“In an eye-opening embedded systems safety and security survey conducted by the Barr Group , 28 percent of respondents said the systems they work on could cause injury or fatalities and 60 percent of more
If you are a history buff, you might find this post interesting. If you are a history buff with interest in cryptography and software hacking, you may have a lot of fun with it. First the history. In more
When software on a consumer’s computer becomes problematic or stops working altogether, in most cases, it is simply a nuisance without significant financial or business implications. In commercial env more
A flexible software license management system is critical for enabling ISVs to keep pace with end user expectations, not only in the way the software is licensed, but also in the manner by which end u more
An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints. In many cases, an attacker will try to access the execution code and attack the we more
Software entrepreneurs who are developing their first time application have the luxury of building-in their software licensing and protection solution from the outset. They most likely will choose to more
Industrie 4.0, a.k.a. the fourth industrial revolution, is representative of the global strategic initiative to revolutionize industry by integrating digital automation, interoperability and advanced more
With just a few shopping days left before Christmas, the retail frenzy is at its height. Judging from the plethora of products touted in all of the sales flyers and commercials, it seems that this is more
More than 81% of organizations believe successful adoption of the Industrial Internet of Things (IIoT) is critical to their future success, yet ironically, only 25% of these organizations have a clear more
The more that is written about the Internet of Things and its myriad of potential game changing applications, it seems that the terms “IIoT” and “disruption” become more closely aligned. Disruption in more
The US FDA recently published new recommendations for both manufacturers and regulators to address medical device cybersecurity. The final document, Postmarket Management of Cybersecurity in Medical D more
The push for some form of liability for vendors who sell faulty or insecure software has been the subject of debate for many years with little or no clear agreement on its legality or how to enforce i more
The tone of the many well-meaning discussions about the Industrial Internet of Things (IIoT) varies widely from one viewpoint of unbridled optimism about the seemingly endless possibilities to another more
The vulnerability of Internet-enabled endpoints in the Industrial Internet of Things (IIoT) is a critical security concern. The rapid proliferation of these connected devices, which include sensors, P more
Software licensing and monetization continue to be critical factors in a successful deployment for ISVs, particularly as the IoT and embedded systems market evolves and end user licensing preferences more
Whether you are a total believer or not, it looks like the shift from perpetual software licensing to the software subscription model is here to stay. According to a Gartner report , “By 2020, more th more
“We are keeping our computers offline. That way, they are safe.” I don’t know whether the IT professionals at French carmakers, British NHS hospitals, or German train operators believed this. What I d more
“Old School” perpetual software licensing agreements are rapidly falling out of favor as often times they place restrictions on product use that do not fit the dynamic business needs of the end user. more
When I last googled Blockchain , 21 million results were returned, and I am sure this number is on the rise as government agendas, panels at international trade shows, and every vendor dealing in IT s more
Blockchain frameworks enable the immutable storage of data [1,2]. A still open practical question is the so called “oracle” problem, i.e. the way real world data is actually transferred into and out o more
Questa schermata riduce il consumo di energia del monitor quando non sei attivo sul nostro sito. Per riprendere la navigazione è sufficiente muovere il mouse.