Application Security
vulnerabilities identification and remediation software.
-
product
Application software
The measurement equipment is controled by connected PC, and make it easy operation to analyze and management of measured data.
-
product
An Alternative To LN2 And Or CO2 In Many Applications
ThermalAir TC-100 Air Conditioned Chiller
The MPI ThermalAir TC-100 is a high capacity thermal air chilling system used for localized ambient temperature testing by providing continuous -80 Clean Dry Air at the output with a flow of up to 24 SCFM.
-
product
High-Level Application Development Kit
dVeloper
dVeloper Foundation SDK is a high-level application development kit that includes libraries for image acquisition, camera and I/O control, and real-time image processing. It is a comprehensive set of optimized functions designed specifically for all dPict Imaging hardware products, providing for easy porting across any hardware or application. dVeloper Foundation SDK comes with extensive samples and documentation to for quick and easy application development.
-
product
ARINC 429 Simulator & Analyzer Applications Software
F-SIM-A429
Avionics Interface Technologies
Software GUI Application for Operating AIT ARINC 429 InterfacesCapture & Analyze Data from Multiple ARINC 429 Input ChannelsDefine & Execute Complex Simulations of Multiple Rate-Oriented Labels - Simulate Output Data on Multiple Channels Simultaneously - Replay Previously Captured Bus Data - Full Error Injection & Detection - Update, Modify, & View ARINC 429 Data on-the-fly - Engineering Unit Displays & Software Widgets - Receive Data to Label/SDI Specific Buffers - Also Supports MIL-STD-1553, ARINC 664, Ethernet, & Data Load operations
-
product
Mobile Application Penetration Testing
A Mobile application is an application that runs on mobile devices. It has become a dominant and popular business tool today. Corporates are empowering mobile devices by offering more and more services on mobile and handheld devices. Unfortunately, mobile devices like notebook computers, PDAs, Pocket PCs, smartphones, and BlackBerrys are all attractive targets for malicious attackers. By accessing your corporate network via email, VPNs, and other means of remote access, a successful compromise can result in the exposure of Personally Identifiable Information, corporate secrets, customer data, and additional sensitive information.
-
product
L4-7 Application Performance Testing of Virtualized Compute and Network Elements
IxLoad VE
Keysight Network Applications and Security
IxLoad VE supports complete functional and performance testing of virtualized servers and 10GbE[LE1] converged network adapters (CNAs) for cloud computing environments. Using Ixia Virtual Load Modules, IxLoad VE is able to test a host of virtualized assets, including firewalls, deep packet inspection (DPI) devices, load balancers, and other network devices.
-
product
ESPI Analysis Application
TP601010
First released by Intel in June 2013, the Enhanced Serial Peripheral Interface (“eSPI”) is designed as a replacement for the Low Pin Count (“LPC”) bus. eSPI supports communication between Embedded Controller (EC), Baseboard Management Controller (BMC), Super-I/O (SIO) and Port-80 debug cards. eSPI was available in the Sky Lake chipset (2015) and is available in the Kaby Lake [current] chipset. Cannonlake will support eSPI and is slated for release the second half of 2017. Icelake is scheduled for release in 2019 and it will mark the first chipset when eSPI becomes mandatory.
-
product
Seals And Harnesses For Testing Applications
R&J’s seals are molded, not machined, so we can guarantee the quality of each and every seal that leaves our manufacturing facility. Molded seals are ideal to assure longer performance on the job reducing downtime and resulting in increased production as well as time and cost reduction.Tooling charges are held to an absolute minimum, or even eliminated, because we carry a large inventory of molds. When we build a mold for the seal you need, we re-use the mold on all future orders. This eliminates the problems normally associated with the high-cost of using the high quality, molded seals that we provide.
-
product
Application Gauging
Bowers Group offers a range of both standard and bespoke measurement solutions for a variety of gauging applications. As the world’s leading bore gauge manufacturer, our application heads can be fitted directly onto our XT range of internal micrometers to create a flexible, modular measuring system. Whether you’re measuring threads, grooves, splines, sphericals, or deep holes, we have a standard solution to suit. If you’re looking for something completely bespoke, our team has the skills and expertise to solve your measurement problem.
-
product
NVIDIA GPU And Intel® Xeon® AI Computing Platform For Autonomous Drive Applications
AVA-3510
The AVA-3510 Series is powered by an Intel® Xeon® E processor coupled with workstation-grade Intel®C246 chipset to support up to 64 GB ECC DDR4 memory. The system incorporates one 2.5" SSD 256G for easy installation as optional accessories for fast read/write performance.
-
product
Power Amplifier For Real-Time Dynamic Simulation(RTDS) Application
As the first power amplifier manufacturer in China, PONOVO has been offering various power amplifier products for customers in China and other countries since 2001. PONOVO has launched both conventional power amplifier for power system use and also 4-Quadrant power amplifier for more filed application, such as microgrid, windfarm, PV, HVDC, areospace, battery simulation, etc.
-
product
DDR5 Receiver Conformance and Characterization Test Application
M80885RCA
DDR5 Receiver Conformance and Characterization Test Application.
