The vulnerability of Internet-enabled endpoints in the Industrial Internet of Things (IIoT) is a critical security concern. The rapid proliferation of these connected devices, which include sensors, P meer
A flexible software license management system is critical for enabling ISVs to keep pace with end user expectations, not only in the way the software is licensed, but also in the manner by which end u meer
The Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware- based root of truste meer
Late last year, the World Economic Forum’s Global Agenda Council on the Future of Software & Society issued a very interesting report on Deep Shift: 21 Ways Software Will Transform Global Society . In meer
Software licensing and monetization continue to be critical factors in a successful deployment for ISVs, particularly as the IoT and embedded systems market evolves and end user licensing preferences meer
The VDMA , the advocacy organization for Germany’s mechanical and systems engineering industry, has released data from its latest research on product piracy (Product Piracy 2018), and once again, the meer
An article by Jacob Beningo that appeared recently in Design News caught my eye and raised an interesting question. The main premise of the article, “ The Soon-to-Be-Extinct Embedded Software Engineer meer
The potential danger of cyberattacks is present in virtually every facet of our lives, whether it be tampering of medical devices, attacks on critical civil infrastructure, prying into our connected h meer
Software has become an essential tool for global businesses to perform their fundamental everyday tasks. Software adds value in the way organizations conduct business, improve profitability, reach new meer
On the 20 th and 21 st of September, the new "Secure Distributed Ledger and Contracts" Research Center was inaugurated by Prof. Sadeghi at the University of Darmstadt , Germany. In his role as externa meer
Blockchain frameworks enable the immutable storage of data [1,2]. A still open practical question is the so called “oracle” problem, i.e. the way real world data is actually transferred into and out o meer
The recent news about security vulnerabilities in common microprocessors and, by implication, popular operating systems and applications have left many users rightly concerned about their IT security. meer
“We are keeping our computers offline. That way, they are safe.” I don’t know whether the IT professionals at French carmakers, British NHS hospitals, or German train operators believed this. What I d meer
“Old School” perpetual software licensing agreements are rapidly falling out of favor as often times they place restrictions on product use that do not fit the dynamic business needs of the end user. meer
When I last googled Blockchain , 21 million results were returned, and I am sure this number is on the rise as government agendas, panels at international trade shows, and every vendor dealing in IT s meer
Intellectual property theft is rampant around the globe. In a 2016 study, VDMA, the German Mechanical Engineering Industry Association , reported that nine of out ten manufacturers were victims of pir meer
Modern day medicine is increasingly dependent upon sophisticated technology that is rapidly changing the landscape of healthcare delivery and demonstrating that its use can make a dramatic improvement meer
With the recent, highly publicized incidents of identity theft, ransomware and malware attacks directed at healthcare facilities, the medical device community is on high security alert. Cybersecurity meer
It seems like every day we hear about damaging and costly cyberattacks resulting from pirated software, theft of digital Intellectual Property, stolen personal, financial and medical data, or maliciou meer
U.S. Senators recently introduced legislation intended to improve the cybersecurity of Internet-connected devices. The Internet of Things (IoT) Cybersecurity Improvement Act of 2017 would require that meer