Protecting the intellectual property associated with digital assets that come in a form other than software applications requires a different approach and dedicated tools. Technical, legal, and commercial know-how is frequently shared in a business environment, and the authors want to make sure their assets do not end up in the hands of unauthorized personnel or competitors, let alone media outlets. Certain reports are also for-sale products, in which case their cloning or distribution with non-eligible parties means an immediate monetary loss. However, a file that needs a standard application to be opened cannot include encryption and decryption methods: While CodeMeter Protection Suite protects software against illicit actions, SmartShelter and CodeMeter Core API are responsible for protecting and licensing digital documents.
SmartShelter is available in two flavors:
- SmartShelter|PDF, a certified plugin for Adobe Acrobat and Adobe Acrobat Reader that provides additional security functions on top of Adobe’s native protection mechanisms; these include the creation of stronger passwords unknown even to the file author, the storage of passwords on a computer-bound license file or a hardware secure element, and monitoring for disallowed applications. Additionally, the integration of CodeMeter License Central enables the generation of all CodeMeter licensing options and offers full control over the entitlement process.
- SmartShelter|SDL, a secure data layer for any type of document that slips in between the operating system and the document reader. It configures which operations are allowed and which are prohibited based on the license rights: the ability to open, read only, or save documents is totally regulated with a fine-grained management console.
In this new presentation, we see:
- How document protection differs from software protection
- Four basic scenarios for protecting documents
* The documents take the form of PDF files that are displayed with a PDF viewer
* The documents are opened and saved with one of your own applications
* The documents come in a standard format and are opened and saved with a standard application
* The documents come in a different standard format and can only be viewed with a standard document viewer application
- DEMO: SmartShelter|PDF for protecting PDF files
- DEMO: SmartShelter|SDL for protecting and licensing standard documents
- DEMO: CodeMeter Core API for protecting and licensing files with a proprietary format
Whether the prosperity of your business depends on protecting the IP of the documents you sell, the data your software produces, or the data from third parties you process, your top priority is defending your finances and reducing your liability risks.
Watch the webinar:
https://youtu.be/ImnFHW9yuA8
The Effort-Performance Relationship in Software Protectionteam-WIBU
“Less is more” is a popular oxymoron. In software protection, most ISVs might express this commonplace statement as "I would like to achieve maximum protection with minimal effort". But is this possible at all? Can you really expect the strongest encryption method with just a minimum investment in your own resources?
Wibu-Systems has solved this paradox with CodeMeter Protection Suite. Guided tools that encrypt a compiled application or a library in an automatic and secure way are made available for all common platforms. AxProtector, AxProtector .NET, and AxProtector Java are your reliable companions for this rapid and straightforward process.
For the optimal protection of your software application, the code should be split into individual parts and dynamically reassembled at runtime. AxProtector .NET and AxProtector Java take care of this operation in a fully automated fashion for you. But what about native applications and libraries that are protected with AxProtector? In this case, IxProtector, integrated with AxProtector, takes over this procedure for you. You can choose between semi-automatic and fully manual controls.
This is where Translocated Execution enters the scene and inserts automatic decryption routines into your application. In addition to the implementation of simple automatisms, Translocated Execution also moves executable code into memory. Functions are temporally superimposed, so that finding a dedicated function in a memory dump becomes a matter of pure luck for a would-be attacker and a systematic memory dump of all functions becomes practically impossible.
In short, Translocated Execution offers two main advantages:
The automatic decryption and execution of the code reduces your manual efforts to a minimum.
Moving code into memory increases security standards against memory dumps.
Get to know the theory behind Translocated Execution, see the necessary steps, and learn about the available optimization options. A combination with additional security techniques like traps, which are also an essential part of Blurry Box cryptography, is also possible at any time.
This presentation is covering some of the core technology concepts and several innovative features:
An overview of CodeMeter Protection Suite
Basic principles underpinning AxProtector
Basic principles underpinning IxProtector
Translocated Execution
Security considerations
The presentation is aimed to prove how extremely secure software protection mechanisms can be implemented with little effort. Translocated Execution will raise the security bar for hackers, as the wizard for AxProtector and IxProtector will automatically disassemble your application into many small parts that are dynamically re-assembled at runtime. A minimalist approach to software protection made possible by CodeMeter Protection Suite.
Watch the webinar: https://youtu.be/pPOAdyahHXU
The Effort-Performance Relationship in Software Protectionteam-WIBU
“Less is more” is a popular oxymoron. In software protection, most ISVs might express this commonplace statement as "I would like to achieve maximum protection with minimal effort". But is this possible at all? Can you really expect the strongest encryption method with just a minimum investment in your own resources?
Wibu-Systems has solved this paradox with CodeMeter Protection Suite. Guided tools that encrypt a compiled application or a library in an automatic and secure way are made available for all common platforms. AxProtector, AxProtector .NET, and AxProtector Java are your reliable companions for this rapid and straightforward process.
For the optimal protection of your software application, the code should be split into individual parts and dynamically reassembled at runtime. AxProtector .NET and AxProtector Java take care of this operation in a fully automated fashion for you. But what about native applications and libraries that are protected with AxProtector? In this case, IxProtector, integrated with AxProtector, takes over this procedure for you. You can choose between semi-automatic and fully manual controls.
This is where Translocated Execution enters the scene and inserts automatic decryption routines into your application. In addition to the implementation of simple automatisms, Translocated Execution also moves executable code into memory. Functions are temporally superimposed, so that finding a dedicated function in a memory dump becomes a matter of pure luck for a would-be attacker and a systematic memory dump of all functions becomes practically impossible.
In short, Translocated Execution offers two main advantages:
The automatic decryption and execution of the code reduces your manual efforts to a minimum.
Moving code into memory increases security standards against memory dumps.
Get to know the theory behind Translocated Execution, see the necessary steps, and learn about the available optimization options. A combination with additional security techniques like traps, which are also an essential part of Blurry Box cryptography, is also possible at any time.
This presentation is covering some of the core technology concepts and several innovative features:
An overview of CodeMeter Protection Suite
Basic principles underpinning AxProtector
Basic principles underpinning IxProtector
Translocated Execution
Security considerations
The presentation is aimed to prove how extremely secure software protection mechanisms can be implemented with little effort. Translocated Execution will raise the security bar for hackers, as the wizard for AxProtector and IxProtector will automatically disassemble your application into many small parts that are dynamically re-assembled at runtime. A minimalist approach to software protection made possible by CodeMeter Protection Suite.
Watch the webinar: https://youtu.be/pPOAdyahHXU
Recent enhancements to Enterprise Vault give your organization new levels of control over your unstructured data. In this session, you'll learn how you can make the most of these new and enhanced capabilities. This includes using intelligent workflows that leverage classification and machine learning to accelerate your compliance activities, taking advantage of flexible new cloud deployment and cloud storage options, and much more. Don't miss this opportunity to explore best practices that will transform Enterprise Vault into one of the most versatile and powerful information management tools in your arsenal.
Hans brings the most comprehensive solution for Document Filing. The solution is specially designed for work style in Indian context and has a robust intelligent engine to take care of document filing and retrieving complexities.
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...PaaSword EU Project
This is a paper presentation held by Dr. Simone Braun at the 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15) in Limassol, Cyprus. This paper aims at defining a roadmap to derive a holistic framework providing data privacy and security by design in the context of cloud-based multi-tenant customer relationship management (CRM) systems. As a CRM system developed for SMEs CAS PIA serves as an example for typically occurring data structures and use cases including the innovative concept of user-defined security levels for different data types. A scenario and requirements analysis for motivating the need for a suitable user-context-specific security concept and a data and privacy preserving framework is presented.
BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...Fujitsu Central Europe
Breakout Session - Frank L. Blaimberger und Christof Schleidt
Wie entwickelte sich eine Fabrik in Richtung Industrie 4.0? Wie bindet man ein Ökosystem von Kunden und Partnern ein? Welche Rolle spielen dabei unterschiedliche Plattformen?
Fujitsu verfügt über ein innovatives Portfolio an Services und Technologien, um Industrie 4.0 zu ermöglichen. Sie sind im eigenen Werk in Augsburg bereits im Einsatz. Wir zeigen Ihnen, wie neue IoT-Technologien in die verschiedenen Fachbereiche effizient und mit Mehrwert implementiert werden können.
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"Joseph Lopez, M.ISM
Peter Pfalzgraf, Head of Business Units for PROSTEP AG presents how PROSTEP Solutions Integrate with ThingWorx Connectors - Enterprise IoT Solutions and Platform Technology
The Enterprise File Fabric for Service Providers | Solution BriefHybrid Cloud
The File Fabric SPE is a multi-cloud data solution that enhances
existing service provider data products, such as object storage,
by providing an easy mechanism for end customers to consume
object data thereby substantially increasing sales of existing data services. It can additionally be provided as a packaged offering to partners as a value added product bundle for use with existing data services.
The rapid expansion of the Internet of Things has fostered convenience and connectedness for consumers. It has also opened the door for creative hackers. Recently, hackers used hundreds of thousands of common internet-connected devices in consumers’ homes, without the owners’ knowledge, to launch a DDoS attack that temporarily brought down crucial parts of the internet’s infrastructure.
Attacks in the past have shown that passwords in IoT devices provide insufficient security. Additionally, IoT devices are too constrained for implementing biometric functions.
The question then becomes how to authenticate to such devices and can the industry adopt a standardized approach despite a highly fragmented IoT landscape. This presentation by Rolf Lindemann of Nok Nok Labs, explores how FIDO Authentication can provide convenient and strong authentication in an array of IoT use cases.
intergator as a comprehensive and holistic information management platformEduard Daoud
intergator is all about an intelligent company-wide and cross-system search engine, based on machine learning, which ensures that you quickly and easily access information within your enterprise. Regardless of whether the content is on file servers, databases, archives, DMS (data management systems) or emails, intergator indexes all these sources of information at the same time and delivers the needed results under consideration of respective access rights within a few seconds.
As opposed to a simple full text search intergator does not leave you alone with thousands of hits, but offers smart and extremely efficient possibilities to navigate within the search results and to limit or extend these as needed. This is possible due to the automatic keyword indexing and the recognition of proper names and interrelations.
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
Bus operators depend on their vehicles, and any spare parts they need have to be available as quickly as possible. Up to now, this meant massive local stocks or complex on-demand logistics, but now digitalization is hailing in a new age. The owners and operators of Mercedes Benz and Setra busses can now produce the parts themselves with 3D printing. All they need for these mini-factories are a certified 3D printer and the licenses for the parts they want to print. Wibu-Systems’ CodeMeter provides the technological basis for a secure digital process chain with full control over how many parts can be and are printed on the ground.
Additive manufacturing was long considered a technology for nerds or select specialists. There were too many technical challenges still to be overcome, and the cost of 3D printed parts was far too high compared to conventional manufacturing. But times have changed, and many of these problems have been solved. New service concepts are being introduced and are already creating new global, digital markets. Our webinar introduces the solution thought up by Daimler Buses in partnership with the 3D printer specialists Farsoon Technology and the CodeMeter security technology of Wibu-Systems. The system solves two essential problems: The protection of the digital object data and the monetization of the entire process with a reliable license management system.
The challenge is to be able to produce parts wherever and whenever they are needed. This promises a new field for service providers to get active in, offering 3D printing services for their clients. However, when the parts are processed and printed by a third party, there need to be systems in place to protect the intellectual property involved and to make the entire value chain correctly traceable and, crucially, billable. This is where Daimler Buses has found a solution with the potential to revolutionize the current conventional parts business. The system creates exciting new prospects for the service business and for the availability of spare parts, both economically and ecologically speaking.
Many parts and components are now available in digital format on the OMNIplus 3D printing license shop. Bus operators and service partners around the world can purchase these and produce them at their leisure and at the point of need. The parts are provided as encrypted downloads. As in any online store, the buyer adds the right items to their cart. At the checkout, the buyer then receives a preprinting license to prepare the print job with the Buildstar® software made by Farsoon Technologies and the actual printing license for the right number of parts. The licenses can then be used with the Makestar® software on Farsoon-certified 3D printers. Both protected and unprotected parts can be combined in one job to reduce the printing costs. Order processing is handled by the combination of CodeMeter License Central and the SAP system already in place at Daimler Buses.
Harnessing the power of cloud for real securityErkang Zheng
Find out how LifeOmic security and engineering leveraged cloud services to define a highly secure architecture for real security and HIPAA compliance. The "Essential Eight" of our security principles, and a real implementation example for secure deployment into our virtually air-gapped production environments. A model we call #zerotrustplus.
Mediante el uso del marco de perímetro digital seguro, implementando un modelo “defense-in depth” se logrará la continuidad de las operaciones para evitar que los ataques maliciosos afecten las mismas y proporcionar resiliencia de acceso seguro y de red durante interrupciones, desastres naturales y calamidades. Esto permite a la fuerza de trabajo reanudar rápidamente industrias de actividades críticas y esenciales.
OpenText is pleased to launch eDOCS 16.1 – overflowing with innovations for an increasingly secure, flexible work environment that “works the way you do”. eDOCS 16.1 offers increasingly flexible, intuitive ECM in a secure, collaborative work environment, deployed on premises, in the cloud, or hybrid.
Post Quantum Cryptography – The Impact on Identityteam-WIBU
As PQC continues to be a major topic for many companies and Government Institutions, we take a dive into the topics of quantum computers, post-quantum-cryptography, and the potential relevance for (ID) use cases.
This seminar would like to present the principles of the technology and the latest developments in this field as well some indication as to the relevance, impact, and consequences on (Government) ID projects or use cases. The seminar may also look towards the relationship with these projects not only from a hardware standpoint but also from a software algorithmic stance as we migrate from current used crypto systems to quantum-proof systems.
KEY TAKEAWAYS
What is a Quantum Computer, what is Post Quantum Cryptography and when will we see a quantum computer?
The migration from current crypto systems to quantum proof systems.
How will PQC and QC affect (Government) ID projects and implementations.
What will QC mean for the security proofing of ID and Information in the future.
TARGET AUDIENCE
Interested parties in the field of Identity and Security.
Government bodies looking to the future for ID document management systems
Enterprises looking to understand the potential impact of QC upon their business and industries.
PRESENTATION: Cryptoagility and Quantum Resistance: Easier Said Than Done.
Ever since the publication of Shor’s quantum algorithm for the factorization of large numbers, it has been known that quantum computers could at some point pose a threat to our communication and data security. Today we have cloud access to small, functioning quantum computers. The answer to this threat is quantum-resistant cryptography: cryptographic methods for classical computers that are robust against attacks by quantum computers.
