The 256-bit AES algorithm is based on a block cipher, which means it divides the data to be encrypted into blocks of 128 bits and encrypts each block...
With 2T2R MIMO two transmitting and receiving antennas are used for data transmission. This improves the data rate of the wireless link and is used...
The 3D Defense System used by Seagate, consists of various features to protect the hard drive from data loss, data manipulation and physical damage....
In the 3DNow! Technology is a multimedia instruction set of the company AMD, Cyrix and Centaur. It is in direct competition with Intel's SSE...
In communications, the modulation method is 64 QAM used as a combination of amplitude modulation and phase modulation. The 64 in this case indicates...
The ATM Adaptation Layer 5 (AAL5) is a protocol layer of the Asynchronous Transfer Mode (ATM) network responsible for transmitting data over the...
An Access Control List (ACL) is a security mechanism used to control access to a network or a specific device. ACLs are typically implemented on...
An access point is often found in wireless networks and is also known as base station. It is connected via a cable connection to the network and then...
With an Access Point (AP short) creates a wireless network for different clients. These can then connect to the access point and gain access to the...
The Active Scan function is available with various WLAN access points Juniper Networks and ensures that is actively looking for other APs. The...
Adaptive Fly Height technique is used to automatically adjust the distance between the read / write head to the magnetic disk of the hard disk. When...
ADSL (Asymmetric Digital Subscriber Line) is a type of broadband internet connection that uses existing telephone lines to provide high-speed...
The expansion of ADSL to solve some problems of the underlying technology. Therefore, ADSL2 offers power saving features also higher bandwidths. The...
With ADSL2 + ADSL is already in its third generation available. This range and transmission rate can be increased in particular, the crosstalk...
AMD implemented on some processors (eg, bulldozers, Piledrive and Jaguar) the instruction set Advanced Bit Manipulation (ABM). This includes the...
This function causes a significant increase in performance in the execution of SSE instructions. Previously, 64-bit long instructions were only...
The Advanced ECC technology developed by HP and extends the standard ECC technology for some functions. Thus, single-bit will not only corrects...
The main feature of the Advanced Format technology is the use of 4-KB sectors instead of 512 byte. This are hard disks with higher storage capacity...
If multiple disks simultaneously operated in a system, their rotational vibrations can influence each other. Hard drives with the Advanced Multidrive...
Processors with Advanced Smart Cache have not for each processor core has a dedicated L2 cache, but a common for all nuclei. This utilization is...
The Advanced Encryption Standard (AES) is used in different contexts for encryption. It supports different block and key lengths up to 256 bits. If,...
Called CCMP, and Counter-Mode / CBC-MAC Protocol, is a security standard is based on AES. CCMP is responsible for encryption, authentication and...
These x-86 instruction set extension for AMD and Intel processors accelerated applications perform AES encryption and -Entschlüsselungen. These...
The Anti-Theft Technology Intel was intended to improve the safety of so-equipped notebooks. In the meantime, however, Intel has announced that...
ARP (Address Resolution Protocol) is a network protocol that maintains a mapping of MAC addresses to IP addresses. It is mainly used in IPv4 Ethernet...
Advanced Technology Attachment with Packet Interface (ATAPI or ATA) is a standard for transferring data between storage media and drives, and the...
The ports of a switch with Auto MDI-X can independently and automatically recognize whether it is another switch or a terminal on the connected...
Auto-negotiation is used when two connected via the network port terminals are independently negotiate the maximum possible transmission speed. This...
When auto-uplink is a function of network switches. This thereby recognizes whether it is connected to a terminal or to another switch and...
AVX refers to an extension of the x86 instruction set processors from AMD and Intel. This feature is especially useful functions for...
The Background Media Scan is used by hard drives for self-diagnosis. If no requests are made on the drive, the scan is performed automatically by...
With BFD is referred to in the network area, the Bidirectional Forwarding Detection. This is used to detect errors between two transmitting stations,...
The Border Gateway Protocol (BGP) is one of the main protocols used in the Internet, because it takes care of the routing between autonomous systems....
A blade server, short blade (English for blade or leaf) consists of a rack and the individual modules, which are also often referred to only as...
The Bootstrap Protocol, or BOOTP short, is used to assign a computer in a network, not only IP address but also other parameters. The client may also...
The two-phase shift keying (QPSK, 2-PSK, or Binary Phase Shift Keying) describes a phase shift keying, which has two states. It is the simplest form...
