-
- End-of-Repair
- No further technical support
-
- End-of-Service
- No further technical support
- - End-of-Support
- No further software updates or upgrades
-
Advanced Encrytion Standard
- Common method or a block cipher for encrypting documents, connections and servers with an AES key up to 256 bits length
-
AI tools
- AI-supported applications that enable or facilitate entertaining, creative or productive activities
-
All IP
- All IP means that telephony (Voice over IP – abbreviation "VoIP") and other services are carried over IP-based networks (also known as "NGNs" – Next Generation Networks)
-
all-in-one solution
- Compact system or software that does not require any other components to perform its tasks
-
Allnet Flat
- With COMuniq ONE an optional add-on for a tariff that includes all calls to the German fixed network, German mobile network and the EU fixed network.
-
AML
- Feature set for the COMfortel M-700 mobile telephones, used for communication with alarm servers (alarm activation, receiving of alarm messages, location detection)
-
analogue connection
- In traditional telephony, the connection of an analogue end device, using two wire cores (The term a/b connenction is only commonly used in Germany)
-
analogue port
- In traditional telephony, the point at which an analogue end device accesses the telephone system or telephone network (The term a/b port is only commonly used in Germany)
-
announcement before answering
- Plays a greeting message to the caller before their call is accepted and/or if all group members are busy
-
appliance
- A functional unit, consisting of hardware and software, designed to perform a particular task; for example, the COMpact 5500R, used as a telecommunications system
-
ARP
- A network protocol that determines the physical (MAC) address of the hardware involved for a given network address and stores this assignment in the ARP tables if necessary
-
ARP spoofing
- A hacker sends spoofed ARP messages in order to link his own MAC address with an IP address already present in the LAN by manipulating the ARP table and thus establish e.g. a connection that can be intercepted
-
Artificial Intelligence
- A branch of information technology that deals with the ability of a machine or software to imitate human abilities such as logical thinking, learning, planning and creativity
-
ATA
- Device suitable to establish a connection with one or more standard analogue telephones to the voice over IP network
-
audio electronics
- Electronic unit to process audio signals
-
authentication
- Proof of a claimed property of an entity, which may be a person, an object, a document or information, for example, and which thereby performs its verification through its contribution
-
auto provisioning
- Automatic setup of e.g. IP telephones by means of configuration data provided
-
automatic reception
- This function automatically connects an external caller with the person they want to contact by dialling a digit according to an announcement (e.g. "... If you would like to talk to the Sales team, press 1")
-
barred/approved numbers
- An ICT system's telephone number directory can be used to store numbers that are to be rejected (Do not disturb), or preferentially connected (VIP numbers), if a call to them is received; inbound and outbound numbers can be blocked or approved
-
bit/s
- A unit of measurement used in data technology to describe the number of data units (smallest unit = bit) transferred per second, also known as the "bit rate"
-
black-hat hacker
- Act with criminal objectives, often on behalf of governments or organisations and intend, for example, to damage the target system or steal data
-
Bluetooth support
- The Bluetooth interface can be used to connect headsets or smartphones to the COMfortel D-600, e.g. when it is connected to a smartphone, calls can be redirected automatically to the smartphone when the call recipient leaves the office
-
boss secretary function
- All calls to the boss telephone/s are diverted to the secretary and can be "put through" after a query call; there are no restrictions to telephone calls from the boss telephone
-
botnet
- A group of automated malicious programmes (bots, abbr. for robots) that run on networked computers without the owner's consent and use local resources
-
BRI
- A Basic Rate Interface (BRI) is the basic access to an ISDN line with two voice channels and one data channel
-
BRI
- ISDN connection with two voice channels and one data channel
-
brokering
- Brokering enables unlimited changing between an active call participant and an on-hold call participant
-
brute force attack
- An attack method in which secure accesses are "hacked" by repeatedly and systematically entering user password combinations
-
business telephone number
- Personal subscriber telephone number in a company
-
busy lamp field
- Signals the busy statuses of subscribers in an ICT system on the button panel on a desk telephone
-
busy on busy
- If a call is in progress, another call to the same number is rejected; the caller hears the busy tone and the person being called does not hear a call-waiting signal
-
busy on busy function
- If a call is in progress, this function rejects another call to the same number; the caller hears the busy tone and the person being called does not hear a call-waiting signal
-
BYOD
- Meaning: "bring your own device" – this refers to being permitted to use one's personally owned devices, such as a laptop, tablet or smartphone, within the company, in compliance with the company's security regulations
-
CalDAV
- A network protocol that enables a client to access, modify and synchronise calendar data on a remote server via WebDAV
-
call deflection
- Calls to a particular telephone number are, for example, transferred to a smartphone or other land line connection
-
call flow display
- The call flow display is used to identify the call number dialled by the customer
-
call hold
- A subscriber can put an existing call connection on hold and use the on-hold time, for example, to establish another call connection for questions or to switch between the two calls, if required
-
call protection
- This function blocks incoming calls from particular phone numbers or subscribers or calls received at particular times
-
call through
- A procedure used, for example, to forward a call made on a mobile telephone to an external subscriber number, via an ICT system, so that the ICT system's telephone number is sent to this subscriber
-
caller ID
- Identifies and displays the telephone number, and if relevant, the name of the calling party (if the name is present in Contacts or if it is transferred directly via CNIP)
-
capacitive touch function
- When this is implemented, you can gently touch the surface of the display to trigger a control function
-
captcha
- A fully automated test in which, for example, distorted character strings are queried to check whether the input in web forms is made by a human or a machine
-
CardDAV
- A network protocol that enables a client to access, modify and synchronise contact information on a remote server via WebDAV
-
CAT-iq
- Meaning: "Cordless Advanced Technology" – Internet and quality
-
CFB
- The Call Forwarding Busy function forwards a call if the telephone number is busy
-
CFNR
- The Call Forwarding on No Reply function forwards a call that has not been picked up after a specified time period has passed
-
CFU
- The Call Forwarding Unconditional function forwards a call immediately
-
ChatGPT
- An AI application (generative pre-trained transformer) that is able to communicate with users via text-based messages and images
-
CLIP
- When CLIP is implemented, the caller's telephone number is displayed before the call is accepted
-
CLIP no screening
- When CLIP no screening is implemented, customer-specific telephone numbers are transferred without being verified
- cloud computing
- In cloud computing, shared computer resources are made available on request, usually over the Internet and on a non-device-specific basis, for example in the form of servers, data storage systems or applications
- cloud service
- A non-hardware-specific service, usually offered over the Internet
- cloud solution
- A non-hardware-specific product or service, usually offered over the Internet
- cloud storage
- External storage for one or more users, usually offered over the Internet
- cloud-based
- Technology based on cloud computing
-
CNG
- Generates a quiet background noise during pauses in speech in IP telephony to prevent the listener having the impression that the connection has been interrupted
-
CNIP
- When CNIP is implemented, and the caller's name is already present in the telephone's telephone book or in the ICT system, it is displayed on the telephone's display screen even before the call is accepted
-
code lock function
- A code lock is a character string that you enter using the keyboard to trigger a function, for example, to open a door in an Auerswald or FONtevo door terminal system
-
codec
- A codec consists of two functional units for coding and decoding signals and data; codecs are used in video and audio technology
-
compliance
- A device's conformity to the legally applicable standard
-
computer worm
- Malicious program (computer program or script) that can duplicate itself after being executed once and triggers actions on the infected system without infecting other files or boot sectors with its code
-
context-sensitive
- In a technical environment, means the options for affecting a device or software application that are dependent on its current state
-
CTI
- A technology that uses computers and specialised software to control and coordinate telephone services
-
CTI software
- Specialised software for controlling and coordinating telephone services with the computer
-
cyber attack
- Attack on a computer network carried out by a hacker
-
cyber security
- Protection against external attacks on your own computer network
-
cyber spying
- The act or practice of obtaining secrets and information without the permission and knowledge of the information holder using illegal or criminal methods on the Internet, networks or individual computers
- cybercrime
- Illegal act(s) in the computer or telecommunications sector
-
data protection
- Protection of your own data against unauthorised access and manipulation of any kind
-
data synchronisation
- Calendar data, contact data and e-mails can be synchronised on the IP system telephones in the COMfortel range
-
DECT
- DECT: Digital Enhanced Cordless Telecommunication – a standard for digital cordless telephony and data transfer
-
DECT cell
- Working range of a DECT base station or DECT repeater
-
DECT multi-cell server
- Base station for a DECT telephone system that consists of multiple radio cells
-
DECT multi-cell system
- DECT system with multiple radio cells
-
DECT range
- Radio range of a DECT cell
-
DECT single-cell server
- Base station for a single-radio cell DECT telephone system
-
DECT single-cell system
- DECT system with a single radio cell
-
DECT system
- Digital Enhanced Cordless Telecommunication system for telephony and data transfer
-
denial-of-service attack
- A server is deliberately bombarded by a system with a flood of requests that it can no longer cope with and then refuses service or, in the worst case, collapses
-
deployment
- Automatic or targeted distribution of software or firmware to software-based devices from a central point
-
desk telephone
- Telephone with desk-top enclosure and wired connection to an infrastructure
-
DHCP
- Automatic assignment of dynamic IP addresses to network devices when they are connected to the server or router
-
direct call
- In a direct call, any key, or a specified key, can be pressed to establish a connection to a remote terminal without dialling the phone number
-
direct external line access
- The dialling and use of one of several exchange lines
-
distributed denial-of-service attack
- A server is bombarded by a large number of different systems in a large-scale coordinated attack with a flood of requests that it can no longer cope with and then refuses service or, in the worst case, collapses
-
DND (Do Not Disturb)
- This function blocks incoming calls from particular phone numbers or subscribers or calls received at particular times
-
door intercom system
- In contrast to stand-alone systems, Auerswald and FONtevo door terminal systems are integrated in the internal telephone infrastructure and provide direct communication between the door terminal system and subscriber telephones
-
door terminal
- The external part of a door terminal system, consisting of one or more door bell buttons, a loudspeaker and a microphone
-
dynamic IP address
- IP address automatically assigned to a network device by the router to which it is connected
-
echo cancellation
- This function prevents unwanted echo effects that can occur when signals are sent and received at the same time, for example, in telephony
-
EHS port
- DHSG is known as EHS (meaning: "Electronic Hook Switch") in English; this is an electronic interface for wireless headsets, which have speakers, a microphone and – for the EHS function – a call acceptance and termination button
-
endpoint security
- Real-time attack protection for endpoints (devices) that connect to a network and are therefore potentially vulnerable to malware threats
-
exchange line routing
- In an ICT system, this regulates the distribution of incoming external calls (incoming exchange line routing) and the handling of outgoing external calls (outgoing exchange line routing)
-
external line key
- Direct assignment of an exchange line
-
Fast Ethernet switch
- Networking hardware that connects devices within a computer network and ensures data packets reach their destination device; maximum transmission speed on Fast Ethernet: 100 Mbit/s
-
fax protocol
- The basis for communication between fax devices that includes the signals used to establish and close the connection, transfer telephone numbers, set the date and time and acknowledge receipt of the message
-
fax switch
- When a call is received, the fax switch identifies whether the call is a fax or telephone call and diverts the connection to the appropriate end device
-
feature enhancement
- The extension of the scope of services provided by a piece of hardware or software
-
feature update
- The extension or improvement of existing features
-
federation
- A term used in computer-aided communications to describe a unique identity over several (remote) systems, used in UCC systems that extend beyond individual company networks
- firewall
- A security system that protects a computer network or an individual computer from unwanted network access
-
firmware
- operating software for a device or system
-
firmware licence
- A purchased right to use firmware
-
firmware release
- Version status of a firmware
-
firmware update
- In an update, the operating system software for a device or system is upgraded to a more recent version
-
firmware-based
- The implementation of technical functions via firmware
-
Fixed Mobile Convergence
- A term used in telecommunications to describe the convergence (coming together) of fixed networks and mobile wireless networks with the option of using personal end devices and services independently of specific networks and locations
-
floating user licence
- A right to use the software or functions of Auerswald COMtrexx systems that can be transferred between users
-
floating user licence model
- Model for transferring usage rights to different users of Auerswald COMtrexx systems
-
FTP
- Simple data transfer protocol with no checking mechanisms
-
FXO
- Meaning: "Foreign eXchange Office", a PBX's analogue exchange line connection
-
FXS
- Meaning: "Foreign eXchange Station", a PBX's analogue remote exchange connections
-
gateway
- This is an active network node that is used to connect two networks that use different types of protocols to each other; for example, in an IP-based ICT system, analogue or ISDN telephones are connected via gateways
-
generative Artificial Intelligence
- A form of AI that can produce new content such as conversations, texts, images, videos and music based on its training data
-
gesture control
- Gestures and movements can be used to control an electronic device without touching the device itself
-
Gigabit Ethernet switch
- Networking hardware that connects devices within a computer network and ensures data packets reach their destination device; maximum transmission speed on Gigabit Ethernet: 1,000 Mbit/s (1 Gbit/s)
-
grey-hat hacker
- Possibly violate laws, but to achieve a higher goal, for example by publicising security vulnerabilities to force those responsible to act
-
group functions
- Internal subscribers on an ICT system (extensions) can be gathered into groups; intelligent team functions can then be used to manage them either with a system telephone or a CTI application
-
hacker
- Term for a person who has a high level of knowledge of IT security mechanisms and their vulnerabilities, is involved in hacks and sometimes even carries them out ("hacks")
-
handover
- A mobile end device switches from one radio cell to another during a call or data connection
-
handset
- Mobile end device (telephone) in a cordless (DECT) telephone system
-
hardware appliance
- A hardware platform for implementing stand-alone software
-
hardware upgrade
- The upgrading or modification of an existing hardware base, e.g. by adding another COMpact NET module
-
HD audio
- HD audio (G.722) enables better quality voice transmission with a frequency range of approximately 20 to 8,000 Hz
-
HDSP
- Meaning: "High Definition Sound Performance" (a Gigaset trademark)
-
headset
- A headset usually consists of one or two speakers (headphones) and a microphone
-
headset connection
- A separate socket on the telephone for a headset
-
high end
- A superior, better than average technical standard
-
high level
- A high performance level
-
hook switch
- On a traditional desk telephone, this is a mechanical switch contact that operates when the receiver is picked up or put down; in more modern telephones, this is a magnetic/electronic switch
-
hookswitch
- On a traditional desk telephone, this is a mechanical switch contact that operates when the receiver is picked up or put down; in more modern telephones, this is a magnetic/electronic switch
-
https
- Abbreviation for Hypertext Transfer Protocol Secure, allows encrypted connections to be established on the Internet to protect sensitive data from unauthorised access
-
ICT server
- General term for a central network-based system (hardware or software) that performs all the telecommunications tasks and services in a company
-
ICT system
- New term that replaces "PBX". The IT-oriented services provided by modern communications systems have made "PBX" obsolete
-
identity theft
- Refers to the misuse of personal data (the identity) of a natural person by third parties
-
instant messaging
- Messaging service that uses a programme called Instant Messenger for communications in real time
-
intercom
- The intercom function plays an announcement over the room's loudspeaker on one or more desk telephones (system telephones); it can also enable the hands-free microphone
-
io-homecontrol®
- A wireless communication protocol used to control home automation products made by different manufacturers
-
IP address
- An IP address is assigned to every connected device in a network, so that it can be accessed directly
-
IP camera support
- Auerswald/FONtevo IP system telephones can be used to integrate IP cameras and control them, e.g. for monitoring purposes or for video door calls
-
IP DECT multi-cell server
- The base station of an IP-based multiple radio cell DECT telephone system
-
IP DECT single-cell server
- The base station of an IP-based single radio cell DECT telephone system
-
IP DECT system
- In contrast to a standard DECT system, the base unit in an IP DECT system is connected to the telephone infrastructure, e.g. the ICT system, via IP
-
IP telephone
- Telephone that connects to IP-based networks
-
IP20
- The IP (Ingress Protection) code, e.g. IP20, classifies and rates the suitability of electrical devices for use in different environmental conditions and also the degree to which they protect users against the potential risks of using them
-
IPv6
- Internet Protocol Version 6 (successor of IPv4) is the latest generation of the globally implemented process for transmitting data in computer networks, especially in the Internet
-
IVR - Interactive Voice Response
- With COMuniq ONE a voice response system that interacts with the caller. The caller listens to the IVR system menu and answers by pressing a button on the phone. Depending on the caller's answers, the IVR responds accordingly.
-
IVR system
- Automated voice dialogue system in telecommunications that enables the caller to receive information or instructions by voice commands or keyboard input
-
Java
- This non-platform-specific Java technology includes the Java programming language and the Java platform; Java applications run on a simulated "virtual machine"
-
key extension module
- Auxiliary device with multiple (programmable) keys for desk telephones, e.g. for the COMfortel family
-
keylogger
- Hardware or software that logs user input at the keyboard of a computer in order to monitor or reconstruct it
-
KNX/EIB
- KNX combines different building functions into a single uniform system with a field bus; it is a further development of the older global "European Installation Bus" (EIB) standard
-
LAN-TAPI
- An interface in the ICT system, used for the computer-based control of telephony functions for several subscribers over the network
-
LDAP
- Network protocol for querying and modifying information on distributed directory services
-
LED signalling
- The use of LEDs as visual signals or alarms
-
legacy interface
- Interface for "out of date" devices that are to be operated in modern systems
-
Li-ion battery
- Powerful rechargeable battery technology, notable for high storage density, small dimensions and lack of memory effect
-
Li-poly battery
- A type of powerful rechargeable battery technology used in almost all small devices, notable for high storage density, small dimensions and lack of memory effect
-
malware
- Refers to software (short for "malicious software") that executes unwanted and usually harmful functions on an IT system, typically without the user's knowledge
-
Man-in-the-middle attack
- A common type of cyber attack in which attackers hack into the communication between two or more network participants, gaining complete control over the data traffic and utilising opportunities for manipulation
-
message forwarding
- New voice and fax messages are forwarded to a remote destination, such as a smartphone, by an answering machine or central voicemail and fax system by e-mail
-
micro SD card
- Memory card with max. capacity 2 GB
-
micro SD/SDHC card
- Memory card with max. capacity 2/32 GB
-
micro USB
- Small format version of the Universal Serial Bus port
-
micro USB connector
- Small format version of the Universal Serial Bus port
-
microsite
- Website with limited content, mostly for just one purpose
-
mini multicell
- Extended DECT radio coverage over a larger area with up to 3 low-cost bases
-
mode-dependant
- Function or action that is dependant on the system status
-
multi-factor authentication
- Proof of a user's identity using a combination of several independent features, namely knowledge (e.g. PIN code), possession (e.g. smartphone with authorisation app), biometrics (iris, face or voice recognition)
-
Ni-MH battery
- Conventional rechargeable battery technology with relatively high storage density but with restrictions on construction design (only cylindrical) and with annoying memory effect
-
NTP
- Standard protocol for synchronising clocks in IT systems
-
on prem
- On prem or on premises refers to a usage and licensing model for server-based computer programmes (software)
-
on-hold position
- Multiple accepted calls can be parked in an ICT system's waiting field, and then transferred to someone later on. A call's park position indicates its place in the waiting calls queue
-
one-touch dial
- Quick dialling of a programmed telephone number by pressing a function key
-
online reverse search
- If no suitable entry is found in a local telephone book or the central telephone book, for an incoming call, the ICT system runs an online name search over the Internet, to display the caller's name
-
open query
- A caller who is to be transferred can be placed in a waiting position so that the requested communication partner can take the call on a different internal telephone
-
overvoltage protection module
- Device that protects other devices within the same wired network against voltage surges, e.g. during thunderstorms
-
parallel call
- Simultaneous signalling of a call to several destinations, e.g. landline and mobile phone or groups
- password reset
- The possibility of resetting the password of selected Auerswald ICT systems and determining a new password without resetting the entire system to the delivery state; purchase of the corresponding voucher is required
-
pharmacy line
- Pressing the door bell button on a door terminal triggers a call to an internal or external telephone number and then creates a connection for a call
-
phishing
- Term from cybercrime, refers to widespread illegal attempts to elicit user access data (login names plus passwords) for security-relevant areas
-
phishing mails
- Fraudulent e-mails that are based on the fishing principle and attempt to hook the addressee with a lure in order to obtain sensitive personal data such as financial and account information or access data
-
pickup
- Accepting an incoming call signalled for a different subscriber. The authorisation to do this can be configured
-
plug-and-play concept
- Used to bring a technical product into operation without complicated configuration
-
