Revulytics Blog

Vendor Responses to Software Piracy - Part 2, “The Reaction Phase”

December 10, 2010

Subscribe

Join host Dan Thompson and guest Michael Goff for the second of three podcasts that address vendor responses to software piracy (listen to Part 1 on the "Discovery Phase").

In this podcast, we cover the "Reaction" phase and discuss common responses by software vendors when they learn that their applications have been cracked and are being used unlicensed. We compare these responses to the benefits of taking a piracy business intelligence approach and look at the recent news from Avast as an example of measuring the scope of a problem to enable data-driven decisions.

Click below to listen to "Reaction Phase" (7:13)

 

Activate Your Data-Driven Compliance Program

Add new license revenue by detecting, identifying and converting unpaid users into paying customers.

Michael Goff

Post written by Michael Goff

Marketing Director at Revulytics
Michael is Marketing Director at Revulytics where he is responsible for corporate marketing, content, and social media. He has helped to educate the industry on the benefits of software usage analytics for compliance and product management through the company's blog and contributed articles in trade publications. Michael was previously a marketing programs manager at The MathWorks and principal at Goff Communications. Michael earned a J.D. from Boston University School of Law and a B.A. from Colgate University.