The push for some form of liability for vendors who sell faulty or insecure software has been the subject of debate for many years with little or no clear agreement on its legality or how to enforce it.
Industrie 4.0, a.k.a. the fourth industrial revolution, is representative of the global strategic initiative to revolutionize industry by integrating digital automation, interoperability and advanced data exchange into manufacturing technologies.
A flexible software license management system is critical for enabling ISVs to keep pace with end user expectations, not only in the way the software is licensed, but also in the manner by which end users can manage licenses internally once purchased.
The tone of the many well-meaning discussions about the Industrial Internet of Things (IIoT) varies widely from one viewpoint of unbridled optimism about the seemingly endless possibilities to another filled with apocalyptic doom and gloom about the safety of the planet and everyone on it.
More than 81% of organizations believe successful adoption of the Industrial Internet of Things (IIoT) is critical to their future success, yet ironically, only 25% of these organizations have a clear IIoT strategy in place and only 24% of those organizations are happy with its execution.
Software licensing and monetization continue to be critical factors in a successful deployment for ISVs, particularly as the IoT and embedded systems market evolves and end user licensing preferences change.
The Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware- based root of trusted computing platforms.
When I recently watched a report about Tofaş, with its impressive one-million square meter operation and its leading position in the Fiat-Chrysler world in terms of World Class Manufacturing (WCM), I seriously wondered what else Smart Factories could offer in the near future.
Security and the IoT are terms becoming intrinsically linked in the grand discussion of connected devices and their envisioned applications in virtually every aspect of our ecosystem, whether it be consumer wearables, medical devices, or industrial systems.
Many software developers have turned to the free trial business model to market their enterprise software – simply put, offer free software for a timed period and hope the end user performs a thorough evaluation and sees enough value to warrant a purchase of the software after the trial expires.
The close of a year and the anticipation of what’s to come in the New Year always brings about some interesting reviews of the past 12 months and predictions for the future by industry analysts, company executives and the trade press.
It has been several years since Kevin Ashton introduced the concept of the Internet of Things, based on RFID and sensor technology that enable computers to observe, identify and understand the world—without the limitations of human-entered data.
Aside from the widespread attention and hype surrounding the prolific growth expectations of the Internet of Things (IoT), industry focus has been on potential (IoT) device vulnerabilities and cybersecurity.
A recent report released by the Economist Intelligence Unit entitled Long-term Macroeconomic Forecasts: Key trends to 2050 highlighted some of the emerging economic issues expected to shape global business in the coming decades.
Attackers — in ever greater numbers and with increasing sophistication — see, in the growing promise of our tech-connected world, opportunities to steal or cause major disruption or destruction by exploiting vulnerabilities.
With today’s cloud or virtual solutions, there are many available license management options to evaluate and even more questions to consider – What about security? Service levels? Architecture? Server location? Support? Cost and fees?
Former U.S. Vice President Dick Cheney acknowledged that he once feared that terrorists could use the electrical device that had been implanted near his heart to kill him and had his doctor disable its wireless function.
Faced with an increasingly complicated network environment, made only more complex by the addition of virtualization, cloud services and bring your own devices (BYOD), many of your customers are also struggling to keep track of their software assets, contracts, and entitlements.
Adobe may have raised some eyebrows last year when they announced they were moving their packaged Creative Suite PC software to the cloud, but most industry analysts predicted this day was coming – it was just a matter of how soon.
When describing software protection dongles in a 2007 article appearing in PC Magazine, John C. Dvorak, a well-respected (but self-described curmudgeon) and award winning columnist said, “The dongle was a mostly failed copy-protection device that came into existence in the 1980s. It was also a point of controversy…”