Software development practices typically fall into two categories – Brownfield projects or Greenfield projects – each of which utilizes different tools and requires different strategic approaches. Bro more
The recent cyber-attack on the Colonial pipeline in the U.S. is a stark reminder of the very real threats that exist to global infrastructure. The pipeline which carries 45% of the U.S. East Coast’s s more
In my last post , I talked about the pros and cons of Brownfield software development and the key considerations for integrating a licensing and entitlement management system into the process. In this more
Enterprise cybersecurity experts and experienced software developers are in high demand. Unfortunately, the current high-tech talent pool is insufficient to meet the demand. A recent blog post publish more
macOS developers are heralding the recent launch of Apple’s M1 ARM-based system-on-chip along with Apple’s next generation operating system, Big Sur, that is required to run M1 devices. The miniature more
More and more ISVs are moving their applications to the cloud vs. deployment over traditional IT infrastructure. The benefits are easily recognizable: high availability, flexibility and scalability on more
Most every brick-and-mortar retailer today is also engaged in e-commerce to offer their customers an alternative to traditional shopping and as a mechanism to generate incremental sales. And as more a more
Software is at the core of digital transformation. In today’s enterprises and tomorrow’s smart Industries, software is key to improving operational efficiencies, enabling successful convergence of IT more
Flexibility, scalability, and interoperability are key ingredients for any successful business solution. Flexibility means that the solution can be fine-tuned to adapt to dynamic market shifts as cust more
The ability to scale IT infrastructure and systems to quickly adjust to variable workloads and changing market demands is critical for any size business. Just look at the radical changes companies nee more
A dongle shortage? By now, consumers around the world are well aware of product shortages, from electronics to lumber to consumer necessities, caused by the tumultuous disruptions across global supply more
Just recently I was doing some research on the ongoing market shift towards SaaS and subscription software licensing and stumbled upon an old Gartner report that was published in 2008, entitled Gartne more
Compared with more familiar cybercrimes such as the theft of credit card, consumer health, and other personally identifiable information (PII), IP cyber theft has largely remained in the shadows. That more
While it is generally accepted that the first modern child-proof lid was invented by a Canadian pediatrician in 1967, there is evidence that ancient Mayans created an interlocking lid back in the fift more
Bundling is considered to be an effective pricing strategy for zero-margin information goods. However, researchers at the University of Hawaii, argue that these types of goods are prone to piracy and more
Most companies, particularly software developers, are mindful of the need to protect their critical IP from theft, counterfeiting, and illegal use. In most cases, the first step is to take the legal a more
Home grown vs. outsourcing – it is a dilemma faced by businesses of all size in most every industry. A metalworking company, for example, may need to decide whether it is more cost-effective to build more
Consumption-based licensing, subscriptions, features-on-demand, and similar licensing models are opening up new business opportunities for manufacturers across many different markets, all based on cre more
In the past decade, a bright spotlight has been focused on the promise and practical use of 3D printing for general manufacturing operations. The potential advantages are numerous: short run part prod more
I recently read an article on the “ 5 embedded system terms IoT admins must know ”. The crux of the article was to familiarize IoT device engineers with the various software, hardware, and signal proc more