Aprima Medical Software, Inc

Software

Software Module protects against emerging viruses.

Zero-Hour Anti-Virus(TM) module protects enterprises against emerging virus attacks in real-time. It protects against viruses and other forms of malicious code during first hours, after new viruses are released and before anti-virus signatures have been updated. Combining global analysis of internet traffic patterns with local containment of suspicious messages and attachments, module constantly...

Read More »

Email Security Appliance offers plug-and-play operation.

To address security threats and compliance requirements, PxAppliance enables email security encryption and operates with all email clients and platforms. Features include enterprise-class PostX secure delivery solutions and policy management; ability for encrypted messages to be read anywhere, anytime, and on any device; and rack-mount design. Deployed within several hours, hardware unit lets...

Read More »
Communication Systems & Equipment

Mercury Monitoring System suits coal-fired power plants.

To satisfy PS-12A mercury CEMS performance standard required by Clean Air Mercury Rule, continuous emissions monitoring system (CEMS) employs Cold Vapor Atomic Fluorescence (CVAF) technology for measuring mercury. Product enables low detection limits and total vapor phase measurement while minimizing sample loss during transport. This eliminates need for external calibration gasses and optimizes...

Read More »
Software

Software provides defense mapping.

Designed for military command and control applications, ILOG JViews(TM) Maps for Defense offers commercial graphics toolkit for creating interactive maps for defense industry that can be displayed on laptop computers. It can display real-time field data and supports video-like zooming, object animation, as well as detailed and realistic terrain information. Computer memory management allows for...

Read More »
Software

Software supports project-based manufacturing.

Component-based IFS Applications(TM) v7 suite gives users single view of projects throughout product lifecycle. Through project-centric functionality, project view covers complete lifecycle of each design in PLM, SCM, CRM, EAM, MRO, Finance, and HR. Application suite lets information be controlled and shared through high-security, portal-based solutions, and details can be exported to standard...

Read More »
Software

Software provides enterprise management solution.

Suited for SMBs, IBM eServer solution for Oracle's JD Edwards EnterpriseOne and JD Edwards World helps manage core business operations. Solution, offered on i5 520 models of IBM's midrange server as extension of IBM eServer i5 550 Solution Edition, offers Web-enabled environments and facilitates deployment and administration. Single-server solution simplifies IT environment by helping clients...

Read More »
Services

Secure Service aids in VoIP setup and management.

SecureVoIP(TM) provides enterprises with policy-based security management and network control capability to automatically provision, implement, and manage VoIP communications to device and user application level. Utilizing WirePower(TM) Converged Control technology as network operating and directory management system, solution provides security management and network control capability critical...

Read More »
Printing & Duplicating Equipment

Chip Mask Creator provides complete ILT capability.

Acting as replacement for Resolution Enhancement Technology (RET) software, Explorer uses Inverse Lithography Technology (ILT) platform to evaluate desired on-wafer pattern and mathematically determine mask features needed to produce intended silicon outcome. ILT analyzes entire image and generates globally optimized mask design in single pass. Combining software and hardware, Explorer features...

Read More »
Software

Software helps manage security services.

Enabling users to take proactive actions to improve effectiveness of security controls, OnlineGuardianÂ-® v3.5 provides visibility into managed environments. It delivers ability to receive clear view of security infrastructure state and understand threats impacting business. Solution includes data warehousing, health monitoring, and security dashboard features that are based on user-defined...

Read More »

All Topics