Home securely
 

Keywords :   


Tag: securely

Telefónica securely signs Proteus STB software images with Fastcom

2021-09-15 08:30:55| Digital TV News

September 14, 2021 Fastcom has announced that Telefónica is using its MCAS solution to securely sign software images for installation on its Proteus set-top-boxes. MCAS is a managed service, available 24/7, from Fastcom.

Tags: software images signs securely

 

Digital flowmeter securely measures air usage on a wireless network

2017-06-30 21:09:50| Canadian Plastics Headlines

EXAIRs new digital flowmeters have wireless capability, enabling them to reliably and securely measure and monitor compressed air usage, trends and histor The post Digital flowmeter securely measures air usage on a wireless network appeared first on Canadian Plastics.

Tags: digital network air wireless

 
 

Chat Securely With Tor Messenger Beta

2015-10-30 18:02:10| PC Magazine Software Product Guide

Tor Messenger beta lets you chat securely on familiar messaging services.

Tags: chat beta messenger tor

 

StripFeeder Transition Rail securely holds components in tracks.

2015-09-14 14:31:08| Industrial Newsroom - All News for Today

Featuring machined tracks for both paper and emboss tape on same rail for seamless transition, Transition Rail lets end-users fully utilize StripFeeder platform without loss of component lane. StripFeeder Transition kits are set to run 3 lanes of paper tape and 3 lanes of emboss tape in 0.25, 0.50, and 0.75 in. pocket depths. StripFeeder .mod and Mini systems feature removable rails that can be mounted to accommodate various tape sizes in same feeder.

Tags: components tracks holds transition

 

Access Management Software securely supports mobile devices.

2015-04-20 14:31:08| Industrial Newsroom - All News for Today

Identity and Access Management Suite v9.0 includes Hitachi ID Mobile Access for Android and iOS, which enables access to all product features from phones and tablets. Along with dashboards and reports, features include ability to feed report output into requests to automate access remediation. Communication between user's device and on-premise IAM system is facilitated by cloud-hosted proxy service. To ensure security, devices must be activated via scanned QR code.

Tags: software management access mobile

 

Sites : [1] [2] [3] [4] next »