yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

MY True Cloud Announces the Release of “Invisible Cloud-Token”

MY TrueCloud’s Invisible Cloud-Token uses proprietary technology to deliver the industry's only token-less solution that delivers above military grade proprietary 2-Factor Authentication security via the Cloud and the users’ browser.

Invisible Cloud-Token addresses the 2 biggest concerns of adopting 2-Factor Authentication, end-user adoption and high-costs. MTC’s proprietary algorithms empower the browser to manage the process of One Time Passwords (OTPs) totally invisible to the end-user – adoption is automatic. Also, with no need to have a secondary device, companies can realize significant savings using a 100% cloud technology.

“Invisible Cloud-Token is a true game changer. It sets a new industry standard for secure SaaS platforms in a Mobile world. Invisible Cloud-Token combined with MTC’s advance cloud based collaboration platform provides the industry’s only secure token-less solution suite for companies pursuing a mobile strategy. Based on our years of research and development and listening to our customers, we feel Invisible Cloud-Token allows for cost-effective mobile deployment across the enterprise which will be a huge home run for our customers,” explains Mitch Alcon, CEO.

Data privacy concerns must be addressed before companies can take full advantage of mobile technology. Passwords offer only single factor authentication and are relatively easy to breach. 2 Factor Authentication using Hardware Tokens in various forms have been introduced to mitigate the real threat of password theft. However, hardware tokens are expensive to deploy and are easily lost or forgotten. Invisible Cloud-Token solves these problems by providing a unique, on-demand solution with the strength of both passwords and tokens without the disadvantages of low security and high deployment costs of physical tokens.

Invisible Cloud-Token is a completely web based two factor Authentication method which requires a SSL/VPN portal. You can use your existing VPN, or purchase MTC’s SSL/VPN with proprietary tunneling technology that optimizes MTC’s token-less technology. Your browser is enrolled when used for the first time with a technology that seamlessly configures your browser and integrates a OTP-token into it. A SMS OTP seed is placed in the browser and the next time authentication occurs, a script automatically generates and sends a OTP. Invisible Cloud-Token utilizes a proprietary algorithm that completely removes the SMS OTP seed to prevent the possibility of hackers reverse-engineering the authentication code to gain unauthorized access.

MY TrueCloud is a secure mobile cloud platform that addresses the key issues of data privacy and costs of mobile deployment. The key benefits of Invisible Cloud-Token 2 Factor Authentication are low cost, ease of deployment, convenience and state of the art next generation security. Invisible Cloud-Token is based on industry standards; it uses HTML5 and OATH, runs on any platform that is HTML5 enabled, including Windows Desktop, Android, Blackberry, Java ME and iOS Devices. End users can continue to use password-based authentication and existing passwords in directories such as LDAP or Active Directory.

“We are confident that our comprehensive SaaS collaboration suite consisting of integrated Customer Relations Management (CRM), Document Management, e-Marketing, Project Management, Social Media, Chat and toll free Webinar/Video Conferencing in a single, secure Cloud application with strong 2-factor authentication, anywhere with any device will change the paradigm of how organizations work together to achieve shared goals,” explains Glen Passaretti, Manager Sales and Marketing.

MY TrueCloud is an Aliso Viejo, California based company. To learn more about Invisible Cloud-Token and our SaaS Cloud based collaboration solutions contact Glen Passaretti at 866-426-5485 or email

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or ma...
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid i...
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at, and Tomer Levy, co-founder and CEO of, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in ...
Application availability is not just the measure of “being up”. Many apps can claim that status. Technically they are running and responding to requests, but at a rate which users would certainly interpret as being down. That’s because excessive load times can (and will be) interpreted...
For almost two decades, businesses have discovered great opportunities to engage with customers and even expand revenue through digital systems, including web and mobile applications. Yet, even now, the conversation between the business and the technologists that deliver these systems ...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 17th Cloud Expo, Dave Nielsen, Developer...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers