List of Software (middle, driver, security, etc.) products

  • classification:Software (middle, driver, security, etc.)

1216~1260 item / All 4055 items

Displayed results

Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!

  • PRエリア.png
  • Other conveying machines

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.

  • Satech - AdaptaGuard_Ipros_2023_JP_1.jpg
  • Satech - BlueGuard_Ipros_2023_JP_1.jpg
  • Satech - EasyGuard_Ipros_2023_JP_1.jpg
  • Satech - FastGuard_Ipros_2023_JP_2.jpg
  • Satech - ImpactGuard_Ipros_2023_JP_1.jpg
  • Satech - EasyGuard_Ipros_2023_JP_Media-gallery_1.jpg
  • Satech - ImpactGuard_Ipros_2023_JP_Media-gallery_2.jpg
  • Satech - AdaptaGuard_Ipros_2023_JP_Media-gallery_1.jpg
  • Satech - BlueGuard_Ipros_2023_JP_Media-gallery_2.jpg
  • Other safety and hygiene products

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The first step towards sales support! Leads to "specific cost reduction" and "operational efficiency."

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data linkage from shift work planning to work performance and attendance management!

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Simple and straightforward security to make all translations simple.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A KIS system utilizing cutting-edge IT technology! Building a robust security system.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Automatic control of measuring instruments, construction of experimental systems, control of prototypes, etc. Please leave software development to us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A platform that simplifies API development and allows for the rapid creation of excellent APIs, 'Postman'.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

World-class data recovery software by a leading company in the industry.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing a wide range of products including lighting equipment and measurement devices from Image Engineering, as well as test charts and analysis software!

  • Other lighting equipment
  • Other measurement, recording and measuring instruments
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Transforming field surveys with DX! The damage recording system Surveynote revolutionizes field surveys by changing handwritten field notebooks to iPads.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Remote management software for all edge devices.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
KV 450 x 300px.jpeg

ADLINK releases EdgeGO, remote management software for all edge devices.

● Efficient Edge Device Management: ADLINK's EdgeGO provides an all-in-one software solution for the remote and secure management of edge devices across various industries. ● Improved Operational Efficiency: Real-time alerts, remote troubleshooting, and comprehensive device monitoring enable efficient and secure operations. ● Optimized for Various Fields: EdgeGO caters to sectors such as manufacturing, smart cities, healthcare, and retail, ensuring optimal performance and device management.

Aiming to reduce the burden on the IT department! Posting about "the benefits of an integrated monitoring approach" and more.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Seven Ways to Keep Business Files Safe and Protect Data

In December of last year, the systems of a third-party vendor for Uber Technologies Inc. were attacked by hackers, resulting in a data breach. Details of 77,000 Uber employees were leaked and put at risk. For a company to continuously operate its business, it is necessary to securely retain and transfer electronic files that often contain various confidential information. If a corporate culture exists that does not prioritize the protection of confidential data and tends to postpone it, it cannot avoid cybersecurity incidents. Gartner predicts that cyberattacks related to third parties will continue to increase beyond 2023. You can find more details in the related links below.

Accurately grasp what is happening on the network! It is necessary to monitor and manage it rigorously.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Seven Ways to Keep Business Files Safe and Protect Data

In December of last year, the systems of a third-party vendor for Uber Technologies Inc. were attacked by hackers, resulting in a data breach. Details of 77,000 Uber employees were leaked and put at risk. For a company to continuously operate its business, it is necessary to securely retain and transfer electronic files that often contain various confidential information. If a corporate culture exists that does not prioritize the protection of confidential data and tends to postpone it, it cannot avoid cybersecurity incidents. Gartner predicts that cyberattacks related to third parties will continue to increase beyond 2023. You can find more details in the related links below.

Easily automate workflows! Software that detects compliance risks.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Secure file transfer: Protection of personal identifiable information

In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.

Industry-leading Managed File Transfer (MFT) software

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Seven Ways to Keep Business Files Safe and Protect Data

In December of last year, the systems of a third-party vendor for Uber Technologies Inc. were attacked by hackers, resulting in a data breach. Details of 77,000 Uber employees were leaked and put at risk. For a company to continuously operate its business, it is necessary to securely retain and transfer electronic files that often contain various confidential information. If a corporate culture exists that does not prioritize the protection of confidential data and tends to postpone it, it cannot avoid cybersecurity incidents. Gartner predicts that cyberattacks related to third parties will continue to increase beyond 2023. You can find more details in the related links below.

We are releasing case studies on measures against cyber attacks that have resolved bottlenecks in network security!

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Infrastructure DNS monitoring

In the early 1990s, it was common to simply register a company name as a domain name, with a straightforward approach of one domain per company, which incurred very little cost. Nowadays, in order to stay ahead of competitors and protect the brand, it is necessary to register domains for one's own services as well. The situation has changed significantly from the past to the present, but the process of registering a domain name remains an important procedure for supporting online business. In this blog, we will start by explaining what the Domain Name System (DNS) is, and then discuss important DNS servers and their monitoring for infrastructure. You can find more details about the blog through the related links below.

Published case studies of measures against cyber attacks that solved issues in the security operations department and the network operations department.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Secure file transfer: Protection of personal identifiable information

In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.

Publication of case studies on reliable network monitoring and countermeasures against cyber attacks detected in a university environment.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
logo.JPG

Secure file transfer: Protection of personal identifiable information

In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.

Providing customers with peace of mind, excitement, and satisfaction! A civil engineering estimation system that enables more accurate calculations for faster and more precise bidding.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Developing DJ equipment embedded programs and identification software for banknote recognition devices!

  • Software (middle, driver, security, etc.)
  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Simple operation and streamlined functions! It can be used efficiently even in laboratories that handle large-scale processing.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

(Benefits of upgrading to Bluehill Universal software from the old software for users)

This is a webinar for customers using the old Instron software (Bluehill 1, Bluehill 2, Bluehill 3, Bluehill LE). We will confirm the current software lifecycle stage for customers and explain the benefits of upgrading to the latest software, Bluehill Universal. Please feel free to join us. 【Seminar Content】 - Current status and risks of the software/PC you are using - Features of Bluehill Universal - Changes from the old software - (Demo) Representative functions of the software - FAQ 【Target Audience for the Seminar】 - Those using Bluehill Lite, LE, 1, 2, or 3 old software - Those using PCs with Windows 7 or earlier - Those considering updating to the latest software - Those who want to know about new features of the latest software - Those interested in touch panel PCs (dashboard/Windows 10 compatible) 【Presenter】 Shinpei Yamashita, Sales Specialist, Instron Japan 【Participation Fee】 Free 【Question Format】 Chat (always available)

Engineers conduct direct hearings to achieve fast software development that realizes the desired product.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Automate visual inspections with easy operation! An AI appearance inspection solution that can be easily customized! We are currently offering a free summary of essential knowledge.

  • AI検査システム.PNG
  • Software (middle, driver, security, etc.)
  • Development support tools (ICE, emulators, debuggers, etc.)
  • Visual Inspection Equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
DXサイトバナー.JPG

DX solution site focused on the manufacturing industry is OPEN!

Matching the high-quality manufacturing site Challenging high-quality hardware manufacturing and solutions Applied, which handles a wide range of PCs for specific applications, proposes DX solutions focused on the manufacturing industry. From a single PC to the automation of visual inspections, we thoroughly support the digitalization challenges in manufacturing! We tackle the challenges of the manufacturing industry from unique angles that only Applied can offer, including our original specific-purpose PC, "Fablik PC."

Solve on-site and management issues through the recording, management, and analysis of work data!

  • Software (middle, driver, security, etc.)
  • Production Management System
  • Process Control System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Analysis software compatible with resource surveys that bring out the performance of AquaMagic.

  • Software (middle, driver, security, etc.)
  • Other measurement, recording and measuring instruments
  • Other electronic measuring instruments

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A comprehensive and reproducible test suite for in-vehicle ANC systems and devices!

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Analog waveform output software 'C-WaveformGenerator' compatible with APIs that can be controlled from external applications.

  • Software (middle, driver, security, etc.)
  • Expansion Boards

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
C-WaveformGenerator(API対応).jpg

Released a new version of the analog waveform output software "C-WaveformGenerator" that supports APIs controllable from external applications.

We have released a new version of the free download analog waveform output software "C-WaveformGenerator" that supports API control from external applications. "C-WaveformGenerator" is PC-based software that can generate various waveform signals using our measurement and control boards with analog output capabilities. It can output waveform signals as a substitute for benchtop signal generators (function generators) and can be used to build measurement control and inspection systems. With the support for an API that allows control of various settings and the start/stop of waveform output from external applications, users can utilize the various waveform output functions of "C-WaveformGenerator" from their applications. During application debugging, you can adjust the output waveform using the GUI of "C-WaveformGenerator" like a benchtop measuring instrument, and switch to API control for starting/stopping output upon completion, thereby reducing the man-hours required for system construction.

Attention healthcare system administrators! This is the first step in information security measures!

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The system that was used in the past will be usable again.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Threema OnPrem is secure communication that protects privacy.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will tackle the challenges of the "town" with a stamp rally app utilizing blockchain technology!

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Regardless of differences in evaluators or experience, we have achieved consistent judgments!

  • 2021-07-15_11h13_21.png
  • Other measurement, recording and measuring instruments
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will exhibit at the Solar Summit 2022 ONLINE.

We will be exhibiting for the first time at the DMM Online Exhibition. 【Date and Time】 March 30, 2022 (Wednesday) to April 1, 2022 (Friday) 10:00 AM to 6:00 PM https://exhibition.showbooth.dmm.com/events/solar2203/ The company booth is now open! Admission is free, so if you're interested, please join us.

Monitoring patient care and nurse carts using "iCAP" for the nurse station.

  • icap.png
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Exploring how intelligent solutions enable a smart future together with all companies across industries.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

4GB DDR3 SODIMM memory & smart factory using SATA to CF card storage solution

  • Software (middle, driver, security, etc.)
  • SSD

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Trouble Solved! Do you have concerns like 'I need to have multiple browsers on one device'?

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What are the key points when selecting a browser for HMI/UI in embedded devices? I will explain the options, considerations, and their advantages and disadvantages.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
FA_demo_new.png

Try out the new demo of the Espial browser.

We have prepared a new demo environment that operates with the "Espial Browser." Please experience the UI/UX created with HTML5/CSS3/JavaScript along with our browser. The demo version of the "Espial Browser" is available for both Linux and VxWorks versions running on the NXP i.MX8M Plus platform. If you have any requests for demos or evaluations, please feel free to contact us.

This is a browser that supports specifications such as Hybridcast, BML, and TTML, as well as ARIB, IPTV Forum, A-PAB, and JLabs.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
FA_demo_new.png

Try out the new demo of the Espial browser.

We have prepared a new demo environment that operates with the "Espial Browser." Please experience the UI/UX created with HTML5/CSS3/JavaScript along with our browser. The demo version of the "Espial Browser" is available for both Linux and VxWorks versions running on the NXP i.MX8M Plus platform. If you have any requests for demos or evaluations, please feel free to contact us.

Optimal for HMI/GUI tools! High-speed UI resource-saving WebKit browser for embedded devices.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
FA_demo_new.png

Try out the new demo of the Espial browser.

We have prepared a new demo environment that operates with the "Espial Browser." Please experience the UI/UX created with HTML5/CSS3/JavaScript along with our browser. The demo version of the "Espial Browser" is available for both Linux and VxWorks versions running on the NXP i.MX8M Plus platform. If you have any requests for demos or evaluations, please feel free to contact us.

Try the new rich UI demo that works with the Espial browser. A demo with IP cameras is also available.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Web touchpoints influence purchases! Acquiring leads through customer web inquiries and estimates to increase share sales.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Contributing to functionality organization and cost reduction with marine radar products × μC3/Compact and μNet3.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

I want to make it versatile! Providing a wide range of CPU options with CC Link IE TSN × μC3/Compact.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

By introducing μC3/Compact and μNet3, the development downtime caused by the RTOS has been reduced from one month to zero.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Filter

classification
Delivery Time
Location