iPROS Urban Planning
  • Search for products by classification category

    • Building Materials
      Building Materials
      35536items
    • Facilities
      Facilities
      56658items
    • Lighting and Interior
      Lighting and Interior
      17273items
    • Common materials
      Common materials
      37010items
    • Civil Engineering Materials
      Civil Engineering Materials
      9535items
    • Construction, work and methods
      Construction, work and methods
      27653items
    • Surveys, Measurements, and Services
      Surveys, Measurements, and Services
      30352items
    • IT/Software
      IT/Software
      31890items
    • others
      others
      84581items
    • Store and facility supplies
      Store and facility supplies
      4358items
    • Office and commercial supplies
      Office and commercial supplies
      11463items
    • Hospital and welfare facility supplies
      Hospital and welfare facility supplies
      952items
    • Logistics Equipment
      Logistics Equipment
      7378items
    • Energy and Resources
      Energy and Resources
      11606items
  • Search for companies by industry

    • Information and Communications
      7198
    • others
      6981
    • Building materials, supplies and fixtures manufacturers
      6683
    • Service Industry
      4607
    • Trading company/Wholesale
      2996
    • Other construction industries
      2455
    • Electrical equipment construction business
      642
    • Interior Design
      528
    • Facility Design Office
      492
    • Construction Consultant
      464
    • Architectural design office
      361
    • retail
      345
    • Warehousing and transport related industries
      321
    • Electricity, Gas and Water Industry
      290
    • General contractors and subcontractors
      288
    • Interior construction business
      274
    • Medical and Welfare
      272
    • Educational and Research Institutions
      258
    • Building Management
      253
    • Renovation and home construction industry
      224
    • Water supply and drainage construction business
      204
    • Housing manufacturers and construction companies
      187
    • Transportation
      160
    • Real Estate Developers
      155
    • Fisheries, Agriculture and Forestry
      124
    • Structural Design Office
      66
    • Finance, securities and insurance
      35
    • Restaurants and accommodations
      29
    • self-employed
      29
    • Mining
      26
    • Public interest/special/independent administrative agency
      18
    • Police, Fire Department, Self-Defense Forces
      18
    • Store and building owners
      9
    • Property Owner
      8
    • Government
      8
    • Individual
      8
  • Special Features
  • Ranking

    • Overall Products Ranking
    • Overall Company Ranking
Search for Products
  • Search for products by classification category

  • Building Materials
  • Facilities
  • Lighting and Interior
  • Common materials
  • Civil Engineering Materials
  • Construction, work and methods
  • Surveys, Measurements, and Services
  • IT/Software
  • others
  • Store and facility supplies
  • Office and commercial supplies
  • Hospital and welfare facility supplies
  • Logistics Equipment
  • Energy and Resources
Search for Companies
  • Search for companies by industry

  • Information and Communications
  • others
  • Building materials, supplies and fixtures manufacturers
  • Service Industry
  • Trading company/Wholesale
  • Other construction industries
  • Electrical equipment construction business
  • Interior Design
  • Facility Design Office
  • Construction Consultant
  • Architectural design office
  • retail
  • Warehousing and transport related industries
  • Electricity, Gas and Water Industry
  • General contractors and subcontractors
  • Interior construction business
  • Medical and Welfare
  • Educational and Research Institutions
  • Building Management
  • Renovation and home construction industry
  • Water supply and drainage construction business
  • Housing manufacturers and construction companies
  • Transportation
  • Real Estate Developers
  • Fisheries, Agriculture and Forestry
  • Structural Design Office
  • Finance, securities and insurance
  • Restaurants and accommodations
  • self-employed
  • Mining
  • Public interest/special/independent administrative agency
  • Police, Fire Department, Self-Defense Forces
  • Store and building owners
  • Property Owner
  • Government
  • Individual
Special Features
Ranking
  • Overall Products Ranking
  • Overall Company Ranking
  • privacy policy
  • terms of service
  • About Us
  • Careers
  • Advertising
  1. Home
  2. Information and Communications
  3. 東光高岳
  4. Product/Service List
Information and Communications
  • Added to bookmarks