PoE power supply
- Power supply unit for smaller devices in the network, such as VoIP telephones, which are supplied with power via the Ethernet cable; this removes the need for a separate power cable and power supply unit
-
power dialling
- Automatic (configurable) redialling if the target subscriber is busy
-
Power over Ethernet
- PoE (in accordance with IEEE 802.3af) enables smaller devices in the network, such as VoIP telephones, to be supplied with power via the Ethernet cable; this removes the need for a separate power cable and power supply unit
-
premium feature
- A feature that goes beyond the standard definition
-
premium function
- A device function that goes beyond the standard definition
-
premium SIP telephony
- SIP telephony with additional convenience functions and functional scope
-
presence management
- Management and display of subscriber activities in unified corporate communications (UCC)
-
PRI
- ISDN connection with up to 30 voice channels (B channels) and one data channel (D channel); one or more main telephone numbers and multiple extension numbers, in each case, can be assigned
-
provider
- Communications services provider
-
provider template
- Templates are supplied for the configuration of the ICT system at the provider, which contain the respective basic settings of the product used; manual set-up is no longer necessary
-
provisioning
- The provision of configuration data for rapid configuration of, for example, IP telephones
-
PTMP connection
- ISDN Basic Rate Access with two voice channels (B channels) and one data channel (D channel). Multiple separate telephone numbers can be assigned
-
PTP connection
- ISDN Basic Rate Access with two voice channels (B channels) and one data channel (D channel); one main number and multiple extension numbers can be assigned
-
QoS
- QoS includes, for example, a service offered by a router or switch that ensures consistently high speech quality during IP telephony, by prioritising voice data (RTP data packets)
-
query
- Temporary call connection to another subscriber during an active call connection
-
query key
- Temporarily puts the active call on hold so that a different subscriber can be called
-
ransomware
- This involves encrypting data on the foreign computer or preventing access to it in order to extort a ransom for decryption or release
-
RCA jack
- A special jack designed for audio and video signals, introduced by RCA (Radio Corporation of America) in the early 1940th years
-
RCA plug
- A special plug designed for audio and video signals, introduced by RCA (Radio Corporation of America) in the early 1940th years
-
redial
- The automatic redialling of the most recently dialled phone number, e.g. using a function key
-
release date
- Date on which a piece of software/firmware is completed
-
release level
- Version level of a piece of software/firmware
-
Reseller Partner
- Auerswald partner that sells products and services to end-customers
-
resistive touch function
- When implemented, touching a display surface gently triggers a control function
-
roamimg user concept
- Data synchronisation concept that enables users to be provided with their personal data, wherever they are working
-
roaming User
- Users of a system or software application are provided with their personal data, wherever they are working
-
rootkit
- A collection of software tools that is installed on a compromised system after the intrusion in order to conceal future logins of the intruder and hide malware, for example
-
router
- A router is used as the interface between the local network (LAN) and the Internet (WAN) or between two local networks
-
RTP
- The Real-Time Transport Protocol (RTP) ensures that audio and video data is transmitted over IP-based networks without breaks, e.g. in the case of VoIP
-
S0 connection
- An internal or external S0 port provides two voice channels and one data channel for use; an external S0 port can be used as a Point-to-Point connection or as a Point-to-Multipoint connection
-
scam
- Term for any type of fraud, in today's usage especially for online fraud, in which the fraudster encourages the defrauded person to act recklessly under the pretence of a false identity
-
screen sharing
- The transfer of a computer's screen contents to one or more other computers
-
security risk
- Danger to facilities, persons and data due to unsafe, unauthorised or illegal actions
-
self-labelling function keys
- The contents of a display beside a function key change, as driven by the software, for example with the COMfortel D-XT20i extension module
- setup service
- Service offered by Auerswald to support the configuration of selected ICT systems; purchase of the corresponding voucher is required
-
SFTP
- Data transfer protocol with encryption
-
simultaneous call connections
- Multiple active connections managed by "call hold", "brokering", "conference" or "waiting queues"
-
simultaneous incoming calls
- Multiple incoming calls to one subscriber, for active calls, the second call is signalled by "call waiting"
-
SIP
- The Session Initiation Protocol is a network protocol used to set up, control and end a communication session between two or more subscribers
-
SIP account
- The SIP account or SIP identity are the personal user data used to access the VoIP provider's infrastructure or the infrastructure of the IP-based ICT system; the subscriber can call or be called via the account
-
SIP BLF
- Busy lamp field in a VoIP telephone, based on the Session Initiation Protocol
-
SIP MWI
- Signalling of a message in voicemail or fax box, based on the Session Initiation Protocol
-
SIP telephone
- Telephone with signalling and audio transmission using the Session Initiation Protocol (SIP)
-
SIP trunk
- Using a SIP trunk, several transmission channels and telephone numbers can be managed at once, on one access account, e.g. to enable direct extensions to be set up on IP systems, comparable to a PBX or Primary Multiplex Interface
-
SIPS
- Session Initiation Protocol Secure is used to encrypt signalling data with TLS and transmit it
-
Smart IVR
- Intelligent, AI-supported voice dialog system that interacts with the customer thanks to natural language processing, understands freely formulated questions and can trigger corresponding processes if necessary
-
smishing
- A phishing attack in which SMS text messages ask the recipient to click on a link or dial a telephone number belonging to the attacker
-
soft client
- A programme that uses the services of a server, e.g. a softphone
-
Soft PBX
- Stand-alone communications software for business use
-
Soft PBX solution
- Software-based ICT system consisting of software and alternative hardware platforms
-
softphone
- Computer programme for making telephone calls over land lines or the Internet; a headset, for example, can be used as the hardware to operate the programme
-
software based
- The use of software to implement technical functions
-
software centric
- The use of software-based techniques to define the architecture of systems and implement them
-
software licence
- The purchased right to use a piece of software
-
software maintenance
- The manufacturer of software releases updated versions on a regular or ad hoc basis as an upgrade to extend functions or an update to improve functions
-
software release
- Version status of a software
-
software security update
- The updating of software security features
-
software update
- The updating of software to a newer version
-
spear phishing
- A newer variant of phishing, whereby the attacker coordinates the recipients and content of his phishing e-mail and also mentions internal circumstances in order to appear credible
-
speed-dial key
- Frequently called telephone numbers can assigned to a specific button on the telephone
-
SRTP
- Under SRTP (the Secure Real-Time Transport Protocol), data is encrypted and then transmitted
-
SSL
- Encryption protocol for secure data transfer in the Internet (previous designation for what today is called TLS)
-
standby time
- On mobile devices: the maximum recording time they can be switched on, with a radio connection to the base unit (without an active call connection), until the device battery goes flat
-
static IP address
- Manually assigned permanent IP address for a network device connected to the router
-
status signalling
- The statuses of a function or switching device are indicated visually by, for example, multi-coloured LEDs
-
subscriber key
- A direct call key in a telephone or key extension module that has been permanently assigned to a subscriber
-
system connection
- Connection of a technical device to the surrounding infrastructure
-
system telephone
- Telephone with additional convenience and special functions that supports special features of the connected ICT system
-
talking time
- On mobile devices: the maximum duration of an active call connection until the device battery goes flat
-
TAPI
- An interface in the ICT system that enables computer-based control of telephony functions to be used
-
TFT colour display
- A TFT display is a special kind of LC (liquid crystal) display which is better able to reproduce colours
-
TFTP
- A very simply transmission protocol that only supports the reading of or writing to files
-
ticket
- A job number (reference), generated during a support request and used to manage communications
-
TLS
- Encryption protocol for secure data transfer in the Internet (previously called SSL)
-
trojan
- Disguised as legitimate or harmless files, they tempt users to click on them and install malware on their PC
-
two-factor authentication
- Proof of identity of a user by means of a combination of two different and, in particular, independent components, namely knowledge (e.g. PIN code) and possession (e.g. smartphone with biometrics)
- UC
- Meaning: "Unified Communication", a collective term for the integration of all kinds of different communications applications, types and channels within a communication solution
- UCC
- Meaning: "Unified Communication & Collaboration", a collective term for the integration of UC with additional tools for optimising the ways staff in companies work together
-
UI
- Meaning: "user interface", a human/machine interface, usually control software, with which users interact with a technical system
-
UM
- Meaning: "United Messaging" – this is used to present incoming messages to the user in a uniform form, e.g. as e-mail with attached audio, image or text files
-
UMS
- Describes the merging of different types of communication on a single platform
-
UP0 connection
- In an ICT system, the UP0 port is used for connecting digital end devices, using a single twin-core wire; COMfortel series ISDN system telephones are connected directly to the internal UP0 port, other ISDN devices need a UP0/S0 adapter
-
USB
- Digital interface for devices in IT technology
-
USB host port
- Interface for devices with Universal Serial Bus
-
USB interface
- Siftware interface, Universal Serial Bus standard
-
USB port
- Hardware interface, Universal Serial Bus standard
-
user interface
- The place at which a user interacts with operating software and hardware, in order to use it
-
user licence
- Gives a user the right to use an Auerswald COMtrexx system
-
vanity keyboard
- A keypad on which letters are assigned to numbers, enabling a user to dial phone numbers as phone words instead of a sequence of numbers
-
virus
- Meaning: "Virtual Private Network"; this type of network connects two remote networks via a "tunnel", transmitted data is encrypted and cannot be read by external parties
-
virus scanner
- Programme that scans a computer for viruses and other malware and removes them
-
VLAN
- Meaning: "Virtual Local Area Network"; a virtual network within a local network, used, for example, to separate IP telephony from other data traffic on a logical level
-
voicemail message
- A message left in the voicemail system; this is stored electronically and can be queried with the PC or a system telephone, or forwarded as an e-mail
-
voicemail system
- A voicemail system is a centralised system used for sending, storing and retrieving audio messages, for all subscribers in an ICT system
-
VoIP
- Meaning: "Voice over IP" – telephony over IP-based networks
-
VoIP appliance
- Stand-alone ICT hardware with implemented VoIP software
-
VoIP channel
- A VoIP channel transports the signalling and voice data in a connection between two subscribers or between a subscriber and the telephone system
-
VoIP codec
- A codec consists of two functional units for coding and decoding signals and data for transmission over a data network; in the case of VoIP codecs, the compression factor determines the quality of the audio signal during IP telephony
-
VoIP subscriber
- A user of an internal VoIP connection, registered in an ICT system
-
VoIP telephone
- Telephone with signalling and audio transmission over the Internet Protocol (IP)
-
Voucher Center
- Website to redeem function activation vouchers purchased via the Auerswald online shop or distribution, providing series number specific information about associated devices
-
voucher code
- A voucher can be purchased in the Auerswald online shop, which contains a code that can be used to activate a function in an Auerswald system, e.g. enhancement on-hold positions for incoming calls
-
VPN
- Meaning: "Virtual Private Network"; this type of network connects two remote networks via a "tunnel", transmitted data is encrypted and cannot be read by external parties
-
VPN client
- Software used to establish a secure data connection between the user and the VPN server
-
VPN server
- Software used to establish a VPN and manage connected VPN clients
- vulnerability
- Refers to the weakness of an IT system due to errors in the software, hardware, dimensioning or configuration that enable attackers or malware to penetrate the system
-
waiting queues
- In COMfortel system telephones, the waiting field is used to take incoming calls, forward them to another subscriber, put them in the waiting loop for a busy subscriber, hold them in the waiting field or fetch them again by pressing a key
-
WAN
- Meaning: "Wide Area Network"; this is a computer network such as the Internet, which covers a wide geographical area
-
web interface
- The use of a browser to display the control software for a device or system; this means that there is no need for a separate application for displaying it
-
web tool
- Small software tool, usually made available as a service in the Internet
-
WebDAV
- Network protocol used to make files available over the Internet
-
WebRTC
- Open communication standard that enables real-time communication to take place over computer-to-computer links, via web browsers, e.g. for video conferencing, file transfer, chats and desktop sharing
-
white-hat hacker
- Use their knowledge both in accordance with the law and within hacker ethics, for example by carrying out professional penetration tests
-
widget
- Mini application that contains information and/or control functions, and can be placed directly on the home screen of, for example, a smartphone or tablet
-
WiFi
- A kind of WLAN, certified according to the IEEE-802.11 standard
-
wireless headset
- Combined earphone/microphone combination with radio connection
-
WLAN
- A wireless network, used to connect mobile devices to the local network via a wireless access point
-
workplace model
- Definition of how workplaces and working times are configured
-
zero-touch provisioning
- A function with which devices can be made available for use, and configured, automatically, saving a great deal of the manual effort required