The standardization of such methods is currently ongoing. However, these methods are based on mathematical problems, that are much younger than the factorization problem already investigated by Euclid. On the other hand, currently used cryptographic methods such as RSA or ECDSA are broken as soon as a sufficiently large quantum computer exists. Cryptoagility is therefore recommended, software should be built or modified in such a way that cryptographic algorithms are easily substitutable. But how great is the danger posed by quantum computers? To what extent is cryptography affected, and when do we need to take action? Is cryptoagility really so easy to implement in practice or is this perhaps much easier said than done?
Unlocking the Future: Empowering Industrial Securityteam-WIBU
In today's fast-paced digital era, where industries globally are evolving through rapid digital transformation and digital assets form the core of industrial innovation, ensuring software integrity, safeguarding intellectual property, and enabling software monetization through sophisticated and adaptable software license management systems are of utmost importance.
In the realm of IoT devices and PLCs (Programmable Logic Controllers), memory cards frequently serve as an essential component of the infrastructure. Recognizing this, we've chosen to expand upon this foundation by enhancing an already crucial element in practical scenarios with additional functionalities. This strategic extension aims to not only fulfill a fundamental requirement but also to elevate the utility and performance of these devices by integrating advanced features into the existing framework.
Join us for a webinar that showcases the groundbreaking collaboration between Swissbit and Wibu-Systems, introducing CmReady – a revolutionary solution at the nexus of state-of-the-art technologies designed to meet these critical needs.
What is CmReady?
CmReady revolutionizes software protection and licensing by enabling the binding of a CmActLicense – a software license container – to a certified CmReady memory device in the form factor of an SD or microSD card, rather than tethering it exclusively to the target device running the protected software. This innovative approach grants unparalleled mobility to CmActLicenses, equating their portability with that of traditional dongles, yet with the added convenience and flexibility of removable memory devices.
Why CmReady?
Industrial memory cards, integral to manufacturers for specific project needs, already populate the field in diverse capacities and features. Recognizing the necessity to enhance these deployed units for increased sustainability, CmReady emerges as a groundbreaking solution. It not only upgrades existing memory cards with new functionalities but also transforms them into secure anchors for IP protection and software licensing. This innovative approach ensures that existing infrastructure can adapt to evolving security demands without the need for complete replacement, representing a leap forward in sustainable technological advancement.
All the Benefits of CmReady in a Nutshell
With CmReady, industrial customers gain access to a plethora of benefits:
Portable licenses bound to CmReady memory cards
Effortless activation and renewal processes
Seamless compatibility with CodeMeter Runtime starting from release 8.00 and CodeMeter Embedded starting from release 3.00
Plug and Play functionality, eliminating implementation hassle
Enhanced data protection and integrity features, safeguarding against piracy and unauthorized access
Recent enhancements to Enterprise Vault give your organization new levels of control over your unstructured data. In this session, you'll learn how you can make the most of these new and enhanced capabilities. This includes using intelligent workflows that leverage classification and machine learning to accelerate your compliance activities, taking advantage of flexible new cloud deployment and cloud storage options, and much more. Don't miss this opportunity to explore best practices that will transform Enterprise Vault into one of the most versatile and powerful information management tools in your arsenal.
Hans brings the most comprehensive solution for Document Filing. The solution is specially designed for work style in Indian context and has a robust intelligent engine to take care of document filing and retrieving complexities.
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...PaaSword EU Project
This is a paper presentation held by Dr. Simone Braun at the 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15) in Limassol, Cyprus. This paper aims at defining a roadmap to derive a holistic framework providing data privacy and security by design in the context of cloud-based multi-tenant customer relationship management (CRM) systems. As a CRM system developed for SMEs CAS PIA serves as an example for typically occurring data structures and use cases including the innovative concept of user-defined security levels for different data types. A scenario and requirements analysis for motivating the need for a suitable user-context-specific security concept and a data and privacy preserving framework is presented.
BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...Fujitsu Central Europe
Breakout Session - Frank L. Blaimberger und Christof Schleidt
Wie entwickelte sich eine Fabrik in Richtung Industrie 4.0? Wie bindet man ein Ökosystem von Kunden und Partnern ein? Welche Rolle spielen dabei unterschiedliche Plattformen?
Fujitsu verfügt über ein innovatives Portfolio an Services und Technologien, um Industrie 4.0 zu ermöglichen. Sie sind im eigenen Werk in Augsburg bereits im Einsatz. Wir zeigen Ihnen, wie neue IoT-Technologien in die verschiedenen Fachbereiche effizient und mit Mehrwert implementiert werden können.
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"Joseph Lopez, M.ISM
Peter Pfalzgraf, Head of Business Units for PROSTEP AG presents how PROSTEP Solutions Integrate with ThingWorx Connectors - Enterprise IoT Solutions and Platform Technology
The Enterprise File Fabric for Service Providers | Solution BriefHybrid Cloud
The File Fabric SPE is a multi-cloud data solution that enhances
existing service provider data products, such as object storage,
by providing an easy mechanism for end customers to consume
object data thereby substantially increasing sales of existing data services. It can additionally be provided as a packaged offering to partners as a value added product bundle for use with existing data services.
The rapid expansion of the Internet of Things has fostered convenience and connectedness for consumers. It has also opened the door for creative hackers. Recently, hackers used hundreds of thousands of common internet-connected devices in consumers’ homes, without the owners’ knowledge, to launch a DDoS attack that temporarily brought down crucial parts of the internet’s infrastructure.
Attacks in the past have shown that passwords in IoT devices provide insufficient security. Additionally, IoT devices are too constrained for implementing biometric functions.
The question then becomes how to authenticate to such devices and can the industry adopt a standardized approach despite a highly fragmented IoT landscape. This presentation by Rolf Lindemann of Nok Nok Labs, explores how FIDO Authentication can provide convenient and strong authentication in an array of IoT use cases.
intergator as a comprehensive and holistic information management platformEduard Daoud
intergator is all about an intelligent company-wide and cross-system search engine, based on machine learning, which ensures that you quickly and easily access information within your enterprise. Regardless of whether the content is on file servers, databases, archives, DMS (data management systems) or emails, intergator indexes all these sources of information at the same time and delivers the needed results under consideration of respective access rights within a few seconds.
As opposed to a simple full text search intergator does not leave you alone with thousands of hits, but offers smart and extremely efficient possibilities to navigate within the search results and to limit or extend these as needed. This is possible due to the automatic keyword indexing and the recognition of proper names and interrelations.
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
Bus operators depend on their vehicles, and any spare parts they need have to be available as quickly as possible. Up to now, this meant massive local stocks or complex on-demand logistics, but now digitalization is hailing in a new age. The owners and operators of Mercedes Benz and Setra busses can now produce the parts themselves with 3D printing. All they need for these mini-factories are a certified 3D printer and the licenses for the parts they want to print. Wibu-Systems’ CodeMeter provides the technological basis for a secure digital process chain with full control over how many parts can be and are printed on the ground.
Additive manufacturing was long considered a technology for nerds or select specialists. There were too many technical challenges still to be overcome, and the cost of 3D printed parts was far too high compared to conventional manufacturing. But times have changed, and many of these problems have been solved. New service concepts are being introduced and are already creating new global, digital markets. Our webinar introduces the solution thought up by Daimler Buses in partnership with the 3D printer specialists Farsoon Technology and the CodeMeter security technology of Wibu-Systems. The system solves two essential problems: The protection of the digital object data and the monetization of the entire process with a reliable license management system.
