Newsletter
Sökresultat
 
Visar 31-40 av 70 resultat
< 1 2 3 4 5 6 7 >
...har förenklat • vår serverdrift samt underlättat uppbyggnaden av de nya program-kontrollerna. • Peter Stridsberg, TV4 • I hjärtat av serverhallen • sitter • ServSwitch Octet • och sköter växlingen mellan programkontrollen • och servrarna för sän...
...be accessed via serial console, Telnet, and Secure Shell. These switches can often be configured and managed as groups. More recent managed switches may also support a Web interface for management through a Web browser. • These high-end switches en...
...combinations and which server was connected to which port—leading to many cryptic, scribbled notes attached to the switch and to the workstation. • Today's versions • But with the advent of on-screen menu's, an operator can use easy-to-read, pop-up...
...earlier (over shorter, less twisted pair) is moved more to the left side of the screen, the colour signal arriving later (over a longer pair with higher twist ratio) is moved to the right. • All colours displayed on a screen are made of red, green ...
...Network (ISDN), wireless, and Digital Subscriber Line (DSL). • Remote access enables remote users to dial into your LAN over the phone by using either land lines or a cellular connection. Typically, remote users plug their laptop modems into a h...
...directions to a series of nodes. FDDI accommodates up to 500 nodes per dual-ring network and allows up to 2 kilometers between adjacent nodes. FDDI uses the same token-passing scheme as the IEEE 802.5 Token Ring network to control transmissi...
...directions to a series of nodes. FDDI accommodates up to 500 nodes per dual-ring network and allows up to 2 kilometers between adjacent nodes. FDDI uses the same token-passing scheme as the IEEE 802.5 Token Ring network to control transmissi...
...for the management of servers and serial network devices in IT branches - help you cope with these challenges. • They allow for fast and comfortable troubleshooting, reboots or cold starts. The patented KVM over IP technology offers a single centr...
...send the authentication request to the authenticator. The authenticator passes the request to the authentication server to authenticate and verify, and the server tells the authenticator if the request for authorization for those ports is granted.
< 1 2 3 4 5 6 7 >

 
Top Products