Software scalability is a key aspect for a sustainable business model that aligns with current needs as well as future potential. With an agile software licensing scheme, organizations can readily ena more
As we close out another year full of industry challenges and successes, I am proud to reflect upon our achievements in 2023: Recipient of another prestigious industry award , the launch of a myriad of more
Certificates are used to prove the authenticity and identity of users or devices on the Internet, in emails, for machine-to-machine communication, and elsewhere. A commonly used certificate is an X.50 more
The security and integrity of mission critical software, particularly software used by governments or for controlling critical infrastructure, is under intense scrutiny for its trustworthiness and the more
Subscription software licensing is gaining traction in nearly every business sector from e-commerce models to enterprise business applications to niche vertical software solutions. In IDC’s Worldwide more
In our daily lives, how frequently have we heard someone say “let’s make sure we are on the same page”, whether it be during a personal interaction or a business communication? Pretty often I would sa more
Trustworthiness in the context of an industrial system is a relatively new term intended to provide a better understanding of the meaning of trust in such a system and how this trust can be approached more
The U.S. Congress recently introduced legislation to address the growing concern for security on IoT devices purchased by the U.S. government. Does the proposal go far enough? Let’s take a further loo more
Earlier this year, ARC Advisory Group, in conjunction with Kaspersky Labs, conducted a survey on the State of Cybersecurity of Industrial Control Systems (ICS) as well as the priorities, concerns, and more
Software for embedded systems is based more and more on open system platforms, such as Linux Embedded, VxWorks , Windows Embedded, QNX and many others. In addition to powerful core functionality, one more
In 2016, the Industrial Internet Consortium gained agreement upon an understanding of the term “trustworthiness” and its effect on design and operation of an industrial system. At the core of that und more
Dongles – The Historical "Bad Rap" When describing software protection dongles in a 2007 article appearing in PC Magazine , John C. Dvorak, a well-respected (but self-described curmudgeon) and award w more
We talk a lot about copy protection in this space but what I want to focus on today is what is meant by the phrase "secure software licensing." Let's unpack the term and look at each component separat more
Anytime you add a 3rd party component into your overall product stack you need to be thoughtful before you decide. Copy protection software is no different: it's something you will rely on to protect more
The world is flat. Thomas Friedman argues in his classic work that modern telecommunications makes global trade and competition a simple fact of modern life. And so you need flat earth software licens more
The big news for crypto-wonks this week is that an international group of researchers has cracked a portion of RSA encryption. And it's not like they had to throw supercomputers at the problem; it was more
We’ve been hearing the term " software monetization " bandied about. What does it mean? We define software monetization as the capability to effectively maximize your software revenue by meeting marke more
Hackers are out there. So you can't take for granted--now or ever--that it won't happen to you. Achieving software security is a complex problem; what's amazing to me is how often the bad guys get in more
There are plenty of reasons to use a software protection dongle even when you're running an embedded system. Some people believe that embedded systems are immune to piracy because the software has to more
All is not well within today’s pharmacist community. Several recent reports have documented the growing pressures brought on by increasing workloads with limited resources, time, and staffing. During more