The worldwide spread of coronavirus (COVID-19) has wreaked havoc on the global economy in an incredibly short period of time. What businesses have been most resilient in sidestepping operational disru more
Compared with more familiar cybercrimes such as the theft of credit card, consumer health, and other personally identifiable information (PII), IP cyber theft has largely remained in the shadows. That more
Tis the season for bold forecasts by analysts and industry pundits opining on global trends, predicting the “next big thing” and the challenges that lie ahead. Whereas the promise of the IoT and its b more
ISVs are facing increasing pressure to deliver SaaS solutions instead of traditional on-premise software applications. Why? Mainly, because they are responding to their customers’ preferences and inve more
Virtualization is now in widespread use amongst the IT community and ISVs need to consider the ramifications of virtual machines on software licensing. Simply defined, a virtual machine is hardware, s more
Software development practices typically fall into two categories – Brownfield projects or Greenfield projects – each of which utilizes different tools and requires different strategic approaches. Bro more
The recent cyber-attack on the Colonial pipeline in the U.S. is a stark reminder of the very real threats that exist to global infrastructure. The pipeline which carries 45% of the U.S. East Coast’s s more
In my last post , I talked about the pros and cons of Brownfield software development and the key considerations for integrating a licensing and entitlement management system into the process. In this more
Enterprise cybersecurity experts and experienced software developers are in high demand. Unfortunately, the current high-tech talent pool is insufficient to meet the demand. A recent blog post publish more
macOS developers are heralding the recent launch of Apple’s M1 ARM-based system-on-chip along with Apple’s next generation operating system, Big Sur, that is required to run M1 devices. The miniature more
More and more ISVs are moving their applications to the cloud vs. deployment over traditional IT infrastructure. The benefits are easily recognizable: high availability, flexibility and scalability on more
The ability to scale IT infrastructure and systems to quickly adjust to variable workloads and changing market demands is critical for any size business. Just look at the radical changes companies nee more
A dongle shortage? By now, consumers around the world are well aware of product shortages, from electronics to lumber to consumer necessities, caused by the tumultuous disruptions across global supply more
Just recently I was doing some research on the ongoing market shift towards SaaS and subscription software licensing and stumbled upon an old Gartner report that was published in 2008, entitled Gartne more
Software trustworthiness – what does it mean for developers, owner-operators and decision makers in Industrial Internet of Things (IIoT) systems? The Industrial Internet Consortium (IIC) recently publ more
There is concern by some that quantum computers present an imposing threat to current cryptographic methods designed to keep our critical infrastructure, systems, and data safe. This is particular tru more
Disruptive technologies are transforming all industries into digital industries and repositioning them to reap the benefits of Industry 4.0. In the industrial context, digital transformation (DX) is p more
The global phenomenon of digital transformation is dramatically shifting the ways businesses operate, the way they engage with customers, and the way in which they develop and deliver new products to more
Questa schermata riduce il consumo di energia del monitor quando non sei attivo sul nostro sito. Per riprendere la navigazione è sufficiente muovere il mouse.