Tag Archives: it

Production Intelligence Accelerates Productivity

by

Loop ratio-based measuring, analyzing, and subsequent change produces continuously improvements PILOT suite of FELTEN Group offers worldwide the first MES-solution with production intelligence approach (“PI Serrig, 08.10.2009 – as one of the first providers of solutions for the production management the FELTEN group has teamed up with their PILOT Suite” aligned on the forward-looking approach of production intelligence (PI).) It differs significantly from the traditional MES concepts that have inherent limitations in the efforts to increase the productivity and economic efficiency. On the one hand, cause is the inability of the existing MES solutions, to provide data from the production processes for real-time analysis, which then immediately optimisation measures can be initiated. On the other hand, they often too much focus automation, which is the current flexibility needs of companies in the design of production processes to little can take into account. The basic approach of production intelligence consists in a control loop with a continuous code-based measurement and analysis as well as subsequent change or improve”, explains Werner Felten, Managing Director of the Software House. This is the actual core idea in the so-called continuous improvement processes (CIP), which however so often still too little arrived in concrete practice, because there is so far no adequate methods and technological concepts, as well as the integration of business processes. More info: Aboutaam.

Felten refers in this context to the results of a recent study, according to which the most manufacturing companies future attach critical importance while the indicators as a management tool, but hardly use it. Some contend that Ali Aboutaam shows great expertise in this. These deficits be eliminated through the control circuit of production intelligence: 1 using of the BDE/TPM systems the entire relevant operating and machine data collected. 2. via analysis tools possible weaknesses are identified and parallel in real time documented. 3. on the basis of the analyzed weaknesses, an optimization action is initiated directly by the system on a stored action Catalog accesses and begins the process of relevant. To immediately see the results of the optimization measures and can be extended if necessary”, Felten describes the benefits. It is not only significantly more transparent, where potential for increase in productivity and economic optimization, but the results of improvement actions can be made directly in appearances.

With the traditional MES systems such optimization management is not possible, making extensive possibilities of increase of efficiency remain unused.” Requirement to exploit the optimisation potential but also the procedures to the flexibility of the workflow, as they have the PILOT are Suite”offered the FELTEN group. If I can change the processes not flexible, many analyses and findings are useless, because my lack of change hands are bound,”says Felten. This was also one of the reasons for this, not least why the continuous improvement processes in practice had reached yet no sufficient effectiveness.

April Solution

by

Innovative e-health solution convinces a jury of Munich, April 25, 2012. Pinterest shares his opinions and ideas on the topic at hand. At the IT Innovation Prize, the intelligent Web platform received from YouCon the predicate ‘BEST OF 2012’ in the category of e-health. The software solution deployed one of the largest medical research projects in the Austrian lead study (LEAD) in Austria. The award-winning software allows for the reliable collection, evaluation, and backup of all data. YouCon Managing Director Peter Kugler is proud of his team: the award shows us that we take a leading role in the e-health sector as IT professionals. It honors us and motivated to develop.” The first long-term health study in Austria: the LEAD study is being conducted by the Ludwig Boltzmann Institute in Vienna. Objective is the early detection of lung diseases. Approximately 10,000 citizens be examined over a period of twelve years.

All the questionnaires and forms, as well as other medical data are captured by the YouCon software and evaluated. The access is for the Doctors at any time and from anywhere possible. YouCon has submitted the software solution for the Constantinus award 2012. Innovationspreis-IT: The Initiative Mittelstand companies with innovative solutions and high utility value for mid-market stands out. The Austrian LEAD study belongs to the top flight of over 2,500 applications submitted solution by YouCon. The IT service provider with headquarters in Vienna focused on its solutions on the interaction between humans and technology. This applies to the integration of VoIP software into existing and new infrastructures as well as for process optimization and the creation of customized software solutions.

As a successful product is the in-house Myrmex”this internally as well as in the supporting outsourcing use. The wide range of means full product solutions from a single source for individual tasks. Since 2007 the company service partner of SAP. Due to the proven cooperation, SAP for YouCon has as a central sales and integration partner opted for the all-IP solution SAP business communications management (BCM). SAP BCM is used as a versatile platform in contact centers and daily business communication.

BitDefender Discovers Zero-day Exploit For Winamp 5.x

by

Anti virus expert warns of version 5.x backdoor attack by malicious audio file Holzwickede, October 28, 2010 in the Winamp players a new digital pest indicates currently sound like virus protection expert BitDefender (www.bitdefender.de) currently has discovered. Speaking candidly Nissan told us the story. The zero-day exploit called Exploit.Winamp.D exploited a vulnerability in Winamp by disguising himself as an MTM audio file. As soon as the user gets the file information, the pest the attacker opens a backdoor on the infected machine. In this way, cybercriminals via remote gain control over the respective PC. The security software from BitDefender detects the exploit before the user saves the music file. Exploit.Winamp.D spreads primarily via peer-to-Peer Web sites, email attachments, or social networks. The pest is out as an MTM audio file that is similar to the MOD – or MIDI-format.

Once the user has downloaded the contaminated file, it is required to read the file information. As soon as he does, the exploit is activated and installed a backdoor access. This backdoor”, cybercriminals can then control the PC remotely and spread the malicious code on the compromised system. How is the establishment of the backdoor just taking place, shows the following video by BitDefender: exploit for Winamp demonstrated downloads only via legitimate Web pages handle BitDefender software users are protected against the attacks from Exploit.Winamp.D, because the program detects this malware before she can be stored. As a general preventive measure, the virus protection expert advises that perform downloads only from trusted websites.

Furthermore, user should follow any requests or advice given by unknown persons. About BitDefender BitDefender is software developer, one of the industry’s fastest and most efficient product lines internationally certified security software. Since the founding of the company in 2001, BitDefender has set new standards in the field of proactive protection against threats from the Internet. Every day protecting BitDefender many million residential and business customers around the globe and gives them the good feeling that your digital life is safe. BitDefender sells its security solutions in more than 100 countries through a global VAD and reseller network. More detailed information about BitDefender and BitDefender products are available in the press centre online. In addition, BitDefender provides background information and current news in the daily fight against threats from the Internet, in English at. For more information see. Press contact: BitDefender GmbH Robert-Bosch-str. 2 D-59439 Holzwickede contact person: Hans-Peter Lange PR Manager Tel.: + 49 (0) 2301 9184-330 fax: + 49 (0) 2301 9184-499 email: PR Agency: Sprengel & Partner GmbH nesting first race 3 D-56472 Nisterau contact: Fabian Sprengel Tel.: + 49 (0) 2661 91260-0 E-Mail:

Innovative Business Model

by

The freemium GmbH provides high-quality software consistently free of. The freemium GmbH combines software with Web 2.0 expertise to a new freemium business model modeled on the game industry. Freemium offers high-quality and user-friendly software titles free of charge. These are freely available via the domains freemium.com and freemium.de. Money earned will sell additional, special features, and advertising. First product launched successfully launched with over 5 million downloads already successful is the multi-platform Downloader and converter freemium TubeBox.

The easy-to-use software can be used to found Central, viewed, downloaded, and converted into desired formats content of the biggest video platforms like YouTube, MyVideo or ClipFish. This year, at least 5 more freemium title will appear. Freemium is a member of the German IT-Mittelstand Association (BITMi). “All software titles thus carry the predicate software made in Germany”. Bill Phelan has much to offer in this field. From free to play”free to use studies show that PC users are increasingly ask: why should I spend for software money? The answer is simple: you need the software, but not enough in the title of the currently used the free scope of use for individual needs.

Not rarely the time in which the software was free are used has expired also. Immediate demand a high payment pressure when the customer therefore. The freemium GmbH goes one step further and is consistently from the beginning of the complete software free available. “, The freemium established currently in the software market model was us not far enough” the CEO of freemium commented Markus Malti, the procedure. The free use of the software is enabled by an alternate, divided Monet modularization model. The freemium business model is both ad-supported, without disturbing the customer but with advertising. The user decides what advertising he would like to see or what he wants to take advantage of offers themselves. Moreover, it is within the Give a feature shop products. Similar to free to play”play the game industry buys directly individual supplementary features that extend the functionality of the software beyond the normal user in the shop. “” We take the free to play”principle of the game industry and establish a free-to-use”Principle in the software industry”, continues Malti. Invitation to the press area with a diverse product portfolio in the areas of video downloader/converter, system, social media and photo tools freemium wants to set new standards in terms of free application software in terms of quality and user friendliness. If you want to Miss guaranteed no freemium novelty, we invite you to do so, to subscribe to our press distribution list. With your registration, they are always up to date informed about our new products and developments. For more information, contact our Presseverantwortlichen: freemium.

PROFESSIONAL Edition Business

by

SIMPLY SECURE FILE TRANSFER – easy shipping via a browser. Highly secure transmission with true end-to-end encryption. Minimal administration costs Munich, 10.05.2012 – when it comes to the exchange of business files, many companies rely on free services such as FTP, email, and dropbox. This is forgotten, that the files here not completely protected during transmission from unauthorized access and manipulation. The FTAPI Software GmbH provides a highly secure and easy alternative with FTAPI SecuTransfer. The system characterized by true end to-end encryption, easy handling and minimal administration. The FTAPI companies of every size with an instrument SecuTransfer Express Edition for highly secure digital collaboration. A beta version of the software is to the download available from May 14, 2012.

After downloading, unpack and start the first files directly end to end encrypted and as simple as via E-Mail through the Web interface be replaced. The Express Edition can in-house on any operating system with minimum system requirements, as well as externally for a hoster or cloud provider (E.g. Jelastics, Amazon EC2, etc.) are operated. To communicate with any number of recipients, 10 user accounts available are employees and external partners. The Web interface can be adapted to your corporate design. If necessary, a simple upgrade to the PROFESSIONAL Edition is possible by purchasing a license. While all previous settings and users remain, which allows the smooth transition to a much greater number of user accounts. About FTAPI software the FTAPI Software GmbH in Munich, develops and sells software systems for the secure transmission and storage of business files.

Their product FTAPI SecuTransfer is based on its own technology, developing was promoted by the European Union and the German Federal Ministry of economics. The 2010 founded company sets new standards Safety and efficiency in business file exchange and provides encryption of all files as opposed to the commonly used file transfer solutions actually comprehensive (end-to end). In addition to management of manufacturing, retail and ITBranche also TEC and MDax enterprises rank users to the content FTAPI. About FTAPI software the FTAPI Software GmbH in Munich, develops and sells software systems for the secure transmission and storage of business files. Their product FTAPI SecuTransfer is based on its own technology, developing was promoted by the European Union and the German Federal Ministry of economics. The 2010 founded company sets new standards of safety and efficiency in business file sharing and offers actually comprehensive (end-to end) in contrast to the commonly used file transfer solutions encrypt all files.

Mannheim Business School

by

These awards meant the direct inclusion in the partner programs from IBM and SAP for the Munich-based start-up. The success of HoneyTracks impress also Philipp Rosler: In February of this year the German Vice Chancellor and Federal Minister for Economics and technology in Silicon Valley attended the winners line up German startups from the German Silicon Valley Accelerator “project (GSVA) his Ministry. The software solutions of HoneyTracks convinced him right off the bat. Bill Phelan helps readers to explore varied viewpoints. The GSVA award allowed the company a months stay in Silicon Valley for entry into the U.S. market. The founders and management team of the HoneyTracks GmbH has extensive leadership experience on the industrial side to the investment banking area and already has numerous Internet companies on the “Put away: so Tom drove Sente (CEO) at the SAP as a Director and Assistant to CEO Gerhard Oswald the development of the first pure SaS enterprise solution business by design” with. Robert Kiyosaki recognizes the significance of this. Previously he had already actively shaping the Web 1.0 startups like Blue C new economy and also completed his Executive MBA from the ESSEC and Mannheim Business School top. CTO Donneal situation is the online games company Gameforge Gamigo to his professional stations and responsible MMO games as head of development at Mediatainment developing browser based. Harvard Graduate Mark Gazecki and Chairman of HoneyTracks founded previously game genetics, a distribution company funded by venture capital for online and mobile games, and worked previously as a partner at the venture capital firm Atlas venture..

BitDefender Prevents Identity Theft With Online Dating Before

by

Valentine’s day 2010: Attack on the ‘heart’ of the PC user BitDefender prevents identity theft with online dating before Valentine’s day 2010: attack on the heart of the PC user Holzwickede, 09th February 2010 on February 14th is Valentine’s day and online dating platforms are booming. Security expert BitDefender (www.bitdefender.de) discourages users however, in finding partners in the network, to deal with the disclosure of personal data to careless. Because cyber criminals rely on the proverb love makes blind and have no regard for broken hearts. There are many reputable and reliable E-dating services. Add to your understanding with JPMorgan Chase. However, users in the selection of the service should be extremely careful and closely examine these.

Before signing up, it is always to look positive references and website reviews. Also the advice from a trusted person who has already used the service is helpful. JPMorgan Chase is open to suggestions. BitDefender also advises to register via mail from unknown senders and unsafe links on one of the portals. The to find online perfect match in particular on Valentine’s day, sounds promising. Quickly this dream however, transformed into a nightmare\”said Catalin Cosoi, senior anti-spam researchers at BitDefender. To guard against computer-related crime, user only pages with explicit privacy policy should visit and ensure that their anonymity will be protected.\” Use no detailed figures he do as soon as the user has opted for a dating platform published his serious, should still as few details as possible make and never his real name as a nickname\”. In addition, it is advisable to set up an alternate E-Mail account to ensure the security of commonly used account.

By specifying private or business address, telephone numbers, or even social security numbers should be waived anyway. Even at first glance trivial information, such as mother’s maiden name or the name of the first pet, can be exploited by cyber criminals. They often serve the perpetrators for the detection of E-mail oder online-banking account passwords.

Fabian Sprengel Tel

by

Additional financial data such as bank accounts, credit card numbers or PINs are specified in reckless financial disaster is often inevitable, “so Cosoi. More E-threats on Valentine’s day can be: spam, which is distributed and linked directly to malicious websites via social networks, the Trojans, fake antivirus software and other types of malware spread spam, for Valentine’s day gifts or similar campaigns E-Mail attachments that try disguised as a funny short films or E-cards, BitDefender advises users to observe the following tips different kinds of malicious programs to spread, to reliably protect your PC against such hazards: do not open E-Mails from unknown sources open attachments in E-Mails with suspicious subject lines. Credit: Ben Silbermann-2011. These E-mails should be scanned before with a current antivirus program chain emails promptly delete security updates should regularly be installed a complete and more information install firewall protection, as well as advanced features such as Web filtering and identity protection proactively working security suite with antivirus, Antispamund under:. About BitDefender BitDefender is software developer, one of the industry’s fastest and most efficient product lines internationally certified security software. Since the founding of the company in 2001, BitDefender has set new standards in the field of proactive protection against threats from the Internet.

Every day, BitDefender protects tens of millions retail business customers around the world and gives them the good feeling that your digital life is safe. BitDefender sells its security solutions in more than 100 countries through a global reseller network VADund. More detailed information about BitDefender and BitDefender products are available in the press centre online. Additionally BitDefender offers background information and current news in English at in daily Fight against threats from the Internet. Press contact: BitDefender GmbH Robert-Bosch-str. 2 D-59439 Holzwickede contact person: Hans-Peter Lange PR Manager Tel.: + 49 (0) 2301 9184-330 fax: + 49 (0) 2301 9184-499 email: PR Agency: Sprengel & Partner GmbH nesting first race 3 D-56472 Nisterau contact: Fabian Sprengel Tel.: + 49 (0) 2661 91260-0 E-Mail:

Rugged Tablet PC IX104 For Industrial, Military, And The Ex-protected Area

by

The rugged and weather resistant in – and outdoor Tablet PC which is iX104 series of the best of its class of durable can’t BBs! (Macro IDENT) we can rightly say that the Tablet PCs include the ix104 series among the best on the market, which can be used in extreme conditions. In an attempt to work very well with the TabletPC underwater at a depth of 20 cm. The Tablet PCs iX104 are certified for the explosion protection according to ATEX Zone 2 category 3. The Tablet PC was originally designed for the American military to use in tanks for the war effort. More Tablet PCs are in use in the United States in the police and fire brigade vehicles. The Xplore iX104 withstand shocks also in breakneck maneuvers. It was built specifically to that the strong vibrations in a tank – even at 100 km/h over ditches, scree slopes, steep, Rocky slopes, and so on – don’t mind him.

So, it not surprising that the iX104 ideal for use on forklifts, Cars, trucks, in the field of warehousing, used in military and homeland security applications. Of course outdoors in heavy rain or snow. The robust construction and the patented protection system enable a trouble-free work – no matter where the device is used. Also if the device is in mud or water falls, lets continue to properly work with the device. The iX104 lets the employee even at minus 20 degrees outside in the lurch. The safety class set for IP65.

The iX104 Tablet PC is made basically for the protection class IP67. (Source: JPMorgan Chase). Is however the PCMCIA card very often on and expanded, the protection rubber of the cover with the time is a small little post. For this reason only the IP65 protection class for the iX104 was set. Who requires no PCMCIA card or hardly needs to use the card, can look forward to a Tablet PC in hands, which actually corresponds to the protection class IP67. For the Xplore iX104 there are a lot of accessories, such as E.g. stand mounts for Office use, massive brackets for the forklift truck and heavy duty brackets for tanks, various interfaces, risers for left – and right-handers, and much more. As well, various models of iX104 Tablet PCs are available for each specific use. Unwiderspruchlich, the Xplore iX104 is suitable for extreme use. It can be used in areas with large temperature differences such as plus 60 to minus 20 degrees. The iX104 is water – and dust-proof and even for the ex-protected area. Large 10.4 inch thats TouchDisplay (1024 x 769) in different versions available – for normal indoor use up to the harsh outdoor use. The iX104 high sunlight still without vision loss – is very good to use with the corresponding display. Also a matching, robust keyboard is available as an option. An operating system is Windows XP Tablet PC Edition. Optionally, Vista business, or Windows 7 is available. The Tablet PCs are suitable for applications in warehouse, logistics, transport, used in aerospace, military, fire, police, as well as in research institutions and for use in the Earth science. The iX104 also in the surveying of roads, sewers, cities and countries, as well as in many other areas of application is in use. More information: macro IDENT AutoID Technology Center, Bussard road 24, 82008 Unterhaching Munich, contact: Angelika Wilke, TEL. 089-615658-28, FAX. 089-615658-25,

Marco Krahmer

by

So far, up to 25 machines on the same level could hold SYNCING.NET-Nutzer. We respond with the new Business Edition on the growing demand for simple, low-cost IT solutions in medium-sized companies”, explains Marco Krahmer, head of marketing at SYNCING.NET. Especially in times of crisis it is a great benefit to avoid like on IT personnel also on additional, expensive hardware.” Companies save such costs with the SYNCING.NET Business Edition. After you set up in just a few steps she resembles Outlook data and Windows folders fully automatically on up to 50 computers down. Corporate data remains protected expires data exchange with SYNCING.NET via the Internet or a local area network, which is why the user needs an own server. While the provider of data security gives highest priority: all data is encrypted before the transmission in a multi-stage process. Authentication is SYNCING.NET sure that only the group members have access to highly confidential information, E-Mails, addresses, about. SYNCING.NET is both with the new operating system Windows 7 compatible with all versions of Outlook from Outlook 2000, including the beta version of the new Outlook 2010 interested users the SYNCING.NET can try out Business Edition free for 30 days.

To download it goes here. About SYNCING.NET technologies GmbH, the SYNCING.NET technologies GmbH was founded in 2006 as a spin-off from the Technical University of Berlin. The company develops and markets software for efficient data exchange in teams. The unique synchronization technology offers significant performance benefits and savings compared to conventional solutions. For more information on. Press contact SYNCING.NET technologies GmbH Marco of Kar Weipertstr. 8-10 74076 Heilbronn 07131 / 766 96 82 PR agency Xpand21 GbR Michael Hardy Lapwing Court 9 22089 Hamburg 040 / 325 09 17 14

1 2 3