UPM RFID

Software

Software promotes scalability for virtualization on servers.

With support for System z9 109, z/VMÂ-® v5.2 provides scalability for memory-constrained environments by effective utilization of more than 2 Gb of real memory. This offers constraint relief for virtual-server environments, including those with Linux(TM) on System z9 and zSeries guests. Along with SCSI disk support, software provides platform for integrating applications, data, and...

Read More »
Software

OS Software suits enterprise and web-based applications.

Optimizing TCP/IP networking, z/OS.e v1.7 provides advances in business resiliency and security with extensions to GDPS(TM) for system recovery and RACFÂ-® interoperability. It delivers XL C/C++ with C compiler designed to support ISO C1999 standard, and supports Transport Layer Security, which is application-transparent. To help simplify systems management, IBM Health Checker for z/OS...

Read More »
Software

Data Management Software offers multi-CAD integration.

Cyco AutoManager Meridian 2005 and Cyco AutoManager TeamWork 2005 automate and streamline strategic management of engineering data across information lifecycle. Cyco AutoManager Meridian 2005 is suited for larger organizations, while Cyco AutoManager TeamWork 2005 is suited for departmental operations. Both utilize Inventor assembly browser, which enables designers see status of all sub-component...

Read More »
Voice Recognition Module facilitates system design.
Automatic ID

Voice Recognition Module facilitates system design.

Based on 8-bit RSC-4128 IC, VR Stamp(TM) enables integration of voice recognition into consumer, industrial, automotive, and medical electronics. IC delivers speech recognition, synthesis, and system control. Flash memory, serial EEPROM, clock crystals, and power noise management components are all packed into standard 40-pin DIP footprint. FluentChip(TM) software offers speech recognition,...

Read More »
Communication Systems & Equipment

Wireless IP Phone runs on real-time Linux operating system.

Built on open standards, WIP 2 is compatible with any IP telephony system using Session Initiation Protocol. It incorporates jitter buffer for speech quality, provides 2 call appearances, and supports voice encryption, paging, 3-way conferencing, presence, instant messaging, and all standard telephony functions. In speaker phone mode, full duplex acoustic echo cancellation ensures optimal sound...

Read More »
Software

Software helps improve Web application interface.

Cross-platform JavaScript navigation component, dhtmlxTree v1.1, provides hierarchical view of data and allows web developers to create extensible DHTML tree control. Client-side API allows complete customization of tree view with JavaScript, and tree structure and appearance can be configured through XML. Dynamical loading of items from XML stream lets users create trees with unlimited number of...

Read More »
Software

Software provides check image exchange.

Electronic check routing solution, PayCourierÂ-® Check 21 imports images, converts data according to industry standards, and routes images to image-enabled institutions. Product can establish unlimited number of capture points and present items to multiple exchange points after conversion. Image Replacement Document module allows user to produce IRDs that can be processed as substitute...

Read More »
Pin and Sleeve Devices conform to IEC 309 standards.
Architectural & Civil Engineering Products

Pin and Sleeve Devices conform to IEC 309 standards.

Watertight plugs, receptacles, connectors, inlets, and mechanical interlock devices provide safe electrical connections in commercial and light industrial environments subject to temperature extremes, vibration, impact, dirt, moisture, corrosive elements, and wash downs. Housings are flame retardant, impact-resistant and non-corrosive Valox and nylon material. Rated to 20, 30, 60, and 100 A,...

Read More »
Electronic Padlocks provide key control and audit trail.
Fasteners & Hardware

Electronic Padlocks provide key control and audit trail.

Electronic Padlocks consist of pick-proof CyberLock cylinder in padlock, CyberKey-® that cannot be duplicated, and CyberAudit-® access control software. Each time CyberKey opens padlock, record of user ID, date, and time is stored in lock and key. Key can be programmed to restrict authorized user's access to specific padlocks on pre-selected days and times. Padlocks are available with...

Read More »

All Topics