Onze excuses, wij kunnen u niet aanmelden.
Controleer uw e-mailadres en wachtwoord.
Uw laatste winkelwagen is nog beschikbaar
Het winkelmandje van uw laatste bezoek aan Black Box is nog steeds beschikbaar.
Wilt u de producten in deze winkelwagen bekijken?
De Black Box website maakt gebruik van cookies. Door de Black Box website te blijven gebruiken of door op de instemmingsknop rechts te klikken, gaat u akkoord met het gebruik van cookies op deze website.
Meer informatie.
...Box’s KVM trays are miles ahead of the competition. • Nothing reduces clutter in a server room like KVM trays that are 1- or 2U high, and mount in a cabinet or rack. Here are some of the features that set our KVM trays apart. • TFT LCD support. • ...
...heavy equipment like servers. But if you need frequent access to all sides of the equipment, an open rack might be more convenient. If your equipment needs a lot of ventilation, you’ll have to be more careful about ventilation if you enclose it i...
...such as a PC or server, can also function as a gateway. • KVMoIP switch • A KVMoIP switch contains an IP gateway, which is the pathway the KVM signals use to travel from the IP network to an existing non-IP KVM switch. It converts and direct...
...The DKM system enables mixing and matching to meet distance and media requirements. Ports are all input/output, enabling quick and easy moves, adds, and changes. • Scalable, highly reliable, flexible. • The DKM ensures a quiet work environmen...
...After the power cycles on and off, normal communications resume. Often, there aren’t any technically trained personnel at the site who can perform maintenance and resets on equipment. Even if it is a manned station, there is a risk that the wro...
...in contrast, are far less restricted in bandwidth, but they must deliver a picture suitable for viewing from very short distances. • We’ll explain many of today’s different video formats that fall into these two categories. • Broadcast/television...
...layers that contain modules for performing defined functions. This translates into a set of rules that defines the way participating network nodes must interact to communicate and exchange information. The OSI Model defines standard relationships be...
...identity of users and servers should be verified and the firewall should keep a record of message sources and arrival times. • Is the equipment compatible? • Each company’s network is unique. Yours may include various pieces of hardware and softwa...