1~45 item / All 299 items
Displayed results
Filter by category
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Contact this company
Inquiry Form1~45 item / All 299 items
Filter by category

In the real estate industry, handling highly confidential information such as customer data and contract documents makes cybersecurity measures essential. Particularly, as online contract procedures and information sharing increase, the risks of information leakage and unauthorized access are rising. Damage from cyberattacks can lead to a loss of trust from customers and significantly impact business continuity. Fujisoft's cybersecurity measures provide features that lead to secure product development and reduce the burden of the development process, such as high-precision detection of OSS vulnerabilities, automatic generation of SBOM, and integration with DevOps infrastructure, thereby mitigating cyber risks in contract management. 【Usage Scenarios】 * Online contract systems * Customer information management systems * Contract document management systems 【Benefits of Implementation】 * Reduction of information leakage risks * Increased trust from customers * Assurance of business continuity
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the entertainment industry, the protection of copyrighted works and the safety of software that handles them are crucial. Particularly in content distribution and software development, vulnerabilities in open-source software (OSS) and licensing risks can lead to copyright infringement and information leaks. Compliance with the Cyber Resilience Act (CRA) starting in 2027 is also urgent. Fujisoft's cybersecurity measures support safe software development through OSS vulnerability management, automatic generation of Software Bill of Materials (SBOM), and integration with DevOps infrastructure. This enables the coexistence of copyright protection and enhanced security, allowing businesses to operate with peace of mind. 【Use Cases】 - Content distribution platforms - Software development companies - Game development companies - Video production companies 【Benefits of Implementation】 - Reduction of OSS vulnerability risks - Increased efficiency in software configuration management through SBOM - Preparation for CRA compliance - Reduction of copyright infringement risks
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the IT industry, it is important to diagnose software vulnerabilities and protect systems from cyber attacks. Especially with the increasing use of OSS (open source software), managing vulnerabilities and license risks is essential. By 2027, the Cyber Resilience Act (CRA) will be mandated, requiring enhanced security measures. Fujisoft's cybersecurity measures contribute to safe product development and reduce the burden of the development process through high-precision detection of OSS vulnerabilities, automatic generation of SBOM, and integration with DevOps infrastructure. This is recommended for those considering strengthening software security and addressing OSS vulnerabilities. 【Use Cases】 - Want to understand OSS vulnerabilities and license risks - Feeling challenged in balancing specifications and security measures - Want to streamline SBOM management and CRA compliance 【Benefits of Implementation】 - Visualization of OSS vulnerability risks - Reduction of management workload through automatic SBOM generation - Support for CRA compliance
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the retail industry's payment systems, it is essential to securely protect customer information and financial transactions. Information leaks and system outages due to cyberattacks can undermine customer trust and have serious impacts on business continuity. By 2027, the Cyber Resilience Act (CRA) will be mandated, making software security measures even more important. Fujisoft's cybersecurity measures support the construction of secure payment systems through OSS vulnerability management, automatic generation of SBOMs, and integration with DevOps infrastructure. 【Usage Scenarios】 - Online payment systems - POS systems - Store networks 【Benefits of Implementation】 - Protection of customer information - Reduction of system outage risks - Compliance with regulations
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the energy sector, particularly in critical infrastructure, system outages caused by cyberattacks can have a significant impact on society as a whole. By December 2027, the Cyber Resilience Act (CRA) will be fully applied in the EU, mandating the strengthening of software security. For systems supporting critical infrastructure, addressing OSS vulnerabilities, managing SBOMs, and complying with the CRA are urgent tasks. Fujisoft will leverage its 40 years of embedded development experience to support your cybersecurity measures. By utilizing Black Duck SCA, we will achieve safe product development and reduce the burden of the development process. 【Usage Scenarios】 - Control systems for critical infrastructure such as power plants, transmission networks, and oil and gas plants - Mitigating the risk of system outages due to cyberattacks - Streamlining CRA compliance, OSS vulnerability management, and SBOM management 【Benefits of Implementation】 - Visualization of OSS vulnerabilities and license risks - Reduction of management workload through automatic SBOM generation - Establishment of a safe product development process
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the transportation supply chain, the security of information systems is crucial. In particular, the risk of cyberattacks across the entire supply chain is increasing, and information leaks or system outages can significantly impact business continuity. By 2027, the Cyber Resilience Act (CRA) will be applicable, making security measures across the entire supply chain essential. Fujisoft's cybersecurity measures contribute to safe product development and the reduction of burdens in the development process through high-precision detection of OSS vulnerabilities, automatic generation of SBOMs, and integration with DevOps infrastructure. This is recommended for those considering strengthening software security and addressing OSS vulnerabilities. 【Use Cases】 * Strengthening security across the entire supply chain * Addressing OSS vulnerabilities * SBOM management * Compliance with CRA 【Benefits of Implementation】 * Reducing security risks across the entire supply chain * Mitigating the risks of information leaks and system outages * Supporting compliance with CRA * Ensuring safe product development and reducing the burden of the development process
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In educational institutions, it is important to manage the personal information of students and staff appropriately and to minimize the risk of information leaks. Especially with the increase in online learning activities, information leaks and system outages due to cyberattacks can become serious issues that hinder the continuity of education. There is also pressure to comply with the Cyber Resilience Act (CRA) starting in 2027, making the strengthening of security measures an urgent task. Fujisoft's cybersecurity measures support safe system development and operation through vulnerability management of OSS, automatic generation of SBOM, and collaboration with DevOps infrastructure. We encourage you to consider this to balance personal information protection and the continuity of educational activities. 【Use Cases】 - Personal information management in schools and boards of education - Strengthening security for online learning platforms - Information security education for staff 【Benefits of Implementation】 - Reduction of personal information leak risks - Protection of systems from cyberattacks - Preparation for CRA compliance - Establishment of a safe educational environment
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the telecommunications network industry, the stable operation of systems and the protection of customer data are the top priorities. In particular, vulnerabilities in the software that makes up the network increase the risks of service outages and information leaks. By 2027, the Cyber Resilience Act (CRA) will be mandated, making security measures essential. Fujisoft's cybersecurity measures achieve safe product development and reduce the burden of the development process through high-precision detection of OSS vulnerabilities, automatic generation of SBOMs, and integration with DevOps infrastructure. 【Use Cases】 - Development of network equipment - Strengthening the security of communication infrastructure - Addressing software vulnerabilities 【Benefits of Implementation】 - Compliance with CRA - Visualization of OSS risks - Streamlining SBOM management
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the protection of government agency systems, robust security measures are essential to prevent information leaks and system outages. Particularly in systems that handle critical information of citizens, it is necessary to minimize damage from cyber attacks. By 2027, the Cyber Resilience Act (CRA) will be mandated, making software security measures mandatory. Fujisoft's cybersecurity measures support safe system development through the detection of OSS vulnerabilities, automatic generation of SBOMs, and integration with DevOps infrastructure. We encourage government agencies considering software security enhancements and OSS vulnerability measures to review our materials. 【Usage Scenarios】 - Strengthening security for critical infrastructure systems - System security measures for personal information protection - Compliance with CRA 【Benefits of Implementation】 - Reduction of OSS vulnerability risks - Streamlining of SBOM management - Establishment of a safe system development process
