The EKON 21 welcomes the world’s leading Delphi experts, thinkers, and practitioners to share their craft and mastery secrets, offering a deep dive for the modern developer and architect aiming to transform technologies into valuable business solutions. Insights into the very latest innovations, methodologies, and best practices for Delphi, cross-platform, mobile, Windows 10, databases, frameworks, tools, web and cloud technologies will be revealed.
As a cybersecurity evangelist, Wibu-Systems is sponsoring the event to concentrate on the epicenter of prosperity for your software-powered business: secure license lifecycle management with CodeMeter, a complete security and entitlement platform that acts as a gatekeeper against piracy, reverse engineering, and tampering and enables lean and versatile software monetization. Our specialists will pinpoint the criteria for choosing the right security tools and the effective modi operandi you can put in place to create robust protection safeguards and a forward-looking range of licensing models.
Ruediger Kuegler, our VP Sales and Security Specialist, has been a veteran of this event; for this year’s edition, he has created two brand lectures:
- 23 October, 10.30 to 11.30 am, Secure protection of a Delphi application with CodeMeter Protection Suite: first, Ruediger will step into the shoes of a hacker and show how they typically remove protections from licensed software; starting from an application developed in Delphi, he will then demonstrate how CodeMeter Protection Suite and, in particular, the special capabilities of of its AxProtector and IxProtector modules can provide effective software encryption.
- 24 October, 09.30 to 10.30, Applied cryptography – Best practice tips: this presentation will cover lots of ground in state-of-the-art encryption, from new techniques like blockchain to the benefit of using hash values, the difference between symmetric and asymmetric cryptography, trust relationships with digital signatures, concatenation of single blocks, and considerations of key lengths, performance, and common vulnerabilities.