Glossary

256-Bit-AES

The Advanced Encryption Standard (AES) is an algorithm that is used by various current encryption standards. The number after the name (usually 128...

2T2R MIMO-technology

With 2T2R MIMO two transmitting and receiving antennas are used for data transmission. This improves the data rate of the wireless link and is used...

3D Defense System

The 3D Defense System used by Seagate, consists of various features to protect the hard drive from data loss, data manipulation and physical damage....

3DNow! Technology

In the 3DNow! Technology is a multimedia instruction set of the company AMD, Cyrix and Centaur. It is in direct competition with Intel's SSE...

64 QAM

In communications, the modulation method is 64 QAM used as a combination of amplitude modulation and phase modulation. The 64 in this case indicates...

64 Technology

The Intel 64 Technology featuring the processors directly more than 4 GB of RAM can be addressed. In addition, these CPUs can execute the commands...

AAL5

When AAL5 is the ATM adaptation layer 5, which has now enforced in practice for data communication. AAL 5 is doing a very efficient service class...

Access Control List (ACL)

The Access Control List (ACL) or access control list is a software-based technique that determines which users have which rights. In the network...

Access Point

An access point is often found in wireless networks and is also known as base station. It is connected via a cable connection to the network and then...

AccessPoint

With an Access Point (AP short) creates a wireless network for different clients. These can then connect to the access point and gain access to the...

ActiveScan-function

The Active Scan function is available with various WLAN access points Juniper Networks and ensures that is actively looking for other APs. The...

Adaptive Fly Height

Adaptive Fly Height technique is used to automatically adjust the distance between the read / write head to the magnetic disk of the hard disk. When...

ADSL

ADSL stands for Asymmetric Digital Subscriber Line and refers to the widespread connection technology for broadband connections. This variant of the...

ADSL2

The expansion of ADSL to solve some problems of the underlying technology. Therefore, ADSL2 offers power saving features also higher bandwidths. The...

ADSL2+

With ADSL2 + ADSL is already in its third generation available. This range and transmission rate can be increased in particular, the crosstalk...

Advanced Bit Manipulation

AMD implemented on some processors (eg, bulldozers, Piledrive and Jaguar) the instruction set Advanced Bit Manipulation (ABM). This includes the...

Advanced Digital Media Boost

This function causes a significant increase in performance in the execution of SSE instructions. Previously, 64-bit long instructions were only...

Advanced ECC

The Advanced ECC technology developed by HP and extends the standard ECC technology for some functions. Thus, single-bit will not only corrects...

Advanced Format-Technologie

The main feature of the Advanced Format technology is the use of 4-KB sectors instead of 512 byte. This are hard disks with higher storage capacity...

Advanced Multidrive System (SAMS)

If multiple disks simultaneously operated in a system, their rotational vibrations can influence each other. Hard drives with the Advanced Multidrive...

Advanced Smart Cache

Processors with Advanced Smart Cache have not for each processor core has a dedicated L2 cache, but a common for all nuclei. This utilization is...

AES

The Advanced Encryption Standard (AES) is used in different contexts for encryption. It supports different block and key lengths up to 256 bits. If,...

AES-CCMP

Called CCMP, and Counter-Mode / CBC-MAC Protocol, is a security standard is based on AES. CCMP is responsible for encryption, authentication and...

AES-NI

These x-86 instruction set extension for AMD and Intel processors accelerated applications perform AES encryption and -Entschlüsselungen. These...

Anti-Theft Technology

The Anti-Theft Technology Intel was intended to improve the safety of so-equipped notebooks. In the meantime, however, Intel has announced that...

ARP

ARP (Address Resolution Protocol) is a network protocol that maintains a mapping of MAC addresses to IP addresses. It is mainly used in IPv4 Ethernet...

ATAPI

Advanced Technology Attachment with Packet Interface (ATAPI or ATA) is a standard for transferring data between storage media and drives, and the...

Auto MDI/MDI-X

The ports of a switch with Auto MDI-X can independently and automatically recognize whether it is another switch or a terminal on the connected...

Auto-Negotiation

Auto-negotiation is used when two connected via the network port terminals are independently negotiate the maximum possible transmission speed. This...

Auto-Uplink

When auto-uplink is a function of network switches. This thereby recognizes whether it is connected to a terminal or to another switch and...

AVX

AVX refers to an extension of the x86 instruction set processors from AMD and Intel. This feature is especially useful functions for...

Background Media Scan (BMS)

The Background Media Scan is used by hard drives for self-diagnosis. If no requests are made on the drive, the scan is performed automatically by...

BFD

With BFD is referred to in the network area, the Bidirectional Forwarding Detection. This is used to detect errors between two transmitting stations,...

BGP

The Border Gateway Protocol (BGP) is one of the main protocols used in the Internet, because it takes care of the routing between autonomous systems....

Blade

A blade server, short blade (English for blade or leaf) consists of a rack and the individual modules, which are also often referred to only as...

BOOTP

The Bootstrap Protocol, or BOOTP short, is used to assign a computer in a network, not only IP address but also other parameters. The client may also...

BPSK

The two-phase shift keying (QPSK, 2-PSK, or Binary Phase Shift Keying) describes a phase shift keying, which has two states. It is the simplest form...

Broadcast Storm Control

A broadcast storm refers to the accumulation of broadcast requests in a network. Since a broadcast is always sent to all devices on the network, this...

Bulk Data Encryption

The Bulk Data Encryption was developed by Hitachi (HGST) for encrypting hard drives. In this case, the hard disk controller takes over the full data...

CAPWAP support

CAPWAP (Control and Provisioning of Wireless Access Points) is a software-based protocol. This is used to configure, control and manage wireless...

CAR Committed Access Rate

By Committed Access Rate (CAR), the data transfer rate is limited in recent routers. This quality of service (QoS also) supported because can...

CCFL

Cold Cathode Fluorescent Light is an older method for backlighting for LCD screens, which is a fluorescent tube with daylight spectrum and an...

CCK

The modulation method CCK (Complementary Code Keying for) is required for wireless networking using the IEEE 802.11b. It replaces the DSSS method...

Class of Service (CoS)

The Class of Service (CoS, German service class) has a different meaning depending on the context. In the field of network technology are thus the...

Clean Sweep

The Clean Sweep method provides when switching on the hard disk that the read / write head departs the complete magnetic disk. The aim irregularities...

CLI

In CLI (Command Line Interface) is an ordinary command line (sometimes called command line, console or terminal called). This possibility of entry is...

Computer

Under a PC system is meant all of the individual components necessary for a computer. This includes the motherboard to the CPU, the RAM and the slots...

computer monitors

In order to write texts on the PC and read or to watch movies, you need apart from the graphics card , the signals in image signals processed also a...

Computer power supply

Computer power supplies are switching power supplies for the power supply of PCs or notebooks (External Power Supply) can be used.

Console

Console Switches are key components for rack-mount implementations. (A console is a keyboard, a video monitor, and mouse (KVM) which are connected to...
Loading ...