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the healthcare industry, highly confidential information such as patients' personal data and medical records is handled. Information leaks not only undermine patient trust but also carry risks of legal liability and damages. In particular, cyberattacks that exploit software vulnerabilities are one of the main causes of information leaks. The Cyber Resilience Act (CRA) will come into effect in 2027, requiring healthcare institutions to strengthen their software security measures. Fujisoft's cybersecurity measures support safe software development through OSS vulnerability management and automatic generation of SBOM, reducing the risk of information leaks. 【Use Cases】 - Electronic medical record systems - Medical information systems - Patient portal websites 【Benefits of Implementation】 - Reduction of information leak risks - Compliance with regulations - Gaining trust from patients
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the manufacturing industry, there is always a risk of leakage of confidential information such as intellectual property and customer data. Information leaks due to cyberattacks can undermine a company's trust and make business continuity difficult. By 2027, the Cyber Resilience Act (CRA) will be mandatory, making software security measures essential. Fujisoft's cybersecurity measures support safe product development through the detection of OSS vulnerabilities, automatic generation of SBOMs, and integration with DevOps infrastructure. This is ideal for those considering strengthening software security and addressing OSS vulnerabilities. 【Use Cases】 - Protection of confidential information - Risk management in the supply chain - Compliance with CRA 【Benefits of Implementation】 - Reduction of information leakage risks - Compliance with regulations - Streamlining of the development process
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the financial industry, protecting customer data and preventing fraudulent transactions are the top priorities. Information leaks and system outages due to cyberattacks can lead to a loss of trust from customers and cause significant damage. The Cyber Resilience Act (CRA) will be fully applied in the EU by December 2027, affecting financial institutions as well. Attacks exploiting software vulnerabilities are relentless, and urgent measures are required. Fujisoft's cybersecurity measures support safe system development through OSS vulnerability management and automatic generation of SBOMs. Let's enhance the security of the fraud detection system by utilizing Black Duck SCA. 【Use Cases】 * Strengthening the security of fraud detection systems * Protecting customer information * Compliance with the Cyber Resilience Act (CRA) 【Benefits of Implementation】 * Early detection and response to OSS vulnerabilities * Streamlining software configuration management with SBOM * Safe system development and operation
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"DoCD" is a complete debugging system for the DCD DQ80251/DQ8051/DT8051/DP8051x/DP80390x microcontroller cores. It offers several features, including real-time non-intrusive debugging capabilities, enabling pre-silicon validation, post-silicon, and on-chip software debugging. This allows for hardware breakpoints, tracing, variable monitoring, and multi-C source debugging. 【Key Blocks】 ■ Debugging features of the IP core ■ Hardware debugger ■ Debugging software *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "DQ8051CPU" is an IP core for a single-chip 8-bit embedded microcontroller designed to operate with both high-speed (on-chip) and low-speed (off-chip) memory. It is 100% binary compatible with the 8051 8-bit microcontroller and is specifically designed with a focus on performance-to-power consumption ratio, featuring an advanced Power Management Unit (PMU). Additionally, it includes a built-in DoCD-JTAG on-chip debugger and supports the Keil μVision development platform as well as standalone DoCD debugging software. 【Specifications (partial)】 ■ 100% compatibility with 8051 ■ Capable of executing 28.40 times faster than the original 80C51 at the same frequency due to a quad-pipeline architecture ■ Up to 26.721 VAX MIPS at 100MHz ■ 24 times faster multiplication ■ 12 times faster division *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The DQ80251 is an IP core for a 16-bit/32-bit embedded microcontroller that is 100% binary compatible with the 16-bit 80C251 and the 8-bit 80C51 microcontrollers. It features a built-in DoCD-JTAG on-chip debugger and supports debugging software from Keil DK251 and DoCD. The Dhrystone 2.1 benchmark program runs at 75 times the speed of the original 80C51 and 6 times the speed of the original 80C251 under the same frequency conditions. Furthermore, due to its high instruction efficiency, the size of the code compiled for SOURCE mode is approximately half that of the equivalent standard 8051 code. 