List of Other Software products
- classification:Other Software
1~45 item / All 369 items
The purpose depends on your ideas! A small swivel bearing "Rakkaru" that allows you to easily and lightly rotate heavy objects!
- Metal bearings
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Providing cutting-edge methods and technologies for electronic state calculations and computational chemistry models across a wide range of fields, including chemistry, biochemistry, and physics.
- Computational Chemistry
- Other research software
- Other Software
Based on the raw voices of 10,000 business professionals, we highlight the "now" of generative AI!
- Software (middle, driver, security, etc.)
- Other Software
Achieving UI improvement through the use of corporate websites and sales office guides for new customers!
- Software (middle, driver, security, etc.)
- Other Software
To maximize the effects of generative AI, not only individual skill enhancement but also organizational efforts are essential!
- Software (middle, driver, security, etc.)
- Other Software
Instant responses with 200 types of printing techniques! Efficient customer support realized with an AI chatbot.
- Software (middle, driver, security, etc.)
- Other Software
Protecting payment data from the threat of quantum computers!
- Other Software
Hardware-level security solutions to enhance the safety of online exams.
- Other Software
Hardware-level solutions to enhance the security of IoT devices.
- Other Software
Security solutions that protect data and hardware.
- Other Software
Security solutions that protect data and hardware.
- Other Software
Security solutions to protect supply chain data and hardware.
- Other Software
Security solutions to protect the data and hardware of smart grids.
- Other Software
Hardware-level security that protects the safety of medical data.
- Other Software
Security solutions that protect data and hardware.
- Other Software
A security solution to protect secret communications from the threats of quantum computers.
- Other Software
Protecting financial transactions from the threat of quantum computers.
- Other Software
It is the only transdermal absorption simulation software in Japan that has a proven track record of use in pharmaceutical companies and universities.
- Other Software
Specialized in review and approval! Smooth realization of online and automated current business workflows.
- Other Software
Providing hardware-level security solutions to protect data and hardware!
- Other Software
UI, parameters, and communication compliant with SEMI standards are possible! Control of image boards (FPGA), cameras (CL, CXP), etc.
- Other process controls
- Other Software
Stop creating for no reason and structure the process to achieve results!
- Other Software
Introducing the report "AI2027" and the book "AI2041," which predicts what comes next!
- Other Software
Introducing a powerful ally, "AI (Artificial Intelligence)," that will help you reclaim your time!
- Other Software
Since it does not include traditional algorithms, it is suitable for customers who only require the new Quantum Safe algorithms!
- Other Software
During the maintenance period, we provide engineer-level support and updates!
- Other Software
Optimized for minimal footprint and stack usage! Hardware and OS-independent design.
- Other Software
Providing cryptographic algorithms for the post-quantum cryptography (PQC) era, focusing on performance and reliability!
- Other Software
The system guarantees to boot only images from trusted sources without making any changes to the images!
- Other Software
Rapid response and minimal disruption in the update cycle are guaranteed!
- Other Software
It is also possible to use it independently in custom-developed products and provide the necessary cryptographic functions!
- Other Software
Deployed by major vendors of physical and virtual cloud/network products, printers, embedded devices, and more!
- Other Software
Secure applications can be assigned unique roots and keys, allowing for the establishment of independent permissions and access levels!
- Other Software
The IPsec implementation minimizes development costs and shortens time to market!
- Other Software
Able to establish over 3,800 IPsec tunnels per second! Demonstrates excellent scalability with a multi-core architecture.
- Other Software
Security gateway, providing high interoperability and portability for cloud implementation and use with IoT devices!
- Other Software
The built-in QSE core firmware allows the core functions to accommodate future updates to NIST specifications!
- Other Software
Achieve future-proof encryption with a quantum-resistant cryptography library!
- Other Software