- End-of-Repair
No further technical support
- End-of-Service
No further technical support
- End-of-Support
No further software updates or upgrades
Advanced Encrytion Standard
Common method or a block cipher for encrypting documents, connections and servers with an AES key up to 256 bits length
AI tools
AI-supported applications that enable or facilitate entertaining, creative or productive activities
All IP
All IP means that telephony (Voice over IP – abbreviation "VoIP") and other services are carried over IP-based networks (also known as "NGNs" – Next Generation Networks)
all-in-one solution
Compact system or software that does not require any other components to perform its tasks
Allnet Flat
With COMuniq ONE an optional add-on for a tariff that includes all calls to the German fixed network, German mobile network and the EU fixed network.
AML
Feature set for the COMfortel M-700 mobile telephones, used for communication with alarm servers (alarm activation, receiving of alarm messages, location detection)
analogue connection
In traditional telephony, the connection of an analogue end device, using two wire cores (The term a/b connenction is only commonly used in Germany)
analogue port
In traditional telephony, the point at which an analogue end device accesses the telephone system or telephone network (The term a/b port is only commonly used in Germany)
announcement before answering
Plays a greeting message to the caller before their call is accepted and/or if all group members are busy
appliance
A functional unit, consisting of hardware and software, designed to perform a particular task; for example, the COMpact 5500R, used as a telecommunications system
ARP
A network protocol that determines the physical (MAC) address of the hardware involved for a given network address and stores this assignment in the ARP tables if necessary
ARP spoofing
A hacker sends spoofed ARP messages in order to link his own MAC address with an IP address already present in the LAN by manipulating the ARP table and thus establish e.g. a connection that can be intercepted
Artificial Intelligence
A branch of information technology that deals with the ability of a machine or software to imitate human abilities such as logical thinking, learning, planning and creativity
ATA
Device suitable to establish a connection with one or more standard analogue telephones to the voice over IP network
audio electronics
Electronic unit to process audio signals
authentication
Proof of a claimed property of an entity, which may be a person, an object, a document or information, for example, and which thereby performs its verification through its contribution
auto provisioning
Automatic setup of e.g. IP telephones by means of configuration data provided
automatic reception
This function automatically connects an external caller with the person they want to contact by dialling a digit according to an announcement (e.g. "... If you would like to talk to the Sales team, press 1")
barred/approved numbers
An ICT system's telephone number directory can be used to store numbers that are to be rejected (Do not disturb), or preferentially connected (VIP numbers), if a call to them is received; inbound and outbound numbers can be blocked or approved
bit/s
A unit of measurement used in data technology to describe the number of data units (smallest unit = bit) transferred per second, also known as the "bit rate"
black-hat hacker
Act with criminal objectives, often on behalf of governments or organisations and intend, for example, to damage the target system or steal data
Bluetooth support
The Bluetooth interface can be used to connect headsets or smartphones to the COMfortel D-600, e.g. when it is connected to a smartphone, calls can be redirected automatically to the smartphone when the call recipient leaves the office
boss secretary function
All calls to the boss telephone/s are diverted to the secretary and can be "put through" after a query call; there are no restrictions to telephone calls from the boss telephone
botnet
A group of automated malicious programmes (bots, abbr. for robots) that run on networked computers without the owner's consent and use local resources
BRI
A Basic Rate Interface (BRI) is the basic access to an ISDN line with two voice channels and one data channel
BRI
ISDN connection with two voice channels and one data channel
brokering
Brokering enables unlimited changing between an active call participant and an on-hold call participant
brute force attack
An attack method in which secure accesses are "hacked" by repeatedly and systematically entering user password combinations
business telephone number
Personal subscriber telephone number in a company
busy lamp field
Signals the busy statuses of subscribers in an ICT system on the button panel on a desk telephone
busy on busy
If a call is in progress, another call to the same number is rejected; the caller hears the busy tone and the person being called does not hear a call-waiting signal
busy on busy function
If a call is in progress, this function rejects another call to the same number; the caller hears the busy tone and the person being called does not hear a call-waiting signal
BYOD
Meaning: "bring your own device" – this refers to being permitted to use one's personally owned devices, such as a laptop, tablet or smartphone, within the company, in compliance with the company's security regulations
CalDAV
A network protocol that enables a client to access, modify and synchronise calendar data on a remote server via WebDAV
call deflection
Calls to a particular telephone number are, for example, transferred to a smartphone or other land line connection
call flow display
The call flow display is used to identify the call number dialled by the customer
call hold
A subscriber can put an existing call connection on hold and use the on-hold time, for example, to establish another call connection for questions or to switch between the two calls, if required
call protection
This function blocks incoming calls from particular phone numbers or subscribers or calls received at particular times
call through
A procedure used, for example, to forward a call made on a mobile telephone to an external subscriber number, via an ICT system, so that the ICT system's telephone number is sent to this subscriber
caller ID
Identifies and displays the telephone number, and if relevant, the name of the calling party (if the name is present in Contacts or if it is transferred directly via CNIP)
capacitive touch function
When this is implemented, you can gently touch the surface of the display to trigger a control function
captcha
A fully automated test in which, for example, distorted character strings are queried to check whether the input in web forms is made by a human or a machine
CardDAV
A network protocol that enables a client to access, modify and synchronise contact information on a remote server via WebDAV
CAT-iq
Meaning: "Cordless Advanced Technology" – Internet and quality
CFB
The Call Forwarding Busy function forwards a call if the telephone number is busy
CFNR
The Call Forwarding on No Reply function forwards a call that has not been picked up after a specified time period has passed
CFU
The Call Forwarding Unconditional function forwards a call immediately
ChatGPT
An AI application (generative pre-trained transformer) that is able to communicate with users via text-based messages and images
CLIP
When CLIP is implemented, the caller's telephone number is displayed before the call is accepted
CLIP no screening
When CLIP no screening is implemented, customer-specific telephone numbers are transferred without being verified
cloud computing
In cloud computing, shared computer resources are made available on request, usually over the Internet and on a non-device-specific basis, for example in the form of servers, data storage systems or applications
cloud service
A non-hardware-specific service, usually offered over the Internet
cloud solution
A non-hardware-specific product or service, usually offered over the Internet
cloud storage
External storage for one or more users, usually offered over the Internet
cloud-based
Technology based on cloud computing
CNG
Generates a quiet background noise during pauses in speech in IP telephony to prevent the listener having the impression that the connection has been interrupted
CNIP
When CNIP is implemented, and the caller's name is already present in the telephone's telephone book or in the ICT system, it is displayed on the telephone's display screen even before the call is accepted
code lock function
A code lock is a character string that you enter using the keyboard to trigger a function, for example, to open a door in an Auerswald or FONtevo door terminal system
codec
A codec consists of two functional units for coding and decoding signals and data; codecs are used in video and audio technology
compliance
A device's conformity to the legally applicable standard
computer worm
Malicious program (computer program or script) that can duplicate itself after being executed once and triggers actions on the infected system without infecting other files or boot sectors with its code
context-sensitive
In a technical environment, means the options for affecting a device or software application that are dependent on its current state
CTI
A technology that uses computers and specialised software to control and coordinate telephone services
CTI software
Specialised software for controlling and coordinating telephone services with the computer
cyber attack
Attack on a computer network carried out by a hacker
cyber security
Protection against external attacks on your own computer network
cyber spying
The act or practice of obtaining secrets and information without the permission and knowledge of the information holder using illegal or criminal methods on the Internet, networks or individual computers
cybercrime
Illegal act(s) in the computer or telecommunications sector
data protection
Protection of your own data against unauthorised access and manipulation of any kind
data synchronisation
