Free Essay

Application of Beam

In:

Submitted By mohsin931
Words 7853
Pages 32
SHADOW MARKET
2011 bsa global software piracy study
NiNth editioN, May 2012ExEcutivE Summary ..............................................................................................................................1
Global trEndS .......................................................................................................................................2
Habits of Self-reported Pirates ...........................................................................................................2
Emerging Economies Exert Greater influence ....................................................................................4
Key market Highlights .........................................................................................................................4
Pcs continue to overshadow tablets and cloud computing, for now ............................................ 6
Strong Support for iP rights................................................................................................................7
Pc Software Piracy rates and commercial value of unlicensed Software.........................................8 mEtHodoloGy......................................................................................................................................10 “a rigorous and Well-designed Effort”............................................................................................10 bSa bluEPrint for rEducinG SoftWarE Piracy .........................................................................14 about bSa ..............................................................................................................................................15
Contents1
SHADOW MARKET
2011 bsa global software piracy study
NiNth editioN, May 2012
ExEcuTivE SuMMARy
Well over half of the world’s personal computer users — 57 percent — admit they pirate software. that includes 31 percent who say they do it “all of the time,” “most of the time,” or
“occasionally,” plus another 26 percent who admit they pirate, but only “rarely.” fewer than four users in 10 (38 percent) say they “never” acquire software that is not fully licensed.
These startling findings come from a survey of approximately 15,000 computer users in 33 countries that together make up 82 percent of the global PC market. Ipsos Public Affairs conducted the interviews in January and February of 2012 as part of the ninth annual BSA Global Software Piracy Study.
Among the other key findings in this year’s report:
• The global piracy rate for PC software hovers at
42 percent.
• The commercial value of this shadow market of pirated software climbed from $58.8 billion in 2010 to $63.4 billion in 2011, a new record, propelled by
PC shipments to emerging economies where piracy rates are highest.
• Country by country, the frequency with which people report acquiring unlicensed software closely aligns with the actual rates of piracy that
IDC calculates annually for this report using hard market data.
• The users who say they pirate software most frequently are disproportionately young and male
— and they install more software of all types on their computers than do infrequent pirates or non-pirates. • Emerging economies, which in recent years have been the driving force behind PC software piracy, are now decisively outpacing mature markets in their rate of growth. They took in 56 percent of the world’s new PC shipments in 2011, and they now account for more than half of all PCs in use.
5%
Always
9%
Mostly
17%
Occasionally
5%
DK/Refuse
38%
Never
26%
Rarely global self-reported piracy
“how often do you acquire pirated software or software that is not fully licensed — all of the time, most of the time, occasionally, rarely, or never?”this year’s bSa Global Software Piracy Study marks the first time a large sample of computer users around the world have been asked directly, “How often do you acquire pirated software or software that is not fully licensed?”
The answers people have given to that question — combined with other details they have provided, including the means by which they acquire software, their understanding of which ways of getting software are likely to be legal or illegal, and their attitudes toward intellectual property rights generally — reveal sharp divides between the habits and outlooks of computer users in emerging and developed markets. Those differences help explain why the global piracy rate hovered at 42 percent in 2011 while a steadily expanding marketplace in the developing world drove the commercial value of software theft to $63.4 billion.
Non-Pirates Infrequent
Pirates
Frequent
Pirates
0
20
40
60
80
100
120
0
20
40
60
80
100
120
Mature Economies Emerging Economies
Average Installed on New PCs in 2011
Mature Economies Emerging Economies
0%
5%
10%
15%
20%
25%
30%
0
5
10
15
20
25
30
Always Mostly Occasionally Rarely
Share of All Users Admitting Piracy programs installed per computer self-reported piracy habits by Market
Global Trends
2 www.bsa.org habits of self-reported pirates
This year’s survey finds that frequent pirates — people who admit they acquire unlicensed software all of the time, most of the time, or occasionally
— also are the most voracious software users. They report installing 55 percent more programs of all types on their computers than do non-pirates. This gives them an outsized impact on the global piracy rate.
Even more striking is the difference in behavior between users in emerging economies and users in the developed world. Frequent pirates in emerging economies install nearly four times as many programs of all sorts per new PC as do frequent pirates in mature markets. Among infrequent pirates — those who say they rarely acquire unlicensed software — there is a greater than two-to-one gap in the total number of programs they install.3
SHADOW MARKET
2011 bsa global software piracy study
NiNth editioN, May 2012
Frequent software pirates are disproportionately young and male, and they are more than twice as likely to live in an emerging economy as they are to live in a mature one (38 percent to 15 percent). Not surprisingly, pirates are far more likely than nonpirates to acquire software through channels that tend to be illegal, such as by installing a single copy of a program on more computers than the license allows or downloading programs from peer-to-peer sites such as Kazaa or Morpheus.
In the developing world, some of this behavior can be attributed to a general state of confusion about which ways of acquiring software are legal and which are not. For example, a comparatively low two-thirds of computer users in emerging economies trust that the software available for sale in retail stores is likely to be legal. That skepticism is not unreasonable.
Indeed, in many emerging markets, users would often be right to assume that stores are stocked with illegal copies of name-brand software.
Strikingly, this year’s survey finds that business decision makers around the world admit to pirating software more frequently than do other computer users. In fact, business decision makers who admit they frequently pirate software are more than twice as likely as other computer users to say they buy software for one computer but then install it on additional machines in their offices. This form of license abuse accounts for the vast majority of enterprise software piracy globally — and the commercial value of it adds up quickly, because it is not uncommon for large companies to make hundreds or thousands of illegal copies.
This year’s survey also reaffirms that business decision makers in emerging economies are more likely to pirate software than business decision makers in mature markets. This has broad ramifications, because software is an essential tool of production; companies that dodge the capital cost of it gain an unfair competitive advantage over companies that pay for software as they should.
Always Mostly Occasionally Rarely
0
5
10
15
20
25
30
All Users Business Decision Makers
Share of BDMs Admitting Piracy
0%
5%
10%
15%
20%
25%
30%
Share of BDMs Admitting Piracy
Mature Economies Emerging Economies
0%
5%
10%
15%
20%
25%
30%
0
5
10
15
20
25
30
Always Mostly Occasionally Rarely business decision Makers admit pirating More than other users...
...especially in emerging MarketseMergiNg ecoNoMies exert greater iNflueNce
In addition to the differences in behavior and outlook between computer users in emerging and developed economies, broad market forces also are shifting the balance of influence toward the developing world.
In 2010, emerging markets for the first time took in more new PC shipments than mature markets. In
2011, they extended their lead, buying 56 percent of all new PCs versus 44 percent in mature markets.
With this trend came another milestone — emerging markets are now home to more than half of all computers currently in use worldwide.
