Newsletter
Store home > Search
Search results
 
Showing 71-80 of 167 results
< 1 ... 6 7 8 9 10 ... 17 >
...FDDI connector • comes with a 2.5-mm free-floating ferrule and a fixed shroud to minimise light loss. • The MT-RJ connector • , a small-form RJ-style connector, features a moulded body and uses cleave-and-leave splicing. • The LC connector • , a sma...
...PCs no longer have traditional Cathode Ray Tube (CRT) computer monitors with a VGA interface. The latest high-end computers have Digital Flat Panels (DFPs) with a Digital Visual Interface (DVI). Although most computers still have traditional monito...
...push-on connector. It is a connector for multifiber ribbon cable that generally contains 6, 8, 12, or 24 fibers. It is defined by IEC-61754-7 and EIA/TIA-604-5-D, also known as FOCIS 5. The MPO connector, combined with lightweight ribbon cable,...
...a special port on a switch or other network device to convert the port to a copper or fiber interface. These compact transceivers replace the older, bulkier GBIC interface. Although these devices are available in copper, their most common use is t...
...in the mid 1980s when it released its IBM token ring architecture. Physically, a token ring network is wired as a star, with 'hubs' and arms out to each station and the loop going out-and-back through each. • The IEEE ratified the Token ring LAN s...
...This is NAC at its most basic level. However, today’s NAC is usually also capable of dictating each user’s level of access and of managing users’ access once they’re on the network. • NAC has a special place in a network security plan becau...
...modern flat screen monitors will only display a small range of refresh rates and resolutions, and most will not display any refresh rates below 60Hz. • PAL has a refresh rate of only 50Hz and so can not be displayed on most flat screens without co...
...effective network security. • Identity • Accurate and positive identification of network users, hosts, applications, services, and resources is a must. Kerberos, password tools, and protocols such as RADIUS and TACACS+ enable identification. • Peri...
...requirements, but it’s also important to ensure that cabinets used to house blade servers provide adequate ventilation—even in a cool room, hot spots can develop inside cabinets if air distribution is inadequate. • Fully perforated doors. • If...
...Support •   • Practical IT Security solutions from Black Box • What dangers lurk? • Corporate networks are routinely attacked tens of thousands of times every day. Intellectual property is stolen. Records are destroyed. Privacy is compromised. Our e...
< 1 ... 6 7 8 9 10 ... 17 >

 
Top Products