A broadcast storm refers to the accumulation of broadcast requests in a network. Since a broadcast is always sent to all devices on the network, this...
The Bulk Data Encryption was developed by Hitachi (HGST) for encrypting hard drives. In this case, the hard disk controller takes over the full data...
CAPWAP (Control and Provisioning of Wireless Access Points) is a software-based protocol. This is used to configure, control and manage wireless...
By Committed Access Rate (CAR), the data transfer rate is limited in recent routers. This quality of service (QoS also) supported because can...
Cold Cathode Fluorescent Light is an older method for backlighting for LCD screens, which is a fluorescent tube with daylight spectrum and an...
The modulation method CCK (Complementary Code Keying for) is required for wireless networking using the IEEE 802.11b. It replaces the DSSS method...
The Class of Service (CoS, German service class) has a different meaning depending on the context. In the field of network technology are thus the...
The Clean Sweep method provides when switching on the hard disk that the read / write head departs the complete magnetic disk. The aim irregularities...
In CLI (Command Line Interface) is an ordinary command line (sometimes called command line, console or terminal called). This possibility of entry is...
Under a PC system is meant all of the individual components necessary for a computer. This includes the motherboard to the CPU, the RAM and the slots...
In order to write texts on the PC and read or to watch movies, you need apart from the graphics card , the signals in image signals processed also a...
Computer power supplies are switching power supplies for the power supply of PCs or notebooks (External Power Supply) can be used.
Console Switches are key components for rack-mount implementations. (A console is a keyboard, a video monitor, and mouse (KVM) which are connected to...
Cool'n'Quiet denotes a power saving mode for the manufacturer AMD processors. It is an improvement of the PowerNow! Technology is and will for the...
The Cool Core technology from AMD delivers on the Opteron models for further energy savings. If one or more cores are not used, the performance is...
The heart of any computer, notebook or server is the CPU - Central Processing Unit. Also known as the processor or microprocessor. Without a...
In Cyclic Delay Diversity (CDD) is a shift method in MIMO-based transmission systems, ie those with multiple transmit and receive antennas. This...
Data Lifeguard is a software developed by Western Digital (WD), a leading manufacturer of hard drives and storage solutions. This software is...
When Data Protection System is a method of Maxtor that protects the hard drive against shock. This not only increased reliability is achieved, it is...
A DDoS attack (Distributed Denial of Server) is aimed, unlike the denial of service attack, to a larger number of servers and systems. This is also...
Behind Demand Based Switching (DBS) hides a technology from Intel that provides better energy efficiency. At low load the cores no longer run with...
The denial of service attacks (DoS attacks) contact mostly against certain servers and computer systems, with the aim of overloading. As a result,...
The dynamic frequency selection (Dynamic Frequency Selection, short DFS) allows a router can change to an unused channel in the higher 5 GHz band....
The Dynamic Host Configuration Protocol (DHCP short) it is possible to automatically assign IP addresses within a local network. In private networks...
DiffServ (Differentiated Services) is a method which classifies the IP packets differently. This can be, for example, ensures that critical...
With DIMM (Dual Inline Memory Module) are referred to the work of computer memory modules. The term Dual behalf means that on the front and back...
The Directed Offline Scan performs automatic tests for self-diagnosis of disks while they are at rest, are thus read or write any data. This causes...
DirectX is a collection of application programming interfaces (APIs) for developing multimedia applications, particularly video games, on Microsoft...
DisplayPort is a standardized connection standard that is used to transmit video and audio signals. In the first place there is this connection to...
The Domain Name System (DNS) is one of the most important services in private LANs and public networks such as the Internet. It is responsible for a...
In a DOS attack (Denial of Service), the entire network will be paralyzed by as many data packets are sent to the target, it can not handle. Many...
By Differential Quaternary Phase Shift Keying (QPSK), a quadrature phase shift keying is described. This offers several advantages as opposed to QPSK...
The Direct Sequence Spread Spectrum (DSSS) is used for data transmission via radio link. By this method, the desired signal more robust against...
The Dual Dynamic Power Management results in AMD processors, that the power consumption of individual CPU cores can be independently controlled. This...
For DVI (Digital Visual Interface) is an interface that is suitable only for the transmission of video data. It is now used on many motherboards and...
Thermal sublimation, also known as dye sublimation or thermal transfer printing, is a printing process in which dyes are transferred to a substrate...
The Dynamic and Static Wear Leveling comes with flash memory media, such as USB sticks or SSD drives are used. This is a technology that enables,...
Error Correcting Codes (ECC), also known as error-correcting code memory, is a type of memory module used in computer systems to detect and correct...
This method is used by several manufacturers, to reduce the number of bit errors. Important here is that the detected errors are not only but also...
With Enhanced G-Force Protection, the hard drive is better protected against shocks and vibrations. When the device is moved while it is turned on,...
By a stop command, the operating system can turn off the processing units of the processor. The extended hold command (Enhanced Halt State) causes...
This method provides a better coding of the data before it is written to the hard disk. This not only a higher density and better error correction...
This is the development of energy saving technology of AMD. Instead of adapting only the core voltage and clock speed of the processor to the current...
The Intel Enhanced SpeedStep Technology (IEST) provides dynamic adaptation of processor performance. Little computing power is required, the cores...
Known at Intel under the name XD bit (execute disable), AMD uses the name Enhanced Virus Protection or short EPP. This is a technique that improves...
The Extended Page Tables are an implementation of Intel, to utilize the Second Level Address Translation (SLAT). Here, the management of the memory...
Ethernet is a widely used network standard used for data transmission in local area networks (LANs). It was developed in the 1970s and has...
EURO-ISDN is also known under the names or e-DSS1 DSS1. There is a signaling protocol, which is responsible for the D channel of the ISDN. Reason for...
With Intel as XD bit (execute disable) denotes this function is to be regarded as a security enhancement. In this case, the main task to prevent that...
Intel Fast Memory Access provides a more efficient distribution of accesses to the memory. More specifically, the capacity of the data bus between...
Fibre Channel is a logical extension of the SCSI bus. In contrast to the SCSI bus Fibre Channel is a serial network with nodes, switches, other...
FireWire, also known as IEEE 1394, is a serial computer bus standard mainly used for fast data transfer between devices. Developed by Apple and...
The firmware is the software side heart of every switch and router. From her the possible functions and factory settings depend on. Many...
With Intel Flex Memory Access, it is possible two memory modules of different sizes in dual-channel mode to operate, which otherwise only works with...
Hard drives with the Flex Power feature by the manufacturer Western Digital can provide two different ways with electricity. First, it is possible to...
The flow control or flow control, controls on data transfers between the respective data rate devices. It often happens that the transmitting and...
The motor current hard drive has fluid bearings bearings instead of conventional ball bearings. This Fluid Dynamic Bearings cause a lower noise level...
Full duplex capability means that the terminals involved can send and receive simultaneously. In older networks and half-duplex was used, where it...
The G-Force Protection Seagate contains a so-called Free Fall Sensor. This is to recognize early enough the hard drive if the notebook has been...
The GARP protocol is used on networks to publicize the characteristics of a terminal. Thereby, this register at the Layer 2 switches and use the LAN...
GLONASS (Global Navigation Satellite System) is an advanced navigation system that was developed similar to the Global Positioning System (GPS). It...
Display with a glossy surface, as glare-type display known.
The Global Positioning System (GPS) is an advanced navigation system used worldwide for determining locations, navigation, and time references. It is...
Graphics cards are boards with a GPU (Graphics Processing Unit), the processor data from the pre-processed and as images / graphics, displays it on...
Under the GreenPower Technology Western Digital combines several properties together, such as. IntelliSeek or IntelliPark. These cause a total...
Hard drives and hard disks (HDD) are called magnetic storage media used for permanent storage of data on PCs or notebooks.
Hardware encryption is an encryption process in which the hardware device without the use of additional software is able to encrypt data. This is for...
The High Definition Multimedia Interface (usually just called HDMI) is an interface through which a transmission of video and audio signals over a...
This method is mainly used in 2.5-inch hard drives for notebooks. It was developed by Hitachi with the aim to configure the power supply efficiency...
The hot-swap functionality enables the exchange of hardware during operation. Thus, e.g. a failed disk in the RAID array to be replaced in most cases...
HP Sure View is a display technology available on select HP laptops and monitors. This technology is a solution to the growing need for privacy and...
The Hypertext Transfer Protocol (HTTP short, English for hypertext transfer protocol) was defined in version 1.0 in 1996, with the development in...
Hyper-Threading (HTT short) refers to Intel's implementation of multithreading in hardwareseitigem processors. The purpose of this technique is to...
In the (short-HT) HyperTransport technology is an open industry standard. This emerged from an AMD project called Lightning Data Transport (LDT) and...
This technology results in an acceleration of the input and expenditure. The hardware architecture was modified to allow parts of the processing of...
Advanced Technology Attachment with Packet Interface (ATAPI or ATA) is a standard for transferring data between storage media and drives, and the...
By Idle Read After Write, the reliability of the written data on hard drives is ensured. Traditionally been carried out by hard disks directly after...
Many processors have to save energy for a resting state (English Idle State). This is, for example, triggered by a holding command of the operating...
IGMP (Internet Group Management Protocol) is used to establish the multicast groups where there is a network protocol. The actual management is done...
IGMP is a network protocol used to establish the multicast groups. IGMP snooping allows a switch communication between end devices and routers to...
The ImpacGuard was developed for the interaction with the Noise Guard and the SilentSeek technology. Samsung hard drives get so perfect protection...
The Independent Dynamic Core Technology provides more performance, at various AMD CPUs. A core busy more than another, then the clock rate is...
Integrated Ethernet switch The integrated Ethernet switch is often found in routers and wireless access points. This simply indicates only that at...
The memory controller controls the flow of data between the CPU and RAM. This is either on the motherboard (usually on the North Bridge) or directly...
Intel 64 Technology, also known as Intel 64 or x64, is an extension of the x86 architecture processor developed by Intel. It is a 64-bit computing...
Intel Smart Cache is a feature integrated into Intel processors to enhance their performance and efficiency. It is a shared cache memory used by...
Intel Trusted Execution Technology (TXT) is a security technology developed by Intel to protect computers and servers from malicious attacks and...
To obtain the ideal tuning of speed and transfer rate, Western Digital IntelliPower provides with various cache algorithms. Result, considerable...
To optimize the search speed on hard drives and at the same time to reduce the noise, and power consumption, uses Western Digital IntelliSeek. It is...
An intrusion detection system is used to detect and prevent attacks against a computer or a computer network. A distinction is made between the types...
IP control can have many different meanings. In most cases, however, is hereby meant, that can be configured and used certain functions of the system...
IPS stands for In-Plane Switching and is a type of screen technology used in flat panel displays. It is a type of LCD technology that offers higher...
The Internet Protocol Security (IPSec short) supports secure communication over potentially unsafe IP networks. These IPSec provides ultimately the...
IPv6 is the successor to the current IPv4 standard protocol that is used on the Internet and local networks. Need to migrate to IPv6, however, all...
The Intelligent Resilient Framework (IRF) is an HP Technology and is designed to form again was efficient networks that scale easily and wait. For...
The Intermediate System to Intermediate System Protocol (IS-IS) has many similarities to OSPF and works accordingly after the link-state routing...
Jumbo frames denote large and non-standard frames on the network. Frames are the data that are transmitted together with their log data. Oversized...
KVM stands for "Keyboard, Video, Mouse" and refers to a technology that allows multiple computers or servers to be controlled using a single...
The Layer 2 Tunneling Protocol is used to tunnel frames from the second layer of the OSI model, between two networks via the Internet. This allows a...
Layer 2 switches operate at the data link layer of the OSI model. This means that the devices with the MAC addresses of the connected devices can...
In contrast to the Layer 2 switch, a Layer 3 switch operates at the network layer of the OSI model. Here come instead of MAC addresses and IP...
LCD screens are working on a backlight. Nowadays, there are two backlight systems this: CCFL and LED
LEAP (Lightweight Extensible Authentication Protocol) is a specific implementation of the Extensible Authentication Protocol (EAP), a network...
An Light Emitting Diode (LED) is an electronic semiconductor component that emits light when an electric current flows through it. LEDs have made...
A MAC address filtering can grant certain devices access to the network or exclude certain systems. He is often found in connection with Wi-Fi...
A managed switches clearly has more functions than a normal standard switch. For example, the administrator can log these manageable systems to...
Using Maximum Ratio Combining (MRC) is the signal strength of radio signals, increased by the use of multiple antennas. The individual antennas...
MEEPRML (Modified Enhanced EPRML) is an extension of the EPRML method. This provides improved handling of data before it can be read or written....
RAM (Random Access Memory) or RAM / main memory called. This store temporary data that are required for execution or processing of applications. The...
A meshed network (engl. Mesh) is when each network component coupled to one or more other. The data packets are always passed on as long until they...
For controlling VoIP Gateways inter alia, MGCP (Media Gateway Control Protocol) is used. This provides a transmission of control information and can...
Megahertz is a frequency unit
As a MIMO (Multiple Input Multiple Output) refers to the use of multiple transmit and receive antennas for communication in communications...
What is known under the name of IGMP in IPv4, IPv6 is continued at as Multicast Listener Discovery (MLD). In particular, switches and other network...
The Multi Media Extension (MMX) was introduced by Intel in 1997. This larger amounts of data are processed in parallel, since the instructions are...
To write texts on the PC and read or to watch movies, you need apart from the graphics card, the signals in image signals also processed a...
Also known by the name mainboard. A board on which are installed the various components of a computer.
MPLS is Multiprotocol Label Switching, and enables the connection-oriented transfer of data packets in a connectionless network. The path to take the...
MS-CHAP is Microsoft's implementation of the Challenge Handshake Authentication Protcol (CHAP). This has been around since Windows NT 4.0 and is...
With the Multiple Spanning Tree Protocol (RSTP) MSTP will be extended again. You get so used to different STP instances the possibility of VLAN...
By My WiFi technology from Intel, it is always possible to make out his notebook into a wireless access point. Other devices such as smartphones can...
NAT Support is a concept in network technology that refers to the ability of network devices to perform Network Address Translation (NAT).NAT is...
Native Command Queuing (NCQ short) describes a method in which the hard drive multiple commands are transferred simultaneously. Subsequently, the...
NCache Acceleration Technology works unlike DRAM, NAND flash memory to store eg. Write accesses between. This can be done much more efficiently than...
The Noise Guard technology has been used in some Samsung disks. The noise level decreases thereby enormously, as the spectrum is shifted and...
Non-ECC is a term often used in relation to computer hardware such as memory modules. It stands for Non-Error Correction Code and refers to the type...
Portable PCs in different sizes and power levels.
The NoTouch ramp load technology used by Western Digital, is to prevent touching the read / write head of a magnetic disk. This wear can be reduced...
ODD stands for Optical Disc Drive to German optical drive, this is generally required for read and write CD's and DVD's.
The modulation method Orthogonal Frequency-Division Multiplexing (OFDM) is used in the digital data transmission is used. The payload can be divided...
OpenGL (Open Graphics Library) is a cross-platform, standardized API (Application Programming Interface) for creating 3D graphics and applications....
In OSPF (Open Shortest Path First) is a routing protocol of the Interior Gateway Protocol class. This has in large enterprise networks a number of...
The packet filter, sometimes also called network filter, allowing the filtering of incoming and outgoing traffic. This can, for example, be used to...
In the Port and Address Translation (NAT or NAPT) a special form of NAT is used. A special feature here is the will not only translates the IP...
The Peripheral Component Interconnect Express Standard (abbreviated to PCI Express, PCIe or PCI-e), governs the connection of peripherals to the...
The Protected Extensible Authentication Protocol (PEAP) was developed, among others, Cisco and Microsoft. It is used to hedge EAP by an encrypted and...
With Perpendicular Magnetic Recording refers to a method that is used for writing to disks with magnetic disks. This method is inter alia also known...
With Perpendicular Magnetic Recording refers to a method that is used for writing to disks with magnetic disks. This method is inter alia also known...
PFC are known as passive or active power factor correction
The PMK caching (Pairwise Master Key) enables authentication in wireless networks. The PMK serves as a Master Secret, which is present in the access...
Power Over Ethernet, PoE short, a procedure which allows the power supply to end the network port. Here, however, there are different versions that...
A network device with PoE support can be supplied via the network cable. This requires that the switch is supported the same or a compatible...
The POP3 protocol is the e-mail terminal for use. You can specify both a single client be used on a home computer, as well as a server needs to...
A Port Mirroring creates an exact copy of the selected port, to another desired switch port. This means that all data packets are arriving at the...
Power Over Ethernet, PoE short, is a method which enables the power supply to end the network port. Here, however, there are different versions that...
Computer power supplies are switching power supplies for the power supply of PCs or notebooks (External Power Supply) can be used.
The Power Choice function is developed by Seagate and found mainly hard drives at Enterprise. This is the user a precise adjustment of the power...
This power-saving technology for notebook processors from AMD is similar to Intel's SpeedStep technology. Basically here the computing power is...
Behind the PowerNow! Technology with OPM (Optimized Power Management) hides a technique which is basically very similar to the Cool'n'Quiet...
With the help of the actual PPPoA Point-to-Point Protocol is transmitted through ATM. To this end it is packed into corresponding ATM cells in order...
When PPPoE is an implementation of the Point-to-Point Protocol (PPP) over an Ethernet connection. Two phases of the connection are defined, the...
The Point-to-Point Tunneling Protocol (PPTP short) offers the opportunity to build up a Virtual Private Network. It was developed, inter alia, 3Com...
From Preemptive Wear Leveling process especially benefit users of applications that perform a high number of read / write operations in a physically...
The heart of any computer, notebook or server is the CPU - Central Processing Unit. Also known as the processor or microprocessor. Without a...
The quadrature phase shift keying (QPSK) is used, in contrast to the 2-PSK method, four discrete phase positions. Each phase state thereby represents...
Quality of Service, QoS short (sometimes also called Quality of Service), establishes a series of paramaters for various services. So should as IP...
The Quiet Drive Technology was developed by Quantum to reduce noise from HDD to a minimum. Therefore, all components, not just the engine,...
The QuietStep- or RampLoad process ensures lower power consumption by the read / write head is parked at idle away from the actual magnetic disk....
The Service Set ID is a freely selectable name, eg the may be a wireless network identified and addressed by this. Many wireless access points today...
The Remote Authentication Dial-In User Service, short for RADIUS is used to authenticate users with dial-up connections in computer networks, such...
RAM (Random Access Memory) or RAM / main memory called. This store temporary data that are required for execution or processing of applications. The...
The extension to the SMTP protocol causes that is a network structure is not deleted immediately, when a change occurs. Rather, RSTP ensures that...
Raytracing is a computer-assisted technique for generating photorealistic images and animations widely used in computer graphics and film...
The Routing Information Protocol (RIP) possessing basic mechanisms to send data packets over LANs and other networks. It works on the basis of...
The Routing Information Protocol Version 2 (RIPv2), the first version will be continued seamlessly. Many features, such as the packet format, were...
When RMON (Remote Monitoring for) is a standard that regulates the query network devices and the collection of statistical data. It thereby...
Unlike RMON 1, this version of the Remote Monitoring standard works on the network and application layer of the OSI model. This more data can be...
A Rogue Detection system helps the administrator of a network in the identification of so-called rouge access points. This can be as involve base...
Especially in server systems and storage arrays, the disks can interfere with each other through their rotational vibration. To reduce this effect...
The Rotational Vibration Safeguard was developed by HGST and is largely responsible for the recognition of vibration. Two sensors will measure...
High-performance networks preferably have a ring topology Ethernet-based. There, the Rapid Ring Protection Protocol (RRPP) is used to prevent...
The Self-Monitoring, Analysis and Reporting Technology (SMART short) is a standard that is used for continuous monitoring of functions and features,...
SAS (Serial Attached SCSI) is a computer interface, which took over from the previous parallel SCSI interface 2004.
Serial ATA (SATA, also S-ATA / Serial Advanced Technology Attachment) is a mainly developed for data exchange between processor and disk...
Seagate Secure the self-encrypting hard drives from Seagate are known. This data in case of loss and against unauthorized access are optimally...
Seagate Soft Sonic technology refers to the motor of the hard disk, particularly quietly read and write operations are possible. Therefore, own up...
With SeaShell packaging for hard disks is called that protects the drive especially true during shipping. It also protects against static discharge...
The SSH Secure Shell or short, refers to a network protocol, as well as the appropriate software, ie programs. SSH is used to an encrypted network...
The Secure Connect technology from Western Digital called special cable for connecting SATA hard drives. On one side is a normal SATA connector for...
To ensure a higher long-term reliability is used by Western Digital Secure parking. This method ensures that the read / write head when idle, it is...
The self-correction of twisted-pair polarity reverse is useful when wiring errors are made when network connection. These are then recognized by the...
A sensing per device (also called Port Sensing) ensures that the switch automatically detects which device works with which maximum transfer speed....
The SentryScan function of WLAN access points Juniper Networks enables the so-called Sentry mode. If the access point is operated in this mode, it...
Under a server (from lat. Servus = servant) refers usually a computer system that is used in large corporate networks and on all main processes of...
A shader is a module that is responsible for rendering effects in 3D graphics. These modules can be hardware, as well exist software based and are...
With the Shock Guard technology from Western Digital, the sensitive drive mechanics from shock and vibration protected. Also for the plate surfaces...
Disks as Maxtor Shock Protection System with particularly robust against shock and vibration. They are therefore particularly suitable for mobile...
The technology developed by Samsung SilentSeek technology, provides a total quieter hard drive. For this purpose, the drive elements and their...
With SilkStream Western Digital offers a smooth, uninterrupted video performance. It supports up to twelve simultaneous streams in HD quality. Thus,...
With the progressive use of VoIP telephony, and the Session Initiation Procol (SIP) is always known. This provides functions for establishing,...
Intel Smart Memory Access denoted by the ability of a processor to fetch data not only in advance in the cache (prefetching), but to process them...
Smartphones are the current form of mobile phones. In its main features, it resembles a tablet, which can do well without a keyboard.
By using the SMTP protocol (Simple Network Management Protocol) Some tasks can be simplified in the management of a network. Thus, individual...
The Simple Network Management Protocol (SNMP) has been developed for central monitoring and control of network systems. These include, for example,...
With the second version of the Simple Network Management Protocol (SNMP) has been extended to some functions. If today is SNMP version 2 is...
The main reason for developing SNMPv3, was the lack of security mechanisms in the previous versions. However, since this also provides more...
The Simple Network Time Protocol (SNTP) is a simplified version of NTP. It is used to set the time between different computer system to synchronize,...
With SODIMM (Small Outline Dual Inline Memory Module) are called memory modules for notebook computers and other computers in a small format. They...
With SoftSonic a special, developed by Seagate, motor for hard disks is called. This reduces vibrations, the waste heat, and bearing wear and works...
Spacetime Blocking Code (STBC) is a technique that is used in wireless networks. The data stream is coded in data blocks, of which copies are...
Especially in the area of the switch environments, the Spanning Tree Protocol (STP) is here to stay. Namely, prevents the two components with two...
In contrast to a HDD (Hard Disk Drive), which is a magnetic storage medium, SSD drives (SSD = Solid State Drive) do not work with a rotating magnetic...
The Streaming SIMD Extensions were introduced by Intel in 1999. Expand the instruction set to speed up by parallelizing programs. Today SSE is...
This is an extension of the x86 instruction set. This allows for better processing of floating-point and integer operations. This fundamental...
As an extension to this SSE2 version offers a total of 13 new instructions. However, the main innovations simplify the coding of 3D features. This...
The extension of the SSE4 instruction set is slightly different between Intel and AMD. In addition, there are still the minor versions 4.1, 4.2 and...
The Secure Shell 2 or shortly SSH-2 provides an encrypted network connection to a remote device ready. This allows, for example. Router remotely...
For hard drives with StableTrac the drive shaft of the magnetic disk is particularly secured top and bottom. This disk is stabilized and the own...
Stackable means for network devices, the device creates a logical whole by the merger of compatible devices. This is, for example, some switch models...
The term Storage different storage solutions are summarized. It is separate and distinct systems, which may have different components.
Store-and-Forward means a transmission technique in which the transmitted data is stored by the respective intermediate station and only then...
SpectraLink Voice Priority (SVP) is a mechanism for priority-based transmission of voice in Wi-Fi networks. This is fully compatible with the 802.11...
Syslog indicates a standard for transmitting log data. Log data are usually records of events, such as errors, warnings, or simple status...
A Tablet (English for notepad or blackboard ) is a small and light computer that has a touch screen and is suited by the flat design especially for...
For TCP / IP (Transmission Control Protocol / Internet Protocol) is strictly speaking not a single protocol but at more contiguous. Due to the...
Telnet is composed of the words Telecommunication Network and describes a widely used network protocol. There is here a Telnet client and a Telnet...
The Trivial File Transfer Protocol (TFTP) is a transmission protocol that was developed based on EFTP. It only supports the reading and writing of...
With the thermal Flyheight Control Hitachi provides a constant distance between the read / write head and the magnetic disk so that no loss of...
Hereby, various techniques are known which provide for the processor does not overheat. Once a certain temperature is exceeded, in fact, the...
Called a thin client, or even zero-cloud client is a computer that consumes because of its lower hardware configuration, significantly less energy...
If a hard disk controller as finds a bad sector, it tries to correct the error in a given time. If this fails, the disk is removed from the RAID...
The Temporal Key Integrity Protocol, or simply TKIP is a protocol for wireless networks. This is still used today in networks that use WPA or WPA2....
TLS stands for Transport Layer Security (transport layer security) and was formerly also Secure Sockets Layer (SSL) called. This is an encryption...
Traffic shaping (also traffic shaping) refers to a process by which the data traffic can be affected. It may be preferred data packets or be subject...
The TRIM commands are used by the operating system to inform a solid-state drive (SSD) that certain data areas are no longer used because the files...
The patented HGST TrueTrack servo technology ensures greater robustness of the selected hard disk. Technically, several improvements provide the...
The trunking is used by several pathways (eg physical lines) merge into a single logical transmission path. This can be for example a large load on a...
With TSPEC (Traffic Specification) allowing a client on the wireless network to send its own connection requests to the Access Point. A client could,...
This writing method in Disk works with read / write heads, which are based on the quantum mechanical effect of the magnetic tunnel resistance. The...
The Turbo Boost Technology then is used when the system requests a higher clock frequency. The time of activation and the corresponding duration...
U-APSD (Unscheduled Automatic Power Save Delivery) is part of the 802.11e standards. It is primarily responsible for increasing the battery life of...
An uplink refers to a specific port on the switch or router that can be used to connect to another switch. Uplinks are usually more powerful because...
The URL filtering certain URLs are, as the name suggests, simply prohibited. The user can no longer access these URLs so. The URL filter is often...
The acronym USB stands for Universal Serial Bus and referred to a bus system that is used to connect the various peripherals. Prior to the...
Small, economical and silent computer for office use you get from us in the so-called Ultra Small Form Factor (USFF). This is an extension of the...
With VGA (from the English for Video Graphics Array) is a standardized connection for the analog image transmission is called. He was introduced by...
Virtualization is a technology that makes it possible to run multiple operating systems simultaneously on a so-called host and allocate the available...
By VLAN (Virtual Local Area Network) one or more logical subnets can be formed within a physical network. This causes a logical separation of...
Support VPN (Virtual Private Network) for terminals that can either dial into a VPN is or even create one. For routers in the business sector both is...
The vPro technology is a platform from Intel for desktop PCs in the corporate environment. The assertion Active Management Technology (AMT)...
If at any time an access to the Internet or other networks requires that VRRP protocol may be used for hedging purposes. This provides methods which...
The Wireless Distribution System (WDS) is a technology used in wireless networks to expand the range and flexibility of WLAN networks. It...
In this process, the CPU is allocated to a process, and after a certain time, the process is again shifted to the rear in the queue. The individual...
The Wired Equivalent Privacy (WEP) standard is an encryption protocol for wireless networks. This should not only ensure access to the network...
The Whisper Drive technology from Western Digital uses special lane-changing algorithms to reduce the number of movements of the read / write head....
Wi-Fi 6E is an advancement in wireless network technology, building upon the established Wi-Fi 6 standard. The letter "E" stands for "Extended," as...
The Wi-Fi Multimedia standard or short WMM is to optimize the integration of consumer electronics into wireless networks. Ultimately, by better...
Behind Wide Dynamic Execution hides a merger of various techniques of core architecture from Intel. These cause the CPU executes instructions in an...
WiMAX refers to a high-speed transmission in the frequency range from 2 GHz to 66 GHz. This technique is used in many countries and also the latest...
A Wireless Intrusion Detection System (WIDS) detects attacks on the WLAN in the enterprise and notifies the administrator. Both software-based...
A Wireless Intrusion Prevention System (WIPS) is a network component that scans the radio range for unauthorized access points. Thus, for example....
A WLAN (Wireless Local Area Network) is a wireless network that consists of at least one base station and one or more clients. The base station (also...
WMM stands for Wi-Fi Multimedia and is also known as Wireless Multimedia Extensions (WME). This is a standard, which should ensure better use of...
WPA (Wi-Fi Protected Access) is an encryption method for WLAN networks. WPA uses dynamic key, based on TKIP and PSK or EAP for authentication of...
The security standard WPA2 (Wi-Fi Protected Access 2) is the successor to WPA and should preferably be used whenever possible. It is based on AES,...
WXGA stands for Wide Extended Graphics Array. It has a screen resolution of 1280 x 768 pixels