1~45 item / All 255 items
Displayed results
Filter by category
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Contact this company
Contact Us Online1~45 item / All 255 items
Filter by category

In the retail industry's payment systems, highly confidential data such as customers' credit card information and transaction histories are handled. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of payment data leaks and fraudulent use. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure payment processing. 【Use Cases】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensures the safety of payment data * Increases customer trust * Reduces the risk of damage from unauthorized access
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In online examinations at educational institutions, the confidentiality of exam data and the protection of candidates' privacy are essential. With the advancement of quantum computers, the risk of traditional encryption methods being compromised is increasing, making it urgent to implement measures to prevent unauthorized access to and tampering with exam results. Our quantum-resistant cryptographic IP core adopts algorithms selected by NIST and CNSA, protecting exam data and hardware from attacks by quantum computers. 【Use Cases】 - Online exam platforms - Encryption and decryption of exam data - Measures against unauthorized access 【Benefits of Implementation】 - Secure protection of exam data - Deterrence of cheating - Establishment of a reliable exam environment
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the field of IoT device authentication, secure identification of devices and protection of data are essential. With the advancement of quantum computers, traditional encryption methods are under threat, increasing the security risks for IoT devices. This product uses algorithms selected by NIST and CNSA to protect devices and data from quantum computer attacks. 【Use Cases】 - Authentication of IoT devices - Secure data communication - Protection of firmware 【Benefits of Implementation】 - Prevention of device impersonation - Maintenance of data confidentiality - Assurance of long-term security
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the military field, the protection of confidential information and secure communication are essential. The advancement of quantum computers poses a threat to traditional encryption technologies, making the introduction of quantum-resistant cryptographic techniques an urgent necessity to prevent data leaks and unauthorized access. This product provides a hardware-level security solution that uses algorithms selected by NIST and CNSA to protect data and hardware from attacks by quantum computers. 【Use Cases】 - Encryption of highly confidential communications - Protection of important data - Strengthening the security of military systems 【Benefits of Implementation】 - Reduction of risks associated with decryption by quantum computers - Maintenance of data confidentiality - Improvement of system security levels
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the satellite communication industry, the confidentiality of data and the security of communications are the top priorities. The advancement of quantum computers threatens current encryption technologies and increases the risk of data interception and tampering in satellite communications. This product provides a hardware-level security solution that uses algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks. 【Use Cases】 * Satellite data communication * Communication with space stations * Military satellite communication 【Benefits of Implementation】 * Protection from attacks by quantum computers * Secure transmission and reception of confidential data * Assurance of long-term security
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the manufacturing supply chain, highly confidential information such as product design data, manufacturing process data, and customer information is handled. Since this data is shared throughout the supply chain, measures against the risk of decryption by quantum computers are essential. In the event of a data breach, it could lead to a decline in the company's competitiveness or issues related to damages. Our "Quantum-Resistant Cryptography IP Core" uses algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks. 【Use Cases】 - Strengthening the security of data transmission and reception in the supply chain - Security measures in manufacturing equipment control systems - Information protection throughout the entire product lifecycle 【Benefits of Implementation】 - Improved security levels across the entire supply chain - Reduced risk of data breaches - Enhanced reliability of the company
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the smart grid industry, ensuring the stability and security of power supply is essential. Particularly, with the advancement of quantum computers, the risk of traditional encryption methods being compromised is increasing. This raises the possibility of unauthorized access to control data of power systems and customer information, which could have serious implications for the entire social infrastructure. Our "Post-Quantum Cryptography IP Core" utilizes algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks, thereby supporting the secure operation of smart grids. 【Use Cases】 * Smart meters * Power control systems * Data communication in transmission networks 【Benefits of Implementation】 * Protection from attacks by quantum computers * Improved reliability of power systems * Maintenance of confidentiality for critical data
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the healthcare industry, protecting patients' confidential information and medical data is the top priority. The advancement of quantum computers threatens traditional encryption technologies, increasing the risk of unauthorized access and data breaches for these critical data. To protect patient privacy and maintain the reliability of healthcare institutions, the implementation of quantum-resistant encryption technology is essential. 【Use Cases】 * Electronic medical record systems * Telemedicine platforms * Data management in research institutions * Communication of medical devices 【Benefits of Implementation】 * Protection of data from attacks by quantum computers * Maintenance of patient data confidentiality * Strengthening the security of medical information systems * Compliance with regulations
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In government agencies, advanced security measures are essential to protect national secrets and important information assets of the citizens. The development of quantum computers poses a threat to traditional encryption technologies, increasing the risk of information leakage. Therefore, solutions that can protect data from attacks by quantum computers and ensure security are in demand. 【Use Cases】 * Protection of confidential data in government agencies * Strengthening the security of critical infrastructure * Ensuring the confidentiality of communications 【Benefits of Implementation】 * Reduction of risks associated with decryption by quantum computers * Prevention of national losses due to information leakage * Establishment of a secure information communication environment
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the telecommunications industry, the risk of decryption by quantum computers threatens the security of highly confidential data communications. Particularly in areas that require advanced security, such as financial transactions, sharing of confidential information, and communications within government agencies, it is essential to protect communication data from attacks by quantum computers. Quantum-resistant cryptographic IP cores provide a hardware-level security solution that uses algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks. 【Use Cases】 - Highly confidential data communications - Communications in financial transactions - Communications within government agencies 【Benefits of Implementation】 - Protection from the risk of decryption by quantum computers - Achievement of advanced security - Maintenance of data confidentiality
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the financial industry, advanced security measures are essential to protect customers' assets and confidential information. Particularly with the advent of quantum computers, the risk of traditional encryption technologies being compromised has increased. To safeguard transactions from this threat, the implementation of post-quantum cryptography is urgent. Our "Post-Quantum Cryptography IP Core" provides a hardware-level security solution that uses algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks. 【Use Cases】 * Online banking * Credit card payments * Securities trading * Data communication between financial institutions 【Benefits of Implementation】 * Enhanced safety of customer data * Increased reliability of financial transactions * Compliance with regulations * Assurance of business continuity
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the energy industry, the stable operation of systems is the most critical issue, and system downtime can have severe consequences, such as power supply interruptions or plant operational halts. Cyberattacks exploiting vulnerabilities in open-source software (OSS) increase the risk of system outages, making proper management and vulnerability countermeasures for OSS essential. Black Duck SCA supports stable system operation by visualizing OSS usage and managing risks related to vulnerabilities and license violations. As part of the preparations for compliance with the European Cyber Resilience Act (CRA) starting December 11, 2027, OSS/SBOM management is also important. Fujisoft supports the implementation and operation of Black Duck SCA, contributing to the improvement of system stability for our customers. 【Effects of Implementation】 - Visualizes OSS vulnerability risks and reduces the risk of system outages due to cyberattacks. - Avoids license violation risks and strengthens compliance. - Manages supply chain risks through SBOM creation. - Enhances system stability and business continuity.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the gaming industry, managing the vulnerabilities of open source software (OSS) is crucial to ensure the quality and safety of games. Particularly in online games and large-scale games, vulnerabilities pose risks of unauthorized access and information leaks. Black Duck SCA efficiently supports vulnerability management for OSS, checks for license violations, and addresses encryption risks, thereby aiding in safe game development. 【Use Cases】 - Vulnerability management of OSS in game development projects - Strengthening game security - Compliance with license requirements 【Benefits of Implementation】 - Reduction of vulnerability risks - Prevention of security incidents - Streamlining of the development process
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the entertainment industry, the use of software and libraries is active, and the risk of copyright infringement is always present. Particularly in diverse content production such as video production, game development, and music distribution, the use of OSS (Open Source Software) is essential. However, issues related to OSS license violations and vulnerabilities can lead to copyright infringement and security risks, potentially damaging a company's reputation. Black Duck SCA visualizes the usage of OSS and reduces copyright risks by early detection of license violations and vulnerabilities. 【Use Cases】 - Management of OSS usage for editing software and plugins in video production - License verification of libraries and middleware in game development - OSS management of music production tools on music distribution platforms 【Benefits of Implementation】 - Reduces the risk of copyright infringement and avoids legal troubles - Lowers the risk of information leaks and service interruptions due to security vulnerabilities - Improves development efficiency and quality through proper management of OSS
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In educational institutions, it is essential to manage the personal information of students and staff securely. With the increasing use of OSS (open source software), the risks of vulnerabilities and license violations are also rising. These risks can lead to the leakage or misuse of personal information. Black Duck SCA contributes to strengthening personal information protection systems by visualizing OSS usage and supporting vulnerability management and license compliance checks. 【Use Cases】 - Student Information Systems - Staff Information Systems - Research Data Management 【Benefits of Implementation】 - Reduction of personal information leakage risks - Compliance with regulations - Strengthening of information security systems
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the retail industry, protecting customer data is one of the top priorities. In addition to complying with personal information protection laws, the loss of customer trust due to information leaks can jeopardize a company's survival. Cyberattacks exploiting vulnerabilities in open-source software (OSS) can lead to customer data breaches and system outages. Black Duck SCA helps protect customer data from these risks and supports business continuity through OSS vulnerability management and SBOM creation. 【Use Cases】 - Systems handling customer data - POS systems - E-commerce sites 【Benefits of Implementation】 - Reduces the risk of customer data leaks - Prevents opportunity losses due to system outages - Strengthens compliance with regulations Fujisoft has a 40-year history in embedded development and a technical team of over 2,000 people, supporting customers in solving their challenges.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In financial institutions, compliance adherence is one of the most important issues. With the increase in the use of open source software (OSS), addressing license violations and vulnerability risks has become essential. Particularly, as regulations regarding information security become stricter, proper management of OSS is crucial for business continuity and securing customer trust. Black Duck SCA supports the strengthening of compliance systems in financial institutions by visualizing the use of OSS and efficiently managing risks. 【Usage Scenarios】 - Development of financial-related systems - Compliance with laws such as the Personal Information Protection Act and the Financial Instruments and Exchange Act - Cybersecurity risk measures 【Benefits of Implementation】 - Reduces the risk of OSS license violations - Mitigates the risk of information leaks due to vulnerabilities - Improves transparency through SBOM creation
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the telecommunications infrastructure industry, ensuring the stable operation of systems and security is the most critical issue. Particularly with the increasing use of OSS (open-source software), the risks of vulnerabilities and license violations are rising. These risks can lead to infrastructure downtime and information leaks, potentially causing social impacts. Black Duck SCA enhances the safety of telecommunications infrastructure by visualizing the use of OSS and supporting vulnerability management, license compliance checks, and responses to encryption risks. It is also effective in preparing for compliance with the European Cyber Resilience Act (CRA) starting December 11, 2027. 【Use Cases】 - Management of OSS for network equipment and software in telecommunications operators - Visualization of OSS usage in data centers - Vulnerability management for OSS in IoT devices 【Benefits of Implementation】 - Early detection of OSS vulnerability risks and the ability to take countermeasures - Reduction of risks associated with license compliance violations - Management of supply chain risks through the creation of SBOM (Software Bill of Materials)
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
For government agencies, the increasing risk of cyber attacks and the complexity of supply chains have made the security management of OSS (Open Source Software) an urgent issue. In particular, to ensure the reliability and safety of information systems, it is essential to address OSS vulnerabilities, ensure license compliance, and accurately manage SBOM (Software Bill of Materials). Black Duck SCA provides a comprehensive solution to these challenges. 【Use Cases】 - Vulnerability management of OSS in information systems - Compliance with software license requirements - Automated generation and management of SBOM - Compliance with the Cyber Resilience Act 【Benefits of Implementation】 - Visualizes security risks of OSS, enabling rapid response. - Reduces the risk of license violations and strengthens compliance. - Reduces supply chain risks through accurate management of SBOM. - Supports compliance with the European Cyber Resilience Act (CRA).
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the automotive supply chain, the safety of software components is crucial. Vulnerabilities in open source software (OSS) and license violations can impact product quality and compliance. Black Duck SCA enhances the security of the entire supply chain by visualizing OSS usage and managing risks. 【Use Cases】 - Understanding the OSS usage of software components provided by suppliers - Creation and management of Software Bill of Materials (SBOM) - Vulnerability assessment and countermeasures for OSS 【Benefits of Implementation】 - Reduction of security risks across the supply chain - Strengthening of compliance adherence - Improvement in product quality
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In the healthcare industry, protecting patient information is the top priority. While the use of OSS (open source software) is common in the development and operation of medical information systems, there are also risks of vulnerabilities and license violations. These risks can lead to the leakage of patient information or system outages, potentially causing serious issues. Black Duck SCA visualizes the utilization of OSS and manages risks to ensure the safety of patient information and support compliance. 【Use Cases】 - Electronic medical record systems - Medical information collaboration platforms - Software utilization in research and development 【Benefits of Implementation】 - Protection of patient information - Compliance adherence - Improved system stability - Early detection and response to risks Fujisoft leverages 40 years of experience in embedded development to provide optimal solutions tailored to customer needs. Through partnerships with Black Duck and Macnica, we offer comprehensive support from implementation to operation.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
In quality management for the manufacturing industry, software quality is a crucial factor that influences product reliability. As the use of open source software (OSS) increases, addressing license violations and vulnerability risks becomes essential. Black Duck SCA supports the management of OSS and the creation of Software Bill of Materials (SBOM), contributing to the maintenance of product quality. 【Use Cases】 - Vulnerability management of OSS in embedded software products - License compliance checks for OSS in the supply chain - Visualization of software configuration information through SBOM 【Benefits of Implementation】 - Reduction of security risks for products - Avoidance of legal risks due to license violations - Improvement of software quality
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "D16550" is a soft core universal asynchronous receiver/transmitter (UART) that is functionally the same as the TL16C550A. It supports serial transmission in two modes: UART and FIFO. In FIFO mode, an internal FIFO is activated, storing 16 bytes (with 3 bits of error data per byte in the RCVR FIFO) in both the receive and transmit directions. Additionally, it features a programmable 16-bit baud rate generator that can divide the timing reference clock input by a divisor ranging from 1 to (2^16-1). 【Specifications (partial)】 ■ Software compatible with 16450 and 16550 UART ■ Configuration features ■ Isolated configurable BAUD clock line ■ Majority logic ■ Supports RS232 and RS485 *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "DSPI" is a fully configurable SPI master/slave device. Users can set the polarity and phase of the serial clock signal SCK. This not only enables the microcontroller to communicate with serial peripheral devices but also allows communication with inter-processors in a multi-master system. 【Features】 <SPI Master> ■ Master and multi-master operation ■ 8 SPI slave select lines ■ System error detection ■ Mode fault error ■ Write collision error *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"DQSPI" is an innovative Quad SPI designed to provide very fast operation for SPI memory. It offers the flexibility to connect with standard peripheral products from various manufacturers. Additionally, the IP core supports common 8, 16, and 32-bit processors. Please feel free to contact us if you have any inquiries. 【Specifications (partial)】 ■ Operates with 8, 16, and 32-bit CPUs ■ Full-duplex synchronous serial data transfer ■ DMA support ■ Supports 32, 16, and 8-bit systems ■ Support for various system bus standard specifications *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"DOSPI" is an innovative octal SPI designed to provide very fast operation for SPI memory. It has sufficient flexibility to connect directly to many standard products from multiple manufacturers. Furthermore, the IP core supports common 8, 16, and 32-bit processors. Please feel free to contact us when you need assistance. 【Specifications (Partial)】 ■ Operates with 8, 16, and 32-bit CPUs ■ Full-duplex synchronous serial data transfer ■ DMA support ■ Support for 32, 16, and 8-bit systems ■ Support for various system bus standards *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "TeraBox 1402B" is an FPGA server equipped with an Intel 3rd generation Xeon CPU. It provides double the density of a typical 4U server and the power equivalent to four Achronix Speedster 7t, Intel Stratix 10, and Xilinx UltraScale+ FPGAs. It can accommodate up to four FPGAs in a standard depth 1U server. Please feel free to contact us if you have any inquiries. 【Features】 ■ 32×100G or 128×10/25G with 16 QSFP-DD ports ■ Can accommodate up to four FPGAs in a standard depth 1U server ■ Support for all BittWare PCIe FPGA cards *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "TeraBox 1401B" is an FPGA server equipped with the AMD EPYC7002 series. It maximizes the density of FPGA servers to provide the highest level of computing and networking capabilities in a 1U chassis. Additionally, it offers double the density of a typical 4U server and the power equivalent to four Achronix Speedster7t, Intel Stratix 10, and Xilinx UltraScale+ FPGAs. 【Features】 ■ 32×100G or 128×10/25G with 16 QSFP-DD ports ■ Capable of housing up to four FPGAs in a standard depth 1U server ■ Support for all BittWare PCIe FPGA cards *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "TeraBox 210DE" is a 2U edge server from Dell that is compact, robust, and highly expandable, integrated with a full lineup of FPGA cards featuring Achronix, Altera, and AMD FPGAs. It combines a high-power 3rd generation Intel Xeon Scalable host with high-density FPGA resources. With a depth of less than 19 inches (approximately 477mm), it delivers accelerator-based performance outside of data centers. 【Features】 - The configuration includes two large double-wide cards from BittWare using Achronix Speedster 7t, Altera Agilex, or AMD Virtex UltraScale+ FPGAs. - The system can also be configured with four low-profile cards or full-height cards. - In addition to BittWare's installation and support, options for Dell server support are provided. *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "TeraBox 1502B" is an ultra-high-density FPGA server that maximizes the density of FPGA servers to the limit. It offers approximately twice the density of a typical 4U server and provides the power equivalent to four of BittWare's largest Achronix Speedster 7t, Altera Agilex, or AMD UltraScale+ FPGAs. These innovative products support PCIe Gen5 and are equipped with AMD EPYC or Intel Xeon processors in a standard rack-depth chassis. 【Features】 ■ Equipped with top-level compute and network capabilities in a 1U chassis ■ Provides approximately twice the density of a typical 4U server and the power equivalent to four of BittWare's largest Achronix Speedster 7t, Altera Agilex, or AMD UltraScale+ FPGAs ■ Supports PCIe Gen5 and is equipped with AMD EPYC or Intel Xeon processors in a standard rack-depth chassis *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "TeraBox 5202S" is a 5U, 10 dual-slot chassis that supports Intel's 4th generation Xeon Scalable processors and PCIe Gen5. You can choose the VectorPath equipped with Achronix Speedster7t FPGA and high-bandwidth GDDR6 memory, or the IA-860m equipped with Altera Agilex FPGA and QSFP-DD, achieving an astonishing performance of up to 30x 400G. Regardless of the configuration you choose, you will receive installation, support, and comprehensive warranty from BittWare. 【Features】 - The configuration includes up to 10 BittWare double-wide cards using Achronix, Altera, or AMD FPGAs. - You can select the IA-860m, which achieves an astonishing performance of up to 30x 400G. - You can receive installation, support, and comprehensive warranty from BittWare. *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "TeraBox 2202D" is a 2U server that integrates a full lineup of Achronix, Altera, and AMD FPGA-based cards and is one of Dell EMC's highly popular 2U data center servers. The configuration includes two large double-wide cards from BittWare using Achronix Speedster 7t, Altera Agilex, or AMD UltraScale+ FPGAs. Additionally, the system can be configured to support up to 16 BittWare U.2 accelerators. 【Features】 ■ Combines high-performance dual CPUs (4th generation Intel Xeon Scalable) with high-density FPGA resources. ■ Regardless of the configuration chosen, BittWare installation and support, as well as Dell server support options, are provided. *For more details, please download the PDF (English version) or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the 'GTX1650 4GB MXM Module' that we handle. This is a high-performance MXM3.1 module graphics card equipped with the NVIDIA GeForce GTX1650, using the standard MXM Type A form factor. Following the GTX1660 Ti and GTX1660, it is an entry-level product of the Turing generation. 【Features】 ■ NVIDIA GeForce GTX1650 ■ Support for DirectX 12, OpenGL 4.6, Vulkan API ■ MXM 3.1 Type A ■ Support for 4 outputs ■ 128-bit width, 4GB, GDDR5 Memory ■ NVIDIA CUDA technology *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the 'GTX1050 Ti 4GB MXM Module' that we handle. This is a high-performance MXM 3.1 module graphics card equipped with the NVIDIA GeForce GTX 1050 Ti, using the standard MXM Type A form factor. It is an entry-level graphics card from the Pascal generation and is the successor to the GTX 950 from the Maxwell generation. 【Features】 ■ NVIDIA GeForce GTX 1050 Ti ■ Supports DirectX 12, OpenGL 4.5, Vulkan API ■ MXM 3.1 Type A ■ Supports 4 outputs ■ 128-bit width, 4GB, GDDR5 Memory ■ NVIDIA CUDA technology *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the 'RX6600 Low profile (single slot)' that we handle. This is a PCIe 4.0 x8 low-profile graphics card equipped with AMD Radeon RX 6600 and four Mini DisplayPorts, allowing for multi-display output without the need for additional video converters or splitters. Please feel free to contact us if you have any inquiries. 【Features】 ■ AMD Radeon RX 6600 ■ Supports DirectX 12, Vulkan, OpenGL 4.6, Open CL 2.2 ■ 4 x Mini DisplayPort display outputs ■ 128-bit width, 8GB, GDDR6 * For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the 'RX6600 MXM module' that we handle. This is a high-performance MXM3.1 module graphics card equipped with the AMD Radeon RX 6600, using the standard MXM Type B form factor. You can consult our concierge for product details and pricing. Please feel free to contact us. 【Features】 ■ AMD Radeon RX 6600 ■ Supports DirectX 12, Vulkan, OpenGL 4.6, Open CL 2.2 ■ MXM 3.1 Type B ■ Support for 4 outputs ■ 128-bit width, 8GB, GDDR6 Memory *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the 'RX6400 PCI-E Graphic card (4HDMI)' that we handle. This is a PCIe 4.0 x4 graphics card equipped with AMD Radeon RX 6400 and four HDMI ports, allowing for multi-display output without the need for additional video converters or splitters. Please feel free to contact us if you have any inquiries. 【Features】 ■ AMD Radeon RX 6400 ■ Supports DirectX 12, Vulkan, OpenGL 4.6, Open CL 2.2 ■ 4 x HDMI display outputs ■ 64-bit width, 4GB, GDDR6 *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the "RX 6400 PCI-E Graphic Card" that we handle. It is a PCIe 4.0 x4 graphics card equipped with the AMD Radeon RX 6400. Additionally, thanks to Fuji Soft's extensive experience in embedded development, we have a support system in place that ensures you can feel secure both before and after your purchase. 【Features】 ■ AMD Radeon RX 6400 ■ Supports DirectX 12, Vulkan, OpenGL 4.6, Open CL 2.2 ■ DisplayPort + HDMI display outputs ■ 64-bit width, 4GB, GDDR6 *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the 'RX6400 MXM module' that we handle. It is a high-performance MxM 3.1 module graphics card equipped with the AMD Radeon RX 6400, using the standard MXM Type B form factor. You can consult our concierge for product details and pricing. Please feel free to contact us. 【Features】 ■ AMD Radeon RX 6400 ■ Supports DirectX 12, Vulkan, OpenGL 4.6, Open CL 2.2 ■ MXM 3.1 Type B ■ Support for 2 outputs ■ 64-bit width, 4GB, GDDR6 Memory * For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the GPU-equipped graphics card 'SPARKLE Intel Arc A380 ELF' that we handle. With AV1 hardware encoding and AI-enhanced XeSS upscaling, it enhances production and gaming. Featuring a single fan and dual-slot design, it brings a new balance of performance level and price. 【Features】 ■6GB GDDR6 ■Single Fan ■SA380E 6G *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "SPARKLE Intel Arc A310 ELF" is a graphics card equipped with a GPU suitable for entry-level use, featuring a compact design that does not require an external power input. With a single fan and dual-slot design, it strikes a balance between performance level and price. Please feel free to contact us if you have any inquiries. 【Features】 ■4 GB GDDR6 ■Single Fan ■SA310E4G *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
We would like to introduce the GPU-equipped graphics card 'SPARKLE Intel Arc A580 ORC OC Edition' that we handle. It features TORN Cooling with customized double AXL fans, a 2.2-slot design, and a full metal backplate compatible with various types. The 8GB DDR6 with a 175W TBP offers budget-friendly options under the Intel Arc A750. 【Features】 ■ 8GB GDDR6 ■ ThermalSync ■ TORN Cooling ■ Axial Fan ■ Metal Backplate ■ SA580C-8GOC *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The "TeraBox 140EB" is a 1U enclosure designed for FPGA cards that provides top-level computing and networking capabilities in a 1U chassis. This enclosure offers twice the density of a typical 4U server and delivers the power equivalent to four of our largest Achronix, Altera, or AMD FPGA-based cards. Please feel free to contact us if you have any inquiries. 【Features】 ■ Top-level computing power and networking capabilities in a 1U chassis ■ Twice the density of a typical 4U server ■ Provides the power equivalent to four of our largest Achronix, Altera, or AMD FPGA-based cards *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The BittWare "TeraBox 1102S" is compatible with all PCIe cards equipped with Achronix, Altera, and AMD FPGAs. With PCIe access from the front panel, you can access up to 8x 100G or 32x 10/25G I/O in a single rack space. Please feel free to contact us if you have any inquiries. 【Features】 ■ Cost-effective 1U server ■ Excellent solution that does not limit card options ■ Compatible with all PCIe cards equipped with Achronix, Altera, and AMD FPGAs ■ Access to up to 8x 100G or 32x 10/25G I/O in a single rack space *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
The TeraBox 1501B server offers approximately twice the density of a typical 4U server and provides the power of up to four of BittWare's largest Achronix Speedster7t, Altera Agilex, or AMD UltraScale+ FPGAs. These innovative products support PCIe Gen5 and are equipped with AMD EPYC or Intel Xeon processors in a standard rack-depth chassis. Please feel free to contact us when you need assistance. 【Features】 ■ Maximized density of FPGA servers ■ Equipped with top-level compute and network capabilities in a 1U chassis ■ Approximately twice the density of a typical 4U server ■ Supports PCIe Gen5 *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration