Browse Definitions :

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

TET - XEN

  • tethering - Tethering is the practice of using a mobile device (such as a cell phone) as a modem to connect another device (such as a laptop) to the Internet.
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • Toslink - Toslink is a connector format for fiber optic digital audio cables.
  • TrackBack - TrackBack is a technical specification for an Internet program that allows a blogger to know when another blogger has commented upon one of his posts.
  • traffic engineering - Traffic engineering is a method of optimizing the performance of a telecommunications network by dynamically analyzing, predicting and regulating the behavior of data transmitted over that network.
  • traffic shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.
  • Transparent Interconnection of Lots of Links (TRILL) - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.
  • Trema - Trema is an open source framework for developing OpenFlow controllers for software-defined networking in the Ruby and C programming languages.
  • triple-play network - A triple-play network is one in which voice, video and data are all provided in a single access subscription.
  • Tsunami UDP - Tsunami UDP is an open source file transfer protocol that enables high-speed data transfer over network paths with a large bandwidth delay product.
  • ubiquitous robotics - Ubiquitous robotics is the design and deployment of robots in smart network environments in which everything is interconnected.
  • ubiquitous sensor network (USN) - A ubiquitous sensor network (USN) is one that connects all possible sensors in a given network or environment which, theoretically, could be global.
  • unified communications and collaboration (UCC) - Unified communications and collaboration (UCC) is the collection of technology and software that combines enterprise communication with real time, asynchronous cooperation capabilities.
  • universal acceptance (UA) - Universal acceptance (UA) is a best practice that ensures all domain names and email addresses work with all applications, devices and systems.
  • Universal Service Fund (USF) - The Universal Service Fund (USF) is a United States government program that supports telecommunications access and affordability in rural and low-income communities.
  • variable-length subnet mask (VLSM) - Definition: Learn what a variable-length subnet mask (VLSM) is and how it allows network engineers to reduce the number of wasted IP addresses in each subnet.
  • vEPC (virtual Evolved Packet Core) - The vEPC offers a framework to support converged voice and data on 4G Long-Term Evolution networks.
  • verbose logging - Verbose logging is a computer logging mode that records more information than the usual logging mode.
  • Verizon Communications v. Federal Communications Commission (2014) - Verizon Communications v.
  • vertical blanking interval (VBI) - The vertical blanking interval (VBI) is a portion of a television signal that can carry information other than video or audio, such as closed-caption text and stock market data.
  • vertical scalability (scaling up) - Vertical scalability is the ability to increase the capacity of existing hardware or software by adding resources - for example, adding processing power to a server to make it faster.
  • video on demand (VoD) - Video on demand (VoD) is an interactive TV technology that allows subscribers to view programming in real time or download programs and view them later.
  • video telephony - Video telephony is full-duplex, real-time audio-visual communication between or among end users.
  • VMware - VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.
  • voice over LTE (VoLTE) - Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice-enabled e-mail (voice-activated e-mail) - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • Vouch by Reference (VBR) - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • WAN accelerator - A WAN accelerator is an appliance that improves the end user's experience on a wide area network (WAN).
  • wavelength-division multiplexing (WDM) - Wavelength-division multiplexing (WDM) is a method of combining multiple signals on laser beams at various infared (IR) wavelengths for transmission along fiber optic media.
  • Weave - Weave is a set of browser enhancements and associated services from Mozilla Labs that allow users to store personal information on Mozilla servers.
  • web conferencing - Web conferencing is a form of communication that enables real-time sharing of computer screens, applications or web-based content among two or more devices.
  • WebSocket - WebSocket is a communications protocol for a persistent, bi-directional, full duplex TCP connection from a user’s web browser to a server.
  • weighted fair queueing (WFQ) - Weighted fair queueing (WFQ) is a method of automatically smoothing out the flow of data in packet-switched communication networks by sorting packets to minimize the average latency and prevent exaggerated discrepancies between the transmission efficiency afforded to narrowband versus broadband signals.
  • white space - White space, in a communications context, refers to underutilized portions of the radio frequency (RF) spectrum vacated in the absence of analog broadcast television.
  • white space device (WSD) - A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space.
  • Wi-Fi 6 (802.11ax) - Wi-Fi 6 is a standard for wireless internet that replaces the 802.
  • Wi-Fi backscattering - Wi-Fi backscattering is a low-power communications technology that uses radio frequency (RF) signals as a power source and reuses the existing Wi-Fi infrastructure to provide RF-powered devices with Internet connectivity.
  • Wi-Fi Direct - Wi-Fi Direct is a peer-to-peer specification that allows devices certified for Wi-Fi Direct to exchange data without an Internet connection or a wireless router.
  • Wi-Fi HaLow (802.11ah) - HaLow is based on the WiFi Alliance 802.
  • Wi-Fi Multimedia (WMM) - Wi-Fi Multimedia (WMM), previously known as Wireless Multimedia Extensions (WME), is a subset of the 802.
  • Wide Area Ethernet (WAE) - Wide Area Ethernet (WAE) or Ethernet WAN (also sometimes referred to as fiber or LAN extension service ) is a network carrier service that delivers high-speed wide area network (WAN) connectivity, utilizing Ethernet as the connection method.
  • wideband audio (HD voice) - Wideband audio, also known as HD voice, is a cellular technology that utilizes a wider frequency spectrum to achieve greater voice quality during phone calls.
  • wildcard mask - A wildcard mask is a sequence of numbers that streamlines packet routing within the subnets of a proprietary network.
  • Windows Server Update Services (WSUS) - Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems.
  • wireless broadband (WiBB) - Wireless broadband is high-speed Internet and data service delivered through a wireless local area network (WLAN) or wide area network (WWAN).
  • Wireless Communications Service (WCS) - The Wireless Communications Service (WCS) is a set of wireless services that operate in the 2.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • wireless WAN (Wireless Wide Area Network) - A wireless WAN is a wide area network in which separate areas of coverage or cells are connected wirelessly to provide service to a large geographic area.
  • WRAN (wireless regional area network) - A wireless regional area network (WRAN) is techology based on IEEE 802.
  • wsname - WSName, or Workstation Name Changer, is a freeware utility that automates the process of computer renaming.
  • x2 - x2 is a technology from US Robotics (now 3Com) for the downstream transmission of data over ordinary phone lines at 56 Kbps (thousands of bits per second).
  • XenMobile Mail Manager - XenMobile Mail Manager, Citrix's EMM email product, is designed to allow emloyees to access sensitive corporate email while working outside the office, while also facilitating administration and management.

-ADS BY GOOGLE

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the...

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

Close