List of Embedded Systems products
- classification:Embedded Systems
3826~3870 item / All 11515 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Small Zynq board. Ideal for AI, IoT, and edge computing.
- Embedded Board Computers
World's smallest class Zynq FPGA board 'ADZBT1'
- Embedded Board Computers
Streamline on-site reporting smartly! Turn your smartphone into a data HUB for field operations.
- Embedded applications for mobile phones and PDAs
"We will exhibit at the Mansion Comprehensive EXPO 2024" G-Smart Co., Ltd.
The "Mansion Comprehensive EXPO 2024" is a comprehensive exhibition organized by the BREX Executive Committee, focusing on the latest products and services related to the "construction, management, and maintenance" of condominiums in the housing, architecture, and real estate sectors. For those struggling with reporting tasks, we will provide demonstrations and the latest information on "Smart Attack" at our exhibition booth. ★★★ Points ★★★ 1. Renewal Version Launch: Smart Attack V3 The renewed version will debut in 2024! You can see the even more user-friendly Smart Attack in a demonstration. 2. Disaster Risk Management: Smart Attack Guardian A service that automatically issues business instructions based on information released by the Japan Meteorological Agency! We will introduce its applications in condominium management operations. ★★★ Exhibition Information ★★★ Dates: May 30 (Thursday) to May 31 (Friday), 2024, 10:00 AM to 5:00 PM Venue: Tokyo Big Sight (Ariake, Tokyo International Exhibition Center) West Exhibition Hall 2 Booth Number: B12-32 *We will participate in a special lecture seminar. For more details, please refer to the related links below.↓↓ All of us at the company look forward to your visit.
Performance and functionality that exceed expectations in various settings! New system-compliant machine.
- Communications
A must-see for Access users! Achieve the creation of forms and more using definition information.
- Development support tools (ICE, emulators, debuggers, etc.)
Boardcon Technology in China has developed a system-on-module (SoM) suitable for embedding in ARM-based industrial and commercial equipment.
- Embedded Board Computers
Introducing a wide range of products including lighting equipment and measurement devices from Image Engineering, as well as test charts and analysis software!
- Other lighting equipment
- Other measurement, recording and measuring instruments
- Software (middle, driver, security, etc.)
The VIA ARTiGO A5000 system can streamline the development of smart industrial IoT systems with high power efficiency and performance.
- Embedded Board Computers
Transforming field surveys with DX! The damage recording system Surveynote revolutionizes field surveys by changing handwritten field notebooks to iPads.
- Software (middle, driver, security, etc.)
Remote management software for all edge devices.
- Software (middle, driver, security, etc.)
ADLINK releases EdgeGO, remote management software for all edge devices.
● Efficient Edge Device Management: ADLINK's EdgeGO provides an all-in-one software solution for the remote and secure management of edge devices across various industries. ● Improved Operational Efficiency: Real-time alerts, remote troubleshooting, and comprehensive device monitoring enable efficient and secure operations. ● Optimized for Various Fields: EdgeGO caters to sectors such as manufacturing, smart cities, healthcare, and retail, ensuring optimal performance and device management.
Register the program key for AutoCAD and Excel as a shortcut!
- Other embedded systems (software and hardware)
Introduced for fashion apparel POS systems. Adopted as a keyboard for POS registers that pursues convenience over touch panel systems!
- Other embedded systems (software and hardware)
No OS shutdown required, equipped with "Power Cut Protect®" feature, slim embedded box computer BX-T210 with a thickness of approximately 30mm.
- Industrial PCs
- Embedded Board Computers
- controller
[Exhibition Report] Japan IT Week "26th Embedded/Edge Computing Expo Spring"
Contec exhibited at Japan IT Week "26th Embedded/Edge Computing Expo Spring" held from April 5 to 7, 2023. We sincerely thank everyone who visited our booth. To provide a simulated experience of visiting our exhibition booth, we have prepared report videos of each section by our staff and a 3D virtual booth. Please take a look.
Power of desktop PCs for industrial applications! Box computer equipped with Xeon processors and high expandability.
- Industrial PCs
- Embedded Board Computers
- controller
[Exhibition Report] Japan IT Week "26th Embedded/Edge Computing Expo Spring"
Contec exhibited at Japan IT Week "26th Embedded/Edge Computing Expo Spring" held from April 5 to 7, 2023. We sincerely thank everyone who visited our booth. To provide a simulated experience of visiting our exhibition booth, we have prepared report videos of each section by our staff and a 3D virtual booth. Please take a look.
