Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


China Telecom Partners With Guardtime as a Keyless Signature Distributor

BEIJING and PALO ALTO, CA -- (Marketwire) -- 11/08/12 -- Guardtime (www.guardtime.com), the leading provider of keyless signature technology for validating the integrity and authenticity of digital data, today announced a partnership with China Telecom, the largest fixed line telecommunications service provider in the People's Republic of China, establishing China Telecom as a keyless signature service provider via its Tianyi 3G platform.

Tianyi 3G platform Executive Zhe Mong Li said, "Guardtime's keyless signature technology is completely unique and has the potential to revolutionize communications by providing an independent audit trail for all voice and electronic messaging on Chinese networks, removing any doubt about message integrity and authenticity. We are looking forward to integrating the technology into our platform and providing the service to our mobile subscribers."

Mike Gault, CEO of Guardtime, added: "China is a key market for Guardtime and we're thrilled to be working together with China Telecom. Together with our existing partners, companies such as, Voxeo Labs, Message Bus and Joyent, we hope to transform society to one where electronic data is more reliable than physical and where all data, whether generated by voice, email or machine, comes with irrefutable proof of integrity and authenticity. Establishing China Telecom as a partner is a major step forward for our vision."

Wang li Yun Chairman of the Zhejiang Cixi Government nomination committee which recently awarded Guardtime the 2M RMB Shanglin prize commented: "We are very pleased to see the traction Guardtime is getting in this (Chinese) marketplace. Whether it is app stores, smart metering, email, voice, telematics or cloud platform integration, Guardtime has a key role to play in Chinese society in the coming years and decades."

About China Telecom
China Telecom Corporation Limited (SEHK: 728) (NYSE: CHA) is a Chinese state-owned telecommunication company. It is the largest fixed-line service and third largest mobile telecommunication provider in the People's Republic of China.

About Guardtime
Guardtime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. Guardtime's Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. Guardtime's mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Guardtime Media Contact:
Victor Cruz
MediaPR.net

Email: Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Web 2.0 Latest News
Are you still pondering whether to integrate cloud computing services into the structure of your IT network? You are not the only one. Most IT professionals are very concerned about data security, so they aren’t that willing to switch to cloud computing solutions that easily. It’s a fa...
Having automated workflows sounds like a sexy thing. And it is. It feels pretty awesome to be able to initiate a process with a button and forget about it while the work gets done. But that doesn’t mean you have to automate every process in your office. I mean, I think people can take...
I'm often guilty of sticking my head in the sand, ignoring very small details that could turn into big problems later on. Like when Netflix told me my credit card was about to expire, but it seemed like such a boring task, so I ignored them...till the day Netflix stopped working. I gru...
It seems like every day we see reminders of the importance of thorough security testing from all areas of the software world. Security has become an especially critical consideration for APIs in recent years. Organizations rely on APIs to share and receive information - either from a t...
Clouds are typically classified into four different topologies: private, public, community and hybrid clouds. Let’s focus on hybrid clouds: what are the use cases that require this topology, what are the challenges, and who stands to benefit from the hybrid cloud trend? First off, a d...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE