Remove Information Security Remove Licensing Remove Software Remove Wireless
article thumbnail

Experience “The Big Pivot”

Cloud Musings

For software companies, this painful shift could be from an established initial license purchase and annual maintenance revenue model to a software subscription model. Product-wise this may also include shifting from custom offerings to delivering fixed and standardize software services.

Data 118
article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

WIENS : Yeah, so people when they asked me what I do, I say I build software that takes apart other pieces of software. So the idea is that for a variety of purposes, a company might want to understand is this piece of software, a virus or someone else might want to say, is this piece of software that I'm going to run on my computer?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

And the Xbox One seemed like a higher level software type hacking and I wasn't quite comfortable with that level of software. And so I was always kind of into you know, wireless stuff. It's always seems kind of magical, I guess to people, you know, wireless transmission and everything else and how it works.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

I’m Robert Vamosi and in this episode I’m talking about our right to repair, how some high tech companies might want to limit that right, and how there’s a group of information security professionals who are volunteering their free time to fight for those rights in local legislation.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

I’m Robert Vamosi and in this episode I’m talking about our right to repair, how some high tech companies might want to limit that right, and how there’s a group of information security professionals who are volunteering their free time to fight for those rights in local legislation.

article thumbnail

How to make your offline self harder to find online

The Verge

You can’t wipe all your info off the internet — but you can make it less available There are two key concepts in information security : threat model and attack surface. For some states, you may only need to enter a birth date, while others require a partial Social Security number, driver’s license, or other government ID number.

How To 130