fish fry
Subscribe Now

Software Cat and Mouse

IP, Ownership, and Cyber Piracy Today

So you’ve built yourself some lovely software. You’ve shined and polished the corners, field tested it, and even gotten the approval of the VCs on high. But what if, the whole time, there was a tiny hole in your code? And because of that tiny hole, the bad guys were able to waltz right in and are now using your software all willy-nilly-like without paying. Well folks, this is happening a lot more than we know. Or, maybe we do know about it but we just don’t want to talk about it. This week we’re pulling back the curtain on software piracy, IP thievery, and unlicensed software usage with Ted Miracco from SmartFlow Compliance Solutions. Ted and I discuss where the biggest piracy threats are coming from these days and how companies big and small can protect themselves from those sneaky, scurvy-ridden cyber pirates.


 

Download this episode (right click and save)

Links for September 30, 2016

More information about SmartFlow Compliance Solutions

New Episode of Chalk Talk: Targeting SDR Design to Hardware

Leave a Reply

featured blogs
Oct 23, 2019
The most complex of the Platonic solids is the icosahedron with twenty triangular faces....
Oct 23, 2019
IDC or Crimp? When discussing options for cable assemblies, designers frequently ask if we recommend discrete wire cable assemblies with crimped contacts or insulation displacement connectors (IDC) with ribbon cable. Our answer is it depends on your application. Crimped conne...
Oct 23, 2019
Recently the Western Automotive Journalists, or WAJ (I had no idea that was a thing), held their annual Silicon Valley Reinvents the Wheel event at the Computer History Museum in Mountain View.... [[ Click on the title to access the full blog on the Cadence Community site. ]...
Oct 22, 2019
By Abdellah Bakhali – Mentor, A Siemens Business Better SoC IO ring verification means more accurate and consistent product reliability. New automated checks help designers identify and correct errors early in the design flow. Learn more here… Aristotle once sugg...
Oct 18, 2019
[From the last episode: We looked at the role of cache memory in a processor.] Now that we'€™ve looked at the major components of a computing system, let'€™s put them together. We won'€™t talk about how we'€™re putting them together for the moment; that comes next. We...