Download PDF

ITW Linx

ITW Linx has been manufacturing products for the telecommunications market for over 20 years. ITW Linx has been the first in the industry with a number of protection products for telecom and datacom like the industry’s first 66 block protector and CAT5E / CAT6 protection families. They have an engineering team in the US devoted to designing and testing to the toughest standards in the industry. They have manufacturing facilities in the U.S. and abroad to minimize their time to market and maximize our global presence.

more...
  • SNAPSHOT
  • United States
    1912
    Public
    NYSE: ITW
    < $10m
    201 - 1,000
    Open website
  • TECHNOLOGY STACK
  • ITW Linx’s Tech Stack maps ITW Linx’s participation in the IoT tech stack.
    • Application Layer
    • Functional Applications

    • Cloud Layer
    • Platform as a Service
      Infrastructure as a Service

    • Edge Layer
    • Automation & Control
      Processors & Edge Intelligence
      Actuators
      Sensors

    • Devices Layer
    • Robots
      Drones
      Wearables
    • Supporting
      Technologies
    • Analytics & Modeling
      Application Infrastructure & Middleware
      Cybersecurity & Privacy
      Networks & Connectivity
    Technological Capability
    None
    Minor
    Moderate
    Strong
  • IOT SNAPSHOT
  • ITW Linx’s IoT Snapshot maps the range and focus areas of ITW Linx’s IoT business across Technologies, Use Cases, Industries, and Services. Only categories with active products will be shown. Missing categories indicate that there is no activity in those areas.
    Industries
    Automotive
    Construction & Infrastructure
    Food & Beverage
    Services
    Testing & Certification
  • IOT SOLUTIONS
  • KEY CUSTOMERS
  • CASE STUDIES
  • HARDWARE
  • SOFTWARE
  • PODCASTS
  • MEMBERSHIP
  • INDUSTRIES
  • FUNCTIONS
  • SIMILAR SUPPLIERS
  • ESCRYPT (Bosch)
    ESCRYPT - Embedded Security is the leading system provider for embedded security world-wide. ESCRYPT offers protection for all kinds of embedded applications, corresponding infrastructure and organizational aspects. ESCRYPT provides its customers with solutions for all issues in IT-Security from one source. With its extensive experience in embedded security, ESCRYPT consists of unique and comprehensive expertise in many different branches. ESCRYPT provides a complete range of security products, consulting services and solutions tailored for specific industries. ESCRYPT services include Security Assessment, Security Strategy & Architecture, Customized Software, Customized Hardware, Certification Support, PKI & Key Management, Application & Code Testing and Training & Awareness. Featured Products: - CycurHSM - CycurKEYS - CycurLIB - CycurTLS
    Blonder Tongue Laboratories
    Blonder Tongue Laboratories, Inc. together with R. L. Drake Holdings, LLC - its wholly owned subsidiary - offer customers more than 130 years of combined engineering and manufacturing excellence with solid histories of delivering reliable, quality products. As a leader in the field of cable television communications, the Company provides system operators and integrators serving the cable, broadcast, satellite, IPTV, institutional and professional video markets with comprehensive solutions for the provision of content contribution, distribution and video delivery to homes and businesses. The Company designs, manufactures, sells and supports an equipment portfolio of standard and high definition digital video solutions, as well as core analog video and high speed data solutions for distribution over coax, fiber and IP networks.
    Dedicated Computing
    Dedicated Computing is a global technology company committed to solving the business problems of our customers through the design, development and deployment of innovative technology solutions.We have over 20 years of industry-focused experience in serving customers with imaging, modeling, visualization, and simulation applications. Our expertise ensures our solutions meet the regulatory and compliance, uptime and system availability, and information Assurance requirements that are mission-critical to their applications.
  • PARTNERS
© 2021 IoT ONE