Tyvärr kunde vi inte logga in dig.
Kontrollera e-postadress och lösenord.
Leveransinformation
The basket of your last visit to Black Box is still available.
Vänligen skapa ett konto för att fortsätta.
The Black Box website uses cookies. By continuing the use of the Black Box website, or by pressing the agree button on the right, you consent to the use of cookies on this website.
Mer information.
...Education, Medical and Government sectors. Our solutions analyse your networking needs, perform on-site surveys, design the solution, construct any required civil structures, install the wireless network. Black Box provide reliable, high-speed wirel...
...buy and set up VPN equipment by yourself. But some service providers have introduced VPN solutions that guarantee certain levels of service. They boast 99% uptime and offer credit reimbursements for outages, for example, so this means that the VPN...
...serial devices even over very long distances—as far as your network stretches. It’s even possible to connect serial devices across the Internet. A terminal server connects the remote serial device to the network, and then another terminal server...
...using a modem or TCP/IP Ethernet connection. • The software is available conveniently preloaded on a PC we ship to you or included with your Tiger II Controller system. • Use the Windows® compatible software’s GUI to define system parameters, set...
...to be expanded over a whole network. • Spanning Tree: (STP/802.1d) The switch can detect network loops and is able to break the loop by disabling one of the uplinks. This allows administrators to build up network rings to build up redundanc...
...and other computer equipment without being at the equipment’s location. • For whom • Who needs remote power control? Everyone, especially any organization with a network that reaches remote sites. This can include branch offices, unmanned informat...
...addresses and ports in IP packets. This basic form of firewall protection is really no more than a simple sorting algorithm. Generally they enable you to have some control through the use of access lists. Packet filtering can also often be performe...
...process of managing multiple KVM switches whether they be in a single location, or spread throughout the world. Allowing the server manager to set individual and group access rights, makes the whole issue of security vs access a simple task to manag...
...for Time Division Multiplexing and is based on the idea to subdivide time (e.g. one second) into many smaller units. • An information unit can now be transmitted separately in each of these units. The information units need not be in a logical seq...
...do not forget your VoIP phones. They need PoE Power. A lot of things to consider. • Fiber To The Desk • FTTO means that the Fiber is running to the office. Elsewhere you might see the term Fiber To The Desk which means quite the same. Here the fi...