Browse Definitions :

Wireless technologies

Terms related to wireless technologies, including definitions about wireless devices and words and phrases about radio, microwave and infrared communication.

WIR - Z-W

  • Wired Equivalent Privacy (WEP) - Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.
  • wireless - Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path.
  • wireless ad-hoc network (WANET) - A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring a central device, such as a router or access point.
  • wireless application service provider (WASP) - WASP is also an acronym for the Web Standards Project.
  • wireless backhaul - Wireless backhaul is the use of wireless communications systems to get data from an end user to a node in a major network such as the Internet or the proprietary network of a large business, academic institution or government agency.
  • Wireless Bitmap (WBMP) - A Wireless Bitmap (WBMP) is a graphic image format for use when sending Web content to handheld wireless devices.
  • wireless broadband (WiBB) - Wireless broadband is high-speed Internet and data service delivered through a wireless local area network (WLAN) or wide area network (WWAN).
  • wireless charging - Wireless charging is any of several methods of charging batteries without the use of cables.
  • Wireless Communications Service (WCS) - The Wireless Communications Service (WCS) is a set of wireless services that operate in the 2.
  • wireless fidelity - Wireless fidelity is frequently thought to be the full version of Wi-Fi, which refers to any of the IEEE (Institute of Electrical and Electronics Engineers) 802.
  • wireless ISP (wireless Internet service provider or WISP) - A wireless Internet service provider (WISP) is an Internet service provider (ISP) that allows subscribers to connect to a server at designated hot spots (access points) using a wireless connection such as Wi-Fi.
  • wireless LAN (WLAN or Wireless Local Area Network) - A wireless LAN is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection.
  • wireless mesh network (WMN) - A wireless mesh network (WMN) is a mesh network created through the connection of wireless access points installed at each network user's locale.
  • wireless number portability - Wireless number portability is the ability of a mobile customer to retain the same phone number when they switch carriers; wireline-to-wireless number portability allows customers to switch from their landline telephone service to a wireless provider while retaining the same telephone number.
  • wireless service provider (WSP) - A wireless service provider (WSP) is a company that offers transmission services to users of wireless devices (handheld computers and telephones) through radio frequency (RF) signals rather than through end-to-end wire communication.
  • Wireless Transport Layer Security (WTLS) - Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications.
  • wireless WAN (Wireless Wide Area Network) - A wireless WAN is a wide area network in which separate areas of coverage or cells are connected wirelessly to provide service to a large geographic area.
  • WRAN (wireless regional area network) - A wireless regional area network (WRAN) is techology based on IEEE 802.
  • WSAN (wireless sensor and actuator network) - A wireless sensor and actuator network (WSAN) is a group of sensors that gather information about their environment and actuators, such as servos or motors, that interact with them.
  • Yagi antenna (Yagi-Uda array) - A Yagi antenna, also known as a Yagi-Uda array or simply a Yagi, is a unidirectional antenna commonly used in communications when a frequency is above 10 MHz.
  • Z-Wave - Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close