Micro-ATX with Intel Raptor Lake/Alder Lake processors and Q670 chipset
- Embedded Board Computers
Thin Mini-ITX motherboard equipped with Intel Alder Lake N processor
- Embedded Board Computers
AAEON Industrial 3.5-inch Standard Single Board Computer equipped with Intel Alder Lake-N series.
- Embedded Board Computers
AAEON Intel Alder Lake-N Series Equipped Industrial 3.5-Inch Standard Single Board Computer [GENE-ADN6]
Features ● Equipped with Intel(R) Core i3-N305/N50/N97 processor ● DDR5 4800 MHz Dual Channel SODIMM x 1 (up to 32GB) (sold separately) ● HDMI 1.4 x 1, VGA x 1, LVDS x 1 ● 2.5GbE x 3, SATA 6.0Gb/s x 1, DIO x 8bit ● USB 3.2 Gen2 x 2 (Rear I/O), USB 2.0 x 4 (Pin header) ● RS-232/422/485 x 2, RS-232 x 2 ● Mini PCIe card x 1, M.2 E-Key 2230 x 1 (PCIe, USB 2.0), M.2 B-Key 3052 x 1 (USB 3.2, USB 2.0) ● TPM 2.0 compatible (only for some models) ● DC 9-36V / 12V
The power input voltage is 0.13V - 3V! Energy harvesting continues even when VIN drops to 130mV.
- Embedded Board Computers
Expansion module to add a digital output interface to the CPU unit of the CONPROSYS(R) nano series.
- Embedded Board Computers
- Communications
GIGA IPC 12th/13th/14th Generation CPU Compatible Industrial Mini ITX Motherboard with LGA1700 Socket
- Embedded Board Computers
GIGA IPC NUC specifications equipped with Intel N97 processor.
- Embedded Board Computers
GIGA IPC 12th/13th/14th Generation CPU Compatible Industrial Mini ITX Motherboard with LGA1700 Socket 【QBi-N97A】
Features ● Supports 12th/13th/14th generation CPUs with LGA1700 socket, compatible with H610 chipset ● DDR5 4800MHz SO-DIMM x 2 (up to 64GB) (sold separately) ● 2.5GbE LAN port x 1, GbE LAN port x 1 ● SATA 6Gb/s ports x 2 ● HDMI, DP, VGA, LVDS ● RS-232/422/485 & RI/5V/12V x 1, RS-232/422/485 x 1
Aiming to reduce the burden on the IT department! Posting about "the benefits of an integrated monitoring approach" and more.
- Software (middle, driver, security, etc.)
Active Directory Monitoring: Reasons and Methods
Active Directory (AD), which is a crucial part of the network, can be considered a lifeline, especially in terms of user and ID management. Many companies position AD as a core directory service, enabling them to identify, track, and manage users and IT assets appropriately. All these IDs are stored in Active Directory, and IT assets are logged. Through this directory data, it is possible to identify breaches and abnormal behavior; however, if Active Directory is not monitored, malicious actors may go unnoticed when they begin to infiltrate the network. You can find more details in the related links below.
Accurately grasp what is happening on the network! It is necessary to monitor and manage it rigorously.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Ensure high resilience! Manage high-performance and scalable application delivery.
- Other embedded systems (software and hardware)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Easily automate workflows! Software that detects compliance risks.
- Software (middle, driver, security, etc.)
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
Industry-leading Managed File Transfer (MFT) software
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
We are releasing case studies on measures against cyber attacks that have resolved bottlenecks in network security!
- Software (middle, driver, security, etc.)
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
Published case studies of measures against cyber attacks that solved issues in the security operations department and the network operations department.
- Software (middle, driver, security, etc.)
Secure file transfer: Protection of personal identifiable information
In this blog, I would like to discuss personal identifiable information and its protection. First, how is personal identifiable information recognized? The U.S. Federal Government's General Services Administration defines PII as information that can be used to identify or track an individual, either on its own or in combination with other personal information or identifiers linked to a specific individual, and states that specific risks associated with identifying individuals must be assessed on a case-by-case basis. It also points out the importance of recognizing that when additional information is made public, non-PII can become PII. You can find more details about the blog in the related links below.
Publication of case studies on reliable network monitoring and countermeasures against cyber attacks detected in a university environment.
- Software (middle, driver, security, etc.)
Progress's WhatsUp Gold has been named a leader in the G2 Network Monitoring Tools Report.
When it comes to product evaluation, you might imagine observing the product's performance in a lab or office setting, but G2 Software Reviews are not of that kind. G2's reviews are based on evaluations from actual users who regularly use the tools. It is not theoretical; being chosen as a leader in the G2 Grid report (Network Monitoring) based on candid feedback from specific users is a great honor. This is the result of evaluations from 130 customers who use Progress's WhatsUp Gold. You can find more details in the related links below.
Industrial mesh intercoms that connect people, for improving efficiency and safety in the workplace.
- Communications
We develop smartphone applications tailored to your business and needs.
- Embedded applications for mobile phones and PDAs
We handle complex marketing activities, allowing you to focus on negotiations.
- Embedded system design service
Providing customers with peace of mind, excitement, and satisfaction! A civil engineering estimation system that enables more accurate calculations for faster and more precise bidding.
- Software (middle, driver, security, etc.)
Information on the equipment configuration and specifications of our products, as well as a list of virtual devices, is published!
- Development support tools (ICE, emulators, debuggers, etc.)
Developing DJ equipment embedded programs and identification software for banknote recognition devices!
- Software (middle, driver, security, etc.)
- Other embedded systems (software and hardware)
Equipped with the low power consumption floating-point DSP TMS320C6745! Size is 100mm x 75mm.
- Embedded Board Computers
Experience in the development of pressure sensor processing devices, FM demodulators, LCD signal extension drive circuits, and more!
- Leak Testing Equipment
- Other embedded systems (software and hardware)
Simple operation and streamlined functions! It can be used efficiently even in laboratories that handle large-scale processing.
- Software (middle, driver, security, etc.)
(Benefits of upgrading to Bluehill Universal software from the old software for users)
This is a webinar for customers using the old Instron software (Bluehill 1, Bluehill 2, Bluehill 3, Bluehill LE). We will confirm the current software lifecycle stage for customers and explain the benefits of upgrading to the latest software, Bluehill Universal. Please feel free to join us. 【Seminar Content】 - Current status and risks of the software/PC you are using - Features of Bluehill Universal - Changes from the old software - (Demo) Representative functions of the software - FAQ 【Target Audience for the Seminar】 - Those using Bluehill Lite, LE, 1, 2, or 3 old software - Those using PCs with Windows 7 or earlier - Those considering updating to the latest software - Those who want to know about new features of the latest software - Those interested in touch panel PCs (dashboard/Windows 10 compatible) 【Presenter】 Shinpei Yamashita, Sales Specialist, Instron Japan 【Participation Fee】 Free 【Question Format】 Chat (always available)
We will solve the business challenges faced by our customers with ODS-made business tablets.
- Integrated operation management
- Embedded Board Computers
- Industrial PCs
Desktop industrial PC using industrial-grade components, ideal for applications requiring performance in harsh factory environments such as image inspection and AGV control.
- Industrial PCs
- Embedded Board Computers
- Desktop PC
Equipped with Trellix whitelist-type security software as standard. A palm-sized embedded PC for IoT edge computing.
- Industrial PCs
- Embedded Board Computers
- controller
Supports power-off operation without shutdown. A new model has been added to the IoT Edge controller "CPS-BXC200 series."
Contec has newly added two models equipped with the "Power Cut Protect(TM)" function, which supports operation without shutdown, as a standard feature in the IoT Edge controller "CPS-BXC200 series," and started sales on June 29, 2021. The palm-sized, highly expandable IoT Edge controller "CPS-BXC200 series" has been developed into a total of eight models as IoT devices for edge computing, including models pre-installed with McAfee whitelist antivirus software and models compatible with the Edgecross platform. With the addition of the two new models featuring the "Power Cut Protect(TM)" function, the lineup now consists of a total of ten models.
The number of channels available for use with simple wireless amplification increases! Important notes and explanations are also provided.
- Communications
High sound quality, multifunctional, and high operability! Also supports Bluetooth data communication.
- Communications
Stress-free high-speed scanning even with multiple channels! Easy to use, slim and compact.
- Communications