【Specifications (partial)】 ■ 100% binary compatible with 80C251 ■ Implements BINARY and SOURCE modes ■ Most instructions execute in 1 clock cycle ■ Quad pipeline architecture allows operation at the same frequency, 75 times faster than the original 80C51 and 6 times faster than the 80C251 *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "D32PRO" is an IP core for a 32-bit microcontroller based on the Harvard architecture. It supports dual and multi-core systems, making it suitable for embedded systems that require higher computational performance and system complexity by improving code density. It comes with various peripheral interfaces such as USB, SPI, LCD, HDLC, UART, Ethernet MAC, CAN, LIN, and RTC, allowing for easy system construction. 【Specifications (partial)】 ■ 32-bit Harvard architecture ■ Maximum performance of 1.52/2.67 DMIPS/MHz and 2.59 CoreMarks/MHz ■ Minimum ASIC gate area of 10.6k/6.8k ■ 15 32-bit general-purpose registers ■ ASIC silicon-proven architecture *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "DI3CM" is an HCI controller that complies with the MIPI I3C Basic v1.1.1 specification and the Host Controller Interface v1.1 specification. I3C (Improved Inter-Integrated Circuit) is a bus that succeeds the I2C bus. I3C significantly improves usage, power, and performance while maintaining the assets inherited from I2C. The core uses two pins and has minimal power consumption, reducing cost and complexity while allowing easy interfacing with multiple sensors from various vendors to the controller or application processor. 【Specifications (partial)】 ■ Compliant with MIPI I3C Basic v1.1.1 specification and Host Controller Interface v1.1 specification ■ MIPI Manufacturer ID: 0x03B3 ■ Supports static and dynamic addresses for I2C devices ■ Support for Dynamic Address Assignment (DAA) *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"DUART" is a soft core of a Universal Asynchronous Receiver/Transmitter (UART). It enables serial transmission in UART mode and is a very simple and small UART IP core available on the market. Additionally, it features a programmable 16-bit baud rate generator that can divide the timing reference clock input by a divisor ranging from 1 to (2^16-1). 【Specifications (partial)】 ■ Majority logic ■ Addition or removal of standard asynchronous communication bits (start, stop, parity) to serial data ■ Supports UART mode ■ Independently controlled transmission, reception, line status, and data set interrupts *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "D16450" is a soft core universal asynchronous receiver/transmitter (UART) that is functionally the same as the TL16C450. It also includes a programmable 16-bit baud generator, which can divide the timing reference clock input by a divisor ranging from 1 to (2^16-1). Supported devices/OS include Intel FPGA, Lattice FPGA, Xilinx FPGA, and ASIC. 【Specifications (partial)】 ■ Software compatible with 16450 UART ■ Configuration features ■ Isolated configurable BAUD clock line ■ Majority logic ■ Addition or removal of standard asynchronous communication bits (start, stop, parity) to serial data *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "D16750" is a soft core universal asynchronous receiver/transmitter (UART) that is functionally the same as the TL16C750. It supports serial transmission in two modes: UART and FIFO. In FIFO mode, the transmitter and receiver are buffered with 64 (up to 512) bytes of FIFO each, reducing the number of interrupts to the CPU. In UART mode, the receiver and transmitter are double-buffered to eliminate the need for precise synchronization between the CPU and serial data. 【Specifications (partial)】 ■ Software compatible with 16450, 16550, and 16750 UARTs ■ Configuration features ■ Isolated configurable BAUD clock line ■ Majority logic ■ Supports RS232 and RS485 *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The D16950 is a soft core universal asynchronous receiver/transmitter (UART) that is functionally the same as the OX16C950. It supports serial transmission in two modes: UART and FIFO. In FIFO mode, an internal FIFO is activated, storing 128 bytes (up to 512) in both the receive and transmit directions (with 3 bits of error data per byte in the RCVR FIFO). Additionally, it features a programmable 16-bit baud generator that can divide the timing reference clock input by a divisor ranging from 1 to (2^16-1). 【Specifications (partial)】 ■ Software compatible with 16450, 16550, 16650, 16750, and 16950 UARTs ■ Configuration features ■ Isolated configurable BAUD clock line ■ Majority logic ■ Supports RS232 and RS485 *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the SPARKLE multi-GPU server 'W790-52L-8P' that we handle. It boasts excellent cost efficiency, equipped with a large capacity of VRAM and high Tokens/s performance. It features an Intel Xeon W-3400 processor in a full tower workstation. Please feel free to contact us if you have any inquiries. 【Features】 ■ Up to 192GB VRAM, with 4 SPARKLE Intel Arc Pro B60 Duo 48GB cards ■ Full tower workstation equipped with an Intel Xeon W-3400 processor ■ Over 70 models optimized/validated with IPEX-LLM (e.g., Llama, Gemma3, etc.) *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "W790-52L-6P" is a cost-effective multi-GPU server from SPARKLE, equipped with large-capacity VRAM and high Tokens/s performance. It features a full tower workstation with an Intel Xeon W-3400 processor. The company offers not only hardware but also barebone servers and workstation solutions, ranging from GPUs to full systems. 【Features】 ■ Up to 144GB VRAM, with three SPARKLE Intel Arc Pro B60 Duo 48GB ■ Full tower workstation equipped with an Intel Xeon W-3400 processor ■ Over 70 models optimized/validated with IPEX-LLM (e.g., Llama, Gemma3, etc.) *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the SPARKLE multi-GPU server 'W790-4U-10P' that we handle. Equipped with an Intel Xeon W-3400 processor in a 4U rack-type workstation. Over 70 models have been optimized/validated with IPEX-LLM. The company provides not only hardware from GPUs to full systems but also barebone servers and workstation solutions. 【Features】 ■ Up to 240GB VRAM, 10 SPARKLE Intel Arc Pro B60 24GB cards ■ Equipped with an Intel Xeon W-3400 processor in a 4U rack-type workstation ■ Over 70 models optimized/validated with IPEX-LLM (e.g., Llama, Gemma3, etc.) *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "C741-6U-16P" is a multi-GPU server that can accommodate up to 16 SPARKLE Intel Arc Pro B60 24GB graphics cards. It features dual Intel Xeon Scalable processors in a 6U rack-mounted multi-GPU server. It offers excellent cost efficiency, large capacity VRAM, and high Tokens/s performance. 【Features】 ■ Up to 384GB VRAM, 16 SPARKLE Intel Arc Pro B60 24GB ■ Dual Intel Xeon Scalable processors in a 6U rack-mounted multi-GPU server ■ Over 70 models optimized/validated with IPEX-LLM (e.g., Llama, Gemma3, etc.) *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "C741-6U-Dual 16P" is a cost-effective multi-GPU server equipped with large-capacity VRAM and high Tokens/s performance. It can accommodate up to 16 SPARKLE Intel Arc Pro B60 Duo 48GB graphics cards. Achieve the maximum VRAM capacity with a single server. 【Features】 ■ Up to 768GB VRAM with 16 SPARKLE Intel Arc Pro B60 Duo 48GB ■ 6U rack-mounted multi-GPU server with dual Intel Xeon scalable processors ■ Expandable with SPARKLE PCIe 5.0 expansion boards ■ Over 70 models optimized/validated with IPEX-LLM (e.g., Llama, Gemma3, etc.) *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "Intel Arc Pro B60 24GB GDDR6-Blower" is a PCIe GPU card suitable for demanding professionals. The blower model features a radial fan design that efficiently expels heat from the card/enclosure, making it ideal for professional workstations and multi-GPU configurations with limited internal airflow. It supports Linux multi-GPU LLM, enhancing AI performance and delivering faster, higher-quality results. 【Specifications (Partial)】 ■SPECIFICATIONS ・Boost Clock: 2400MHz ・Xe Cores: 20 ・Ray Tracing Units: 20 ・Intel XMX Engines: 160 *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "Intel Arc Pro B60 24GB GDDR6-Passive" is a PCIe GPU card that supports Linux multi-GPU LLM, enhancing AI performance to achieve faster and higher-quality results. Equipped with 24GB of GDDR6 memory, a bandwidth of up to 456GB/s, and 160 XMX AI engines, it is well-suited for demanding professionals. The efficient passive cooling system optimizes thermal performance while maintaining quiet operation. 【Specifications (Partial)】 ■SPECIFICATIONS ・Boost Clock: 2400MHz ・Xe Core: 20 ・Ray Tracing Units: 20 ・Intel XMX Engines: 160 *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "Intel Arc Pro B60 48GB GDDR6-Passive" is a PCIe GPU card suitable for demanding professionals, featuring 48GB of GDDR6 memory, a maximum bandwidth of 456GB/s, and 320 XMX AI engines. It supports Linux multi-GPU LLM, enhancing AI performance to achieve faster and higher-quality results. The passive model is equipped with a fanless, high-capacity memory GPU specifically designed for AI workloads and multi-GPU server environments. 【Specifications (partial)】 ■SPECIFICATIONS ・Boost Clock: 2400MHz ・Xe Core: 20+20 ・Ray Tracing Units: 20 ・Intel XMX Engines: 160+160 *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "WaveBox Gamma" is a standard 1U server capable of accommodating up to three FPGA cards. By inserting BittWare's RFSoC and FPGA cards, it realizes an appliance that converts analog signals into network packets. In particular, when combined with the RFX family cards RFX880 and RFX770 designed for WaveBox, it becomes a suitable product for customers who require the full potential of the RFSoC chip and for users who do not need to connect a host CPU to the RFSoC module. 【Features】 ■ Supports up to 3 RFX 880 cards ■ Up to 6 QSFP-DD (supports 3x400G) ■ Up to 12 5GSPS 14-bit ADCs ■ Up to 12 9.7GSPS 14-bit DACs *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "RFX 770" is a PCIe card equipped with a third-generation RFSoC ZU43DR featuring 4-channel ADC and 4-channel DAC, supporting PCIe Gen4 x8x8. This product provides a bandwidth of PCIe Gen3 x16, achieving a physical transfer speed of 16GB/second. When sending packets to the host DRAM via the host CPU, a transfer speed of approximately 10GB/second can be achieved. 【Features】 ■ Analog: 5GSPS 14-bit ADC x4 + 9.7GSPS 14-bit DAC x4 ■ Digital: PCIe Gen4 x8x8 (RFX 770) *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "RFX 880" is a PCIe card equipped with a 3rd generation RFSoC ZU43DR featuring 4-channel ADC and 4-channel DAC, supporting up to 400GbE. This product, which offers 400GbE digital I/O, supports four times the bandwidth compared to PCIe used during data transfer through two QSFP-DD ports. It is well-received by customers building satellite base stations. 【Features】 ■ Analog: 5GSPS 14-bit ADC x 4 + 9.7GSPS 14-bit DAC x 4 ■ Digital: Up to 400Gb/s I/O (RFX 880) *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In medical information systems, patient information is highly confidential data, and its leakage can not only violate patient privacy but also significantly undermine the trust in medical institutions. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of patient information leakage and misuse. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure patient information protection. 【Use Cases】 * Electronic medical record systems * Online consultation systems * Patient portal websites 【Benefits of Implementation】 * Ensures the safety of patient information * Enhances the reliability of medical institutions * Reduces the risk of information leakage due to unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the supply chain industry, robust security is required to prevent data tampering and leakage in product tracking assurance. In particular, highly confidential data such as product movement history and quality information are exposed to risks of unauthorized access and decryption by quantum computers. By implementing quantum-resistant cryptography, the safety of data across the entire supply chain can be ensured, achieving reliable tracking assurance. 【Use Cases】 * Product tracking systems * Supply chain management systems * Quality management systems 【Benefits of Implementation】 * Prevention of data tampering * Improved traceability * Increased reliability from customers
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In a points system, highly confidential data such as customers' personal information and points history is handled. With the advent of quantum computers, the risk of traditional encryption methods being broken is increasing, raising the danger of data leaks and unauthorized use. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure data protection. 【Usage Scenarios】 * Online points systems * POS systems * Mobile points apps 【Benefits of Implementation】 * Ensures data security * Increases customer trust * Reduces the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the ticket sales industry, fraudulent use of counterfeit tickets has become a significant issue. With the advent of quantum computers, the risk of traditional encryption technologies being compromised has increased, threatening the security of tickets. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure ticket issuance and management. 【Use Cases】 * Electronic ticket systems * Entrance gate systems * Ticket sales platforms 【Benefits of Implementation】 * Prevention of ticket counterfeiting * Increased trust from customers * Reduction of loss risk due to fraudulent use
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the vending machine industry, ensuring the security of payment data in remote management systems is crucial. In particular, it is necessary to prevent information leaks due to unauthorized access from remote locations and the tampering of payment data. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, making the adoption of quantum-resistant cryptographic technology essential for achieving secure payment processing. 【Usage Scenarios】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensures the safety of payment data * Increases customer trust * Reduces the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the mobile payment industry, it is essential to securely protect highly confidential data such as customers' credit card information and transaction history. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of payment data leaks and fraudulent use. To achieve secure mobile payments, the implementation of quantum-resistant cryptographic technology is crucial. 【Usage Scenarios】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensuring the safety of payment data * Increasing customer trust * Reducing the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the electronic money industry, the most important challenge is to securely protect customers' payment information. With the advancement of quantum computers, the risk of traditional encryption methods being compromised has increased, leading to potential damages from fraudulent use and a loss of trust from customers. To achieve secure payment processing, the introduction of quantum-resistant cryptography technology is essential. 【Usage Scenarios】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensuring the security of payment data * Enhancing reliability from customers * Reducing the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In cryptocurrency exchanges, the most important challenge is to manage customer assets securely. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of unauthorized asset outflows. To achieve secure asset management, the introduction of quantum-resistant cryptographic technology is essential. 【Usage Scenarios】 * Cryptocurrency wallets * Trading platforms * Cold wallets 【Effects of Implementation】 * Ensuring the safety of customer assets * Enhancing the reliability of the exchange * Reducing the risk of asset loss due to unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the banking industry, ensuring the security of remittance data is the most important issue. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, heightening the danger of remittance data leakage and misuse. Tampering with remittance data can lead to a loss of trust from customers and potentially cause significant damage. Our quantum-resistant cryptographic IP core enables secure remittance processing, protecting your assets and trust from these risks. 【Use Cases】 * Online remittance systems * ATM networks * Mobile banking apps 【Benefits of Implementation】 * Ensures the security of remittance data * Enhances customer trust * Reduces the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the credit card industry, highly confidential data such as customer credit card information and transaction history is handled. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of payment data leaks and fraudulent use. Therefore, the introduction of quantum-resistant cryptographic technology is essential to ensure secure payment processing. 【Use Cases】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensuring the safety of payment data * Enhancing customer trust * Reducing the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In POS systems, highly confidential data such as customers' credit card information and transaction histories are handled. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of authentication information leakage and misuse. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure authentication processing. 【Usage Scenarios】 * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensures the safety of payment data * Enhances customer trust * Reduces the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In e-commerce sites, highly confidential information such as customers' credit card information and transaction data is handled. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of information leaks and unauthorized use. To achieve secure transactions, the introduction of quantum-resistant cryptography is essential. 【Usage Scenarios】 * Online payment systems * Mobile payment apps 【Benefits of Implementation】 * Ensuring the safety of payment data * Increasing customer trust * Reducing the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the retail industry's payment systems, highly confidential data such as customers' credit card information and transaction histories are handled. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of payment data leaks and fraudulent use. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure payment processing. 【Use Cases】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensures the safety of payment data * Increases customer trust * Reduces the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration