ActiveDataTools is a huge collection of tools for working with data. ActiveDataTools helps you manage, convert and cleanse your data more effectively. Using ActiveDataTools, you can read and write dozens of popular data formats, correct and format data, query and filter information and quickly validate datasets.
ActiveDataTools contains hundreds of ways to manage your data, like correcting padding and letter case, making date formats consistent, correcting number fields and more. ActiveDataTools helps you enrich and enhance your information, remove wrong/invalid data and improve data quality.
eaDocX is the high-quality Microsoft Word document generator for the popular UML modelling tool, Enterprise Architect (Sparx Systems).
It offers:
.. for Analysts
Thousands of analysts all over the world already benefit from using EA to capture their work. EA allows analysts to use the full range of UML and other techniques to capture all aspects of a business.
... for Architects
Capturing an Enterprise Architecture is a major undertaking, and one which requires the very best tools if it's to be worthwhile. You need tools which can both capture the organisation's knowledge effectively, but which can also get that knowledge out to the designers who need it.
The ASTA Safari Kit includes:
All Arkeia Hot plug-ins are compatible with Arkeia Network Backup and Arkeia Smart Backup.
EdgeFort removes the complexity of purchasing, configuring and managing a backup server, a tape drive and all of the related management software. With the federated data protection architecture, there is no need for an expensive expansion of network infrastructure or costly local IT resources to ensure local data is backed up and encrypted.
dotDefender is a software based web application firewall. dotDefender complements the network firewall and other network-based internet security products by intercepting seemingly legitimate users attempting to use the web application to commit fraud, or gain access to valuable and confidential information.
dotDefender uses a number of engines to detect and prevent hacking attacks, including Pattern Recognition, a Signature Knowledgebase, Data Leakage Protection (DLP), and Upload Inspection.