Software piracy rates in emerging markets meanwhile towered over those in mature markets: 68 percent, on average, compared to 24 percent. Emerging economies thus continue to account for an overwhelming majority of the global increase in the commercial value of pirated software.
Key MarKet highlights
Among the economies with the highest commercial values of software piracy, two stand apart from the rest in scale — and apart from each other in their market profiles. First, there is the United States, the world’s largest software market by far, with legal sales approaching $42 billion. It has the world’s lowest piracy rate at 19 percent, but because it is such a large market, the commercial value of that piracy adds up to almost $10 billion.
Next, there is China, which is on course to overtake the US in the commercial value of its piracy despite having a legal software market just one-fifteenth the size of America’s. China’s illegal software market was worth nearly $9 billion in 2011 versus a legal market of less than $3 billion, making its piracy rate
77 percent.
To fully understand the gap in legal software sales between China and the world’s other big markets, it helps to consider the picture on a per-PC basis:
Businesses and consumers spend an average of $542 for a new PC (excluding a monitor) in China but buy
2010 2011
0%
10%
20%
30%
40%
50%
60%
0
10
20
30
40
50
60
Mature Economies Emerging Economies
Share of All PC Shipments
2003 2004 2005 2006 2007 2008 2009 2010 2011
$0
$10
$20
$30
$40
$50
$60
$70
$80
0
10
20
30
40
50
60
70
80
Mature Economies Emerging Economies
$Billions (2010 Dollars) destination of global pc shipments commercial Value of pirated software
4 www.bsa.org5
SHADOW MARKET
2011 bsa global software piracy study
NiNth editioN, May 2012 just $8.89 in legal software to run it. This is less than a quarter of the amount spent per PC in other “BRIC” markets — Russia, India, and Brazil, which come next in the value of their piracy — and just 7 percent of the amount spent per PC in the US.
Among the other noteworthy developments in 2011:
• India saw its piracy rate fall by 1 point year-overyear to 63 percent in 2011, continuing a gradual
9-point decline since 2004. The commercial value of pirated software in India inched up only slightly in real terms for the year. These results coincide with an effort by national and state government agencies to promote best practices in software asset management (SAM).
• Mexico’s piracy rate edged down 1 point year-overyear to 57 percent in 2011, a 3-point improvement from 60 percent in 2009. This is largely thanks to progress made in curbing unlicensed software use by enterprises. The Mexican government, working in partnership with industry, has promoted software legalization through an ambitious program of public education and enforcement.
• Russia notched a 2-point improvement in its piracy rate — and saw a 10 percent increase in legal software sales per PC — while industry promoted
SAM programs and conducted PR campaigns to publicize the risks of using counterfeit software, and Russian officials continued enforcement efforts against software piracy. Russia’s PC software piracy rate has now dropped a record 24 points in the past nine years.
• The EU regional average dropped 2 points to 33 percent in 2011. This was due to 1-point declines in a number of Western European countries, including
Italy, Germany, the Netherlands, Sweden, and the
UK, and a 2-point drop in France. This progress is significant as European policymakers are embarking on a review of the European IPR Civil
Enforcement Directive.
The global software piracy rate was unchanged at 42 percent in 2011 — largely because it was a flat year for the PC market. There was less than a 2 percent increase in shipments for the year compared to a robust 14 percent increase in 2010 and a growth average of 10 percent in the previous three years.
The marginal increase in PC shipments in 2011 was
2006 2007 2008 2009 2010 2011
$400
$600
$800
$1000
Brazil USA Russia India China
2010 Dollars
$744
$661
$625
$620
$542
2006 2007 2008 2009 2010 2011
$0
$30
$60
$90
$120
$150
USA Russia Brazil India China
2010 Dollars
$120.22
$41.18
$36.38
$33.79
$8.89
average price of a New pc legal software sales per pc6 www.bsa.org heavily concentrated among business customers rather than consumers. That had a dampening effect on piracy, because the rate of unlicensed software use tends to be lower among enterprises, especially in mature markets.
Adding to the tempering effect of enterprise PC shipments, laptops, which tend to be sold preloaded with legal software, accounted for an increased share of the market (57 percent, up from 56 percent in 2010). Meanwhile, stripped-down “white-box” machines, which often are vehicles for unlicensed software, accounted for a decreased share of the market (16.8 percent, down from 17.3 percent in
2010). But offsetting all of those effects on piracy was the increasing market share of the world’s emerging economies. As a group, their piracy rate was 68 percent in 2011 compared to an average of 24 percent in developed economies. pcs coNtiNue to oVershadow tablets aNd cloud coMputiNg, for Now
The overall shape of the software market itself continued to evolve in 2011 — notably, with the explosive growth of media tablets and cloud computing. Yet both of these trends remain in their fledgling stages compared to the scale of desktop and laptop computing. For example:
• The number of tablets in use around the world leapt 80 percent from about 45 million in 2010 to more than 80 million in 2011. The global installed base of PCs, by comparison, edged past 1.5 billion.
Those computers were running more than 32 billion software programs with a combined commercial value of $261 billion. All the tablets in use globally were running approximately 3.7 billion apps with a combined commercial value of $7 billion.
• Similarly, PC software that is delivered as a service through cloud computing architectures represented just over 1 percent of the global PC software market — a $1.3 billion slice of a $101 billion pie. In the overall software market, which grew to
$264 billion in 2011, cloud computing represented an 8 percent share.
As the software market evolves to provide solutions for more devices and platforms, the nature of software piracy, too, is evolving. A forthcoming supplement to this year’s Global Software Piracy
Study will begin to explore the dynamics at work in cloud computing. top 20 economies in commercial Value of pirated pc software, 2011 pirated Value
($M)
legal sales ($M) piracy rate uS $9,773 $41,664 19% china $8,902 $2,659 77% russia $3,227 $1,895 63% india $2,930 $1,721 63% brazil $2,848 $2,526 53% france $2,754 $4,689 37%
Germany $2,265 $6,447 26% italy $1,945 $2,107 48% uK $1,943 $5,530 26%
Japan $1,875 $7,054 21% indonesia $1,467 $239 86% mexico $1,249 $942 57%
Spain $1,216 $1,548 44% canada $1,141 $3,085 27% thailand $852 $331 72%
South Korea $815 $1,223 40% australia $763 $2,554 23% venezuela $668 $91 88% malaysia $657 $538 55% argentina $657 $295 69%7
SHADOW MARKET
2011 bsa global software piracy study
NiNth editioN, May 2012 stroNg support for ip rights
The 2010 Global Software Piracy Study was the first to probe computer users’ attitudes toward intellectual property. It found strong support for the idea that innovators should be rewarded for their work, and this years’ survey found no wavering in that sentiment. By a wide 71-percent to 29-percent margin, respondents aligned themselves with the idea that “it is important for people who create new products or technologies to be paid for them, because it provides an incentive to produce more innovations. That is good for society because it drives technological progress and economic growth.”
Computer users around the world rejected the alternative proposition: “No company or individual should be allowed to control a product or technology that could benefit the rest of society. Laws like that limit the free flow of ideas, stifle innovation, and give too much power to too few people.”
Innovators
should be paid
71%
Benefits should flow to society
29%
“please indicate which of the following two statements you agree with more...” strong support for ip rights
IP profits benefit local economies
People should profit from ideas
IP creates jobs
IP encourages creativity Important to reward innovation
0 10 20 30 40 50 60 70 80 0 10 20 30 40 50 60 70 80
Pirates in Mature Economies
Global Average
41%
56%
50%
55%
41%
58%
68%
75%
65%
71%
% Agreeing pirates in Mature Markets disregard intellectual property
Globally, the picture is similar among admitted pirates and non-pirates; but pirates in mature economies are outliers from the rest of the world’s computer users: They show considerably less support for IP rights and protections than everyone else does and less faith in the economic benefits.
Frequent pirates in the developed world also are conspicuous in expressing disregard for the law. For example, compared to non-pirates in the developed world, they are 19 percent less likely to say that the illegality of pirating software is a good reason not to do it.
Compounding that problem, this year’s survey finds a troubling lack of incentive among admitted pirates around the world to change their behavior. In mature markets, only 20 percent of those who admit they frequently pirate software say the risk of getting caught is a reason not to do it. In emerging markets, the figure is even lower — just 15 percent of pirates appear to be concerned about the risk of getting caught. This suggests there is a need for authorities to ramp up enforcement to send a stronger deterrent signal to the marketplace. 8 www.bsa.org piracy rates commercial Value of unlicensed software ($M)
2011 2010 2009 2008 2007 2011 2010 2009 2008 2007
Asia Pacific australia 23% 24% 25% 26% 28% $763 $658 $550 $613 $492 bangladesh 90% 90% 91% 92% 92% $147 $137 $127 $102 $92 brunei 67% 66% 67% 68% 67% $25 $19 $14 $15 $13 china 77% 78% 79% 80% 82% $8,902 $7,779 $7,583 $6,677 $6,664 hong Kong 43% 45% 47% 48% 51% $232 $227 $218 $225 $224 india 63% 64% 65% 68% 69% $2,930 $2,739 $2,003 $2,768 $2,025 indonesia 86% 87% 86% 85% 84% $1,467 $1,322 $886 $544 $411
Japan 21% 20% 21% 21% 23% $1,875 $1,624 $1,838 $1,495 $1,791
Malaysia 55% 56% 58% 59% 59% $657 $606 $453 $368 $311
New Zealand 22% 22% 22% 22% 22% $99 $85 $63 $75 $55 pakistan 86% 84% 84% 86% 84% $278 $217 $166 $159 $125 philippines 70% 69% 69% 69% 69% $338 $278 $217 $202 $147 singapore 33% 34% 35% 36% 37% $255 $233 $197 $163 $159 south Korea 40% 40% 41% 43% 43% $815 $722 $575 $622 $549 sri lanka 84% 86% 89% 90% 90% $86 $83 $77 $97 $93 taiwan 37% 37% 38% 39% 40% $293 $252 $227 $201 $215 thailand 72% 73% 75% 76% 78% $852 $777 $694 $609 $468
Vietnam 81% 83% 85% 85% 85% $395 $412 $353 $257 $200 other ap 91% 91% 90% 91% 91% $589 $576 $303 $69 $56 total ap 60% 60% 59% 61% 59% $20,998 $18,746 $16,544 $15,261 $14,090
Central and Eastern Europe albania 75% 75% 75% 77% 78% $6 $6 $8 $9 $11 armenia 88% 89% 90% 92% 93% $26 $23 $14 $7 $8 azerbaijan 87% 88% 88% 90% 92% $67 $57 $52 $55 $50 belarus 87% 88% 87% — — $87 $126 $55 — — bosnia 66% 66% 66% 67% 68% $15 $13 $14 $15 $13 bulgaria 64% 65% 67% 68% 68% $102 $113 $115 $139 $63 croatia 53% 54% 54% 54% 54% $74 $70 $71 $77 $68 czech republic 35% 36% 37% 38% 39% $214 $195 $174 $168 $161 estonia 48% 50% 50% 50% 51% $25 $23 $19 $21 $20 fyroM 66% 66% 67% 68% 68% $22 $19 $15 $14 $11 georgia 91% 93% 95% 95% — $52 $46 $54 $59 — hungary 41% 41% 41% 42% 42% $143 $131 $113 $146 $125
Kazakhstan 76% 76% 78% 78% 79% $123 $89 $74 $125 $110 latvia 54% 56% 56% 56% 56% $32 $30 $24 $31 $29 lithuania 54% 54% 54% 54% 56% $44 $38 $31 $40 $37
Moldova 90% 90% 91% 90% 92% $45 $36 $28 $40 $43
Montenegro 79% 79% 81% 83% 83% $7 $7 $11 $8 $7 poland 53% 54% 54% 56% 57% $618 $553 $506 $648 $580 romania 63% 64% 65% 66% 68% $207 $195 $183 $249 $151 russia 63% 65% 67% 68% 73% $3,227 $2,842 $2,613 $4,215 $4,123 serbia 72% 74% 74% 74% 76% $104 $95 $67 $99 $72 slovakia 40% 42% 43% 43% 45% $68 $63 $65 $62 $54 slovenia 46% 47% 46% 47% 48% $51 $47 $39 $51 $39 ukraine 84% 86% 85% 84% 83% $647 $571 $272 $534 $403 rest of cee 90% 89% 88% 88% 88% $127 $118 $56 $191 $173 total cee 62% 64% 64% 66% 68% $6,133 $5,506 $4,673 $7,003 $6,351
Latin America argentina 69% 70% 71% 73% 74% $657 $681 $645 $339 $370 bolivia 79% 80% 80% 81% 82% $59 $54 $40 $20 $19 brazil 53% 54% 56% 58% 59% $2,848 $2,619 $2,254 $1,645 $1,617 chile 61% 62% 64% 67% 66% $382 $349 $315 $202 $187 colombia 53% 54% 55% 56% 58% $295 $272 $244 $136 $127 costa rica 58% 58% 59% 60% 61% $62 $55 $33 $24 $22 dominican republic 76% 76% 77% 79% 79% $93 $87 $66 $43 $39 ecuador 68% 67% 67% 66% 66% $92 $79 $65 $37 $33 el salvador 80% 80% 80% 80% 81% $58 $55 $46 $28 $28 guatemala 79% 80% 80% 81% 80% $116 $106 $74 $49 $41 honduras 73% 73% 74% 74% 74% $24 $22 $17 $9 $8
Mexico 57% 58% 60% 59% 61% $1,249 $1,199 $1,056 $823 $836
Nicaragua 79% 79% 79% 79% 80% $9 $8 $5 $4 $4 panama 72% 72% 73% 73% 74% $74 $68 $42 $24 $22 paraguay 83% 83% 82% 83% 82% $73 $55 $29 $16 $13 peru 67% 68% 70% 71% 71% $209 $176 $124 $84 $75 uruguay 68% 69% 68% 69% 69% $85 $78 $40 $25 $23
Venezuela 88% 88% 87% 86% 87% $668 $662 $685 $484 $464 other la 84% 84% 83% 84% 83% $406 $405 $430 $319 $195 total la 61% 64% 63% 65% 65% $7,459 $7,030 $6,210 $4,311 $4,123 pc software piracy rates aNd coMMercial Value of uNliceNsed software9
SHADOW MARKET
2011 bsa global software piracy study
NiNth editioN, May 2012 piracy rates commercial Value of unlicensed software ($M)
2011 2010 2009 2008 2007 2011 2010 2009 2008 2007
Middle East and Africa algeria 84% 83% 84% 84% 84% $83 $69 $55 $96 $86 bahrain 54% 54% 54% 55% 57% $23 $22 $21 $27 $27 botswana 80% 79% 79% 80% 82% $16 $15 $11 $14 $14 cameroon 83% 82% 83% 83% 84% $9 $7 $7 $6 $5 egypt 61% 60% 59% 59% 60% $172 $196 $146 $158 $131 iraq 86% 85% 85% 85% 85% $172 $147 $129 $205 $124 israel 31% 31% 33% 32% 32% $192 $170 $148 $172 $121 ivory coast 81% 79% 79% 80% 81% $16 $13 $14 $15 $15
Jordan 58% 57% 57% 58% 60% $31 $28 $26 $22 $20
Kenya 78% 79% 79% 80% 81% $85 $85 $66 $31 $28
Kuwait 59% 60% 60% 61% 62% $72 $68 $62 $69 $61 lebanon 71% 72% 72% 74% 73% $52 $49 $46 $49 $44 libya 90% 88% 88% 87% 88% $60 $74 $25 $22 $22
Mauritius 57% 56% 56% 57% 57% $7 $5 $4 $5 $4
Morocco 66% 65% 66% 66% 67% $91 $75 $64 $70 $66
Nigeria 82% 82% 83% 83% 82% $251 $225 $156 $132 $114 oman 61% 62% 63% 62% 61% $36 $33 $39 $26 $23
Qatar 50% 49% 51% 51% 54% $62 $52 $50 $26 $25 reunion 40% 40% 40% 40% 40% $1 $1 $1 $1 $1 saudi arabia 51% 52% 51% 52% 51% $449 $414 $304 $272 $170 senegal 78% 78% 78% 79% 80% $9 $7 $5 $7 $6 south africa 35% 35% 35% 35% 34% $564 $513 $324 $335 $284 tunisia 74% 72% 72% 73% 76% $51 $52 $44 $48 $54 turkey 62% 62% 63% 64% 65% $526 $516 $415 $468 $365 uae 37% 36% 36% 36% 35% $208 $173 $155 $170 $94 yemen 89% 90% 90% 89% 89% $15 $12 $10 $14 $13
Zambia 82% 82% 82% 82% 82% $3 $3 $2 $2 $2
Zimbabwe 92% 91% 92% 92% 91% $4 $6 $4 $4 $3 other africa 86% 87% 86% 86% 85% $363 $418 $260 $95 $76 other Me 87% 88% 88% 87% 87% $536 $630 $294 $438 $448 total Mea 58% 58% 59% 59% 60% $4,159 $4,078 $2,887 $2,999 $2,446
North America canada 27% 28% 29% 32% 33% $1,141 $1,066 $943 $1,222 $1,071 puerto rico 42% 42% 46% 44% 44% $44 $42 $46 $36 $33 united states 19% 20% 20% 20% 20% $9,773 $9,515 $8,390 $9,143 $8,040 total Na 19% 21% 21% 21% 21% $10,958 $10,623 $9,379 $10,401 $9,144
Western Europe austria 23% 24% 25% 24% 25% $226 $209 $212 $184 $157 belgium 24% 25% 25% 25% 25% $252 $233 $239 $269 $223 cyprus 48% 48% 48% 50% 50% $19 $17 $16 $15 $14 denmark 24% 26% 26% 25% 25% $222 $208 $203 $215 $193 finland 25% 25% 25% 26% 25% $210 $193 $175 $194 $160 france 37% 39% 40% 41% 42% $2,754 $2,579 $2,544 $2,760 $2,601 germany 26% 27% 28% 27% 27% $2,265 $2,096 $2,023 $2,152 $1,937 greece 61% 59% 58% 57% 58% $343 $301 $248 $238 $198 iceland 48% 49% 49% 46% 48% $17 $16 $11 $23 $33 ireland 34% 35% 35% 34% 34% $144 $137 $125 $118 $106 italy 48% 49% 49% 48% 49% $1,945 $1,879 $1,733 $1,895 $1,779 luxembourg 20% 20% 21% 21% 21% $33 $31 $30 $21 $16
Malta 43% 43% 45% 45% 46% $7 $6 $7 $8 $7
Netherlands 27% 28% 28% 28% 28% $644 $591 $525 $563 $502
Norway 27% 29% 29% 28% 29% $289 $261 $195 $229 $195 portugal 40% 40% 40% 42% 43% $245 $228 $221 $212 $167 spain 44% 43% 42% 42% 43% $1,216 $1,105 $1,014 $1,029 $903 sweden 24% 25% 25% 25% 25% $461 $411 $304 $372 $324 switzerland 25% 26% 25% 25% 25% $514 $424 $344 $345 $303 united Kingdom 26% 27% 27% 27% 26% $1,943 $1,846 $1,581 $2,181 $1,837 total we 32% 33% 34% 33% 33% $13,749 $12,771 $11,750 $13,023 $11,655 total worldwide 42% 42% 43% 41% 38% $63,456 $58,754 $51,443 $52,998 $47,809 european union 33% 35% 35% 35% 35% $14,433 $13,458 $12,469 $13,981 $12,383 bric countries* 70% 71% 71% 73% 75% $17,907 $15,979 $14,453 $15,305 $14,429
*BRIC Countries are Brazil, Russia, India, and China.the bSa Global Software Piracy Study quantifies the volume and value of unlicensed software installed on personal computers in a given year — in this case, 2011. to compile the report, bSa works closely with two of the world’s leading independent research firms — idc and ipsos Public affairs — to measure, understand, and evaluate global software piracy.
The study involves collecting 182 discrete data inputs and assessing PC and software trends in each of 116 markets. A detailed video presentation of the methodology can be found at www.bsa.org/globalstudy.
Measuring the scale and scope of illegal behavior like software piracy clearly has its challenges. While this annual study is considered to be one of the most sophisticated appraisals of piracy produced each year, BSA and its partners continually look for new ways to improve the reliability of the data. This year, in partnership with two prominent IT economic researchers, BSA has made several modifications designed to refine the inputs and ensure the most accurate estimation of software piracy possible. methodology “A RigOROuS AnD WEll-DESignED EffORT”
