Articles

March 3, 2026
Monetizing software part 3: Protecting your revenue and investment

This is the third and final article in our series on monetizing desktop software. The first part looked at pricing considerations and the second at how to sell through e-commerce channels. This part looks at how to protect your revenue and investment from pirates and reverse engineers looking to steal your intellectual property (IP). With […]

Read More
February 23, 2026
Monetizing software part 2: E-commerce

This is the second part in our series on monetizing software. Part one looked at pricing. This article focuses on how to sell through e-commerce channels. Selling desktop software has changed over the years. Traditionally, individual customers would buy a physical copy of the software and license; while selling to enterprises meant invoices, resellers, and […]

Read More
February 19, 2026
Monetizing software part 1: Pricing

This is the first in a three part series discussing software monetization. The series will focus on the oft-overlooked area of desktop software; and starts with how to price your software. Choosing how to price your software is one of the hardest decisions you can make as a product team. Pick the wrong model, and […]

Read More
January 6, 2026
Embedded AI in Medical Devices: Innovation that must be protected

Artificial Intelligence (AI) is quietly changing how medical devices work. Not long ago, most devices simply measured and reported data. Today, many of them think locally. Thanks to embedding AI in medical devices, they can spot patterns, predict risks, and help guide treatment in real time. This shift is powered by embedded AI. Instead of […]

Read More
September 16, 2025
Embedded AI: Protecting IP and model integrity

AI models are valuable intellectual property (IP). They often represent years of work, money, and expertise. If these models are stolen, copied, or misused, companies lose their competitive edge and revenue. At PACE Anti-Piracy, we focus on protecting software that runs on devices outside the cloud–like desktops, phones, and IoT devices. We recently launched Fusion […]

Read More
August 20, 2025
Content piracy in a vibe coded universe

Like most technology companies, PACE has been experimenting with AI tooling to help with software development. A lot of the coding we do is deep, low-level stuff–often close the machine. This definitely tests the AI and it’s fair to say it will be a long time before AI starts to replace our engineers. That doesn’t […]

Read More
May 19, 2025
Beyond Obfuscation: Protecting Critical Algorithms in Code

Most software developers have heard of code obfuscation. It’s a technique that takes well constructed, easy to follow code and turns it into something that is difficult to understand. The aim being to stop a reverse engineer (a hacker) from reading the compiled code (static analysis) and discovering how it works. This article introduces a […]

Read More
March 24, 2025
5 Critical Security Measures for the Media & Entertainment Industry

Not all software has the luxury of running as a service. In many cases software has to run at the edge. This is particular true in media & entertainment. For the purposes of this article, the “edge” is stretched to its widest possible sense to include on-premises servers, desktop PCs, mobile apps, and embedded systems. […]

Read More
December 18, 2024
Demystifying Code Signing

PACE spoke about code signing at the 2024 droidcon London conference. While the talk focused on the Android platform, the key takeaways were applicable to software developers targeting any modern operating system. All Android apps must be code signed to run on a device. This is performed either directly by the developer or through Play […]

Read More
August 29, 2024
Software licensing for air-gapped environments

Software publishers and creative users alike recognise risks to their Intellectual Property (IP). While software publishers can use secure licensing solutions like iLok Licensing, for many of these creative users, any leak of their content will significantly impact their business’s viability. A common solution to protect content is to adopt an “air-gapped” architecture, where a […]

Read More
August 26, 2024
Apple opening the NFC & SE on iPhones isn’t as revolutionary as we think

On the 14th of August, Apple announced that it was opening up Near Field Communications (NFC) and the Secure Element (SE) on iPhones to third parties. This was the news that the payments industry and many others had been waiting for. But is this as revolutionary as it initially seems? I’ve been involved in mobile […]

Read More
July 25, 2024
Safeguarding Supply Chains: Jetecon OY and PACE 

Taneli Malinen from Jetecon Taneli Malinen sees things differently.  Literally. As a production and simulation expert, he’s been building software and advising companies to see their processes in the VR space for years. He helped found Jetecon, a 3D simulation technology company that allows companies to be more productive through the use of VR and […]

Read More
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram