Corel has released a new set of tools for creating enterprise application graphics that meet industry recommendations. The struggling Canadian software company on Monday released Smart Graphics Studio ...
Corel has released a new package of its WordPerfect Office software designed specifically for use by small businesses. WordPerfect Office 12 - Small Business Edition, announced on Tuesday, is aimed at ...
Corel, which is owned by KKR, said it plans to separate its business into two independent companies.
Made available Tuesday as a free download, Snapfire includes image organization and sharing capabilities. Until now, the platform-in-the-making was code-named Alta. "You can create images, put them in ...
Popular virtualization software company Parallels has been acquired by Corel. The creative software veteran who has produced Corel Draw, WordPerfect, and Painter Pro says it will put “significant ...
Corel today announced Corel® Home Suite, a new collection of applications for running efficient households and sparking creativity in families. An ideal solution for the home PC user, the new suite ...
Longtime software maker Corel, which in December purchased popular cross-platform virtualization software maker Parallels, was itself recently acquired by private equity firm KKR, according to a ...
Corel Corporation today introduced its all-new photo and video product, Corel Digital Studio™ 2010. Now it is simple, fast and fun for everyone to enjoy and share their favorite photos and videos all ...
Corel on Tuesday announced an updated version of WordPerfect Office, its rival to Microsoft's dominant Office suite. The new program, Corel WordPerfect Office X3, adds the ability to import and export ...
Corel is adopting a neutral approach to the electronic-document-format duel and updating its WordPerfect word-processing software to support fully both the OpenDocument Format (ODF) and Microsoft‘s ...
Several photo, video and other media editing programs from software maker Corel contain DLL hijacking vulnerabilities that could allow attackers to execute malicious code on users’ computers.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results