The DDUx II is a highly integrated and extremely rugged computing Server incorporating Intel’s Core i7 processor technology, as well as removable 2.5” solid state hard drives and an extensive array of external interfaces. It was selected to be the official Processor Unit (PU) for our Mounted Family of Computer Systems (MFoCS).
The DDUx II is optimized for computing power, interfacing sensors & networks, and flexibility to deliver multiple concurrent capabilities in a compact form factor. Operation in the toughest military, Department of Homeland Security (DHS), and industrial environments has been validated through an intensive qualification program and fielded operations.
The DDUx II is optimized for computing power, interfacing sensors & networks, and has the flexibility to deliver multiple concurrent capabilities in a compact form factor. Operation in the toughest Military, Department of Homeland Security (DHS), and industrial environments has been validated through an intensive qualification program and fielded operations.
The DDUx II is ideally suited to meet computing, networking/routing, sensor integration, and video processing needs in mobile and harsh environments where reliability is critical. The architecture simultaneously supports hosting of applications, management of network infrastructures, collection and streaming of sensor data. The DDUx II can operate multiple operating systems and virtual machines concurrently to support diverse application and data distribution requirements.
A Capability Upgrade Bay (CUB) allows the DDUx II to be customized to support customer specific I/O demands for any application. Several standard CUB card options are available for additional Ethernet ports, 802.11 wireless and LTE Cellular.
The DDUx II incorporates a Trusted Platform Module 2.0 (TPM) as part of a comprehensive Embedded Security architecture based on advanced Trusted Computing technologies. The Hardware Root of Trust built by the DDUx II Embedded Hardware Security subsystem provides a unique and advanced foundation for Cybersecurity threat protection.
Download the data sheet | Download the price list