The challenge is to be able to produce parts wherever and whenever they are needed. This promises a new field for service providers to get active in, offering 3D printing services for their clients. However, when the parts are processed and printed by a third party, there need to be systems in place to protect the intellectual property involved and to make the entire value chain correctly traceable and, crucially, billable. This is where Daimler Buses has found a solution with the potential to revolutionize the current conventional parts business. The system creates exciting new prospects for the service business and for the availability of spare parts, both economically and ecologically speaking.
Many parts and components are now available in digital format on the OMNIplus 3D printing license shop. Bus operators and service partners around the world can purchase these and produce them at their leisure and at the point of need. The parts are provided as encrypted downloads. As in any online store, the buyer adds the right items to their cart. At the checkout, the buyer then receives a preprinting license to prepare the print job with the Buildstar® software made by Farsoon Technologies and the actual printing license for the right number of parts. The licenses can then be used with the Makestar® software on Farsoon-certified 3D printers. Both protected and unprotected parts can be combined in one job to reduce the printing costs. Order processing is handled by the combination of CodeMeter License Central and the SAP system already in place at Daimler Buses.
Harnessing the power of cloud for real securityErkang Zheng
Find out how LifeOmic security and engineering leveraged cloud services to define a highly secure architecture for real security and HIPAA compliance. The "Essential Eight" of our security principles, and a real implementation example for secure deployment into our virtually air-gapped production environments. A model we call #zerotrustplus.
Mediante el uso del marco de perímetro digital seguro, implementando un modelo “defense-in depth” se logrará la continuidad de las operaciones para evitar que los ataques maliciosos afecten las mismas y proporcionar resiliencia de acceso seguro y de red durante interrupciones, desastres naturales y calamidades. Esto permite a la fuerza de trabajo reanudar rápidamente industrias de actividades críticas y esenciales.
OpenText is pleased to launch eDOCS 16.1 – overflowing with innovations for an increasingly secure, flexible work environment that “works the way you do”. eDOCS 16.1 offers increasingly flexible, intuitive ECM in a secure, collaborative work environment, deployed on premises, in the cloud, or hybrid.
Post Quantum Cryptography – The Impact on Identityteam-WIBU
As PQC continues to be a major topic for many companies and Government Institutions, we take a dive into the topics of quantum computers, post-quantum-cryptography, and the potential relevance for (ID) use cases.
This seminar would like to present the principles of the technology and the latest developments in this field as well some indication as to the relevance, impact, and consequences on (Government) ID projects or use cases. The seminar may also look towards the relationship with these projects not only from a hardware standpoint but also from a software algorithmic stance as we migrate from current used crypto systems to quantum-proof systems.
KEY TAKEAWAYS
What is a Quantum Computer, what is Post Quantum Cryptography and when will we see a quantum computer?
The migration from current crypto systems to quantum proof systems.
How will PQC and QC affect (Government) ID projects and implementations.
What will QC mean for the security proofing of ID and Information in the future.
TARGET AUDIENCE
Interested parties in the field of Identity and Security.
Government bodies looking to the future for ID document management systems
Enterprises looking to understand the potential impact of QC upon their business and industries.
PRESENTATION: Cryptoagility and Quantum Resistance: Easier Said Than Done.
Ever since the publication of Shor’s quantum algorithm for the factorization of large numbers, it has been known that quantum computers could at some point pose a threat to our communication and data security. Today we have cloud access to small, functioning quantum computers. The answer to this threat is quantum-resistant cryptography: cryptographic methods for classical computers that are robust against attacks by quantum computers.
The standardization of such methods is currently ongoing. However, these methods are based on mathematical problems, that are much younger than the factorization problem already investigated by Euclid. On the other hand, currently used cryptographic methods such as RSA or ECDSA are broken as soon as a sufficiently large quantum computer exists. Cryptoagility is therefore recommended, software should be built or modified in such a way that cryptographic algorithms are easily substitutable. But how great is the danger posed by quantum computers? To what extent is cryptography affected, and when do we need to take action? Is cryptoagility really so easy to implement in practice or is this perhaps much easier said than done?
Unlocking the Future: Empowering Industrial Securityteam-WIBU
In today's fast-paced digital era, where industries globally are evolving through rapid digital transformation and digital assets form the core of industrial innovation, ensuring software integrity, safeguarding intellectual property, and enabling software monetization through sophisticated and adaptable software license management systems are of utmost importance.
In the realm of IoT devices and PLCs (Programmable Logic Controllers), memory cards frequently serve as an essential component of the infrastructure. Recognizing this, we've chosen to expand upon this foundation by enhancing an already crucial element in practical scenarios with additional functionalities. This strategic extension aims to not only fulfill a fundamental requirement but also to elevate the utility and performance of these devices by integrating advanced features into the existing framework.
Join us for a webinar that showcases the groundbreaking collaboration between Swissbit and Wibu-Systems, introducing CmReady – a revolutionary solution at the nexus of state-of-the-art technologies designed to meet these critical needs.
What is CmReady?
CmReady revolutionizes software protection and licensing by enabling the binding of a CmActLicense – a software license container – to a certified CmReady memory device in the form factor of an SD or microSD card, rather than tethering it exclusively to the target device running the protected software. This innovative approach grants unparalleled mobility to CmActLicenses, equating their portability with that of traditional dongles, yet with the added convenience and flexibility of removable memory devices.
Why CmReady?
Industrial memory cards, integral to manufacturers for specific project needs, already populate the field in diverse capacities and features. Recognizing the necessity to enhance these deployed units for increased sustainability, CmReady emerges as a groundbreaking solution. It not only upgrades existing memory cards with new functionalities but also transforms them into secure anchors for IP protection and software licensing. This innovative approach ensures that existing infrastructure can adapt to evolving security demands without the need for complete replacement, representing a leap forward in sustainable technological advancement.
All the Benefits of CmReady in a Nutshell
With CmReady, industrial customers gain access to a plethora of benefits:
Portable licenses bound to CmReady memory cards
Effortless activation and renewal processes
Seamless compatibility with CodeMeter Runtime starting from release 8.00 and CodeMeter Embedded starting from release 3.00
Plug and Play functionality, eliminating implementation hassle
Enhanced data protection and integrity features, safeguarding against piracy and unauthorized access
The Power of Partnership: Enabling Success Togetherteam-WIBU
A common piece of wisdom highlights the value of collaboration over solitary efforts. Working together, partners can pool their resources and expertise, achieving greater results than either could alone. This is particularly true when partners possess deep industry knowledge or local insights, like language and customs.
Another key insight is the benefit of enabling partners to operate independently. This approach can lessen your workload, accelerate the delivery of solutions, and enhance partner satisfaction by granting them more control and autonomy.
To achieve this, providing partners with the tools and knowledge for self-sufficiency is essential. While setting up processes with a partner may initially require more effort than handling tasks yourself, this investment in empowerment is sustainable and ultimately more rewarding.
These principles are universally relevant, particularly in the realm of software sales. CodeMeter License Portal is designed to facilitate this process with your partners. It can be tailored to fit various use cases and integrate with your existing processes, such as those in your ERP system, ensuring a customized and effective partnership.
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
Over the history of Wibu-Systems, there have been certain recurring reasons that have brought customers to select the CodeMeter protection and licensing solution: usually, these are hacking of software, revenues lost, the long-term limitations of a homegrown solution, the wish to supply multiple licensing models, or the plan to integrate licensing into an existing back-office system. However, once primary licensing needs are met, there is still a number of features that remains underutilized or not explored at all, just as is the case with smart phones or basic office applications.
