Browse Definitions :
26 results for:

codec

codec

Definition | SearchUnifiedCommunications

A codec is either a hardware device or a software-based process that compresses and decompresses large amounts of data used in voice over IP, video ...

Ogg Theora

Definition | WhatIs.com

Ogg Theora is an open-source video codec being developed by the Xiph.

mu-Law

Definition | SearchNetworking

Mu-Law is the standard codec (compression/decompression) algorithm for pulse code modulation (PCM) from the CCITT (Consultative Committee for ...

A-Law

Definition | SearchNetworking

A-Law is the standard codec (compression/decompression) algorithm for pulse code modulation (PCM) from the ITU-T (the Telecommunication ...

AMR (Audio/Modem Riser or AMR slot)

Definition | WhatIs.com

AMR (Audio/Modem Riser) is a specification developed by Intel for packaging the analog I/O audio functions of modem circuitry together with a codec ...

scalable video coding (SVC)

Definition | SearchUnifiedCommunications

Scalable video coding (SVC) is an extension of the H.264 (MPEG-4 AVC) video compression standard for video encoding.

wideband audio (HD voice)

Definition | SearchNetworking

Wideband audio, also known as HD voice, is a cellular technology that utilizes a wider frequency spectrum to achieve greater voice quality during ...

mean opinion score (MOS)

Definition | SearchNetworking

In voice communications, particularly Internet telephony, the mean opinion score (MOS) provides a numerical measure of the quality of human speech at...

G.711

Definition | SearchUnifiedCommunications

G.711 is the default pulse code modulation (PCM) standard for Internet Protocol (IP) private branch exchange (PBX) vendors, as well as for the public...

VoIP (voice over IP)

Definition | SearchUnifiedCommunications

VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks. VoIP historically referred to using IP...

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close