soft ETSI launches First Software Development Group By www.etsi.org Published On :: Tue, 31 Oct 2023 09:31:43 GMT Sophia Antipolis, 25 July 2023 ETSI is proud to announce the establishment of its first Software Development Group, called OpenSlice. With this group, ETSI positions itself as a focal point for development and experimentation with network slicing. Read More... Full Article
soft ETSI Announces New Software Development Group for Common API Framework By www.etsi.org Published On :: Thu, 09 Nov 2023 08:57:30 GMT Sophia Antipolis, 9 November 2023 ETSI is delighted to announce the establishment of a new Software Development Group, called OpenCAPIF. OpenCAPIF is developing an open-source Common API Framework, as defined by 3GPP, allowing for secure and consistent exposure and use of APIs. Read More... Full Article
soft Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates By www.tenable.com Published On :: Fri, 25 Oct 2024 09:00:00 -0400 Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.Dive into six things that are top of mind for the week ending Oct. 25.1 - CSA: How to prevent “shadow AI” As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.The white paper covers shadow AI topics including:Creating a comprehensive inventory of AI systemsConducting gap analyses to spot discrepancies between approved and actual AI usageImplementing ways to detect unauthorized AI waresEstablishing effective access controlsDeploying monitoring techniques “By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:The asset’s descriptionInformation about its AI modelsInformation about its data sets and data sourcesInformation about the tools used for its development and deploymentDetailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standardsRecords of its access control mechanismsShadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.To get more details, read:The full “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paperA complementary slide presentationThe CSA blog “Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape”For more information about AI security issues, including shadow AI, check out these Tenable blogs:“Do You Think You Have No AI Exposures? Think Again”“Securing the AI Attack Surface: Separating the Unknown from the Well Understood”“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach”“6 Best Practices for Implementing AI Securely and Ethically”“Compromising Microsoft's AI Healthcare Chatbot Service”2 - Best practices for secure software updatesThe security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.”“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally. The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.To get more details, read:The “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers” guideThe CISA alert “CISA, US, and International Partners Release Joint Guidance to Assist Software Manufacturers with Safe Software Deployment Processes”For more information about secure software updates:“Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design” (Tenable)“The critical importance of robust release processes” (Cloud Native Computing Foundation)“Software Deployment Security: Risks and Best Practices” (DevOps.com)“Software Updates, A Double-Edged Sword for Cybersecurity Professionals” (Infosecurity)“DevOps Best Practices for Faster and More Reliable Software Delivery” (DevOps.com)3 - Report: GenAI, attack variety, data security drive cyber strategiesWhat issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.To get more details, read:The report’s announcement “Cybersecurity success hinges on full organizational support, new CompTIA report asserts”CompTIA’s blogs “Today’s top drivers for cybersecurity strategy” and “Cybersecurity’s maturity: CompTIA’s State of Cybersecurity 2025 report”The full “State of Cybersecurity 2025” reportFor more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:“Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources” (blog)“Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?” (on-demand webinar)“The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy” (blog)“Mitigating AI-Related Security Risks” (on-demand webinar)“Securing the AI Attack Surface: Separating the Unknown from the Well Understood” (blog)4 - CISA lists software dev practices most harmful for securityRecommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added. Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:Using programming languages considered “memory unsafe”Including user-provided input in SQL query stringsReleasing a product with default passwordsReleasing a product with known and exploited vulnerabilitiesNot using multi-factor authenticationFailing to disclose vulnerabilities in a timely mannerAlthough the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.To get more details, check out:CISA’s announcement “CISA and FBI Release Product Security Bad Practices for Public Comment”The full document “Product Security Bad Practices”For more information about how to develop secure software:“Tenable Partners with CISA to Enhance Secure By Design Practices” (Tenable)“Ensuring Application Security from Design to Operation with DevSecOps” (DevOps.com)“What is application security?” (TechTarget)“Guidelines for Software Development (Australian Cyber Security Centre)5 - New EU law focuses on cybersecurity of connected digital productsMakers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars. For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:Aren’t shipped with known exploitable vulnerabilitiesFeature a “secure by default” configurationCan fix their vulnerabilities via automatic software updatesOffer access protection via control mechanisms, such as authentication and identity managementProtect the data they store, transmit and process using, for example, at-rest and in-transit encryption“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.For more information and analysis about the EU’s Cyber Resilience Act:“Cyber Resilience Act Requirements Standards Mapping” (ENISA)“The Cyber Resilience Act, an Accidental European Alien Torts Statute?” (Lawfare)“EU Cybersecurity Regulation Adopted, Impacts Connected Products” (National Law Review)“Open source foundations unite on common standards for EU’s Cyber Resilience Act” (TechCrunch)“The Cyber Resilience Act: A New Era for Mobile App Developers” (DevOps.com)VIDEOThe EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 6 - UK cyber agency: CISOs must communicate better with boardsCISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.”As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.”“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.Here’s a small sampling of the advice:Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.Aim to provide a holistic view, and avoid using technical jargon.Aim to advise instead of to educate. Full Article
soft Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039) By www.tenable.com Published On :: Tue, 12 Nov 2024 14:02:10 -0500 4Critical82Important1Moderate0LowMicrosoft addresses 87 CVEs and one advisory (ADV240001) in its November 2024 Patch Tuesday release, with four critical vulnerabilities and four zero-day vulnerabilities, including two that were exploited in the wild.Microsoft patched 87 CVEs in its November 2024 Patch Tuesday release, with four rated critical, 82 rated important and one rated moderate.This month’s update includes patches for:.NET and Visual StudioAirlift.microsoft.comAzure CycleCloudAzure Database for PostgreSQLLightGBMMicrosoft Exchange ServerMicrosoft Graphics ComponentMicrosoft Office ExcelMicrosoft Office WordMicrosoft PC ManagerMicrosoft Virtual Hard DriveMicrosoft Windows DNSRole: Windows Hyper-VSQL ServerTorchGeoVisual StudioVisual Studio CodeWindows Active Directory Certificate ServicesWindows CSC ServiceWindows DWM Core LibraryWindows Defender Application Control (WDAC)Windows KerberosWindows KernelWindows NT OS KernelWindows NTLMWindows Package Library ManagerWindows RegistryWindows SMBWindows SMBv3 Client/ServerWindows Secure Kernel ModeWindows Task SchedulerWindows Telephony ServiceWindows USB Video DriverWindows Update StackWindows VMSwitchWindows Win32 Kernel SubsystemRemote code execution (RCE) vulnerabilities accounted for 58.6% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 29.9%.ImportantCVE-2024-43451 | NTLM Hash Disclosure Spoofing VulnerabilityCVE-2024-43451 is a NTLM hash spoofing vulnerability in Microsoft Windows. It was assigned a CVSSv3 score of 6.5 and is rated as important. An attacker could exploit this flaw by convincing a user to open a specially crafted file. Successful exploitation would lead to the unauthorized disclosure of a user’s NTLMv2 hash, which an attacker could then use to authenticate to the system as the user. According to Microsoft, CVE-2024-43451 was exploited in the wild as a zero-day. No further details about this vulnerability were available at the time this blog post was published.This is the second NTLM spoofing vulnerability disclosed in 2024. Microsoft patched CVE-2024-30081 in its July Patch Tuesday release.ImportantCVE-2024-49039 | Windows Task Scheduler Elevation of Privilege VulnerabilityCVE-2024-49039 is an EoP vulnerability in the Microsoft Windows Task Scheduler. It was assigned a CVSSv3 score of 8.8 and is rated as important. An attacker with local access to a vulnerable system could exploit this vulnerability by running a specially crafted application. Successful exploitation would allow an attacker to access resources that would otherwise be unavailable to them as well as execute code, such as remote procedure call (RPC) functions.According to Microsoft, CVE-2024-49039 was exploited in the wild as a zero-day. It was disclosed to Microsoft by an anonymous researcher along with Vlad Stolyarov and Bahare Sabouri of Google's Threat Analysis Group. At the time this blog post was published, no further details about in-the-wild exploitation were available.ImportantCVE-2024-49019 | Active Directory Certificate Services Elevation of Privilege VulnerabilityCVE-2024-49019 is an EoP vulnerability affecting Active Directory Certificate Services. It was assigned a CVSSv3 score of 7.8 and is rated as important. It was publicly disclosed prior to a patch being made available. According to Microsoft, successful exploitation would allow an attacker to gain administrator privileges. The advisory notes that “certificates created using a version 1 certificate template with Source of subject name set to ‘Supplied in the request’” are potentially impacted if the template has not been secured according to best practices. This vulnerability is assessed as “Exploitation More Likely” according to Microsoft’s Exploitability Index. Microsoft’s advisory also includes several mitigation steps for securing certificate templates which we highly recommend reviewing.ImportantCVE-2024-49040 | Microsoft Exchange Server Spoofing VulnerabilityCVE-2024-49040 is a spoofing vulnerability affecting Microsoft Exchange Server 2016 and 2019. It was assigned a CVSSv3 score of 7.5 and rated as important. According to Microsoft, this vulnerability was publicly disclosed prior to a patch being made available. After applying the update, administrators should review the support article Exchange Server non-RFC compliant P2 FROM header detection. The supplemental guide notes that as part of a “secure by default” approach, the Exchange Server update for November will flag suspicious emails which may contain “malicious patterns in the P2 FROM header.” While this feature can be disabled, Microsoft strongly recommends leaving it enabled to provide further protection from phishing attempts and malicious emails.CriticalCVE-2024-43639 | Windows Kerberos Remote Code Execution VulnerabilityCVE-2024-43639 is a critical RCE vulnerability affecting Windows Kerberos, an authentication protocol designed to verify user or host identities. It was assigned a CVSSv3 score of 9.8 and is rated as “Exploitation Less Likely.”To exploit this vulnerability, an unauthenticated attacker needs to leverage a cryptographic protocol vulnerability in order to achieve RCE. No further details were provided by Microsoft about this vulnerability at the time this blog was published.Important29 CVEs | SQL Server Native Client Remote Code Execution VulnerabilityThis month's release included 29 CVEs for RCEs affecting SQL Server Native Client. All of these CVEs received CVSSv3 scores of 8.8 and were rated as “Exploitation Less Likely.” Successful exploitation of these vulnerabilities can be achieved by convincing an authenticated user into connecting to a malicious SQL server database using an affected driver. A full list of the CVEs are included in the table below.CVEDescriptionCVSSv3CVE-2024-38255SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-43459SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-43462SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-48993SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-48994SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-48995SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-48996SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-48997SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-48998SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-48999SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49000SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49001SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49002SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49003SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49004SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49005SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49006SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49007SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49008SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49009SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49010SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49011SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49012SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49013SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49014SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49015SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49016SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49017SQL Server Native Client Remote Code Execution Vulnerability8.8CVE-2024-49018SQL Server Native Client Remote Code Execution Vulnerability8.8ImportantCVE-2024-43602 | Azure CycleCloud Remote Code Execution VulnerabilityCVE-2024-43602 is a RCE vulnerability in Microsoft’s Azure CycleCloud, a tool that helps in managing and orchestrating High Performance Computing (HPC) environments in Azure. This flaw received the highest CVSSv3 score of the month, a 9.9 and was rated as important. A user with basic permissions could exploit CVE-2024-43602 by sending specially crafted requests to a vulnerable AzureCloud CycleCloud cluster to modify its configuration. Successful exploitation would result in the user gaining root permissions, which could then be used to execute commands on any cluster in the Azure CycleCloud as well as steal admin credentials.Tenable SolutionsA list of all the plugins released for Microsoft’s November 2024 Patch Tuesday update can be found here. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on How to Perform Efficient Vulnerability Assessments with Tenable.Get more informationMicrosoft's November 2024 Security UpdatesTenable plugins for Microsoft November 2024 Patch Tuesday Security UpdatesJoin Tenable's Security Response Team on the Tenable Community.Learn more about Tenable One, the Exposure Management Platform for the modern attack surface. Full Article
soft Establishing a Software Inventory By www.tenable.com Published On :: Fri, 27 May 2022 09:00:00 -0400 In the event of a security breach, a software inventory is essential to determine what was breached, and who needs to be notified. First responders require a software inventory to perform forensic analysis and determine breach notification requirements for vendors, business partners, and regulatory bodies. Organizations that have a clear understanding of software in their environment can quickly assess a breach impact and identify affected areas. If legal proceedings are involved, an organized software inventory greatly assists in limiting data handed over to Law Enforcement and assists technical staff in depositions or testimony. Business Continuity and Disaster Recovery plans specify requirements for restoration of critical assets and services, but these need to be identified to establish a Recovery Time Objective (the amount of time to recover a service to an acceptable level of operation) and Recovery Point Objective (the last point of known good data.) Developing and maintaining a software inventory is a critical first step in implementing an effective cyber security program. A software inventory helps demonstrate compliance with regulatory controls and Service Level Agreements (SLA) for software used in the environment. From the perspective of “less is more,” a software inventory also identifies unnecessary software running in the environment, which increases the attack surface without providing a business advantage. Security operations perform scans to identify operating system and application versions, including unsupported software and unpatched systems. This information is used to establish a secure baseline and measure drift from that baseline. A software inventory is necessary to determine if the software is authorized, appropriately licensed, supported, and has the most recent security fixes applied. Identifying the authorized software assets is an important step to ensure critical assets are protected. The larger the organization, the more difficult the inventory process becomes. Tenable.io and Tenable.sc help organizations build a software inventory. There are several software discovery plugins that run by default in the following scan templates: Basic and Advanced Agent Scans Advanced (Network) Scan Basic (Network) Scan Credentialed Patch Audit Internal PCI Network Scan Maintaining a software inventory aids in cyber hygiene and minimizes unauthorized software installation. Many organizations perform an annual audit by an external third party, where they are required to enumerate authorized software that is running in the environment. Organizations that maintain a current software inventory throughout the year can produce information required by auditors and vendors with minimal effort. The report and its chapters are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Discovery and Detection. The report requirements are: Tenable.sc 5.19.1 Nessus 10.0.1 Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.io discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture. Chapters Executive Summary This chapter presents data for detected operating systems, browsers, unsupported software, and other software installations on systems within a network. Installed Software Iteration This chapter displays software detected across the organizations systems. Software enumeration is utilized to detect Installed software. Issues Gating Remediation This chapter displays known/identified roadblocks to completing remediation efforts. Full Article
soft Proteomic characterization identifies clinically relevant subgroups of soft tissue sarcoma - Nature.com By news.google.com Published On :: Thu, 15 Feb 2024 08:00:00 GMT Proteomic characterization identifies clinically relevant subgroups of soft tissue sarcoma Nature.com Full Article
soft The Softies return with 'The Bed I Made' By www.npr.org Published On :: Mon, 11 Nov 2024 17:21:35 +0000 The pop minimalists return with a record that feels like calling up an old friend.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
