List of IT/Network products
- classification:IT/Network
3331~3375 item / All 44002 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Realizing rapid investment effects through productivity improvement! Interfaces available for various industrial protocols.
- Production Management System
- Other process controls
- Other information systems
We will monitor the grinding process in real-time with the Marpos measurement head!
- Wafer processing/polishing equipment
- Production Management System
- Other measurement, recording and measuring instruments
Visualize PTP network traffic and support stable operation of power control.
- server
- Other server related
"Annual losses of tens of millions of yen reduced to zero," "Zero instances of misuse and incorrect input," "Inventory workload reduced to one-tenth." Success stories of 19 companies that solved manuf...
- Production Management System
- Other production management systems
We will be exhibiting at Japan IT Week Nagoya (Port Messe Nagoya) from February 25 to February 27!
We will be exhibiting at "Japan IT Week Nagoya," which will be held at Port Messe Nagoya from February 25 (Wednesday) to February 27 (Friday), 2026. Japan IT Week Nagoya is the largest comprehensive exhibition in the Chubu region related to system development, operation, and maintenance. It consists of four exhibitions. Our company will be participating in the "Embedded, Edge, and IoT Development EXPO." At our booth, we will offer free consultations on our production management cloud system, "SmartF." If you have any of the following concerns, please feel free to stop by our booth: ✅ I want to know how to digitalize the manufacturing site. ✅ I am considering implementing barcode management. ✅ I want to move away from manual management using handwritten notes or Excel. ✅ I want to streamline the management of inventory, quality, and costs. ✅ I want to know the differences from the production management system I am currently using. We can also provide proposals based on the challenges faced by attendees. If you have any issues with digitalizing your operations, please feel free to consult with us!
Visualize PTP network traffic and enhance transaction monitoring.
- server
- Other server related
AMC board equipped with the 3rd generation Intel Core i7, boasting high reliability.
- Embedded Board Computers
AMC board equipped with 3rd generation Intel Core i7, achieving high-speed processing.
- Embedded Board Computers
Compact portable "WiFi Protocol Analyzer V3" fully compatible with WiFi 7 (IEEE 802.11be) and the 6GHz band.
- Communications
Our professionals protect the security of financial institutions 24 hours a day, 365 days a year.
- Other security
A professional will protect your security 24 hours a day, 365 days a year.
- Other security
Professionals protect your learning environment from cyber threats 24 hours a day, 365 days a year.
- Other security
A professional will protect your operation management system 24 hours a day, 365 days a year.
- Other security
Our professionals protect the communication infrastructure 24 hours a day, 365 days a year.
- Other security
From threat detection to response. Protect vulnerabilities with professional security.
- Other security
Professional support for the preservation of evidence data. Available 24/7 for your peace of mind.
- Other security
Leave everything from threat detection to response to us. Professionals will protect your security. [Campaign ongoing & technical explanation materials available for free.]
- Other security
Protect medical information and implement security measures that meet patients' trust.
- Other security
Protecting customer data from cyber threats! Professionals available 24/7.
- Other security
A professional will protect your confidentiality 24 hours a day, 365 days a year. Campaign ongoing.
- Other security
24/7 cybersecurity services to protect energy infrastructure.
- Other security
Complete elimination of threats that goes beyond just notifications! Introducing a response speed of 38 minutes that overwhelms the industry average.
- Other security
- Firewall and intrusion prevention
Don't search! Don't hesitate! Just read the on-site DX.
- Other production management systems
No specialized knowledge required! Demand forecasting service using no-code AI predictive analytics.
- Software (middle, driver, security, etc.)
- Other operation management software
Free Seminar: Transforming Veteran Intuition into a "System" - A Demand Forecasting and Business Standardization Model for Supply and Demand Succession
In the manufacturing and wholesale sectors, demand forecasting and supply-demand judgments often rely on the experience and intuition of a few veteran personnel, leading to a situation where the basis for decisions and adjustment know-how become personalized. Furthermore, there is a challenge in that judgments based on factors such as weather, promotions, days of the week, and seasonal influences are not documented, making it difficult to reproduce and pass on this knowledge. As a result, the transfer of knowledge to younger staff does not progress, and the quality of operations becomes unstable due to personnel transfers or retirements, which can lead to insufficient utilization of AI even when it is implemented. In this seminar, we will introduce the concept of a "Supply-Demand Inheritance Model" that combines the AI demand forecasting engine "Deep Predictor" with the business platform "Pleasanter" to reproduce and accumulate the insights of veterans as a "system." We will explain in an easy-to-understand manner, from a practical perspective, how to record and share the basis for judgments and exception handling while considering external factors, leading to the resolution of personalization, standardization of operations, and continuous improvement. For more details, please check the "Details & Application" link below.
No specialized equipment required; immediate implementation possible! With advanced AI technology, we will transform workforce development in manufacturing sites.
- Process Control System
- Production Management System
- Other production management systems
Don't you think 'we won't be targeted'?
- Other security
Are you overlooking legal amendments and standard revisions?
- Other security
Utilize data as an information asset! We will visualize cross-departmental knowledge and establish the use of data in a way that integrates seamlessly into business workflows.
- Other embedded systems (software and hardware)
Automate your operations and maximize productivity! Why not transform your business with Power Platform?
- Other information systems
- Software (middle, driver, security, etc.)
- Personnel and Labor
An IoT platform that has inclusive compatibility, is usable by anyone, and allows anyone to develop functions.
- Other information systems
- Business Intelligence and Data Analysis
We will assist companies using Microsoft 365 with their email server migration!
- Email/Fax transmission
- server
- Other information systems
Take a photo with your smartphone and let the AI read the manufacturer-specific label! Thorough prevention of incoming inspection errors and incorrect storage.
- Software (middle, driver, security, etc.)
Making IT a tool for 'monozukuri' that anyone can use.
- 3D CAD
- 2D CAD machine
- Document and Data Management
With intuitive operability and unified operations regardless of document type, anyone can easily master it.
- Other CAD related software
- Document and Data Management
The Diagram King Standard promotes the utilization of diverse technological information assets that transcend organizational, locational, and temporal barriers through various data reuse functions.
- Other CAD related software
- Document and Data Management
The Tube King Standard is equipped with advanced security features to prevent unauthorized information leakage.
- Other CAD related software
- Document and Data Management
Efficiently and quickly collect and evaluate measurement data! Customization of the software is possible.
- Acoustic Analysis
- Time-frequency measurements
- Communications
Diagnose bearings in just 4 simple steps! Easy-to-use bearing diagnostic software.
- Software (middle, driver, security, etc.)
Detect subtle nuances! Simple operability that can be achieved in just 2 easy steps.
- Software (middle, driver, security, etc.)
17th Anti-Fraud Study Session: Whistleblower Protection Act and Response to Misconduct
In this study session, we will invite Professor Toshihiro Okuyama from Sophia University, who has been active on the front lines of journalism for many years as a former Asahi Shimbun reporter, and who continues to raise and explain social issues through the media, as well as actively participating in the hundred-member committee. He will provide an explanation of the Whistleblower Protection Act and responses to scandals, incorporating real examples. 【Event Overview】 ◆ Date and Time: November 1, 2024 (Friday) 16:00 - 17:00 ◆ Format: Free Webinar (A Zoom URL will be sent after registration) ◆ Tool Used: Zoom Webinars ◆ Participation Conditions: - Those using free email addresses, those from competing companies, and those whose affiliations are unclear are requested to refrain from registering. - When accessing Zoom on the day of the event, please enter the name and email address you provided at the time of registration in the Zoom participation input field.
ChatGPT is not the only AI. In the first place, what is AI (artificial intelligence) and natural language processing?
- Software (middle, driver, security, etc.)
What is generative AI? A simple and easy-to-understand explanation! Types and uses, mechanisms and disadvantages, as well as an explanation of the rise of ChatGPT.
- Software (middle, driver, security, etc.)
Having a large amount of training data is not necessarily good. What constitutes training data that enhances AI accuracy?
- Software (middle, driver, security, etc.)
Challenges of generative AI: power consumption. Solutions brought by the approach from Green AI to "Green Micro AI."
- Software (middle, driver, security, etc.)
We will completely replicate and securely store the data of retirees, providing swift and reliable support for fraud investigations and evidence preservation!
- Personnel and Labor
[Free Online Seminar on 2/13] Legal and Practical Key Points on Cyber Attack Countermeasures and Information Leakage Prevention from the Perspective of a Former Cybercrime Prosecutor
Recently, various companies across different industries have been victims of cyberattacks, including ransomware, resulting in long recovery times and significant financial losses. Additionally, the leakage of information held and managed by companies can damage their reputation and lead to a substantial decline in business performance, depending on how the situation is handled. Even though companies are victims of cyberattacks and information leaks, if they fail to respond appropriately during normal times or crises, there is a risk that the company and its executives may face lawsuits for damages or criminal liability. Given the significant risks posed by cyberattacks and information leaks, it is essential for multiple stakeholders, including company executives, general affairs, human resources, legal, and IT security departments, to implement response measures across the organization during both normal and crisis situations. Attorney Masayuki Otake, who has extensive experience investigating numerous cases as a prosecutor in charge of cybercrime and intellectual offenses, will explain the important legal and practical points to consider in such situations.