Switch and Data

Results: 268



#Item
61Paper shredder / Security / Information technology management / Technology / Shredder / Switch / Maintenance /  repair /  and operations / Data remanence / Fiction / Destruction / Office equipment / Paper recycling

Microsoft Word - Model 1125P.CD Rev 0.doc

Add to Reading List

Source URL: www.semshred.com

Language: English - Date: 2013-01-22 10:54:36
62Privacy / Radio-frequency identification / Wireless / Kneading / Traceability / Baker / Telecommunications engineering / 19-inch rack / Learning / Baking / Technology / Automatic identification and data capture

Linauer & Wagner „Backstuben“ BackwarenproduktionsgmbH Scope of Project Production planning, recipe management, batch traceability, silo control plant switch cabinet construction, cabling

Add to Reading List

Source URL: www.automationx.com

Language: English - Date: 2013-02-18 10:41:29
63Information / Ethernet / Local area networks / Inter-process communication / Streaming / Traffic flow / Virtual LAN / Computer network / Network switch / Computing / Computer network security / Data

Ethane: Taking Control of the Enterprise Martìn Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, and Nick McKeown Scott Shenker

Add to Reading List

Source URL: www.sigcomm.org

Language: English - Date: 2011-07-27 15:40:00
64Nortel / Routers / Wireless networking / Technology / Computer hardware / Remote backup service / Backup / Network switch / Replication / Computing / Networking hardware / Netgear

NETGEAR Business Storage Overview ® Midmarket customers turn to NETGEAR® to lower costs and escape traditional big IT complexities. ReadyNAS® storage is the ideal solution for data backup, disaster

Add to Reading List

Source URL: www.netgear.co.kr

Language: English - Date: 2015-04-21 05:11:37
65Networking hardware / Computer networking / Local area networks / Telecommunications engineering / Ethernet / Multilayer switch / Network switch / Data link layer / Computer network / Computing / Network architecture / Electronic engineering

CHAPTER 3 Structuring and Modularizing the Network

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2008-01-29 16:27:10
66Network architecture / 3Com / Network switch / Gigabit Ethernet / Gigabit interface converter / Link aggregation / Superstack / Virtual LAN / RMON / Ethernet / OSI protocols / Computing

3Com Switch 4050 and Switch 4060 Data Sheet

Add to Reading List

Source URL: www.andovercg.com

Language: English - Date: 2009-08-28 16:36:21
67Cloud storage / Data center / Data management / Distributed data storage / Networks / Interxion / Concurrent computing / Computing / Distributed computing

GLOBAL SWITCH ALWAYS ON THE RESILIENCE AND RELIABILITY OF OUR DATA CENTRE SERVICE CAN BE CHARACTERISED SIMPLY AS ‘ALWAYS ON’. THE ABILITY TO PROVIDE UNINTERRUPTED

Add to Reading List

Source URL: www.globalswitch.com

Language: English - Date: 2014-02-20 12:39:40
68Computing / OSI protocols / Network architecture / Ethernet / Token ring / Token bus network / Network switch / Data link layer / ARCNET / IEEE 802 / IEEE standards / Local area networks

A Real-Time Ethernet Network at Home F. Hanssen, P. Hartel, T. Hattink, P. Jansen, J. Scholten, J. Wijnberg Distributed and Embedded Systems group Faculty of Computer Science — University of Twente E-mail: hanssen@cs.u

Add to Reading List

Source URL: www.croky.net

Language: English - Date: 2003-07-28 17:17:07
69Instruction set architectures / Computer errors / Computer memory / Data transmission / Endianness / Metaphors / GNU Debugger / Magic number / Segmentation fault / Computing / Computer architecture / Computer programming

The odd kid on the block or: to boldly run ARM like no one did before Martin Husemann Abstract Modern ARM SoCs offer bi-endian support: the CPU can switch between little and big endian mode. Similar to

Add to Reading List

Source URL: www.netbsd.org

Language: English - Date: 2015-03-17 05:18:30
70Network architecture / Computing / Private VLAN / Network switch / Computer architecture / Data transmission / Computer network security / IEEE 802 / Local area networks / Ethernet / Virtual LAN

Segregating Networks and Functions After gaining initial access to a network, adversaries traverse the allowed communication paths between network devices to gain deeper access. However, a securely segregated network can

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-13 09:24:34
UPDATE