    Bookmarks list

    Bookmark has been removed

    Bookmarks list

    You can't add any more bookmarks

    By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

    Free membership registration

東光高岳

EstablishmentOctober 1, 2012
capital800000Ten thousand
addressTokyo/Koto-ku/8th Floor, Toyosu Prime Square, 5-6-36 Toyosu
phone03-6371-4466
  • Official site
last updated:Jan 22, 2024
東光高岳logo
  • Contact this company

    Contact Us Online
  • Company information
  • Products/Services(28)
  • catalog(2)
  • news(0)

東光高岳 List of Products and Services

  • category

1~28 item / All 28 items

Displayed results

class="retina-image"

Things Not Taught in School: Heap and Stack

Not taught in school! An introduction to heaps and stacks in a column.

When looking at programming books, compiler manuals, etc., terms like "heap area" and "stack area" come up. What exactly are these? In the embedded world, generally, the addresses and sizes of sections are determined at the time the program or OS is compiled, and the addresses or sizes of sections do not change during operation. In contrast, "heap area" and "stack area" refer to memory that is temporarily used within the program, and they typically belong to some part of a section in RAM. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Things Not Taught in School: When They Say It's DMA-Compatible (2)

Not taught in school! An introduction to the specific operation of DMA transfer in a column.

Using the USB controller as an example, I will explain the specific operation of DMA transfer. As an example, let's consider the case of writing to the built-in FIFO of a DMA slave-type USB controller using a general-purpose DMAC. Typically, the capacity of the FIFO built into the USB controller is not very large, generally around the size of two packets at most. *For detailed content of the column, you can view it from the related links. For more information, please feel free to contact us.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What You Won't Learn at School: When They Say It's DMA-Compatible (1)

Not taught in school! Introducing DMA in a column.

When we undertake software development on the customer's hardware, we often hear, "We want you to implement DMA support to improve transfer performance." What exactly does "DMA support" entail? I will explain the overview of DMA transfer, how to implement device drivers, and points to be cautious about. *For detailed content of the column, you can view it through the related links. For more information, please feel free to contact us.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"What They Don't Teach You at School: What is Security?" (3)

Not taught in schools! An introduction to cryptographic communication and cryptographic techniques for copyright protection in a column.

This time, let's talk about the technology that determines whether the data itself has been forged or tampered with. In addition to using public key cryptography to prove that "this is indeed a document written by the person," there is another method called a message digest. Another technology that has recently gained a lot of attention is cryptographic techniques for copyright protection. This includes scrambling in paid broadcasts and copy protection technologies for digital terrestrial television. This might actually be more familiar to us. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What they don't teach you at school: What is security? (1)

Not taught in school! An introduction to security and authentication in a column.

When it comes to security, many people might think of encryption. Indeed, we often hear stories about "encryption being broken," and there is a common misconception that increasing encryption strength equates to strong security. However, what is actually more important than whether or not to encrypt is "authentication." There is also a term similar to security, which is safety, and recently, concepts like functional safety and product safety have been gaining attention in Japan. What I will discuss next is the safety aspect of "security." Let's first consider the security system of an apartment building. *For more details on this column, you can view it through the related links. Please feel free to contact us for more information.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What they don't teach you at school: How to access devices.

Not taught in school! An introduction to the points to consider when developing device drivers in a column.

One of the major tasks in embedded systems is the development of programs (device drivers) that directly control hardware (devices). This is a field where experience speaks more than in application development, and since knowledge of hardware is indispensable, it may be said to be the essence of embedded systems in a sense. Even though we refer to "devices" in general, there are many devices surrounding the CPU these days. This means that we must develop a wide variety of device drivers. *For more detailed information, please refer to the related links. Feel free to contact us for more details.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What schools don't teach you: Cash is a double-edged sword.

Not taught in school! An introduction to cash in a column.

In the world of computers, you may have a general understanding of a technology called cache, which is used to speed up processing. Cache is used in various places, and applications typically do not need to be aware of its existence. This time, I will explain about "cache"! *You can view the detailed content of the column through the related links. For more information, please feel free to contact us.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What you won't be taught at school: When asked about code size.

Not taught in school! Introducing a column about code size.

When customers are considering embedded middleware products, a common question is, "What is the code size?" What should I answer when asked about "code size"? In this context, code size refers to "the amount of memory required to store the program" when the middleware product is embedded in the hardware. *For more details, you can view the related links. Please feel free to contact us for more information.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"Things that are not taught in school" An exception has occurred.

Not taught in schools! Introducing exceptions in the world of computers in a column.

Exceptions can occur when running software on a computer (CPU), not just in embedded devices. But what exactly is an "exception"? In the world of computers, an exception refers to a state where normal processing cannot continue. *For more detailed information, you can view the related links. Please feel free to contact us for more details.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What They Don't Teach You at School: Does Code Disappear? ~ The Trap of Optimization ~

Not taught in school! An introduction to the traps of compiler optimization in a column.

You know that compilers have optimization options, right? There are various types of optimizations, including those related to code size and those related to execution speed. However, sometimes compiler optimizations can cause issues, leading embedded software to malfunction. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Things Not Taught in School: Let's Try Breaking Memory

Not taught in school! An introduction to buffer overflow in a column.

You may have heard the news that "a security hole has been found," but do you know what it means? A security hole refers to a "gap in software" that can be exploited. Among these, the most common type is something called "buffer overflow." When a buffer overflow occurs, there is a risk that arbitrary code can be executed, making it a very dangerous vulnerability. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is a stack? (2)

Not taught in school! Introducing Stack Overflow in a column.

Let's start by explaining some important points regarding stack memory. In a multitasking environment, multiple tasks operate concurrently. This means that each task is executing separate functions independently. To achieve this, stack memory is allocated separately for each task. *For detailed information, you can view the related links. Please feel free to contact us for more details.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is a stack? (1)

Not taught in school! An introduction to stacks and functions in a column.

You may have heard a conversation like, "I took a day off from work yesterday because I caught a cold, so my work got stacked up." The term "stacked" means "to pile up," so it's relatively easy to visualize. However, in the embedded industry, it is used in the following ways: "The stack overflowed and caused an exception." "What should the stack size for this task be?" "Can't we get a stack trace?" ...It feels quite different. What do these phrases mean? *You can view the detailed content of the column through the related link. For more information, please feel free to contact us.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What schools don't teach: Multitasking

Not taught in school! Introducing a column on multitasking.

You've heard the term "multitasking," right? For example, it is used in a jargon-like way such as, "Performing development, design, and administrative tasks through multitasking" or "If you can handle customer support through multitasking, you're considered competent." Multitasking also plays a very important role when creating programs, but what exactly is multitasking in the first place? *You can view the detailed content of the column through the related link. For more information, please feel free to contact us.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is Endian that they don't teach you at school?

Not taught in school! An introduction to Endian in a column.

When looking at specifications for devices and software, the term "endian" often comes up. This time, I will explain what endian is and what precautions need to be taken when creating programs and circuit boards based on endian. In the embedded world, various CPUs are used depending on the application, so it is necessary to be aware of endian as well. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is Intel involved in this too, something that isn't taught in school?

Not taught in school! An introduction to CPUs in a column.

This time, let's talk about CPUs. In the world of computers, Intel CPUs like Pentium and Celeron are overwhelmingly famous, but in reality, there are many more types of CPUs. These types are referred to as CPU architectures, and in the current world of computers, they can be roughly divided into two categories: Intel-based and PowerPC-based. *For detailed content of the column, you can view it through the related links. For more information, please feel free to contact us.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Things that are not taught in school: Cannot use Printf()

Not taught in school! An introduction to Printf() in a column.

How does everyone debug the programs they create? Using printf() to display logs and check if the configuration values and sequences are as designed is the quickest method. However, in embedded development, it's not that easy to use printf(). First, there are cases where the function itself is not provided. For example, the specifications of the μITRON OS, which is very commonly used in Japan, do not include it. *You can view the detailed content of the column through the related links. For more information, please feel free to contact us.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Things Not Taught in School: Interrupts and Polling

Not taught in school! An introduction to interrupts and polling in a column.

It is not an exaggeration to say that current computer systems cannot be realized without "interrupts." In particular, programming that makes full use of "interrupts" is essential in embedded systems. This time, I would like to introduce what "interrupts" are, along with the contrasting method known as "polling." *For detailed content of the column, you can view it through the related links. For more information, please feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Things Not Taught in School: Let's Learn Binary and Hexadecimal!

Not taught in school! An introduction to binary and hexadecimal in a column.

In the world of embedded systems, being able to handle binary and hexadecimal numbers quickly and accurately is one of the very important skills. In various situations, the ability to instantly convert between binary, decimal, and hexadecimal is required. Making mistakes in this area can lead directly to bugs, and if you have to think about it every time, it won't work in a professional setting. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Toko Takadake Co., Ltd. Software Introduction

"Moving the present, creating the future." We will contribute to the realization of Society 5.0 with the edge technology we have cultivated so far.

Our company provides IoT solutions and software for embedded systems in various fields. The embedded system software "MatrixQuest Series" is a product developed from scratch based on standards/specifications. It offers functionalities centered around communication, such as USB (host/function), Wi-Fi, TCP/IP, file systems, and SD host drivers, and we also develop ECHONET Lite and OpenADR in-house. Additionally, with the cooperation of many partner companies, we offer a variety of products including the deep learning framework "KAIBER," embedded fonts "DynaFont," Bluetooth, and real-time operating systems. We also provide support for Wi-Fi certification, BlueZ, Bluedroid compatibility, wireless certification, and SIG certification acquisition.

  • Other Software
  • IoT
  • Vibration and Sound Level Meter

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

MatrixQuestWLAN/wpa 【WPA2 Supplicant】

【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Wireless LAN Connection Solution

Wireless LAN Connection Solution

"Compatible with various companies' wireless LAN modules" - Manufacturers with signed contracts: Qualcomm Infineon (formerly Cypress) NXP Semiconductors (formerly Marvell) RealTek Broadcom Airoha - Manufacturers scheduled to sign contracts*: MediaTek (can be contracted for individual projects) ROHM Others

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

USB 2.0 compatible function driver protocol stack

MatrixQuestUSB/func 【USB 2.0 compatible function driver protocol stack】

**Features** - Supports USB 2.0 HighSpeed - Supports control transfer, bulk transfer, and interrupt transfer - Complies with USB Interface Association Descriptor (IAD) and supports multiple interfaces (optional) - Supports the following class drivers: - MSC (BOT/SCSI) - CDC - RNDIS - SIC - MTP - Provides sample programs compatible with Microsoft Windows Hardware Compatibility Test (HCT 12.1 kit) - Achieves high portability by completely separating system-dependent parts - Easy debugging with a variety of logging functions *Also supports USB 3.0 functions*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FAT32 compatible file system

MatrixWuestFS/fat 【FAT32 compatible file system】

**Features** - Supports FAT12, FAT16, and FAT32 used in DOS, Windows 3.1, Windows 95/98/XP, and Windows 2000 - Can specify on a volume basis - Data exchange with Windows NT is possible using FAT12/16 - Compatible with VFAT and supports long file names. Supports Japanese file and directory names that include half-width katakana - Achieves optimal memory size through various configurations - Allows specification of cache size on a volume basis for FAT, directories, and data - Provides a normal file operation image from the application, excluding initialization and mounting processes - Supports removable media - Comes standard with logical format tools and DOS partition creation tools - Can be easily adapted for USB memory and other devices when used in combination with MatrixQuestUSB

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IPv6-compatible TCP/IP protocol stack

It is a TCP/IP protocol stack optimized for embedded applications.

**Features** - Compliance with major RFCs (Request for Comments) - Dual-stack structure for IPv4/v6 Can be implemented separately through configuration - IPv6 Ready Logo Phase 2 (Core, IPsec acquired, DHCPv6 planned for acquisition) - Compatible with DOD (U.S. Department of Defense) IPv6 Standard Profiles at the Simple Server level - Compact code size - High-speed design with minimized internal copies - Multi-homing capability - Configurable embedded protocols - Available for sale with IPv4 only - Standard attachment of IPsec - Support for IPsec accelerator (Renesas SH7672) - Multicast support - MIB-2 interface support

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

USB 1.1/2.0 compatible host driver

MatrixQuestUSB/host [USB 1.1/2.0 compatible host driver]

**Features** - Compliant with USB 2.0 - Allows star topology connections up to 6 levels through a HUB, enabling connection of 1 host and up to 127 targets - Supports a mix of high-speed (480Mbps), full-speed (12Mbps), and low-speed (1.5Mbps) connections - Supports control transfer, bulk transfer, interrupt transfer, and isochronous transfer - Supports root HUB driver - Compatible with hot plug and plug-and-play for connected devices - Provides standard class drivers for keyboard/mouse (HID), printers, and HUBs - Enables independent memory management from other applications - Allows dynamic registration of class drivers - Achieves high portability by completely isolating system-dependent parts - Facilitates debugging with a variety of logging functions *Also compatible with USB 3.0*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[SSL 3.0/TLS 1.2 compatible library]

Library for achieving security in embedded systems.

【Features】 - Compact size Designed for embedded use, achieving a very compact size unlike OpenSSL and others. - Support for cryptography Supports public key cryptographic algorithms and symmetric key cryptographic algorithms. Supports message digests. Supports X.509 format certificates. - Supports both server and client. - Support for connections via Proxy Allows connections through HTTP Proxy when using client functionality.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MatrixQuestWLAN/wps 【WPS Software】

MatrixQuestWLAN/wps 【WPS Software】

**Features** 1. Easy setup function for wireless LAN It allows for easy setup with APs that have obtained WPS certification, regardless of the manufacturer. 2. High portability Designed to facilitate combinations with various wireless LAN drivers. 3. Supports WPA/WPA2 (supplicant only) By combining with the proven separate product "MatrixQuestWLAN/wpa," WPS functionality is achieved. - Supports WPA-PSK/WPA2-PSK - Supports WPA-1X/WPA2-1X 4. Supports WPS (Enrollee) - EAP-TLS - EAP-PEAP 5. Supports both PIN code method and push button method 6. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support) - EAP-WSC

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Prev 1 Next
  • イプロスがリアル展示会を主催します! AI/DX 営業・マーケティング展 出展社募集中 リード数・商談数が止まらない!新しいリアル展示会を提供 会期 2026年3月24日(火)~25日(水) 会場 東京ビッグサイト東4ホール 出展概要資料を進呈!
    • Contact this company

      Contact Us Online

    Products

    • Search for Products

    Company

    • Search for Companies

    Special Features

    • Special Features

    Ranking

    • Overall Products Ranking
    • Overall Company Ranking

    support

    • site map
    IPROS
    • privacy policy Regarding external transmission of information
    • terms of service
    • About Us
    • Careers
    • Advertising
    COPYRIGHT © 2001-2025 IPROS CORPORATION ALL RIGHTS RESERVED.
    Please note that the English text on this page is automatically translated and may contain inaccuracies.