2 04, 2015

Services Can Add Automatic Image Attribution for Your Website

By |April 2nd, 2015|WordPress|

Multiethnic Group of Hands Holding Copyright

Stock and custom photos and images can add a nice final touch to your website and blog when making a point. The prevalence of photo sharing services and new digital technologies has made photos more common across the Web, so your content needs to secure stunning images to keep up with the competition.


31 01, 2015

The benefits of LaaS for software development, deployment and customer service

By |January 31st, 2015|Labs64, Licensing, NetLicensing|

The movement of infrastructure, processing and networks to the cloud often involves the emulation of software and services that run these cloud-based platforms. Software running in the ether still requires a license, but managing the licensing for virtual machines can become a complex task, especially when a single server or machine may run multiple instances of your software.

CLicensing as a Service, or LaaS, has emerged as a new way to allow vendors to manage the software they provide to customers, freeing up time for development and product innovation instead of having to continually ensure that customers are only running the amount of instances they pay to license. This development may also be outside the vendor’s area of expertise.

16 12, 2014

Who’s Watching You?

By |December 16th, 2014|Trends|

It is undeniable that one of the largest technology stories of 2013 was not a new range of televisions, or a revolutionary smartphone. Although these were both technologies that emerged in this year, the story which saw a UK newspaper destroy computer hard disk drives in the presence of members of the Security Forces and a well-documented man-hunt across half of the world was the revelations released by a former employee of the American National Security Agency that millions of people had had their personal emails and mobile phone records accessed by agencies in both America and Europe.
Although the initial impact of this was the shock that agencies had first of all been able to access this material with such ease and that it had been considered acceptable; the secondary effect was the realisation that major email and telecommunications companies had been willing to hand over information about their customers to these agencies.

17 11, 2014

Is there a decline in personal device usage?

By |November 17th, 2014|Trends|

Fotolia_68537090_SThe ongoing focus of this series has been the changing habits of application users. Until now we have focused largely on applications and how the evolving use of applications means that it is necessary for developers to make a change in their approach to creating and marketing their products.

The change in application use is reflective of a broader shift in the way that people interact with the technology around them. Even five years ago, people were not as ‘connected’ as they are now. Increasing broadband connection speeds, wider availability of free Wi-Fi, 3G and 4G mobile networks has meant that we are hardly ever away from the multitude of computers that we now carry with us, wherever we go.

1 11, 2014

Labs64 NetLicensing 2.1 is Out!

By |November 1st, 2014|NetLicensing, News and Announcements|

Today we’re excited to finally announce the availability of the Labs64 NetLicensing version 2.1.

You’re very welcome to give it a try, and share your feedback with us.

Release highlights:

  • Get an instant overview of your activities on a vendor dashboard at NetLicensing Management
  • Licensing Models got new friendly and intuitive names: “Try & Buy”, “Subscription”, “Rental”
  • Service reliability taken to the next level with NetLicensing Agent
  • New Java client library introduced
  • Java, C# and PHP client libraries adapted to employ the new API features
  • Service documentation revisited for better clarity and readability
  • … and many other useful improvements

Please see the Release Notes for the complete list of changes and new features.

11 09, 2014

The New Way to Pay

By |September 11th, 2014|PSP, Trends|

NFC - Near field communication The defining aspect of the success of Smartphones over the last five years has been the ability that they have given us to literally do anything we want in practically any place. The phrase ‘there is an app for everything’ has now become common parlance amongst both industry members and consumers alike. We carry in our pockets mini-computers with more power and potential than those which we used in offices just 10 years ago.

We are also using our phones and tablet devices for much more than the simple entertainment devices which can make and  receive calls that was the at the core of the first smartphones. Millions of people now manage their finances largely through online banking and carry out a significant number of transactions and transfers just using their thumbs on the 4 inch screen of a mobile phone.

31 08, 2014

Think outside the Box (and your wallet)

By |August 31st, 2014|Labs64|

Think Outside The Box Torn Paper


You are an inventor, you have a great idea for a new piece of technology but you don’t have the resources to properly explore your ideas and bring them to fruition. You don’t have any great amount of disposable income and there is no one willing to back you. You don’t want to do a half hearted job as you’re worried that if you don’t get it right first time, then you will have lost your chance and your dreams will be over.

What makes the whole situation worse is that the few people you have told about your idea have been really positive, you’ve approached a few potential investors and they’ve all mentioned the ‘potential’ which your idea has but none of them have been willing to hand over any cold hard cash to actually help you get off the ground and take the time to truly develop your idea to the best of its potential.

10 08, 2014

‘Specific Use’ Applications

By |August 10th, 2014|Trends|

It might seem strange to think that it is now ten years since the largest social network every created was first dreamt up in the dormitory of an American University. It’s uniquely recognisable symbol is everywhere and can be used to access almost everything. It is undeniable that social networking has completely changed the way in which we interact with people as well as how we approach our day to day communications with one another.

A significant part of the success of the major names in social media has been the ability to share photos, stories and send instant messages from a single place. This convenience has stretched from the browser interface across to tablets and mobile devices.

However, the endless amount of advertising, ‘promoted posts’ and a general excess of material in which people simply have no interest has pushed users away from the fully integrated GUI and towards applications which have a particular function. Applications which do one thing exceptionally well, as opposed to do many things to a lower level of quality and with regular changes to the user experience.

16 07, 2014

Working with Canvas – The new technology of vector animation

By |July 16th, 2014|HTML5|

Use of HTML5 gives developers new horizons in animation implement for their websites. There is no need to use outdated Flash technology or to overload traffic with large images, you can simply familiarize with a few norms of creation of motion interpretation by canvas redraw.


8 07, 2014

Application Security: The Essentials – Insufficient Transport Layer Protection

By |July 8th, 2014|Security|

In this, our final article in our series on the essentials of Application Security, we will be looking at Insufficient Transport Layer Protection. This occurs when an application has failed to properly encrypt network traffic, which means that confidentiality and overall integrity has been compromised. ITLP also covers the times when applications network level security is weakened; this can be because of flaws in algorithms, improper use of certificates and use of security certificates which have expired.

All of these factors will reduce the effectiveness of any Secure Sockets Layer (SSL) and Transport Layer Security (TLS) which you have put in place as a part of the application’s development.

If you are unfamiliar with either TLS or SSL then now is the time to acquaint yourself. TLS, and SSL before it, is used to add a layer of security to all traffic which has gone through an authentication process – i.e. when you have logged into a website or application, TLS will protect any data which is sent over the network for the duration of the session. SSL certificates are installed on the relevant servers and are in place to act as verification that the site or app to which the user is connecting is genuine.