-
product
CCTV Security Testers
CCTV Security Tester is a kind of multi-function test tool for CCTV and security camera installation professionals. CCTV Camera Tester is developed aiming to CCTV security system installation and maintenance, combining the following function: Optical Fiber Communication test, low power circuit test, video test and PTZ control, and DC12 1A output for camera test, etc. Helps solving varies problem of security system. It could be also used in laboratory tests, equipment maintenance, etc. CCTV Tester is really an ideal multi-function instrument for CCTV Security System, Optical Fiberal Communication, CATV and other optical fiber networks.
-
product
Rectifier Assemblies for Crane Applications
CEHCO manufactures Transformer Rectifier Assemblies for Crane Applications. We offer standard products and customized solutions.
-
product
In-Circuit Test Applications
With decades of experience developing test fixtures, we are the recognized industry leaders for solid and reliable quality as well as our outstanding customer service. We fully support our products locally and worldwide for maintenance, repair, and ECO work. Also, 100% wiring verification is part of our Quality Control process, by utilizing automated verification machines for GenRad/Teradyne and HP/Agilent fixture.
-
product
Mobile Application Testing
Mobile compatibility testing covers aspects of platform fragmentation, physical characteristics, and the App Store review guidelines.
-
product
Application Migration & Mobilization
When migrating your apps, there are many options: ASP.NET to HTML5; Windows Forms to WPF; desktop or web to mobile; native vs. Web vs. hybrid, and more. Infragistics helps you make solid decisions about platforms, devices, frameworks, and best practices by bringing our invaluable experience in going mobile and moving your applications to new technology. Together, we’ll create a customized solution suited to your users’ evolving needs.
-
product
Application Software
Application software is a key element of a premium measurement system. Applying this software approach to a broad range of radiation detector hardware and data acquisition systems, ORTEC software offers comprehensive nuclear measurement solutions that provide integrated hardware control, analysis, and display in a single, easy-to-use package.
-
product
Secure Flexible and Automated Hybrid Cloud Infrastructure
KnackStack
KnackStack introduces flexible and automated hybrid cloud infrastructure as a service for cloud agnostic deployments and automation. It's designed for the U.S. nation's most secure applications to automate data management and security.
-
product
Quantum-Safe Security
CN4000 Series
The CN4000 series are the ideal optimized, high-performance encryptors for Small to Medium Enterprises (SME). They also enable an ideal cost effective “encrypt everywhere” solution for Large Enterprises. Despite their small form-factor, the CN4000 Series encryptors have the same robust security credentials as the rack-mounted models.
-
product
Radar level sensors: applications & products
Our radar level sensors offer reliable, fast level measurement with micrometer-level accuracy. This opens up new applications for level measurement – for example, in the level control of molten steel or aluminum for the metal industry or in the high-precision flow measurement of bulk material on conveyor belts for the mining industry.
-
product
Special Application Transformers
Special Application Transformers are available in maintenance-friendly designs with high reliability and minimum losses. These transformers can easily withstand the harshest weather and other conditions to meet the exact demands of power and other industrial applications. They are widely used in different sectors from mining, steel manufacturing, offshore oil, electrolysis to gas platforms. They are easy to install and remove transformers available with highly efficient design to ensure maximum performance.
-
product
Virtualized Security Resilience Testing
BreakingPoint VE
Keysight Network Applications and Security
Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.
-
product
Network and Application Monitoring
IxChariot
Instant performance assessment of complex networks from pre- to post-deployment
-
product
High-Accuracy Sensors For Complex, Real-World Applications
Are you building a system that needs to measure real-world data accurately and reliably to make intelligent, real-time decisions? Our large portfolio of sensors measure data from the analog world and deliver it to the digital world. These sensors feature high-accuracy, low-power performance, real-time protection, robust interfaces and compact packages to satisfy the requirements of industrial, automotive, consumer, data center and communications applications. Their high accuracy makes them an excellent choice for high-precision applications, while their small packages and low power consumption make them ideal for hand-held or battery-powered devices. Explore our different types of sensors to find the most cost-effective and space-saving option to suit your specific design requirements.
-
product
Cryogenic Lab Applications
Lake Shore products are used in a large variety of applications. Find your application here to see the recommended products.
-
product
Compact Edge AI Platform For Various AI And AMR Applications
DLAP-411-Orin
ADLNK DLAP-411-Orin Edge AI Inference Platform powered by NVIDIA® Jetson AGX Orin™ is a high-performance platform designed for deployment of AI-powered systems at the edge, providing the computing power needed for demanding AI applications.
-
product
Electronic Tensile Strength Tester Pull Force Test Chamber Applicable Industri
Shenzhen Chuangxin Instruments Co., Ltd.
This machine can test various materials (both finished and semi-finished products ) of tensile strength ,compressive strength and elongation ,can do stripping ,tear strength ,flexural ,compression test and etc. It can connect up to the computer and display or printout the test times , test value , max. value , etc . Also it can make various report forms according to the requirements .
-
product
Cyber Security Training
Elbit Systems of America's comprehensive attack scenario library reflects the most recent threat landscape. Our cyber security experts continuously update training scenarios with newly discovered attacks and tactics. Versatile network settings and attack scenarios equip cyber security teams with customized training specific to each team's organization.





























