The Advanced Encryption Standard (AES) is an algorithm that is used by various current encryption standards. The number after the name (usually 128...
With 2T2R MIMO two transmitting and receiving antennas are used for data transmission. This improves the data rate of the wireless link and is used...
The 3D Defense System used by Seagate, consists of various features to protect the hard drive from data loss, data manipulation and physical damage....
In the 3DNow! Technology is a multimedia instruction set of the company AMD, Cyrix and Centaur. It is in direct competition with Intel's SSE...
In communications, the modulation method is 64 QAM used as a combination of amplitude modulation and phase modulation. The 64 in this case indicates...
The Intel 64 Technology featuring the processors directly more than 4 GB of RAM can be addressed. In addition, these CPUs can execute the commands...
When AAL5 is the ATM adaptation layer 5, which has now enforced in practice for data communication. AAL 5 is doing a very efficient service class...
The Access Control List (ACL) or access control list is a software-based technique that determines which users have which rights. In the network...
An access point is often found in wireless networks and is also known as base station. It is connected via a cable connection to the network and then...
With an Access Point (AP short) creates a wireless network for different clients. These can then connect to the access point and gain access to the...
The Active Scan function is available with various WLAN access points Juniper Networks and ensures that is actively looking for other APs. The...
Adaptive Fly Height technique is used to automatically adjust the distance between the read / write head to the magnetic disk of the hard disk. When...
ADSL stands for Asymmetric Digital Subscriber Line and refers to the widespread connection technology for broadband connections. This variant of the...
The expansion of ADSL to solve some problems of the underlying technology. Therefore, ADSL2 offers power saving features also higher bandwidths. The...
With ADSL2 + ADSL is already in its third generation available. This range and transmission rate can be increased in particular, the crosstalk...
AMD implemented on some processors (eg, bulldozers, Piledrive and Jaguar) the instruction set Advanced Bit Manipulation (ABM). This includes the...
This function causes a significant increase in performance in the execution of SSE instructions. Previously, 64-bit long instructions were only...
The Advanced ECC technology developed by HP and extends the standard ECC technology for some functions. Thus, single-bit will not only corrects...
The main feature of the Advanced Format technology is the use of 4-KB sectors instead of 512 byte. This are hard disks with higher storage capacity...
If multiple disks simultaneously operated in a system, their rotational vibrations can influence each other. Hard drives with the Advanced Multidrive...
Processors with Advanced Smart Cache have not for each processor core has a dedicated L2 cache, but a common for all nuclei. This utilization is...
The Advanced Encryption Standard (AES) is used in different contexts for encryption. It supports different block and key lengths up to 256 bits. If,...
Called CCMP, and Counter-Mode / CBC-MAC Protocol, is a security standard is based on AES. CCMP is responsible for encryption, authentication and...
These x-86 instruction set extension for AMD and Intel processors accelerated applications perform AES encryption and -Entschlüsselungen. These...
The Anti-Theft Technology Intel was intended to improve the safety of so-equipped notebooks. In the meantime, however, Intel has announced that...
ARP (Address Resolution Protocol) is a network protocol that maintains a mapping of MAC addresses to IP addresses. It is mainly used in IPv4 Ethernet...
Advanced Technology Attachment with Packet Interface (ATAPI or ATA) is a standard for transferring data between storage media and drives, and the...
The ports of a switch with Auto MDI-X can independently and automatically recognize whether it is another switch or a terminal on the connected...
Auto-negotiation is used when two connected via the network port terminals are independently negotiate the maximum possible transmission speed. This...
When auto-uplink is a function of network switches. This thereby recognizes whether it is connected to a terminal or to another switch and...
AVX refers to an extension of the x86 instruction set processors from AMD and Intel. This feature is especially useful functions for...
The Background Media Scan is used by hard drives for self-diagnosis. If no requests are made on the drive, the scan is performed automatically by...
With BFD is referred to in the network area, the Bidirectional Forwarding Detection. This is used to detect errors between two transmitting stations,...
The Border Gateway Protocol (BGP) is one of the main protocols used in the Internet, because it takes care of the routing between autonomous systems....
A blade server, short blade (English for blade or leaf) consists of a rack and the individual modules, which are also often referred to only as...
The Bootstrap Protocol, or BOOTP short, is used to assign a computer in a network, not only IP address but also other parameters. The client may also...
The two-phase shift keying (QPSK, 2-PSK, or Binary Phase Shift Keying) describes a phase shift keying, which has two states. It is the simplest form...
A broadcast storm refers to the accumulation of broadcast requests in a network. Since a broadcast is always sent to all devices on the network, this...
The Bulk Data Encryption was developed by Hitachi (HGST) for encrypting hard drives. In this case, the hard disk controller takes over the full data...
CAPWAP (Control and Provisioning of Wireless Access Points) is a software-based protocol. This is used to configure, control and manage wireless...
By Committed Access Rate (CAR), the data transfer rate is limited in recent routers. This quality of service (QoS also) supported because can...
Cold Cathode Fluorescent Light is an older method for backlighting for LCD screens, which is a fluorescent tube with daylight spectrum and an...
The modulation method CCK (Complementary Code Keying for) is required for wireless networking using the IEEE 802.11b. It replaces the DSSS method...
The Class of Service (CoS, German service class) has a different meaning depending on the context. In the field of network technology are thus the...
The Clean Sweep method provides when switching on the hard disk that the read / write head departs the complete magnetic disk. The aim irregularities...
In CLI (Command Line Interface) is an ordinary command line (sometimes called command line, console or terminal called). This possibility of entry is...
Under a PC system is meant all of the individual components necessary for a computer. This includes the motherboard to the CPU, the RAM and the slots...
In order to write texts on the PC and read or to watch movies, you need apart from the graphics card , the signals in image signals processed also a...
Computer power supplies are switching power supplies for the power supply of PCs or notebooks (External Power Supply) can be used.
Console Switches are key components for rack-mount implementations. (A console is a keyboard, a video monitor, and mouse (KVM) which are connected to...