Please click here to check who's online and chat with them.

Find Verified Computers Electronics Communications Electrical Suppliers, Manufacturers and Wholesalers

Top Supplier Cities : Seoul   -   Ansan-Si  
May-24-19
Supplier From Gyeonggi-do, South Korea (Republic Of Korea)
 
Call status and dialing in organization charts Search for people and make calls
Call enabled / Busy / Call in progress
Making / Receiving a Call / Pickup / Call Forward / Transfer Caller Information including picture
Outgoing / incoming calls / call notes
Windows Vista - Windows7-Windows10
Call status and dialing in organization charts Search for people and make calls
Making / Receiving a Call / Call Forward / Transfer Caller Information including picture
IP-Phone ( LCD )
May-24-19
Supplier From Gyeonggi-do, South Korea (Republic Of Korea)
 
Audio / Video Conference
Document Sharing , Application Sharing, Web Sharing White board marking, H.323 Codec, SIP Interface Conference
Windows : Windows7-Windows10
Smart Phone : Android(5.0 - ) / i0S(8.x - )
Sep-14-01
Supplier From Busan, South Korea (Republic Of Korea)
Jun-30-20
Supplier From Chongqing, South Korea (Republic Of Korea)
Feb-24-14
Supplier From Seoul, South Korea (Republic Of Korea)
2057 Computers Electronics Communications Electrical Suppliers
Short on time? Let Computers Electronics Communications Electrical sellers contact you.
Mar-11-15
Supplier From Chang Won, South Korea (Republic Of Korea)
May-02-19
Supplier From Seoul, South Korea (Republic Of Korea)
GOLD Member
Nov-14-19
Supplier From Busan, South Korea (Republic Of Korea)
May-07-02
Supplier From Seoul, South Korea (Republic Of Korea)
Nov-18-19
Supplier From South Korea (Republic Of Korea)
Jun-19-23
Supplier From South Korea (Republic Of Korea)
Jun-12-15

Hi-Ware

MOQ: Not Specified
Supplier From Seoul, Yeoungdeungpo-Gu, South Korea (Republic Of Korea)
 
HI-WARE is an IAM Solution which integrates HI-TAM (Access Management Solution), HI-DBAM (Database Access Management Solution), HI-TIM (Identity Management Solution) and HI-DBIM (Database Identity Management Solution), built and enhanced with years of experience by the best engineers.

HI-TAM and HI-TIM work together as HI-WARE, solution for secure authentication, access management, activity monitor log, SSO, and many more features in a single platform.
HI-WARE eliminates problems that can arise from heterogeneous solutions, solidifying security of your data, as well as great enhancement in convenience for the users by utilizing single UI and process.
Jul-26-21
Supplier From South Korea (Republic Of Korea)
Mar-19-08
Supplier From Seoul, South Korea (Republic Of Korea)
Dec-29-22
Supplier From Yongin-si, Gyeonggi-do, South Korea (Republic Of Korea)
 
- Design & Development of On-Demand System
- Development of UI(User Interface) Software

Applications :
Develop application software

Features :
Develop customized software (for Windows)
Have a library of various industrial measurement and control components (motion, cameras, industrial measuring instruments, etc.).
Support various development languages
Develop industrial automation equipment, inspection instrumentation software.
Develop the Machine Vision software.
Consulting on securing data measurement accuracy and system reliability.
Manage and maintain the development data and establish support system
Feb-22-23
Supplier From Yongin-si, Gyeonggi-do, South Korea (Republic Of Korea)
 
- Design & Development of On-Demand System
- Development of UI(User Interface) Software

Applications :
Develop application software

Features :
Develop customized software (for Windows)
Have a library of various industrial measurement and control components (motion, cameras, industrial measuring instruments, etc.).
Support various development languages
Develop industrial automation equipment, inspection instrumentation software.
Develop the Machine Vision software.
Consulting on securing data measurement accuracy and system reliability.
Manage and maintain the development data and establish support system
Mar-22-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
Introduction 2 of authentication service method before transaction

Ensure setting the periods and the number of secure card transactions through credit card owner's authentication before transactions

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public
Mar-22-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
Introduction 3 of authentication service method before transaction

The S2K users can safely and conveniently confirm your identity for your data of portal and Nothing can access to all of your important data such as documents, photos and videos, without a certification

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public
Mar-22-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
Introduction 1 of authentication service method before transaction

Ensure secure card transaction through credit card owner's authentication
before transaction

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public
May-16-17
Supplier From Seoul, South Korea (Republic Of Korea)
 
Introduction 1 of authentication service method before transaction

Ensure secure card transaction through credit card owner's authentication
before transaction

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public
2057 Computers Electronics Communications Electrical Suppliers
Short on time? Let Computers Electronics Communications Electrical sellers contact you.