Browse Definitions :

Telecom

Terms related to telecom, including definitions about telecommunication service providers and words and phrases about voice, video and Internet communication.

SMI - WIR

  • SMiShing (SMS phishing) - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • snoopware - In mobile computing, snoopware is malware that is capable of monitoring activity on a smartphone.
  • spectrum efficiency - Spectrum efficiency is the optimized use of spectrum or bandwidth so that the maximum amount of data can be transmitted with the fewest transmission errors.
  • SPID (Service Profile Identifier) - A SPID (Service Profile Identifier) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network B-channel.
  • spread spectrum - Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied.
  • SSL VPN (Secure Sockets Layer virtual private network) - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
  • subcarrier - A subcarrier is one telecommunication signal carrier that is carried on top of another carrier so that effectively two signals are carried at the same time.
  • T-carrier system - To see the relationship between T-carrier, E-carrier, and DS0 multiples, see digital signal X.
  • TD-SCDMA (time division synchronous code division multiple access) - TD-SCDMA (time division synchronous code division multiple access) is a mobile telephone standard for wireless network operators who want to move from a second generation (2G) wireless network to a third-generation (3G) one.
  • TDMA (time division multiple access) - TDMA (time division multiple access) is a technology used in digital cellular telephone communication that divides each cellular channel into three time slots in order to increase the amount of data that can be carried.
  • telecom carrier - A telecom carrier is a company that is authorized by regulatory agencies to operate a telecommunications system.
  • telecom cloud provider - A telecom cloud provider is a telecommunications company that has shifted a significant part of its business from landline service to devote resources to providing cloud services.
  • telecommunications (telecom) - Telecommunications is the transmission of data, voice and video over significant distances by electronic means that use a wide variety of networks and media.
  • teleconference - A teleconference is a telephone meeting among two or more participants involving technology more sophisticated than a simple two-way phone connection.
  • Telephony Application Program Interface (TAPI) - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.
  • telepresence room - A telepresence room is a conference space dedicated to high-end videoconferencing.
  • text messaging (texting or wireless messaging) - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • traffic engineering - Traffic engineering is a method of optimizing the performance of a telecommunications network by dynamically analyzing, predicting and regulating the behavior of data transmitted over that network.
  • triple-play network - A triple-play network is one in which voice, video and data are all provided in a single access subscription.
  • two-way pager - A two-way pager is a pager that allows you to send data as well as receive it.
  • UCaaS (Unified Communications as a Service) - Unified communications as a service (UCaaS) is a cloud delivery model that offers a variety of communication and collaboration applications and services.
  • Ultra Low Energy (ULE) - Ultra Low Energy (ULE) is a telecommunications technology based on DECT (Digital Enhanced Cordless Telecommunications) which is the de-facto standard for voice calls, integrated in millions of devices worldwide.
  • United Launch Alliance (ULA) - United Launch Alliance (ULA) is a private aerospace launch provider.
  • unlocked cell phone - An unlocked cell phone is a cellular telephone handset that can be used with more than one service provider, making it easy for a user to switch from one cellular network to another.
  • vestigial sideband (VSB) - Vestigial sideband (VSB) is a type of amplitude modulation (AM) technique (sometimes called VSB-AM) that encodes data by varying the amplitude of a single carrier frequency.
  • video on demand (VoD) - Video on demand (VoD) is an interactive TV technology that allows subscribers to view programming in real time or download programs and view them later.
  • vishing (voice or VoIP phishing) - Vishing is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities.
  • voice dial - Voice dial is a telephone feature that initiates a call when the user says a contact name or the digits in a phone number.
  • voice portal (vortal) - A voice portal (sometimes called a vortal) is a Web portal that can be accessed entirely by voice.
  • voice recognition (speaker recognition) - Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice-to-text - Voice-to-text is a type of speech recognition program that converts spoken to written language.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • voicemail preview - Voicemail preview is a feature of unified messaging, and in particular voice-to-text messaging programs such as Microsoft Exchange.
  • VoIP (voice over IP) - VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks.
  • VoIP caller ID (Voice over Internet Protocol caller identification) - VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as caller ID on a conventional telephone line but with enhanced features and flexibility.
  • VoIP phone - A VoIP phone is a hardware- or software-based telephone designed to use voice over IP (VoIP) technology to send and receive phone calls over an IP network.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • VoIP: Glossary - This handy glossary will assist you with terminology related specifically to voice over IP.
  • VSAT (Very Small Aperture Terminal) - VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users.
  • W-CDMA (Wideband Code-Division Multiple Access) - Also see CDMA, CDMA One, and CDMA2000.
  • WATS (wide-area telephone service) - WATS (wide-area telephone service) is a specialized form of fixed-rate long-distance telecommunication service.
  • white space device (WSD) - A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space.
  • Wi-Fi cell phone (cellular-Internet phone or cell-Internet phone) - A Wi-Fi cell phone (also called a cellular-Internet phone or cell-Internet phone) is a wireless telephone set that can automatically switch between conventional cellular and Wi-Fi VoIP modes, even during the course of a conversation.
  • Wi-Fi Multimedia (WMM) - Wi-Fi Multimedia (WMM), previously known as Wireless Multimedia Extensions (WME), is a subset of the 802.
  • wideband - Wideband is a transmission medium or channel that has a wider bandwidth than one voice channel (with a carrier wave of a certain modulated frequency).
  • WiDEN (Wideband Integrated Digital Enhanced Network) - WiDEN (Wideband Integrated Digital Enhanced Network) is an upgraded version of iDEN (Integrated Digital Enhanced Network), a wireless communications technology originally developed by Motorola in 1993 and deployed by Nextel in 1996 to combine the capabilities of digital cellular telephone, two-way radio, alphanumeric pager and data/fax modem in a single network.
  • wireless backhaul - Wireless backhaul is the use of wireless communications systems to get data from an end user to a node in a major network such as the Internet or the proprietary network of a large business, academic institution or government agency.
  • wireless charging - Wireless charging is any of several methods of charging batteries without the use of cables.
  • wireless number portability - Wireless number portability is the ability of a mobile customer to retain the same phone number when they switch carriers; wireline-to-wireless number portability allows customers to switch from their landline telephone service to a wireless provider while retaining the same telephone number.
  • wireless WAN (Wireless Wide Area Network) - A wireless WAN is a wide area network in which separate areas of coverage or cells are connected wirelessly to provide service to a large geographic area.
  • wireline communication - Wireline communication (also known as wired communication) is the transmission of information over a physical filament.
  • wiretapping - Wiretapping is the surreptitious electronic monitoring of telephone, telegraph, cellular, fax or Internet-based communications.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close