Routing that may split one traffic flow among multiple routes.
"Big Brother is watching you". A phrase coined by George Orwell in his classic
Texas expression used to dismiss a cowboy wanabee. In Lone Star IT circles, it describes a technician with a certificate or degree in computer science, but little or no field experience.
LEO stands for Low-Earth-Orbit. Big LEO is a low-earth-
The only crime in which two rites make a wrong.
An architectural format for storage of binary data, big-endian is most significant in multi-byte data types. Big-endian considers the most significant bytes to be the leftmost (i.e., those with a lower address) in a multi-byte data word. Some architectures use big-endian for ordering bits within bytes. Some architectures use big-endian for ordering bits, and little-endian for ordering bytes. Little-endian considers the right-most bytes (or bits) to be most significant. IBM and many other mainframe computers use big-endian architecture, while most PCs use little-endian. The PowerPC is bi-endian, as it can understand both approaches. Conversion of data between the two data architectures is known as the NUXI problem. If the word "UNIX" were stored in two two-byte words, a big-endian system would store it as "UNIX," while a little-endian system would store it as "NUXI." The terms "big-endian" and "little-endian" are derived from "Gulliver's Travels," wherein the Lilliputians were divided
The Bikini Transmitter is a body wire developed for a special surveillance project. Law Enforcement professionals needed to
A synchronization control system between exchanges A and B in which the clock at exchange A controls the received data at exchange B and the clock at exchange B controls the received data at exchange A. Normally implemented by deriving the receive timing from the incoming bit stream.
German word for interactive videotex. The German Bundespost likes this service. But the German version isn't as successful as the French because the French gave away the videotex terminals. And the Germans didn't. Also, the French really
An itemized list or statement of charges. If you can't bill for a product or service, you're engaged in a hobby rather than a business.
Imagine a phone call from New York to Los Angeles. It may start with the customer of a new phone company, then proceed to a local phone company (let's say New York Telephone, now called Bell Atlantic). Then it may proceed to a long distance company before ending in Los Angeles and going through another one or two local phone companies before reaching the person
Years ago, Bill Gates
A list of specific types and amounts of direct materials expected to be used to produce a given job or quantity of output.
A billing option associated with Operator Assisted calls that allows the calling party to bill a call to their hotel room. With this option, the carrier is required to notify the hotel, upon completion of the call, of the time and charges.
Electronic sales pitches that come up on your computer screen at any time.
A broadside antenna array with flat reflectors.
You (at home or your business) establish who can and cannot charge a call to your phone by making an agreement with your local telephone company to screen your calls. (e.g. refusal of all collect call
BTN. The primary telephone number used for billing regardless of the number of telephone lines associated with that number. Apparently, the
BAN. Used by telephone companies to
The company that will bill the customer for collect or third number billed calls. It may or may not be the same as the Earned Company.
The increments of time in which the phone company (long distance or local) bills. Some services are measured and billed in one minute increments. Others are measured and billed in six or ten second increments. The billing increment is a major competitive weapon between long distance companies. Short billing
A Billing Media Converter, as made by the Cook division of Northern Telecom, provides a means of transporting Automatic Message Accounting (AMA) data from DMS-10 central offices to regional accounting offices with the physical transfer of magnetic tapes. The BMC is polled.
BTN. The primary telephone number used for billing regardless of the number of telephone lines associated with that number. Multiple WTNs (Working Telephone Numbers), also known as ETNs (Earning Telephone
See BVA and BVS.
In North America, a billion is a thousand million. In many
Binary, machine readable forms of programs which have been compiled or
Where only two values or states are possible for a particular condition, such as "ON" or "OFF" or "One" or "Zero." Binary is the way digital computers function because they can only represent things as "ON" or "OFF." This binary system contrasts with the "normal" way we write numbers ” i.e. decimal. In decimal, every time you push the number one position to the left, it means you increase it by ten. For example, 100 is ten times the number 10. Computers don't work this way. They work with binary notation. Every time you push the number one position to the right it means you double it. In binary, only two digits are used ” the "0" (zero) and the "1" (the one). If you write the number 10101 in binary, and you want to figure it in decimal as we know it, here's how you do it. 1 is one thing; Zero x 2 = zero; 1 times 2 x 2 = 4; 0 x 2 x 2 x 2 = 0; 1 x 2 x 2 x 2 x 2 = 16. Therefore the total 10101 in binary = 1 + 0 + 4 + 0 + 16 = 21 in decimal.
ASCII uses a seven bit coding scheme. Thus, the maximum number of different things you can code using seven bits is 128, i.e. 2 x 2 x 2 x 2 x 2 x 2 x 2 = 128. The maximum number represented by a byte (8 bits) in the IBM EBCDIC coding system is 256. i.e. 2 x 2 x 2 x 2 x 2 x 2 x 2 x 2 = 256. See Binary Coded Decimal, Binary File and Binary Transfer.
A code in which every element has only one of two possible values, which may be the presence or absence of a pulse, a one or a zero, or high or a low condition for a voltage or current.
BCD. A system of binary numbering that uses a 4-bit code to represent each decimal digit from 0 to 9 and multiple 4-bit patterns for higher numbers. The decimal numbers 0 to 9 are represented by the four-bit binary numbers from 0000 to 1001.
A number in the binary system of notation.
A file containing information that is in machine-readable form. It is an application. Or it can only be read by an application. See Binary Transfer.
BFT. The transmission of binary files, software, documents, images, video and electronic data exchange information between communicating devices, including PCs, fax devices, etc. When binary files are transferred via telecommunications, they must not be changed in any way during the transfer;
BLAM. A proposed alternative to the IEEE 802.3 backoff algorithm.
Any notation that uses two different characters, usually the binary digits O and 1.
A number system that uses two characters (O and 1) with two as its base, just as the decimal number system uses ten characters (O through 9) with ten as its base.
See BPSK for an explanation.
A channel designed so that the probability of changing binary bits in one direction is the same as the probability of changing them back to the correct state.
BISYNC or BSC.
In data transmission the synchronization of the transmitted characters by timing signals. The timing elements at the sending and receiving terminal define where one character ends and another begins. There are no start or stop elements in this form of transmission. For a more detailed explanation, see BSC.
Also a uniform discipline or protocol for synchronized transmission of binary coded data using a set of control characters and control character sequences.
Conversion from base 2 to base 10. See Binary.
See Binary File Transfer and MIME.
A request to activate a session between two logical units (LUs). See BIND.
A way to separate groups of 25 pairs in a twisted-pair cable with more than 25.
A typical phone line ” business or residence, analog or digital ” is a pair of wires. When the phone company
A Novell NetWare database containing definitions for entities such as users, groups, and workgroups. The bindery contains three components: objects, properties, and property data sets. Objects represent any physical or logical entity, including users, user groups, file servers, print servers, or any other entity given a name. Properties are the characteristics of each bindery object, including passwords, account restrictions, account
A Windows 95 definition. Binding is a process that establishes the communication channel between a protocol driver and a network adapter driver.
A screw with a small nut. You take your wires and join them together on a binding post by wrapping them together around the screw and then
A post witches were attached to just before they were burned at the stake. Rude switchboard operators and ACDs with long queues should also suffer this fate.
When sending files which aren't plain ASCII across a network ” dial-up, leased line or the Internet ” you basically have two options. First, you can attach them as a binary file (i.e. non-ASCII file). Or second, you can encode them into ASCII characters and send the file as part of your message. The first method is preferable. But you can typically only send binary files from one account to another on the same network, or between two networks that have agreed between
The binomial is a two-parameter distribution, the parameters being n, the number of trials, and p, the probability of a particular outcome of a single trial.
Monitoring hospital admissions to detect
Pointless or excessive filler in a weblog. As one Net diarist wrote; "I was accused recently of biogorrhea. Well, yes, that's fair. But see, here's the thing. I'm leaving town for a month..."
A hobbyist who tinkers with DNA and other aspects of
Bioinformatics is the process of using computer systems for the purposes of acquisition, storage and analysis of biological data. Computer databases and algorithms are used to speed up biological research and to characterize the molecular components of living things. Bioinformatics is notably being used in the Human Genome Project, the effort to identify the 80,000 genes in human DNA. Bioinformatics includes a wide spectrum of technologies including computer architectures, knowledge management, networking and collaboration tools as well as traditional life-science equipment needed to handle biological samples.
Biometrics is the study of unique and measurable physical (or biological) characteristics such as
Any means of controlling access through human measurements, such as fingerprinting, handwriting analysis, retinal scanning, hand geometry and voiceprinting. See Biometrics.
A device used in authenticating access to a system. A biometric device authenticates a user by measuring some hard-to-
A problem-solving routine for human behavior as it is exercised in the realm of networks and
Bioinformatics applies informatics to biological research. Informatics is the use of advanced computing techniques to manage and analyze data. It has become
Basic Input/Output System of desktop computers. The BIOS contains the buffers for sending information from a program to the actual hardware device the information should go to.
A Windows 95 term. Bios enumerator is responsible, in a Plug and Play system, for identifying all hardware devices on the motherboard of the computer. The BIOS supports an API that allows all Plug and Play computers to be queried in a common manner.
Devices such as fingerprint readers and signature recognition systems.
Billing Interconnection Percentage. A calculation of who owns how much of a route when there are multiple providers between two points. Used to allocate revenue in MPB arrangements.
Bit Interleaved Parity 8. A method of error monitoring used in SONET optical fiber transmission systems. A SONET frame of data comprises a large number of bits organized into bytes, or 8-bit values. The bytes, of course, are interleaved into a byte stream. The BIP-8 method looks across all matching bit
Bit Interleaved Parity N. A method of error monitoring. With even parity, an N bit code is generated by the transmitting equipment over a specified portion of the signal in such a manner that the first bit of the code provides even parity over the first bit of all N- bit sequences within the specified portion, etc. Even parity is generated by setting the BIPN bits so that there are an even number of 1s in each of all N-bit sequences including the BIP-N. See BIP-8 for a concrete example.
The predominant signaling method used for digital transmission services, such as DDS and T-1. The signal carrying the binary value alternates between positive and negative. Zero and one values are represented by the signal amplitude at either polarity, while no-value "spaces" are at zero amplitude.
The T carrier line coding system that inverts the polarity of alternate "one" bits.
A signal having two polarities, both of which are not zero. It must have a two-state or
The presence of two consecutive "one" bits of the same polarity on the T carrier line. See also Bipolar Coding.
An electronic tracking device used by law enforcement to track the physical location of a subject.
A birdie is a lightweight device that you blow through underground cement pipes through which you want to pull cable. Here's how it typically works: First, you use a bore to make an underground hole. Then you fill that hole with hollow concrete
February 11, 1847 Thomas Alva Edison born
February 16, 1982 Michael Allen Newton born
February 20, 1980 Claire Elizabeth Newton born
February 23, 1965 Michael Dell (Dell Computer) born
March 3, 1847 Alexander Graham Bell born
March 11, 1933 Ben Rosen (Compaq, SRX, etc.) born
March 15, 1949 Gerry Friesen born
April 6, 1939 John Sculley born
April 27, 1791 Samuel Morse born
May 11, 1948 International Communications Association born
June 10, 1942 Harry Newton born in Sydney, Australia
June 13, 1961 TeleCommunications Association born
June 19, 1924 Ray Noorda (Novell) born
June 27, 1968 Carterfone decision handed down by FCC
July 4, 1943 Susan Newton born in Perth, Australia
August 31, 1962 The Communications Satellite Act is born
September 2, 1936 Andy Grove (Intel)
September 12, 1948 Communications Managers Association
October 28, 1955 Bill Gates (Microsoft)
November 10, 1946 Ray Horak (Context Corporation)
November 13, 1954 Scott McNealy (Sun Microsystems)
December 10, 1928 William G. McGowan, founder of MCI
The French term for "second" or "encore." It is used by the ITU/ITU to designate the second in a family of
Border Intermediate System
Bus Interface Card.
A biscuit is a regular phone jack that is frequently located in a residence.
Also spelled B-ISDN. Broadband ISDN. This is a vaguely defined term. It basically means any circuit capable of transmitting more than one Basic Rate ISDN, i.e. 144 Kbps. One definition I read recently suggested that BISDN is "a set of public network services that are delivered over ATM, including data, voice, and video. BISDN will provide services such as high-definition television (HDTV),
A trigger circuit that has two stable states.
Broadband ISDN User's Part: A SS7 protocol which defines the signaling messages to control connections and services. See Signaling System 7.
(pronounced bye-sink). BISYNChronous Transmission. A half-duplex, character- oriented, synchronous data communications transmission method originated by IBM in 1964. See Synchronous.
Also called BISYNC. A data character-oriented communications protocol developed by IBM for synchronous transmission of binary-coded data between two devices. BISYNC uses a specific set of control characters to synchronize the transmission of that binary coded data. See also Binary Synchronous Communication.
Bit is a contraction of the term BInary digiT. It is the smallest unit of information (data) a computer can process, a "1" or "0." Similarly, a bit is the basic unit in digital communications. Across a transmission facility, a bit can be represented in a variety of ways, including positive (+) and negative (-) voltage, relatively high (e.g., +3.0) volts and relatively low (e.g., +1.5)
Slang for throwing out bits ” into a wastepaper bucket.
A section of memory capable of temporarily storing a single bit (BInary digiT) of information. Used to make data transmission accurate or consistent.
A bit added to a digital signal and used for error checking, i.e. a parity bit. See also Parity.
A means of determining the integrity of a data packet. The counting of bits is very important. If the receiver can't confirm that it received all of the bits, it can't confirm that the integrity of the received data packet is
The number of bits used to represent the color of each pixel in a graphic file or the sound in an audio file. The higher the number, the more information included in the file and the higher the quality of the data. Common graphic bit depths are 4-bit, 8-bit, 16-bit, 24-bit and 32-bit. Common sound bit depths are 8-bit and 16-bit.
See Bit Time.
A mistake in transmitting a bit. Error rate statistics play a key role in measuring the performance of a network. As errors increase, user payload (especially data) must be re-transmitted. The end effect is creation of more (non-revenue) traffic in the network. See Bit Error Rate.
BER. The percentage of received bits in error compared to the total number of bits received. Usually
A person who
A form of TDM for synchronous protocols, including HDLC, SDLC, BiSync and X.25. Bit interleaving retains the sequence and number of bits, so that correct synchronization is achieved between both ends. See Bit Interleaving/Multiplexing.
In multiplexing, individual bits from different lower speed channel sources are combined one bit at a time/one channel at a time into one continuous higher speed bit stream. Compare with byte interleaving/ multiplexing.
Used to describe communications protocols in which control information may be coded in fields as small as a single bit.
BOP. A data link control protocol that uses specific bit patterns to transfer controlling information. Examples are IBM's Synchronous Data Link Control (SDLC) and the ITU-T High-Level Data Link Control (HDLC). Bit-oriented protocols are normally used for synchronous transmission only. Bit-oriented protocols are code transparent (meaning they work regardless of the character encoding method used), since no encoded characters are used in the control sequence.
An efficient transmission protocol that encodes communications control information in fields of bits rather than characters or bytes.
A binary bit appended to an array of bits to make the sum of all the bits always odd or always even. See Parity.
A group of bits arranged in specified ways to represent numbers, letters or symbols, forming a unique binary number for each character. For example, the 7-bit ASCII code produces 128 different characters, i.e. 2 x 2 x 2 x 2 x 2 x 2 x 2 = 128.
A device which pumps out bits at a high rate of speed. Slang for high-speed carrier electronics such as ADSL terminating units, which can achieve speeds of multiple Mbps over standard twisted-pair local
The number of bits of data transmitted over a phone line per second. You can usually figure how many characters per second you will be transmitting ” in asynchronous communications ” if you divide the bit rate by ten. For example, if you are transmitting at 1200 bits per second, you will be transmitting 120 characters per second. In real life, it's never this simple, however. The total bits transmitted will depend on re-trans- missions, which depends on the noise of the line, etc. See BAUD RATE.
A technique to signal in-band in digital facilities, which typically use out of
Number of colors or levels of gray that can be displayed at one time. Controlled by the amount of memory in the computer's graphics controller card. An 8-bit controller can display 256 colors or levels of gray; a 16-bit controller, 64,000 colors: a 24-bit controller, 16.8 million colors.
BIT7. A TR008 DS1 line code that
A continuous flow of binary digits (bits), through some form of communications medium_e.g., fiber optics, air (wireless) or twisted-pair, with no break or separators between the characters.
A process in some synchronous data communications protocols to ensure that the transmission is properly clocked. In HDLC (High-level Data Link Control), for example, each frame of data is both preceded and succeeded by a "flag" of six consecutive "one" bits. The flags signal the beginning and ending of the data frame, and are used by the receiving devices to synchronize on the rate of transmission. In order to avoid confusion, therefore, any set of six consecutive "one" data bits must be broken by a stuffed "zero" bit. This stuffed bit is added by the sender and stripped by the receiver. The idea of inserting the "one" bit is to avoid the data's
A process used in some packet data network protocols in order to fill a packet to the prescribed, fixed size. For example, X.25 requires that all packets in a specific network be of the same
A SONET term describing the manner in which information streams are mapped into the SONET frame format for unchannelized VT (Virtual Tributary) transport. For instance, multiple VT1.5s can be mapped into a SONET frame, with each VT1.5 carrying a single T-1 signal within the STS-1 SPE (Synchronous Payload Envelope). In the LOH (Line OverHead) of the SONET are included VT pointers which identify the established portions of the SPE in which the beginning byte of each VT1.5 is located. As each VT1.5 works its way through the SONET network, its actual position may change within the various SPEs, thereby requiring that the pointer be reset; this process is very complex and expensive, and results in a small level of delay. Regardless of issues of complexity, cost and (
Also known as "bit duration," the bit time is the length of time associated with a bit placed on a transmission medium. In somewhat oversimplified terms, a transmission system that runs at a signaling speed of 1 Gbps supports bits that have an individual duration of 1 billionth of a second.
The number of bits transferred per unit of time. Usually expressed in Bits Per Second (BPS).
A technical person. Twiddle, according to the Random House Dictionary, means "to play or trifle idly with something; fiddle." The expression bit twiddler is used thus, "I'm not a bit twiddler. You'll have to ask Joe in Engineering if you want the answer to that."
BIT BLock Transfer. Microsoft Windows relies intensively on a type of operation called bit block transfer (BITBLT) to
Built-in test equipment. Features designed into a piece of equipment that allow online diagnosis and testing of failures and operating status.
Representation of characters or graphics by individual pixels arranged in row (horizontal) and column (vertical) order. Each pixel can be represented by one bit (simple black and white) or up to 32 bits (high-definition color). Bitmapped images can be displayed on screens or printed. The method of storing information that maps an image pixel, bit by bit. There are many bitmapped file formats, .bmp, .pcx, .pict, .pict-2, tiff/.tif,.gif (89a), and so on. Most image files are bit mapped. This type of file gives you stair stepped edges, the 'jaggies'. When examined closely you can see the line of pixels that creates edges. Bitmap images are used by all computers. The desktop for all Windows machines uses .bmp files, while the Macintosh uses pict files. Most Internet publishing and e-mail use JPEG or .JPG and .GIF (89a) formats." See Bit Specifications.
