Software Piracy


SOFTWARE PIRACY

We regularly hear reports about the cost to the software industry of software piracy, but are the claims to be taken at face value? Statistics are notoriously biased towards what the author is trying to say.

Types of Software:

There are three basic types of software, although these do have their own subsections, as will be discussed later:

1. Commercial software, purchased with a licence for one or more computers. This generally is coupled with some form of support and regular updates to patch errors etc. Sometimes a new version of the software is offered at a reduced rate as "update". This type of software is generally relatively expensive and is often designed to cover specific industrial purposes. The big exception is the various sets of "office" software, which are designed for use in the commercial environment, but can naturally be equally used for various tasks at home. The most common application in this category is, of course, text editing. Most of the other classic "office" applications, such as calculations and data bases are only of limited use in the domestic environment, although they will be used in some cases, particularly now that the more computer-literate generation is growing.

2. Simplified or "lite" versions of the commercial software. These are intended principally for small businesses and enterprises that do not need the complete capabilities of, say, a 3-D modelling system, but must be able to view such documentation and prepare compatible drawings. Again, the "office" environment was a long time not represented in this sector, but has recently started to be available. These will also come with a single or multiple, but limited licence and now mostly be registered with the manufacturer.

3. Free or "open source" software. This is designed for general distribution and has no particular limitations as to use, except that it may not be changed in any way. Naturally, such software has its limitations, but may serve very adequately for many purposes. Practically all types of software are to be found in this category. One notable application distributes the software to read its documents freely, but charges for the software to produce the documents. This policy is arguably the motor behind its ride to a position as industry standard, since you can always be certain that he receiver can decipher whatever is sent, without long discussions about compatibility and versions.

Clearly, there can be no piracy of products that fall into the third category, except for changing of the code or reuse of the code for other purposes, but this does not appear to be a major issue at the moment, so we will concentrate our attention on the first two categories.

Both of these categories contain software that is copied and distributed either free of charge or for a nominal fee. Naturally, the full versions of the software are preferred, but the simplified versions are also to be found, depending on what is available.

Types of Software Pirate

This puts our software pirates into two categories of their own:

1. Those who knowingly use a copy of software "borrowed" from work or supplied by friends, who probably acquired it by the same means.

2. Those who prepare copies of software from an original and sell it at a low price through internet auctions or on market stands. Their customers may, in many cases, be unaware that the software has been pirated and simply be pleased to acquire a software package at a bargain price. Some will be quite well aware of the actual source, but still prepared to take this means of saving money.

Composition of the Groups:

So who is to be found in these two groups?

1. This group is very widely ranged and consists of school children, people practicing at home with the company software, various private persons with an interest in computers who will try anything that is free and, possibly, very small businesses. Many schools will supply their students with copies of software licensed for the school to enable them to complete homework or learn to use it for technical subjects. A student finishing a technical school with little or no knowledge of the technical software used in their industry will not easily find employment, so a blind eye is turned in many schools to this practice. Schoolwork is often required to be written on computer these days, and again, this is only really possible if some form of text software is available. Those who use company software at home to play with or for their children to complete homework are also a large group. The computer has become a part of our lifestyle in the western hemisphere, and many people are interested in the possibilities opened by the modern generation of powerful number-crunchers. The days of mainframe computers costing hundreds of thousands of dollars is not gone, but the small computer in a network has taken over in many areas, so the professional software that would earlier have required a mainframe connection and a whole basement full of equipment will now run happily on a home computer. There may be a loss of speed, but who cares? The vast majority of these people know full well that what they are doing is not allowed, but consider this as a very minor matter, and would laugh at any suggestion that they should purchase the software officially. The few companies that also do this are saving money that they probably do not have, despite being aware of the risks.

2. The group of people who copy software and distribute it for sale as being genuine are working simply for profit, taking advantage of the simplicity of the process and the high prices of genuine software. The general public is not aware of the penalties for this type of action and is often unsure about recognising the genuine article. Other items in the consumer market are available from many manufacturers as basically identical products, so why should this not be the case with software? Very many are simply duped into buying what they see as a cheap alternative to a brand-marked product.

Costs of Software Piracy:

So what are the real costs to the software companies?

In most cases, school and college students would not be in a position to pay the costs for the expensive commercial software they use in technical subjects, and the schools and colleges are not in a position to supply this to them free of charge. Most schools have licences for software to be used on the premises, but this is not available for the students at home. Theoretically, they will use the computers at school to complete work and practice, but this is generally not possible due to a lack of resources, or classrooms locked because of vandalism. The only way to solve the problem is for the schools to simply distribute the software to their students on the basis of it being only for their use. There is no licence and no direct upgrade possible. Generally, although illegal, this system works quite well. Schools try to copy upgrades and patches for their students, mostly successfully. The snag to the matter is that we educate people in that this is perfectly acceptable practice, despite it being illegal. No-one would think of insisting or even checking that drop-out students erase the software and no longer use it, but this is probably fairly well assured by the fact that they have dropped out in the first place!

Solutions to Software Piracy:

Student Software:

Low-Cost Software:

One of the best-known software companies has recently started to sell a slightly simplified version of their software in a student package, stating that this is not for commercial use. Naturally, this is being distributed to everybody without regard to their true status as student or not! Nevertheless it is a definite move in the right direction. Providing an affordable alternative is the first step towards a solution for this problem. The quality is good and it contains all the usual features that are needed.

Other companies also offer free software for student use, but this is in most cases pitifully inadequate and simply not up to the job and no preparation for later commercial practice. It remains to be seen how far the availability of reasonably priced student software will affect sales of the commercial product. One of the factors presumably behind this move is the general attitude that the present software is perfectly adequate and can be used for a length of time without being replaced. Since many software houses have distanced themselves from the idea of upgrade software for older versions at a reduced price, this attitude will probably cause sales of the full commercial software to be limited to new systems, and not as an improvement on older systems.

The new wave of student software is probably intended to bridge this gap somewhat by providing extra revenue. Whether the fears of the others that the production of a student version at greatly reduced price will cut into their sales of the full, commercial version will prove to be correct, or the alternative view that these are complementary products will prevail will remain to be seen.

Benefits of Student Use:

It is undoubtedly true that someone who has trained on one type of software will tend to remain loyal to it as far as company policies allow and that this is a definite motivation to purchase a type of software, hence the policy of the schools is unlikely to be challenged or mentioned publicly. Nevertheless, there is no reason for forcing our youth into criminal activity! Providing a solution that allows people to use these applications during training legally should be a priority for the software houses that will bring some revenue in the short term, and possibly more in the long term. One of the problems in the computer branch has always been the emphasis on short term results and quick profits, but this attitude will have to change soon to allow for these factors.

"Fun " Use:

Again, the people who use the company software at home for fun cannot really be seen as a risk to the profits of a software company. They would simply spend their time otherwise in the evenings if they did not have this possibility! The matter only then becomes problematic when they begin producing work privately for other companies. This would then definitely be a matter for concern, both for the producers of the software and other companies in the same branch, who have to calculate the costs of software into their prices.

Geographical Factors:

The problem is also geographically different. Most of the software packages originate, at least on paper, from the United States. The prices in Europe tend to be 1.5 to 2 times higher, without considering sales tax of any type, which is generally higher in most European countries. Whilst this may not be of consequence for the run of low-cost software, it is a significant difference when complex design or technical applications are considered. This price differential is often explained by higher support costs or translation costs, but these factors alone cannot be the complete reason. A change in this policy would probably help to reduce the level of use of copies in the commercial field at least. Splitting software packages into easily-upgraded elements would also enable small companies to purchase what they need immediately and then add the extra features in time as and when necessary.

Reasons for Software Piracy:

Software piracy is legally a crime, but it is a crime that is still acceptable in our society. Very little has been done to combat it for a number of reasons. One reason is that it is almost universal amongst users of computers. Many people "need" an application once per year and do not wish to pay the sometimes horrendous cost for the commercial licences. Companies have made no real attempt to combat it until now, since this is a form of free advertising, and the benefits of having it available to students have been mentioned above. It is only now, when the earning curve start to tip downhill that this is seen as a threat to company existence. In reality it is relatively simple to make something extremely difficult to copy. Impossibility is a dream in the computer world these days!

Concluding Remarks:

That criminal activity should be hindered and software piracy is, broadly speaking, theft, is quite correct, but the solution is not just to seek out and punish wrong-doers, but to find a solution for all these groups of people who, for one reason or other, wish to use the software, but cannot, or will not, find the means of paying the present market cost. An imaginative solution to this problem could well be the break-through that a company needs to make itself known in every household, provided the product is correct.

Simon Fowler is a graduate in Mechanical Engineering and now works as sales technician for flue gas analyzers. He is presently employed by madur electronics in Vienna, Austria.

limo prices to midway Crystal Lake west of Randal .. Lockport Chicago limo O’Hare
In The News:

Creating an email alias can help clean up your inbox by organizing emails based on purpose, like creating different aliases for shopping, newsletters and work.
A multipurpose robotic system promises to transform how items are stacked onto pallets, aiming to maximize space utilization and reduce shipping costs.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Melody, the artificial intelligence-powered robot, is life-sized and represents a move toward creating robots that resemble people in appearance and interaction.
Here are five easy smartphone rules from the National Security Agency that you can follow to better protect your mobile device from hackers and scammers.
A U.S. robotics company has developed "Jennie," a robotic pet powered by artificial intelligence that's designed to comfort those facing mental health challenges.
Healthcare records for more than 184 million Americans were breached in 2024, but you can take steps to minimize that risk. Kurt the CyberGuy explains.
The Skyrider X1 from Rictor claims to be the "first amphibious flying passenger motorcycle," and it combines land and air travel in one sleek design.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Home inventory and restoration apps help itemize and track every item in your home in the event you have to make an insurance claim after a natural disaster.
The White House launched a new cybersecurity safety label, the U.S. Cyber Trust Mark, intended to help consumers make informed decisions on smart device safety.
Today's tech can help make life so much easier — if you know how to use it. Here are a few tips on the quickest and best ways to make your phone, laptop and other devices work for you.
Tech expert Kurt “CyberGuy" Knutsson offers Windows 11 restart fixes: Update drivers, run system scans and check hardware.
Sony and Honda's Afeela 1 EV launches with advanced tech and entertainment for $89,900. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.

Microsoft Axapta, Navision or Great Plains: ERP Selection for Large Corporation

If you would like to pick something from Microsoft, or... Read More

Microsoft Great Plains Customization Tools Evolution ? Overview for Consultant

When Great Plains Software introduced the first graphical accounting application... Read More

Understanding XML Server

XML Server can be a Web Server that stores the... Read More

Microsoft Great Plains - Typical Problems And Fixes ? Overview For IT Administrators

How to delete the user? This is the first problem... Read More

MSN Messenger Is A Sweet Way To Communicate

MSN messenger is a pretty cool invention. I mean I'm... Read More

Great Plains Sales Order Processing and Invoicing Modules ? Tips For Consultants

We'll give you non formal view, based on our consulting... Read More

Reloading Windows XP

If you have been running Windows XP for a couple... Read More

Microsoft Great Plains Food Processing ? Implementation & Customization Highlights

Microsoft Great Plains might be considered as ERP platform to... Read More

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

Rapid Application Development - Is it Really a Need of Today?

Rapid Application Development (RAD) is a software development methodology. In... Read More

Microsoft Blues

With the advent of 'Service Pack 2' for Windows XP... Read More

DB Integration - Software for Combine MS Access Databases

Our company, Novaprof Inc., developed unique software - DB Integration.... Read More

netstat - Linux Command to Display Networking Information

In linux, one of great commands for finding out information... Read More

Microsoft Great Plains Distribution, Barcoding, Consignment ? overview for consultant

Microsoft Great Plains ? ERM from Microsoft Business Solutions and... Read More

Adware, What Is It?

Adware is a type of Spyware program that displays some... Read More

Microsoft CRM in Latin America: Implementation, Customization, Support ? Overview for Consultant

Microsoft Business Solutions CRM is present several years on the... Read More

Passwords Used In Microsoft Word Documents

You would like to protect your documents, wouldn't you? Reasons... Read More

SpyBot - Search and Destroy versus Microsoft AntiSpyware (Beta).... My personal experiences...

Ok... Where to start?Well, I guess I will start at... Read More

EDI: Electronic Document Interchange for Microsoft Great Plains ? Overview for Software Developer/Pr

Microsoft Great Plains - Microsoft Business Solutions accounting and ERP... Read More

The Top 5 Wrong Reasons For Not Hiring Testers

Considering whether or not your software company should hire a... Read More

Chinese Input - Step by Step Instruction on How to Input Chinese Characters in English Windows XP

Enabling Chinese input is quick and easy, there are only... Read More

Microsoft Great Plains Integration with Legacy Systems ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Best Practices In Choosing Network Monitoring Software

Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More

Programming Language Migration Path

While I was preparing some personal background information for a... Read More

The True Meaning of Freeware

The vast majority of us will have, at some point,... Read More

taxi o'hare Auburn ..