noteboox.de is SSL secured EHI verified online shop

Lexikon

123 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ä Ö Ü

123

256-Bit-AES

The Advanced Encryption Standard (AES) is an algorithm that is used by various current encryption...

2T2R MIMO-technology

With 2T2R MIMO two transmitting and receiving antennas are used for data transmission. This...

3D Defense System

The 3D Defense System used by Seagate, consists of various features to protect the hard drive from...

3DNow! Technology

In the 3DNow! Technology is a multimedia instruction set of the company AMD, Cyrix and Centaur. It...

64 QAM

In communications, the modulation method is 64 QAM used as a combination of amplitude modulation...

64 Technology

The Intel 64 Technology featuring the processors directly more than 4 GB of RAM can be addressed....

A

AAL5

When AAL5 is the ATM adaptation layer 5, which has now enforced in practice for data communication....

Access Control List (ACL)

The Access Control List (ACL) or access control list is a software-based technique that determines...

Access Point

An access point is often found in wireless networks and is also known as base station. It is...

AccessPoint

With an Access Point (AP short) creates a wireless network for different clients. These can then...

ActiveScan-function

The Active Scan function is available with various WLAN access points Juniper Networks and ensures...

Adaptive Fly Height

Adaptive Fly Height technique is used to automatically adjust the distance between the read / write...

ADSL

ADSL stands for Asymmetric Digital Subscriber Line and refers to the widespread connection...

ADSL2

The expansion of ADSL to solve some problems of the underlying technology. Therefore, ADSL2 offers...

ADSL2+

With ADSL2 + ADSL is already in its third generation available. This range and transmission rate...

Advanced Bit Manipulation

AMD implemented on some processors (eg, bulldozers, Piledrive and Jaguar) the instruction set...

Advanced Digital Media Boost

This function causes a significant increase in performance in the execution of SSE instructions....

Advanced ECC

The Advanced ECC technology developed by HP and extends the standard ECC technology for some...

Advanced Format-Technologie

The main feature of the Advanced Format technology is the use of 4-KB sectors instead of 512 byte....

Advanced Multidrive System (SAMS)

If multiple disks simultaneously operated in a system, their rotational vibrations can influence...

Advanced Smart Cache

Processors with Advanced Smart Cache have not for each processor core has a dedicated L2 cache, but...

AES

The Advanced Encryption Standard (AES) is used in different contexts for encryption. It supports...

AES-CCMP

Called CCMP, and Counter-Mode / CBC-MAC Protocol, is a security standard is based on AES. CCMP is...

AES-NI

These x-86 instruction set extension for AMD and Intel processors accelerated applications perform...

Anti-Theft Technology

The Anti-Theft Technology Intel was intended to improve the safety of so-equipped notebooks. In the...

ARP

ARP (Address Resolution Protocol) is a network protocol that maintains a mapping of MAC addresses...

ATAPI

Advanced Technology Attachment with Packet Interface (ATAPI or ATA) is a standard for transferring...

Auto MDI/MDI-X

The ports of a switch with Auto MDI-X can independently and automatically recognize whether it is...

Auto-Negotiation

Auto-negotiation is used when two connected via the network port terminals are independently...

Auto-Uplink

When auto-uplink is a function of network switches. This thereby recognizes whether it is connected...

AVX

AVX refers to an extension of the x86 instruction set processors from AMD and Intel. This feature...

B

Background Media Scan (BMS)

The Background Media Scan is used by hard drives for self-diagnosis. If no requests are made on the...

BFD

With BFD is referred to in the network area, the Bidirectional Forwarding Detection. This is used...

BGP

The Border Gateway Protocol (BGP) is one of the main protocols used in the Internet, because it...

Blade

A blade server, short blade (English for blade or leaf) consists of a rack and the individual...

BOOTP

The Bootstrap Protocol, or BOOTP short, is used to assign a computer in a network, not only IP...

BPSK

The two-phase shift keying (QPSK, 2-PSK, or Binary Phase Shift Keying) describes a phase shift...

Broadcast Storm Control

A broadcast storm refers to the accumulation of broadcast requests in a network. Since a broadcast...

Bulk Data Encryption

The Bulk Data Encryption was developed by Hitachi (HGST) for encrypting hard drives. In this case,...

