List of Software (middle, driver, security, etc.) products
- classification:Software (middle, driver, security, etc.)
1321~1350 item / All 4086 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
Remote management software for all edge devices.
- Software (middle, driver, security, etc.)
ADLINK releases EdgeGO, remote management software for all edge devices.
● Efficient Edge Device Management: ADLINK's EdgeGO provides an all-in-one software solution for the remote and secure management of edge devices across various industries. ● Improved Operational Efficiency: Real-time alerts, remote troubleshooting, and comprehensive device monitoring enable efficient and secure operations. ● Optimized for Various Fields: EdgeGO caters to sectors such as manufacturing, smart cities, healthcare, and retail, ensuring optimal performance and device management.
Aiming to reduce the burden on the IT department! Posting about "the benefits of an integrated monitoring approach" and more.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Accurately grasp what is happening on the network! It is necessary to monitor and manage it rigorously.
- Software (middle, driver, security, etc.)
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
Easily automate workflows! Software that detects compliance risks.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Industry-leading Managed File Transfer (MFT) software
- Software (middle, driver, security, etc.)
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
We are releasing case studies on measures against cyber attacks that have resolved bottlenecks in network security!
- Software (middle, driver, security, etc.)
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
Published case studies of measures against cyber attacks that solved issues in the security operations department and the network operations department.
- Software (middle, driver, security, etc.)
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
Publication of case studies on reliable network monitoring and countermeasures against cyber attacks detected in a university environment.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Providing customers with peace of mind, excitement, and satisfaction! A civil engineering estimation system that enables more accurate calculations for faster and more precise bidding.
- Software (middle, driver, security, etc.)
Developing DJ equipment embedded programs and identification software for banknote recognition devices!
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
Simple operation and streamlined functions! It can be used efficiently even in laboratories that handle large-scale processing.
- Software (middle, driver, security, etc.)
(Benefits of upgrading to Bluehill Universal software from the old software for users)
This is a webinar for customers using the old Instron software (Bluehill 1, Bluehill 2, Bluehill 3, Bluehill LE). We will confirm the current software lifecycle stage for customers and explain the benefits of upgrading to the latest software, Bluehill Universal. Please feel free to join us. 【Seminar Content】 - Current status and risks of the software/PC you are using - Features of Bluehill Universal - Changes from the old software - (Demo) Representative functions of the software - FAQ 【Target Audience for the Seminar】 - Those using Bluehill Lite, LE, 1, 2, or 3 old software - Those using PCs with Windows 7 or earlier - Those considering updating to the latest software - Those who want to know about new features of the latest software - Those interested in touch panel PCs (dashboard/Windows 10 compatible) 【Presenter】 Shinpei Yamashita, Sales Specialist, Instron Japan 【Participation Fee】 Free 【Question Format】 Chat (always available)
Engineers conduct direct hearings to achieve fast software development that realizes the desired product.
- Software (middle, driver, security, etc.)
Automate visual inspections with easy operation! An AI appearance inspection solution that can be easily customized! We are currently offering a free summary of essential knowledge.
- Software (middle, driver, security, etc.)
- Development support tools (ICE, emulators, debuggers, etc.)
- Visual Inspection Equipment
DX solution site focused on the manufacturing industry is OPEN!
Matching the high-quality manufacturing site Challenging high-quality hardware manufacturing and solutions Applied, which handles a wide range of PCs for specific applications, proposes DX solutions focused on the manufacturing industry. From a single PC to the automation of visual inspections, we thoroughly support the digitalization challenges in manufacturing! We tackle the challenges of the manufacturing industry from unique angles that only Applied can offer, including our original specific-purpose PC, "Fablik PC."
Analysis software compatible with resource surveys that bring out the performance of AquaMagic.
- Software (middle, driver, security, etc.)
- Other measurement, recording and measuring instruments
- Other electronic measuring instruments
Analog waveform output software 'C-WaveformGenerator' compatible with APIs that can be controlled from external applications.
- Software (middle, driver, security, etc.)
- Expansion Boards
Released a new version of the analog waveform output software "C-WaveformGenerator" that supports APIs controllable from external applications.
We have released a new version of the free download analog waveform output software "C-WaveformGenerator" that supports API control from external applications. "C-WaveformGenerator" is PC-based software that can generate various waveform signals using our measurement and control boards with analog output capabilities. It can output waveform signals as a substitute for benchtop signal generators (function generators) and can be used to build measurement control and inspection systems. With the support for an API that allows control of various settings and the start/stop of waveform output from external applications, users can utilize the various waveform output functions of "C-WaveformGenerator" from their applications. During application debugging, you can adjust the output waveform using the GUI of "C-WaveformGenerator" like a benchtop measuring instrument, and switch to API control for starting/stopping output upon completion, thereby reducing the man-hours required for system construction.
Attention healthcare system administrators! This is the first step in information security measures!
- Software (middle, driver, security, etc.)
The system that was used in the past will be usable again.
- Software (middle, driver, security, etc.)
Threema OnPrem is secure communication that protects privacy.
- Software (middle, driver, security, etc.)
We will tackle the challenges of the "town" with a stamp rally app utilizing blockchain technology!
- Software (middle, driver, security, etc.)
Regardless of differences in evaluators or experience, we have achieved consistent judgments!
- Other measurement, recording and measuring instruments
- Software (middle, driver, security, etc.)
We will exhibit at the Solar Summit 2022 ONLINE.
We will be exhibiting for the first time at the DMM Online Exhibition. 【Date and Time】 March 30, 2022 (Wednesday) to April 1, 2022 (Friday) 10:00 AM to 6:00 PM https://exhibition.showbooth.dmm.com/events/solar2203/ The company booth is now open! Admission is free, so if you're interested, please join us.
Monitoring patient care and nurse carts using "iCAP" for the nurse station.
- Software (middle, driver, security, etc.)
Exploring how intelligent solutions enable a smart future together with all companies across industries.
- Software (middle, driver, security, etc.)
4GB DDR3 SODIMM memory & smart factory using SATA to CF card storage solution
- Software (middle, driver, security, etc.)
- SSD
Trouble Solved! Do you have concerns like 'I need to have multiple browsers on one device'?
- Software (middle, driver, security, etc.)
What are the key points when selecting a browser for HMI/UI in embedded devices? I will explain the options, considerations, and their advantages and disadvantages.
- Software (middle, driver, security, etc.)
Try out the new demo of the Espial browser.
We have prepared a new demo environment that operates with the "Espial Browser." Please experience the UI/UX created with HTML5/CSS3/JavaScript along with our browser. The demo version of the "Espial Browser" is available for both Linux and VxWorks versions running on the NXP i.MX8M Plus platform. If you have any requests for demos or evaluations, please feel free to contact us.
This is a browser that supports specifications such as Hybridcast, BML, and TTML, as well as ARIB, IPTV Forum, A-PAB, and JLabs.
- Software (middle, driver, security, etc.)
Try out the new demo of the Espial browser.
We have prepared a new demo environment that operates with the "Espial Browser." Please experience the UI/UX created with HTML5/CSS3/JavaScript along with our browser. The demo version of the "Espial Browser" is available for both Linux and VxWorks versions running on the NXP i.MX8M Plus platform. If you have any requests for demos or evaluations, please feel free to contact us.
Optimal for HMI/GUI tools! High-speed UI resource-saving WebKit browser for embedded devices.
- Software (middle, driver, security, etc.)
Try out the new demo of the Espial browser.
We have prepared a new demo environment that operates with the "Espial Browser." Please experience the UI/UX created with HTML5/CSS3/JavaScript along with our browser. The demo version of the "Espial Browser" is available for both Linux and VxWorks versions running on the NXP i.MX8M Plus platform. If you have any requests for demos or evaluations, please feel free to contact us.