Encoding Modules
This set of solutions is based on standard or custom-defined encoding algorithms, such as DSP functions, video codecs, encryption protocols, error-correcting mechanisms, etc.
Different bandwidth constraints as well as target application specifics define the basic interface nature of the encoding machine. Burst support, continuous processing requirements, latency and delay restrictions and finally the use of external memory elements and their size – all these factors result in module implementation scheme: on-demand, streaming or packetized encoding.
The main target of this solution is to convey the custom data over standard protocols to allow fast time to market with minimum implementation risks.
Video Processing & Connectivity
We have a vast knowledge and experience in implementing video channels as connection links and pre/co-processing OEM modules to more powerful customer video aggregation, analysis, compression and storage systems.
Such links are usually built of input interfaces getting the data from image sources of different types or standard video interfaces such as HDMI, eDP, pixel bus, FlatLink, etc.; image processor and finally the output interface to displays and data transport systems (HDMI, Ethernet, etc.).
We offer our expertise to “non-video-specialists” customers integrating video source and sink equipment and components in their end product (for example in medical equipment, smart cleantech products, new generation industrial automation, and many other segments increasingly using sensors for advanced features implementation).
Cyber Protection
Cyber protection is usually referred to a set of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Apart of hardware implementation of firewalls, the majority of cyber security solutions are built at higher application layers in software, running on standard computing platforms: personal computers, mobile devices, servers, storage appliances, etc. Such software tracks the traffic, identifies the intrusion attempts and blocks them notifying the network administrator of the event. Although the firewall runs on dedicated hardware, it also operates as a set of configurable rules implementing controlled access to different parts of the network.
The vulnerability of both pure software and firewall cyber protection mechanisms comes from possible “misconfiguration” by attacker, allowing access into “protected” network areas. While the ideal solution for mission-critical parts of the network is implemented as a full isolation of such sub-network from the external world, in most of the cases some censored non-sensitive information traffic is still required to flow outside.
Our first product in this class of cyber protection equipment implements a one-way Data Diode physically disconnecting the return path and absolutely eliminating backdoor access.