Since the first 3D printing machine was unveiled back in 1984, industrial use was the main focus. However, it was not until early patents expired in 2009 and consumer models came to market that indust more
Discrete manufacturing, and all of the supporting functions that go along with it, like inventory management, product lifecycle management, supply chain management and Enterprise Resource Planning, is more
Embedded device hacking is the exploitation of vulnerabilities in embedded software to gain control of the device. Why does it happen? Some hackers attack embedded systems to spy on the devices, take more
As has been written in this space many times before, the risks to modern, connected industrial control systems are quite real, from loss of system control and destruction to stealing machine designs a more
The novel Coronavirus pandemic has turned the global workforce upside down, forcing millions of workers to conduct business at home, whether they are emotionally ready or not, if their homes are prepa more
A few weeks ago, we produced a short video that focused on a single word that embodies one of Wibu-Systems overarching goals – that word is “FREEDOM.” In theory, what we mean is that we aspire to offe more
IoT ONE, a research and advisory firm focused on industrial digitalization, recently released an interesting report on the impact of COVID-19 on industrial digital transformation. The objective of the more
Much has been written in this space and elsewhere about the productivity benefits of Industry 4.0 and the security challenges inherent with Internet-based data acquisition and control of industrial Io more
It doesn’t happen often, but it is possible that license containers can be lost, stolen or broken, and when it does occur, the ISV is faced with a dilemma: how to reactivate the license quickly to fos more
Much has been written recently, in this space and elsewhere, about the growing popularity with end users and ISVs alike of cloud-based subscription software delivery . Subscriptions offer ISVs several more
Tis the season for bold forecasts by analysts and industry pundits opining on global trends, predicting the “next big thing” and the challenges that lie ahead. Whereas the promise of the IoT and its b more
ISVs are facing increasing pressure to deliver SaaS solutions instead of traditional on-premise software applications. Why? Mainly, because they are responding to their customers’ preferences and inve more
Virtualization is now in widespread use amongst the IT community and ISVs need to consider the ramifications of virtual machines on software licensing. Simply defined, a virtual machine is hardware, s more
Software development practices typically fall into two categories – Brownfield projects or Greenfield projects – each of which utilizes different tools and requires different strategic approaches. Bro more
The recent cyber-attack on the Colonial pipeline in the U.S. is a stark reminder of the very real threats that exist to global infrastructure. The pipeline which carries 45% of the U.S. East Coast’s s more
In my last post , I talked about the pros and cons of Brownfield software development and the key considerations for integrating a licensing and entitlement management system into the process. In this more
Enterprise cybersecurity experts and experienced software developers are in high demand. Unfortunately, the current high-tech talent pool is insufficient to meet the demand. A recent blog post publish more
macOS developers are heralding the recent launch of Apple’s M1 ARM-based system-on-chip along with Apple’s next generation operating system, Big Sur, that is required to run M1 devices. The miniature more
More and more ISVs are moving their applications to the cloud vs. deployment over traditional IT infrastructure. The benefits are easily recognizable: high availability, flexibility and scalability on more
We pride ourselves in our resilience and our ability to think and invent our way out of a crisis. Technological optimism has been one of the engines of modern life, and its promise has often held true more
Questa schermata riduce il consumo di energia del monitor quando non sei attivo sul nostro sito. Per riprendere la navigazione è sufficiente muovere il mouse.