Consumption-based licensing, subscriptions, features-on-demand, and similar licensing models are opening up new business opportunities for manufacturers across many different markets, all based on cre more
In the past decade, a bright spotlight has been focused on the promise and practical use of 3D printing for general manufacturing operations. The potential advantages are numerous: short run part prod more
Software is at the core of digital transformation. In today’s enterprises and tomorrow’s smart Industries, software is key to improving operational efficiencies, enabling successful convergence of IT more
Flexibility, scalability, and interoperability are key ingredients for any successful business solution. Flexibility means that the solution can be fine-tuned to adapt to dynamic market shifts as cust more
While ISVs and embedded systems engineers transform their businesses with new software licensing strategies, like subscriptions and consumption-based licensing, their ongoing concerns with software pi more
The beginning of a new year is always the time for predictions, particularly in the cyber security field. CIOs, CSOs, and enterprise executives around the globe are scrambling to fortify their infrast more
Some things are just meant to be, whether serendipitous or not – even in business. That’s the backstory of the mutually beneficial relationship that developed between Wibu-Systems and Glaser Programms more
The value of engineering time: That was the essence of an interesting e-book authored by Michelle Boucher, VP of Tech-Clarity, an independent U.S. research firm. The title of the e-book was How to Red more
Digital forensics refers to the process of identifying, extracting, analyzing, and presenting data recovered from digital devices, including computers and associated media, hard drives, optical disks, more
Seventy-two percent of the companies surveyed in the German mechanical and plant engineering sector stated that they were affected by product or brand piracy, with estimated damages amounting to 6.4 b more
Many types of strategies can be employed to lengthen the product lifecycle. Businesses can add new features and functionality to reinvigorate an existing product, develop a completely new replacement more
The digital media industry has long been a vulnerable target for piracy. The theft of copyrighted music, games, software, videos, films and the like costs the entertainment industry billions of dollar more
I recently read an article on the “ 5 embedded system terms IoT admins must know ”. The crux of the article was to familiarize IoT device engineers with the various software, hardware, and signal proc more
IIoT endpoint security was the leading concern of respondents to the 2018 SANS IIoT Survey: Shaping IIoT Security Concerns. The SANS Institute is a cooperative research and education organization and more
“Threat actors don’t have to defeat a company’s security measures, they only have to compromise a third-party supplier that it works with or relies on.” CSOonline That seems to be the case with a new more
Much has been written about the unbridled optimism brought on by the so called 4 th Industrial Revolution (a.k.a. Industry 4.0) and the unprecedented cyber-related risks facing manufacturers given the more
BSA | The Software Alliance, a global software industry advocate, recently asserted their opinion on communications legislation being considered by the Australian Government. The Telecommunications an more
On the 20 th and 21 st of September, the new "Secure Distributed Ledger and Contracts" Research Center was inaugurated by Prof. Sadeghi at the University of Darmstadt , Germany. In his role as externa more
Blockchain frameworks enable the immutable storage of data [1,2]. A still open practical question is the so called “oracle” problem, i.e. the way real world data is actually transferred into and out o more
The recent news about security vulnerabilities in common microprocessors and, by implication, popular operating systems and applications have left many users rightly concerned about their IT security. more