Licensing for Hosted Application Services: Why it costs what it costs

Licensing for Hosted Application Services:

Why it costs what it costs

Application hosting services are experiencing resurgence in popularity these days, due to the prevalence of messaging about the benefits of a “cloud” technology model.  While hosted application services aren’t really cloud (according to cloud technology purists, anyway), they can look and feel and be paid for just like cloud solutions, so the name fits OK.  Hosted applications are desktop or network applications you access via the web, where the software is implemented and managed by a 3rd party application service provider (the host) rather than being installed on your local PC or LAN.  Some software products may be rental-licensed by the ASP, and when combined with the hosting service, the entire subscription service is more like SaaS (software-as-a-service) than the old “purchase and install” approach.

An important supporting program for application hosting service providers is the Microsoft Service Provider License Agreement program. Under a formal agreement with Microsoft or via an SPLA reseller, service providers and independent software vendors are able to license the latest Microsoft software to provide software services and hosted applications to customers. With the SPLA, service providers and ISVs can lawfully license Microsoft products on a monthly basis to host software services and provide application access for their customers. The SPLA supports a variety of hosting scenarios to help providers deliver highly-customized and robust solutions to a wide range of subscribing customers, and it’s the only valid means for obtaining subscription-based provider licensing for these products.

Because the software products being hosted are essentially desktop or LAN-based products, the underlying technology to “deliver” those applications is generally of a similar foundation.  In cases where the provider is offering hosting of Windows-based QuickBooks desktop editions or Microsoft Office applications, for example, the platforms and servers used by the service provider are almost certainly Windows-based.  This operating system, as well as the rights to allow remote user connections to it, is licensed to the provider from Microsoft under the SPLA.  These elements are referred to as “user” licensing elements.

An aspect of Microsoft reporting and licensing which is not well recognized (or frequently complied with) is the difference between user and application licensing.

User licensing, which includes the Windows server access license as well as the remote desktop user license, is a named user access license. This means that the provider need only report and settle for the user license if the user actually accesses the system during the reporting period (usually each month).  Not quite like a concurrent user model, where only the high count of users is reported, the named user model requires that the license for each user be paid if that user logged in at any time and remained logged in for any length of time during the reporting period.

Application licensing applies to the application software license acquired through and governed by the use-rights provided for and granted under the Microsoft SPLA. Rental application licensing is assigned to a specific, named user, and is to be reported fully on a monthly basis regardless of whether or not the user accessed the software. This is in direct contrast to the named user access licensing described above. Providers are required to report and settle on a monthly basis the total number of subscribed application licenses available to users, including Microsoft Office applications, Exchange, SQL and others, regardless of whether or not the user actually logged in and used the products.  The license is assigned to the user and is therefore required to be paid.

Being an application hosting service provider is a complicated business, and there is a lot to consider when developing subscription services for broad customer delivery.  Pricing is one of the complaints customers voice relating to these services, but the reality is that it takes quite a bit in terms of system resources and licensing to provide an acceptable hosted application experience.  This is one of the areas where SaaS and true cloud solutions benefit from a scale economy – where the application is designed for the platform, and one instance of the solution and platform can serve a large number of customers more affordably.

When working with a hosting service provider, it is wise to recognize that the platform and software licensing costs are there to support the type of applications being hosted.  If you have an SQL-based application, you will need the SQL licensing to support it, just like you have to pay for licensing of an Exchange mailbox or a hosted copy of Word.  Enabling only a portion of the total business software requirement may make it difficult to cost justify hosting just one solution.  However, if the business utilizes the host to manage all the desktop applications and data, the cost-efficiency of the approach can increase dramatically.  Regardless of whether the business elects to continue to run software on local PCs, or if it decides to outsource IT to a host and run it there, the company will have to pay the price for software licensing.

Make sense?

J

Small Business IT Governance: You really need it now

it-balancing-actBig changes are going on in the world of information technology and business.  Where social computing and  mobility are no longer purely consumer concerns, enterprise IT departments face a growing requirement to embrace user devices and access in environments which were once strictly and closely controlled.  Enterprise IT may be challenged when presented with user personal devices and demands for remote access to enterprise data, yet the governance of systems is generally well-defined and strictly performed.  In small business, however, the people, policy and process issues (collectively incorporated into “governance”) tend to be more organic, and the use of personal devices and open access is more frequently considered to be a normal part of the overall business IT profile.

It is a focus on defining controls and processes, and influencing the activities and attitudes of the people involved, which has become an essential requirement in small business.  Where management of information technology resources was not of great concern to the small business owner before, increased device and information mobility (removal of physical boundaries) and erosion of logical boundaries around personal and business computing have become a really big deal for everyone in business. Small businesses just don’t often have departments of people working on the problem.

Technology use in business has always come at a price, and as various influences continue to change how users interact with devices, applications and systems, business owners and IT managers will continue to face difficult choices between balancing security of information resources and providing a productivity-enhancing user experience.   Too many security barriers result in avoidance of security protocols, slow or immobile company computers result in users working on their own machines and portables, and restricting access for mobile users results in “shadow IT” implementations of mobile sync and other data access approaches.

Yet “shadow IT” tends to be the norm with many small businesses, where there are often fewer barriers to implementing solutions which address individual user issues or problems.  Lacking the resources or understanding to develop a strong plan for managing information systems and technology within the business, small business owners often consider the computer systems and computerized data to be tools to get jobs done rather than strategically valuable assets to be strictly controlled and protected.  These business owners are not recognizing the ever-increasing need to not simply secure business information, but to establish processes and rules which will govern how users and devices access and interact with the information and systems.

Enterprise IT departments have often viewed their small business counterparts (customers, suppliers, etc.) as potential points of vulnerability, an attitude which was once considered to be centered not on real assessments of the risk but more in terms of ego, level of sophistication, and hierarchy in the food chain.  In today’s world of real risk introduced by myriad technological and human elements in every link in the supply chain, enterprise IT conclusions regarding the risk potential of doing business with anyone – including small businesses – may not be entirely unfounded.  Whether it be commentary and information distributed by individuals via social media or malware or corruption introduced inadvertently (or not) via computerized interaction, there is the possibility of risk introduced with every system, person and process involved.  Enterprise to enterprise, these issues may be more often recognized and remediated; where the SMB is involved, not always so much.

This is a brave new world of computing, and there is truth in that even the smallest of businesses can “compete with the big guys” when the right mixture of technology and process is applied – for good or bad.  Technology enables businesses to be more productive, get more done with fewer resources and perform at higher levels. IT Governance in small business is no longer an optional area of focus, addressed only during infrequent discussions with the local contract IT guy when he comes in to defrag the hard drive on a slow computer.  Establishing the proper processes and controls to wrap around IT use in the business has become an imperative; a necessarily specific and considerate approach to how information technology is used within the business, who uses it, and what IT is composed of.

Just about every business, and most individuals, are connected in some manner via some type of network, representing a dramatic and dynamic change to the traditional composition of business IT and the landscape of vulnerabilities which threaten it.  The increased connectedness, capability and complexity of systems and networks requires a greater focus on overall IT governance – exercising authority and controls – as the impact (just like the information) can easily and unintentionally reach far beyond the boundaries of the individual business.

jmbunnyfeetMake Sense?

J

“People are nothing more than another operating system”, says Lance Spitzner, training director for the Securing The Human Program at SANS Institute.  “Computers store, process and transfer information, and people store, process and transfer information,”  How Hackers Fool Your Employees

Justifying the IT Budget: the Cost of Not Spending

it_spend“Competitive and ever-increasingly sophisticated in the marketplace”[1] describes a company positioned for long term business survival.  Complacency takes the business nowhere but into irrelevance-land, which I think we can all agree is not where most business owners wish to end up…  it makes selling the company slightly more challenging.  Even in markets which were once firmly held to be localized are now open to new – and new kinds of – competitors, due in most part to advancements the development of information technology (IT) as well as how it is applied.  These days, competition is globally facilitated rather than locally, and it’s becoming the standard approach.  Welcome to the cloud.

