Ratings and Reviews 0 Ratings
Ratings and Reviews 0 Ratings
Alternatives to Consider
-
Epicor Connected Process ControlEpicor Connected Process Control offers an intuitive software solution designed to create and manage digital work instructions while maintaining strict process control, effectively minimizing the chances of errors in operations. By integrating IoT devices, it captures comprehensive time studies and detailed process data, including images, at the task level, providing unprecedented real-time visibility and quality oversight. The eFlex system is versatile enough to accommodate countless product variations and thousands of components, catering to both component-based and model-based manufacturers alike. Furthermore, work instructions seamlessly connect to the Bill of Materials, guaranteeing that products are assembled correctly every time, even when modifications occur during production. This advanced system intelligently adapts to variations in models and components, ensuring that only the relevant work instructions for the current build at the station are presented, enhancing efficiency and accuracy throughout the manufacturing process. In this way, Epicor empowers manufacturers to maintain high standards of quality control while adapting to the dynamic nature of production demands.
-
PathSolutions TotalViewTotalView provides comprehensive network monitoring and straightforward root-cause analysis of issues, using clear, accessible language. This solution tracks every device and all interfaces associated with those devices, ensuring nothing is overlooked. Furthermore, TotalView delves deep by gathering 19 different error counters, along with performance metrics, configuration details, and connectivity data, allowing for a holistic view of the network. An integrated heuristics engine processes this wealth of information to deliver clear, easily understandable insights into problems. With this system, even junior engineers can tackle complex issues, freeing up senior engineers to concentrate on higher-level strategic initiatives. The main product encompasses all essential tools required for maintaining an optimally functioning network, including configuration management, server and cloud service monitoring, IP address management (IPAM), NetFlow analysis, path mapping, and diagramming capabilities. By utilizing TotalView, you can achieve complete visibility of your network, enabling you to resolve issues more swiftly and efficiently, ultimately enhancing overall network performance.
-
JOpt.TourOptimizerWhen creating software solutions for Logistics Dispatch, you may encounter various challenges, including those related to staff dispatching for mobile services, sales representatives, or other workforce issues; managing truck shipment allocations for daily logistics and transportation needs, which involves scheduling and optimizing routes; addressing concerns in waste management and district planning; and tackling a variety of highly constrained problem sets. If your product lacks an automated optimization engine to address these complexities, JOpt can be an invaluable addition, providing you with the tools to reduce costs, save time, and optimize workforce efficiency, allowing you to focus on your primary business objectives. The JOpt.TourOptimizer is a versatile component designed to tackle Vehicle Routing Problems (VRP), Capacitated Vehicle Routing Problems (CVRP), and Time Windowed Vehicle Routing Problems (VRPTW), making it suitable for any route optimization tasks in logistics and related sectors. Available as either a Java library or a Docker container that incorporates the Spring Framework and Swagger, this solution is tailored to facilitate seamless integration into your existing software ecosystem.
-
Control DControl D is a versatile DNS filtering and traffic redirection service that utilizes advanced Secure DNS protocols such as DNS-over-HTTPS, DNS-over-TLS, and DNS-over-QUIC, while also accommodating traditional DNS. With Control D, users can effectively eliminate harmful threats, restrict various types of undesirable content across the network—including advertisements, trackers, IoT data, adult material, social media, and more—while also redirecting traffic through transparent proxies and monitoring network activities and usage patterns at a client-specific level. Consider it your own personalized Authoritative DNS resolver for the entire Internet, providing you with detailed control over which domains are allowed to be resolved, redirected, or blocked. This capability not only enhances security but also empowers users to tailor their online experience according to their preferences.
-
ShareMyToolboxIntroducing ShareMyToolbox - the ultimate tool tracking solution designed specifically for construction teams. Effortlessly manage your small tools and equipment with a platform that is fully compatible with both Apple and Android devices, allowing users to explore their company's tool inventory with ease. Quickly request tools and accept assignments through the simple process of barcode scanning, while also leveraging GPS coordinates captured during scans, which are clearly illustrated on an interactive map. This system is meticulously crafted for contractors, setting a new standard for user-friendliness. Begin your journey in tool tracking with these straightforward steps: Seamless Organization: Create a detailed inventory of your tools and equipment, forming a personalized cloud catalog of essential assets. Improved Visibility: Equip field personnel with immediate access to assess the company's extensive assets through our user-friendly mobile app. Foster Accountability: Enable field workers to efficiently manage tool transactions—such as check-ins, check-outs, and transfers—using the convenience of barcodes and QR codes, ensuring every asset is accounted for. Additionally, enhance your team's productivity by integrating ShareMyToolbox into your daily operations, making tool management a breeze.
-
InEightInEight is purpose-built project controls software that helps capital construction teams plan smarter, build with confidence, and deliver predictable outcomes. The platform connects cost, schedule, scope, and field data in real time, giving teams a single source of truth from pre-construction through turnover. Trusted by 850+ companies managing more than $1 trillion in global capital projects, InEight enables organizations to improve forecasting accuracy, streamline collaboration, reduce rework, and optimize project performance. Industries served include infrastructure, energy and renewables, mining, water, transportation, and industrial construction.
-
SynerionSynerion is workforce management software engineered for organizations that require accuracy, configurability, and long-term reliability when managing employee time, scheduling, and labor costs. Instead of forcing businesses into rigid templates or relying on brittle spreadsheets, Synerion adapts to the complexity of real-world operations. Time can be captured through a range of devices — biometric clocks (fingerprint, facial recognition), proximity or HID card readers, mobile apps with geofencing, browser-based portals, or tablet kiosks. Each punch is processed in real time and validated against configurable pay rules, including overtime, shift premiums, union agreements, step rates, and project-based allocations. This reduces payroll errors at the source and eliminates costly manual reconciliation. Offline mode with automated sync ensures no time data is lost, even during outages. Managers gain tools to design complex schedules with rotations, shift balancing, and skill coverage checks, while automated alerts notify them of gaps, overtime risks, or missed punches before they become problems. Finance and operations teams benefit from configurable dashboards and audit-ready reports that provide transparency into hours, costs, and labor allocation at the job, project, or department level. This gives leadership confidence in their workforce data and a clear view into labor’s impact on profitability. Deployment is handled directly by Synerion’s in-house specialists rather than outsourced contractors, ensuring faster discovery, accurate configuration, and smoother go-lives. Customers can choose Synerion Agile, a quick-start package for fast adoption, or Synerion Enterprise, a fully configurable system capable of supporting highly complex requirements. With 35 years of experience and thousands of customers across manufacturing, healthcare, logistics, and government, Synerion combines enterprise-level flexibility with mid-market accessibility.
-
Tai TMSFor the past 15 years, Tai TMS has been instrumental in assisting freight brokers in expanding their operations. Our dedicated team, which consists of software developers and industry specialists, ensures that we provide top-notch service. Clients rely on us due to our unwavering commitment to innovation, rapid and effective problem-solving, and our dedication to their growth and success. Tai TMS presents freight brokers with a comprehensive platform that facilitates quoting, booking, and tracking shipments seamlessly. The system not only automates LTL shipping but also offers FTL brokers a centralized solution for securing load coverage efficiently. Although freight brokers recognize the essentials for staying competitive, achieving growth without a contemporary TMS solution can be challenging. Tai is here to bridge that gap. By automating all logistics aspects, Tai TMS delivers unmatched visibility throughout the process, enabling freight brokers to operate with enhanced efficiency. Additionally, the AI-powered platform simplifies the booking of both LTL and FTL shipping, making it more accessible for brokers to attract and secure new clients. With Tai TMS, the path to success in the freight industry becomes clearer and more attainable.
-
StrongDMThe landscape of access and access management has evolved into a more intricate and often frustrating challenge. strongDM reimagines access by focusing on the individuals who require it, resulting in a solution that is not only user-friendly but also maintains rigorous security and compliance standards. This innovative approach is referred to as People-First Access. Users benefit from quick, straightforward, and traceable access to essential resources, while administrators enjoy enhanced control that reduces the risk of unauthorized and excessive permissions. Additionally, teams in IT, Security, DevOps, and Compliance can effortlessly track activities with detailed audit logs answering critical questions about actions taken, locations, and timings. The system integrates seamlessly and securely across various environments and protocols, complemented by reliable 24/7 customer support to ensure optimal functionality. This comprehensive approach guarantees both efficiency and security in managing access.
-
A10 Defend Threat ControlA10 Defend Threat Control is a cloud-based service integrated into the A10 software suite. It features an up-to-the-minute DDoS attack map along with a comprehensive inventory of DDoS threats. Unlike many existing tools that prioritize ease of use but often generate false positives or negatives, A10 Defend Threat Control offers in-depth insights into both attackers and their targets. This includes analytics on various vectors, emerging trends, and other critical data points. By delivering actionable intelligence, it empowers organizations to enhance their security measures and effectively block harmful IP addresses that could initiate DDoS attacks. Ultimately, this tool stands out in its ability to combine thorough analysis with practical defense strategies for businesses facing evolving cyber threats.
What is Model Predictive Control Toolbox?
The Model Predictive Control Toolbox™ provides an extensive array of functions, an easy-to-use app, Simulink® blocks, and useful reference examples to streamline the development of model predictive control (MPC) systems. It effectively addresses linear problems by allowing the development of implicit, explicit, adaptive, and gain-scheduled MPC approaches. For more intricate nonlinear situations, users can implement both single-stage and multi-stage nonlinear MPC. Moreover, this toolbox comes equipped with deployable optimization solvers and allows for the incorporation of custom solvers as needed. Users can evaluate the performance of their controllers through closed-loop simulations within MATLAB® and Simulink environments. In the context of automated driving, the toolbox offers blocks and examples that comply with MISRA C® and ISO 26262 standards, which facilitates the rapid start of projects related to lane keeping assistance, path planning, path following, and adaptive cruise control. It enables the design of implicit, gain-scheduled, and adaptive MPC controllers that can solve quadratic programming (QP) problems while also facilitating the generation of explicit MPC controllers based on implicit designs. Furthermore, the toolbox accommodates discrete control set MPC for addressing mixed-integer QP challenges, thus expanding its versatility for various control systems. With its rich set of features, the toolbox guarantees that both beginners and seasoned professionals can successfully apply advanced control strategies in their projects. This versatility ensures that users across multiple domains can find relevant applications for their specific needs.
What is Hitex SafeTpal?
Hitex GmbH presents SafeTpal, an adaptable Safety & Security Suite specifically designed for the AURIX TC3xx microcontroller series, aimed at simplifying the intricate process of developing embedded safety and security solutions. This suite is equipped to handle applications that comply with strict standards, such as ISO 26262 ASIL-D and IEC 61508 SIL-3, in addition to various security criteria including ISO 21434, CERT-C, and MISRA-C. It features a collection of certified software components, such as drivers, hardware abstraction layers (HAL), and bootloader/OTA packages, while also offering reference designs, educational materials, thorough documentation, and customizable service packages to support each stage of the V-model, from initial conceptual design and architecture to development, testing, validation, and final production. With its modular design, SafeTpal enables users to choose only the essential services and tools needed, promoting both efficiency and tailored solutions. The suite includes vital drivers like SafeThal for HAL and SafeTpack for secure startup, as well as HSP support for MATLAB/Simulink, board reference designs such as SafeTdevboard and SafeTschematic, and consulting services that encompass SafeTstart, SafeTdev, and SafeTunittests. This extensive suite guarantees that developers are well-equipped with all necessary resources to build strong and secure embedded systems while ensuring adherence to industry standards. Ultimately, SafeTpal not only enhances productivity but also helps mitigate risks associated with embedded system development.
Integrations Supported
MATLAB
Simulink
API Availability
Has API
API Availability
Has API
Pricing Information
$1,180 per year
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
MathWorks
Company Location
United States
Company Website
www.mathworks.com/products/model-predictive-control.html
Company Facts
Organization Name
Hitex
Date Founded
1976
Company Location
Germany
Company Website
www.hitex.com/products/software-components/safety-and-security-ease-of-use
Categories and Features
Categories and Features
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation