A recent article in SD Times gave light to the trend that more and more aspects of software development are being forced to “shift left” in the development lifecycle, meaning that the speed at which d more
"Bricking” is a widely used term describing an electronic device, such as a smartphone, game console, router, or tablet computer that has been rendered useless due to severe physical damage, a serious more
Pay-per-use software licensing is not a new concept. In fact, as discovered in a recent Google search, the business model was under consideration as far back as 1993 ( Host Users Seek License Details, more
Cloud initiatives, SaaS, subscriptions, pay-per-use, and a bevy of new, customer-centric licensing models are wreaking havoc with some ISVs who are struggling to keep up with their own antiquated lice more
“Threat actors don’t have to defeat a company’s security measures, they only have to compromise a third-party supplier that it works with or relies on.” CSOonline That seems to be the case with a new more
Much has been written about the unbridled optimism brought on by the so called 4 th Industrial Revolution (a.k.a. Industry 4.0) and the unprecedented cyber-related risks facing manufacturers given the more
BSA | The Software Alliance, a global software industry advocate, recently asserted their opinion on communications legislation being considered by the Australian Government. The Telecommunications an more
In the past few years, high profile cyberattacks to key Infrastructure have raised serious security concerns around the globe. These are just a few of the more prominent attacks: Massive power outages more
In today’s ISV world, a flexible software licensing strategy is the key to successful monetization and profitability. In the past, secure hardware-based license dongles were the platform of choice for more
I read an interesting article recently, How Do You Create an Internet of Things Workforce?, that was published by the IEEE Computer Society. The gist of the article was that given the significant incr more
The right-to-repair movement is gaining traction in the U.S. as many states are considering legislation that would allow consumers and third parties to repair electronic equipment without voiding manu more
With its many promises and great prospects, the Internet of Things (IoT) warrants much stronger protection then the closed systems of the past. IoT systems rely on public networks, which by definition more
Digital transformation is changing the healthcare landscape as more and more medical devices come online, both next generation systems and legacy equipment, with many allowing remote access. Digital p more
Cybersecurity research is a “technological prerequisite” for addressing the numerous disruptive challenges brought on by the rapid progression of the digitalization of society. That sentiment is the b more
One of the most frequent questions I see asked in developer communities, like StackOverflow and Github , is when to use .NET framework and when to use .NET Core, as there seems to be confusion with th more
Over the past 30 years , we’ve helped hundreds of companies migrate from their homegrown or vendor-supplied licensing solution to our CodeMeter licensing and protection platform. While there are many more
Turn your customers into subscribers. That’s the mantra of Zuora Inc., a leading provider of a cloud-based subscription management platform. They have coined the term “Subscription Economy ® ” which e more
Is it possible to introduce an IoT device that can authenticate its user, can encrypt and decrypt transmitted and received data, and deliver or verify the proof of integrity, yet still be considered a more
What if a computer virus was capable of completely destroying the data on every Internet-connected device in the U.S. in a matter of minutes? Can you fathom the chaos? Basic services like electricity, more
The digital footprint of the healthcare landscape continues to expand as more and more medical devices come online, both next generation systems and legacy equipment, with many allowing remote access. more