Image

Blog

Spotlight on Software Monetization

Software Licensing Strategy? You’d Better Make One. Yes, You.
6 years ago

Software Licensing Strategy? You’d Better Make One. Yes, You.

It seems that almost every small company dreams of becoming a larger one, with the self evident corollary that with size comes resources, and with resources, mountains become molehills. Read More

Moving to the Cloud: Unshackling from the Desktop without Losing Track of Users
6 years ago

Moving to the Cloud: Unshackling from the Desktop without Losing Track of Users

As an ISV, moving your application into the Cloud and offering it as a service is no trivial task.  How software is supplied and managed for the desktop is very different than as a service.  The usage and requirements of network connectivity, scaling, authentication and authorization, as examples, are all subtly different from the Enterprise model.

Once you get past the foundation of how to supply your application as a service, you need to solve the additional problems of authorization and utilization; or “Who has access to what?” and “How much are they using?”

Read More

Best Practices for Securing Embedded Software with Hardware Keys
6 years ago

Best Practices for Securing Embedded Software with Hardware Keys

Part 3 of 3 from the series “Take on Licensing: What High-Tech Manufacturers Need to Know”

Recently, I shared the five phases that high-tech manufacturers move through in the transition from hardware-based to software-based solutions.  Now that we’ve reviewed the phases and the challenges, let’s discuss best practices. Read More

Show Me the Money! Revenue Recognition Best Practices  (Part 2)
6 years ago

Show Me the Money! Revenue Recognition Best Practices (Part 2)

In my last blog entry (Show Me The Money, Part 1) we looked at a number of factors that play into software revenue recognition when a vendor (ISV) introduces electronic license enforcement into their product lines.  Part 1 focused on the principles and mechanics behind giving customers access to the software upon order execution so that the ISV may recognize revenue.   Part 1 concluded by bringing another key element into the revenue recognition equation: time.  Time can affect revenue recognition in a number of ways:

  • We have the time required by the customer to actually get their license keys after the ISVs claims to have given them “access” to the software.
  • We have the software’s ability to run by default without a license key for a temporary amount of time.  Does that count as “access”?
  • We have some ISVs selling perpetual entitlements but wanting or needing to deliver license keys that expire annually.  Does the customer really have access to what they bought?

Read More

From Equipment Manufacturer to Software Vendor: Five Common Phases of Transition
6 years ago

From Equipment Manufacturer to Software Vendor: Five Common Phases of Transition

Part 2 of 3 from the series “Take on Licensing: What High-Tech Manufacturers Need to Know”

Shifting from an equipment manufacturer business model to that of a software company does not happen overnight, and typically occurs in phases. These are the common phases that take place during the transition from equipment manufacturer to software vendor:

Read More

SafeNet, Dell Boomi, and the Babel Fish
6 years ago

SafeNet, Dell Boomi, and the Babel Fish

Ever since software systems have been around, people have been working to connect them together to get added benefit.  Sometimes that leads to large integrated all-in-one systems, sometimes it leads to efforts to standardise API’s and communications protocols and it almost always leads to lots of professional services.

In the cloud though, that’s changing.  One of the most innovative companies I have seen is Boomi (now Dell Boomi).   Their website does a better job of explaining their value proposition, but essentially it translates communications between systems – kind of like the Babel Fish (from HHGTTG), but for software. Read More