"Security"

What is the right cloud CAD storage?

What is the right cloud CAD storage?

Cloud technologies are trending. But engineers are still on the fence to decide about how to move to the “cloud future”. Last week at Solid Edge University in Boston, I was learning about Siemens PLM approach in cloud and how Solid Edge is developing complementary cloud features to their desktop…

Share
Cloud PLM, frictionless collaboration and IP protection

Cloud PLM, frictionless collaboration and IP protection

I shared my thoughts how collaboration technologies and product development can make a dent into current PLM development trajectories. Digital transformation brings lot of changes in our lives. Our daily routines are changing, the way we drive our cars, communicate with people, do banking and shopping are changing. So, the…

Share
How cloud infrastructure can prevent engineering IP theft

How cloud infrastructure can prevent engineering IP theft

Security is important to make cloud solution successful. Even latest researches shows security is not the first concern from companies considering to move to cloud solution (), it is still an important element of any cloud solution validation by IT and other companies. One of the most critical elements of…

Share
Will PLM and ALM prevent a car from being hacked?

Will PLM and ALM prevent a car from being hacked?

Integration of hardware and software is a topic in mind of many manufacturing companies these days. PLM was traditionally focused on mechanical and lately on electronic topics cannot ignore more software. Software developers are using a different set of tools for configuration management. For long time ALM (Application Lifecycle Management)…

Share
The importance of software BOM for hardware security

The importance of software BOM for hardware security

We live in the era of smart products. Modern smartphones is a good confirmation to that. The average person today keeps in his pocket a computer with computational capability equal or even more than computer that aerospace and defense industry used for navigation. In addition to that, you smartphone has…

Share
How PLM vendors will develop next security technologies

How PLM vendors will develop next security technologies

The world is a scare place today. Every day we hear about different security problems – very large retail network informed me that their payment system was breached; large organization informs that customer databases with account information leaked, proprietary photos of celebrities available for general public, credit card numbers compromised….

Share
3 security related questions to ask your PLM cloud provider

3 security related questions to ask your PLM cloud provider

Cloud is getting wider adoption these days. An interesting trend I observe for the last year – customer are asking less questions about security. It was different 3-5 years ago. Everyone got concerned about cloud solutions security. Specifically for PLM domain, customers got concerned about company IP (drawings and other…

Share
PLM security: data and classification complexity

PLM security: data and classification complexity

Security. It is hard to underestimate the importance of the topic. Information is one of the biggest assets companies have. Data and information is a lifeblood of every engineering and manufacturing organization. This is a key element of company IP. Combined of 3D models, Bill of Materials, manufacturing instructions, suppliers…

Share
Security and permissions are showstoppers to adopt search

Security and permissions are showstoppers to adopt search

Search and information discovery is a big deal these days. Inspired by Google and other web search giants, we want information at our fingertips at the right time. I’ve been following topic of search long time. You can jump on few of my previous articles about search – Oslo &…

Share