- Industry: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
An entity, such as a person, equipment, or program to which a call is directed. Synonym called party.
Industry:Telecommunications
An entry in a domain name system database that directs the routing of mail by mail transfer agents.
Industry:Telecommunications
An envelope of antenna gain contours resulting from moving the boresight of a steerable satellite beam along the limits of the effective boresight area.
Industry:Telecommunications
An environment in which special attention is paid (in the form of authorizations, security clearances, configuration controls, etc. ) to protect data and resources from accidental or malicious acts. 2. An environment providing sufficient assurance that applications and equipment are protected against the introduction of malicious logic during an information system (IS) life cycle. Closed security is based upon a system's developers, operators, and maintenance personnel having sufficient clearances, authorization, and configuration control.
Industry:Telecommunications
An epoch, i.e., the designation of an instant on a selected time scale, astronomical or atomic. It is used in the sense of time of day 2. On a time scale, the interval between two events, or the duration of an event. 3. An apparently irreversible continuum of ordered events. 4. That which characterizes, or is characterized by, the observed and apparently irreversible continuum of ordered events.
Industry:Telecommunications
An equal-access concept developed by the FCC stating that, ". . . If a carrier offers an enhanced service, it should be required to offer network interconnection (or collocation) opportunities to others that are comparably efficient to the interconnection that its enhanced service enjoys. Accordingly, a carrier would be required to implement CEI only as it introduces new enhanced services. "
Industry:Telecommunications
An equation that determines an appropriate password length, M, which provides an acceptable probability, P, that a password will be guessed in its lifetime. Note: The password length is given by M = (log S) / (log N) where S is the size of the password space and N is the number of characters available. The password space is given by S = LR/P, where L is the maximum lifetime of a password and R is the number of guesses per unit of time.
Industry:Telecommunications
An equation that expresses the radar horizon range (RHR,) given by where RHRs is the radar horizon range in statute miles, h is the antenna height in feet, and a is the object critical altitude, i.e., the target altitude in feet, below which the radar cannot illuminate the object. Note: The RHR is also given by where RHRk is the radar horizon range in kilometers when h and a are in meters. The effective Earth radius, namely 4/3 times the actual Earth radius, is used in deriving these formulas. The effective Earth radius for LOS varies with carrier frequency. Second-order differentials are neglected. They contribute less than 0. 1%.
Industry:Telecommunications
An equipment condition in which all trunks (paths) in a given trunk group are busy. Note: All-trunks-busy registers do not indicate subsequent attempts to reach trunk groups.
Industry:Telecommunications
An equipment-interface device (usually computer equipment) with some number of digital lines, usually a multiple of eight, which may be used for input, output, or both, depending on the function. Note: The digital lines may be individually controlled, although nothing precludes using them in combination.
Industry:Telecommunications