Newsletter
Store home > Search
Search results
 
Showing 41-50 of 55 results
< 1 2 3 4 5 6 >
...buy and set up VPN equipment by yourself. But some service providers have introduced VPN solutions that guarantee certain levels of service. They boast 99% uptime and offer credit reimbursements for outages, for example, so this means that the VPN...
...using a modem or TCP/IP Ethernet connection. • The software is available conveniently preloaded on a PC we ship to you or included with your Tiger II Controller system. • Use the Windows® compatible software’s GUI to define system parameters, set...
...to be expanded over a whole network. • Spanning Tree: (STP/802.1d) The switch can detect network loops and is able to break the loop by disabling one of the uplinks. This allows administrators to build up network rings to build up redundanc...
...much control you need over that network. • Unmanaged switches • are basic plug-and-play switches with no remote configuration, management, or monitoring options, although many can be locally monitored and configured via LED indicators and DIP swit...
...for Time Division Multiplexing and is based on the idea to subdivide time (e.g. one second) into many smaller units. • An information unit can now be transmitted separately in each of these units. The information units need not be in a logical seq...
...do not forget your VoIP phones. They need PoE Power. A lot of things to consider. • Fiber To The Desk • FTTO means that the Fiber is running to the office. Elsewhere you might see the term Fiber To The Desk which means quite the same. Here the fi...
...and other computer equipment without being at the equipment’s location. • For whom • Who needs remote power control? Everyone, especially any organization with a network that reaches remote sites. This can include branch offices, unmanned informat...
...process of managing multiple KVM switches whether they be in a single location, or spread throughout the world. Allowing the server manager to set individual and group access rights, makes the whole issue of security vs access a simple task to manag...
...addresses and ports in IP packets. This basic form of firewall protection is really no more than a simple sorting algorithm. Generally they enable you to have some control through the use of access lists. Packet filtering can also often be performe...
...data (RS-232 or USB) over distances of hundreds of meters to one or more locations. They generally utilise standard CatX infrastructure cable and can offer extensions to distances of up to 300m. • VGA based Multimedia distribution products are si...
< 1 2 3 4 5 6 >

 
Top Products