Skip to content

透過 STEAM 動手實作能力重新想像學習 —— Skyrock 科技俱樂部 STEAM 使用案例分享

Skyrock 是一個體驗式學習空間,經由實踐方式來教授 STEAM(科學、科技、工程、藝術和數學),及透過個人創造以激發天賦和想像力。

隨著整個社會快速數位化,學生掌握必要的知識和技能以獲得成功在這個數位化社會中變得越來越重要。

Zack Hwang 曾是電源工程師,現在為 Skyrock 的校長之一,他成功地將IPEVO 愛比科技產品融入線上和實體課程中。線上課程的概念已經存在多年,但直到最近才真正被大眾認可為有效的教育形式。借助 IPEVO 愛比科技產品,Zack 能夠順利的向全國各地的學生反複說明課程中精細而複雜的細節。

「當老師想要從臉部影像切換到手部動作錄影時,視訊教學攝影機對教授直播組裝課程提供很大幫助。」

在結合 IPEVO 產品之前,Skyrock 一直需要想辦法盡力維持影片品質:

「我們試著集合多位老師錄製多個組裝影片。最大的挑戰是讓影片的品質和畫面維持一致性。」

在此之前,Skyrock 是將智慧型手機放在手機支架上來錄製影片:

「使用愛比科技視訊教學攝影機錄製影片後,最明顯不同的是,畫面不會像使用手機錄影時會抖動或搖晃。」

在 STEAM 課程中使用愛比科技視訊教學攝影機獲得很好的成果後,Zack 分享了他對 IPEVO 愛比科技視訊教學攝影機在其他潛在領域應用的想法:

「我認為視訊教學攝影機很適合需要不同拍攝角度及錄影的現場直播課程。例如烹飪課程、藝術和手工藝等。」

Skyrock 的使命是推廣 STEAM 教育,Zack 分享了其背後的想法:

「我們都知道,教科書和考試是如何扼殺孩子的好奇心。只有認真工作沒有玩樂,一點也沒有樂趣。我們相信培養孩子們對技能和創造的信心,能讓孩子們再次愛上學習。因此,這個是讓孩子們能參與「認真玩」(SERIOUS PLAY) 和 「困難,但有趣」(HARD FUN) 創意計畫的最完美的工具!」

本文章圖片中使用VZ-X 無線教學攝影機 以及 VZ-R HDMI/USB 雙模教學攝影機。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於IPEVO
IPEVO源自於PChome Online硬體事業部門,2007年7月正式獨立。自2004年於台灣營運Skype網絡電信服務,使台灣成為Skype全球發展中最成功的市場。2005年起以IPEVO品牌推出一系列Skype專屬硬件產品,將Skype虛擬服務轉化為使用者實質經驗。IPEVO以簡單、實際且具有價值的經驗為產品目標,其簡潔俐落的產品風格呼應著IPEVO的核心思考與產品精神。目前已研發之產品包括:Skype有線USB話機、Skype無線話機、Skype會議系統、Skype視訊設備、Stand-alone免電腦Skype話機。

An Overview of Saudi Arabia’s Personal Data Protection Act (PDPL)

Saudi Arabia’s Personal Data Protection Law (PDPL) was implemented by Royal Decree M/19 of 9/2/1443H (September 16, 2021), which approved Resolution No. 98 of 7/2/1443 H (September 14, 2021). It was published in the Republic Journal on September 24, 2021.

The Saudi Data and Artificial Intelligence Authority (SDAIA) will oversee the implementation of the new legislation for the first two years, after which a transfer of oversight to the National Data Management Office (NDMO) will be considered. The NDMO is the regulatory arm of SDAIA and had already published interim data governance regulations in 2020, which have now been superseded by the PDPL with regard to the protection of personal data.

According to the SDAIA announcement, the PDPL is intended to ensure the privacy of personal data, regulate data sharing and prevent abuse of personal data in line with the goals of the Saudi Vision 2030 to develop digital infrastructure and support the innovation to grow a digital economy.

PDPL Enforcement Scope

The Personal Data Protection Law (PDPL), as well as other legislation on the subject, is designed to protect personal data, that is, any information, in any form, through which a person can be directly or indirectly identified. This expressly includes an individual’s name, identification number, addresses and contact numbers, pictures, and video recordings of the person.

