This past summer, the Trusted Computing Group (TCG) published an interesting document entitled, Architect’s Guide: IoT Security . The document outlined 5 critical strategies that developers of connect mehr
The US FDA recently published new recommendations for both manufacturers and regulators to address medical device cybersecurity. The final document, Postmarket Management of Cybersecurity in Medical D mehr
The push for some form of liability for vendors who sell faulty or insecure software has been the subject of debate for many years with little or no clear agreement on its legality or how to enforce i mehr
In the past decade, the Internet has dramatically changed the way software and the corresponding licenses are delivered. As we know, the days of the CD ROM installation are long gone. Consumers today mehr
The vulnerability of Internet-enabled endpoints in the Industrial Internet of Things (IIoT) is a critical security concern. The rapid proliferation of these connected devices, which include sensors, P mehr
A flexible software license management system is critical for enabling ISVs to keep pace with end user expectations, not only in the way the software is licensed, but also in the manner by which end u mehr
An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints. In many cases, an attacker will try to access the execution code and attack the we mehr
There were some interesting findings released in a global study this past June conducted by Harbor Research (in conjunction with Progress Software) on the State of IoT: 2015 Global Developer Study . N mehr
IDC recently released their annual top 10 software licensing and pricing predictions for 2016 and I think they are right on target based upon feedback from organizations who are using our CodeMeter se mehr
The close of a year and the anticipation of what’s to come in the New Year always brings about some interesting reviews of the past 12 months and predictions for the future by industry analysts, compa mehr
When I recently watched a report about Tofaş , with its impressive one-million square meter operation and its leading position in the Fiat-Chrysler world in terms of World Class Manufacturing (WCM), I mehr
It was difficult to avoid the barrage of headlines coming out of the last week’s annual RSA Conference, the purported largest annual gathering of security professionals in the world. Cyberthreats, per mehr
Software licensing and monetization continue to be critical factors in a successful deployment for ISVs, particularly as the IoT and embedded systems market evolves and end user licensing preferences mehr
Whether you are a total believer or not, it looks like the shift from perpetual software licensing to the software subscription model is here to stay. According to a Gartner report , “By 2020, more th mehr
The Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware- based root of truste mehr
Late last year, the World Economic Forum’s Global Agenda Council on the Future of Software & Society issued a very interesting report on Deep Shift: 21 Ways Software Will Transform Global Society . In mehr
Software has become ubiquitous in the healthcare industry given its widespread use for controlling medical devices and health information systems and communicating and maintaining electronic patient d mehr
The VDMA , the advocacy organization for Germany’s mechanical and systems engineering industry, has released data from its latest research on product piracy (Product Piracy 2018), and once again, the mehr
An article by Jacob Beningo that appeared recently in Design News caught my eye and raised an interesting question. The main premise of the article, “ The Soon-to-Be-Extinct Embedded Software Engineer mehr
Intellectual property theft is rampant around the globe. In a 2016 study, VDMA, the German Mechanical Engineering Industry Association , reported that nine of out ten manufacturers were victims of pir mehr
Dieser Bildschirm reduziert den Stromverbrauch des Monitors, wenn Sie nicht auf unserer Website aktiv sind. Um die Suche fortzusetzen, bewegen Sie einfach die Maus.