CodeMeter License Central 3.0 is just around the corner. One of its newest features is the support for Nested Product Items. With Nested Product Items, modules can be logically grouped together, and the licensing process can be further simplified. You may wonder whether this new feature is actually not already covered by the current bundles. You can achieve your goal in both cases: To sell software functions separately with the implementation of modular licenses. Not only does this business approach offer low-cost entry-level versions, but it also tailors your software to the actual and unique needs and budgets of your customers.
Experience a sneak peek at CodeMeter License Central 3.0, and see live how Nested Product Items are configured and used in licenses. Learn how the resulting licenses are displayed and how this configuration affects the borrowing and use of the licenses.
We will delve into:
- Use cases for Nested Product Items
- Technical implementation
- Differences between bundles and Nested Product Items
- Borrowing and using transferred licenses
Whatever option you choose, make sure the licensing process of your software is accurately designed to protect your intellectual property, boost your revenues, and meet your customers‘ demands.
Watch the webinar: https://youtu.be/pkE0o-hIO5A
Bündeln oder Schachteln? Das ist hier die Frageteam-WIBU
CodeMeter License Central 3.0 steht vor der Tür. Eines der neuen Features ist die Unterstützung von Nested Product Items. Mit Nested Product Items können Module logisch zueinander gruppiert und der Lizenzerstellungsprozess vereinfacht werden. Vielleicht fragen Sie sich: „Ist dies mit Bündeln nicht bereits jetzt möglich?“. Es werden die Unterschiede zwischen Bündeln in CodeMeter License Central und verschachtelten Product Items in der Lizenz vorgestellt und diskutiert in welchem Anwendungsfall welche Variante die für Sie beste Lösung ist.
Beide Konzepte eignen sich für die Umsetzung von modularen Lizenzen, bei denen Sie Funktionen Ihrer Software separat verkaufen. Durch modulare Lizenzierung können Sie günstige Einsteigerversionen anbieten und Ihre Software auf die individuellen Bedürfnisse und Budgets Ihrer Kunden anpassen.
Erleben Sie mit uns einen ersten Preview von CodeMeter License Central 3.0 und sehen Sie, wie Nested Product Items konfiguriert und in Lizenzen verwendet werden. Erfahren Sie, wie die erstellten Lizenzen dargestellt werden und welche Auswirkungen diese Konfiguration auf das Ausleihen und die Benutzung der Lizenzen hat.
- Anwendungsfälle für Nested Product Items
- Technische Realisierung
- Unterschiede Bündel und Nested Product Items
- Ausleihen und Verwenden von Lizenzen
Lernen Sie, wie Sie Ihre Anwendungsfälle für modulare Lizenzierung optimal mit CodeMeter umsetzen.
Webinar anschauen:
https://youtu.be/OzvbZjawtgo
Zertifikate für Authetizität, Authentifizierung oder beides?team-WIBU
Digitale Zertifikate gehören zu den Meilensteinen der Sicherheitshistorie. Seitdem Zertifikate eingesetzt werden, nutzen Hersteller und Anwender die Vorteile einer verschlüsselten Kommunikation, beispielsweise beim sicheren Mailverkehr, Datei- und Festplattenverschlüsselung oder der sicheren Anmeldung auf lokale Rechner oder Webseiten. Gesetzgeber haben maßgebende Schritte eingeleitet, um den Einsatz von Zertifikaten zu fördern und zu regeln. Trotz ihrer Wirksamkeit scheinen Zertifikate für einige immer noch kryptisch und umständlich zu sein.
Mit Zertifikaten können Software- und Geräte-Hersteller ihre Software auf Echtheit prüfen oder eine Benutzerauthentifizierung aufbauen und auf diese Weise Software-Integrität gewährleisten und Zugangsrechte verwalten.
- Was sind Zertifikate?
* Grundlagen der asymmetrischen Kryptographie
* Wie kann ein Schlüssel als authentisch erkannt werden?
* Selbst signierte Zertifikate
* Root-Zertifikate
* Zertifikatsketten
* Rücknahmelisten
- Übersicht der Anwendungsfälle für Zertifikate
- Anwendungsfall Server-Zertifikat
* Erstellung eines Server-Zertifikates.
* Einrichtung des Servers
- Anwendungsfall Client Zertifikat
* Erstellen Client-Zertifikates
* Einrichtung des Servers
* Speichern des Client-Zertifikates auf dem PC.
* Beispiel mit der CodeMeter License Central
- Speicherorte für Zertifikate
* Als Datei auf einem PC
* Auf einem PC mit der CSSI Middleware
- Zertifikate im Bereich Software Security
* Authenticode
* CodeMeter Universal Firm Code basierend auf Zertifikaten
* Code-Integrität im AxProtector mit Zertifikaten
Egal, ob Sie mit Standardsoftware oder Embedded-Software arbeiten – Zertifikate zählen in beiden Fällen als Bestandteil der Softwaresicherheit.
Unsere Technologie ist so vorbereitet, dass Sie Zertifikate direkt einsetzen können. Die Schutzhardware enthält SmartCard-Chips und die Sicherheitstools zum einfachen Einsatz von Zertifikaten gehören bereits zu unseren Lösungen.
Webinar anschauen:
https://youtu.be/nA-JGAIKqzU
OPC UA Security: Native and Add-on Solutionsteam-WIBU
The Industrial Internet of Things has set the stage for the convergence of Operations Technology (OT) and Information Technology (IT), that is, the plant floor and the higher-level IT infrastructure. One of the many aspects of this transitional journey is represented by M2M communications.
OPC UA is a multi-platform, plug & play Information Exchange Standard for industrial smart automation and cloud networking. It standardizes communications within machines, between machines, and from machines to smart systems, securely networked with IoT architectures.
As a member of the OPC Foundation, Wibu-Systems has been an early adopter of the OPC UA standard in Industrie 4.0 projects like IUNO, the German national reference project for IT security in Industrie 4.0, S4SmartPro, the key finder prototype production line of SmartFactoryKL, and OpSit, the optimal use of smart items technologies in healthcare.
As recently pointed out in the Industrial Internet Security Framework as well, it is endpoints, i.e. the device or cloud-based components that have interfaces for network communication, that are particularly vulnerable in a world of cyber-physical systems connected to open networks. The Unified Automation ANSI C based and High Performance OPC UA SDKs, powered by CodeMeter Embedded, fully support the OPC UA defined Security Profiles and configurations and provide even stronger security for modern M2M communications. Secret information, like RSA private keys, certificates, and trust lists, is stored in a hardware secure element and protected from theft and tampering attacks. In a time when intellectual property is shifting in the value chain from hardware to software, manufacturers now also have new opportunities to capitalize on their software and offer feature-based, time-based, version-based, or pay-per-use models to scale up their offerings, expand their market share, and produce recurrent revenues.
In this presentation, we are going to navigate you through a journey of exploration that will touch upon:
* The elements of innovation in smart manufacturing
* The connection requirements for M2M in the IIoT age
* The building blocks of the OPC Unified Architecture
* Use cases that are accelerating the rise of Smart Factories
* The integration of CodeMeter in the OPC UA standard
* The OPC UA security extension for endpoints
Working with Windows, Linux, macOS, or Android? With minimal embedded controllers up to massive cloud infrastructures? OPC UA and CodeMeter are equally suited, scalable, and secure, and most of all integrated in a streamlined fashion to provide the ultimate technology in access control, authentication, and encryption.
Watch the webinar: https://youtu.be/r3CHB42OJ-o
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...team-WIBU
An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints.
As defined by the Industrial Internet Consortium (IIC), an endpoint is a component that has an interface for network communication and it can be of various types, including a device endpoint or an endpoint that provides cloud connectivity.
Endpoints are the only place in an IIoT system where execution code is stored, started and updated and data is stored, modified or applied. In many cases, an attacker will, therefore, try to access the execution code and attack the weakest point in the devices’ security implementation, then modify or replace the execution code with malicious intent.
The IIC has recently presented an endpoint protection/security model and policy in its Industry Internet Security Framework (IISF) document. The technical report is an in-depth cross-industry-focused security framework reflecting thousands of hours of knowledge and experiences from security experts, collected, researched and evaluated for the benefit of all IIoT system deployments.
Monetizing Software, Machines, and Materials with New Business Modelsteam-WIBU
There was a time when traditional software publishers could generate substantial revenues with simple one-off sales. As the digital market kept growing and users became more skilled and demanding, the whole process had to be redesigned to lower the upfront investment, instill a sense of trust and dependability between supplier and buyer, and produce recurrent and dynamic income. In the industrial realm, this topic has become more relevant and pressing, driven by recent developments in machine connectivity, the globalization of manufacturing processes, and the interest in customized manufacturing for production runs of maybe even only single pieces.
While subscription models have customers paying a constant fee for every subscription term you set, regardless of whether they actually use the product or service, pay-per-use allows them to pay on the go for the machine lease, the consumables, the raw material, or the software package they specifically requested, at the time they really need it. The risk for you? The lower initial revenues when you first introduce this model are more than compensated for as the relationship with your customer deepens and you adjust your offers to their requirements. Best practices recommend introducing this model gradually alongside existing systems and fine-tuning the process as you analyze customers’ behaviors and spot specific patterns.
CodeMeter License Central offers licenses with unit counters and automated processes, which makes pay-per-use models just as simple to handle as permanent or subscription licenses. You are still free to choose your favorite secure element for storing the licenses: CmDongle, CmActLicense, or server in the LAN or in the Cloud. The processes to create or renew licenses are easily integrated or automated. Automatic billing is just one step away with the streamlined integration of CodeMeter License Central into all mainstream ERP, CRM, and ecommerce platforms.
In this presentation, we go through the whole lifecycle from a number of success stories that will get you inspired to the whole set of actions that will get you started. Here are the main topics:
Application of pay-per-use licensing models in different scenarios
For software
For machines
For materials
For building plans
Technical implementation with CodeMeter
Mapping out a pay-per-use license
Licenses per action
Licenses per term
License creation
License renewal
Downstream billing
Controlling the use of consumables
Sale of own material
Licensing of third-party material
Opportunities and challenges relating to pay-per-use licenses
First, think. Second, believe. Third, dream. And finally, dare. With CodeMeter, you have a powerful ally.
Watch the webinar: https://youtu.be/n-Robn91NQE
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
Nobody would eat a whole salami from end to end. We might all want to, but we wouldn’t try (or manage). Instead, we proceed slice by slice. This strategy, also called the salami tactic, can be applied to many other walks of life, and software licensing is one of them. Over their evolution, many software products tend to get bigger and bigger as the developers try to fulfil new user expectations or add new technology capabilities. Some call this bloat, but it is actually a reasonable way of responding to a growing user base with a growing set of needs and expectations. However, few users will need all of the features at once. Usually, they only need a few selected features, creating a dilemma for software developers and their clients: Users don’t want to pay for things they never use, but developers don’t want to give their work away for free.
