77109 4105 First Data Government Solutions

Total Page:16

File Type:pdf, Size:1020Kb

77109 4105 First Data Government Solutions Interactive Voice Response Systems, Services and Peripherals GovConnect Government Solutions Award # 4105 Jul-01 PT56856 Group # 77109 PS56857 Model Number Product Description NYS Net Installation NYS Mfg. Maintenance Maintenance Maintenance Price Per Unit Net Standard Standard (per Gold (per Platiumum Inst. Per Warranty month) month) (per month) Unit ACCESSNET LICENSES Server Licenses ANET-SVR-DB AccessNet RIMS DB server runtime license $7,380.00 $0 $0 90 days $92.25 $110.70 $129.15 ANET-SVR-STAT AccessNet statistical server runtime license $3,690.00 $0 $0 90 days $46.13 $55.35 $64.58 ANET-SVR-CTI AccessNet CTI server runtime license $12,300.00 $0 $0 90 days $153.75 $184.50 $215.25 ANET-SVR-CC AccessNet Credit Card server runtime license $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-SVR-FAX AccessNet Fax server runtime license $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-SVR-SENTRY AccessNet Sentry monitoring runtime license $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 ANET-SVR-REDN AccessNet server redundency server runtime license $12,300.00 $0 $0 90 days $153.75 $184.50 $215.25 ANET-SVR-IMM AccessNet integrated message manager runtime license $7,380.00 $0 $0 90 days $92.25 $110.70 $129.15 ANET-SVR-PCACCESS AccessNet PC Access transaction processing runtime license $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-SVR-NET AccessNet Web transaction processing runtime license $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 ANET-SVR-EDI AccessNet EDI transalation software runtime license $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-SVR-QUEUE AccessNet call transfer queuing module runtime server license $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-SVR-PBX AccessNet PBX gateway software server runtime license $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 ANET-SVR-T1 AccessNet T1 software server runtime license $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 ANET-SVR-ISDN AccessNet ISDN software server runtime license $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 ANET-SVR-5250 AccessNet 5250 AS/400 access runtime server $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 ANET-SVR-3270 AccessNet 3270 host access runtime server $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 ANET-SVR-FTP AccessNet FTP data access runtime server $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 ANET-SVR-CSTM AccessNet Custom host access runtime server $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-SVR-SDK AccessNet Software Development Kit (SDK) utilities license for third party $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 client integration Client Licenses ANET-CL-VS2 AccessNet WinRIMS two (2) user voice response runtime client $533.00 $0 $0 90 days $6.66 $8.00 $9.33 ANET-CL-RPC2 Accessnet two (2) user remote PC access client $533.00 $0 $0 90 days $6.66 $8.00 $9.33 ANET-CL-NET2 AccessNet two (2) user Internet access client $533.00 $0 $0 90 days $6.66 $8.00 $9.33 ANET-CL-TDD AccessNet single user TDD access client $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-CL-VR2 AccessNet voice recognition runtime license for two (2) concurrent resources $1,312.00 $0 $0 90 days $16.40 $19.68 $22.96 ANET-CL-VRNL2 AccessNet natural language voice recognition license for two (2) concurrent $1,640.00 $0 $0 90 days $20.50 $24.60 $28.70 resources ANET-CL-TTS2 AccessNet voice text-to-speech runtime license for two (2) concurrent $1,312.00 $0 $0 90 days $16.40 $19.68 $22.96 resources ANET-CL-FAX2 AccessNet fax runtime license for two (2) concurrent resources $1,312.00 $0 $0 90 days $16.40 $19.68 $22.96 ANET-CL-ODIAL2 AccessNet outbound dialing runtime resource for two (2) concurrent $656.00 $0 $0 90 days $8.20 $9.84 $11.48 resources ANET-CL-USER AccessNet (1) Client Access license (from WS) $410.00 $0 $0 90 days $5.13 $6.15 $7.18 ANET-DEV-VOICE AccessNet voice response single user development license $4,100.00 $0 $0 90 days $51.25 $61.50 $71.75 Solution Licenses ANET-AP-INTAX AccessNet tax & revenue income tax server database license $41,000.00 $0 $0 90 days $512.50 $615.00 $717.50 ANET-AP-INTAXEZ AccessNet tax & revenue income tax EZ server database license $16,400.00 $0 $0 90 days $205.00 $246.00 $287.00 ANET-AP-STAX AccessNet tax & revenue sales tax server database license $12,300.00 $0 $0 90 days $153.75 $184.50 $215.25 ANET-AP-WTAX AccessNet tax & revenue withholding return server database license $12,300.00 $0 $0 90 days $153.75 $184.50 $215.25 ANET-AP-WAGE AccessNet wage reporting return server database license $16,400.00 $0 $0 90 days $205.00 $246.00 $287.00 ANET-AP-REFUND AccessNet tax & revenue refund status database license $16,400.00 $0 $0 90 days $205.00 $246.00 $287.00 ANET-AP-FORMS AccessNet tax & revenue forms processing database license $12,300.00 $0 $0 90 days $153.75 $184.50 $215.25 ANET-AP-TAXLINE AccessNet tax & revenue tax talk $12,300.00 $0 $0 90 days $153.75 $184.50 $215.25 ANET-AP-EXTEN AccessNet tax and revenue extensions database license $24,600.00 $0 $0 90 days $307.50 $369.00 $430.50 ANET-AP-PAYPLAN AccessNet tax & revenue payment plan database license $24,600.00 $0 $0 90 days $307.50 $369.00 $430.50 ANET-AP-NONFILER AccessNet tax & revenue non-fileers database license $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-AP-EFT AccessNet tax & revenue electronic fund transfer database runtime license $12,300.00 $0 $0 90 days $153.75 $184.50 $215.25 ANET-AP-CSEPLUS AccessNet child support enforcement database license $32,800.00 $0 $0 90 days $410.00 $492.00 $574.00 ANET-AP-CSE AccessNet child support enforcement database license $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-AP-MEDICAID AccessNet medicaid provider information database license $24,600.00 $0 $0 90 days $307.50 $369.00 $430.50 ANET-AP-NEWHIRE AccessNet new hire reporting database license $24,600.00 $0 $0 90 days $307.50 $369.00 $430.50 ANET-AP-TRAFFIC AccessNet traffic citation database license $12,300.00 $0 $0 90 days $153.75 $184.50 $215.25 ANET-AP-UICLAIMS AccessNet continued claims database license $41,000.00 $0 $0 90 days $512.50 $615.00 $717.50 ANET-AP-RIC AccessNet remote initial claims database license $82,000.00 $0 $0 90 days $1,025.00 $1,230.00 $1,435.00 ANET-AP-ACM AccessNet automated address change module database runtime license $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 ANET-AP-CUSTOM AccessNet custom application database license $8,200.00 $0 $0 90 days $102.50 $123.00 $143.50 Language Licenses ANET-LP-SPAN Voice Response Spanish language pack module $1,640.00 $0 $0 90 days $20.50 $24.60 $28.70 ANET-LP-PORT Voice Response Portuguese language pack module $1,640.00 $0 $0 90 days $20.50 $24.60 $28.70 ANET-LP-FREN Voice Response French language pack module $1,640.00 $0 $0 90 days $20.50 $24.60 $28.70 ANET-LP-CAMB Voice Response Cambodian language pack module $1,640.00 $0 $0 90 days $20.50 $24.60 $28.70 Consulting Services FIC-CONSULT Hourly consulting services custom development or programming services $102.50 $0 $0 90 days $0.00 $0.00 $0.00 FICB-CONSULT Block of consulting services for custom development or programming $1,640.00 $0 $0 90 days $0.00 $0.00 $0.00 services FICB-CONSULT2 Block of consulting services for specialized custom development or strategic $2,296.00 $0 $0 90 days $0.00 $0.00 $0.00 consulting services . FIC-SCRIPTING Hourly consulting for script development, testing and integration $102.50 $0 $0 90 days $0.00 $0.00 $0.00 FICB-SCRIPTING Block of consulting for script development, testing and integration $1,640.00 $0 $0 90 days $0.00 $0.00 $0.00 FIC-LOADING Hourly consulting for loading of professionally recorded prompts into RIMS $102.50 $0 $0 90 days $0.00 $0.00 $0.00 voice application FICB-LOADING Block of consulting for loading of professionally recorded prompts into voice $1,640.00 $0 $0 90 days $0.00 $0.00 $0.00 application FIC-INSTALL Hourly consulting services for system installation and configuration. $102.50 $0 $0 90 days $0.00 $0.00 $0.00 FICB-INSTALL Block of consulting services for system installation and configuration. $1,640.00 $0 $0 90 days $0.00 $0.00 $0.00 FIC-DBLINK Hourly consulting services for development of database link routines $102.50 $0 $0 90 days $0.00 $0.00 $0.00 FICB-DBLINK Block of consulting services for development of database link routines $1,640.00 $0 $0 90 days $0.00 $0.00 $0.00 FICB-DBLINK2 Block of consulting servers for the development and integration of specialized $2,296.00 $0 $0 90 days $0.00 $0.00 $0.00 database linkage routines to custom host servers or proprietary hosts FIC-PROMNGT Hour consulting for project management including status report, project $102.50 $0 $0 90 days $0.00 $0.00 $0.00 meetings, analyst supervision, etc FICB-PROMNGT Block of consulting for project management including status report, project $1,640.00 $0 $0 90 days $0.00 $0.00 $0.00 meetings, analyst supervision, etc FICB-PROMNGT2 Block of consulting for specialized project management for specific project $2,296.00 $0 $0 90 days $0.00 $0.00 $0.00 planning and consulting services FIC-QA Hourly consulting for quality assurance $102.50 $0 $0 90 days $0.00 $0.00 $0.00 FIC-TRAINING Hourly consulting for application training $102.50 $0 $0 90 days $0.00 $0.00 $0.00 FICB-TRAINING Block of consulting for application training $1,640.00 $0 $0 90 days $0.00 $0.00 $0.00 FIC-STUDIO Hourly professional studio recording fee $287.00 $0 $0 90 days $0.00 $0.00 $0.00 FIC-APPLSUPP Monthly voice application script support $0.00 $0 $0 90 days $205.00 $246.00 $287.00 FIC-DENTRY Hourly consulting services for data entry personnel $41.00 $0 $0 90 days $0.00 $0.00 $0.00 FICB-DENTRY Block of consulting services for data
Recommended publications
  • Optimizing and Protecting Hard Drives ‐ Chapter # 9
    Optimizing and Protecting Hard Drives ‐ Chapter # 9 Amy Hissom Key Terms antivirus (AV) software — Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates’ VirusScan and Norton AntiVirus are two popular AV packages. backup — An extra copy of a file, used in the event that the original becomes damaged or destroyed. boot sector virus — An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems. buffer — A temporary memory area where data is kept before being written to a hard drive or sent to a printer, thus reducing the number of writes to the devices. chain — A group of clusters used to hold a single file. child, parent, grandparent backup method — A plan for backing up and reusing tapes or removable disks by rotating them each day (child), week (parent), and month (grandparent). cross-linked clusters — Errors caused when more than one file points to a cluster, and the files appear to share the same disk space, according to the file allocation table. defragment — To “optimize” or rewrite a file to a disk in one contiguous chain of clusters, thus speeding up data retrieval. differential backup — Backup method that backs up only files that have changed or have been created since the last full backup. When recovering data, only two backups are needed: the full backup and the last differential backup. disk cache — A method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request.
    [Show full text]
  • Graphicconverter 6.6
    User’s Manual GraphicConverter 6.6 Programmed by Thorsten Lemke Manual by Hagen Henke Sales: Lemke Software GmbH PF 6034 D-31215 Peine Tel: +49-5171-72200 Fax:+49-5171-72201 E-mail: [email protected] In the PDF version of this manual, you can click the page numbers in the contents and index to jump to that particular page. © 2001-2009 Elbsand Publishers, Hagen Henke. All rights reserved. www.elbsand.de Sales: Lemke Software GmbH, PF 6034, D-31215 Peine www.lemkesoft.com This book including all parts is protected by copyright. It may not be reproduced in any form outside of copyright laws without permission from the author. This applies in parti- cular to photocopying, translation, copying onto microfilm and storage and processing on electronic systems. All due care was taken during the compilation of this book. However, errors cannot be completely ruled out. The author and distributors therefore accept no responsibility for any program or documentation errors or their consequences. This manual was written on a Mac using Adobe FrameMaker 6. Almost all software, hardware and other products or company names mentioned in this manual are registered trademarks and should be respected as such. The following list is not necessarily complete. Apple, the Apple logo, and Macintosh are trademarks of Apple Computer, Inc., registered in the United States and other countries. Mac and the Mac OS logo are trademarks of Apple Computer, Inc. Photo CD mark licensed from Kodak. Mercutio MDEF copyright Ramon M. Felciano 1992- 1998 Copyright for all pictures in manual and on cover: Hagen Henke except for page 95 exa- mple picture Tayfun Bayram and others from www.photocase.de; page 404 PCD example picture © AMUG Arizona Mac Users Group Inc.
    [Show full text]
  • Verizon Wireless Mobile Office User Guides for Windowstm 95/98
    Verizon Wireless Mobile Office User Guides For WindowsTM 95/98 To use Mobile Office for basic Internet access, do the following: Setting the Phone Up As a Modem 2 – 5 Setting Up a Mobile Office Quick 2 Netsm Connection 6 – 9 Using The Mobile Office Service 10 - 16 Related Support Documents: Setting Up Your Existing Dial Up Connections 17- 24 Setting Up AOL 4.0 / 5.0 (If you currently use AOL.) 25 - 32 Faxing With Your Digital Data Capable Phone 33 - 53 1 man.doc Setting the Phone Up as a Modem Step 1:(Optional) If you have a driver that was provided with your phone skip this step. If you do not have a driver you can use a standard driver included in Windows or we recommend using our driver. Download the Mobile Office Driver. Step 2: Go into control panel by clicking on Start, Settings, Control Panel Step 3: Select Modems Step 4: Click Add... 2 man.doc Step 5: Select "Other" then click Next. (If your PC does not support PC-Cards you will not get this screen.) Step 6: Check "Don't run the Hardware Installation wizard" if you get this dialog box. Then click on the Next button. Step 7: Check the box labeled "Don't detect my modem; I will select it from a list." Then click Next. 3 man.doc Step 8: If you have a driver provided by your phone manufacturer, click on the "Have Disk..." button. Insert your disk, click "OK" and then choose the model of phone that you have.
    [Show full text]
  • Third BUSINES Superbrands-2010-Final 6/1/11 12:46 PM Page 92
    Third BUSINES Superbrands-2010-final 6/1/11 12:46 PM Page 92 Market safeguard and keep open cyber highways is a imminently powerful, year after year. Cyberspace is full of creepy crawlies. Consider source of abiding comfort for millions of In 2007, for instance, International Data the latest gremlins – Pillenz, Bamital, Sefrnit, internet users. Corporation (IDC) recognised Symantec in a Pylespa, Daonol, Zbot and Tidserv and add the Its success can be attributed to keeping its wide range of award categories including Data old, broad-spectrum favourites, spyware, adware, ears to the ground and developing technologies Protection and Recovery; Cross-platform worms, viruses, trojans and spam and you’ve that synchronise with the needs of customers. provider of Clustering and Availability; Email entered the world of cyber crime.These are the To accomplish this feat the company has created Archiving Applications; Security and Vulnerability pests which have made working on a PC or a unique web called the Symantec Global Management; and Policy and Compliance, and laptop a forgettable nightmare.The universal Intelligence Network.This is an extraordinary Host and Vulnerability Software; plus an award quest for a protector has thrown up several resource which provides a real-time view of for software developed for Messaging Security names but the one that has become virtually emerging digital threats almost anywhere in the and Virus Protection. synonymous with computer software, world. With more than 40,000 sensors in 180 In the same year, Gartner rated the company particularly in the realms of security and countries and more than 6200 managed security as Global Market Share Leader in Enterprise information management, is Symantec.
    [Show full text]
  • India Business Volume 2 Symantec Size
    Business Superbrands- 2nd edition(Main) 8/27/08 4:12 AM Page 136 Market 30% of the world’s email traffic. At the as Global Market Share Leader in Enterprise Adware, spyware, worms, viruses, trojans, company’s three security operation centres – Backup; Backup and Recovery Software; Core spam… computer users the world over are one of which is in India – employees analyse Storage Management Software; and Email Active now familiar with these gremlins that often and correlate emerging threats to help Archiving. Between 2006 and 2007, in the make working on a PC or laptop a nightmare. customers prepare for and withstand attacks. Gartner Magic Quadrants, the company was There is a universal quest for a protector.The Powerful protection – and only available from listed as a leader in PC Configuration Life Cycle one name that has become virtually Symantec – is the company credo. Its pedigree Management; Managed Security Services synonymous with computer software, is supported by other illustrious names and Providers (NA); Storage Services; Security particularly in the realms of security and includes industry leaders such as Veritas, Altiris Information and Event Management; Email information management is Symantec. and Brightmail (Source: archival data). Active Archiving; Content Monitoring and Headquartered in Cupertino, California, the Filtering for Data Loss Prevention and Email US$ 5.19 billion (Rs. 20,760 crore) company Achievements Security Boundary. operates in more than 40 countries and is part Its aptitude to successfully integrate acquired During the last two years, the accolades and of the NASDAQ and Fortune 500 listing. technologies has kept Symantec at the front of recognition have been overwhelming.
    [Show full text]
  • Yes, Virginia, There Really Is a Norton
    05_579932 bk01ch01.qxd 2/24/05 10:44 PM Page 9 Chapter 1: Getting to Know Norton Products In This Chapter ߜ Appreciating Norton’s long history in the PC help biz ߜ Figuring out exactly who Norton is ߜ Getting to know Norton products by type ven if you’re brand-spankin’-new to computers, and before you pur- Echased your Norton software, you probably heard or read the name Norton many times. In fact, Norton is one of the relatively few PC-industry names that has been with us since early on in the history of personal com- puters. If you only knew how many companies have gone bust or been bought up by bigger firms over the last two-plus decades, you would be astounded! This chapter introduces you to the various tools that are available under the Norton name (plenty!). Here, I focus in on the type of software, because you have so many different ones to choose from. Just as finding and using the right tool in your household tool chest is important when you’re want- ing to do a specific repair, choosing the right Norton product for the PC protection, repair, or maintenance job you face is important — and in this chapter, I help you do just that. Norton: A Name Long Associated with PC Care IBM’s name is still associated with the original PC-class computer that rolled out in 1981. This is true even though so many other manufacturers have joined theCOPYRIGHTED PC design and rollout industry. MATERIAL Not very long after the debut of the IBM PC, the name IBM was joined by the name Norton for some of the first utilities created to help consumers work with those PCs.
    [Show full text]
  • Fax Sharing User's Guide
    Fax Sharing User’s Guide February 2000 WinFax PRO Fax Sharing User’s Guide Copyright Notice © Symantec Corporation 2000 All rights reserved. The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language in any form by any means without the prior written consent of Symantec Corporation. Information in this manual is subject to change without notice and does not represent a commitment on the part of the vendor. Federal copyright law permits you to make a backup of this software for archival purposes only. Any other duplication of this software, including copies offered through sale, loan, rental or gift is a violation of law, and subject to both criminal and civil penalties. Notice to WinFax PRO Users It shall be unlawful for any person within the United States to use any computer or other electronic device to send any message via a facsimile machine unless such message clearly contains, in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date and time it is sent and an identification of the business, other entity or individual sending the message and the telephone number of the sending machine or such business, other entity, or individual. Trademarks Symantec, the Symantec logo, TalkWorks PRO, Cover Your Voice, WinFax PRO, Cover Your Fax, and pcANYWHERE are trademarks of Symantec Corporation and its subsidiaries. AOL is a registered trademark of America Online, Inc.
    [Show full text]
  • DLCC Software Catalog
    Daniel's Legacy Computer Collections Software Catalog Category Platform Software Category Title Author Year Media Commercial Apple II Integrated Suite Claris AppleWorks 2.0 Claris Corporation and Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 1.0.2 --> 1.1.1 Update Apple Computer, Inc. 1984 400K Commercial Apple II Operating System Apple IIGS System 1.1 Apple Computer, Inc. 1986 800K Commercial Apple II Operating System Apple IIGS System 2.0 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.1 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.2 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 4.0 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 5.0 Apple Computer, Inc. 1989 800K Commercial Apple II Operating System Apple IIGS System 5.0.2 Apple Computer, Inc. 1989 800K Commercial Apple II Reference: Programming ProDOS Basic Programming Examples Apple Computer, Inc. 1983 800K Commercial Apple II Utility: Printer ImageWriter Toolkit 1.5 Apple Computer, Inc. 1984 400K Commercial Apple II Utility: User ProDOS User's Disk Apple Computer, Inc. 1983 800K Total Apple II Titles: 12 Commercial Apple Lisa Emulator MacWorks 1.00 Apple Computer, Inc. 1984 400K Commercial Apple Lisa Office Suite Lisa 7/7 3.0 Apple Computer, Inc. 1984 400K Total Apple Lisa Titles: 2 Commercial Apple Mac OS 0-9 Audio Audioshop 1.03 Opcode Systems, Inc. 1992 800K Commercial Apple Mac OS 0-9 Audio Audioshop 2.0 Opcode Systems, Inc.
    [Show full text]
  • (CRCS) Release 6.0 Installation
    Conference Reservation and Control System (CRCS) Release 6.0 Installation 555-027-109 Comcode 108382085 Issue 1 April 1999 Copyright© 1999 Lucent Technologies Inc. Users outside of the US and Canada should contact their local All Rights Reserved authorized Lucent Technologies distributor if they want to order Printed in U.S.A. additional copies of this document. Also, users in these countries should send any comments on the document to their local authorized Lucent Technologies distributor. Notice Lucent Technologies Inc. Fraud Intervention While reasonable effort was made to ensure that the information If you suspect you are being victimized by toll fraud and you need in this document was complete and accurate at the time of technical support or assistance, call the BCS Technical Service printing, Lucent Technologies Inc. and its authorized agents Center Toll Fraud Intervention hotline at 800 643-2353. cannot assume responsibility for errors. Changes and/or corrections to the information contained in this document may be Comments incorporated in future issues. Names and addresses used for To comment on this document, complete and fax in the comment examples throughout this guide are fictitious. card at the end of the document. Your Responsibility for Your System’s Security Technical Support You are responsible for the security of your system. Lucent Call: Video Technical Center (VTC) Technologies Inc. does not warrant that this product is immune 800 242-2121 then follow the prompts for video from or will prevent unauthorized use of common-carrier conferencing telecommunications services or facilities accessed through or connected to it. Lucent Technologies Inc.
    [Show full text]
  • Technical Specs Intellisoft Group Products Work Best When Installed on Platforms with the Following Specifications
    Technical Specs IntelliSoft Group products work best when installed on platforms with the following specifications. It is critical to keep your platforms updated with Microsoft Windows® critical updates. IntelliSoft Group products can be deployed in Client/Server, Intranet/Web, or SaaS implementations. IntelliSoft Group Client/Server and Intranet/Web solution are installed within Customer networks. IntelliSoft Group SaaS solutions are hosted within IntelliSoft group's secure facilities and are continuously monitored and maintained. A full Disaster Recovery and Application Failover protocol is maintained at all times providing continuous Service Uptime. Client Recommended Minimum Requirements Processor Intel® Pentium® 4, 1.8GHz or above RAM 8GB or above Available Hard Disk 40GB or above Windows 7 Professional SP1, Windows 8 Professional, Operating System Windows 8.1 Professional, Windows 10 Professional Microsoft Office Microsoft Office 2003 SP3 32-bit, 2007 SP3 32-bit, 2010 Suite SP2 32-bit, 2013 32-bit IntelliSoft IntelliSoft PDF Writer (Included) Convenience Modules Office Control 4.0.1.0 for Microsoft Office (Included) Microsoft Fax 5.2 or Higher, Microsoft WinFax 10.03 or Faxing Software Higher2 Scanning Software Imaging Professional 2.8.2 (Included) Document Reader Adobe Acrobat Reader 8.0 or Higher Authentication/Single LDAP (Optional) Sign On IE 8, IE 9, IE 10 (In compatibility mode), IE 11 (In Browser compatibility mode) 7-Zip (included) licensed under the GNU LGPL license. File Zip Software For more info see www.7-zip.org. Practitioner
    [Show full text]
  • [Amok] S/N: 1299275 a Smaller Note 99 2.08 Firstname
    LETRA A A Real Validator 1.01 Name: ubique.daemon [AmoK] s/n: 1299275 A Smaller Note 99 2.08 FirstName: ViKiNG LastName: Crackz Company: private Street: ViKiNG Zip: 11111 City: Crackz Code: 19147950 Order: 97234397 A.I.D 2.1 s/n: AD6778-A2G0 A.I.D. 2.0.2 s/n: AD6778-A2G0T A+ Math 1.0 Name: (Anything) s/n: 8826829 A+ MathMAT 1.0.0 Name: TEAM ElilA s/n: 8826829 A-1 Image Screen Saver 4.1 s/n: B5K7ij49p2 A1 Text Finder 4.02 s/n: PCSLT3248034 ABCPager 1.6.4 Name: Sara s/n: 1DQDSSSSSSSS ABCPager Plus 5.0.5 Name: Sara s/n: M5N5SSSSSSSS Ability Office 2000 2.0.007 Name: Ben Hooks s/n: 12878044-01034-40997 Ability Office 2000 2.0.005 Name:Nemesis] Organization:TNT s/n: 15155445-37898- 08511 Ablaze Quick Viewer 1.6 Name: Hazard s/n: 81261184XXXXXXX Abritus Business 2000 3.02 Name/Company: (Anything) s/n: 1034-314-102 Abritus Business 2000 3.02 Name/Company: (Anything) s/n: 1034-314-102 Absolute Fast Taskbar 1.01 Name: (Anything) s/n: nxpwvy Absolute Security 3.6 Name: Evil Ernie 2K [SCB] s/n: GMKKRAPZBJRRXQP Absolute Security Pro 3.3 Name: C0ke2000 s/n: GPBKTCNKYZKWQPJ Absolute Security Standard 3.4 Name: Hazard 2000 s/n: ECHVNZQRCYEHHBB or Name: PhatAzz [e!] s/n: RBFXPLUMBPGDFYW Absolute Security Standard 3.5 Name: embla of phrozen crew s/n: LTPDTDMAEHNKNTR AbsoluteFTP 1.0 beta 6 Name: CORE/JES Company: CORE s/n: 00-00-000000 Exp: never Key: 1074 2875 9697 3324 3564 AbsoluteFTP 1.0 Final Name: CORE/JES Company: CORE s/n: 00-00-000000 Exp: Never Key: 1074 2875 9697 3324 3564 AbsoluteFTP 1.0 RC 11 Name: _RudeBoy_ Company: Phrozen Crew s/n: 02-01-
    [Show full text]
  • Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc
    Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is sold AS IS and WITHOUT WARRANTY. You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc. “ Syngress: The Definition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. Unique Passcode 28475016 PUBLISHED BY Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Drive Burlington, MA 01803 Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.
    [Show full text]