In order to help you to evaluate and use our product we have prepared an trial version that is freely available for download.
Trial version is limited to emulator/simulator only, you cannot use that on a real device. There is however no expiration date of a trial, so feel free to use it for any amount of time you need for the evaluation or even an actual development.
Please drop us an email about your SeaCat experience, you will help us to make product even better. Also, we will be more than happy to support you in your journey with SeaCat, so just tell us and we will gladly assist you.
iOS and Mac OS X
- SeaCat Tutorial series
The SOFTWARE PRODUCT (SeaCat trial) is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties.
BY USING THE SOFTWARE PRODUCT, YOU ARE AGREEING ON BEHALF OF THE ENTITY USING THE SOFTWARE PRODUCT ("COMPANY") THAT COMPANY WILL BE BOUND BY AND IS BECOMING A PARTY TO THIS LICENSE AGREEMENT ("AGREEMENT") AND THAT YOU HAVE THE AUTHORITY TO BIND COMPANY. IF COMPANY DOES NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, DO NOT USE THE SOFTWARE PRODUCT. COMPANY HAS NOT BECOME A LICENSEE OF, AND IS NOT AUTHORIZED TO USE THE SOFTWARE PRODUCT UNLESS AND UNTIL IT HAS AGREED TO BE BOUND BY THESE TERMS.
Company may not use the SOFTWARE PRODUCT if Company is a direct competitor.
SOFTWARE PRODUCT is licensed as follows:
- Time span.
This license is granted for unlimited period of time.
This license allows Company to use SOFTWARE PRODUCT on an emulator of mobile device. Use of the SOFTWARE PRODUCT on physical mobile device is explicitly prohibited.
The SOFTWARE PRODUCT can be used only for evaluation and software development and testing. Any other uses require written confirmation from TESKALABS LTD. Using SOFTWARE PRODUCT to generate profit is prohibited unless you are granted with written confirmation from TESKALABS LTD.
- Time span.
- DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS
- Copyright Notices.
You must not remove or alter any copyright notices on any copy of the SOFTWARE PRODUCT.
You may not distribute or sell whole or any part of the SOFTWARE PRODUCT to third parties. License will be revoked if distributed or sold to third parties.
You may not rent, lease, or lend the SOFTWARE PRODUCT.
You are not allowed to modify the SOFTWARE PRODUCT in any way. License will be automatically revoked when the SOFTWARE PRODUCT is modified.
- Copyright Notices.
All title, including but not limited to copyrights, in and to SOFTWARE PRODUCT and any copies thereof are owned by TESKALABS LTD.
- NO WARRANTIES
TESKALABS LTD expressly disclaims any warranty for the SOFTWARE PRODUCT, which is provided 'as is' without any express or implied warranty of any kind, including but not limited to any warranties of merchantability, non-infringement, or fitness of a particular purpose.
- LIMITATION OF LIABILITY
In no event shall TESKALABS LTD be liable for any damages due to use of SOFTWARE PRODUCT, to the maximum extent permitted by law. This includes without limitation, lost profits, business interruption, or lost information. In no event will TESKALABS LTD be liable for loss of data or for indirect, special, incidental, consequential (including lost profit), or other damages. TESKALABS LTD shall have no liability with respect to the content of the SOFTWARE PRODUCT or any part thereof, including but not limited to errors or omissions contained therein, libel, trademark rights, business interruption, loss of privacy or the disclosure of confidential information.
Need a help?
Have a question we didn’t cover?
Do you have comments or feedback?
Feel free to contact me at email@example.com.
Data encryption tool for GDPRMore information
You Might Be Interested in Reading These Articles
Containerization is an alternative for full machine virtualization. You probably know well-known containerization technology from Docker or Rocket. However, this article addresses the pros and cons of mobile “containerization” or wrapper used to isolate the mobile app from the mobile operating system or other applications installed on the same device. These type of “containerization” work in a different way.
Published on September 27, 2016
Using scalable and reliable software is vital for the success of any large-scale IT project. As increasing numbers of transactions are made, application infrastructure needs to stand strong and support that growth, and not be another source of problems.
Published on January 17, 2017
Mobile applications use HTTP communication between the application backend and the clients. Because of the demand for higher level of security, IT people implement HTTPS by setting up certificates issued by LetsEncrypt Certification Authority in their application backend server. The shift between non secure HTTP connections to HTTPS connections leads to a significant increase of amount of data being transferred from/to the clients. How is this possible?
Published on June 14, 2016