Kendall Electric Incorporated Kendall

Total Page:16

File Type:pdf, Size:1020Kb

Kendall Electric Incorporated Kendall April 2014 KENDALL ELECTRIC INCORPORATED KENDALL ELECTRIC Knowledgeable INCORPORATED People Providing Quality Electrical Products, KENDALL ELECTRICService, INCORPORATED Value and Solutions. KENDALL ELECTRICwww.kendallelectric.com INCORPORATED KENDALL ELECTRIC INCORPORATED KENDALL ELECTRICThe INCORPORATED KENDALL ELECTRIC INCORPORATED KENDALL ELECTRIC Connection INCORPORATED KENDALL ELECTRIC INCORPORATED KENDALL ELECTRIC INCORPORATED KENDALL ELECTRIC INCORPORATED KENDALL ELECTRICFind the products you need INCORPORATED at: shop.kendallelectric.com KENDALL InELECTRIC This Issue INCORPORATED • Panduit’s Network Infrastructure Security Products • Hammond Power Solutions Transformers • Leviton’s New Occupancy Sensors • The Ideal Way to Cut: PowerBladeTM Cable Cutters • Speco Technologies Camera Kit • Bulletin 193 - E300 Electronic Overload Relays KENDALL ELECTRICTM INCORPORATED • Introducing the Armor GuardLogix® • Outdoor Lighting - LED vs Metal Halide • Ideal Industries SLKTM Disconnect Fuse Kits • Fluke IntelliToneTM Pro Toner and Probe • Rockwell Stratix 2000 Family Update • Grace Voltage Indicators KENDALL ELECTRIC• Panduit Panel Optimization INCORPORATED• A-B’s Compact I/O Ethernet Adapter: 1769-AENTR • Kendall Electric Repair Center Update • Save the Date - RAOTM August 2014 • Online Development Inc. - An In-Depth Look • Who is Prosoft Technologies? KENDALL ELECTRIC• LED Retrofit Kit for Fluorescent Lamps INCORPORATED• Allen Bradley’s Training Schedule KENDALL If ELECTRICyou would like to receive The Connection via e-mail,INCORPORATED please send a request to: [email protected] KENDALL ELECTRIC INCORPORATED Network Security Accessories Network accessories block unauthorized access to existing network infrastructure from the data center to the workstation. These devices save time and money associated with network downtime, data security breaches, infrastructure repair, and hardware replacement due to theft. The innovative design of the blockout device snaps into jack modules and is released with the removal Panduit’s Network Infrastructure Securitytool, ensuring the safety and security of the network infrastructure. The versatile design of the lock-in device is compatible with most existing patch cords, faceplates, patch panels, IP cameras and other IP devices. It is also compatible with VoIP phones to help prevent unauthorized tampering with connectivity to ensure E911 continuity. KENDALL ProductsELECTRIC By: MarkINCORPORATED Royston - Account Manager - Kingsport, TN Block-Out and Lock-In Devices Network Security AccessoriesOver the past few years, network infrastructure design has changed from just a func- tional design to a secure functional design. Security has become one of the most im- Network accessories block unauthorized access to existing network infrastructure from the data center to the workstation. These Part KENDALL ELECTRICportant considerations of all network designs implemented.INCORPORATED Panduit offers a wide range Number Description Color devices save time and money associated with network downtime, data security breaches, infrastructure repair, and hardware of network security solutions. They even address the security risk at the physical layer Blockout Devices replacement due to theft. The innovative design of the blockout device snaps into jack modules and is released with the removal by offering solutions to deter unauthorized access. Did you know that the USB drive is PSL-DCJB‡‡ Ten RJ45 jack module blockout devices and one removal tool. Red tool, ensuring the safety and security of the networkconsidered infrastructure. to be one The ofversatile the weakest design points of the of lock-in a network? device Even is compatible the strongest with firewall or PSL-LCAB* Ten LC duplex adapter blockout devices and one removal tool. Red most existing patch cords, faceplates, patch panels,security IP cameras software and can other be bypassedIP devices. just It isby also plugging compatible in a USB with drive. VoIP Havephones you to thought PSL-SCBD± Ten SC adapter blockout devices and one removal tool. Red help prevent unauthorized tampering with connectivityabout to how ensure devastating E911 continuity. it can be to a network by unplugging the wrong cable? Below are PSL-DCJB PSL-LCAB just a few of Panduit’s simple affordable solutions for securing a network infrastructure. PSL-USBA** Five USB Type 'A' blockout devices and one removal tool. Red PSL-PERM-USBA Ten permanent USB Type 'A' blockout devices. Red No removal tool available. Block-Out and Lock-In Devices PSL-USBB Ten USB Type 'B' blockout devices and one removal tool. Red Block-Out and Lock-In Devices PSL-PERM-USBB Ten permanent USB Type 'B' blockout devices. Red No removal tool available. Part Number Description Color PSL-SCBD PSL-USBA** Lock-In Devices PSL-DCPLX‡‡ Ten RJ45 plug lock-in devices, one installation/removal tool. Red Blockout Devices PSL-DCJB‡‡ Ten RJ45 jack module blockout devices and one removal tool. Red PSL-DCPLRX‡‡ Ten recessed RJ45 plug lock-in devices, Red one installation/removal tool. PSL-LCAB* Ten LC duplex adapter blockout devices and one removal tool. Red FLCCLIW-X LC duplex lock-in clip and removal tool. White PSL-SCBD± Ten SC adapter blockout devices and one removal tool. Red QPPLD6-X QuickNet™ 6-pack Plug Pack lock-in device. Red PSL-PERM-USBA PSL-USBB ™ PSL-DCJB PSL-LCAB PSL-USBA** Five USB Type 'A' blockout devices and one removal tool. Red QPPLD8-X QuickNet 8-pack Plug Pack lock-in device. Red ‡‡For colors other than Red, add -BL (Black), -BU (Blue), -GR (Green), -YL (Yellow), -OR (Orange), PSL-PERM-USBA Ten permanent USB Type 'A' blockout devices. Red -VL (Violet), -IW (International White) or -IG (International Gray) to the end of the part number. No removal tool available. *For colors other than Red, add -AQ (Aqua), -BL (Black), -BU (Blue), -EI (Electric Ivory), or OR (Orange) to PSL-USBB Ten USB Type 'B' blockout devices and one removal tool. Red the end of the part number. ±For colors other than Red, add -AQ (Aqua), -BL (Black), -BU (Blue), -EI (Electric Ivory) or -AG (Green) PSL-PERM-USBB Ten permanent USB Type 'B' blockout devices. Red to the end of the part number. No removal tool available. Replace -X in part number with -C or add -C to end of part number for bulk packages of 100 devices (does not apply to removable or permanent USB blockout devices). PSL-SCBD PSL-USBA** Lock-In Devices **Add -L to end of part number for bulk packages of 50 devices with 5 removal tools. PSL-DCPLX‡‡ Ten RJ45 plug lock-in devices, one installation/removal tool. Red PSL-PERM-USBB PSL-DCPLX and PSL-DCPLRX PSL-DCPLRX‡‡ Ten recessed RJ45 plug lock-in devices, Red one installation/removal tool. FLCCLIW-X LC duplex lock-in clip and removal tool. White QPPLD6-X QuickNet™ 6-pack Plug Pack lock-in device. Red PSL-PERM-USBA PSL-USBB QPPLD8-X QuickNet™ 8-pack Plug Pack lock-in device. Red FLCCLIW-X QPPLD6-X ‡‡For colors other than Red, add -BL (Black), -BU (Blue), -GR (Green), -YL (Yellow), -OR (Orange), -VL (Violet), -IW (International White) or -IG (International Gray) to the end of the part number. Patch Cord Color Bands *For colors other than Red, add -AQ (Aqua), -BL (Black), -BU (Blue), -EI (Electric Ivory), or OR (Orange) to the end of the part number. Part ±For colors other than Red, add -AQ (Aqua), -BL (Black), -BU (Blue), -EI (Electric Ivory) or -AG (Green) Number Description Color Leviton’sto the end of the part New number. Occupancy Sensors PCBANDWH-Q Snaps onto individual copper patch cable for additional White Replace -X in part number with -C or add -C to end of part number for bulk packages of 100 devices (does color-coding. not apply to removable or permanent USB blockout devices). For standard colors other than White, replace WH suffix with BL (Black), BU (Blue), RD (Red), YL (Yellow), **Add -L to end of part number for bulk packages of 50 devices with 5 removal tools. By: Joy Beebe - Account Manager - Kalamazoo, MI GR (Green), OR (Orange), VL (Violet), WH (White), EI (Electric Ivory) or IG (International Gray). PSL-PERM-USBB PSL-DCPLX and PSL-DCPLRX 25/package. KENDALL ELECTRIC INCORPORATED6 Representative offering only, visit www.panduit.com for complete listing of products. Whether you have a large business or a The ODC/M series has auto-adapting technology and small business, implementing energy saving continually self adjusts time delay and sensitivity to the products will increase your company profit. pattern of use. Each unit is configurable for manual or Leviton offers the new ODC/ODM series of auto ON/OFF settings. Sensors using the daylight har- FLCCLIW-X QPPLD6-X occupancy sensors that can be a self con- vesting option are available in a multi-technology option, tained energy management solution. using both ultrasonic and passive infrared sensing. Patch Cord Color Bands The ODC/M series combines a line voltage Whether you are searching for a ceiling mount or wall Part occupancy sensor, power pack and photocell switch sensor, this series will provide a self contained, Number technology intoDescription one unit. The integrated de- robustColor and reliable solution. Each unit has a visual LED PCBANDWH-Q Snaps ontosign individual eliminates copper patch the needcable for for additional separate wiring statusWhite indicator and the “fail-safe” circuitry assures lights color-coding. of the power pack and occupancy sensor; on, meeting safety requirements. Lenses are available For standard colors other than White,making replace it WHa low-cost, suffix with BLeasy-to-install, (Black), BU (Blue), energy
Recommended publications
  • San Diego I-15 Integrated Corridor Management (ICM) System
    San Diego I-15 Integrated Corridor Management (ICM) System March 2008 FINAL I-15 ICM System Requirements Partnerships. Technology. Mobility. Made possible in conjunction with the following partners: TABLE OF CONTENTS 1 Introduction.............................................................................................................. 1 1.1 Integrated Corridor Management System (ICMS) Purpose..........................................................1 1.2 ICMS Scope..................................................................................................................................1 1.2.1 Needs and Issues..............................................................................................................1 1.2.2 Vision, Goals, and Objectives ...........................................................................................2 1.3 Definitions, Acronyms, and Abbreviations ....................................................................................4 1.4 References....................................................................................................................................5 1.5 Document Overview......................................................................................................................6 2 Integrated Corridor Management System (ICMS) – Overall Description................. 7 2.1 ICMS Context................................................................................................................................7 2.2 ICMS Description ..........................................................................................................................8
    [Show full text]
  • Ingeniería Del Software II: AJAX Vs Silverlight
    Ingeniería del Software II: AJAX vs Silverlight Diego Martín-Serrano Fernández Francisco José Oteo Fernández Jesús Martínez-Campos Martínez Índice 1. Introducción a Ajax...............................................................................................................3 2. Profundizando en Ajax.........................................................................................................4 2.1. Frameworks para desarrollo Ajax.....................................................................................5 3. Conclusión sobre Ajax.........................................................................................................6 4. Introducción a Silverlight......................................................................................................7 5. Profundizando en Silverlight................................................................................................8 6. Conclusión sobre Silverlight..............................................................................................10 7. Comparativa Ajax vs Silverlight..........................................................................................11 8. Bibliografía..........................................................................................................................14 Índice de tablas Tabla 1. Posibles valores del atributo readyState del objeto XMLHTTPRequest....................4 Tabla 2. Frameworks para el lado del servidor, según el lenguaje de programación.............6 Tabla 3. Comparativa características
    [Show full text]
  • Bankovní Institut Vysoká Škola Praha
    Bankovní institut vysoká škola Praha Katedra informačních technologií a elektronického obchodování Web 2.0 - nové možnosti, nové problémy Diplomová práce Autor: Bc. Tomáš Dziak Informační technologie a management Vedoucí práce: Ing. PhDr. Antonín Pavlíček, Ph.D. Praha Červen, 2010 Prohlášení: Prohlašuji, ţe jsem diplomovou práci zpracoval samostatně a s pouţitím uvedené literatury. V Praze, dne 23. 6. 2010 Tomáš Dziak Anotace Tato diplomová práce zkoumá pojem Web 2.0 od okamţiku jeho výskytu, přičemţ hledá příčiny vzniku tohoto nového trendu. Charakterizuje vlastnosti Webu 2.0 pomocí analýzy jeho základních principů a snaţí se s pomocí konkrétních příkladů pojmenovat dopad Webu 2.0 na současný stav World Wide Webu. Zkoumá moţnosti tvorby uţivatelem generovaného obsahu, které Web 2.0 nabízí. Na základě rozboru technik a technologií, jeţ jsou při vytváření obsahu Webu 2.0 nejčastěji pouţívány, odhaduje moţnosti dalšího vývoje Webu 2.0 v různých oblastech směrem k nástupu cloud computingu a rozšíření webových sluţeb mezi nové typy klientských zařízení. Annotation This diploma thesis investigates the term Web 2.0 from the moment of its first appearance whereas it searches for the causes of this new trend. The thesis characterizes Web 2.0 features using analysis of its basic principles and using specific examples it tries to denominate the impact of Web 2.0 on current World Wide Web. It recognizes the possibilities of user-generated content which are provided by Web 2.0. Following the analysis of techniques and technologies mostly used during composing of Web 2.0 content the thesis estimates the possibilities of Web 2.0 development in different areas on its way to cloud computing expansion and future spread of web services among new types of client devices.
