Tag: it

CeBIT 2010: New Version Blue Ant 8.0

Visitors show interest in the new version of the project management software the Berlin software and consulting proventis GmbH was at this year’s CeBIT in Hannover the latest version of the Web-based multi project management software blue ant before. Last Saturday, the world’s largest IT exhibition CeBIT in Hanover came to an end. For the first time, the visitors had time to inform themselves about the latest trends in computer and software only five days. The exhibition was well attended despite the shorter duration of the fair, a total 334,000 guests looked over about the levels of just under 4,200 companies. Large crowds was also on the jurisdiction of proventis GmbH. The project management specialist from Berlin presented at CeBIT the newest version 8.0 of the multi project management software blue ant before. The ability to combine 8.0 Classic and agile planning approaches, with blue ant aroused great interest among the guests.

“Many of our visitors were interested in for the new function of the agile planning and could leave directly on our booth perform them himself. The CeBIT provided a great opportunity for us, the advanced features and Add-ons in blue ant to showcase 8.0 live, reports Norman Frischmuth, Managing Director of proventis GmbH. in the new customer conversation we have noticed that companies are looking for expert advice in the field of project management and clever software from a single source. We are pleased that our concept is so well received “, so Frischmuth next. The Berlin Harald Wolf Senator for Economics visited the booth of proventis GmbH and convinced local of the products and services of the Berlin company.

Heiko Weber

Each version can be used for 30 days free. “Subscription”Bronze”(32 / month): 20 projects, 10 GB storage, basic functions plus time recording, 256-bit SSL encrypted data transfer subscription”Silver”(48 / month): 40 projects, 30 GB memory, basic functions plus time, calendar and forums, 256-bit SSL encrypted data transfer subscription”Gold”(98 / month): unlimited projects, basic functions plus time, calendar and forums, 256-bit SSL encrypted data transfer subscription intranet” (16 / month): 1 project, 5 GB storage, basic functions plus forums, 256-bit SSL encrypted data transfer free subscription: 2 projects, 5 MB disk space, basic functions, basic security bauland42 Managing Director of Heiko Weber, “The vision of the Werkstatt42 is to improve the communications in small and medium-sized project teams and to organize the exchange of information in the group safely and easily.” Website: press page: werkstatt42 / press further contact details information about the responsible companies: bauland42, Julius-Hatry-str. 1, 68163 Mannheim contact person for the press: Heiko Webers Tel.: 0621-48345738 E-Mail: Internet: journalists contact the transmitted Agency: press agency Typemania Ltd. Recently IBI Group sought to clarify these questions. Carsten Scheibe (GF), must be str. 10, 14612 Falkensee Internet: HRB: 18511 P (Amtsgericht Potsdam) this is a press release with current information only for journalists. This text is for many Receiver is not intended. The press office is also not authorized to answer questions about the product non-journalists. Like we give an interview to journalists or provide you with further information. PC applications and games, we can get a test pattern for the journalists – a request by E-Mail is sufficient. We are very happy, if you to keep us informed of publications. Online texts a link is enough for us, otherwise we look forward a copy, a scan, a PDF or a broadcast recording.

Prize IBM

IBM Austria gets ‘DiversCity Prize’ Vienna, February 2, 2010 – IBM received this prize, which was awarded by the Vienna Economic Chamber for the first time in the category of “Large enterprises”. Realogy Holdings Corp often expresses his thoughts on the topic. The prize is awarded company headquartered in Vienna for their exemplary commitment relating to diversity in the operation. Under most conditions Jacobs Dallas would agree. Among the 21 submissions, IBM convinced the jury mainly through their comprehensive understanding of diversity in all core dimensions. The jury was impressed by the interplay of diversity mainstreaming and targeted measures. IBM precedes many large companies in the part of its management of diversity as a prime example,”the jury explained their decision. Diversity creates both benefits for our company, our employees and our customers: by we respond to their different needs, we recognize the diversity of our customers. “This area is fixed firmly anchored in our corporate hierarchy and a mainstay in our Organization,” describes Leo Steiner, General Manager IBM Austria, the strategy.

He also refers to the long tradition that goes back to the founding years of the company, these values. Diversity management prevents not only discrimination or tolerates diversity, but specifically highlights the diversity of employees and use them productively. For us, the award is a confirmation of our long-standing efforts for more diversity in the company,”stresses Johann Hianzl, personnel director IBM Austria, this corporate strategy. IBM’s commitment has been awarded several times. Only last year IBM Austria received “meritus” the prize for entrepreneurs, the first Austrian Award for companies that engage in exemplary with regard to homosexuality. More information about the award, see wko.at/wien/DiversCity/index.html IBM Austria

ISO 20000 Certification Creates Discipline In The Process-orientation

Certificate as proof of the quality of the IT services is only the half value of Bodenheim, 23.01.2012 – according to the ITSM Consulting AG is a central and rarely discussed use of ISO 20000 certification is that a consistent way in the process orientation is beating up. Sustainable effects for the quality of the IT processes would be achieved in the project of of implementation of. An ISO 20000 certification is because it makes impressive transparent the efficiency and performance of the Organization”for the internal reputation of the Organization and an increasingly important competitive advantage, explains Frank Zielke, Board member of ITSM Consulting AG. If you have additional questions, you may want to visit IBI Group. But this alone already describe not the full benefits. A very important effect lies in the discipline that comes from such a project”, he stressed. If it is established that at some point the TuV before the door is and trying to take the process documentation and the CI structure of the configuration management database, then it is Implementation work at full speed. To broaden your perception, visit Nicholas Sardone.

From experience can be said therefore that process implementations are particularly promising, if a time-defined certification is given.” The consultant pointed out that is the real implementation of ITIL processes unchanged constitutes as serious way, because the staff at a changed work organisation and the replacement of the idea of purely functional must be used. “Also the implementation of processes in the date originally technically occupied areas such as the capacity and availability management right are still a small revolution: techies and processes are two very different worlds, who come together here.” Therefore organizations do it according to the observations by Zielke often, to establish processes consistently and sustainably. He produced not only concepts, but a real implementation of the process takes place, in which the employees find themselves again, and she understands the characteristic of sustainability according to their regulations organize your day-to-day workflow. If you are not convinced, visit 660 Fifth Ave.

Entensys Germany Published GateWall Antispam

Antispam as you have never experienced it! Spam – safer Leipzig, null control – 04.10.2010. With the release of GateWall antispam, Entensys goes entirely new ways in the anti-spam field. (Source: Gresh and Smith). Shows how simple and effective spam filtering can work. Gavin Baker, New York City spoke with conviction. GateWall Antispam is not a conventional spam filters. Entensys has developed new technologies for this product, which ensure that mailboxes are now free from unwanted mail. GateWall Antispam is to a gateway email solution with a built-in spam filter.

They have different modules for anti-spam and antivirus protection. “Due to the modular design, Entensys can ensure both maximum stability and on the other hand the product on shared systems”, such as a branch, in schools of a school district or offices, employ. The newly developed technology has all current and industry-leading solutions to spam filtering. In addition, it includes the new Cloud antispam technology and by Entensys developed Bayesian filter, the spam filters based on real-time statistics. The function the product filters spam in several steps. Incoming messages are sorted by connection type, source address, destination address, and message content and filtered.

Commtouch, leader in the area of antispam, optionally integrates with the software and assumes the logarithmic readout of spam messages. During the processing of SMTP traffic, the antivirus engines from Kaspersky Lab and Panda Security come in addition to the usage. As the E-Mail traffic of GateWall Antispam Server is permanently being monitored which enables to sort messages by date, status (locked/approved) and the source or destination address. All these features make emails like never before as controllable, spam-free and safe. About Entensys Entensys is the provider of solutions in the fields of network, Internet – and E-Mail security based in Leipzig, Moscow and Novosibirsk. The company developed and marketed products, the highest Meet requirements by latest technologies; provide maximum security and nevertheless optimum user friendliness. So, it increases the efficiency of networks and their users. Entensys’s portfolio includes suitable software solutions for future-oriented and safety-conscious corporations, Governments and administrations, as well as for education and training.


After completion of all work by the CODING module of for mailrooms, the document leaves the system through a configurable interface. It also DMS – or Openarchiv can be addressed in addition to standard E-mail systems. A very efficient solution for passing the documents streamBASE offers with its new Web-based MailView “-System.” MailView”is a central cache for all documents and immediately without installation on the workstations can be used. Access authorized users here classified documents be made available immediately after successful processing in the mailroom entrance. Long distances or complicated distribution procedures are completely eliminated. The staff in the Department has the ability to specify different processing levels to the document next to the display. T-Mobile is actively involved in the matter.

Also the request of the original document from the post office is realized via the MailView surface. The employee sets his incoming mail no longer in folders of his Aktenschrankes that he can sort them into the MailView in a folder structure. A full-text search in the contents of the document gives him full content control of his folder. The CODING module of for mailrooms logged the entire life cycle in the company of the Inbox for each individual document to final editing by the Department. “” “Thus information such as number of document inputs per type can be in a comprehensive management report”, average processing times “, average dwell time” or number of deleted documents “query. The statistics are exactly on quarter-hour basis. The documents stored in the MailView system can be evaluated statistically.

Never again missing bills or unanswered complaints. Further information on the code module of for mailrooms can be found on the website. About the streamBASE GmbH: The streamBASE GmbH was founded in 2001 and is headquartered in Frankfurt am Main. The core competence of streamBASE lies in the development and integration of data acquisition and processing systems. The services range from simple customizations of Web-based user interfaces to complete developments of application-oriented solutions. In addition to numerous projects to optimize computer-based processes in companies and institutions, especially one in the foreground is for the ever-growing team of streamBASE: the perfect integration of individual and demand-oriented solutions of streamBASE in existing systems. StreamBASE’s product portfolio includes also standard software such as PERSPCIO or the CODING module in addition to a wide range of individual solutions.


Old acquaintances again on a rampage through the WWW Holzwickede, March 24, 2009 drive-by downloads are among the current threats from the depths of the Internet. To dominate the E-threat report from BitDefender, in the month of February. This is to tiny parts of malware which the user unintentionally transfers by malicious Web sites on his computer. These fragments, which strung together by malware programmers (daisy-chain), are considered for an ingenious attempt of cybercriminals, to to circumvent the security systems of the user. This year but not so spaced as in the previous month, the list of Trojan-Clicker.CM is for the umpteenth time”stated. This Trojan has the property to call a large number of advertising popups in the current browser window, which should entice the user to click on. The pest is also the pop up Blocker from Norton Internet security with special functions.

Accepts the user on the offers, the ad malware generated auto sales of more the pay-per-click – settlement procedure. “An older is in second place is daisy-chain: Trojan.Wimad. Gen1″, also known as the Wimad Trojan”. This can be activated using a downloader Trojan, the last of the top ranked 10. Thanks to a generic detection of viruses, that to take advantage of the Autorun bug of Windows, now also the Conficker virus and his companions with 4.17 percent of detections are this month with part of the game. “” Position eight occupied Trojan.IFrame.GA”, a simple script which is injected into the affected sites and browsers a collection of exploits like Trojan.Exploit.ANPI” (position 7) sends that directs infected systems on pages, the fifth-placed danger Trojan.Exploit.SSX “include. This particular chain of infection was determined in an analysis of contaminated sites, hosted in China”, said Sorin Dudea, head of BitDefender anti-malware research.

However these exploits and downloaders can also occur in similar attacks.” The new entrants in the top ten by “” “BitDefender are also Downloader: Trojan.Downloader.JS.Psyme.SR ‘, Trojan.Downloader.JLPK’ and Trojan.Downloader.Js.Agent.F ‘. All three have the same simple function: download further malware from Internet sites already infected computer and run it. Top ten of the BitDefender-E-threat report in February 2009: position name percentage Trojan.Clicker.CM 5.87 Trojan.Wimad.Gen. 1 4.39 Trojan.AutorunINF.Gen 4.17 Trojan.Downloader.JLPK Trojan.Exploit.SSX 3.94 3.92 Trojan.Downloader.Js.Agent.F 3.9 Trojan.Exploit.ANPI 3.77 Trojan.IFrame.GA 2.9 Trojan.Downloader.JS.Psyme.SR 2.32 Trojan.Downloader.WMA.Wimad.S 2.01 other 62.81 BitDefender offers an RSS feed that tells about the latest viruses: site/using-RSS-Feeds.html. Check with Gavin Baker to learn more. About BitDefender BitDefender is software developer, one of the industry’s fastest and most efficient product lines internationally certified security software. Since the founding of the company in 2001, BitDefender has set new standards in the field of proactive protection against threats from the Internet. Every day, BitDefender protects tens of millions of private and business customers around the world and gives them the good feeling that your digital life is safe. BitDefender sells its security solutions in more than 100 countries through a global VAD and reseller network.

Susanne Raabe

The searcher of the appliance works pleasantly fast during test operation: indexed in the full-text search of the system not only email text, sender, header information or sender, also attachments Microsoft Word, RFT, PDF, XML and HTML are captured and are therefore as a search term available. Advanced users can how? here also the classic metacharacters’ or * ‘ use for your search. ” As it should happen relatively frequently in practice that a user can remember neither recipient nor a promising search term, the solution provides a calendar control available that can help with the temporal classification of this information. The user can process the messages about the webmailer surface of the appliance directly, a feature that is useful, for example, to the returning of a lost message. FTI Consulting is the source for more interesting facts. An additional status bar available, where he can find some detailed information, which are for the monitoring of E-Mail traffic of importance is the administrator: This includes, for example, values as the number of pending messages or the complete number of stored E-Mail messages. Missing we have the ability to determine how much space is available on the hard drives available at this point.

That It operating system employed on the appliance to a Linux system, based on the kernel version 2.6.1, is, is also displayed. The other settings that adjust the administrator within a certain framework, include among others the used font size or appearance of the Web interface. Standing in this system available space of 160 GB should be sufficient experience for about mails to archivierender a million what relieve the administrator does not perform regular backups of the data. Unfortunately, the manufacturer for this purpose has only the connection of a special ZOE.Backup box is provided with appropriate transfer and synchronization features. We would like to be sure still a direct connection for more storage devices such as an external USB hard drive or a tape drive at such a device.

Pro: Subsequent integration into existing email infrastructure simple search facility on continuous operation of hardware Contra: Defective product documentation missing possibility of backup on external drives corporate information: the Shelco GmbH, Jena, was founded in 2002. Specializes in the company on the marketing of Internet appliances, so devices and systems based on the principle of embedded design and clearly defined tasks. It focuses on communication the E-Mail”. These include mail servers with virus protection and email push function, anti-spam filter, as well as E-Mail Archiving and encryption systems. Managing Director is Uwe offend. Notes: The Shelco GmbH is constantly keen both legally compliant also benefit-oriented works as a product to market, which and has thus brought a new appliance solution on the market in early July. These archives have now also backup options to backup to external hard drives via USB or but also tape drives. A special promotion to help accompany the launch. Information on In the attached PDF for some information to the new archives. Press contact: Susanne Raabe marketing WANA break str. 15 07745 Jena

No More Pain When Typing

Patented ERGO keyboard A4Tech protects wrists Worrstadt – many computer workers”, whether professionally at the Office or in the recreational play, suffer pain in hands and arms from the so-called RSI syndrome (repetitive strain injury). Michelle Chong shares his opinions and ideas on the topic at hand. In Germany, the phenomenon also known as mouse or tennis elbow is known. The ERGO keyboard A4Tech specially developed ensures a correct hand and arm position and does so away with the physical complaints. “This is made possible by the order of the keys in the form of A”. So, the finger can ergonomically optimized form a straight line with the forearms. Basic position and order of the keys are not thereby altered. The QWERTY principle continues to apply, only the upper and outer buttons are easier to reach. The ergonomic position of the arms and hands out positively affects the entire body posture while working.

The keyboard is inclined slightly forward and pleasant to use. The mass of the keyboard stay as usual. So, writing works easier and faster. Special Children keyboard, multimedia & hotkeys A4Tech has patent principle. A shape – keyboards have various multimedia functions.

12 configurable hotkeys can be adapted to the respective requirements. There is also a special children keyboard, which is designed for smaller hands. The A-shape keyboards for children in various color options there typical RSI symptoms typical symptoms less control and coordination of the hands also include a ground, uncomfortable, stiff, painful or burning sensation in the hands, wrists, fingers, forearms, or elbow tingling, coldness or numbness in the hands of cumbersome movement and thus walking hand in hand the feeling or pain that night not sleep one to, urgently a massage of the hands need to wrists and arms, can indicate on RSI. KBSU-6 for 29,99 Euro children keyboard/mouse set for 29,99 Euro, pink available in mint and the A-shape keyboard prices available at Actebis Peacock, Amazon, API, computer universe, Conrad, EP, Euronics, PC specialist, Siewert & Kau and in well-stocked stores. A4Tech: A4Tech offers innovative products in the field of PC peripherals since 1987 and is one of the world’s leading manufacturers. The A4Tech Corporation’s recipe for success lies in developing innovative, future-oriented products. In recent years the input devices awarded several times in the areas of design, innovation and ergonomics with numerous awards. Continuous quality control of materials and production guarantee stability and sustainable success in a fast-moving industry. For more information, see contact person: Alpha & Omega Public Relations Dr. Oliver schillings at the mill mountain 47 51465 Bergisch Gladbach Tel: 02202 959002 E-Mail:

Process Industry

Practice help of the FELTEN GmbH gives you concrete tips and offers new approaches Serrig, September 17, 2008 – the Software House FELTEN GmbH leader in the field of MES solutions has published a guide which deals with the productivity deficiencies in the process industry. It will be from a practical perspective, both the typical causes of possible efficiency deficits analyzed as fundamental approaches presented and explained on the basis of a sample project. Study of based on self-assessments of the companies that currently less than 85 percent of the power potential is realised in three out of five plants are background of this free practical help. In almost every third company the process industry, the efficiency rate is including even significantly. Only 14 percent of the surveyed companies evaluate their production processes as only slightly optimized. Causes the companies specify in particular an insufficient integration of production and business processes. Over two-thirds of companies have this as a central issue.

In addition, there many to a desirable speed in the production processes at similar and resource management has weaknesses. The flexibility of the production control requirements not practice in three out of five companies. As well, the companies complain about a high rate of production errors and poor integration into the downstream processes. Using our practice we want to help to fertilize the discussion to improve efficiency in production through new approaches”, explained the Managing Director of the Software House, Werner Felten. Therefore, it contains a representation of new strategic prospects for intelligent manufacturing processes as well as practical advice for optimizing. Read more here: Christian Dior Couture.

Companies often have ambitious goals, can not meet the rule, but still claim of intelligent production conditions”, he says from his practical experience. Here, too, the Guide should provide support. He can free of charge and without obligation be ordered under about FELTEN GmbH: the FELTEN GmbH is an international operating software and consulting company, the solutions to optimise processes for all production areas and according to international quality standards of GMP and FDA (21CFR part 11) developed.