Suggested Categories:

Guided Selling Software
Guided selling software are tools that help sales reps and customers move through the sales process. Guided selling tools guide sales reps through the entire sales cycle and selling process, so that they can close more deals and become more efficient at selling.
PDF Editors
PDF editors allow users to create, modify, and manage PDF documents by adding, removing, or editing text, images, and other elements within the file. These platforms typically offer tools for annotating, highlighting, and commenting on PDFs, as well as the ability to rearrange pages, merge multiple PDFs, or split a single document into several files. PDF editors also often include features like form filling, digital signing, and password protection, enhancing document security and interactivity. By using PDF editors, businesses and individuals can customize documents, improve collaboration, and streamline workflows for handling digital paperwork.
User Research Software
User research software, also referred to as UX research or user testing software, enables organizations to research and understand all aspects of the user experience and customer journey. These tools typically include features for conducting surveys, user interviews, usability testing, and feedback collection through various channels such as websites, mobile apps, and social media. They may also provide analytics capabilities to analyze patterns in user data, identify pain points, and uncover actionable insights. User research software is essential for improving user experience (UX), optimizing interfaces, and ensuring that products meet the needs and expectations of their target audience.
PDF Converters
PDF converters are software tools that enable users to convert PDF documents into different formats, such as Word, Excel, PowerPoint, HTML, or image files, and vice versa. These platforms allow users to extract text, images, and tables from PDF files, making the content editable and easier to manipulate. PDF converters can handle both scanned and native PDFs, offering features like OCR (Optical Character Recognition) for extracting text from images. With the ability to convert files to and from PDF, users can easily share, edit, or archive documents in the most appropriate format for their needs. By using PDF converters, businesses and individuals can improve document workflow and increase productivity.
PDF Readers
PDF readers are software applications that enable users to access, open, and read PDFs. PDF readers are essential tools for being able to open and read PDF files. Advanced PDF readers may also support form filling, digital signatures, and interactive features embedded in PDF documents. PDF readers are widely used in both personal and professional settings to view reports, manuals, eBooks, contracts, and other documents that need to preserve formatting across different devices and platforms.
PDF SDK
PDF SDKs (Software Development Kits) provide developers with the tools and libraries needed to integrate PDF functionality into their applications or websites. These SDKs offer features like viewing, editing, creating, converting, and annotating PDFs, allowing developers to build custom PDF solutions tailored to their needs. PDF SDKs often include APIs for manipulating text, images, and form data, as well as for handling document security, such as encryption and password protection. By using PDF SDKs, developers can add robust PDF capabilities to their software without having to build these features from scratch, saving time and resources.
PDF Software
PDF software refers to a range of tools designed for working with PDF (Portable Document Format) files, which are widely used for document sharing and storage. These tools offer a variety of functions, such as creating, viewing, editing, converting, securing, and managing PDF files. PDF software can be used for tasks like merging or splitting documents, adding annotations, filling out forms, applying digital signatures, and securing documents with passwords or encryption. It is commonly utilized across industries for document collaboration, official documentation, and data exchange due to its universal compatibility and ability to maintain formatting across different platforms.
Layer 2 Protocols
Layer 2 protocols are blockchain protocols that are built on top of an existing blockchain network. A layer 2 protocol is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications can be built on Layer 2 protocols, and layer 2 protocols interact with layer 1 protocols in order to improve efficiency and overall user experience.
B2B Payment Platforms
B2B payment platforms are digital solutions designed to facilitate and streamline financial transactions between businesses. These platforms provide secure, efficient, and scalable methods for companies to send and receive payments, manage invoices, and handle cross-border transactions. Features often include support for various payment methods (such as ACH, wire transfers, credit cards, and e-wallets), invoice management, payment reconciliation, and fraud prevention tools. B2B payment platforms help businesses reduce administrative costs, improve cash flow management, and ensure compliance with regulatory requirements. By automating payment workflows and improving the speed and accuracy of transactions, these platforms enhance the overall efficiency of business operations.
B2B Data Providers
B2B data providers offer companies access to large sets of business-related data, which can include information on companies, contacts, industries, financials, and market trends. This data is valuable for businesses looking to expand their customer base, enhance lead generation, conduct market research, or refine their sales strategies. B2B data providers often deliver enriched contact information, company profiles, and detailed insights on decision-makers, helping businesses identify potential leads and make informed decisions. These services may include databases with direct access to contacts, industry reports, and analytics to improve targeted outreach and account-based marketing strategies.
PDF APIs
PDF APIs are software interfaces that enable developers to integrate PDF-related functionality into their applications or websites. These APIs allow for the creation, manipulation, conversion, and extraction of content from PDF files without requiring users to manually open or edit the files. Common features of PDF APIs include merging, splitting, editing text, adding annotations, and extracting text and images. They can also handle PDF conversions, such as converting PDFs to other formats like Word, Excel, or HTML, and vice versa. By using PDF APIs, businesses can automate document workflows, enhance document management systems, and integrate PDF capabilities into custom applications seamlessly.
PDF Compressors
PDF compressors reduce the file size of PDF documents while preserving the content and formatting. These tools optimize the PDF by removing unnecessary data, compressing images, and adjusting file structures to decrease storage requirements and improve file transfer speeds. PDF compressors are useful for businesses and individuals who need to share large PDF files via email or upload them to websites, ensuring they remain accessible and easy to handle without sacrificing quality. Many PDF compression tools offer batch processing, allowing users to compress multiple files at once, saving time and effort.
PDF Merge Software
PDF merge software tools enable users to combine PDFs into a single PDF file. PDF merge tools simplify the process of combining multiple separate PDF files or other documents, like Word documents, into one single PDF document.
PDF Splitters
PDF splitters are tools that allow users to divide large PDF files into smaller, more manageable parts. These platforms provide the ability to separate a single PDF document into individual pages, specific page ranges, or custom-selected sections. PDF splitters can be useful for organizing, sharing, or extracting specific content from a larger file without altering the rest of the document. Many PDF splitters also support batch processing, enabling users to split multiple files at once. By using a PDF splitter, businesses and individuals can easily break down documents for more convenient handling, sharing, and storage.
PDF Generators
PDF generators are tools that allow users to quickly and easily create PDF documents from any type of file, HTML, or code. These tools provide a simple way to convert text, images and other digital formats into the standard PDF format. They also often provide additional features such as password protection and interactive elements like links and forms.
PDF Printers
PDF printers are software tools that allow users to convert digital files into PDF format. They are often used by individuals and businesses for creating and sharing documents with a consistent layout across different devices. These printers can be installed on desktop computers, laptops, and mobile devices. They offer a range of features such as the ability to merge multiple files into one PDF document and password protection for added security. Overall, PDF printers are convenient tools for managing electronic documents in a standardized format.
PDF Encryption Software
PDF encryption software is a type of program used to protect documents in the PDF format. With it, users can protect the contents of their documents by setting passwords and restricting certain editing permissions. It can also be configured to set expiration dates for documents, ensuring that they remain secure until a specified time. By encrypting PDFs, users are able to keep their sensitive information safe and secure from unauthorized viewing.
PDF Translators
PDF translators are software tools or web-based services used to convert text and imagery in a PDF from one language into another. The translation process is quick and easy, allowing users to obtain translations of PDF documents in a matter of minutes. These translators provide high quality results, making them invaluable for business, educational and personal use. electronic signature, and publishing.
PDF Annotators
PDF annotation tools are pieces of software designed to allow users to add notes and highlight text on PDF documents. They can be used by students or professionals to mark up documents, make comments, and organize information in an intuitive way. Annotations may also include drawing shapes or adding images. The annotations can then be saved with the document for easy sharing and future reference.
PDF Redaction Software
PDF redaction software allows users to securely remove or hide sensitive information from PDF documents, ensuring that confidential data is not accessible. It provides tools to permanently redact text, images, or entire sections by blacking out or erasing content while preserving the rest of the document’s structure. The software ensures that redacted information is irretrievable, even through advanced recovery techniques, enhancing security and compliance with privacy regulations. It often includes features for batch processing, making it easier to redact multiple documents quickly and efficiently. Ultimately, PDF redaction software helps organizations protect sensitive information and maintain compliance with data protection laws.
View more categories (20) for "myfp2esp32-user-guide-306_02.pdf"

62 Products for "myfp2esp32-user-guide-306_02.pdf" with 2 filters applied:

  • 1
    Liberty Access Control Software
    ...Enables fast, easy deployment via intuitive web-based user interface for configuration and programming with reduced installation time, costs, and hardware footprint. Significantly reduces costs by replacing expensive, cumbersome control panel hardware and installation with a compact, energy-efficient Liberty Encryption Bridge.
  • 2
    Solink

    Solink

    Solink

    Solink is a cloud video security and analytics platform that works with your existing cameras, access controls, and operational technologies like POS and labor management, helping you modernize and improve security and operations without costly upgrades. Solink is already trusted by 30,000 customers across 32 countries.
    Starting Price: $175/location/month
  • 3
    Orna

    Orna

    Kerkton Security Technologies

    ...With a streamlined dispatch system, you can easily and efficiently dispatch calls, provide real-time updates to officers, and receive praise from clients for prompt response times. When dispatchers or patrol officers have comments, they can be added to the call. Comments are time-stamped with the user so there is a permanent record. Natural disasters happen, and sometimes security companies need to work together, so dispatch can add multiple agencies/companies to a single call providing you with the resources you need. Easily add attachments, such as photos, to the call. Photos appear on PDFs of closed calls and can be set up to appear on automated or manual activity reports. ...
  • 4
    Magic Monitor
    Everything you need, all in one stunning user interface. The Magic Monitor® client provides an unsurpassed user experience, unifying access control, video surveillance, forensics, digital signage, live-sourced Internet feeds such as weather, traffic, news, and interactive content like floor plans and maps. The Magic Monitor experience is available for users of both NetBox™ and OnGuard® ecosystem products, including access control and video management systems. ...
  • 5
    Protecsys 2 Suite
    With Protecsys 2 Suite, Horoquartz delivers a global, connected electronic safety and security solution. By effectively deterring intrusions, theft, vandalism, aggression and minor infractions, you ensure the continuity of your operations and create a more positive climate in the company. Protecsys 2 Suite is a software suite that integrates access control, intrusion detection, video surveillance, visitor management and centralized supervision of your system.
  • 6
    ACTAtek Agent
    ACTAtek Agent 2 is primarily used to download the event logs from the remote ACTAtek device in real-time and without any hassle. It saves time and administrative efforts in backing up the data from the ACTAtek to a central computer. ACTAtek Agent2 is a Web-based middleware to help poll out the event log data from remote ACTAtek device back to the backend database in real-time.
  • 7
    ActivitySuite

    ActivitySuite

    Computer Methods

    ActivitySuite is 100% web-based solution for private patrol operators. It monitors and documents patrol activities in the field, creates reports and e-mails PDFs to your clients. ActivitySuite can track maintenance issues, parking enforcement, alarm calls, field interviews and in-depth incident reports. Monitor guards with GPS site hits and manage notifications. Keep clients up-to-date in real-time via the client portal. Subscriptions from $99 per month. Computer Methods develops professional firmware, software, services and IOT applications for embedded devices, Windows, Web, Android and iOS platforms. ...
    Starting Price: $99 per month
  • 8
    HiveWatch

    HiveWatch

    HiveWatch

    HiveWatch is an AI-driven physical security platform that unifies disparate security systems, such as access control, video surveillance, and guard operations, into a single, cloud-based command center that transforms security from reactive to strategic. It features a rules engine for customizing incoming alarms by criteria like time, location, or repeatability, and embedded standard operating procedures to guide operator response. HiveWatch reduces false alarms through machine learning, escalates genuine threats to human supervisors via its AI Operator module, and automates tailgating detection. It also supports multi-site orchestration, device health monitoring, case management of incidents, and performance metrics (e.g., time to resolve, incident counts) for executive reporting. ...
    Starting Price: Free
  • 9
    Vireo

    Vireo

    Vireo

    ...Be the envy of your competitors and impress your clients with your own company mobile apps. The system comprises of a management portal, employee portal, and client portal. You can manage your full business, clients, contracts, and employees and each user type has its own login area! The System was developed with GDPR and data protection at the heart. From data subject access requests to automated data destruction, Vireo is above and beyond what is required. Manage your company from anywhere in the world. Change the look and feel at the click of a button. With encryption and 2FA we ensure your data is secure. ...
    Starting Price: $5,584 one -time payment
  • 10
    OnGuard

    OnGuard

    LenelS2

    The OnGuard® access control system exemplifies our commitment to providing a superior, integrated and customizable security management system that meets your evolving needs. The OnGuard system delivers solutions that seamlessly unify access control and video monitoring for a wide range of industries. Providing the means to aggregate, visualize and share security data from multiple sources, the OnGuard system helps companies recognize context and analyze inputs from a number of simultaneous...
  • 11
    Novagems

    Novagems

    Novagems

    Novagems is an all-in-one workforce management software designed to simplify and optimize team operations across various industries. With features like seamless scheduling, real-time time tracking, GPS location monitoring, and easy payroll processing, Novagems helps businesses streamline their workforce management. The software ensures enhanced productivity and better employee management, whether your team is in the office or working remotely. Novagems offers a centralized platform that...
    Starting Price: $2.49/user/month
  • 12
    Xeoma

    Xeoma

    Felenasoft

    ...Xeoma transforms cameras into smart detectors with advanced AI integrations, including LPR, face and emotion detection, age/gender analysis, crowd/loitering monitoring, abandoned object alerts, and even drone or slip-and-fall detection. Users get live monitoring in a traditional security layout, remote access via 100% free P2P connections without static IP. xeoma.com
    Starting Price: $19, one-time, perpetual
  • 13
    PAX CHECKPOINT

    PAX CHECKPOINT

    Vanderlande

    ...The PAX Advanced lane is the most cutting-edge automated screening lane (ASL) for the screening of passengers’ hand luggage in airports or other secured areas. PAX MX2 allows passengers to divest and reclaim on both sides of the screening machine, ultimately offering the efficiency of two conventional lanes.
  • 14
    Dahua

    Dahua

    Dahua Technology

    ...Through its application-based design concept, it offers unified management of 6 major business scenarios to meet and satisfy customers' needs. It includes 3 major security applications, 2 major object management and 1 major maintenance management. It also further strengthens the performance and security of the system, and enhances its effectiveness. The LiveView interface provides various integrated resources such as videos, access control, webpages, maps, events, etc. for easier monitoring. It utilizes interface expansion on the right side to respond to events in time. ...
  • 15
    EntraPass

    EntraPass

    Kantech

    ...EntraPass offers the flexibility to apply security to controllers directly connected on the network, as well as over RS-485. EntraPass software is compatible with Kantech IP devices such as KT-1/KT-2/KT-400 controllers and Kantech IP Link (KT-IP) which all utilize 128-bit AES encryption to protect communication against compromise. KT-400 controller is a highly proven IP controller that supports 8 readers (4 doors IN/OUT control) when using ioProx XSF and ioSmart readers and cards. Securely connect 4 readers to the KT-400 through OSDP.
  • 16
    Spot AI

    Spot AI

    Spot AI

    Footage is painful to use, hardware is expensive and tech is dated. After Spot AI, Footage is easy to access, cameras are $0 and tech is cutting edge, so extracting insights is a breeze. Across industries, video footage is being used as the ultimate data source to detect and diagnose problems, and take corrective action. YouTube-like web dashboard with powerful AI features anyone can use. Securely access video footage without worrying about VPNs and static IP addresses. Reliably pull up...
    Starting Price: $2,199 per location
  • 17
    GuardsPro

    GuardsPro

    GuardsPro

    Manage security guard operations on the cloud with GuardsPro, a robust security guard management solution. GuardsPro allows users to streamline patrol operations with features such as online reporting, site tours, in-app check-in/check-out, and more. With GuardsPro's dashboard, users can manage tasks, notifications, company policies, online notes, and more. GuardsPro is available via iOS and Android platforms.
    Starting Price: $15.00/month/user
  • 18
    Intelli-M Access
    ...Whether leveraging cloud or server-based options, 3xLOGIC provides cost-effective security solutions that are easy to manage, simple to install, and scale with your changing needs. This cloud-based solution makes access control practical and affordable for any user, regardless of technical experience or business size. User’s can easily view, monitor, and report on any or all events and alarms; define multiple security roles, and access privileges for individual users. The powerful rules engine allows a customer to build the functionality they need such as Lock-down, First-in, last-out, n-man rule and much, much more.
  • 19
    Kisi

    Kisi

    KISI

    Kisi offers a flexible platform for your business, acting as an all-in-one, standalone solution or integrating with your existing access control solution. Streamline user onboarding and management with automated access provisioning in Kisi. You can even connect your user management systems to Kisi, automatically enrolling users and granting them the permissions they require. Grant and revoke access on a user or team-wide basis. You can even integrate your SSO or directory solution for automatic provisioning in the future. ...
  • 20
    Alarm.com

    Alarm.com

    Alarm.com

    ...Easily create and disable user codes. Give each user a unique code, then see who has armed or disarmed the system, and when. You can disable codes within minutes from your computer or tablet. With over a decade of experience and over 6 million active users, Alarm.com continues to be a technology leader. Join the Alarm.com family and become a Service Provider today.
  • 21
    PatrolLIVE

    PatrolLIVE

    PatrolLIVE

    Spend less time training personnel and more time reporting on patrols. Our clients love the user experience and that their employees don’t need to spend hours learning a new piece of technology. Report Incidents, activity and get insights in real time. Users can easily send data on the go so that key responders can be on the scene as quickly as possible. The PatrolLIVE app allows for clear and easy execution monitoring and compliance for your onsite patrol.
  • 22
    Brivo

    Brivo

    Brivo

    ...Brivo is the global leader in cloud-based access control and security platforms for commercial and multifamily properties. Our mission is to provide Simply Better Security solutions that improve user experiences for property managers, tenants, employees, and visitors. With over 20 million users and 1,500 authorized dealers, our SaaS platform has been unifying the security experience across access control, mobile credentials, video surveillance, identity federation, visitor management, intercoms, and elevator control since 2001. ...
  • 23
    DoorFlow

    DoorFlow

    NetNodes

    Cloud-based access control for your building, that works with your existing locks and user directory. While DoorFlow can work as a standalone system, most of our customers benefit from the fact that we integrate with user directory, co-working space management systems and sport club systems out of the box. What makes DoorFlow unique is that it’s a fully automated, setup-and-forget solution. Building access rights policies are assigned once to groups like HR, Sales or Cleaners. ...
    Starting Price: $35 per month
  • 24
    Presynct_OnDemand

    Presynct_OnDemand

    PreSynct Technologies

    Presynct_OnDemand is a leading incident reporting workflow and management available on-cloud or on-premises. Developed by PreSynct Technologies, Presynct_OnDemand offers the best mobile incident reporting. With Presynct_OnDemand’s efficient incident reporting and workflow system, you can easily track cases, write incident reports, log activities, dispatch resources, analyze data, and more.
    Starting Price: $9.95/month/user
  • 25
    Super Display Touchscreen Security

    Super Display Touchscreen Security

    Black Creek Integrated Systems

    ...The Super Display® System is ideal for either new construction or retrofits and is the most cost-effective, long-term solution available. The Super Display® System leverages brilliant, large-format LCD touchscreen monitors, speedy Intel® processors and Black Creek's easy-to-use user interface software to produce fast and intuitive security management for corrections. The Black Creek Super Display® Touchscreen Security System is an open architecture construct - utilizing only high-quality, non-proprietary system components. This assures a high level of system availability and makes maintenance a breeze by using only in-house personnel.
  • 26
    TagtronicsPatrol
    TagtronicsPatrol portfolio of products are integrated into our user-friendly security guard software package which was developed with the help of several security companies to aid the busy day-to-day administration of the ever growing security market. We have produced several videos to demonstrate the functionality of our security guard software packages; these can be accessed via the links below.
  • 27
    Amadeus 8
    ...Consult the documentation and open tickets through DDS technical site. Marketing tools. The marketing place to keep up to date, consult the latest news, share case studies and download products documentation. Supreme user experience. Amadeus 8 focuses on users’ expectations to interact intuitively with customized information, through the innovative design, the modern tools
  • 28
    Silvertrac Software

    Silvertrac Software

    Silvertrac Software

    Improve guard accountability and reporting with the industry's most trusted security guard management solution, Silvertrac Software. Feature-rich, easy to use, and reliable, Silvertrac Software enables security organizations of all sizes to efficiently monitor their security teams and respond to real-time issues fast. Silvertrac is accessible both as a web based & mobile application and includes tools such as real-time incident reporting, facility tracking, scheduled/automated...
    Starting Price: $50/month
  • 29
    Genea Access Control
    ...Allow tenants to self-manage their employees access to the base building, parking garage and other access points. No more waiting days for a manually provisioned card! Empowering tenants to add and remove users saves property teams hundreds of hours per year, reducing the time and cost associated with access control. No longer wait months to remove your tenant’s former employees. Self-service and automated user controls ensures only the right people have access to your building. The first access control management software of its kind to be built on non-proprietary hardware. ...
  • 30
    Honeywell WIN-PAK
    Honeywell’s WIN-PAK 4.8 software solution provides a cost-effective way to integrate and manage access control, video surveillance, and intrusion detection through a single interface. Building upon WIN-PAK’s legendary and robust workstation-based management system, WIN-PAK 4.8 provides an intuitive browser-based interface allowing users to perform everyday access control actions from virtually anywhere. WIN-PAK 4.8 can be easily scaled from a single site to a multi-region, enterprise-level solution without restrictions on the number of users or sites being managed. WIN-PAK 4.8 supports third-party integrations such as HID's Mobile Access®, BioConnect® Suprema®, Morpho biometrics, point-of-sale systems, visitor management, and HR applications. ...
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next