Aprima Medical Software, Inc

Software accelerates BPM initiatives for legal industry.

When deployed on Metastorm BPMÂ-® software suite, Process PodÂ-® for New Business Intake enables law firms to automate management of critical tasks associated with screening new clients and new business matters and managing potential conflicts. Program provides auditable environment for compliance and risk management, collaboration across firm, visibility and control over key information,...

Read More »
Test & Measurement

Comparators feature sub-nanosecond propagation delay.

With 700 ps propagation delay, dual 21 mA Model LMH7322 features rise and fall times of 160 ps and dispersion of 5 ps at greater than 100 mV overdrive. Separate input and output supply pins enable level-shifting applications. Providing propagation delay of 2.9 ns, single Model LMH7220 features 0.6 ns rise and fall times and consumes 6.8 mA at 5 V. LVDS output drives 325 mV into 100 W symmetrical...

Read More »
Computer Hardware & Peripherals

Media Gateway Processor targets VoIP applications.

Carrier-class Entropia(TM) IV SoC processor scales to meet processing requirements of both fixed communications and mobile infrastructure. Embedding combination of DSP and RISC network processors on single chip, unit assures better than 30 gigamultiply accumulate operations/sec of DSP processing and 1 GOP of network processing to drive more than 1,000 voice channels/chip. Power management and...

Read More »

MOSFETs minimize heat generation in servers and notebooks.

Fabricated with 0.25 micron process, uPA272xUT1A Series provides on-resistance from 2.0-7.7 mW, while uPA273xUT1A Series ranges from 2.6-3.1 mW. Units in uPA272xUT1A family help power CPUs and chipsets in notebooks, desktop PCs, and servers. Series uPA273xUT1A is used in protection circuitry of Li-Ion batteries for notebook PCs, and helps prevent heat generation and explosions that may result...

Read More »
Services

Service lets users read voicemails anywhere, anytime.

Transcribing voicemails to text, Vonage Text enables customers to read, store, search, and respond to voicemail messages on phone, laptop, or mobile device. Users can scan new messages to see which are urgent, and prioritize their responses, as well as search for specific information within email messages.

Read More »
Safety & Security Equipment

Email Security Appliance defends against malware.

Based on MailMarshal SMTP software, MailMarshal eIOOOO provides deep content inspection as well as protection against spam, phishing, spyware, viruses, fraud, porn, DHA, DOS, regulatory noncompliance, and intellectual property theft. Unit includes Pentium 4 CPU with redundant hard drives and is scalable for small to very large enterprise deployments. Array management technology permits...

Read More »
Software

Software provides hosted email security services.

MailMarshal Service Provider Edition offers managed and Internet service providers with range of hosted email security services that can be tailored to customers' requirements, including email filtering, policy control, archiving, and reporting. It features Array Manager Architecture, and centralized management console enabling MSP/ISP staff to manage policies, user accounts, and messages across...

Read More »
Software

Software extends Microsoft Windows Presentation Foundation.

By using vector-based graphics, subtle animation, and stylization capabilities of WPF platform, NetAdvantageÂ-® for WPF 2007 Volume 1 gives developers tools needed to create user interfaces. Program provides traditional tabular style data editing scenario developers are familiar with. It includes xamDataGrid presentation control, which supports many grid UI features such as inline data...

Read More »
Software

Software secures enterprise endpoints from data leaks.

GuardianEdge Device Control provides granular access control over peripheral ports and connected external devices on enterprise PCs. It stops sensitive data from leaking out of organization while preventing malicious code from entering networks. With program, administrators can set policy-based user access controls for ports and devices that align with business requirements. Audit and alert...

Read More »

All Topics