List of Software (middle, driver, security, etc.) products
- classification:Software (middle, driver, security, etc.)
2161~2205 item / All 4058 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
This is a recommended series for dental clinics that only need patient information and do not require a reservation function.
- Software (middle, driver, security, etc.)
It's convenient because patient information is displayed instantly! We support building trust with patients.
- Software (middle, driver, security, etc.)
The web system currently in use can easily function as a CTI system!
- Software (middle, driver, security, etc.)
Patient information, examination history, and appointment details are displayed instantly! You can start a conversation with an understanding of the patient.
- Software (middle, driver, security, etc.)
Patient information pops up from the bottom right of the computer screen! You won't miss the timing even when visiting outside.
- Software (middle, driver, security, etc.)
Standard equipment in the industry! Satisfactory inspection speed, accuracy, and easy operation.
- Other electronic measuring instruments
- Other measurement, recording and measuring instruments
- Software (middle, driver, security, etc.)
For the analysis of arc plasma in circuit breakers and relays. Developed by plasma experts. With the active development of BEVs, inquiries are increasing!
- Software (middle, driver, security, etc.)
Cybersecurity measures to protect the manufacturing industry from increasingly serious cyberattacks as smart factories and telework advance. Campaign ongoing!
- Software (middle, driver, security, etc.)
<Announcement of Cyber Attack Special Column Release & Webinar Release> A discussion with experts that everyone should know about, as anyone can be a victim: "Now" and "Future" of Ransomware Countermeasures - What is the latest backup solution "AT-Offline Manager"?
Allied Telesis, Inc. (Headquarters: Shinagawa-ku, Tokyo; Chairman of the Board: Akira Oshima) announces the launch of a new series on the latest cyber attack countermeasures and ransomware measures in its web communication magazine "FASHIONISTA," aimed at IT infrastructure professionals and those gathering information on the subject, which was published on September 15 (Thursday). At the same time, a detailed explanatory webinar on the ransomware countermeasure solution "AT-Offline Manager" was also released. Recently, while the number of companies providing cybersecurity products and services has increased, and domestic government agencies such as NISC (*1) have issued alerts and guidelines, various businesses and organizations across different markets have still fallen victim to cyber attacks. ■ New Column Release: Latest Cyber Attack Countermeasures × Ransomware In light of this, we have launched a new column series in our communication magazine "FASHIONISTA," focusing on the latest cyber attack countermeasures, particularly the ransomware that has been causing a stir recently. *For more details, please refer to the PDF document or related links.
4K system compatible! It is possible to build a system that takes advantage of the characteristics of the video server!
- Software (middle, driver, security, etc.)
- Other image-related equipment
Utilizing the characteristics of the video server, it allows for playback while recording, creating highlights, broadcasting, and sending out content.
- Software (middle, driver, security, etc.)
- Other image-related equipment
Rich interface! A system with high connectivity to studio systems!
- Software (middle, driver, security, etc.)
- Other image-related equipment
- controller
Equipped with GPI-linked tally transmission functionality! A product that can be customized to meet customer needs!
- Software (middle, driver, security, etc.)
- Other image-related equipment
- controller
We propose a suitable plan! Security measures advanced through "diagnosis and investigation" and "countermeasures and strengthening."
- Software (middle, driver, security, etc.)
- Other security
Support system debugging without waiting for implementation! Microcontroller peripheral modules for virtual verification.
- Software (middle, driver, security, etc.)
Monitor the condition of equipment with multiple sensing technologies, and improve factory operational efficiency by maintaining it when abnormalities indicating potential failures are detected!
- Software (middle, driver, security, etc.)
Easy construction of attribute information and registration of large-capacity data! Introduction to marine survey data management and analysis software.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
High-resolution still image file output! Overlay observation and analysis data according to the coordinate system for three-dimensional display.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Image analysis software
Intuitive color representation of underwater terrain depth data! Output drawings as image files!
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Image analysis software
Continuously display the boundary between water and land areas! The collected data can be processed and analyzed with MarineDiscovery.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
Graphically display underwater acoustic data! Playback in three dimensions is possible with our Visual3DX.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Image Processing Software
Introducing powerful visualization and diagramming software that supports image brightness adjustment and color display!
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
You can freely edit arcs, geodesics, and intermediate lines! Introducing the Geodetic Drawing Tool.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
Overlay display of multiple registered data! Extractable and outputtable from attribute selection, rectangular selection, mesh selection, etc.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
Output surface information, line information, and depth point information in the specified format! Generate contour files by drawing lines on the boundaries of the surface.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
Eligible for the IT Implementation Subsidy 2021! Set survey range, line spacing, number of lines, etc., and automatically create planned survey lines.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
Introducing multi-beam data processing software eligible for the IT introduction subsidy 2021!
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
Introducing software for processing side-scan sonar data that supports a variety of formats!
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
Real-time display of actual water depth and tidal changes! Supports navigation according to tidal conditions in shallow coastal areas such as ports and near shorelines.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other information systems
No double booking. You can schedule by simply "sending the URL."
- Software (middle, driver, security, etc.)
- SFA/Sales Support System
Transforming work styles with QR codes, making it exciting and smart! Contributing to improved operational efficiency! [Top-class number of users for seating management services]
- Software (middle, driver, security, etc.)
Detecting unknown threats! Preventing risks such as information leakage incidents caused by cyber attacks in advance.
- Software (middle, driver, security, etc.)
First step towards DX! Customers can combine modules for use according to their business needs.
- Software (middle, driver, security, etc.)
Two selectable editions! Equipped with numerous features to simplify tasks and generate programs in a short time.
- Software (middle, driver, security, etc.)
- Other industrial robots
- Other embedded systems (software and hardware)
First come, first served for up to 4 participants! You can learn embedded Linux development using Yocto in a hands-on format!
- Embedded OS
- Embedded system design service
- Software (middle, driver, security, etc.)
Many voices of praise from major manufacturers! A CAM specifically for turbo machine parts that is super easy to operate! It enables high-precision and high-speed NC calculations!
- Software (middle, driver, security, etc.)
- 3D CAM
- 2D CAM
Rotation of coordinates is possible! By incorporating point sequence numerical data, a highly accurate model can be created.
- Software (middle, driver, security, etc.)
- 3D CAM
- 2D CAM
Contributing to the acceleration of situation understanding! A case of establishing an IT environment that does not hinder growth strategies!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems
Initial response time reduced from 24 hours to 5 minutes! A security software that is easy to manage with telework!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems
The user evaluation regarding detection accuracy is high, and the easy-to-use UX is a major attraction!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems
Not only large corporations but also small businesses can implement it! It excels in automated operations using AI technology!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems
Achieve security automation with AI! By the time you notice it, it's already over—automated response EDR!
- Software (middle, driver, security, etc.)
- Other security
- Other security and surveillance systems