List of Other operation management software products
- classification:Other operation management software
766~810 item / All 2256 items
Heat resistant up to 1200℃. We will custom-make high-performance insulation covers that ensure safety in the working environment!
- Glass
EC-SHOP construction services for your company, including shop design, member management, product management, order management, and sales aggregation.
- Other operation management software
- Purchasing Management System
We provide total support for all the necessary functions for building an EC-SHOP, including design, member management, product management, order management, and sales aggregation!
- Other operation management software
- Purchasing Management System
We will realize a resilient, sustainable, and smart utility for the future.
- Other operation management software
We have released information about AspenTech's digital grid management products.
AspenTech's digital grid management product suite enables the realization of resilient, sustainable, and smart utilities for the future. Through a flexible and secure operational technology platform equipped with robust advanced applications, we support the evolution of lifelines such as electricity and gas. For more details, please refer to the related product information.
Open 24 hours a day, 365 days a year! Verification of various certificates such as student IDs and disability certificates is also available online!
- Other operation management software
By simply installing the device, achieve "visibility" and "efficiency" in international logistics!
- Other operation management software
We will be exhibiting at the 2nd Kansai Logistics Expo!
We will be exhibiting at the 2nd Kansai Logistics Expo held at Intex Osaka, showcasing various services and solutions for logistics automation, labor-saving, contactless operations, and heatstroke prevention items. 【Exhibited Products】 ■ Ice Vest *Fitting experience available An item that easily helps prevent heatstroke just by wearing it! ■ Smart Pallet / Smart Cart *Demonstration available You can track the location of pallets and carts equipped with active RFID tags online. In addition to inventory management and loss prevention, area management and shipping information management are also possible! ■ Assist Suit "Support Jacket Series" *Fitting experience available Wearing this suit reduces the burden on workers and contributes to labor-saving and white logistics! ■ Rental Pallet Loss Guarantee System A system that fully waives the penalty fees that were previously charged each time a pallet was lost! *The guarantee fee will be billed separately from the pallet rental fee. ■ Logistics IoT (Nantsui / World Keeper) A system that easily tracks the location, temperature, and humidity of items. It enables quality control in the transportation of GDP-compliant pharmaceuticals and frozen foods!
It is possible to display past movement information! View the track in quasi-real time.
- Other operation management software
Equipped with functions for semester and academic year-end processing, report cards, grade input, pass/fail judgment, and post-admission processing.
- Other operation management software
- Other information systems
A system example that can manage names, addresses, membership fees, and print address labels and payment slips!
- Other operation management software
- Other information systems
Membership registration, cancellation management, and usage history management! Linked with registration and inquiries from the internet.
- Other operation management software
- Other core systems
IT Introduction Subsidy 2023 | Start DX with Digitalization | Inventory and Reporting Management for 'Warehouses, Logistics, and Factories' with 'Genbuster'
- Other operation management software
Easy management for administrators who are not familiar with computer operations! Up to 50 monitored PCs.
- Other operation management software
Just hold up a FeliCa-compatible IC card! Easily and reliably manage the arrival and departure times of preschoolers with "Touen-chan Touch."
- Other operation management software
Dakkotsu-chan Touch is compatible with your IC card! An easy, convenient, and low-cost attendance management software.
- Other operation management software
A reliability solution that achieves a high-reliability virtualization system that is simple, robust, and cost-effective.
- Other operation management software
You can input daily reports on your smartphone and aggregate registered cases on your PC with Excel output available! Ideal for budget management and case management!
- Other operation management software
Efficient creation of reservation forms, accommodating a wide variety of seminars! A case study of system development that also achieves labor reduction.
- Other operation management software
De-personalization, recurrence prevention, and quality improvement effective with 'Knowledge × AI'! We support the utilization of AI in design operations.
- Other operation management software
Providing an environment that allows for stable disaster response even when communication disruptions occur due to disasters!
- Other operation management software
An all-in-one business support app born from the voices of support staff working on-site!
- Other operation management software
Achieving "business efficiency" through the utilization of AI and "visualization of support" through family collaboration!
- Other operation management software
An affordable environment that allows you to focus on core business! Visible support leads to gratitude from family.
- Other operation management software
By utilizing our company's designated format for delivery notes, we have reduced the time required to respond to the status of purchased parts by 70%!
- Other services
- Other operation management software
Customized interface for PS/2, keytops laser-printed and used as input terminals for manufacturing equipment.
- Other operation management software
A 3D innovation that has changed the industry! It is possible to eliminate all machine collisions.
- Other operation management software
Advanced features backed by LoadMaster technology, supported by customers around the world.
- Other operation management software
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Optimization of Citrix Virtual Apps and Desktops! A better load balancer.
- Other operation management software
Infrastructure DNS monitoring
In the early 1990s, it was common to simply register a company name as a domain name, with a straightforward approach of one domain per company, which incurred very little cost. Nowadays, in order to stay ahead of competitors and protect the brand, it is necessary to register domains for one's own services as well. The situation has changed significantly from the past to the present, but the process of registering a domain name remains an important procedure for supporting online business. In this blog, we will start by explaining what the Domain Name System (DNS) is, and then discuss important DNS servers and their monitoring for infrastructure. You can find more details about the blog through the related links below.
Streamlining secure application delivery! Support for a wide range of authentication methods.
- Other operation management software
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Consideration of issues and requirements! We offer three support levels with appropriate feature sets assigned.
- Other operation management software
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
99.9% IT system reliability achieved! Case study on measures against cyber attacks that enable significant monthly savings released.
- Other operation management software
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Simple and integrated log collection, alerts, and archiving! Also reduces licensing costs.
- Other operation management software
Seven Ways to Keep Business Files Safe and Protect Data
In December of last year, the systems of a third-party vendor for Uber Technologies Inc. were attacked by hackers, resulting in a data breach. Details of 77,000 Uber employees were leaked and put at risk. For a company to continuously operate its business, it is necessary to securely retain and transfer electronic files that often contain various confidential information. If a corporate culture exists that does not prioritize the protection of confidential data and tends to postpone it, it cannot avoid cybersecurity incidents. Gartner predicts that cyberattacks related to third parties will continue to increase beyond 2023. You can find more details in the related links below.
Monitoring network availability and performance! Numerous features such as alerts, reports, and inventory.
- Other operation management software
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
Achieve monitoring of the availability and performance of networks, systems, and applications!
- Other operation management software
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.