C

CAPWAP support

CAPWAP (Control and Provisioning of Wireless Access Points) is a software-based protocol. This is...

CAR Committed Access Rate

By Committed Access Rate (CAR), the data transfer rate is limited in recent routers. This quality...

CCFL

Cold Cathode Fluorescent Light is an older method for backlighting for LCD screens, which is a...

CCK

The modulation method CCK (Complementary Code Keying for) is required for wireless networking using...

Class of Service (CoS)

The Class of Service (CoS, German service class) has a different meaning depending on the context....

Clean Sweep

The Clean Sweep method provides when switching on the hard disk that the read / write head departs...

CLI

In CLI (Command Line Interface) is an ordinary command line (sometimes called command line, console...

Computer

Under a PC system is meant all of the individual components necessary for a computer. This includes...

computer monitors

In order to write texts on the PC and read or to watch movies, you need apart from the graphics...

Computer power supply

Computer power supplies are switching power supplies for the power supply of PCs or notebooks...

Console

Console Switches are key components for rack-mount implementations. (A console is a keyboard, a...

Cool'n'Quiet Technology

Cool'n'Quiet denotes a power saving mode for the manufacturer AMD processors. It is an...

CoolCore technology

The Cool Core technology from AMD delivers on the Opteron models for further energy savings. If one...

CPU

The heart of any computer, notebook or server is the CPU - Central Processing Unit. Also known as...

Cyclic Delay Diversity (CDD)

In Cyclic Delay Diversity (CDD) is a shift method in MIMO-based transmission systems, ie those with...

D

Data Lifeguard

When Data Lifeguard is a small tool manufacturer Western Digital. This internal and external hard...

Data Protection System (DPS)

When Data Protection System is a method of Maxtor that protects the hard drive against shock. This...

DDoS

A DDoS attack (Distributed Denial of Server) is aimed, unlike the denial of service attack, to a...

Demand Based Switching

Behind Demand Based Switching (DBS) hides a technology from Intel that provides better energy...

Denial-of-service-attacks

The denial of service attacks (DoS attacks) contact mostly against certain servers and computer...

DFS-support

The dynamic frequency selection (Dynamic Frequency Selection, short DFS) allows a router can change...

DHCP

The Dynamic Host Configuration Protocol (DHCP short) it is possible to automatically assign IP...

DiffServ

DiffServ (Differentiated Services) is a method which classifies the IP packets differently. This...

DIMM

With DIMM (Dual Inline Memory Module) are referred to the work of computer memory modules. The term...

Directed Offline Scan

The Directed Offline Scan performs automatic tests for self-diagnosis of disks while they are at...

DirectX

DirectX is a collection of application programming interfaces (APIs also for Application...

DisplayPort

DisplayPort is a standardized connection standard that is used to transmit video and audio signals....

DNS

The Domain Name System (DNS) is one of the most important services in private LANs and public...

DoS attack prevention

In a DOS attack (Denial of Service), the entire network will be paralyzed by as many data packets...

DQPSK

By Differential Quaternary Phase Shift Keying (QPSK), a quadrature phase shift keying is described....

DSSS

The Direct Sequence Spread Spectrum (DSSS) is used for data transmission via radio link. By this...

Dual Dynamic Power Management

The Dual Dynamic Power Management results in AMD processors, that the power consumption of...

DVI

For DVI (Digital Visual Interface) is an interface that is suitable only for the transmission of...

Dynamic and Static Wear Leveling

The Dynamic and Static Wear Leveling comes with flash memory media, such as USB sticks or SSD...

E

ECC

The ECC technology (Error Checking and Correcting) ensures higher reliability of memory. Through...

Enhanced Error Correction Code

This method is used by several manufacturers, to reduce the number of bit errors. Important here is...

Enhanced G-Force Protection

With Enhanced G-Force Protection, the hard drive is better protected against shocks and vibrations....

Enhanced Halt State

By a stop command, the operating system can turn off the processing units of the processor. The...

Enhanced Partial Response Maximum Likelihood (EPRML)

This method provides a better coding of the data before it is written to the hard disk. This not...

Enhanced PowerNow!

This is the development of energy saving technology of AMD. Instead of adapting only the core...

Enhanced SpeedStep technology

The Intel Enhanced SpeedStep Technology (IEST) provides dynamic adaptation of processor...

Enhanced Virus Protection

Known at Intel under the name XD bit (execute disable), AMD uses the name Enhanced Virus Protection...

EPT

The Extended Page Tables are an implementation of Intel, to utilize the Second Level Address...

Ethernet

Ethernet is a specification that defines various details of software and hardware in wired...

EURO-ISDN

EURO-ISDN is also known under the names or e-DSS1 DSS1. There is a signaling protocol, which is...

Execute Disable Bit

With Intel as XD bit (execute disable) denotes this function is to be regarded as a security...

F

Fast Memory Access

Intel Fast Memory Access provides a more efficient distribution of accesses to the memory. More...

Fibre Channel

Fibre Channel is a logical extension of the SCSI bus. In contrast to the SCSI bus Fibre Channel is...

firmware upgradable

The firmware is the software side heart of every switch and router. From her the possible functions...

Flex Memory Access

With Intel Flex Memory Access, it is possible two memory modules of different sizes in dual-channel...

FlexPower

Hard drives with the Flex Power feature by the manufacturer Western Digital can provide two...

flow control

The flow control or flow control, controls on data transfers between the respective data rate...

Fluid-Dynamic-Bearing-(FDB)-Motor

The motor current hard drive has fluid bearings bearings instead of conventional ball bearings....

Full duplex capability

Full duplex capability means that the terminals involved can send and receive simultaneously. In...

G

G-Force Protection

The G-Force Protection Seagate contains a so-called Free Fall Sensor. This is to recognize early...

GARP

The GARP protocol is used on networks to publicize the characteristics of a terminal. Thereby, this...

Glossy

Display with a glossy surface, as glare-type display known.

graphics Cards

Graphics cards are boards with a GPU (Graphics Processing Unit), the processor data from the...

GreenPower-Technologie

Under the GreenPower Technology Western Digital combines several properties together, such as....

H

Harddrives

Hard drives and hard disks (HDD) are called magnetic storage media used for permanent storage of...

Hardware encryption

Hardware encryption is an encryption process in which the hardware device without the use of...

HDMI

The High Definition Multimedia Interface (usually just called HDMI) is an interface through which a...

Hitachi Voltage Efficiency Regulator Technology (HiVERT)

This method is mainly used in 2.5-inch hard drives for notebooks. It was developed by Hitachi with...

Hot-Swap

The hot-swap functionality enables the exchange of hardware during operation. Thus, e.g. a failed...

HTTP

The Hypertext Transfer Protocol (HTTP short, English for hypertext transfer protocol) was defined...

Hyper-Threading Technology

Hyper-Threading (HTT short) refers to Intel's implementation of multithreading in...

Hyper-Threading-Technologie

Hyper-Threading (HTT short) refers to Intel's implementation of multithreading in...

HyperTransport-Technologie

In the (short-HT) HyperTransport technology is an open industry standard. This emerged from an AMD...

I

I/O Acceleration Technology

This technology results in an acceleration of the input and expenditure. The hardware architecture...

IDE

Advanced Technology Attachment with Packet Interface (ATAPI or ATA) is a standard for transferring...

Idle Read After Write (IRAW)

By Idle Read After Write, the reliability of the written data on hard drives is ensured....

Idle States

Many processors have to save energy for a resting state (English Idle State). This is, for example,...

IGMP

IGMP (Internet Group Management Protocol) is used to establish the multicast groups where there is...

IGMP Snooping

IGMP is a network protocol used to establish the multicast groups. IGMP snooping allows a switch...

ImpacGuard

The ImpacGuard was developed for the interaction with the Noise Guard and the SilentSeek...

Independent Dynamic Core Technology

The Independent Dynamic Core Technology provides more performance, at various AMD CPUs. A core busy...

Integrated Ethernet switch

Integrated Ethernet switch The integrated Ethernet switch is often found in routers and wireless...

integrated memory controller

The memory controller controls the flow of data between the CPU and RAM. This is either on the...

IntelliPower

To obtain the ideal tuning of speed and transfer rate, Western Digital IntelliPower provides with...

IntelliSeek

To optimize the search speed on hard drives and at the same time to reduce the noise, and power...

Intrusion Detection

An intrusion detection system is used to detect and prevent attacks against a computer or a...

IP-control

IP control can have many different meanings. In most cases, however, is hereby meant, that can be...

IPSec

The Internet Protocol Security (IPSec short) supports secure communication over potentially unsafe...

IPv6

IPv6 is the successor to the current IPv4 standard protocol that is used on the Internet and local...

IRF

The Intelligent Resilient Framework (IRF) is an HP Technology and is designed to form again was...

IS-IS

The Intermediate System to Intermediate System Protocol (IS-IS) has many similarities to OSPF and...

J

Jumbo-Frames-Support

Jumbo frames denote large and non-standard frames on the network. Frames are the data that are...

K

KVM

KVM stands for keyboard video mouse and is a Console Switch provides the central components for...

L

L2TP

The Layer 2 Tunneling Protocol is used to tunnel frames from the second layer of the OSI model,...

Layer 2 switching

Layer 2 switches operate at the data link layer of the OSI model. This means that the devices with...

Layer 3 switching

In contrast to the Layer 2 switch, a Layer 3 switch operates at the network layer of the OSI model....

LCD

LCD screens are working on a backlight. Nowadays, there are two backlight systems this: CCFL and...

LEAP

LEAP is an implementation of EAP (Extensible Authentication Protocol) Cisco. To authenticate a user...

LED

Light Emitting Diode - is a newer backlighting system which does not use an inverter, and instead...

M

MAC-address-filtering

A MAC address filtering can grant certain devices access to the network or exclude certain systems....

managed

A managed switches clearly has more functions than a normal standard switch. For example, the...

Maximum Ratio Combining (MRC)

Using Maximum Ratio Combining (MRC) is the signal strength of radio signals, increased by the use...

MEEPRML technology

MEEPRML (Modified Enhanced EPRML) is an extension of the EPRML method. This provides improved...

Memory

RAM (Random Access Memory) or RAM / main memory called. This store temporary data that are required...

mesh networking

A meshed network (engl. Mesh) is when each network component coupled to one or more other. The data...

MGCP

For controlling VoIP Gateways inter alia, MGCP (Media Gateway Control Protocol) is used. This...

MHz

Megahertz is a frequency unit

MIMO

As a MIMO (Multiple Input Multiple Output) refers to the use of multiple transmit and receive...

MLD-Snooping

What is known under the name of IGMP in IPv4, IPv6 is continued at as Multicast Listener Discovery...

MMX instructions

The Multi Media Extension (MMX) was introduced by Intel in 1997. This larger amounts of data are...

Monitor

To write texts on the PC and read or to watch movies, you need apart from the graphics card, the...

motherboard

Also known by the name mainboard. A board on which are installed the various components of a...

MPLS

MPLS is Multiprotocol Label Switching, and enables the connection-oriented transfer of data packets...

MS-CHAP

MS-CHAP is Microsoft's implementation of the Challenge Handshake Authentication Protcol (CHAP)....

MSTP

With the Multiple Spanning Tree Protocol (RSTP) MSTP will be extended again. You get so used to...

My WiFi Technology

By My WiFi technology from Intel, it is always possible to make out his notebook into a wireless...

N

NAT Support

The Network Address Translation (NAT) procedure is often used by network devices, and in particular...

Native Command Queuing (NCQ)

Native Command Queuing (NCQ short) describes a method in which the hard drive multiple commands are...

nCache Acceleration Technology

NCache Acceleration Technology works unlike DRAM, NAND flash memory to store eg. Write accesses...

NoiseGuard

The Noise Guard technology has been used in some Samsung disks. The noise level decreases thereby...

Notebook

Portable PCs in different sizes and power levels.

NoTouch-Ramp-Ladetechnologie

The NoTouch ramp load technology used by Western Digital, is to prevent touching the read / write...

O

ODD

ODD stands for Optical Disc Drive to German optical drive, this is generally required for read and...

OFDM

The modulation method Orthogonal Frequency-Division Multiplexing (OFDM) is used in the digital data...

OpenGL

The OpenGL (Open Graphics Library or Open Graphics Library) is a collection of application...

OSPF

In OSPF (Open Shortest Path First) is a routing protocol of the Interior Gateway Protocol class....

P

packet filtering

The packet filter, sometimes also called network filter, allowing the filtering of incoming and...

PAT Support

In the Port and Address Translation (NAT or NAPT) a special form of NAT is used. A special feature...

PCIE

The Peripheral Component Interconnect Express Standard (abbreviated to PCI Express, PCIe or PCI-e),...

PEAP

The Protected Extensible Authentication Protocol (PEAP) was developed, among others, Cisco and...

Perpendicular Magnetic Recording (PMR)

With Perpendicular Magnetic Recording refers to a method that is used for writing to disks with...

Perpendicular Recording

With Perpendicular Magnetic Recording refers to a method that is used for writing to disks with...

PFC

PFC are known as passive or active power factor correction

PMK-Caching

The PMK caching (Pairwise Master Key) enables authentication in wireless networks. The PMK serves...

PoE

Power Over Ethernet, PoE short, a procedure which allows the power supply to end the network port....

PoE support

A network device with PoE support can be supplied via the network cable. This requires that the...

POP3

The POP3 protocol is the e-mail terminal for use. You can specify both a single client be used on a...

Port Mirroring

A Port Mirroring creates an exact copy of the selected port, to another desired switch port. This...

Power Over Ethernet (PoE)

Power Over Ethernet, PoE short, is a method which enables the power supply to end the network port....

power Supply

Computer power supplies are switching power supplies for the power supply of PCs or notebooks...

PowerChoice

The Power Choice function is developed by Seagate and found mainly hard drives at Enterprise. This...

PowerNow! Technology

This power-saving technology for notebook processors from AMD is similar to Intel's SpeedStep...

PowerNow! technology with OPM

Behind the PowerNow! Technology with OPM (Optimized Power Management) hides a technique which is...

PPPoA

With the help of the actual PPPoA Point-to-Point Protocol is transmitted through ATM. To this end...

PPPoE

When PPPoE is an implementation of the Point-to-Point Protocol (PPP) over an Ethernet connection....

PPTP

The Point-to-Point Tunneling Protocol (PPTP short) offers the opportunity to build up a Virtual...

Preemptive Wear Leveling (PWL)

From Preemptive Wear Leveling process especially benefit users of applications that perform a high...

Processor

The heart of any computer, notebook or server is the CPU - Central Processing Unit. Also known as...

Q

QPSK

The quadrature phase shift keying (QPSK) is used, in contrast to the 2-PSK method, four discrete...

Quality of Service (QoS)

Quality of Service, QoS short (sometimes also called Quality of Service), establishes a series of...

Quiet Drive Technology (QDT)

The Quiet Drive Technology was developed by Quantum to reduce noise from HDD to a minimum....

QuietStep

The QuietStep- or RampLoad process ensures lower power consumption by the read / write head is...

R

Radio Service Set ID (SSID)

The Service Set ID is a freely selectable name, eg the may be a wireless network identified and...

RADIUS

The Remote Authentication Dial-In User Service, short for RADIUS is used to authenticate users with...

RAM

RAM (Random Access Memory) or RAM / main memory called. This store temporary data that are required...

Rapid STP

The extension to the SMTP protocol causes that is a network structure is not deleted immediately,...

RIP-1

The Routing Information Protocol (RIP) possessing basic mechanisms to send data packets over LANs...

RIP-2

The Routing Information Protocol Version 2 (RIPv2), the first version will be continued seamlessly....

RMON

When RMON (Remote Monitoring for) is a standard that regulates the query network devices and the...

RMON 2

Unlike RMON 1, this version of the Remote Monitoring standard works on the network and application...

Rogue Detection

A Rogue Detection system helps the administrator of a network in the identification of so-called...

Rotary Acceleration Feed Forward (RAFF)

Especially in server systems and storage arrays, the disks can interfere with each other through...

Rotational Vibration Safeguard (RVS)

The Rotational Vibration Safeguard was developed by HGST and is largely responsible for the...

RRPP

High-performance networks preferably have a ring topology Ethernet-based. There, the Rapid Ring...

S

S.M.A.R.T.

The Self-Monitoring, Analysis and Reporting Technology (SMART short) is a standard that is used for...

SAS

SAS (Serial Attached SCSI) is a computer interface, which took over from the previous parallel SCSI...

SATA

Serial ATA (SATA, also S-ATA / Serial Advanced Technology Attachment) is a mainly developed for...

Seagate Secure

Seagate Secure the self-encrypting hard drives from Seagate are known. This data in case of loss...

Seagate SoftSonic

Seagate Soft Sonic technology refers to the motor of the hard disk, particularly quietly read and...

SeaShell

With SeaShell packaging for hard disks is called that protects the drive especially true during...

Secure Shell (SSH)

The SSH Secure Shell or short, refers to a network protocol, as well as the appropriate software,...

SecureConnect

The Secure Connect technology from Western Digital called special cable for connecting SATA hard...

SecurePark

To ensure a higher long-term reliability is used by Western Digital Secure parking. This method...

Self-correction of twisted-pair polarity reverse

The self-correction of twisted-pair polarity reverse is useful when wiring errors are made when...

Sensing per device

A sensing per device (also called Port Sensing) ensures that the switch automatically detects which...

SentryScan-function

The SentryScan function of WLAN access points Juniper Networks enables the so-called Sentry mode....

Server

Under a server (from lat. Servus = servant) refers usually a computer system that is used in large...

Shader

A shader is a module that is responsible for rendering effects in 3D graphics. These modules can be...

Shock Guard

With the Shock Guard technology from Western Digital, the sensitive drive mechanics from shock and...

Shock Protection System (SPS)

Disks as Maxtor Shock Protection System with particularly robust against shock and vibration. They...

SilentSeek

The technology developed by Samsung SilentSeek technology, provides a total quieter hard drive. For...

SilkStream

With SilkStream Western Digital offers a smooth, uninterrupted video performance. It supports up to...

SIP

With the progressive use of VoIP telephony, and the Session Initiation Procol (SIP) is always...

Smart Memory Access

Intel Smart Memory Access denoted by the ability of a processor to fetch data not only in advance...

Smartphone

Smartphones are the current form of mobile phones. In its main features, it resembles a tablet,...

SNMP

By using the SMTP protocol (Simple Network Management Protocol) Some tasks can be simplified in the...

SNMP 1

The Simple Network Management Protocol (SNMP) has been developed for central monitoring and control...

SNMP 2c

With the second version of the Simple Network Management Protocol (SNMP) has been extended to some...

SNMP 3

The main reason for developing SNMPv3, was the lack of security mechanisms in the previous...

SNTP

The Simple Network Time Protocol (SNTP) is a simplified version of NTP. It is used to set the time...

SODIMM

With SODIMM (Small Outline Dual Inline Memory Module) are called memory modules for notebook...

SoftSonic

With SoftSonic a special, developed by Seagate, motor for hard disks is called. This reduces...

Space Time Blocking Code (STBC)

Spacetime Blocking Code (STBC) is a technique that is used in wireless networks. The data stream is...

Spanning Tree Protocol STP

Especially in the area of the switch environments, the Spanning Tree Protocol (STP) is here to...

SSD

In contrast to a HDD (Hard Disk Drive), which is a magnetic storage medium, SSD drives (SSD = Solid...

SSE

The Streaming SIMD Extensions were introduced by Intel in 1999. Expand the instruction set to speed...

SSE2

This is an extension of the x86 instruction set. This allows for better processing of...

SSE3

As an extension to this SSE2 version offers a total of 13 new instructions. However, the main...

SSE4

The extension of the SSE4 instruction set is slightly different between Intel and AMD. In addition,...

SSH-2

The Secure Shell 2 or shortly SSH-2 provides an encrypted network connection to a remote device...

StableTrac

For hard drives with StableTrac the drive shaft of the magnetic disk is particularly secured top...

stackable

Stackable means for network devices, the device creates a logical whole by the merger of compatible...

Storage

The term Storage different storage solutions are summarized. It is separate and distinct systems,...

Store-and-Forward

Store-and-Forward means a transmission technique in which the transmitted data is stored by the...

Support for SpectraLink Voice Priority (SVP)

SpectraLink Voice Priority (SVP) is a mechanism for priority-based transmission of voice in Wi-Fi...

Syslog

Syslog indicates a standard for transmitting log data. Log data are usually records of events, such...

T

Tablet

A Tablet (English for notepad or blackboard ) is a small and light computer that has a touch screen...

TCP/IP

For TCP / IP (Transmission Control Protocol / Internet Protocol) is strictly speaking not a single...

Telnet

Telnet is composed of the words Telecommunication Network and describes a widely used network...

TFTP

The Trivial File Transfer Protocol (TFTP) is a transmission protocol that was developed based on...

Thermal Flyheight Control (TFC)

With the thermal Flyheight Control Hitachi provides a constant distance between the read / write...

Thermal Monitoring Technologies

Hereby, various techniques are known which provide for the processor does not overheat. Once a...

Thin-Client

Called a thin client, or even zero-cloud client is a computer that consumes because of its lower...

Time-Limited Error Recovery (TLER)

If a hard disk controller as finds a bad sector, it tries to correct the error in a given time. If...

TKIP

The Temporal Key Integrity Protocol, or simply TKIP is a protocol for wireless networks. This is...

TLS

TLS stands for Transport Layer Security (transport layer security) and was formerly also Secure...

Traffic Shaping

Traffic shaping (also traffic shaping) refers to a process by which the data traffic can be...

TRIM-support

The TRIM commands are used by the operating system to inform a solid-state drive (SSD) that certain...

TrueTrack-Servotechnologie

The patented HGST TrueTrack servo technology ensures greater robustness of the selected hard disk....

Trunking

The trunking is used by several pathways (eg physical lines) merge into a single logical...

Trusted Execution Technology

The Intel TXT (Trusted Execution Technology) uses a so-called TPM (Trusted Platform Module) and...

TSPEC

With TSPEC (Traffic Specification) allowing a client on the wireless network to send its own...

Tunnel Magneto-resistive Recording (TMR)

This writing method in Disk works with read / write heads, which are based on the quantum...

Turbo Boost Technology

The Turbo Boost Technology then is used when the system requests a higher clock frequency. The time...

U

U-APSD

U-APSD (Unscheduled Automatic Power Save Delivery) is part of the 802.11e standards. It is...

Uplink

An uplink refers to a specific port on the switch or router that can be used to connect to another...

URL filtering

The URL filtering certain URLs are, as the name suggests, simply prohibited. The user can no longer...

USB

The acronym USB stands for Universal Serial Bus and referred to a bus system that is used to...

USFF

Small, economical and silent computer for office use you get from us in the so-called Ultra Small...

V

VGA

With VGA (from the English for Video Graphics Array) is a standardized connection for the analog...

Virtualization Technology

Virtualization is a technology that makes it possible to run multiple operating systems...

VLAN

By VLAN (Virtual Local Area Network) one or more logical subnets can be formed within a physical...

VPN support

Support VPN (Virtual Private Network) for terminals that can either dial into a VPN is or even...

vPro Technology

The vPro technology is a platform from Intel for desktop PCs in the corporate environment. The...

VRRP

If at any time an access to the Internet or other networks requires that VRRP protocol may be used...

W

WDS

When WDS (Wireless Distribution System) is a method for the wireless connection of several WLAN...

Weighted Round Robin (WRR) queuing

In this process, the CPU is allocated to a process, and after a certain time, the process is again...

WEP

The Wired Equivalent Privacy (WEP) standard is an encryption protocol for wireless networks. This...

WhisperDrive

The Whisper Drive technology from Western Digital uses special lane-changing algorithms to reduce...

Wi-Fi Multimedia (WMM)

The Wi-Fi Multimedia standard or short WMM is to optimize the integration of consumer electronics...

Wide Dynamic Execution

Behind Wide Dynamic Execution hides a merger of various techniques of core architecture from Intel....

WiMAX Wireless Technology

WiMAX refers to a high-speed transmission in the frequency range from 2 GHz to 66 GHz. This...

Wireless Intrusion Detection System (WIDS)

A Wireless Intrusion Detection System (WIDS) detects attacks on the WLAN in the enterprise and...

Wireless Intrusion Prevention System (WIPS)

A Wireless Intrusion Prevention System (WIPS) is a network component that scans the radio range for...

WLAN

A WLAN (Wireless Local Area Network) is a wireless network that consists of at least one base...

WMM

WMM stands for Wi-Fi Multimedia and is also known as Wireless Multimedia Extensions (WME). This is...

WPA

WPA (Wi-Fi Protected Access) is an encryption method for WLAN networks. WPA uses dynamic key, based...

WPA2

The security standard WPA2 (Wi-Fi Protected Access 2) is the successor to WPA and should preferably...

WXGA

WXGA stands for Wide Extended Graphics Array. It has a screen resolution of 1280 x 768 pixels