New paradigms in IT capability and use are spawning huge shifts in what were broadly recognized normal or traditional business approaches.  This realization has created the need for businesses to radically change their view of IT investment and the value of IT within the organization and operation.  Yet IT is rarely an area which gains a strategic focus for investment within most businesses, and is frequently considered to be like a pencil or a particular chair… something the business needs but which has little impact on the company’s ability to compete better.  Au Contraire, Mon Frère:  Information technology is at the heart of business competitiveness, but justifying the desired investment is the great challenge.  Maybe it’s because the focus is always on the great benefits to be achieved with the spend, rather than looking realistically at the impact of not doing it well or at all.  Especially with information technology, there is a large potential cost to be paid for not spending adequately.

While business operations are sustained through IT involvement, economic pressures continue to weigh down business interest in funding IT operations. (which is weird, as there is a lot of evidence that the good bet is on those who do just the opposite). This regular spending reduction and cost control plan has good intentions of reducing the overall cost of business operations. The unfortunate reality is that operations are less efficiently sustained and are even more frequently unable to create or manage any level of growth. Reducing all IT spending is only useful when profitability is also improved and quality is maintained, unless it is an effort to simply stay afloat as revenues decline (and it’s recognized that quality will decline as well). But reducing costs does not help the business seeking to remain competitive in a rapidly changing marketplace, and pulling the pins out of the department primarily responsible for at least keeping things currently in operation operating serves only to chip away at the once-solid foundation. It’s a real problem, this difficulty with increasing interest and justifying increased funding for business information technology. And it all stems from the inability of organizations to clearly and with tangible benefit cost justify the investment.

It is this justification – demonstrating IT investment as a strategic asset presenting an advantage over competitors and positioning the business for future success – which requires effort and analysis to fully describe. Information technology is not a set of servers and software, and it is not websites and portals. It’s not click thru rates or SEO scores. Well, it’s all of that, but it is none of that. There is so much to consider and incorporate, and there are many degrees of success which might be experienced along the way. Information technology is a fundamental requirement in each and every business, and dependency upon it is increasing at a startlingly rapid pace, yet we still can’t quite figure out how to put it all on paper with provable numbers.

It might be easier to forecast in little departmental or functional pieces, but that doesn’t provide a total picture of the enterprise. And it’s often really difficult to quantify the impact of not doing something, or doing it only OK rather than really well. When this data does present itself, it often comes too late and in the form of a comparison to the competition, revealing where the business just didn’t meet the mark as compared to others in the same space.

It all boils down to businesses coming to the realization that information technology investment must be made on a continuing basis. The justification for IT funding must be made, and that justification must necessarily be balanced against the potential implications and impacts of not implementing. This is the only formula which can ultimately describe the value of IT investment in the business.

Make Sense?

Read the entire article on LinkedIn

https://www.linkedin.com/today/post/article/20140624161243-633314-justifying-the-it-budget-the-cost-of-not-spending

 

[1] A model for investment justification in information
technology projects: A. Gunasekaran et al. / International Journal of Information Management 21 (2001) 349–364

Accounting Professional Value is Insight and Advice, Not Just a Hosted Server

Accounting Professional Value is Insight and Advice, Not Just a Hosted Server

Back in the late 90’s, when the application service provider model was first established, a number of providers recognized how beneficial it would be for public accountants to use hosted applications to work more closely with their accounting and bookkeeping clients.  Seeking markets which would rapidly adopt a hosted application model, these providers focused on hosting small business accounting solutions such as Intuit QuickBooks desktop products, and then sought participation by the largest addressable communities of users working with those products – QuickBooks ProAdvisors, bookkeepers and accountants.  The idea was that the community of QuickBooks professionals would benefit by bringing their clients onto the hosting platform, and service providers could sell to one professional and gain a bunch of small business users.  It made sense, too, as it allowed the professional to have a single service and login that allowed them to access all their client QuickBooks company files.  The client could log in to the system, too, delivering remote access and managed service benefits to the client, as well.  But there was a catch, and it didn’t fully reveal itself until recently as cloud-based applications and true SaaS applications began to gain market adoption.

