Build or buy – the age-old question that seemingly has no clear answer, whether you are a diligent consumer or an enterprise decision maker. Consider these scenarios. A homeowner imagines that a backy more
Supervisory control and data acquisition systems (SCADA) came into play in the 1970’s with the emergence of microprocessors and PLCs as mechanisms to control and monitor automated processes. In the ea more
I recently came across a blog post written in 2014 that today seems quite prophetic. Entitled “ Back to the Future: Is Electronic Software Delivery Making a Big Return? ,” the article was posted by Ja more
In 1989, Wibu-Systems was founded on the premise to deliver innovative technology for the protection and security of digital assets. That premise was realized with WibuKey and embodied in the company’ more
Your software business is booming but what happens when unexpectedly your customer’s business spirals out of control? Consider this hypothetical situation: An ISV has developed a software solution tha more
The security and integrity of mission critical software, particularly software used by governments or for controlling critical infrastructure, is under intense scrutiny for its trustworthiness and the more
The global phenomenon of digital transformation is dramatically shifting the ways businesses operate, the way they engage with customers, and the way in which they develop and deliver new products to more
I was glad to see that security found its niche in CRN’s rundown of the 50 coolest IoT companies of 2021 along with other companies who have launched innovative connectivity, hardware, industrial IoT, more
Trustworthiness, and confidence in that trustworthiness, are essential aspects of cyber-physical systems. Inattention to trustworthiness can lead to loss of human life, long-term environmental impacts more
In the Fall 2018 issue of the Industry IoT Consortium (IIC)’s Journal of Innovation, I published an article on Trustworthiness in Industrial System Design . The article introduced trustworthiness as a more
“Advancing progress toward a technology environment where all software products are safe and secure by design is a top priority for the U.S. Cybersecurity & Infrastructure Security Agency (CISA), the more
Dongles – The Historical "Bad Rap" When describing software protection dongles in a 2007 article appearing in PC Magazine , John C. Dvorak, a well-respected (but self-described curmudgeon) and award w more
We talk a lot about copy protection in this space but what I want to focus on today is what is meant by the phrase "secure software licensing." Let's unpack the term and look at each component separat more
All is not well within today’s pharmacist community. Several recent reports have documented the growing pressures brought on by increasing workloads with limited resources, time, and staffing. During more
A recent report released by the Economist Intelligence Unit entitled Long-term Macroeconomic Forecasts: Key trends to 2050 highlighted some of the emerging economic issues expected to shape global bus more
Aside from the widespread attention and hype surrounding the prolific growth expectations of the Internet of Things (IoT), industry focus has been on potential (IoT) device vulnerabilities and cyberse more
The Industrial Internet Consortium ( IIC ) recently released the first version of a document entitled " Industrial Internet Reference Architecture Technical Report ". The document serves to initiate a more
If you have decided to integrate a 3rd party licensing solution for your software application, you’ve made the right choice. By doing so, you’ve freed up your developers to do what they do best — writ more
Software for embedded systems is based more and more on open system platforms – Linux Embedded, VxWorks , Windows Embedded, QNX and many others. In addition to powerful core functionality, one of the more
"Attackers — in ever greater numbers and with increasing sophistication — see, in the growing promise of our tech-connected world, opportunities to steal or cause major disruption or destruction by ex more