[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fLD0eefHxAo_68SpPsPnmT8Nq-uyY6XH9mVHgaf5lgMQ":3,"$fVTqFomDb9dGWuWxZDmHtlm7VP6nl9wyH5dC3eiEfKkI":12},{"author":4,"tags":11},{"author_id":5,"author_name":6,"author_name_first_letter":7,"article_count":8,"bio":9,"short_bio":9,"slug":10,"image_url":9},157857,"John Lovelock","J",6,null,"john-lovelock",[],{"quotes":13,"pagination":77},[14,27,38,49,60,66],{"id":15,"quote_text":16,"author_id":5,"source_id":17,"has_image":18,"author":19,"source":20,"quote_tag":21,"commentary":9},1918014,"This isn't about the money. It's about the principle of stopping IP theft.",4,false,{"id":5,"author_name":6,"slug":10,"author_name_first_letter":7,"article_count":8,"image_url":9},{},[22],{"id":23,"tag":24},4906873,{"id":25,"tag_name":26},5033,"principle",{"id":28,"quote_text":29,"author_id":5,"source_id":17,"has_image":18,"author":30,"source":31,"quote_tag":32,"commentary":9},1917996,"A recent consumer survey we carried out in the UK indicated that there is a discrepancy between people's attitude toward physical theft and toward software theft. People will say that they would report someone who was stealing from a physical retailer, but not someone downloading an illegal copy of a software program.",{"id":5,"author_name":6,"slug":10,"author_name_first_letter":7,"article_count":8,"image_url":9},{},[33],{"id":34,"tag":35},4906853,{"id":36,"tag_name":37},126,"attitude",{"id":39,"quote_text":40,"author_id":5,"source_id":17,"has_image":18,"author":41,"source":42,"quote_tag":43,"commentary":9},1917975,"These associations will draw together a global network of enforcement agencies, working together for the greater good of the software industry.",{"id":5,"author_name":6,"slug":10,"author_name_first_letter":7,"article_count":8,"image_url":9},{},[44],{"id":45,"tag":46},4906828,{"id":47,"tag_name":48},15139,"draw",{"id":50,"quote_text":51,"author_id":5,"source_id":17,"has_image":18,"author":52,"source":53,"quote_tag":54,"commentary":9},1917952,"FAST encourage businesses to do an electronic audit of the software on their systems. Our question to people running businesses is ? have you got control of your enterprise systems? The answer is probably 'no'.",{"id":5,"author_name":6,"slug":10,"author_name_first_letter":7,"article_count":8,"image_url":9},{},[55],{"id":56,"tag":57},4906810,{"id":58,"tag_name":59},3436,"answer",{"id":61,"quote_text":62,"author_id":5,"source_id":17,"has_image":18,"author":63,"source":64,"quote_tag":65,"commentary":9},1917937,"We don't think it was being shared for profit.",{"id":5,"author_name":6,"slug":10,"author_name_first_letter":7,"article_count":8,"image_url":9},{},[],{"id":67,"quote_text":68,"author_id":5,"source_id":17,"has_image":18,"author":69,"source":70,"quote_tag":71,"commentary":9},1917922,"Organizations are increasingly looking for single sign-on, access security and provisioning solutions that seamlessly integrate with existing applications and IT infrastructure. It is critical for healthcare organizations to implement a complete identity and access management solution that will not only streamline workflows to improve caregiver productivity, but also strengthen security and provide centralized identity and policy management.",{"id":5,"author_name":6,"slug":10,"author_name_first_letter":7,"article_count":8,"image_url":9},{},[72],{"id":73,"tag":74},4906780,{"id":75,"tag_name":76},36291,"access",{"currentPage":78,"totalPages":78,"totalItems":8,"itemsPerPage":79},1,10]