In 2010, we were retained by BSA to provide an independent assessment of the methodology used in the BSA Global
Software Piracy Study and offer recommendations for improvements. At the outset, it is worth noting that studies of piracy examine illegal or unreported behavior, making it difficult to obtain perfect estimates. As such, accurate estimation of the software piracy rate requires good data inputs and a rigorous well-designed process to ensure that the results present as accurate a picture as possible of both the existing and the changing nature of software piracy over time. Based on our review, we believe the BSA Global Piracy Study has these elements in place.
In our review process, we examined documents provided by
BSA that described the methodology used in the 2010 study.
We also interviewed key people at IDC and Ipsos.
While we did not review the accuracy of the data provided by IDC or Ipsos, IDC’s Worldwide PC Tracker, a key source of data, is widely recognized by the IT industry as the best available on the market. Likewise, Ipsos has a strong reputation for high-quality surveys. It should be noted that in
2010, the end-user survey substantially increased the number of respondents, which has improved the quality of the data.
In addition to data quality, the results of the study are determined by the appropriateness of the computational procedure. The methodology must account for different software categories and the associated prices, the average value of software across different channels, installed software variability by country, and so on.
In this regard, the study utilizes standard approaches of estimating secondary data inputs in order to reduce the level of uncertainty a more subjective approach could introduce to year-on-year results.
It is well understood in the academic research community that any study methodology introduces a margin of error. The challenge for researchers is to design a study that keeps the error within an acceptable margin. As part of this undertaking with BSA, we provided several recommendations for improvement, which should enhance the accuracy of the results of this year’s study. These recommendations are described in more detail in the methodology of the white paper.
However, in our assessment, the BSA Global Software Piracy
Study methodology represents a rigorous and well-designed effort to take into account the key features of the software market and to measure the level of activity occurring in what is essentially a black market. We believe the study provides reliable estimates of piracy rates and the commercial value of pirated software, particularly in larger markets.
— Professors Vijay Gurbaxani & Vidyanand Choudhary
University of California, Irvine
Vijay Gurbaxani and Vidyanand Choudhary are Taco Bell Professor of Information Systems and Associate Professor of Information Systems at the
Paul Merage School of Business, University of California, Irvine. Their views and opinions expressed in this report are strictly theirs alone and do not necessarily reflect the views and opinions of the University of California.
10 www.bsa.org11
SHADOW MARKET
2011 bsa global software piracy study
NiNth editioN, May 2012 global surVey of software users
A key component of the BSA Global Software Piracy
Study is a global survey of software users, led by the highly regarded research firm Ipsos Public Affairs.
The survey was conducted among 14,700 business and consumer PC users, online or in-person, in 33 markets that make up a globally representative sample of geographies, levels of IT sophistication, and geographic and cultural diversity.
The survey is used, in part, to determine the
“software load” for each country — that is, a picture of the number of software programs installed per
PC, including commercial, open-source and mixedsource programs. Respondents are asked how many software packages, and of what type, were installed on their PC in the previous year; what percentage were new or upgrades; whether they came with the computers or not; and whether they were installed on a new computer or one acquired prior to 2011.
In addition, the surveys are used to assess key social attitudes and behaviors related to intellectual property, software piracy, and other emerging technology issues. This insight provides fresh perspective each year on the dynamics underlying software piracy around the world.
Among the improvements to the study this year is the development of a rotational strategy for the survey to enhance country coverage year upon year. Going forward, 11 countries will be surveyed annually, and
42 countries will be surveyed at least once every two to three years. The remainder will be surveyed on an ad hoc basis, generally one a year. As has been the case, the total survey population in any given year will account for approximately 90 percent of the PC software market. calculatiNg software piracy rates Since 2003, BSA has worked with IDC, the leading provider of market statistics and forecasts to the IT industry, to determine software piracy rates and the commercial value of pirated software.
The basic method for coming up with the piracy rate and commercial value of unlicensed software in a country is as follows:
1. determine how much Pc software was deployed during the year.
2. determine how much was paid for or otherwise legally acquired during the year.
3. Subtract one from the other to get the amount of unlicensed software. once the amount of unlicensed software is known, the Pc software piracy rate is computed as a percentage of total software installed.
To calculate the total number of software units installed — the denominator — IDC determines how many computers there are in a country and how many of those received software during the year. IDC tracks this information quarterly in 105 countries, either in products called “PC Trackers” or as part of custom assignments. The remaining few countries are researched annually for this study.
Unlicensed Software Units Total Software Units Installed
=
PIRACy RATE12 www.bsa.org
Once IDC has determined how many computers there are, and using the software load data collected in the survey, it can determine the total software units installed — licensed and unlicensed — in each country. To estimate the software load in countries not surveyed, IDC uses a series of correlations between the known software loads from surveyed countries and their scores on an emerging market measure published by the International Telecommunications
Union, called the ICT Development Index. These correlations are used to group the countries into cohorts, wherein the average software load of surveyed countries in each cohort is applied as the estimated software load for non-surveyed countries in that cohort. In 2011, IDC expanded the number of cohorts from four to six in order to provide more precision in applying surveyed values to similar countries. To get the number of unlicensed software units — the numerator of the piracy equation — IDC must determine the value of the legally acquired software market. IDC routinely publishes software market data from about 80 countries and studies roughly 20 more on a custom basis. For the few remaining countries,
IDC conducts annual research for the purposes of this study. This research provides the value of the legally acquired software market.
To convert the software market value to number of units, IDC computes an average price per software unit for all of the PC software in the country. This is done by developing a country specific matrix of software prices — such as retail, volume-license,
OEM, free, and open-source — across a matrix of products, including security, office automation, operating systems, and more.
IDC’s pricing information comes from its pricing trackers and from local analysts’ research. The weightings — OEM versus retail, consumer versus business — are taken from IDC surveys. IDC multiplies the two matrices to get a final, blendedaverage software unit price.
To arrive at the total number of legitimate software units, IDC applies this formula:
In 2011, IDC implemented several measures to validate its calculations of average software unit price. Analyst teams in 25 countries have been asked to provide additional information on software price by category and estimates of acquisition type
(e.g. retail, volume-license, free/open source) to serve as a cross-check against IDC’s computed values.
Rotating the countries for which information is collected each year will allow IDC to recalibrate software prices periodically, providing a more accurate estimate of legitimate software units from industry revenues.
Finally, subtracting the number of legitimate software units from the total software units reveals the number of unlicensed software units installed during the year.
This process provides the underlying data for the basic piracy rate equation.
Total Software Units Installed

