Browse Definitions:

Networking

Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

Circuit switched services equipment and providers

Terms related to circuit switched services equipment and providers, including dedicated communications channel definitions and words and phrases about telecommunications.

  • trunk

    A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.

  • service-level agreement (SLA)

    A service-level agreement (SLA) is a contract that specifies what the service provider is responsible for.

  • signal-to-noise ratio (S/N or SNR)

    In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise. This ratio is usually measured in decibels.

View All Circuit switched services equipment and providers Definitions

Data transmission

Terms related to data transmission, including definitions about communication channels and words and phrases about point-to-point and point-to-multipoint data transfers.

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber.

  • IPTV (Internet Protocol television)

    IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

View All Data transmission Definitions Back to Top

Email and messaging

Terms related to email and messaging, including definitions about instant messenger and words and phrases about email servers, storage, spam and mobile access.

  • text messaging (texting or wireless messaging)

    Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an event.

View All Email and messaging Definitions Back to Top

High-speed networks

Terms related to high-speed communication networks, including network and end-system architecture definitions and words and phrases about high-bandwidth and low-latency communication.

  • Verizon Communications v. Federal Communications Commission (2014)

    Verizon Communications v. Federal Communications Commission was a 2014 case in which the court ruled that the FCC lacked the authority to regulate broadband providers as common carriers. The case was heard by the United States Court of Appeals for the District of Columbia Circuit.

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber.

  • IPTV (Internet Protocol television)

    IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.

View All High-speed networks Definitions Back to Top

Internet of Things

The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human interaction.

  • vertical farming

    Vertical farming is the practice of growing vegetables and fruit in vertically stacked layers. The practice can be based on soil, hydroponic or aeroponic growing methods.

  • Mobileye

    Mobileye is a machine vision-based assisted driving and accident prevention system and Intel-owned company of the same name.

  • RIOT operating system

    RIOT operating system is an open source operating system specialized for IoT (internet of things) devices.

View All Internet of Things Definitions Back to Top

LANs

Terms related to local area networks (LANs), including definitions about Ethernet and words and phrases about devices that share a common communications line or link.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

  • network automation

    Network automation is the use of IT controls to supervise and carry out every-day network management functions.

  • 40 Gigabit Ethernet (40GbE)

    40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps). 40 GbE runs on Quad Small Form Factor Pluggable (QSFFP) cabling, a high-density fiber connector with 12 strands of fiber.

View All LANs Definitions Back to Top

Network hardware

Terms related to network hardware, including definitions about cables or file servers and words and phrases about routers and switches.

  • Unshielded Twisted Pair (UTP)

    Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.

  • infrastructure (IT infrastructure)

    Infrastructure is the foundation or framework that supports a system or organization. In computing, infrastructure is composed of physical and virtual resources that support the flow, storage, processing and analysis of data.

View All Network hardware Definitions Back to Top

Network software

Terms related to network software, including definitions about network monitoring and words and phrases about network administration.

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.

  • SDDC (software-defined data center)

    An SDDC (software-defined data center) is a data storage facility in which networking, storage, CPU and security are virtualized and delivered as a service.

  • systems engineering (SE)

    Systems engineering (SE) is an interdisciplinary area of technology that encompasses software and hardware systems design and development with consideration to their interconnections and the environment in which they operate.

View All Network software Definitions Back to Top

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

  • churn rate

    Churn rate is a measure of the number of customers or employees who leave a company during a given period. It can also refer to the amount of revenue lost as a result of the departures.

  • VMware

    VMware is a virtualization and cloud computing software provider for x86-compatible computers.

  • east-west traffic

    East-west traffic, in a networking context, is the transfer of data packets from server to server within a data center. The label east-west comes from network diagram drawings that usually depict local area network (LAN) traffic horizontally.

View All Networking and communications Definitions Back to Top

Routing and switching

Terms related to routers and switches, including definitions about hubs and words and phrases about packet-switched networks.

  • edge provider

    An edge provider is a service that a given ISP’s customers connect to that is not inside that provider’s network and does not belong to them.

