SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
iCONECT Overview
iCONECT:   Web  based development 1999; The #1 Web Based Info-Mgmt Software * Used by 83 of top 100 law firms worldwide Lockheed, NASA, USDOJ, CAL-AZ-NY Attorney General, Raytheon
 
Why iCONECT? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How is iCONECT unique? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Vendor Proven Hosting Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],Layers on top of existing Oracle Licensing (self/LSP/CSP) [C++ application for Windows, Linux - RAC]
HOSTING OPTIONS ,[object Object],[object Object],[object Object]
Case Study #1 - NASA ,[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study #2 - Mercedes ,[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study #3 - Enron ,[object Object],[object Object],[object Object],[object Object]
Case Study #4 – DaVinci Code ,[object Object],[object Object],[object Object],[object Object]
Case Study #5 – EOUSA-DOJ ,[object Object],[object Object],[object Object],[object Object]
Extensive Integrations
What’s New? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
iCONECT – UNICODE and Worldwide Review Strategies Dec. 5, 2008

Weitere ähnliche Inhalte

Andere mochten auch

I’m drifting through negative space
I’m drifting through negative spaceI’m drifting through negative space
I’m drifting through negative spacetoddegreene
 
Protocol de kyoto (treball exposició oral)
Protocol de kyoto (treball exposició  oral)Protocol de kyoto (treball exposició  oral)
Protocol de kyoto (treball exposició oral)montse sebastian
 
Zu e x5 training 04 06-2010
Zu e x5 training 04 06-2010Zu e x5 training 04 06-2010
Zu e x5 training 04 06-2010Alex Alvord
 
BSI Smart Grid Technologies Review
BSI Smart Grid Technologies ReviewBSI Smart Grid Technologies Review
BSI Smart Grid Technologies ReviewGerry Locke
 
BSI Subsurface Utility Engineering
BSI Subsurface Utility EngineeringBSI Subsurface Utility Engineering
BSI Subsurface Utility EngineeringGerry Locke
 
Balance sheet basics (2012)
Balance sheet basics (2012)Balance sheet basics (2012)
Balance sheet basics (2012)Ritramr
 
Ecosistemes(pissarra digital)
Ecosistemes(pissarra digital)Ecosistemes(pissarra digital)
Ecosistemes(pissarra digital)montse sebastian
 
Bluebookonline coaching
Bluebookonline coachingBluebookonline coaching
Bluebookonline coachingRitramr
 
How banks-create-money
How banks-create-moneyHow banks-create-money
How banks-create-moneyRitramr
 

Andere mochten auch (13)

I’m drifting through negative space
I’m drifting through negative spaceI’m drifting through negative space
I’m drifting through negative space
 
A Constitutional Journey
A Constitutional Journey A Constitutional Journey
A Constitutional Journey
 
Book cover transformed
Book cover transformedBook cover transformed
Book cover transformed
 
Protocol de kyoto (treball exposició oral)
Protocol de kyoto (treball exposició  oral)Protocol de kyoto (treball exposició  oral)
Protocol de kyoto (treball exposició oral)
 
Zu e x5 training 04 06-2010
Zu e x5 training 04 06-2010Zu e x5 training 04 06-2010
Zu e x5 training 04 06-2010
 
BSI Smart Grid Technologies Review
BSI Smart Grid Technologies ReviewBSI Smart Grid Technologies Review
BSI Smart Grid Technologies Review
 
BSI Subsurface Utility Engineering
BSI Subsurface Utility EngineeringBSI Subsurface Utility Engineering
BSI Subsurface Utility Engineering
 
Balance sheet basics (2012)
Balance sheet basics (2012)Balance sheet basics (2012)
Balance sheet basics (2012)
 
Anne Frank
Anne FrankAnne Frank
Anne Frank
 
Ecosistemes(pissarra digital)
Ecosistemes(pissarra digital)Ecosistemes(pissarra digital)
Ecosistemes(pissarra digital)
 
E X5 Pres
E X5 PresE X5 Pres
E X5 Pres
 
Bluebookonline coaching
Bluebookonline coachingBluebookonline coaching
Bluebookonline coaching
 
How banks-create-money
How banks-create-moneyHow banks-create-money
How banks-create-money
 

Ähnlich wie iConect Corporate Overview

Please, Please, PLEASE Defend Your Mobile Apps!
Please, Please, PLEASE Defend Your Mobile Apps!Please, Please, PLEASE Defend Your Mobile Apps!
Please, Please, PLEASE Defend Your Mobile Apps!Jerod Brennen
 
HPCC Systems Presentation to TDWI Chicago Chapter
HPCC Systems Presentation to TDWI Chicago ChapterHPCC Systems Presentation to TDWI Chicago Chapter
HPCC Systems Presentation to TDWI Chicago ChapterHPCC Systems
 
Louise McCluskey, Kx Engineer at Kx Systems
Louise McCluskey, Kx Engineer at Kx SystemsLouise McCluskey, Kx Engineer at Kx Systems
Louise McCluskey, Kx Engineer at Kx SystemsDataconomy Media
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Baltimax
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
Slideshare 1
Slideshare 1Slideshare 1
Slideshare 1bfoley14
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
How Bluemix Helps NASA Innovate
How Bluemix Helps NASA InnovateHow Bluemix Helps NASA Innovate
How Bluemix Helps NASA InnovateIBM
 
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...Studio Fiorenzi Security & Forensics
 
MarkLogic Overview, Ron Avnur, MarkLogic
MarkLogic Overview, Ron Avnur, MarkLogicMarkLogic Overview, Ron Avnur, MarkLogic
MarkLogic Overview, Ron Avnur, MarkLogicmug-fr
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyShawn Riley
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataMirantis
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceImperva Incapsula
 
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...BlueFish
 
Educause Annual 2007
Educause Annual 2007Educause Annual 2007
Educause Annual 2007Neil Matatall
 
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornSecuring Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornEric Andresen
 
Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...IntelligentManufacturingInstitute
 
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...Nagios
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 

Ähnlich wie iConect Corporate Overview (20)

Please, Please, PLEASE Defend Your Mobile Apps!
Please, Please, PLEASE Defend Your Mobile Apps!Please, Please, PLEASE Defend Your Mobile Apps!
Please, Please, PLEASE Defend Your Mobile Apps!
 
HPCC Systems Presentation to TDWI Chicago Chapter
HPCC Systems Presentation to TDWI Chicago ChapterHPCC Systems Presentation to TDWI Chicago Chapter
HPCC Systems Presentation to TDWI Chicago Chapter
 
Louise McCluskey, Kx Engineer at Kx Systems
Louise McCluskey, Kx Engineer at Kx SystemsLouise McCluskey, Kx Engineer at Kx Systems
Louise McCluskey, Kx Engineer at Kx Systems
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
Slideshare 1
Slideshare 1Slideshare 1
Slideshare 1
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
How Bluemix Helps NASA Innovate
How Bluemix Helps NASA InnovateHow Bluemix Helps NASA Innovate
How Bluemix Helps NASA Innovate
 
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
 
MarkLogic Overview, Ron Avnur, MarkLogic
MarkLogic Overview, Ron Avnur, MarkLogicMarkLogic Overview, Ron Avnur, MarkLogic
MarkLogic Overview, Ron Avnur, MarkLogic
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container Data
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients Performance
 
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
 
Educause Annual 2007
Educause Annual 2007Educause Annual 2007
Educause Annual 2007
 
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornSecuring Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
 
Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...
 
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
Nagios Conference 2013 - Thomas Dunbar - Building Technology for Storage Syst...
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 

iConect Corporate Overview