noteboox.de is SSL secured EHI verified online shop

Glossary

123 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ä Ö Ü

256-Bit-AES

The Advanced Encryption Standard (AES) is an algorithm that is used by various current encryption standards. The number after the name (usually 128...

2T2R MIMO-technology

With 2T2R MIMO two transmitting and receiving antennas are used for data transmission. This improves the data rate of the wireless link and is used...

3D Defense System

The 3D Defense System used by Seagate, consists of various features to protect the hard drive from data loss, data manipulation and physical damage....

3DNow! Technology

In the 3DNow! Technology is a multimedia instruction set of the company AMD, Cyrix and Centaur. It is in direct competition with Intel's SSE...

64 QAM

In communications, the modulation method is 64 QAM used as a combination of amplitude modulation and phase modulation. The 64 in this case indicates...

64 Technology

The Intel 64 Technology featuring the processors directly more than 4 GB of RAM can be addressed. In addition, these CPUs can execute the commands...

A

AAL5

When AAL5 is the ATM adaptation layer 5, which has now enforced in practice for data communication. AAL 5 is doing a very efficient service class...

Access Control List (ACL)

The Access Control List (ACL) or access control list is a software-based technique that determines which users have which rights. In the network...

Access Point

An access point is often found in wireless networks and is also known as base station. It is connected via a cable connection to the network and then...

AccessPoint

With an Access Point (AP short) creates a wireless network for different clients. These can then connect to the access point and gain access to the...

ActiveScan-function

The Active Scan function is available with various WLAN access points Juniper Networks and ensures that is actively looking for other APs. The...

Adaptive Fly Height

Adaptive Fly Height technique is used to automatically adjust the distance between the read / write head to the magnetic disk of the hard disk. When...

ADSL

ADSL stands for Asymmetric Digital Subscriber Line and refers to the widespread connection technology for broadband connections. This variant of the...

ADSL2

The expansion of ADSL to solve some problems of the underlying technology. Therefore, ADSL2 offers power saving features also higher bandwidths. The...

ADSL2+

With ADSL2 + ADSL is already in its third generation available. This range and transmission rate can be increased in particular, the crosstalk...

Advanced Bit Manipulation

AMD implemented on some processors (eg, bulldozers, Piledrive and Jaguar) the instruction set Advanced Bit Manipulation (ABM). This includes the...

Advanced Digital Media Boost

This function causes a significant increase in performance in the execution of SSE instructions. Previously, 64-bit long instructions were only...

Advanced ECC

The Advanced ECC technology developed by HP and extends the standard ECC technology for some functions. Thus, single-bit will not only corrects...

Advanced Format-Technologie

The main feature of the Advanced Format technology is the use of 4-KB sectors instead of 512 byte. This are hard disks with higher storage capacity...

Advanced Multidrive System (SAMS)

If multiple disks simultaneously operated in a system, their rotational vibrations can influence each other. Hard drives with the Advanced Multidrive...

Advanced Smart Cache

Processors with Advanced Smart Cache have not for each processor core has a dedicated L2 cache, but a common for all nuclei. This utilization is...

AES

The Advanced Encryption Standard (AES) is used in different contexts for encryption. It supports different block and key lengths up to 256 bits. If,...

AES-CCMP

Called CCMP, and Counter-Mode / CBC-MAC Protocol, is a security standard is based on AES. CCMP is responsible for encryption, authentication and...

AES-NI

These x-86 instruction set extension for AMD and Intel processors accelerated applications perform AES encryption and -Entschlüsselungen. These...

Anti-Theft Technology

The Anti-Theft Technology Intel was intended to improve the safety of so-equipped notebooks. In the meantime, however, Intel has announced that...

ARP

ARP (Address Resolution Protocol) is a network protocol that maintains a mapping of MAC addresses to IP addresses. It is mainly used in IPv4 Ethernet...

ATAPI

Advanced Technology Attachment with Packet Interface (ATAPI or ATA) is a standard for transferring data between storage media and drives, and the...

Auto MDI/MDI-X

The ports of a switch with Auto MDI-X can independently and automatically recognize whether it is another switch or a terminal on the connected...

Auto-Negotiation

Auto-negotiation is used when two connected via the network port terminals are independently negotiate the maximum possible transmission speed. This...

Auto-Uplink

When auto-uplink is a function of network switches. This thereby recognizes whether it is connected to a terminal or to another switch and...

AVX

AVX refers to an extension of the x86 instruction set processors from AMD and Intel. This feature is especially useful functions for...

B

Background Media Scan (BMS)

The Background Media Scan is used by hard drives for self-diagnosis. If no requests are made on the drive, the scan is performed automatically by...

BFD

With BFD is referred to in the network area, the Bidirectional Forwarding Detection. This is used to detect errors between two transmitting stations,...

BGP

The Border Gateway Protocol (BGP) is one of the main protocols used in the Internet, because it takes care of the routing between autonomous systems....

Blade

A blade server, short blade (English for blade or leaf) consists of a rack and the individual modules, which are also often referred to only as...

BOOTP

The Bootstrap Protocol, or BOOTP short, is used to assign a computer in a network, not only IP address but also other parameters. The client may also...

BPSK

The two-phase shift keying (QPSK, 2-PSK, or Binary Phase Shift Keying) describes a phase shift keying, which has two states. It is the simplest form...

Broadcast Storm Control

A broadcast storm refers to the accumulation of broadcast requests in a network. Since a broadcast is always sent to all devices on the network, this...

Bulk Data Encryption

The Bulk Data Encryption was developed by Hitachi (HGST) for encrypting hard drives. In this case, the hard disk controller takes over the full data...

C

CAPWAP support

CAPWAP (Control and Provisioning of Wireless Access Points) is a software-based protocol. This is used to configure, control and manage wireless...

CAR Committed Access Rate

By Committed Access Rate (CAR), the data transfer rate is limited in recent routers. This quality of service (QoS also) supported because can...

CCFL

Cold Cathode Fluorescent Light is an older method for backlighting for LCD screens, which is a fluorescent tube with daylight spectrum and an...

CCK

The modulation method CCK (Complementary Code Keying for) is required for wireless networking using the IEEE 802.11b. It replaces the DSSS method...

Class of Service (CoS)

The Class of Service (CoS, German service class) has a different meaning depending on the context. In the field of network technology are thus the...

Clean Sweep

The Clean Sweep method provides when switching on the hard disk that the read / write head departs the complete magnetic disk. The aim irregularities...

CLI

In CLI (Command Line Interface) is an ordinary command line (sometimes called command line, console or terminal called). This possibility of entry is...

Computer

Under a PC system is meant all of the individual components necessary for a computer. This includes the motherboard to the CPU, the RAM and the slots...

computer monitors

In order to write texts on the PC and read or to watch movies, you need apart from the graphics card , the signals in image signals processed also a...

Computer power supply

Computer power supplies are switching power supplies for the power supply of PCs or notebooks (External Power Supply) can be used.

Console

Console Switches are key components for rack-mount implementations. (A console is a keyboard, a video monitor, and mouse (KVM) which are connected to...

Cool'n'Quiet Technology

Cool'n'Quiet denotes a power saving mode for the manufacturer AMD processors. It is an improvement of the PowerNow! Technology is and will...

CoolCore technology

The Cool Core technology from AMD delivers on the Opteron models for further energy savings. If one or more cores are not used, the performance is...

CPU

The heart of any computer, notebook or server is the CPU - Central Processing Unit. Also known as the processor or microprocessor. Without a...

Cyclic Delay Diversity (CDD)

In Cyclic Delay Diversity (CDD) is a shift method in MIMO-based transmission systems, ie those with multiple transmit and receive antennas. This...

D

Data Lifeguard

When Data Lifeguard is a small tool manufacturer Western Digital. This internal and external hard drives are checked and the user, the serial and...

Data Protection System (DPS)

When Data Protection System is a method of Maxtor that protects the hard drive against shock. This not only increased reliability is achieved, it is...

DDoS

A DDoS attack (Distributed Denial of Server) is aimed, unlike the denial of service attack, to a larger number of servers and systems. This is also...

Demand Based Switching

Behind Demand Based Switching (DBS) hides a technology from Intel that provides better energy efficiency. At low load the cores no longer run with...

Denial-of-service-attacks

The denial of service attacks (DoS attacks) contact mostly against certain servers and computer systems, with the aim of overloading. As a result,...

DFS-support

The dynamic frequency selection (Dynamic Frequency Selection, short DFS) allows a router can change to an unused channel in the higher 5 GHz band....

DHCP

The Dynamic Host Configuration Protocol (DHCP short) it is possible to automatically assign IP addresses within a local network. In private networks...

DiffServ

DiffServ (Differentiated Services) is a method which classifies the IP packets differently. This can be, for example, ensures that critical...

DIMM

With DIMM (Dual Inline Memory Module) are referred to the work of computer memory modules. The term Dual behalf means that on the front and back...

Directed Offline Scan

The Directed Offline Scan performs automatic tests for self-diagnosis of disks while they are at rest, are thus read or write any data. This causes...

DirectX

DirectX is a collection of application programming interfaces (APIs also for Application Programming Interface) for multimedia applications on...

DisplayPort

DisplayPort is a standardized connection standard that is used to transmit video and audio signals. In the first place there is this connection to...

DNS

The Domain Name System (DNS) is one of the most important services in private LANs and public networks such as the Internet. It is responsible for a...

DoS attack prevention

In a DOS attack (Denial of Service), the entire network will be paralyzed by as many data packets are sent to the target, it can not handle. Many...

DQPSK

By Differential Quaternary Phase Shift Keying (QPSK), a quadrature phase shift keying is described. This offers several advantages as opposed to QPSK...

DSSS

The Direct Sequence Spread Spectrum (DSSS) is used for data transmission via radio link. By this method, the desired signal more robust against...

Dual Dynamic Power Management

The Dual Dynamic Power Management results in AMD processors, that the power consumption of individual CPU cores can be independently controlled. This...

DVI

For DVI (Digital Visual Interface) is an interface that is suitable only for the transmission of video data. It is now used on many motherboards and...

Dynamic and Static Wear Leveling

The Dynamic and Static Wear Leveling comes with flash memory media, such as USB sticks or SSD drives are used. This is a technology that enables,...

E

ECC

The ECC technology (Error Checking and Correcting) ensures higher reliability of memory. Through her single-bit errors can be detected and corrected,...

Enhanced Error Correction Code

This method is used by several manufacturers, to reduce the number of bit errors. Important here is that the detected errors are not only but also...

Enhanced G-Force Protection

With Enhanced G-Force Protection, the hard drive is better protected against shocks and vibrations. When the device is moved while it is turned on,...

Enhanced Halt State

By a stop command, the operating system can turn off the processing units of the processor. The extended hold command (Enhanced Halt State) causes...

Enhanced Partial Response Maximum Likelihood (EPRML)

This method provides a better coding of the data before it is written to the hard disk. This not only a higher density and better error correction...

Enhanced PowerNow!

This is the development of energy saving technology of AMD. Instead of adapting only the core voltage and clock speed of the processor to the current...

Enhanced SpeedStep technology

The Intel Enhanced SpeedStep Technology (IEST) provides dynamic adaptation of processor performance. Little computing power is required, the cores...

Enhanced Virus Protection

Known at Intel under the name XD bit (execute disable), AMD uses the name Enhanced Virus Protection or short EPP. This is a technique that improves...

EPT

The Extended Page Tables are an implementation of Intel, to utilize the Second Level Address Translation (SLAT). Here, the management of the memory...

Ethernet

Ethernet is a specification that defines various details of software and hardware in wired networks. To this end, in addition to the protocols used...

EURO-ISDN

EURO-ISDN is also known under the names or e-DSS1 DSS1. There is a signaling protocol, which is responsible for the D channel of the ISDN. Reason for...

Execute Disable Bit

With Intel as XD bit (execute disable) denotes this function is to be regarded as a security enhancement. In this case, the main task to prevent that...

F

Fast Memory Access

Intel Fast Memory Access provides a more efficient distribution of accesses to the memory. More specifically, the capacity of the data bus between...

Fibre Channel

Fibre Channel is a logical extension of the SCSI bus. In contrast to the SCSI bus Fibre Channel is a serial network with nodes, switches, other...

firmware upgradable

The firmware is the software side heart of every switch and router. From her the possible functions and factory settings depend on. Many...

Flex Memory Access

With Intel Flex Memory Access, it is possible two memory modules of different sizes in dual-channel mode to operate, which otherwise only works with...

FlexPower

Hard drives with the Flex Power feature by the manufacturer Western Digital can provide two different ways with electricity. First, it is possible to...

flow control

The flow control or flow control, controls on data transfers between the respective data rate devices. It often happens that the transmitting and...

Fluid-Dynamic-Bearing-(FDB)-Motor

The motor current hard drive has fluid bearings bearings instead of conventional ball bearings. This Fluid Dynamic Bearings cause a lower noise level...

Full duplex capability

Full duplex capability means that the terminals involved can send and receive simultaneously. In older networks and half-duplex was used, where it...

G

G-Force Protection

The G-Force Protection Seagate contains a so-called Free Fall Sensor. This is to recognize early enough the hard drive if the notebook has been...

GARP

The GARP protocol is used on networks to publicize the characteristics of a terminal. Thereby, this register at the Layer 2 switches and use the LAN...

Glossy

Display with a glossy surface, as glare-type display known.

graphics Cards

Graphics cards are boards with a GPU (Graphics Processing Unit), the processor data from the pre-processed and as images / graphics, displays it on...

GreenPower-Technologie

Under the GreenPower Technology Western Digital combines several properties together, such as. IntelliSeek or IntelliPark. These cause a total...

H

Harddrives

Hard drives and hard disks (HDD) are called magnetic storage media used for permanent storage of data on PCs or notebooks.

Hardware encryption

Hardware encryption is an encryption process in which the hardware device without the use of additional software is able to encrypt data. This is for...

HDMI

The High Definition Multimedia Interface (usually just called HDMI) is an interface through which a transmission of video and audio signals over a...

Hitachi Voltage Efficiency Regulator Technology (HiVERT)

This method is mainly used in 2.5-inch hard drives for notebooks. It was developed by Hitachi with the aim to configure the power supply efficiency...

Hot-Swap

The hot-swap functionality enables the exchange of hardware during operation. Thus, e.g. a failed disk in the RAID array to be replaced in most cases...

HTTP

The Hypertext Transfer Protocol (HTTP short, English for hypertext transfer protocol) was defined in version 1.0 in 1996, with the development in...

Hyper-Threading Technology

Hyper-Threading (HTT short) refers to Intel's implementation of multithreading in hardwareseitigem processors. The purpose of this technique is...

Hyper-Threading-Technologie

Hyper-Threading (HTT short) refers to Intel's implementation of multithreading in hardwareseitigem processors. The purpose of this technique is...

HyperTransport-Technologie

In the (short-HT) HyperTransport technology is an open industry standard. This emerged from an AMD project called Lightning Data Transport (LDT) and...

I

I/O Acceleration Technology

This technology results in an acceleration of the input and expenditure. The hardware architecture was modified to allow parts of the processing of...

IDE

Advanced Technology Attachment with Packet Interface (ATAPI or ATA) is a standard for transferring data between storage media and drives, and the...

Idle Read After Write (IRAW)

By Idle Read After Write, the reliability of the written data on hard drives is ensured. Traditionally been carried out by hard disks directly after...

Idle States

Many processors have to save energy for a resting state (English Idle State). This is, for example, triggered by a holding command of the operating...

IGMP

IGMP (Internet Group Management Protocol) is used to establish the multicast groups where there is a network protocol. The actual management is done...

IGMP Snooping

IGMP is a network protocol used to establish the multicast groups. IGMP snooping allows a switch communication between end devices and routers to...

ImpacGuard

The ImpacGuard was developed for the interaction with the Noise Guard and the SilentSeek technology. Samsung hard drives get so perfect protection...

Independent Dynamic Core Technology

The Independent Dynamic Core Technology provides more performance, at various AMD CPUs. A core busy more than another, then the clock rate is...

Integrated Ethernet switch

Integrated Ethernet switch The integrated Ethernet switch is often found in routers and wireless access points. This simply indicates only that at...

integrated memory controller

The memory controller controls the flow of data between the CPU and RAM. This is either on the motherboard (usually on the North Bridge) or directly...

IntelliPower

To obtain the ideal tuning of speed and transfer rate, Western Digital IntelliPower provides with various cache algorithms. Result, considerable...

IntelliSeek

To optimize the search speed on hard drives and at the same time to reduce the noise, and power consumption, uses Western Digital IntelliSeek. It is...

Intrusion Detection

An intrusion detection system is used to detect and prevent attacks against a computer or a computer network. A distinction is made between the types...

IP-control

IP control can have many different meanings. In most cases, however, is hereby meant, that can be configured and used certain functions of the system...

IPSec

The Internet Protocol Security (IPSec short) supports secure communication over potentially unsafe IP networks. These IPSec provides ultimately the...

IPv6

IPv6 is the successor to the current IPv4 standard protocol that is used on the Internet and local networks. Need to migrate to IPv6, however, all...

IRF

The Intelligent Resilient Framework (IRF) is an HP Technology and is designed to form again was efficient networks that scale easily and wait. For...

IS-IS

The Intermediate System to Intermediate System Protocol (IS-IS) has many similarities to OSPF and works accordingly after the link-state routing...

J

Jumbo-Frames-Support

Jumbo frames denote large and non-standard frames on the network. Frames are the data that are transmitted together with their log data. Oversized...

K

KVM

KVM stands for keyboard video mouse and is a Console Switch provides the central components for rack-mount implementations.

L

L2TP

The Layer 2 Tunneling Protocol is used to tunnel frames from the second layer of the OSI model, between two networks via the Internet. This allows a...

Layer 2 switching

Layer 2 switches operate at the data link layer of the OSI model. This means that the devices with the MAC addresses of the connected devices can...

Layer 3 switching

In contrast to the Layer 2 switch, a Layer 3 switch operates at the network layer of the OSI model. Here come instead of MAC addresses and IP...

LCD

LCD screens are working on a backlight. Nowadays, there are two backlight systems this: CCFL and LED

LEAP

LEAP is an implementation of EAP (Extensible Authentication Protocol) Cisco. To authenticate a user name and password is used. To use this...

LED

Light Emitting Diode - is a newer backlighting system which does not use an inverter, and instead of a fluorescent tube several LEDs used.

M

MAC-address-filtering

A MAC address filtering can grant certain devices access to the network or exclude certain systems. He is often found in connection with Wi-Fi...

managed

A managed switches clearly has more functions than a normal standard switch. For example, the administrator can log these manageable systems to...

Maximum Ratio Combining (MRC)

Using Maximum Ratio Combining (MRC) is the signal strength of radio signals, increased by the use of multiple antennas. The individual antennas...

MEEPRML technology

MEEPRML (Modified Enhanced EPRML) is an extension of the EPRML method. This provides improved handling of data before it can be read or written....

Memory

RAM (Random Access Memory) or RAM / main memory called. This store temporary data that are required for execution or processing of applications. The...

mesh networking

A meshed network (engl. Mesh) is when each network component coupled to one or more other. The data packets are always passed on as long until they...

MGCP

For controlling VoIP Gateways inter alia, MGCP (Media Gateway Control Protocol) is used. This provides a transmission of control information and can...

MHz

Megahertz is a frequency unit

MIMO

As a MIMO (Multiple Input Multiple Output) refers to the use of multiple transmit and receive antennas for communication in communications...

MLD-Snooping

What is known under the name of IGMP in IPv4, IPv6 is continued at as Multicast Listener Discovery (MLD). In particular, switches and other network...

MMX instructions

The Multi Media Extension (MMX) was introduced by Intel in 1997. This larger amounts of data are processed in parallel, since the instructions are...

Monitor

To write texts on the PC and read or to watch movies, you need apart from the graphics card, the signals in image signals also processed a...

motherboard

Also known by the name mainboard. A board on which are installed the various components of a computer.

MPLS

MPLS is Multiprotocol Label Switching, and enables the connection-oriented transfer of data packets in a connectionless network. The path to take the...

MS-CHAP

MS-CHAP is Microsoft's implementation of the Challenge Handshake Authentication Protcol (CHAP). This has been around since Windows NT 4.0 and is...

MSTP

With the Multiple Spanning Tree Protocol (RSTP) MSTP will be extended again. You get so used to different STP instances the possibility of VLAN...

My WiFi Technology

By My WiFi technology from Intel, it is always possible to make out his notebook into a wireless access point. Other devices such as smartphones can...

N

NAT Support

The Network Address Translation (NAT) procedure is often used by network devices, and in particular IP-routers. It is the translation of IPv4...

Native Command Queuing (NCQ)

Native Command Queuing (NCQ short) describes a method in which the hard drive multiple commands are transferred simultaneously. Subsequently, the...

nCache Acceleration Technology

NCache Acceleration Technology works unlike DRAM, NAND flash memory to store eg. Write accesses between. This can be done much more efficiently than...

NoiseGuard

The Noise Guard technology has been used in some Samsung disks. The noise level decreases thereby enormously, as the spectrum is shifted and...

Notebook

Portable PCs in different sizes and power levels.

NoTouch-Ramp-Ladetechnologie

The NoTouch ramp load technology used by Western Digital, is to prevent touching the read / write head of a magnetic disk. This wear can be reduced...

O

ODD

ODD stands for Optical Disc Drive to German optical drive, this is generally required for read and write CD's and DVD's.

OFDM

The modulation method Orthogonal Frequency-Division Multiplexing (OFDM) is used in the digital data transmission is used. The payload can be divided...

OpenGL

The OpenGL (Open Graphics Library or Open Graphics Library) is a collection of application programming interfaces for 2D and 3D graphics. It can be...

OSPF

In OSPF (Open Shortest Path First) is a routing protocol of the Interior Gateway Protocol class. This has in large enterprise networks a number of...

P

packet filtering

The packet filter, sometimes also called network filter, allowing the filtering of incoming and outgoing traffic. This can, for example, be used to...

PAT Support

In the Port and Address Translation (NAT or NAPT) a special form of NAT is used. A special feature here is the will not only translates the IP...

PCIE

The Peripheral Component Interconnect Express Standard (abbreviated to PCI Express, PCIe or PCI-e), governs the connection of peripherals to the...

PEAP

The Protected Extensible Authentication Protocol (PEAP) was developed, among others, Cisco and Microsoft. It is used to hedge EAP by an encrypted and...

Perpendicular Magnetic Recording (PMR)

With Perpendicular Magnetic Recording refers to a method that is used for writing to disks with magnetic disks. This method is inter alia also known...

Perpendicular Recording

With Perpendicular Magnetic Recording refers to a method that is used for writing to disks with magnetic disks. This method is inter alia also known...

PFC

PFC are known as passive or active power factor correction

PMK-Caching

The PMK caching (Pairwise Master Key) enables authentication in wireless networks. The PMK serves as a Master Secret, which is present in the access...

PoE

Power Over Ethernet, PoE short, a procedure which allows the power supply to end the network port. Here, however, there are different versions that...

PoE support

A network device with PoE support can be supplied via the network cable. This requires that the switch is supported the same or a compatible...

POP3

The POP3 protocol is the e-mail terminal for use. You can specify both a single client be used on a home computer, as well as a server needs to...

Port Mirroring

A Port Mirroring creates an exact copy of the selected port, to another desired switch port. This means that all data packets are arriving at the...

Power Over Ethernet (PoE)

Power Over Ethernet, PoE short, is a method which enables the power supply to end the network port. Here, however, there are different versions that...

power Supply

Computer power supplies are switching power supplies for the power supply of PCs or notebooks (External Power Supply) can be used.

PowerChoice

The Power Choice function is developed by Seagate and found mainly hard drives at Enterprise. This is the user a precise adjustment of the power...

PowerNow! Technology

This power-saving technology for notebook processors from AMD is similar to Intel's SpeedStep technology. Basically here the computing power is...

PowerNow! technology with OPM

Behind the PowerNow! Technology with OPM (Optimized Power Management) hides a technique which is basically very similar to the Cool'n'Quiet...

PPPoA

With the help of the actual PPPoA Point-to-Point Protocol is transmitted through ATM. To this end it is packed into corresponding ATM cells in order...

PPPoE

When PPPoE is an implementation of the Point-to-Point Protocol (PPP) over an Ethernet connection. Two phases of the connection are defined, the...

PPTP

The Point-to-Point Tunneling Protocol (PPTP short) offers the opportunity to build up a Virtual Private Network. It was developed, inter alia, 3Com...

Preemptive Wear Leveling (PWL)

From Preemptive Wear Leveling process especially benefit users of applications that perform a high number of read / write operations in a physically...

Processor

The heart of any computer, notebook or server is the CPU - Central Processing Unit. Also known as the processor or microprocessor. Without a...

Q

QPSK

The quadrature phase shift keying (QPSK) is used, in contrast to the 2-PSK method, four discrete phase positions. Each phase state thereby represents...

Quality of Service (QoS)

Quality of Service, QoS short (sometimes also called Quality of Service), establishes a series of paramaters for various services. So should as IP...

Quiet Drive Technology (QDT)

The Quiet Drive Technology was developed by Quantum to reduce noise from HDD to a minimum. Therefore, all components, not just the engine,...

QuietStep

The QuietStep- or RampLoad process ensures lower power consumption by the read / write head is parked at idle away from the actual magnetic disk....

R

Radio Service Set ID (SSID)

The Service Set ID is a freely selectable name, eg the may be a wireless network identified and addressed by this. Many wireless access points today...

RADIUS

The Remote Authentication Dial-In User Service, short for RADIUS is used to authenticate users with dial-up connections in computer networks, such...

RAM

RAM (Random Access Memory) or RAM / main memory called. This store temporary data that are required for execution or processing of applications. The...

Rapid STP

The extension to the SMTP protocol causes that is a network structure is not deleted immediately, when a change occurs. Rather, RSTP ensures that...

RIP-1

The Routing Information Protocol (RIP) possessing basic mechanisms to send data packets over LANs and other networks. It works on the basis of...

RIP-2

The Routing Information Protocol Version 2 (RIPv2), the first version will be continued seamlessly. Many features, such as the packet format, were...

RMON

When RMON (Remote Monitoring for) is a standard that regulates the query network devices and the collection of statistical data. It thereby...

RMON 2

Unlike RMON 1, this version of the Remote Monitoring standard works on the network and application layer of the OSI model. This more data can be...

Rogue Detection

A Rogue Detection system helps the administrator of a network in the identification of so-called rouge access points. This can be as involve base...

Rotary Acceleration Feed Forward (RAFF)

Especially in server systems and storage arrays, the disks can interfere with each other through their rotational vibration. To reduce this effect...

Rotational Vibration Safeguard (RVS)

The Rotational Vibration Safeguard was developed by HGST and is largely responsible for the recognition of vibration. Two sensors will measure...

RRPP

High-performance networks preferably have a ring topology Ethernet-based. There, the Rapid Ring Protection Protocol (RRPP) is used to prevent...

S

S.M.A.R.T.

The Self-Monitoring, Analysis and Reporting Technology (SMART short) is a standard that is used for continuous monitoring of functions and features,...

SAS

SAS (Serial Attached SCSI) is a computer interface, which took over from the previous parallel SCSI interface 2004.

SATA

Serial ATA (SATA, also S-ATA / Serial Advanced Technology Attachment) is a mainly developed for data exchange between processor and disk...

Seagate Secure

Seagate Secure the self-encrypting hard drives from Seagate are known. This data in case of loss and against unauthorized access are optimally...

Seagate SoftSonic

Seagate Soft Sonic technology refers to the motor of the hard disk, particularly quietly read and write operations are possible. Therefore, own up...

SeaShell

With SeaShell packaging for hard disks is called that protects the drive especially true during shipping. It also protects against static discharge...

Secure Shell (SSH)

The SSH Secure Shell or short, refers to a network protocol, as well as the appropriate software, ie programs. SSH is used to an encrypted network...

SecureConnect

The Secure Connect technology from Western Digital called special cable for connecting SATA hard drives. On one side is a normal SATA connector for...

SecurePark

To ensure a higher long-term reliability is used by Western Digital Secure parking. This method ensures that the read / write head when idle, it is...

Self-correction of twisted-pair polarity reverse

The self-correction of twisted-pair polarity reverse is useful when wiring errors are made when network connection. These are then recognized by the...

Sensing per device

A sensing per device (also called Port Sensing) ensures that the switch automatically detects which device works with which maximum transfer speed....

SentryScan-function

The SentryScan function of WLAN access points Juniper Networks enables the so-called Sentry mode. If the access point is operated in this mode, it...

Server

Under a server (from lat. Servus = servant) refers usually a computer system that is used in large corporate networks and on all main processes of...

Shader

A shader is a module that is responsible for rendering effects in 3D graphics. These modules can be hardware, as well exist software based and are...

Shock Guard

With the Shock Guard technology from Western Digital, the sensitive drive mechanics from shock and vibration protected. Also for the plate surfaces...

Shock Protection System (SPS)

Disks as Maxtor Shock Protection System with particularly robust against shock and vibration. They are therefore particularly suitable for mobile...

SilentSeek

The technology developed by Samsung SilentSeek technology, provides a total quieter hard drive. For this purpose, the drive elements and their...

SilkStream

With SilkStream Western Digital offers a smooth, uninterrupted video performance. It supports up to twelve simultaneous streams in HD quality. Thus,...

SIP

With the progressive use of VoIP telephony, and the Session Initiation Procol (SIP) is always known. This provides functions for establishing,...

Smart Memory Access

Intel Smart Memory Access denoted by the ability of a processor to fetch data not only in advance in the cache (prefetching), but to process them...

Smartphone

Smartphones are the current form of mobile phones. In its main features, it resembles a tablet, which can do well without a keyboard.

SNMP

By using the SMTP protocol (Simple Network Management Protocol) Some tasks can be simplified in the management of a network. Thus, individual...

SNMP 1

The Simple Network Management Protocol (SNMP) has been developed for central monitoring and control of network systems. These include, for example,...

SNMP 2c

With the second version of the Simple Network Management Protocol (SNMP) has been extended to some functions. If today is SNMP version 2 is...

SNMP 3

The main reason for developing SNMPv3, was the lack of security mechanisms in the previous versions. However, since this also provides more...

SNTP

The Simple Network Time Protocol (SNTP) is a simplified version of NTP. It is used to set the time between different computer system to synchronize,...

SODIMM

With SODIMM (Small Outline Dual Inline Memory Module) are called memory modules for notebook computers and other computers in a small format. They...

SoftSonic

With SoftSonic a special, developed by Seagate, motor for hard disks is called. This reduces vibrations, the waste heat, and bearing wear and works...

Space Time Blocking Code (STBC)

Spacetime Blocking Code (STBC) is a technique that is used in wireless networks. The data stream is coded in data blocks, of which copies are...

Spanning Tree Protocol STP

Especially in the area of the switch environments, the Spanning Tree Protocol (STP) is here to stay. Namely, prevents the two components with two...

SSD

In contrast to a HDD (Hard Disk Drive), which is a magnetic storage medium, SSD drives (SSD = Solid State Drive) do not work with a rotating magnetic...

SSE

The Streaming SIMD Extensions were introduced by Intel in 1999. Expand the instruction set to speed up by parallelizing programs. Today SSE is...

SSE2

This is an extension of the x86 instruction set. This allows for better processing of floating-point and integer operations. This fundamental...

SSE3

As an extension to this SSE2 version offers a total of 13 new instructions. However, the main innovations simplify the coding of 3D features. This...

SSE4

The extension of the SSE4 instruction set is slightly different between Intel and AMD. In addition, there are still the minor versions 4.1, 4.2 and...

SSH-2

The Secure Shell 2 or shortly SSH-2 provides an encrypted network connection to a remote device ready. This allows, for example. Router remotely...

StableTrac

For hard drives with StableTrac the drive shaft of the magnetic disk is particularly secured top and bottom. This disk is stabilized and the own...

stackable

Stackable means for network devices, the device creates a logical whole by the merger of compatible devices. This is, for example, some switch models...

Storage

The term Storage different storage solutions are summarized. It is separate and distinct systems, which may have different components.

Store-and-Forward

Store-and-Forward means a transmission technique in which the transmitted data is stored by the respective intermediate station and only then...

Support for SpectraLink Voice Priority (SVP)

SpectraLink Voice Priority (SVP) is a mechanism for priority-based transmission of voice in Wi-Fi networks. This is fully compatible with the 802.11...

Syslog

Syslog indicates a standard for transmitting log data. Log data are usually records of events, such as errors, warnings, or simple status...

T

Tablet

A Tablet (English for notepad or blackboard ) is a small and light computer that has a touch screen and is suited by the flat design especially for...

TCP/IP

For TCP / IP (Transmission Control Protocol / Internet Protocol) is strictly speaking not a single protocol but at more contiguous. Due to the...

Telnet

Telnet is composed of the words Telecommunication Network and describes a widely used network protocol. There is here a Telnet client and a Telnet...

TFTP

The Trivial File Transfer Protocol (TFTP) is a transmission protocol that was developed based on EFTP. It only supports the reading and writing of...

Thermal Flyheight Control (TFC)

With the thermal Flyheight Control Hitachi provides a constant distance between the read / write head and the magnetic disk so that no loss of...

Thermal Monitoring Technologies

Hereby, various techniques are known which provide for the processor does not overheat. Once a certain temperature is exceeded, in fact, the...

Thin-Client

Called a thin client, or even zero-cloud client is a computer that consumes because of its lower hardware configuration, significantly less energy...

Time-Limited Error Recovery (TLER)

If a hard disk controller as finds a bad sector, it tries to correct the error in a given time. If this fails, the disk is removed from the RAID...

TKIP

The Temporal Key Integrity Protocol, or simply TKIP is a protocol for wireless networks. This is still used today in networks that use WPA or WPA2....

TLS

TLS stands for Transport Layer Security (transport layer security) and was formerly also Secure Sockets Layer (SSL) called. This is an encryption...

Traffic Shaping

Traffic shaping (also traffic shaping) refers to a process by which the data traffic can be affected. It may be preferred data packets or be subject...

TRIM-support

The TRIM commands are used by the operating system to inform a solid-state drive (SSD) that certain data areas are no longer used because the files...

TrueTrack-Servotechnologie

The patented HGST TrueTrack servo technology ensures greater robustness of the selected hard disk. Technically, several improvements provide the...

Trunking

The trunking is used by several pathways (eg physical lines) merge into a single logical transmission path. This can be for example a large load on a...

Trusted Execution Technology

The Intel TXT (Trusted Execution Technology) uses a so-called TPM (Trusted Platform Module) and cryptographic methods to determine the authentic...

TSPEC

With TSPEC (Traffic Specification) allowing a client on the wireless network to send its own connection requests to the Access Point. A client could,...

Tunnel Magneto-resistive Recording (TMR)

This writing method in Disk works with read / write heads, which are based on the quantum mechanical effect of the magnetic tunnel resistance. The...

Turbo Boost Technology

The Turbo Boost Technology then is used when the system requests a higher clock frequency. The time of activation and the corresponding duration...

U

U-APSD

U-APSD (Unscheduled Automatic Power Save Delivery) is part of the 802.11e standards. It is primarily responsible for increasing the battery life of...

Uplink

An uplink refers to a specific port on the switch or router that can be used to connect to another switch. Uplinks are usually more powerful because...

URL filtering

The URL filtering certain URLs are, as the name suggests, simply prohibited. The user can no longer access these URLs so. The URL filter is often...

USB

The acronym USB stands for Universal Serial Bus and referred to a bus system that is used to connect the various peripherals. Prior to the...

USFF

Small, economical and silent computer for office use you get from us in the so-called Ultra Small Form Factor (USFF). This is an extension of the...

V

VGA

With VGA (from the English for Video Graphics Array) is a standardized connection for the analog image transmission is called. He was introduced by...

Virtualization Technology

Virtualization is a technology that makes it possible to run multiple operating systems simultaneously on a so-called host and allocate the available...

VLAN

By VLAN (Virtual Local Area Network) one or more logical subnets can be formed within a physical network. This causes a logical separation of...

VPN support

Support VPN (Virtual Private Network) for terminals that can either dial into a VPN is or even create one. For routers in the business sector both is...

vPro Technology

The vPro technology is a platform from Intel for desktop PCs in the corporate environment. The assertion Active Management Technology (AMT)...

VRRP

If at any time an access to the Internet or other networks requires that VRRP protocol may be used for hedging purposes. This provides methods which...

W

WDS

When WDS (Wireless Distribution System) is a method for the wireless connection of several WLAN access points. Thus, the individual base stations...

Weighted Round Robin (WRR) queuing

In this process, the CPU is allocated to a process, and after a certain time, the process is again shifted to the rear in the queue. The individual...

WEP

The Wired Equivalent Privacy (WEP) standard is an encryption protocol for wireless networks. This should not only ensure access to the network...

WhisperDrive

The Whisper Drive technology from Western Digital uses special lane-changing algorithms to reduce the number of movements of the read / write head....

Wi-Fi Multimedia (WMM)

The Wi-Fi Multimedia standard or short WMM is to optimize the integration of consumer electronics into wireless networks. Ultimately, by better...

Wide Dynamic Execution

Behind Wide Dynamic Execution hides a merger of various techniques of core architecture from Intel. These cause the CPU executes instructions in an...

WiMAX Wireless Technology

WiMAX refers to a high-speed transmission in the frequency range from 2 GHz to 66 GHz. This technique is used in many countries and also the latest...

Wireless Intrusion Detection System (WIDS)

A Wireless Intrusion Detection System (WIDS) detects attacks on the WLAN in the enterprise and notifies the administrator. Both software-based...

Wireless Intrusion Prevention System (WIPS)

A Wireless Intrusion Prevention System (WIPS) is a network component that scans the radio range for unauthorized access points. Thus, for example....

WLAN

A WLAN (Wireless Local Area Network) is a wireless network that consists of at least one base station and one or more clients. The base station (also...

WMM

WMM stands for Wi-Fi Multimedia and is also known as Wireless Multimedia Extensions (WME). This is a standard, which should ensure better use of...

WPA

WPA (Wi-Fi Protected Access) is an encryption method for WLAN networks. WPA uses dynamic key, based on TKIP and PSK or EAP for authentication of...

WPA2

The security standard WPA2 (Wi-Fi Protected Access 2) is the successor to WPA and should preferably be used whenever possible. It is based on AES,...

WXGA

WXGA stands for Wide Extended Graphics Array. It has a screen resolution of 1280 x 768 pixels