The problem actually started to reveal itself as more businesses elected to adopt hosting services.  There’s a saying amongst the QuickBooks hosting providers that “nobody uses just QuickBooks”.  Saying “nobody” uses just QuickBooks is a bit of a stretch, but the reality is that numerous businesses use other applications and software solutions in addition to their QuickBooks product.  Sometimes these products integrate with QuickBooks and sometimes they don’t, but it is not often that a business utilizes just the one software solution.  At minimum, there are likely email or productivity tools in use, too.  The point is that the QuickBooks hosting providers – those hosts focusing on providing service to QuickBooks accountants and small business clients – realized that the number and variety of applications desired by their customers would grow very quickly, as would the variety of needed implementation models.  The unfortunate solution of the time was to just put it all on the same environment.

The original selling message to the QuickBooks consultant and accountant markets was that they should get all their clients on to the hosting service, and then the accountant could benefit from an “economy of scale”, making the cost of the overall delivery lower.  Further, by grouping the firm and the clients into a single hosting environment, it would make application and data sharing easier.  Both of these messages are true, but putting the firm and its clients into a single environment – with the firm as the “sponsor” and front line promoter of the service – began to have impacts which were not clearly foreseen.

  1. Accounting professionals and consultants changed the nature of their relationship with the client, going from trusted advisors to technology and solution vendors.
  2. Client business technology needs were placed as secondary to “enabling” the working relationship between the accountant and the small business client.
  3. Attempts to fully satisfy client technology requirements overburdened and impacted the environment, reducing overall service quality and satisfaction and diminishing the value of the scale economy (as well as the clients’ perception of their accounting professional).
  4. Firms structured their processes to support a single technology and operating model, and found difficulties in adopting new strategies or solutions.

In concept, having accounting professionals and their clients all working seamlessly together in the same systems sounds great.  For some firms, a cloud server packed with all the firm and client applications and data enables an entirely new business and service model, which is very cool and it actually works (for some firms and their clients).  But the problem – a problem which may not be fully revealed in the short term – is that the various businesses involved, from the accounting practice to each and every client, has different business needs and operates as a unique organization.  While there may be fundamental similarities, “the devil is in the details” as they say, and a single platform or hosting solution is unlikely to really work well for all.  Even more potentially damaging, the perception of the trusted advisor who is now viewed as a vendor of IT services or software erodes the value of the client engagement and the potential for the firm to deliver greater benefit through their core offerings.  A business owner is more likely to change vendors of IT service than they are their trusted accounting or finance professional.   And they’re also more likely to change IT service providers if the provider cannot deliver exactly the application or service desired.  When the accounting professional is perceived to be the IT service provider, the lines are blurred and the client ends up attaching their loyalty to a software product or business solution instead of the accountant advisor OR the IT provider.

With SaaS and native web-based applications being broadly adopted by small businesses, the opportunity for firms to engage with clients in different ways and with different solutions started to break the one-size-fits-all hosting approach.  Professionals found that empowering their clients by supporting properly fitted solutions which work for the client business delivered the opportunity to become more operationally and strategically involved with the client business.  Deeper operational and strategic involvement with the client became the means to drive increased value in the engagement and services offered and delivered.  The client business was able to benefit from the involvement of their trusted advisor, regardless of what platforms or systems might be in place.

Accountants and bookkeepers are recognizing that the previous model of aligning the practice with a particular software product or delivery system may not be the best approach to building and retaining the customer base.  With new business accounting and bookkeeping solutions emerging regularly – and gaining broad market adoption – and as more and more varied cloud based services and solutions are applied to various business problems – professionals will further recognize that their value is not tied to a cloud server, a single small business accounting solution, or to any particular technology.  The value of the accounting professional is not in the software they support or the server it runs on.  The value of the accounting professional is in the insight gathered and advice provided – services offered which help support better business management, growth and profitability.

Make Sense?

J

Read more:

Licensing the Cloud: Software Distribution and Use in a Remote Access World

Licensing the Cloud: Software Distribution and Use in a Remote Access World

Whether we like it or not, and whether we agree or not – software developers have a right to decide how and where their licensed products are run.  There have always been arguments in this area, where software license purchasers take the position that they should be able to do what they want with their licenses, and where commercial software developers believe they have the rights to dictate authorized usage.  Truly, when it comes down to the legalities of it all, the software companies will win because they have the legal footing to fall back on  – the EULA containing use rights and terms which licensed users have agreed to.

The problem has been ongoing, with software developers constantly and consistently seeking methods to reduce unauthorized software distribution and unsupported use, and users spending amazing amounts of time and resources finding ways to break the rule.  Copy protection, “phone home” license validation models and all sorts of approaches have been developed to prevent software theft and unauthorized distribution.  But it happens anyway – a lot – and the cloud is turning into a great facilitator.  Surprisingly, it’s an “in your face” approach, too, where the previous iteration of web-enabled software theft (unauthorized digital downloads and license cracking) was fairly quiet and tried to be secretive to stay out of the gun sights of the developer.  Today’s “flavor” is right out there, being marketed to any and all who care to view the ads.

With businesses more frequently turning to “cloud” server providers to run business applications, it is no wonder that the IaaS and PaaS companies would want to make their services easier and more valuable to acquire than the next guy’s.  Aside from a groovy control panel and great networking and VM pricing, the added value from these providers is in the applications they are able to service.  More frequently, hosting service providers are marketing their solutions in the context of the applications customers run on the service (which makes sense, because the application’s what really matters).  Leveraging the brand value and recognition of popular commercial software products makes sense, as it improves overall visibility and increases the potential of the “right” kind of prospect engaging and becoming a customer.

The problem arises when these service providers sell hosting services for, or which support, applications they are not authorized or licensed to deliver, and this is where the argument comes full circle.  The hosting provider wants to host applications customers use, customers have licenses for those applications, but not a right to have them hosted.  The host deploys the application anyway, because that’s what the customer wants.  “What’s the risk?” they ask… “the customer has the software license”.

The risk is, unfortunately, greater for the service provider than for the customer.  Even if the customer has a license for the software product, that license may not actually be eligible to run on a hosted server.  “Businesses lease computer equipment all the time, and they can run the software on those systems” is the next argument generally offered by the service provider.  But, in the eyes of the software developer, there may be a big difference between leased equipment run in-house versus subscribed platform services deployed via a commercial hosting provider.  Even Microsoft recognizes the benefit and value of providing “mobility” of application licensing, and has specific licensing models to allow commercial hosts to deploy customer-owned licenses.  While many service providers understand and recognize the requirements to ensure that customer applications are properly licensed for hosted delivery, there are a great many who think the rules simply do not apply to them.  These folks are introducing a great deal of risk into their hosting businesses, even if they are not willing to recognize it.

When a customer runs their software in an unauthorized manner, they risk losing the rights and benefits associated with their software license.  When a commercial hosting company runs software on their servers that they have no right to install and run… they are potentially guilty of unauthorized software distribution and copyright theft.

Actions against facilitators of unauthorized content distribution – you can equate “software” with “content” – have received much press in past months, yet much of the discussion centers on music and video content (as in the Megaupload story).  Actions involving commercial software products tend to be somewhat less visible, probably due to reluctance by commercial developers to have what could be perceived as negative press flowing through social media venues.  It’s popular to protect music and videos, but hosting providers aren’t seeing the wisdom of preserving the integrity of a commercial software product license.  Instead, they’re relying on the customer to indemnify them (the customer has a license, remember?).   But the customer can’t protect the host; the host must protect the host – it’s the prudent business approach.

Infrastructure providers, platform providers and businesses operating as application hosting companies should pay close attention to the content living on their servers.  Taking a position that the customer has the right to do whatever they want with the system is not a viable position; the precedent has been set that the hosting provider is responsible for the content on their systems.  In the case of hosts offering service for small business applications like Microsoft Office and Intuit QuickBooks, for example, it is essential that a service model which conforms to and supports proper license usage be in place, and that any required authorizations are, too.

Software is just another form of content, and the cloud makes distribution of and access to content a lot easier, even when it shouldn’t be.

Make sense?

J

Client Solutions, not just Professional Services

Client Solutions, not just Professional Services

Accounting Professionals serving a small business client base are struggling to find ways to demonstrate the value of the services they provide, yet many firms remain focused exclusively on their own processes and improving profitability therein rather than looking “outside the box” to see how they might involve the client in the discovery.  The obvious element which these firms are not addressing is the client user, and how a direct participation by the client becomes the foundation for internal process improvement.  After all, a lot of what accounting professionals are battling against is perceived value.  If the client were to be a more direct participant, the value of the work and the tools which support getting it done could provide a more tangible or visible aspect and increase the overall value perception of the client.

It is easy to say “get the client more involved”, but actually doing it can be the real challenge.  Professionals are recognizing this reality as they attempt to engage client users in online portals for document exchange and by providing application functionality which is supportive of the accountants’ processes.  While some professional firms are experiencing success with this approach, many other firms are not.  There are likely a variety of reasons why some firms have more success than others in getting clients to work with their online tools, but I believe there are two key elements which impact success:  accountant-centric focus, and provider lock-in.  Whether these elements work to the firms’ advantage or not depends solely upon the specifics of the service model and client market being served.

Accountant-centric focus

Most accounting professionals recognize that paperless approaches to working with client information and documents makes a lot more sense than working with the actual paper.  Particularly with the innovations in image capture, OCR and zero-entry solutions, it is logical to try to get as much of the required information transformed into useful digital data as possible.  Data entry time is reduced, accuracy is improved, and the resultant information is better and more useful and may be processed more efficiently… for the accounting professional.  For the client, on the other hand, it’s just another way to get information to the accountant (who is always wanting more information).  The value of the deliverable – the reconciled bank account, financial report, tax return or whatever – isn’t increased.   The solution often offered to the client is a solution intended to solve not the client problems, but the accountant’s.  For the client, it is difficult to see this as a “solution” to any evident problem they face.

Provider lock-in

Business software customers are often commenting about how the solutions they use don’t allow easy transition to alternative products, or add-ons are only available from developer-prescribed sources.  Vendor lock-in is a consideration and may be a barrier to doing business, because business owners want to know that they have the ability to change as business requirements change… whether it means changing software and systems, or whether it means changing professional service providers.  As more professional service providers attempt to engage their clients in technology-based approaches to doing business, clients are recognizing that these approaches may come with “strings attached”, limiting their future choices.  While it is important for the professional services firm to protect its work product, it is also important to consider the client’s position.  Part of every business relationship is trust, and that trust should not be one-sided.  Just as the professional trusts that the client will work with them in a legitimate manner, so does the client trust that their professional will not hold their information hostage if they elect to make a change or engage with other providers in the future.  Additionally, does the system provided by the accounting firm allow the client to collaborate with their own team members or other service providers, or does it address only the interactions between the accounting pro and the client?  This also represents a barrier to participation, as any given client business likely interacts with a variety of providers – many of whom are also asking that owner to implement solutions which improve their ability to do a form of e-business together.

As accounting service providers look to technology to facilitate closer and more efficient working arrangements with clients, they would do well to also consider how that technology is positioned to benefit the client as well as the professional practice.  Delivering a solution which provides clients with the capability to control information access, which allows collaboration with their various service providers, and which facilitates a lean process approach for all involved could be the right answer to the problem.  Perhaps this becomes the most important factor – client enablement – and focusing on solutions which address the clients’ information management and processing requirements as well as those of the firm.

Make Sense?

J

Read more about Data Warriors: Accountants in the Cloud

Read more about using the cloud to extend “connectedness” beyond traditional boundaries