Newsletter
Store home > Search
Search results
 
Showing 41-50 of 83 results
< 1 ... 3 4 5 6 7 ... 9 >
...PCs no longer have traditional Cathode Ray Tube (CRT) computer monitors with a VGA interface. The latest high-end computers have Digital Flat Panels (DFPs) with a Digital Visual Interface (DVI). Although most computers still have traditional monito...
Fibre Optic Connectors. • Fibre Optic Connectors • The ST® connector • , which uses a bayonet locking system, is the most common connector. • The SC connector • features a moulded body and a push- pull locking system. • The FDDI connector • co...
...Crosstalk (NEXT). It’s signal interference from one pair that adversely affects another pair on the same end. Crosstalk occurs between adjacent wire pairs (“pair-to-pair NEXT”). In addition, all other pairs in a UTP cable can also contribute t...
...in the mid 1980s when it released its IBM token ring architecture. Physically, a token ring network is wired as a star, with 'hubs' and arms out to each station and the loop going out-and-back through each. • The IEEE ratified the Token ring LAN s...
...This is NAC at its most basic level. However, today’s NAC is usually also capable of dictating each user’s level of access and of managing users’ access once they’re on the network. • NAC has a special place in a network security plan becau...
...Advantages of video on fibre optic cable. • Advantages of fibre optic cable over copper coax cable to transmit video • Superior performance • Fibre cable supports a very high data rate and yields a very low signal loss. So you get sharp, clear vide...
...modern flat screen monitors will only display a small range of refresh rates and resolutions, and most will not display any refresh rates below 60Hz. • PAL has a refresh rate of only 50Hz and so can not be displayed on most flat screens without co...
...Support •   • Practical IT Security solutions from Black Box • What dangers lurk? • Corporate networks are routinely attacked tens of thousands of times every day. Intellectual property is stolen. Records are destroyed. Privacy is compromised. Our e...
Five key elements of effective network security. • Identity • Accurate and positive identification of network users, hosts, applications, services, and resources is a must. Kerberos, password tools, and protocols such as RADIUS and TACACS+ ena...
...requirements, but it’s also important to ensure that cabinets used to house blade servers provide adequate ventilation—even in a cool room, hot spots can develop inside cabinets if air distribution is inadequate. • Fully perforated doors. • If...
< 1 ... 3 4 5 6 7 ... 9 >

 
Top Products