Many software developers have turned to the free trial business model to market their enterprise software – simply put, offer free software for a timed period and hope the end user performs a thorough more
Security and the IoT are terms becoming intrinsically linked in the grand discussion of connected devices and their envisioned applications in virtually every aspect of our ecosystem, whether it be co more
This past summer, the Trusted Computing Group (TCG) published an interesting document entitled, Architect’s Guide: IoT Security . The document outlined 5 critical strategies that developers of connect more
Aside from the widespread attention and hype surrounding the prolific growth expectations of the Internet of Things (IoT), industry focus has been on potential (IoT) device vulnerabilities and cyberse more
The Industrial Internet Consortium ( IIC ) recently released the first version of a document entitled " Industrial Internet Reference Architecture Technical Report ". The document serves to initiate a more
We’ve all seen the disturbing software piracy statistics released by BSA | The Software Alliance in their Global Software Survey : 43 percent of the software installed on personal computers globally i more
Whether it be Stuxnet or an iPhone virus, it is people who are the cause for trouble. But let’s go back to how the story began: Just a few days ago, it was unthinkable for an iPhone to be infected wit more
It has been several years since Kevin Ashton introduced the concept of the Internet of Things, based on RFID and sensor technology that enable computers to observe, identify and understand the world—w more
The Deloitte Centre for Health Solutions paints an interesting picture of the healthcare and life science sectors in their report, Healthcare and Life Sciences Predictions 2020 – a bold future? The la more
The Industrial Internet Consortium held an interesting TweetChat last week in preparation for their Security event held on Tuesday, November 4 in NYC. The IIC-led chat posed 6 questions and received e more
When At&T, Cisco, GE, IBM and Intel founded the Industrial Internet Consortium in March 2014, I wonder if they had envisioned how quickly the International technology community would embrace the their more
The intellectual property gained during the development of an ISV’s flagship software product most likely represents an investment in hundreds and hundreds of man hours. The majority of that time is s more
The SD Association recently celebrated the 10th anniversary of the microSD™ Card. Founded in 2000 by Panasonic, SanDisk and Toshiba, the SD Association is a group dedicated to establishing SD standard more
There were some interesting findings released in a global study this past June conducted by Harbor Research (in conjunction with Progress Software) on the State of IoT: 2015 Global Developer Study . N more
IDC recently released their annual top 10 software licensing and pricing predictions for 2016 and I think they are right on target based upon feedback from organizations who are using our CodeMeter se more
When I recently watched a report about Tofaş , with its impressive one-million square meter operation and its leading position in the Fiat-Chrysler world in terms of World Class Manufacturing (WCM), I more
Since WPF/Xaml/Prism applications work a lot with reflection, it cannot be easily guaranteed that the obfuscated names of methods, fields, etc. will be entered everywhere instead of the original names more
If you want to sign your assembly, you must do so after the encryption. AxProtector .Net offers the possibility to specify the keys for the signing as parameters and to sign the assembly created durin more
This performance loss is a known issue. It occurs because your original code is "moved" to a secure place, and AxProtector code is placed at the original address when encrypting your assembly with AxP more
To be able to mark certain functions for IxProtector, the function must be exported during compilation. Only then can IxProtector find the function in the binary. For marking the macro WUPIDECLFUNC fr more