Filtered By
SoftwareX
Hardware or Software? [filter]
Results
285 Total
1.0

RCS MD,

Document

Mediation Device for Lawful Interception RCS Mediation Systems are fully compatible with all transport technologies (including ISDN, SS?, CDMA, GSM, UMTS, GPRS, CDMA2000, SIP, H.323, MGCP). On the ...
1.0

LIMS

Document

Utimaco LIMS™ Lawful Interception of Telecommunication Services LIMS – w orl dw i de 2 Utimaco LIMS™ Lawful Interception Lawful Interception (LI) is the legally approved surveillance of telec...
1.0

LIMS

Document

Utimaco LIMS™ Interceptación legal de servicios de telecomunicaciones LIMS – w orl dw i de 2 Utimaco LIMS™ Interceptación legal La interceptación legal (LI, por sus siglas en inglés) es la su...
1.0

NiceTrack Horizon Insight

Document

NICEL Intent. Insight. Impact: NiceTrack Horizon Insiaht The NiceTrackTMHorizon Insight is the NICE Intelligenceplatform for mass interception and analysis of very high volumes and rates of commun...
1.0

MorphoFace

Document

U Executive summary Morpho Face Investigate Pilot (MFIP) is a user friendly face recognition system. It implements the fundamental functional capabilities o f 2D frontal face image recognition. M...
1.0

BATVOX

Document

BATVOX is an expert 1:i voice biometric tool designed f o r forensics experts and scientific police t o perform speaker verification and compile expert reports as evidence in court BATVOX - Featu...
1.0

FinFly LAN

Document

СРЕДСТВА ДИСТАНЦИОННОГО МОНИТОРИНГА И ЗАРАЖЕНИЯ FINFLY LAN Одной из главных задач правоохранительных органов являются мобильные объекты, где физический доступ к компьютерной системе невозможен и п...
1.0

FinFly LAN

Document

Soluciones De Infección Y Monitoreo Remota FINFLY LAN Algunos de los principales retos a los que deben enfrentarse las fuerzas y cuerpos de seguridad son los objetivos móviles, cuando no es posibl...
1.0

FinFly Web

Document

Controlo Remoto E Soluções De Infecção FINFLY WEB Um dos maiores desafios na utilização de uma solução de controlo remoto é a instalação no sistema alvo, especialmente quando apenas estão disponív...
1.0

FinFly Web

Document

СРЕДСТВА ДИСТАНЦИОННОГО МОНИТОРИНГА И ЗАРАЖЕНИЯ FINFLY WEB Одной их главных задач при использовании средства дистанционного мониторинга является его внедрение в систему объекта, особенно когда име...
1.0

FinFisher

Document

FINFISHER: SOLUÇÕES DE CONTROLO REMOTO E INTRUSÃO DE TI GOVERNAMENTAL www.gammagroup.com FINFISHER it intrusion FINFISHER: SOLUÇÕES DE CONTROLO REMOTO E INTRUSÃO DE TI GOVERNAMENTAL O FinFish...
1.0

Identifying music in a live sound stream

Document

Identifying music in a live sound stream Applications Jingle Tracker captures the number and time that jingles or music samples are played on a given broadcasting channel. Applications ! Adve...
1.0

Multi-channel call recording and monitoring system

Document

Smart Logger Multi-channel call recording and monitoring system Smart Logger Description ! Records voice conversations from different sound sources. ! Gives instant and comfortable access to r...
1.0

Smart Logger

Document

SMART LOGGER Multi-channel call recording and monitoring system. Hardware Applications Logging and monitoring: u Telephone conversations u Facsimile transmission sessions (using Fax Reader module)...
1.0

Denoiser Clear Voice, Declicker Clear Voice, Sound Stretcher, VoiceCom, Voice Key, Music Spotting,

Document

Voice of the Future Speech Technology Center Developers’ Solutions NOISE CANCELLATION SPEAKER VERIFICATION VOICE COMMAND RECOGNITION Speech Technology Center Limited (STC) is active in the fol...
1.0

SG

Document

Volume 5: Securing the Blue Coat SG Appliance Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html bcs.info@bluecoat...
1.0

ProxySG

Document

Blue Coat ProxySG Configuration and Management Guide Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html bcs.info@b...
1.0

COGITO

Document

COGITO® Intelligence API Powerful semantic software To extract 1ntell1gence from data Cogito Intelligence API brings the power of semantic processing to your application or analysis pipeline, ana...
1.0

HIWIRE, TGAlerts, Hydra, Looking Glass, Chimera,

Document

We are global pioneers of Virtual HUMINT™-driven Web Intelligence Services & Technology, designed to bridge crucial intelligence gaps faced by allied governments and corporations around the world....
1.0

Remote Control System

Document

REMOTE CONTROL SYSTEM Astealth spyware-based system for computer crime investigations and intelligence collection 11010TEv t i s , 1Vitt111:VIMMEINEAPO% M u t t o n Ago CUMIN WIMIIIMUNI1 111011 PC...
1.0

Location Monitoring Intelligence Platform

Document

TRUEPOSITION LOCINT® Mobile phones have become the standard communication method across the globe. Unfortunately, mobility has also made it easier for criminals and terrorists to plan. coordinate a...
1.0

MFT Forensic Tower

Document

What is MFZ? The MFT Forensic Tower is Meiya Pico's 2nd generation Forensic Workstation. Oriented by the Parallel Forensic Technology, the MFT provides rich interfaces, achieves concurrent data dup...
1.0

Convoy Jamming System

Document

rad~ofrec teci JSAGE I Specifications nrry rruwarswyua - Reactive Jamming Technology - .5000Waft ERP - 5.8 mio threat signal generation ne Keacrlve Jarnmrng I ecnnor y guarantees highest ef...
1.0

OBSERVER

Document

Smart filtering of intrusions in surveillance areas. Selective alarms on events. On-the-fly face detection. I TeI: -33 (0)s 61 00 91 45 i Fax: +33 (0)5 61 52 14 85 .g 3BSERVER is a smart videop...
1.0

RESOLVE

Document

find 1 l i I fix I engage I exploit I access electronic warfare system Electronic warfare s:/$em '. Geolocation, exploitation and denial of tactical communications RESOLVE is a 100% UK sta...
1.0

Mercure 3

Document

d IVI-7 I irDesigned by investigators for investigators a solution by OCKHFlm SOLUTIONS r Phone 1 F-, 3.~ i g & call volume management analysis is a t the heart of any investigation .. ,...
1.0

SIFT, ASIS

Document

- a 853 Family member- 7 for Military and Intelligence organizations . _Gite-sfinternal-F- 5 . . SEFT, based on the-precise...
1.0

Cryptowall Mail-Protect

Document

CRYPTOWALL MAIL PROTECT L’OUTIL INDISPENSABLE POUR PROTEGER VOS COURRIELS Le menu de configuration Mail-Protect Le gestionnaire des adresses privilégiées PRINCIPALES CARACTERISTIQUES RECEVEZ, A...
1.0

EAGLE

Document

EAGLE GLINT OPERATOR Manual Reference : Version : Date : State : EAGLE / MAN-EAGLE-OPERATOR 1.0 19/03/09 Draft 1.! INTRODUCTION .....................................................4! 1.1.! C...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh