Newsletter
Butik forside > Søg
Søgeresultater
 
Viser 11-20 af 42 resultater
< 1 2 3 4 5 >
...There are several things you should consider when you’re deciding whether you need an enclosed cabinet or a rack. • First; • what equipment will you be putting in it? The extra stability of a cabinet might be important if you’re installing lar...
...require the number of multiplexors PDH networks do. • The speeds of an SDH’s core network and the multiplication of channels are different from PDH systems, too. The box at right details the characteristics. • SDH is a much more efficient metho...
...Enhanced version of G.SHDSL Uses 2, 4 or 8 wires to transmit Ethernet and other signals Possible data rates: Up to 5,7 Mbps per 2 wires at up to 6 kilometers distance Up to 15 Mbps per 2 wires at up to 3,5 kilometers distance. • DSL makes use...
...the exploitation of vulnerable data communication equipment by technical surveillance or eavesdropping. • Unprotected equipment emit a signal into the air • What puts your data communication equipment at risk? Many things. But first and forem...
...just looking for free Internet access, but sometimes they’re looking for confidential information such as credit card numbers. And many war drivers, when they locate a wireless network, will post the GPS coordinates of that network on the Internet...
...This can include branch offices, unmanned information kiosks, alarm and control systems, and even HVAC systems for climate control. Other applications include unmanned remote monitoring stations, satellite control equipment at communications towers,...
Fiber To The Office • Fiber To The Office • The classical network • A classical network consists of a rack with switches and patch panels and outlets in your cable conduit. Between the outlets and the patch panel you use Cat5, 6 or 7 cables. H...
...tilgå KVM-switchen via Internettet. På den måde kan man få adgang til en eller flere PC/Servere uanset hvor man er - blot der er Internet adgang. • Det er også muligt at placere både PC/servere samt brugerne op til 300 meter væk fra switchen. Dette...
...routinely attacked tens of thousands of times every day. Intellectual property is stolen. Records are destroyed. Privacy is compromised. Our ever-growing, ever-faster cyber world makes protecting your network from Internet intruders ever more diffic...
...NAC) is a method of ensuring that only known devices are allowed to connect to your network and that they meet your network’s requirements before they are granted access. • This is NAC at its most basic level. However, today’s NAC is usually ...
< 1 2 3 4 5 >

 
Top Products