We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for soft.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

soft(inspection) - List of Manufacturers, Suppliers, Companies and Products

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

soft Product List

1~15 item / All 26 items

Displayed results

【SOLIDWORKS Inspection】

A communication tool that allows for easier, faster, and more accurate creation of inspection reports.

"I want to switch from the current tool to another tool." "I want to introduce 3DCAD." For such customers, we propose the most suitable tools for their business and environment, and we support a series of requests from operational methods after implementation to maintenance. SOLIDWORKS Inspection is a communication tool that allows you to create inspection reports easily, accurately, and quickly. It is software for First Article Inspection (FAI) and process inspection, automatically and easily generating ballooned inspection drawings and inspection reports (such as AS9102 and PPAP). Since SOLIDWORKS Inspection consists of a standalone application and a SOLIDWORKS add-in, users can utilize existing data regardless of file format (SOLIDWORKS files, PDF, TIFF). *For more details, please contact us or download the catalog.*

  • 3D CAD

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Offline programming software "Robotmaster"

Two selectable editions! Equipped with numerous features to simplify tasks and generate programs in a short time.

"Robotmaster" is an offline programming software that maximizes robot productivity and creates new added value. With a powerful and user-friendly UI, it allows for the creation of complex and error-free programs in a short time, even without specialized knowledge of robot programming. You can choose between two editions: a standalone version that generates trajectories directly from CAD models and a bridge version that imports tool paths from CAM. 【Features】 ■ Maximizes robot productivity ■ Powerful and user-friendly UI ■ Achieves an average reduction of 70% in work time ■ Includes numerous features that simplify tasks and enable quick program generation for those starting to use robots *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other industrial robots
  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PICWave (Photonic IC/Laser /SOA)

PICWave is software for designing photonic integrated circuits (PICs) that include active devices such as semiconductor lasers and SOAs.

PICWave is a photonic integrated circuit (PIC) design tool which brings together: an advanced laser diode and SOA model, a powerful photonic integrated circuit (PIC) design and simulation tool, a flexible design flow environment. The combination of the laser diode and photonic integrated circuit design capability allows you to characterise any laser diode geometry and model photonic circuits that include both passive and active components.

  • Company:CTflo
  • Price:Other
  • Contract Analysis
  • Analysis Services
  • Other physicochemical equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Digitizer、 SCAPP software option

An SDK option for performing computational processing of data acquired by a digitizer at supercomputer-level speeds using Nvidia's CUDA.

Spectrum Instrumentation GmbH in Germany released a new SDK, the SCAPP software option – the Spectrum CUDA Access for Parallel Processing – on November 20, 2017. SCAPP is an SDK option that uses Nvidia's CUDA standard (CUDA is a parallel computing architecture that utilizes GPUs with 256 to 5,000 processing units provided by NVIDIA) to perform computational processing of data acquired by digitizers at supercomputer-like speeds. With CUDA, it is possible to execute data conversion, filtering, accumulation and averaging, baseline correction, window processing, and FFT at supercomputer-like speeds (up to 12 TFLOPS). The SCAPP package is an extension of drivers that enable Remote Direct Memory Access (RDMA), and it supports the M4i series and M2p series under Linux.

  • Other electronic measuring instruments

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

DomainTools, an OSINT tool with one of the largest investigation scopes in the world.

An OSINT tool with over 20 years of research experience and the world's largest database covering 97% of the internet.

Open-source intelligence (OSINT) tools that are also implemented in government agencies and banks. With over 20 years of accumulated data and real-time monitoring, they quickly detect threats and vulnerabilities related to domains, DNS, and IP addresses. Supports data integration with major threat intelligence, SOAR (Security Orchestration, Automation and Response), and SIEM (Security Information and Event Management) services. Not only ideal for defense against external attacks, but also for protecting brands and information assets, as well as for professional digital investigations. We also offer the information visualization and analysis tool 'Maltego,' which can integrate DomainTools data.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Data] Setting, Auditing, Analysis, Counter Services 'PowerDMARC'

Reporting and threat analysis, DKIM third-party authentication! Information on value and support systems included!

This document introduces the anti-phishing email measures, settings, audits, analyses, and counter services provided by 'PowerDMARC'. It covers issues related to email, the differences between SPF & DKIM vs S/MIME, and data privacy with PowerDMARC. By setting the report email destination to this service, XML parsing can be performed to generate graphs and analyze IP addresses. 【Contents (partial)】 ■ Phishing emails used as attack tools ■ Emails that do not arrive ■ PPAP issue ■ Technical specifications ■ SPF (Sender Policy Framework) *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Eureka Chronos: NC Optimization Software

A simulation tool equipped with AI that optimizes sending speed with easy operation.

【Eureka Chronos Features】 The artificial intelligence (AI: Artificial Intelligence) algorithm (patented by Roboris Sir) automatically adjusts the feed rate based on the actual cutting tool conditions, maintaining the amount of material removed (VR) as constant as possible over time, enabling the optimization of cutting processes. It is possible to achieve a reduction in processing time of over 30% compared to conventional cutting processing times.

  • simulator

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

List of SOLIDWORKS Products

A clear introduction to the range of "SOLIDWORKS" products developed as a multi-product line!

Digital design services offer the product design tool "3D CAD/SOLIDWORKS," which combines usability, functionality, and implementation cost. This catalog provides a clear introduction to the range of "SOLIDWORKS" products. For customers who want to switch from their current tools to a different one or want to implement 3D CAD, we propose tools suitable for their business and environment, and we support them with a series of requests from operational methods after implementation to maintenance. [Contents] ■ Product Design ■ Design Verification ■ Product Data Management ■ Communication ■ SOLIDWORKS Features/Tool Names/Packages, etc. *For more details, please refer to the PDF document or feel free to contact us.

  • 3D CAD

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

BIM tools for architecture, civil engineering, and construction execution [AEC Collection]

Reduce construction costs with BIM and enhance productivity and competitiveness - Let's start with Revit.

◆What is the AEC Collection? The AEC Collection is a group of products offered by Autodesk, a company well-known for AutoCAD. Centered around the BIM software Revit, it provides several essential software tools for projects, including 2D CAD and 3D CAD, at an affordable price. As the name "Architecture, Engineering & Construction Collection" suggests, one of its attractions is the wide range of applications, covering civil engineering, architecture, facilities, structures, construction, and related manufacturing fields. It is also effective in scenarios requiring simulation and visualization. ◆Benefits of Using the AEC Collection - Projects can be visualized with BIM models Quick responses to planning, multiple proposals, and revisions are facilitated, promoting consensus. - Improved understanding of projects and decision-making Utilizing mobile devices makes communication even easier. - Original data can be shared both internally and externally In addition to cloud usage, all project participants from different fields can use the AEC Collection, reducing compatibility issues and enabling smoother collaboration.

  • 3D CAD
  • 2D CAD Construction

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Free Trial: Email Spoofing Protection 'PowerDMARC'

Measures against "spoofing emails" to create an environment where customers can trust email delivery and ensure that emails are reliably received.

Spoofing emails refer to the practice of sending emails that impersonate a company or individual, with the intent to infect with viruses or direct recipients to fake websites. Don't you often receive spoofing emails and think, "Isn't there something that can be done about this?" If an email impersonating your company reaches: - Business partners - Customers and causes damage, your company, which has not taken measures against spoofing emails, may be deemed to have "not taken necessary levels of countermeasures" and could bear liability for damages (Civil Code Article 709). In recent years, over 70% of security incidents have originated from emails. To protect email security, SPF, DKIM, and DMARC have been established as standard specifications. While setting up SPF, DKIM, and DMARC is easy for infrastructure engineers, the recent shift to cloud infrastructure has led to a loss of skills in DNS and email configuration. Using PowerDMARC makes it easy to set up SPF, DKIM, and DMARC. You can also audit email delivery status through clear "visualization"! For more details, please download the catalog!

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • Email/Fax transmission

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

General-purpose finite element method analysis NX Nastran

General-purpose finite element method analysis

Nastran is widely used across all major manufacturing sectors and has unique features such as system modeling/substructuring (super elements), dynamic response analysis, and solution customization (DMAP), making it the industry standard for advanced system-level analysis in the automotive, aerospace, defense, heavy machinery, and shipbuilding industries.

  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Explanation of Invoices and Revised Electronic Bookkeeping Law] Accidents and Troubles That May Occur in the Manufacturing Industry

Have you been receiving suspicious emails lately? Fake invoices from impersonation emails created by tools like ChatGPT are being sent to your company.

The invoice system will begin on October 1, 2023. Additionally, the revised Electronic Bookkeeping Act will become mandatory starting January 1, 2024. As a result, the entire industry has started to send invoices electronically. This raises the issue of "spoofing emails (phishing emails)." With the advent of generative AI like ChatGPT, it has become possible to create emails in natural-sounding Japanese, leading to an increase in cases where cybercriminals send sophisticated "fake invoices." If a fake email impersonating your company reaches your business partners or customers, the following problems may arise: - Personal information of employees or customers may be leaked, leading to lawsuits. - Important corporate secrets may be stolen and resold, causing your company to lose competitive advantage. - Company funds may be siphoned off. - Business partners may become infected with viruses through your company, resulting in huge compensation costs. (According to Article 709 of the Civil Code, your company may be deemed to have "not taken necessary measures" against spoofing emails and could bear liability for damages.) We have prepared a document that explains this situation in more detail and outlines potential solutions. Please download it and use it to ensure safe operations!

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • Email/Fax transmission

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Protecting your business from intellectual property theft due to cyber attacks【PowerDMARC】

Rapidly increasing cyber attacks from China! The targets are the intellectual properties of small and medium-sized enterprises, such as technology, designs, and patents. If we don't protect ourselves, the company could be in crisis!?

Do you think that cyber attacks only target large companies? In reality, cybercriminals often first infect small and medium-sized enterprises with viruses, and then embed viruses in emails sent to large companies from there. The small and medium-sized enterprises that are used as stepping stones have all their intellectual property and client information stolen. They then face mass production of similar products in countries like China, leading to price competition that results in losses. Furthermore, they may be held responsible for infecting large companies with viruses and could face liability for damages (as it falls under the tort of Article 709 of the Civil Code). The actual flow of an attack typically begins with sending emails that impersonate employees of the target company or disguise themselves as clients to employees of that company. Once someone opens the email, they get infected, and the infection spreads from there. In other words, eliminating the initial "spoofed emails impersonating internal or external individuals" is crucial for protecting both your company and your clients. So, what should be done to eliminate spoofed emails? The materials provide a detailed explanation of the above content. We highly recommend downloading them and starting your countermeasures immediately.

  • Company:Spelldata
  • Price:100,000 yen-500,000 yen
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration