Big-Software (Part 1): How Big-Software can use the law to destroy other companies featuring G.C. Hutson, CEO for Sadien

Big-Software companies have the power and legal backing to use federal copyright law to destroy other companies, that use their products without proper licensing.

The financial and operational consequences of not auditing and maintaining your company's software licensing can be catastrophic. It can literally destroy your business and literally ruin your life.

Software license compliance is vital to the security and prosperity of your business. Software copyright, piracy and compliance are strictly governed by federal law. And that law dramatically favors the best interests of software companies, almost entirely.

Sadien, Inc. is a consulting group that specializes in software piracy. To learn more, visit us at http://www.Sadien.com or call us (615) 869-0022.

See more software related videos at http://www.sadien.com/video.html

Views: 172

Comment

You need to be a member of Codetown to add comments!

Join Codetown

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

AWS Adds Intelligent-Tiering and Replication for S3 Tables

AWS has introduced Intelligent-Tiering and cross-region replication for S3 Tables to automate cost optimization and data availability for Apache Iceberg workloads. These features allow data to transition to lower-cost storage tiers based on access patterns while maintaining consistent, read-only table replicas across regions and accounts without manual synchronization.

By Steef-Jan Wiggers

Google’s Eight Essential Multi-Agent Design Patterns

Google recently published a guide outlining eight essential design patterns for multi-agent systems, ranging from sequential pipelines to human-in-the-loop architecture. The guide provides concrete explanations of each pattern along with sample code for Google's Agent Development Kit.

By Sergio De Simone

Java News Roundup: Spring Shell, JReleaser, TornadoInsight, Apache Camel

This week's relatively quiet Java roundup for December 29th, 2025, features news highlighting: the GA release of Spring Shell 4.0; point releases of JReleaser 1.22.0 and Apache Camel 4.14.3; and TornadoInsight now compatible with the recent release of TornadoVM 2.0.

By Michael Redlich

DuckDB's WebAssembly Client Allows Querying Iceberg Datasets in the Browser

DuckDB has recently introduced end-to-end interaction with Iceberg REST Catalogs directly within a browser tab, requiring no infrastructure setup. The new feature leverages DuckDB-Wasm, a WebAssembly port of DuckDB that runs in the browser, allowing users to query, read, and write Iceberg tables in a serverless manner.

By Renato Losio

AWS Introduces Fifth-Generation Graviton Processor with M9g Instances

AWS recently announced the new Graviton5 processor and the preview of the first EC2 instances running on it, the general-purpose M9g instances. According to the cloud provider, the latest chip delivers up to 25% higher performance than Graviton4, introduces the Nitro Isolation Engine, and provides a larger L3 cache, improving latency, memory bandwidth, and network throughput.

By Renato Losio

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service