Legitimate Software Units
=
UNLICENSEd SofTWARE UNITS
Software Market Value Aveerage Software Units Price
=
LEgITIMATE SofTWARE UNITS
# PCs getting Software x Installed Software Units per PC
=
ToTAL SofTWARE UNITS INSTALLEd 13
SHADOW MARKET
2011 bsa global software piracy study
NiNth editioN, May 2012 calculatiNg the coMMercial
Value of pirated software
The commercial value of pirated software is the value of unlicensed software installed in a given year, as if it had been sold in the market. It provides another measure of the scale of software piracy and allows for important year-over-year comparisons of changes in the software piracy landscape.
It is calculated using the same blend of prices by which IDC determines the average software unit price, including: retail, volume license, OEM, free, open-source, etc. The average software unit price is lower than retail prices one would find in stores.
Having calculated the total units of software installed, as well as the number of legitimate and unlicensed software units installed and the average price per software unit, IDC is able to calculate the commercial value of unlicensed software. which software is iNcluded
The BSA Global Software Piracy Study calculates piracy of all software that runs on PCs — including desktops, laptops, and ultra-portables, including netbooks. It includes operating systems, systems software such as databases and security packages, business applications, and consumer applications such as games, personal finance, and reference software.
The study also takes into account the availability of legitimate, free software and open-source software, which is software that is licensed in a way that puts it into the public domain for common use. It is typically free but can also be used in commercial products.
It includes software as a service if it is paid for, but excludes free, Web-based services that might supplant the need for a paid-for package to be installed on a PC. Software sold as part of a legalization program — such as a bulk sale to a government to distribute to schools — is included in the study.
The study excludes software that runs on servers or mainframes and routine device drivers, as well as free downloadable utilities, such as screen savers, that would not displace paid-for software or normally be recognized by a user as a software program. It also does not include software loaded onto tablets or smart phones. the iMpact of exchaNge rates
From 2003 through 2008, US dollar figures in the value tables were in current dollars from the year before. For example, the 2006 value of unlicensed software was stated in 2005 dollars; the value of 2007 unlicensed software was stated in 2006 dollars, and so on. In 2009, BSA decided to publish value figures in the current dollars of the year being studied —
2009 values are in 2009 dollars, 2010 values in 2010 dollars, and 2011 values in 2011 dollars.
This is important when evaluating changes in the values over time. Some of the changes will be based on real market dynamics, some on exchange rate fluctuations from year to year.
# Unlicensed Units Installed x Average Software Unit Price
=
CoMMERCIAL VALUE14 www.bsa.org iNcrease public educatioN aNd awareNess
Reducing software piracy requires a fundamental shift in public attitudes toward software and IP. Public education is critical, therefore, to increase awareness of the importance of managing software assets and respecting creative works through compliance with software licensing. Experience has shown that publicprivate awareness campaigns about piracy and the value of IP can be extremely effective. In addition, support for industry-led initiatives to promote the business practice of managing and optimizing software purchases, utilization, and maintenance — a process known as software asset management
(SAM) — can help governments, businesses, and other organizations derive greater value from software assets by optimizing their use of licensed applications and reducing piracy. For example, BSA offers a suite of certification programs in standardsbased SAM for individual professionals, entire organizations, and auditors.
ModerNiZe ip laws to accouNt for New iNNoVatioNs
Around the world, copyright and other intellectual property laws have lagged behind the pace of technology innovation. With the advent of cloud computing and the proliferation of networked mobile devices, policymakers should modernize protections for software and other copyrighted materials. This effort should include vigorous enforcement actions — including against online piracy — and modernization of underlying copyright laws, for example through implementation of World Intellectual Property
Organization (WIPO) copyright treaties. step up eNforceMeNt with dedicated resources
Too often, software theft is not considered a serious crime and penalties for convicted offenders are too low to provide effective deterrence. Countries can elevate their enforcement of intellectual property by:
• Creating specialized IP enforcement units at the national and local level and providing dedicated resources to investigate and prosecute IP theft;
• Increasing cross-border cooperation among police and other enforcement agencies to improve coordination for law enforcement in multiple countries; • Supporting the training of law enforcement and judiciary officials (including establishing specialized
IP courts where appropriate) and providing better technical assistance to ensure that the people on the front lines of piracy enforcement are equipped with the tools they need to deal with the changing nature of IP theft; and
• Fulfilling obligations under the World Trade
Organization’s Agreement on Trade-Related
Aspects of Intellectual Property Rights (TRIPS) by adopting and implementing laws that meet international norms for civil and criminal IP rights protection. IP laws also should provide for clear protection and energetic enforcement against misappropriation and infringement of new software innovations, such as cloud computing technologies. lead by exaMple
Governments are the largest users of software in the world. They should demonstrate leadership by ensuring they are using only fully licensed software in their own operations. They should implement SAM programs and promote the use of legal software in state-owned enterprises, and among all contractors and suppliers.
BSA Blueprint for reducing SoftwAre pirAcy 15
SHADOW MARKET
2011 bsa global software piracy study
NiNth editioN, May 2012
ABOuT BSA the business Software alliance (bSa) is the leading advocate for the global software industry before governments and in the international marketplace. it is an association of world-class companies that invest billions of dollars annually to create software solutions that spark the economy and improve modern life.
BSA serves as the world’s premier anti-piracy organization and as a respected leader in shaping public policies that promote technology innovation and drive economic growth.
Through government relations, intellectual property enforcement, and educational activities in markets around the world, BSA protects intellectual property and fosters innovation; works to open markets and ensure fair competition; and builds trust and confidence in information technology for consumers, businesses, and governments alike. protectiNg iNtellectual property
& fosteriNg iNNoVatioN
Intellectual property rights (IPR) — copyrights, patents, and trademarks — provide the legal framework for creative enterprise, the bedrock of growing economies. They are also essential to commercial software development, which is the world’s largest copyright industry.
By working with policymakers, leading enforcement actions, and conducting public-education initiatives around the world, BSA ensures that respect for IPR pervades the global economy and society.
• championing intellectual property rights: BSA works with governments around the world to ensure intellectual property protections keep pace with new innovations in technology, such as cloud computing. • curbing software theft: BSA conducts vigorous enforcement programs in approximately 50 countries, helping its members guard against software theft by taking legal action against commercial, end-user license infringement, counterfeiting operations, and Internet piracy.
• leading industry research: BSA publishes the most authoritative global studies on piracy and its economic impact, illuminating the scope of the problem and helping shape national and international policy responses.
• educating the public: BSA educates consumers about harms associated with software piracy and offers a groundbreaking training program to help organizations more effectively manage their software assets.16 www.bsa.org opeNiNg MarKets & eNsuriNg fair coMpetitioN
Open markets are essential to economic growth and prosperity. BSA expands market opportunities for the software industry by working with governments to break down trade barriers and eliminate discriminatory procurement preferences that stifle innovation by skewing competition.
• breaking down barriers to growth: BSA provides policymakers with information, expert analysis and industry insights to promote an open-market agenda. These efforts include a special focus on the so-called ‘BRIC’ economies of Brazil, Russia,
India and China, which are the world’s fastestgrowing technology markets but also home to rampant piracy.
• promoting technology Neutrality: BSA encourages fair competition among technologies by promoting internationally recognized standards and unbiased IT-procurement policies for governments. • supporting New innovations: BSA works with policymakers around the world to create conditions for new technologies such as cloud computing to flourish. In addition to collaborating on technology standards, this work involves elevating intellectual property protections, harmonizing international legal principles, and addressing other challenges that are beyond the capability or jurisdiction of any one company or government. buildiNg trust & coNfideNce iN techNology
Security and privacy undergird trust and confidence in information technology for consumers, businesses and governments. BSA promotes responsible data stewardship and facilitates acceptance and adoption of each new wave of innovation that transforms the technology marketplace and creates value for society.
• driving public-private collaboration: Drawing on the expertise of its members and productive working relationships with public officials, BSA serves as a knowledge center and catalyst to encourage cooperation and forge consensus among industry and governments.
• protecting consumers: As new technologies emerge, such as cloud computing, BSA and its members develop appropriate privacy and security standards and share their insights with policymakers and regulators.
• Mapping policy solutions: BSA has developed a global cybersecurity framework to guide governments in crafting policies that effectively deter and punish cybercrime, mitigate threats, inform and protect consumers, and respond to cyber incidents.www.bsa.org bsa europe, Middle east & africa
2 Queen Anne’s Gate Buildings
Dartmouth Street
London, SW1H 9BP
United Kingdom
T: +44.207.340.6080
F: +44.207.340.6090 bsa worldwide headQuarters
1150 18th Street, NW
Suite 700
Washington, DC 20036
T: +1.202.872.5500
F: +1.202.872.5501 bsa asia-pacific
300 Beach Road
#25-08 The Concourse
Singapore 199555
T: +65.6292.2072
F: +65.6292.6369 busiNess software alliaNce global offices
Bangkok, Thailand Beijing, China Brussels, Belgium Hanoi, Vietnam Jakarta, Indonesia Kuala Lumpur, Malaysia
München, Germany New Delhi, India São Paulo, Brazil Taipei, Taiwan Tokyo, Japan

Similar Documents

Free Essay

Heliography

...INTRODUCTION Devices that use light to store and read data have been the backbone of data storage for nearly two decades. Compact discs revolutionized data storage in the early 1980s, allowing multi-megabytes of data to be stored on a disc that has a diameter of a mere 12 centimeters and a thickness of about 1.2 millimeters. In 1997, an improved version of the CD, called a digital versatile disc (DVD), was released, which enabled the storage of full-length movies on a single disc. CDs and DVDs are the primary data storage methods for music, software, personal computing and video. A CD can hold 783 megabytes of data. A double-sided, double-layer DVD can hold 15.9 GB of data, which is about eight hours of movies. These conventional storage mediums meet today's storage needs, but storage technologies have to evolve to keep pace with increasing consumer demand. CDs, DVDs and magnetic storage all store bits of information on the surface of a recording medium. In order to increase storage capabilities, scientists are now working on a new optical storage method called holographic memory that will go beneath the surface and use the volume of the recording medium for storage, instead of only the surface area. Three-dimensional data storage will be able to store more information in a smaller space and offer faster data transfer times. Holographic memory is developing technology that has promised...

Words: 3539 - Pages: 15

Free Essay

3 Point Bending Beam

...Laboratory 2: Build a Beam for 3-Point Bending Abstract: This laboratory report contains the design process of a simple foam I-beam. An analysis of the beam is conducted after the application of a 3-point bending from an ATS machine. This beam experienced a linear stiffness of 262 lbf./in. at an ultimate strength of 53.9 lbf. and deflection of 0.351 in. to which it immediately failed. Objective: This laboratory required the design and construction of a beam that spans 30 inches in order to determine the maximum strength and carry load at mid-span. The beam was created exclusively using a 10 by 40 inches piece of foam board of thickness 3/16 inches, 4 hot glue sticks, and Exacto knives. Design Rationale: From the materials mentioned, an I-beam was constructed. The cuts necessary to produce the I-beam are shown in Figured 1. 32 in. 1 in. 5 in. 5 in. Figure 1: Foam Beam Cut Schematic. When deciding how to cut foam board, the thought behind it was to target the areas of the beam that would experience the most applied load force. The final design consisted of five 1-inch units hot glued together at three equally spaced sections between two 32-inch long boards. The top and bottom sections 1 were supposed to keep the board from failing at its ends and splitting apart and the middle section was to keep the board from splitting in the middle and dipping inward. The final design is shown in Figure 2. Top View Side View Front View Figure 2: Finished I-Beam Views The focuses...

Words: 794 - Pages: 4

Premium Essay

Disadvantages Of Rapid Prototyping Manufacturing

...Always thinking about accelerate the design phase and achieve a clearly idea of the design as we have it physically. 1.3 EXISTING TECHNOLOGIES. 3D printing allows us to create a model of a piece to validate the geometry of it, correct mistakes and make modifications in the design with a low cost. But, how do it create this complex geometry so easy? 3D printing takes data from a CAD software, evaluates the geometry in three dimensions by parallel horizontal layers as close as accurate could be the piece. In this way, a solid volume is generated from a lot of horizontal sections. This is possible to do with different technologies: • SLA, Stereolithography: it is based on the solidification of a photosensitive resin layer by layer. Uses a beam of laser light with certain frequencies and powers. • SGC, Photopolymeration by UV light: Based on solidification, as the SLA, but the difference is that solidifies radiating a powerful UV light and working on all points of a section at a...

Words: 2343 - Pages: 10

Premium Essay

Truss

...MECHANICAL & AUTOMOBILE ENGINEERING DEPARTMENT III TERM SECOND YEAR 1 Course number MEC211 2 Course Title STRENGTH OF MATERIALS 3 Credits 5 4 Contact Hours (LT- P) 3-1-2 5 Course Objective To understand the relationship between stress and strain in solids. 6 Course Outcomes On successful completion of this module students will be able to 1. Understand the concept of strain and stress, stress- strain diagram, Elastic constants and constitutive relations.. 2. Determine principal stresses and strain and locate principal planes. 3. Apply the theory of simple bending to compute stresses in beams of homogenous and composite sections of different shapes. 4. Calculate slope and deflection in beams.Use Double integration method, Macaulay’s method, moment area method methods to calculate slope and deflection for the following : a) Cantilevers b) Simply supported beams with or without overhang Under concentrated loads, uniformly distributed loads or combination of concentrated and uniformly distributed loads. 5. Apply different formulae to analyze stresses in struts and columns subjected to axial loads. 7 Outline syllabus 7.01 MEC211.A Unit A Simple stresses and strains 7.02 MEC211.A1 Unit A Topic 1 Concept of stress and strain, St. Venant’s principle, Stress and strain diagram, Hooke’s law, Young’s modulus (E), Modulus of Rigidity(G), Bulk modulus(K), Poisson ratio. 7.03 MEC211.A2 Unit A Topic 2 Stress and elongation in a bar due to its self – weight, Elongation...

Words: 958 - Pages: 4

Free Essay

Term Paper.Doc

...1 Chapter 4 Shear Forces and Bending Moments 4.1 Introduction Consider a beam subjected to transverse loads as shown in figure, the deflections occur in the plane same as the loading plane, is called the plane of bending. In this chapter we discuss shear forces and bending moments in beams related to the loads. 4.2 Types of Beams, Loads, and Reactions Type of beams a. simply supported beam (simple beam) b. cantilever beam (fixed end beam) c. beam with an overhang 2 Type of loads a. concentrated load (single force) b. distributed load (measured by their intensity) : uniformly distributed load (uniform load) linearly varying load c. couple Reactions consider the loaded beam in figure equation of equilibrium in horizontal direction Fx = 0 HA - P1 cos = 0 HA = P1 cos MB = 0 - RA L + (P1 sin ) (L - a) + P2 (L - b) + q c2 / 2 = 0 (P1 sin ) (L - a) P2 (L - b) q c2 RA = CCCCCCC + CCCC + CC L L 2 L (P1 sin ) a P2 b q c2 RB = CCCCC + CC + CC L L 2 L for the cantilever beam Fx = 0 HA = 5 P3 / 13 12 P3 (q1 + q2) b Fy = 0 RA = CC + CCCCC 13 2 3 12 P3 q1b q1 b MA = 0 MA = CC + CC (L – 2b/3) + CC (L – b/3) 13 2 2 for the overhanging beam MB = 0 - RA L + P4 (L– a) + M1 = 0 MA = 0 - P4 a + RB L + M1 = 0 P4 (L– a) + M1 P4 a - M1 RA = CCCCCC RB = CCCC L L 4.3 Shear Forces and Bending Moments Consider a cantilever beam with a concentrated load P applied at the end A, at the cross section mn, the shear force and bending moment are found ...

Words: 1519 - Pages: 7

Free Essay

Applications of Electron Microscopy in Materials Science and Engineering

...APPLICATIONS OF ELECTRON MICROSCOPY IN MATERIALS AND METALLURGICAL ENGINEERING A TERM PAPER PRESENTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE POSTGRADUATE COURSE MME 604 [ELECTON OPTICS AND MICROSCOPY] BY MARK, UDOCHUKWU 20044449298 SUBMITTED TO ENGR. PROF. O. O. ONYEMAOBI [EXAMINER] DEPARTMENT OF MATERIALS AND METALLURGICAL ENGNEERING FEDERAL UNIVERSITY OF TECHNOLOGY, OWERRI AUGUST 2005 i Markudo [2005] PREFACE The electron microscope is an indispensable modern analytical and research tool. Microscopy is employed in all branches of science to identify materials, characterize unknown substances or study the properties of known materials. This term paper surveys the applications of electron microscopy in the field of materials and metallurgical engineering. I hereby acknowledge my lecturer on Electron Optics and Microscopy (MME 604), Engr. Prof. O. O. Onyemaobi. He has been sharpening my research and writing skills since my undergraduate days. This is the third term paper I will be submitting to him. ii TABLE OF CONTENTS Title Page Preface Table of Contents CHAPTER ONE 1.0 1.1 1.2 1.2.1 1.2.2 1.2.3 Introduction Materials and Metallurgical Engineering Microscopes and Microscopy Levels of Structure Methods of Structural and Compositional Elucidation Microscopy i ii iii-v 1-12 1 1 3 4 6 8 13-24 13 13 14 16 17 18 19 21 CHAPTER TWO 2.0 2.1 2.2 2.3 2.3.1 2.3.2 2.3.3 2.3.4 Transmission Electron Microscopy Interaction of Electrons...

Words: 11775 - Pages: 48

Free Essay

Wireless Power Transfer Techniques

...2 2013 ABSTRACT The advent of various wireless technologies have revolutionized the communication infrastructure and consequently changed the entire world into a global village. Use of wireless technology has also been made for transmission of electric power wirelessly. It can reduce heavy line losses; increase the portability of power systems. It also integrates the communication technologies and electric power to the same platform. This paper presents a comprehensive review and detailed analysis of various techniques used for wireless power transmission. Role of wireless power transmission in applications of smart grid like electric vehicle charging has also been covered. Feasibility, implementations, operations, results and comparison among different methods have been elaborated in order to identify the favourable and economical method for low power and small distance applications. KEYWORDS: Power systems, Wireless power transmission, Magnetic resonance. INTRODUCTION Role of electricity in modern machine era is considered like circulation of blood in human body. Electrical energy has made human life easy and luxurious. Electricity is being distributed using the conventional grid which is in service for last hundred years. Conventional grid is characterized by out dated infrastructure, delayed communication and heavy transmission losses. One of the solutions of the...

Words: 3072 - Pages: 13

Free Essay

Analysis of Physical Parameters Influencing Beam Pattern of Uniform Linear Array of Antennas

...ANALYSIS OF THE PHYSICAL PARAMETERS INFLUENCING BEAM PATTERN OF A UNIFORM LINEAR ARRAY OF ANTENNAS Final Year Project Report Presented by SAJID UR REHMAN CIIT/SP08-BET-090/ISB USMAN ULLAH ASIF CIIT/SP08-BET-121/ISB In Partial Fulfillment Of the Requirement for the Degree of Bachelor of Science in Electrical (Telecommunication) Engineering DEPARTMENT OF ELECTRICAL ENGINEERING COMSATS INSTITUTE OF INFORMATION Technology, ISLAMABAD JAN 2012 Declaration We, hereby declare that this project neither as a whole nor as a part there of has been copied out from any source. It is further declared that we have developed this project and the accompanied report entirely on the basis of our personal efforts made under the sincere guidance of our supervisor. No portion of the work presented in this report has been submitted in the support of any other degree or qualification of this or any other University or Institute of learning, if found we shall stand responsible. Signature:______________ Sajid Ur Rehman Signature:______________ UsmanUllah Asif COMSATS INSTITUTE OF INFORMATION Technology, ISLAMABAD JAN 2012 ANALYSIS OF THE PHYSICAL PARAMETERS INFLUENCING BEAM PATTERN OF A UNIFORM LINEAR ARRAY OF ANTENNAS An Undergraduate Final Year Project Report submitted to the Department of ELECTRICAL ENGINEERING As a Partial Fulfillment...

Words: 6048 - Pages: 25

Free Essay

The It Futur Trends and Technology

...engineering design have led to dramatic reductions in size, power consumption and cost for digital circuitry, wireless communications and Micro ElectroMechanical Systems (MEMS). This has enabled very compact, autonomous and mobile nodes, each containing one or more sensors, computation and communication capabilities, and a power supply. The missing ingredient is the networking and applications layers needed to harness this revolutionary capability into a complete system. We review the key elements of the emergent technology of “Smart Dust” and outline the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume. “Smart Dust.” It is certainly within the realm of possibility that future prototypes of Smart Dust could be small enough to remain suspended in air, buoyed by air currents, sensing and communicating for hours or days on end. At least one popular science fiction book has articulated just such a vision [12]. In this paper, we are concerned with the networking and applications challenges presented by this radical new technology. These kinds of networking nodes must consume extremely low power, communicate at bit rates measured in kilobits per second, and potentially need to operate in high volumetric densities. These requirements dictate the need for novel ad hoc routing and media access solutions. Smart dust will enable an unusual range of...

Words: 6715 - Pages: 27

Premium Essay

Physics

...using other technologies. Spatial coherence typically is expressed through the output being a narrow beam which is diffraction-limited, often a so-called "pencil beam." Laser beams can be focused to very tiny spots, achieving a very high irradiance. Or they can be launched into a beam of very low divergence in order to concentrate their power at a large distance. Temporal (or longitudinal) coherence implies a polarized wave at a single frequency whose phase is correlated over a relatively large distance (the coherence length) along the beam.[3] A beam produced by a thermal or other incoherent light source has an instantaneous amplitude and phase which vary randomly with respect to time and position, and thus a very short coherence length. Most so-called "single wavelength" lasers actually produce radiation in several modes having slightly different frequencies (wavelengths), often not in a single polarization. And although temporal coherence implies monochromaticity, there are even lasers that emit a broad spectrum of light, or emit different wavelengths of light simultaneously. There are some lasers which are not single spatial mode and consequently their light beams diverge more than required by the diffraction limit. However all such devices are classified as "lasers" based on their method of producing that light: stimulated emission. Lasers are employed in applications where light of the required spatial or temporal coherence could not be produced using simpler...

Words: 288 - Pages: 2

Free Essay

Accounting

...fiber optic links, except the beam is transmitted through free space. While the transmitter and receiver must require line-ofsight conditions, they have the benefit of eliminating the need for broadcast rights and buried cables. Laser communications systems can be easily deployed since they are inexpensive, small, low power and do not require any radio interference studies. The carrier used for the transmission signal is typically generated by a laser diode. Two parallel beams are needed, one for transmission and one for reception. Due to budget restrictions, the system implemented in this project is only one way. event, disaster scenes, communications). conventions or space band I. INTRODUCTION (HEADING 1) Laser communication is one of the emerging area of wireless communication system. Due to its low noise ratio makes its one of the well suited communication medium for exchanging of information. Currently laser communication is adopted in satellite communication for space research activities and due to its efficiency on low noise ratio, inexpensive, low power, flexibility and its resistance to the radio interference makes laser communication as one of the research area in wireless communication. In this process, this paper comprises one such application of laser communication for information exchange between any two devices. Laser communication can be used to transmit sound and data signal through the laser beam of system. The intensity of ...

Words: 2367 - Pages: 10

Premium Essay

Solution Accounting

...Advanced Accounting Beams Anthony 11th Edition Solutions Manual Click here to download immediately!!! http://solutionsmanualtestbanks.blogspot.com/2011/10/advanced-accountingbeams-anthony-11th.html ----------------------------------------------------------------------Advanced Advanced Advanced Advanced Accounting Accounting Accounting Accounting Beams Beams Beams Beams Anthony Anthony Anthony Anthony 11th 11th 11th 11th Edition Edition Edition Edition Solutions Solutions Solutions Solutions Manual Manual Manual Manual -------------------------------------------------------------------------***THIS IS NOT THE ACTUAL BOOK. YOU ARE BUYING the Solution Manual in e-version of the following book*** Name: Advanced Accounting Author: Beams Anthony Edition: 11th ISBN-10: 0132568969 Type: Solutions Manual - The file contains solutions and questions to all chapters and all questions. All the files are carefully checked and accuracy is ensured. - The file is either in .doc, .pdf, excel, or zipped in the package and can easily be read on PCs and Macs. - Delivery is INSTANT. You can download the files IMMEDIATELY once payment is done. If you have any questions, please feel free to contact us. Our response is the fastest. All questions will always be answered in 6 hours. This is the quality of service we are providing and we hope to be your helper. Delivery is in the next moment. Solution Manual is accurate. Buy now below and the DOWNLOAD LINK WILL APPEAR IMMEDIATELY once payment is...

Words: 19905 - Pages: 80

Free Essay

People

...CTRL-ALT-DEL, this keyboard shortcut brings up Task Manager in XP, 2000, Vista and 7 no matter how the system is configured: CTRL-SHIFT-ESC (4) What is the default appearance of the mouse pointer when it is waiting for an action to complete in Windows XP? (I-beam, hour-glass, two-headed arrow, or arrow) (5) What is the default appearance of the mouse pointer when it is not on an active area of the window? (I-beam, hour-glass, two-headed arrow, or arrow) (6) What is the default appearance of the mouse pointer when you wish to resize a window on the desktop? (I-beam, hour-glass, two-headed arrow, or arrow) (7) If you press certain keys (example, the Alt key), the Windows OS will designate hot keys (accelerator keys) by changing them in this way: (boldface, italics, underline, or blinking) (8) Provide two other names for the Status Area (where you see the clock, date, and background programs): System Tray ,Notification Area_ (9) Windows 7 allows you to “pin” applications to the Taskbar. What does Windows XP provide that was similar for your frequently-used applications?(two words) Quick Launch (10) If you tell a user she needs to reboot, be sure to tell her to do this first: Close all Applications (11) Where do you turn on or turn off Windows Updates? System Properties (12) Why should you leave Windows Updates “on”? to correct security and other problems with program...

Words: 309 - Pages: 2

Free Essay

Vaccume Tubes Research Paper

...VACUUM TUBES A Research Paper Presented to the Faculty of School of Engineering Asia Pacific College Magallanes, Makati by Pamela Joyce M. Espigol In Partial Fulfillment Of the Requirements in Electronic Devices and Circuits Lec Date Submitted October 30, 2015 II. INTRODUCTION a. RESEARCH PAPER SUMMARY NO. | ABSTRACT | METHODOLOGY | RESULTS | CONCLUSION | RECOMMENDATION | 1 | The objective of this work is to simulate a tube guitar amplifier, the Giannini True Reverber designed by Carlos Alberto Lopes in the nineteen sixties. The nonlinear “overdrive” characteristics of these devices make them attractive for guitarists since odd harmonics are added into the guitar sound as well as sound compression. The shortcomings of these amplifiers led to the development of DSP simulation techniques over the last few years. Many past DSP simulations of tube amplifiers were implemented using Static Digital Wave shappers for the task of replicating the tube transfer characteristics. Since the physical behavior of such systems is quite complex, physically informed models are necessary for more precision in the simulation, requiring more computer power. A Wave Digital Filter (WDF) simulation of the Giannini True Reverber double 12AX7 preamp is accomplished in this work using Koren’s triode equations and Block Compiler, where each parameter was acquired in the original electronic schematic or by measurement of the real amplifier. The real preamp is compared to the...

Words: 5874 - Pages: 24

Free Essay

Engr 244

... MECHANICS OF MATERIALS Other Loading Types Seventh Edition Beer • Johnston • DeWolf • Mazurek Fig. 4.3 (a) Free-body diagram of a clamp, (b) freebody diagram of the upper portion of the clamp. • Eccentric Loading: Axial loading which does not pass through section centroid produces internal forces equivalent to an axial force and a couple • Transverse Loading: Concentrated or distributed transverse load produces internal forces equivalent to a shear force and a couple • Principle of Superposition: The normal stress due to pure bending may be combined with the normal stress due to axial loading and shear stress due to shear loading to find the complete state of stress. 4-3 Fig. 4.4 (a) Cantilevered beam with end loading. (b) As portion AC shows, beam is not in pure bending. Copyright © 2015 McGraw-Hill Education. Permission required for reproduction or display. MECHANICS OF MATERIALS Symmetric Member in Pure Bending Seventh Edition Beer • Johnston • DeWolf • Mazurek • Internal forces in any cross section are equivalent to a couple. The moment of the couple is the section bending...

Words: 2230 - Pages: 9