Products & ServicesSee also: Categories | Featured Products | Technical Articles | Engineering Web Results
Supplier: Softchoice Corporation
Description: The Astaro Security Gateway allows you to customize the type of security you deploy on your network. Astaro offers a selection of inter-operable security applications which can be activated individually or together on your hardware as needed. This offers the user a security solution tailored
Supplier: JTAG Technologies Inc.
Description: Buzz With Buzz , you can easily define up to two boundary-scan chains and quickly verify chain integrity. Once the chains have been checked, Buzz provides a sample of the I/Os. The watch window in Buzz shows you the current logic state of any specified boundary-scan pin on your board. Buzz also
Supplier: GE Intelligent Platforms
Description: AXISView is a suite of integrated graphical tools designed for complex multiprocessor systems. It provides system visualization with the ability to configure, download, run, debug and monitor a multiprocessor application from an integrated, intuitive GUI environment. It also provides a level of code
Supplier: OMEGA Engineering, Inc.
Description: The OMEGA® iTHX-SD transmitter lets you monitor and record Temperature, Relative Humidity and Dew Point over an Ethernet network or the Internet with no special software except a Web browser.
- Recorder Data Format: X-Y Plotter, Paperless / Video Graphing
- Datalogger / Recorder: Yes
- Signal Inputs: DC Voltage, AC Voltage
- Auxiliary Outputs: Voltage Output, Relay Output
Find Suppliers by Category Top
Featured Products for Computer Security Software Top
Chemsultants International Network, Inc.
EZ-Lab Software for Advanced Analysis & Reporting
EZ-Lab Data Management software interfaces with all of ChemInstruments' load cell based testing platforms. The software is a very simple and intuitive way to get more out of your testing equipment. EZ-Lab Data Management software provides test data results in report-ready format. This easy to use software provides powerful statistical analysis and reporting capabilities on any Microsoft Windows based personal computer. EZ-Lab Software Benefits. One main screen contains all commands to easily... (read more)
Browse Test, Inspection, and Measurement Software Datasheets for Chemsultants International Network, Inc.
System-level Electronics Design Environment
of leading-edge software and consulting services for electrical and electronic design and manufacturing. Founded in 1976, Zuken has the longest track record of technological innovation and financial stability in the electronic design automation (EDA) software industry. The company's extensive experience, technological expertise and agility, combine to create world-class software solutions. Zuken's transparent working practices and integrity in all aspects of business produce long-lasting and successful... (read more)
Browse Computer-aided Engineering Software (CAE) Datasheets for Zuken
Electro Standards Laboratories
Network Services - Security/Telephony Systems
Operation. POS Wiring & Terminal Installation. Software Upgrades & Router Installations. Experienced in multi-site, multi-state rollouts. Electro Networks' technicians are skilled in multi-site rollouts of Point of Sale wiring and terminal installation, security wiring, software upgrades, and router installation. Electro Networks is a one stop shop for all retail operation technology needs. Electro Networks announces expanded network services including network design, installation... (read more)
Browse Network Design and Development Services Datasheets for Electro Standards Laboratories
Summit 8800 Flow Computer
KROHNE ’s Summit 8800 Digital Flow Computer features a touch screen graphic display and dramatic performance, handling, and interoperability improvements over standard flow computers. An extensive feature set supports the latest developments in metering, data handling, and system maintenance at an extremely competitive price. TheSummit 8800 is ideal for a wide variety of custody and process applications, including metering oil, gas, wet gas, steam and water; bulk chemicals batching; heat... (read more)
Browse Flow Computers, Totalizers, and Indicators Datasheets for KROHNE, Inc.
Brookfield Engineering Laboratories, Inc.
TexturePro CT Software Now 21 CFR Compliant
CT3 Texture Analyzer orders. TexturePro CT software, which connects directly to your computer via USB, is designed specifically for use with Brookfield ’s CT3 Texture Analyzer. Customers currently using v1.2 can upgrade to v1.3 free of charge at www.brookfieldengineering.com/products/software/updates/TextureProCT/setup.htm. Major enhancements include the capacity to run on 32bit or 64bit operating systems, the addition of a new rupture test used to determine the break point of a sample... (read more)
Browse Texture Analyzers Datasheets for Brookfield Engineering Laboratories, Inc.
DELUMPER® Division, Franklin Miller, Inc.
TASKMASTER shredders are playing a major role in the proper disposal of computers drives and media. The safe destruction and disposal of a growing stream of electronic scrap and computer storage media is now a major recycling priority in this and many other countries. In the US alone, according to National Safety Council, more than 5,000,000 PCs will be relegated to the scrap heap in 2007. A major problem is that those PCs are loaded with confidential data such as names, accounts, social... (read more)
Browse Shredders Datasheets for DELUMPER® Division, Franklin Miller, Inc.
Conduct Research Top
Embedded Computers in Substation Automation (.pdf)
paper discusses how embedded computer systems can provide reliable automation for power substation networks. Microsoft Word - MOXA_White_Paper---Embedded_Computers_in_Substation_Automation.doc Moxa White Paper. Embedded Computers for Substation Automation. Daisy Dai, Product Marketing
Embedded Computers Introduced to Production Lines
Acquisition & Control. DAQ Software & Utilities. Communication. Bus Expansion. Remote I/O. Industrial LAN & Wireless. Inductive Power Distribution. Solutions. System Integration. Digital Signage Solutions. Medical Solutions. Security Solutions. Smart Grid & Energy. Test & Measurement. Manufacturing Automation
Embedded Computers for Integrated Railway Communication
. Wireless Accessories. Power Supplies. Industrial Computing. Specialized by Market. Marine Computers. Rail Computers. Power Substation Computers. Wireless Computers. Compact/Fanless Computers. Wide Temperature Computers. Display Computers. Rcore Software. Serial Connectivity. Serial Device Servers
Embedded Computers for Real-time Monitoring in the Mining Industry
Unit. Wireless Accessories. Power Supplies. Industrial Computing. Specialized by Market. Marine Computers. Rail Computers. Power Substation Computers. Wireless Computers. Compact/Fanless Computers. Wide Temperature Computers. Display Computers. Rcore Software. Serial Connectivity. Serial Device
Physical Network Security
. in someone's pocket. 724-746-5500 | blackbox.com. Page 4. Physical Network Security. Why physical access to computers is a problem. Unrestricted physical access to a computer or a network is your number one security threat. If a hacker has physical access to your. network, stealing information is easy
Wired 4.10: Jet-Powered Computers
of chemicals. They're small, light, and can run at room temperature. But they're also relatively weak. A century of research has explored ways to make chemical batteries as powerful as combustion engines with little success. Continuously fueled combustion engines, on. Wired 4.10: Jet-Powered Computers
Demonstrating Software Reliability (.pdf)
. In addition, systems engineers tend to be very comfortable in dealing with the reliability of Hardware (in terms of MTBF and MTTR). Software is not so mature in the field of measured reliability. This is a cause for concern, as Software is the cause of at least as many system failures as Hardware
The Many Faces of Security (.pdf)
generated constantly) that are scanned. the information to be sent or received is of a sensitive. by anti-virus software. Such viruses can cause a lot of. nature, such as a private e-mail or a credit card or social. damage before effective countermeasures are put in. security number. In this case
Engineering Web Search: Computer Security Software Top
Siemens USA - Software, Security & Systems
Software, Security & Systems Skip over Site Identifier Software, Security & Systems Software, Security & Systems
Desktop Security Software | Antivirus Software | Top Software...
Layered Security Model | Valuable Data | Anti Malware | Data Backup | Email Security | Web Security | Wireless Security | User Education | Security
Free Computer Security - Personal Software Inspector (PSI) -...
Free computer security Stay secure by updating insecure programs on your computer with the Secunia Personal Software Inspector (PSI)
Computer-aided software engineering - Wikipedia, the free...
Computer-aided software engineering (CASE) is the scientific application of a set of tools and methods to a software system which results in
Software engineering - Wikipedia, the free encyclopedia
Software engineering (SE) is the application of a systematic, disciplined, quantifiable approach to the design, development, operation, and
Guidance Software is recognized globally as a world leader in Digital Forensics, Cyber Security, and E-Discovery solutions.
Free Software Directory
The Free Software Directory From Free Software Directory security software-development system-administration
National Software Reference Library
Software Data Set TECHNICAL INFORMATION