Software synchronizes, replicates, and provides backup.
Running as service in Windows NT/2000/XP/2003, Sync Now v3.0.6 syncs folders stored locally or on several machines. It includes task scheduler, file verification, and fully automated unattended sync mode. Task definition wizard guides user through steps of creating new tasks. All sync tasks are listed in main window where user can see current status, edit properties, move them up or down list...
Read More »Software monitors user's web activity in real-time.
Transparent to user, GFI WebMonitor 3 provides access control plug-in for Microsoft Internet Security and Acceleration Server that allows administrators to monitor sites users are browsing and what files they are downloading, in real-time. It can scan all downloads for viruses, perform proactive content filtering, and block files based on type. GFI WebMonitor supports add-ons that enable it to...
Read More »Software enables standards-based real-time networking.
With architecture that targets data-critical applications, NDDS v4.0 includes DDS-compliant API, direct end-to-end messaging, and pluggable transports that support any media. Product also features programmable parameters, Quality of Service (QoS), and custom types. Pre-allocated memory prevents allocation and fragmentation delays, while endpoint design accelerates messaging. Applications do not...
Read More »Software facilitates business critical collaboration.
LotusÃ-® Domino(TM) 7 includes Lotus Sametime 7, which combines instant messaging and Web conferencing. Lotus Sametime Enterprise Meeting Server 7 can be added to optimize load balancing and failover for enterprise-class deployments. Lotus QuickPlace 7 brings together geographically dispersed team members, while Lotus Domino Document Manager 7 enables teams to work together through...
Read More »![A Guide to Quality Control of the SMT Process](https://cdn.thomasnet.com/kc/thumbs/13295.png)
A Guide to Quality Control of the SMT Process
The printed circuit board (PCB) manufacturing process begins with cutting-edge equipment capable of accurately picking and placing up to 40,000 components per hour. This innovative equipment keeps error rates extremely low, and those defects that do occur are quickly caught by sensitive laser and optical inspection equipment.
Read More »Backup Software supports Red Hat Logical Volume Manager.
Yosemite Backup(TM) v8.1 offers disaster recovery for Linux environment, enabling users to restore data from scratch versus having to re-install and re-configure Linux software before recovering data. Built-in virtual library via D2D2Ne(TM) option allows users to create multiple hierarchies of data storage and manage hierarchies from one central location. Bare Metal Disaster Recovery option...
Read More »Data Server Software supports 64-bit Linux platforms.
Through compatibility with Oracle, SQL Server, and Sybase databases, ANTs Data Server v3.2 allows enterprises to move applications without major rewrites associated with application migration. Based on SQL query execution engine that incorporates lock-free operations, software offers ability to handle multiple result sets, support for very large stored procedures, and embedded deployment mode,...
Read More »Software provides network access control.
Sygate Enterprise Protection v5.0 integrates Host Intrusion Prevention and Universal NAC System on single agent, which is centrally managed by single console. Software can block transfer of data to unauthorized removable media devices, specify unauthorized devices for data transfer, and control user's ability to read, write, or execute data on specific devices. It includes Memory Firewall...
Read More »Host Intrusion Prevention Solution can control USB devices.
McAfee Entercept protects availability, integrity, and confidentiality of data, applications, and other critical assets by proactively blocking USB-based attacks before they can proliferate on system or network. Effective against known and unknown threats, product controls use of USB storage devices to help organizations prevent propagation of malware and arrest internal data theft.
Read More »Software addresses mounting security threats.
Part of Solidcore S3 Control(TM) product line and based on Solidification(TM) technology, S3 Security(TM) delivers proactive and categorical control of what runs on Solidified(TM) computing systems. It assures that no unauthorized code, whether inadvertent or malicious, can execute. Integrating with existing IT applications, software is transparent to operations, requires no initial configuration...
Read More »Software Development Kit protects applications from attack.
Validian ASI(TM) SDK v1.0 enables users to implement secure data-transport and application-authentication framework that requires no knowledge of security or IP networking. Product ASI-enables existing and new applications that are architected to be client-server or fully distributed. Validian ASI protects against unauthorized access, malicious code, and other forms of attack by creating trusted...
Read More »![Clear Clogged Drains Faster with General Pipe Cleaners' Kinetic Water Ram](https://cdn.thomasnet.com/kc/thumbs/13195.png)
Clear Clogged Drains Faster with General Pipe Cleaners' Kinetic Water Ram
The Kinetic Water Ram by General Pipe Cleaners clears out clogged pipes quickly using kinetic energy. The Ram is so simple to operate, anyone can use it. Check out the video to learn more.
Read More »