513 Results for:shoretel loss

  • Sort by: 

Real-time Transport Protocol (RTP)

Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data. Read Full Definition

differentiated services (DiffServ or DS)

Differentiated services, often shortened to DiffServ or DS, is a class of service (CoS) model to specify and control IP network traffic by class. Read Full Definition

Stream Control Transmission Protocol (SCTP)

Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network. Read Full Definition

domain controller

A domain controller is a type of server that processes requests for authentication from users within a computer domain. Read Full Definition

Associated Glossaries

IMEI (International Mobile Equipment Identity)

IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone. This number is used by service providers to uniquely identify valid devices. Read Full Definition

Associated Glossaries

Veeam Backup & Replication

Veeam Backup & Replication is a software product developed by Veeam Software to back up, restore and replicate data on virtual machines (VMs). Read Full Definition

Associated Glossaries

Windows Server 2012 (WS 2012)

Windows Server 2012, formerly codenamed Windows Server 8, is the latest version of Windows Server. Read Full Definition

security awareness training

Security awareness training is a strategic approach IT and security professionals take to educate employees and stakeholders on the importance of cybersecurity and data privacy. Read Full Definition

labor law

Labor law is legislation specifying responsibilities and rights in employment, particularly the responsibilities of the employer and the rights of the employee. Read Full Definition

Associated Glossaries

business email compromise (BEC, man-in-the-email attack)

A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity in order to commit fraud . Read Full Definition

Associated Glossaries