For some ISVs, software licensing can be straightforward and uncomplicated. Their software is designed to only be implemented on a specific operating system and deployed over a particular type of netw meer
The novel Coronavirus pandemic has turned the global workforce upside down, forcing millions of workers to conduct business at home, whether they are emotionally ready or not, if their homes are prepa meer
A few weeks ago, we produced a short video that focused on a single word that embodies one of Wibu-Systems overarching goals – that word is “FREEDOM.” In theory, what we mean is that we aspire to offe meer
A lot has been written recently about the increasing network connectivity of embedded devices found in a wide array of smart applications and platforms, including automobiles, household appliances, in meer
IoT devices have long passed through the “early adopter” phase and should no longer be considered as new or emerging technologies. Such “things” as smart doorbells, smart surveillance cameras, smart c meer
Like many other recent conferences and exhibitions around the globe, attendance took a hit at the RSA Conference 2020 held last month in San Francisco, CA, USA due to travel concerns brought on by Cor meer
The emergency triggered by the Corona virus pandemic is dominating not just the news but also every aspect of our private and business lives in unprecedented ways. All corners of the globe are simulta meer
During our regular CodeMeter customer support meetings, I find that we frequently discuss customer questions regarding protection and licensing for a Windows Service or Server application. In most cas meer
Since the first 3D printing machine was unveiled back in 1984, industrial use was the main focus. However, it was not until early patents expired in 2009 and consumer models came to market that indust meer
In his syndicated Software Integrity Blog , Jonathan Knudsen of Synopsis, recently made a case for why software should be considered critical infrastructure. He points out that the U.S. recognizes 16 meer
Cyber strategy is business strategy, and C-suite executives and government leaders have taken notice. At least that’s one of the takeaways from the annual World Economic Forum held last month in Davos meer
IoT ONE, a research and advisory firm focused on industrial digitalization, recently released an interesting report on the impact of COVID-19 on industrial digital transformation. The objective of the meer
Flexibility, scalability, and interoperability are key ingredients for any successful business solution. Flexibility means that the solution can be fine-tuned to adapt to dynamic market shifts as cust meer
While ISVs and embedded systems engineers transform their businesses with new software licensing strategies, like subscriptions and consumption-based licensing, their ongoing concerns with software pi meer
The beginning of a new year is always the time for predictions, particularly in the cyber security field. CIOs, CSOs, and enterprise executives around the globe are scrambling to fortify their infrast meer
Compared with more familiar cybercrimes such as the theft of credit card, consumer health, and other personally identifiable information (PII), IP cyber theft has largely remained in the shadows. That meer
Much has been written in this space and elsewhere about the productivity benefits of Industry 4.0 and the security challenges inherent with Internet-based data acquisition and control of industrial Io meer
It doesn’t happen often, but it is possible that license containers can be lost, stolen or broken, and when it does occur, the ISV is faced with a dilemma: how to reactivate the license quickly to fos meer
Virtualization is now in widespread use amongst the IT community and ISVs need to consider the ramifications of virtual machines on software licensing. Simply defined, a virtual machine is hardware, s meer
Software development practices typically fall into two categories – Brownfield projects or Greenfield projects – each of which utilizes different tools and requires different strategic approaches. Bro meer