As has been written in this space many times before, the risks to modern, connected industrial control systems are quite real, from loss of system control and destruction to stealing machine designs a more
Embedded device hacking is the exploitation of vulnerabilities in embedded software to gain control of the device. Why does it happen? Some hackers attack embedded systems to spy on the devices, take more
Software-driven innovations are being fueled by the emergence of smart things - devices, automobiles, factories, cities - all of which impact nearly every aspect of our personal lives and businesses. more
The digital footprint of the healthcare landscape continues to expand as more and more medical devices come online, both next generation systems and legacy equipment, with many allowing remote access. more
Software solutions and services will continue to become increasingly significant in 2019 as digitalization makes further inroads into the engineering sector, while opening the door for new innovations more
Over the past 30 years , we’ve helped hundreds of companies migrate from their homegrown or vendor-supplied licensing solution to our CodeMeter licensing and protection platform. While there are many more
The U.S. Congress recently introduced legislation to address the growing concern for security on IoT devices purchased by the U.S. government. Does the proposal go far enough? Let’s take a further loo more
BSA |The Software Alliance) released its 2019 Policy Agenda in early February to facilitate discussion and debate around what they believe to be some of the most pressing issues impacting the global e more
Blockchain frameworks enable the immutable storage of data [1,2]. A still open practical question is the so called “oracle” problem, i.e. the way real world data is actually transferred into and out o more
Cybersecurity research is a “technological prerequisite” for addressing the numerous disruptive challenges brought on by the rapid progression of the digitalization of society. That sentiment is the b more
One of the most frequent questions I see asked in developer communities, like StackOverflow and Github , is when to use .NET framework and when to use .NET Core, as there seems to be confusion with th more
What if a computer virus was capable of completely destroying the data on every Internet-connected device in the U.S. in a matter of minutes? Can you fathom the chaos? Basic services like electricity, more
Is it possible to introduce an IoT device that can authenticate its user, can encrypt and decrypt transmitted and received data, and deliver or verify the proof of integrity, yet still be considered a more
Turn your customers into subscribers. That’s the mantra of Zuora Inc., a leading provider of a cloud-based subscription management platform. They have coined the term “Subscription Economy ® ” which e more
I read an interesting article recently, How Do You Create an Internet of Things Workforce?, that was published by the IEEE Computer Society. The gist of the article was that given the significant incr more
In today’s ISV world, a flexible software licensing strategy is the key to successful monetization and profitability. In the past, secure hardware-based license dongles were the platform of choice for more
In the past few years, high profile cyberattacks to key Infrastructure have raised serious security concerns around the globe. These are just a few of the more prominent attacks: Massive power outages more
On the 20 th and 21 st of September, the new "Secure Distributed Ledger and Contracts" Research Center was inaugurated by Prof. Sadeghi at the University of Darmstadt , Germany. In his role as externa more
BSA | The Software Alliance, a global software industry advocate, recently asserted their opinion on communications legislation being considered by the Australian Government. The Telecommunications an more
Much has been written about the unbridled optimism brought on by the so called 4 th Industrial Revolution (a.k.a. Industry 4.0) and the unprecedented cyber-related risks facing manufacturers given the more
Cet écran réduit la consommation d'énergie du moniteur lorsque vous n'êtes pas actif sur notre site. Pour reprendre la navigation, il suffit de déplacer votre souris.