(Showing headlines 18621 - 18640) << 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 ...
Software protects against search vulnerabilities.
Fremont, CA 94555
Dec 03, 2004 Sygate On-Demand verifies security integrity of devices, creates encrypted Virtual Desktop, and erases data from system upon termination of session, ensuring that information cannot be viewed using Google Desktop Search. Host Integrity module offers administrators option to resrict SSL VPN access to endpoints running Google Desktop Search. Software enforces security compliance and ensures safe access to proprietary or private information and applications.
Server Software ensures fault-tolerant clusters.
Beaverton, OR 97006
Dec 03, 2004
PolyServe Oracle HA for Linux eliminates single points of failure and streamlines server and storage management of Oracle environment. It comprises software, cluster file system optimized for Oracle, centralized cluster management console, application management, Oracle I/O monitoring, multi-path I/O capability, and centralized I/O monitoring. System supports up to 16 servers running Linux and multiple Oracle database workloads in single server/storage cluster.
SCADA Software eliminates need for custom analysis screens.
Citect Pty Ltd
Gordon NSW 2072 Australia
Dec 03, 2004 CitectSCADA® v6 lets users analyze cause of root disturbances via Process Analyst visualization tool, which combines historical alarm and trend data in one integrated display. Zero-maintenance Web Client allows secure access from anywhere in enterprise via Internet Explorer, and software offers support for true 32-bit color. Along with analysis and visualization facilities, software also includes time-stamped data and custom alarm filters.
Software manages laboratory information.
Computing Solutions, Inc.
Evansville, IN 47710
Dec 03, 2004 Suited for process industries, LabSoft LIMS v8 facilitates sample logging and recording of test results. When logging sample, Test Plan suggests pre-qualified group of tests to be included based on any property of sample. Software provides information on validation of instrument used to obtain test results. User can drill down on process result and not only view instrument that was used, but view control chart of validation results.
CAD Software facilitates scan registration.
Durham, NC 27713
Dec 02, 2004 Geomagic Studio 7 provides automated reconstruction and redesign of physical parts and molds, mass production of customized devices, and build-to-order manufacturing. Fitting algorithm automatically determines when convergence to final alignment has occurred, while maps graphically show alignment problems for each scan. Intelligent memory mapping and disk caching allocate data too large for physical memory into available swap space on hard drive.
Software provides central workforce management solution.
Ultimate Software Group, Inc.
Weston, FL 33304
Dec 02, 2004 UltiPro Workforce Management v8.0 includes Web administration capabilities to streamline employee-related processes in areas of performance, electronic document, and compensation management as well as eTime entry. From central, online location, managers and supervisors can plan, organize, and document performance evaluations via Web browser. Release offers role-based security to determine viewing rights between users and supports file attachments.
Software delivers complete machine control.
DEK International GmbH
Zurich Ch-8005 Switzerland
Dec 02, 2004 Suited for electronics manufacturers, ISCANâ„˘ Intelligent Scaleable Control Area Network architecture is based on Fieldbus technology, which transmits packets of information digitally. Intelligent communication allows for trend analysis, which can monitor overall machine health and predict routine maintenance. All information is additionally accessible remotely via Internet using Interactivâ„˘ system.
Voice Over WLAN Platform provides context-aware solution.
Dec 02, 2004 Fully integrated Voice Over Wireless LAN (VoWLAN) platform delivers location-based VoIP functionality, enabling users to deploy context-aware solutions for Voice Over WiFi (VoWiFi) market. It offers instantaneous content screening, interoperability between IP and classic telephony networks, and geo-localization feature. Platform also enables exchange of videos or pictures using PDAs and smartphones that include digital cameras.
Imaging Application is suited for medical OEMs.
Mercury Computer Systems, Inc.
Chelmsford, MA 01824
Dec 02, 2004
Leveraging accelerated 3D rendering to optimize clinical workflow, ExamineRT(TM) provides visualization capabilities and complete digital imaging and communications in medicine (DICOM) integration. Able to run on standalone workstations or scalable application server connected to multiple thin clients, product integrates VisageRT(TM) software components with interactive GUI and is optimized for certified acceleration hardware.
Software utilizes intelligent folder technology.
San Fransico, CA 94105
Dec 02, 2004 IDOL Enterprise Desktop Search uses implicit query tool to deliver information at right time in proper context. Tool brings together information derived from office documents, email, websites, news, and multimedia content from multiple locations, and puts into Active Folder technology, which understands themes within any data set and automatically populates folder with related information. Off-line viewing facility and security features are also included.
Software manages and protects enterprise data.
CommVault Systems, Inc.
Oceanport, NJ 07757-0900
Dec 02, 2004 Built on Microsoft Windows Server 2003 platform, QiNetix Second Generation software suite provides enterprise data management solution with granular data protection. Backup and recovery capabilities include 1-Touch Restore, which lets user recover entire server or workstation, and use of CommVault media management technology. Readiness Check feature performs pre-operation check of all components to ensure completion of critical data movement applications.
Labor Tracking Software keeps log of all transactions.
Austin, TX 78746 5221
Dec 01, 2004 xmLABORâ„˘ v6.1 integrated labor timesheet program tracks and manages staff and contract labor and posts data to MicroMain XMâ„˘ CMMS/EAM system. Security measures ensure staff and contract labor view only timesheet fields and necessary maintenance work order details. Program includes option for transaction approvals prior to timesheet submission, email report feature, and ability to log hours related and indirectly related to work orders.
Graphics Software develops mobile multimedia applications.
Renesas Technology America, Inc.
San Jose, CA 95134-1368
Dec 01, 2004 Designed to work with SH-Mobile application processors, OpenGL ES Library, 3D graphics software provides development solution for multimedia applications for embedded devices such as mobile phones. Solution facilitates development of applications incorporating 3D rendering functions.
Software manages and monitors networks.
AdRem Software, Inc.
New York, NY 10022-4407
Dec 01, 2004 Suited for SMBs, NetCrunch v3.1 delivers policy-based monitoring, alerting, problem resolution, and reporting in cross-platform networks. It discovers physical and logical network topology and displays network assets via dynamically updated graphical views that support proactive agentless monitoring. SNMP View Editor provides graphical analysis of SNMP performance data, while Monitoring Optimization Wizard prioritizes monitoring to select critical nodes.
Software monitors and secures servers and network devices.
Xenos Software LLC
Murfreesboro, TN 37130
Nov 30, 2004 Run on Windows 2000, XP, and 2003, Server Nannyâ„˘ v2.25 detects problems with servers, sends appropriate notification, and performs automated actions to correct problems. It monitors any network device using 30+ different types of monitors, from basic ping to SNMP. Notifications are sent via email, SMS, net send, and more according to schedule that ensures correct contacts are notified by best method depending upon day and time of failure.
Security Software is FIPS 140-2 certified.
SSH Communications Security Corp
FIN-00100 Helsinki Finland
Nov 30, 2004
Enabling end-to-end secure communications throughout internal and external network, SSH Tectia(TM) client/server solution supports Red Hat Enterprise Linux v2.1 and v3.0, Solaris 9, Windows 2000, and Windows 2003 Server. It provides transparent encryption and authentication, and integrates into heterogeneous, multi-platform environments. Cryptographic module is approved for use in Federal agencies within context of complete security program.
Software proactivly protects against worm attacks.
Redwood city, CA 94065
Nov 30, 2004 SecureCore v2.0, built on proprietary Memory Firewall, stops known and Zero Day worms by preventing them from executing in memory before they can cause damage and spread. Suited for use in enterprise networks, it offers capabilities for centralized deployment, management, and reporting. Application prevents execution of even one line of malicious code when worms reach protected endpoint devices, insulating enterprises from information loss and downtime.
Intrusion Prevention Systems offer spyware protection.
TippingPoint Technologies, Inc.
Austin, TX 78731
Nov 30, 2004 UnityOneâ„˘ systems block spyware at network level, providing application, performance, and infrastructure protection at gigabit speeds through total packet inspection. Solution has filters that prevent computers that were infected prior to software implementation from uploading personal information to collection servers. Filters also prevent spyware servers from updating desktop agents with new functionality while also blocking download of ads.
Security Tools help resolve software vulnerabilities.
Fortify Software, Inc
San Mateo, CA 94404
Nov 30, 2004
Source Code Analysis tools mitigate enterprise security risk by automating identification, prioritization, and resolution of flaws in software applications. Multiple source code analyzers detect security vulnerabilities in software, while Fortify Audit Workbench reports vulnerabilities and prioritizes them for correction. Fortify Rules Builder lets users create custom rules to check for security flaws associated with company-specific application components.
Software streamlines information delivery processes.
Computer Associates International, Inc.
Islandia, NY 11788
Nov 30, 2004 Providing out-of-the-box support for 10 languages, CleverPath Portal v4.7 simplifies personalized delivery of complex business process information to IT and business users. It facilitates portal implementations and optimizes distribution of information assets across enterprise. Also able to facilitate conformance with content management best practices, product lets organizations deliver relevant content to anyone inside or outside of enterprise.
(Showing headlines 18621 - 18640) << 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072