soft

ETSI launches First Software Development Group

Sophia Antipolis, 25 July 2023

ETSI is proud to announce the establishment of its first Software Development Group, called OpenSlice. With this group, ETSI positions itself as a focal point for development and experimentation with network slicing.

Read More...




soft

ETSI Announces New Software Development Group for Common API Framework

Sophia Antipolis, 9 November 2023

ETSI is delighted to announce the establishment of a new Software Development Group, called OpenCAPIF. OpenCAPIF is developing an open-source Common API Framework, as defined by 3GPP, allowing for secure and consistent exposure and use of APIs.

Read More...




soft

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.

Dive into six things that are top of mind for the week ending Oct. 25.

1 - CSA: How to prevent “shadow AI” 

As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”

So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.

The white paper covers shadow AI topics including:

  • Creating a comprehensive inventory of AI systems
  • Conducting gap analyses to spot discrepancies between approved and actual AI usage
  • Implementing ways to detect unauthorized AI wares
  • Establishing effective access controls
  • Deploying monitoring techniques

 

 

“By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.

For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:

  • The asset’s description
  • Information about its AI models
  • Information about its data sets and data sources
  • Information about the tools used for its development and deployment
  • Detailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standards
  • Records of its access control mechanisms

Shadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.

To get more details, read:

For more information about AI security issues, including shadow AI, check out these Tenable blogs:

2 - Best practices for secure software updates

The security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.

To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.

“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.

Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally.

 

 

The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.

“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.

To get more details, read:

For more information about secure software updates:

3 - Report: GenAI, attack variety, data security drive cyber strategies

What issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.

That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. 

These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.

“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.

Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.

Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.

Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.

“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.

To get more details, read:

For more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:

4 - CISA lists software dev practices most harmful for security

Recommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.

Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.

“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.

“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added.

 

 

Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:

  • Using programming languages considered “memory unsafe”
  • Including user-provided input in SQL query strings
  • Releasing a product with default passwords
  • Releasing a product with known and exploited vulnerabilities
  • Not using multi-factor authentication
  • Failing to disclose vulnerabilities in a timely manner

Although the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.

If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.

To get more details, check out:

For more information about how to develop secure software:

5 - New EU law focuses on cybersecurity of connected digital products

Makers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.

A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars.

 

 

For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:

  • Aren’t shipped with known exploitable vulnerabilities
  • Feature a “secure by default” configuration
  • Can fix their vulnerabilities via automatic software updates
  • Offer access protection via control mechanisms, such as authentication and identity management
  • Protect the data they store, transmit and process using, for example, at-rest and in-transit encryption

“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.

The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.

For more information and analysis about the EU’s Cyber Resilience Act:

VIDEO

The EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 

6 - UK cyber agency: CISOs must communicate better with boards

CISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.

For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.

“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.

As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.

“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.

Here’s a small sampling of the advice:

  • Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.
  • Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.
  • Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.
  • Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.
  • Aim to provide a holistic view, and avoid using technical jargon.
  • Aim to advise instead of to educate.




soft

Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039)

  1. 4Critical
  2. 82Important
  3. 1Moderate
  4. 0Low

Microsoft addresses 87 CVEs and one advisory (ADV240001) in its November 2024 Patch Tuesday release, with four critical vulnerabilities and four zero-day vulnerabilities, including two that were exploited in the wild.

Microsoft patched 87 CVEs in its November 2024 Patch Tuesday release, with four rated critical, 82 rated important and one rated moderate.

This month’s update includes patches for:

  • .NET and Visual Studio
  • Airlift.microsoft.com
  • Azure CycleCloud
  • Azure Database for PostgreSQL
  • LightGBM
  • Microsoft Exchange Server
  • Microsoft Graphics Component
  • Microsoft Office Excel
  • Microsoft Office Word
  • Microsoft PC Manager
  • Microsoft Virtual Hard Drive
  • Microsoft Windows DNS
  • Role: Windows Hyper-V
  • SQL Server
  • TorchGeo
  • Visual Studio
  • Visual Studio Code
  • Windows Active Directory Certificate Services
  • Windows CSC Service
  • Windows DWM Core Library
  • Windows Defender Application Control (WDAC)
  • Windows Kerberos
  • Windows Kernel
  • Windows NT OS Kernel
  • Windows NTLM
  • Windows Package Library Manager
  • Windows Registry
  • Windows SMB
  • Windows SMBv3 Client/Server
  • Windows Secure Kernel Mode
  • Windows Task Scheduler
  • Windows Telephony Service
  • Windows USB Video Driver
  • Windows Update Stack
  • Windows VMSwitch
  • Windows Win32 Kernel Subsystem

Remote code execution (RCE) vulnerabilities accounted for 58.6% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 29.9%.

