Here's the scenario: Your IT team writes a web service, and part of its WSDL interface includes a hash algorithm the team came up with on their own. You publish the API and your business partners use your clever little hash in integrating with across cloud services. Years later, you get a letter from a lawyer from a town in Texas you've never heard of, claiming you've infringed on a patent you never heard of. Your team scrambles to replace that hash algorithm, but that means a change to your API and some of your business partners resist making the change. It doesn't matter though: the infringement has already occurred, and you're going to pay somebody quite a bit of money even if you can prove your innocence.