The Industrial Internet Consortium ( IIC ) recently released the first version of a document entitled " Industrial Internet Reference Architecture Technical Report ". The document serves to initiate a more
It has been several years since Kevin Ashton introduced the concept of the Internet of Things, based on RFID and sensor technology that enable computers to observe, identify and understand the world—w more
The Deloitte Centre for Health Solutions paints an interesting picture of the healthcare and life science sectors in their report, Healthcare and Life Sciences Predictions 2020 – a bold future? The la more
We’ve all seen the disturbing software piracy statistics released by BSA | The Software Alliance in their Global Software Survey : 43 percent of the software installed on personal computers globally i more
“Advancing progress toward a technology environment where all software products are safe and secure by design is a top priority for the U.S. Cybersecurity & Infrastructure Security Agency (CISA), the more
All is not well within today’s pharmacist community. Several recent reports have documented the growing pressures brought on by increasing workloads with limited resources, time, and staffing. During more
Dongles – The Historical "Bad Rap" When describing software protection dongles in a 2007 article appearing in PC Magazine , John C. Dvorak, a well-respected (but self-described curmudgeon) and award w more
"Attackers — in ever greater numbers and with increasing sophistication — see, in the growing promise of our tech-connected world, opportunities to steal or cause major disruption or destruction by ex more
A recent report released by the Economist Intelligence Unit entitled Long-term Macroeconomic Forecasts: Key trends to 2050 highlighted some of the emerging economic issues expected to shape global bus more
Aside from the widespread attention and hype surrounding the prolific growth expectations of the Internet of Things (IoT), industry focus has been on potential (IoT) device vulnerabilities and cyberse more
By now, many of you have heard about the "BadUSB" exploit, where two security researchers at Security Research Labs demonstrated how they could perpetrate an attack on USB devices. By reprogramming th more
During the early 2000's, there was much skepticism about the value and viability of virtualization. Today, however, there is no doubt that companies have embraced the efficiencies and expansion capabi more
The U.S. Federal Trade Commission recently released an in-depth report entitled, The Internet of Things: Privacy & Security in a Connected World , which included a long list of considerations and reco more
Former U.S. Vice President Dick Cheney acknowledged that he once feared that terrorists could use the electrical device that had been implanted near his heart to kill him and had his doctor disable it more
ISVs today must address many questions in your product development and delivery strategies as the software licensing landscape has become increasingly complex. Let’s take a look at some of these quest more
I recently read an interesting article in Engineering and Technology Magazine, entitled ‘Immature’ Internet of Things Hackable with Primitive Methods. What caught my eye was the opening paragraph that more
In their book, Embedded Systems Security , David and Michael Kleidermacher point out some all-to-real scenarios about the consequences of malicious threats to embedded systems. Consider that for every more
Adobe may have raised some eyebrows last year when they announced they were moving their packaged Creative Suite PC software to the cloud, but most industry analysts predicted this day was coming – it more
Faced with an increasingly complicated network environment, made only more complex by the addition of virtualization, cloud services and bring your own devices (BYOD), many of your customers are also more
We talk a lot about copy protection in this space but what I want to focus on today is what is meant by the phrase "secure software licensing." Let's unpack the term and look at each component separat more