List of Other Software products
- classification:Other Software
1~45 item / All 370 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Providing cutting-edge methods and technologies for electronic state calculations and computational chemistry models across a wide range of fields, including chemistry, biochemistry, and physics.
- Computational Chemistry
- Other research software
- Other Software
Based on the raw voices of 10,000 business professionals, we highlight the "now" of generative AI!
- Software (middle, driver, security, etc.)
- Other Software
Achieving UI improvement through the use of corporate websites and sales office guides for new customers!
- Software (middle, driver, security, etc.)
- Other Software
To maximize the effects of generative AI, not only individual skill enhancement but also organizational efforts are essential!
- Software (middle, driver, security, etc.)
- Other Software
Instant responses with 200 types of printing techniques! Efficient customer support realized with an AI chatbot.
- Software (middle, driver, security, etc.)
- Other Software
Protecting payment data from the threat of quantum computers!
- Other Software
Hardware-level security solutions to enhance the safety of online exams.
- Other Software
Hardware-level solutions to enhance the security of IoT devices.
- Other Software
Security solutions that protect data and hardware.
- Other Software
Security solutions that protect data and hardware.
- Other Software
Security solutions to protect supply chain data and hardware.
- Other Software
Security solutions to protect the data and hardware of smart grids.
- Other Software
Hardware-level security that protects the safety of medical data.
- Other Software
Security solutions that protect data and hardware.
- Other Software
A security solution to protect secret communications from the threats of quantum computers.
- Other Software
Protecting financial transactions from the threat of quantum computers.
- Other Software
It is the only transdermal absorption simulation software in Japan that has a proven track record of use in pharmaceutical companies and universities.
- Other Software
Specialized in review and approval! Smooth realization of online and automated current business workflows.
- Other Software
Providing hardware-level security solutions to protect data and hardware!
- Other Software
UI, parameters, and communication compliant with SEMI standards are possible! Control of image boards (FPGA), cameras (CL, CXP), etc.
- Other process controls
- Other Software
Stop creating for no reason and structure the process to achieve results!
- Other Software
Introducing the report "AI2027" and the book "AI2041," which predicts what comes next!
- Other Software
Introducing a powerful ally, "AI (Artificial Intelligence)," that will help you reclaim your time!
- Other Software
Since it does not include traditional algorithms, it is suitable for customers who only require the new Quantum Safe algorithms!
- Other Software
During the maintenance period, we provide engineer-level support and updates!
- Other Software
Optimized for minimal footprint and stack usage! Hardware and OS-independent design.
- Other Software
Providing cryptographic algorithms for the post-quantum cryptography (PQC) era, focusing on performance and reliability!
- Other Software
The system guarantees to boot only images from trusted sources without making any changes to the images!
- Other Software
Rapid response and minimal disruption in the update cycle are guaranteed!
- Other Software
It is also possible to use it independently in custom-developed products and provide the necessary cryptographic functions!
- Other Software
Deployed by major vendors of physical and virtual cloud/network products, printers, embedded devices, and more!
- Other Software
Secure applications can be assigned unique roots and keys, allowing for the establishment of independent permissions and access levels!
- Other Software
The IPsec implementation minimizes development costs and shortens time to market!
- Other Software
Able to establish over 3,800 IPsec tunnels per second! Demonstrates excellent scalability with a multi-core architecture.
- Other Software
Security gateway, providing high interoperability and portability for cloud implementation and use with IoT devices!
- Other Software
The built-in QSE core firmware allows the core functions to accommodate future updates to NIST specifications!
- Other Software
Achieve future-proof encryption with a quantum-resistant cryptography library!
- Other Software