During the early 2000's, there was much skepticism about the value and viability of virtualization. Today, however, there is no doubt that companies have embraced the efficiencies and expansion capabi meer
The U.S. Federal Trade Commission recently released an in-depth report entitled, The Internet of Things: Privacy & Security in a Connected World , which included a long list of considerations and reco meer
Former U.S. Vice President Dick Cheney acknowledged that he once feared that terrorists could use the electrical device that had been implanted near his heart to kill him and had his doctor disable it meer
It has been several years since Kevin Ashton introduced the concept of the Internet of Things, based on RFID and sensor technology that enable computers to observe, identify and understand the world—w meer
The Deloitte Centre for Health Solutions paints an interesting picture of the healthcare and life science sectors in their report, Healthcare and Life Sciences Predictions 2020 – a bold future? The la meer
We’ve all seen the disturbing software piracy statistics released by BSA | The Software Alliance in their Global Software Survey : 43 percent of the software installed on personal computers globally i meer
Adobe may have raised some eyebrows last year when they announced they were moving their packaged Creative Suite PC software to the cloud, but most industry analysts predicted this day was coming – it meer
Faced with an increasingly complicated network environment, made only more complex by the addition of virtualization, cloud services and bring your own devices (BYOD), many of your customers are also meer
By now, many of you have heard about the "BadUSB" exploit, where two security researchers at Security Research Labs demonstrated how they could perpetrate an attack on USB devices. By reprogramming th meer
Whether it be Stuxnet or an iPhone virus, it is people who are the cause for trouble. But let’s go back to how the story began: Just a few days ago, it was unthinkable for an iPhone to be infected wit meer
The intellectual property gained during the development of an ISV’s flagship software product most likely represents an investment in hundreds and hundreds of man hours. The majority of that time is s meer
The SD Association recently celebrated the 10th anniversary of the microSD™ Card. Founded in 2000 by Panasonic, SanDisk and Toshiba, the SD Association is a group dedicated to establishing SD standard meer
The Industrial Internet Consortium held an interesting TweetChat last week in preparation for their Security event held on Tuesday, November 4 in NYC. The IIC-led chat posed 6 questions and received e meer
When At&T, Cisco, GE, IBM and Intel founded the Industrial Internet Consortium in March 2014, I wonder if they had envisioned how quickly the International technology community would embrace the their meer
There were some interesting findings released in a global study this past June conducted by Harbor Research (in conjunction with Progress Software) on the State of IoT: 2015 Global Developer Study . N meer
ISVs today must address many questions in your product development and delivery strategies as the software licensing landscape has become increasingly complex. Let’s take a look at some of these quest meer
I recently read an interesting article in Engineering and Technology Magazine, entitled ‘Immature’ Internet of Things Hackable with Primitive Methods. What caught my eye was the opening paragraph that meer
With today’s cloud or virtual solutions, there are many available license management options to evaluate and even more questions to consider – What about security? Service levels? Architecture? Server meer
In the past decade, the Internet has dramatically changed the way software and the corresponding licenses are delivered. As we know, the days of the CD ROM installation are long gone. Consumers today meer
Understanding the Vulnerabilities of IIoT Endpoints Much has been written lately about IIoT endpoints and their many potential security vulnerabilities. As defined by the Industrial Internet Consortiu meer