Leading market surveys consistently put JavaScript, PHP, and Python at the top of the list of the most favored programming languages. Historically, these languages were sidelined when it came to protecting and licensing software. Software protection matters most in the desktop and embedded application domain, where C/C++ used to be the original top dog, but the last decade has brought the rise of Java and .NET languages as the new contenders.
JavaScript, PHP, and Python used to be the languages of choice for simple scripts or browser and other web applications, but with HTML5 applications and environments and frameworks like Electron and node.js getting more and more prominent and Docker containers providing a great way to deliver former web applications, this old demarcation line is a thing of the past.
One reason behind this recent upsurge in the popularity of JavaScript is the cross-platform potential of these languages, which makes the porting of applications to other platforms cost effective and convenient. At the same time, this behavioral change creates new conditions for licensing and software protection purposes.
The three strategies have unique strengths to match the use case and chosen tool chain.
Watch the webinar: https://youtu.be/7OpoDL6rr3U
Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...Michael Elder
Building apps to run in your local Kubernetes or managed Kubernetes environment is easy and straightforward. A common packaging mechanism based on container images and open source Helm to distribute your Kubernetes apps can be produced to your continuous delivery pipeline. These apps can then be deployed wherever needed. Deploying in your datacenter? Great! You can run Kubernetes with IBM Cloud Private anywhere! Want Kubernetes but don’t want to manage it yourself? Great! You can consume Kubernetes-as-a-Service with IBM Cloud Kubernetes Service! In this talk, we’ll demonstrate how to leverage each of these offerings to build and run apps. We’ll also cover some of the nuances of running in a hybrid cloud operating model.
Client Deployment of IBM Cloud Private (IBM #Think2019 #5964)Michael Elder
As you plan for the adoption of Kubernetes in your datacenter, you’ll face several common questions. How much capacity will your clusters need? How should you manage the network security of the cluster? How do you expose services on the cluster to your existing network fabric? What are the tradeoffs to consider between different storage providers? What should you do for backup and disaster recovery scenarios? In this session, we’ll review several examples of client deployment architectures that will help you get started on your journey to a hybrid, multicloud architecture for your apps!
An architect’s guide to leveraging your incumbencyMichael Elder
O'Reilly Software Architecture Conference 2018 (London)
Continuous delivery for 12-factor Microservices works because it’s by design. When you can architect a solution for continuous delivery, you control all the angles but what do you do when you don’t have that luxury? This session will highlight how modernizing existing IT infrastructure with containers enables you to manage change through continuous delivery and reduce ongoing operational costs.
Abstract
While the industry has promoted a dramatic trend to build new, improved styles of architecture; there remains a gap in how to address the ongoing and continuous improvement and operation of existing enterprise IT systems alongside these new 12-factor apps.
In this session, we will review why 12-factor apps are a natural fit for Kubernetes by design. We will demonstrate how Kubernetes addresses virtually all of the 12 factors for scalable web apps. Then we will take a step back and consider the important question: how well will stateful and transactional workloads that were not designed for 12-factor be able to run within Kubernetes?
Even with purist gaps from 12-factor for traditional enterprise workloads, there are real benefits to velocity and cost management to move stateful and transactional workloads to containers. With a container based orchestrator like Kubernetes, all workload types can take advantage of automated DevOps release pipelines, provide rich feedback loops with canary testing, leverage better automated failure recovery in production, and provide easier visibility into the operational health of services running within Kubernetes. Leveraging a standard platform for a blend of architectural types enables an enterprise to standardize operational practices for across the board. The end result might be the right path for your enterprise to drive your digital transformation.
A technical overview of IBM MobileFirst Platform that explains how it can solve key enterprise challenges for a successful mobile journey.
Learn more on how IBM MobileFirst Platform can help your business: http://ibm.co/1L1SttH
Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...Michael Elder
Building apps to run in your local Kubernetes or managed Kubernetes environment is easy and straightforward. A common packaging mechanism based on container images and open source Helm to distribute your Kubernetes apps can be produced to your continuous delivery pipeline. These apps can then be deployed wherever needed. Deploying in your datacenter? Great! You can run Kubernetes with IBM Cloud Private anywhere! Want Kubernetes but don’t want to manage it yourself? Great! You can consume Kubernetes-as-a-Service with IBM Cloud Kubernetes Service! In this talk, we’ll demonstrate how to leverage each of these offerings to build and run apps. We’ll also cover some of the nuances of running in a hybrid cloud operating model.
Client Deployment of IBM Cloud Private (IBM #Think2019 #5964)Michael Elder
As you plan for the adoption of Kubernetes in your datacenter, you’ll face several common questions. How much capacity will your clusters need? How should you manage the network security of the cluster? How do you expose services on the cluster to your existing network fabric? What are the tradeoffs to consider between different storage providers? What should you do for backup and disaster recovery scenarios? In this session, we’ll review several examples of client deployment architectures that will help you get started on your journey to a hybrid, multicloud architecture for your apps!
An architect’s guide to leveraging your incumbencyMichael Elder
O'Reilly Software Architecture Conference 2018 (London)
Continuous delivery for 12-factor Microservices works because it’s by design. When you can architect a solution for continuous delivery, you control all the angles but what do you do when you don’t have that luxury? This session will highlight how modernizing existing IT infrastructure with containers enables you to manage change through continuous delivery and reduce ongoing operational costs.
Abstract
While the industry has promoted a dramatic trend to build new, improved styles of architecture; there remains a gap in how to address the ongoing and continuous improvement and operation of existing enterprise IT systems alongside these new 12-factor apps.
In this session, we will review why 12-factor apps are a natural fit for Kubernetes by design. We will demonstrate how Kubernetes addresses virtually all of the 12 factors for scalable web apps. Then we will take a step back and consider the important question: how well will stateful and transactional workloads that were not designed for 12-factor be able to run within Kubernetes?
Even with purist gaps from 12-factor for traditional enterprise workloads, there are real benefits to velocity and cost management to move stateful and transactional workloads to containers. With a container based orchestrator like Kubernetes, all workload types can take advantage of automated DevOps release pipelines, provide rich feedback loops with canary testing, leverage better automated failure recovery in production, and provide easier visibility into the operational health of services running within Kubernetes. Leveraging a standard platform for a blend of architectural types enables an enterprise to standardize operational practices for across the board. The end result might be the right path for your enterprise to drive your digital transformation.
A technical overview of IBM MobileFirst Platform that explains how it can solve key enterprise challenges for a successful mobile journey.
Learn more on how IBM MobileFirst Platform can help your business: http://ibm.co/1L1SttH
Companio AG: Cpronto Business WhitepaperCompanio AG
Companio’s Cpronto is a uniquely powerful and easy-to-use software engine. For the first
time, users without extensive programming skills have a tool they can use to create their
own comprehensive business applications that integrate easily into existing IT landscapes.
Cpronto’s unique system design frees users and developers from programming work. With
the automated, location-independent and browser-based tool Cpronto, you can quickly
create customised applications tailored to meet your individual needs.
Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise AppsMichael Elder
Brad Topol & Michael Elder, IBM
“12 Factor” is a software methodology for building scalable microservice applications that provides best practices designed to enable applications to be built with portability, resilience, and scalability when deployed to the web. In this talk we provide an overview of the 12 Factor methodology and describe how the core constructs provided by Kubernetes can be leveraged to support the 12 factors for scalable web apps. In this talk we will provide live demonstrations of how Kubernetes can support 12 Factor for not only newer cloud native applications, but also for legacy enterprise middleware applications that include stateful and transactional workloads.
Programmatic Access to and Extensibility of the IBM SmartCloud for Social Bus...IBM Connections Developers
IBM SmartCloud for Social Business (IBM Connections in the cloud) provides an unique set of social and collaborative services like profiles, file sharing, community discussions and much more. Attend this webinar to see how to develop your own apps rapidly by leveraging these services from IBM Connections via the IBM Social Business Toolkit SDK. Additionally you will learn how to extend and customize IBM SmartCloud for Social Business via the extension framework.
Speakers:
Philippe Riand, IBM Collaboration Solutions Social Application Development Architect
Niklas Heidloff, IBM Collaboration Solutions Community Advocate
Mark Wallace, IBM Collaboration Solutions Social Business Toolkit SDK Architect
https://ibmdw.net/social
#8311: Transform the Enterprise with IBM Cloud PrivateMichael Elder
Does your organization need to improve development agility and operational efficiency? Does it also need to accelerate the delivery of applications to market? Bottom line: do you need to become cloud native with your application development, but face security and compliance challenges that limit your adoption of public cloud? The enterprise needs a platform on which it can create new, cloud native applications, modernize and optimize existing ones, and gain access to capabilities in public cloud for secure integration with applications being developed behind the firewall. The new IBM Cloud Private helps your organization meet these enterprise challenges. Come learn more about IBM Cloud Private and how you can leverage it.
Presented at IBM Think 2018.
Make Good Apps great - Using IBM MobileFirst FoundationAjay Chebbi
App developers tend to spend a lot of time not working on the user experience of the app. They need a helping hand to manage app security, app lifecycle management, enterprise connectivity etc. IBM Mobile First Foundation provides a platform. Use the Mobile Foundation service on Bluemix cloud.
Daniel Glueck - How Bosch develops for IBM ConnectionsLetsConnect
The session will give a technical overview about the deployment of IBM Connections at Bosch. It covers information about the infrastructure of IBM Connections, the development process and used tools. A live demonstration of the build and deploy process will be given.
Innomatic is the platform for building Enterprise and Multi Tenant applications in PHP.
This presentation is an overview of the Innomatic Platform Architecture.
.NET and Kubernetes: Bringing Legacy .NET Into the Modern World with Pivotal ...VMware Tanzu
SpringOne Platform 2019
.NET and Kubernetes: Bringing Legacy .NET Into the Modern World with Pivotal Container Services
Speakers: David Dieruf, Product Marketing Manager, Pivotal and Christopher Umbel, .NET AppTx Practice Lead, Pivotal
YouTube: https://youtu.be/nw6gI67l8GA
Companio AG: Cpronto Business WhitepaperCompanio AG
Companio’s Cpronto is a uniquely powerful and easy-to-use software engine. For the first
time, users without extensive programming skills have a tool they can use to create their
own comprehensive business applications that integrate easily into existing IT landscapes.
Cpronto’s unique system design frees users and developers from programming work. With
the automated, location-independent and browser-based tool Cpronto, you can quickly
create customised applications tailored to meet your individual needs.
Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise AppsMichael Elder
Brad Topol & Michael Elder, IBM
“12 Factor” is a software methodology for building scalable microservice applications that provides best practices designed to enable applications to be built with portability, resilience, and scalability when deployed to the web. In this talk we provide an overview of the 12 Factor methodology and describe how the core constructs provided by Kubernetes can be leveraged to support the 12 factors for scalable web apps. In this talk we will provide live demonstrations of how Kubernetes can support 12 Factor for not only newer cloud native applications, but also for legacy enterprise middleware applications that include stateful and transactional workloads.
Programmatic Access to and Extensibility of the IBM SmartCloud for Social Bus...IBM Connections Developers
IBM SmartCloud for Social Business (IBM Connections in the cloud) provides an unique set of social and collaborative services like profiles, file sharing, community discussions and much more. Attend this webinar to see how to develop your own apps rapidly by leveraging these services from IBM Connections via the IBM Social Business Toolkit SDK. Additionally you will learn how to extend and customize IBM SmartCloud for Social Business via the extension framework.
Speakers:
Philippe Riand, IBM Collaboration Solutions Social Application Development Architect
Niklas Heidloff, IBM Collaboration Solutions Community Advocate
Mark Wallace, IBM Collaboration Solutions Social Business Toolkit SDK Architect
https://ibmdw.net/social
#8311: Transform the Enterprise with IBM Cloud PrivateMichael Elder
Does your organization need to improve development agility and operational efficiency? Does it also need to accelerate the delivery of applications to market? Bottom line: do you need to become cloud native with your application development, but face security and compliance challenges that limit your adoption of public cloud? The enterprise needs a platform on which it can create new, cloud native applications, modernize and optimize existing ones, and gain access to capabilities in public cloud for secure integration with applications being developed behind the firewall. The new IBM Cloud Private helps your organization meet these enterprise challenges. Come learn more about IBM Cloud Private and how you can leverage it.
Presented at IBM Think 2018.
Make Good Apps great - Using IBM MobileFirst FoundationAjay Chebbi
App developers tend to spend a lot of time not working on the user experience of the app. They need a helping hand to manage app security, app lifecycle management, enterprise connectivity etc. IBM Mobile First Foundation provides a platform. Use the Mobile Foundation service on Bluemix cloud.
Daniel Glueck - How Bosch develops for IBM ConnectionsLetsConnect
The session will give a technical overview about the deployment of IBM Connections at Bosch. It covers information about the infrastructure of IBM Connections, the development process and used tools. A live demonstration of the build and deploy process will be given.
Innomatic is the platform for building Enterprise and Multi Tenant applications in PHP.
This presentation is an overview of the Innomatic Platform Architecture.
.NET and Kubernetes: Bringing Legacy .NET Into the Modern World with Pivotal ...VMware Tanzu
SpringOne Platform 2019
.NET and Kubernetes: Bringing Legacy .NET Into the Modern World with Pivotal Container Services
Speakers: David Dieruf, Product Marketing Manager, Pivotal and Christopher Umbel, .NET AppTx Practice Lead, Pivotal
YouTube: https://youtu.be/nw6gI67l8GA
Software License Models - Spicing up the Mixteam-WIBU
Over the last decades, licensing has evolved from a nifty way to prevent software piracy in the best case or a necessary nuisance in the worst to a true business enabler, as licenses are now the perfect means to realize business models in an economy that is virtually run by software. The advent of cloud computing opened up new avenues for licensing, as more monolithic models like permanent licenses or ‘dumb’ temporary licenses were replaced by more flexible options, with licenses ready to be renewed or even remodeled in an instant and over the cloud to match the user’s needs and the software developer’s business strategies. Subscription licenses, in particular, seem a match made in heaven or, indeed, in the cloud: Users benefit from direct access to the software bundles they want, often at a more affordable rate than the steep upfront costs of traditional software distribution. Software publishers in turn benefit from predictable revenue streams and the flexibility to update or remodel their offerings to go with the flow of the market.
Not all use cases, however, are born equal and the licensing concept that fits one business model might severely hamper another. Some users might be wary of the light, but permanent burden of subscription payments; some might want more flexibility to access only the features they need and when they need them, instead of constant access to a complete bundle. Still, others prefer the certainty of owning software outright as they are accustomed to, but with the mobility and flexibility they have come to love in the modern connected age.
Finding the shoe that fits seems an uphill struggle, but this is where Wibu-Systems’ CodeMeter comes into its own. With support for a vast array of licensing models from conventional single-user licenses to highly flexible pay-per-use, feature-on-demand, or subscription licenses, CodeMeter can model virtually any business model in license form. It gives software developers the ability to offer users as much freedom as they want without compromising on security. This includes borrowing licenses, a crucial option for smaller businesses in particular that want their employees to be able to access a limited pool of licenses at the point of need – for maintenance services in the field, for visits to clients, or for temporary work from home. CodeMeter uses special floating network licenses to make this possible, which are borrowed from and flagged as active in the pool and stored on a local license container for temporary use out and about. All this flexibility is made possible by CodeMeter with clever and easy-to-use license configurations.
Your Migration Map to a Comprehensive Protection and Licensing Systemteam-WIBU
If you think that people migrate from secure licensing technology A to secure licensing technology B mainly for pricing reasons, you’d better think again. With 30 years of practice in this field under our belt, we have been watching the market closely, and our own statistics tell a different story. For most of the cases we were called in to advise, the main trigger had to do with more complex protection and/or licensing needs that the ISVs had to comply with. Whether these were goals they set themselves to gain a stronger market positioning or the result of discussions the ISVs were having with their clients, whether the system the ISVs were migrating from was homegrown or from a dedicated DRM supplier, the result was always the same: technology demands had increased to such a critical point that the existent solution could not keep up. Upon reaching that fork, the ISVs could develop a custom upgrade and stray off course from their own corporate mission, or look for a mature, interoperable, comprehensive, and widely adopted technology, developed independently by a fully dedicated vendor.
The presentation deeps into the migration process of some of our customers:
The most frequent use cases for migrating to CodeMeter
Short overview of CodeMeter
A flexible licensing system (dongle, soft license, cloud)
Secure integration with CodeMeter Protection Suite
Easy delivery with CodeMeter License Central
Fully customizable and integrable license portal
Unified system for PC, IoT, IIoT, embedded, and the cloud
Migration approaches
CodeMeter Runtime / Binding Extension
Transition time for two systems running in parallel
CodeMeter as a secure ID
Complete conversion for each new major version
Exchanging dongles in the field
Patching old versions
Demos and best practices
Acquiring legacy data
Creating legacy licenses using CodeMeter
Generating a secure unique ID for third-party vendors
Encrypting an application that supports multiple licensing systems
What’s your story? Are you ready to leapfrog into the future of license and entitlement management? Join us and discover what you may be missing out on by staying with your current system.
Watch the webinar: https://youtu.be/NQEVALx6Fyw
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014IBM France Lab
Bluemix is an open-standard, cloud-based platform for
building, managing, and running applications of all types
(web, mobile, big data, new smart devices, and so on).
Monitoring your applications, get into a framework of proactive application fixing instead of reactive. And with IBM, reduce your outages with the of predictive insights.
Ivanti Momentum | What's New in User Workspace Manager 2020.2Ivanti
Join Oli Giordimaina as he goes over new capabilities in the User Workspace Manager 2020.2 update and learn how it continues to deliver a best-in-class digital workspace management solution. He’ll be going into detail on improving user experiences with the Windows Start Menu Designer, Windows Settings sync over VPN, and on-demand Windows 10 privilege elevation capabilities. Additionally, he’ll discuss enhanced functionality for IT teams with URL re-Direction for Edge Browser, authenticated web-proxy support, OneDrive Delta API support, and File Director administration tools.
Should I sue or should I encrypt? This question remains fiercely debated to this day whenever people discuss how to protect the intellectual property. The first option is the cure you can apply after you have fallen prey to piracy or reverse engineering, the latter a preventative choice that can help you stay safe from cyber attacks to your know-how. Together, they safeguard your IP comprehensively from a technical and legal perspective.
Intellectual property can come in all shapes and sizes, spanning from algorithms mapped in software to sensitive documents or data made available to service technicians for their maintenance work. From a technical standpoint, the arsenal of protections can include logical access controls, authenticity verification, obfuscation, and encryption methods - all options to be weighed and considered with an eye on the actual type of the IP to be shielded and the nature of the threat that IP is exposed to.
With CodeMeter Protection Suite, Wibu-Systems provides a whole battery of IP protection tools that you can integrate quickly and easily into your software. These tools are tailored to suit the specificities of the development environments and target platforms used:
AxProtector .NET protects applications and libraries created using the traditional .NET Framework or a .NET Standard 2.0 compliant framework
AxProtector Java is specifically designed for Java SE and Java EE applications
AxProtector and IxProtector protect native code developed e.g. with C / C++, Visual Basic, Delphi or FORTRAN for Windows, macOS, Linux, or Android platforms.
The latest version of AxProtector .NET introduces high-speed cache, which reduces the overhead inherent in system protection, improves the security of the protected application, and increases compatibility with many .NET applications.
The most recent iteration of AxProtector Java also supports Java 11 and 12 applications.
The newest versions of AxProtector and IxProtector add a modality for IP protection alone, which allows applications and libraries to be protected without the need to use CodeMeter as a licensing system. This option is especially interesting for anyone who wants to distribute applications for free, who uses other systems to license applications, or who is currently in the midst of migrating to CodeMeter.
Watch the webinar:
https://youtu.be/w6JFfv-mAUM
Cloud-Based Licensing in Offline Scenariosteam-WIBU
Using the cloud for software licenses is all the rage at the moment, especially for enterprise software where admins take over most of the day-to-day management tasks on behalf of the users in their organization. The advantages are obvious: Providers and users can access their license information at any time, and often usage data as well. Licenses can be changed on the fly; they can be created, updated, or revoked as needed. For admins, it becomes easy to actively organize which users can use which licenses on which devices.
Manufacturing facilities on the proverbial shop floor are, however, often not hooked up to the Internet, but instead run offline and fully autonomously. The reasons for this are obvious: Machines will not suddenly come to a standstill should the Internet connection break down. This could lead to massive costs down the line – just imagine a furnace falling cold in a steelworks. At the same time, keeping machines separate from the Internet protects against cyberattacks and sabotage. Attackers cannot tamper with devices they simply cannot reach.
As part of Industry 4.0, more and more manufacturing data is sent over the Internet, e.g., for predictive maintenance. In most cases, the data is captured and passed onto the Internet via dedicated gateways. Still, there is no direct Internet connection on the shop floor for the reasons named above.
What does that mean for licensing? A lot, for architectural purposes. The servers needed to create and manage licenses are usually on the Internet. The users, like the operators of manufacturing lines, need to activate the licenses directly on the computers and devices on the shop floor. As with the data collected for Industry 4.0 purposes, this works without a direct Internet connection. All that is needed is an intermediate medium, which can be a regular PC, to move the license from the online to the offline world. If need be, this can happen completely offline by physically sharing data.
In this webinar, we will follow the process of activating licenses with an offline device and CodeMeter License Central in detail. Which data is needed at what point? How can that data be shared? Which steps are optional and can be skipped for the offline process? And how does CodeMeter License Central make all of this simpler?
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!JessiRyan1
Innominds’ low code app development platform, iSymphonyTM, is built specifically targeting the captive and client needs of ISVs and enterprises to deliver applications with markedly reduced time and improved quality. It accelerates processes across the Software Development Life Cycle (SDLC) with automatic generation of standards-based code, open and flexible APIs, cloud-native and microservices-based architecture, and one-click deployment.
Developing for Hybrid Cloud with BluemixRoberto Pozzi
How can you get all the benefits of developing your application in the cloud and guarantee a secure integration in a Hybrid Cloud scenario?
This deck, presented at IBM CloudKnow event in October 2014, explains how to do it with @IBMBluemix, the Platform as a Service solution from IBM.
The application is available on http://cloudknow-italy-web.mybluemix.net/home.html.
Monetizing Software, Machines, and Materials with New Business Modelsteam-WIBU
There was a time when traditional software publishers could generate substantial revenues with simple one-off sales. As the digital market kept growing and users became more skilled and demanding, the whole process had to be redesigned to lower the upfront investment, instill a sense of trust and dependability between supplier and buyer, and produce recurrent and dynamic income. In the industrial realm, this topic has become more relevant and pressing, driven by recent developments in machine connectivity, the globalization of manufacturing processes, and the interest in customized manufacturing for production runs of maybe even only single pieces.
While subscription models have customers paying a constant fee for every subscription term you set, regardless of whether they actually use the product or service, pay-per-use allows them to pay on the go for the machine lease, the consumables, the raw material, or the software package they specifically requested, at the time they really need it. The risk for you? The lower initial revenues when you first introduce this model are more than compensated for as the relationship with your customer deepens and you adjust your offers to their requirements. Best practices recommend introducing this model gradually alongside existing systems and fine-tuning the process as you analyze customers’ behaviors and spot specific patterns.
CodeMeter License Central offers licenses with unit counters and automated processes, which makes pay-per-use models just as simple to handle as permanent or subscription licenses. You are still free to choose your favorite secure element for storing the licenses: CmDongle, CmActLicense, or server in the LAN or in the Cloud. The processes to create or renew licenses are easily integrated or automated. Automatic billing is just one step away with the streamlined integration of CodeMeter License Central into all mainstream ERP, CRM, and ecommerce platforms.
In this presentation, we go through the whole lifecycle from a number of success stories that will get you inspired to the whole set of actions that will get you started. Here are the main topics:
Application of pay-per-use licensing models in different scenarios
For software
For machines
For materials
For building plans
Technical implementation with CodeMeter
Mapping out a pay-per-use license
Licenses per action
Licenses per term
License creation
License renewal
Downstream billing
Controlling the use of consumables
Sale of own material
Licensing of third-party material
Opportunities and challenges relating to pay-per-use licenses
First, think. Second, believe. Third, dream. And finally, dare. With CodeMeter, you have a powerful ally.
Watch the webinar: https://youtu.be/n-Robn91NQE
Similar to Licensing for cross-platform applications made with Python, PHP, and JavaScript (20)
Post Quantum Cryptography – The Impact on Identityteam-WIBU
As PQC continues to be a major topic for many companies and Government Institutions, we take a dive into the topics of quantum computers, post-quantum-cryptography, and the potential relevance for (ID) use cases.
This seminar would like to present the principles of the technology and the latest developments in this field as well some indication as to the relevance, impact, and consequences on (Government) ID projects or use cases. The seminar may also look towards the relationship with these projects not only from a hardware standpoint but also from a software algorithmic stance as we migrate from current used crypto systems to quantum-proof systems.
KEY TAKEAWAYS
What is a Quantum Computer, what is Post Quantum Cryptography and when will we see a quantum computer?
The migration from current crypto systems to quantum proof systems.
How will PQC and QC affect (Government) ID projects and implementations.
What will QC mean for the security proofing of ID and Information in the future.
TARGET AUDIENCE
Interested parties in the field of Identity and Security.
Government bodies looking to the future for ID document management systems
Enterprises looking to understand the potential impact of QC upon their business and industries.
PRESENTATION: Cryptoagility and Quantum Resistance: Easier Said Than Done.
Ever since the publication of Shor’s quantum algorithm for the factorization of large numbers, it has been known that quantum computers could at some point pose a threat to our communication and data security. Today we have cloud access to small, functioning quantum computers. The answer to this threat is quantum-resistant cryptography: cryptographic methods for classical computers that are robust against attacks by quantum computers.
The standardization of such methods is currently ongoing. However, these methods are based on mathematical problems, that are much younger than the factorization problem already investigated by Euclid. On the other hand, currently used cryptographic methods such as RSA or ECDSA are broken as soon as a sufficiently large quantum computer exists. Cryptoagility is therefore recommended, software should be built or modified in such a way that cryptographic algorithms are easily substitutable. But how great is the danger posed by quantum computers? To what extent is cryptography affected, and when do we need to take action? Is cryptoagility really so easy to implement in practice or is this perhaps much easier said than done?
Unlocking the Future: Empowering Industrial Securityteam-WIBU
In today's fast-paced digital era, where industries globally are evolving through rapid digital transformation and digital assets form the core of industrial innovation, ensuring software integrity, safeguarding intellectual property, and enabling software monetization through sophisticated and adaptable software license management systems are of utmost importance.
In the realm of IoT devices and PLCs (Programmable Logic Controllers), memory cards frequently serve as an essential component of the infrastructure. Recognizing this, we've chosen to expand upon this foundation by enhancing an already crucial element in practical scenarios with additional functionalities. This strategic extension aims to not only fulfill a fundamental requirement but also to elevate the utility and performance of these devices by integrating advanced features into the existing framework.
Join us for a webinar that showcases the groundbreaking collaboration between Swissbit and Wibu-Systems, introducing CmReady – a revolutionary solution at the nexus of state-of-the-art technologies designed to meet these critical needs.
What is CmReady?
CmReady revolutionizes software protection and licensing by enabling the binding of a CmActLicense – a software license container – to a certified CmReady memory device in the form factor of an SD or microSD card, rather than tethering it exclusively to the target device running the protected software. This innovative approach grants unparalleled mobility to CmActLicenses, equating their portability with that of traditional dongles, yet with the added convenience and flexibility of removable memory devices.
Why CmReady?
Industrial memory cards, integral to manufacturers for specific project needs, already populate the field in diverse capacities and features. Recognizing the necessity to enhance these deployed units for increased sustainability, CmReady emerges as a groundbreaking solution. It not only upgrades existing memory cards with new functionalities but also transforms them into secure anchors for IP protection and software licensing. This innovative approach ensures that existing infrastructure can adapt to evolving security demands without the need for complete replacement, representing a leap forward in sustainable technological advancement.
All the Benefits of CmReady in a Nutshell
With CmReady, industrial customers gain access to a plethora of benefits:
Portable licenses bound to CmReady memory cards
Effortless activation and renewal processes
Seamless compatibility with CodeMeter Runtime starting from release 8.00 and CodeMeter Embedded starting from release 3.00
Plug and Play functionality, eliminating implementation hassle
Enhanced data protection and integrity features, safeguarding against piracy and unauthorized access
The Power of Partnership: Enabling Success Togetherteam-WIBU
A common piece of wisdom highlights the value of collaboration over solitary efforts. Working together, partners can pool their resources and expertise, achieving greater results than either could alone. This is particularly true when partners possess deep industry knowledge or local insights, like language and customs.
Another key insight is the benefit of enabling partners to operate independently. This approach can lessen your workload, accelerate the delivery of solutions, and enhance partner satisfaction by granting them more control and autonomy.
To achieve this, providing partners with the tools and knowledge for self-sufficiency is essential. While setting up processes with a partner may initially require more effort than handling tasks yourself, this investment in empowerment is sustainable and ultimately more rewarding.
These principles are universally relevant, particularly in the realm of software sales. CodeMeter License Portal is designed to facilitate this process with your partners. It can be tailored to fit various use cases and integrate with your existing processes, such as those in your ERP system, ensuring a customized and effective partnership.
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
Over the history of Wibu-Systems, there have been certain recurring reasons that have brought customers to select the CodeMeter protection and licensing solution: usually, these are hacking of software, revenues lost, the long-term limitations of a homegrown solution, the wish to supply multiple licensing models, or the plan to integrate licensing into an existing back-office system. However, once primary licensing needs are met, there is still a number of features that remains underutilized or not explored at all, just as is the case with smart phones or basic office applications.
Whatever features you rely upon most with CodeMeter today, it can make sense for you to get acquainted with the complete set of options at your disposal, optimize your processes even further, and make full use of the investment you have made. Additionally, the new generation of CodeMeter offers some special features that we are first to introduce to the worldwide market.
This webinar is a great opportunity for our current CodeMeter customers as well as those who are early in their journey towards automated license lifecycle management; both can get a complete overview of the special features of our technology and the best practices we strongly encourage. And, all should be aware that several features of CodeMeter are supplied with free lifetime maintenance included.
Discover the product highlights and the latest innovations that come with the latest version of CodeMeter.
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
Für Softwarehersteller oder Hersteller von intelligenten Systemen ist Lizenzierung ein wichtiger Bestandteil der Monetarisierungsstrategie von Software und Geräten. Nur mit Hilfe einer Lizenzierungslösung wie CodeMeter ist es möglich, das wertvolle geistige Eigentum zu schützen und gleichzeitig Raubkopien zu vermeiden, und dadurch ein Maximum an Lizenzen an die Kunden zu verkaufen. Auf der anderen Seite ist für die Anwender aber auch wichtig, dass die erworbenen Lizenzen kontinuierlich zur Verfügung stehen. Einen Produktionsausfall aufgrund nicht vorhandener Lizenzen gilt es unter allen Umständen zu vermeiden. Das gilt nicht nur für automatisierte Fertigungslinien beispielsweise in der Automobilindustrie, sondern auch bei Anwendungen innerhalb kritischer Infrastrukturen oder für Unternehmen, die global tätig sind und regional auftretende Ausfälle vermeiden müssen, aber auch keine Zeitfenster mehr für Wartungsarbeiten haben.
Die kontinuierliche Bereitstellung von Lizenzen ist bei Ausfällen von Teilsystemen ein wichtiger Aspekt für bestimmte Kunden und Branchen. Dies wird über eine ausfallsichere, hochverfügbare Lizenzierungsumgebung CodeMeter TMR-Server realisiert. TMR steht dabei für „Triple Mode Redundancy“ und kombiniert ein Konzept ausfallsicherer Lizenzverfügbarkeit (2-aus-3) mit bewährter Rechenzentrumstechnologie. Ein Cluster aus fünf Servern, davon zwei Load-Balancer und drei Lizenzserver, agiert dabei als ein Verbund-System. Solange zwei der drei Lizenzserver sowie ein Load-Balancer verfügbar sind, bleibt die gesamte Lizenzierungsumgebung betriebsbereit und garantiert damit eine Hochverfügbarkeit der Lizenzen für die Anwender.
Das Webinar gibt einen Einblick in den grundlegenden Aufbau und die Funktionsweise des CodeMeter TMR-Servers.
No Time to Idle – License availability for business continuityteam-WIBU
For software developers and the makers of smart systems, licensing is a key element in their software’s or hardware’s monetization strategies. Licensing solutions like CodeMeter empower them to protect their invaluable intellectual property, prevent product piracy, and sell as many licenses as possible. At the same time, their customers want to know that the licenses will actually be available whenever they need them: Losing valuable working hours or having your machines running idle because of a missing license would be the worst-case scenario. This goes for modern, automated production lines as are common in the automotive industry and elsewhere, but it can be even more relevant for applications running critical infrastructures or for global enterprises that cannot afford to waste their limited maintenance opportunities or even shift operations from continent to continent simply because one regional license is missing.
No Time to Idle: Making sure that licenses are reliably available to avoid systems or parts of systems falling idle might not be a matter for a 00 agent of His Majesty’s Secret Service, but it can be a matter of commercial life and death for many companies or sectors of industry. This is where CodeMeter’s Triple Mode Redundancy comes in: A high-availability licensing environment that uses a concept of two-out-of-three fail-proof TMR servers and robust data center technology. A cluster of five servers, including two load balancers and three license servers, works together to make sure that the licensing environment keeps doing its job as long as two of the three licensing servers are up and running. This guarantees that licenses are available for their users whenever they need them.
This webinar offers an insight into the design and operation of the CodeMeter TMR server concept.
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
In principle, there are two different approaches to cloud licensing: On the one hand, licenses can be created, managed, and updated via the cloud. However, the licenses are actually located on the local device and can be used offline, at least for a certain period of time. On the other hand, the licenses can be used directly in the cloud. This case requires a permanent online connection to the server in the cloud. Especially if the number of licenses used simultaneously needs to be counted reliably, such a connection to the license server is inherent. In the webinar, we will look at best practice tips for this "license server" use case.
For "always-on" licenses, CmCloudContainer is the best solution from the CodeMeter product family. The license server is operated by Wibu-Systems for you in the cloud. You create a CmCloudContainer, transfer the licenses in advance into this CmCloudContainer, and send your customer the access data (credential file). When creating the CmCloudContainer, you can choose between a Personal Container and an Enterprise Container.
The Personal Container is typically used as a container for a user (person). They can have the container active on up to three workstations. Through the License Quantity, you define on how many workstations the user can use your software simultaneously. Three active workstations do not automatically mean three licenses for simultaneous use; by default, a match of one license on one workstation is set.
The Enterprise Container is used when multiple users share a license, almost like a license pool. From an installation point of view, there is the possibility to set up a local proxy CodeMeter license server. All users access this server and do not need direct access to the cloud. This case is mainly used when devices on the shop floor are indirectly connected to the cloud via edge devices.
Alternatively, all users or devices consuming licenses can communicate directly with the CodeMeter Server in the cloud. Mixed forms of direct and indirect access through several local license servers are also possible. The exciting question here is how to disavow a device or user from the list of units of people that were initially granted access rights.
Here is where CodeMeter License Portal comes in handy and provide a turnkey solution. You and your customers create groups and users. Each user can access two CmCloudContainers, their own Personal CmCloudContainer, and the Enterprise CmCloudContainer of the group to which they belong. Depending on the use case, you can either leave the choice to your user or make it transparently in the background for them.
“A fistful of licenses” is no problem: You simply create them manually with CodeMeter License Editor or the command line tool CmBoxPgm. But “for a few licenses more”, you should think about automating the license creation, distribution, and management process. Enter CodeMeter License Central! As in Ennio Morricone’s famous western, where the Man with no Name and Colonel Mortimer team up to beat the bad guys, the unique strengths of CodeMeter License Central and ERP systems work best when they work together. They are not opponents, but perfect companions.
Depending on your use case, you need to decide which system should take the lead for licensing: the ERP system or CodeMeter License Central? You can also mix and match them both in a hybrid setup if you need to account for different workflows. One typical use case would be a combination of subscription licenses sold either directly by you or distributed via a reseller. In this situation, your resellers could create their licenses via a portal with CodeMeter License Central, and the ERP system is notified each month about the number of active licenses for an aggregated bill for the reseller. You could even sell more subscriptions directly by moving them from the ERP system to CodeMeter License Central. Alternatively, you can run reseller licenses first through the ERP system or direct-sale licenses first through CodeMeter License Central.
To make the link between the ERP system and CodeMeter License Central, you have a choice of a simple or a sophisticated SOAP interface, a generic connector with a REST-like API, or some custom layer to slot in between the two sides. When using the generic connector and a custom layer, you can adjust the operating logic to suit your specific needs, letting you respond to any changes in your requirements with little interventions and expansions that do not force you to move everything into the ERP system.
For SAP, you have two turnkey solutions ready and waiting: Our partner Informatics has created a framework for integration in SAP, typically used in the SD (Sales and Distribution) modules. Alternatively, CodeMeter License Central can be contacted directly from SAP’s EMS module.
One important aspect is the backchannel between CodeMeter License Central and the ERP system. When the ERP system is in the lead, the backchannel can feed back information about the current state of licenses, e.g. whether and where they are activated. All of this information can be sent via the notification dispatcher (push) or requested by the ERP system when they are needed (pull). If licenses are created in CodeMeter License Central, the backchannel is still key for the ERP system to bill those licenses, again with push or pull options available.
The Industrial Internet of Things has well and truly arrived, with manufacturers around the world having access to a vast assortment of smart machines with clever app features for tailoring their functionality perfectly to their needs. But where to start? To really kick off the connected, app-driven, and smarter industry of tomorrow, end users need an app marketplace that they trust and know how to use, with apps that they know will work on their equipment, and everything with confidence in legal, commercial, technical and – not least – security terms. The Open Industry 4.0 Alliance, Hilscher, and Wibu-Systems have come together to showcase how this can be done with the OI4 Community App Store, Docker containers for interoperability, and CodeMeter for safe operations and secure intellectual property.
Today, the world of industrial applications is very diverse and forms a complex ecosystem that entails a multitude of technical requirements. Due to the current complexity of the brownfield environment, a broad acceptance of existing applications and their ease of use are bogged down, if not made even impossible.
The overarching goal is to place the user experience first and foremost so that end users can move to the ecosystem of their choosing, without being permanently tied to a particular infrastructure. Wider choice, more flexibility in deployment, and rapid response to changes are the direct results of these greater freedoms.
As we all know, digitization is now in full swing. Triple-digit billions are being invested in this sector, with everyone, regardless of their role in the value chain, expecting increased productivity and shorter delivery and setup times. The end game: improved inventory management, shorter market entry cycles, reduced batch sizes, and sustainability in the form of energy efficiency and optimization of the resources utilized.
The Open Industry 4.0 Alliance (OI4) gathers manufacturers and providers of Industry 4.0 solutions and services worldwide aimed at successfully transitioning customers to the Industrial Internet of Things. The group has developed a joint approach with all its members to reach tangible results on the path towards a complete digitization of the manufacturing industry.
Three main stakeholders come into play:
1. The application providers, who bundle their expertise in professional apps and make them available to a broad market;
2. The store operators, who provide the end users with a large number of applications and map legal, commercial, and technical aspects in their systems;
3. The end users, who don’t want to deal with the complexity of different store systems and expect trustworthy platforms.
Hilscher, a name that has stood for trendsetting automation solutions for over 35 years, and Wibu-Systems, a global leader in software monetization via protection, licensing, and security, are members of OI4 and ready to demonstrate this constructive attitude during this live masterclass.
Protecting and Licensing .NET Applicationsteam-WIBU
.NET has seen a surge in its popularity as a development platform since 2018, powered not least by the multiplatform capabilities introduced with .NET Standard. According to the Tiobe Index, C# currently ranks in fifth spot as a choice for developers in .NET, outranked only by Python, C/C++, and Java. Python is particularly in demand for internal projects or automation use cases, as Java is for servers, and .NET for end user devices. For traditional standalone and client applications, it is safe to say that .NET is a sure second choice alongside C/C++.
Security matters, and it matters especially when applications are run out in the field, on an end user’s device. This is true for the end users themselves, as they don’t want their machines affected by malware or other harmful code, which is usually avoided by solutions like signed code. But it is also true for software developers who want to protect their work from piracy or IP theft. .NET differs from C/C++ in that the source code does not go through a compiler to run as machine code on a specific platform. Instead, it is turned into intermediate code that can still run on multiple platforms. The downside to this is that the intermediate code remains accessible for snooping and tampering by would-be attackers. License checks can be removed or replaced by forged ones, and business secrets contained in the code may simply be stolen.
Our answer: AxProtector .NET from our CodeMeter Protection Suite. AxProtector .NET works perfectly with code signatures, meaning developers do not have to make that decision between security for the end user or protection for their own IP. They can, and should, have both.
AxProtector .NET makes clever use of the easy legibility of the intermediate code: it extracts all the classes and methods contained in a .NET assembly and encrypts them piece by piece. The encrypted code is then placed back instead of the original code.
During runtime, the methods are decrypted on the fly when they are called for. The actual intermediate code remains in the device’s working memory only for a brief moment to run through the Just In Time Compiler (JIT) and create the machine code, and then it is erased from memory. A native C/C++ component, CPSRT, takes over part of the decrypting and runs cyclical security checks in the background. By comparison to a straight-up .NET solution, adding this native component increases the security of the system again. CPSRT is available for most common platforms and processes, including Windows, macOS, Linux, Intel x86 and x86-64 as well as ARM and AARCH64. It does not normally mean any limitation to the application’s ability to run on multiple platforms.
Rolling out or updating licenses should be as simple and straightforward as possible. CodeMeter already comes with lots of workflows for the purpose on its License Portal. Many jobs can be automated through that portal, and the work for the user reduced to a few simple clicks. However, all of this needs a user who would manually start the activation or updating process. For larger organizations that depend on up-to-date transparency about the licenses that are active in the field, the License Portal is also the optimum solution.
But how could you streamline the process on the user’s side even more? This is where a bit of magic comes into play in the form of the Software Activation Wizard.
CodeMeter has many different use cases covered with a choice of source code examples for different developer languages to help you put in place your own Software Activation Wizard to match your processes, workflows, and requirements. All you need is CodeMeter License Central and the right gateways in the cloud.
There are many use cases that could include automatic license updates, such as:
Adding or removing features
Revoking entire licenses
Automatically renewing subscriptions after payment has been received
Updating service technicians’ licenses
Automatically renewing maintenance contracts
Locating or locking lost licenses
An automatic update removes the need for the user to do anything. Nobody has to be reminded to activate an update over the License Portal. Not only is this easier and more comfortable for the user, it also gives you, as the vendor, full control over the process. The Software Activation Wizard can become a perfect fit for your business by being integrated in your software and tailored to your processes and your corporate design.
Automation saves costs, and it gives you a great means to collect data and retrieve it via CodeMeter License Central. One popular option is to register users during license activation, which is particularly appealing when your licenses are sold through diverse channels, but you still want to know who your users are in the wild. This even works with free software: it can be activated and registered in the same manner, with the license created in the background during activation, and you will know who is using your software.
The first step is always the most decisiveteam-WIBU
“You don’t get a second shot at a good first impression.” We have all heard this deceptively simple saying. It applies to your and our relationships with potential new customers, but it also applies to your first impression of working with our software protection and licensing technology CodeMeter. Workflows that used to be state of the art only a few years ago are no longer accepted without question today. Just think of the old habit of distributing trial versions of software on CD-ROMs or DVDs at expos. Nobody does so anymore, because very few people have the necessary drives left on their new computers. As a software developer or vendor, you will recognize many of the challenges we at Wibu-Systems face when it comes to providing test versions of our product to potential clients. That is why we have prepared a webinar to share our ideas and experiences with designing the new evaluation process with you. In this masterclass, you will discover the workflows we use with our clients, with a look behind the scenes to show you how and why we do it this way. You can do everything we have done in this process yourself with CodeMeter for your own processes.
In the past, Wibu-Systems delivered its test versions through the mail, i.e. a physical SDK toolkit including two dongles and a DVD. The disadvantage is obvious: Potential clients had to wait for the package to arrive before they could test our technology, and they had to have a DVD drive to use the included disc. In short: We needed a new approach. Our goal was to enable our clients’ testing team to start their tests immediately, while keeping the cryptographic keys needed for the process as secure as they were on the hardware-based CmDongle.
The combination of CmCloudContainers and CmDongles means that all possible requirements are covered. The cryptographic keys are always kept safe; users with online access can start to test the software immediately, and users forced to go the offline route can still carry their licenses and keys around on the CmDongle. Should the situation change later on, everything can be switched around as needed.
The CodeMeter Developer Portal is modelled on the CodeMeter License Portal. If you want, you can copy our choice of offering a combination of dongles for offline scenarios and cloud containers for a faster response. You can also get access to the CodeMeter Evaluation Portal, a trial version of the License Portal that lets you review the processes from your specific vantage point and see in action how you would produce trial versions of your software or even enable your sales partners and resellers to do so.
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
Bus operators depend on their vehicles, and any spare parts they need have to be available as quickly as possible. Up to now, this meant massive local stocks or complex on-demand logistics, but now digitalization is hailing in a new age. The owners and operators of Mercedes Benz and Setra busses can now produce the parts themselves with 3D printing. All they need for these mini-factories are a certified 3D printer and the licenses for the parts they want to print. Wibu-Systems’ CodeMeter provides the technological basis for a secure digital process chain with full control over how many parts can be and are printed on the ground.
Additive manufacturing was long considered a technology for nerds or select specialists. There were too many technical challenges still to be overcome, and the cost of 3D printed parts was far too high compared to conventional manufacturing. But times have changed, and many of these problems have been solved. New service concepts are being introduced and are already creating new global, digital markets. Our webinar introduces the solution thought up by Daimler Buses in partnership with the 3D printer specialists Farsoon Technology and the CodeMeter security technology of Wibu-Systems. The system solves two essential problems: The protection of the digital object data and the monetization of the entire process with a reliable license management system.
The challenge is to be able to produce parts wherever and whenever they are needed. This promises a new field for service providers to get active in, offering 3D printing services for their clients. However, when the parts are processed and printed by a third party, there need to be systems in place to protect the intellectual property involved and to make the entire value chain correctly traceable and, crucially, billable. This is where Daimler Buses has found a solution with the potential to revolutionize the current conventional parts business. The system creates exciting new prospects for the service business and for the availability of spare parts, both economically and ecologically speaking.
Many parts and components are now available in digital format on the OMNIplus 3D printing license shop. Bus operators and service partners around the world can purchase these and produce them at their leisure and at the point of need. The parts are provided as encrypted downloads. As in any online store, the buyer adds the right items to their cart. At the checkout, the buyer then receives a preprinting license to prepare the print job with the Buildstar® software made by Farsoon Technologies and the actual printing license for the right number of parts. The licenses can then be used with the Makestar® software on Farsoon-certified 3D printers. Both protected and unprotected parts can be combined in one job to reduce the printing costs. Order processing is handled by the combination of CodeMeter License Central and the SAP system already in place at Daimler Buses.
Authenticate and authorize your IIoTdevicesteam-WIBU
“Who’s who” is an important question, not just for the publishers of biographical encyclopedias. Identities and reliable ways to identify people, devices, and real or virtual objects have become more important than ever before as much of our lives, including the industrial world, has gone digital. The new opportunities coming from this also contain new challenges: From biometric passports making travel safer and more secure to eID technologies facilitating virtual transactions and digital certificates establishing themselves as the technology of choice to authenticate devices and actors in the industrial IoT, the tech world is exploring how identity can be represented both online and offline.
Digital certificates are a great tool to uniquely identify people or devices with the tried-and-tested reliability and security of a pair of cryptographic keys acting as the currency of trust: One key is public and confirmed by a neutral authority, the Certificate Authority, to belong to the person, device, or digital object, and the other is private and secure. With a certificate signed with that private key and the private key stored safely away from prying eyes, there should be no way to tamper with or steal the identity it confirms.
CodeMeter Certificate Vault is our answer: The keys are kept safe and the necessary cryptographic operations handled in the smart card chips embedded in our secure hardware elements, our CmDongles. But CodeMeter Certificate Vault is more than that: It acts as a PKCS#11-compliant token provider, acts as a go-between when keys need to be accessed, e.g. through the OpenSSL API, it works perfectly in the important M2M communication standard OPC UA, and it simplifies the often laborious process of distributing and managing certificates by bringing the whole comfort and great performance of CodeMeter License Central to the certificate world. Key pairs are created, bound to their intended container, and packaged in a secure file that can simply be shipped over to their destination. With CodeMeter’s award-winning encryption, the entire process is safe from theft and tampering. In his talk, Guenther Fischer will look at three use cases that show the power of CodeMeter Certificate Vault in action.
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
"Pricing policy is an executive matter" – this should underline how important it is who defines prices and how they are defined. If the price is too steep, you scare off potential customers and lose revenue. If the price is too low, you may win more customers, but the revenue will plateau at some point, because the increased numbers will not make up for the financial shortfall. Low prices naturally affect profits, and sometimes dramatically so.
For software developers, retail prices are directly related to different licensing options. The most common choices are still the traditional "One-off purchases" or "One-off purchases with maintenance contracts". But there are more and more software vendors offering more modern models like subscriptions or consumption-based licenses.
This webinar will cover both the commercial and the technical sides of these licensing models, specifically consumption-based models. For pricing decisions, two factors matter most: "What does it cost me to produce the software?" and "What is the software worth to our customers?". In many cases in the market, the second question ought to take precedence both when calculating prices and when trying to sell the actual software: "This printer can print 1000 pages" might be a great statement for gadget lovers. But when trying to sell the printer’s real added value, it should be "This printer is 20% faster and can save you a lot of expensive labor."
Modern licensing models can benefit from using cloud solutions, as the cloud makes it easy to capture and collect usage data immediately and renew subscriptions on the fly. But has the whole world really gone online already? Our experts at Wibu-Systems know: That is not true. In industrial shopfloor scenarios in particular, there is so much legitimate concern about cyberattacks, sabotage, or data theft that many devices are not always available online. Often, outbound connections through dedicated gateways are the limit of what can be accepted. And availability is also another legitimate worry for many users of cloud services. It only takes a misguided shovel, and the fastest fiberoptic interconnection is cut and production comes to a standstill. What good is a 20% faster connection with a network printer, if the printer has been physically cut from the network? All the time and effort saved with modern connectivity is quickly lost again to such incidents.
The technical part of the webinar will cover the concrete ways to implement consumption-based licenses with CodeMeter.
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
Nobody would eat a whole salami from end to end. We might all want to, but we wouldn’t try (or manage). Instead, we proceed slice by slice. This strategy, also called the salami tactic, can be applied to many other walks of life, and software licensing is one of them. Over their evolution, many software products tend to get bigger and bigger as the developers try to fulfil new user expectations or add new technology capabilities. Some call this bloat, but it is actually a reasonable way of responding to a growing user base with a growing set of needs and expectations. However, few users will need all of the features at once. Usually, they only need a few selected features, creating a dilemma for software developers and their clients: Users don’t want to pay for things they never use, but developers don’t want to give their work away for free.
This is where the salami tactic comes back into the picture. Called features-on-demand in the software world, it means that the users are not forced to buy or pay for the entire package (or salami), but only for the features (or slices) they want. Although the term had negative connotations for its originator, Zoltán Pfeiffer, the salami tactic is a great example of a win-win strategy. The seller gets their software to the user at a lower entry price, and the users have the opportunity to spend more for the features they want on top.
Security and Protection for Machine Learning.pptxteam-WIBU
Machine learning. We believe that it has the potential to be a game changer that will transform the course of our future. But what actually is machine learning? The term refers to training an artificial intelligence with typically massive sets of data. The resulting trained model can then predict other data. To illustrate this, we can see how medical data could be processed automatically by an artificial intelligence.
Think of a doctor screening a patient for TBC. The doctor takes a look at the X-ray image to tell whether the patient is infected or not. This needs years of training and lots of experience. A trained AI could do the same job much more efficiently and make the technique available even to general practitioners. Imagine that a maker of TBC screening systems produces a system that read the X-ray scans and make the diagnosis by itself. All it needs is a good set of X-ray images with the right diagnoses attached. The system is trained with these scans to produce a model that can predict the diagnoses for future scans. What is immediately clear is that the data that the machine is being fed with has to be sound: All incorrect or flawed data has to be screened out, and the meaningful data has to be identified and correlated. The model that slowly grows from this process becomes the intellectual property of the manufacturer. And as soon as intellectual property comes into the picture, we get problems: There will be counterfeiters trying to build similar systems by abusing the property of the original maker. There might even be outright saboteurs who want to manipulate what the system can do in practice.
Latest at this point – much sooner, if you ask us – the device maker should start thinking about ways to protect that IP. The IP comes in multiple forms: It is the data used originally to train the model, the training setup itself, and the eventual trained model. It does not matter whether the model in question is a virtual system operating in the cloud or an actual device sitting on a desk in a doctor’s surgery room somewhere. At stake in both cases is a data model that can be accessed via the physical device and that needs to be securely stored in the cloud. And for both threats, CodeMeter has a perfect solution: Encrypting the model to protect it against unauthorized use, copying, or espionage.
Nobody enjoys being bossed around. Nobody enjoys having their every move monitored, especially if the checks and controls make life harder than they should. But if everybody did what they wanted, there would be anarchy. And the same is true for software licensing: Without any protections, your software will eventually fall victim to thieves and pirates. Tough and strict controls can help minimize that risk. Tools like CodeMeter Protection Suite make it easy to encrypt software and bind it irrevocably to a license. But when things go wrong – maybe the computer with the license breaks – it can mean that the user cannot keep working with their software on a new device.
This is where a license portal comes into play as the perfect self-service solution for your clients. You define what your users and distribution partners should be able to do on their own. Our license portal and CodeMeter License Central keep track of all license actions of your users and partners. You can check up on what happened at your leisure and intervene if there is any funny business with anybody.
You can set smart cut-off values to stop people from abusing the freedom you have given them. When one of these points is passed, it would be up to you to allow or disallow any action manually. This is the perfect compromise between the two extremes “Allow everything first and check up on it later” and “Allow nothing and control everything yourself”.
Self-service options for single users include:
- Moving licenses to other devices / dongles / users
- Recovering lost licenses
- Creating and activating emergency licenses
- Creating demo or trial licenses
- Binding cloud licenses to other devices
- Changing the access details for cloud licenses
But license portals are not just there to make life easier for individual users. They include features and functions that are perfect for commercial clients or multi-level distribution models. On top of individual users, you can define hierarchies of different roles for different client or partner levels. For instance, administrators and partners could see all licenses for their part of the tree, while end users can only see the licenses allotted to them or their specific unit.
License portals can also be set up to allow resellers or distribution partners to create their own full-scale licenses at the point of need. As with all of these features, this is an optional setting that you could configure for all partners or only for specific partners of your choosing.
Running code in secure hardware or cloud environmentsteam-WIBU
Software protection has one prime mission: To prevent your software from being run and taken apart by a debugger. Paradoxically, this makes life harder not just for hackers, but also for legitimate developers trying to test their work and remedy any bugs that might be hidden in it. Now, with CodeMoving, you can take the leap into optimal protection: CodeMoving lets you move essential code into a secure CmContainer for execution far away from the prying eyes of would-be hackers. But how can developers test their work under these circumstances? The new generation of AxProtector comes with a simulation mode, built specifically for that purpose.
CodeMeter Protection Suite includes a variety of AxProtector flavors that make protecting applications easy. There are versions of AxProtector for native Windows, macOS, Linux, and Android applications and for applications in Java, .NET, Python, and JavaScript. AxProtector itself is available as a standard version for encrypting either entire applications or individual functions. File encryption, IP Protection mode, and CodeMoving are available as optional resources.
File encryption allows your application to load protected files, such as models used for AI. The IP Protection mode works against reverse engineering without your software needing a CodeMeter license and without CodeMeter being installed on the user’s system. With CodeMoving, you can have sensitive parts of your software executed in the secure confines of a CmContainer. This masterclass will show you how to make the most of CodeMoving, including the ability to test and debug even protected code.
With CodeMoving, you can create as many code fragments as you want for execution in a CmDongle or CmCloudContainer. To move the code, the application is encrypted with AxProtector; all functions to be moved are compiled and encrypted by AxProtector and normally kept in the application like their peers with regular AxProtector protections. While AxProtector decrypts and executes the function in question in the memory of the computer during runtime, CodeMoving first moves it into a CmDongle or CmCloudContainer to be decrypted and executed with the right input parameters. The output parameters are then returned to the application. CodeMoving is more secure than AxProtector used by itself, while regular encryptions with AxProtector offer better performance for the protected code. To find the optimal balance for your application, a combination of CodeMoving and functions encrypted with AxProtector is possible.
Subscriptions - Relationships built to lastteam-WIBU
Subscriptions range somewhere between the holy grail and the gold standard for software vendors. They have already become the norm in much of the consumer world, and they are becoming increasingly popular for commercial options as well. The secret to their success is not so secret at all: For the vendor, they promise a steady stream of income. For users, they offer affordable access to software without steep upfront costs for the licenses. The costs for maintenance and further development become more predictable for both sides, and users know that their software will always be the latest version available. Despite these many plus points, the decision to switch from straight-up sales to subscription models deserves some care and attention, as it can mean a drop in actual revenue in the initial transition period.
Beyond these financial considerations, the switch to subscription models also calls for some attention to the technical nitty-gritty. There is one technical hurdle that needs to be taken in any case: All subscription models need some form of channel between the vendor and the user – magical thinking is not enough, and telepathy is out of the question. Even in today’s hyper-connected world, this is still a live issue, as there are many devices that need to operate offline, maybe even in secure and cordoned-off environments. Speaking generally, there are two possible routes to consider:
* Licenses can be created as permanent licenses that work without any further intervention. When the subscription is cancelled, the license is turned into a temporary license or deactivated on the spot, ideally with a form of receipt to record that transaction. One major drawback of this choice is that licenses may still be used by more fraudulent users (e.g. those claiming that they lost the device they had bought the license for). And even for legitimate and upright users, there is little incentive to care about deactivating their licenses properly. Still, this straightforward option has the considerable advantage that it needs hardly any updates or interventions in the case of offline use.
* Licenses can be created as temporary licenses that are renewed on a regular basis. Should a subscription be cancelled in this case, the license is given a new fixed expiry date and is not renewed anymore beyond that time limit. From the point of view of license enforcement, this is the way to go, as it essentially prevents all fraudulent use after the planned expiry date. The approach does, however, need a mechanism for regularly updating the licenses, even if they are used in offline scenarios. Preplanned push updates by file transfer can facilitate this, with lots of automation opportunities to make the process as unobtrusive as possible.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.