The PDPL applies to any personal data processing by companies or public entities carried out in Saudi Arabia by any means, including the processing of personal data of Saudi residents by entities located outside the Kingdom.

The PDPL does not apply to the processing of personal data for personal and family use.

The PDPL Pillars

Many of the features of the Personal Data Protection Law (PDPL) are consistent with the concepts and principles contained in other international data protection laws, such as:

  • Data Subject Rights: Individuals (data subjects) shall, with some exceptions, have the right to be informed about the processing of personal data and the legal basis for such processing, the right to access their personal data (including to obtain a free copy thereof), the right to correct or update their personal data, and the right to request their destruction if they are no longer necessary. Data subjects can also file complaints related to the PDPL enforcement with the regulatory authority.
  • Registration of Controllers: Organizations that collect personal data and determine the purpose for which they are used and the method of processing (controllers) must register with an electronic portal that will form a national register of controllers. There will be an annual fee payable for registration, to be determined in executive regulations (which will be issued in due course).
  • Controller Obligations: Controllers will be obliged to ensure the accuracy, integrity, and relevance of personal data before processing them, to keep a record of the processing for a period that will be defined by the executive regulations, and to ensure their team is properly trained in the PDPL and data protection principles.
  • Consent: Data subjects may withdraw their consent to the processing of personal data at any time, and consent shall not be a prerequisite for the controller to offer a service or benefit (unless the service or benefit is specifically related to the processing activity for which consent is obtained).
  • Processing not Based on Consent: Notwithstanding the provisions on withdrawal of consent, the PDPL makes it clear that data processing does not always require consent from the data subject. Consent is not required if processing achieves a clear benefit and it is impossible or impractical to contact the data subject, if required by law or prior agreement to which the data subject is a party, or if the controller is an entity and processing is required for security or legal purposes.
  • Privacy Policy: Controllers must implement a privacy policy and make it available to data subjects before the collection of their personal data. The Personal Data Protection Law (PDPL) establishes the minimum information that must be included in the privacy policy, including when personal data is collected directly from the data subject.
  • Purpose Limitation and Data Minimization: Organizations must make clear the purpose for which personal data is collected and used. Personal data must also be relevant and controllers must limit collection to the minimum necessary to achieve the intended purpose.
  • Impact Assessments: Controllers must assess the impact of processing personal data and, if personal data is no longer needed to achieve the intended purpose, the controller must stop collecting such data.
  • Marketing: Personal data may not be used for marketing purposes without the recipient’s consent or the use of opt-out mechanisms.
  • Breach Notification: Data breaches, leaks, or unauthorized access to personal data must be notified to the supervisory authority, and incidents that cause material damage to the data subject must be notified to the data subjects.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Scale Computing Customer Edge Data Center Project Named a Finalist in 2021 DCD>Awards

INDIANAPOLIS – December 7, 2021 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that Data Center Dynamics has named the company’s work with Ahold Delhaize NV and Econocom Products & Solutions as a finalist in the 2021 DCD>Awards, in the Edge Data Center Project of the Year category.

According to DCD, the edge is now moving from the era of promise to the era of delivery. Driven by higher standards of connectivity and increasing sophistication of systems and hardware, the Edge Data Center Project of the Year award category seeks to feature how edge is evolving and diversifying while redefining the opportunities that technology can represent.

Ahold Delhaize, a world-leading food retailer with 6,700 stores worldwide, needed a complete infrastructure refresh to replace aging hardware. They wanted a simple, cost effective edge computing solution with easy deployment. At phase one, Delhaize implemented Scale Computing HC3 Edge platform on Lenovo ThinkSystem SR250 and Scale Computing HE150 servers in their 800 stores in Belgium and Luxembourg. By doing so, Delhaize reduced management time by 75% and improved recovery time by 99.9%. Scale Computing HC3 Edge provides a comprehensive system that automates the overall IT management, saving organizations time, money, and resources. Delhaize experienced no downtime in any store where HC3 Edge is implemented.

Alongside simplified management, Scale Computing’s HC3 also offers a comprehensive range of recovery and Data Protection features which have enabled Delhaize to improve disaster recovery. With snapshots, replication and regular back up testing, the HC3 Edge platform also offers business continuity.

Technology is everywhere, and it’s increasingly important that edge computing be able to support applications anytime, anywhere

“Technology is everywhere, and it’s increasingly important that edge computing be able to support applications anytime, anywhere,” said Jeff Ready, CEO and co-founder of Scale Computing. “Edge computing plays a critical role in the retail industry’s IT innovation and digital transformation strategies. Made for the IT infrastructure demands of retail stores, HC3 Edge is a powerful, all-in-one software platform designed for running applications at the edge, and we’re thrilled that our work with Delhaize was named a finalist in the DCD Awards.”

This announcement comes on the heels of other recent industry recognition, including:

  • Scale Computing’s HC3 Video Surveillance named a winner for the 2021 CRN Tech Innovator Awards in the Edge Computing category.

  • Scale Computing named on CRN’s 2021 Edge Computing 100 list.

  • Winner in both the Edge Computing category and the Converged/ HyperConverged Infrastructure category, of the 2021 CRN Annual Report Card (ARC) Awards. This is the third consecutive year Scale Computing has been recognized as a CRN ARC Award winner.

  • Scale Computing HC3 received two TrustRadius 2021 Top Rated Awards, in Hyperconverged Infrastructure and Server Virtualization.

  • Scale Computing received a 5-Star rating in CRN’s 2021 Partner Program Guide.

  • Scale Computing’s HE150 was named to SearchStorage’s 2020 Storage Products of the Year.

An independent panel of judges reviewed hundreds of entries submitted from 35 different countries across 6 continents. Winners will be announced on December 8 at the 15th annual awards ceremony in London and broadcast live worldwide.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Simplifying Cyber Security for the Mining Industry

The COVID-19 pandemic has been detrimental to the world economy while flattening many industries. The mining industry was fortunate to be one of the very few industries to deliver exceptional growth throughout this period. Yet this growth has marked the mining industry out as a lucrative target for cybercriminals.

 

Cybercrime has increased over the course of the pandemic as threat actors try to take advantage of the rapidly changing circum- stances, misinformation, and organizations’ shift to a hybrid workplace. The rewards for successful cyber-attacks are staggering. To put this in perspective, it is currently estimated that cyber-crime is worth more than the illegal drug trade globally, with billions of dollars paid out each year on ransomware. Cybercrime continues to accelerate and is expected to cost 10.5 trillion USD annually by 2025.

Cybercriminals are also becoming more innovative and creative as they target complex, business-critical Operational Technology (OT) environments, including Industrial Control Systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems.

Several high-profile attacks have demonstrated both the increasing sophistication of attacks and the devastating effects of a breach in these environments. In 2010 a malicious worm traveled for years to eventually find its SCADA target at an Iranian nuclear plant. More recently, in February 2021, a hacker attempted to poison the water supply of Oldsmar in Florida by using remote access to alter the levels of sodium hydroxide in the water. Though the attempt was thwarted, it illustrated the threat to industrial control systems1. Then in May, hackers successfully gained entry into the Colonial Pipeline Company network, which led to the shutdown of their 5,500-mile fuel pipeline, a shortage of petroleum in the USA and a ransom pay-out of $5.6 million3.

The rapid shift to remote work during the lockdown, and the consequential increase in cyber threats arising from the greater attack surface, have increased the demand for cybersecurity skills. Combined with the existing global shortage of cyber expertise, this demand means many organizations struggle to find and keep the people required to effectively manage security governance and operations across IT/OT environments. In response, we are now seeing increasing adoption of managed security services such as managed detection and response (MDR) solutions and vulnerability and threat identification tools designed specifically for OT systems.

Targeted mining attacks have the potential to affect four parts of operations: extraction, processing/refinement, stock management, and shipping. Each function presents a different set of risks that, if exploited, can reduce efficiency, inhibit operations, and cause financial turmoil. Given the extremely dangerous environments that mine sites present – heavy machinery, fumes, and explosives – the effect of a cyberattack on safety technologies such as wearables and gas detectors is possibly the most severe example.

Understanding the OT Environment 

Security analysts need to understand what is happening within OT systems with a unified system that monitors and assesses both OT and traditional IT environments. Complete coverage of an industrial mining network must include continuous monitoring of the components within the industrial network, such as programmable logic controllers or remote terminal units. Companies need to be continually monitoring governance and compliance aligned to industry good practice and ensuring coverage extends to IoT devices and machinery.

With such complex environments, many mining companies face an increasingly complex task to manage their cybersecurity. It is not uncommon to see companies procure half-a-dozen or more solutions. In fact, one study found 40% of organizations use 10 to 25 separate security tools, and 30% use 26 to 50 tools. This only adds to security teams’ burden. Furthermore, traditional security tools often don’t provide the required visibility into OT networks and devices that companies need to operate.

The key to managing this complexity and simplifying security is to bring network visibility, asset monitoring, vulnerability management, threat intelligence and threat detection into one solution. Security teams can focus on identifying, understanding, and remediating issues rather than managing data and tools. Tooling that is OT-specific and run by professionals who understand the nuances of OT environments is key.

Industry-leading OT security

At Rapid7, we know cyber security. We have two decades of experience in helping organizations advance their security postures and have assisted in increasing customers’ cyber security maturity. Our solutions are built to incorporate the change in modern environments, including the continued convergence of OT, and we offer clarity of risk, while helping secure your entire attack surface.

At Rapid7, we provide targeted threat detection through our External Threat Intelligence platform, allowing you to leverage tailored and actionable intelligence based on unique digital assets. This enables you to identify, block, and takedown attacks that directly target your industry and digital operations.

 For example, you can identify new malware kits and exploits that target production line equipment and/or OT devices or monitor hacker chatter to prioritize and lockdown vulnerabilities before they are exploited.

To expand the power of our solution in OT environments, we have partnered with the award-winning SCADAfence team to develop deep integrations between the two platforms to meet IT and OT security needs. Security teams now have a consolidated solution for IT, OT and IoT vulnerability management, threat intelligence, and incident detection and response.

SCADAfence is an industrial cybersecurity solution that provides visibility and monitoring for the mining industry’s OT & IoT networks. SCADAfence were recently recognized as Frost & Sullivan’s 2021 entrepreneurial company of the year, not to mention positioned as a Leader in the new Frost and Sullivan Radar for the Global Critical Infrastructure cyber security market. SCADAfence also won three coveted global infosec awards at RSA conference, including ICS/SCADA market leader.

SCADAfence’s solution automates asset discovery and inventory management, as well as threat detection and risk management. Remote access security capabilities enable security teams to track user activities and detect those that are outside the user profile or are malicious in nature.

By employing a wide range of algorithms, machine learning and AI, the platform detects anomalies and security events that can compromise availability and affect the safety and reliability of the OT network and its assets. A governance portal also measures compliance across all sites and identifies gaps or bottlenecks to help improve organizational security at scale.

SCADAfence provides 100% deep packet traffic inspection of all SCADA/ICS/IoT devices out of band, and offer a Governance and Compliance modules for ISO, NERC/CIP, EU and many other standard compliance models, providing a seamless reporting mechanism on the cyber security posture within OT environments. This ensures that reporting requirements align to your defined security frameworks.

A Consolidated Approach to Mining OT security

Rapid7 has integrated SCADAfence’s specialized OT monitoring with our industry-leading Insight platform to provide a comprehensive security solution without overwhelming your teams. The integration works bi-directionally and adds great security and manageability. Vulnerability data is collected from across the corporate IT and OT environments and provides visibility in a single interface for a comprehensive insight into IT/OT vulnerabilities.

Threats identified within the OT environment are communicated to teams via a central Security Information and Event Management (SIEM) solution (e.g. Rapid7’s InsightIDR). This, combined with the centralized vulnerability information, is what provides the single interface of all identified vulnerabilities and threats within the IT/OT environments.

The Rapid7 XDR solution (InsightIDR) ingests all your IT/OT threat data, as well as network traffic analysis (NTA), user behavior analytics (UEBA) and endpoint detection and response (EDR) data, to provide a complete view of your environment’s attack surface.

The XDR solution provides security teams with a single, centralized solution that can quickly identify malicious behavior across your entire environment.

In addition, with Rapid7 IntSights, our Threat Intelligence (TI) solution can also look for external threats from the clear, deep, and dark web, picking up industry targeted attacks, leaked company credentials, brand impersonation, executive impersonation and much, much more.

As a result, mining companies now have a single consolidated solution for IT/OT/IoT security, vulnerability management, threat intelligence, extended detection and response, and security orchestration and automation.

Opinion Disclaimier

The views and opinions expressed in this post are those of the author and do not represent the official policy or position of SCADAfence.

This article was orginally published in the Australian Mining Review and is authored by John Rice, Account Exectuve at Rapid7

The original post can be found here: https://australianminingreview.com.au/latest/#page=88

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

訊連科技FaceMe® 人臉辨識獲日本bitkey採用 打造具備非接觸及刷臉功能之「workhub」智慧辦公室解決方案

【2021年12月07日,台北訊】— AI人工智慧領導廠商訊連科技(5203.TW)宣布,旗下FaceMe® 人臉辨識引擎獲日本bitkey Inc. (以下簡稱bitkey)採用,整合至其「workhub」智慧辦公室解決方案。透過先進的AI人臉辨識技術及非接觸性之特性,bitkey「workhub」解決方案可大幅改善後疫情時代辦公空間的便利性。近期「workhub」解決方案於位於東京廣場花園(東京スクエアガーデン)辦公大樓導入,該建築位於東京都中央區,由東京建物負責營運管理。「workhub」的導入,可提升辦公室承租戶及訪客的來訪體驗。bitkey亦於位在該大樓之總部設置了展示間,演示「workhub」相關功能。

Bitkey成立於2018年,為一家日本新創公司,主要提供智慧門鎖、門禁之互聯網解決方案,包括居家智慧之「homehub」、智慧辦公室之「workhub」及互動體驗之「exphub」。根據2021年9月之日本ESP市場調查報告,bitkey為日本出貨量冠軍之智慧門鎖供應商。

Bitkey打造之「workhub」解決方案形塑了未來智慧辦公室之樣貌。透過支援多因子認證 – 包含IC卡、QR Code及人臉辨識技術,「workhub」可在保障企業財產安全的前提下,透過AI技術的加持,提供使用者更方便、易用的門禁、認證介面。Bitkey 「workhub」的主要功能包括:

非接觸性訪客自助報到系統

訪客於來訪前,會收到由workhub平台發送的電子郵件邀請函,包含一組訪客專屬之QR Code。訪客可於大廳之workhub自助報到機掃描QR Code,並透過臉部進行註冊完成報到。之後即可透過刷臉方式使用電梯,並自動送達拜訪之樓層,給予權限通過管制區及會議室之閘門。透過此套系統,受訪者不再需要至大廳帶客上樓,提升訪客來訪之效率。

非接觸性訪客自助報到系統

透過人臉辨識使用會議設施

於各種會議空間,包含多人的大型會議室、及單人使用的視訊會議專用亭,員工於內部系統預約後,都可透過人臉辨識方式,於各會議設施入口處之門禁機進行刷臉解鎖。

透過人臉辨識使用會議設施

利用可視化技術呈現公共空間之人數稠密度

於bitkey辦公室的公共空間,如展示間,設置了以FaceMe® AI技術開發之人流統計功能。於設施入口處的顯示器,透過可視化方式,顯示該公共空間之使用人數,維持防疫期間之社交距離。

利用可視化技術呈現公共空間之人數稠密度

FaceMe® 人臉辨識軟體可支援多數作業系統 (Windows、Linux、Android 、 iOS),並於各式硬體裝置上運行,舉凡高階工作站至低功耗的晶片裝置,皆可彈性建置於IoT和 AIoT邊緣運算裝置上,打造出最適配的人臉辨識解決方案。此外,FaceMe® SDK讓系統整合商可以更快速且便利的方式,將人臉辨識技術導入如門禁安控、智慧金融、智慧零售或智慧居家等不同應用場景。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×