Software Piracy


SOFTWARE PIRACY

We regularly hear reports about the cost to the software industry of software piracy, but are the claims to be taken at face value? Statistics are notoriously biased towards what the author is trying to say.

Types of Software:

There are three basic types of software, although these do have their own subsections, as will be discussed later:

1. Commercial software, purchased with a licence for one or more computers. This generally is coupled with some form of support and regular updates to patch errors etc. Sometimes a new version of the software is offered at a reduced rate as "update". This type of software is generally relatively expensive and is often designed to cover specific industrial purposes. The big exception is the various sets of "office" software, which are designed for use in the commercial environment, but can naturally be equally used for various tasks at home. The most common application in this category is, of course, text editing. Most of the other classic "office" applications, such as calculations and data bases are only of limited use in the domestic environment, although they will be used in some cases, particularly now that the more computer-literate generation is growing.

2. Simplified or "lite" versions of the commercial software. These are intended principally for small businesses and enterprises that do not need the complete capabilities of, say, a 3-D modelling system, but must be able to view such documentation and prepare compatible drawings. Again, the "office" environment was a long time not represented in this sector, but has recently started to be available. These will also come with a single or multiple, but limited licence and now mostly be registered with the manufacturer.

3. Free or "open source" software. This is designed for general distribution and has no particular limitations as to use, except that it may not be changed in any way. Naturally, such software has its limitations, but may serve very adequately for many purposes. Practically all types of software are to be found in this category. One notable application distributes the software to read its documents freely, but charges for the software to produce the documents. This policy is arguably the motor behind its ride to a position as industry standard, since you can always be certain that he receiver can decipher whatever is sent, without long discussions about compatibility and versions.

Clearly, there can be no piracy of products that fall into the third category, except for changing of the code or reuse of the code for other purposes, but this does not appear to be a major issue at the moment, so we will concentrate our attention on the first two categories.

Both of these categories contain software that is copied and distributed either free of charge or for a nominal fee. Naturally, the full versions of the software are preferred, but the simplified versions are also to be found, depending on what is available.

Types of Software Pirate

This puts our software pirates into two categories of their own:

1. Those who knowingly use a copy of software "borrowed" from work or supplied by friends, who probably acquired it by the same means.

2. Those who prepare copies of software from an original and sell it at a low price through internet auctions or on market stands. Their customers may, in many cases, be unaware that the software has been pirated and simply be pleased to acquire a software package at a bargain price. Some will be quite well aware of the actual source, but still prepared to take this means of saving money.

Composition of the Groups:

So who is to be found in these two groups?

1. This group is very widely ranged and consists of school children, people practicing at home with the company software, various private persons with an interest in computers who will try anything that is free and, possibly, very small businesses. Many schools will supply their students with copies of software licensed for the school to enable them to complete homework or learn to use it for technical subjects. A student finishing a technical school with little or no knowledge of the technical software used in their industry will not easily find employment, so a blind eye is turned in many schools to this practice. Schoolwork is often required to be written on computer these days, and again, this is only really possible if some form of text software is available. Those who use company software at home to play with or for their children to complete homework are also a large group. The computer has become a part of our lifestyle in the western hemisphere, and many people are interested in the possibilities opened by the modern generation of powerful number-crunchers. The days of mainframe computers costing hundreds of thousands of dollars is not gone, but the small computer in a network has taken over in many areas, so the professional software that would earlier have required a mainframe connection and a whole basement full of equipment will now run happily on a home computer. There may be a loss of speed, but who cares? The vast majority of these people know full well that what they are doing is not allowed, but consider this as a very minor matter, and would laugh at any suggestion that they should purchase the software officially. The few companies that also do this are saving money that they probably do not have, despite being aware of the risks.

2. The group of people who copy software and distribute it for sale as being genuine are working simply for profit, taking advantage of the simplicity of the process and the high prices of genuine software. The general public is not aware of the penalties for this type of action and is often unsure about recognising the genuine article. Other items in the consumer market are available from many manufacturers as basically identical products, so why should this not be the case with software? Very many are simply duped into buying what they see as a cheap alternative to a brand-marked product.

Costs of Software Piracy:

So what are the real costs to the software companies?

In most cases, school and college students would not be in a position to pay the costs for the expensive commercial software they use in technical subjects, and the schools and colleges are not in a position to supply this to them free of charge. Most schools have licences for software to be used on the premises, but this is not available for the students at home. Theoretically, they will use the computers at school to complete work and practice, but this is generally not possible due to a lack of resources, or classrooms locked because of vandalism. The only way to solve the problem is for the schools to simply distribute the software to their students on the basis of it being only for their use. There is no licence and no direct upgrade possible. Generally, although illegal, this system works quite well. Schools try to copy upgrades and patches for their students, mostly successfully. The snag to the matter is that we educate people in that this is perfectly acceptable practice, despite it being illegal. No-one would think of insisting or even checking that drop-out students erase the software and no longer use it, but this is probably fairly well assured by the fact that they have dropped out in the first place!

Solutions to Software Piracy:

Student Software:

Low-Cost Software:

One of the best-known software companies has recently started to sell a slightly simplified version of their software in a student package, stating that this is not for commercial use. Naturally, this is being distributed to everybody without regard to their true status as student or not! Nevertheless it is a definite move in the right direction. Providing an affordable alternative is the first step towards a solution for this problem. The quality is good and it contains all the usual features that are needed.

Other companies also offer free software for student use, but this is in most cases pitifully inadequate and simply not up to the job and no preparation for later commercial practice. It remains to be seen how far the availability of reasonably priced student software will affect sales of the commercial product. One of the factors presumably behind this move is the general attitude that the present software is perfectly adequate and can be used for a length of time without being replaced. Since many software houses have distanced themselves from the idea of upgrade software for older versions at a reduced price, this attitude will probably cause sales of the full commercial software to be limited to new systems, and not as an improvement on older systems.

The new wave of student software is probably intended to bridge this gap somewhat by providing extra revenue. Whether the fears of the others that the production of a student version at greatly reduced price will cut into their sales of the full, commercial version will prove to be correct, or the alternative view that these are complementary products will prevail will remain to be seen.

Benefits of Student Use:

It is undoubtedly true that someone who has trained on one type of software will tend to remain loyal to it as far as company policies allow and that this is a definite motivation to purchase a type of software, hence the policy of the schools is unlikely to be challenged or mentioned publicly. Nevertheless, there is no reason for forcing our youth into criminal activity! Providing a solution that allows people to use these applications during training legally should be a priority for the software houses that will bring some revenue in the short term, and possibly more in the long term. One of the problems in the computer branch has always been the emphasis on short term results and quick profits, but this attitude will have to change soon to allow for these factors.

"Fun " Use:

Again, the people who use the company software at home for fun cannot really be seen as a risk to the profits of a software company. They would simply spend their time otherwise in the evenings if they did not have this possibility! The matter only then becomes problematic when they begin producing work privately for other companies. This would then definitely be a matter for concern, both for the producers of the software and other companies in the same branch, who have to calculate the costs of software into their prices.

Geographical Factors:

The problem is also geographically different. Most of the software packages originate, at least on paper, from the United States. The prices in Europe tend to be 1.5 to 2 times higher, without considering sales tax of any type, which is generally higher in most European countries. Whilst this may not be of consequence for the run of low-cost software, it is a significant difference when complex design or technical applications are considered. This price differential is often explained by higher support costs or translation costs, but these factors alone cannot be the complete reason. A change in this policy would probably help to reduce the level of use of copies in the commercial field at least. Splitting software packages into easily-upgraded elements would also enable small companies to purchase what they need immediately and then add the extra features in time as and when necessary.

Reasons for Software Piracy:

Software piracy is legally a crime, but it is a crime that is still acceptable in our society. Very little has been done to combat it for a number of reasons. One reason is that it is almost universal amongst users of computers. Many people "need" an application once per year and do not wish to pay the sometimes horrendous cost for the commercial licences. Companies have made no real attempt to combat it until now, since this is a form of free advertising, and the benefits of having it available to students have been mentioned above. It is only now, when the earning curve start to tip downhill that this is seen as a threat to company existence. In reality it is relatively simple to make something extremely difficult to copy. Impossibility is a dream in the computer world these days!

Concluding Remarks:

That criminal activity should be hindered and software piracy is, broadly speaking, theft, is quite correct, but the solution is not just to seek out and punish wrong-doers, but to find a solution for all these groups of people who, for one reason or other, wish to use the software, but cannot, or will not, find the means of paying the present market cost. An imaginative solution to this problem could well be the break-through that a company needs to make itself known in every household, provided the product is correct.

Simon Fowler is a graduate in Mechanical Engineering and now works as sales technician for flue gas analyzers. He is presently employed by madur electronics in Vienna, Austria.

maid service near Lake Forest ..
In The News:

New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.
Android users can now manage apps across multiple devices more easily with Google Play Store's updated remote uninstall button in the latest update.
NASA's Perseverance rover discovers shiny metallic rock on Mars that could be a meteorite from an ancient asteroid, containing high levels of iron and nickel.
Holiday scams spike during Black Friday and Cyber Monday as criminals exploit your leaked personal data. Learn how to protect yourself from fake stores and phishing.
Commerce Department proposes TP-Link router ban over Chinese security risks. Learn how this potential prohibition could affect your home network and devices.
Hyundai AutoEver America suffered a data breach affecting 2,000 current and former employees, exposing names, Social Security numbers and driver's license information.
Washington court rules automated license plate reader images are public records, even when stored by vendors like Flock Safety, setting precedent for transparency.
Fake airline texts claiming flight cancellations are targeting travelers with convincing scams. Learn how cybercriminals steal personal data and credit card info.
Discover how iOS 26's new Adaptive Power feature automatically extends iPhone battery life by learning your usage patterns and adjusting performance intelligently.
New TikTok malware campaign tricks users into running PowerShell commands that download Aura Stealer, which steals credentials and authentication tokens.
Gaia Family offers fixed upfront pricing for IVF cycles with unlimited embryo transfers and financial protection, partnering with over 100 U.S. fertility clinics.
The Jetsons Act aims to position Pennsylvania as a leader in advanced air mobility by establishing regulations for hybrid ground-air vehicles.

The Religion And Philosophy Of Small Internet Business

I have always had a tendency to focus on the... Read More

Is Your Small Business Ready For A CRM Software Solution?

I have yet to see a business that, sometimes in... Read More

Beware of Spyware

One day, you suddenly realize that your computer started to... Read More

OS 101: Suggestions for Choosing an Operating System

An operating system (abbreviated OS) is essentially the path through... Read More

Linux ? Keyboard Or Mouse

Just stress testing one of the latest Linux distributions. Been... Read More

Microsoft Great Plains: Customization Upgrade & Recovery ? Visual Studio VB 6.0

Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More

Microsoft Great Plains Implementation in Russia ? Overview for Consultant

Microsoft Business Solutions Great Plains is very popular ERP platform... Read More

Microsoft Great Plains customization ? Freight Forwarding/Transportation industry example

Microsoft Business Solutions Great Plains version 8.5, 8.0, 7.5, Great... Read More

Microsoft Great Plains Reporting ? Overview for Developer

Looks like Microsoft Great Plains becomes more and more... Read More

Defining OLAP Solutions and Data Warehouse design

This tutorial covers OLAP solutions used by Data warehouses and... Read More

Software Automation Helps Increase your Bottom Line

When you own a small business, time is money. And... Read More

Microsoft Great Plains & CRM in Transportation & Logistics ? Overview

Microsoft Business Solutions Great Plains and MS CRM (client relation... Read More

Microsoft Great Plains: Manufacturing or Bill of Materials - Overview for IT Specialist

Microsoft Great Plains is main Microsoft Business Solutions product, targeted... Read More

ERP for Large Corporation ? New Selling Strategy

Our opinion is based on our Microsoft Business Solutions Great... Read More

Introduction To ISDN, Part II

In the previous ISDN article, we looked at how and... Read More

Four Easy Ways To Prevent Spyware

How would you like to prevent spyware and adware from... Read More

Microsoft Great Plains: Service Business Customization & Integration Example

Microsoft Business Solutions Great Plains might be considered as ERP... Read More

Antivirus Software ? Get The Bugs Before They Get You!

You turn on your computer, and it doesn't look quite... Read More

Hubris - Definition: Microsofts Passport

Before September of 1995, Microsoft ignored the Internet because their... Read More

Microsoft Great Plains, Navision, Axapta ? Selection Considerations

During the years of our consulting practice, which comes back... Read More

15 Questions to Ask Your Software Vendor

When making a decision to buy any piece of software... Read More

Software Piracy

SOFTWARE PIRACY We regularly hear reports... Read More

Getting Patched with Windows Service Pack

Are you one of those people that keeps track of... Read More

What is Fleet Maintenance Management?

Fleet Maintenance Management is a critical position in any company... Read More

Groupware: What Works the Way Businesses Do?

GroupwareThe internet is full of 1.5 million to 7 million... Read More

top rated cleaning service Des Plaines ..