Axoft

ManageEngine Strengthens Unified Endpoint Management with Voice Commands and Geo-Fencing

ManageEngine Strengthens Unified Endpoint Management with Voice Commands and Geo-Fencing

ManageEngine, the real-time IT management company, today announced the launch of voice assistant and geo-fencing features for Desktop Central, its unified endpoint security and management solution. Available immediately, the latest version of Desktop Central allows IT teams to manage endpoints via voice commands from the solution’s mobile app. This version includes a geo-fencing feature that closes IT security gaps by enforcing location-specific IT policies on mobile devices.

ManageEngine employs artificial intelligence (AI) in Desktop Central’s new virtual assistant, which comes integrated with its mobile app for Android devices. With the AI-powered virtual assistant, IT teams can perform complex tasks – such as scanning, detecting and deploying missing patches; performing asset scans; uninstalling software; blocking unauthenticated executables; prohibiting software; establishing remote connections; and shutting down and waking up computers – with a few quick voice commands. To further streamline endpoint management, Desktop Central adds geo-fencing capabilities that provide IT teams with location-specific security commands.

Endpoint management is critical to IT security because most security breaches originate from the endpoints,” said Mathivanan Venkatachalam, vice president at ManageEngine. “IT teams today spend a lot of time on redundant tasks, with one or more tools. Infusing AI, we could automate most of the complex endpoint management tasks using simple voice commands, saving a lot of time. Also, features like geo-fencing and remote OS deployment will reduce IT time and efforts as well as increase productivity.”

Highlights of the New Desktop Central

Virtual Assistant

Administrators can use voice commands on Desktop Central’s mobile app for Android devices to perform the following operations:

  • Patch Management: Scan a network for patches, detect and deploy missing patches, and ask for details on which computers in the network are vulnerable.
  • Software Deployment: Uninstall software, prohibit or block non-productive software and applications, apply licenses, and more.
  • IT Asset Management: Ask for hardware and software details of network computers as well as check license compliance status.
  • Remote Control: Initiate remote connections to a machine by saying its name.
  • Tools: Remotely wake up and shut down computers.

Geo-Fencing

The new geo-fencing will help IT teams automate IT security policies on a device based on its location, including locking it or completely wiping corporate data from the device if it leaves the established geographical range.

Remote Office OS Deployment

OS deployment to remote computers, being the most challenging and time-consuming task, is now made easy with the newest version of Desktop Central. Deploying OS images to a computer anywhere in the world at any time with a few simple clicks allows IT teams to master onboarding activities.

Pricing and Availability

Desktop Central is priced device per year and available for download at site. A fully functional, 30-day trial version is also available for download. Desktop Central can be installed on-premises or hosted on various cloud platforms and has a fully-functional free edition that can manage up to 50 endpoints.

About Desktop Central

Desktop Central is a unified endpoint management solution that helps in managing thousands of servers, desktops and mobile devices from a central location. It automates the complete desktop and mobile device management life cycle, ranging from a simple system configuration to complex software deployment. Used by more than 6,500 customers around the globe, it helps businesses cut costs on IT infrastructure, achieve operational efficiency, improve productivity, and combat network vulnerabilities.

Desktop Central Solution Overview ↵

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения

Trend Micro announced the improvement of the level of protection workstations

Trend Micro announced the improvement of the level of protection workstations

Trend Micro Incorporated, a global leader in cybersecurity solutions, has announced improvements to its offer to secure workstations. The product, which has undergone rebranding and has received the name Trend Micro Apex One™, sets a new level of security for workstations thanks to a wide range of new features available through a single software agent, managed from a local area network or within the SaaS infrastructure. The new offer from the company offers a simple way to significantly increase the effectiveness of automatic detection and response to complex threats, as well as provides up-to-date information on the state of protection, providing the maximum level of security for customers, the company said in a press release.

Information security professionals are increasingly overworked with the products that are required to protect endpoints. Increasing the number of alerts from security systems and logs that you want to monitor creates obstacles to respond promptly to advanced threats.

«The latest version of our program includes improvements that help solve the most common end-point security issues in the industry today, “says Kevin Simzer, executive director of Trend Micro. “Despite the claims of some so-called” next-generation vendors “, effective protection requires several levels of protection, which is a fundamental element of our strategy. Apex One ™ is a good choice for companies seeking to crowd out traditional anti-virus or looking for next-generation solutions».

Trend Micro Apex One™ offers customers the following three key features:

• Automatic detection and response:

Apex One ™ is based on XGen ™ security technology, a combination of multi-generation protection features and intelligent use of the right technology at the right time. Thanks to the Zero Day Initiative, under the auspices of Trend Micro, the product provides the most operational in the industry virtual patches for vulnerabilities, as well as protection technologies against the latest threats and complex attacks, such as non-file malicious code.

• Provision of up-to-date information:

Apex One ™ offers significantly enhanced Detection and Response (EDR) capabilities on workstations. Additionally, the Trend Micro Remote Detection and Response Service (MDR) is offered, providing expert support teams with threat control and monitoring alerts.

• Complexity of the solution:

Apex One ™ offers the widest industry-wide range of features offered through a single software agent, while many vendors still offer two or more programs. In particular, this is a multifunctional EDR Apex One ™ system that includes automated detection and response tools that simplify deployment processes and eliminate blind areas.

«Currently, decision-makers in the field of information technology can be confused with the emerging noise in the cybersecurity market. As for the safety of the workstations, I urge you to focus on actual performance, security enhancements, and flexibility of each solution being considered”, said Doug Cahill, senior cyber security analyst and ESG director. “Offering Auto Detection and Threat Investigation (EDR) capabilities in one agent, capable of providing all necessary protection promptly, Trend Micro offers the most up-to-date approach to endpoint protection.».

«In our work, we are faced with constant security challenges that require protection from growing threats, such as non-file malware and extortion programs, as well as compliance with security standards,” said Tim Masey, Carhartt Cybersecurity Director . “Currently, Trend Micro provides us with an effective endpoint security system, and we place high hopes on the advanced capabilities of Apex One™».

The form factor of the product, available from November 2018, as a single software agent, simplifies the deployment process at the same time and at the same time meets the most up-to-date security requirements. Apex One ™ is a substantially enhanced version of an existing Trend Micro OfficeScan product; Current OfficeScan users will receive Apex One ™ as a regular update without additional surcharges; Some features, such as the EDR investigation function, will require the purchase of an additional license.

Overview of the Apex One solution ↵

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения

F-Secure joins forces with Zyxel to protect home networks

wifi_lock

F-Secure joins forces with Zyxel to protect home networks

The offer for Internet service providers will include routers that provide fast connectivity and security to all user devices, such as laptops, tablets, smartphones, and even smart washing machines or refrigerators.

As part of the company’s collaboration, Zyxel network gateways are equipped with F-Secure Connected Home Security technology. The solution uses the F-Secure Security Cloud service and new ways to combat cyber threats thanks to artificial intelligence. The combination of these elements provides adequate protection against malicious software. The user will also be able to use the privacy protection function or parental controls, says the F-Secure press release .

According to Allen Lin, vice president of the Zyxel Broadband EMEA Business Unit:

“The popularity of Internet of Things (IoT) devices is growing, and they need to be properly maintained. That is why, together with F-Secure, we have developed a solution that protects all devices in the home network that Internet providers can now offer to their users.”

It is predicted that by 2021, up to 25 billion devices that connect to the Internet will be connected in the world, and, unfortunately, they are not always created to ensure the safety of users. In this case, routers are another “door” in our homes that also needs to be secured. F-Secure cooperates with more than 200 operators around the world and believes that the new solution will better protect users who use their services.

Zyxel has been a global network solutions provider operating in 150 markets for almost 30 years. Currently, 100 million of the company’s devices are used by operators, businesses and private users. The companies will present a new solution at the World Broadband Forum in Berlin, which will be held from October 23-25, 2018.