Whatever features you rely upon most with CodeMeter today, it can make sense for you to get acquainted with the complete set of options at your disposal, optimize your processes even further, and make full use of the investment you have made. Additionally, the new generation of CodeMeter offers some special features that we are first to introduce to the worldwide market.
This webinar is a great opportunity for our current CodeMeter customers as well as those who are early in their journey towards automated license lifecycle management; both can get a complete overview of the special features of our technology and the best practices we strongly encourage. And, all should be aware that several features of CodeMeter are supplied with free lifetime maintenance included.
Discover the product highlights and the latest innovations that come with the latest version of CodeMeter.
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
Für Softwarehersteller oder Hersteller von intelligenten Systemen ist Lizenzierung ein wichtiger Bestandteil der Monetarisierungsstrategie von Software und Geräten. Nur mit Hilfe einer Lizenzierungslösung wie CodeMeter ist es möglich, das wertvolle geistige Eigentum zu schützen und gleichzeitig Raubkopien zu vermeiden, und dadurch ein Maximum an Lizenzen an die Kunden zu verkaufen. Auf der anderen Seite ist für die Anwender aber auch wichtig, dass die erworbenen Lizenzen kontinuierlich zur Verfügung stehen. Einen Produktionsausfall aufgrund nicht vorhandener Lizenzen gilt es unter allen Umständen zu vermeiden. Das gilt nicht nur für automatisierte Fertigungslinien beispielsweise in der Automobilindustrie, sondern auch bei Anwendungen innerhalb kritischer Infrastrukturen oder für Unternehmen, die global tätig sind und regional auftretende Ausfälle vermeiden müssen, aber auch keine Zeitfenster mehr für Wartungsarbeiten haben.
Die kontinuierliche Bereitstellung von Lizenzen ist bei Ausfällen von Teilsystemen ein wichtiger Aspekt für bestimmte Kunden und Branchen. Dies wird über eine ausfallsichere, hochverfügbare Lizenzierungsumgebung CodeMeter TMR-Server realisiert. TMR steht dabei für „Triple Mode Redundancy“ und kombiniert ein Konzept ausfallsicherer Lizenzverfügbarkeit (2-aus-3) mit bewährter Rechenzentrumstechnologie. Ein Cluster aus fünf Servern, davon zwei Load-Balancer und drei Lizenzserver, agiert dabei als ein Verbund-System. Solange zwei der drei Lizenzserver sowie ein Load-Balancer verfügbar sind, bleibt die gesamte Lizenzierungsumgebung betriebsbereit und garantiert damit eine Hochverfügbarkeit der Lizenzen für die Anwender.
Das Webinar gibt einen Einblick in den grundlegenden Aufbau und die Funktionsweise des CodeMeter TMR-Servers.
No Time to Idle – License availability for business continuityteam-WIBU
For software developers and the makers of smart systems, licensing is a key element in their software’s or hardware’s monetization strategies. Licensing solutions like CodeMeter empower them to protect their invaluable intellectual property, prevent product piracy, and sell as many licenses as possible. At the same time, their customers want to know that the licenses will actually be available whenever they need them: Losing valuable working hours or having your machines running idle because of a missing license would be the worst-case scenario. This goes for modern, automated production lines as are common in the automotive industry and elsewhere, but it can be even more relevant for applications running critical infrastructures or for global enterprises that cannot afford to waste their limited maintenance opportunities or even shift operations from continent to continent simply because one regional license is missing.
No Time to Idle: Making sure that licenses are reliably available to avoid systems or parts of systems falling idle might not be a matter for a 00 agent of His Majesty’s Secret Service, but it can be a matter of commercial life and death for many companies or sectors of industry. This is where CodeMeter’s Triple Mode Redundancy comes in: A high-availability licensing environment that uses a concept of two-out-of-three fail-proof TMR servers and robust data center technology. A cluster of five servers, including two load balancers and three license servers, works together to make sure that the licensing environment keeps doing its job as long as two of the three licensing servers are up and running. This guarantees that licenses are available for their users whenever they need them.
This webinar offers an insight into the design and operation of the CodeMeter TMR server concept.
Cloud-Based Licensing in Offline Scenariosteam-WIBU
Using the cloud for software licenses is all the rage at the moment, especially for enterprise software where admins take over most of the day-to-day management tasks on behalf of the users in their organization. The advantages are obvious: Providers and users can access their license information at any time, and often usage data as well. Licenses can be changed on the fly; they can be created, updated, or revoked as needed. For admins, it becomes easy to actively organize which users can use which licenses on which devices.
Manufacturing facilities on the proverbial shop floor are, however, often not hooked up to the Internet, but instead run offline and fully autonomously. The reasons for this are obvious: Machines will not suddenly come to a standstill should the Internet connection break down. This could lead to massive costs down the line – just imagine a furnace falling cold in a steelworks. At the same time, keeping machines separate from the Internet protects against cyberattacks and sabotage. Attackers cannot tamper with devices they simply cannot reach.
As part of Industry 4.0, more and more manufacturing data is sent over the Internet, e.g., for predictive maintenance. In most cases, the data is captured and passed onto the Internet via dedicated gateways. Still, there is no direct Internet connection on the shop floor for the reasons named above.
What does that mean for licensing? A lot, for architectural purposes. The servers needed to create and manage licenses are usually on the Internet. The users, like the operators of manufacturing lines, need to activate the licenses directly on the computers and devices on the shop floor. As with the data collected for Industry 4.0 purposes, this works without a direct Internet connection. All that is needed is an intermediate medium, which can be a regular PC, to move the license from the online to the offline world. If need be, this can happen completely offline by physically sharing data.
In this webinar, we will follow the process of activating licenses with an offline device and CodeMeter License Central in detail. Which data is needed at what point? How can that data be shared? Which steps are optional and can be skipped for the offline process? And how does CodeMeter License Central make all of this simpler?
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
In principle, there are two different approaches to cloud licensing: On the one hand, licenses can be created, managed, and updated via the cloud. However, the licenses are actually located on the local device and can be used offline, at least for a certain period of time. On the other hand, the licenses can be used directly in the cloud. This case requires a permanent online connection to the server in the cloud. Especially if the number of licenses used simultaneously needs to be counted reliably, such a connection to the license server is inherent. In the webinar, we will look at best practice tips for this "license server" use case.
For "always-on" licenses, CmCloudContainer is the best solution from the CodeMeter product family. The license server is operated by Wibu-Systems for you in the cloud. You create a CmCloudContainer, transfer the licenses in advance into this CmCloudContainer, and send your customer the access data (credential file). When creating the CmCloudContainer, you can choose between a Personal Container and an Enterprise Container.
The Personal Container is typically used as a container for a user (person). They can have the container active on up to three workstations. Through the License Quantity, you define on how many workstations the user can use your software simultaneously. Three active workstations do not automatically mean three licenses for simultaneous use; by default, a match of one license on one workstation is set.
The Enterprise Container is used when multiple users share a license, almost like a license pool. From an installation point of view, there is the possibility to set up a local proxy CodeMeter license server. All users access this server and do not need direct access to the cloud. This case is mainly used when devices on the shop floor are indirectly connected to the cloud via edge devices.
Alternatively, all users or devices consuming licenses can communicate directly with the CodeMeter Server in the cloud. Mixed forms of direct and indirect access through several local license servers are also possible. The exciting question here is how to disavow a device or user from the list of units of people that were initially granted access rights.
Here is where CodeMeter License Portal comes in handy and provide a turnkey solution. You and your customers create groups and users. Each user can access two CmCloudContainers, their own Personal CmCloudContainer, and the Enterprise CmCloudContainer of the group to which they belong. Depending on the use case, you can either leave the choice to your user or make it transparently in the background for them.
“A fistful of licenses” is no problem: You simply create them manually with CodeMeter License Editor or the command line tool CmBoxPgm. But “for a few licenses more”, you should think about automating the license creation, distribution, and management process. Enter CodeMeter License Central! As in Ennio Morricone’s famous western, where the Man with no Name and Colonel Mortimer team up to beat the bad guys, the unique strengths of CodeMeter License Central and ERP systems work best when they work together. They are not opponents, but perfect companions.
Depending on your use case, you need to decide which system should take the lead for licensing: the ERP system or CodeMeter License Central? You can also mix and match them both in a hybrid setup if you need to account for different workflows. One typical use case would be a combination of subscription licenses sold either directly by you or distributed via a reseller. In this situation, your resellers could create their licenses via a portal with CodeMeter License Central, and the ERP system is notified each month about the number of active licenses for an aggregated bill for the reseller. You could even sell more subscriptions directly by moving them from the ERP system to CodeMeter License Central. Alternatively, you can run reseller licenses first through the ERP system or direct-sale licenses first through CodeMeter License Central.
To make the link between the ERP system and CodeMeter License Central, you have a choice of a simple or a sophisticated SOAP interface, a generic connector with a REST-like API, or some custom layer to slot in between the two sides. When using the generic connector and a custom layer, you can adjust the operating logic to suit your specific needs, letting you respond to any changes in your requirements with little interventions and expansions that do not force you to move everything into the ERP system.
For SAP, you have two turnkey solutions ready and waiting: Our partner Informatics has created a framework for integration in SAP, typically used in the SD (Sales and Distribution) modules. Alternatively, CodeMeter License Central can be contacted directly from SAP’s EMS module.
One important aspect is the backchannel between CodeMeter License Central and the ERP system. When the ERP system is in the lead, the backchannel can feed back information about the current state of licenses, e.g. whether and where they are activated. All of this information can be sent via the notification dispatcher (push) or requested by the ERP system when they are needed (pull). If licenses are created in CodeMeter License Central, the backchannel is still key for the ERP system to bill those licenses, again with push or pull options available.
The Industrial Internet of Things has well and truly arrived, with manufacturers around the world having access to a vast assortment of smart machines with clever app features for tailoring their functionality perfectly to their needs. But where to start? To really kick off the connected, app-driven, and smarter industry of tomorrow, end users need an app marketplace that they trust and know how to use, with apps that they know will work on their equipment, and everything with confidence in legal, commercial, technical and – not least – security terms. The Open Industry 4.0 Alliance, Hilscher, and Wibu-Systems have come together to showcase how this can be done with the OI4 Community App Store, Docker containers for interoperability, and CodeMeter for safe operations and secure intellectual property.
Today, the world of industrial applications is very diverse and forms a complex ecosystem that entails a multitude of technical requirements. Due to the current complexity of the brownfield environment, a broad acceptance of existing applications and their ease of use are bogged down, if not made even impossible.
The overarching goal is to place the user experience first and foremost so that end users can move to the ecosystem of their choosing, without being permanently tied to a particular infrastructure. Wider choice, more flexibility in deployment, and rapid response to changes are the direct results of these greater freedoms.
As we all know, digitization is now in full swing. Triple-digit billions are being invested in this sector, with everyone, regardless of their role in the value chain, expecting increased productivity and shorter delivery and setup times. The end game: improved inventory management, shorter market entry cycles, reduced batch sizes, and sustainability in the form of energy efficiency and optimization of the resources utilized.
The Open Industry 4.0 Alliance (OI4) gathers manufacturers and providers of Industry 4.0 solutions and services worldwide aimed at successfully transitioning customers to the Industrial Internet of Things. The group has developed a joint approach with all its members to reach tangible results on the path towards a complete digitization of the manufacturing industry.
Three main stakeholders come into play:
1. The application providers, who bundle their expertise in professional apps and make them available to a broad market;
2. The store operators, who provide the end users with a large number of applications and map legal, commercial, and technical aspects in their systems;
3. The end users, who don’t want to deal with the complexity of different store systems and expect trustworthy platforms.
Hilscher, a name that has stood for trendsetting automation solutions for over 35 years, and Wibu-Systems, a global leader in software monetization via protection, licensing, and security, are members of OI4 and ready to demonstrate this constructive attitude during this live masterclass.
Protecting and Licensing .NET Applicationsteam-WIBU
.NET has seen a surge in its popularity as a development platform since 2018, powered not least by the multiplatform capabilities introduced with .NET Standard. According to the Tiobe Index, C# currently ranks in fifth spot as a choice for developers in .NET, outranked only by Python, C/C++, and Java. Python is particularly in demand for internal projects or automation use cases, as Java is for servers, and .NET for end user devices. For traditional standalone and client applications, it is safe to say that .NET is a sure second choice alongside C/C++.
Security matters, and it matters especially when applications are run out in the field, on an end user’s device. This is true for the end users themselves, as they don’t want their machines affected by malware or other harmful code, which is usually avoided by solutions like signed code. But it is also true for software developers who want to protect their work from piracy or IP theft. .NET differs from C/C++ in that the source code does not go through a compiler to run as machine code on a specific platform. Instead, it is turned into intermediate code that can still run on multiple platforms. The downside to this is that the intermediate code remains accessible for snooping and tampering by would-be attackers. License checks can be removed or replaced by forged ones, and business secrets contained in the code may simply be stolen.
Our answer: AxProtector .NET from our CodeMeter Protection Suite. AxProtector .NET works perfectly with code signatures, meaning developers do not have to make that decision between security for the end user or protection for their own IP. They can, and should, have both.
AxProtector .NET makes clever use of the easy legibility of the intermediate code: it extracts all the classes and methods contained in a .NET assembly and encrypts them piece by piece. The encrypted code is then placed back instead of the original code.
During runtime, the methods are decrypted on the fly when they are called for. The actual intermediate code remains in the device’s working memory only for a brief moment to run through the Just In Time Compiler (JIT) and create the machine code, and then it is erased from memory. A native C/C++ component, CPSRT, takes over part of the decrypting and runs cyclical security checks in the background. By comparison to a straight-up .NET solution, adding this native component increases the security of the system again. CPSRT is available for most common platforms and processes, including Windows, macOS, Linux, Intel x86 and x86-64 as well as ARM and AARCH64. It does not normally mean any limitation to the application’s ability to run on multiple platforms.
Rolling out or updating licenses should be as simple and straightforward as possible. CodeMeter already comes with lots of workflows for the purpose on its License Portal. Many jobs can be automated through that portal, and the work for the user reduced to a few simple clicks. However, all of this needs a user who would manually start the activation or updating process. For larger organizations that depend on up-to-date transparency about the licenses that are active in the field, the License Portal is also the optimum solution.
But how could you streamline the process on the user’s side even more? This is where a bit of magic comes into play in the form of the Software Activation Wizard.
CodeMeter has many different use cases covered with a choice of source code examples for different developer languages to help you put in place your own Software Activation Wizard to match your processes, workflows, and requirements. All you need is CodeMeter License Central and the right gateways in the cloud.
There are many use cases that could include automatic license updates, such as:
Adding or removing features
Revoking entire licenses
Automatically renewing subscriptions after payment has been received
Updating service technicians’ licenses
Automatically renewing maintenance contracts
Locating or locking lost licenses
An automatic update removes the need for the user to do anything. Nobody has to be reminded to activate an update over the License Portal. Not only is this easier and more comfortable for the user, it also gives you, as the vendor, full control over the process. The Software Activation Wizard can become a perfect fit for your business by being integrated in your software and tailored to your processes and your corporate design.
Automation saves costs, and it gives you a great means to collect data and retrieve it via CodeMeter License Central. One popular option is to register users during license activation, which is particularly appealing when your licenses are sold through diverse channels, but you still want to know who your users are in the wild. This even works with free software: it can be activated and registered in the same manner, with the license created in the background during activation, and you will know who is using your software.
The first step is always the most decisiveteam-WIBU
“You don’t get a second shot at a good first impression.” We have all heard this deceptively simple saying. It applies to your and our relationships with potential new customers, but it also applies to your first impression of working with our software protection and licensing technology CodeMeter. Workflows that used to be state of the art only a few years ago are no longer accepted without question today. Just think of the old habit of distributing trial versions of software on CD-ROMs or DVDs at expos. Nobody does so anymore, because very few people have the necessary drives left on their new computers. As a software developer or vendor, you will recognize many of the challenges we at Wibu-Systems face when it comes to providing test versions of our product to potential clients. That is why we have prepared a webinar to share our ideas and experiences with designing the new evaluation process with you. In this masterclass, you will discover the workflows we use with our clients, with a look behind the scenes to show you how and why we do it this way. You can do everything we have done in this process yourself with CodeMeter for your own processes.
In the past, Wibu-Systems delivered its test versions through the mail, i.e. a physical SDK toolkit including two dongles and a DVD. The disadvantage is obvious: Potential clients had to wait for the package to arrive before they could test our technology, and they had to have a DVD drive to use the included disc. In short: We needed a new approach. Our goal was to enable our clients’ testing team to start their tests immediately, while keeping the cryptographic keys needed for the process as secure as they were on the hardware-based CmDongle.
The combination of CmCloudContainers and CmDongles means that all possible requirements are covered. The cryptographic keys are always kept safe; users with online access can start to test the software immediately, and users forced to go the offline route can still carry their licenses and keys around on the CmDongle. Should the situation change later on, everything can be switched around as needed.
The CodeMeter Developer Portal is modelled on the CodeMeter License Portal. If you want, you can copy our choice of offering a combination of dongles for offline scenarios and cloud containers for a faster response. You can also get access to the CodeMeter Evaluation Portal, a trial version of the License Portal that lets you review the processes from your specific vantage point and see in action how you would produce trial versions of your software or even enable your sales partners and resellers to do so.
Authenticate and authorize your IIoTdevicesteam-WIBU
“Who’s who” is an important question, not just for the publishers of biographical encyclopedias. Identities and reliable ways to identify people, devices, and real or virtual objects have become more important than ever before as much of our lives, including the industrial world, has gone digital. The new opportunities coming from this also contain new challenges: From biometric passports making travel safer and more secure to eID technologies facilitating virtual transactions and digital certificates establishing themselves as the technology of choice to authenticate devices and actors in the industrial IoT, the tech world is exploring how identity can be represented both online and offline.
Digital certificates are a great tool to uniquely identify people or devices with the tried-and-tested reliability and security of a pair of cryptographic keys acting as the currency of trust: One key is public and confirmed by a neutral authority, the Certificate Authority, to belong to the person, device, or digital object, and the other is private and secure. With a certificate signed with that private key and the private key stored safely away from prying eyes, there should be no way to tamper with or steal the identity it confirms.
CodeMeter Certificate Vault is our answer: The keys are kept safe and the necessary cryptographic operations handled in the smart card chips embedded in our secure hardware elements, our CmDongles. But CodeMeter Certificate Vault is more than that: It acts as a PKCS#11-compliant token provider, acts as a go-between when keys need to be accessed, e.g. through the OpenSSL API, it works perfectly in the important M2M communication standard OPC UA, and it simplifies the often laborious process of distributing and managing certificates by bringing the whole comfort and great performance of CodeMeter License Central to the certificate world. Key pairs are created, bound to their intended container, and packaged in a secure file that can simply be shipped over to their destination. With CodeMeter’s award-winning encryption, the entire process is safe from theft and tampering. In his talk, Guenther Fischer will look at three use cases that show the power of CodeMeter Certificate Vault in action.
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
"Pricing policy is an executive matter" – this should underline how important it is who defines prices and how they are defined. If the price is too steep, you scare off potential customers and lose revenue. If the price is too low, you may win more customers, but the revenue will plateau at some point, because the increased numbers will not make up for the financial shortfall. Low prices naturally affect profits, and sometimes dramatically so.
For software developers, retail prices are directly related to different licensing options. The most common choices are still the traditional "One-off purchases" or "One-off purchases with maintenance contracts". But there are more and more software vendors offering more modern models like subscriptions or consumption-based licenses.
This webinar will cover both the commercial and the technical sides of these licensing models, specifically consumption-based models. For pricing decisions, two factors matter most: "What does it cost me to produce the software?" and "What is the software worth to our customers?". In many cases in the market, the second question ought to take precedence both when calculating prices and when trying to sell the actual software: "This printer can print 1000 pages" might be a great statement for gadget lovers. But when trying to sell the printer’s real added value, it should be "This printer is 20% faster and can save you a lot of expensive labor."
Modern licensing models can benefit from using cloud solutions, as the cloud makes it easy to capture and collect usage data immediately and renew subscriptions on the fly. But has the whole world really gone online already? Our experts at Wibu-Systems know: That is not true. In industrial shopfloor scenarios in particular, there is so much legitimate concern about cyberattacks, sabotage, or data theft that many devices are not always available online. Often, outbound connections through dedicated gateways are the limit of what can be accepted. And availability is also another legitimate worry for many users of cloud services. It only takes a misguided shovel, and the fastest fiberoptic interconnection is cut and production comes to a standstill. What good is a 20% faster connection with a network printer, if the printer has been physically cut from the network? All the time and effort saved with modern connectivity is quickly lost again to such incidents.
The technical part of the webinar will cover the concrete ways to implement consumption-based licenses with CodeMeter.
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
Nobody would eat a whole salami from end to end. We might all want to, but we wouldn’t try (or manage). Instead, we proceed slice by slice. This strategy, also called the salami tactic, can be applied to many other walks of life, and software licensing is one of them. Over their evolution, many software products tend to get bigger and bigger as the developers try to fulfil new user expectations or add new technology capabilities. Some call this bloat, but it is actually a reasonable way of responding to a growing user base with a growing set of needs and expectations. However, few users will need all of the features at once. Usually, they only need a few selected features, creating a dilemma for software developers and their clients: Users don’t want to pay for things they never use, but developers don’t want to give their work away for free.
This is where the salami tactic comes back into the picture. Called features-on-demand in the software world, it means that the users are not forced to buy or pay for the entire package (or salami), but only for the features (or slices) they want. Although the term had negative connotations for its originator, Zoltán Pfeiffer, the salami tactic is a great example of a win-win strategy. The seller gets their software to the user at a lower entry price, and the users have the opportunity to spend more for the features they want on top.
Security and Protection for Machine Learning.pptxteam-WIBU
Machine learning. We believe that it has the potential to be a game changer that will transform the course of our future. But what actually is machine learning? The term refers to training an artificial intelligence with typically massive sets of data. The resulting trained model can then predict other data. To illustrate this, we can see how medical data could be processed automatically by an artificial intelligence.
Think of a doctor screening a patient for TBC. The doctor takes a look at the X-ray image to tell whether the patient is infected or not. This needs years of training and lots of experience. A trained AI could do the same job much more efficiently and make the technique available even to general practitioners. Imagine that a maker of TBC screening systems produces a system that read the X-ray scans and make the diagnosis by itself. All it needs is a good set of X-ray images with the right diagnoses attached. The system is trained with these scans to produce a model that can predict the diagnoses for future scans. What is immediately clear is that the data that the machine is being fed with has to be sound: All incorrect or flawed data has to be screened out, and the meaningful data has to be identified and correlated. The model that slowly grows from this process becomes the intellectual property of the manufacturer. And as soon as intellectual property comes into the picture, we get problems: There will be counterfeiters trying to build similar systems by abusing the property of the original maker. There might even be outright saboteurs who want to manipulate what the system can do in practice.
Latest at this point – much sooner, if you ask us – the device maker should start thinking about ways to protect that IP. The IP comes in multiple forms: It is the data used originally to train the model, the training setup itself, and the eventual trained model. It does not matter whether the model in question is a virtual system operating in the cloud or an actual device sitting on a desk in a doctor’s surgery room somewhere. At stake in both cases is a data model that can be accessed via the physical device and that needs to be securely stored in the cloud. And for both threats, CodeMeter has a perfect solution: Encrypting the model to protect it against unauthorized use, copying, or espionage.
Nobody enjoys being bossed around. Nobody enjoys having their every move monitored, especially if the checks and controls make life harder than they should. But if everybody did what they wanted, there would be anarchy. And the same is true for software licensing: Without any protections, your software will eventually fall victim to thieves and pirates. Tough and strict controls can help minimize that risk. Tools like CodeMeter Protection Suite make it easy to encrypt software and bind it irrevocably to a license. But when things go wrong – maybe the computer with the license breaks – it can mean that the user cannot keep working with their software on a new device.
This is where a license portal comes into play as the perfect self-service solution for your clients. You define what your users and distribution partners should be able to do on their own. Our license portal and CodeMeter License Central keep track of all license actions of your users and partners. You can check up on what happened at your leisure and intervene if there is any funny business with anybody.
You can set smart cut-off values to stop people from abusing the freedom you have given them. When one of these points is passed, it would be up to you to allow or disallow any action manually. This is the perfect compromise between the two extremes “Allow everything first and check up on it later” and “Allow nothing and control everything yourself”.
Self-service options for single users include:
- Moving licenses to other devices / dongles / users
- Recovering lost licenses
- Creating and activating emergency licenses
- Creating demo or trial licenses
- Binding cloud licenses to other devices
- Changing the access details for cloud licenses
But license portals are not just there to make life easier for individual users. They include features and functions that are perfect for commercial clients or multi-level distribution models. On top of individual users, you can define hierarchies of different roles for different client or partner levels. For instance, administrators and partners could see all licenses for their part of the tree, while end users can only see the licenses allotted to them or their specific unit.
License portals can also be set up to allow resellers or distribution partners to create their own full-scale licenses at the point of need. As with all of these features, this is an optional setting that you could configure for all partners or only for specific partners of your choosing.
Running code in secure hardware or cloud environmentsteam-WIBU
Software protection has one prime mission: To prevent your software from being run and taken apart by a debugger. Paradoxically, this makes life harder not just for hackers, but also for legitimate developers trying to test their work and remedy any bugs that might be hidden in it. Now, with CodeMoving, you can take the leap into optimal protection: CodeMoving lets you move essential code into a secure CmContainer for execution far away from the prying eyes of would-be hackers. But how can developers test their work under these circumstances? The new generation of AxProtector comes with a simulation mode, built specifically for that purpose.
CodeMeter Protection Suite includes a variety of AxProtector flavors that make protecting applications easy. There are versions of AxProtector for native Windows, macOS, Linux, and Android applications and for applications in Java, .NET, Python, and JavaScript. AxProtector itself is available as a standard version for encrypting either entire applications or individual functions. File encryption, IP Protection mode, and CodeMoving are available as optional resources.
File encryption allows your application to load protected files, such as models used for AI. The IP Protection mode works against reverse engineering without your software needing a CodeMeter license and without CodeMeter being installed on the user’s system. With CodeMoving, you can have sensitive parts of your software executed in the secure confines of a CmContainer. This masterclass will show you how to make the most of CodeMoving, including the ability to test and debug even protected code.
With CodeMoving, you can create as many code fragments as you want for execution in a CmDongle or CmCloudContainer. To move the code, the application is encrypted with AxProtector; all functions to be moved are compiled and encrypted by AxProtector and normally kept in the application like their peers with regular AxProtector protections. While AxProtector decrypts and executes the function in question in the memory of the computer during runtime, CodeMoving first moves it into a CmDongle or CmCloudContainer to be decrypted and executed with the right input parameters. The output parameters are then returned to the application. CodeMoving is more secure than AxProtector used by itself, while regular encryptions with AxProtector offer better performance for the protected code. To find the optimal balance for your application, a combination of CodeMoving and functions encrypted with AxProtector is possible.
Subscriptions - Relationships built to lastteam-WIBU
Subscriptions range somewhere between the holy grail and the gold standard for software vendors. They have already become the norm in much of the consumer world, and they are becoming increasingly popular for commercial options as well. The secret to their success is not so secret at all: For the vendor, they promise a steady stream of income. For users, they offer affordable access to software without steep upfront costs for the licenses. The costs for maintenance and further development become more predictable for both sides, and users know that their software will always be the latest version available. Despite these many plus points, the decision to switch from straight-up sales to subscription models deserves some care and attention, as it can mean a drop in actual revenue in the initial transition period.
Beyond these financial considerations, the switch to subscription models also calls for some attention to the technical nitty-gritty. There is one technical hurdle that needs to be taken in any case: All subscription models need some form of channel between the vendor and the user – magical thinking is not enough, and telepathy is out of the question. Even in today’s hyper-connected world, this is still a live issue, as there are many devices that need to operate offline, maybe even in secure and cordoned-off environments. Speaking generally, there are two possible routes to consider:
* Licenses can be created as permanent licenses that work without any further intervention. When the subscription is cancelled, the license is turned into a temporary license or deactivated on the spot, ideally with a form of receipt to record that transaction. One major drawback of this choice is that licenses may still be used by more fraudulent users (e.g. those claiming that they lost the device they had bought the license for). And even for legitimate and upright users, there is little incentive to care about deactivating their licenses properly. Still, this straightforward option has the considerable advantage that it needs hardly any updates or interventions in the case of offline use.
* Licenses can be created as temporary licenses that are renewed on a regular basis. Should a subscription be cancelled in this case, the license is given a new fixed expiry date and is not renewed anymore beyond that time limit. From the point of view of license enforcement, this is the way to go, as it essentially prevents all fraudulent use after the planned expiry date. The approach does, however, need a mechanism for regularly updating the licenses, even if they are used in offline scenarios. Preplanned push updates by file transfer can facilitate this, with lots of automation opportunities to make the process as unobtrusive as possible.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfJay Das
With the advent of artificial intelligence or AI tools, project management processes are undergoing a transformative shift. By using tools like ChatGPT, and Bard organizations can empower their leaders and managers to plan, execute, and monitor projects more effectively.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.