Category Archives: Software Support

Evolve 2017 Oslo showcased how beneficial the digital transformation can be for Norwegian software vendors

OSLO, Nov-8-2017 — /EuropaWire/ — The 99X Technology team aired its first international breakfast seminar, on winning with the digital evolution this 25th at Kulturhuset in Oslo. As a first of a series of seminars to be kicked off in the coming years, Evolve 2017: Oslo was all about bringing the digitalization wave to Norway’s tech and innovation community, with knowledge and experience sharing sessions from industry thought leaders in the region.

Directed specifically at enthusiasts looking to transform their business models to digital, and enhance revenue by adding core value to products or services, the seminar was held in partnership with Netlife Design, Norway and was an insightful two hours for the audience. The speaker panel featured Dag Honningsvåg (Chairman of 99X Technology, Driw AS and Bylineme, and Former CEO of Making Waves), Jostein Magnussen (Co-founder of Netlife Design), Hasith Yaggahavita (CTO at 99X Technology and founder of IgniterSpace) and Per-Christian Svendsen (CEO of Boligmappa AS).

“The opportunities are endless with digital transformation. We know this first-hand and we have proven experiences where software products have achieved sustained growth over the years, working with many different ISVs across the world. The objective today was to bring to light how beneficial this would be for Norwegian software vendors, as well as general enthusiasts for their growth strategy,” said Dag Honningsvag, expressing his views at the seminar.

“Evolve Oslo also became a platform for like-minded digitalization enthusiasts to come together and share their views, and this was exactly what we were hoping for. As digital evangelists, we are looking forward to enabling this transformation for the entire European region very soon,” he further added.

Commencing with Dag’s comprehensive introduction to digitalization, the seminar was taken over by Jostein who shared very informative insights on handling clients in the digital era of information clutter, followed by Hasith who elaborated on the next big thing after the SaaS hype. Per-Christian then concluded with an interesting view of how the digital transformation journey works, taking his own success with Boligmappa AS as an example. Overall, the tips and learnings were a great directive for the audience.

This seminar marked the end of a fruitful engagement in Norway by the 99X Technology team, which also included a company showcase at Webdagene 2017, Scandinavia’s largest customer experience conference, last week.

SOURCE: EuropaWire

99X Technology played an active role in digitizing leading European ISVs (Independent Software Vendors)

Oslo, Norway, Oct-26-2017 — /EuropaWire/ — Leading software product engineering specialist 99X Technology recently showcased at Webdagene 2017, Scandinavia’s largest customer experience conference, organized by Netlife Design Norway.

The show which housed over 15 Exhibitors and entertained more than 1,000 visitors is an annual convention which spans across two days, featuring a line-up of industry thought leaders and top players in the digital sphere in Europe on its speaker panel. The aim of the show is to bring participants up-to-date on latest trends in world-class digital user experiences. Webdagene was held from 18th to 20th of October this year, with the first day being a workshop-oriented session, and second and third days dedicated to the exhibition.

Having played an active role in digitizing leading European ISVs (Independent Software Vendors) with over 150 successful software products in its portfolio, it was a great platform for the team from 99X Technology to display some of Sri Lanka’s best product engineering skills to the European region and its IT community.

“While we have maintained an active presence in Norway over the past decade or so, Webdagene brought us face-to-face with some of the key players in the digital sphere in the whole European region. In addition to being a fantastic experience with so many inspiring individuals, it also proved to be a great opportunity, where we gained good insights into Europe’s evolving technology landscape. This exposure helped us align our digital offerings better for European market as a global software product co-creator,” said Hasith Yaggahavita, CTO of 99X Technology, while expressing his views on the event.

About 99X Technology

Headquartered in Sri Lanka with offices in Norway and Australia, 99X Technology has been adjudged one of Asia’s best workplaces and is a regional leader in Agile software product engineering and technology innovation. Its expertise has been proven through a 150+ portfolio of successful globally serving software products developed since the year 2000, by partnering with leading ISVs across Europe, Australasia and USA. 99X Technology has been ranked as a Great Place To Work for in Sri Lanka for five consecutive years, and is among the first IT companies in the country to enter the Great Place To Work Hall of Fame (2017).

SOURCE: EuropaWire

Email Encryption End-to-End: How to Prevent the NSA from Reading Your Confidential Email Messages

Anyone who has not spent the last two weeks meditating in a cave will have heard about PRISM, the program of the National Security Agency (NSA) to spy on anyone they wish using the internet services provided by Microsoft (beginning in September 2007), Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL and Apple. These are all mentioned in one of the slides of a 41-slide top-secret Power Point presentation (an overview apparently intended to train intelligence operatives on the capabilities of the program) which was leaked by NSA whistleblower Edward Snowden to the Guardian (UK), which newspaper revealed the astonishing details on June 6. The document claims “collection directly from the servers” of major US ISPs.

The existence of PRISM was confirmed by the U.S. Director of National Intelligence (James Clapper) in a press release on the same day, stating that the program was authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA), and claiming that it is intended only to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States.

However, according to the Guardian, “The program facilitates extensive, in-depth surveillance on live communications and stored information. The [FISA] law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US. It also opens the possibility of communications made entirely within the US being collected without warrants.” Section 702 of FISA says that senior officials of the U.S. administration can authorize the surveillance of any American provided that the request officially targets a foreigner. This allows “legal” access to all private information concerning anyone (whether or not they reside in the US) “associated with” the “foreign suspect”.

Private information, of course, includes the content of email messages, and those that the NSA sucks up are stored for years (forever?) in the huge NSA data banks. The standard claim of government defenders of invasive surveillence is: “If you have nothing to hide then you have nothing to worry about.” There are several answers to this.

Firstly, if you work with proprietary or confidential information, such as business plans, software code, financial statements, etc., then you may very well wish to hide this from others who might make use of it to your disadvantage (and if you work for a company which owns this information then your failure to hide it from your company’s competitors may lead to your dismissal).

Secondly, as Edward Snowden said in an interview with the Guardian: “… you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody even by a wrong [phone] call. And then they can use this [PRISM] system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with. And attack you on that basis to sort of derive suspicion from an innocent life and paint anyone in the context of a wrongdoer.”

So can you do anything about this? It’s just possible that massive public outrage at the development of a total surveillance state might cause PRISM to be shut down. But don’t hold your breath. You can, however, do something to prevent the NSA from reading your confidential email messages. You could use public key cryptography in some form. This requires the creation of a ‘private’ key and a ‘public’ key, and anyone who wishes to send you an encrypted message has to know your public key (and you then decrypt the message using your private key). This is fine, but it’s a bit complicated and requires considerable attention to detail, so is really only suitable for the tech-savvy. There is an easier way to keep your messages and data from the NSA’s prying eyes (just in case you are a person of interest to them).

Hermetic Systems publishes Windows software called “Email Encryption End-to-End” which, in brief, allows you to create an encrypted file containing both a text message and a separate file of any type (such as a ZIP file). You can then attach this encrypted file to an ordinary email message, send it, and the recipient can recover your text message and the file using the same software. Your message and file remain encrypted from start to finish, frustrating any attempt by the NSA to read them.

This software is easy to use and no technical knowledge (beyond the ordinary ability to run a Windows program and to send and receive email) is needed, and you can still use the same email client as you do now (provided that it allows attachments to messages).

Suppose your company wishes to send you somewhere to negotiate a business deal with some other company. They will want to know the details of the deal you make with that company as soon as you have concluded the negotiation, so you are to write it up on your laptop as a Word document (and maybe a few Excel spreadsheets) and send it by email. But your company’s competitors would dearly like to know the details of the deal you make, so you are instructed to send the document (and spreadsheets) in encrypted form. Before leaving, you are given a phrase to use as the encryption key. After several days negotiation you reach a deal, and prepare your report.

Now suppose also that a year ago someone who works at a shady payment processing service phoned you by mistake; this service was subsequently shut down for alleged money-laundering, but in the meantime that phone call got you placed on a list of “known associates of suspected money-launderer”, and subject to surveillance under the PRISM program. Of course, you were not informed. But since you and your company know that transmission of unencrypted data across the internet allows “sniffers” to pick out selected messages, and that certain competitors would dearly like to know the details of the deal you just negotiated (and, unknown to you, certain people who work for NSA might also profit from knowing those details) you are about to send your report by means of encrypted email. Here’s how to do it:

You take all the confidential material (Word documents, Excel files, graphics images, etc.), and put them into a ZIP file. Without being online, you run the “Email Encryption End-to-End” (EEE) software and this allows you to (a) compose a text message which summarizes the outcome of the negotiation and mentions what’s in the ZIP file, (b) tell EEE the location of the ZIP file, (c) enter the phrase which your company gave you to use as the encryption key, and (d) tell EEE the location and name of a file in which it will write its output — the ‘ciphertext file. The ciphertext file can have any name, but let’s say ‘chess.pcx’. You then hit the ‘Encrypt’ button and EEE encrypts your text message together with the ZIP file and writes the encrypted data to the ciphertext file. Now you go online and bring up your usual webmail client. You compose some pedestrian message, such as, “Chess tournament went well; got 2nd prize; here’s a picture of the prize winners.” You then attach the ciphertext file to the message and send it off to your company.

The person at your company meant to receive it then saves the attached file someplace, then runs EEE and (a) enters the agreed-upon phrase for the encryption key and (b) tells EEE where to find the ciphertext file. They then hit the ‘Decrypt’ button and EEE (a) displays your text message mentioning what’s in the ZIP file and (b) asks for the location of a folder in which to write it. After it does this, the recipient can then unzip the ZIP file to recover the documents that you sent.

NSA may have sucked up and stored your ‘outer’ email message in its data bank, but this will appear to be just some message about a chess tournament with an attached ‘pcx’ file referred to in the message as a picture. No graphics software will be able to display it (because it is not a graphics file), and no ZIP program will be able to unzip it (because it is not a ZIP file), and in fact it can’t be read at all, except by someone using the EEE software and knowing the phrase used to encrypt the data. Your confidential data has been transmitted securely in encrypted form from ‘end to end’.

Finally, if there is some chance that your laptop might fall into the wrong hands before your return, you can (after your company has confirmed receipt of your report) delete (or better, securely delete) the ciphertext file which was created by EEE (and perhaps even uninstall the EEE software itself), since the details of your negotiation are now safely in the hands of your company.

Further information about the “Email Encryption End-to-End” software (which is bilingual, English/German) including prices for a single-user license and for a multiple-user license, plus a link to download a trial version, is on the Hermetic Systems website at:http://www.hermetic.ch/eee/eee.htm

Via EPR Network
More Software press releases

Hermetic Systems releases a program for secure end-to-end email encryption

Despite substantiated reports that at least one major US telephone service provider gave the National Security Agency full access to its customers’ phone calls, and shunted its customers’ internet traffic to data-mining equipment installed in a secret room in its San Francisco switching center, most Americans still transmit their email in plaintext, allowing it to be scanned by data-sniffers. (The NSA was ordered by a court to stop, but who knows if they complied?) This may be because most Americans don’t give much thought to the possibility that their email could be the subject of eavesdropping, or it could be because for some reason it doesn’t worry them, or it could be because encrypting email has in the past been a somewhat tricky practice to get right (so was deemed not worth the effort).

There are several reasons why email encryption can be difficult, or insecure: Some systems are quite secure but require an elaborate procedure before email can be sent to (and read by) another person. Messages scanned in transit can in the case of some systems reveal that encrypted information is present, thus alerting an eavesdropper to something to look for. Some systems encrypt a message only after it is uploaded to a server, with the message (in plaintext) being vulnerable to interception between the user’s PC and the server.

Hermetic Systems has release software for email encryption which involves none of these difficulties. But why would you want to use it? For correspondence with your family you probably don’t need to. But, for example, suppose you are collaborating with others in a project which requires an exchange of confidential information, which competitors might like to get their hands on. You might be wanting to transmit Excel files containing sensitive financial data, or images with blueprints for a new design.

The new software, entitled ‘Email Encryption End-to-End’, uses an encryption method in which the key used for encryption is the same as the key used for decryption, so your correspondent(s) must know the key you used to encrypt a message. This can be transmitted more-or-less securely, especially if you can meet your correspondent(s) in person. Assuming this can be accomplished, the actual sending and receiving of encrypted messages is quite simple. You run the program (on your PC), compose a message of up to 60 KB in size (or upload it to the program from a file) and specify an encryption key, then hit the ‘Encrypt’ button. This creates a ciphertext file (which you can name as anything you want), and to send it to a correspondent you simply attach it to an ordinary email message. The ciphertext can masquerade as an image file or as a file using some obscure file format, so there’s no indication that encryption is being used.

You correspondent receives the ordinary email, saves the attached (ciphertext) file, runs the software, tells it where to find the file, specifies the encryption (now decryption) key, and hits the ‘Decrypt’ button, whereupon the message appears.

Moreover, ‘Email Encryption End-to-End’ allows you to send, in addition to a text message, a file of any type and up to 1 MB in size. The text message and the file are then combined and encrypted together to produce the ciphertext file. This allows you to send an MS Word file, an Excel file, an image file, etc., in addition to the text message.

The program has an introductory price of US$29.75. A multi-user license is also available (at a discount) for up to 10 users. Such a license is useful for a group of colleagues working together on a single project. A multi-user license requires only a single email address, that of the purchaser of the license, and the email addresses of the purchaser’s email correspondent(s) are not needed.

A trial version can be freely downloaded from the user manual page athttp://www.hermetic.ch/eee/eee.htm. This is a 14-day trial with which only one key (‘abcd efgh ijkl mnop’) can be used for encryption, so it allows testing but (since the key is public knowledge) cannot be used for secure email encryption.

Via EPR Network
More Software press releases

Growth Drives AgreeYa to Move Its Global Headquarters

AgreeYa Solutions today moved its Global Headquarters to their new office building in Folsom, CA. In response to the strong growth that AgreeYa has witnessed in past few years, the Folsom, CA based technology solutions, and staffing services company has outgrown its current premises.

The new location is based on the 605 Coolidge Drive, Folsom, CA. AgreeYa will continue to provide technology solutions and staffing services for existing and new customers. The new building houses advanced technology, multiple forms of audio and video communications, provides infrastructure and services that promotes teamwork and synergy across all and offers excellent transportation links. The new office with over 23,000 sq feet is more than double in size from previous office based on the Woodmere Road, Folsom, CA.

Commenting on the move, Ajay Kaul, Managing Partner of AgreeYa said, “This is an exciting time for AgreeYa. Our existing HQ facility had little room for expansion. We are delighted to have acquired the new facility as this move will support our plans for scaling up our operations and for upcoming growth into 2013 and beyond.”

Ajay added “Our business has shown strong growth in the past few years underpinned by our passion to achieve success together with our customers. With recent success of our Microsoft SharePoint Enterprise Social Collaboration solution – SocialXtend, our move to larger premise reflects a confidence in our ability to continue to grow and provide high quality software, solutions, and staffing services to our customers.”

Via EPR Network
More Software press releases

SportsMark selects WinMagic Encryption technology to protect critical data at London 2012 Olympic Games

WinMagic Inc., the global innovator in disk encryption, today announced SportsMark has chosen WinMagic’s SecureDoc data security and encryption software to protect sensitive corporate hospitality program data for the London 2012 Olympic Games.

Of the many events SportsMark will be involved in this year, including Super Bowl, The Masters, and the America’s Cup World Series, the London 2012 Olympic Games will be a pinnacle event. SportsMark has been preparing for this momentous event for over four years, working side by side with its clients to create unparalleled guest experiences and optimize their brand building and sales objectives. SportsMark’s clients will host more than 45,000 guests throughout the Olympic and Paralympic Games, working with a staff of over 1,000 and managing tens of thousands of Olympic event tickets on behalf of their 15 clients.

“We’ve been working with SportsMark for quite some time and we’re very pleased that they selected SecureDoc as their data encryption solution to protect the personal information of all the guests they’ll be hosting during the London 2012 Olympic Games,” said Mark Hickman, worldwide vice-president of sales at WinMagic Inc. “As an existing customer, SportsMark recognized the ease of use and flexibility of SecureDoc and we were more than happy to help ensure this continued for a project of this importance and profile.”

SportsMark’s information services team determined that they required a rapid OS and encryption deployment ready for a highly mobile and diverse workforce to securing log in onto any of their laptops at any of the locations.

“WinMagic SecureDoc was clearly the answer to our requirements,” said Scott Shuemake, systems engineer at SportsMark. “We needed an encryption solution that we could quickly and easily implement, manage centrally and provide all temporary staff with access to all the devices, so we had the flexibility to move staff around the hospitality venues across London, sometimes at short notice.”

SportsMark Group has contracted 1000 temporary hospitality event staff to work for the duration of Olympic and Paralympic Games in more than 15 pop-up offices around central London. These staff will be supplied with rented laptops that require the hard drive to be fully encrypted.

The technical solution consisted of 300 temporary licenses of WinMagic SecureDoc and SecureDoc Enterprise Server to install the SecureDoc packages and provide recovery. SportsMark also utilized WinMagic consultancy services to ensure the smoothest and quickest deployment in the fastest possible timeframe. At the end of the project, SportsMark will take advantage of SecureDoc’s Crypto erase feature to decommission the devices used for the event.

Via EPR Network
More Software press releases

IT Outsourcing in Ukraine Becoming a Thriving Industry

With IT skilled workforce trained to provide software and application development services, among others, it is small wonder that Ukraine’s IT outsourcing (ITO) industry is booming.

Industry experts in 2010 have recorded a 20% growth in Ukraine’s outsourcing industry. The number of skilled laborers working for ITO companies surged to at least 2 400 more than that in 2009. If that is not enough to say Ukraine’s outsourcing industry is something to watch out for, then perhaps the commendations from different industry experts can speak for themselves. Ukraine was among the Global Services (GS) and Tholons’ Top50 Emerging Global Outsourcing Destinations in 2009. In 2011, Ukraine was named ITO Destination of the Year Award in the European Outsourcing Excellence Awards. It was also among the top 20 locations for outsourcing in the Global Services100 List, which is annually compiled by GS in partnership with NeoAdvisory.

Industry experts have seen several reasons why companies are choosing to outsource to Ukraine; some reputed companies have even started to establish their brand in the country. One of the most common reasons for outsourcing is the cost. Companies get to save when outsourcing some of its needed services compared to keeping an in-house department for those services. Services like software development are best outsourced to Ukraine not only because the country has a skilled workforce but also because doing so can be more cost-efficient. There are lots of resources in other locations like Moscow or St. Petersburg, but the costs there are expensive. This is an advantage to Ukraine, which is offering lower service costs than most countries in Western Europe.

Ukraine also has a high literacy rate to boast of and a high population of personnel with technical skills. The personnel usually have a background in physics or mathematics making it easy for them, to hurdle technical problems. The country’s higher education system encourages students taking computer-related courses to learn foreign languages, like English. Software developers particularly those joining the outsourcing industry had to obtain the required language skill. This makes them competent not only in providing the service required but also in communicating with the customers.

One of the ITO companies in Ukraine that specializes in software and application development is Svitla Systems, which has worked with a number of clients from start-ups to corporate companies and even educational institutions. Svitla Systems boasts of a roster of employees with adequate expertise when it comes to IT services. The company employs developers with a degree in Computer Science and many of them have Master’s Degree while some even have PhD’s. They are also good in spoken and written English so language barrier is not a problem.

Companies like Svitla Systems are the ones behind the rise of Ukraine as an outsourcing destination.

Via EPR Network
More Software press releases

OTS Solutions, a global software services provider, initiated the process of International Organization for Standardization’s (ISO) 9001:2008 certification

OTS Solutions (“OTS”), a Microsoft certified IT services provider and one of the leading outsourced software product development companies in India, today announced that they have initiated the certification (ISO 9001:2008) process with Association française de Normalisation (AFNOR). AFNOR is the French national organization for international standardization activities, information provisions, certifications and trainings.

The ISO 9001:2008 standard is a set of quality practices that ensures the use of effective processes that are consistently monitored and continually improved. It specifies Quality Management System (QMS) requirements focused on an organization’s ability to meet and improve upon customer satisfaction and quality requirements. As part of the certification process, OTS established its own QMS (based on Alfresco) to ensure the processes will improve service quality on a regular, quantifiable, and demonstrable basis.

“OTS’s technical team has successfully implemented an effective quality management system based on the requirements of the ISO 9001:2008 standard,” said Hemant Madaan, Managing Director of OTS Solutions. “They demonstrated unwavering focus in creating and implementing a QMS system which provides for continuous improvements in document’s support quality, increased streamlined structure, and a dedicated, systematic approach to overall quality management.”

The certification process began in November 2010. From December 2010 to June 2011, the company executed internal audits across its global development center (based in Gurgaon, India) for various functions such as solution development, document management, end-user support as well as network operations and management. The auditing agency now started conducting certification audits from July 2011; first external audit held on 06th July, 2011.

About OTS Solutions
OTS Solutions is a Microsoft Certified software services provider offering bespoke software development, testing & support services and staff augmentation services across the globe. We are also an Apple and Android Partner for development.

Since our inception, we have steadily grown into a reputed provider of high quality and cost effective software development services. Our ability to evolve continuously and flexible approach towards the dynamic business world has helped us to gain success in short span of time.

OTS has a distinct practice area, “Product Development Practice”, which comprises a large pool of expert and experienced resources with product mindset, team structures and engagement models, which work as an extension of our client’s team. For more information, please visit www.otssolutions.com.

Via EPR Network
More Software press releases

First 100 Companies Registered On ITOlist.eu – Catalogue Of IT Outsourcing Service Providers From Central and Eastern Europe

IBA Group, one of the largest IT service providers in Central and Eastern Europe, has become the hundredth company registered in the catalogue ITOlist.eu. Among the hundred registered companies which provide outsourcing services, there are 33 companies f r o m Ukraine, 25 companies f r o m Romania, and 10 companies f r o m Belarus. The Central and Eastern European (CEE) region is one of the most fast-developing providers of nearshore IT outsourcing services for the EU countries and offshore IT outsourcing services for the American and Asian countries.

A major objective of the catalogue ITOlist.eu is to create a full base of IT outsourcing service providers f r o m Central and Eastern Europe that will allow consumers to facilitate the search of the right partner. The catalogue ITOlist.eu includes company profiles with information about companies, their services, technologies, clients and projects. The providers are able to add video presentations and publish advanced company profiles. The clients are able to use the multilevel search, view provider profiles, send requests for collaboration or IT projects implementation.

Sergei Levteev, President of IBA Group, comments: “This year, we are participating for the first time in the research organized by the Central and Eastern European Outsourcing Association. We believe that the inclusion of our company in the two information resources of the association, namely the report and the catalogue ITOlist.eu, will grant us access to the additional groups of outsourcing service consumers across the globe. We also support the idea that we need to promote Central and Eastern Europe as a promising destination for the world IT outsourcing industry.”

Some information gathered in the online survey research.ceeoa.org will be used as source information for the report “CEE IT Outsourcing Review 2009” – annual review of IT outsourcing service providers and markets in 16 countries of Central and Eastern Europe.

CEEOA invites all outsourcing service providers f r o m the CEE region to participate in online survey for the research “CEE IT Outsourcing Review 2009” – research.ceeoa.org. Each company-respondent that completes the survey will get a free profile in online catalogue ITOlist.eu and the brief company profile in the report.

Via EPR Network
More Software press releases

CEEOA Starts The Annual Research ‘CEE IT Outsourcing Review’ And Launches ITOlist.eu – The Catalogue Of ITO Companies

Central and Eastern European Outsourcing Association (CEEOA) is pleased to announce that they started the research “Central and Eastern Europe IT Outsourcing Review 2009” – annual review of IT outsourcing services providers markets in 16 countries of Central and Eastern Europe.

CEEOA Starts The Annual Research 'CEE IT Outsourcing Review' And Launches ITOlist.eu - The Catalogue Of ITO Companies

The CEE region is one of the leading providers of IT outsourcing services on the global market and is rapidly developing due to its geographic proximity to the European consumers of outsourcing services and cultural compatibility to the North American consumers. The main objectives of the “CEE IT Outsourcing Review” is to determine the volume of IT outsourcing services providers markets, to research the trends of IT outsourcing industry development and the advantages of each country regarding the IT outsourcing development in this country, and some fundamental information for the potential consumers of outsourcing services about the first steps while looking for the providers.

For the first time the research “Central and Eastern Europe IT Outsourcing Review” was conducted in early 2008 for the year 2007. The 2007 research report “Central and Eastern Europe IT Outsourcing Review 2007” indicated that there was a great interest to the CEE as a prospective region for IT outsourcing services. The report was accessed by an estimated 10,000 people and many research companies used it as a resource for their commercial reports. Thus, in 2008 KPMG referenced the report in their own research ‘Exploring Global Frontiers’. Following positive feedback for the 2007 Report, the CEEOA decided to commission an annual research on CEE IT Outsourcing Review, resulting in the 2008 Report conducted in early 2009. Currently the report is the most full and demanded analytical source about the IT outsourcing development in the CEE region.

The report 2009 will consist of the following key sections: introduction, expert views/estimations on the market development, analytical review of the main indicators of IT outsourcing providers market, country profiles, profiles of experts and partners, profiles of the companies-respondents.

The representative of Bulgarian Web Association noted, “This year we launch the online survey for our research and thus we expect to attract more respondents. The questionnaire is more detailed and this will allow us to make our market estimations more precise. We hope that the launch of the catalogue of IT outsourcing services providers f r o m  the CEE region – ITOlist.eu that will be based on the online survey will be significant event on the global outsourcing market . The catalogue will unite all ITO providers f r o m  Central and Eastern Europe and will become the efficient communication channel between the potential customers and providers. We consider that ITOlist.eu will facilitate the selection process of providers for the interested customers.”

The report “CEE IT Outsourcing Review” is one of the free distribution reports, and that allows reaching the maximal distribution of the information among the potential outsourcing services consumers.

CEEOA kindly invite all the companies providing IT outsourcing services f r o m the CEE region to participate in the online survey – http://research.ceeoa.org The participation in the research will allow your company to get the recognition as one of the active players in the IT outsourcing services provision market in the CEE region. Participating in the research your company get the free brief profile in the report “Central and Eastern Europe IT Outsourcing Review 2009” and the free profile on ITOlist.eu (http://www.itolist.eu) – the catalogue of IT outsourcing companies f r o m Central and Eastern Europe.

About CEEOA
Central and Eastern European Outsourcing Association (CEEOA) (www.ceeoa.org) was founded in 2008. The members of the association are the leading national IT and Outsourcing associations f r o m the Central and Eastern Europe, among them Baltic Outsourcing Association (BOA), Ukrainian HI-TECH Initiative, Hungarian Service Industry and Outsourcing Association (HOA), Employers’ Association of the Software and Services Industry (ANIS) f r o m Romania, Bulgarian Web Association (BWA) and ASPIRE – Association of IT & Business Process Services Companies (Poland). One of the main objectives of CEEOA is to promote the Central and Eastern European Region as competitive alternative to other Global offshoring destinations, and to increase services delivery quality and volume to the recognized standards.

Via EPR Network
More Software press releases

MailList Controller Version 8 Released

Arclab Software Technologies, a software development company creating and marketing windows applications for home and business users, announced today the release of the newest version of the professional email newsletter software “MailList Controller” version 8.

MailList Controller Version 8 Released

Arclab MailList Controller is an email mailing list management, bulk mail, email marketing and email newsletter software solution for windows designed to send out personalized email messages, manage multiple mailing lists, email newsletter services, campaigns, e-zines, announcements, support and group mails.

MailList Controller works with Microsoft® Windows® 7/Vista/XP/2000

Features of the latest version:

* Send out Newsletter and Bulk Email Messages
* Fast SMTP Email Software Engine
* Works with any Mailaccount (SMTP/POP3)
* Supports SMTP/ESMTP Authentication
* Support for SSL and StartTLS (Secure Socket Layer)
* Partial and delayed Send Mode for limited Mailaccounts
* Directory Pickup Mode for direct mailing without SMTP
* Forward Replies to a different Email Address
* Customizable Returned Mail (Bounce) Detection
* Manage and Host multiple Distribution Lists
* Supports 15 custom Fields for Personalization
* Supports Filters and Subsets (Queries) for partial Mailing
* Linked Lists (List linked to an external Data Source)
* Single and Double Opt-in Subscriptions
* Process Email Subscribe and Remove Requests
* Process Webform Subscribe and Remove Requests
* Import Members from MS Excel, MS Access, Text (csv) or ODBC
* Global Blacklist for Import and incoming Messages
* Sort out duplicate Email Addresses automatically
* Built-in WYSIWYG Rich-Text (HTML) Editor
* Support for external Mail Client (e.g. MS Outlook)
* Direct support for external HTML Editors
* Personalization (Mail Merge)
* Add inline Graphics and File Attachments to Newsletter Messages
* Import HTML files from an external HTML Editor
* Send Plain Text, HTML or Messages in MIME Format
* Custom Charsets for international Newsletter Mailings
* Subscribe Archive (Save Subscribe Email Source)
* Email Software that runs on your Computer
* Works on a Windows PC, Desktop, Laptop or Server
* Runs as Windows Service (does not require an User being logged in)
* No special Hardware or additional Software required
* No Subscription and no Recurring Fees required
* Member Database stays private and secure

The newsletter software is available in 3 different versions: MailList Controller Free, Professional and eXtreme.

Via EPR Network
More Software press releases

Atlassian Joins Agile Alliance

Atlassian, a global developer of popular agile tools for agile software development, announced today that they have become a corporate member of the Agile Alliance, an online community that supports the values and principals of the Agile Manifesto.

Participation in the Agile Alliance follows the launch of Atlassian’s agile development microsite, “Agile @ Atlassian.” The site features video interviews with several of Atlassian’s engineers and product managers as they discuss agile software development, pair programmingsoftware testingcode review and more. Agile software development refers to a group of pragmatic software development methodologies based on iterative development. In agile development requirements and solutions evolve less through planning and more through frequent interactions between collaborative self-organizing cross-functional development teams and a customer. Unlike traditional approaches aimed at delivering a large application at the end of a long project, agile software development focuses on keeping code simple, testing often, and rapidly delivering working software to the customer, enabling the gathering of customer feedback at the earliest possible opportunity throughout the entire life of the project.

Atlassian develops agile tools that help software engineers develop in collaborative improve software quality, and promote best practices. Atlassian recently released version 4.2 of GreenHopper, a plugin for JIRA that provides agile project management to simplify sprint planning and task tracking for a team. GreenHopper adds support for popular agile methodologies including Scrum and Kanban, enabling users to easily plan and manage short iterations, constrain the amount of work that can be allocated to any stage of a workflow and measure lead time for projects.

Atlassian has also recently participated in a number of agile events, including Agile 2009 in Chicago, Agile Australia 2009, and the Agile World Tour. For more information, visit Agile @ Atlassian or Atlassian’s agile blog series.

About Atlassian
Atlassian is a private, global software company that helps technical and corporate teams collaborate and build better products and solutions for their customers. Our mission is simple: delight customers with our products and our service, value innovation in development and our business operation, and solve customer problems with brilliant simplicity. Atlassian boasts more than 15,000 customers and 188 employees. For more information, visit www.atlassian.com.

Via EPR Network
More Software press releases

Celerant Provides Integrated E-Commerce Platform for shoegalleryonline.com

Staten Island, NY (April 21, 2009) – Celerant Technology, a leader in the retail software industry, recently completed the web development and retail software integration for their long time client, C&W Shoes, dba The Shoe Gallery. Celerant launched The Shoe Gallery’s E-Commerce site, www.shoegalleryonline.com in September 2008, and it has proven to be a very successful and profitable addition to their business.

“The Shoe Gallery has shown exceptional growth over the years, first with their expansion to 5 brick and mortar footwear stores and now with the launch of their newly designed and fully integrated E-Commerce site” said Celerant Technology President and CEO, Ian Goldman. “Our team of web developers works closely with The Shoe Gallery, as well as each of our other E-Commerce clients, both creatively and developmentally, to ensure that the custom website is created based on their individual needs and specific functionality. We are proud that www.shoegalleryonline.com has been able to achieve such an increase in sales and visibility in such a short amount of time.”

Celerant Technology, www.celerant.com provides a complete multichannel solution for retail organizations; from point of sale, inventory management, warehousing, E-Commerce, mail order and more. Celerant’s E-Commerce platform is completely integrated within the same real-time database as the Celerant Command Retail system in the store(s) and offers a wide array of innovative web features and functionality. The www.shoegalleryonline.com website was developed with Celerant’s intuitive web technology to be user friendly and visually appealing.

“We are extremely pleased with the design and functionality of our E-Commerce site” stated Will Brooks, Shoe Gallery Controller. “Since going live with the site six months ago, we have experienced increased sales and have seen an exceptional number of new orders. The existing search engine optimization already embedded into the design of the site, along with the ability to feed into price comparison sites, have aided in increasing our sales without spending excess money on marketing. It has been fabulous working with Celerant’s web design team because they work with us to figure out innovative ways to improve the site, such as adding a zoom feature to our images and a special webpage where you can sift through the popular brands we sell. We are very pleased with the trajectory of our growth and look forward to our future Web business with Celerant by our side.”

The Shoe Gallery provides customers with a huge selection of name brand shoes, accessories, and ready to wear for women and men at a lower cost than department stores. They currently have 5 locations across Georgia, Oklahoma, and Mississippi. 
Visit Shoe Gallery at www.shoegalleryonline.com.

About Celerant Technology
Celerant’s Command Retail is an advanced real-time retail management system, which manages all areas of retail including POS, Inventory Management, Warehouse, Distribution Center, Allocation, Multi-Channel/E-Commerce/Kiosk, Data Mining, and Back-office, in a single, integrated system. Our advantage is the flexibility of our Java platform, allowing Celerant professionals to conduct cost-effective analysis and adaptation based on the individual needs of each retailer. The result is a better system that meets the needs of retail businesses and gives them the tools to take Command of their success. For more information regarding Celerant Technology, go to www.celerant.com. For information on the Command Retail product, visit www.commandretail.com.

Via EPR Network
More Software press releases

When You Need Training And Support For MS Office, You Need Look No Further Than Save On Support

MS Office is truly the industry standard for desktop computer software solutions. Whether you are writing a letter in Word, or keeping a budget in Excel, Office has you covered from top-to-bottom.

“This software package really does have it all,” said senior support consultant Lesley O’Donnell of Save On Support. “The numerous options it offers are not duplicated in any other program package on the market today.”

But, no matter which specific program you plan on using, you’re always going to need someone to offer support and guidance. This is where Save On Support would like to step in. Offering remote-access assistance, they greatly cut their consulting fees, enabling you to get the help you need at prices you and your company can easily afford.

Remote support is truly the next big thing in computer consulting,” commented O’Donnell. “Not only is it extremely cost-effective, it’s also very convenient as well, and that’s a combination you can’t overlook.”

To receive more information about Microsoft Office support and training options from Save On Support, please contact us at your earliest convenience, toll-free at (866) 762-3990, or e-mail us.

Via EPR Network
More Software press releases