CD Tower Line Has Ethernet Interface

The CD Tower-Ethernet Series incorporates Procom's "Smart Ethernet CD" controller, a built-in plug-and-play Ethernet connection interface for Novell Netware applications. The tower attaches to an unused Ethernet connection on an existing network, providing all workstations with access to individual CDs. The CD Tower Ethernet line d'es not attach to a computer and d'es not require the network to be taken down for installation. The unit can store as much as 1.75 million pages (4.5GB) of data within its compact, seven-drive enclosure, suitable for archiving or information sharing. DiscView, a Windows/DOS-based utility, manages CDs for an unlimited number of users. Network administrators can, for example, authorize or deny access to CD-ROM volumes. Drives are accessed as if they were read-only hard disks. The tower comes in three versions. Models feature double, triple and quadruple Procom CD-ROM drive mechanisms, SCSI-2 interfaces and sustained data transfer rates greater than 600KB. Procom Technology, Irvine, CA, (800) 800-8600, www.procom.com.

Featured

  • AI microchip under cybersecurity attack, surrounded by symbols of threats like a skull, spider, lock, and warning shield

    Report Finds Agentic AI Protocol Vulnerable to Cyber Attacks

    A new report from Backslash Security has identified significant security vulnerabilities in the Model Context Protocol (MCP), technology introduced by Anthropic in November 2024 to facilitate communication between AI agents and external tools.

  • silhouetted student stands before the White House, surrounded by abstract digital graphics of brains, circuits, and AI elements

    White House Sets Sights on AI Education

    A new executive order from President Donald Trump aims to advance America's position in artificial intelligence technology by incorporating AI into education and providing AI training for educators.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • Two hands shaking in the center with subtle technology icons, graphs, binary code, and a padlock in the dark blue background

    Two Areas for K-12 Schools to Assess for When to Work with a Managed Services Provider

    The complexity of today’s IT network infrastructure and increased cybersecurity risk are quickly moving beyond many school districts’ ability to manage on their own. But a new technology model, a partnership with a managed services provider, offers a way forward for schools to overcome these challenges.