FA
Today, Friday، 22 Nov 2024 - 04:19
Mokhafaf

Acronym Finder

CNC
What is CNC ?
‎Computer Numerical Control
Digital control computer, or CNN to steering the machine tool, and industrial with the use of a computer is said to be.

by CNN can be quickly fragments with the size, exact from metal or wood, right. The Shape of the components of the AGO by a program that in the system (CAM), or by using manually (Manual) produced is determined. Usually for this purpose, frequently, from the standard (EIA-274-D (ISO6983 used that code a (G-Codes) also called, in this standard the files, move the tools, and the performance of the sequential device to specify. On standards, newer devices CNN News ISO 10303 and ISO 14649 file input operations necessary for the production of the workpiece to define the work of each device according to the tools and capabilities of the. path of motion it produces....
VOIP
What is VOIP ?
Voice Over Internet Protocol
VOIP(voice over internet protocol:Voice Over Internet Protocol) is a general term for a family of technology transfer for the delivery of voice communications over the network, based on IP, like the internet and networks package .

VoIP(pronounce weap), telephone, IP, telephone, internet, telephone, broadband, sound of broadband and voice over broadband, also called.

usually, the companies provide a service, VoIP as producers, and the protocols used to carry the symptoms of voice over IP network, as voice over IP or VoIP protocols will be remembered. It can be, in principle, the development of commercial experience protocol voice network (1973), by which producers of a generation, the internet(ARPANET was) invented. considered.

some of the lower cost, partly due to the use of a network individual to carry voice and data, especially where users to the network access that capacity, it is less used and can be VOIP without any extra cost carry. Call VoIP to VoIP, some times are free, while VOIP calls to the public telephone network(PSTN) may cost in the have the that should be used by manufacturers, VoIP paid.

protocol, voice over IP, signal, phone calls, etc. as audio digital carry(which usually with the technology of compression of data, speech, etc. of the data, it dropped and for the collection of stream data, the IP will be sent).

two types of PSTN services such as VoIP, there are. The inner dial in direct(DID) and access numbers. The inner dial in direct(DID), the caller directly to the VoIP connects in the event that the necessary access numbers, etc. match the numbers internally using VoIP by the caller....
WIMAX
What is WIMAX ?
WorldWide Interoperability for Microwave Access
WiMAX (WiMAX), or the interaction flexibility, global access, microwave, etc. communication protocol for wireless broadband access based on IEEE 802.16. WiMAX internet access to both fixed and fully mobile in a district-wide provides. Now (2010 ad )latest revision WiMAX access with data transfer rates of 40 Mbit / s to supply. With the standard of IEEE 802.16 m expected that the transfer speed up to one gigabit per second increase. The name WiMAX by the WiMAX was chosen that in the year 2001 to promote Sabah and flexibility, this standard was established. This forum WiMAX as a technology based Standard that defines the possibility of broadband wireless access as a replacement for cables and lines,, El(DSL) offers....
UMTS
What is UMTS ?
Universal Mobile Telecommunications System
System global telecom mobile phones (UTMS), one of the technology, the third generation mobile network. This technology also to the development of technology, the fourth generation on the move....
VPN
What is VPN ?
Virtual Private Network
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The benefits of a VPN include increases in functionality, security, and management of the private network. It provides access to resources that are inaccessible on the public network and is typically used for remote workers. Encryption is common, although not an inherent part of a VPN connection.

A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or with tunneling protocols over existing networks. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely....
ASCII
What is ASCII ?
American Standard Code for Information Interchange
Skiing is a sequence character (a Character Encoding based on the English alphabet. Codes skiing in computers, etc. communication means and any other means that the text concerned is, for the display texts are used. All the sets, characters of the new generation (such as Unicode and UTF) of the ski comes with fall.

ski, the first time in 1967, innovation was the last time in 1986, suffered a change. Now 33 characters it non-printable. that the majority of the control characters that are on the appearance of the text effect....
SSL
What is SSL ?
Secure Sockets Layer
Secure Socket Layer (Secure Sockets Layer) or SSL (SSL) protocol, which is by a company, Netscape, to exchanged, documents private via the internet is developed. SSL certificate from a private key for the password the information on a connection SSL are transferred. Both browsers, Netscape Navigator and Internet Explorer (and nowadays, all modern browsers) of the protocol supported. Also a lot of websites to provide a suitable Substratum in order to keep information confidential, users (such as credit card number) of this protocol, and using it can be. According to it, what standard is that. URL that need a connection of type SSL have :https instead :http start. SSL is a protocol independent of layer application is (Application Independent).So, protocols such as FTP, HTTP, and Telnet ability to use it. With this there is SSL for the protocols FTP, HTTP, IPSec, has been optimized....
SSH
What is SSH ?
Secure Shell
Secure Shell (Secure Shell) or the abbreviation ssh SSH) is an internet protocol that allows the exchange of information with the use of a secure channel between two devices connected in the network creates. Both the original version of this protocol it is called, SSH1 or SSH1 and SSH2 or SSH-2 be known. At first, on systems with the basic Unix and Linux, to access to the accounts of shell usage. SS for Tel net, and other skins of telecommunications non-secure created....