Bundling is considered to be an effective pricing strategy for zero-margin information goods. However, researchers at the University of Hawaii, argue that these types of goods are prone to piracy and more
Most companies, particularly software developers, are mindful of the need to protect their critical IP from theft, counterfeiting, and illegal use. In most cases, the first step is to take the legal a more
I recently read an article on the “ 5 embedded system terms IoT admins must know ”. The crux of the article was to familiarize IoT device engineers with the various software, hardware, and signal proc more
While ISVs and embedded systems engineers transform their businesses with new software licensing strategies, like subscriptions and consumption-based licensing, their ongoing concerns with software pi more
The beginning of a new year is always the time for predictions, particularly in the cyber security field. CIOs, CSOs, and enterprise executives around the globe are scrambling to fortify their infrast more
Many types of strategies can be employed to lengthen the product lifecycle. Businesses can add new features and functionality to reinvigorate an existing product, develop a completely new replacement more
Home grown vs. outsourcing – it is a dilemma faced by businesses of all size in most every industry. A metalworking company, for example, may need to decide whether it is more cost-effective to build more
Some things are just meant to be, whether serendipitous or not – even in business. That’s the backstory of the mutually beneficial relationship that developed between Wibu-Systems and Glaser Programms more
The value of engineering time: That was the essence of an interesting e-book authored by Michelle Boucher, VP of Tech-Clarity, an independent U.S. research firm. The title of the e-book was How to Red more
Digital forensics refers to the process of identifying, extracting, analyzing, and presenting data recovered from digital devices, including computers and associated media, hard drives, optical disks, more
Seventy-two percent of the companies surveyed in the German mechanical and plant engineering sector stated that they were affected by product or brand piracy, with estimated damages amounting to 6.4 b more
As commonly known, industrial control systems are used for managing, directing, and regulating the behavior of automated industrial processes. They can be found in most every industry sector, from ene more
Only pay for what you need has been the key selling point and differentiator for at least one major insurance provider in the U.S. for the past several years. The benefit to consumers, they say, is th more
The Internet is definitely not terra incognita for businesses, but even a well-equipped IT team might flinch at the prospect of having to run its own servers and web services. And even when the right more
In June 2021, it was leaked that Microsoft would release a successor version of Windows 10. Even though Windows 11 had been on the market since October 2021, this came as a surprise to many, as Micros more
A dongle is a dongle is a dongle – that may have been true many years ago when secure hardware elements were generally available as standard USB sticks. But times have changed, and today, many options more