-
- High performance hub with active cable that provides an extended 10m connection between a computer and up to 4 USB 3.0 devices
- Can be used standalone or as part of the Lindy Active Extension System Pro to create bespoke extension systems of over 40m (depending on the cable configurations used)
- Supports the full USB 3.0 SuperSpeed bandwidth for speeds of 5Gbps
- Easy to use – connects to the device’s existing USB cable (5m maximum)
- 2 year warranty
The Lindy USB Active Extension Hub Pro is a high performance hub with active cable that allows access to four USB 3.0 SuperSpeed peripherals over long distances. With support for data transfer speeds of up to 5Gbps this extension hub is perfect for transferring large data volumes quickly and reliably.
This 10m extension hub can be used standalone or as part of the Lindy USB 3.0 Active Extension System Pro. This system is a modular solution that can combine multiple USB Active Extension Pro cables and a USB 3.0 Active Extension Pro hub to distribute USB signals to up to 4 devices at up to about 40m (depending on the cable configurations used).
Please note that only the USB 3.0 Active Extension Pro 8m (Nr. 43158) or 15m (Nr. 43229) can be connected directly to your computer. If you are creating an extension using multiple units from the Extension Pro System then the first unit must always be the USB 3.0 Active Extension Pro 8m (Nr. 43158) or 15m (Nr. 43229). Once the first cable has been connected, you can then cascade further cables to achieve a maximum distance of 40m. The final part of the extension can be any of the three parts of the Extension Pro System. If you need to extend multiple devices or if you connect a USB device with high power requirement, then you should use the 10m Hub Pro unit (Nr. 43159) with it’s power supply as the final part of the extension.
This cable features industry-proven active technology and locking connectors to ensure full signal integrity in the most demanding environments.
Information about USB 3.0, 3.1 & 3.2
USB 3.0, USB 3.1 and USB 3.2 PCs, cables and devices are all compatible with each other, when using either a USB Type A or USB Type C host interface.
USB 3.0, USB 3.1 Gen 1 and USB 3.2 Gen 1 all support data transfer rates up to 5 Gbps.
USB 3.1 Gen 2 and USB 3.2 Gen 2 both support data transfer rates up to 10 Gbps. -
- No compromise, ultimate performance DisplayPort 1.2 cable for demanding environments and mission critical systems
- Supports UHD resolutions up to 4096x2160@60Hz 4:4:4 10bit
- Full metal 24K gold plated housing, 24K gold plated connectors and contacts
- Low attenuation triple shielded cable, corrosion resistant, high performance OFC 24AWG conductors
- DisplayPort 1.2 compliant: 3D, 4K, 21.6Gbps; 25 year warranty
From the Lines cable connectivity concept developed by Lindy, Gold Line DisplayPort cables are the no compromise, high performance connection solution for use in the most demanding professional environments.
Gold Line DisplayPort cables feature triple shielded construction with 24AWG OFC conductors for premium performance and corrosion resistance. High quality 24K gold plated contacts and connectors maintain optimal signal integrity and maximum reliability.
UHD resolutions up to 4K 4096x2160@60Hz 4:4:4 10bit, including stereoscopic 3D and HDCP are supported. DisplayPort 1.2 technology and DisplayPort compliance certification ensures compatibility with all DisplayPort enabled devices.
These superior quality cables utilise a unique low attenuation design that ensures consistent and reliable transmission even over very long distances.
Gold DisplayPort cables are available in lengths: 0.5m, 1m, 2m, 3m, 5m, 7.5m, 10m, 15m and 20m
-
- 4 x Voice or Token Ring devices to 1 port
- Only for analogue telephone lines, not VoIP, LAN
- Must be used in pairs by connecting one to a patch panel and the other to a wall outlet
- Low cost solution for adding extra connections
- Existing installations can be expanded quickly and simply
- Additional devices can easily be added temporarily or permanently
- No performance loss
- Saves adding additional cable runs
- Ideal for existing installations where additional cables cannot be installed easily
Please note: these multipliers are sold as single units not pairs." -
This Cat5e 75 foot gray crossover cable is used for networking, data transfer and phone lines. For use from a DSL/cable modem directly to the PC and for a direct link from PC to PC. This particular cable is a gray UTP (Unshielded Twisted Pair) patch cable with molded boots (snagless installation) and extra protection for the RJ45 connector and clip. The connectors are wired to the T568B standard. The individual conductors are 24 AWG (American wire gauge) stranded pure copper. Cat5e patch cables are stranded to improve flexibility. Pure copper conductors provide the best signal possible. The RJ45 plug features gold connectors to prevent corrosion thus ensuring a longer cable life. Our Cat5e Ethernet patch cables exceed the EIA/TIA-568-C standard.Part No. 10X6-33175
-
X-PHY EMBEDDED AI CYBER SECURE notebook with Mobility LightWeight notebook specification. With an embedded cybersecurity solution, the rate of attacks and the loss after damage can be reduced. The Flexxon Embedded AI SecureTM SSD is the best solution that comprises with advanced AI Co-Processor Quantum Engine that sets a whole new standard for AI Embedded cybersecurity storage facility. To protect the data, the X-Phy Cyber Secure SSD monitors the threats in real-time and stops that from dead in their tracks.
-
X-PHY EMBEDDED AI CYBER SECURE notebook with Mobility LightWeight notebook specification. With an embedded cybersecurity solution, the rate of attacks and the loss after damage can be reduced. The Flexxon Embedded AI SecureTM SSD is the best solution that comprises with advanced AI Co-Processor Quantum Engine that sets a whole new standard for AI Embedded cybersecurity storage facility. To protect the data, the X-Phy Cyber Secure SSD monitors the threats in real-time and stops that from dead in their tracks.
-
X-PHY EMBEDDED AI CYBER SECURE notebook for Small Medium Business (SMB) use. With an embedded cybersecurity solution, the rate of attacks and the loss after damage can be reduced. The Flexxon Embedded AI SecureTM SSD is the best solution that comprises with advanced AI Co-Processor Quantum Engine that sets a whole new standard for AI Embedded cybersecurity storage facility. To protect the data, the X-Phy Cyber Secure SSD monitors the threats in real-time and stops that from dead in their tracks.
-
X-PHY EMBEDDED AI CYBER SECURE notebook for Small Medium Business (SMB) use. With an embedded cybersecurity solution, the rate of attacks and the loss after damage can be reduced. The Flexxon Embedded AI SecureTM SSD is the best solution that comprises with advanced AI Co-Processor Quantum Engine that sets a whole new standard for AI Embedded cybersecurity storage facility. To protect the data, the X-Phy Cyber Secure SSD monitors the threats in real-time and stops that from dead in their tracks.
-
X-PHY EMBEDDED AI CYBER SECURE notebook for Small Medium Business (SMB) use. With an embedded cybersecurity solution, the rate of attacks and the loss after damage can be reduced. The Flexxon Embedded AI SecureTM SSD is the best solution that comprises with advanced AI Co-Processor Quantum Engine that sets a whole new standard for AI Embedded cybersecurity storage facility. To protect the data, the X-Phy Cyber Secure SSD monitors the threats in real-time and stops that from dead in their tracks.
-
X-PHY EMBEDDED AI CYBER SECURE notebook for Small Medium Business (SMB) use. With an embedded cybersecurity solution, the rate of attacks and the loss after damage can be reduced. The Flexxon Embedded AI SecureTM SSD is the best solution that comprises with advanced AI Co-Processor Quantum Engine that sets a whole new standard for AI Embedded cybersecurity storage facility. To protect the data, the X-Phy Cyber Secure SSD monitors the threats in real-time and stops that from dead in their tracks.
-
X-PHY EMBEDDED AI CYBER SECURE notebook with high performance notebook specification. With an embedded cybersecurity solution, the rate of attacks and the loss after damage can be reduced. The Flexxon Embedded AI SecureTM SSD is the best solution that comprises with advanced AI Co-Processor Quantum Engine that sets a whole new standard for AI Embedded cybersecurity storage facility. To protect the data, the X-Phy Cyber Secure SSD monitors the threats in real-time and stops that from dead in their tracks.
-
X-PHY EMBEDDED AI CYBER SECURE notebook with high performance notebook specification. With an embedded cybersecurity solution, the rate of attacks and the loss after damage can be reduced. The Flexxon Embedded AI SecureTM SSD is the best solution that comprises with advanced AI Co-Processor Quantum Engine that sets a whole new standard for AI Embedded cybersecurity storage facility. To protect the data, the X-Phy Cyber Secure SSD monitors the threats in real-time and stops that from dead in their tracks.
-
Flexxon X-Mask USB Drive is the ultimate solution for extending password-protected access and prohibiting unauthorized illegal access. Store the critical data into the FLEXXON?S X-Mask USB Drive and ?Mask? it with your password rendering it tamper-proof, unalterable and restricting accidental deletion of data for as long as you need.
-
Flexxon X-Mask USB Drive is the ultimate solution for extending password-protected access and prohibiting unauthorized illegal access. Store the critical data into the FLEXXON?S X-Mask USB Drive and ?Mask? it with your password rendering it tamper-proof, unalterable and restricting accidental deletion of data for as long as you need.
-
Flexxon X-Mask USB Drive is the ultimate solution for extending password-protected access and prohibiting unauthorized illegal access. Store the critical data into the FLEXXON?S X-Mask USB Drive and ?Mask? it with your password rendering it tamper-proof, unalterable and restricting accidental deletion of data for as long as you need.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
Flexxon X-Mask Memory Card gives you the privilege to put a password and prevent the data from unauthorized access. As long as you keep the ?Mask? on, your data cannot be stolen, tampered, or deleted by random people. Using the Windows Tool you can prohibit the illegal access by hiding your private data and authenticate the user access.
-
STORE THE DATA ONCE AND MAKE IT UNALTERABLE IN WRITE ONCE READ MANY USB DRIVE. Ensure the highest level of data security and keep your crucial files with the Flexxon WORM USB drive. This write-once-read-many USB drive has been designed with advanced technology to maintain reliability and compatibility. Once the data has been stored, none can edit or remove it from the WORM Pendrive but can read it whenever you want.
-
STORE THE DATA ONCE AND MAKE IT UNALTERABLE IN WRITE ONCE READ MANY USB DRIVE. Ensure the highest level of data security and keep your crucial files with the Flexxon WORM USB drive. This write-once-read-many USB drive has been designed with advanced technology to maintain reliability and compatibility. Once the data has been stored, none can edit or remove it from the WORM Pendrive but can read it whenever you want.
-
STORE THE DATA ONCE AND MAKE IT UNALTERABLE IN WRITE ONCE READ MANY USB DRIVE. Ensure the highest level of data security and keep your crucial files with the Flexxon WORM USB drive. This write-once-read-many USB drive has been designed with advanced technology to maintain reliability and compatibility. Once the data has been stored, none can edit or remove it from the WORM Pendrive but can read it whenever you want.
-
Write-Once-Read-Many commercial grade memory cards are specifically built for applications where data reliability and safety are paramount. A unalterable, non-rewritable, and non-erasable solution that ensures data integrity within the WORM SD/MicroSD cards. FLEXXON WORM card comes in Default WORM card mode that do not require activation of any software application.
-
Write-Once-Read-Many commercial grade memory cards are specifically built for applications where data reliability and safety are paramount. A unalterable, non-rewritable, and non-erasable solution that ensures data integrity within the WORM SD/MicroSD cards. FLEXXON WORM card comes in Default WORM card mode that do not require activation of any software application.