noteboox.de is TLS 1.2 secured EHI verified online shop

Lexikon

123

256-Bit-AES

The Advanced Encryption Standard (AES) is an algorithm that is used by various current encryption...

2T2R MIMO-technology

With 2T2R MIMO two transmitting and receiving antennas are used for data transmission. This...

3D Defense System

The 3D Defense System used by Seagate, consists of various features to protect the hard drive from...

3DNow! Technology

In the 3DNow! Technology is a multimedia instruction set of the company AMD, Cyrix and Centaur. It...

64 QAM

In communications, the modulation method is 64 QAM used as a combination of amplitude modulation...

64 Technology

The Intel 64 Technology featuring the processors directly more than 4 GB of RAM can be addressed....

A

AAL5

When AAL5 is the ATM adaptation layer 5, which has now enforced in practice for data communication....

Access Control List (ACL)

The Access Control List (ACL) or access control list is a software-based technique that determines...

Access Point

An access point is often found in wireless networks and is also known as base station. It is...

AccessPoint

With an Access Point (AP short) creates a wireless network for different clients. These can then...
Customer Feedback