The Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware- based root of truste more
Late last year, the World Economic Forum’s Global Agenda Council on the Future of Software & Society issued a very interesting report on Deep Shift: 21 Ways Software Will Transform Global Society . In more
Software licensing and monetization continue to be critical factors in a successful deployment for ISVs, particularly as the IoT and embedded systems market evolves and end user licensing preferences more
The Industrial Internet Consortium held an interesting TweetChat last week in preparation for their Security event held on Tuesday, November 4 in NYC. The IIC-led chat posed 6 questions and received e more
When At&T, Cisco, GE, IBM and Intel founded the Industrial Internet Consortium in March 2014, I wonder if they had envisioned how quickly the International technology community would embrace the their more
There were some interesting findings released in a global study this past June conducted by Harbor Research (in conjunction with Progress Software) on the State of IoT: 2015 Global Developer Study . N more
The intellectual property gained during the development of an ISV’s flagship software product most likely represents an investment in hundreds and hundreds of man hours. The majority of that time is s more
The SD Association recently celebrated the 10th anniversary of the microSD™ Card. Founded in 2000 by Panasonic, SanDisk and Toshiba, the SD Association is a group dedicated to establishing SD standard more
In the past decade, the Internet has dramatically changed the way software and the corresponding licenses are delivered. As we know, the days of the CD ROM installation are long gone. Consumers today more
Understanding the Vulnerabilities of IIoT Endpoints Much has been written lately about IIoT endpoints and their many potential security vulnerabilities. As defined by the Industrial Internet Consortiu more
The Internet of Things (IoT) is a term that has slipped easily into our everyday vocabulary, bringing with it exotic notions of smart appliances, driverless automobiles, intelligent monitors, and the more
On the 20 th and 21 st of September, the new "Secure Distributed Ledger and Contracts" Research Center was inaugurated by Prof. Sadeghi at the University of Darmstadt , Germany. In his role as externa more
Blockchain frameworks enable the immutable storage of data [1,2]. A still open practical question is the so called “oracle” problem, i.e. the way real world data is actually transferred into and out o more
The recent news about security vulnerabilities in common microprocessors and, by implication, popular operating systems and applications have left many users rightly concerned about their IT security. more
“We are keeping our computers offline. That way, they are safe.” I don’t know whether the IT professionals at French carmakers, British NHS hospitals, or German train operators believed this. What I d more
“Old School” perpetual software licensing agreements are rapidly falling out of favor as often times they place restrictions on product use that do not fit the dynamic business needs of the end user. more
When I last googled Blockchain , 21 million results were returned, and I am sure this number is on the rise as government agendas, panels at international trade shows, and every vendor dealing in IT s more
Intellectual property theft is rampant around the globe. In a 2016 study, VDMA, the German Mechanical Engineering Industry Association , reported that nine of out ten manufacturers were victims of pir more
Modern day medicine is increasingly dependent upon sophisticated technology that is rapidly changing the landscape of healthcare delivery and demonstrating that its use can make a dramatic improvement more
With the recent, highly publicized incidents of identity theft, ransomware and malware attacks directed at healthcare facilities, the medical device community is on high security alert. Cybersecurity more
Cet écran réduit la consommation d'énergie du moniteur lorsque vous n'êtes pas actif sur notre site. Pour reprendre la navigation, il suffit de déplacer votre souris.