For some ISVs, software licensing can be straightforward and uncomplicated. Their software is designed to only be implemented on a specific operating system and deployed over a particular type of netw more
In his syndicated Software Integrity Blog , Jonathan Knudsen of Synopsis, recently made a case for why software should be considered critical infrastructure. He points out that the U.S. recognizes 16 more
Cyber strategy is business strategy, and C-suite executives and government leaders have taken notice. At least that’s one of the takeaways from the annual World Economic Forum held last month in Davos more
A lot has been written recently about the increasing network connectivity of embedded devices found in a wide array of smart applications and platforms, including automobiles, household appliances, in more
The latest research report on product piracy released by the VDMA , the advocacy organization for Germany’s mechanical and systems engineering industry, is out and the findings are disturbing once aga more
The enterprise software licensing transformation continues in parallel with the evolving expectations of end users and the fluid nature of the technology landscape. ISVs have taken to addressing user more
Since the first 3D printing machine was unveiled back in 1984, industrial use was the main focus. However, it was not until early patents expired in 2009 and consumer models came to market that indust more
Discrete manufacturing, and all of the supporting functions that go along with it, like inventory management, product lifecycle management, supply chain management and Enterprise Resource Planning, is more
We pride ourselves in our resilience and our ability to think and invent our way out of a crisis. Technological optimism has been one of the engines of modern life, and its promise has often held true more
Companies today are scrambling to implement the enabling technologies required to support a growingly remote workforce efficiently and cost-effectively. Tools for file sharing, virtual collaboration a more
During our regular CodeMeter customer support meetings, I find that we frequently discuss customer questions regarding protection and licensing for a Windows Service or Server application. In most cas more
Compared with more familiar cybercrimes such as the theft of credit card, consumer health, and other personally identifiable information (PII), IP cyber theft has largely remained in the shadows. That more
Much has been written in this space and elsewhere about the productivity benefits of Industry 4.0 and the security challenges inherent with Internet-based data acquisition and control of industrial Io more
It doesn’t happen often, but it is possible that license containers can be lost, stolen or broken, and when it does occur, the ISV is faced with a dilemma: how to reactivate the license quickly to fos more
Virtualization is now in widespread use amongst the IT community and ISVs need to consider the ramifications of virtual machines on software licensing. Simply defined, a virtual machine is hardware, s more
Software development practices typically fall into two categories – Brownfield projects or Greenfield projects – each of which utilizes different tools and requires different strategic approaches. Bro more
The recent cyber-attack on the Colonial pipeline in the U.S. is a stark reminder of the very real threats that exist to global infrastructure. The pipeline which carries 45% of the U.S. East Coast’s s more
Just recently I was doing some research on the ongoing market shift towards SaaS and subscription software licensing and stumbled upon an old Gartner report that was published in 2008, entitled Gartne more
Smart factories encompass the digitization of virtually every part of the manufacturing system, employing a host of emerging technologies, such as artificial intelligence, virtual reality, digital twi more
Are there any foreseeable boundaries for digital transformation? It doesn’t seem so, as the exponential increase of millions of connected devices and the creative IoT applications that have emerged sh more