Images which are created with matrices of pixels, or dots. Also called raster graphics. See Bitmap.
Because It's Time NETwork. An academic computer network based originally on IBM mainframes connected with leased 9600 bps lines. BITNET has recently merged with CSNET, The Computer+Science Network (another academic computer network) to form CREN: The Corporation for Research and Educational Networking. The network connects more than 200 institutions and has more than 900 computational nodes.
A person who uses a coin-operated computer terminal installed in a coffee house to log into cyberspace.
Hewlett Packard's term for its bidirectional parallel port communications "standard." It introduced this standard with its 600 dps LaserJet 4 plain paper printer in the fall of 1992. It is hoping other manufacturers will adopt the standard. The big plus of the standard is that it allows a printer to tell a connected computer that it (the printer) has run out of paper, or the paper has
Building Integrated Timing Supply. A single building master timing supply. BITS generally
The bits clock provides a pulse that synchronizes the entire network. The pulse is a 1-0-1-0-1-0-1-0 stream. Used extensively in SONET network.
The number of bits passing a specific point per second. See Bps.
A KILObit per second is one thousand bits per second.
A MEGAbit per second is one million bits per second (thousands of kilos).
A GIGAbit per second is one billion bits per second (thousands of millions).
A TERAbit per second is one trillion bits per second (thousands of billions).
A PETAbit per second is equal to 10 to the 15th or 1,000 terabits per second.
Bits are the smallest units of information in telecom and data processing; the term bit is derived from binary digit. One byte is typically equivalent to 8 bits. Given that a bit can carry two pieces of information (represented by either 0 or 1), two bits together can represent four (or 22) pieces of information: 00, 01, 10, and II. Similarly, eight bits or one byte mean that 256 (28) pieces of information can be represented, stored, and transmitted. These pieces of information can be color codes, sound levels, or numbers and letters. See also asynchronous and synchronous. See also the Introduction to this book at the very beginning.
All the useless
To transmit. "Did you bitspit the file to Harry?"
A Nortel Networks' trade name for an in-building termination and cross-connect system for
See White List.
An electronic device that you don't want to take the time to understand. As in, "We'll put the data through a black box that will put it into X.25 format." The term has recently come also to mean PBX switches. While "Black Box" is a generic term, The Black Box Corporation of Pittsburgh, PA, has had the audacity (and brilliance) to register the term as a trademark. The Phone Phreak community has used the term black box to describe a device that's put on phone lines in electromechanical central office areas (they don't work under ESS offices). To the phone phreak community, a black box is made up of a resistor, a
Cockpit voice recorder and flight data
A leading direct marketer of connectivity solutions ” everything from cables to routers. It publishes and distributes the award-wining Black Box Catalog. Black Box is based in Pittsburgh. They kindly provided the pinout diagrams for the back of this dictionary. www.
In facsimile systems using amplitude modulation, that form of transmission in which the maximum transmitted power corresponds to the maximum density of the subject copy.
In facsimile systems using frequency modulation, that form of transmission in which the
These guys are the bad hackers. They're the ones that break into systems, steal confidential information to sell or destroy, delete documents, remove
Routing term for an area of the network where packets enter, but do not emerge, owing to adverse conditions or poor system configuration within a portion of the network.
A theorized invisible (thus perceived as dark) region in space with a small diameter in relation to its
When Samuel Morse won a contract from the U.S. Congress in the 1800s to build a telegraph line from Washington, DC to Baltimore, he initially tried to install the lines underground,
The lowest luminance level that can occur in video or television transmission and which, when
See White List.
Picture tube in which the color phosphors are
In facsimile systems using amplitude modulation, that form of recording in which the maximum received power corresponds to the maximum density of the record medium.
In a facsimile system using frequency modulation, that form of recording in which the lowest received frequency corresponds to the maximum density of the record medium.
In facsimile, the signal resulting from the scanning of a maximum- density area of the subject copy.
In cryptographic systems, a signal containing only unclassified or encrypted information.
The day that began the Great Depression. It was October 24, 1929.
Blackbird is a
A total loss of commercial electric power. A blackout has a decidedly negative affect on your ability to compute and communicate,
A CATV and satellite TV definition. A pre-defined area of the country where a particular programming service will not be available, usually because of
Blacksburg is a town of 40,000 people in the
A blade is any card placed into a backplane in a telephone system. Usually a blade is an additional module. The "blade" term shows the aspect of insertion of the flat plane. This definition
Some people in telecom also refer to a blade as software.
When people get
A computer server built on or several computer printed circuit cards and then . Many blade servers can fit on a single rack. They can be linked together and can provide the power of a big server for a fraction of the price. See also Blade.
Binary Logarithmic Access Method. A proposed alternative to the IEEE 802.3 backoff algorithm.
Blamestorming occurs when people sit around in a group and discuss why a deadline was missed or a project failed, and most importantly, who was responsible.
In contemporary telecom-speak, WorldCom technologists didn't troubleshoot, they blamestormed.
A character on teletype terminals that does not punch holes in paper tape (except for feed holes to push the paper through). Also the character between words, usually called a "Space" is referred to in IBM jargon as a Blank.
On the AMPS cellular telephone network, certain administrative messages are sent on the voice channel by blocking the voice signal (blanking) and sending a short high speed data message (burst). The blank and burst technique is one that causes a momentary dropout of the audio connection (and sometimes disconnection of cellular modem connections) when a power level message is transmitted to the cellular phone.
The hollow space of a cellular metal or cellular concrete floor unit without factory installed fittings.
Covering or intended to cover a large group or class of things, conditions, situations, etc.: a blanket proposal; a blanket LOA (Letter of Agency). An LOA is a letter you give to someone whom you allow to represent you and act on your behalf. For example, a letter of agency is used when your interconnect company orders lines from your local phone company on your
The suppression of the display of one or more display elements or display segments.
Period during the television picture formation when the
The process of transmitting pulses that extinguish or blank the reproducing spot during the horizontal and vertical retrace intervals.
BLocked ASynchronous Transmission. A proprietary technology.
A Internet user who takes four screens to say something where four words would work a lot better.
Broadband Local Exchange Carrier. A service provider offering broadband services locally.
Building Local Exchange Carrier. BLECs are business entities ” mostly specialists, aligned with REITs (Real Estate Investment Trusts) or landlords ” who invest in creating and managing the "
To have outbound and inbound phone calls answered by the same
A call center person who answers both incoming and makes outgoing calls. This idea of a blended agent is a new concept in a Call Center. In the past call centers have typically kept their inbound and outbound agents separate. The reason? Management felt that the necessary skills were very different and no one could master both.
A telephone call center whose agents both receive and make calls. In other words, a call center whose phone system acts both as an automatic call distributor and a predictive dialer.
A combination of cellular floor units with raceway capability and other floor units with raceway capability systematically arranged in a modular pattern.
Block Error Ratio. The ratio of the blocks in error received in a specified time period to the total number of blocks received in the same period.
BLock Error Rate Test. Data transmission testing in which the error rate counted is the number of blocks containing errored bits instead of the raw number of errored bits. Many users claim this is more representative of the real throughput quality of a circuit than simple raw BER testing. See BERT.
Broadband Loop Emulation Service. Developing specifications from both the ADSL Forum and the ATM Forum. BLES addresses the requirements for an end-to-end architecture to support voice and data over
The Busy Lamp Field is a visual display of the status of all or some of your phones. Your BLF
Imagine you want to lay fiber cable along the side of a highway. You know from blue staking and from the city maps that there are other utility cables along the
bcc. A list of recipients of an e-mail message whose names do not appear in the normal message header, so the original recipient of the message does not know that copies have been forwarded to other locations. Sometimes called blind courtesy copy.