The enterprise software licensing transformation continues in parallel with the evolving expectations of end users and the fluid nature of the technology landscape. ISVs have taken to addressing user meer
Like many other recent conferences and exhibitions around the globe, attendance took a hit at the RSA Conference 2020 held last month in San Francisco, CA, USA due to travel concerns brought on by Cor meer
The emergency triggered by the Corona virus pandemic is dominating not just the news but also every aspect of our private and business lives in unprecedented ways. All corners of the globe are simulta meer
For some ISVs, software licensing can be straightforward and uncomplicated. Their software is designed to only be implemented on a specific operating system and deployed over a particular type of netw meer
In his syndicated Software Integrity Blog , Jonathan Knudsen of Synopsis, recently made a case for why software should be considered critical infrastructure. He points out that the U.S. recognizes 16 meer
Much has been written in this space and elsewhere about the productivity benefits of Industry 4.0 and the security challenges inherent with Internet-based data acquisition and control of industrial Io meer
It doesn’t happen often, but it is possible that license containers can be lost, stolen or broken, and when it does occur, the ISV is faced with a dilemma: how to reactivate the license quickly to fos meer
Much has been written recently, in this space and elsewhere, about the growing popularity with end users and ISVs alike of cloud-based subscription software delivery . Subscriptions offer ISVs several meer
Smart factories encompass the digitization of virtually every part of the manufacturing system, employing a host of emerging technologies, such as artificial intelligence, virtual reality, digital twi meer
Are there any foreseeable boundaries for digital transformation? It doesn’t seem so, as the exponential increase of millions of connected devices and the creative IoT applications that have emerged sh meer
Digital sovereignty – it’s not a new term, but one that is becoming more and more prominent in the daily news cycle. Digital sovereignty refers to the ability to have control over your own digital des meer
Companies today are scrambling to implement the enabling technologies required to support a growingly remote workforce efficiently and cost-effectively. Tools for file sharing, virtual collaboration a meer
The worldwide spread of coronavirus (COVID-19) has wreaked havoc on the global economy in an incredibly short period of time. What businesses have been most resilient in sidestepping operational disru meer
Compared with more familiar cybercrimes such as the theft of credit card, consumer health, and other personally identifiable information (PII), IP cyber theft has largely remained in the shadows. That meer
Tis the season for bold forecasts by analysts and industry pundits opining on global trends, predicting the “next big thing” and the challenges that lie ahead. Whereas the promise of the IoT and its b meer
ISVs are facing increasing pressure to deliver SaaS solutions instead of traditional on-premise software applications. Why? Mainly, because they are responding to their customers’ preferences and inve meer
Virtualization is now in widespread use amongst the IT community and ISVs need to consider the ramifications of virtual machines on software licensing. Simply defined, a virtual machine is hardware, s meer
Software development practices typically fall into two categories – Brownfield projects or Greenfield projects – each of which utilizes different tools and requires different strategic approaches. Bro meer
The recent cyber-attack on the Colonial pipeline in the U.S. is a stark reminder of the very real threats that exist to global infrastructure. The pipeline which carries 45% of the U.S. East Coast’s s meer
In my last post , I talked about the pros and cons of Brownfield software development and the key considerations for integrating a licensing and entitlement management system into the process. In this meer