Page: 1 2 3 Next

Parts by Number Top

Part # Distributor Manufacturer Product Category Description
CC-EVB-SECURE National Microchip Copeland Communications Inc Not Provided KIT EVAL WORLD MODEM SECURE
dsPIC33FJ128MC802 Microchip Technology, Inc. Microchip Technology, Inc. Not Provided to ±16-bit shifts for up to 40-bit data. On-Chip Flash and SRAM: . Flash program memory. . Data SRAM. . Boot, Secure, and General Security for program Flash. Direct Memory Access (DMA): . 8-channel hardware DMA. . Up to 2 Kbytes dual ported DMA buffer area (DMA RAM) to store data transferred...
dsPIC33FJ64MC802 Microchip Technology, Inc. Microchip Technology, Inc. Not Provided to ±16-bit shifts for up to 40-bit data. On-Chip Flash and SRAM: . Flash program memory. . Data SRAM. . Boot, Secure, and General Security for program Flash. Direct Memory Access (DMA): . 8-channel hardware DMA. . Up to 2 Kbytes dual ported DMA buffer area (DMA RAM) to store data transferred...
dsPIC33FJ128MC202 Microchip Technology, Inc. Microchip Technology, Inc. Not Provided Flash and SRAM: . Flash program memory. . Data SRAM. . Boot, Secure, and General Security for program Flash. Direct Memory Access (DMA): . 8-channel hardware DMA. . Up to 2 Kbytes dual ported DMA buffer area (DMA RAM) to store data transferred via DMA: - Allows data transfer between RAM...
PV-5000-DEV Automationdirect.com Not Provided Software Products / Point of View SCADA -z- HMI Software Point of View SCADA/HMI software, development only package, 5000 tags. Software includes (1) 5000-tag development license, (1) Web thin client license, (1) secure viewer thin client license, (1) mobile thin client license and support for (10) simultaneous active communications drivers; limited...
More >>

Conduct Research Top

  • Wireless and secure
    A secure, wireless ultrawideband (UWB) data-communication network could help monitor U.S. Air Force bases and DOE nuclear facilities as well as control remotely operated weapon systems, say developers at Sandia National Laboratories, Time Domain Corp., Huntsville, Ala., and KoolSpan Inc., North
  • US Navy Demonstrates VoIP with Tenors for Secure Ship-to-Shore Communications
    ) voice network connections in favor of the converged transport of both voice and data communications over a more economical common IP-based satellite link. Thus, the Quintum Tenor VoIP MultiPath switching platform is an effective solution for implementing highly efficient secure ship-to-shore voice
  • Secure Data Communication at Port of Rotterdam
    A customer case study.
  • Secure optical communication system utilizing deformable MEMS mirrors
    Voice communication in free space was demonstrated at ranges larger than 200 meters. A new retro-reflector design, incorporating more modulated mirrors had been constructed. This configuration was built and tested. Its performance and advantages as compared to the single mirror retro-reflector
  • Rigid-Flex Medical Care Communication Handheld Device
    sensitive information, the communication system needed to be unfailingly secure. Neither the end customer, design house, nor contract manufacturer involved in the project had any experience with rigid-flex circuit design, so Epec was consulted for guidance on this component of the product.
  • Building a VoIP Network with Nortel's Multimedia Communication Server 5100
    Building a VoIP Network with Nortel's Multimedia Communication Server 5100. Learn how to design, build, secure, and maintain a cutting-edge converged network to satisfy all of your business requirements with help from this comprehensive guide.
  • Networking and Remote Communication on a Workstation-based Shaker Control System
    user interface attributes allow for secure. operation of the vibration control peripheral from nearly any type of workstation, X-termial,. or personal computer on the same network. Also discussed, are capabilities for remote. control and status communication with climatic chamber controllers
  • Smart Computing Article - Communication Breakdown
    August 2006 Vol.10 Issue 5 Add To My Personal Library Networks are the main reason that nearly every business has an IT department and for good reason. Networks are tricky to set up and even more difficult to secure. They stall out or work in fits and start for seemingly no reason. It s all

More Information Top

Lock Indicates content that may require registration and/or purchase. Powered by IHS Goldfire