With today’s cloud or virtual solutions, there are many available license management options to evaluate and even more questions to consider – What about security? Service levels? Architecture? Server more
The Deloitte Centre for Health Solutions paints an interesting picture of the healthcare and life science sectors in their report, Healthcare and Life Sciences Predictions 2020 – a bold future? The la more
We’ve all seen the disturbing software piracy statistics released by BSA | The Software Alliance in their Global Software Survey : 43 percent of the software installed on personal computers globally i more
The SD Association recently celebrated the 10th anniversary of the microSD™ Card. Founded in 2000 by Panasonic, SanDisk and Toshiba, the SD Association is a group dedicated to establishing SD standard more
The Industrial Internet Consortium held an interesting TweetChat last week in preparation for their Security event held on Tuesday, November 4 in NYC. The IIC-led chat posed 6 questions and received e more
The Industrial Internet Consortium ( IIC ) recently released the first version of a document entitled " Industrial Internet Reference Architecture Technical Report ". The document serves to initiate a more
It has been several years since Kevin Ashton introduced the concept of the Internet of Things, based on RFID and sensor technology that enable computers to observe, identify and understand the world—w more
Whether it be Stuxnet or an iPhone virus, it is people who are the cause for trouble. But let’s go back to how the story began: Just a few days ago, it was unthinkable for an iPhone to be infected wit more
The intellectual property gained during the development of an ISV’s flagship software product most likely represents an investment in hundreds and hundreds of man hours. The majority of that time is s more
Understanding the Vulnerabilities of IIoT Endpoints Much has been written lately about IIoT endpoints and their many potential security vulnerabilities. As defined by the Industrial Internet Consortiu more
The Internet of Things (IoT) is a term that has slipped easily into our everyday vocabulary, bringing with it exotic notions of smart appliances, driverless automobiles, intelligent monitors, and the more
“The system should not require secrecy and it must not be a problem if it falls into enemy hands.” Those were the words of Auguste Kerckhoffs, who published two articles in 1883 in which he surveyed t more
This past summer, the Trusted Computing Group (TCG) published an interesting document entitled, Architect’s Guide: IoT Security . The document outlined 5 critical strategies that developers of connect more
When I recently watched a report about Tofaş , with its impressive one-million square meter operation and its leading position in the Fiat-Chrysler world in terms of World Class Manufacturing (WCM), I more
It was difficult to avoid the barrage of headlines coming out of the last week’s annual RSA Conference, the purported largest annual gathering of security professionals in the world. Cyberthreats, per more
A flexible software license management system is critical for enabling ISVs to keep pace with end user expectations, not only in the way the software is licensed, but also in the manner by which end u more
An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints. In many cases, an attacker will try to access the execution code and attack the we more
Software entrepreneurs who are developing their first time application have the luxury of building-in their software licensing and protection solution from the outset. They most likely will choose to more
The US FDA recently published new recommendations for both manufacturers and regulators to address medical device cybersecurity. The final document, Postmarket Management of Cybersecurity in Medical D more
The push for some form of liability for vendors who sell faulty or insecure software has been the subject of debate for many years with little or no clear agreement on its legality or how to enforce i more