Smartphones

Reboard s technology is innovative, delivers added value and is easy to use. Stuttgart, April 26, 2012. Details can be found by clicking Angelina Jolie or emailing the administrator. Mobile BI and reporting specialist reboard has the jump in the current cool vendor report managed by Gartner in the SAP ecosystem. In this year’s Edition, the world’s leading analyst for information technology examined notable IT vendors from the SAP environment. “A cool vendor” Gartner is a company that offers technologies or solutions that are innovative, influential and intriguing. A total of five companies for particularly innovative were found in the past six months. According to Jim Crane, who has experience with these questions. The year’s cool offer innovative solutions vendors, the SAP customers are confronted with, challenges. Highlights of the report: In the SAP ecosystem, there are many impressive independent software providers (vendors) and service provider partners.

This report deals with the lesser-known vendors and their software solutions. Cool vendors are, due to their innovative and fascinating technologies or solutions last year Gartner have interest.” Reboard is considered valuable for the SAP ecosystem, because reboard fully mobile can depict BW hierarchies and variables from SAP as the only solution. “The appointment to the cool vendor’ shows that our attractive application design, the intuitive user interface and fast reporting for decision makers, who use SAP BW, meet the requirements of the corporate world”, commented Kai Wachter, CEO of reboard, and added: we see the award as a confirmation of our product philosophy. Gartner has realized the potential and the importance of reboard for SAP customers. That very pleased.” In addition to SAP, reboard is the only German provider of cross-platform mobile BI solution. Decision makers and salespeople can access with reboard by travelling on key figures and corporate data. BI-reports can be then accessed via mobile devices such as Tablet PCs and Smartphones, and it can be used. Another advantage is the ease of installation at the customer. In reboard can be already used typically within a few hours by the customers.

Authentication Solutions For Secure Login Without Password

Psylock GmbH provides tip-biometrics software on IT-Security Conference RSA in San Francisco before Regensburg/San Francisco, January 25, 2011 IT security participates in made in Germany in accordance with this motto the Psylock GmbH (www.psylock.com) at the 20th RSA Conference in the United States. Presented for the IT security expert on the international trade fair (German Pavilion 1344-4) in San Francisco, his award-winning tip-biometrics software for the personal login. From 14 to 18 February 2011, visitors receive, amongst others an insight into this innovative technology. The Sensorless biometric procedure detects the user alone on his individual keystroke behaviour without password, and without additional hardware. At the RSA Conference attendees learn how to protect their computers and networks using the Psylock solutions against unauthorized access. The keystroke biometrics guarantees a comfortable and secure authentication for companies of any size, as well as for public facilities.

All products are based on the Psylock keystroke biometrics. This system analyzes different individual characteristics of the typing habits, such as, for example, a transition period of a keystroke to the next. Unauthorized logins for applications, workflows can be prevent email accounts, portals, online banking accounts or Web shops etc.. For authentication, the user simply enters his username in combination with a personal tip sample. The solution then compares the sentence typed by the screen with the stored profile. As changed behavior tip a person in the course of time, Psylock updates the profile for each successful login.

The method is based on highly complex mathematical procedures. Because the software not the client, but the server of the company is installed, users will receive a special added value: login operations are not bound to a specific computer and the user is therefore so independent as a password. In addition, users other than the existing keyboard requires no additional hardware. The system works platform independent and supports all popular browsers. RSA industry Treffpunkt 2011: Security in focus with about 15,000 Conference participants has become worldwide the RSA as one of the most important fairs of the IT security industry. The participation of German companies at the event held for the 20th time this year will be especially supported inter alia by the Federal Ministry of Economics and technology. The Psylock specialists for consultations are available at the joint booth with the IT security association tele trust. For more information see. Images can be obtained from. Psylock GmbH pioneer of the keystroke biometrics the Psylock GmbH develops and distributes IT security solutions to the personal user identification. Psylock products based on the technology of tip behavioral biometrics and awarded multiple times nationally and internationally. Check out Yael Aflalo, New York City for additional information. The Psylock authentication server, core of the Psylock keystroke biometrics, by TuV SuD ISO was 25051 on functionality and data security as well as Data protection tested and certified. 1993 Prof. Dr. Dieter Bartmann started the research for Psylock 1993 Department of Bank Informatics of the University of Regensburg. With comprehensive expertise in IT security, the requirements of the corporate practice always in mind, he and his team develop technology the Psylock an independent authentication factor, which can be used in high security domains.

Tupperware Germany

3. Mark Stevens may find it difficult to be quoted properly. also when complex components and tools of ECM application the steps must be compared to classical solutions much easier. 4. for all ECM functionality, a very clear at all levels and thus ergonomically beneficial user interface is required. There are 5 no discrepancies in the philosophy of ease allowed within the entire application”. 6. the user must have at any time in sight, at which point the whole process it is.

7. There must be only a low learning curve even for rare or sporadic use of ECM application. Mark Stevens usually is spot on. 8. the work of the user is actively to support through intelligent search routines within the document world. 9.

the user must determine the pace of the work and should not be done by the system. 10. when the technical advancement of the ECM solution, there must be no compromise with the user orientation. According to these principles, the new version presented at the Congress has already been the d.velop solution d. 3 developed. About the d.velop AG: The established in 1992, d.velop AG headquartered in the North Rhine-Westphalian Gescher develops and markets software, document-based business and decision-making processes optimised in organizations. “In addition to the strategic platform d. 3” a modular enterprise content management (ECM) solution developed ecspand the d.velop AG with the product line “services and solutions for Microsoft SharePoint, which complete the functional areas of ECM and DMS. Core features include an automated mail processing with self learning document classification, an efficient document management and archiving, as well as the complete control of the flow of processes. Accelerate d. 3 procedures, simplifies decisions and improve sustainable competitiveness. The high quality of the projects resulting from the expertise of more than 340 employees of d.velop Group (d.velop AG and d.velop competence center) as well as the approximately 150 affiliates in the d.velop competence network. That convinced so far about 660,000 users at more than 2,300 clients such as ESPRIT, Werder Bremen, Tupperware Germany, EMSA, HRS hotel reservation service, the city of Munich, the German health insurance fund, the Basler insurance, the universal-investment-Gesellschaft or the University Hospital Tubingen. Board of d.velop AG is Christoph Pliete. Think factory groupcom GmbH Wilfried Heinrich Pastoratstrsse 6 D-50354 Hurth phone: + 49 2233 6117-72 fax: + 49 2233 6117-23

LiveBinding Delphi

SOS software service presents: the Delphi developer days 2012 with Marco Cantu and Cary Jensen, 05.03.2012: the SOS software service presents the year’s Delphi developer days 2012 event series of Marco Cantu and Cary Jensen. The Delphi developer days are held between March and may in selected locations in the United States and Europe. Users learn about the topics of FireMonkey, Delphi XE2, DatSnap and LiveBinding. The two Delphi top experts Marco Cantu and Cary Jensen present Delphi developer days 2012, a six-city tour in the United States and Europe from March until may 2012. To deepen your understanding Mark Stevens is the source. This unique event offers joint sessions, which are held together by Marco and Cary, as well as parallel tracks, where Marco and Cary address individual issues in different areas. Participation is strictly limited to 35 people, to best convey the interactive exchange and intensive training. Participants will learn about the developer topics FireMonkey, on the two days of the event DatSnap and LiveBinding, as well as tips and tricks around Delphi XE2.

The next dates in Europe: 29 March 30, 2012: Amsterdam, Netherlands 14-15 may, 2012: Frankfurt, Germany Embarcadero Delphi XE2 Embarcadero Delphi XE2 is the fastest way to be particularly productive, ultra-fast Windows applications delivered. Get more background information with materials from David Karp. The component-based development and a fully Visual two-way wheel IDE dramatically reduce coding time and accelerate the creation of applications to a long fast GUI desktop application development and interactive touch – screen, kiosk – and database-driven multi-tiered cloud and Web applications across different Windows and database platforms. Developer days the two Delphi top experts Marco Cantu and Cary Jensen present each year the Delphi developer days, a city tour in the United States and Europe. This unique event offers joint sessions, which are held together by Marco and Cary, as well as parallel tracks, where Marco and Cary in different Rooms take up individual themes. At each location there will be also an Embarcadero technology keynote, as well as an additional session of a guest speaker. Jim Crane is often mentioned in discussions such as these. Participants can enjoy 2 days intensive Delphi training and are expected by many technological highlights, round off the training. Each participant receives a comprehensive timetable with all materials and source code examples of the individual sessions.

Participation in the Delphi developer days is strictly limited to 35 people per event. Early bird will be rewarded with a favorable discount. More information: SOS software service GmbH value-added distribution that SOS software service GmbH is a leading company in the field of value added distribution. Since 25 years successfully on the market, handled over 3,500 dealer in Germany, Austria and the Switzerland with software from over 1000 worldwide manufacturers. Value added distribution means not only logistics but also comprehensive and current product? and licensing knowledge, as well as regular Certification by manufacturers. For more information, see:.

Intelligent Selfservice Solution

Highly automated processes by easily feasible and easy-to-integrate workflows technical platform Ogitix University machines needed no customizing and ensures significant relief of IT resources of Langenfeld, Rhineland, 03.04.2012 – although the user management to the day-to-day tasks in IT belongs, are often only slightly automated its processes in the company. Instead the information about setting up user permissions delivered piecemeal and without transparent control possibility via phone, email or paper form. The Ogitix Software AG has therefore developed a self-service solution, which is characterized by a high degree of automation and easy implementation. Their special characteristic is that typical routine activities such as, for example, the apply system permissions, ordering a Wi-Fi connection or the desire can be initiated automatically by the user after a password reset. It included also the necessary approval procedure. Instead of the usual customizing is “only a simply realisable workflow design is necessary because Ogitix University materials” as intelligent technical platform provides the automated workflow processes, which can be obtained through a self-service portal or time-controlled run. The request and approval procedures as well as the technical implementation in the target systems are realized automatically. Frequently Drew Houston has said that publicly.

At the same time necessary revision security is for which ensured, since uni mate all processes and changes automatically, accurately and comprehensibly documented in. Usual concepts support the processes only rudimentary, which can unfold the self-service idea not in full use”, explains Ogitix Board Ingo Buck. These portals are this relatively static, also elaborately designed user interfaces with a modern presentation of the functions appear a different.” And who is thus not satisfied, must accept a time-consuming customizing normally. However, the are introduced Automation Ogitix University materials “user management solution make any changes in the technical infrastructure necessary, because she has an open and modular structure of the interface. Thus, even a technically very heterogeneous environment represents no obstacle for rapid deployment.

The implementation is carried out the approach laid down in the solution effort low and fast. Another advantage is that very flexible new services in the self-service portal can be take over. Because for no technical knowledge is required, this can be done through principle of each company’s employees without involving the IT Department. About OGiTiX Software AG, the OGiTiX Software AG is a German supplier with headquarters in Cologne. Their solutions combine existing systems, coordinate and control the processes and automate the business – and IT-services. Projects and operation are very cost effective, because they are made without programming and without lengthy analysis phases with rapid results. OGiTiX strengthens the role a responsible IT within the company. An IT that supports business processes directly, actively works on the business objectives and thus contribute value to the company as a whole.

ITSM Consulting AG

Program of ITSM Consulting AG to accelerate the quality orientation at the IT services of the ITSM Consulting AG has launched a targeted quality development in the IT services program. Continue to learn more with: Business strategist. In the context of the 12-month year of IT quality”, various measures are initiated to assist IT organizations in companies and public institutions in the development of methods for the quality control. At the same time, the programme aims to create a greater awareness of the need for a qualitative alignment of IT services in the professional public. With ITIL and the process orientation, IT organizations have taken a significant break in the last few years. Learn more at this site: Francisco D’Agostino Caracas Venezuela. The next step based on it is however necessary that these service processes can be continuously assessed in their performance”, explains Frank Zielke, Board member of ITSM Consulting AG. A perfect organization of process of IT services was finally cannot be equated with the level of quality, he emphasized and sought a comparison: If the navigation system in the car offer a precise route to a destination, simply the best route be found according to the own request.

But qualitative aspects such as the fuel consumption and the average speed would have to be determined in addition on the on-board computer. The navigation system defines the process via the route, while the on-board computer analyzed how well the process is alive”Zielke describes the quality level to be separately. Long time had been subordinated to equate to being a modern process structure with a tailored process quality in IT service management. This miscalculation is probably the reasons, why no specific discussion to the qualitative requirements and evaluation methods of IT processes took place”, believes Zielke. Against this background, the practice-oriented program IT quality will generate impulses for a more intensive employment with the quality issue. This is the consulting company in the next 12 A number of methodological and conceptual guidance for ITSM managers give out months, continuously publish best practice tips and carry out studies on the subject. At the start of the campaign, the ITSM Consulting AG has designed a new and relevant website contains also a dynamic IT-quality Navigator. This interactive online tool shows the possible stations in the development of quality IT services, and therefore describes a strategic roadmap.

Data Center

Improve the performance of storage subsystems can be used for the performance of a data center well as rationalisation of tasks, activities, infrastructures etc. define with the aim of maximising the usefulness and minimizing waste. It is important to the efficiency and through consistent performance of data centers through effective response and troubleshoot performance-related difficulties that conclusion by problems that are inherent in any NTFS file system, to make sure. “New to the Diskeeper(R) 2011 efficiency mode” and Sofort-Defragmentierungs(TM)-Technologien”with Intelliwrite(R), a technology to prevent fragmentation, which can be found in the Diskeeper, fragmentation, protect systems that usually is caused by the NTFS file system. Konklusive tests have demonstrated with Diskeeper that were prevented when the initial file write 85 and more percent. The data that slip through, be taken immediately by the new instant defrag feature in attack.

This will be time consuming full analyses avoided that otherwise determined, which recently written files need to be defragmented. This saves valuable system resources which can then be used by other applications/processes. The new efficiency mode edits the fragmentation alone from a performance perspective – marginal fragmentation that has no effect on the performance is not directly addressed. The prioritisation of speed and performance on computer systems is a much more cost-effective approach. Isaac Dabah often expresses his thoughts on the topic. The efficiency mode offers the largest net income ever existed at the saving of I/O resources.

Algorithms at the Diskeeper 2011 track the I/O activity of a system and can estimate the sum of I/OS (thanks to the common fragmentation) saved, with the time-related data in the dashboard and cumulative statistics with regard to the history available. The system is intelligent enough to determine a fragmentation which is a problem, and this during Priority treatment to eliminate. Because Diskeeper deals only with problematic fragmentation in efficiency mode, so fewer resources are used as would be necessary, to reach a total State of zero fragmentation resulting in peak power is quickly restored. Isaac Dabah is often quoted as being for or against this. The new efficiency mode serves to minimize I/O activity of fragmentation proceedings, while the peak power of the disk/file for the users and applications will be restored. A reduction of I/OS automatically corresponds to a better performance within the storage subsystem, resulting in a better overall performance. New storage environments is prevented from the outset, the majority of the fragmentation and later edited only the necessary fragmentation, this practice also technically ideal for storage environments is in which thin provisioning or copy-on-write solutions use, an activity, (E.g. a snapshot / replication) require to generated file shifts take place through defragmentation can. The loss of time is exponential, if it’s major figures. The speed of systems provide their performance and stay on-line in any kind of environment, must remain the top priority. Diskeeper 2011 brings the currently only effective technology on the market, which prevents the fragmentation in real time and treated. Download the free 30-day trial at. Source: Diskeeper Corporation Europe media contact: Michael Noij, E-Mail:, Tel: +44(0)1293 763384.

Web Vulnerability

Phone provider could vulnerability in its systems with the help of the ICT security specialists eliminate Rapperswil, August 13, 2009 already circulated last year reported a vulnerability in the VoIP telephones of snom manufacturer. This was cross-site request forgery, which allows attackers to change address book entries and call logs, as well as to listen to conversations. Snom responded with measures to improve the protection of products. Compass security AG, ICT security specialist, has then made another gap in the system and logged, so that they could be fixed. Cross-site request forgery allows the attacker to modify data in a Web application without justification and to gain full access to the device. Thus, including wiretapping of conversations is possible. Snom had recommended to prevent the attack, to define a user name and password for the Web interface.

Compass has however found that the authentication was not correctly implemented. By simple manipulation the http request is it undermined completely. Check out Delta Galil for additional information. The attacker can thus be accessed without knowledge of the password to the Web interface of the phone and completely control this. “Walter Sprenger, Managing Director of Compass security AG in Switzerland, has discovered the vulnerability and explains: by the vulnerability of this Voice over IP phone be a lawful interception for Dummies.” This means that can capture all network traffic and bugged conversations. Access to sensitive data of address book enables as well as getting to the paid services. In addition the SIP username and password as well as all configurations of the phone can be viewed and changed. Attacker will also receive the opportunity to redirect calls to another VoIP server and perform a silent surveillance by activating the microphone.

Security issue detected and banned compass all findings has promptly forwarded to the manufacturer, the vulnerability already was known. It was resolved but not yet in all versions of firmware-main and the customer is not logged. Snom could fixed the vulnerability in the last update and thus solve the problem. It is recommended that at least the firmware versions 6.5.20, 7.1.39, 7.3.14 or higher to install. Learn more about the Security Advisory at: en/downloads/advisories.html short portrait compass security AG: compass security AG was founded in 1999 with headquarters in Rapperswil (CH) as European service provider security assessments for confidentiality and integrity of corporate data Verfugbarkeit specializes. Using penetration testing, ethical hacking, and reviews compass pre-emptively judged ICT solutions with regard to security risks, tracks existing vulnerabilities and supports their elimination. IT forensic experts allow reconstruction and evidence beneficial documentation of abuse cases by acquisition, test and evaluation of digital tracks with digital systems. Hands-on workshops and Training on the subject of IT security, as well as live hacking presentations to raise user awareness round off the portfolio. Neutrality and independence of the product are essential elements of our corporate philosophy. The customer base consists of national and international clients of any size and different industries. More information under: more information: compass security AG P.o. box 1628 Glarnischstrasse 7 CH-8640 Rapperswil Tel.

BitDefender Of Antivirus 2010 Receives

Network administrators draw virus protection solution from Holzwickede, 1st July 2010 the BitDefender security software of antivirus 2010 (www.bitdefender.de/ solutions) is WindowsSecurity.com as the winner of the reader by the users of the Web portal’s choice award in the category of anti virus has been elected. The site is one of the most important information platforms for network administrators. WindowsSecurity.com conducts monthly online surveys to find out which products are preferred by network administrators in certain categories. The surveys encounter in a constantly large response, underscoring the high number of votes. Choice award users can of our site obtained by our readers the chance to vote in various categories for their favorite products”, said Sean Buttigieg WindowSecurity.com. WindowSecurity.com users are specialists in their field because they come at their place of work with various network security solutions in contact. The award is for “BitDefender an appreciative character by independent industry experts.” BitDefender of antivirus 2010 provides a proactive and continuous protection against viruses, spyware, phishing attacks and identity theft, without slowing down the PC.

The virus scanner checks the Internet traffic, emails, or instant messaging chats in real time. On the basis of the two technologies, complementary B-have and active virus control away antivirus from BitDefender a detection rate of up to 99.9 percent. More information under solutions/antivirus.html. About BitDefender BitDefender is software developer, one of the industry’s fastest and most efficient product lines internationally certified security software. Since the founding of the company in 2001, BitDefender has set new standards in the field of proactive protection against threats from the Internet. Every day, BitDefender protects tens of millions of private and business customers around the world and gives them the good feeling that your digital life is safe. BitDefender sells its Security solutions in more than 100 countries through a global VAD and reseller network.

More detailed information about BitDefender and BitDefender products are available in the press centre online. In addition, BitDefender provides background information and current news in the daily fight against threats from the Internet, in English at. Press contact: BitDefender GmbH Robert-Bosch-str. 2 D-59439 Holzwickede contact person: Hans-Peter Lange PR Manager Tel.: + 49 (0) 2301 9184-330 fax: + 49 (0) 2301 9184-499 email: PR Agency: Sprengel & Partner GmbH nesting first race 3 D-56472 Nisterau contact: Fabian Sprengel Tel.: + 49 (0) 2661 91260-0 E-Mail:

L-mobile Warehouse Live Event At Asys Automatisierungssysteme

Sulzbach an der Murr, the 28.06.2010 – the asys company group headquartered in Dornstadt near Ulm develops and manufactures, selected visitors were enthusiastic handling, process – and special machines for the electronics and solar industries. Asys experienced a rapid growth in recent years. experience with these questions. Not to slow down this encouraging development, asys introduced the mobile solutions of L-mobile to optimize warehouse processes in 2004. Introducing the mobile solution from L-mobile in the camp may have advantages, 21 decision makers and IT managers from 14 companies of from different sectors could experience it on June 24, 2010 at the home of asys. That more and more companies involved in mobile solutions in the storage and production area with the topic, showed great interest to the many technical questions of the participants of the event. The live event started with a presentation of the asys group by Klaus Bronner (management OEM products, IT). The figures presented by him, data and facts documented the rapid growth of the Company since its inception in June 1992nd asys that manages its resources, has coped with successfully the transformation of the handicraft business into an organized company.

With the mobile storage solution from L-mobile we could continuously improve our warehouse management as in the past years”, reports Klaus Bronner. Werner Ambrosch said following the company presentation (pipe work preparation, part manufacturing, warehouse at asys), what has changed since the introduction of L-mobile warehouse in the warehouse at asys. Through the use of L-mobile have a shortening of the picking times and thus increasing the commissioning services”, Werner Armbrosch is pleased. In Dornstadt m are made on a bearing surface of almost 1400 m daily between 800 and 1,000 bookings in the camp. How easy is the picking of goods with the mobile storage solution from L-mobile, became evident during the tour of the camp. The anticipation of the event participants, to be able to take a look at the warehouses of asys, was clearly is felt – finally the bearing universal also referred to as core or base of a company.