In their book, Embedded Systems Security , David and Michael Kleidermacher point out some all-to-real scenarios about the consequences of malicious threats to embedded systems. Consider that for every more
Adobe may have raised some eyebrows last year when they announced they were moving their packaged Creative Suite PC software to the cloud, but most industry analysts predicted this day was coming – it more
Faced with an increasingly complicated network environment, made only more complex by the addition of virtualization, cloud services and bring your own devices (BYOD), many of your customers are also more
I recently read an interesting article in Engineering and Technology Magazine, entitled ‘Immature’ Internet of Things Hackable with Primitive Methods. What caught my eye was the opening paragraph that more
With today’s cloud or virtual solutions, there are many available license management options to evaluate and even more questions to consider – What about security? Service levels? Architecture? Server more
If you have decided to integrate a 3rd party licensing solution for your software application, you’ve made the right choice. By doing so, you’ve freed up your developers to do what they do best — writ more
Hackers are out there. So you can't take for granted--now or ever--that it won't happen to you. Achieving software security is a complex problem; what's amazing to me is how often the bad guys get in more
There are plenty of reasons to use a software protection dongle even when you're running an embedded system. Some people believe that embedded systems are immune to piracy because the software has to more
The world is flat. Thomas Friedman argues in his classic work that modern telecommunications makes global trade and competition a simple fact of modern life. And so you need flat earth software licens more
Aside from the widespread attention and hype surrounding the prolific growth expectations of the Internet of Things (IoT), industry focus has been on potential (IoT) device vulnerabilities and cyberse more
The Industrial Internet Consortium ( IIC ) recently released the first version of a document entitled " Industrial Internet Reference Architecture Technical Report ". The document serves to initiate a more
Former U.S. Vice President Dick Cheney acknowledged that he once feared that terrorists could use the electrical device that had been implanted near his heart to kill him and had his doctor disable it more
ISVs today must address many questions in your product development and delivery strategies as the software licensing landscape has become increasingly complex. Let’s take a look at some of these quest more
It has been several years since Kevin Ashton introduced the concept of the Internet of Things, based on RFID and sensor technology that enable computers to observe, identify and understand the world—w more
The Deloitte Centre for Health Solutions paints an interesting picture of the healthcare and life science sectors in their report, Healthcare and Life Sciences Predictions 2020 – a bold future? The la more
The big news for crypto-wonks this week is that an international group of researchers has cracked a portion of RSA encryption. And it's not like they had to throw supercomputers at the problem; it was more
We’ve been hearing the term " software monetization " bandied about. What does it mean? We define software monetization as the capability to effectively maximize your software revenue by meeting marke more
The close of a year and the anticipation of what’s to come in the New Year always brings about some interesting reviews of the past 12 months and predictions for the future by industry analysts, compa more
Many software developers have turned to the free trial business model to market their enterprise software – simply put, offer free software for a timed period and hope the end user performs a thorough more
When I recently watched a report about Tofaş , with its impressive one-million square meter operation and its leading position in the Fiat-Chrysler world in terms of World Class Manufacturing (WCM), I more