Something for the development, industry or for a smartphone? 320x240pix. or 160x120pix is sufficient? We will give you answers to the most frequently asked questions, parameter specifications, and specific product recommendations by the type of measurement.
WIZnet has just launched a new W7500 & W7500P-based Serial to Ethernet modules (S2E modules), which are pin-to-pin compatible with WIZnet’s existing S2E modules – WIZ1XX series.
The Fischer Elektronik series of aluminum enclosures excel in the competition with others. With its design, a wide range of sizes and shapes, but also thanks to its shock resistance...
The TEQ 300WIR meets the demanding requirements for quality, reliability and safety for use in railway applications. The TRACO Power converters of this series contribute to the creation of simple and reliable solutions.
Renowned German manufacturer optimizes the offer of preferred rocker switches.
Espressif designed and manufactured several WiFi/BT modules and development boards to help users evaluate functionality of the ESP32 family of chips. The chip itself and modules based on ESP32 chip gained huge popularity and the number of applications built on ESPRESSIF modules grow exponentially.
In cooperation with IQRF and IoT fans, we have prepared a webinar on the preparation of our own IoT solutions using IQRF technology on Wednesday, 28.3.2018
112L-TDA0 - reliable and cost-effective card socket with transfer capability of 312MB/s from ATTEND.
Sensirion SCD30 is a calibrated module with NDIR CO2, humidity and temperature sensors. Measuring of CO2 concentration and automatic ventilation on demand guarantees healthy workplace and even saves the energy.
Miniature, intelligent, 0.90“ RGB TFT display with a WiFi module for immediate use – that´s the IoD-09 series.
When it comes to human health and security, there is no time for errors and failures. Every component of medical grade system must be 100% safe and reliable.
Symmetric ciphers use the same secret key to encrypt and decrypt, and their security is based on confidentiality of this key. We can divide symmetric ciphers into block symmetric ciphers and stream symmetric ciphers.