iPROS Manufacturing
  • Search for products by classification category

    • Electronic Components and Modules
      Electronic Components and Modules
      59262items
    • Machinery Parts
      Machinery Parts
      74880items
    • Manufacturing and processing machinery
      Manufacturing and processing machinery
      99742items
    • Scientific and Physics Equipment
      Scientific and Physics Equipment
      34847items
    • Materials
      Materials
      37108items
    • Measurement and Analysis
      Measurement and Analysis
      54932items
    • Image Processing
      Image Processing
      15057items
    • Control and Electrical Equipment
      Control and Electrical Equipment
      53219items
    • Tools, consumables, and supplies
      Tools, consumables, and supplies
      64416items
    • Design and production support
      Design and production support
      12493items
    • IT/Network
      IT/Network
      43604items
    • Office
      Office
      13751items
    • Business support services
      Business support services
      33264items
    • Seminars and Skill Development
      Seminars and Skill Development
      6315items
    • Pharmaceutical and food related
      Pharmaceutical and food related
      30384items
    • others
      73739items
  • Search for companies by industry

    • Manufacturing and processing contract
      7337
    • others
      4994
    • Industrial Machinery
      4415
    • Machine elements and parts
      3282
    • Other manufacturing
      2890
    • IT/Telecommunications
      2553
    • Trading company/Wholesale
      2470
    • Industrial Electrical Equipment
      2298
    • Building materials, supplies and fixtures
      1810
    • software
      1634
    • Electronic Components and Semiconductors
      1569
    • Resin/Plastic
      1491
    • Service Industry
      1444
    • Testing, Analysis and Measurement
      1129
    • Ferrous/Non-ferrous metals
      983
    • environment
      699
    • Chemical
      629
    • Automobiles and Transportation Equipment
      564
    • Printing Industry
      508
    • Information and Communications
      455
    • Consumer Electronics
      416
    • Energy
      327
    • Rubber products
      313
    • Food Machinery
      307
    • Optical Instruments
      277
    • robot
      271
    • fiber
      250
    • Paper and pulp
      232
    • Electricity, Gas and Water Industry
      169
    • Pharmaceuticals and Biotechnology
      167
    • Warehousing and transport related industries
      145
    • Glass and clay products
      139
    • Food and Beverage
      129
    • CAD/CAM
      125
    • retail
      109
    • Educational and Research Institutions
      105
    • Medical Devices
      103
    • Ceramics
      98
    • wood
      88
    • Transportation
      84
    • Medical and Welfare
      63
    • Petroleum and coal products
      62
    • Shipbuilding and heavy machinery
      51
    • Aviation & Aerospace
      48
    • Fisheries, Agriculture and Forestry
      42
    • Public interest/special/independent administrative agency
      31
    • equipment
      31
    • self-employed
      24
    • Research and development equipment and devices
      24
    • Government
      23
    • Materials
      22
    • Mining
      17
    • Finance, securities and insurance
      13
    • cosmetics
      11
    • Individual
      10
    • Restaurants and accommodations
      9
    • Police, Fire Department, Self-Defense Forces
      7
    • Laboratory Equipment and Consumables
      4
    • Raw materials for reagents and chemicals
      3
    • Contracted research
      3
  • Special Features
  • Ranking

    • Overall Products Ranking
    • Overall Company Ranking
Search for Products
  • Search for products by classification category

  • Electronic Components and Modules
  • Machinery Parts
  • Manufacturing and processing machinery
  • Scientific and Physics Equipment
  • Materials
  • Measurement and Analysis
  • Image Processing
  • Control and Electrical Equipment
  • Tools, consumables, and supplies
  • Design and production support
  • IT/Network
  • Office
  • Business support services
  • Seminars and Skill Development
  • Pharmaceutical and food related
  • others
Search for Companies
  • Search for companies by industry

  • Manufacturing and processing contract
  • others
  • Industrial Machinery
  • Machine elements and parts
  • Other manufacturing
  • IT/Telecommunications
  • Trading company/Wholesale
  • Industrial Electrical Equipment
  • Building materials, supplies and fixtures
  • software
  • Electronic Components and Semiconductors
  • Resin/Plastic
  • Service Industry
  • Testing, Analysis and Measurement
  • Ferrous/Non-ferrous metals
  • environment
  • Chemical
  • Automobiles and Transportation Equipment
  • Printing Industry
  • Information and Communications
  • Consumer Electronics
  • Energy
  • Rubber products
  • Food Machinery
  • Optical Instruments
  • robot
  • fiber
  • Paper and pulp
  • Electricity, Gas and Water Industry
  • Pharmaceuticals and Biotechnology
  • Warehousing and transport related industries
  • Glass and clay products
  • Food and Beverage
  • CAD/CAM
  • retail
  • Educational and Research Institutions
  • Medical Devices
  • Ceramics
  • wood
  • Transportation
  • Medical and Welfare
  • Petroleum and coal products
  • Shipbuilding and heavy machinery
  • Aviation & Aerospace
  • Fisheries, Agriculture and Forestry
  • Public interest/special/independent administrative agency
  • equipment
  • self-employed
  • Research and development equipment and devices
  • Government
  • Materials
  • Mining
  • Finance, securities and insurance
  • cosmetics
  • Individual
  • Restaurants and accommodations
  • Police, Fire Department, Self-Defense Forces
  • Laboratory Equipment and Consumables
  • Raw materials for reagents and chemicals
  • Contracted research
Special Features
Ranking
  • Overall Products Ranking
  • Overall Company Ranking
  • privacy policy
  • terms of service
  • About Us
  • Careers
  • Advertising
  1. Home
  2. software
  3. 富士ソフト インダストリービジネス事業部
  4. Product/Service List
software
  • Added to bookmarks

    Bookmarks list

    Bookmark has been removed

    Bookmarks list

    You can't add any more bookmarks

    By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

    Free membership registration

富士ソフト インダストリービジネス事業部

EstablishmentMay 15, 1970
capital2620028Ten thousand
number of employees6427
addressKanagawa/Naka-ku, Yokohama-shi/1-1 Sakuragicho
phone050-3000-2102
  • Special site
  • Official site
last updated:Aug 19, 2025
富士ソフトlogo
  • Contact this company

    Inquiry Form
  • Company information
  • Products/Services(353)
  • catalog(128)
  • news(0)

富士ソフト Product Lineup

  • category

46~90 item / All 353 items

Displayed results

Filter by category

組み込み・受託開発 組み込み・受託開発
産業用PC特集​ 産業用PC特集​
FPGA評価ボード特集 FPGA評価ボード特集
​SOM特集 ​SOM特集
AMD Alveo AMD Alveo
FPGAボード FPGAボード
GPUボード GPUボード
IP(IPコア/FPGA/ASIC) IP(IPコア/FPGA/ASIC)
PCIeカード PCIeカード
SoM SoM
サーバー サーバー
サービス・ソリューション サービス・ソリューション
その他 その他
ソフトウェア ソフトウェア
産業用PC 産業用PC
class="retina-image"

Intel Arc Pro B60 GPU<Blower>

Equipped with 24GB of GDDR6 memory, a maximum bandwidth of 456GB/s, and 160 XMX AI engines!

The "Intel Arc Pro B60 24GB GDDR6-Blower" is a PCIe GPU card suitable for demanding professionals. The blower model features a radial fan design that efficiently expels heat from the card/enclosure, making it ideal for professional workstations and multi-GPU configurations with limited internal airflow. It supports Linux multi-GPU LLM, enhancing AI performance and delivering faster, higher-quality results. 【Specifications (Partial)】 ■SPECIFICATIONS ・Boost Clock: 2400MHz ・Xe Cores: 20 ・Ray Tracing Units: 20 ・Intel XMX Engines: 160 *For more details, please download the PDF (English version) or feel free to contact us.

  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Intel Arc Pro B60 24GB GDDR6

Equipped with a specially designed fanless high-capacity memory GPU for AI workloads and multi-GPU server environments!

The "Intel Arc Pro B60 24GB GDDR6-Passive" is a PCIe GPU card that supports Linux multi-GPU LLM, enhancing AI performance to achieve faster and higher-quality results. Equipped with 24GB of GDDR6 memory, a bandwidth of up to 456GB/s, and 160 XMX AI engines, it is well-suited for demanding professionals. The efficient passive cooling system optimizes thermal performance while maintaining quiet operation. 【Specifications (Partial)】 ■SPECIFICATIONS ・Boost Clock: 2400MHz ・Xe Core: 20 ・Ray Tracing Units: 20 ・Intel XMX Engines: 160 *For more details, please download the PDF (English version) or feel free to contact us.

  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Intel Arc Pro B60 48GB GDDR6

An efficient passive cooling system optimizes thermal performance while maintaining silent operation!

The "Intel Arc Pro B60 48GB GDDR6-Passive" is a PCIe GPU card suitable for demanding professionals, featuring 48GB of GDDR6 memory, a maximum bandwidth of 456GB/s, and 320 XMX AI engines. It supports Linux multi-GPU LLM, enhancing AI performance to achieve faster and higher-quality results. The passive model is equipped with a fanless, high-capacity memory GPU specifically designed for AI workloads and multi-GPU server environments. 【Specifications (partial)】 ■SPECIFICATIONS ・Boost Clock: 2400MHz ・Xe Core: 20+20 ・Ray Tracing Units: 20 ・Intel XMX Engines: 160+160 *For more details, please download the PDF (English version) or feel free to contact us.

  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Server "WaveBox Gamma"

An appliance that converts analog signals into network packets has been realized!