Calendar data, contact data and e-mails can be synchronised on the IP system telephones in the COMfortel range
DECT
DECT: Digital Enhanced Cordless Telecommunication – a standard for digital cordless telephony and data transfer
DECT cell
Working range of a DECT base station or DECT repeater
DECT multi-cell server
Base station for a DECT telephone system that consists of multiple radio cells
DECT multi-cell system
DECT system with multiple radio cells
DECT range
Radio range of a DECT cell
DECT single-cell server
Base station for a single-radio cell DECT telephone system
DECT single-cell system
DECT system with a single radio cell
DECT system
Digital Enhanced Cordless Telecommunication system for telephony and data transfer
denial-of-service attack
A server is deliberately bombarded by a system with a flood of requests that it can no longer cope with and then refuses service or, in the worst case, collapses
deployment
Automatic or targeted distribution of software or firmware to software-based devices from a central point
desk telephone
Telephone with desk-top enclosure and wired connection to an infrastructure
DHCP
Automatic assignment of dynamic IP addresses to network devices when they are connected to the server or router
direct call
In a direct call, any key, or a specified key, can be pressed to establish a connection to a remote terminal without dialling the phone number
direct external line access
The dialling and use of one of several exchange lines
distributed denial-of-service attack
A server is bombarded by a large number of different systems in a large-scale coordinated attack with a flood of requests that it can no longer cope with and then refuses service or, in the worst case, collapses
DND (Do Not Disturb)
This function blocks incoming calls from particular phone numbers or subscribers or calls received at particular times
door intercom system
In contrast to stand-alone systems, Auerswald and FONtevo door terminal systems are integrated in the internal telephone infrastructure and provide direct communication between the door terminal system and subscriber telephones
door terminal
The external part of a door terminal system, consisting of one or more door bell buttons, a loudspeaker and a microphone
dynamic IP address
IP address automatically assigned to a network device by the router to which it is connected
echo cancellation
This function prevents unwanted echo effects that can occur when signals are sent and received at the same time, for example, in telephony
EHS port
DHSG is known as EHS (meaning: "Electronic Hook Switch") in English; this is an electronic interface for wireless headsets, which have speakers, a microphone and – for the EHS function – a call acceptance and termination button
endpoint security
Real-time attack protection for endpoints (devices) that connect to a network and are therefore potentially vulnerable to malware threats
exchange line routing
In an ICT system, this regulates the distribution of incoming external calls (incoming exchange line routing) and the handling of outgoing external calls (outgoing exchange line routing)
external line key
Direct assignment of an exchange line
Fast Ethernet switch
Networking hardware that connects devices within a computer network and ensures data packets reach their destination device; maximum transmission speed on Fast Ethernet: 100 Mbit/s
fax protocol
The basis for communication between fax devices that includes the signals used to establish and close the connection, transfer telephone numbers, set the date and time and acknowledge receipt of the message
fax switch
When a call is received, the fax switch identifies whether the call is a fax or telephone call and diverts the connection to the appropriate end device
feature enhancement
The extension of the scope of services provided by a piece of hardware or software
feature update
The extension or improvement of existing features
federation
A term used in computer-aided communications to describe a unique identity over several (remote) systems, used in UCC systems that extend beyond individual company networks
firewall
A security system that protects a computer network or an individual computer from unwanted network access
firmware
operating software for a device or system
firmware licence
A purchased right to use firmware
firmware release
Version status of a firmware
firmware update
In an update, the operating system software for a device or system is upgraded to a more recent version
firmware-based
The implementation of technical functions via firmware
Fixed Mobile Convergence
A term used in telecommunications to describe the convergence (coming together) of fixed networks and mobile wireless networks with the option of using personal end devices and services independently of specific networks and locations
floating user licence
A right to use the software or functions of Auerswald COMtrexx systems that can be transferred between users
floating user licence model
Model for transferring usage rights to different users of Auerswald COMtrexx systems
FTP
Simple data transfer protocol with no checking mechanisms
FXO
Meaning: "Foreign eXchange Office", a PBX's analogue exchange line connection
FXS
Meaning: "Foreign eXchange Station", a PBX's analogue remote exchange connections
gateway
This is an active network node that is used to connect two networks that use different types of protocols to each other; for example, in an IP-based ICT system, analogue or ISDN telephones are connected via gateways
generative Artificial Intelligence
A form of AI that can produce new content such as conversations, texts, images, videos and music based on its training data
gesture control
Gestures and movements can be used to control an electronic device without touching the device itself
Gigabit Ethernet switch
Networking hardware that connects devices within a computer network and ensures data packets reach their destination device; maximum transmission speed on Gigabit Ethernet: 1,000 Mbit/s (1 Gbit/s)
grey-hat hacker
Possibly violate laws, but to achieve a higher goal, for example by publicising security vulnerabilities to force those responsible to act
group functions
Internal subscribers on an ICT system (extensions) can be gathered into groups; intelligent team functions can then be used to manage them either with a system telephone or a CTI application
hacker
Term for a person who has a high level of knowledge of IT security mechanisms and their vulnerabilities, is involved in hacks and sometimes even carries them out ("hacks")
handover
A mobile end device switches from one radio cell to another during a call or data connection
handset
Mobile end device (telephone) in a cordless (DECT) telephone system
hardware appliance
A hardware platform for implementing stand-alone software
hardware upgrade
The upgrading or modification of an existing hardware base, e.g. by adding another COMpact NET module
HD audio
HD audio (G.722) enables better quality voice transmission with a frequency range of approximately 20 to 8,000 Hz
HDSP
Meaning: "High Definition Sound Performance" (a Gigaset trademark)
headset
A headset usually consists of one or two speakers (headphones) and a microphone
headset connection
A separate socket on the telephone for a headset
high end
A superior, better than average technical standard
high level
A high performance level
hook switch
On a traditional desk telephone, this is a mechanical switch contact that operates when the receiver is picked up or put down; in more modern telephones, this is a magnetic/electronic switch
hookswitch
On a traditional desk telephone, this is a mechanical switch contact that operates when the receiver is picked up or put down; in more modern telephones, this is a magnetic/electronic switch
https
Abbreviation for Hypertext Transfer Protocol Secure, allows encrypted connections to be established on the Internet to protect sensitive data from unauthorised access
ICT server
General term for a central network-based system (hardware or software) that performs all the telecommunications tasks and services in a company
ICT system
New term that replaces "PBX". The IT-oriented services provided by modern communications systems have made "PBX" obsolete
identity theft
Refers to the misuse of personal data (the identity) of a natural person by third parties
instant messaging
Messaging service that uses a programme called Instant Messenger for communications in real time
intercom
The intercom function plays an announcement over the room's loudspeaker on one or more desk telephones (system telephones); it can also enable the hands-free microphone
io-homecontrol®
A wireless communication protocol used to control home automation products made by different manufacturers
IP address
An IP address is assigned to every connected device in a network, so that it can be accessed directly
IP camera support
Auerswald/FONtevo IP system telephones can be used to integrate IP cameras and control them, e.g. for monitoring purposes or for video door calls
IP DECT multi-cell server
The base station of an IP-based multiple radio cell DECT telephone system
IP DECT single-cell server
The base station of an IP-based single radio cell DECT telephone system
IP DECT system
In contrast to a standard DECT system, the base unit in an IP DECT system is connected to the telephone infrastructure, e.g. the ICT system, via IP
IP telephone
Telephone that connects to IP-based networks
IP20
The IP (Ingress Protection) code, e.g. IP20, classifies and rates the suitability of electrical devices for use in different environmental conditions and also the degree to which they protect users against the potential risks of using them
IPv6
Internet Protocol Version 6 (successor of IPv4) is the latest generation of the globally implemented process for transmitting data in computer networks, especially in the Internet
IVR - Interactive Voice Response
With COMuniq ONE a voice response system that interacts with the caller. The caller listens to the IVR system menu and answers by pressing a button on the phone. Depending on the caller's answers, the IVR responds accordingly.
IVR system
Automated voice dialogue system in telecommunications that enables the caller to receive information or instructions by voice commands or keyboard input
Java
This non-platform-specific Java technology includes the Java programming language and the Java platform; Java applications run on a simulated "virtual machine"
key extension module
Auxiliary device with multiple (programmable) keys for desk telephones, e.g. for the COMfortel family
keylogger
Hardware or software that logs user input at the keyboard of a computer in order to monitor or reconstruct it
KNX/EIB
KNX combines different building functions into a single uniform system with a field bus; it is a further development of the older global "European Installation Bus" (EIB) standard
LAN-TAPI
An interface in the ICT system, used for the computer-based control of telephony functions for several subscribers over the network
LDAP
Network protocol for querying and modifying information on distributed directory services
LED signalling
The use of LEDs as visual signals or alarms
legacy interface
Interface for "out of date" devices that are to be operated in modern systems
Li-ion battery
Powerful rechargeable battery technology, notable for high storage density, small dimensions and lack of memory effect
Li-poly battery
A type of powerful rechargeable battery technology used in almost all small devices, notable for high storage density, small dimensions and lack of memory effect
malware
Refers to software (short for "malicious software") that executes unwanted and usually harmful functions on an IT system, typically without the user's knowledge
Man-in-the-middle attack
A common type of cyber attack in which attackers hack into the communication between two or more network participants, gaining complete control over the data traffic and utilising opportunities for manipulation
message forwarding
New voice and fax messages are forwarded to a remote destination, such as a smartphone, by an answering machine or central voicemail and fax system by e-mail
micro SD card
Memory card with max. capacity 2 GB
micro SD/SDHC card
Memory card with max. capacity 2/32 GB
micro USB
Small format version of the Universal Serial Bus port
micro USB connector
Small format version of the Universal Serial Bus port
microsite
Website with limited content, mostly for just one purpose
mini multicell
Extended DECT radio coverage over a larger area with up to 3 low-cost bases
mode-dependant
Function or action that is dependant on the system status
multi-factor authentication
Proof of a user's identity using a combination of several independent features, namely knowledge (e.g. PIN code), possession (e.g. smartphone with authorisation app), biometrics (iris, face or voice recognition)
Ni-MH battery
Conventional rechargeable battery technology with relatively high storage density but with restrictions on construction design (only cylindrical) and with annoying memory effect
NTP
Standard protocol for synchronising clocks in IT systems
on prem
On prem or on premises refers to a usage and licensing model for server-based computer programmes (software)
on-hold position
Multiple accepted calls can be parked in an ICT system's waiting field, and then transferred to someone later on. A call's park position indicates its place in the waiting calls queue
one-touch dial
Quick dialling of a programmed telephone number by pressing a function key
online reverse search
If no suitable entry is found in a local telephone book or the central telephone book, for an incoming call, the ICT system runs an online name search over the Internet, to display the caller's name
open query
A caller who is to be transferred can be placed in a waiting position so that the requested communication partner can take the call on a different internal telephone
overvoltage protection module
Device that protects other devices within the same wired network against voltage surges, e.g. during thunderstorms
parallel call
Simultaneous signalling of a call to several destinations, e.g. landline and mobile phone or groups
password reset
The possibility of resetting the password of selected Auerswald ICT systems and determining a new password without resetting the entire system to the delivery state; purchase of the corresponding voucher is required
pharmacy line
Pressing the door bell button on a door terminal triggers a call to an internal or external telephone number and then creates a connection for a call
phishing
Term from cybercrime, refers to widespread illegal attempts to elicit user access data (login names plus passwords) for security-relevant areas
phishing mails
Fraudulent e-mails that are based on the fishing principle and attempt to hook the addressee with a lure in order to obtain sensitive personal data such as financial and account information or access data
pickup
Accepting an incoming call signalled for a different subscriber. The authorisation to do this can be configured
plug-and-play concept
Used to bring a technical product into operation without complicated configuration
PoE power supply
Power supply unit for smaller devices in the network, such as VoIP telephones, which are supplied with power via the Ethernet cable; this removes the need for a separate power cable and power supply unit
power dialling
Automatic (configurable) redialling if the target subscriber is busy
Power over Ethernet
PoE (in accordance with IEEE 802.3af) enables smaller devices in the network, such as VoIP telephones, to be supplied with power via the Ethernet cable; this removes the need for a separate power cable and power supply unit
premium feature
A feature that goes beyond the standard definition
premium function
A device function that goes beyond the standard definition
premium SIP telephony
SIP telephony with additional convenience functions and functional scope
presence management
Management and display of subscriber activities in unified corporate communications (UCC)
PRI
ISDN connection with up to 30 voice channels (B channels) and one data channel (D channel); one or more main telephone numbers and multiple extension numbers, in each case, can be assigned
provider
Communications services provider
provider template
Templates are supplied for the configuration of the ICT system at the provider, which contain the respective basic settings of the product used; manual set-up is no longer necessary
provisioning
The provision of configuration data for rapid configuration of, for example, IP telephones
PTMP connection
ISDN Basic Rate Access with two voice channels (B channels) and one data channel (D channel). Multiple separate telephone numbers can be assigned
PTP connection
ISDN Basic Rate Access with two voice channels (B channels) and one data channel (D channel); one main number and multiple extension numbers can be assigned
QoS
QoS includes, for example, a service offered by a router or switch that ensures consistently high speech quality during IP telephony, by prioritising voice data (RTP data packets)
query
Temporary call connection to another subscriber during an active call connection
query key
Temporarily puts the active call on hold so that a different subscriber can be called
ransomware
This involves encrypting data on the foreign computer or preventing access to it in order to extort a ransom for decryption or release
RCA jack
A special jack designed for audio and video signals, introduced by RCA (Radio Corporation of America) in the early 1940th years
RCA plug
A special plug designed for audio and video signals, introduced by RCA (Radio Corporation of America) in the early 1940th years
redial
The automatic redialling of the most recently dialled phone number, e.g. using a function key
release date
Date on which a piece of software/firmware is completed
release level
Version level of a piece of software/firmware
Reseller Partner
Auerswald partner that sells products and services to end-customers
resistive touch function
When implemented, touching a display surface gently triggers a control function
roamimg user concept
Data synchronisation concept that enables users to be provided with their personal data, wherever they are working
roaming User
Users of a system or software application are provided with their personal data, wherever they are working
rootkit
A collection of software tools that is installed on a compromised system after the intrusion in order to conceal future logins of the intruder and hide malware, for example
router
A router is used as the interface between the local network (LAN) and the Internet (WAN) or between two local networks
RTP
The Real-Time Transport Protocol (RTP) ensures that audio and video data is transmitted over IP-based networks without breaks, e.g. in the case of VoIP
S0 connection
An internal or external S0 port provides two voice channels and one data channel for use; an external S0 port can be used as a Point-to-Point connection or as a Point-to-Multipoint connection
scam
Term for any type of fraud, in today's usage especially for online fraud, in which the fraudster encourages the defrauded person to act recklessly under the pretence of a false identity
screen sharing
The transfer of a computer's screen contents to one or more other computers
security risk
Danger to facilities, persons and data due to unsafe, unauthorised or illegal actions
self-labelling function keys
The contents of a display beside a function key change, as driven by the software, for example with the COMfortel D-XT20i extension module
setup service
Service offered by Auerswald to support the configuration of selected ICT systems; purchase of the corresponding voucher is required
SFTP
Data transfer protocol with encryption
simultaneous call connections
Multiple active connections managed by "call hold", "brokering", "conference" or "waiting queues"
simultaneous incoming calls
Multiple incoming calls to one subscriber, for active calls, the second call is signalled by "call waiting"
SIP
The Session Initiation Protocol is a network protocol used to set up, control and end a communication session between two or more subscribers
SIP account
The SIP account or SIP identity are the personal user data used to access the VoIP provider's infrastructure or the infrastructure of the IP-based ICT system; the subscriber can call or be called via the account
SIP BLF
Busy lamp field in a VoIP telephone, based on the Session Initiation Protocol
SIP MWI
Signalling of a message in voicemail or fax box, based on the Session Initiation Protocol
SIP telephone
Telephone with signalling and audio transmission using the Session Initiation Protocol (SIP)
SIP trunk
Using a SIP trunk, several transmission channels and telephone numbers can be managed at once, on one access account, e.g. to enable direct extensions to be set up on IP systems, comparable to a PBX or Primary Multiplex Interface
SIPS
Session Initiation Protocol Secure is used to encrypt signalling data with TLS and transmit it
Smart IVR
Intelligent, AI-supported voice dialog system that interacts with the customer thanks to natural language processing, understands freely formulated questions and can trigger corresponding processes if necessary
smishing
A phishing attack in which SMS text messages ask the recipient to click on a link or dial a telephone number belonging to the attacker
soft client
A programme that uses the services of a server, e.g. a softphone
Soft PBX
Stand-alone communications software for business use
Soft PBX solution
Software-based ICT system consisting of software and alternative hardware platforms
softphone
Computer programme for making telephone calls over land lines or the Internet; a headset, for example, can be used as the hardware to operate the programme
software based
The use of software to implement technical functions
software centric
The use of software-based techniques to define the architecture of systems and implement them
software licence
The purchased right to use a piece of software
software maintenance
The manufacturer of software releases updated versions on a regular or ad hoc basis as an upgrade to extend functions or an update to improve functions
software release
Version status of a software
software security update
The updating of software security features
software update
The updating of software to a newer version
spear phishing
A newer variant of phishing, whereby the attacker coordinates the recipients and content of his phishing e-mail and also mentions internal circumstances in order to appear credible
speed-dial key
Frequently called telephone numbers can assigned to a specific button on the telephone
SRTP
Under SRTP (the Secure Real-Time Transport Protocol), data is encrypted and then transmitted
SSL
Encryption protocol for secure data transfer in the Internet (previous designation for what today is called TLS)
standby time
On mobile devices: the maximum recording time they can be switched on, with a radio connection to the base unit (without an active call connection), until the device battery goes flat
static IP address
Manually assigned permanent IP address for a network device connected to the router
status signalling
The statuses of a function or switching device are indicated visually by, for example, multi-coloured LEDs
subscriber key
A direct call key in a telephone or key extension module that has been permanently assigned to a subscriber
system connection
Connection of a technical device to the surrounding infrastructure
system telephone
Telephone with additional convenience and special functions that supports special features of the connected ICT system
talking time
On mobile devices: the maximum duration of an active call connection until the device battery goes flat
TAPI
An interface in the ICT system that enables computer-based control of telephony functions to be used
TFT colour display
A TFT display is a special kind of LC (liquid crystal) display which is better able to reproduce colours
TFTP
A very simply transmission protocol that only supports the reading of or writing to files
ticket
A job number (reference), generated during a support request and used to manage communications
TLS
Encryption protocol for secure data transfer in the Internet (previously called SSL)
trojan
Disguised as legitimate or harmless files, they tempt users to click on them and install malware on their PC
two-factor authentication
Proof of identity of a user by means of a combination of two different and, in particular, independent components, namely knowledge (e.g. PIN code) and possession (e.g. smartphone with biometrics)
UC
Meaning: "Unified Communication", a collective term for the integration of all kinds of different communications applications, types and channels within a communication solution
UCC
Meaning: "Unified Communication & Collaboration", a collective term for the integration of UC with additional tools for optimising the ways staff in companies work together
UI
Meaning: "user interface", a human/machine interface, usually control software, with which users interact with a technical system
UM
Meaning: "United Messaging" – this is used to present incoming messages to the user in a uniform form, e.g. as e-mail with attached audio, image or text files
UMS
Describes the merging of different types of communication on a single platform
UP0 connection
In an ICT system, the UP0 port is used for connecting digital end devices, using a single twin-core wire; COMfortel series ISDN system telephones are connected directly to the internal UP0 port, other ISDN devices need a UP0/S0 adapter
USB
Digital interface for devices in IT technology
USB host port
Interface for devices with Universal Serial Bus
USB interface
Siftware interface, Universal Serial Bus standard
USB port
Hardware interface, Universal Serial Bus standard
user interface
The place at which a user interacts with operating software and hardware, in order to use it
user licence
Gives a user the right to use an Auerswald COMtrexx system
vanity keyboard
A keypad on which letters are assigned to numbers, enabling a user to dial phone numbers as phone words instead of a sequence of numbers
virus
Meaning: "Virtual Private Network"; this type of network connects two remote networks via a "tunnel", transmitted data is encrypted and cannot be read by external parties
virus scanner
Programme that scans a computer for viruses and other malware and removes them
VLAN
Meaning: "Virtual Local Area Network"; a virtual network within a local network, used, for example, to separate IP telephony from other data traffic on a logical level
voicemail message
A message left in the voicemail system; this is stored electronically and can be queried with the PC or a system telephone, or forwarded as an e-mail
voicemail system
A voicemail system is a centralised system used for sending, storing and retrieving audio messages, for all subscribers in an ICT system
VoIP
Meaning: "Voice over IP" – telephony over IP-based networks
VoIP appliance
Stand-alone ICT hardware with implemented VoIP software
VoIP channel
A VoIP channel transports the signalling and voice data in a connection between two subscribers or between a subscriber and the telephone system
VoIP codec
A codec consists of two functional units for coding and decoding signals and data for transmission over a data network; in the case of VoIP codecs, the compression factor determines the quality of the audio signal during IP telephony
VoIP subscriber
A user of an internal VoIP connection, registered in an ICT system
VoIP telephone
Telephone with signalling and audio transmission over the Internet Protocol (IP)
Voucher Center
Website to redeem function activation vouchers purchased via the Auerswald online shop or distribution, providing series number specific information about associated devices
voucher code
A voucher can be purchased in the Auerswald online shop, which contains a code that can be used to activate a function in an Auerswald system, e.g. enhancement on-hold positions for incoming calls
VPN
Meaning: "Virtual Private Network"; this type of network connects two remote networks via a "tunnel", transmitted data is encrypted and cannot be read by external parties
VPN client
Software used to establish a secure data connection between the user and the VPN server
VPN server
Software used to establish a VPN and manage connected VPN clients
vulnerability
Refers to the weakness of an IT system due to errors in the software, hardware, dimensioning or configuration that enable attackers or malware to penetrate the system
waiting queues
In COMfortel system telephones, the waiting field is used to take incoming calls, forward them to another subscriber, put them in the waiting loop for a busy subscriber, hold them in the waiting field or fetch them again by pressing a key
WAN
Meaning: "Wide Area Network"; this is a computer network such as the Internet, which covers a wide geographical area
web interface
The use of a browser to display the control software for a device or system; this means that there is no need for a separate application for displaying it
web tool
Small software tool, usually made available as a service in the Internet
WebDAV
Network protocol used to make files available over the Internet
WebRTC
Open communication standard that enables real-time communication to take place over computer-to-computer links, via web browsers, e.g. for video conferencing, file transfer, chats and desktop sharing
white-hat hacker
Use their knowledge both in accordance with the law and within hacker ethics, for example by carrying out professional penetration tests
widget
Mini application that contains information and/or control functions, and can be placed directly on the home screen of, for example, a smartphone or tablet
WiFi
A kind of WLAN, certified according to the IEEE-802.11 standard
wireless headset
Combined earphone/microphone combination with radio connection
WLAN
A wireless network, used to connect mobile devices to the local network via a wireless access point
workplace model
Definition of how workplaces and working times are configured
zero-touch provisioning
A function with which devices can be made available for use, and configured, automatically, saving a great deal of the manual effort required