Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


Electronic Control Security, Inc. Awarded Series of Purchase Orders Totaling $1.6 Million to Supply Security Equipment for the Kingdom of Saudi Arabia's Frontier Forces

CLIFTON, NJ -- (Marketwire) -- 02/08/13 -- Electronic Control Security, Inc. (OTCBB: EKCS) (ECSI), a global leader in state-of-the-art integrated entry control and perimeter security systems, today announced receipt of a series of purchase orders valued at $1.6 million to supply security equipment for the Kingdom of Saudi Arabia's Frontier Forces. ECSI anticipates fulfilling these purchase orders during fiscal year 2013.

Arthur Barchenko, President & CEO of ECSI, stated, "These purchase orders reflect ECSI's commitment to establishing new revenue opportunities in overseas markets. This news is a testament to ECSI's reach as a company and I believe demonstrates a degree of confidence on the part of our foreign customers in ECSI's ability to consistently deliver quality product no matter the geographical distance. For this particular customer, we are excited about the prospects of a long-standing relationship."

Further, Mr. Barchenko added that, "Proposals have been submitted in response to additional opportunities in the Kingdom addressing security upgrade requirements for the Ministry of Defense, Ministry of Interior as well as oil & gas facilities. Contract awards are anticipated for fiscal 2013 through 2015."

About ECSI

ECSI is a global leader in entry control and perimeter security and a quality provider to the Department of Defense, Department of Energy, nuclear power stations, and other large commercial-industrial complexes. The Company designs, manufactures and markets physical electronic security systems for high-profile, high-threat environments utilizing risk assessment and analysis to determine and address the security needs of its customers. Teaming agreements with major system integrators enable ECSI to support the installation and aftermarket of its products in the U.S. and overseas. ECSI is located at 790 Bloomfield Avenue, Bldg. C-1, Clifton, NJ 07012. Tel: 973-574-8555; Fax: 973-574-8562. For more information on ECSI and its customers, please visit http://www.ecsiinternational.com.

ECSI INTERNATIONAL, INC. SAFE HARBOR STATEMENT: This press release contains forward-looking statements that involve substantial uncertainties and risks. These forward-looking statements are based upon our current expectations, estimates and projections about our business and our industry and reflect our beliefs and assumptions based upon information available to us at the date of this release. We caution readers that forward-looking statements are predictions based on our current expectations about future events. These forward-looking statements are not guarantees of future performance and are subject to risks, uncertainties and assumptions that are difficult to predict. Our actual results, performance or achievements could differ materially from those expressed or implied by the forward-looking statements as a result of a number of factors, including but not limited to changes in economic conditions generally and in our industry specifically, timely delivery by us of the purchase orders and timely receipt by us of payment in respect of such orders, acceptance of our proposals, changes in security technology, receipt and timing of collections from purchase orders, legislative or regulatory changes that affect us, the availability of working capital, changes in costs and the availability of goods and services, the introduction of competing products, changes in our operating strategy or development plans, sufficiency of cash reserves and the risks and uncertainties discussed under the heading "RISK FACTORS" in Item 1A of our Annual Report on Form 10-K for the fiscal year ended June 30, 2012 and in our other filings with the Securities and Exchange Commission. We undertake no obligation to revise or update any forward-looking statement for any reason.

FOR CONTACT:
Daryl Holcomb
(973) 574-8555

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Web 2.0 Latest News
The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking our networks. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a de...
Many workloads are already in the cloud: Most organizations today run at least some workloads in the cloud. For newer organizations, they will often run ALL of their workloads in the cloud. For cloud-based workloads, sending log data to a cloud-based logging provider is not quite as bi...
While there could be more similar use cases, the point here is IoT while bringing new innovation and benefits also brings new risks. These risks much different from earlier innovations, because when in earlier cases it is mostly the enterprise financial, reporting and other data pr...
Successful hacks can paralyze websites, enable corporate or personal data to fall into the wrong hands and potentially damage the image, reputation and sales pipeline of the organization under attack. For many, this begs the question ‘Why us?’ To find out, let’s delve into the psyche o...
Large technology manufacturers that focus on channel sales through distributors and resellers have traditionally operated with informal processes, using tools like spreadsheets and information driven by anecdotal stories from channel partners, unstructured data, and the "gut instinct" ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE