Feeds

Anti piracy group grapples with virtual world

So how do you crack down on virtual pirates?

HP ProLiant Gen8: Integrated lifecycle automation

The Federation Against Software Theft (FAST) has sunk its teeth into the fuzzy, grey world of virtualisation.

The anti-piracy body said it has got together with a number of big name firms, including Hewlett-Packard, Symantic/Altris, and Computacenter to work out ways of tackling potential problems that could arise when running software on virtualised systems.

FAST reckons that, while businesses were increasingly turning to virtualisation technology, many were failing to understand the ramifications of non-compliance.

According to FAST CEO John Lovelock, the virtual environment is virtually out of control and he says software vendors should consider processes and controls that could lock down proper usage.

"It is vital at this point that we demand greater clarity from vendors and look at the potential to canvas virtualisation software vendors for their view on the future direction," said Lovelock.

Presumably, the pirate busting body is banking on the prospect of cracking down on users who are, at best, confused about whether their software licenses cover the multiple configurations made possible by virtualisation.

The problem is it seems that vendors are often as confused as users when it comes to licensing and both virtualisation and multi-core architectures. Back in April, Microsoft tweaked its licensing to allow users to use virtualisation to cut costs.

Oracle, amongst others, has flirted with more complex formulae.

While the likes of Fujitsu Siemens Computers has questioned whether virtualisation makes running data centres even more complex by obscuring what's running where.®

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.