Search
All categories
Results 121 - 140 of about 584
  • The Klez virus

    Introduction to the Klez virus Appearing early in 2002, the Klez virus is still everywhere on networks, and the danger it poses is even higher due to the new variations that keep cropping up (like Klez.e, Klez.g, Klez.h, Klez.i, Klez.k,... Read more

    Viruses and threats
    April 16, 2018 at 11:43 AM
  • WiMAX - 802.16 - Worldwide Interoperability for Microwave Access

    What is WiMAX ? WiMAX is short for Worldwide Interoperability for Microwave Access. It is a metropolitan wireless standard created by the companies Intel and Alvarion in 2002 and ratified by the IEEE (Institute of Electrical and... Read more

    Wimax
    October 16, 2008 at 09:43 AM
  • General Terms and Conditions of Use

    All Rights Reserved - 2018 © CCM BENCHMARK GROUP Object Legal Disclaimers and Imprint Definitions Accessing the Service Intellectual Property Personal Data Limitation of Liability Hyperlinks Force majeure Modifications to this... Read more

    Terms of Use
    December 20, 2019 at 03:47 AM
  • File sharing in Windows XP

    Advantages File sharing involves making the content of one or more directories available through the network. All Windows systems have standard devices making it easy to share the content of a directory. However, file sharing may lead... Read more

    Network configuration
    April 4, 2011 at 05:07 PM
  • RJ45 Plug

    RJ45 plugs The RJ45 connector (RJ stands for Registered Jack) is one of the main connectors used with Ethernet network cards, and transmits information over twisted pairs of wires. For this reason, it is sometimes called an Ethernet port:... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • TMA (Third-Party Application Maintenance)

    Third-party application maintenance The term third-party application maintenance (acronym TMA) refers to outsourcing the maintenance of applications, i.e. entrust all or part of the maintenance of applications to a third-party computer... Read more

    e-Business
    October 16, 2008 at 09:43 AM
  • DNS (Domain Name System)

    What is DNS? Each computer directly connected to the Internet has at least one specific IP address. However, users do not want to work with numerical addresses such as 194.153.205.26 but with a domain name or more specifically addresses... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Port/Ports TCP/IP

    The use of ports Many TCP/IP programs can be executed simultaneously over the Internet (you can for example open several browsers simultaneously or browse HTML pages while downloading a file via FTP). Each of these programs works with a... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • TCP/IP

    What does TCP/IP mean? TCP/IP is a suite of protocols. The acronym TCP/IP means "Transmission Control Protocol/Internet Protocol" and is pronounced "T-C-P-I-P". It comes from the names of the two major protocols in the suite of... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Network equipment - The switch

    Switches A switch is a multi-port bridge, meaning that it is an active element working on layer 2 of the OSI model. The switch analyzes the frames coming in on its entry ports and filters the data in order to focus solely on the right... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM
  • Information security officer (ISO)

    Information security officer (ISO) An ISO (information security officer) is in charge of setting and a company's security policy. He/she also plays a critical role in informing, advising, and alerting the general management on matters... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • Graphics cards - Video cards

    2D Accelerator Cards A graphics card, sometimes called a graphics adapter, video card or graphics accelerator, is a computer component which converts digital data into a graphical form which can be displayed on a monitor. The initial... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • The Printer

    Printers Characteristics Daisy Wheel Printer Dot-Matrix Printer Inkjet Printer and Bubble Jet Printer Laser Printer LED Printer Printer Command Language Print Servers Printers The printer is a peripheral that allows you to make a print... Read more

    Computer
    November 7, 2012 at 08:26 AM
  • GANTT diagram

    Introduction to the GANTT diagram The GANTT diagram is a tool that allows the user to model the planning of tasks necessary to the performance of a project. This tool was invented in 1917 by Henry L. Gantt. Given the relative ease of... Read more

    Project management
    November 1, 2012 at 03:49 PM
  • ISO 9000, ISO 9001 and ISO 9004

    Introduction to ISO Certification Certification is a way to attest, by the intermediary of a third-party certifier, to a company's ability to provide a service, product or system in accordance with client requirements and regulation... Read more

    Quality
    October 16, 2008 at 09:43 AM
  • Intrusion Test

    Intrusion Test Intrusion tests (abbreviated as pen tests) consist in testing an information system's protection methods by subjecting the system to a real situation. Two methods are generally used: The black box method that consists of... Read more

    Security
    October 16, 2008 at 09:43 AM
  • Clusters

    The Concept of Clusters A "cluster" is an architecture made up of several computers that form nodes, where each node is able to operate independently. There are two main types of clusters: High-availability clusters spread a workload... Read more

    High availability
    October 16, 2008 at 09:43 AM
  • Operating system

    Description of the operating system Roles of the operating system Components of the operating system Multi-threaded systems Multi-processor systems Embedded systems Real time systems Types of operating system Description of the... Read more

    Operating System
    March 15, 2018 at 03:48 PM
  • Ethernet

    Introduction to Ethernet Ethernet (also known as IEEE 802.3 standard) is a data transmission standard for local area networks based on the following principle: All machines on an Ethernet network are connected to the same communication... Read more

    Internet Technologies
    October 16, 2008 at 09:43 AM
  • CIE / Lab (L*a*b) coding

    CIE Coding Colors may be perceived differently depending on individuals and may be displayed differently depending on the peripheral display devices. The International Lighting Commission (Commission Internationale de l'Eclairage, CIE)... Read more

    Video
    May 11, 2011 at 04:59 PM

Newsletter

The Best of CCM in Your Inbox

Subscribe To Our Newsletter!