F-Secure Solution Overview

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения

SolarWinds released Database Performance Analyzer 12

SolarWinds_DPA

SolarWinds released Database Performance Analyzer 12

SolarWinds, a leading provider of powerful and affordable IT management software, today announced the launch of SolarWinds® Database Performance Analyzer (DPA) 12.0, powerful database and query performance monitoring, analysis and customization tool built for many popular, popular databases. The latest enhancements are designed to help database professionals quickly identify and determine the root cause of slow database queries, and easily optimize database tables to ensure the speed of business critical applications that rely on them.

The SolarWinds database performance analyzer is designed to provide high visibility to the performance of databases in hybrid environments – in the field, virtualized and in the cloud. The SolarWinds DPA provides effective information for database professionals with two completely new features: Table Tuning Advisor and Query Performance Analyzer.

The Query Performance Analyzer can help users determine the root cause of slow SQL queries. Detailed query profile data is intelligently displayed in a single view, which reduces the time spent searching for sources and correlating information.

“The table tuning advisor answers about 99% of what I want to know,” said Dale Fanning, director of database development and systems development, Regent University. “I think that he provides all the data necessary to make a decision about setting.”

The table tuning advisor is designed to proactively address one of the most difficult aspects of database management: indexing. The SolarWinds Advisor, DPA Table Tuning Advisor, helps identify and test index capabilities by tracking workload patterns and then advising users where a new index can help optimize inefficiencies.

“Databases are on the verge of application performance, and a slow database often leads to a slow application,” said Christoph Pfister, executive vice president of SolarWinds products. “Solving application performance issues without deep understanding of the database is a challenge at best. SolarWinds DPA 12.0 can help database professionals quickly solve performance problems with these new features that are designed to pinpoint where to focus on customization and indexing efforts to optimize the performance of their environment and reduce manual processes.”

The SolarWinds DPA is designed to provide seamless integration with SolarWinds network and system tools, including Network Performance Monitor (NPM) and Server & Application Monitor (SAM). Integration with features such as the SolarWinds® PerfStack™ toolbar is built to provide additional support for lock analysis that can help users find out where the lock-in incident occurred and the overall impact of this action, guided by information on future troubleshooting strategies.

SolarWinds DPA can be deployed on Windows or Linux, and it controls physical and virtual databases located on the background or in the cloud, including Microsoft® SQL Server®, Oracle®, MySQL®, MariaDB®, IBM® DB2® for Linux, UNIX® and for Windows (LUW), SAP® Adaptive Server Enterprise (ASE) SAP, as well as platform-like service (PaaS) databases, including Microsoft Azure® DB, Amazon® RDS and Aurora.

Detailed Review and System Requirements Database Performance Analyzer

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения

Microsoft releases Windows 10 IoT Enterprise 2019

4

Microsoft releases Windows 10 IoT Enterprise 2019

As early as October 1, 2018, Microsoft releases a new OEM version of Windows 10 Redstone 5 (RS5) worldwide.

The new line of IoT products Microsoft will provide the most affordable for today’s security and reliability of devices.

The Windows Embedded / IoT channel updates for existing LTSB cycles: Windows 10 IoT Enterprise and Windows 10 IoT Core, as well as an entirely new product – Windows 10 IoT Core Services.

Now the Microsoft IoT products line is represented by the following updated products:

• Windows 10 IoT Enterprise 2019 LTSC – the first since 2016 and the third LTSB (newly-LTSC) release in the long-link support channel (2015 and 2016 versions are still available). Contains all the new features released during this time in the standard CBB release, which include new processors, energy efficiency and performance optimization, improved security, Azure service, Kioskmode modification, eSIM support, highly-developed Assign Access, GDPR compliance (analogue our F-152), support for IoT Central and IoT Edge, advanced privacy settings and more. Does not update the version – “installed and forgot”.

• Windows 10 IoT Enterprise SAC is essentially the same CBB release (analogous to the desktop version with updates 2 times a year), but with a new name. “SAC” means “Semi-Annual Channel”, that is, an update every six months. It is in demand in those projects where the Windows Store is required and regular free functional updates.

• Windows 10 IoT Enterprise Upgrade – upgrade licenses for 2016 for already installed devices (Field Upgrade)

• Windows 10 IoT Core – A free version of the OS for compact devices, including the ARM CPU, with semi-annual updates. Download here.

• Windows 10 IoT Core Services – For the first time, Microsoft offers Windows Core as a subscription service for connected devices. Includes monitoring and update service through the IoT Core Device Update Center (DUC) and Device Health attestation and the 10-year LTSC support cycle.

Pricing of new products

• Windows 10 IoT Enterprise Product – remains unchanged. As before, the price depends only on the processor used in the device. The table of devices is presented on the site. The 2015 and 2016 versions will be available in accordance with the 10-year cycle (up to 2025 and 2026, respectively).

• Windows 10 IoT Core Services – is licensed under a subscription. The base price is $ 0.30 per device per month. Sold for 10 years, i.e. The cost of one license is $ 36, including cloud service for 10 years. Of course, the number of devices is important in pricing.

• Windows 10 IoT Core – remains free and free to download from Microsoft.

To get the distro of the trial version Windows 10 IoT Enterprise 2019 LTSC, contact AXOFT Ukraine Sales and Development, tel. +38 044 201 03 03 or e-mail sales@axoft.ua

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения

80% of all software in Ukraine – unlicensed, but the trend is improving

80% of all software in Ukraine – unlicensed, but the trend is improving

In Ukraine, 80% of software installed on computers does not have the necessary licenses. This is mentioned in the BSA Global Software Survey, which is regularly released by the Association of Software Manufacturers.

Since 2016, penetration of unlicensed software in Ukraine has decreased by only 2 percentage points. For comparison, in the US, this indicator of using pirated software is 15%.

The study also provides data on the volume and cost of unlicensed software installed on personal computers in more than 110 countries. So in Ukraine, according to the BSA, the cost of all software installed without licenses for 2017 was $ 108 million, which is almost 4 times less, that of neighboring Poland, 50% less than that of Romania and the Czech Republic, and almost comparable to the indicators Hungary. It is worth noting that in 2011 this figure was at $ 647 million and exceeded the figure of several countries in Central and Eastern Europe. Indicators of the decline in the cost of software primarily associated with the depreciation of the national currency.

If we take in money terms, Ukraine is on the fifth place after Russia ($ 1.2 billion), Poland ($ 447 million), Romania ($ 161 million) and the Czech Republic ($ 149 million) in Central and Eastern Europe. And in terms of percentage – in the sixth.

In general, the penetration of pirated software in the CEE region (Central and Eastern Europe) is 57%. Approximately the same level (50% and above) in Asia, Latin America, Africa and the Middle East. The lowest level of piracy, expected, is observed in North America (16%) and Western Europe (26%), which has an impact on the global statistics: for the world as a whole, the use of pirated software is 37%.

The BSA notes that the use of unlicensed software contributes to the growth of cyber attacks and is associated with financial losses. Infecting unlicensed software with malicious programs costs companies around the world at $ 359 billion a year.

Surprising facts of the use of pirated software by state and educational institutions. This is nonsense. On the one hand, this is at least a violation of laws, on the other hand, users lose many of the advantages that licensed software gives.

Still, if you understand what licensing software gives us and why it should be bought:

1. Buying licensed software, we avoid violation of laws.

2. Unlicensed software is hacked and often there is no possibility of updating the program, and this is especially critical in the case of antiviruses, firewalls and operating systems.

3. By purchasing software, you usually get the right to free technical support. Without which, sometimes it is simply impossible to correctly configure the operation of the program.

4. Licensed software almost always guarantees you a free update of the program within a certain period. It should be noted that almost any software contains these or other faults, without correction of which it is sometimes impossible to fully use it.

5. When hacking software, pirates often make significant changes to the distribution package, throwing out at least a library of drivers and other things that are not important to them.

6. Money invested in licensed software, contribute to further product improvement for the benefit of users. Buying the program, you stimulate the developers.

7. When the enterprise passes the certification procedure for compliance with the requirements of international ISO standards, work with licensed software is a mandatory requirement.

8. Violation of the requirements of copyright law may adversely affect the company’s reputation.

9. Very often pirated versions of programs incorporate viruses through which unauthorized persons gain access to the management of your PC or, in the light of recent events, your servers and individual PCs can become just machines for pirating the crypto currency, which will significantly affect the speed of the server and individual PCs in general.

