In today’s world, doing business the conventional way and maintaining the status quo does not promise recurring revenue as it did in the past. Nor does it provide a competitive …
In 1997, a pair of management consultants – Michael Treacy and Fred Wiersema – published a book entitled The Discipline of Market Leaders: Choose Your Customers, Narrow Your Focus, Dominate Your Market, which suggested that companies could only become dominant players in their industry by achieving a proficiency in one of the following areas:
I feel very fortunate to have the opportunity to work with Viavi Solutions. It has been a pleasure to learn how Viavi deploys software monetization solutions to increase revenue, improve its customer experience, and strengthen relationships. Viavi leads with great products and has implemented operational efficiencies to respond to its customers’ needs more quickly. Several years ago, it was great if a company could master one of these areas, but today, cutting-edge companies like Viavi are leading in all three functions: customer intimacy, product leadership, and operational efficiency.
Trends in the healthcare market are placing unprecedented value on the software that lies at the heart of today’s intelligent medical devices. This puts manufacturers under enormous pressure to innovate not only the types of products they build, but also how they go to market. At LicensingLive! 2015, I spoke at length about the licensing issues facing one of the world’s leading medical technology companies, Stryker Corporation, and how it has risen to the challenge.
The WSJ recently ran an interesting article on the key challenges of moving to the cloud.
“When on-demand enterprise applications emerged about a decade ago, they were touted as a cheap and more flexible alternative to buying software outright – a move that comes with upfront infrastructure and licensing costs, on top of ongoing fees for maintenance, support, and upgrades. But in practice, these promises have been hard to fulfill”.
The age of the Internet of Things (IoT) has dawned and we are heading toward a future filled with software-driven intelligent devices. To give you an idea of the magnitude of this transformation, IDC is predicting that there will be 30 billion units installed worldwide by the year 2020. Because every device in the IoT is connected, a whole new breed of tech company is emerging, forcing many traditional companies to innovate and go to market differently.
In the 1973 movie Magnum Force, maverick cop Dirty Harry famously said that “A man’s got to know his limitations”. In business, knowing how and where to invest your resources can be the difference between success and failure. Indeed, overextending yourself when you should be focusing on your core competencies can have disastrous consequences for your bottom line if left unchecked.
The upcoming release of Star Wars: The Force Awakens has got me thinking about the duality of good and evil. As the epic battle between Jedi warriors and the Sith continues to unfold in a galaxy far, far away, there is another battle being waged much closer to home. A battle so epic, it threatens the very way we consume content. Of course, I am talking about the fight against intellectual property (IP) theft; that never-ending game of cat and mouse between content owner and hacker that keeps the entertainment industry up at night. As Gemalto’s VP of Product Development, R&D Software Monetization, I feel compelled to raise my lightsaber in support of all the content creators.
Introducing a new license management solution to your back office can bring tremendous value to your business. But without proper planning, the transition from legacy system to new solution can easily go awry.
ISVs have long relied on product keys (otherwise known as software license keys) to ensure that their software is only being used by those entitled to do so. Oftentimes, these product keys are also used to control use of specific features, based on the agreement the end user has with the ISV. Despite the value these product keys hold, they pose a number of challenges for both ISVs and end users.