Feeds

PwC: software patents threat to Europe

Few prepared for consequences

  • alert
  • submit to reddit

New hybrid storage solutions

Services and accountancy firm Price Waterhouse Coopers has formally identified software patenting as a threat to the growth and success of ICT in Europe.

In a report prepared this summer for the Dutch EU presidency, PwC lists ten ICT breakthroughs it says are needed to resume the pace of growth Europe experienced during the IT boom. Under the fifth, entitled "Go for global platform leadership in the ICT industry", the report states that the "current discussion on the patent on software" represents a "particular threat" to the European ICT industry.

In a preface, Laurens Jan Brinkhorst, Minister of Economic Affairs in the Netherlands, says that the aim of the document is to present "a list of breakthroughs that we may need to achieve our Lisbon-goals".

He argues that Europe, particularly a post-dot-com-crash Europe, with ten new member states, needs to re-evaluate how best to meet its own targets for economic, social and environmental renewal, set out in Lisbon, in 2000.

This is what it has to say about software patenting:

The mild regime of IP protection in the past has led to a very innovative and competitive software industry with low entry barriers. A software patent, which serves to protect inventions of a non-technical nature, could kill the high innovation rate. However, opinions on software patent in its current proposed form vary a lot. Many large companies operating on a global scale, including European ones, seem to be in favour of a software patenting regime. But most small enterprises are strongly opposed.

Only very few European companies have prepared themselves for the consequences of a software patent regime. It raises the question how the introduction of the European software patent interacts with a European strategy based on widespread use of ICT's.

The authors have chosen their words carefully, and in doing so, have got straight to the really messy parts of the whole debate: what exactly constitutes a technical effect; and who will really benefit from the directive becoming law.

The report, entitled Rethinking the European ICT Agenda: Ten ICT-breakthroughs for reaching Lisbon goals is posted on the anti-software patenting campaigners, FFII.org's website. (Foundation for a Free Information Infrastructure). You can access it (pdf) here. ®

Related stories

Software patents under attack
EU braces for software patent demo
EU software patents: how the vote was won
EU software patent debate continues

Security for virtualized datacentres

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.