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения

Orientation on iOS 12 with RAD Studio 10.3

Orientation on iOS 12 with RAD Studio

This week, Apple released a new version of its software, iOS 12. In the light of software updates from Apple, Embarcadero tested its product RAD Studio 10.2.3, the development environment for IOS. RAD Studio 10.2.3 now supports the creation of applications that can run on iOS 12 devices using the iOS 11 SDK and Xcode 9.X. Accordingly, currently the new version of the SDK and Xcode is not supported.

Embarcadero announces support for new releases of mobile devices Apple and Google in RAD Studio 10.3 and allow customers who need to use the beta version of RAD Studio 10.3 to solve the required tasks.

As a way to provide early support to their customers, in the “Subscription to Updates” section, Embarcadero invites customers to join their 10.3-beta Carnival program.

With the forthcoming beta build of RAD Studio 10.3, Embarcadero will provide orientation support for iOS 12 with the latest version of the SDK and Xcode. Although the usual beta limitations do not allow you to create and deploy production applications, the beta version will have a special EULA condition that allows you to deploy (extend) iOS applications in the Apple App Store. This is the same approach that Embarcadero used to allow beta testers to create and deploy applications for Android with a new API requirement.

Being able to participate in your beta program is one of the great benefits of updating a subscription. You can check how many days remain in the updated subscription using License Manager.

More detailed information about Embarcadero software solutions can be obtained from AXOFT managers by phone +38 044 201 03 03 or by e-mail: axoft@axoft.ua

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения

Rating of programming languages and development environments

Rating of programming languages and development environments

The developer Pierre Carbonnelle (Pierre Carbonnelle) published the rating of programming languages ​​PYPL for September 2018. According to him, Python outperformed the popularity of Java and got on the first line of the list. To calculate the index in PYPL, statistics are used for the search queries of the guides to languages.

To calculate the popularity index in PYPL, statistics on search queries are used. Also, the rating compares the latest data with the indicators of a year ago, that is, in September 2017.

Popularity rating of programming languages

Unlike the TIOBE rating, PYPL C and C ++ are considered together. But even this did not allow languages ​​to get into the top 5. Relatively new TypeScript and Kotlin for the year climbed a few lines of the rating on the 12th and 16th places respectively. Strongly passed the position in 2018 Perl and Delphi.

.

Dynamics of the popularity of languages ​​from the top 10

The graph below shows the dynamics of the popularity of the AP from the first ten, beginning in June 2004. It shows that the popularity of Java, JavaScript and MATLAB remains approximately at the level of 2004. Also there is a continuous growth of search queries for Python and R languages. In addition, Swift, which appeared in 2014, has not yet caught up with Objective-C in popularity.

Principles of the formation of PYPL

A sharp initial rise can be explained by the principles of rating. The tool calculates popularity based on how often Google users search the web for a language guide. The developer explains that he takes into account search queries with the name of the language and the word “tutorial”. This allows you to exclude, for example, requests with the word Python from users who study the behavior of snakes. The word “programming”, according to Carbonnell, will produce distorted results, because when searching for some languages, for example, PHP, users do not need to specify that it is programming.

This approach distinguishes PYPL from the TIOBE index. The latter counts the number of pages in the network with the mention of a certain language. However, according to the creator of PYPL, the presence of pages does not mean that someone is reading them.

The same system, focused on the search for manuals, displays the number of programmers studying a particular language. Carbonnell sees this as a more reliable source for PYPL. At the same time, when a new language appears, the management’s requests for it are inevitably increased and, accordingly, the take-off of its rating.

Popularity rating of development environments

The same developer created a tool that tracks the most popular IDEs. Rating of development environments is compiled similarly to PYPL, based on the frequency of search queries in Google with the word “download”.

In the top 5 as of September 2018 includes Visual Studio, Eclipse, Android Studio, NetBeans, and JetBrains, which has grown strongly over the last year IntelliJ. The strongest position was in Xocode in 2018. In the last place is Coda 2.

IntelliJ development tools from the company JetBrains, which strengthened its positions in the IDE market over the last year, also presented the portfolio of AXOFT Ukraine. JetBrains produces full-featured, powerful and easy-to-use software products for development in Java, Python, PHP, JavaScript, VB.NET and others. Get more detailed information about JetBrains solutions from AXOFT managers on +38 044 201 03 03 or e-mail: axoft@axoft.ua

Become an AXOFT Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

Last news

Invisible threats: Trend Micro announces growing threat of cryptomayning

Invisible threats: Trend Micro announces growing threat of cryptomayning

Trend Micro in the first half of 2018 recorded a 96 percent increase in the number of unauthorized cryptomoney detection cases compared to the entire 2017 and a 956 percent increase in this indicator compared to the first half of 2017.

Another important trend in the first half of the year is related to the spread of unusual types of malicious programs, such as file-based, macro and micro-file malicious software. Trend Micro recorded a 250 percent increase in the number of detections of one particular microfile file malicious program – TinyPOS – compared to the second half of 2017, which may be due to the increased ability of these types of malware to bypass security features that use only one protection mechanism.

Also in the first half of 2018, 15 large-scale data leaks were recorded, as a result of which more than one million records were stolen. Almost half of the leakage was the result of inadvertent disclosure of data, not malicious acts. Most of the leakage occurred in the health sector.

The full version of the report on the results of the study is available on the link.

“The observed change in the threat picture is consistent with what we have seen over the years: cybercriminals are constantly changing their tools, tactics and techniques to increase their infection rates,” said Jon Clay, director of the Trend Micro International Threats Division . -Standard indirect attacks using extortion programs, as well as stealing data became the norm, so attackers changed tactics to act more secretively, using other attack vectors that were not observed earlier or found widespread use. It follows that business leaders must assess their resources in order to provide sufficient protection that can withstand new and serious cyber threats.

Software Trend Micro

 

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения

JetBrains has released Rider 2018.2

JetBrains has released Rider 2018.2

The JetBrains team upgraded its cross-platform environment for .NET development Rider to version 2018.2. The new release includes Docker support for the debugger, built-in spell checker, unit-test code coverage and the ability to work with the MacBook Touch Bar.

What’s new in Rider 2018.2:

•The debugger has Docker support, improved call stack display, and stop points for each thread in the case of multithreaded code.

•Two new launcher configurations have been implemented: Publish to IIS and Publish to custom server – To deploy the ASP.NET Core Web application on a local or remote server.

•Improved code autocomplete using an algorithm based on statistics. In addition, Rider draws attention to how often the user uses his hints and, depending on the feedback, makes corrections.

•The IDE setup adds the ability to create templates, as well as edit and manage them through Editor | Live Templates and Editor | File Templates.

•A redesign of the browser solutions: a new toolbar with icons to display all the files, browser and editor synchronization and several new navigation buttons.

•Updated macOS version: added MacBook Touch Bar support, new icons and dark theme for window headers.

•Integration with Unity: implemented support for .asmdef and csc.rsp files, Unity Reload Assembles in Play mode, invalid invalid warning = = null, and improved support for remote debugging..

•Together with the integration with dotCover environments, unit-test code coverage and support for continuous testing (Windows version only).

•Added a ReSpeller plugin for spell checking in identifiers, comments, and strings literal, as well as for quick correction of the detected error. In addition, support for C # 7.3, the Blazor pilot project and other features of ReSharper 2018.2 are implemented.

•There are new features for frontend development: Support for TypeScript versions 2.9 and 3.0, improved integration with React, Angular and Vue.js.

•The contents of the context menu C # Interactive added the Reference option, and, in addition, updated support F# и NuGet.

A complete list of updates available on the page What’s New в блоге JetBrains, dedicated IDE Rider.

In August 2018, a new version of the whole family of tools for .NET-development – ReSharper Ultimate 2018.2 has also been released. It includes the update to RеSharper, which received support for C # 7.3, built-in spell checker, and several new navigation features..

Download JetBrains Rider:

»»»Free Trial (30-day)

 

Стать партнером Axoft

Рады сотрудничеству с AXOFT!
Заполните и отправьте данную форму.
Мы с вами свяжемся по обсуждению условий сотрудничества.

акционные предложения