Call status and dialing in organization charts Search for people and make calls Call enabled / Busy / Call in progress Making / Receiving a Call / Pickup / Call Forward / Transfer Caller Information including picture Outgoing / incoming calls / call notes Windows Vista - Windows7-Windows10 Call status and dialing in organization charts Search for people and make calls Making / Receiving a Call / Call Forward / Transfer Caller Information including picture IP-Phone ( LCD )
Call enabled / Busy / Call in progress Receiving a Call / Pickup / Call Forward Outgoing / incoming calls / call notes Call status and dialing Entire Organization / Department / Individual Group On-line Presence/ Alias Individual, Group, Broadcast, Attach File, Receive Read Confirmation, HTML Original Text, Emoticon, Background Color, Image, Insert Stationery A collection of conversations by timeline -display of unconfirmed conversation count, exit (delete) Conversation -1: 1, 1: N conversations, conversation invitations, fie (photo) transfer, emoticon transfer, shale, capture transfer, -display of conversation left and right, display of conversation read count detailed view of unverified conversation, deletion of conversation line, dialogue image capture -Capture image by conversation line, display Web Open Tag Voice Talk / Face Talk -Audio & Video Communication based SIP and interface with IP-Phone/PBX Remote Control / Desktop Sharing - Application / Acceptance-Based Remote Control, Remote Control Service by Authority In/Out Message Box, Alarm Message Box Scrolling internal ad image / Scrolling in internal news (notice, recruiter etc.) Windows : Windows Vista,Windows7 Windows10 Mac : Mac OS X 10.8 - MacOS Siera
Entire Organization / Department / Individual Group On-line Presence/ Alias Individual, Group, Broadcast, Attach File, Receive Read Confirmation, HTML Original Text, Emoticon, Background Color, Image, Insert Stationery A collection of conversations by timeline -display of unconfirmed conversation count, exit (delete) Conversation -1: 1, 1: N conversations, conversation invitations, fie (photo) transfer, emoticon transfer, shale, capture transfer, -display of conversation left and right, display of conversation read count detailed view of unverified conversation, deletion of conversation line, dialogue image capture -Capture image by conversation line, display Web Open Tag Voice Talk / Face Talk -Audio & Video Communication based SIP and interface with IP-Phone/PBX Remote Control / Desktop Sharing - Application / Acceptance-Based Remote Control, Remote Control Service by Authority In/Out Message Box, Alarm Message Box Scrolling internal ad image / Scrolling in internal news (notice, recruiter etc.) Windows : Windows Vista,Windows7 Windows10 Mac : Mac OS X 10.8 - MacOS Siera
Call status and dialing in organization charts Search for people and make calls Call enabled / Busy / Call in progress Making / Receiving a Call / Pickup / Call Forward / Transfer Caller Information including picture Outgoing / incoming calls / call notes Windows Vista - Windows7-Windows10 Call status and dialing in organization charts Search for people and make calls Making / Receiving a Call / Call Forward / Transfer Caller Information including picture IP-Phone ( LCD )
Audio / Video Conference Document Sharing , Application Sharing, Web Sharing White board marking, H.323 Codec, SIP Interface Conference Windows : Windows7-Windows10 Smart Phone : Android(5.0 - ) / i0S(8.x - )
Electronic and electric equipment such as pump, motor, boiler, screw , generators machinery and equipment.
Nvss(super nvr), face capture ip camera, nv series ip camera, face recognition, non contact temperature terminal with facial recognition.
Shoes, electronics, house ware, kitchenware's, eye wares, sports, cell phones.
3D printer, electro spark machines, cable harnesses.
HI-WARE is an IAM Solution which integrates HI-TAM (Access Management Solution), HI-DBAM (Database Access Management Solution), HI-TIM (Identity Management Solution) and HI-DBIM (Database Identity Management Solution), built and enhanced with years of experience by the best engineers. HI-TAM and HI-TIM work together as HI-WARE, solution for secure authentication, access management, activity monitor log, SSO, and many more features in a single platform. HI-WARE eliminates problems that can arise from heterogeneous solutions, solidifying security of your data, as well as great enhancement in convenience for the users by utilizing single UI and process.
Electronic devices such as tvs, curve smart tv, lg smart tv laptops.Shipping
Electronic, electric, industrial and automotive, light, automation, cars, cosmetic, perfume, haircare, tools, tools and key programmer for locksmiths and key and transponder, locks for car and house, alarm system, laptop, cell phone, playgame, CNC and derivative, agriculture Machines.
Used Smartphones, Tablets And Computers.
Used laptops and used iphones.
Small electric home appliance.
Mobile phone, communication system.
Bio Medical Instruments, Laboratory Instrument, S Spectrophotometer, Indirect Elisa Kit, Fully Automatic Immuno Analyzer And Luminometer.
Introduction 2 of authentication service method before transaction Ensure setting the periods and the number of secure card transactions through credit card owner's authentication before transactions The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public
Introduction 3 of authentication service method before transaction The S2K users can safely and conveniently confirm your identity for your data of portal and Nothing can access to all of your important data such as documents, photos and videos, without a certification The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public
Introduction 1 of authentication service method before transaction Ensure secure card transaction through credit card owner's authentication before transaction The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public