Suggested Categories:

Guided Selling Software
Guided selling software are tools that help sales reps and customers move through the sales process. Guided selling tools guide sales reps through the entire sales cycle and selling process, so that they can close more deals and become more efficient at selling.
PDF Editors
PDF editors allow users to create, modify, and manage PDF documents by adding, removing, or editing text, images, and other elements within the file. These platforms typically offer tools for annotating, highlighting, and commenting on PDFs, as well as the ability to rearrange pages, merge multiple PDFs, or split a single document into several files. PDF editors also often include features like form filling, digital signing, and password protection, enhancing document security and interactivity. By using PDF editors, businesses and individuals can customize documents, improve collaboration, and streamline workflows for handling digital paperwork.
User Research Software
User research software, also referred to as UX research or user testing software, enables organizations to research and understand all aspects of the user experience and customer journey. These tools typically include features for conducting surveys, user interviews, usability testing, and feedback collection through various channels such as websites, mobile apps, and social media. They may also provide analytics capabilities to analyze patterns in user data, identify pain points, and uncover actionable insights. User research software is essential for improving user experience (UX), optimizing interfaces, and ensuring that products meet the needs and expectations of their target audience.
PDF Converters
PDF converters are software tools that enable users to convert PDF documents into different formats, such as Word, Excel, PowerPoint, HTML, or image files, and vice versa. These platforms allow users to extract text, images, and tables from PDF files, making the content editable and easier to manipulate. PDF converters can handle both scanned and native PDFs, offering features like OCR (Optical Character Recognition) for extracting text from images. With the ability to convert files to and from PDF, users can easily share, edit, or archive documents in the most appropriate format for their needs. By using PDF converters, businesses and individuals can improve document workflow and increase productivity.
PDF Readers
PDF readers are software applications that enable users to access, open, and read PDFs. PDF readers are essential tools for being able to open and read PDF files. Advanced PDF readers may also support form filling, digital signatures, and interactive features embedded in PDF documents. PDF readers are widely used in both personal and professional settings to view reports, manuals, eBooks, contracts, and other documents that need to preserve formatting across different devices and platforms.
PDF SDK
PDF SDKs (Software Development Kits) provide developers with the tools and libraries needed to integrate PDF functionality into their applications or websites. These SDKs offer features like viewing, editing, creating, converting, and annotating PDFs, allowing developers to build custom PDF solutions tailored to their needs. PDF SDKs often include APIs for manipulating text, images, and form data, as well as for handling document security, such as encryption and password protection. By using PDF SDKs, developers can add robust PDF capabilities to their software without having to build these features from scratch, saving time and resources.
PDF Software
PDF software refers to a range of tools designed for working with PDF (Portable Document Format) files, which are widely used for document sharing and storage. These tools offer a variety of functions, such as creating, viewing, editing, converting, securing, and managing PDF files. PDF software can be used for tasks like merging or splitting documents, adding annotations, filling out forms, applying digital signatures, and securing documents with passwords or encryption. It is commonly utilized across industries for document collaboration, official documentation, and data exchange due to its universal compatibility and ability to maintain formatting across different platforms.
Layer 2 Protocols
Layer 2 protocols are blockchain protocols that are built on top of an existing blockchain network. A layer 2 protocol is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications can be built on Layer 2 protocols, and layer 2 protocols interact with layer 1 protocols in order to improve efficiency and overall user experience.
B2B Payment Platforms
B2B payment platforms are digital solutions designed to facilitate and streamline financial transactions between businesses. These platforms provide secure, efficient, and scalable methods for companies to send and receive payments, manage invoices, and handle cross-border transactions. Features often include support for various payment methods (such as ACH, wire transfers, credit cards, and e-wallets), invoice management, payment reconciliation, and fraud prevention tools. B2B payment platforms help businesses reduce administrative costs, improve cash flow management, and ensure compliance with regulatory requirements. By automating payment workflows and improving the speed and accuracy of transactions, these platforms enhance the overall efficiency of business operations.
B2B Data Providers
