{"id":1605,"date":"2011-08-31T03:15:00","date_gmt":"2011-08-31T03:15:00","guid":{"rendered":"http:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/"},"modified":"2017-11-01T02:21:48","modified_gmt":"2017-11-01T02:21:48","slug":"cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win","status":"publish","type":"post","link":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/","title":{"rendered":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win?"},"content":{"rendered":"<p>Came across an article on EDN that talks about <a href=\"http:\/\/www.edn.com\/article\/518710-The_quandary_of_EDA_software_piracy.php\">software piracy in EDA<\/a>&nbsp;land.<br \/>Apparently 30% to 40% of all EDA software use is via pirated licenses.<br \/>Imagine what this means in terms of lost revenue to EDA vendors, and to endusers, it might be argued that a rival design team is spending far less on far more software licenses - and getting their products out to market much quicker.<\/p>\n<p>Sounds like an echo of problems plaguing the general software, music and film industries?<br \/>If fewer and fewer people buy legitimate licenses (software, songs, movies etc.) then perhaps fewer EDA vendors (artists) will be able to make a good living, and there might eventually be less EDA software (works of art) for endusers.<\/p>\n<p>The cloud has been talked about as a potential means of prevention.<br \/>According to a Cadence spokesperson,<\/p>\n<blockquote><p>\"When we have software as a service, either at our own cloud or an external Cadence-certified cloud, we basically retain control of the environment, including the licensed server.&nbsp;Licensing becomes a non-issue.\"<\/p><\/blockquote>\n<p>There are few doubts as to whether a cloud computing solution will help mitigate software piracy, given its degree of control and flexibility for both vendors and endusers.<\/p>\n<p>But there is a deeper side of the issue that we shouldn't ignore, and that is when there is an arms race, both sides would do better to embrace each other rather than compete to see who can create the better licensing mechanism or more elegant key crack.<br \/>As a Chinese saying goes, \u201c\u9053\u9ad8\u4e00\u5c3a\u9b54\u9ad8\u4e00\u4e08\u201d - loosely translated as, \"When the priest advances one foot, the devil advances by ten\" - a perpetual arms race, essentially, which is probably going to bleed the vendors dry and cause inefficiencies for legitimate users in the long run.<\/p>\n<p>What I'm trying to express is, there must be a more effective middle ground where EDA vendors and endusers can come together in a win-win situation.<br \/>The cloud is a wonderful place to meet in the middle, affording each side:<\/p>\n<ul>\n<li>effective means of control and usage<\/li>\n<li>smooth trial and feedback<\/li>\n<li>efficient delivery and support on a large (in EDA anyway) scale (Larry Disenhof, group director of export compliance and government affairs at Cadence, estimates that one third of such piracy could be turned into revenue)<\/li>\n<\/ul>\n<div>What are your thoughts?<\/div>\n<div><\/div>\n<p>Harnhua<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Came across an article on EDN that talks about software piracy in EDA&nbsp;land.Apparently 30% to 40% of all EDA software use is via pirated licenses.Imagine what this means in terms of lost revenue to EDA vendors, and to endusers, it might be argued that a rival design team is spending far less on far more [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"_links_to":"","_links_to_target":""},"categories":[205],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify Blog &amp; Support<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify Blog &amp; Support\" \/>\n<meta property=\"og:description\" content=\"Came across an article on EDN that talks about software piracy in EDA&nbsp;land.Apparently 30% to 40% of all EDA software use is via pirated licenses.Imagine what this means in terms of lost revenue to EDA vendors, and to endusers, it might be argued that a rival design team is spending far less on far more [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/\" \/>\n<meta property=\"og:site_name\" content=\"Plunify Blog &amp; Support\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-31T03:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-01T02:21:48+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirvy Teo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/support.plunify.com\/en\/#organization\",\"name\":\"Plunify-Support\",\"url\":\"https:\/\/support.plunify.com\/en\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/support.plunify.com\/en\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i1.wp.com\/support.plunify.com\/en\/wp-content\/uploads\/sites\/5\/2016\/05\/Plunify_Logo_Outline_TranspBG_sm.png?fit=600%2C159&ssl=1\",\"contentUrl\":\"https:\/\/i1.wp.com\/support.plunify.com\/en\/wp-content\/uploads\/sites\/5\/2016\/05\/Plunify_Logo_Outline_TranspBG_sm.png?fit=600%2C159&ssl=1\",\"width\":600,\"height\":159,\"caption\":\"Plunify-Support\"},\"image\":{\"@id\":\"https:\/\/support.plunify.com\/en\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/support.plunify.com\/en\/#website\",\"url\":\"https:\/\/support.plunify.com\/en\/\",\"name\":\"Plunify Blog &amp; Support\",\"description\":\"Everything you need to know about Plunify products\",\"publisher\":{\"@id\":\"https:\/\/support.plunify.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/support.plunify.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#webpage\",\"url\":\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/\",\"name\":\"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify Blog &amp; Support\",\"isPartOf\":{\"@id\":\"https:\/\/support.plunify.com\/en\/#website\"},\"datePublished\":\"2011-08-31T03:15:00+00:00\",\"dateModified\":\"2017-11-01T02:21:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/support.plunify.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud computing &amp; software piracy: From prevention and mitigation to win-win?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#webpage\"},\"author\":{\"@id\":\"https:\/\/support.plunify.com\/en\/#\/schema\/person\/e837e6c73fa6ac9d51563659f5703277\"},\"headline\":\"Cloud computing &amp; software piracy: From prevention and mitigation to win-win?\",\"datePublished\":\"2011-08-31T03:15:00+00:00\",\"dateModified\":\"2017-11-01T02:21:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#webpage\"},\"wordCount\":394,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/support.plunify.com\/en\/#organization\"},\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/support.plunify.com\/en\/#\/schema\/person\/e837e6c73fa6ac9d51563659f5703277\",\"name\":\"Kirvy Teo\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/support.plunify.com\/en\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/774c97d4bacda481b716e8168ce23aad?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/774c97d4bacda481b716e8168ce23aad?s=96&d=mm&r=g\",\"caption\":\"Kirvy Teo\"},\"url\":\"https:\/\/support.plunify.com\/en\/author\/kirvy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify Blog &amp; Support","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/","og_locale":"en_US","og_type":"article","og_title":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify Blog &amp; Support","og_description":"Came across an article on EDN that talks about software piracy in EDA&nbsp;land.Apparently 30% to 40% of all EDA software use is via pirated licenses.Imagine what this means in terms of lost revenue to EDA vendors, and to endusers, it might be argued that a rival design team is spending far less on far more [&hellip;]","og_url":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/","og_site_name":"Plunify Blog &amp; Support","article_published_time":"2011-08-31T03:15:00+00:00","article_modified_time":"2017-11-01T02:21:48+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirvy Teo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/support.plunify.com\/en\/#organization","name":"Plunify-Support","url":"https:\/\/support.plunify.com\/en\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/support.plunify.com\/en\/#logo","inLanguage":"en-US","url":"https:\/\/i1.wp.com\/support.plunify.com\/en\/wp-content\/uploads\/sites\/5\/2016\/05\/Plunify_Logo_Outline_TranspBG_sm.png?fit=600%2C159&ssl=1","contentUrl":"https:\/\/i1.wp.com\/support.plunify.com\/en\/wp-content\/uploads\/sites\/5\/2016\/05\/Plunify_Logo_Outline_TranspBG_sm.png?fit=600%2C159&ssl=1","width":600,"height":159,"caption":"Plunify-Support"},"image":{"@id":"https:\/\/support.plunify.com\/en\/#logo"}},{"@type":"WebSite","@id":"https:\/\/support.plunify.com\/en\/#website","url":"https:\/\/support.plunify.com\/en\/","name":"Plunify Blog &amp; Support","description":"Everything you need to know about Plunify products","publisher":{"@id":"https:\/\/support.plunify.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/support.plunify.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#webpage","url":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/","name":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify Blog &amp; Support","isPartOf":{"@id":"https:\/\/support.plunify.com\/en\/#website"},"datePublished":"2011-08-31T03:15:00+00:00","dateModified":"2017-11-01T02:21:48+00:00","breadcrumb":{"@id":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/support.plunify.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win?"}]},{"@type":"Article","@id":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#article","isPartOf":{"@id":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#webpage"},"author":{"@id":"https:\/\/support.plunify.com\/en\/#\/schema\/person\/e837e6c73fa6ac9d51563659f5703277"},"headline":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win?","datePublished":"2011-08-31T03:15:00+00:00","dateModified":"2017-11-01T02:21:48+00:00","mainEntityOfPage":{"@id":"https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#webpage"},"wordCount":394,"commentCount":1,"publisher":{"@id":"https:\/\/support.plunify.com\/en\/#organization"},"articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#respond"]}]},{"@type":"Person","@id":"https:\/\/support.plunify.com\/en\/#\/schema\/person\/e837e6c73fa6ac9d51563659f5703277","name":"Kirvy Teo","image":{"@type":"ImageObject","@id":"https:\/\/support.plunify.com\/en\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/774c97d4bacda481b716e8168ce23aad?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/774c97d4bacda481b716e8168ce23aad?s=96&d=mm&r=g","caption":"Kirvy Teo"},"url":"https:\/\/support.plunify.com\/en\/author\/kirvy\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7XiEH-pT","_links":{"self":[{"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/posts\/1605"}],"collection":[{"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/comments?post=1605"}],"version-history":[{"count":1,"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/posts\/1605\/revisions"}],"predecessor-version":[{"id":2861,"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/posts\/1605\/revisions\/2861"}],"wp:attachment":[{"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/media?parent=1605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/categories?post=1605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/support.plunify.com\/en\/wp-json\/wp\/v2\/tags?post=1605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}