List of Software (middle, driver, security, etc.) products
- classification:Software (middle, driver, security, etc.)
2251~2295 item / All 3925 items
Trust built on years of experience and numerous certifications. A bilingual bridge SE in Japanese and Chinese within Japan collaborates with SEs in China for development.
- Embedded system design service
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
If you need system development using Java, .NET, or C#, including open systems and web systems, please contact us!
- Other core systems
- Software (middle, driver, security, etc.)
- Other contract services
An IoT platform with data accumulation, monitoring, visualization, and analysis functions from devices and sensors.
- Software (middle, driver, security, etc.)
- Embedded Board Computers
- Embedded system design service
Achieves synchronization between the in-car CID and Android/iOS smartphones via wireless connection using Bluetooth or Wi-Fi, or wired connection via USB.
- Software (middle, driver, security, etc.)
- Communications
- Embedded system design service
Identify security vulnerabilities in source code! Reduce the risk of data leaks.
- Software (middle, driver, security, etc.)
- Other security
- Other services
We will identify vulnerabilities lurking in access management, authentication controls, and known configuration mistakes!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Attempt to attack the target application and uncover hidden vulnerabilities!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Identifying vulnerabilities that have a significant impact on business! We deliver high-value test results.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Two depths are available! You can choose the appropriate test level according to your risk profile.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Reduce the risk of data leaks! We have resources that can quickly respond to changes in scale.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Support for compliance with security and regulations! Experience immersive continuous learning.
- Software (middle, driver, security, etc.)
- Other security
- Distance learning/E-learning
Addressing software risks lurking in various places! Accelerating the delivery of secure and high-quality code.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Total support for application security from development to deployment!
- Software (middle, driver, security, etc.)
- Other security
Manage all test execution, policy application, prioritization of issues, and filtering!
- Software (middle, driver, security, etc.)
- Other security
Establish security and compliance as part of the normal business process!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
You can quickly identify and fix critical security and quality issues while coding!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Introducing a solution to detect and fix security vulnerabilities during coding!
- Software (middle, driver, security, etc.)
- Other security
Diagnosing software risks throughout the SDLC with a single record system for AppSec data!
- Software (middle, driver, security, etc.)
- Other security
We enable comprehensive open-source risk management regardless of your company's size or budget!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify software security vulnerabilities! This enables informed and reliable decision-making based on information.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Manage risks related to security, licensing, and code quality! Introduction to SCA solutions.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify and exploit critical vulnerabilities for business to reduce the risk of leaks!
- Software (middle, driver, security, etc.)
- Other security
The tablet admin for kitting is an RPA tool that automates the initial setup of Android smartphones and tablets.
- Software (middle, driver, security, etc.)
We will solve various problems related to the system.
- Software (middle, driver, security, etc.)
A comprehensive platform for cognitive services that enables data extraction and full-text OCR without the need to define immediately usable pre-trained OCR skills.
- Other operation management software
- Software (middle, driver, security, etc.)
Automated large-scale document conversion server to create a digital library that allows access, sharing, and searching.
- Other server related
- Software (middle, driver, security, etc.)
PDF software for efficient document processing in a digital workspace.
- Software (middle, driver, security, etc.)
- Document and Data Management
NC programming is moving from "human hands" to "automation"! Welcome to the world of ARUMCODE.
- Software (middle, driver, security, etc.)
- Production Management System
- Data conversion software
NC programming is moving from "manual operation" to "automation"! We will introduce recommended PCs for operation.
- Software (middle, driver, security, etc.)
- Production Management System
- Data conversion software
Solving the problems faced by machining companies! Promoting cost reduction and productivity improvement within factories!
- Software (middle, driver, security, etc.)
- Production Management System
- Data conversion software
Identify software vulnerabilities and enhance the robustness of the software and the interoperability of the system!
- Software (middle, driver, security, etc.)
We protect and manage open source across the entire software supply chain!
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
- Document and Data Management
Accurately identify and verify vulnerabilities! You can grasp the URL detection and coverage of web applications at a glance.
- Other security
- Software (middle, driver, security, etc.)
- Other security and surveillance systems
Two-factor authentication system using USB keys and one-time password tokens!
- Software (middle, driver, security, etc.)
A wide range of products including comprehensive broadcasting systems for radio stations, DAD, and FM/AM broadcasting monitoring tuners are featured!
- Other core systems
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
The work setup takes only about 1 to 3 minutes! Automatic application of welding parameters and corner conditions is possible.
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
- Other CAD related software
A user-centered system integration that doesn't end up as just a pie in the sky for business improvement!
- Embedded system design service
- Management consultant/Small business consultant
- Software (middle, driver, security, etc.)
Powerful, intuitive, and interactive! Enables immediate measurement without programming!
- Software (middle, driver, security, etc.)
Just place the barcode reader on the QR code! You can display and verify the contents of the QR code on the screen!
- Software (middle, driver, security, etc.)
There are few keyboards that have "0", "00", and "000"! Let's create the missing "zero" key.
- Software (middle, driver, security, etc.)
A screen with 18 lines can display 100 pages! It also has a branching function for different menu screen pages.
- Software (middle, driver, security, etc.)
We are involved in the operation of large-scale systems, primarily for financial institution clients!
- Other services
- Software (middle, driver, security, etc.)
Implementation of system design development, cloud services, and support for package product introduction!
- Other services
- Embedded system design service
- Software (middle, driver, security, etc.)