Aprima Medical Software, Inc

Software

Software manages lifecycle of spreadsheets.

Audit and Balancing System for Spreadsheet Compliance ensures integrity and consistency of enterprise information by automating labor-intensive balancing and reconciliation processes that are subject to error when performed manually. Providing system for data import, version control, auditing, collaborative review/approval, and retention management, software also offers system and document-level...

Read More »
Communication Systems & Equipment

Audio Amplifiers offer mono and stereo capabilities.

Available in 2 mono and 2 stereo versions, with or without mute/enable function, PAM8x02 Series Class-D digital audio amplifiers deliver 2 W into 8 ohm load at less than 10% THD + noise, with efficiencies of over 85%. Only one input coupling capacitor per channel is needed in external circuit. PAM8x01 series of 1.2 W amplifiers includes PAM8301 (mono) and PAM8401 (stereo) Class-D audio...

Read More »
Computer Hardware & Peripherals

Remote Management Session Server manages VoIP switches.

Remote Management Session Server provides encrypted/secure network management for remote TenorÂ-® switches situated behind network address translation firewalls. Tenor VoIP switches and gateways will auto-register with RMSS, which will email administrator that switch is on-line and manageable remotely via telnet, FTP, or Tenor Configuration Manager. Server is housed on 1U, rack-mountable...

Read More »
Automatic ID

Fingerprint Recognition Sensor eliminates need for keys.

Scratch-resistant FDA02DL(TM) sensor features PC Board, Auto-On(TM), and Adaptive Enrollment(TM) that maintains varying quality levels of enrolled fingerprints and periodically updates user's enrollment profile. Unit works both indoors and outdoors and accepts range of fingerprints including wet, aged, dry, small-sized, and scarred. Sensor stores fingerprint data for up to 100 users and is...

Read More »
Computer Hardware & Peripherals

SoCs are designed for wireless applications.

Available in 2 configurations, OCTEON CN30XX MIPS64Â-® SoC processors provide multi-100 Mbps application performance and include integrated Gigabit Ethernet interfaces. They integrate custom MIPS64 processor core with advanced multi-layer application acceleration and security processing hardware for delivering wired and wireless (802.11a/b/g/n) broadband routers, gateways, wireless access...

Read More »
Computer Hardware & Peripherals

SATA Desktop Hard Drives provide 300 MB/s transfer rate.

Providing 0.5 TB of capacity for data-intensive applications such as graphic design and digital video editing, WD CaviarÂ-® SE16 500 GB Drives deliver 7,200 rpm performance, 16 MB cache, and native command queuing. Noise levels are virtually imperceptible to human ear in home and business environments with WhisperDrive(TM) technology. SoftSeek(TM) technology streamlines read/write seeking...

Read More »
Software

Software protects against Blackworm email virus.

Mitigation Packages are available in 2 types: one to scan hard drives for Blackworm and remove it if it exists, and another to jumpstart computers with virus definitions that are out of date, signaling them to immediately retrieve latest antivirus software. Also known as Blackmal, Nyxem.E, Win32/MyWife.E, CME-24, Tearec.A, and KamaSutra, Blackworm corrupts files of business applications and...

Read More »
Communication Systems & Equipment

Mobile Phone offers Bluetooth, infrared, and USB.

Quadband Nokia 6125 operates in GSM 850/900/1800/1900 networks and is equipped with 1.3 megapixel camera with 8x digital zoom, video recording, and dedicated camera button. Features include MMS, instant messaging, push to talk, and Nokia Xpress audio messaging, Macromedia Flash Player, integrated email client that supports attachments, and built-in digital music player that supports music formats...

Read More »
Software

Software provides unified protection across enterprise.

Integrated Threat Management r8 provides comprehensive, scalable protection against malware, spyware, rootkits, blended threats, and other forms of malicious code. Features include automatic threat alerts, 75 detailed, graphical reports, automated bandwidth-saving signature, and agent communications that provide real time visibility into enterprise computing assets. Administrators can...

Read More »

All Topics