{"id":1605,"date":"2011-08-31T03:15:00","date_gmt":"2011-08-31T03:15:00","guid":{"rendered":"http:\/\/support.plunify.com\/en\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/"},"modified":"2011-08-31T03:15:00","modified_gmt":"2011-08-31T03:15:00","slug":"cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win","status":"publish","type":"post","link":"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/","title":{"rendered":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win?"},"content":{"rendered":"<p>Came across an article on EDN that talks about <a href=\"http:\/\/www.edn.com\/article\/518710-The_quandary_of_EDA_software_piracy.php\">software piracy in EDA<\/a>&nbsp;land.<br \/>Apparently 30% to 40% of all EDA software use is via pirated licenses.<br \/>Imagine what this means in terms of lost revenue to EDA vendors, and to endusers, it might be argued that a rival design team is spending far less on far more software licenses - and getting their products out to market much quicker.<\/p>\n<p>Sounds like an echo of problems plaguing the general software, music and film industries?<br \/>If fewer and fewer people buy legitimate licenses (software, songs, movies etc.) then perhaps fewer EDA vendors (artists) will be able to make a good living, and there might eventually be less EDA software (works of art) for endusers.<\/p>\n<p>The cloud has been talked about as a potential means of prevention.<br \/>According to a Cadence spokesperson,<\/p>\n<blockquote><p>\"When we have software as a service, either at our own cloud or an external Cadence-certified cloud, we basically retain control of the environment, including the licensed server.&nbsp;Licensing becomes a non-issue.\"<\/p><\/blockquote>\n<p>There are few doubts as to whether a cloud computing solution will help mitigate software piracy, given its degree of control and flexibility for both vendors and endusers.<\/p>\n<p>But there is a deeper side of the issue that we shouldn't ignore, and that is when there is an arms race, both sides would do better to embrace each other rather than compete to see who can create the better licensing mechanism or more elegant key crack.<br \/>As a Chinese saying goes, \u201c\u9053\u9ad8\u4e00\u5c3a\u9b54\u9ad8\u4e00\u4e08\u201d - loosely translated as, \"When the priest advances one foot, the devil advances by ten\" - a perpetual arms race, essentially, which is probably going to bleed the vendors dry and cause inefficiencies for legitimate users in the long run.<\/p>\n<p>What I'm trying to express is, there must be a more effective middle ground where EDA vendors and endusers can come together in a win-win situation.<br \/>The cloud is a wonderful place to meet in the middle, affording each side:<\/p>\n<ul>\n<li>effective means of control and usage<\/li>\n<li>smooth trial and feedback<\/li>\n<li>efficient delivery and support on a large (in EDA anyway) scale (Larry Disenhof, group director of export compliance and government affairs at Cadence, estimates that one third of such piracy could be turned into revenue)<\/li>\n<\/ul>\n<div>What are your thoughts?<\/div>\n<div><\/div>\n<p>Harnhua<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Came across an article on EDN that talks about software piracy in EDA&nbsp;land.Apparently 30% to 40% of all EDA software use is via pirated licenses.Imagine what this means in terms of lost revenue to EDA vendors, and to endusers, it might be argued that a rival design team is spending far less on far more [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[99],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify \u65e5\u672c\u8a9e\u30d8\u30eb\u30d7\u30c7\u30b9\u30af<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify \u65e5\u672c\u8a9e\u30d8\u30eb\u30d7\u30c7\u30b9\u30af\" \/>\n<meta property=\"og:description\" content=\"Came across an article on EDN that talks about software piracy in EDA&nbsp;land.Apparently 30% to 40% of all EDA software use is via pirated licenses.Imagine what this means in terms of lost revenue to EDA vendors, and to endusers, it might be argued that a rival design team is spending far less on far more [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/\" \/>\n<meta property=\"og:site_name\" content=\"Plunify \u65e5\u672c\u8a9e\u30d8\u30eb\u30d7\u30c7\u30b9\u30af\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-31T03:15:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"plunify\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/support.plunify.com\/jp\/#website\",\"url\":\"https:\/\/support.plunify.com\/jp\/\",\"name\":\"Plunify \\u65e5\\u672c\\u8a9e\\u30d8\\u30eb\\u30d7\\u30c7\\u30b9\\u30af\",\"description\":\"Plunify \\u65e5\\u672c\\u8a9e\\u30b5\\u30dd\\u30fc\\u30c8\\u30b5\\u30a4\\u30c8\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/support.plunify.com\/jp\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#webpage\",\"url\":\"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/\",\"name\":\"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify \\u65e5\\u672c\\u8a9e\\u30d8\\u30eb\\u30d7\\u30c7\\u30b9\\u30af\",\"isPartOf\":{\"@id\":\"https:\/\/support.plunify.com\/jp\/#website\"},\"datePublished\":\"2011-08-31T03:15:00+00:00\",\"dateModified\":\"2011-08-31T03:15:00+00:00\",\"author\":{\"@id\":\"https:\/\/support.plunify.com\/jp\/#\/schema\/person\/0702317d75b841ce991ca9936b72f8b0\"},\"breadcrumb\":{\"@id\":\"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/support.plunify.com\/jp\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud computing &amp; software piracy: From prevention and mitigation to win-win?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/support.plunify.com\/jp\/#\/schema\/person\/0702317d75b841ce991ca9936b72f8b0\",\"name\":\"plunify\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/support.plunify.com\/jp\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/79e7edc12624b682db2df4112ff7210b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/79e7edc12624b682db2df4112ff7210b?s=96&d=mm&r=g\",\"caption\":\"plunify\"},\"url\":\"https:\/\/support.plunify.com\/jp\/author\/plunify\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify \u65e5\u672c\u8a9e\u30d8\u30eb\u30d7\u30c7\u30b9\u30af","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/","og_locale":"en_US","og_type":"article","og_title":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify \u65e5\u672c\u8a9e\u30d8\u30eb\u30d7\u30c7\u30b9\u30af","og_description":"Came across an article on EDN that talks about software piracy in EDA&nbsp;land.Apparently 30% to 40% of all EDA software use is via pirated licenses.Imagine what this means in terms of lost revenue to EDA vendors, and to endusers, it might be argued that a rival design team is spending far less on far more [&hellip;]","og_url":"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/","og_site_name":"Plunify \u65e5\u672c\u8a9e\u30d8\u30eb\u30d7\u30c7\u30b9\u30af","article_published_time":"2011-08-31T03:15:00+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"plunify","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/support.plunify.com\/jp\/#website","url":"https:\/\/support.plunify.com\/jp\/","name":"Plunify \u65e5\u672c\u8a9e\u30d8\u30eb\u30d7\u30c7\u30b9\u30af","description":"Plunify \u65e5\u672c\u8a9e\u30b5\u30dd\u30fc\u30c8\u30b5\u30a4\u30c8","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/support.plunify.com\/jp\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#webpage","url":"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/","name":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win? - Plunify \u65e5\u672c\u8a9e\u30d8\u30eb\u30d7\u30c7\u30b9\u30af","isPartOf":{"@id":"https:\/\/support.plunify.com\/jp\/#website"},"datePublished":"2011-08-31T03:15:00+00:00","dateModified":"2011-08-31T03:15:00+00:00","author":{"@id":"https:\/\/support.plunify.com\/jp\/#\/schema\/person\/0702317d75b841ce991ca9936b72f8b0"},"breadcrumb":{"@id":"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/support.plunify.com\/jp\/2011\/08\/31\/cloud-computing-software-piracy-from-prevention-and-mitigation-to-win-win\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/support.plunify.com\/jp\/"},{"@type":"ListItem","position":2,"name":"Cloud computing &amp; software piracy: From prevention and mitigation to win-win?"}]},{"@type":"Person","@id":"https:\/\/support.plunify.com\/jp\/#\/schema\/person\/0702317d75b841ce991ca9936b72f8b0","name":"plunify","image":{"@type":"ImageObject","@id":"https:\/\/support.plunify.com\/jp\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/79e7edc12624b682db2df4112ff7210b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/79e7edc12624b682db2df4112ff7210b?s=96&d=mm&r=g","caption":"plunify"},"url":"https:\/\/support.plunify.com\/jp\/author\/plunify\/"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/support.plunify.com\/jp\/wp-json\/wp\/v2\/posts\/1605"}],"collection":[{"href":"https:\/\/support.plunify.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/support.plunify.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/support.plunify.com\/jp\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/support.plunify.com\/jp\/wp-json\/wp\/v2\/comments?post=1605"}],"version-history":[{"count":0,"href":"https:\/\/support.plunify.com\/jp\/wp-json\/wp\/v2\/posts\/1605\/revisions"}],"wp:attachment":[{"href":"https:\/\/support.plunify.com\/jp\/wp-json\/wp\/v2\/media?parent=1605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/support.plunify.com\/jp\/wp-json\/wp\/v2\/categories?post=1605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/support.plunify.com\/jp\/wp-json\/wp\/v2\/tags?post=1605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}