The "WaveBox Gamma" is a standard 1U server capable of accommodating up to three FPGA cards. By inserting BittWare's RFSoC and FPGA cards, it realizes an appliance that converts analog signals into network packets. In particular, when combined with the RFX family cards RFX880 and RFX770 designed for WaveBox, it becomes a suitable product for customers who require the full potential of the RFSoC chip and for users who do not need to connect a host CPU to the RFSoC module. 【Features】 ■ Supports up to 3 RFX 880 cards ■ Up to 6 QSFP-DD (supports 3x400G) ■ Up to 12 5GSPS 14-bit ADCs ■ Up to 12 9.7GSPS 14-bit DACs *For more details, please download the PDF (English version) or feel free to contact us.

  • server

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PCIe card "RFX 770"

Customers are pleased with the development of devices equipped with analog recording and playback functions!

The "RFX 770" is a PCIe card equipped with a third-generation RFSoC ZU43DR featuring 4-channel ADC and 4-channel DAC, supporting PCIe Gen4 x8x8. This product provides a bandwidth of PCIe Gen3 x16, achieving a physical transfer speed of 16GB/second. When sending packets to the host DRAM via the host CPU, a transfer speed of approximately 10GB/second can be achieved. 【Features】 ■ Analog: 5GSPS 14-bit ADC x4 + 9.7GSPS 14-bit DAC x4 ■ Digital: PCIe Gen4 x8x8 (RFX 770) *For more details, please download the PDF (English version) or feel free to contact us.

  • Embedded Board Computers

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PCIe card "RFX 880"

Supports four times the bandwidth through two QSFP-DD ports!

The "RFX 880" is a PCIe card equipped with a 3rd generation RFSoC ZU43DR featuring 4-channel ADC and 4-channel DAC, supporting up to 400GbE. This product, which offers 400GbE digital I/O, supports four times the bandwidth compared to PCIe used during data transfer through two QSFP-DD ports. It is well-received by customers building satellite base stations. 【Features】 ■ Analog: 5GSPS 14-bit ADC x 4 + 9.7GSPS 14-bit DAC x 4 ■ Digital: Up to 400Gb/s I/O (RFX 880) *For more details, please download the PDF (English version) or feel free to contact us.

  • Embedded Board Computers

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for medical information systems

Protecting patient information from the threats of quantum computers!

In medical information systems, patient information is highly confidential data, and its leakage can not only violate patient privacy but also significantly undermine the trust in medical institutions. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of patient information leakage and misuse. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure patient information protection. 【Use Cases】 * Electronic medical record systems * Online consultation systems * Patient portal websites 【Benefits of Implementation】 * Ensures the safety of patient information * Enhances the reliability of medical institutions * Reduces the risk of information leakage due to unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for supply chains

Protecting supply chain data from the threat of quantum computers!

In the supply chain industry, robust security is required to prevent data tampering and leakage in product tracking assurance. In particular, highly confidential data such as product movement history and quality information are exposed to risks of unauthorized access and decryption by quantum computers. By implementing quantum-resistant cryptography, the safety of data across the entire supply chain can be ensured, achieving reliable tracking assurance. 【Use Cases】 * Product tracking systems * Supply chain management systems * Quality management systems 【Benefits of Implementation】 * Prevention of data tampering * Improved traceability * Increased reliability from customers

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for point systems

Protecting point systems from the threat of quantum computers!

In a points system, highly confidential data such as customers' personal information and points history is handled. With the advent of quantum computers, the risk of traditional encryption methods being broken is increasing, raising the danger of data leaks and unauthorized use. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure data protection. 【Usage Scenarios】 * Online points systems * POS systems * Mobile points apps 【Benefits of Implementation】 * Ensures data security * Increases customer trust * Reduces the risk of damage from unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for ticket sales

Preventing ticket forgery from the threat of quantum computers!

In the ticket sales industry, fraudulent use of counterfeit tickets has become a significant issue. With the advent of quantum computers, the risk of traditional encryption technologies being compromised has increased, threatening the security of tickets. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure ticket issuance and management. 【Use Cases】 * Electronic ticket systems * Entrance gate systems * Ticket sales platforms 【Benefits of Implementation】 * Prevention of ticket counterfeiting * Increased trust from customers * Reduction of loss risk due to fraudulent use

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for vending machines

Protecting payment data from the threat of quantum computers!

In the vending machine industry, ensuring the security of payment data in remote management systems is crucial. In particular, it is necessary to prevent information leaks due to unauthorized access from remote locations and the tampering of payment data. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, making the adoption of quantum-resistant cryptographic technology essential for achieving secure payment processing. 【Usage Scenarios】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensures the safety of payment data * Increases customer trust * Reduces the risk of damage from unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for mobile payments

Protecting payment data from the threat of quantum computers!

In the mobile payment industry, it is essential to securely protect highly confidential data such as customers' credit card information and transaction history. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of payment data leaks and fraudulent use. To achieve secure mobile payments, the implementation of quantum-resistant cryptographic technology is crucial. 【Usage Scenarios】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensuring the safety of payment data * Increasing customer trust * Reducing the risk of damage from unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for electronic money

Protecting payment data from the threat of quantum computers!

In the electronic money industry, the most important challenge is to securely protect customers' payment information. With the advancement of quantum computers, the risk of traditional encryption methods being compromised has increased, leading to potential damages from fraudulent use and a loss of trust from customers. To achieve secure payment processing, the introduction of quantum-resistant cryptography technology is essential. 【Usage Scenarios】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensuring the security of payment data * Enhancing reliability from customers * Reducing the risk of damage from unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for cryptocurrency exchanges

Protecting cryptocurrency assets from the threat of quantum computers!

In cryptocurrency exchanges, the most important challenge is to manage customer assets securely. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of unauthorized asset outflows. To achieve secure asset management, the introduction of quantum-resistant cryptographic technology is essential. 【Usage Scenarios】 * Cryptocurrency wallets * Trading platforms * Cold wallets 【Effects of Implementation】 * Ensuring the safety of customer assets * Enhancing the reliability of the exchange * Reducing the risk of asset loss due to unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for banks

Protecting remittance data from the threat of quantum computers!

In the banking industry, ensuring the security of remittance data is the most important issue. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, heightening the danger of remittance data leakage and misuse. Tampering with remittance data can lead to a loss of trust from customers and potentially cause significant damage. Our quantum-resistant cryptographic IP core enables secure remittance processing, protecting your assets and trust from these risks. 【Use Cases】 * Online remittance systems * ATM networks * Mobile banking apps 【Benefits of Implementation】 * Ensures the security of remittance data * Enhances customer trust * Reduces the risk of damage from unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for credit cards

Protecting credit card information from the threat of quantum computers!

In the credit card industry, highly confidential data such as customer credit card information and transaction history is handled. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of payment data leaks and fraudulent use. Therefore, the introduction of quantum-resistant cryptographic technology is essential to ensure secure payment processing. 【Use Cases】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensuring the safety of payment data * Enhancing customer trust * Reducing the risk of damage from unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for POS systems

Protecting POS system authentication from the threat of quantum computers!

In POS systems, highly confidential data such as customers' credit card information and transaction histories are handled. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of authentication information leakage and misuse. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure authentication processing. 【Usage Scenarios】 * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensures the safety of payment data * Enhances customer trust * Reduces the risk of damage from unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[For EC sites] Quantum-resistant encryption IP core

Protecting e-commerce transactions from the threats of quantum computers!

In e-commerce sites, highly confidential information such as customers' credit card information and transaction data is handled. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of information leaks and unauthorized use. To achieve secure transactions, the introduction of quantum-resistant cryptography is essential. 【Usage Scenarios】 * Online payment systems * Mobile payment apps 【Benefits of Implementation】 * Ensuring the safety of payment data * Increasing customer trust * Reducing the risk of damage from unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for retail payments

Protecting payment data from the threat of quantum computers!

In the retail industry's payment systems, highly confidential data such as customers' credit card information and transaction histories are handled. With the advent of quantum computers, the risk of traditional encryption methods being compromised has increased, raising the danger of payment data leaks and fraudulent use. Therefore, the introduction of quantum-resistant cryptographic technology is essential to achieve secure payment processing. 【Use Cases】 * Online payment systems * POS systems * Mobile payment apps 【Benefits of Implementation】 * Ensures the safety of payment data * Increases customer trust * Reduces the risk of damage from unauthorized access

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[For Educational Institutions] Quantum-Resistant Cryptography IP Core

Hardware-level security solutions to enhance the safety of online exams.

In online examinations at educational institutions, the confidentiality of exam data and the protection of candidates' privacy are essential. With the advancement of quantum computers, the risk of traditional encryption methods being compromised is increasing, making it urgent to implement measures to prevent unauthorized access to and tampering with exam results. Our quantum-resistant cryptographic IP core adopts algorithms selected by NIST and CNSA, protecting exam data and hardware from attacks by quantum computers. 【Use Cases】 - Online exam platforms - Encryption and decryption of exam data - Measures against unauthorized access 【Benefits of Implementation】 - Secure protection of exam data - Deterrence of cheating - Establishment of a reliable exam environment

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for IoT devices

Hardware-level solutions to enhance the security of IoT devices.

In the field of IoT device authentication, secure identification of devices and protection of data are essential. With the advancement of quantum computers, traditional encryption methods are under threat, increasing the security risks for IoT devices. This product uses algorithms selected by NIST and CNSA to protect devices and data from quantum computer attacks. 【Use Cases】 - Authentication of IoT devices - Secure data communication - Protection of firmware 【Benefits of Implementation】 - Prevention of device impersonation - Maintenance of data confidentiality - Assurance of long-term security

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Military-grade quantum-resistant cryptographic IP core

Security solutions that protect data and hardware.

In the military field, the protection of confidential information and secure communication are essential. The advancement of quantum computers poses a threat to traditional encryption technologies, making the introduction of quantum-resistant cryptographic techniques an urgent necessity to prevent data leaks and unauthorized access. This product provides a hardware-level security solution that uses algorithms selected by NIST and CNSA to protect data and hardware from attacks by quantum computers. 【Use Cases】 - Encryption of highly confidential communications - Protection of important data - Strengthening the security of military systems 【Benefits of Implementation】 - Reduction of risks associated with decryption by quantum computers - Maintenance of data confidentiality - Improvement of system security levels

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant encryption IP core for satellite communications

Security solutions that protect data and hardware.

In the satellite communication industry, the confidentiality of data and the security of communications are the top priorities. The advancement of quantum computers threatens current encryption technologies and increases the risk of data interception and tampering in satellite communications. This product provides a hardware-level security solution that uses algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks. 【Use Cases】 * Satellite data communication * Communication with space stations * Military satellite communication 【Benefits of Implementation】 * Protection from attacks by quantum computers * Secure transmission and reception of confidential data * Assurance of long-term security

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for the manufacturing supply chain.

Security solutions to protect supply chain data and hardware.

In the manufacturing supply chain, highly confidential information such as product design data, manufacturing process data, and customer information is handled. Since this data is shared throughout the supply chain, measures against the risk of decryption by quantum computers are essential. In the event of a data breach, it could lead to a decline in the company's competitiveness or issues related to damages. Our "Quantum-Resistant Cryptography IP Core" uses algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks. 【Use Cases】 - Strengthening the security of data transmission and reception in the supply chain - Security measures in manufacturing equipment control systems - Information protection throughout the entire product lifecycle 【Benefits of Implementation】 - Improved security levels across the entire supply chain - Reduced risk of data breaches - Enhanced reliability of the company

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for smart grids

Security solutions to protect the data and hardware of smart grids.

In the smart grid industry, ensuring the stability and security of power supply is essential. Particularly, with the advancement of quantum computers, the risk of traditional encryption methods being compromised is increasing. This raises the possibility of unauthorized access to control data of power systems and customer information, which could have serious implications for the entire social infrastructure. Our "Post-Quantum Cryptography IP Core" utilizes algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks, thereby supporting the secure operation of smart grids. 【Use Cases】 * Smart meters * Power control systems * Data communication in transmission networks 【Benefits of Implementation】 * Protection from attacks by quantum computers * Improved reliability of power systems * Maintenance of confidentiality for critical data

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for healthcare

Hardware-level security that protects the safety of medical data.

In the healthcare industry, protecting patients' confidential information and medical data is the top priority. The advancement of quantum computers threatens traditional encryption technologies, increasing the risk of unauthorized access and data breaches for these critical data. To protect patient privacy and maintain the reliability of healthcare institutions, the implementation of quantum-resistant encryption technology is essential. 【Use Cases】 * Electronic medical record systems * Telemedicine platforms * Data management in research institutions * Communication of medical devices 【Benefits of Implementation】 * Protection of data from attacks by quantum computers * Maintenance of patient data confidentiality * Strengthening the security of medical information systems * Compliance with regulations

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[For Government] Quantum-resistant Cryptographic IP Core

Security solutions that protect data and hardware.

In government agencies, advanced security measures are essential to protect national secrets and important information assets of the citizens. The development of quantum computers poses a threat to traditional encryption technologies, increasing the risk of information leakage. Therefore, solutions that can protect data from attacks by quantum computers and ensure security are in demand. 【Use Cases】 * Protection of confidential data in government agencies * Strengthening the security of critical infrastructure * Ensuring the confidentiality of communications 【Benefits of Implementation】 * Reduction of risks associated with decryption by quantum computers * Prevention of national losses due to information leakage * Establishment of a secure information communication environment

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for communication

A security solution to protect secret communications from the threats of quantum computers.

In the telecommunications industry, the risk of decryption by quantum computers threatens the security of highly confidential data communications. Particularly in areas that require advanced security, such as financial transactions, sharing of confidential information, and communications within government agencies, it is essential to protect communication data from attacks by quantum computers. Quantum-resistant cryptographic IP cores provide a hardware-level security solution that uses algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks. 【Use Cases】 - Highly confidential data communications - Communications in financial transactions - Communications within government agencies 【Benefits of Implementation】 - Protection from the risk of decryption by quantum computers - Achievement of advanced security - Maintenance of data confidentiality

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quantum-resistant cryptographic IP core for financial institutions

Protecting financial transactions from the threat of quantum computers.

In the financial industry, advanced security measures are essential to protect customers' assets and confidential information. Particularly with the advent of quantum computers, the risk of traditional encryption technologies being compromised has increased. To safeguard transactions from this threat, the implementation of post-quantum cryptography is urgent. Our "Post-Quantum Cryptography IP Core" provides a hardware-level security solution that uses algorithms selected by NIST and CNSA to protect data and hardware from quantum computer attacks. 【Use Cases】 * Online banking * Credit card payments * Securities trading * Data communication between financial institutions 【Benefits of Implementation】 * Enhanced safety of customer data * Increased reliability of financial transactions * Compliance with regulations * Assurance of business continuity

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Black Duck SCA for the Energy Industry

Improving system stability through OSS management, also compliant with the Cyber Resilience Act.

In the energy industry, the stable operation of systems is the most critical issue, and system downtime can have severe consequences, such as power supply interruptions or plant operational halts. Cyberattacks exploiting vulnerabilities in open-source software (OSS) increase the risk of system outages, making proper management and vulnerability countermeasures for OSS essential. Black Duck SCA supports stable system operation by visualizing OSS usage and managing risks related to vulnerabilities and license violations. As part of the preparations for compliance with the European Cyber Resilience Act (CRA) starting December 11, 2027, OSS/SBOM management is also important. Fujisoft supports the implementation and operation of Black Duck SCA, contributing to the improvement of system stability for our customers. 【Effects of Implementation】 - Visualizes OSS vulnerability risks and reduces the risk of system outages due to cyberattacks. - Avoids license violation risks and strengthens compliance. - Manages supply chain risks through SBOM creation. - Enhances system stability and business continuity.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Black Duck SCA for the Gaming Industry

Manage OSS vulnerability risks in game development and create safe games.

In the gaming industry, managing the vulnerabilities of open source software (OSS) is crucial to ensure the quality and safety of games. Particularly in online games and large-scale games, vulnerabilities pose risks of unauthorized access and information leaks. Black Duck SCA efficiently supports vulnerability management for OSS, checks for license violations, and addresses encryption risks, thereby aiding in safe game development. 【Use Cases】 - Vulnerability management of OSS in game development projects - Strengthening game security - Compliance with license requirements 【Benefits of Implementation】 - Reduction of vulnerability risks - Prevention of security incidents - Streamlining of the development process

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Copyright Management with Black Duck SCA for the Entertainment Industry

Reduce copyright risks of entertainment content through OSS/SBOM management.

In the entertainment industry, the use of software and libraries is active, and the risk of copyright infringement is always present. Particularly in diverse content production such as video production, game development, and music distribution, the use of OSS (Open Source Software) is essential. However, issues related to OSS license violations and vulnerabilities can lead to copyright infringement and security risks, potentially damaging a company's reputation. Black Duck SCA visualizes the usage of OSS and reduces copyright risks by early detection of license violations and vulnerabilities. 【Use Cases】 - Management of OSS usage for editing software and plugins in video production - License verification of libraries and middleware in game development - OSS management of music production tools on music distribution platforms 【Benefits of Implementation】 - Reduces the risk of copyright infringement and avoids legal troubles - Lowers the risk of information leaks and service interruptions due to security vulnerabilities - Improves development efficiency and quality through proper management of OSS

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Black Duck SCA for Educational Institutions

OSS/SBOM management tool to enhance personal information protection.

In educational institutions, it is essential to manage the personal information of students and staff securely. With the increasing use of OSS (open source software), the risks of vulnerabilities and license violations are also rising. These risks can lead to the leakage or misuse of personal information. Black Duck SCA contributes to strengthening personal information protection systems by visualizing OSS usage and supporting vulnerability management and license compliance checks. 【Use Cases】 - Student Information Systems - Staff Information Systems - Research Data Management 【Benefits of Implementation】 - Reduction of personal information leakage risks - Compliance with regulations - Strengthening of information security systems

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Black Duck SCA for Retail Industry

An OSS/SBOM management tool that supports the secure management of customer data.

In the retail industry, protecting customer data is one of the top priorities. In addition to complying with personal information protection laws, the loss of customer trust due to information leaks can jeopardize a company's survival. Cyberattacks exploiting vulnerabilities in open-source software (OSS) can lead to customer data breaches and system outages. Black Duck SCA helps protect customer data from these risks and supports business continuity through OSS vulnerability management and SBOM creation. 【Use Cases】 - Systems handling customer data - POS systems - E-commerce sites 【Benefits of Implementation】 - Reduces the risk of customer data leaks - Prevents opportunity losses due to system outages - Strengthens compliance with regulations Fujisoft has a 40-year history in embedded development and a technical team of over 2,000 people, supporting customers in solving their challenges.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Financial Institutions] Strengthening Compliance through BlackDuck SCA

Supporting compliance for financial institutions through OSS management and SBOM creation.

In financial institutions, compliance adherence is one of the most important issues. With the increase in the use of open source software (OSS), addressing license violations and vulnerability risks has become essential. Particularly, as regulations regarding information security become stricter, proper management of OSS is crucial for business continuity and securing customer trust. Black Duck SCA supports the strengthening of compliance systems in financial institutions by visualizing the use of OSS and efficiently managing risks. 【Usage Scenarios】 - Development of financial-related systems - Compliance with laws such as the Personal Information Protection Act and the Financial Instruments and Exchange Act - Cybersecurity risk measures 【Benefits of Implementation】 - Reduces the risk of OSS license violations - Mitigates the risk of information leaks due to vulnerabilities - Improves transparency through SBOM creation

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Communication Infrastructure] Management of OSS/SBOM with BlackDuck SCA

We support risk management of OSS and the creation of SBOM, protecting communication infrastructure.

In the telecommunications infrastructure industry, ensuring the stable operation of systems and security is the most critical issue. Particularly with the increasing use of OSS (open-source software), the risks of vulnerabilities and license violations are rising. These risks can lead to infrastructure downtime and information leaks, potentially causing social impacts. Black Duck SCA enhances the safety of telecommunications infrastructure by visualizing the use of OSS and supporting vulnerability management, license compliance checks, and responses to encryption risks. It is also effective in preparing for compliance with the European Cyber Resilience Act (CRA) starting December 11, 2027. 【Use Cases】 - Management of OSS for network equipment and software in telecommunications operators - Visualization of OSS usage in data centers - Vulnerability management for OSS in IoT devices 【Benefits of Implementation】 - Early detection of OSS vulnerability risks and the ability to take countermeasures - Reduction of risks associated with license compliance violations - Management of supply chain risks through the creation of SBOM (Software Bill of Materials)

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Black Duck SCA for Government Agencies

Support risk management of OSS and creation of SBOM to enhance security.

For government agencies, the increasing risk of cyber attacks and the complexity of supply chains have made the security management of OSS (Open Source Software) an urgent issue. In particular, to ensure the reliability and safety of information systems, it is essential to address OSS vulnerabilities, ensure license compliance, and accurately manage SBOM (Software Bill of Materials). Black Duck SCA provides a comprehensive solution to these challenges. 【Use Cases】 - Vulnerability management of OSS in information systems - Compliance with software license requirements - Automated generation and management of SBOM - Compliance with the Cyber Resilience Act 【Benefits of Implementation】 - Visualizes security risks of OSS, enabling rapid response. - Reduces the risk of license violations and strengthens compliance. - Reduces supply chain risks through accurate management of SBOM. - Supports compliance with the European Cyber Resilience Act (CRA).

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Black Duck SCA for the Automotive Supply Chain

Support OSS management and SBOM creation to reduce supply chain risks.

In the automotive supply chain, the safety of software components is crucial. Vulnerabilities in open source software (OSS) and license violations can impact product quality and compliance. Black Duck SCA enhances the security of the entire supply chain by visualizing OSS usage and managing risks. 【Use Cases】 - Understanding the OSS usage of software components provided by suppliers - Creation and management of Software Bill of Materials (SBOM) - Vulnerability assessment and countermeasures for OSS 【Benefits of Implementation】 - Reduction of security risks across the supply chain - Strengthening of compliance adherence - Improvement in product quality

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Black Duck SCA for Healthcare

A tool for managing OSS/SBOM that protects patient information security.

In the healthcare industry, protecting patient information is the top priority. While the use of OSS (open source software) is common in the development and operation of medical information systems, there are also risks of vulnerabilities and license violations. These risks can lead to the leakage of patient information or system outages, potentially causing serious issues. Black Duck SCA visualizes the utilization of OSS and manages risks to ensure the safety of patient information and support compliance. 【Use Cases】 - Electronic medical record systems - Medical information collaboration platforms - Software utilization in research and development 【Benefits of Implementation】 - Protection of patient information - Compliance adherence - Improved system stability - Early detection and response to risks Fujisoft leverages 40 years of experience in embedded development to provide optimal solutions tailored to customer needs. Through partnerships with Black Duck and Macnica, we offer comprehensive support from implementation to operation.

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Quality Control by Black Duck SCA for the Manufacturing Industry

Improving the quality and safety of the manufacturing process through OSS/SBOM management.

