Browse Definitions :

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

TEL - XEN

  • telecommunications (telecom) - Telecommunications, also known as telecom, is the exchange of information over significant distances by electronic means and refers to all types of voice, data and video transmission.
  • Telecommunications Display Device (TDD) - A Telecommunications Display Device (TDD), also known as a text telephone, is a telephone equipped with a keyboard and a display for people who are hearing- or speech-impaired.
  • terbo - The suffix terbo appears in the V.
  • tethering - Tethering is the practice of using a mobile device (such as a cell phone) as a modem to connect another device (such as a laptop) to the Internet.
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • Toslink - Toslink is a connector format for fiber optic digital audio cables.
  • TrackBack - TrackBack is a technical specification for an Internet program that allows a blogger to know when another blogger has commented upon one of his posts.
  • traffic engineering - Traffic engineering is a method of optimizing the performance of a telecommunications network by dynamically analyzing, predicting and regulating the behavior of data transmitted over that network.
  • traffic shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.
  • Transparent Interconnection of Lots of Links (TRILL) - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.
  • Trema - Trema is an open source framework for developing OpenFlow controllers for software-defined networking in the Ruby and C programming languages.
  • triple-play network - A triple-play network is one in which voice, video and data are all provided in a single access subscription.
  • Tsunami UDP - Tsunami UDP is an open source file transfer protocol that enables high-speed data transfer over network paths with a large bandwidth delay product.
  • ubiquitous robotics - Ubiquitous robotics is the design and deployment of robots in smart network environments in which everything is interconnected.
  • ubiquitous sensor network (USN) - A ubiquitous sensor network (USN) is one that connects all possible sensors in a given network or environment which, theoretically, could be global.
  • unified communications and collaboration (UCC) - Unified communications and collaboration (UCC) is the collection of technology and software that combines enterprise communication with real time, asynchronous cooperation capabilities.
  • universal acceptance (UA) - Universal acceptance (UA) is a best practice that ensures all domain names and email addresses work with all applications, devices and systems.
  • Universal Service Fund (USF) - The Universal Service Fund (USF) is a United States government program that supports telecommunications access and affordability in rural and low-income communities.
  • variable-length subnet mask (VLSM) - Definition: Learn what a variable-length subnet mask (VLSM) is and how it allows network engineers to reduce the number of wasted IP addresses in each subnet.
  • vEPC (virtual Evolved Packet Core) - The vEPC offers a framework to support converged voice and data on 4G Long-Term Evolution networks.
  • verbose logging - Verbose logging is a computer logging mode that records more information than the usual logging mode.
  • Verizon Communications v. Federal Communications Commission (2014) - Verizon Communications v.
  • vertical blanking interval (VBI) - The vertical blanking interval (VBI) is a portion of a television signal that can carry information other than video or audio, such as closed-caption text and stock market data.
  • vertical scalability (scaling up) - Vertical scalability is the ability to increase the capacity of existing hardware or software by adding resources - for example, adding processing power to a server to make it faster.
  • video on demand (VoD) - Video on demand (VoD) is an interactive TV technology that allows subscribers to view programming in real time or download programs and view them later.
  • video telephony - Video telephony is full-duplex, real-time audio-visual communication between or among end users.
  • VMware - VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.
  • voice over LTE (VoLTE) - Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice-enabled e-mail (voice-activated e-mail) - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • Vouch by Reference (VBR) - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • WAN accelerator - A WAN accelerator is an appliance that improves the end user's experience on a wide area network (WAN).
  • wavelength-division multiplexing (WDM) - Wavelength-division multiplexing (WDM) is a method of combining multiple signals on laser beams at various infared (IR) wavelengths for transmission along fiber optic media.
  • web conferencing - Web conferencing is a form of communication that enables real-time sharing of computer screens, applications or web-based content among two or more devices.
  • WebSocket - WebSocket is a communications protocol for a persistent, bi-directional, full duplex TCP connection from a user’s web browser to a server.
  • weighted fair queueing (WFQ) - Weighted fair queueing (WFQ) is a method of automatically smoothing out the flow of data in packet-switched communication networks by sorting packets to minimize the average latency and prevent exaggerated discrepancies between the transmission efficiency afforded to narrowband versus broadband signals.
  • What is edge computing? Everything you need to know - Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.
  • white space - White space, in a communications context, refers to underutilized portions of the radio frequency (RF) spectrum vacated in the absence of analog broadcast television.
  • white space device (WSD) - A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space.
  • Wi-Fi 6 (802.11ax) - Wi-Fi 6 is a standard for wireless internet that replaces the 802.
  • Wi-Fi backscattering - Wi-Fi backscattering is a low-power communications technology that uses radio frequency (RF) signals as a power source and reuses the existing Wi-Fi infrastructure to provide RF-powered devices with Internet connectivity.
  • Wi-Fi Direct - Wi-Fi Direct is a peer-to-peer specification that allows devices certified for Wi-Fi Direct to exchange data without an Internet connection or a wireless router.
  • Wi-Fi HaLow (802.11ah) - HaLow is based on the WiFi Alliance 802.
  • Wi-Fi Multimedia (WMM) - Wi-Fi Multimedia (WMM), previously known as Wireless Multimedia Extensions (WME), is a subset of the 802.
  • Wide Area Ethernet (WAE) - Wide Area Ethernet (WAE) or Ethernet WAN (also sometimes referred to as fiber or LAN extension service ) is a network carrier service that delivers high-speed wide area network (WAN) connectivity, utilizing Ethernet as the connection method.
  • wideband audio (HD voice) - Wideband audio, also known as HD voice, is a cellular technology that utilizes a wider frequency spectrum to achieve greater voice quality during phone calls.
  • wildcard mask - A wildcard mask is a sequence of numbers that streamlines packet routing within the subnets of a proprietary network.
  • Windows Server Update Services (WSUS) - Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems.
  • wireless ad hoc network (WANET) - A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless router or access point.
  • wireless broadband (WiBB) - Wireless broadband (WiBB) is high-speed internet and data service delivered through a wireless local area network (WLAN) or wireless wide area network (WWAN).
  • Wireless Communications Service (WCS) - The Wireless Communications Service (WCS) is a set of wireless services that operate in the 2.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • wireless mesh network (WMN) - A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (WAP) nodes installed at each network user's locale.
  • wireless WAN (Wireless Wide Area Network) - A wireless WAN is a wide area network in which separate areas of coverage or cells are connected wirelessly to provide service to a large geographic area.
  • WRAN (wireless regional area network) - A wireless regional area network (WRAN) is techology based on IEEE 802.
  • wsname - WSName, or Workstation Name Changer, is a freeware utility that automates the process of computer renaming.
  • x2 - x2 is a technology from US Robotics (now 3Com) for the downstream transmission of data over ordinary phone lines at 56 Kbps (thousands of bits per second).
  • XenMobile Mail Manager - XenMobile Mail Manager, Citrix's EMM email product, is designed to allow emloyees to access sensitive corporate email while working outside the office, while also facilitating administration and management.

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...

  • unified threat management (UTM)

    Unified threat management (UTM) describes an information security (infosec) system that provides a single point of protection ...

  • attack vector

    An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close