Glossary

256-Bit-AES

The Advanced Encryption Standard (AES) is an algorithm that is used by various current encryption...

2T2R MIMO-technology

With 2T2R MIMO two transmitting and receiving antennas are used for data transmission. This...

3D Defense System

The 3D Defense System used by Seagate, consists of various features to protect the hard drive from...

3DNow! Technology

In the 3DNow! Technology is a multimedia instruction set of the company AMD, Cyrix and Centaur. It...

64 QAM

In communications, the modulation method is 64 QAM used as a combination of amplitude modulation...

64 Technology

The Intel 64 Technology featuring the processors directly more than 4 GB of RAM can be addressed....

A

AAL5

When AAL5 is the ATM adaptation layer 5, which has now enforced in practice for data communication....

Access Control List (ACL)

The Access Control List (ACL) or access control list is a software-based technique that determines...

Access Point

An access point is often found in wireless networks and is also known as base station. It is...

AccessPoint

With an Access Point (AP short) creates a wireless network for different clients. These can then...

Do not miss any special promotions anymore!

You will receive 5€ discount if you subscribe to our newsletter. Stay up-to-date!

5 € Rabatt
5 € Rabatt
Bei einer Bestellung ab 50 €

erhalten Sie 5 € Rabatt auf alle Produkte in unserem Shop

* nur gültig bei Bestellungen in unserem Online-Shop.

AB-50EUR
Kupon kopieren
Nein Danke! Ich bezahle den vollen Preis.