In quality management for the manufacturing industry, software quality is a crucial factor that influences product reliability. As the use of open source software (OSS) increases, addressing license violations and vulnerability risks becomes essential. Black Duck SCA supports the management of OSS and the creation of Software Bill of Materials (SBOM), contributing to the maintenance of product quality. 【Use Cases】 - Vulnerability management of OSS in embedded software products - License compliance checks for OSS in the supply chain - Visualization of software configuration information through SBOM 【Benefits of Implementation】 - Reduction of security risks for products - Avoidance of legal risks due to license violations - Improvement of software quality

  • Software (middle, driver, security, etc.)
  • Other security
  • Other analyses

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Softcore "D16550"

Serial transmission is possible in two modes: UART and FIFO! A programmable 16-bit baud rate generator is built-in.

The "D16550" is a soft core universal asynchronous receiver/transmitter (UART) that is functionally the same as the TL16C550A. It supports serial transmission in two modes: UART and FIFO. In FIFO mode, an internal FIFO is activated, storing 16 bytes (with 3 bits of error data per byte in the RCVR FIFO) in both the receive and transmit directions. Additionally, it features a programmable 16-bit baud rate generator that can divide the timing reference clock input by a divisor ranging from 1 to (2^16-1). 【Specifications (partial)】 ■ Software compatible with 16450 and 16550 UART ■ Configuration features ■ Isolated configurable BAUD clock line ■ Majority logic ■ Supports RS232 and RS485 *For more details, please download the PDF (English version) or feel free to contact us.

  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SPI Master/Slave 'DSPI'

The simple interface allows for easy connection to the microcontroller!

The "DSPI" is a fully configurable SPI master/slave device. Users can set the polarity and phase of the serial clock signal SCK. This not only enables the microcontroller to communicate with serial peripheral devices but also allows communication with inter-processors in a multi-master system. 【Features】 <SPI Master> ■ Master and multi-master operation ■ 8 SPI slave select lines ■ System error detection ■ Mode fault error ■ Write collision error *For more details, please download the PDF (English version) or feel free to contact us.

  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SPI Master/Slave "DQSPI"

Four types of transfer formats! Fully composable, static synchronous design without internal tri-state.

"DQSPI" is an innovative Quad SPI designed to provide very fast operation for SPI memory. It offers the flexibility to connect with standard peripheral products from various manufacturers. Additionally, the IP core supports common 8, 16, and 32-bit processors. Please feel free to contact us if you have any inquiries. 【Specifications (partial)】 ■ Operates with 8, 16, and 32-bit CPUs ■ Full-duplex synchronous serial data transfer ■ DMA support ■ Supports 32, 16, and 8-bit systems ■ Support for various system bus standard specifications *For more details, please download the PDF (English version) or feel free to contact us.

  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SPI Master/Slave 'DOSPI'

Supports up to 7 SPI slaves! Simple SPU and DMA interface operation.

"DOSPI" is an innovative octal SPI designed to provide very fast operation for SPI memory. It has sufficient flexibility to connect directly to many standard products from multiple manufacturers. Furthermore, the IP core supports common 8, 16, and 32-bit processors. Please feel free to contact us when you need assistance. 【Specifications (Partial)】 ■ Operates with 8, 16, and 32-bit CPUs ■ Full-duplex synchronous serial data transfer ■ DMA support ■ Support for 32, 16, and 8-bit systems ■ Support for various system bus standards *For more details, please download the PDF (English version) or feel free to contact us.

  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ultra High-Density 1U FPGA Server 'TeraBox 1402B'

Maximize the density of FPGA servers to the limit and provide the highest level of computing and networking capabilities in a 1U chassis!

The "TeraBox 1402B" is an FPGA server equipped with an Intel 3rd generation Xeon CPU. It provides double the density of a typical 4U server and the power equivalent to four Achronix Speedster 7t, Intel Stratix 10, and Xilinx UltraScale+ FPGAs. It can accommodate up to four FPGAs in a standard depth 1U server. Please feel free to contact us if you have any inquiries. 【Features】 ■ 32×100G or 128×10/25G with 16 QSFP-DD ports ■ Can accommodate up to four FPGAs in a standard depth 1U server ■ Support for all BittWare PCIe FPGA cards *For more details, please download the PDF (English version) or feel free to contact us.

  • server

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Prev 12345...8 Next
  • 金属・化学・窯業・食品・医療品などのほぐし・解砕・ふるい分けがこれ一台 解砕機構付き佐藤式振動ふるい機 つばさ デモ実施中!
  • あなたの設計時間 CADに奪われていませんか? 制約から解放される新たな設計環境へ
    • Contact this company

      Inquiry Form

    Products

    • Search for Products

    Company

    • Search for Companies

    Special Features

    • Special Features

    Ranking

    • Overall Products Ranking
    • Overall Company Ranking

    support

    • site map
    IPROS
    • privacy policy Regarding external transmission of information
    • terms of service
    • About Us
    • Careers
    • Advertising
    COPYRIGHT © 2001-2026 IPROS CORPORATION ALL RIGHTS RESERVED.
    Please note that the English text on this page is automatically translated and may contain inaccuracies.