This is where the salami tactic comes back into the picture. Called features-on-demand in the software world, it means that the users are not forced to buy or pay for the entire package (or salami), but only for the features (or slices) they want. Although the term had negative connotations for its originator, Zoltán Pfeiffer, the salami tactic is a great example of a win-win strategy. The seller gets their software to the user at a lower entry price, and the users have the opportunity to spend more for the features they want on top.
Bündeln oder Schachteln? Das ist hier die Frageteam-WIBU
CodeMeter License Central 3.0 steht vor der Tür. Eines der neuen Features ist die Unterstützung von Nested Product Items. Mit Nested Product Items können Module logisch zueinander gruppiert und der Lizenzerstellungsprozess vereinfacht werden. Vielleicht fragen Sie sich: „Ist dies mit Bündeln nicht bereits jetzt möglich?“. Es werden die Unterschiede zwischen Bündeln in CodeMeter License Central und verschachtelten Product Items in der Lizenz vorgestellt und diskutiert in welchem Anwendungsfall welche Variante die für Sie beste Lösung ist.
Beide Konzepte eignen sich für die Umsetzung von modularen Lizenzen, bei denen Sie Funktionen Ihrer Software separat verkaufen. Durch modulare Lizenzierung können Sie günstige Einsteigerversionen anbieten und Ihre Software auf die individuellen Bedürfnisse und Budgets Ihrer Kunden anpassen.
Erleben Sie mit uns einen ersten Preview von CodeMeter License Central 3.0 und sehen Sie, wie Nested Product Items konfiguriert und in Lizenzen verwendet werden. Erfahren Sie, wie die erstellten Lizenzen dargestellt werden und welche Auswirkungen diese Konfiguration auf das Ausleihen und die Benutzung der Lizenzen hat.
- Anwendungsfälle für Nested Product Items
- Technische Realisierung
- Unterschiede Bündel und Nested Product Items
- Ausleihen und Verwenden von Lizenzen
Lernen Sie, wie Sie Ihre Anwendungsfälle für modulare Lizenzierung optimal mit CodeMeter umsetzen.
Webinar anschauen:
https://youtu.be/OzvbZjawtgo
Zertifikate für Authetizität, Authentifizierung oder beides?team-WIBU
Digitale Zertifikate gehören zu den Meilensteinen der Sicherheitshistorie. Seitdem Zertifikate eingesetzt werden, nutzen Hersteller und Anwender die Vorteile einer verschlüsselten Kommunikation, beispielsweise beim sicheren Mailverkehr, Datei- und Festplattenverschlüsselung oder der sicheren Anmeldung auf lokale Rechner oder Webseiten. Gesetzgeber haben maßgebende Schritte eingeleitet, um den Einsatz von Zertifikaten zu fördern und zu regeln. Trotz ihrer Wirksamkeit scheinen Zertifikate für einige immer noch kryptisch und umständlich zu sein.
Mit Zertifikaten können Software- und Geräte-Hersteller ihre Software auf Echtheit prüfen oder eine Benutzerauthentifizierung aufbauen und auf diese Weise Software-Integrität gewährleisten und Zugangsrechte verwalten.
- Was sind Zertifikate?
* Grundlagen der asymmetrischen Kryptographie
* Wie kann ein Schlüssel als authentisch erkannt werden?
* Selbst signierte Zertifikate
* Root-Zertifikate
* Zertifikatsketten
* Rücknahmelisten
- Übersicht der Anwendungsfälle für Zertifikate
- Anwendungsfall Server-Zertifikat
* Erstellung eines Server-Zertifikates.
* Einrichtung des Servers
- Anwendungsfall Client Zertifikat
* Erstellen Client-Zertifikates
* Einrichtung des Servers
* Speichern des Client-Zertifikates auf dem PC.
* Beispiel mit der CodeMeter License Central
- Speicherorte für Zertifikate
* Als Datei auf einem PC
* Auf einem PC mit der CSSI Middleware
- Zertifikate im Bereich Software Security
* Authenticode
* CodeMeter Universal Firm Code basierend auf Zertifikaten
* Code-Integrität im AxProtector mit Zertifikaten
Egal, ob Sie mit Standardsoftware oder Embedded-Software arbeiten – Zertifikate zählen in beiden Fällen als Bestandteil der Softwaresicherheit.
Unsere Technologie ist so vorbereitet, dass Sie Zertifikate direkt einsetzen können. Die Schutzhardware enthält SmartCard-Chips und die Sicherheitstools zum einfachen Einsatz von Zertifikaten gehören bereits zu unseren Lösungen.
Webinar anschauen:
https://youtu.be/nA-JGAIKqzU
OPC UA Security: Native and Add-on Solutionsteam-WIBU
The Industrial Internet of Things has set the stage for the convergence of Operations Technology (OT) and Information Technology (IT), that is, the plant floor and the higher-level IT infrastructure. One of the many aspects of this transitional journey is represented by M2M communications.
OPC UA is a multi-platform, plug & play Information Exchange Standard for industrial smart automation and cloud networking. It standardizes communications within machines, between machines, and from machines to smart systems, securely networked with IoT architectures.
As a member of the OPC Foundation, Wibu-Systems has been an early adopter of the OPC UA standard in Industrie 4.0 projects like IUNO, the German national reference project for IT security in Industrie 4.0, S4SmartPro, the key finder prototype production line of SmartFactoryKL, and OpSit, the optimal use of smart items technologies in healthcare.
As recently pointed out in the Industrial Internet Security Framework as well, it is endpoints, i.e. the device or cloud-based components that have interfaces for network communication, that are particularly vulnerable in a world of cyber-physical systems connected to open networks. The Unified Automation ANSI C based and High Performance OPC UA SDKs, powered by CodeMeter Embedded, fully support the OPC UA defined Security Profiles and configurations and provide even stronger security for modern M2M communications. Secret information, like RSA private keys, certificates, and trust lists, is stored in a hardware secure element and protected from theft and tampering attacks. In a time when intellectual property is shifting in the value chain from hardware to software, manufacturers now also have new opportunities to capitalize on their software and offer feature-based, time-based, version-based, or pay-per-use models to scale up their offerings, expand their market share, and produce recurrent revenues.
In this presentation, we are going to navigate you through a journey of exploration that will touch upon:
* The elements of innovation in smart manufacturing
* The connection requirements for M2M in the IIoT age
* The building blocks of the OPC Unified Architecture
* Use cases that are accelerating the rise of Smart Factories
* The integration of CodeMeter in the OPC UA standard
* The OPC UA security extension for endpoints
Working with Windows, Linux, macOS, or Android? With minimal embedded controllers up to massive cloud infrastructures? OPC UA and CodeMeter are equally suited, scalable, and secure, and most of all integrated in a streamlined fashion to provide the ultimate technology in access control, authentication, and encryption.
Watch the webinar: https://youtu.be/r3CHB42OJ-o
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...team-WIBU
An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints.
As defined by the Industrial Internet Consortium (IIC), an endpoint is a component that has an interface for network communication and it can be of various types, including a device endpoint or an endpoint that provides cloud connectivity.
Endpoints are the only place in an IIoT system where execution code is stored, started and updated and data is stored, modified or applied. In many cases, an attacker will, therefore, try to access the execution code and attack the weakest point in the devices’ security implementation, then modify or replace the execution code with malicious intent.
The IIC has recently presented an endpoint protection/security model and policy in its Industry Internet Security Framework (IISF) document. The technical report is an in-depth cross-industry-focused security framework reflecting thousands of hours of knowledge and experiences from security experts, collected, researched and evaluated for the benefit of all IIoT system deployments.
Monetizing Software, Machines, and Materials with New Business Modelsteam-WIBU
There was a time when traditional software publishers could generate substantial revenues with simple one-off sales. As the digital market kept growing and users became more skilled and demanding, the whole process had to be redesigned to lower the upfront investment, instill a sense of trust and dependability between supplier and buyer, and produce recurrent and dynamic income. In the industrial realm, this topic has become more relevant and pressing, driven by recent developments in machine connectivity, the globalization of manufacturing processes, and the interest in customized manufacturing for production runs of maybe even only single pieces.
While subscription models have customers paying a constant fee for every subscription term you set, regardless of whether they actually use the product or service, pay-per-use allows them to pay on the go for the machine lease, the consumables, the raw material, or the software package they specifically requested, at the time they really need it. The risk for you? The lower initial revenues when you first introduce this model are more than compensated for as the relationship with your customer deepens and you adjust your offers to their requirements. Best practices recommend introducing this model gradually alongside existing systems and fine-tuning the process as you analyze customers’ behaviors and spot specific patterns.
CodeMeter License Central offers licenses with unit counters and automated processes, which makes pay-per-use models just as simple to handle as permanent or subscription licenses. You are still free to choose your favorite secure element for storing the licenses: CmDongle, CmActLicense, or server in the LAN or in the Cloud. The processes to create or renew licenses are easily integrated or automated. Automatic billing is just one step away with the streamlined integration of CodeMeter License Central into all mainstream ERP, CRM, and ecommerce platforms.
In this presentation, we go through the whole lifecycle from a number of success stories that will get you inspired to the whole set of actions that will get you started. Here are the main topics:
Application of pay-per-use licensing models in different scenarios
For software
For machines
For materials
For building plans
Technical implementation with CodeMeter
Mapping out a pay-per-use license
Licenses per action
Licenses per term
License creation
License renewal
Downstream billing
Controlling the use of consumables
Sale of own material
Licensing of third-party material
Opportunities and challenges relating to pay-per-use licenses
First, think. Second, believe. Third, dream. And finally, dare. With CodeMeter, you have a powerful ally.
Watch the webinar: https://youtu.be/n-Robn91NQE
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
Nobody would eat a whole salami from end to end. We might all want to, but we wouldn’t try (or manage). Instead, we proceed slice by slice. This strategy, also called the salami tactic, can be applied to many other walks of life, and software licensing is one of them. Over their evolution, many software products tend to get bigger and bigger as the developers try to fulfil new user expectations or add new technology capabilities. Some call this bloat, but it is actually a reasonable way of responding to a growing user base with a growing set of needs and expectations. However, few users will need all of the features at once. Usually, they only need a few selected features, creating a dilemma for software developers and their clients: Users don’t want to pay for things they never use, but developers don’t want to give their work away for free.
This is where the salami tactic comes back into the picture. Called features-on-demand in the software world, it means that the users are not forced to buy or pay for the entire package (or salami), but only for the features (or slices) they want. Although the term had negative connotations for its originator, Zoltán Pfeiffer, the salami tactic is a great example of a win-win strategy. The seller gets their software to the user at a lower entry price, and the users have the opportunity to spend more for the features they want on top.
Using AEM in a customer global multi-channel programMeryll Blanchet
With this presentation, I invite you to the journey through a complex global multi-channel program involving AEM as a front-end. We will have a look at several milestones, from the initial customer's objectives to the implementation on AEM side. Of course, the pitch is based on a real-life project that is now in production. But for obvious reasons, Geometrixx Outdoors is taken as reference for a few screenshots.
FINS is a unique web-based solution supporting “Just-In-Time” manufacturing tailor-made to optimize supply chains in the watch industry. FINS “Just in Time” is first a software and system solution, with supporting teams able to customize solutions according to certain needs in a very short time. In addition, the solution works as an automating process, bar code system and traceability method with online access.
Since its inception in 1972, SAP has grown its global market dominance relentlessly. The latest version goes far beyond the standard paradigms of an ERP system and includes an entire business suite ready for the digital economy. Gone are the days when isolated software packages were handling different back office processes. Today, analytics, CRM, data management, ERP, financial management, HR, product lifecycle management, and supply chain management are tied in one unique modular platform.
This makes the integration of CodeMeter License Central with SAP even more relevant; with their capabilities combined, the two products provide greater convenience for users across the global community. CodeMeter License Central is Wibu-Systems’ database-derived license entitlement application for the automatic creation, delivery, and management of software licenses. Available in multiple languages, the product has become a reference standard for license lifecycle management.
For years, it has already been possible to integrate CodeMeter License Central with SAP using an SOAP interface. The specific development and consulting skills in SAP designs of Informatics have helped us make the integration process even more sophisticated. The workflow in short: an order is created in SAP. If it includes a license-based software product, the order is sent to CodeMeter License Central via SAP, and the operator receives an activation code. After the successful activation of the license by the end user, CodeMeter License Central returns the activation data to SAP. With a simple look at the SAP dashboard, the operator can verify the status of the licenses at any time.
During this presentation, we will cover:
- Fundamentals of CodeMeter License Central
- SOAP interface for SAP
- Integration in SAP
- License entitlement in SAP
- License activation in the License Portal
- License lifecycle management in SAP
- Examples of an integration process workflow
If you are using SAP, you must not miss this event. Reserve your seat and see how this turnkey solution can bring cost effectiveness and convenience of implementation, expediting and simplifying your back office procedures.
Watch the webinar: https://youtu.be/kDzUQBJTSSA
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
Bus operators depend on their vehicles, and any spare parts they need have to be available as quickly as possible. Up to now, this meant massive local stocks or complex on-demand logistics, but now digitalization is hailing in a new age. The owners and operators of Mercedes Benz and Setra busses can now produce the parts themselves with 3D printing. All they need for these mini-factories are a certified 3D printer and the licenses for the parts they want to print. Wibu-Systems’ CodeMeter provides the technological basis for a secure digital process chain with full control over how many parts can be and are printed on the ground.
Additive manufacturing was long considered a technology for nerds or select specialists. There were too many technical challenges still to be overcome, and the cost of 3D printed parts was far too high compared to conventional manufacturing. But times have changed, and many of these problems have been solved. New service concepts are being introduced and are already creating new global, digital markets. Our webinar introduces the solution thought up by Daimler Buses in partnership with the 3D printer specialists Farsoon Technology and the CodeMeter security technology of Wibu-Systems. The system solves two essential problems: The protection of the digital object data and the monetization of the entire process with a reliable license management system.
The challenge is to be able to produce parts wherever and whenever they are needed. This promises a new field for service providers to get active in, offering 3D printing services for their clients. However, when the parts are processed and printed by a third party, there need to be systems in place to protect the intellectual property involved and to make the entire value chain correctly traceable and, crucially, billable. This is where Daimler Buses has found a solution with the potential to revolutionize the current conventional parts business. The system creates exciting new prospects for the service business and for the availability of spare parts, both economically and ecologically speaking.
Many parts and components are now available in digital format on the OMNIplus 3D printing license shop. Bus operators and service partners around the world can purchase these and produce them at their leisure and at the point of need. The parts are provided as encrypted downloads. As in any online store, the buyer adds the right items to their cart. At the checkout, the buyer then receives a preprinting license to prepare the print job with the Buildstar® software made by Farsoon Technologies and the actual printing license for the right number of parts. The licenses can then be used with the Makestar® software on Farsoon-certified 3D printers. Both protected and unprotected parts can be combined in one job to reduce the printing costs. Order processing is handled by the combination of CodeMeter License Central and the SAP system already in place at Daimler Buses.
Throughout this hour-long learning session, we'll explore which industries, verticals and departments are the prime targets for partners to pursue. This session will give our partners better insight into selling methodologies/best practices as well as understand what assets are available to them to drive a successful sales campaign. We'll cover how:
- UiPath establishes an industry/vertical Point of View (POV) that gives an overarching look at associated automation trends.
- To identify specific Personas with in the customer’s organization and what triggers them to buy.
- To leverage known and proven use cases.
- To build and prepare for your first customer call and see what additional assets can be delivered to the customer to ensure the sales campaign has all the necessary on-going support.
Learn about UiPaths' new packaging/bundling schemes.
Our goal is to simplify quoting and purchasing of UiPath solutions for our Partners and Customers. This session will introduce our partners to a simple line-up of bundles which will cover bundle pricing as well as the technology components that make up each bundle.
Lastly, we'll reinforce the notification that was just sent out to our partner Community around the Renewal/Upsell Discount Policy.
The Dongle is Dead. Long Live the Dongle.team-WIBU
For more than 30 years, dongles have been an obvious and effective choice for software protection. Reports of its death have been greatly exaggerated, as the technology remains a favorite for developers and users alike. What software developers like about it is the great protection it offers against hackers, coming at comparatively low costs for them. Users, on the other hand, enjoy its portability and the option of using their licenses on the go and, if they want, offline. More recent copy protection technologies, such as licenses in the cloud bound to individual users or individual machines, might beat dongles on even lower upfront costs per user and on the immediate availability of the licenses. Power users typically also have licenses for multiple applications and software systems, and they are not too keen to lug around a big bulge of license dongles.
CmDongles have one feature that beats one key weakness of typical dongle solutions in many industries and use cases: CmDongles are multivendor-capable. That means, if your user already owns a CmDongle, you can ‘hop on’ as well with your license. This saves you and your users the price of the dongle and the shipping cost, and CodeMeter License Central makes sure that the license gets to your user in the blink of an eye – without compromising the level of protection we all know and love in our CmDongles. The required infrastructure is also cheaper to maintain than that of a pure cloud solution, as the server only creates the licenses in the first place and does not have to come into the picture at all during regular use of the software.
Your users benefit a lot from this option: Their licenses stay mobile and can be used offline. Switching computers is as easy as unplugging the CmDongle from one machine and plugging it into the next. And if everybody is on board, your users need only one CmDongle for the licenses from many different vendors.
By clearly demarcating the separate areas – the Firm Items – CodeMeter offers unparalleled security for all vendors. All vendors can create, edit, or delete licenses only for their Firm Items. What one vendor does with a license could never affect the Firm Items of other vendors. With CodeMeter, security starts right with the basic architecture. Join our webinar and explore the fundamental design of CodeMeter.
Watch the webinar: https://youtu.be/yv1edTJztcA
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
"Pricing policy is an executive matter" – this should underline how important it is who defines prices and how they are defined. If the price is too steep, you scare off potential customers and lose revenue. If the price is too low, you may win more customers, but the revenue will plateau at some point, because the increased numbers will not make up for the financial shortfall. Low prices naturally affect profits, and sometimes dramatically so.
For software developers, retail prices are directly related to different licensing options. The most common choices are still the traditional "One-off purchases" or "One-off purchases with maintenance contracts". But there are more and more software vendors offering more modern models like subscriptions or consumption-based licenses.
This webinar will cover both the commercial and the technical sides of these licensing models, specifically consumption-based models. For pricing decisions, two factors matter most: "What does it cost me to produce the software?" and "What is the software worth to our customers?". In many cases in the market, the second question ought to take precedence both when calculating prices and when trying to sell the actual software: "This printer can print 1000 pages" might be a great statement for gadget lovers. But when trying to sell the printer’s real added value, it should be "This printer is 20% faster and can save you a lot of expensive labor."
Modern licensing models can benefit from using cloud solutions, as the cloud makes it easy to capture and collect usage data immediately and renew subscriptions on the fly. But has the whole world really gone online already? Our experts at Wibu-Systems know: That is not true. In industrial shopfloor scenarios in particular, there is so much legitimate concern about cyberattacks, sabotage, or data theft that many devices are not always available online. Often, outbound connections through dedicated gateways are the limit of what can be accepted. And availability is also another legitimate worry for many users of cloud services. It only takes a misguided shovel, and the fastest fiberoptic interconnection is cut and production comes to a standstill. What good is a 20% faster connection with a network printer, if the printer has been physically cut from the network? All the time and effort saved with modern connectivity is quickly lost again to such incidents.
The technical part of the webinar will cover the concrete ways to implement consumption-based licenses with CodeMeter.
Supported by an experienced technical team, Crouzet Automation is a pioneer in the simplification of programming. The brand offers the easiest-to-use and most adaptable alternative automation solution for specialized and demanding needs.
http://www.crouzet-automation.com
Follow us on LinkedIn: https://www.linkedin.com/company/crouzet-automation
Crouzet Automation is a brand of InnoVista Sensors™.
InnoVista Sensors™ : your trusted partner of choice to face industrial challenges of today and tomorrow.
InnoVista Sensors™ is a worldwide industrial specialist of sensors, controllers and actuators for automated systems.
Through its brands, Crouzet Aerospace, Crouzet Automation, Crouzet Control, Crouzet Motors, Crouzet Switches and Systron Donner Inertial, InnoVista Sensors™ offers a wide range of reliable, efficient and customizable components dedicated to the Aerospace & Defence, Transportation and Industrial market and segments.
Thanks to the recognized expertise of its teams and a strong innovation policy, InnoVista Sensors™ brings performance enhancing solutions to its customers worldwide.
www.innovistasensors.comCrouzet Automation is a brand of InnoVista Sensors™.
Market Intelligence Briefing and Government Panel: Cloud Sales OpportunitiesimmixGroup
immixGroup's Market Intelligence team will explore cloud technology trends within the federal landscape and provide you the information you need to uncover new business opportunities, including: organizations, decision makers, and IT programs — all critical to cloud implementation and security and IT convergence.
Demos and Q&A about Cognos Analytics release 5 with the IBM Product Team. View the webinar video recording and download this deck: http://www.senturus.com/resources/whats-new-in-cognos-analytics-11-0-5/.
Topics covered: 1) New dashboard enhancements around visualizations, navigation paths, accessing Framework Manager packages and the new maps, 2) Data modules and reporting features around linking, updated prompt controls and much more and 3) Enhancements around content embedding and portal theme control, extensions and buttons on a per-user basis.
Senturus, a business analytics consulting firm, has a resource library with hundreds of free recorded webinars, trainings, demos and unbiased product reviews. Take a look and share them with your colleagues and friends: http://www.senturus.com/resources/.
This session will share large scale architectures from the author's experiences from Cisco and Symantec.
Anshul Chhabra with Symantec, and Anil Kalbag with Cisco Systems, compare and contrast the architecture across: Infrastructure Architecture Scaling Ecommerce integrations and migration approach from legacy into Adobe Experience Manager, Digital Marketing Cloud Integrations such as personalization, analytics, and DMP.
To view the webinar go to http://bit.ly/atace102516 or for the MP4 version http://bit.ly/ATACE102516MP4
Post Quantum Cryptography – The Impact on Identityteam-WIBU
As PQC continues to be a major topic for many companies and Government Institutions, we take a dive into the topics of quantum computers, post-quantum-cryptography, and the potential relevance for (ID) use cases.
This seminar would like to present the principles of the technology and the latest developments in this field as well some indication as to the relevance, impact, and consequences on (Government) ID projects or use cases. The seminar may also look towards the relationship with these projects not only from a hardware standpoint but also from a software algorithmic stance as we migrate from current used crypto systems to quantum-proof systems.
KEY TAKEAWAYS
What is a Quantum Computer, what is Post Quantum Cryptography and when will we see a quantum computer?
The migration from current crypto systems to quantum proof systems.
How will PQC and QC affect (Government) ID projects and implementations.
What will QC mean for the security proofing of ID and Information in the future.
TARGET AUDIENCE
Interested parties in the field of Identity and Security.
Government bodies looking to the future for ID document management systems
Enterprises looking to understand the potential impact of QC upon their business and industries.
PRESENTATION: Cryptoagility and Quantum Resistance: Easier Said Than Done.
Ever since the publication of Shor’s quantum algorithm for the factorization of large numbers, it has been known that quantum computers could at some point pose a threat to our communication and data security. Today we have cloud access to small, functioning quantum computers. The answer to this threat is quantum-resistant cryptography: cryptographic methods for classical computers that are robust against attacks by quantum computers.
The standardization of such methods is currently ongoing. However, these methods are based on mathematical problems, that are much younger than the factorization problem already investigated by Euclid. On the other hand, currently used cryptographic methods such as RSA or ECDSA are broken as soon as a sufficiently large quantum computer exists. Cryptoagility is therefore recommended, software should be built or modified in such a way that cryptographic algorithms are easily substitutable. But how great is the danger posed by quantum computers? To what extent is cryptography affected, and when do we need to take action? Is cryptoagility really so easy to implement in practice or is this perhaps much easier said than done?
Unlocking the Future: Empowering Industrial Securityteam-WIBU
In today's fast-paced digital era, where industries globally are evolving through rapid digital transformation and digital assets form the core of industrial innovation, ensuring software integrity, safeguarding intellectual property, and enabling software monetization through sophisticated and adaptable software license management systems are of utmost importance.
In the realm of IoT devices and PLCs (Programmable Logic Controllers), memory cards frequently serve as an essential component of the infrastructure. Recognizing this, we've chosen to expand upon this foundation by enhancing an already crucial element in practical scenarios with additional functionalities. This strategic extension aims to not only fulfill a fundamental requirement but also to elevate the utility and performance of these devices by integrating advanced features into the existing framework.
Join us for a webinar that showcases the groundbreaking collaboration between Swissbit and Wibu-Systems, introducing CmReady – a revolutionary solution at the nexus of state-of-the-art technologies designed to meet these critical needs.
What is CmReady?
CmReady revolutionizes software protection and licensing by enabling the binding of a CmActLicense – a software license container – to a certified CmReady memory device in the form factor of an SD or microSD card, rather than tethering it exclusively to the target device running the protected software. This innovative approach grants unparalleled mobility to CmActLicenses, equating their portability with that of traditional dongles, yet with the added convenience and flexibility of removable memory devices.
Why CmReady?
Industrial memory cards, integral to manufacturers for specific project needs, already populate the field in diverse capacities and features. Recognizing the necessity to enhance these deployed units for increased sustainability, CmReady emerges as a groundbreaking solution. It not only upgrades existing memory cards with new functionalities but also transforms them into secure anchors for IP protection and software licensing. This innovative approach ensures that existing infrastructure can adapt to evolving security demands without the need for complete replacement, representing a leap forward in sustainable technological advancement.
All the Benefits of CmReady in a Nutshell
With CmReady, industrial customers gain access to a plethora of benefits:
Portable licenses bound to CmReady memory cards
Effortless activation and renewal processes
Seamless compatibility with CodeMeter Runtime starting from release 8.00 and CodeMeter Embedded starting from release 3.00
Plug and Play functionality, eliminating implementation hassle
Enhanced data protection and integrity features, safeguarding against piracy and unauthorized access
More Related Content
Similar to To Bundle or To Nest? That is the Question
Using AEM in a customer global multi-channel programMeryll Blanchet
With this presentation, I invite you to the journey through a complex global multi-channel program involving AEM as a front-end. We will have a look at several milestones, from the initial customer's objectives to the implementation on AEM side. Of course, the pitch is based on a real-life project that is now in production. But for obvious reasons, Geometrixx Outdoors is taken as reference for a few screenshots.
FINS is a unique web-based solution supporting “Just-In-Time” manufacturing tailor-made to optimize supply chains in the watch industry. FINS “Just in Time” is first a software and system solution, with supporting teams able to customize solutions according to certain needs in a very short time. In addition, the solution works as an automating process, bar code system and traceability method with online access.
Since its inception in 1972, SAP has grown its global market dominance relentlessly. The latest version goes far beyond the standard paradigms of an ERP system and includes an entire business suite ready for the digital economy. Gone are the days when isolated software packages were handling different back office processes. Today, analytics, CRM, data management, ERP, financial management, HR, product lifecycle management, and supply chain management are tied in one unique modular platform.
This makes the integration of CodeMeter License Central with SAP even more relevant; with their capabilities combined, the two products provide greater convenience for users across the global community. CodeMeter License Central is Wibu-Systems’ database-derived license entitlement application for the automatic creation, delivery, and management of software licenses. Available in multiple languages, the product has become a reference standard for license lifecycle management.
For years, it has already been possible to integrate CodeMeter License Central with SAP using an SOAP interface. The specific development and consulting skills in SAP designs of Informatics have helped us make the integration process even more sophisticated. The workflow in short: an order is created in SAP. If it includes a license-based software product, the order is sent to CodeMeter License Central via SAP, and the operator receives an activation code. After the successful activation of the license by the end user, CodeMeter License Central returns the activation data to SAP. With a simple look at the SAP dashboard, the operator can verify the status of the licenses at any time.
During this presentation, we will cover:
- Fundamentals of CodeMeter License Central
- SOAP interface for SAP
- Integration in SAP
- License entitlement in SAP
- License activation in the License Portal
- License lifecycle management in SAP
- Examples of an integration process workflow
If you are using SAP, you must not miss this event. Reserve your seat and see how this turnkey solution can bring cost effectiveness and convenience of implementation, expediting and simplifying your back office procedures.
Watch the webinar: https://youtu.be/kDzUQBJTSSA
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
Bus operators depend on their vehicles, and any spare parts they need have to be available as quickly as possible. Up to now, this meant massive local stocks or complex on-demand logistics, but now digitalization is hailing in a new age. The owners and operators of Mercedes Benz and Setra busses can now produce the parts themselves with 3D printing. All they need for these mini-factories are a certified 3D printer and the licenses for the parts they want to print. Wibu-Systems’ CodeMeter provides the technological basis for a secure digital process chain with full control over how many parts can be and are printed on the ground.
Additive manufacturing was long considered a technology for nerds or select specialists. There were too many technical challenges still to be overcome, and the cost of 3D printed parts was far too high compared to conventional manufacturing. But times have changed, and many of these problems have been solved. New service concepts are being introduced and are already creating new global, digital markets. Our webinar introduces the solution thought up by Daimler Buses in partnership with the 3D printer specialists Farsoon Technology and the CodeMeter security technology of Wibu-Systems. The system solves two essential problems: The protection of the digital object data and the monetization of the entire process with a reliable license management system.
The challenge is to be able to produce parts wherever and whenever they are needed. This promises a new field for service providers to get active in, offering 3D printing services for their clients. However, when the parts are processed and printed by a third party, there need to be systems in place to protect the intellectual property involved and to make the entire value chain correctly traceable and, crucially, billable. This is where Daimler Buses has found a solution with the potential to revolutionize the current conventional parts business. The system creates exciting new prospects for the service business and for the availability of spare parts, both economically and ecologically speaking.
Many parts and components are now available in digital format on the OMNIplus 3D printing license shop. Bus operators and service partners around the world can purchase these and produce them at their leisure and at the point of need. The parts are provided as encrypted downloads. As in any online store, the buyer adds the right items to their cart. At the checkout, the buyer then receives a preprinting license to prepare the print job with the Buildstar® software made by Farsoon Technologies and the actual printing license for the right number of parts. The licenses can then be used with the Makestar® software on Farsoon-certified 3D printers. Both protected and unprotected parts can be combined in one job to reduce the printing costs. Order processing is handled by the combination of CodeMeter License Central and the SAP system already in place at Daimler Buses.
Throughout this hour-long learning session, we'll explore which industries, verticals and departments are the prime targets for partners to pursue. This session will give our partners better insight into selling methodologies/best practices as well as understand what assets are available to them to drive a successful sales campaign. We'll cover how:
- UiPath establishes an industry/vertical Point of View (POV) that gives an overarching look at associated automation trends.
- To identify specific Personas with in the customer’s organization and what triggers them to buy.
- To leverage known and proven use cases.
- To build and prepare for your first customer call and see what additional assets can be delivered to the customer to ensure the sales campaign has all the necessary on-going support.
Learn about UiPaths' new packaging/bundling schemes.
Our goal is to simplify quoting and purchasing of UiPath solutions for our Partners and Customers. This session will introduce our partners to a simple line-up of bundles which will cover bundle pricing as well as the technology components that make up each bundle.
Lastly, we'll reinforce the notification that was just sent out to our partner Community around the Renewal/Upsell Discount Policy.
The Dongle is Dead. Long Live the Dongle.team-WIBU
For more than 30 years, dongles have been an obvious and effective choice for software protection. Reports of its death have been greatly exaggerated, as the technology remains a favorite for developers and users alike. What software developers like about it is the great protection it offers against hackers, coming at comparatively low costs for them. Users, on the other hand, enjoy its portability and the option of using their licenses on the go and, if they want, offline. More recent copy protection technologies, such as licenses in the cloud bound to individual users or individual machines, might beat dongles on even lower upfront costs per user and on the immediate availability of the licenses. Power users typically also have licenses for multiple applications and software systems, and they are not too keen to lug around a big bulge of license dongles.
CmDongles have one feature that beats one key weakness of typical dongle solutions in many industries and use cases: CmDongles are multivendor-capable. That means, if your user already owns a CmDongle, you can ‘hop on’ as well with your license. This saves you and your users the price of the dongle and the shipping cost, and CodeMeter License Central makes sure that the license gets to your user in the blink of an eye – without compromising the level of protection we all know and love in our CmDongles. The required infrastructure is also cheaper to maintain than that of a pure cloud solution, as the server only creates the licenses in the first place and does not have to come into the picture at all during regular use of the software.
Your users benefit a lot from this option: Their licenses stay mobile and can be used offline. Switching computers is as easy as unplugging the CmDongle from one machine and plugging it into the next. And if everybody is on board, your users need only one CmDongle for the licenses from many different vendors.
By clearly demarcating the separate areas – the Firm Items – CodeMeter offers unparalleled security for all vendors. All vendors can create, edit, or delete licenses only for their Firm Items. What one vendor does with a license could never affect the Firm Items of other vendors. With CodeMeter, security starts right with the basic architecture. Join our webinar and explore the fundamental design of CodeMeter.
Watch the webinar: https://youtu.be/yv1edTJztcA
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
"Pricing policy is an executive matter" – this should underline how important it is who defines prices and how they are defined. If the price is too steep, you scare off potential customers and lose revenue. If the price is too low, you may win more customers, but the revenue will plateau at some point, because the increased numbers will not make up for the financial shortfall. Low prices naturally affect profits, and sometimes dramatically so.
For software developers, retail prices are directly related to different licensing options. The most common choices are still the traditional "One-off purchases" or "One-off purchases with maintenance contracts". But there are more and more software vendors offering more modern models like subscriptions or consumption-based licenses.
This webinar will cover both the commercial and the technical sides of these licensing models, specifically consumption-based models. For pricing decisions, two factors matter most: "What does it cost me to produce the software?" and "What is the software worth to our customers?". In many cases in the market, the second question ought to take precedence both when calculating prices and when trying to sell the actual software: "This printer can print 1000 pages" might be a great statement for gadget lovers. But when trying to sell the printer’s real added value, it should be "This printer is 20% faster and can save you a lot of expensive labor."
Modern licensing models can benefit from using cloud solutions, as the cloud makes it easy to capture and collect usage data immediately and renew subscriptions on the fly. But has the whole world really gone online already? Our experts at Wibu-Systems know: That is not true. In industrial shopfloor scenarios in particular, there is so much legitimate concern about cyberattacks, sabotage, or data theft that many devices are not always available online. Often, outbound connections through dedicated gateways are the limit of what can be accepted. And availability is also another legitimate worry for many users of cloud services. It only takes a misguided shovel, and the fastest fiberoptic interconnection is cut and production comes to a standstill. What good is a 20% faster connection with a network printer, if the printer has been physically cut from the network? All the time and effort saved with modern connectivity is quickly lost again to such incidents.
The technical part of the webinar will cover the concrete ways to implement consumption-based licenses with CodeMeter.
Supported by an experienced technical team, Crouzet Automation is a pioneer in the simplification of programming. The brand offers the easiest-to-use and most adaptable alternative automation solution for specialized and demanding needs.
http://www.crouzet-automation.com
Follow us on LinkedIn: https://www.linkedin.com/company/crouzet-automation
Crouzet Automation is a brand of InnoVista Sensors™.
InnoVista Sensors™ : your trusted partner of choice to face industrial challenges of today and tomorrow.
InnoVista Sensors™ is a worldwide industrial specialist of sensors, controllers and actuators for automated systems.
Through its brands, Crouzet Aerospace, Crouzet Automation, Crouzet Control, Crouzet Motors, Crouzet Switches and Systron Donner Inertial, InnoVista Sensors™ offers a wide range of reliable, efficient and customizable components dedicated to the Aerospace & Defence, Transportation and Industrial market and segments.
Thanks to the recognized expertise of its teams and a strong innovation policy, InnoVista Sensors™ brings performance enhancing solutions to its customers worldwide.
www.innovistasensors.comCrouzet Automation is a brand of InnoVista Sensors™.
Market Intelligence Briefing and Government Panel: Cloud Sales OpportunitiesimmixGroup
immixGroup's Market Intelligence team will explore cloud technology trends within the federal landscape and provide you the information you need to uncover new business opportunities, including: organizations, decision makers, and IT programs — all critical to cloud implementation and security and IT convergence.
Demos and Q&A about Cognos Analytics release 5 with the IBM Product Team. View the webinar video recording and download this deck: http://www.senturus.com/resources/whats-new-in-cognos-analytics-11-0-5/.
Topics covered: 1) New dashboard enhancements around visualizations, navigation paths, accessing Framework Manager packages and the new maps, 2) Data modules and reporting features around linking, updated prompt controls and much more and 3) Enhancements around content embedding and portal theme control, extensions and buttons on a per-user basis.
Senturus, a business analytics consulting firm, has a resource library with hundreds of free recorded webinars, trainings, demos and unbiased product reviews. Take a look and share them with your colleagues and friends: http://www.senturus.com/resources/.
This session will share large scale architectures from the author's experiences from Cisco and Symantec.
Anshul Chhabra with Symantec, and Anil Kalbag with Cisco Systems, compare and contrast the architecture across: Infrastructure Architecture Scaling Ecommerce integrations and migration approach from legacy into Adobe Experience Manager, Digital Marketing Cloud Integrations such as personalization, analytics, and DMP.
To view the webinar go to http://bit.ly/atace102516 or for the MP4 version http://bit.ly/ATACE102516MP4
Post Quantum Cryptography – The Impact on Identityteam-WIBU
As PQC continues to be a major topic for many companies and Government Institutions, we take a dive into the topics of quantum computers, post-quantum-cryptography, and the potential relevance for (ID) use cases.
This seminar would like to present the principles of the technology and the latest developments in this field as well some indication as to the relevance, impact, and consequences on (Government) ID projects or use cases. The seminar may also look towards the relationship with these projects not only from a hardware standpoint but also from a software algorithmic stance as we migrate from current used crypto systems to quantum-proof systems.
KEY TAKEAWAYS
What is a Quantum Computer, what is Post Quantum Cryptography and when will we see a quantum computer?
The migration from current crypto systems to quantum proof systems.
How will PQC and QC affect (Government) ID projects and implementations.
What will QC mean for the security proofing of ID and Information in the future.
TARGET AUDIENCE
Interested parties in the field of Identity and Security.
Government bodies looking to the future for ID document management systems
Enterprises looking to understand the potential impact of QC upon their business and industries.
PRESENTATION: Cryptoagility and Quantum Resistance: Easier Said Than Done.
Ever since the publication of Shor’s quantum algorithm for the factorization of large numbers, it has been known that quantum computers could at some point pose a threat to our communication and data security. Today we have cloud access to small, functioning quantum computers. The answer to this threat is quantum-resistant cryptography: cryptographic methods for classical computers that are robust against attacks by quantum computers.
The standardization of such methods is currently ongoing. However, these methods are based on mathematical problems, that are much younger than the factorization problem already investigated by Euclid. On the other hand, currently used cryptographic methods such as RSA or ECDSA are broken as soon as a sufficiently large quantum computer exists. Cryptoagility is therefore recommended, software should be built or modified in such a way that cryptographic algorithms are easily substitutable. But how great is the danger posed by quantum computers? To what extent is cryptography affected, and when do we need to take action? Is cryptoagility really so easy to implement in practice or is this perhaps much easier said than done?
Unlocking the Future: Empowering Industrial Securityteam-WIBU
In today's fast-paced digital era, where industries globally are evolving through rapid digital transformation and digital assets form the core of industrial innovation, ensuring software integrity, safeguarding intellectual property, and enabling software monetization through sophisticated and adaptable software license management systems are of utmost importance.
In the realm of IoT devices and PLCs (Programmable Logic Controllers), memory cards frequently serve as an essential component of the infrastructure. Recognizing this, we've chosen to expand upon this foundation by enhancing an already crucial element in practical scenarios with additional functionalities. This strategic extension aims to not only fulfill a fundamental requirement but also to elevate the utility and performance of these devices by integrating advanced features into the existing framework.
Join us for a webinar that showcases the groundbreaking collaboration between Swissbit and Wibu-Systems, introducing CmReady – a revolutionary solution at the nexus of state-of-the-art technologies designed to meet these critical needs.
What is CmReady?
CmReady revolutionizes software protection and licensing by enabling the binding of a CmActLicense – a software license container – to a certified CmReady memory device in the form factor of an SD or microSD card, rather than tethering it exclusively to the target device running the protected software. This innovative approach grants unparalleled mobility to CmActLicenses, equating their portability with that of traditional dongles, yet with the added convenience and flexibility of removable memory devices.
Why CmReady?
Industrial memory cards, integral to manufacturers for specific project needs, already populate the field in diverse capacities and features. Recognizing the necessity to enhance these deployed units for increased sustainability, CmReady emerges as a groundbreaking solution. It not only upgrades existing memory cards with new functionalities but also transforms them into secure anchors for IP protection and software licensing. This innovative approach ensures that existing infrastructure can adapt to evolving security demands without the need for complete replacement, representing a leap forward in sustainable technological advancement.
All the Benefits of CmReady in a Nutshell
With CmReady, industrial customers gain access to a plethora of benefits:
Portable licenses bound to CmReady memory cards
Effortless activation and renewal processes
Seamless compatibility with CodeMeter Runtime starting from release 8.00 and CodeMeter Embedded starting from release 3.00
Plug and Play functionality, eliminating implementation hassle
Enhanced data protection and integrity features, safeguarding against piracy and unauthorized access
The Power of Partnership: Enabling Success Togetherteam-WIBU
A common piece of wisdom highlights the value of collaboration over solitary efforts. Working together, partners can pool their resources and expertise, achieving greater results than either could alone. This is particularly true when partners possess deep industry knowledge or local insights, like language and customs.
Another key insight is the benefit of enabling partners to operate independently. This approach can lessen your workload, accelerate the delivery of solutions, and enhance partner satisfaction by granting them more control and autonomy.
To achieve this, providing partners with the tools and knowledge for self-sufficiency is essential. While setting up processes with a partner may initially require more effort than handling tasks yourself, this investment in empowerment is sustainable and ultimately more rewarding.
These principles are universally relevant, particularly in the realm of software sales. CodeMeter License Portal is designed to facilitate this process with your partners. It can be tailored to fit various use cases and integrate with your existing processes, such as those in your ERP system, ensuring a customized and effective partnership.
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
Over the history of Wibu-Systems, there have been certain recurring reasons that have brought customers to select the CodeMeter protection and licensing solution: usually, these are hacking of software, revenues lost, the long-term limitations of a homegrown solution, the wish to supply multiple licensing models, or the plan to integrate licensing into an existing back-office system. However, once primary licensing needs are met, there is still a number of features that remains underutilized or not explored at all, just as is the case with smart phones or basic office applications.
Whatever features you rely upon most with CodeMeter today, it can make sense for you to get acquainted with the complete set of options at your disposal, optimize your processes even further, and make full use of the investment you have made. Additionally, the new generation of CodeMeter offers some special features that we are first to introduce to the worldwide market.
This webinar is a great opportunity for our current CodeMeter customers as well as those who are early in their journey towards automated license lifecycle management; both can get a complete overview of the special features of our technology and the best practices we strongly encourage. And, all should be aware that several features of CodeMeter are supplied with free lifetime maintenance included.
Discover the product highlights and the latest innovations that come with the latest version of CodeMeter.
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
Für Softwarehersteller oder Hersteller von intelligenten Systemen ist Lizenzierung ein wichtiger Bestandteil der Monetarisierungsstrategie von Software und Geräten. Nur mit Hilfe einer Lizenzierungslösung wie CodeMeter ist es möglich, das wertvolle geistige Eigentum zu schützen und gleichzeitig Raubkopien zu vermeiden, und dadurch ein Maximum an Lizenzen an die Kunden zu verkaufen. Auf der anderen Seite ist für die Anwender aber auch wichtig, dass die erworbenen Lizenzen kontinuierlich zur Verfügung stehen. Einen Produktionsausfall aufgrund nicht vorhandener Lizenzen gilt es unter allen Umständen zu vermeiden. Das gilt nicht nur für automatisierte Fertigungslinien beispielsweise in der Automobilindustrie, sondern auch bei Anwendungen innerhalb kritischer Infrastrukturen oder für Unternehmen, die global tätig sind und regional auftretende Ausfälle vermeiden müssen, aber auch keine Zeitfenster mehr für Wartungsarbeiten haben.
Die kontinuierliche Bereitstellung von Lizenzen ist bei Ausfällen von Teilsystemen ein wichtiger Aspekt für bestimmte Kunden und Branchen. Dies wird über eine ausfallsichere, hochverfügbare Lizenzierungsumgebung CodeMeter TMR-Server realisiert. TMR steht dabei für „Triple Mode Redundancy“ und kombiniert ein Konzept ausfallsicherer Lizenzverfügbarkeit (2-aus-3) mit bewährter Rechenzentrumstechnologie. Ein Cluster aus fünf Servern, davon zwei Load-Balancer und drei Lizenzserver, agiert dabei als ein Verbund-System. Solange zwei der drei Lizenzserver sowie ein Load-Balancer verfügbar sind, bleibt die gesamte Lizenzierungsumgebung betriebsbereit und garantiert damit eine Hochverfügbarkeit der Lizenzen für die Anwender.
Das Webinar gibt einen Einblick in den grundlegenden Aufbau und die Funktionsweise des CodeMeter TMR-Servers.
No Time to Idle – License availability for business continuityteam-WIBU
For software developers and the makers of smart systems, licensing is a key element in their software’s or hardware’s monetization strategies. Licensing solutions like CodeMeter empower them to protect their invaluable intellectual property, prevent product piracy, and sell as many licenses as possible. At the same time, their customers want to know that the licenses will actually be available whenever they need them: Losing valuable working hours or having your machines running idle because of a missing license would be the worst-case scenario. This goes for modern, automated production lines as are common in the automotive industry and elsewhere, but it can be even more relevant for applications running critical infrastructures or for global enterprises that cannot afford to waste their limited maintenance opportunities or even shift operations from continent to continent simply because one regional license is missing.
No Time to Idle: Making sure that licenses are reliably available to avoid systems or parts of systems falling idle might not be a matter for a 00 agent of His Majesty’s Secret Service, but it can be a matter of commercial life and death for many companies or sectors of industry. This is where CodeMeter’s Triple Mode Redundancy comes in: A high-availability licensing environment that uses a concept of two-out-of-three fail-proof TMR servers and robust data center technology. A cluster of five servers, including two load balancers and three license servers, works together to make sure that the licensing environment keeps doing its job as long as two of the three licensing servers are up and running. This guarantees that licenses are available for their users whenever they need them.
This webinar offers an insight into the design and operation of the CodeMeter TMR server concept.
Cloud-Based Licensing in Offline Scenariosteam-WIBU
Using the cloud for software licenses is all the rage at the moment, especially for enterprise software where admins take over most of the day-to-day management tasks on behalf of the users in their organization. The advantages are obvious: Providers and users can access their license information at any time, and often usage data as well. Licenses can be changed on the fly; they can be created, updated, or revoked as needed. For admins, it becomes easy to actively organize which users can use which licenses on which devices.
Manufacturing facilities on the proverbial shop floor are, however, often not hooked up to the Internet, but instead run offline and fully autonomously. The reasons for this are obvious: Machines will not suddenly come to a standstill should the Internet connection break down. This could lead to massive costs down the line – just imagine a furnace falling cold in a steelworks. At the same time, keeping machines separate from the Internet protects against cyberattacks and sabotage. Attackers cannot tamper with devices they simply cannot reach.
As part of Industry 4.0, more and more manufacturing data is sent over the Internet, e.g., for predictive maintenance. In most cases, the data is captured and passed onto the Internet via dedicated gateways. Still, there is no direct Internet connection on the shop floor for the reasons named above.
What does that mean for licensing? A lot, for architectural purposes. The servers needed to create and manage licenses are usually on the Internet. The users, like the operators of manufacturing lines, need to activate the licenses directly on the computers and devices on the shop floor. As with the data collected for Industry 4.0 purposes, this works without a direct Internet connection. All that is needed is an intermediate medium, which can be a regular PC, to move the license from the online to the offline world. If need be, this can happen completely offline by physically sharing data.
In this webinar, we will follow the process of activating licenses with an offline device and CodeMeter License Central in detail. Which data is needed at what point? How can that data be shared? Which steps are optional and can be skipped for the offline process? And how does CodeMeter License Central make all of this simpler?
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
In principle, there are two different approaches to cloud licensing: On the one hand, licenses can be created, managed, and updated via the cloud. However, the licenses are actually located on the local device and can be used offline, at least for a certain period of time. On the other hand, the licenses can be used directly in the cloud. This case requires a permanent online connection to the server in the cloud. Especially if the number of licenses used simultaneously needs to be counted reliably, such a connection to the license server is inherent. In the webinar, we will look at best practice tips for this "license server" use case.
For "always-on" licenses, CmCloudContainer is the best solution from the CodeMeter product family. The license server is operated by Wibu-Systems for you in the cloud. You create a CmCloudContainer, transfer the licenses in advance into this CmCloudContainer, and send your customer the access data (credential file). When creating the CmCloudContainer, you can choose between a Personal Container and an Enterprise Container.
The Personal Container is typically used as a container for a user (person). They can have the container active on up to three workstations. Through the License Quantity, you define on how many workstations the user can use your software simultaneously. Three active workstations do not automatically mean three licenses for simultaneous use; by default, a match of one license on one workstation is set.
The Enterprise Container is used when multiple users share a license, almost like a license pool. From an installation point of view, there is the possibility to set up a local proxy CodeMeter license server. All users access this server and do not need direct access to the cloud. This case is mainly used when devices on the shop floor are indirectly connected to the cloud via edge devices.
Alternatively, all users or devices consuming licenses can communicate directly with the CodeMeter Server in the cloud. Mixed forms of direct and indirect access through several local license servers are also possible. The exciting question here is how to disavow a device or user from the list of units of people that were initially granted access rights.
Here is where CodeMeter License Portal comes in handy and provide a turnkey solution. You and your customers create groups and users. Each user can access two CmCloudContainers, their own Personal CmCloudContainer, and the Enterprise CmCloudContainer of the group to which they belong. Depending on the use case, you can either leave the choice to your user or make it transparently in the background for them.
“A fistful of licenses” is no problem: You simply create them manually with CodeMeter License Editor or the command line tool CmBoxPgm. But “for a few licenses more”, you should think about automating the license creation, distribution, and management process. Enter CodeMeter License Central! As in Ennio Morricone’s famous western, where the Man with no Name and Colonel Mortimer team up to beat the bad guys, the unique strengths of CodeMeter License Central and ERP systems work best when they work together. They are not opponents, but perfect companions.
Depending on your use case, you need to decide which system should take the lead for licensing: the ERP system or CodeMeter License Central? You can also mix and match them both in a hybrid setup if you need to account for different workflows. One typical use case would be a combination of subscription licenses sold either directly by you or distributed via a reseller. In this situation, your resellers could create their licenses via a portal with CodeMeter License Central, and the ERP system is notified each month about the number of active licenses for an aggregated bill for the reseller. You could even sell more subscriptions directly by moving them from the ERP system to CodeMeter License Central. Alternatively, you can run reseller licenses first through the ERP system or direct-sale licenses first through CodeMeter License Central.
To make the link between the ERP system and CodeMeter License Central, you have a choice of a simple or a sophisticated SOAP interface, a generic connector with a REST-like API, or some custom layer to slot in between the two sides. When using the generic connector and a custom layer, you can adjust the operating logic to suit your specific needs, letting you respond to any changes in your requirements with little interventions and expansions that do not force you to move everything into the ERP system.
For SAP, you have two turnkey solutions ready and waiting: Our partner Informatics has created a framework for integration in SAP, typically used in the SD (Sales and Distribution) modules. Alternatively, CodeMeter License Central can be contacted directly from SAP’s EMS module.
One important aspect is the backchannel between CodeMeter License Central and the ERP system. When the ERP system is in the lead, the backchannel can feed back information about the current state of licenses, e.g. whether and where they are activated. All of this information can be sent via the notification dispatcher (push) or requested by the ERP system when they are needed (pull). If licenses are created in CodeMeter License Central, the backchannel is still key for the ERP system to bill those licenses, again with push or pull options available.
The Industrial Internet of Things has well and truly arrived, with manufacturers around the world having access to a vast assortment of smart machines with clever app features for tailoring their functionality perfectly to their needs. But where to start? To really kick off the connected, app-driven, and smarter industry of tomorrow, end users need an app marketplace that they trust and know how to use, with apps that they know will work on their equipment, and everything with confidence in legal, commercial, technical and – not least – security terms. The Open Industry 4.0 Alliance, Hilscher, and Wibu-Systems have come together to showcase how this can be done with the OI4 Community App Store, Docker containers for interoperability, and CodeMeter for safe operations and secure intellectual property.
Today, the world of industrial applications is very diverse and forms a complex ecosystem that entails a multitude of technical requirements. Due to the current complexity of the brownfield environment, a broad acceptance of existing applications and their ease of use are bogged down, if not made even impossible.
The overarching goal is to place the user experience first and foremost so that end users can move to the ecosystem of their choosing, without being permanently tied to a particular infrastructure. Wider choice, more flexibility in deployment, and rapid response to changes are the direct results of these greater freedoms.
As we all know, digitization is now in full swing. Triple-digit billions are being invested in this sector, with everyone, regardless of their role in the value chain, expecting increased productivity and shorter delivery and setup times. The end game: improved inventory management, shorter market entry cycles, reduced batch sizes, and sustainability in the form of energy efficiency and optimization of the resources utilized.
The Open Industry 4.0 Alliance (OI4) gathers manufacturers and providers of Industry 4.0 solutions and services worldwide aimed at successfully transitioning customers to the Industrial Internet of Things. The group has developed a joint approach with all its members to reach tangible results on the path towards a complete digitization of the manufacturing industry.
Three main stakeholders come into play:
1. The application providers, who bundle their expertise in professional apps and make them available to a broad market;
2. The store operators, who provide the end users with a large number of applications and map legal, commercial, and technical aspects in their systems;
3. The end users, who don’t want to deal with the complexity of different store systems and expect trustworthy platforms.
Hilscher, a name that has stood for trendsetting automation solutions for over 35 years, and Wibu-Systems, a global leader in software monetization via protection, licensing, and security, are members of OI4 and ready to demonstrate this constructive attitude during this live masterclass.
Protecting and Licensing .NET Applicationsteam-WIBU
.NET has seen a surge in its popularity as a development platform since 2018, powered not least by the multiplatform capabilities introduced with .NET Standard. According to the Tiobe Index, C# currently ranks in fifth spot as a choice for developers in .NET, outranked only by Python, C/C++, and Java. Python is particularly in demand for internal projects or automation use cases, as Java is for servers, and .NET for end user devices. For traditional standalone and client applications, it is safe to say that .NET is a sure second choice alongside C/C++.
Security matters, and it matters especially when applications are run out in the field, on an end user’s device. This is true for the end users themselves, as they don’t want their machines affected by malware or other harmful code, which is usually avoided by solutions like signed code. But it is also true for software developers who want to protect their work from piracy or IP theft. .NET differs from C/C++ in that the source code does not go through a compiler to run as machine code on a specific platform. Instead, it is turned into intermediate code that can still run on multiple platforms. The downside to this is that the intermediate code remains accessible for snooping and tampering by would-be attackers. License checks can be removed or replaced by forged ones, and business secrets contained in the code may simply be stolen.
Our answer: AxProtector .NET from our CodeMeter Protection Suite. AxProtector .NET works perfectly with code signatures, meaning developers do not have to make that decision between security for the end user or protection for their own IP. They can, and should, have both.
AxProtector .NET makes clever use of the easy legibility of the intermediate code: it extracts all the classes and methods contained in a .NET assembly and encrypts them piece by piece. The encrypted code is then placed back instead of the original code.
During runtime, the methods are decrypted on the fly when they are called for. The actual intermediate code remains in the device’s working memory only for a brief moment to run through the Just In Time Compiler (JIT) and create the machine code, and then it is erased from memory. A native C/C++ component, CPSRT, takes over part of the decrypting and runs cyclical security checks in the background. By comparison to a straight-up .NET solution, adding this native component increases the security of the system again. CPSRT is available for most common platforms and processes, including Windows, macOS, Linux, Intel x86 and x86-64 as well as ARM and AARCH64. It does not normally mean any limitation to the application’s ability to run on multiple platforms.
Rolling out or updating licenses should be as simple and straightforward as possible. CodeMeter already comes with lots of workflows for the purpose on its License Portal. Many jobs can be automated through that portal, and the work for the user reduced to a few simple clicks. However, all of this needs a user who would manually start the activation or updating process. For larger organizations that depend on up-to-date transparency about the licenses that are active in the field, the License Portal is also the optimum solution.
But how could you streamline the process on the user’s side even more? This is where a bit of magic comes into play in the form of the Software Activation Wizard.
CodeMeter has many different use cases covered with a choice of source code examples for different developer languages to help you put in place your own Software Activation Wizard to match your processes, workflows, and requirements. All you need is CodeMeter License Central and the right gateways in the cloud.
There are many use cases that could include automatic license updates, such as:
Adding or removing features
Revoking entire licenses
Automatically renewing subscriptions after payment has been received
Updating service technicians’ licenses
Automatically renewing maintenance contracts
Locating or locking lost licenses
An automatic update removes the need for the user to do anything. Nobody has to be reminded to activate an update over the License Portal. Not only is this easier and more comfortable for the user, it also gives you, as the vendor, full control over the process. The Software Activation Wizard can become a perfect fit for your business by being integrated in your software and tailored to your processes and your corporate design.
Automation saves costs, and it gives you a great means to collect data and retrieve it via CodeMeter License Central. One popular option is to register users during license activation, which is particularly appealing when your licenses are sold through diverse channels, but you still want to know who your users are in the wild. This even works with free software: it can be activated and registered in the same manner, with the license created in the background during activation, and you will know who is using your software.
The first step is always the most decisiveteam-WIBU
“You don’t get a second shot at a good first impression.” We have all heard this deceptively simple saying. It applies to your and our relationships with potential new customers, but it also applies to your first impression of working with our software protection and licensing technology CodeMeter. Workflows that used to be state of the art only a few years ago are no longer accepted without question today. Just think of the old habit of distributing trial versions of software on CD-ROMs or DVDs at expos. Nobody does so anymore, because very few people have the necessary drives left on their new computers. As a software developer or vendor, you will recognize many of the challenges we at Wibu-Systems face when it comes to providing test versions of our product to potential clients. That is why we have prepared a webinar to share our ideas and experiences with designing the new evaluation process with you. In this masterclass, you will discover the workflows we use with our clients, with a look behind the scenes to show you how and why we do it this way. You can do everything we have done in this process yourself with CodeMeter for your own processes.
In the past, Wibu-Systems delivered its test versions through the mail, i.e. a physical SDK toolkit including two dongles and a DVD. The disadvantage is obvious: Potential clients had to wait for the package to arrive before they could test our technology, and they had to have a DVD drive to use the included disc. In short: We needed a new approach. Our goal was to enable our clients’ testing team to start their tests immediately, while keeping the cryptographic keys needed for the process as secure as they were on the hardware-based CmDongle.
The combination of CmCloudContainers and CmDongles means that all possible requirements are covered. The cryptographic keys are always kept safe; users with online access can start to test the software immediately, and users forced to go the offline route can still carry their licenses and keys around on the CmDongle. Should the situation change later on, everything can be switched around as needed.
The CodeMeter Developer Portal is modelled on the CodeMeter License Portal. If you want, you can copy our choice of offering a combination of dongles for offline scenarios and cloud containers for a faster response. You can also get access to the CodeMeter Evaluation Portal, a trial version of the License Portal that lets you review the processes from your specific vantage point and see in action how you would produce trial versions of your software or even enable your sales partners and resellers to do so.
Authenticate and authorize your IIoTdevicesteam-WIBU
“Who’s who” is an important question, not just for the publishers of biographical encyclopedias. Identities and reliable ways to identify people, devices, and real or virtual objects have become more important than ever before as much of our lives, including the industrial world, has gone digital. The new opportunities coming from this also contain new challenges: From biometric passports making travel safer and more secure to eID technologies facilitating virtual transactions and digital certificates establishing themselves as the technology of choice to authenticate devices and actors in the industrial IoT, the tech world is exploring how identity can be represented both online and offline.
Digital certificates are a great tool to uniquely identify people or devices with the tried-and-tested reliability and security of a pair of cryptographic keys acting as the currency of trust: One key is public and confirmed by a neutral authority, the Certificate Authority, to belong to the person, device, or digital object, and the other is private and secure. With a certificate signed with that private key and the private key stored safely away from prying eyes, there should be no way to tamper with or steal the identity it confirms.
CodeMeter Certificate Vault is our answer: The keys are kept safe and the necessary cryptographic operations handled in the smart card chips embedded in our secure hardware elements, our CmDongles. But CodeMeter Certificate Vault is more than that: It acts as a PKCS#11-compliant token provider, acts as a go-between when keys need to be accessed, e.g. through the OpenSSL API, it works perfectly in the important M2M communication standard OPC UA, and it simplifies the often laborious process of distributing and managing certificates by bringing the whole comfort and great performance of CodeMeter License Central to the certificate world. Key pairs are created, bound to their intended container, and packaged in a secure file that can simply be shipped over to their destination. With CodeMeter’s award-winning encryption, the entire process is safe from theft and tampering. In his talk, Guenther Fischer will look at three use cases that show the power of CodeMeter Certificate Vault in action.
Security and Protection for Machine Learning.pptxteam-WIBU
Machine learning. We believe that it has the potential to be a game changer that will transform the course of our future. But what actually is machine learning? The term refers to training an artificial intelligence with typically massive sets of data. The resulting trained model can then predict other data. To illustrate this, we can see how medical data could be processed automatically by an artificial intelligence.
Think of a doctor screening a patient for TBC. The doctor takes a look at the X-ray image to tell whether the patient is infected or not. This needs years of training and lots of experience. A trained AI could do the same job much more efficiently and make the technique available even to general practitioners. Imagine that a maker of TBC screening systems produces a system that read the X-ray scans and make the diagnosis by itself. All it needs is a good set of X-ray images with the right diagnoses attached. The system is trained with these scans to produce a model that can predict the diagnoses for future scans. What is immediately clear is that the data that the machine is being fed with has to be sound: All incorrect or flawed data has to be screened out, and the meaningful data has to be identified and correlated. The model that slowly grows from this process becomes the intellectual property of the manufacturer. And as soon as intellectual property comes into the picture, we get problems: There will be counterfeiters trying to build similar systems by abusing the property of the original maker. There might even be outright saboteurs who want to manipulate what the system can do in practice.
Latest at this point – much sooner, if you ask us – the device maker should start thinking about ways to protect that IP. The IP comes in multiple forms: It is the data used originally to train the model, the training setup itself, and the eventual trained model. It does not matter whether the model in question is a virtual system operating in the cloud or an actual device sitting on a desk in a doctor’s surgery room somewhere. At stake in both cases is a data model that can be accessed via the physical device and that needs to be securely stored in the cloud. And for both threats, CodeMeter has a perfect solution: Encrypting the model to protect it against unauthorized use, copying, or espionage.
Nobody enjoys being bossed around. Nobody enjoys having their every move monitored, especially if the checks and controls make life harder than they should. But if everybody did what they wanted, there would be anarchy. And the same is true for software licensing: Without any protections, your software will eventually fall victim to thieves and pirates. Tough and strict controls can help minimize that risk. Tools like CodeMeter Protection Suite make it easy to encrypt software and bind it irrevocably to a license. But when things go wrong – maybe the computer with the license breaks – it can mean that the user cannot keep working with their software on a new device.
This is where a license portal comes into play as the perfect self-service solution for your clients. You define what your users and distribution partners should be able to do on their own. Our license portal and CodeMeter License Central keep track of all license actions of your users and partners. You can check up on what happened at your leisure and intervene if there is any funny business with anybody.
You can set smart cut-off values to stop people from abusing the freedom you have given them. When one of these points is passed, it would be up to you to allow or disallow any action manually. This is the perfect compromise between the two extremes “Allow everything first and check up on it later” and “Allow nothing and control everything yourself”.
Self-service options for single users include:
- Moving licenses to other devices / dongles / users
- Recovering lost licenses
- Creating and activating emergency licenses
- Creating demo or trial licenses
- Binding cloud licenses to other devices
- Changing the access details for cloud licenses
But license portals are not just there to make life easier for individual users. They include features and functions that are perfect for commercial clients or multi-level distribution models. On top of individual users, you can define hierarchies of different roles for different client or partner levels. For instance, administrators and partners could see all licenses for their part of the tree, while end users can only see the licenses allotted to them or their specific unit.
License portals can also be set up to allow resellers or distribution partners to create their own full-scale licenses at the point of need. As with all of these features, this is an optional setting that you could configure for all partners or only for specific partners of your choosing.
Running code in secure hardware or cloud environmentsteam-WIBU
Software protection has one prime mission: To prevent your software from being run and taken apart by a debugger. Paradoxically, this makes life harder not just for hackers, but also for legitimate developers trying to test their work and remedy any bugs that might be hidden in it. Now, with CodeMoving, you can take the leap into optimal protection: CodeMoving lets you move essential code into a secure CmContainer for execution far away from the prying eyes of would-be hackers. But how can developers test their work under these circumstances? The new generation of AxProtector comes with a simulation mode, built specifically for that purpose.
CodeMeter Protection Suite includes a variety of AxProtector flavors that make protecting applications easy. There are versions of AxProtector for native Windows, macOS, Linux, and Android applications and for applications in Java, .NET, Python, and JavaScript. AxProtector itself is available as a standard version for encrypting either entire applications or individual functions. File encryption, IP Protection mode, and CodeMoving are available as optional resources.
File encryption allows your application to load protected files, such as models used for AI. The IP Protection mode works against reverse engineering without your software needing a CodeMeter license and without CodeMeter being installed on the user’s system. With CodeMoving, you can have sensitive parts of your software executed in the secure confines of a CmContainer. This masterclass will show you how to make the most of CodeMoving, including the ability to test and debug even protected code.
With CodeMoving, you can create as many code fragments as you want for execution in a CmDongle or CmCloudContainer. To move the code, the application is encrypted with AxProtector; all functions to be moved are compiled and encrypted by AxProtector and normally kept in the application like their peers with regular AxProtector protections. While AxProtector decrypts and executes the function in question in the memory of the computer during runtime, CodeMoving first moves it into a CmDongle or CmCloudContainer to be decrypted and executed with the right input parameters. The output parameters are then returned to the application. CodeMoving is more secure than AxProtector used by itself, while regular encryptions with AxProtector offer better performance for the protected code. To find the optimal balance for your application, a combination of CodeMoving and functions encrypted with AxProtector is possible.
Subscriptions - Relationships built to lastteam-WIBU
Subscriptions range somewhere between the holy grail and the gold standard for software vendors. They have already become the norm in much of the consumer world, and they are becoming increasingly popular for commercial options as well. The secret to their success is not so secret at all: For the vendor, they promise a steady stream of income. For users, they offer affordable access to software without steep upfront costs for the licenses. The costs for maintenance and further development become more predictable for both sides, and users know that their software will always be the latest version available. Despite these many plus points, the decision to switch from straight-up sales to subscription models deserves some care and attention, as it can mean a drop in actual revenue in the initial transition period.
Beyond these financial considerations, the switch to subscription models also calls for some attention to the technical nitty-gritty. There is one technical hurdle that needs to be taken in any case: All subscription models need some form of channel between the vendor and the user – magical thinking is not enough, and telepathy is out of the question. Even in today’s hyper-connected world, this is still a live issue, as there are many devices that need to operate offline, maybe even in secure and cordoned-off environments. Speaking generally, there are two possible routes to consider:
* Licenses can be created as permanent licenses that work without any further intervention. When the subscription is cancelled, the license is turned into a temporary license or deactivated on the spot, ideally with a form of receipt to record that transaction. One major drawback of this choice is that licenses may still be used by more fraudulent users (e.g. those claiming that they lost the device they had bought the license for). And even for legitimate and upright users, there is little incentive to care about deactivating their licenses properly. Still, this straightforward option has the considerable advantage that it needs hardly any updates or interventions in the case of offline use.
* Licenses can be created as temporary licenses that are renewed on a regular basis. Should a subscription be cancelled in this case, the license is given a new fixed expiry date and is not renewed anymore beyond that time limit. From the point of view of license enforcement, this is the way to go, as it essentially prevents all fraudulent use after the planned expiry date. The approach does, however, need a mechanism for regularly updating the licenses, even if they are used in offline scenarios. Preplanned push updates by file transfer can facilitate this, with lots of automation opportunities to make the process as unobtrusive as possible.
JavaScript was born as a script language for dynamic websites in the infancy of the Internet in 1995. Today’s JavaScript is a different beast altogether, as it has matured to a language of choice for desktop and server applications – one more reason for its popularity, currently ranking 7th in the TIOBE index of popular programming languages. For server and desktop applications in particular, JavaScript now does far more than simply displaying interface elements. In many cases, even the most sensitive and precious operating logics of applications are realized in JavaScript.
Straightforward server applications offered as Software-as-a-Service usually have little need for licensing or added protections. But stable Internet connections are not a given, even in today’s hyperconnected world. The recent 7-hour outage of Facebook, WhatsApp, and Instagram showed the world how fragile the digital infrastructure can be. Clients and users need an option to run mission-critical applications in private clouds, on edge devices, or even completely on-premises. JavaScript can accommodate all these scenarios without the applications needing any rewrite. However, new software protection and licensing concerns need to be addressed if this route is taken: While server applications were safe and sound in their maker’s own data center, where one only had to keep track of the number of registered users, now applications are let out “into the wild”, and JavaScript’s very nature makes it easy for skilled attackers to remove or get around license checks. Unless you add AxProtector JavaScript.
Most server or desktop applications worth to be protected are based on Node.js, which is the standard use case AxProtector JavaScript was designed for. Like its siblings AxProtector Windows, Linux, macOS, Android, .NET, Java, and Python, AxProtector JavaScript is made to operate “in the wild” and to guarantee top protection by encrypting the executable code and optionally integrating license checks right in the application itself. The protected code is only ever decrypted when it is actively being used; code not needed at any given point remains encrypted and cannot be extracted from the host computer’s memory.
You can even encrypt separate parts of your code with individual licenses and cryptographic keys for a more granular and modular protection of your software. With modular encryption, you can deliver your applications will all features onboard, and allow your users to activate and use the features they need by buying additional licenses.
Safer to market: Licensing and e-commerce integratedteam-WIBU
In our digital age, it is software that makes the world go round. Companies that used to sell hardware only are now letting software and firmware determine the feature sets of their products. The same is true for conventional software houses as well, where lifetime licenses are being replaced with pay-per-feature or subscription models. But this freedom of choice and added value for the user comes at a price: The IP and development efforts invested in the products. To monetize these investments, vendors need ways to market, manage, and enforce licenses, and not just for the initial purchase, but also for subsequent aftermarket feature activation or subscription renewals.
In addition to entitlement management and license enforcement, commercial concerns play a key role in these processes. The list of requirements from software and device manufacturers is long, as is the list of legal factors to be considered. This is where e-commerce providers like Cleverbridge, who specialize in these processes, come into their own. Cleverbridge’s features and capabilities leave little to be desired: their solution handles local payment methods around the world, regulatory compliance, and even automatic billing for license renewals.
Cleverbridge's e-commerce platform covers the commercial part of the requirements, while CodeMeter License Central is there for entitlement management and enforcement. Both systems integrate and work perfectly with each other out of the box to offer maximum added value for their users. And at the same time, both systems come with additional interfaces to link up with other systems, such as ERP and CRM. Everything is built to fit neatly into even very heterogeneous landscapes.
Combined and integrated, CodeMeter License Central and the Cleverbridge e-commerce platform automate two separate processes: Payment and billing on one side and entitlement and license enforcement on the other. The Cleverbridge e-commerce platform can call an external license engine for delivering entitlements, and CodeMeter License Central is ready to work as the endpoint for this call. A small piece of Software, the Cleverbridge Connector, maps the data fields between the Clverbridge e-commerce platform and CodeMeter License Central and builds a bridge between the two systems. The integrated solution supports multiple use cases, including the most common types:
- Entitlements with perpetual licenses
- Creating feature-based licenses
- Managing subscriptions
When a product is purchased or a subscription is renewed, the system checks that the license entitlement has been issued or updated accordingly. Simply put: The Cleverbridge platform takes care of communicating with customers, and CodeMeter License Central manages entitlement and license enforcement for the software.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Why React Native as a Strategic Advantage for Startup Innovation.pdfayushiqss
Do you know that React Native is being increasingly adopted by startups as well as big companies in the mobile app development industry? Big names like Facebook, Instagram, and Pinterest have already integrated this robust open-source framework.
In fact, according to a report by Statista, the number of React Native developers has been steadily increasing over the years, reaching an estimated 1.9 million by the end of 2024. This means that the demand for this framework in the job market has been growing making it a valuable skill.
But what makes React Native so popular for mobile application development? It offers excellent cross-platform capabilities among other benefits. This way, with React Native, developers can write code once and run it on both iOS and Android devices thus saving time and resources leading to shorter development cycles hence faster time-to-market for your app.
Let’s take the example of a startup, which wanted to release their app on both iOS and Android at once. Through the use of React Native they managed to create an app and bring it into the market within a very short period. This helped them gain an advantage over their competitors because they had access to a large user base who were able to generate revenue quickly for them.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces