Контора 1.0 Комплексная система управления торговым предприятием.
В 70-х гг. была популярна мини-ЭВМ "Искра-226", которая имела входным языком БЕЙСИК, ОЗУ 64 Кб, оперативную управляющую память 64 Кб, ПЗУ 16 Кб. Среднее время выполнения арифметических операций 1 мс, извлечение квадратного корня 2 мс.
Packet Analyzer Pro edition is an advanced packet analysis and sniffing tool with powerful protocol decodes capabilities. It captures and analyze all traffic transport over both Ethernet and WLAN network with results displayed in simple English.
Network Protocol Packet Analyzer 4.0 - Packet Analyzer is an advanced packet analysis and sniffing tool with powerful protocol decodes capabilities. It can capture all traffic transport over local network segment and decodes all major and frequently used protocols including TCP/IP, UDP, HTTP,
Network Protocols Map Screensaver - We design special screensavers and wall-papers for IT/Networking professionals and students, who will display our art on their computer screens for months orВ years.В This item can be widely downloaded on Internet to build your product awareness.
Network Troubleshooting Analyzer CAPSA - Packet Analyzer CAPSA Pro edition is an advanced sniffing tool with powerful protocol decodes capabilities. It captures and analyze all traffic transport over both Ethernet and WLAN network with results displayed in simple English.
Analyzer Plus - Maintaining time sheets is now a common practice; however, the benefit fromusing them isnt as great as was expected. The lack of time for analyzingthe data depreciates the whole idea of optimizing productivity with timesheets. That, in its turn, converts into insufficient data for invoicingserved customers, inability
Global Network Inventory, Examining The Network - Any computer network administrator has a large responsibility area concerning all network computers configuration. This area includes both hardware and software configurations, and control of all them is really important for network safety, reliability and stability. But as soon as the number of computers in the network exceeds about