View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
November 25, 1990

“SOFTWARE THEFT REACHING DANGEROUS LEVELS” – UNIX VENDORS

By CBR Staff Writer

Some of the leading Unix software vendors, including Interactive Systems Corp, Santa Cruz Operation Inc, Informix Software Inc and Uniplex Ltd, claim that up to 50% of all Unix software currently being used in the UK has been illegally installed. Lars Turndal, managing director of Santa Cruz UK says that in his company’s market for every piece of ‘official’ software sold, at least one other is actually installed. The problem, it seems, does not lie with end users, or even management information systems managers abusing their powers by copying software – the problem centres on a minority within the reseller channels, says Informix UK’s managing director Malcolm Padina. Some resellers are copying purchased software onto customers’ systems and then walking out with those same disks ready for the next job. Not only is this illegal, but it leaves the user with no support media and denies the customer the ability to reinstall the software at a later date. After such a public admission of these abuses, moves to combat the problem are likely to come swiftly from the Unix industry. The Federation Against Software Theft – FAST – is one group that has long campaigned for a clampdown on such activities. Interactive Systems’ director of European operations, Doug Miller, admits that a lot of software has been illegally installed, but believes the practice is even more rife on the continent, where it could even be reaching the endemic levels more often associated with the former Eastern Bloc countries. One Italian Interactive reseller claims that for every legitimate copy of Interactive Unix installed in Italy, there are between five and 10 others illegally installed. Given those numbers, we’ve probably got a million copies installed, said Miller.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU