Glossary

256-Bit-AES

The 256-bit AES algorithm is based on a block cipher, which means it divides the data to be...

2T2R MIMO-technology

With 2T2R MIMO two transmitting and receiving antennas are used for data transmission. This...

3D Defense System

The 3D Defense System used by Seagate, consists of various features to protect the hard drive from...

3DNow! Technology

In the 3DNow! Technology is a multimedia instruction set of the company AMD, Cyrix and Centaur. It...

64 QAM

In communications, the modulation method is 64 QAM used as a combination of amplitude modulation...

AAL5

The ATM Adaptation Layer 5 (AAL5) is a protocol layer of the Asynchronous Transfer Mode (ATM)...

Access Control List (ACL)

An Access Control List (ACL) is a security mechanism used to control access to a network or a...

Access Point

An access point is often found in wireless networks and is also known as base station. It is...

AccessPoint

With an Access Point (AP short) creates a wireless network for different clients. These can then...

ActiveScan-function

The Active Scan function is available with various WLAN access points Juniper Networks and ensures...
Loading ...
kein Bild
id:
mpn:
ean:
from *
/
goto offer
kein Bild
artnr:
HAN:
EAN:
special price
toparticle
bestseller
in stock
price: from *
/