B2B data providers offer companies access to large sets of business-related data, which can include information on companies, contacts, industries, financials, and market trends. This data is valuable for businesses looking to expand their customer base, enhance lead generation, conduct market research, or refine their sales strategies. B2B data providers often deliver enriched contact information, company profiles, and detailed insights on decision-makers, helping businesses identify potential leads and make informed decisions. These services may include databases with direct access to contacts, industry reports, and analytics to improve targeted outreach and account-based marketing strategies.
PDF APIs
PDF APIs are software interfaces that enable developers to integrate PDF-related functionality into their applications or websites. These APIs allow for the creation, manipulation, conversion, and extraction of content from PDF files without requiring users to manually open or edit the files. Common features of PDF APIs include merging, splitting, editing text, adding annotations, and extracting text and images. They can also handle PDF conversions, such as converting PDFs to other formats like Word, Excel, or HTML, and vice versa. By using PDF APIs, businesses can automate document workflows, enhance document management systems, and integrate PDF capabilities into custom applications seamlessly.
PDF Compressors
PDF compressors reduce the file size of PDF documents while preserving the content and formatting. These tools optimize the PDF by removing unnecessary data, compressing images, and adjusting file structures to decrease storage requirements and improve file transfer speeds. PDF compressors are useful for businesses and individuals who need to share large PDF files via email or upload them to websites, ensuring they remain accessible and easy to handle without sacrificing quality. Many PDF compression tools offer batch processing, allowing users to compress multiple files at once, saving time and effort.
PDF Merge Software
PDF merge software tools enable users to combine PDFs into a single PDF file. PDF merge tools simplify the process of combining multiple separate PDF files or other documents, like Word documents, into one single PDF document.
PDF Splitters
PDF splitters are tools that allow users to divide large PDF files into smaller, more manageable parts. These platforms provide the ability to separate a single PDF document into individual pages, specific page ranges, or custom-selected sections. PDF splitters can be useful for organizing, sharing, or extracting specific content from a larger file without altering the rest of the document. Many PDF splitters also support batch processing, enabling users to split multiple files at once. By using a PDF splitter, businesses and individuals can easily break down documents for more convenient handling, sharing, and storage.
PDF Generators
PDF generators are tools that allow users to quickly and easily create PDF documents from any type of file, HTML, or code. These tools provide a simple way to convert text, images and other digital formats into the standard PDF format. They also often provide additional features such as password protection and interactive elements like links and forms.
PDF Printers
PDF printers are software tools that allow users to convert digital files into PDF format. They are often used by individuals and businesses for creating and sharing documents with a consistent layout across different devices. These printers can be installed on desktop computers, laptops, and mobile devices. They offer a range of features such as the ability to merge multiple files into one PDF document and password protection for added security. Overall, PDF printers are convenient tools for managing electronic documents in a standardized format.
PDF Encryption Software
PDF encryption software is a type of program used to protect documents in the PDF format. With it, users can protect the contents of their documents by setting passwords and restricting certain editing permissions. It can also be configured to set expiration dates for documents, ensuring that they remain secure until a specified time. By encrypting PDFs, users are able to keep their sensitive information safe and secure from unauthorized viewing.
PDF Translators
PDF translators are software tools or web-based services used to convert text and imagery in a PDF from one language into another. The translation process is quick and easy, allowing users to obtain translations of PDF documents in a matter of minutes. These translators provide high quality results, making them invaluable for business, educational and personal use. electronic signature, and publishing.
PDF Annotators
PDF annotation tools are pieces of software designed to allow users to add notes and highlight text on PDF documents. They can be used by students or professionals to mark up documents, make comments, and organize information in an intuitive way. Annotations may also include drawing shapes or adding images. The annotations can then be saved with the document for easy sharing and future reference.
PDF Redaction Software
PDF redaction software allows users to securely remove or hide sensitive information from PDF documents, ensuring that confidential data is not accessible. It provides tools to permanently redact text, images, or entire sections by blacking out or erasing content while preserving the rest of the document’s structure. The software ensures that redacted information is irretrievable, even through advanced recovery techniques, enhancing security and compliance with privacy regulations. It often includes features for batch processing, making it easier to redact multiple documents quickly and efficiently. Ultimately, PDF redaction software helps organizations protect sensitive information and maintain compliance with data protection laws.
View more categories (20) for "myfp2esp32-user-guide-306_02.pdf"

44 Products for "myfp2esp32-user-guide-306_02.pdf" with 2 filters applied:

  • 1
    Liberty Access Control Software
    ...Enables fast, easy deployment via intuitive web-based user interface for configuration and programming with reduced installation time, costs, and hardware footprint. Significantly reduces costs by replacing expensive, cumbersome control panel hardware and installation with a compact, energy-efficient Liberty Encryption Bridge.
  • 2
    Alcatraz AI

    Alcatraz AI

    Alcatraz AI

    ...Our robust access control unit combines superior intelligence with a modern design. Powered by machine learning at the door, the Rock ensures real-time authentication, analytics, and access control. With 2D and 3D sensors onboard capturing data, the Rock’s analytical prowess outclasses other security options. Get ready for incredible accuracy and effortless user interaction. With 3D facial mapping and deep neural networks, the Rock can authenticate users in real time for the smoothest experience possible. Pair the access control system with any third-party badge reader for a 2F or 3F security solution in more restricted areas. ...
  • 3
    HID Origo
    ...Access and manage a trusted ecosystem of cloud-connected access control devices, applications, and trusted mobile identities in one place. Utilize data to ensure a seamless user experience, provide operational efficiency and make decisions to guide the business forward. HID Origo offers a scalable and secure infrastructure that ensures top-tier service delivery.
  • 4
    NetBox

    NetBox

    LenelS2

    ...NetBox systems are flexible and work well with existing infrastructure and peripheral devices. There is no software to install, making deployment easy. NetBox systems tightly integrate with LenelS2 NetVR™ and VRx™ video management systems, providing unified system management and administration. When used with the Magic Monitor® client, access events, video and live internet feeds are available from a single user interface to optimize situational awareness. Integration with third-party video management systems is also supported. ...
  • 5
    BlueDiamond
    With multi-technology readers, a feature-rich mobile app and the ability to support mobile and physical credentials, organizations can upgrade to the BlueDiamond™ experience at their own pace. The BlueDiamond mobile user experience enables employees to turn any smartphone into a device for effortless, touchless access. The BlueDiamond solution leverages Carrier’s 20 years of experience developing mobile credential technology. With over 4,000,000 Bluetooth® locking devices deployed across multiple industries – including Energy, Financial, Hospitality and Real Estate. ...
    Starting Price: Free
  • 6
    Paxton Net2

    Paxton Net2

    Paxton Access

    ...We design our products to be easy to install and make the management of any building very simple. The software is intuitive and comes with a range of features that move beyond the basics of locking or unlocking a door. There are two versions available – Net2 Lite, which is ideal for most sites and is free of charge, and Net2 Pro, which offers extra features for more flexible and advanced access control.
  • 7
    Magic Monitor
    Everything you need, all in one stunning user interface. The Magic Monitor® client provides an unsurpassed user experience, unifying access control, video surveillance, forensics, digital signage, live-sourced Internet feeds such as weather, traffic, news, and interactive content like floor plans and maps. The Magic Monitor experience is available for users of both NetBox™ and OnGuard® ecosystem products, including access control and video management systems. ...
  • 8
    Protecsys 2 Suite
    With Protecsys 2 Suite, Horoquartz delivers a global, connected electronic safety and security solution. By effectively deterring intrusions, theft, vandalism, aggression and minor infractions, you ensure the continuity of your operations and create a more positive climate in the company. Protecsys 2 Suite is a software suite that integrates access control, intrusion detection, video surveillance, visitor management and centralized supervision of your system.
  • 9
    BAS

    BAS

    Intercorp Solutions

    ...From simple door access control to complex productivity measurement or payroll processing, BAS can be expanded to suit dynamic business needs. BAS enables a seamless automated process to system users in managing their daily operations. All the key functionalities in the system are fully configurable meeting the dynamic organization needs and complying regulatory requirements by region. Integrating with 3rd party applications is one of the key strengths of BAS where it enables organisations to process data between systems seamlessly giving user friendly feel to system users. ...
    Starting Price: $2/month/user
  • 10
    OnGuard

    OnGuard

    LenelS2

    The OnGuard® access control system exemplifies our commitment to providing a superior, integrated and customizable security management system that meets your evolving needs. The OnGuard system delivers solutions that seamlessly unify access control and video monitoring for a wide range of industries. Providing the means to aggregate, visualize and share security data from multiple sources, the OnGuard system helps companies recognize context and analyze inputs from a number of simultaneous...
  • 11
    Latch

    Latch

    Latch

    ...LatchOS is a full-building operating system of software, products, and services designed to make every building better. Celebrating 100 million unlocks this year and announcing LatchOS2. LatchOS2 with dioramic controls and concierge, we will make even more spaces better places to live, work, and visit. Live, ensure, manage, and partner with Latch. Visit the Latch support site for quick answers and instructional articles.
    Starting Price: Free
  • 12
    IDEMIA

    IDEMIA

    IDEMIA

    ...The company offers solutions across various sectors, including payment, connectivity, access control, public security, and travel, enabling secure transactions and identity verification for citizens and consumers worldwide. IDEMIA serves more than 600 government organizations and 2,400 enterprises, including some of the world's most influential brands. IDEMIA's mission is to unlock the world and make it safer by ensuring secure and trusted identities for all. Explore the innovation trends streamlining and securing interactions between people, objects, companies, governments, and everything in between, in the physical and digital worlds. ...
    Starting Price: Free
  • 13
    Intelli-M Access
    ...Whether leveraging cloud or server-based options, 3xLOGIC provides cost-effective security solutions that are easy to manage, simple to install, and scale with your changing needs. This cloud-based solution makes access control practical and affordable for any user, regardless of technical experience or business size. User’s can easily view, monitor, and report on any or all events and alarms; define multiple security roles, and access privileges for individual users. The powerful rules engine allows a customer to build the functionality they need such as Lock-down, First-in, last-out, n-man rule and much, much more.
  • 14
    Kisi

    Kisi

    KISI

    Kisi offers a flexible platform for your business, acting as an all-in-one, standalone solution or integrating with your existing access control solution. Streamline user onboarding and management with automated access provisioning in Kisi. You can even connect your user management systems to Kisi, automatically enrolling users and granting them the permissions they require. Grant and revoke access on a user or team-wide basis. You can even integrate your SSO or directory solution for automatic provisioning in the future. ...
  • 15
    Feenics Access Control
    Feenics Access Control is an advanced cloud-based access control solution designed to enhance security operations. It offers users a powerful, scalable platform that simplifies the management of security systems by integrating multiple access points into a centralized dashboard. It provides real-time monitoring and control, allowing users to manage credentials, lock/unlock doors, and monitor security events from any device, anytime, anywhere. Feenics Access Control is highly customizable, enabling businesses to tailor security protocols to their specific needs. ...
  • 16
    Brivo

    Brivo

    Brivo

    ...Brivo is the global leader in cloud-based access control and security platforms for commercial and multifamily properties. Our mission is to provide Simply Better Security solutions that improve user experiences for property managers, tenants, employees, and visitors. With over 20 million users and 1,500 authorized dealers, our SaaS platform has been unifying the security experience across access control, mobile credentials, video surveillance, identity federation, visitor management, intercoms, and elevator control since 2001. ...
  • 17
    The Receptionist for iPad
    The Receptionist for iPad is visitor management software that allows users to calm the chaos of the front office. Our digital check-in solution is customizable to your needs; from your company branding, to configurable buttons and drag-and-drop-design badge printing. Effectively manage and track everyone who comes to your workspace and store the information securely in the cloud: no more paper visitor log!
    Starting Price: $60.00/month
    View System
    Visit Website
  • 18
    DoorFlow

    DoorFlow

    NetNodes

    Cloud-based access control for your building, that works with your existing locks and user directory. While DoorFlow can work as a standalone system, most of our customers benefit from the fact that we integrate with user directory, co-working space management systems and sport club systems out of the box. What makes DoorFlow unique is that it’s a fully automated, setup-and-forget solution. Building access rights policies are assigned once to groups like HR, Sales or Cleaners. ...
    Starting Price: $35 per month
  • 19
    CERTIFY Access Control
    ...With 99.9% accuracy for detecting faces, thus winning the trust of your visitors and maintaining your organization’s reputation. CERTIFY SnapXT device has a thermal sensor that detects the body temperature of the user who enters your facility and transmits the data wirelessly to the server. The data then will be analyzed, and it denies access to the user if their temperature exceeds the set parameter.
    Starting Price: $9.95 per month
  • 20
    Door Cloud

    Door Cloud

    SPICA GROUP

    ...Door Cloud access control works with standard electric locks and does not require any specific smart lock. It offers professional access control management, which is scalable to hundreds of doors and thousands of users.
  • 21
    Bosch Access Management System
    Access control is an essential component of building security. You need truly reliable software to manage the access profiles of different users of your facility. Our access control software (Access Management System) is a future-proof access management system for medium- to large-sized applications. It is easy to use, operate and expand. It offers the highest data security and several features found only in high-end security solutions. On top of this, the software is also open for integration with third-party systems, thus making it a very versatile solution for your access control projects. ...
  • 22
    Genea Access Control
    ...Allow tenants to self-manage their employees access to the base building, parking garage and other access points. No more waiting days for a manually provisioned card! Empowering tenants to add and remove users saves property teams hundreds of hours per year, reducing the time and cost associated with access control. No longer wait months to remove your tenant’s former employees. Self-service and automated user controls ensures only the right people have access to your building. The first access control management software of its kind to be built on non-proprietary hardware. ...
  • 23
    CampTrac

    CampTrac

    CampTrac

    ...With the use of self-service kiosks and intelligent tools, the user and guest are able the handle tasks that were previously managed by receptionists and administrators. The CampTrac Card is a unique encrypted contactless smart card that staff and guests can use in order to gain access to the site.
  • 24
    Parakey

    Parakey

    Parakey

    ...Administrate the single premise to the large real estate portfolio. Manage an infinite number of users, doors, and properties. Just like the demands and needs of the market, Parakey is in constant development and is continuously enriched with new functionality. It also increases security as you as an administrator have full control over who has a mobile key, to where and when, and you can take back a mobile key at any time.
    Starting Price: $36.79 per month
  • 25
    Honeywell WIN-PAK
    Honeywell’s WIN-PAK 4.8 software solution provides a cost-effective way to integrate and manage access control, video surveillance, and intrusion detection through a single interface. Building upon WIN-PAK’s legendary and robust workstation-based management system, WIN-PAK 4.8 provides an intuitive browser-based interface allowing users to perform everyday access control actions from virtually anywhere. WIN-PAK 4.8 can be easily scaled from a single site to a multi-region, enterprise-level solution without restrictions on the number of users or sites being managed. WIN-PAK 4.8 supports third-party integrations such as HID's Mobile Access®, BioConnect® Suprema®, Morpho biometrics, point-of-sale systems, visitor management, and HR applications. ...
  • 26
    Spintly

    Spintly

    Spintly

    Truly wireless, cloud-based door access control system for a seamless, hassle-free, and contactless user experience. A modern access management system that combines the power of the cloud, smartphone, and wireless technology. Spintly is transforming the physical security industry with its fully wireless, cloud-based access control system. It removes the complexity of the process of deploying an access control solution in a building.
  • 27
    1Password Extended Access Management (XAM)
    1Password Extended Access Management (XAM) is a security solution designed to safeguard every login across applications and devices, making it ideal for hybrid work environments. It combines user identity verification, device trust assessments, enterprise password management, and application insights to ensure that only authorized users on secure devices can access both approved and unapproved applications. By providing IT and security teams with visibility into app usage, including shadow IT, XAM enables organizations to enforce contextual access policies based on real-time risk signals like device compliance and credential integrity. ...
  • 28
    Sentry Solo

    Sentry Solo

    Sentry Solo

    ...Designed for multifamily properties, self storage facilities, hospitality spaces, and gated communities without on-site staff, Sentry Solo eliminates the need for outdated keypads, kiosks, or intercoms. Instead, it uses a sleek sign with a QR code and mobile access features to provide secure, real-time control. With VirtualKey, users can open gates from their phone, and with VirtualKeypad, guests can scan in instantly using a one-time QR code. No hardware. No maintenance. Just seamless, mobile-first access control that works.
  • 29
    B-Line

    B-Line

    B-Line Technologies Inc.

    B-Line is an all-in-one facility management platform that leverages AI and IoT technologies to automate visitor management, access control, amenity booking, smart controls, and AI assistance for multiple buildings under one platform, offering a comprehensive solution for asset managers and operators of all building types, without ripping or replacing existing infrastructure. Product Services - Visitor management - Room, desk, amenity booking - Digital access, digital wallet,...
    Starting Price: $5 / month / user
  • 30
    Spica Time&Space
    ...The Time&Space system excels in terms of flexibility and scalability, making it suitable for very different companies and organizations, regardless of their size and geographic spread. Users can be found in every sector - from manufacturing, energy, and mining, to retail, finance, hospitality, healthcare, and government.
  • Previous
  • You're on page 1
  • 2
  • Next