Newsletter
Store home > Search
Search results
 
Showing 51-60 of 61 results
< 1 2 3 4 5 6 7 >
...body connector. Secure it by screwing the connector body to the mating threads. Used in high-vibration environments. • The MTO/MTP connector • is a fibre connector that uses high-fibre-count ribbon cable. It’s used in high-density fibre appl...
...rack may need to be secured. A typical rack has about a 38.1-centimetre-deep base, providing some stability, but not enough to prevent the rack from tipping if heavy objects are mounted on it. To solve this problem, most rack bases can be bolted...
...console, Telnet, and Secure Shell. These switches can often be configured and managed as groups. More recent managed switches may also support a Web interface for management through a Web browser. • These high-end switches enable network managers...
...is based on the very secure AES-128 standard and uses a 128-bit encryption. The key for decoding is partly stored within the player and the second part on the medium (disc) itself. Upfront the transfer, the concerned devices agree on a HDCP key, ...
...your new DFP display to work at its best, it must be connected to a DVI video interface. You should upgrade the video card in your PC when you buy your new video monitor. Your KVM switches should also support DVI if you plan to use them with DFPs.
...frequently yet kept secure. The most secure lock option is a biometric lock that requires a finger scan. • Side panels. • Like doors, side panels are optional and may be omitted in protected data centers, except where they’re needed to control v...
...sharing (often called “KVM extension”) applications. These types of extenders feature keyboard/mouse emulation and emulation for other standard HID devices, while providing easy access to single-, dual-, or quad-head computers — ideal for applicati...
< 1 2 3 4 5 6 7 >

 
Top Products