Results for: delphi image processing

Suggested Categories:

Disk Imaging Software
Disk imaging software creates an exact copy of a computer's hard drive, including the operating system, applications, settings, and files. It is commonly used for system backups, disaster recovery, and deploying standardized configurations across multiple machines. By capturing a full snapshot of a disk, users can restore their system quickly in case of data loss, hardware failure, or malware attacks. Many disk imaging tools offer incremental backups, compression, and encryption for efficient storage and security. This software is essential for IT professionals, businesses, and individuals looking to safeguard their data and streamline system recovery.
Image Processing API
An image processing API is an API that can be used by developers to add image processing capabilities to applications. Image processing APIs can be used to build features into applications such as image cleanup, OCR, image conversion, image compression, computer vision, image editing, and more.
Medical Imaging Software
Medical imaging software is used to capture, store, process, and analyze medical images such as X-rays, MRIs, CT scans, ultrasounds, and other diagnostic images. These tools assist healthcare professionals in interpreting images for the purpose of diagnosis, treatment planning, and monitoring of patient progress. Medical imaging software often includes features such as image enhancement, 3D visualization, measurement tools, and the ability to integrate with electronic health records (EHR) systems. It may also offer tools for image sharing, collaboration, and comparison across different time points or imaging modalities. These software solutions improve the accuracy and efficiency of medical imaging workflows, supporting clinicians in delivering better patient care.
Image Recognition Software
Image recognition software enables machines to identify and classify objects, people, or features within images using advanced algorithms and machine learning techniques. This technology is capable of processing vast amounts of visual data to recognize patterns, shapes, and specific elements, making it useful in applications like facial recognition, object detection, and optical character recognition (OCR). The software often integrates with artificial intelligence (AI) models to improve accuracy and adaptability over time through training on diverse datasets. Image recognition is widely used in industries such as security, retail, healthcare, and autonomous vehicles, where it helps automate tasks and enhance decision-making. Overall, this software transforms visual data into actionable insights, providing significant value in various real-world applications.
Dental Imaging Software
Dental imaging software is used by dental professionals to capture, manage, and analyze various types of dental images such as X-rays, 3D scans, and intraoral photographs. This software helps in diagnosing and planning treatments for oral health issues by providing clear, detailed images that are critical for assessment and treatment planning. Features often include image enhancement tools, integration with patient records, digital radiography support, 3D visualization, and measurement tools for accurate diagnosis. Dental imaging software can also improve patient communication by allowing them to view their images and understand their treatment plans more effectively.
Process Mining Software
Process mining software enables organizations to analyze events and processes in order to identify processes that can be improved. Process mining software allows companies to visualize how processes are being handled across the organization.
Process Manufacturing Software
Process manufacturing software enables process manufacturers to streamline and manage their process manufacturing business. Process manufacturing software provides a variety of features including ERP, lot management, measurement management, production management, production scheduling, expiration tracking, recipe management, compliance management, inventory management, and more.
Payment Processing Software
Payment processing software is software used to facilitate payments made to and from businesses. It can process these transactions quickly and securely, allowing merchants to run their operations smoothly. The software is often integrated with point-of-sale systems or accounting programs, allowing for seamless tracking of all financial information. Users can easily manage payment gateways, report on transactions, and reconcile accounts with detailed analytics tools.
Claims Processing Software
Claims processing software is software built to help businesses, particularly in insurance and healthcare, automate and streamline the management of claims from submission to resolution. These platforms typically offer features for claim tracking, claim validation, document management, fraud detection, and payout processing. Claims processing software enables companies to improve operational efficiency, reduce manual errors, and enhance customer satisfaction by speeding up the claims approval process. It also helps with compliance by ensuring that all claims are handled according to industry regulations and internal policies.
Natural Language Processing Software
Natural language processing (NLP) software analyzes both written and spoken human languages and interprets them for translation, deep learning and automation purposes. Natural language processing software may also include natural language understanding (NLU) capabilities.
Business Process Management Software
Business process management software is designed to streamline and automate the way businesses manage their processes. It can help organizations easily create, analyze, optimize, and monitor business processes. BPM software typically works by breaking down a workflow into individual tasks and activities, and then tracking them from start to finish. By using this type of tool, businesses can become more efficient by eliminating redundant steps, reducing manual labor for complex tasks, and improving collaboration among employees.
Digital Process Automation Software
Digital process automation (DPA) software provides businesses with the tools to automate their tasks and operations in order to optimize their workflows. Digital process automation platforms let organizations build apps and integrations quickly using automated workflows and processes. Most capable digital process automation tools allow non-technical users the ability to create workflows and applications without knowing how to code.
Image Converters
Image converters are software tools and apps that enable users to convert images, graphics, and photos from one file format to another. Some image converters offer the ability for batch image conversion.
Image Annotation Tools
Image annotation tools are used to automatically process and label digital images using advanced techniques in machine learning, AI, and computer vision. These tools can accurately recognize important features in images, such as objects, characters, or facial expressions. This data can then be used for various purposes such as automatic image tagging and sorting. Image annotation is becoming an increasingly popular tool for organizing large databases of images and videos.
Image Optimization Software
Image optimization software is a type of software designed to help reduce the file size of digital images while maintaining the image quality. It typically works by compressing file sizes, changing color profiles or resolution, and stripping out unnecessary metadata and other non-visible data. This reduces the overall file size while still allowing users to keep a high-quality picture. Ultimately, this helps to improve website speed and performance by reducing load times from large image files.
Image Compressors
Image compressors are software tools designed to reduce the file size of digital images without significantly compromising visual quality. They use algorithms like lossless or lossy compression to optimize images for faster loading times, reduced storage needs, and improved web performance. Image compressors support various formats such as JPEG, PNG, GIF, and WebP, often allowing users to balance quality and compression level. These tools are essential for photographers, web developers, and marketers aiming to enhance user experience and bandwidth efficiency. Many compressors also include batch processing, automation, and integration capabilities for streamlined workflows.
Image CDN Software
Image CDN (Content Delivery Network) providers are services that optimize and distribute images quickly and efficiently across a global network of servers. They reduce image load times by caching content in multiple geographic locations, ensuring fast delivery to users regardless of their location. These providers often offer features like automatic image optimization, format conversion, and responsive resizing to improve website performance.
Shoppable Image Software
Shoppable image software is a web-based solution that enables businesses to integrate product catalogs with their online images. This allows consumers to buy products they see in photos or videos with just one click.
Robotic Process Automation (RPA) Software
Robotic process automation (RPA) software provides businesses with the automation tools to optimize their processes and operations in order to improve productivity. RPA tools enable businesses to improve efficiency, reduce errors, and lower operational costs by automating mundane tasks, freeing up human employees for more complex and value-driven work. RPA software can integrate with existing systems and applications, providing a seamless automation experience across different workflows. It is widely used in industries such as finance, healthcare, and customer service for tasks that require high levels of consistency and accuracy.
Process Server Software
Process server software is software to manage and streamline the delivery of legal documents, such as subpoenas, summons, and court orders. It enables process servers to track assignments, schedule deliveries, and log successful service attempts in real time. The software often includes GPS tracking, automated notifications, and reporting features to ensure transparency and accountability. It enhances efficiency by digitizing paperwork, reducing manual errors, and providing a centralized platform for managing service records. Legal firms, process serving companies, and independent servers use it to ensure compliance with legal requirements and improve operational workflows.
View more categories (20) for "delphi image processing"

38 Products for "delphi image processing" with 2 filters applied:

  • 1
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    ...Create trial, subscription, and perpetual licenses keys. Licenses can be node locked or floating/concurrent. Protect applications developed in .NET, ASP.NET, C++, VB6, VBA, Delphi, Excel, MS-Access, Word, Outlook add-ins, Android, Mac OS X, Linux, etc. Manage license keys with a state-of-the-art graphical user interface. Protect your application with a few lines of code. Send email notifications to your customers based on selected triggers. e-Commerce integration to automate the license key generation process with the ordering process. ...
    Leader badge
    Starting Price: $200 one-time payment
  • 2
    Gumlet

    Gumlet

    Gumlet

    Host, secure, and stream videos in minutes with Gumlet Video. Build custom video processing and delivery with Gumlet Video API. Optimize and deliver images at scale with Gumlet Image. Trusted by 10,000+ businesses, Gumlet handles 1.5B media files daily with a 54% optimization rate. Gumlet Video: Streamline Video Delivery 1. Simplify video streaming with minimal coding. 2. Achieve high compression without quality loss. 3.
    Leader badge
    Starting Price: $10 / month
  • 3
    LAPIXA

    LAPIXA

    LAPIXA

    ...Dealing with copyright infringement and the legal process is troublesome and time-consuming. We at LAPIXA understand that. Which is why the focus and goal at LAPIXA is superior UX (user experience) and making each step as easy as possible! With this in mind, we’ve designed the LAPIXA Image Finder to be user-friendly across all platforms. More importantly, we’ve streamlined the entire process, requiring minimal time and effort from users to achieve results.
    Starting Price: €9.90 per 500 images per month
  • 4
    Amped Authenticate

    Amped Authenticate

    Amped Software

    Amped Authenticate is the leading forensic software for unveiling the processing history of a digital image. Amped Authenticate provides a suite of powerful tools to determine whether an image is an unaltered original, an original generated by a specific device, or the result of manipulation using a photo editing software, making its admissibility as evidence questionable. Amped Authenticate is used by digital forensic experts and intelligence agencies worldwide. ...
  • 5
    Cognitech Video Investigator
    Part of the Tri-Suite64 software package, Video Investigator® 64 is designed to process video files and still images alike, including enhancing CCTV footage. There are a variety of methods that can be used in either scenario, which is what makes Video Investigator® 64 such a powerful video and image enhancement software package. No other software will offer the vast array of filters and features to enhance video and images like Video Investigator offers its users. ...
  • 6
    Qualys Container Security
    Qualys CS features a vulnerability analysis plug-in for CI/CD tool Jenkins, and soon for other CI/CD tools including Bamboo, TeamCity, and CircleCI. You can download the plugins directly from within the container security module. With Qualys CS, security teams can participate in the DevOps process to gate vulnerable images entering the system, while developers get actionable data to remediate vulnerabilities. Configure policies for preventing vulnerable images from entering the repositories. Set policies based on criteria such as vulnerability severity, and specific QIDs. Review from within the plug-in a summary of the build with its vulnerabilities, information on patchable software and fixed versions, and image layers where it is present. ...
  • 7
    Ocrolus

    Ocrolus

    Ocrolus

    Modernize your back office with automation, powered by artificial intelligence and crowdsourcing. Extract and analyze data from any image regardless of quality, with 99+% accuracy. Data capture has never been easier. Automatically parse images in whatever form is most convenient. Part machine, part human. Ocrolus intertwines its AI with human quality control specialists for outstanding accuracy. Protect your data with bank-level security and a robust audit trail. Eliminate manual review and...
  • 8
    idwall

    idwall

    idwall

    Convert more clients, improve user experience, reduce fraud, and obey regulatory demands. Our Background Check, Document OCR, and Face Match solutions make your processes more secure and up to ten times faster. Your client sends a picture of their driver’s license (CNH) or identity card (RG) and we do the rest. We extract data from the image of a document using OCR (Optical Character Recognition) and check if the data is accurate on public sources. All that is done automatically, making your onboarding quicker, safer, and slicker. ...
  • 9
    Xendity

    Xendity

    Xendity

    ...We aspire to build products which too, can be upgraded to meet your necessities in the framework of solving specific complications of data recognition in an e-document and image processing.
  • 10
    Unisys Modern Device Management
    ...At Unisys, we resolve these dual pressures through Modern Device Management. We give you the ability to efficiently provision, track, image, secure, deploy, and manage all devices and applications in your environment.
  • 11
    InterVision

    InterVision

    InterVision Systems

    Image module Prescriptive onboarding and training for your team.
  • 12
    Passware Kit
    Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts. Passware Bootable Memory Imager acquires memory of Windows, Linux, and Mac computers. Resolved navigation issues after stopping the password recovery process. Instant decryption of the latest VeraCrypt versions via memory analysis. ...
    Starting Price: $1,195 one-time payment
  • 13
    Deep Secure

    Deep Secure

    Deep Secure

    Featuring Deep Secure’s unique Threat Removal technology, iX provides 100% guaranteed protection from known and even zero day malware in documents and images. Working on the perimeter, iX acts as a transparent application layer proxy. With support for a wide range of protocols and data formats, it integrates seamlessly into a range of business processes and applications. Documents are intercepted at the boundary and then re-created from scratch, clean and safe on the other side. Nothing travels end-to-end but safe content – 100% guaranteed. ...
  • 14
    Anchore

    Anchore

    Anchore

    DevSecOps at full speed with deep inspection of container images and policy-based compliance. In an environment where application development must be fast and flexible, containers are the future. Adoption is accelerating, but with it comes risk. Anchore makes it possible to manage, secure, and troubleshoot containers continuously, without sacrificing speed. It delivers a process that allows container development and deployment to be secure from the start, by ensuring that the contents of your containers match the standards that you define. ...
  • 15
    Webshrinker

    Webshrinker

    DNSFilter

    ...Raw data is collected from domains around the world. 5 billion events per day are cleaned and categorized. Machine learning algorithms process large data sets. New information is pushed out to customers via API or database update.
    Starting Price: $50 per month
  • 16
    Air

    Air

    Air.inc

    ...Sure, Air stores your content. But it also has smart search, guest permissions, custom layouts, version tracking, and hassle-free sharing that makes every part of the creative process easier and more enjoyable. Stop hiding your assets in folders and zip files. Plan social media posts, create lightweight presentations, and organize your content in a workspace that reflects your brand. Navigate your workspace like a search engine. Built-in features like image recognition and smart tags enable anyone on your team to jump in and locate assets all by themselves. ...
    Starting Price: $250 per month
  • 17
    BioSP

    BioSP

    Aware

    ...BioSP is modular, programmable, scalable, and secure, capable of managing all aspects of transaction workflow including messaging, submissions, responses, and logging. BioSP makes extensive use of open-source components and is Jakarta EE-compliant. Performs automated biometric image and data analysis, processing, formatting, quality assurance, and reporting.
  • 18
    Greypanel

    Greypanel

    Greypanel

    ...By assigning the nearest resources to users, GreypanelCDN improves web services capacity, network access quality, download speeds and reduces response time, providing in smoother user experience. Targeted at portals and e-commerce sites, GreypanelCDN caches static content such as web pages, HTML, CSS, JS, images and files onto the nodes to accelerate the distribution process. Visitors will be able to access the content from the nearest node and load complex content in seconds, significantly improving web access speeds and reducing site response time, leading to better user experience. Enjoy a fast, stable and secure dynamic request acceleration with our extensive network of acceleration nodes, a large reserve of direct connections and an intelligent scheduling system.
  • 19
    Biometric Anti-Fraud (BAF)
    Biometric Anti-Fraud (BAF) is a technology stack for intelligent processing, analysis and recognition of images with an application scenario for remote human identification. Technology stack for online identity verification with NIST FRVT top-ranked face biometrics, advanced liveness detection and user session data monitoring for face authentication and identity fraud prevention in digital onboarding and eKYC services.
  • 20
    AssureID

    AssureID

    Acuant

    ...World-class patented image capture that automatically crops & detects document type & region.
  • 21
    ADF Cloud Platform

    ADF Cloud Platform

    ADF Solutions

    ADF Solutions is the leading provider of digital forensic and media exploitation tools. These tools are used for processing and analyzing Android/iOS smartphones, mobile devices, computers, external drives, drive images, and other media storage (USB flash drives, memory cards, etc.) ADF triage software is all about speed, scalability, ease-of-use, and relevant results. The tools have a proven track record in reducing forensic backlogs, streamlining digital investigations and rapid access to digital evidence and intelligence. ...
    Starting Price: $35000
  • 22
    UltraBac

    UltraBac

    UltraBac

    ...To begin the process, simply answer a few questions below and an UltraBac specialist will contact you within 24 hours to discuss your options. Once the BDR configuration has been tailored for your business, a custom quote can then be generated using any competitive, educational, or quantity discounts that may be applicable, for the ultimate in cost savings.
  • 23
    Blue Biometrics

    Blue Biometrics

    Blue Biometrics

    Blue enables police to identify more offenders and book more efficiently. Border agencies to enrol more visitor biometrics in advance. Businesses to verify more customers for remote digital processes. Digital identity systems to enrol and verify more citizens at low cost. Blue Biometrics software enables smartphone cameras as contactless fingerprint scanners for law enforcement, financial services, digital identity systems and many other applications. We specialise in the compatibility of contactless fingerprint images with contact based technology for policing, border protection, visas and digital identity systems. ...
  • 24
    Karamba XGuard

    Karamba XGuard

    Karamba Security

    ...The backend engine detects anomalous behavior and provides proactive alerts about suspicious devices. XGuard agents are integrated as part of the firmware build toolchain. No source code is required, development processes are untapped, and the agent is seamlessly integrated with the product binaries. Verification & validation are likewise unchanged. The product software image is tested with XGuard embedded into it, without requiring changes to test plans, as XGuard’s addition doesn’t change product functionality. XGuard automatically adjusts to a wide variety of device and fleet behaviors without requiring any user intervention. ...
  • 25
    VoiSentry
    Provided as a VM image that can be deployed on your platform of choice - hardware server, data center, or cloud. APIs facilitate core enrolment and verification tasks, leaving your application total scope to deal with overarching process operations. VoiSentry includes a cluster-based architecture that provides effective scalability, robustness, and future-proofing, along with the option of hosting on-premise or in a data center.
  • 26
    SentryFusion
    ...SentryFusion includes a cluster-based architecture that provides effective scalability, robustness, and future-proofing, along with the option of hosting on-premise or in a data center. Identify a user's voice and face during a video call so that they may later be recognized during a voice conversation, video call, or image. With identity theft on the rise, MFA is increasingly used to prevent unauthorized access to customer data or financial resources. This opens up the possibility of better-than-real-time operation, even in large-scale authentication scenarios. SentryFusion provides near-instantaneous results, streamlining the authentication process and removing the unnecessary hassle for end users.
  • 27
    Trendzact

    Trendzact

    Trendzact

    ...Security and productivity events can be flagged and then ticketed for a controlled workflow process. Automatically take notes for agents during calls and post them into CRM. Define workflow for triggered events.
  • 28
    Baidu AI Cloud Intrustion Detection System
    Based on the full-flow image and big data processing technology, the IDS can analyze the flow log authorized by the user, via a bypass. Also, it can identify the web application attack quickly and profoundly mines the remote command execution, web shell backdoor, and sensitive file leakage attacks against the web by hackers, and make the alarm accurately. Furthermore, it saves the original web traffic log and audit report, meeting the audit requirements for cybersecurity classified protection compliance services. ...
  • 29
    Shufti Pro

    Shufti Pro

    Shufti Pro

    ...Shufti Pro allows you to simply use the camera of your mobile device in real-time to capture and upload your selfie or a picture of your supported identity document to begin the process. With the OCR technology, data is extracted from the captured image and compared with the data provided to our systems. The two data sets are assessed meticulously, processed, correlated, and analyzed to generate results; all this is done in fraction of a minute.
    Starting Price: 0.20
  • 30
    Vitrium Security

    Vitrium Security

    Vitrium Systems

    ...Get started today with our cloud-hosted subscription service or contact our team to learn how you can implement in your business as part of your overall content strategy or workflow process. Protect all your video, document, and image content files for secured and controlled distribution with Vitrium’s Enterprise Content Security Software. Enjoy one of the highest levels of encryption while still offering seamless access for your customers and gain incredible insight with detailed, analytics reports. Your customers (clients, students or employees) do not require any apps or plug-ins to view their secured content and they can access the content from any device at anytime.
    Starting Price: $300.00/month
  • Previous
  • You're on page 1
  • 2
  • Next