- Branche: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. A covert channel in which one process signals information to another process by modulating its own use of system resources (e.g., CPU time) in such a way that this manipulation affects the real response time observed by the second process. 2. A covert channel in which one process signals information to another by modulating its own use of system resources (e.g., CPU time) in such a way that this manipulation affects the real response time observed by the second process.
Industry:Telecommunications
1. A copyright-protection method of embedding a code into a digital audio or video file to attempt to thwart piracy or unlicenced use. 2. In desktop publishing, an inserted (and usually faint) overlay of an image or text onto pages of a document. Note: The watermark is usually visible on the computer screen in WYSIWIG fashion and on the printed pages of the final document. The watermark often verifies authenticity of authorship or release authority.
Industry:Telecommunications
1. A connection between initiating and terminating nodes of a circuit. 2. A single path provided by a transmission medium via either (a) physical separation, such as by multipair cable or (b) electrical separation, such as by frequency- or time-division multiplexing. 3. A path for conveying electrical or electromagnetic signals, usually distinguished from other parallel paths. 4. Used in conjunction with a predetermined letter, number, or codeword to reference a specific radio frequency. 5. The portion of a storage medium, such as a track or a band, that is accessible to a given reading or writing station or head. 6. In a communications system, the part that connects a data source to a data sink. 7. A virtual area where Internet Relay Chat (IRC) users communicate (exchanging text messages) in real time. Note: There are thousands of channels located on the Internet. 8. An IRC conduit designated for the real-time exchange of text messages. 9. An electrical path suitable for the transmission of communications between two or more points, ordinarily between two or more stations or between channel terminations in Telecommunication Company central offices. A channel may be furnished by wire, fiber optics, radio or a combination thereof. 10. The portion of the electromagnetic spectrum assigned by the FCC for one emission. In certain circumstances, however, more than one emission may be transmitted on a channel. 11. An information transfer path. 12. An information transfer path within a system. May also refer to the mechanism by which the path is effected. 13. An information transfer path within a system. May also refer to the mechanism by which the path is effected.
Industry:Telecommunications
1. A circuit or device that limits the instantaneous output signal amplitude to a predetermined maximum value, regardless of the amplitude of the input signal. 2. A chip developed by the United States Government that was to be used as the standard chip in all encrypted communications. Aside from the fact that all details of how the Clipper chip work remain classified, the biggest concern was the fact that it has an acknowledged trap door in it to allow the government to eavesdrop on anyone using Clipper provided they first obtained a wiretap warrant. This fact, along with the fact that it can't be exported from the United States, has led a number of large corporations to oppose the idea. Clipper uses an 80 bit key to perform a series of nonlinear transformation on a 64 bit data block.
Industry:Telecommunications
1. A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences. 2. With respect to classified matter, the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of national security. 3. Measures taken by a military unit, an activity or installation to protect itself against all acts designed to, or which may, impair its effectiveness. 4. The combination of confidentiality, integrity and availability. 5. The protection of computer hardware, software, and data from accidental or malicious access, use, modification, destruction, or disclosure. Tools for the maintenance of security are focused on availability, confidentiality, and integrity. 6. The combination of confidentiality, integrity, and availability.
Industry:Telecommunications
1. A computer virus capable of disrupting a computer program. 2. A self-contained program that can propagate itself through systems or networks. Note: Worms are often designed to use up available resources such as storage or processing time. 3. An independent program that replicates from machine to machine across network connections, often clogging networks and computer systems as it spreads. 4. Acronym for write once, read many (times. ) Note: A worm drive is used in recording data on a disk such that the data can then be read but not erased.
Industry:Telecommunications
1. A component part of SS7 protocol that provides additional functions to the message transfer part (MTP) to provide for Connectionless and Connection Oriented network services to transfer signaling information between exchanges and specialized centers in telecommunication networks. The combination of the MTP and the SCCP is called Network Service part. 2. The part of SS7 that provides additional functions to the MTP to cater to both connectionless as well as connection-oriented network services and to achieve an OSI-compatible network service.
Industry:Telecommunications
1. A collection of equipment and physical transmission media that forms an autonomous whole and that can be used to interconnect systems for purposes of communication. 2. Specifically, a collection of open system interconnection (OSI) end systems and intermediate systems under the control of a single administrative domain and using a single network access protocol. Note: Examples of subnetworks are private X. 25 networks and collections of bridged local area networks.
Industry:Telecommunications
1. A circuit or device that limits the instantaneous output signal amplitude to a predetermined maximum value, regardless of the amplitude of the input signal. 2. A chip developed by the United States Government that was to be used as the standard chip in all encrypted communications. Aside from the fact that all details of how the Clipper chip work remain classified, the biggest concern was the fact that it has an acknowledged trap door in it to allow the government to eavesdrop on anyone using Clipper provided they first obtained a wiretap warrant. This fact, along with the fact that it can't be exported from the United States, has led a number of large corporations to oppose the idea. Clipper uses an 80 bit key to perform a series of nonlinear transformation on a 64 bit data block.
Industry:Telecommunications
1. A check based on the formation of the sum of the digits of a numeral. Note: The sum of the individual digits is usually compared with a previously computed value. 2. A comparison of checksums on the same data on different occasions or on different representations of the data in order to verify data integrity. Synonym sum check.
Industry:Telecommunications