Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

614 total results found

Second Impact Dot Printers

Documentation

A type of printer that converts text and image files and prints it onto a sheet of paper using solenoids. Printing Process Solenoids are little coils that are in the print head. During the printing process, they get really hot, hot enough to burn you. The sole...

Near Field Communication

Documentation

A communication protocol for mobile devices that facilitate data transfers. NFC is typically used for cellphone-to-cellphone communication and contactless credit card transactions (Tap to Pay).

(Evolved) High Speed Packet Access

Documentation

Evolved High Speed Packet Access (HSPA+). An extension of the 3G cellular network technology. It provides an increase in data throughput and wireless link range without needing additional bandwidth or increased transmit power.

Multiple Input Multiple Output

Documentation

An extension of the 3G cellular network technology, which uses smart antennas to improve the performance of radio systems. MIMO uses multiple reception and transmission antennae to boost bandwidth via spatial multiplexing to boost range and improve signal reli...

Long Term Evolution

Documentation

An extension of the 3G cellular network technology. It increased downlink/uplink speeds to 100/50 Mbps.

Long Term Evolution (Advanced)

Documentation

Successor to LTE. Increased downlink/uplink speeds to 1 Gbps/500 Mbps.

Internet Assigned Numbers Authority

Documentation

The international governing body that manages all IP addresses used ever. IANA is owned by the Internet Corporation for Assigned Names and Numbers. IANA manages Regional Internet Registries (RIRs), which then allocate blocks of IP addresses to local ISPs. An R...

Operating System

Documentation

A collection of software on a computer that allows the user to access and use the computer's memory, file system, process, hardware & software, and program applications. Components Kernel Utilities Interfaces Software Programs Common OSs Microsoft-Windows A...

User Datagram Protocol

Documentation

aliases: UDP A connectionless protocol that sends packets to the receiver regardless of checking for receipt. UDP is a connectionless, nonguaranteed method of communication that has no acknowledgements or flow control. There is no way to confirm the delive...

Transmission Control Protocol

Documentation

aliases: TCP Transmission Control Protocol: connection oriented data transfer protocol that ensures that every packet sent is received before sending the next one. TCP runs at the Transport layer. Three-Way Handshake This is the fundamental process that tw...

Internet Assigned Numbers Authority

Documentation

The international governing body that manages all IP addresses used ever. IANA is owned by the Internet Corporation for Assigned Names and Numbers. IANA manages Regional Internet Authorities (RIRs), which then allocate blocks of IP addresses to local ISPs. An ...

Automatic Private IP Addressing

Documentation

An addressing system in place to use special IP addresses when something goes wrong with the DHCP server or with the host that needs it. APIPA addresses always begin with 169.254.x.x. APIPA is triggered when a DHCP server takes too long to offer an IP address ...

Security Policy

Documentation

A document or collection of documents that provide information about how the organization structures its network security settings. It might include: A Password-Policy A Backup-Policy An Acceptable-Use-Policy A Physical-Security-Policy A User-Education-&-Awar...

Top Level Domain

Documentation

aliases: TLD The ending of most web domain names. Domain Purpose .org Non-Profit Organization .com Commercial Entity .edu Educational Institution .gov Government Entity .tv Television & Entertainment .net Networking-based Company .mil Mi...

DomainKeys Identified Mail

Documentation

aliases: DKIM An email authentication protocol that detects and blocks spoofed emails by validating the sender's domain address. #XI

Sender Policy Framework

Documentation

aliases: SPF An email authentication protocol detects and blocks spoofed emails by validating the sender's domain address and by double-checking the IP of the sender's domain. If the sent domain's IP doesn't match one in the DNS records, the email is block...

Domain based Message Authentication, Reporting, and Conformance

Documentation

aliases: DMARC An email authentication protocol that combines the functionality of DKIM and SPF, while adding the ability to specify what happens to flagged emails, whether they're deleted or set aside in a sort of a 'spam' mailbox. #XI

Mail Protocols

Documentation

An enumeration and description of the three major email protocols. Sending and receiving emails is surprisingly complicated. Luckily, I've covered the basics of SMTP, IMAP and POP3 over here. SMTP The one that sends emails. IMAP The first one that receives ema...