List of Embedded Systems products
- classification:Embedded Systems
6616~6660 item / All 11515 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Hybrid cable for signal and power, consisting of PVC insulation and a black PUR outer sheath!
- Communications
Consolidate each cable into the master cable! Hybrid cable for signals and power.
- Communications
Introducing the crimping tool for RJ45 connector CAT.5 Stewart SS37, designed for RJ plugs!
- Communications
Ideal for cross-sectional area! Introduction of an Ethernet data communication system with a core wire insulation of approximately 0.9 to 1.0 mm.
- Communications
Easy local assembly with IDC quick connection technology! No special tools required for cable connections.
- Communications
Achieving reliability of SD cards for industrial equipment with onboard storage!
- Memory
- Other embedded systems (software and hardware)
- Memory
Designed for wall mounting on the front/back! Suitable for connecting enclosures and cabinets.
- Communications
Ideal for CANopen/DeviceNet applications! A flexible connection solution with plug and play.
- Communications
Guarantees protection against corrosion! Supports quick and easy local assembly and the creation of cables of any length!
- Communications
Safe for outdoor use due to high protection rating! Prevents incorrect connections with M12 T-coding.
- Communications
Quick and easy error tracking! We offer a lineup of M8Y and M12Y branches.
- Communications
Space-saving due to compact design! Shielded sensor cable couplers are also available.
- Communications
Achieves synchronization between the in-car CID and Android/iOS smartphones via wireless connection using Bluetooth or Wi-Fi, or wired connection via USB.
- Software (middle, driver, security, etc.)
- Communications
- Embedded system design service
High flexibility due to the expansion of the cable clamp range! Suitable for environments with strict EMC requirements.
- Communications
CANopen/DeviceNet applications! Space-saving bus connector through compact design.
- Communications
Ideal for industrial applications! Bus connectors that utilize cost-effective bus system terminals.
- Communications
It is possible to create cables of any length! Cost-effective and rational wiring for bus installations.
- Communications
High EMC performance due to metal housing! Built-in termination resistance can be switched.
- Communications
Applicable to mechanical engineering and plant engineering! Flexible connection solutions through plug and play.
- Communications
Quick and easy local assembly is possible! Cost-effective and rational wiring for bus installation.
- Communications
To mechanical engineering and plant engineering! M12T branch connector with shield.
- Communications
Connector that responds to strong mechanical stress! Achieves high cost-effectiveness through rapid installation.
- Communications
It is also possible to operate the switch when the connector is plugged in and the settings are clearly visible!
- Communications
It is suitable for use in intrinsically safe explosion-proof circuits in Zone 2 areas with the risk of explosion!
- Communications
Compatible with strict EMC requirements! Achieves high cost-effectiveness through rapid installation.
- Communications
No loose parts! New innovative insulated displacement terminals suitable for single wires and flexible conductors.
- Communications
Identify security vulnerabilities in source code! Reduce the risk of data leaks.
- Software (middle, driver, security, etc.)
- Other security
- Other services
We will identify vulnerabilities lurking in access management, authentication controls, and known configuration mistakes!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Attempt to attack the target application and uncover hidden vulnerabilities!
- Software (middle, driver, security, etc.)
- Other security
- Other services
Identifying vulnerabilities that have a significant impact on business! We deliver high-value test results.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Two depths are available! You can choose the appropriate test level according to your risk profile.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Reduce the risk of data leaks! We have resources that can quickly respond to changes in scale.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Support for compliance with security and regulations! Experience immersive continuous learning.
- Software (middle, driver, security, etc.)
- Other security
- Distance learning/E-learning
Addressing software risks lurking in various places! Accelerating the delivery of secure and high-quality code.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Total support for application security from development to deployment!
- Software (middle, driver, security, etc.)
- Other security
Manage all test execution, policy application, prioritization of issues, and filtering!
- Software (middle, driver, security, etc.)
- Other security
Establish security and compliance as part of the normal business process!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
You can quickly identify and fix critical security and quality issues while coding!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Introducing a solution to detect and fix security vulnerabilities during coding!
- Software (middle, driver, security, etc.)
- Other security
Diagnosing software risks throughout the SDLC with a single record system for AppSec data!
- Software (middle, driver, security, etc.)
- Other security
We enable comprehensive open-source risk management regardless of your company's size or budget!
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify software security vulnerabilities! This enables informed and reliable decision-making based on information.
- Software (middle, driver, security, etc.)
- Other security
- Other services
Manage risks related to security, licensing, and code quality! Introduction to SCA solutions.
- Software (middle, driver, security, etc.)
- Other security
- Other analyses
Identify and exploit critical vulnerabilities for business to reduce the risk of leaks!
- Software (middle, driver, security, etc.)
- Other security
The tablet admin for kitting is an RPA tool that automates the initial setup of Android smartphones and tablets.
- Software (middle, driver, security, etc.)