List of Embedded Systems products
- classification:Embedded Systems
4741~4770 item / All 12221 items
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Amino acid-derived natural cationic polymer that can be used in food preservatives, hygiene materials, and daily necessities. It is a safe material as it is a fermentation product produced by natural ...
- Shelf life enhancer
Introduction of the preservative polylysine / fermented polyamino acids that contribute to food poisoning prevention.
We provide easy-to-understand materials explaining the natural preservative polylysine, which prevents food poisoning. ε-Polylysine (hereafter referred to as polylysine) is an amino acid-derived preservative widely used as a food preservative. By adding polylysine, the growth of microorganisms that cause food poisoning can be prevented. Every year, food poisoning caused by microorganisms is a significant issue and is frequently reported in the news. Even foods that do not appear to be spoiled can rapidly proliferate microorganisms if the growth environment is suitable, so caution is necessary. Even if something looks clean, contamination by bacteria can progress, posing a risk of food poisoning. By ensuring hygiene management during the manufacturing process, proper storage at appropriate temperatures, and the appropriate use of the preservative polylysine, food safety can be more effectively protected. 【Features】 ■ A safe material produced through fermentation by natural microorganisms (not genetically modified organisms) ■ Provides a good image as a natural fermented product ■ Listed in the existing additive registry as a food preservative ■ A safe domestic product *Please feel free to contact us.
The VIA ARTiGO A5000 system can streamline the development of smart industrial IoT systems with high power efficiency and performance.
- Embedded Board Computers
Transforming field surveys with DX! The damage recording system Surveynote revolutionizes field surveys by changing handwritten field notebooks to iPads.
- Software (middle, driver, security, etc.)
Remote management software for all edge devices.
- Software (middle, driver, security, etc.)
ADLINK releases EdgeGO, remote management software for all edge devices.
● Efficient Edge Device Management: ADLINK's EdgeGO provides an all-in-one software solution for the remote and secure management of edge devices across various industries. ● Improved Operational Efficiency: Real-time alerts, remote troubleshooting, and comprehensive device monitoring enable efficient and secure operations. ● Optimized for Various Fields: EdgeGO caters to sectors such as manufacturing, smart cities, healthcare, and retail, ensuring optimal performance and device management.
Register the program key for AutoCAD and Excel as a shortcut!
- Other embedded systems (software and hardware)
Introduced for fashion apparel POS systems. Adopted as a keyboard for POS registers that pursues convenience over touch panel systems!
- Other embedded systems (software and hardware)
No OS shutdown required, equipped with "Power Cut Protect®" feature, slim embedded box computer BX-T210 with a thickness of approximately 30mm.
- Industrial PCs
- Embedded Board Computers
- controller
[Exhibition Report] Japan IT Week "26th Embedded/Edge Computing Expo Spring"
Contec exhibited at Japan IT Week "26th Embedded/Edge Computing Expo Spring" held from April 5 to 7, 2023. We sincerely thank everyone who visited our booth. To provide a simulated experience of visiting our exhibition booth, we have prepared report videos of each section by our staff and a 3D virtual booth. Please take a look.
Power of desktop PCs for industrial applications! Box computer equipped with Xeon processors and high expandability.
- Industrial PCs
- Embedded Board Computers
- controller
[Exhibition Report] Japan IT Week "26th Embedded/Edge Computing Expo Spring"
Contec exhibited at Japan IT Week "26th Embedded/Edge Computing Expo Spring" held from April 5 to 7, 2023. We sincerely thank everyone who visited our booth. To provide a simulated experience of visiting our exhibition booth, we have prepared report videos of each section by our staff and a 3D virtual booth. Please take a look.
Micro-ATX with Intel Raptor Lake/Alder Lake processors and Q670 chipset
- Embedded Board Computers
Thin Mini-ITX motherboard equipped with Intel Alder Lake N processor
- Embedded Board Computers
AAEON Industrial 3.5-inch Standard Single Board Computer equipped with Intel Alder Lake-N series.
- Embedded Board Computers
AAEON Intel Alder Lake-N Series Equipped Industrial 3.5-Inch Standard Single Board Computer [GENE-ADN6]
Features ● Equipped with Intel(R) Core i3-N305/N50/N97 processor ● DDR5 4800 MHz Dual Channel SODIMM x 1 (up to 32GB) (sold separately) ● HDMI 1.4 x 1, VGA x 1, LVDS x 1 ● 2.5GbE x 3, SATA 6.0Gb/s x 1, DIO x 8bit ● USB 3.2 Gen2 x 2 (Rear I/O), USB 2.0 x 4 (Pin header) ● RS-232/422/485 x 2, RS-232 x 2 ● Mini PCIe card x 1, M.2 E-Key 2230 x 1 (PCIe, USB 2.0), M.2 B-Key 3052 x 1 (USB 3.2, USB 2.0) ● TPM 2.0 compatible (only for some models) ● DC 9-36V / 12V
The power input voltage is 0.13V - 3V! Energy harvesting continues even when VIN drops to 130mV.
- Embedded Board Computers
Expansion module to add a digital output interface to the CPU unit of the CONPROSYS(R) nano series.
- Embedded Board Computers
- Communications
GIGA IPC 12th/13th/14th Generation CPU Compatible Industrial Mini ITX Motherboard with LGA1700 Socket
- Embedded Board Computers
GIGA IPC NUC specifications equipped with Intel N97 processor.
- Embedded Board Computers
GIGA IPC 12th/13th/14th Generation CPU Compatible Industrial Mini ITX Motherboard with LGA1700 Socket 【QBi-N97A】
Features ● Supports 12th/13th/14th generation CPUs with LGA1700 socket, compatible with H610 chipset ● DDR5 4800MHz SO-DIMM x 2 (up to 64GB) (sold separately) ● 2.5GbE LAN port x 1, GbE LAN port x 1 ● SATA 6Gb/s ports x 2 ● HDMI, DP, VGA, LVDS ● RS-232/422/485 & RI/5V/12V x 1, RS-232/422/485 x 1
Aiming to reduce the burden on the IT department! Posting about "the benefits of an integrated monitoring approach" and more.
- Software (middle, driver, security, etc.)
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
Accurately grasp what is happening on the network! It is necessary to monitor and manage it rigorously.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Ensure high resilience! Manage high-performance and scalable application delivery.
- Other embedded systems (software and hardware)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Easily automate workflows! Software that detects compliance risks.
- Software (middle, driver, security, etc.)
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
Industry-leading Managed File Transfer (MFT) software
- Software (middle, driver, security, etc.)
Four Reasons Why NDR is Essential for Cybersecurity
Endpoint protection is the foundation of cybersecurity, but in today's ever-expanding digital environment, endpoints span a wide variety of devices, and traditional endpoint security alone is not sufficient to address the frequent cyberattacks. The proliferation of cloud services, remote work, and expanded system access further amplifies these challenges. In this changing landscape, while additional tools such as Security Information and Event Management (SIEM) systems are used to enhance security, it has become clear that there is a need for an additional cybersecurity stack that should be built through the analysis of attack data and experience. That is where Network Detection and Response (NDR) comes in. In this blog, we will explain four reasons why NDR is necessary. You can find more details in the related links below.
We are releasing case studies on measures against cyber attacks that have resolved bottlenecks in network security!
- Software (middle, driver, security, etc.)
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
Published case studies of measures against cyber attacks that solved issues in the security operations department and the network operations department.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Publication of case studies on reliable network monitoring and countermeasures against cyber attacks detected in a university environment.
- Software (middle, driver, security, etc.)
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
Industrial mesh intercoms that connect people, for improving efficiency and safety in the workplace.
- Communications
We develop smartphone applications tailored to your business and needs.
- Embedded applications for mobile phones and PDAs
We handle complex marketing activities, allowing you to focus on negotiations.
- Embedded system design service
Providing customers with peace of mind, excitement, and satisfaction! A civil engineering estimation system that enables more accurate calculations for faster and more precise bidding.
- Software (middle, driver, security, etc.)
Information on the equipment configuration and specifications of our products, as well as a list of virtual devices, is published!
- Development support tools (ICE, emulators, debuggers, etc.)
Developing DJ equipment embedded programs and identification software for banknote recognition devices!
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
Experience in the development of pressure sensor processing devices, FM demodulators, LCD signal extension drive circuits, and more!
- Leak Testing Equipment
- Other embedded systems (software and hardware)
Simple operation and streamlined functions! It can be used efficiently even in laboratories that handle large-scale processing.
- Software (middle, driver, security, etc.)
(Benefits of upgrading to Bluehill Universal software from the old software for users)
This is a webinar for customers using the old Instron software (Bluehill 1, Bluehill 2, Bluehill 3, Bluehill LE). We will confirm the current software lifecycle stage for customers and explain the benefits of upgrading to the latest software, Bluehill Universal. Please feel free to join us. 【Seminar Content】 - Current status and risks of the software/PC you are using - Features of Bluehill Universal - Changes from the old software - (Demo) Representative functions of the software - FAQ 【Target Audience for the Seminar】 - Those using Bluehill Lite, LE, 1, 2, or 3 old software - Those using PCs with Windows 7 or earlier - Those considering updating to the latest software - Those who want to know about new features of the latest software - Those interested in touch panel PCs (dashboard/Windows 10 compatible) 【Presenter】 Shinpei Yamashita, Sales Specialist, Instron Japan 【Participation Fee】 Free 【Question Format】 Chat (always available)