  • subnet mask (subnetting)

    A subnet mask is a 32- or 128-bit number that segments an existing IP address in a TCP/IP network and divides that address into discrete network and host addresses.

  • adaptive routing (dynamic routing)

    Adaptive routing, also called dynamic routing, is a process for determining the optimal path a data packet should follow through a network to arrive at a specific destination. Adaptive routing can be compared to a commuter taking a different route to work after learning that traffic on his usual route is backed up.

View All Routing and switching Definitions Back to Top

Smart grid

Terms related to smart grids, including definitions about utility electricity delivery systems and words and phrases about smart meters and distributing, monitoring and billing electrical power.

  • application program interface (API)

    An application program interface (API) is code that allows two software programs to communicate with each other.

  • firmware

    Firmware is programming that's written to the non-volatile memory of a hardware device. Non-volatile memory is a form of static random access memory whose contents are saved when a hardware device is turned off or loses its external power source.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

View All Smart grid Definitions Back to Top

Telecom

Terms related to telecom, including definitions about telecommunication service providers and words and phrases about voice, video and Internet communication.

  • data discrimination (data censorship)

    Data discrimination, also called discrimination by algorithm, is bias that occurs when predefined data types or data sources are intentionally or unintentionally treated differently than others.

  • common carrier

    A common carrier, in telecommunications, is an entity that provides wired and wireless communication services to the general public for a fee. A common carrier can be contrasted with a contract carrier, also called a private carrier, which provides services to a limited number of customers.

  • paid prioritization

    Paid prioritization, in relation to the internet, is the optimization of data transfer rates for certain content providers, websites and web services.

View All Telecom Definitions Back to Top

VoIP

Terms related to voice over IP (VoIP), including definitions about communication protocols and words and phrases about making phone calls over the Internet.

  • network convergence

    Network convergence is the efficient coexistence of telephone, video and data communication within a single network.

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and disaster recovery.

  • VoIP (voice over IP)

    VoIP enables voice and multimedia communications, such as phone calls, over the internet and other IP-based networks, and allows enterprises to operate a single voice and data network.

View All VoIP Definitions Back to Top

Wireless LANs

Terms related to wireless LANs, including definitions about Wi-Fi and words and phrases about wireless access points, wireless controllers, wireless LAN security and WLAN configuration.

  • radio frequency (RF, rf)

    Radio frequency is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.

  • line of sight (LOS)

    The level of obstruction in a line of sight determines not only the visibility from one point to another but also the quality of signal reception for wireless transmissions, such as Wi-Fi.

  • Wi-Fi (802.11x standard)

    Wi-Fi is the popular term for high-frequency wireless local area network (WLAN) technology and a standard that has gained acceptance in many companies as an alternative to a wired LAN.

View All Wireless LANs Definitions Back to Top

Wireless technologies

Terms related to wireless technologies, including definitions about wireless devices and words and phrases about radio, microwave and infrared communication.

  • vehicle to infrastructure (V2I or v2i)

    Vehicle-to-infrastructure (V2I or V2X) is a communication model that allows vehicles to share information with the components that support a country's highway system. Such components include overhead RFID readers and cameras, traffic lights, lane markers, streetlights, signage and parking meters. V2I communication is typically wireless and bi-directional: data from infrastructure components can be delivered to the vehicle and vice versa.

  • Qi (Wireless Power Consortium)

    Qi (pronounced CHEE) is a manufacturer-agnostic standard for wirelessly charging battery-powered devices. Qi, which means life energy in Chinese, was developed and is maintained by the Wireless Power Consortium.

  • Wi-Fi (802.11x standard)

    Wi-Fi is the popular term for high-frequency wireless local area network (WLAN) technology and a standard that has gained acceptance in many companies as an alternative to a wired LAN.

View All Wireless technologies Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • data migration

    Data migration is the process of transferring data between data storage systems, data formats or computer systems.

  • compact disc (CD)

    A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data ...

SearchSolidStateStorage

  • NVMe (non-volatile memory express)

    NVMe (non-volatile memory express) is a host controller interface and storage protocol to enable a solid-state drive to use the ...

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close