We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byNeil Birchard
Modified about 1 year ago
EDAC Electronic Design Automation Consortium © 2009 SoftSummit. I All Rights Reserved
EDAC @ SoftSummit 2009 Topics –EDAC Overview –EDAC Structure and Committees –EDAC Anti-Piracy and impact on you –Q&A © 2009 SoftSummit. I All Rights Reserved 2
EDAC Overview Founded in 1989 for EDA tool and service companies Seeks to identify and address issues common to members and members’ customers Augment effectiveness of tools and services provided by members by focusing on commonality and promoting cooperation Industry trade show sponsorships including DAC © 2009 SoftSummit. I All Rights Reserved 3
EDAC Structure Membership of ~100 companies Board of Directors comprising CEOs of major EDA companies EDAC Staff Committees –Export –Communications –Emerging Companies –Interoperability –Anti-Piracy © 2009 SoftSummit. I All Rights Reserved 4
EDAC Anti-Piracy Piracy and overuse accounts for an estimated 1/3 of worldwide use of EDA software An issue in every country using EDA software –Some regions with low piracy rates have high number of infractions (like the US) Some ways piracy affects us –Lower revenue to publishers affect investment in the future –Unfair competition from companies not paying for EDA tools –Compliance is more difficult © 2009 SoftSummit. I All Rights Reserved 5
EDAC Anti-Piracy Counter-measures and where end-users may care 1.Tamper-resistant licenses (stop counterfeit licenses) –Commonly used today – no impact on compliant users 2.Tamper-resistant code (stop crack that skips licensing) –Emerging today – no impact on compliant users –Two approaches being studied Prevention through hardening Detection with phone-home on infraction © 2009 SoftSummit. I All Rights Reserved 6
7 Cracked Software Examples
EDAC Anti-Piracy Counter-measures and where end-users may care 3.WAN control (stop one license following the sun) –Enforcement by small number of tools today –Likely to increase in the future –Could have an impact on honest users who are not compliant to the letter of the agreements 4.Tamper-resistant hostid (stop cloning license servers) –Emerging in next couple of years –Could have significant impact on VMs and Disaster Recovery –EDAC recommendations will take customer needs into account –Additional CELUG input is welcome © 2009 SoftSummit. I All Rights Reserved 8
Q&A Dave Graubart firstname.lastname@example.org www.edac.org © 2009 SoftSummit. I All Rights Reserved 9
Presentation By: Lindsay McCollum Jenna Larsen Joe Soukup.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Economic, social, and security impacts of tobacco excise duty harmonization in the EU Líberální Institut Conference, 20 September 2006 Prague Costs and.
TM Benchmarking Code of Conduct. TM Purpose: –to guide Committee, staff, and participant activities –to promote acceptance –to enhance the professionalism.
Centralized Management Services Dawn Malinowski Wisconsin Public Power Inc Sun Prairie, WI.
© 2009 VMware Inc. All rights reserved Confidential VMware: An Overview Pat Gelsinger, CEO.
Key Issues in Licensing Software and Associated Intellectual Property: Matching Licensing Models to Business Strategies Steve Mutkoski Regional Director,
Ed Morris, Director Office of Space Commercialization National Oceanic and Atmospheric Administration U.S. Department of Commerce Commerce PNT Challenges.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Western Electricity Coordinating Council Market Interface Committee Report to the WECC Board of Directors December 6-7, 2007 Robert D. Schwermann MIC Chair.
Introducing ITAA Advancing the U.S. IT Industry The Information Technology Association of America.
The Global Economy “Its All Relative” Copyright © Texas Education Agency, All rights reserved.
CELUG – August meeting Call in: #
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Bringing value to Malaysia Dan Ellsworth President & CEO World Micro, Inc. COLLABORATING FOR SUCCESS: MALAYSIA.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Socially Responsive Marketing 2-1: The Impact of Marketing 2-2: Criticisms of Marketing 2-3: Increasing Social Responsibility.
1 Foreign Trade Regulations Mandatory Automated Export System Christina Farr September 15, 2008 Foreign Trade Division Regulations, Outreach and Education.
March 2006DSpace Federation Governance Advisory Board Meeting Open Source Software Governance Case Studies.
Your Technology Is Connected. Are You? Your technology doesn’t exist in a vacuum. Welcome to the networked and interconnected technology ecosystem where.
Software Licensing and Compliance Initech is the consulting firm for Bust It Airlines Tiffany, CIO Clayton, CFO Becca, CEO.
Next >>. 2 International business impacts daily life around the world and also affects ethical decisions in business.
1 Organisation for Economic Co-operation and Development.
Copyright © 2012 Pearson Education. Chapter Nineteen The Global Marketplace.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
GLOBAL DEMAND FOR CREDIT and how to address it using EXPORT CREDIT INSURANCE Presented 12 November 2014 by Mabel Luen Meridian Finance Group.
1 The Organisation for Economic Co-operation and Development.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 6 McGraw-Hill Trade protectionism Two kinds of tariff –Protective –Revenue Import quota Embargo.
BUSINESS WITH CONFIDENCEicaew.com © ICAEW 2015 IT and Accountants: A Partnership Made in Heaven? Kirstin Gillon, ICAEW IT Faculty Introduction by Christiana.
Presentation to Energy & Technology/Planning & Development Committees Considerations on Establishing Municipal Utilities Joint Informational Forum Legislative.
TPP Regulatory Coherence Auckland, New Zealand December 6, 2010 Sean Heather Executive Director Global Regulatory Cooperation Project U.S. Chamber of Commerce.
Chapter 17 Globalization and International Business EXPLORING MANAGEMENT.
Global and Chinese Video Management System (VMS) Industry, 2016 Market Research Report
Protectionism Protectionism is the practice of putting limits on foreign trade to protect businesses at home.
Globalization Copyright © 2010 Pearson Education, Inc. publishing as Prentice Hall.
1 ICC Perspectives on Sectoral Approaches Dr. Brian P. Flannery Environment & Energy Commission (Vice-Chair) AWG Workshop, Possible Approaches Targeting.
Corporate responsibility for security Sibylle Bauer SIPRI Sofia, 22 May 2006.
IBM Systems and Technology Group © 2009 IBM Corporation IBM System Storage – Tape Part 1 This document is for IBM and IBM Business Partner use only. It.
Global Edition Chapter Nineteen The Global Marketplace Copyright ©2014 by Pearson Education.
Introduction to AgGateway Spring AgGateway: What it is A non-profit, collaborative membership association Focused on helping growers, retailers.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center.
Non-Life Insurance in the UAE, Key Trends and Opportunities to Tel:
Workshop on Energy Statistics, China September 2012 Electricity and Heat Statistics 1.
The Leader in Software Value Management Page 1 Software Best Practices 3 Practical Strategies for Increasing Revenue Daniel Greenberg VP Worldwide Marketing.
Company Motto/Structure: The Ferrari Family is a dealership that builds it’s pride on excellence in ordering, shipping and delivering the worlds best.
CONFIDENTIAL © 2013 IDA Singapore. All Rights Reserved. 1 Proposal Concept Submission Template 1. Problem Statement 1. Project Scope Target Users Business.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Chapter 6 6 Professional Sport James M. Gladden, Indiana University-Purdue University-Indianapolis William A. Sutton, University of Central Florida C H.
Solving Customs Business Process Problems with a Single Source of Data.
SOFTWARE VALUE MANAGEMENT Dan Stickel EVP & General Manager Software Technologies Group Macrovision.
© 2017 SlidePlayer.com Inc. All rights reserved.