Important

CVE-2024-43451 | NTLM Hash Disclosure Spoofing Vulnerability

CVE-2024-43451 is a NTLM hash spoofing vulnerability in Microsoft Windows. It was assigned a CVSSv3 score of 6.5 and is rated as important. An attacker could exploit this flaw by convincing a user to open a specially crafted file. Successful exploitation would lead to the unauthorized disclosure of a user’s NTLMv2 hash, which an attacker could then use to authenticate to the system as the user. According to Microsoft, CVE-2024-43451 was exploited in the wild as a zero-day. No further details about this vulnerability were available at the time this blog post was published.

This is the second NTLM spoofing vulnerability disclosed in 2024. Microsoft patched CVE-2024-30081 in its July Patch Tuesday release.

Important

CVE-2024-49039 | Windows Task Scheduler Elevation of Privilege Vulnerability

CVE-2024-49039 is an EoP vulnerability in the Microsoft Windows Task Scheduler. It was assigned a CVSSv3 score of 8.8 and is rated as important. An attacker with local access to a vulnerable system could exploit this vulnerability by running a specially crafted application. Successful exploitation would allow an attacker to access resources that would otherwise be unavailable to them as well as execute code, such as remote procedure call (RPC) functions.

According to Microsoft, CVE-2024-49039 was exploited in the wild as a zero-day. It was disclosed to Microsoft by an anonymous researcher along with Vlad Stolyarov and Bahare Sabouri of Google's Threat Analysis Group. At the time this blog post was published, no further details about in-the-wild exploitation were available.

Important

CVE-2024-49019 | Active Directory Certificate Services Elevation of Privilege Vulnerability

CVE-2024-49019 is an EoP vulnerability affecting Active Directory Certificate Services. It was assigned a CVSSv3 score of 7.8 and is rated as important. It was publicly disclosed prior to a patch being made available. According to Microsoft, successful exploitation would allow an attacker to gain administrator privileges. The advisory notes that “certificates created using a version 1 certificate template with Source of subject name set to ‘Supplied in the request’” are potentially impacted if the template has not been secured according to best practices. This vulnerability is assessed as “Exploitation More Likely” according to Microsoft’s Exploitability Index. Microsoft’s advisory also includes several mitigation steps for securing certificate templates which we highly recommend reviewing.

Important

CVE-2024-49040 | Microsoft Exchange Server Spoofing Vulnerability

CVE-2024-49040 is a spoofing vulnerability affecting Microsoft Exchange Server 2016 and 2019. It was assigned a CVSSv3 score of 7.5 and rated as important. According to Microsoft, this vulnerability was publicly disclosed prior to a patch being made available. After applying the update, administrators should review the support article Exchange Server non-RFC compliant P2 FROM header detection. The supplemental guide notes that as part of a “secure by default” approach, the Exchange Server update for November will flag suspicious emails which may contain “malicious patterns in the P2 FROM header.” While this feature can be disabled, Microsoft strongly recommends leaving it enabled to provide further protection from phishing attempts and malicious emails.

Critical

CVE-2024-43639 | Windows Kerberos Remote Code Execution Vulnerability

CVE-2024-43639 is a critical RCE vulnerability affecting Windows Kerberos, an authentication protocol designed to verify user or host identities. It was assigned a CVSSv3 score of 9.8 and is rated as “Exploitation Less Likely.”

To exploit this vulnerability, an unauthenticated attacker needs to leverage a cryptographic protocol vulnerability in order to achieve RCE. No further details were provided by Microsoft about this vulnerability at the time this blog was published.

Important

29 CVEs | SQL Server Native Client Remote Code Execution Vulnerability

This month's release included 29 CVEs for RCEs affecting SQL Server Native Client. All of these CVEs received CVSSv3 scores of 8.8 and were rated as “Exploitation Less Likely.” Successful exploitation of these vulnerabilities can be achieved by convincing an authenticated user into connecting to a malicious SQL server database using an affected driver. A full list of the CVEs are included in the table below.

CVEDescriptionCVSSv3
CVE-2024-38255SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-43459SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-43462SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48993SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48994SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48995SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48996SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48997SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48998SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48999SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49000SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49001SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49002SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49003SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49004SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49005SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49006SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49007SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49008SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49009SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49010SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49011SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49012SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49013SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49014SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49015SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49016SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49017SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49018SQL Server Native Client Remote Code Execution Vulnerability8.8
Important

CVE-2024-43602 | Azure CycleCloud Remote Code Execution Vulnerability

CVE-2024-43602 is a RCE vulnerability in Microsoft’s Azure CycleCloud, a tool that helps in managing and orchestrating High Performance Computing (HPC) environments in Azure. This flaw received the highest CVSSv3 score of the month, a 9.9 and was rated as important. A user with basic permissions could exploit CVE-2024-43602 by sending specially crafted requests to a vulnerable AzureCloud CycleCloud cluster to modify its configuration. Successful exploitation would result in the user gaining root permissions, which could then be used to execute commands on any cluster in the Azure CycleCloud as well as steal admin credentials.

Tenable Solutions

A list of all the plugins released for Microsoft’s November 2024 Patch Tuesday update can be found here. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.

For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on How to Perform Efficient Vulnerability Assessments with Tenable.

Get more information

Join Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.




soft

Establishing a Software Inventory

In the event of a security breach, a software inventory is essential to determine what was breached, and who needs to be notified.  First responders require a software inventory to perform forensic analysis and determine breach notification requirements for vendors, business partners, and regulatory bodies. Organizations that have a clear understanding of software in their environment can quickly assess a breach impact and identify affected areas. If legal proceedings are involved, an organized software inventory greatly assists in limiting data handed over to Law Enforcement and assists technical staff in depositions or testimony. 

Business Continuity and Disaster Recovery plans specify requirements for restoration of critical assets and services, but these need to be identified to establish a Recovery Time Objective (the amount of time to recover a service to an acceptable level of operation) and Recovery Point Objective (the last point of known good data.)  Developing and maintaining a software inventory is a critical first step in implementing an effective cyber security program.

A software inventory helps demonstrate compliance with regulatory controls and Service Level Agreements (SLA) for software used in the environment. From the perspective of “less is more,” a software inventory also identifies unnecessary software running in the environment, which increases the attack surface without providing a business advantage.

Security operations perform scans to identify operating system and application versions, including unsupported software and unpatched systems. This information is used to establish a secure baseline and measure drift from that baseline. A software inventory is necessary to determine if the software is authorized, appropriately licensed, supported, and has the most recent security fixes applied.
Identifying the authorized software assets is an important step to ensure critical assets are protected. The larger the organization, the more difficult the inventory process becomes. Tenable.io and Tenable.sc help organizations build a software inventory. There are several software discovery plugins that run by default in the following scan templates:

  • Basic and Advanced Agent Scans
  • Advanced (Network) Scan
  • Basic (Network) Scan
  • Credentialed Patch Audit
  • Internal PCI Network Scan

Maintaining a software inventory aids in cyber hygiene and minimizes unauthorized software installation. Many organizations perform an annual audit by an external third party, where they are required to enumerate authorized software that is running in the environment. Organizations that maintain a current software inventory throughout the year can produce information required by auditors and vendors with minimal effort. 

The report and its chapters are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Discovery and Detection.

The report requirements are: 

  • Tenable.sc 5.19.1
  • Nessus 10.0.1

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.io discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture.

Chapters


Executive Summary This chapter presents data for detected operating systems, browsers, unsupported software, and other software installations on systems within a network.

Installed Software Iteration This chapter displays software detected across the organizations systems. Software enumeration is utilized to detect Installed software.

Issues Gating Remediation This chapter displays known/identified roadblocks to completing remediation efforts.





soft

The Softies return with 'The Bed I Made'

The pop minimalists return with a record that feels like calling up an old friend.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




soft

What Is It Like to Be a Software Engineer?

I am fascinated by coding. Seriously, how does it even work? And what is it like to be the person behind the code — a software engineer?




soft

The New World of Work: Satya Nadella, CEO of Microsoft

Few people have more insight than Nadella into how teams collaborate and innovate successfully.




soft

The New World of Work: Microsoft’s Jared Spataro

Spataro is one of the leaders of Microsoft’s ambitious research into the future of work, and he talks about how the tech giant thinks we’ll be working in the years and decades ahead.




soft

Reverse Engineering Software: Who? What? When? Where? Why?

Reverse engineering as a term is adopted by many industry subsets. From genetics, computer code, complex PCBs (printed circuit boards), and even military espionage. In this article, we are specifically relating to a metrology-driven process steered by high-precision 3D data acquisition tools. 




soft

Quality Software: Core Qualities to Build Specialist Software Tools in QC Metrology

We review essential software specifications and cover how those attributes can be leveraged when considering computer-controlled physical product testing equipment in the lab or on the shop floor.




soft

How to Leverage QMS Software to Promote a Culture of Quality

How can a QMS help your organization to achieve a strategic culture of quality? What can you learn from the unique challenges other organizations face in different industries? 




soft

How modern software can transform the supply chain with manufacturing quality at the center

A leading aircraft manufacturer faces $27B in losses due to slow supply chain fixes, aggravated by escalating quality standards like AS9102 Rev C. The solution lies in seamless communication of requirements from buyers to suppliers, streamlining operations for all parties involved.




soft

Combining X-ray Fluorescence, Infrared Spectroscopy and Software Algorithms for Positive Material and Contaminant Identification

FTIR is the primary method for material and contaminant identification but lacks sensitivity to metallic components. X-ray fluorescence (XRF) can fill this gap and improve identification accuracy.




soft

Inspection Software

InspectionXpert Corporation announces the release of the new InspectionXpert OnDemand for CAD, a new quality planning and documentation software platform that supports both 3-D model-based and 2-D print-based formats.




soft

Gage Software

Renishaw’s new EZ-IO software for the Equator Flexible Gauge makes it easy for automation integrators to configure communications between Equator systems and a cell controller.




soft

Gaging Software

The Renishaw Equator flexible gauge is now offered with the new INTUOTM gauging software, combined with a range of industry standard Renishaw probes.




soft

Software

FARO announces the release of CAM2 Measure 10.5, its latest software for the FaroArm, FARO ScanArm, FARO Laser Tracker, and FARO 3D Imager.




soft

Software Update

Mitutoyo America Corporation announced the latest version of MeasurLink software with a variety of functional improvements.




soft

LK Metrology Measurement Software

British coordinate measuring machine (CMM) manufacturer LK Metrology, Castle Donington, has announced the release of the latest version of its measurement, programming, simulation, analysis and reporting software.




soft

Verisurf Software Inspection Planner Suite

Verisurf’s New Inspection Planner Suite lets users quickly and easily create and execute inspection plans for arms, trackers, scanners, and manual CMMs, including executing proven inspection plans on CNC CMMs.




soft

QT9 QMS Quality Management Software

QT9 Software launched QT9 QMS Version 16.0, adding two new modules and numerous improvements to its quality management software (QMS).




soft

Teledyne FLIR Boson+ Infrared Thermal Camera Embedded Software Upgrade

Enhanced LWIR thermal performance with leading SWaP provides low-risk integration for unmanned platforms, security applications, handhelds, wearables, and thermal sights.




soft

Verisurf Software Machine Tool Probing (MTP) Suite

Verisurf Software, Inc. demonstrated its new Machine Tool Probing (MTP) suite at IMTS 2024. 




soft

How to Level Up Your Quality Assurance with Inspection Software

Our company often gets asked how to choose quality inspection software and how to maximize its potential. Quality is crucial in manufacturing, and the right inspection software can be a game-changer. Our experts shed light on the benefits of choosing the right fit for your organization and maximizing its utility.




soft

Heinrichs, Robioneck Appointed to INFORM to strengthen AI Software

INFORM has hired two senior managers to help the company with their goals.




soft

Maplesoft User Summit to Discuss Transformations in Online STEM Education

Maplesoft will welcome experts and users of Maple T.A. and Möbius to Vienna from October 19-21, 2016, for its annual user summit. Long-time customers and users will gather at the Vienna University of Technology for presentations on the latest news and features of Maple T.A., Maplesoft’s testing and assessment tool, and the recently introduced Möbius, Maplesoft’s platform for developing online science, technology, engineering and mathematics (STEM) courseware.




soft

Maplesoft President and CEO Receives Honorary Doctorate from the University of Waterloo

James Cooper Recognized for Enhancing Quality of Education and for Outstanding Contributions to the Discipline of Engineering Waterloo, Canada; November 08, 2016: Maplesoft™ announced that James (Jim) Cooper, its president and CEO, has received an honorary doctorate from the University of Waterloo (UW). The University presented Cooper with a Doctor of Engineering degree at a recent graduation ceremony held at the university.




soft

Maplesoft President and CEO Receives Honorary Doctorate from the University of Waterloo

Maplesoft announced that James (Jim) Cooper, its president and CEO, has received an honorary doctorate from the University of Waterloo (UW). The University presented Cooper with a Doctor of Engineering degree at a recent graduation ceremony held at the university.




soft

Maplesoft CEO comes full circle with honorary PhD

The chief executive officer of Waterloo math software company Maplesoft was recently awarded an honorary PhD in engineering from his alma mater. He had wanted to return to university and do that, but it never happened.




soft

Maplesoft, University of Waterloo Enter Education Partnership

Maplesoft and the University of Waterloo have partnered to collaborate on educational STEM content. Through this partnership, Maplesoft’s Möbius will blend with Waterloo-developed coursework and content for an online learning hub for college-level students and professors.




soft

Maplesoft Presents Awards of Excellence to University of Birmingham Students

Maplesoft today announced that the 2017 Maplesoft Excellence Scholarship Awards are being presented to two graduate students from the University of Birmingham. The scholarships provide monetary assistance for three years to each student for their graduate studies. They were selected from a group of students that were instrumental in encouraging and contributing to the use of technology in various undergraduate courses at the university.




soft

Maplesoft Releases Online Courseware Environment for STEM

Maplesoft today released Möbius, a hands-on learning tool focused on science, technology, engineering and mathematics education. The online courseware environment provides an interactive platform for students to explore STEM concepts, visualize problems and solutions, and receive real-time assessment feedback.




soft

Maplesoft and ETAS announce battery cell simulator package

ETAS Inc. and Maplesoft™ today announced the release of a Hardware-in-the-Loop (HIL) Battery Cell Simulator package which satisfies the highest demands for the test and calibration of Battery Management Systems. The solution is based on Maplesoft’s efficient, high-fidelity MapleSim battery model and ETAS’ high-precision Battery Cell Simulator (BCS) BCS-LABCAR.




soft

Micro-Air: Soft Starter Technology

The EasyStart Flex for residential and commercial HVAC is an advanced and versatile soft starter designed for all sizes of residential a/c units up to six tons (72,000 BTUs).




soft

Contractors’ Lives Made Easier With Software, Services

It took more than 17 months for Jackson Systems to research and build the Virtual Technician app, which won gold in the Contractor Services and Software category of the 2018 Dealer Design Awards.




soft

2019 Dealer Design Awards: Contractor Services & Software

Managing equipment is increasingly important to the HVAC industry. Parasense Refrigerant Management Software, gold winner, helps with this.




soft

2020 Dealer Design Awards: Contractor Services & Software

Manifold Cloud Services Ltd. received the 2020 Gold award in the Contractor Services and Software category for its measureQuick app. The product is a universal Bluetooth application that allow tools from multiple manufacturers to be used on a single platform.




soft

2021 Dealer Design Awards: Contractor Services & Software

The Gold award for the Contractor Service and Software category went to SmartDiagnostics with SmartTutor™ (SDST) from Smartech Alliance, a division of SmartHVAC LLC.




soft

Sales Software Can Help HVAC Businesses During Busy Seasons

The last couple busy seasons, HVAC contractors have seen a high influx of calls due to remote work. There are steps HVAC companies can take to meet demand while also alleviating the stress of the season.




soft

2022 Dealer Design Awards: Contractor Services & Software

The Contractor Services & Software category winners include an app that provides access to online product information, an app that helps contractors install and diagnose geothermal equipment, and a computer-based platform for home service businesses.




soft

Five Ways Software Promotes Responsible, Efficient Hydronic System Design

While hydronic systems have long been recognized for their energy-saving properties in HVAC and plumbing applications, designing an efficient hydronic system and narrowing down the necessary system components can be challenging.




soft

2023 Dealer Design Awards: Contractor Services & Software

The Gold award goes to a new computer application designed to help technicians save time and money and provide efficient HVAC equipment installation and diagnostics.




soft

Manufacturers, Software Providers Lean Into Artificial Intelligence

AI can make work easier, more efficient for boots-on-the-ground HVAC professionals.




soft

2024 Dealer Design Awards: Contractor Services & Software

The gold winner can service, certify, and ship a combustion analyzer the same day it’s received.




soft

Software Saves Times, Improves Efficiency for HVAC Contractors

Contractors can get more productivity from staff by letting software take care of the small things.




soft

GPS Insight Acquires Field Management Software Provider ServiceBridge

GPS Insight, a provider of fleet software for organizations, announced the acquisition of ServiceBridge.




soft

Software: Digitize, Digitize, Digitize

Since software can already do so much, manufacturers at this year’s AHR Expo focused on how to expand what can be digitized and how AI can be utilized in order to save contractor’s time and simplify the process.




soft

Four Ways Software Can Help With the Labor Shortage & How to Maximize It

Software can increase productivity, better manage labor, encourage retention, and keep things consistent and organized. But it’s up to HVACR contractors to choose the right software and take the proper stops to implement it.