In their book, Embedded Systems Security , David and Michael Kleidermacher point out some all-to-real scenarios about the consequences of malicious threats to embedded systems. Consider that for every meer
Dongles – The Historical "Bad Rap" When describing software protection dongles in a 2007 article appearing in PC Magazine , John C. Dvorak, a well-respected (but self-described curmudgeon) and award w meer
We talk a lot about copy protection in this space but what I want to focus on today is what is meant by the phrase "secure software licensing." Let's unpack the term and look at each component separat meer
There are plenty of reasons to use a software protection dongle even when you're running an embedded system. Some people believe that embedded systems are immune to piracy because the software has to meer
The world is flat. Thomas Friedman argues in his classic work that modern telecommunications makes global trade and competition a simple fact of modern life. And so you need flat earth software licens meer
Anytime you add a 3rd party component into your overall product stack you need to be thoughtful before you decide. Copy protection software is no different: it's something you will rely on to protect meer
Hackers are out there. So you can't take for granted--now or ever--that it won't happen to you. Achieving software security is a complex problem; what's amazing to me is how often the bad guys get in meer
If you have decided to integrate a 3rd party licensing solution for your software application, you’ve made the right choice. By doing so, you’ve freed up your developers to do what they do best — writ meer
Software for embedded systems is based more and more on open system platforms – Linux Embedded, VxWorks , Windows Embedded, QNX and many others. In addition to powerful core functionality, one of the meer
"Attackers — in ever greater numbers and with increasing sophistication — see, in the growing promise of our tech-connected world, opportunities to steal or cause major disruption or destruction by ex meer
The close of a year and the anticipation of what’s to come in the New Year always brings about some interesting reviews of the past 12 months and predictions for the future by industry analysts, compa meer
Many software developers have turned to the free trial business model to market their enterprise software – simply put, offer free software for a timed period and hope the end user performs a thorough meer
Security and the IoT are terms becoming intrinsically linked in the grand discussion of connected devices and their envisioned applications in virtually every aspect of our ecosystem, whether it be co meer
When At&T, Cisco, GE, IBM and Intel founded the Industrial Internet Consortium in March 2014, I wonder if they had envisioned how quickly the International technology community would embrace the their meer
There were some interesting findings released in a global study this past June conducted by Harbor Research (in conjunction with Progress Software) on the State of IoT: 2015 Global Developer Study . N meer
IDC recently released their annual top 10 software licensing and pricing predictions for 2016 and I think they are right on target based upon feedback from organizations who are using our CodeMeter se meer
A recent report released by the Economist Intelligence Unit entitled Long-term Macroeconomic Forecasts: Key trends to 2050 highlighted some of the emerging economic issues expected to shape global bus meer
Aside from the widespread attention and hype surrounding the prolific growth expectations of the Internet of Things (IoT), industry focus has been on potential (IoT) device vulnerabilities and cyberse meer
ISVs today must address many questions in your product development and delivery strategies as the software licensing landscape has become increasingly complex. Let’s take a look at some of these quest meer
I recently read an interesting article in Engineering and Technology Magazine, entitled ‘Immature’ Internet of Things Hackable with Primitive Methods. What caught my eye was the opening paragraph that meer