Blockchain frameworks enable the immutable storage of data [1,2]. A still open practical question is the so called “oracle” problem, i.e. the way real world data is actually transferred into and out o więcej
“The next generation of software monetization is not just about IP protection nor limited to licensing alternatives (perpetual versus term), but rather about enabling business models that provide addi więcej
Cybercrime will cost up to $6 trillion by 2021, according to a report recently released by Cybersecurity Ventures . This colossal number is equivalent to nearly half of today’s US Gross Domestic Produ więcej
Pay-per-use software licensing is not a new concept. In fact, as discovered in a recent Google search, the business model was under consideration as far back as 1993 ( Host Users Seek License Details, więcej
The Fourth Industrial Revolution Is Here - Are You Ready? That’s the question posed to more than 1,600 C-level executives by Deloitte Global in a survey recently conducted by Forbes Insights. The rese więcej
Trade imbalance is at the crux of the harsh rhetoric exchanged between the U.S. and China recently as both sides threaten to implement tariffs on certain goods and imports to protect their own economi więcej
Historically, software developers have been free of liability if their software fails thanks to End User License Agreements that essentially grant them immunity from lawsuits. Over the years, U.S. cou więcej
Modern day medicine is increasingly dependent upon sophisticated technology that is rapidly changing the landscape of healthcare delivery and demonstrating that its use can make a dramatic improvement więcej
With the recent, highly publicized incidents of identity theft, ransomware and malware attacks directed at healthcare facilities, the medical device community is on high security alert. Cybersecurity więcej
“As today’s technology becomes increasingly complex, modern software monetization is essential. The adoption of modern technologies like the cloud have pressured independent software vendors (ISVs) to więcej
BSA | The Software Alliance , a leading advocate for the global software industry, recently announced its U.S 2018 policy agenda . The agenda focuses on four main policy areas: data, intellectual prop więcej
It seems like every day we hear about damaging and costly cyberattacks resulting from pirated software, theft of digital Intellectual Property, stolen personal, financial and medical data, or maliciou więcej
U.S. Senators recently introduced legislation intended to improve the cybersecurity of Internet-connected devices. The Internet of Things (IoT) Cybersecurity Improvement Act of 2017 would require that więcej
Software has become ubiquitous in the healthcare industry given its widespread use for controlling medical devices and health information systems and communicating and maintaining electronic patient d więcej
The VDMA , the advocacy organization for Germany’s mechanical and systems engineering industry, has released data from its latest research on product piracy (Product Piracy 2018), and once again, the więcej
The recent news about security vulnerabilities in common microprocessors and, by implication, popular operating systems and applications have left many users rightly concerned about their IT security. więcej
Intellectual property theft is rampant around the globe. In a 2016 study, VDMA, the German Mechanical Engineering Industry Association , reported that nine of out ten manufacturers were victims of pir więcej
Cloud initiatives, SaaS, subscriptions, pay-per-use, and a bevy of new, customer-centric licensing models are wreaking havoc with some ISVs who are struggling to keep up with their own antiquated lice więcej
BSA | The Software Alliance, a global software industry advocate, recently asserted their opinion on communications legislation being considered by the Australian Government. The Telecommunications an więcej
In the past few years, high profile cyberattacks to key Infrastructure have raised serious security concerns around the globe. These are just a few of the more prominent attacks: Massive power outages więcej
Ekran ten zmniejsza zużycie energii przez monitor, gdy użytkownik nie jest aktywny na naszej stronie. Aby wznowić przeglądanie, wystarczy przesunąć mysz.