Konferenzen und Rahmenprogramm
Software is the prime target for attacks. Unprotected software can be easily digitally copied, allowing the pirate to sell the software for their own personal gain and well below its intended value. In cases where software is linked with a machine or control system, the electronic and mechanical parts are copied together, allowing the attacker to create a counterfeit copy that looks and operates just like the original, but requires just a fraction of the cost of the original to build. Effective protection technologies exist today that encrypt software code and create licenses which can be bound to a secure element in the target system. The software would then run only on the designated machine, device, or embedded system and provide the functionalities associated with the license, safe from any sort of hacking. Complementary license and entitlement management systems allow software-powered businesses to meet customers€™ demands in a granular way and in turn expand their reach globally.
--- Datum: 25.02.2020 Uhrzeit: 15:00 - 15:30 Uhr Ort: Conference Counter NCC Ost