List of Embedded Systems products
- classification:Embedded Systems
4501~4560 item / All 12004 items
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
You can download a free booklet that introduces the uses, structures, and examples of various types of frames.
- Other machine tools
- Solar power generator
- Other energy equipment
Small Zynq board. Ideal for AI, IoT, and edge computing.
- Embedded Board Computers
World's smallest class Zynq FPGA board 'ADZBT1'
- Embedded Board Computers
Streamline on-site reporting smartly! Turn your smartphone into a data HUB for field operations.
- Embedded applications for mobile phones and PDAs
We will be exhibiting at the Mansion Comprehensive EXPO 2024.
The "Mansion Comprehensive EXPO 2024," which will be held from May 30 (Thursday) to 31 (Friday), 2024, is a comprehensive exhibition organized by the BREX Executive Committee, featuring the latest products and services related to the "construction, management, and repair" of condominiums in the housing, architecture, and real estate sectors. The field reporting app "Smart Attack" is celebrating its 14th year since its initial release this year. It has a proven track record as a tool for improving the efficiency of building management tasks, such as those for condominiums! At our exhibition booth, we will provide demonstrations and the latest information about "Smart Attack." ★★★ Points ★★★ 1. Renewal Version Launch: Smart Attack V3 The renewed version will debut in 2024! You can see the even more user-friendly Smart Attack in a demonstration. 2. Disaster Risk Management: Smart Attack Guardian A service that automatically issues work instructions based on information released by the Japan Meteorological Agency! We will introduce its applications in condominium management tasks. ★★★ Seminar Information ★★★ We will participate in the "Special Lecture/Seminar" held at the exhibition venue. All of us at the company look forward to your visit.
Performance and functionality that exceed expectations in various settings! New system-compliant machine.
- Communications
A must-see for Access users! Achieve the creation of forms and more using definition information.
- Development support tools (ICE, emulators, debuggers, etc.)
Boardcon Technology in China has developed a system-on-module (SoM) suitable for embedding in ARM-based industrial and commercial equipment.
- Embedded Board Computers
Introducing a wide range of products including lighting equipment and measurement devices from Image Engineering, as well as test charts and analysis software!
- Other lighting equipment
- Other measurement, recording and measuring instruments
- Software (middle, driver, security, etc.)
The VIA ARTiGO A5000 system can streamline the development of smart industrial IoT systems with high power efficiency and performance.
- Embedded Board Computers
Transforming field surveys with DX! The damage recording system Surveynote revolutionizes field surveys by changing handwritten field notebooks to iPads.
- Software (middle, driver, security, etc.)
Remote management software for all edge devices.
- Software (middle, driver, security, etc.)
ADLINK releases EdgeGO, remote management software for all edge devices.
● Efficient Edge Device Management: ADLINK's EdgeGO provides an all-in-one software solution for the remote and secure management of edge devices across various industries. ● Improved Operational Efficiency: Real-time alerts, remote troubleshooting, and comprehensive device monitoring enable efficient and secure operations. ● Optimized for Various Fields: EdgeGO caters to sectors such as manufacturing, smart cities, healthcare, and retail, ensuring optimal performance and device management.
Register the program key for AutoCAD and Excel as a shortcut!
- Other embedded systems (software and hardware)
Introduced for fashion apparel POS systems. Adopted as a keyboard for POS registers that pursues convenience over touch panel systems!
- Other embedded systems (software and hardware)
No OS shutdown required, equipped with "Power Cut Protect®" feature, slim embedded box computer BX-T210 with a thickness of approximately 30mm.
- Industrial PCs
- Embedded Board Computers
- controller
[Exhibition Report] Japan IT Week "26th Embedded/Edge Computing Expo Spring"
Contec exhibited at Japan IT Week "26th Embedded/Edge Computing Expo Spring" held from April 5 to 7, 2023. We sincerely thank everyone who visited our booth. To provide a simulated experience of visiting our exhibition booth, we have prepared report videos of each section by our staff and a 3D virtual booth. Please take a look.
Power of desktop PCs for industrial applications! Box computer equipped with Xeon processors and high expandability.
- Industrial PCs
- Embedded Board Computers
- controller
[Exhibition Report] Japan IT Week "26th Embedded/Edge Computing Expo Spring"
Contec exhibited at Japan IT Week "26th Embedded/Edge Computing Expo Spring" held from April 5 to 7, 2023. We sincerely thank everyone who visited our booth. To provide a simulated experience of visiting our exhibition booth, we have prepared report videos of each section by our staff and a 3D virtual booth. Please take a look.
Micro-ATX with Intel Raptor Lake/Alder Lake processors and Q670 chipset
- Embedded Board Computers
Thin Mini-ITX motherboard equipped with Intel Alder Lake N processor
- Embedded Board Computers
AAEON Industrial 3.5-inch Standard Single Board Computer equipped with Intel Alder Lake-N series.
- Embedded Board Computers
AAEON Intel Alder Lake-N Series Equipped Industrial 3.5-Inch Standard Single Board Computer [GENE-ADN6]
Features ● Equipped with Intel(R) Core i3-N305/N50/N97 processor ● DDR5 4800 MHz Dual Channel SODIMM x 1 (up to 32GB) (sold separately) ● HDMI 1.4 x 1, VGA x 1, LVDS x 1 ● 2.5GbE x 3, SATA 6.0Gb/s x 1, DIO x 8bit ● USB 3.2 Gen2 x 2 (Rear I/O), USB 2.0 x 4 (Pin header) ● RS-232/422/485 x 2, RS-232 x 2 ● Mini PCIe card x 1, M.2 E-Key 2230 x 1 (PCIe, USB 2.0), M.2 B-Key 3052 x 1 (USB 3.2, USB 2.0) ● TPM 2.0 compatible (only for some models) ● DC 9-36V / 12V
The power input voltage is 0.13V - 3V! Energy harvesting continues even when VIN drops to 130mV.
- Embedded Board Computers
Expansion module to add a digital output interface to the CPU unit of the CONPROSYS(R) nano series.
- Embedded Board Computers
- Communications
GIGA IPC 12th/13th/14th Generation CPU Compatible Industrial Mini ITX Motherboard with LGA1700 Socket
- Embedded Board Computers
GIGA IPC NUC specifications equipped with Intel N97 processor.
- Embedded Board Computers
GIGA IPC 12th/13th/14th Generation CPU Compatible Industrial Mini ITX Motherboard with LGA1700 Socket 【QBi-N97A】
Features ● Supports 12th/13th/14th generation CPUs with LGA1700 socket, compatible with H610 chipset ● DDR5 4800MHz SO-DIMM x 2 (up to 64GB) (sold separately) ● 2.5GbE LAN port x 1, GbE LAN port x 1 ● SATA 6Gb/s ports x 2 ● HDMI, DP, VGA, LVDS ● RS-232/422/485 & RI/5V/12V x 1, RS-232/422/485 x 1
Aiming to reduce the burden on the IT department! Posting about "the benefits of an integrated monitoring approach" and more.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Accurately grasp what is happening on the network! It is necessary to monitor and manage it rigorously.
- Software (middle, driver, security, etc.)
How far have hospitals progressed in their ransomware countermeasures? - Progress Software conducts a reality survey.
Due to a series of ransomware attacks targeting hospitals, there has been a growing interest in cybersecurity among medical institutions. For example, in October 2022, a ransomware attack on a hospital in Osaka rendered electronic medical records unusable, halting outpatient services and taking two months to restore the system using backup data. Given the detailed reports of the serious damage, many inquiries have been received by the agencies (SIers) handling "Flowmon ADS," a ransomware countermeasure solution offered by Progress Software. You can find more details in the related links below.
Ensure high resilience! Manage high-performance and scalable application delivery.
- Other embedded systems (software and hardware)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Easily automate workflows! Software that detects compliance risks.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Industry-leading Managed File Transfer (MFT) software
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We are releasing case studies on measures against cyber attacks that have resolved bottlenecks in network security!
- Software (middle, driver, security, etc.)
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
Published case studies of measures against cyber attacks that solved issues in the security operations department and the network operations department.
- Software (middle, driver, security, etc.)
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
Publication of case studies on reliable network monitoring and countermeasures against cyber attacks detected in a university environment.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Industrial mesh intercoms that connect people, for improving efficiency and safety in the workplace.
- Communications
We develop smartphone applications tailored to your business and needs.
- Embedded applications for mobile phones and PDAs
We handle complex marketing activities, allowing you to focus on negotiations.
- Embedded system design service
Providing customers with peace of mind, excitement, and satisfaction! A civil engineering estimation system that enables more accurate calculations for faster and more precise bidding.
- Software (middle, driver, security, etc.)
Information on the equipment configuration and specifications of our products, as well as a list of virtual devices, is published!
- Development support tools (ICE, emulators, debuggers, etc.)
Developing DJ equipment embedded programs and identification software for banknote recognition devices!
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
Experience in the development of pressure sensor processing devices, FM demodulators, LCD signal extension drive circuits, and more!
- Leak Testing Equipment
- Other embedded systems (software and hardware)
Simple operation and streamlined functions! It can be used efficiently even in laboratories that handle large-scale processing.
- Software (middle, driver, security, etc.)
(Benefits of upgrading to Bluehill Universal software from the old software for users)
This is a webinar for customers using the old Instron software (Bluehill 1, Bluehill 2, Bluehill 3, Bluehill LE). We will confirm the current software lifecycle stage for customers and explain the benefits of upgrading to the latest software, Bluehill Universal. Please feel free to join us. 【Seminar Content】 - Current status and risks of the software/PC you are using - Features of Bluehill Universal - Changes from the old software - (Demo) Representative functions of the software - FAQ 【Target Audience for the Seminar】 - Those using Bluehill Lite, LE, 1, 2, or 3 old software - Those using PCs with Windows 7 or earlier - Those considering updating to the latest software - Those who want to know about new features of the latest software - Those interested in touch panel PCs (dashboard/Windows 10 compatible) 【Presenter】 Shinpei Yamashita, Sales Specialist, Instron Japan 【Participation Fee】 Free 【Question Format】 Chat (always available)
We will solve the business challenges faced by our customers with ODS-made business tablets.
- Integrated operation management
- Embedded Board Computers
- Industrial PCs
Desktop industrial PC using industrial-grade components, ideal for applications requiring performance in harsh factory environments such as image inspection and AGV control.
- Industrial PCs
- Embedded Board Computers
- Desktop PC
Equipped with Trellix whitelist-type security software as standard. A palm-sized embedded PC for IoT edge computing.
- Industrial PCs
- Embedded Board Computers
- controller
Supports power-off operation without shutdown. A new model has been added to the IoT Edge controller "CPS-BXC200 series."
Contec has newly added two models equipped with the "Power Cut Protect(TM)" function, which supports operation without shutdown, as a standard feature in the IoT Edge controller "CPS-BXC200 series," and started sales on June 29, 2021. The palm-sized, highly expandable IoT Edge controller "CPS-BXC200 series" has been developed into a total of eight models as IoT devices for edge computing, including models pre-installed with McAfee whitelist antivirus software and models compatible with the Edgecross platform. With the addition of the two new models featuring the "Power Cut Protect(TM)" function, the lineup now consists of a total of ten models.
The number of channels available for use with simple wireless amplification increases! Important notes and explanations are also provided.
- Communications
High sound quality, multifunctional, and high operability! Also supports Bluetooth data communication.
- Communications
Stress-free high-speed scanning even with multiple channels! Easy to use, slim and compact.
- Communications
We accept a wide range of business systems from the web, including FA and control-related systems.
- Embedded system design service
Real-time generation and sharing of reports and data from your smartphone. Even easier to use with the renewal!
- Embedded applications for mobile phones and PDAs
[Media Coverage] Smart Attack has been featured in the industry magazine "Housing DX Tool Guide 2025" for the housing sector.
The service "Smart Attack" provided by G-Smart Co., Ltd. has been featured in the "Ultimate Guide to Housing DX Tools 2025." The "Ultimate Guide to Housing DX Tools 2025" is a special publication by Soju Co., Ltd. that compiles 159 tools and their case studies aimed at solving the business challenges of housing companies. In this booklet, the 159 tools are categorized into seven business segments, and Smart Attack is listed as a "Site Management and Construction Management" tool. The site reporting app "Smart Attack" is a business efficiency tool that can be used for site management of construction, inspections of single-family homes, and after-sales maintenance. ★ For more information about the listing and details on "Smart Attack," please refer to the "Related Links."
Edge computing accelerating the advancement of IoT: Three lineups with the latest CPUs, focusing on scalability, compact design, and DIN rail compatibility.
- Industrial PCs
- Embedded Board Computers
- Desktop PC
Engineers conduct direct hearings to achieve fast software development that realizes the desired product.
- Software (middle, driver, security, etc.)
You can safely use LTE Cat. 4 communication with products that have been certified for radio wave technical standards in Japan and have been certified for IoT by major telecommunications carriers!
- Communications
Introducing the SoftBank IoT module (manufactured by Murata Manufacturing) that supports ultra-low power consumption and enhanced security!!
- Communications
Easily introduce transceivers manufactured by the wireless equipment maker "Icom Inc."!
- Communications
Automate visual inspections with easy operation! An AI appearance inspection solution that can be easily customized! We are currently offering a free summary of essential knowledge.
- Software (middle, driver, security, etc.)
- Development support tools (ICE, emulators, debuggers, etc.)
- Visual Inspection Equipment
DX solution site focused on the manufacturing industry is OPEN!
Matching the high-quality manufacturing site Challenging high-quality hardware manufacturing and solutions Applied, which handles a wide range of PCs for specific applications, proposes DX solutions focused on the manufacturing industry. From a single PC to the automation of visual inspections, we thoroughly support the digitalization challenges in manufacturing! We tackle the challenges of the manufacturing industry from unique angles that only Applied can offer, including our original specific-purpose PC, "Fablik PC."
How about developing with the high-performance and reasonably priced i.MX9 series as a successor to the i.MX8?
- Embedded Board Computers
Three-step introduction consideration process! A shortcut to problem-solving that can be proposed by KTC.
- Embedded system design service
- Other contract services
Laundry equipment is fine as it is! Any old laundry equipment can be transformed into the latest "usage visualization" IoT laundry!
- Other embedded systems (software and hardware)
Notice of Participation in the Okayama Technology Exhibition (OTEX) 2024 (November 13 (Wed) - 14 (Thu), 2024)
B's STYLE Co., Ltd. will be exhibiting at the Okayama Technology Exhibition (OTEX) 2024, held at Convex Okayama! We look forward to your visit. B’s STYLE's booth is located in the middle exhibition hall, booth number "124". Our company provides solutions that utilize IoT and AI under the concept of "IoT Plus," which adds IoT items to existing equipment, making the world richer and more convenient in a more affordable and easier way. We sincerely await your visit. Please come by. ------------------------------- ■ Event Date: November 13 (Wednesday) - November 14 (Thursday), 2024, 10:00 AM - 5:00 PM (last day until 4:30 PM) ■ Venue: Convex Okayama, Large, Medium, and Small Exhibition Halls ■ Booth Number: Middle Exhibition Hall, Booth 124 ■ Address: 675 Ouchida, Kita-ku, Okayama City, 701-0165 ■ Access: Free shuttle bus from JR Sanyo Main Line Nakasho Station (approximately 15 minutes) ■ Admission Fee: Free (Pre-registration required) -------------------------------
- A breakout board ideal for evaluating and prototyping the IMBLE3h. - Easy to set up and verify communication when used in conjunction with a USB interface board.
- Communications
- A breakout board ideal for evaluating and prototyping IMBLE3. - Easy to configure and verify communication when used in conjunction with a USB interface board.
- Communications
Analysis software compatible with resource surveys that bring out the performance of AquaMagic.
- Software (middle, driver, security, etc.)
- Other measurement, recording and measuring instruments
- Other electronic measuring instruments