前往Shuct.Net首页

Shudepb PB反编译专家长时间以来,为业内同类软件事实上的唯一选择.细节,彰显专业.态度,决定品质.

关于pb decompiler的搜索

The New Generation of Decompilers | Arthur Hefti Welcome! Register | Sign-in Search Jump to a Magazine .NET AJAX APACHE CLOUD COMPUTING CMS COLDFUSION CRM ECLIPSE FLEX HP IPHONE JAVA LINUX OPEN SOURCE OPEN WEB ORACLE PERL PHP POWERBUILDER PYTHON RED HAT RUBY SAP SEARCH SILVERLIGHT SOA SYMBIAN VIDEO VIRTUALIZATION WEB 2.0 WEBLOGIC WEBSPHERE WIRELESS XML Home Subscribe Advertise Authors Topics Videos Events Webcasts arthurhefti.sys-con.com .NET | AJAX | Cloud | Eclipse | Flex | Open Web | iPhone | Java | Linux | Open Source | Oracle | PowerBuilder | Security | SOA | Virtualization | Web 2.0 PowerBuilder Tips, Tricks, and Techniques Arthur Hefti Subscribe to Arthur Hefti: Email Alerts Get Arthur Hefti via: Homepage Mobile RSS Facebook Twitter LinkedIn Related Topics: Enterprise Application Performance Article The New Generation of Decompilers How to protect your code By Arthur Hefti Article Rating: Select ratingGive it 1/5Give it 2/5Give it 3/5Give it 4/5Give it 5/5 September 9, 2009 01:00 PM EDT Reads: 9,273 Related Print Email Feedback Add This Blog This The latest development technologies rely on intermediate languages and can be decompiled. PowerBuilder is no exception. In this article, we will address the risks posed by decompilers. We will also discuss what can be done to protect against the possible negative results of decompilation - whether you create in-house applications, commercial applications, or are using these applications for your business. A PowerBuilder Decompiler?A decompiler is a program that reads executable code and decompiles it, providing access to source code. It has nothing to do with viruses or other forms of hacking, but - of course - it can be used illegally. Imagine that you've lost your source code (which is certainly possible if you don't use source code control systems); you have the right to use a decompiler on your code. You don't have the right to decompile someone else's code (unless not denied in the license agreement). Other technologies also have their own decompilers. Microsoft provides, as part of the .NET SDK, a tool called ILDASM that reverse-engineers a (non-protected) .NET assembly. The popular "Reflector" tool (by Lutz Roeder, now acquired by Red Gate Software Ltd) shows your original source code in full detail. To take a look at the source code of Java classes, you can make use of several tools, including the DJ Java Decompiler. Decompiled machine code is very hard to understand. However, this is not true for intermediate language, which leads to a key question: Do PowerBuilder decompilers exist? Unfortunately the answer is yes, as it is for any other successful development environment. PowerBuilder is widely used for creating mission-critical applications, something that clearly stimulates the creation of decompilers. The next question is: Do decompilers work with PB? Yes, they do. They can retrieve your full source code as nicely formatted PowerScript with all variable, object, and function names, and ready to work on; all that's missing are the comments. If you don't deploy source code along with your application, it's because you have good reason not to. Protecting your property, prohibiting unauthorized changes, or protecting your license-checking routines are all valid reasons to keep your code to yourself. But, be informed that upon deploying executables, you are basically exposing your full source code. Now is the time to start protecting! How Will This Affect Me?pb decompilers exist, and one of them is frighteningly accurate. From some statistics found on the producer's web site, it was used about 300,000 times. What happens if your application gets decompiled? Your source code is fully exposed, which may bother you in and of itself. But there are more sensitive items that can affect your business: Security is at risk as it's easy to understand how the system works and to find alternate ways to use it or crack it. Any user with harmful intent can copy an application, decompile it, change it, compile it again and use the new version, breaking any security barrier. With a little development skill, access to executables in client/server architecture and a little a technical help are all that's needed. Competitors can understand your algorithms - they can study your protocols and provide an interface to your system, perhaps to offer a competitive upgrade. Competitors can decompile your applications, change the copyright notice, layout, and other minor settings, and produce a new application. If you have deposited your source code, it's possible (although not easy) to demonstrate that the application is your property. Conversely, your original source and the stolen one are equivalent to all points of view. Any user with harmful intent can decompile your application, include a back door or Trojan, compile it again, and distribute it. Changing license check routines and producing a cracked version of your software has never been easier. You have a responsibility to your users to provide the safest application possible. You never know what might happen... Quality Assurance and IT AuditsIf your software is a central asset for your company or customers, you need to protect it from the risk of unauthorized manipulation. This is not a theoretical need - doing this also protects you and your business. Your company most likely spends large amounts of time and money complying with both internal and external legal, security, and risk management audits (Data Protection Act, Sarbanes-Oxley Act, the 95/46/EC UE directive, ISO, etc.). To comply with these policies and keep these certifications, you must be able to prove that you have taken appropriate actions regarding the quality of your IT system. IT audits are there to do just that: find fault in the system and its assets. Applications that are left open to decompilation could be considered a weak link. How Can I Fight Back?There are various ways to protect your intellectual property, your code. However there is always a way to steal it; it's a just matter of time and money. The most effective way to protect your code is preventing access to it - for example, by using a terminal server or writing a web application. This is quite safe, but this code could still be stolen through errors in the software or servers, Trojans, or even employees or subcontractors. Many applications - including most of the applications written in PowerBuilder - are not well suited as web applications and only a few projects make use of terminal servers. When deploying an application to customers, there is an option to encrypt the executable. This is done by adding a small loader to your application. When the application starts, it unpacks the file and executes it. This option cannot be used with a PowerBuilder application including PBDs. Using it for a single EXE works, but by using a debugger, this protection could be broken as well. Another way to protect your code is to write "spaghetti code" (code that is very hard to read and understand). It's said that certain programmers do that on a daily basis, unintentionally. There's a contest for programs written in C called the "International Obfuscated C Code Contest." The major disadvantage of spaghetti code programs is that maintenance is almost impossible. More sophisticated solutions use programs to generate something similar to spaghetti code from source code. The advantage with this is that the code can be easily maintained, but the distributed code is very hard to reverse-engineer. This process is called obfuscation. Besides making it very hard to read the code, it also protects the code from being reused. If someone were to steal your code and it went to trial, it would be hard for the person with obfuscated code to claim that he wrote it this way. What Is Obfuscation?Obfuscating code is the process of producing code that is difficult to understand, starting from a well-documented and maintained application source. You don't need to go to the effort of producing messy code, as this tool automates that process. In order to make code difficult to understand, obfuscation techniques address: Comments removal Changing script formatting Variable and class renaming Addition of dead code De-structuring (changing while/loop, if/then/else statements, choosing case structures by using "goto" statements) Merging libraries If you have never seen the effects of obfuscation, you'll be surprised at how difficult it is to understand obfuscated code. Obfuscation is an alternate way to deploy source code for libraries or frameworks. For example, deploying a PowerBuilder application to Appeon, WinForms, and WebForms requires full source code; however, you probably don't want to publish the original source code. This means that users can take advantage of the generation to .NET by using an obfuscated version of the library source code. As a word of warning, if you have your database password in the application or you have simple license check algorithms, rest assured that someone will use decompilers to take advantage of your good intentions. How Does Obfuscation Work?Removing comments is easy, even considering all the types of comments available in PowerBuilder (even though PowerBuilder grammar handles "///*" and "//*/" as special cases). Script format change also makes code difficult to follow. But the central goal in obfuscation is to destroy the symbol table in a non-reversible way. Even without comments, variable and class names ("symbols") help programmers understand the meaning of your code. Thanks to PowerBuilder naming conventions, our source code is often very easy to read. But, imagine that your variable ls_license_code (computed by very complex algorithms) was named x4tg6_jh instead; it would not be easy to understand what the program does. Unfortunately renaming is not so easy, especially if you consider incremental compilation (that every script must be compiled before being saved) and all the possible references that you have in your programs. Finding elements to rename is not easy either, because if you obfuscate "Messagebox" or "Describe", your application will no longer work. A symbol table is a technical term used by compilers to express the list of symbols used in the source code. Machine code compilers discard the symbol table, because it's not considered a central part of the source code. But intermediate language code compilers don't. The technique for destroying a symbol table is to find variable, class, and method names defined by programmers and to replace them with alternate symbols. By systematically renaming them all (in every part of the program, including strings, DataWindows, etc.), you can build a new obfuscated program that's ready to be compiled. It will have the same functionalities as the original application, but will be much more difficult to understand (see Figure 1). The obfuscation process starts from plain code and: Parses it Builds a symbol table and creates renamed items Obfuscates scripts with extra elements and renames elements Compiles the result in a single big (and messy) library The result of this process is new obfuscated source code and a symbol table that shows the original symbols along with their new names. This new symbol table is like the Rosetta Stone; keep it in a safe place with the original source code. A PowerBuilder Obfuscator?I came across PBProtect back in February when I asked a question about Enable Rex to Gian Luca De Bonis, Enable Development CEO/CTO and the creator of PBProtect. He mentioned the existence of an effective PowerBuilder decompiler and the obfuscator he had created in response. He had been using it for a while to protect his own products, but was thinking that maybe other people would be interested in it. At first, I couldn't believe that a PowerBuilder decompiler existed. To find out more, I decided to download the trial version of this decompiler and check it out. It was unbelievable! The decompiler created nicely formatted source code, and even my variables' names were there. I have had experience with decompilers for other languages, as well as previous pb decompilers, but seeing the restored variable names was quite tough for me. This discovery made me very uncomfortable. Our company writes software for various customers who use it in-house or license it to their customers, as well as tools for PB developers. I applied to be a beta tester for PBProtect 2.0. During the following weeks I tested various alpha and beta releases with different PowerBuilder projects and was more and more pleased with each new version. I passed my findings by email to Gian Luca and we often chatted on IM about details. PBProtect was easy to use. To obfuscate a whole application you have to select a target, choose the right PowerBuilder version, name the output library for the obfuscated code, put your copyright text, and click obfuscate. The whole obfuscation process could be included into a batch build by passing a project file on the command line to PBProtect. After clicking obfuscate, PBProtect parses the source of all the objects and presents you with a list of symbols (objects, functions, properties, etc.). There's a default setting of what gets obfuscated. All the PowerBuilder keywords are excluded. By default, all symbols that contain an underscore (_) are included. This can be changed by using filter expressions with syntax similar to the PB Match function or by including or excluding each symbol individually (see Figure 2). After hitting confirm, the sources will be obfuscated, imported, and rebuilt - ready to be deployed. Listing 1 shows the obfuscated code whereas Listing 2 shows the same code before obfuscation. The listings are a few simple code lines used in a resize event; imagine how it looks when you obfuscate more complex code. (Download Listings 1 and 2 here.) You might wonder what's happening behind the scenes. In the first step, all the source codes are exported into a temporary directory from where they are parsed. During parsing, all the symbols are collected, PowerBuilder keywords are removed from the symbols found, and the list of symbols is displayed in a window. There you can use various criteria to look at the symbols and create filters to include and exclude symbols (see Figure 3). For each symbol, you can define an exception to choose whether or not it gets obfuscated. In the next step, PBProtect obfuscates all the sources according to your settings. After this step, the PB sources are imported into the target library and migrated. In addition to the basic settings, there's also an advanced tab page that you will rarely use. After the obfuscation, you can deploy your project normally. PBProtect is not limited to whole projects. It can be used to obfuscate single libraries as well. At the beginning of the year we decided to write a commercial PDF creation engine (CATsoftPDF) for creating PDFs without the need for a PDF printer driver. The availability of a PowerBuilder decompiler made us quite uneasy about deploying a PBL with all the information - also known as PBD. Anybody could get the trial version of the pb decompiler and get a look at our source code, maybe even steal the code and create his own commercial library. With PBProtect, we can obfuscate the source and distribute the obfuscated PBL instead of the compiled PBD. The advantage of distributing a PBL including the obfuscated source code is that it can be used for .NET projects as well. In the obfuscation process we have to exclude the few functions and objects that need to be accessed from projects using our library. SummaryIt's a fact that software is stolen and used without a license. It's also a fact that efficient pb decompilers exist and can be used by anyone: If you develop mission-critical applications, anyone accessing an executable copy can rebuild the source code, alter the application, and perform illegal operations or access/disclose confidential information. What if the application manages financial transactions, health care data or air traffic? If you develop commercial applications, you can partially protect your business against illegal copies with software keys, but when someone decompiles your code, your intellectual property is at risk; they have access to key functions and features that you don't want to disclose. In both cases, this has many more potential repercussions than simply using software without proper authorization. Fortunately, obfuscation makes it very difficult to reverse-engineer your code. Using an obfuscator like PBProtect made me feel confident that I could deploy my application without worrying that somebody might disclose my work or reuse my code and create a competitive product. Resource PBProtect: http://www.pb-protect.com/EN-source_pbp250art Published September 9, 2009 – Reads 9,273 Copyright © 2009 SYS-CON Media, Inc. — All Rights Reserved. Syndicated stories and blog feeds, all rights reserved by the author. Related Print Email Feedback Add This Blog This More Stories By Arthur Hefti Arthur Hefti is CEO of CATsoft Development GmbH in Zurich. He has been working with PowerBuilder since version 3 and taught dozens of PowerBuilder training classes. He and his team create custom-made client/server and Web applications using XML, Web Services, and encryption. Comments (1) View Comments Share your thoughts on this story. Add your comment You must be signed in to add a comment. Sign-in | Register In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect. Please wait while we process your request... Your feedback has been submitted for approval. Most Recent Comments Goowee007 11/30/09 12:16:00 PM EST What is the PowerBuilder decompiler tool? I'm trying to find a PowerBuilder decompiler tool that can get the source code from .pbd or .exe. Top Reads - Week This Month All Time CATTOR Mobile: Papierlose Servicerapporte inkl. Unterschrift New Version of Drag & Drop DLL published CATTOR Mobile: Papierlose Servicerapporte inkl. Unterschrift Encryption in PowerBuilder Prognos with DataWindow.NET 2.0 and PowerBuilder 11 Web Services PowerBuilder - The ClassDefinition Object The ClassDefinition Object PowerBuilder .NET Web Services with Various Front Ends Taking PowerBuilder's PBDOM Out for a Spin Using PowerBuilder Assemblies in .NET The New Generation of Decompilers Using MS MapPoint in PowerBuilder Artikel "Using PowerBuilder Assemblies in .NET" in PBDJ publiziert "Plug-in Power for PowerBuilder Applications" im ISUG Journal Erschienen Presentation on PowerBuilder TV CommentsNew Release of Quest Toad for Oracle Offers Enhancements to Reduce Risk By Liz McMillanyourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.Oct. 22, 2013 02:57 AM EDTread more & respond » Latest Articles Latest Blogs Latest News Using PowerBuilder Assemblies in .NET The New Generation of Decompilers PowerBuilder .NET Web Services with Various Front Ends Prognos with DataWindow.NET 2.0 and PowerBuilder 11 Web Services PowerBuilder - The ClassDefinition Object The ClassDefinition Object Taking PowerBuilder's PBDOM Out for a Spin Encryption in PowerBuilder Using MS MapPoint in PowerBuilder More Articles... CATTOR Mobile: Papierlose Servicerapporte inkl. Unterschrift New Version of Drag & Drop DLL published CATTOR Mobile in iTunes Store CATTOR Designer in Beta Bereichsübergreifendes Arbeiten mit CATTOR CATTOR Mobile Pr?sentation CATTOR Update CATTOR Mobile PowerBuilder Programmierer gesucht Liste Lebendige Traditionen Kanton Bern CATTOR an der topsoft in Zürich CATTOR als Fallstudie für agile Software Entwicklung More Blogs... Top Stories Cloud Computing Computers and Software In-Memory Technology Will Open the Doors to a Wave of Innovation How Dell Converts Social Media Analytics into Strategic Business Advantage How to Choose Where Your Load Should Come From DevOps Pay Raise: Quantifying the Value of DevOps MCPc to Open New Location in Buffalo Market CIO/CTO Update Computers and Software Software Development Today and 20 Years Ago Top 25 SharePoint Influencers for 2014 Announced WGU Announces New Scholarship for Emerging Business Leaders Data Center Market in Brazil 2014-2018 2014 Business Technology Security Threat Assessment Facebook Media and Entertainment BostonGlobe.com Launches Metered Subscription Model Feeding America responds to President Obama's FY2015 budget Red Hat Brings Enterprise Linux Platform to AWS GovCloud RCS Capital Corporation Receives B2 rating from Moody's, B+ from S&P Ball Aerospace-built GMI Instrument Begins Operations Onboard NASA's Global Precipitation Measurement Satellite Twitter Media and Entertainment Guest Post from Mobility Expert Peter Rogers - JavaScript Cross-compilation Mobile App Development Introducing Acronis Access: The First Solution to Comprehensively Address Enterprise-Level Needs for Mobile File Access, Synching and Sharing Software AG with strong partners at CeBIT 2014: Taking the Road to the Digital Enterprise together DocuSign bringt 85?Millionen US-Dollar zur F?rderung des Wachstums als globalem Standard für das Digital Transaction Management zusammen Emergency Generator Tips for Home and Business Protection From Power Outages Java in the Cloud Computers and Software [24]7 to Present on Mobile and Omnichannel Experience at Mobile Voice Conference 2014 Nintex Wins Five Awards at the 2014 SharePoint Conference App Awards Deep Blue Communications Selects Ruckus SmartCell Gateway for Nationwide Private Cloud WLAN Services Nitrous.IO Cloud Dev Environments Now Included in AWS Activate Offering for Startups Infonetics: 802.11ac Ramping Fast as Wireless LAN Market Sets Another Quarterly High Ajay Budhraja Cloud Big Data Computers and Software Pythian Raises $6 Million to Help Retailers Eliminate Data Security Breaches Waller Capital Serves as Exclusive Advisor to Identified on Sale to Workday OFC 2014 to Feature Breakthrough Research, Technology-focused Programming at the World’s Leading Optical Communications Event IPR International Partners with AFORE to Offer Encryption as a Service (EaaS) Palmetto Technology Group (PTG), IT Managed Service Provider, Named to the MSPmentor 501 Global Edition Tech CEOs Computers and Software NAMIC: Washington 'Overreacts' with Flood Insurance Bill TransPerfect Launches EnCompass? Labeling and Content Management Solutions for the Medical Device Industry Infinity Real Estate Holdings Corporation Appoints New Chief Operations Officer & President Infinity Real Estate Holdings Corporation Appoints New Chief Operations Officer & President Statement From The U.S. Conference Of Mayors CEO & Executive Director Tom Cochran On President Obama's FY 2015 Budget Government Government Janet L. Williams is recognized by Continental Who's Who as a Pinnacle Professional of the Year Global Business Intelligence (BI) Market in Retail Industry 2014-2018 Government of Canada reaches deal on Labour Market Agreement renewal in Quebec - Helping Quebecers obtain skills required to find and maintain jobs Concise Analysis of the International Industrial Control Systems (ICS) Security Market - Forecasts to 2018 SCI Engineered Materials, Inc. Reports Fourth Quarter 2013 Results Televation Telecom Bankrate Announces Pricing of Secondary Public Offering Step Up Screenwriter Duane Adler Makes Directorial Debut With Make Your Move Global Biomaterials Market Aha! lance ses feuilles de route visuelles des produits pour JIRA Variety of Floorplans Drive Sales Success at California Pacific Homes' Caserta It's All About Engaging Media and Entertainment CAA Resources Announces Updated Website, Expanded IR/PR Program AppConext Auto Selects Airfoil to Promote Inaugural In-Vehicle Application Summit for Senior Automotive, Mobile and Technology Industry Leadership Lend Academy Investments Selects Millennium Trust Company as Custodian for its P2P Lending-Focused Managed Accounts IDG Consumer & SMB Expands Tech Lifestyle Portfolio with Launch of Greenbot.com Jagermeister Launches New "JagerBonds" Mobile App Microsoft Developer Computers and Software Guggenheim Securities Hires Eric Mandl to Broaden Investment Banking Capabilities Startup Ecommerce Search Engine Challenges Google and Bing in Product Search Aha! Führt Visual Product Roadmaps für JIRA ein Intermedia Presents at Stifel and Pacific Crest Technology Conferences Smart WebParts Releases Smart Time for the iPad, Now Available in the Apple App Store Mergers & Acquisitions Financial Services Equinix sees continued interest in Secaucus data centers Pretivm Reports Fourth Quarter and Year End 2013 Results Uni-Select to Increase its Presence in Virginia by Acquiring J.K. Distributors, Inc. Trilogy Energy Corp. Announces Financial and Operating Results for the Quarter and Year-Ended December 31, 2013 Saul Centers, Inc. Reports Fourth Quarter 2013 Earnings Las Vegas Lifestyle and Leisure Rubenstein Public Relations Welcomes Megan Wilson As New Associate Vice President Wearable Tech From PLT Labs Ignites Developers’ Imaginations Autodesk Establishes Global Foundation to Accelerate Design-Led Revolution Discovery Communications CEO David Zaslav to Present at Deutsche Bank Media, Internet & Telecom Conference A Taste of Ireland in Downtown Denver: Katie Mullen's Irish Restaurant & Pub at the Sheraton Denver Downtown Hotel SEO Professional Services Atlassian offre aux développeurs une plateforme de prochaine génération pour créer facilement des modules basés sur le nuage de type add-on pour JIRA et Confluence MRY Launches New "JagerBonds" Mobile App For Jagermeister 100 Year Old Financial Services Firm Changes Name JCP&L Offers Outage Reporting on Facebook and Adds Crew Status to Outage Maps Research and Markets: Global Mobile Ad Spending Market 2012-2016: Angry Birds choose Free Download Sarbanes Oxley Computers and Software Ixia Announces Completion of Audit Committee Internal Investigation, SEC Filings Update, and CFO Transition Flavourings in Food - A Legal Perspective - Vols 1 and 2 DocuSign Streamlines Digital Commerce Through Deeper Partnership with Ariba The World's Best Inflight Caterers Honored at Miami Beach Gala GSE Announces Delisting From New York Stock Exchange; Expects To Begin Trading On The OTCQB Marketplace Under New Ticker Symbol "GSEH" Market Research Professional Services Concise Analysis of the International Adhesives and Sealants Market Global Biomaterials Market SDN, NFV & Network Virtualization Market at $4 Bil in 2014 ICT Priorities in Healthcare - Enterprise ICT investment plans Concise Analysis of the International Adhesives and Sealants Market BigData Computers and Software Contexti Establishes Relationship With Cisco to Deliver Big Data Platform Services to Cisco UCS Customers Across Asia Pacific Precogs is a Top 50 Finalist at CODE_n Contest Held at CeBIT 2014 Tegile Systems Presents at Piper Jaffray Technology, Media & Telecommunications Conference Global Big Data Market in the Retail Sector 2014-2018 Can Net Neutrality Bring About Competition and Differentiation? Construction Real Estate and Construction Trilogy Energy Corp. Announces Financial and Operating Results for the Quarter and Year-Ended December 31, 2013 Shingle Springs Band of Miwok Indians Funds Honduras Medical/Dental Mission NACCO Industries, Inc. Announces Fourth Quarter And Full Year 2013 Results Caterpillar Power Systems Business Segment Renamed Energy & Transportation CNH Industrial Publishes its EU Annual Report and Announces Future Financial Reporting Plans SOA & WOA Computers and Software Social Login: The Right Solution for Your Business? Windstream Hosted Solutions Opens Fourth Data Center in Charlotte, NC MSPA-NA Announces Expanded Membership and Focus Hotelbeds Selects Triometric XML Business Intelligence Solution to Support International Growth Securing your AWS Infrastructure with IAM Real Estate News Real Estate and Construction Realtors(R) Applaud House Passage of Bipartisan Flood Insurance Affordability Bill TSS Software Adds agentTRAX to Its RealExpress Vendor Network Saul Centers Declares Quarterly Dividends LegalZoom Selects DocuSign Digital Transaction Management (DTM) for New Mobile App Eliot Harris Announces Campaign to Sell Your House in Marble Falls Bergen County Real Estate and Construction Allied Properties Real Estate Investment Trust Announces Fourth-Quarter and Year-End Results With Continuing Growth in FFO and AFFO Per Unit Celebrating Celebrities Celebrating Celebrities Urban Land Institute To Work With Honolulu Mayor Kirk Caldwell In Crafting Redevelopment Strategies, Options For Blaisdell Center Mill Creek Residential and AEW Capital Management Acquire Lakewood on the Trail in Dallas Allied Properties Real Estate Investment Trust Announces Fourth-Quarter and Year-End Results With Continuing Growth in FFO and AFFO Per Unit Cisco Virtualization Journal Computers and Software Concise Analysis of the International Network Management Market - Forecasts to 2018 Summit for Senior Leaders to Discuss the Fastest-Growing Sector in the Automotive Industry Slated for May CounterPath to Hold Q3 2014 Results Conference Call on March 13, 2014 Concise Analysis of the International Network Management Market - Forecasts to 2018 Global Data Center Ethernet Switch Market 2014-2018 Virtualization Computers and Software Red Hat Launches a Comprehensive Open Source BPM Suite OCZ Storage Solutions Launches New Z-Drive 4500 PCIe SSD Series With Windows Accelerator (WXL) Software Concise Analysis of the International Industrial Control Systems (ICS) Security Market - Forecasts to 2018 OpenNebula Technology Day at Ede, Netherlands Appcore AMP? Is Verified as Citrix Ready IBM Journal Computers and Software Mentor Graphics Proposes New Accellera Standards Committee for Graph-Based Test Specification Standard The Global Silicon Photonics Market: Report Segments the Market by Products, Applications & Geography - Report Includes Forecasts to 2020 and Company Profiles Two Emulex Controllers Achieved Huawei Ready Certification Puppet Labs Announces Puppet Enterprise 3.2 The Global Silicon Photonics Market: Report Segments the Market by Products, Applications & Geography - Report Includes Forecasts to 2020 and Company Profiles Ajay Budhraja Big Data Cloud Computers and Software Alon USA Partners, LP Reports Fourth Quarter and Full Year 2013 Results Kingston Digital Ships Dual Interface USB for Android Smartphones, Tablets CANARIE and Association of University Research Parks Canada Partner to Support Rapid Commercialization of Research Teradata is a Leader in Big Data Hadoop Solutions in 2014 Leading US Medical Facility Implements WANdisco's Non-Stop Hadoop to Help Save Lives Oracle Computers and Software Oracle Business Intelligence Gets Ground Breaking Collaborative BI Technology via BITeamwork Research and Markets: Concise Analysis of the International Enterprise Search Market Research and Markets: Global Marketing Automation Software Market 2014-2018 with Oracle Corp., SAP AG, and SAS Institute Inc Dominating The Global Fraud Detection and Prevention Market by Fraud Analytics & Authentication - Global Advancements, Worldwide Forecasts & Analysis to 2018 Ayasdi Further Strengthens Executive Bench, Adds Vice Presidents of Customer Success and Human Resources to Leadership Team BuyerSteps Computers and Software Selfies and Ellen, Farewell to Arms Searchmetrics partners with AirPair, the platform for expert on-demand online software developer support Marin Software to Release Full Support for New Facebook Ad Campaign Structure Midwest Orthopaedics at Rush First Annual Occupational Health & Workers' Compensation Conference #ETAM Live Show: THE Sexiest, Most Connected Catwalk Show of the Year Entrepreneurs Telecom REPUBLIC RECORDS Announces Ron Cerrito As Sr. Vice President Of Alternative And Rock Promotion Bob Evans Reports Fiscal 2014 Third-Quarter Results Recipients Announced For 2014 Military Child Of The Year? Award National Geographic Channel To Air Carl Sagan's Groundbreaking Original Series "COSMOS: A PERSONAL VOYAGE" In Advance Of The Highly Anticipated Premiere Of New Voyage To The Stars, COSMOS: A SPACETIME ODYSSEY PharmaCan Capital Invests in a Second Commercially Licensed Medical Marijuana Producer in Canada Open Source Journal Computers and Software Acquia Brings Record Expense Account to Austin for SXSW IBM Completes Acquisition of Cloudant CollabNet's CloudForge Now Available In Cloud Foundry Marketplace Brisbane Web Design Agency Eye Candy Media to Donate Money to The Children's Hospital Foundation Free Trial of Invaluable Bitnami Cloud Hosting Service Offered to Startups Utilizing AWS Activate Mac Computers and Software Equil Smartpen Showcases Evernote Integration at The Luxury Technology Show in New York City Met-Ed Offers Outage Reporting on Facebook and Adds Crew Status to Outage Maps FirstEnergy Adds Crew Status to Outage Maps Hilton College mixology students create craft cocktails for Wyndham Houston West Energy Corridor Purchasers of Computers, Video Game Systems and Other Digital Devices to Share in $310 Million Settlement SYS-CON Media About Us Contact Us Company News Careers Author Guidelines SYS-CON Events Cloud Expo Big Data Expo --> Navigate Home Subscribe Advertise Downloads Whitepapers Videos Events Webcasts International Sites India UK Canada Germany France Australia Italy Spain Netherlands Brazil Belgium Magazines .NET Apache AJAX Cloud Computing CMS Coldfusion CRM Eclipse Open Source Flex HP iPhone Video Java Linux Open Web Oracle Perl PHP PowerBuilder Python Red Hat Ruby Search Silverlight SAP SOA Symbian Virtualization Web 2.0 Weblogic Websphere Wireless XML Terms of Use & Our Privacy Statement - About Newsfeeds / Videofeeds. Copyright ©1994-2014 SYS-CON Media.All Rights Reserved. All marks are trademarks of SYS-CON Media. Reproduction in whole or in part in any form or medium without express written permission of SYS-CON Media is prohibited.