Thursday Apr 24, 2014
Search for Dictionary terms (regular expression allowed)
Begins with Contains Exact term Sounds like

Add WordAdd New Word

All | 0-9 | ! | # | $ | % | & | ( | * | + | - | . | / | : | ; | < | = | ? | @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | [ | \ | ] | ^ | ` | { | | | } | ~ | µ
Page:  « Prev ... 2 3 4 5 6 7 8 9 10 11 12... Next »


Word Explanation

Digital Anchor Data File


show biz

SBC (Smart Bitrate Control)

The improved technique of video compression. Variable Keyframe Intervals (VKI) and multipass encoding are the underlying basis of SBC. Files created using this technique can easily be decoded by any MPEG4 video supporting codec.

CTI (Computer Telephone Integration)

The technology that helps combine telephony with computer systems. Computers handling calls in call centers or customer care departments are CTI implementations. Here, computers take incoming calls and route them appropriately depending on their call number and caller ID. CTI has replaced traditional PBXs with advanced systems aptly capable of handling incoming calls, outgoing messages, fax and online communication.

BRI (Basic Rate Interface)

BRI constitutes one of the two ISDN interfaces, the other being primary rate interface (PRI). The BRI supports two 64kbps B channels, apt for carrying multimedia signal, including voice, image and data. Additionally, BRI supports one 16kbps D channel to carry information related to the data packet and signaling. BRI is also known as 2B+D.

Dial-Peer Hunting

A feature of VoIP systems where the originating device attempts to find an alternative call endpoint when a connection cannot be established to the intended endpoint. In order for dial-peer hunting to work the originating device must have a list of dial peers (all can route a call to the same endpoint, but use different destination routers) so the originating device can proceed to the next in the dial peer sequence.

TAPI (Telephony API)

Telephony Application Programming Interface (TAPI) enables integration of computers with telephone services. With TAPI, computers running Windows facilitate phone services such as call dialing and forwarding. Different versions of Windows support varying TAPI versions. TAPI jointly developed by Microsoft and Intel was introduced in 1993. Most modems and telephony devices are compatible with TAPI.

SS7 (Signaling System #7)

A signaling protocol for setting up PSTN calls, defining the way information is exchanged between telephone networks and their individual entities. Defined in 1981 by ITU-T, SS7 in the US is commonly known as Common Channel Signaling System 7 (CCS7).

VPN (Virtual Private Network)

A private communication network that uses a public telecommunication infrastructure, such as the Internet, to provide secure access to their proprietary data to remote offices or individual users. VPN systems can be hardware based, firewall based or software based. Data encryption, authentication of remote users and mechanisms for hiding or masking information about the system from potential attackers on the public network, are important security features of most VPN systems.

Computer Cluster

A computer cluster is a group of computers that work together closely so that in many respects it can be viewed as though it were a single computer. Clusters are commonly (but not always) connected through fast local area networks. Clusters are usually deployed to improve speed and/or reliability over that provided by a single computer, while typically being much more cost-effective than single computers of comparable speed or reliability.

SIP (Session Initiation Protocol)

SIP or Session Initiation Protocol is an IETF (see IETF) standard signaling protocol used for creating, modifying and terminating voice, video and data conferencing over packet-switched networks. VoIP systems incorporate SIP at the application layer to successfully integrate IP telephony with other Internet services. Some of the features of VoIP managed by SIP include call setup, routing, authentication, authorization and communication with different service providers.

DIN Connector: Deutsche Industrie Norm C

Deutsche Industrie Norm connectors (DIN Connector) are 13.2 mm in diameter, and are available in patterns with three to fifteen pins. DIN Connector are used in some Macintosh and IBM PC-compatible computers, and on some network processor panels. For example, the keyboard connector for PCs is a DIN connector. DIN 41612 connectors are used widely to connect network equipment, such as routers and switches.

CNR: Communication and Networking Riser

Communication and Networking Riser (CNR), developed by Intel, is a riser card for ATX family motherboards. The CNR specification is open to the industry. It defines a scalable motherboard riser card and interface that support the audio, modem, and network interfaces of core logic chipsets.

DIB: Dual Independent Bus

DUAL INDEPENDENT BUS (DIB) architecture is introduced in the Intel's Pentium II to connect the processor, memory, and L2 cache. One bus connects the processor to L2 cache and a second connects the processor to main memory. Having two buses instead of one increases performance over single-bus architectures. In addition, the speed of the external L2 cache can scale up independently from the speed of the system bus.This allows for faster cache access. The final feature of the DIB architecture is a pipeline on the cache to the processor bus that allows multiple simultaneous cache requests.

COM: Component Object Model

Component Object Model (COM) is a Microsoft platform for software componentry introduced in 1993, largely to replace the interprocess communication mechanism DDE used by the initial release of OLE. It is used to enable interprocess communication and dynamic object creation in any programming language that supports the technology. The term COM is often used in the software development world as an umbrella term that encompasses the OLE, OLE Automation, ActiveX, COM+ and DCOM technologies. COM provides a language-neutral way of implementing objects such that they can be used in environments different from the one they were created in, even across machine boundaries. For well-authored components, COM allows reuse of objects with no knowledge of their internal implementation because it forces component implementers to provide well-defined interfaces that are separate from the implementation.

Extended ASCII

Extended ASCII, also known as high ASCII, is a set of codes using 8 bits for each character, instead of 7 bits as the basic ASCII set. The basic ASCII set provides it a total of 128 unique symbols. The extended ASCII character set gives it an additional 128 characters. The extra characters represent characters from foreign languages and special symbols for drawing pictures.

Compiler Optimization

Compiler optimization is the process of using some optimization techniques that have been programmed into a compiler, to improve the performance or reach other objectives of the source code. These techniques are automatically applied by the compiler whenever they are appropriate. Because programmers no longer need to manually apply these techniques, programmers are free to write source code in a straightforward manner, expressing their intentions clearly. Then the compiler can choose the most efficient way to handle the implementation details.

Xirrus Management Software (XMS)

The Xirrus Management System (XMS) provides centralized configuration and RF management, security control and policies (IDS/IPS), performance monitoring, and reporting for hundreds of Arrays across a Layer 3 network.


Internet Inter-ORB Protocol. A protocol based on Common Object Request Broker Architecture (CORBA), which defines how distributed objects communicate and allows client software on many platforms to access and use the same object on a server. See ORB (Object Request Broker).

DSL - digital subscriber line

Digital subscriber lines carry data at high speeds over standard copper telephone wires. With DSL, data can be delivered at a rate of 1.5 mbps (around 30 times faster than through a 56-kbps modem).

boot virus

A virus that infects a computer when the computer is booted from an infected disk. A boot virus may make it impossible to start the computer.

command language

A language designed for giving instructions to a computer's operating system to perform certain tasks. An example would be a query language. A command language is much more limited than a programming language.

AT keyboard

Advanced Technology keyboard. The keyboard that originally came with the IBM PC/AT computers, which had 84 keys including the alphanumeric keys, the number pad, F keys, and arrow keys.

active hub

A central device to which other devices connect, and which not only forwards signals, but also amplifies or refreshes the stream of data, which otherwise would deteriorate over a long distance. An active hub is also called a repeater. See also passive hub, intelligent hub.


A headset designed for use with a computer. When the jack is plugged in, the sound only comes though to the headphones.

Page:  « Prev ... 2 3 4 5 6 7 8 9 10 11 12... Next »
Disclaimer: This section is for information purposes only posted by the public. If you feel the information is incorrect, please send us an email to webmaster at computeruser dot com.

forum traveling