Aprima Medical Software, Inc

Machinery & Machining Tools

Boring Machine can bore door lock/latch holes in any location.

Adjustable to accommodate lengths from 5-32 in., Lock Block Boring Machine is designed to bore lock and latch holes in lock blocks for insertion into production door makeup. Touchscreen enables operator to set hole location, turn on appropriate motors, and troubleshoot any problems that arise. Capable of processing up to 3.7 doors/minute with up to 9 holes/door, machine bores holes from both...

Read More »
Software

Network Threat Monitoring Software delivers real-time analytics.

RSA NetWitness Live(TM) helps organizations enhance situational awareness and shorten response time regarding potential threats. Real-time security analytics and advanced threat detection offer visibility into potential attack vectors. Cloud-based, 24/7 threat intelligence delivery platform aggregates, analyzes, and spotlights most relevant security content from approximately 100 trusted sources...

Read More »
Communication Systems & Equipment

Wireless Edge System helps network operators increase capacity.

SmartCell(TM) heterogeneous small cell wireless edge system lets operators add wireless capacity, increase coverage, and provide edge services while relieving radio access, backhaul, and core infrastructure bottlenecks. Combining SmartCell 8800 multi-radio, multi-function access point and SmartCell 200 gateway, system lets operators enhance and extend macro networks with smaller cellular networks...

Read More »
Software

Mobile Device Management Software facilitates app distribution.

With AfariaÂ-® 7.0, enterprise IT can manage mobile applications and devices through UI. Self-service portals help minimize IT workloads by allowing users to enroll and manage devices, while application management functions provide seamless app delivery, updates, security, and integration with SAPÂ-® Store. Device security protects sensitive corporate data while leaving personal data...

Read More »
Optics & Photonics

Uncooled Thermal Camera provides remote fire detection.

With flame detection capability, EyeSec(TM) can detect 75 x 75 cm fire up to 840 m away within 5 seconds. Detection ranges increase for larger-sized fires up to 6 x 6 m and distances up to 6.5 km. Camera scans area of interest and alerts when any object in field of view reaches critical temperature threshold. Upon determining that fire or risk exists, camera adds visual alarm overlay to outgoing...

Read More »
Software

Voice Service Assurance Software enhances network monitoring.

Voice over LTE (VoLTE) service assurance for Omni-Q lets operators monitor VoLTE and circuit switch fallback architectures for voice and SMS services over LTE networks. Solution leverages RADCOM IMS Monitoring Solution to make use of fully correlated end-to-end session-based SIP signaling analysis and voice quality measurements based on RTP protocol analysis, such as mean opinion score. Also,...

Read More »
Software

DNS and DHCP Core Engines target mobile operators.

Helping mobile providers achieve differentiation and network efficiency, Nominum Mobile Suite(TM) includes mobile packet core, which integrates standard caching and authoritative DNS services into single solution for 3G/4G networks. Program provides anywhere/anytime access to information generated by network, and enables providers to create network-based, value-added functions, from protection...

Read More »
Software

Marketing Optimization Software helps maximize campaign results.

By compiling historical data and building hundreds of thousands of statistical models, Kenshoo Portfolio Optimizer v3.0 forecasts impact of each bid change on search marketer's entire keyword portfolio. KPO adjusts bids to maximize profit, revenue, conversion, traffic, or other goals set by advertiser. Version 3.0 is powered by self-learning algorithm that incorporates custom seasonality...

Read More »
Software

Cloud-Based Content Store offers application tests.

Delivering more than 3,000 tests, Mu TestCloud validates application and security policies on intelligent enterprise networks. Cloud-based repository helps customers accurately recreate real application traffic mixes. Content is constantly updated, based on customer demand and popularity. In addition to security attacks such as zero-days and exploits, Mu TestCloud delivers tests for recreating...

Read More »
Safety & Security Equipment

Credit Card Processing System offers point-to-point encryption .

TransactionShield and TransactionVault hardware-based encryption and tokenization ensures that unencrypted payment card data is not processed, stored, or transmitted on enterprise solution systems, as it is encrypted at initial point of swipe using encrypting card reader. Encrypted credit card data is then securely transmitted for decryption and processing. System generates token that is returned...

Read More »

All Topics