upload
Alliance for Telecommunications Industry Solutions
Domeniu: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. Black level expressed as an offset in voltage or IRE units relative to blanking level. Conventionally, approximately 54 mV (7. 5 IRE) in system M as defined by ANSI/EIA/TIA 250-C; conventionally zero in all other systems. 2. See blanking level.
Industry:Telecommunications
1. Within a given technical discipline or area of knowledge, a circle of individuals or organizations having an intensified interest in a narrower facet of the general area. 2. In networking, particularly involving Internet applications, a group of individuals or organizations that sponsor, e.g., IRC channels, mailing lists, or Web sites for the purpose of promoting interest in, or advancement of, a particular area of knowledge.
Industry:Telecommunications
1. With respect to additive mixing, any pair of colors that are radially opposite one another relative to the white point on a chromaticity chart, e.g., the familiar CIE chart. Note: Complementary colors may be combined additively to produce the perception of white. 2. Analogous pairs of colors with respect to subtractive mixing.
Industry:Telecommunications
1. With respect to a signal, to divert a portion of it, or divide it, into usually predetermined or specified proportions. 2. In INFOSEC, a secret random number that is a component of the final working key. 3. An action that creates a private communication between the served user and a conferee. The private communication is a normal "two-party" call.
Industry:Telecommunications
1. Undesired coupling of a signal from one circuit, part of a circuit, or channel, to another. 2. Any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel. Note 1: In telephony, crosstalk is usually distinguishable as speech or signaling tones. Note 2: In video, "ghost" images from one source appear in addition to the signals of interest transmitted from another.
Industry:Telecommunications
1. To request data from (a) another program, another computer or server, or (b) a data array within a program. 2. Of or relating to the technology designed to pull data from a server.
Industry:Telecommunications
1. To establish, usually by challenge and response, that a transmission attempt is authorized and valid. 2. Verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to unauthorized modification in an information system (IS,) or establish the validity of a transmission. 3. A challenge given by voice or electrical means to attest to the authenticity of a message or transmission. 4. To establish the validity of a claimed identity. 5. To establish the validity of a claimed identity.
Industry:Telecommunications
1. To conduct an independent review and examination of system records and activities in order to test the adequacy and effectiveness of data security and data integrity procedures, to ensure compliance with established policy and operational procedures, and to recommend any necessary changes. 2. Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures. 3. An independent review and examination of system records and activities in order to test for the adequacy of system security measures, to identify the degree of conformance with established security policy and operational procedures and to recommend any indicated changes in measures, policy and/or procedures. 4. Monitoring to detect and warn of events which might threaten security. Note: The term "security audit" may be used to avoid ambiguity. 5. See Security Audit. 6. To generate the audit trail, read and interpret its contents, manage its storage, and control its generation.
Industry:Telecommunications
1. To break into or use a computer network or use a system without authorization, as a hacker might do. 2. Referring to a track used to bypass a flaw or a bug in an application program or application.
Industry:Telecommunications
1. Those measures taken to protect all transmissions from interception and electronic analysis. 2. The technical and non-technical measures taken to protect all classified non-communications electromagnetic emissions. It also takes account of the security aspects of any directly associated electromagnetic communications transmissions.
Industry:Telecommunications