    [Show full text]
  • Asterisk Reference Information Version
    Asterisk Reference Information Version Asterisk Development Team Asterisk.org March 29, 2008 Contents 1 Introduction 8 1.1 License Information . 8 1.1.1 Hold Music . 9 1.2 Security . 10 1.2.1 Introduction . 10 1.2.2 Network Security . 10 1.2.3 Dialplan Security . 10 1.2.4 Log Security . 11 1.3 Hardware . 11 1.3.1 Introduction . 11 1.3.2 Zaptel compatible hardware . 12 1.3.3 Non-zaptel compatible hardware . 13 1.3.4 mISDN compatible hardware . 13 1.3.5 Miscellaneous other interfaces . 14 2 Configuration 15 2.1 General Configuration Information . 15 2.1.1 Configuration Parser . 15 2.1.2 Asterisk.conf . 19 2.1.3 CLI Prompt . 21 2.1.4 Extensions . 22 2.1.5 IP Quality of Service . 24 2.1.6 MP3 Support . 27 2.1.7 ICES . 27 2.2 Database Support . 27 1 2.2.1 Realtime Database Configuration . 27 2.2.2 FreeTDS . 31 2.3 Privacy . 31 2.3.1 First of all . 31 2.3.2 Next, Fight against autodialers!! . 31 2.3.3 Next, Fight against the empty CALLERID! . 32 2.3.4 Next, use a WELCOME MENU ! . 32 2.3.5 Next: Torture Them! . 33 2.3.6 Using Call Screening . 34 2.3.7 The 'N' and 'n' options . 35 2.3.8 Recorded Introductions . 36 3 Channel Variables 39 3.1 Introduction . 39 3.2 Parameter Quoting . 39 3.3 Variables . 40 3.4 Variable Inheritance . 40 3.4.1 Example . 41 3.5 Selecting Characters from Variables .
    [Show full text]
  • AJAX AJAX Stands for Asynchronous Javascript and XML. It Is Not A
    AJAX AJAX stands for Asynchronous JavaScript and XML. It is not a programming language rather than it is a way of using existing standards to make more interactive web applications. To understand the AJAX application let us consider the standard HTTP transaction process. Whenever the client connects to server, the client sends request to server and server sends response to the client. After that client and server close their connection. After closing connection the client renders the document and this may include running some JavaScript. In an Ajax application, the JavaScript code then communicates with the server behind the scene. This communication with the server takes place asynchronously and transparently to the user. Data is exchanged with the server without the need for page reload. This process is accomplished with a special kind of HTTP request. Ajax is something which bridges the gap between the functionality and interactivity. It is a technique for crating interactive applications. It makes the web pages interactive, increases speed and usability and better user experience. Features of Ajax: 1. It enables in developing rich internet applications. 2. It enables dynamic web application development. 3. It improves the performance of the web application. 4. Here no plug in is required. 5. It provides real time updates. Components of Ajax: 1. HTML and CSS for marking up and to give style to the components of the site. 2. Client side scripting language (JavaScript) for dynamic display and interact with the information presented. 3. XMLHttp request object for exchanging data asynchronously with the web servers. 4. XML for transferring data.
    [Show full text]