List of Software (middle, driver, security, etc.) products
- classification:Software (middle, driver, security, etc.)
91~135 item / All 4103 items
Heat resistant up to 1200℃. We will custom-make high-performance insulation covers that ensure safety in the working environment!
- Glass
Perform reverse engineering of malicious APKs and security audits!
- Software (middle, driver, security, etc.)
The "BALKAN App" is a practical diagram platform that consolidates organizational charts, workflows, and family trees into one, supporting the visualization and operation of business activities.
- Software (middle, driver, security, etc.)
Streamline the tedious core photo editing tasks! AI automatically trims the core box section.
- Software (middle, driver, security, etc.)
In "Analytica," visualize complex decision-making and support advanced decision-making infrastructure that encompasses uncertainty analysis, optimization, and sharing within a single environment.
- Software (middle, driver, security, etc.)
Simple API design from a system developer's perspective! Achieving over 99% license plate recognition rate with a unique algorithm!
- Other information systems
- Surveillance Camera System
- Software (middle, driver, security, etc.)
Thank You for Attending the 3rd AI and Artificial Intelligence EXPO [Autumn] @ Makuhari Messe
The "3rd AI and Artificial Intelligence EXPO [Autumn]" was held from October 26 (Wednesday) to 28 (Friday), 2022, and thanks to everyone, it concluded successfully and with great attendance. We sincerely thank all the customers and stakeholders who visited our booth. We are very pleased to have had the opportunity to speak with over 200 companies. The solution products we showcased at the exhibition are currently available on "Ipros Urban Development," so we would appreciate it if you could take a look. Additionally, we have posted the materials distributed at the exhibition, so for those who could not attend or who attended but did not receive the materials, please check them out.
Understand operations from the same perspective as the manufacturing site! Build systems rooted in practical experience based on years of industry experience.
- Software (middle, driver, security, etc.)
Providing traceability for resource circulation from waste required in a circular economy using blockchain.
- Software (middle, driver, security, etc.)
Reduce copyright risks of entertainment content through OSS/SBOM management.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Improving system stability through OSS management, also compliant with the Cyber Resilience Act.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Manage OSS vulnerability risks in game development and create safe games.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Support risk management of OSS and creation of SBOM to enhance security.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
We support risk management of OSS and the creation of SBOM, protecting communication infrastructure.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Supporting compliance for financial institutions through OSS management and SBOM creation.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
An OSS/SBOM management tool that supports the secure management of customer data.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
OSS/SBOM management tool to enhance personal information protection.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Improving the quality and safety of the manufacturing process through OSS/SBOM management.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
A tool for managing OSS/SBOM that protects patient information security.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Support OSS management and SBOM creation to reduce supply chain risks.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Support on-site operations! Achieving reduced workload for workers and improved productivity through DX (Digital Transformation).
- Software (middle, driver, security, etc.)
Marpos promises that this technology will greatly contribute to improving quality and productivity in the production field.
- Other measurement, recording and measuring instruments
- Software (middle, driver, security, etc.)
The M50 system, designed for measurements at the work site, is a highly reliable and accurate measuring device.
- Other measurement, recording and measuring instruments
- Software (middle, driver, security, etc.)
No specialized knowledge required! Demand forecasting service using no-code AI predictive analytics.
- Software (middle, driver, security, etc.)
- Other operation management software
Free Seminar: Transforming Veteran Intuition into a "System" - A Demand Forecasting and Business Standardization Model for Supply and Demand Succession
In the manufacturing and wholesale sectors, demand forecasting and supply-demand judgments often rely on the experience and intuition of a few veteran personnel, leading to a situation where the basis for decisions and adjustment know-how become personalized. Furthermore, there is a challenge in that judgments based on factors such as weather, promotions, days of the week, and seasonal influences are not documented, making it difficult to reproduce and pass on this knowledge. As a result, the transfer of knowledge to younger staff does not progress, and the quality of operations becomes unstable due to personnel transfers or retirements, which can lead to insufficient utilization of AI even when it is implemented. In this seminar, we will introduce the concept of a "Supply-Demand Inheritance Model" that combines the AI demand forecasting engine "Deep Predictor" with the business platform "Pleasanter" to reproduce and accumulate the insights of veterans as a "system." We will explain in an easy-to-understand manner, from a practical perspective, how to record and share the basis for judgments and exception handling while considering external factors, leading to the resolution of personalization, standardization of operations, and continuous improvement. For more details, please check the "Details & Application" link below.
Automate your operations and maximize productivity! Why not transform your business with Power Platform?
- Other information systems
- Software (middle, driver, security, etc.)
- Personnel and Labor
Take a photo with your smartphone and let the AI read the manufacturer-specific label! Thorough prevention of incoming inspection errors and incorrect storage.
- Software (middle, driver, security, etc.)
Diagnose bearings in just 4 simple steps! Easy-to-use bearing diagnostic software.
- Software (middle, driver, security, etc.)
Detect subtle nuances! Simple operability that can be achieved in just 2 easy steps.
- Software (middle, driver, security, etc.)
17th Anti-Fraud Study Session: Whistleblower Protection Act and Response to Misconduct
In this study session, we will invite Professor Toshihiro Okuyama from Sophia University, who has been active on the front lines of journalism for many years as a former Asahi Shimbun reporter, and who continues to raise and explain social issues through the media, as well as actively participating in the hundred-member committee. He will provide an explanation of the Whistleblower Protection Act and responses to scandals, incorporating real examples. 【Event Overview】 ◆ Date and Time: November 1, 2024 (Friday) 16:00 - 17:00 ◆ Format: Free Webinar (A Zoom URL will be sent after registration) ◆ Tool Used: Zoom Webinars ◆ Participation Conditions: - Those using free email addresses, those from competing companies, and those whose affiliations are unclear are requested to refrain from registering. - When accessing Zoom on the day of the event, please enter the name and email address you provided at the time of registration in the Zoom participation input field.
ChatGPT is not the only AI. In the first place, what is AI (artificial intelligence) and natural language processing?
- Software (middle, driver, security, etc.)
What is generative AI? A simple and easy-to-understand explanation! Types and uses, mechanisms and disadvantages, as well as an explanation of the rise of ChatGPT.
- Software (middle, driver, security, etc.)
Having a large amount of training data is not necessarily good. What constitutes training data that enhances AI accuracy?
- Software (middle, driver, security, etc.)
Challenges of generative AI: power consumption. Solutions brought by the approach from Green AI to "Green Micro AI."
- Software (middle, driver, security, etc.)
How does concept search differ from keyword search? AI's concept search opens up new frontiers from humanity's collective knowledge.
- Software (middle, driver, security, etc.)
Supporting expert-level complex judgments! A mathematically-based AI engine with a simple structure.
- Software (middle, driver, security, etc.)
Affordable professional-grade! A companion for RISC-V development for beginners to veteran developers.
- Development support tools (ICE, emulators, debuggers, etc.)
- Software (middle, driver, security, etc.)
- Microcomputer
We aim to create a society that responds to the space age with sustainable and ethical technology!
- Software (middle, driver, security, etc.)
- Other process controls
- Other industrial robots
Debugging and tracing module to streamline the operation verification of industrial robots.
- Development support tools (ICE, emulators, debuggers, etc.)
- Software (middle, driver, security, etc.)
- Microcomputer
This full-digital audio output middleware enables high sound quality, low power consumption, and low heat generation using only a microcontroller and an H-bridge circuit.
- Microcomputer
- Transistor
- Software (middle, driver, security, etc.)
Instantly search for "moments you want to know" from a vast archive of past videos, supporting rapid investigation of incidents and accidents.
- Software (middle, driver, security, etc.)
- Other security