List of Embedded Systems products
- classification:Embedded Systems
9661~9690 item / All 11858 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
It is possible to simulate powder flow, solid-gas two-phase flow, solid-liquid two-phase flow, gas-liquid two-phase flow, and solid-gas-liquid three-phase flow!
- Software (middle, driver, security, etc.)
- Other analyses
We will overwhelmingly improve development quality and duration, and achieve agile system integration.
- project management
- Software (middle, driver, security, etc.)
- Database
Our motto is "Safety comes first." We contribute to the community with technology and trust.
- others
- Machinery and equipment installation/dismantling/relocation
- Communications
Significantly reduce the hassle of data entry tasks! A service that reads text and converts it into data has arrived.
- Electronic documents
- Software (middle, driver, security, etc.)
A multi-use revolution from maintenance manuals to usage instructions! We support maintenance inspections with 3D and MR/AR technology.
- Software (middle, driver, security, etc.)
No special applications or editors needed! You can produce and operate it in-house without any special know-how.
- Software (middle, driver, security, etc.)
We create and provide user-friendly manuals in a chat format using AI!
- Software (middle, driver, security, etc.)
We provide embedded system development environments and undertake contract development services.
- Software (middle, driver, security, etc.)
- Embedded system design service
- Other embedded systems (software and hardware)
Software that can extract cracks from digital camera images.
- Visual Inspection Equipment
- Software (middle, driver, security, etc.)
Supporting various events regardless of scale! Easy and highly realistic online events.
- Other network tools
- Communications
- Web/Video Conference
Multi-point conferences with three or more participants are possible! Introducing a cloud-based phone (voice) conference service.
- Other network tools
- Communications
- Web/Video Conference
We provide according to your needs, such as the number of cameras and whether recording is required!
- Other network tools
- Communications
- Web/Video Conference
Capable of handling everything from factory warehouses requiring detailed parts management to small store warehouses!
- others
- Other embedded systems (software and hardware)
Examples of independently developed equipment specifications.
- Development support tools (ICE, emulators, debuggers, etc.)
- Production Management System
Centralized management of warehouses with different storage facilities such as automated warehouses, flat storage warehouses, fixed shelves, and movable shelves.
- Other FA equipment
- others
- Other embedded systems (software and hardware)
IoT secure authentication technology to prevent "spoofing" in device-to-device communication.
- Encryption and authentication
- Software (middle, driver, security, etc.)
- Embedded Board Computers
Realizing centralized cloud management of a vast number of IoT devices.
- Software (middle, driver, security, etc.)
- Integrated operation management
- Server monitoring and network management tools
Edge computing middleware for IoT based on high-speed databases.
- Software (middle, driver, security, etc.)
A collection of SCM functions that can be customized to match business needs!
- Other core systems
- Communications
Automate repetitive tasks on your computer! Reduce errors that are typical of simple tasks!
- Software (middle, driver, security, etc.)
- Other information systems
Easy to expand and simple to implement! Ideal for those who want to start RPA at the department or individual level.
- Software (middle, driver, security, etc.)
- Other information systems
Measurement waveform data capture software developed to meet the needs of research and development environments.
- Software (middle, driver, security, etc.)
Are you wasting valuable time on routine PC data entry? A purely domestic RPA tool that can dramatically improve your work efficiency.
- Other network tools
- Software (middle, driver, security, etc.)
Visualize driving conditions and reduce accidents! We solve your concerns about traffic accidents and management of commercial vehicles.
- Other machine elements
- Other embedded systems (software and hardware)
Enables safe external use of PCs. Data can be used securely even in locations without a network environment.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Prevent information leaks due to internal misconduct! Eliminate unauthorized use of privileges and rights to take out information to "nothing."
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Using secret dispersal technology to render data meaningless! Safe storage and management on the cloud is possible.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
For sending and receiving important data and large volumes of data! Even if any fragment leaks during transport, the original data remains safe.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security
Data De-identification Library! A new concept of "de-identification" for data protection and authentication.
- Other security and surveillance systems
- Software (middle, driver, security, etc.)
- Other security