| Sign In | Join Free | My burrillandco.com |
|
..., and they meet the EIA standards for 19" server racks. The fully enclosed, secure server cabinets range in size from 18U to 42U server racks, and they exceed OEM air flow requirements. Open frame ......
1U 19 inch rack data center enclosure with front tray 96 cores max with 4 pcs MPO cassette The 1U fixed type Rack provides secure transitions between MPO/MTP® and LC discrete connector interfaces. They are used...
1U patch panel data center enclosure without cover 96 cores max with 4 pcs MPO cassette The 1U fixed type Rack provides secure transitions between MPO/MTP® and LC discrete connector interfaces. They are used to...
...Secure Authenticator With 1-Wire SHA-256 And 4Kb User EEPROM Product Description Of DS28E25P DeepCover™ embedded security solutions cloak sensitive data under multiple layers of advanced physical security to...
...Data Rack 32U For CCTV Security Systems 1. Application This series cabinet is 1750mm High and 750mm Wide and 750mm Deep. For those who need more than just standard cabinet, this series can also offer a truly...
...Transmitter – Long-Range Secure Data Link for Drones Product Description The CD15Pro COFDM HD UAV Video Transmitter is designed for professional drone and UAV applications requiring stable, long-range, and s...
...Manpack Video Audio Data Transmitter for Other Security&Protection Product Transmitter MB33 Backpack Mesh Radio Specifications-v1.0_compr... Introduction: The MB33 IP MESH is designed for manpack wireless vi...
...Deliver Right Data to Your Right Tools NetTAP® NetInsight™ Network Visibility Management Background Cloud e-government network security system planning is mainly composed of the physical layer, resource laye...
...Data Capture and Distribution Visibility Management NetTAP® NetInsight™ Network Visibility Management Background Cloud e-government network security system planning is mainly composed of the physical layer, ...
...Security of Traffic Flow 1. Product Background The NetTAP® Network Packet Broker with Nework Traffic Analysis Visibility to Optimize Your Network, it is network data visualization control device developed by...
Secure and Encrypted Suntor CD05HPT UAV Data Link for Safe Communication CD05HPT Drone Video Transmitter & Receiver Specifi... 1. Introduction CD05HPT offers a bi-directional Data Link, enabling communication, ...
Data Audit Network Visibility Software Netinsight Analytics Defined Network NetTAP® NetInsight™ Network Visibility Management Background Cloud e-government network security system planning is mainly composed of...
... transmission technology, automatically uploads gas consumption data to the application platform, realizes remote monitoring of the use status of gas meters, and solves the problems of traditional gas meter ...
... transmission technology, automatically uploads gas consumption data to the application platform, realizes remote monitoring of the use status of gas meters, and solves the problems of traditional gas meter ...
... one-time programmable device. It is ideal for secure authentication and data storage applications. Features: * 8Mb storage capacity * 100-MHz SPI bus interface * One-time programmable * Low power consumptio...
W25X20CLSVIG Flash Memory Chips for Secured Data Storage High Speed Product Listing: W25X20CLSVIG Flash Memory Chips This product is a single-level cell (SLC) flash memory chip designed to store data in a non-v...
... from Microchip Technology Inc. This chip features 1K bits of memory and a 2-wire serial interface, making it ideal for nonvolatile storage of small amounts of data such as configuration settings,...
...chip from Atmel. This device is designed to provide reliable non-volatile storage of small amounts of data. It is ideal for applications requiring high endurance, such as automotive, industrial, and medical ...
... A2, it ensures smooth data transfer and efficient operation across various applications. Key Features Product Name: TF Memory Card Speed Class: C10, U3, ......
...Data Distortion. Refers to the distortion of some sensitive information through desensitization rules to achieve reliable protection of sensitive privacy data.When customer security data or some commercially...