List of Software (middle, driver, security, etc.) products
- classification:Software (middle, driver, security, etc.)
1546~1560 item / All 4114 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Provides integrated facial recognition features! Images can be organized in portfolios and collections.
- Software (middle, driver, security, etc.)
We support the replacement of old systems, software, and more. We accommodate various needs, including hardware replacements.
- Software (middle, driver, security, etc.)
AI appearance inspection solution Free PoC now accepting applications!
- Software (middle, driver, security, etc.)
- Development support tools (ICE, emulators, debuggers, etc.)
- Visual Inspection Equipment
PDF Development Toolkit (SDK)
- Software (middle, driver, security, etc.)
High-speed PDF creation, viewing, and editing software for thin client and virtualization environments.
- Software (middle, driver, security, etc.)
High-speed PDF creation, viewing, and editing software for thin client and virtualization environments.
- Software (middle, driver, security, etc.)
Virtual printer driver for creating PDF files
- Software (middle, driver, security, etc.)
[Development Kit for SIers] Set version of high-speed automatic PDF generation engine and SDK for large volumes of documents.
- Software (middle, driver, security, etc.)
Reliable PDF software that meets the strict selection criteria of businesses, local governments, and public institutions.
- Software (middle, driver, security, etc.)
It is a finite element method program that can analyze all components of the gearbox.
- Software (middle, driver, security, etc.)
Satisfied with the warning notification feature! Introducing cases where rapid problem-solving has become possible.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
A customizable web application specialized for facilities that utilizes a browser!
- Software (middle, driver, security, etc.)