導入事例
ウェビナー
PC延長
お問い合せ
検索結果
 
検索結果 61-70 / 92 表示
< 1 ... 5 6 7 8 9 10 >
...for each CPU, the operator still had to remember key combinations and which server was connected to which port—leading to many cryptic, scribbled notes attached to the switch and to the workstation. • Today's versions • But with the advent of o...
...each other in order to operate properly. Most computers and mice communicate via a method called “stream mode”—as a mouse is being moved, it sends the coordinates of its new position in a constant stream of information. • Burst mode/prompt mode • Ho...
...multi-Gigabit speed and or multiple slower links using Link Aggregation Control Protocol (LACP) • The MediaCento IPX can be configured with multiple sources and screens. We recommend different switches for different configurations, dependin...
...not desirable or too expensive. A lot of standard equipment is available to make the transition between newer topologies like Ethernet and Serial happen, but the industry needs devices that can withstand certain environmental needs. • Furthermore •...
...and 4 switching • The Open Systems Interconnection (OSI) Reference Model provides a layered network design framework that establishes a standard so that devices from different vendors work together. • Layer 2 (The Data-Link Layer) • Layer 2 switche...
メディアコンバータ • LAN から光ファイバへの • シームレスな切替 • イーサネット ネットワークにおける信号の変換と延長 • ご質問、ご相談など、お気軽にお問い合わせください。 • テクニカルサポートに相談 • メディアコンバータは、速度や運用形態、モード、メディアタイプ(ツイストペア、光ファイバ、同軸ケーブル)が違うために接続できない 2 つの機器や、LAN の接続に便利な機器です。一般的に、光ファイバセグメントを LAN ネットワークに挿入するのに用いられ、LAN ケーブルの距...
...of providing a much sharper, clearer image than a traditional CRT monitor. • The VGA interface was developed to support traditional CRT monitors. The DVI interface, on the other hand, is designed specifically for digital displays and supports the hi...
...can be altered depending on the level of security you require. If your links are global, make sure international encryption standards are in place. Also, establish and enforce corporate security procedures (such as password protection) to kee...
...can get by with an inexpensive terminal server that has few or no security functions. But if you’re using a terminal server to make network connections across a network that’s also an Internet subnet, you should look for a terminal server that offe...
< 1 ... 5 6 7 8 9 10 >