soft What Is It Like to Be a Software Engineer? By hbr.org Published On :: Thu, 22 Jul 2021 04:00:00 GMT I am fascinated by coding. Seriously, how does it even work? And what is it like to be the person behind the code — a software engineer? Full Article
soft The New World of Work: Satya Nadella, CEO of Microsoft By hbr.org Published On :: Thu, 28 Oct 2021 04:00:00 GMT Few people have more insight than Nadella into how teams collaborate and innovate successfully. Full Article
soft The New World of Work: Microsoft’s Jared Spataro By hbr.org Published On :: Fri, 18 Mar 2022 04:00:00 GMT Spataro is one of the leaders of Microsoft’s ambitious research into the future of work, and he talks about how the tech giant thinks we’ll be working in the years and decades ahead. Full Article
soft Reverse Engineering Software: Who? What? When? Where? Why? By www.qualitymag.com Published On :: Thu, 01 Sep 2022 00:00:00 -0400 Reverse engineering as a term is adopted by many industry subsets. From genetics, computer code, complex PCBs (printed circuit boards), and even military espionage. In this article, we are specifically relating to a metrology-driven process steered by high-precision 3D data acquisition tools. Full Article
soft Quality Software: Core Qualities to Build Specialist Software Tools in QC Metrology By www.qualitymag.com Published On :: Tue, 28 Mar 2023 00:00:00 -0400 We review essential software specifications and cover how those attributes can be leveraged when considering computer-controlled physical product testing equipment in the lab or on the shop floor. Full Article
soft How to Leverage QMS Software to Promote a Culture of Quality By www.qualitymag.com Published On :: Fri, 25 Oct 2019 00:00:00 -0400 How can a QMS help your organization to achieve a strategic culture of quality? What can you learn from the unique challenges other organizations face in different industries? Full Article
soft How modern software can transform the supply chain with manufacturing quality at the center By www.qualitymag.com Published On :: Fri, 16 Feb 2024 00:00:00 -0500 A leading aircraft manufacturer faces $27B in losses due to slow supply chain fixes, aggravated by escalating quality standards like AS9102 Rev C. The solution lies in seamless communication of requirements from buyers to suppliers, streamlining operations for all parties involved. Full Article
soft Combining X-ray Fluorescence, Infrared Spectroscopy and Software Algorithms for Positive Material and Contaminant Identification By www.qualitymag.com Published On :: Wed, 11 Sep 2024 00:00:00 -0400 FTIR is the primary method for material and contaminant identification but lacks sensitivity to metallic components. X-ray fluorescence (XRF) can fill this gap and improve identification accuracy. Full Article
soft Inspection Software By www.qualitymag.com Published On :: Mon, 05 Jan 2015 00:00:00 -0500 InspectionXpert Corporation announces the release of the new InspectionXpert OnDemand for CAD, a new quality planning and documentation software platform that supports both 3-D model-based and 2-D print-based formats. Full Article
soft Gage Software By www.qualitymag.com Published On :: Mon, 05 Jan 2015 00:00:00 -0500 Renishaw’s new EZ-IO software for the Equator Flexible Gauge makes it easy for automation integrators to configure communications between Equator systems and a cell controller. Full Article
soft Gaging Software By www.qualitymag.com Published On :: Wed, 03 Jun 2015 00:00:00 -0400 The Renishaw Equator flexible gauge is now offered with the new INTUOTM gauging software, combined with a range of industry standard Renishaw probes. Full Article
soft Software By www.qualitymag.com Published On :: Tue, 04 Aug 2015 00:00:00 -0400 FARO announces the release of CAM2 Measure 10.5, its latest software for the FaroArm, FARO ScanArm, FARO Laser Tracker, and FARO 3D Imager. Full Article
soft Software Update By www.qualitymag.com Published On :: Tue, 01 Sep 2015 00:00:00 -0400 Mitutoyo America Corporation announced the latest version of MeasurLink software with a variety of functional improvements. Full Article
soft LK Metrology Measurement Software By www.qualitymag.com Published On :: Fri, 12 Jul 2024 11:00:00 -0400 British coordinate measuring machine (CMM) manufacturer LK Metrology, Castle Donington, has announced the release of the latest version of its measurement, programming, simulation, analysis and reporting software. Full Article
soft Verisurf Software Inspection Planner Suite By www.qualitymag.com Published On :: Mon, 22 Jul 2024 08:00:00 -0400 Verisurf’s New Inspection Planner Suite lets users quickly and easily create and execute inspection plans for arms, trackers, scanners, and manual CMMs, including executing proven inspection plans on CNC CMMs. Full Article
soft QT9 QMS Quality Management Software By www.qualitymag.com Published On :: Mon, 29 Jul 2024 10:00:00 -0400 QT9 Software launched QT9 QMS Version 16.0, adding two new modules and numerous improvements to its quality management software (QMS). Full Article
soft Teledyne FLIR Boson+ Infrared Thermal Camera Embedded Software Upgrade By www.qualitymag.com Published On :: Tue, 30 Jul 2024 11:00:00 -0400 Enhanced LWIR thermal performance with leading SWaP provides low-risk integration for unmanned platforms, security applications, handhelds, wearables, and thermal sights. Full Article
soft Verisurf Software Machine Tool Probing (MTP) Suite By www.qualitymag.com Published On :: Sat, 26 Oct 2024 08:00:00 -0400 Verisurf Software, Inc. demonstrated its new Machine Tool Probing (MTP) suite at IMTS 2024. Full Article
soft How to Level Up Your Quality Assurance with Inspection Software By www.qualitymag.com Published On :: Wed, 19 Jun 2024 00:00:00 -0400 Our company often gets asked how to choose quality inspection software and how to maximize its potential. Quality is crucial in manufacturing, and the right inspection software can be a game-changer. Our experts shed light on the benefits of choosing the right fit for your organization and maximizing its utility. Full Article
soft Heinrichs, Robioneck Appointed to INFORM to strengthen AI Software By www.qualitymag.com Published On :: Mon, 04 Nov 2024 08:00:00 -0500 INFORM has hired two senior managers to help the company with their goals. Full Article
soft Maplesoft User Summit to Discuss Transformations in Online STEM Education By www.maplesoft.com Published On :: Tue, 11 Oct 2016 04:00:00 Z Maplesoft will welcome experts and users of Maple T.A. and Möbius to Vienna from October 19-21, 2016, for its annual user summit. Long-time customers and users will gather at the Vienna University of Technology for presentations on the latest news and features of Maple T.A., Maplesoft’s testing and assessment tool, and the recently introduced Möbius, Maplesoft’s platform for developing online science, technology, engineering and mathematics (STEM) courseware. Full Article
soft Maplesoft President and CEO Receives Honorary Doctorate from the University of Waterloo By www.maplesoft.com Published On :: Tue, 08 Nov 2016 05:00:00 Z James Cooper Recognized for Enhancing Quality of Education and for Outstanding Contributions to the Discipline of Engineering Waterloo, Canada; November 08, 2016: Maplesoft™ announced that James (Jim) Cooper, its president and CEO, has received an honorary doctorate from the University of Waterloo (UW). The University presented Cooper with a Doctor of Engineering degree at a recent graduation ceremony held at the university. Full Article
soft Maplesoft President and CEO Receives Honorary Doctorate from the University of Waterloo By www.maplesoft.com Published On :: Thu, 10 Nov 2016 05:00:00 Z Maplesoft announced that James (Jim) Cooper, its president and CEO, has received an honorary doctorate from the University of Waterloo (UW). The University presented Cooper with a Doctor of Engineering degree at a recent graduation ceremony held at the university. Full Article
soft Maplesoft CEO comes full circle with honorary PhD By www.maplesoft.com Published On :: Sat, 03 Dec 2016 05:00:00 Z The chief executive officer of Waterloo math software company Maplesoft was recently awarded an honorary PhD in engineering from his alma mater. He had wanted to return to university and do that, but it never happened. Full Article
soft Maplesoft, University of Waterloo Enter Education Partnership By www.maplesoft.com Published On :: Mon, 09 Jan 2017 05:00:00 Z Maplesoft and the University of Waterloo have partnered to collaborate on educational STEM content. Through this partnership, Maplesoft’s Möbius will blend with Waterloo-developed coursework and content for an online learning hub for college-level students and professors. Full Article
soft Maplesoft Presents Awards of Excellence to University of Birmingham Students By www.maplesoft.com Published On :: Wed, 22 Mar 2017 04:00:00 Z Maplesoft today announced that the 2017 Maplesoft Excellence Scholarship Awards are being presented to two graduate students from the University of Birmingham. The scholarships provide monetary assistance for three years to each student for their graduate studies. They were selected from a group of students that were instrumental in encouraging and contributing to the use of technology in various undergraduate courses at the university. Full Article
soft Maplesoft Releases Online Courseware Environment for STEM By www.maplesoft.com Published On :: Thu, 20 Apr 2017 04:00:00 Z Maplesoft today released Möbius, a hands-on learning tool focused on science, technology, engineering and mathematics education. The online courseware environment provides an interactive platform for students to explore STEM concepts, visualize problems and solutions, and receive real-time assessment feedback. Full Article
soft Maplesoft and ETAS announce battery cell simulator package By www.maplesoft.com Published On :: Thu, 01 Jun 2017 04:00:00 Z ETAS Inc. and Maplesoft™ today announced the release of a Hardware-in-the-Loop (HIL) Battery Cell Simulator package which satisfies the highest demands for the test and calibration of Battery Management Systems. The solution is based on Maplesoft’s efficient, high-fidelity MapleSim battery model and ETAS’ high-precision Battery Cell Simulator (BCS) BCS-LABCAR. Full Article
soft Micro-Air: Soft Starter Technology By www.achrnews.com Published On :: Fri, 13 Sep 2024 10:00:00 -0400 The EasyStart Flex for residential and commercial HVAC is an advanced and versatile soft starter designed for all sizes of residential a/c units up to six tons (72,000 BTUs). Full Article
soft Contractors’ Lives Made Easier With Software, Services By www.achrnews.com Published On :: Mon, 23 Jul 2018 07:30:00 -0400 It took more than 17 months for Jackson Systems to research and build the Virtual Technician app, which won gold in the Contractor Services and Software category of the 2018 Dealer Design Awards. Full Article
soft 2019 Dealer Design Awards: Contractor Services & Software By www.achrnews.com Published On :: Mon, 29 Jul 2019 10:22:00 -0400 Managing equipment is increasingly important to the HVAC industry. Parasense Refrigerant Management Software, gold winner, helps with this. Full Article
soft 2020 Dealer Design Awards: Contractor Services & Software By www.achrnews.com Published On :: Mon, 27 Jul 2020 04:12:00 -0400 Manifold Cloud Services Ltd. received the 2020 Gold award in the Contractor Services and Software category for its measureQuick app. The product is a universal Bluetooth application that allow tools from multiple manufacturers to be used on a single platform. Full Article
soft 2021 Dealer Design Awards: Contractor Services & Software By www.achrnews.com Published On :: Mon, 26 Jul 2021 01:12:00 -0400 The Gold award for the Contractor Service and Software category went to SmartDiagnostics with SmartTutor™ (SDST) from Smartech Alliance, a division of SmartHVAC LLC. Full Article
soft Sales Software Can Help HVAC Businesses During Busy Seasons By www.achrnews.com Published On :: Fri, 11 Mar 2022 14:00:00 -0500 The last couple busy seasons, HVAC contractors have seen a high influx of calls due to remote work. There are steps HVAC companies can take to meet demand while also alleviating the stress of the season. Full Article
soft 2022 Dealer Design Awards: Contractor Services & Software By www.achrnews.com Published On :: Wed, 20 Jul 2022 07:10:29 -0400 The Contractor Services & Software category winners include an app that provides access to online product information, an app that helps contractors install and diagnose geothermal equipment, and a computer-based platform for home service businesses. Full Article
soft Five Ways Software Promotes Responsible, Efficient Hydronic System Design By www.achrnews.com Published On :: Wed, 21 Jun 2023 11:00:00 -0400 While hydronic systems have long been recognized for their energy-saving properties in HVAC and plumbing applications, designing an efficient hydronic system and narrowing down the necessary system components can be challenging. Full Article
soft 2023 Dealer Design Awards: Contractor Services & Software By www.achrnews.com Published On :: Mon, 31 Jul 2023 11:00:29 -0400 The Gold award goes to a new computer application designed to help technicians save time and money and provide efficient HVAC equipment installation and diagnostics. Full Article
soft Manufacturers, Software Providers Lean Into Artificial Intelligence By www.achrnews.com Published On :: Wed, 06 Mar 2024 14:00:00 -0500 AI can make work easier, more efficient for boots-on-the-ground HVAC professionals. Full Article
soft 2024 Dealer Design Awards: Contractor Services & Software By www.achrnews.com Published On :: Thu, 01 Aug 2024 07:00:29 -0400 The gold winner can service, certify, and ship a combustion analyzer the same day it’s received. Full Article
soft Software Saves Times, Improves Efficiency for HVAC Contractors By www.achrnews.com Published On :: Mon, 12 Aug 2024 14:00:00 -0400 Contractors can get more productivity from staff by letting software take care of the small things. Full Article
soft GPS Insight Acquires Field Management Software Provider ServiceBridge By www.achrnews.com Published On :: Thu, 23 Jan 2020 09:00:00 -0500 GPS Insight, a provider of fleet software for organizations, announced the acquisition of ServiceBridge. Full Article
soft Software: Digitize, Digitize, Digitize By www.achrnews.com Published On :: Fri, 17 Mar 2023 07:00:00 -0400 Since software can already do so much, manufacturers at this year’s AHR Expo focused on how to expand what can be digitized and how AI can be utilized in order to save contractor’s time and simplify the process. Full Article
soft Four Ways Software Can Help With the Labor Shortage & How to Maximize It By www.achrnews.com Published On :: Mon, 20 Mar 2023 11:00:00 -0400 Software can increase productivity, better manage labor, encourage retention, and keep things consistent and organized. But it’s up to HVACR contractors to choose the right software and take the proper stops to implement it. Full Article