Page: 1 2 3 Next

Parts by Number for Secure Communications Top

Part # Distributor Manufacturer Product Category Description
CC-EVB-SECURE Digi-Key Copeland Communications Inc Programmers, Development Systems KIT EVAL WORLD MODEM SECURE
dsPIC33FJ128MC804 Microchip Technology, Inc. Microchip Technology, Inc. Not Provided to ±16-bit shifts for up to 40-bit data. On-Chip Flash and SRAM: . Flash program memory. . Data SRAM. . Boot, Secure, and General Security for program Flash. Direct Memory Access (DMA): . 8-channel hardware DMA. . Up to 2 Kbytes dual ported DMA buffer area (DMA RAM) to store data transferred...
dsPIC33FJ128MC802 Microchip Technology, Inc. Microchip Technology, Inc. Not Provided to ±16-bit shifts for up to 40-bit data. On-Chip Flash and SRAM: . Flash program memory. . Data SRAM. . Boot, Secure, and General Security for program Flash. Direct Memory Access (DMA): . 8-channel hardware DMA. . Up to 2 Kbytes dual ported DMA buffer area (DMA RAM) to store data transferred...
dsPIC33FJ64MC802 Microchip Technology, Inc. Microchip Technology, Inc. Not Provided to ±16-bit shifts for up to 40-bit data. On-Chip Flash and SRAM: . Flash program memory. . Data SRAM. . Boot, Secure, and General Security for program Flash. Direct Memory Access (DMA): . 8-channel hardware DMA. . Up to 2 Kbytes dual ported DMA buffer area (DMA RAM) to store data transferred...
PV-5000-DEV Automationdirect.com Not Provided Software Products / Point of View SCADA -z- HMI Software Point of View SCADA/HMI software, development only package, 5000 tags. Software includes (1) 5000-tag development license, (1) Web thin client license, (1) secure viewer thin client license, (1) mobile thin client license and support for (10) simultaneous active communications drivers; limited...
PV-1000-DEV Automationdirect.com Not Provided Software Products / Point of View SCADA -z- HMI Software Point of View SCADA/HMI software, development only package, 1000 tags. Software includes (1) 1000-tag development license, (1) Web thin client license, (1) secure viewer thin client license, (1) mobile thin client license and support for (3) simultaneous active communications drivers; limited...
More >>

Conduct Research Top

  • Wireless and secure
    A secure, wireless ultrawideband (UWB) data-communication network could help monitor U.S. Air Force bases and DOE nuclear facilities as well as control remotely operated weapon systems, say developers at Sandia National Laboratories, Time Domain Corp., Huntsville, Ala., and KoolSpan Inc., North
  • Secure Data Communication at Port of Rotterdam
    A customer case study. mGuard_CaseStudy_Final Customer Case Study. Secure Data Communication at Port of Rotterdam. Eliminates Risk of Tampering. Customer Profile. Challenge: A Lack of Communication. With 655 acres of company premises, 2.2 miles of waterfront,. Loading and unloading
  • US Navy Demonstrates VoIP with Tenors for Secure Ship-to-Shore Communications
    ) voice network connections in favor of the converged transport of both voice and data communications over a more economical common IP-based satellite link. Thus, the Quintum Tenor VoIP MultiPath switching platform is an effective solution for implementing highly efficient secure ship-to-shore voice
  • Secure Learning RKE Systems Using Encoders
    to the system. On the other hand, a well-designed learning system should notreduce the security level of the basic code-hopping system at all. Secure Learning RKE Systems Using KeeLoq Encoders. TB001. Technical Brief. Secure Learning RKE Systems Using K. ¨. EELOQ. Encoders. Author: Chris R. Burger
  • Secure Power with Next Generation SPDUs (.pdf)
    Leach Tech Report.indd Secure Power With. Next-Generation. SPDUs. Computer-controlled advances. in avionics, such as fly by wire,. along with added onboard elec-. trical features, including in-seat,. passenger entertainment sys-. tems, are boosting electrical. demand on board aircraft. Stan-. dard
  • Secure optical communication system utilizing deformable MEMS mirrors
    Voice communication in free space was demonstrated at ranges larger than 200 meters. A new retro-reflector design, incorporating more modulated mirrors had been constructed. This configuration was built and tested. Its performance and advantages as compared to the single mirror retro-reflector
  • White Paper: Secure Remote Monitoring of the Critical System Infrastructure
    with particular focus on network. security. ��. An Application Note from the. Experts in Business-Critical. Continuity. Secure Remote Monitoring of the Critical. System Infrastructure. TABLE OF CONTENTS. Introduction
  • Embedded Computers for Integrated Railway Communication
    . Industrial Wireless LAN. Single-Radio Wireless AP/Bridge/Client. Dual-Radio Wireless AP/Bridge/Client. Industrial Cellular. Industrial Cellular Routers. Industrial Cellular Gateways. Industrial Cellular Modems. Specialized by Market. Rail. Power Substations. Industrial Secure Routers. Industrial

More Information on: Secure Communications Top

Lock Indicates content that may require registration and/or purchase. Powered by IHS Goldfire