Browse Definitions :

Networking

Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

Circuit switched services equipment and providers

Terms related to circuit switched services equipment and providers, including dedicated communications channel definitions and words and phrases about telecommunications.

  • service-level agreement (SLA)

    A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.

  • network switch

    A network switch is a hardware device that channels incoming data from multiple input ports to a specific output port that will take it toward its intended destination.

  • leased line

    A leased line is a bidirectional telephone line that has been rented for private voice, data exchange or telecommunication use.

View All Circuit switched services equipment and providers Definitions

Data transmission

Terms related to data transmission, including definitions about communication channels and words and phrases about point-to-point and point-to-multipoint data transfers.

  • OAuth

    OAuth (Open Authorization) is an open standard authorization framework for token-based authorization on the internet.

  • service-level agreement (SLA)

    A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.

  • WAN optimization (WAN acceleration)

    WAN optimization -- also known as WAN acceleration -- is the category of technologies and techniques used to maximize the efficiency of data's flow across a wide area network (WAN), between organizations' centralized data centers and their remote locations.

View All Data transmission Definitions Back to Top

Email and messaging

Terms related to email and messaging, including definitions about instant messenger and words and phrases about email servers, storage, spam and mobile access.

  • phishing kit

    A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.

  • cloud telephony (cloud calling)

    Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.

  • unified communications (UC)

    Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools.

View All Email and messaging Definitions Back to Top

High-speed networks

Terms related to high-speed communication networks, including network and end-system architecture definitions and words and phrases about high-bandwidth and low-latency communication.

  • CenturyLink

    CenturyLink is an integrated telecommunications company that provides a wide variety of products and services to clients across the globe, including networking, cloud service and security solutions.

  • 5G

    Fifth-generation wireless (5G) is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks.

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber.

View All High-speed networks Definitions Back to Top

Internet of Things

The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human interaction.

  • Kessler Syndrome

    The Kessler Syndrome is a theoretical scenario in which Earth's orbit is overpopulated with objects and debris, preventing the use of satellites in certain sections of Earth's orbit.

  • What is RPA? Everything you need to know

    Robotic process automation technology is software that can be trained to mimic routine, labor-intensive tasks performed by humans.

  • internet of things (IoT)

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

View All Internet of Things Definitions Back to Top

LANs

Terms related to local area networks (LANs), including definitions about Ethernet and words and phrases about devices that share a common communications line or link.

  • dynamic spectrum access (dynamic spectrum management)

    Dynamic spectrum access (DSA), also referred to as dynamic spectrum management (DSM), is a set of spectrum utilization techniques that adjusts frequency in real time based on fluctuating circumstances.

  • wireline communication

    Wireline communication (also known as wired communication) is the transmission of information over a physical filament. Alternatively, communication technologies that transmit information over-the-air (OTA) are called wireless.

  • interconnection

    Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information. An important goal of interconnection is to enable extremely high bandwidth exchanges with the lowest possible latency, at the lowest cost.

View All LANs Definitions Back to Top

Network hardware

Terms related to network hardware, including definitions about cables or file servers and words and phrases about routers and switches.

  • intrusion prevention system (IPS)

    An intrusion prevention system (IPS) is a network security and threat prevention tool.

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.

  • WAN optimization (WAN acceleration)

    WAN optimization -- also known as WAN acceleration -- is the category of technologies and techniques used to maximize the efficiency of data's flow across a wide area network (WAN), between organizations' centralized data centers and their remote locations.

View All Network hardware Definitions Back to Top

Network software

Terms related to network software, including definitions about network monitoring and words and phrases about network administration.

  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.

  • Ethernet

    Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN), enabling them to communicate with each other via a protocol -- a set of rules or common network language.

  • Simple Network Management Protocol (SNMP)

    Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.

View All Network software Definitions Back to Top

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

  • ISA (Industry Standard Architecture)

    ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.

  • cloud telephony (cloud calling)

    Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.

View All Networking and communications Definitions Back to Top

Routing and switching

Terms related to routers and switches, including definitions about hubs and words and phrases about packet-switched networks.

  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.

  • Martian address (Martian packet)

    A Martian address is a source or destination IP address that apparently does not exist on Planet Earth and is, thus, invalid and/or non-routable.

  • edge router

    An edge router is a specialized router located at a network boundary that enables an internal network to connect to external networks.

View All Routing and switching Definitions Back to Top

Smart grid

Terms related to smart grids, including definitions about utility electricity delivery systems and words and phrases about smart meters and distributing, monitoring and billing electrical power.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

  • internet of things (IoT)

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  • bandwidth

    Network bandwidth is the capacity of a wired or wireless network communications link to transmit the maximum amount of data from one point to another over a computer network or internet connection in a given amount of time -- usually, one second.

View All Smart grid Definitions Back to Top

Telecom

Terms related to telecom, including definitions about telecommunication service providers and words and phrases about voice, video and Internet communication.

  • Ethernet

    Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN), enabling them to communicate with each other via a protocol -- a set of rules or common network language.

  • private branch exchange (PBX)

    A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.

  • CenturyLink

    CenturyLink is an integrated telecommunications company that provides a wide variety of products and services to clients across the globe, including networking, cloud service and security solutions.

View All Telecom Definitions Back to Top

VoIP

Terms related to voice over IP (VoIP), including definitions about communication protocols and words and phrases about making phone calls over the Internet.

  • static IP address

    A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.

  • cloud telephony (cloud calling)

    Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.

  • unified communications (UC)

    Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools.

View All VoIP Definitions Back to Top

Wireless LANs

Terms related to wireless LANs, including definitions about Wi-Fi and words and phrases about wireless access points, wireless controllers, wireless LAN security and WLAN configuration.

  • Wi-Fi Pineapple

    A Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests.

  • bandwidth

    Network bandwidth is the capacity of a wired or wireless network communications link to transmit the maximum amount of data from one point to another over a computer network or internet connection in a given amount of time -- usually, one second.

  • wireless ad-hoc network (WANET)

    A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring a central device, such as a router or access point.

View All Wireless LANs Definitions Back to Top

Wireless technologies

Terms related to wireless technologies, including definitions about wireless devices and words and phrases about radio, microwave and infrared communication.

  • mobile operating system

    A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.

  • Wi-Fi calling

    Wi-Fi calling is a voice service that lets users place and receive calls over a wireless internet connection, as opposed to using a cellular signal.

  • USSD (Unstructured Supplementary Service Data)

    USSD (Unstructured Supplementary Service Data) is a GSM (Global System for Mobile) communications protocol that is used to send text messages.

View All Wireless technologies Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close