"Attackers — in ever greater numbers and with increasing sophistication — see, in the growing promise of our tech-connected world, opportunities to steal or cause major disruption or destruction by ex mehr
A recent report released by the Economist Intelligence Unit entitled Long-term Macroeconomic Forecasts: Key trends to 2050 highlighted some of the emerging economic issues expected to shape global bus mehr
Aside from the widespread attention and hype surrounding the prolific growth expectations of the Internet of Things (IoT), industry focus has been on potential (IoT) device vulnerabilities and cyberse mehr
By now, many of you have heard about the "BadUSB" exploit, where two security researchers at Security Research Labs demonstrated how they could perpetrate an attack on USB devices. By reprogramming th mehr
During the early 2000's, there was much skepticism about the value and viability of virtualization. Today, however, there is no doubt that companies have embraced the efficiencies and expansion capabi mehr
The U.S. Federal Trade Commission recently released an in-depth report entitled, The Internet of Things: Privacy & Security in a Connected World , which included a long list of considerations and reco mehr
Former U.S. Vice President Dick Cheney acknowledged that he once feared that terrorists could use the electrical device that had been implanted near his heart to kill him and had his doctor disable it mehr
ISVs today must address many questions in your product development and delivery strategies as the software licensing landscape has become increasingly complex. Let’s take a look at some of these quest mehr
I recently read an interesting article in Engineering and Technology Magazine, entitled ‘Immature’ Internet of Things Hackable with Primitive Methods. What caught my eye was the opening paragraph that mehr
In their book, Embedded Systems Security , David and Michael Kleidermacher point out some all-to-real scenarios about the consequences of malicious threats to embedded systems. Consider that for every mehr
Adobe may have raised some eyebrows last year when they announced they were moving their packaged Creative Suite PC software to the cloud, but most industry analysts predicted this day was coming – it mehr
Faced with an increasingly complicated network environment, made only more complex by the addition of virtualization, cloud services and bring your own devices (BYOD), many of your customers are also mehr
With today’s cloud or virtual solutions, there are many available license management options to evaluate and even more questions to consider – What about security? Service levels? Architecture? Server mehr
If you have decided to integrate a 3rd party licensing solution for your software application, you’ve made the right choice. By doing so, you’ve freed up your developers to do what they do best — writ mehr
Software for embedded systems is based more and more on open system platforms – Linux Embedded, VxWorks , Windows Embedded, QNX and many others. In addition to powerful core functionality, one of the mehr
Dongles – The Historical "Bad Rap" When describing software protection dongles in a 2007 article appearing in PC Magazine , John C. Dvorak, a well-respected (but self-described curmudgeon) and award w mehr
We talk a lot about copy protection in this space but what I want to focus on today is what is meant by the phrase "secure software licensing." Let's unpack the term and look at each component separat mehr
Anytime you add a 3rd party component into your overall product stack you need to be thoughtful before you decide. Copy protection software is no different: it's something you will rely on to protect mehr
The world is flat. Thomas Friedman argues in his classic work that modern telecommunications makes global trade and competition a simple fact of modern life. And so you need flat earth software licens mehr
The big news for crypto-wonks this week is that an international group of researchers has cracked a portion of RSA encryption. And it's not like they had to throw supercomputers at the problem; it was mehr
Dieser Bildschirm reduziert den Stromverbrauch des Monitors, wenn Sie nicht auf unserer Website aktiv sind. Um die Suche fortzusetzen, bewegen Sie einfach die Maus.