API — Application Programming Interface. An API allows two applications to communicate. It’s what enables data to be seamlessly distributed to different applications on different devices in different locations, and then updated and manipulated in real time. They’re at the heart of cloud-based Unified Communications.
Asynchronous Transfer Mode (ATM) — A high-speed networking standard for voice and data. It’s typically used for private long-distance networks. ATM utilizes fixed-sized cells rather than the variable-length packets Ethernet utilizes. This makes it easier to manage bandwidth; however, it is typically more expensive.
Auto Attendant — Basically, this is a virtual receptionist. Auto attendant allows callers to be automatically transferred to an extension without the intervention of an operator. They typically have a simple menu system and are customizable.
Availability — Availability is based on the probability of a hardware failure, which is obviously bad. Availability is determined by dividing the “mean time between failure” by the “mean time to repair” – in other words, how often things break down divided by how long it takes to fix them. “Five nines,” i.e. 99.999 percent, is the benchmark people often talk about.
Bring-your-own-device (BYOD) — This is a huge reality for most businesses today – their workforce is committed to using its personal smartphones, tablets and other mobile devices to access business information and applications. On one hand, this is great, because it means employees can work anywhere and offers the promise of increased productivity. On the other hand, data
governance becomes a major issue. A successful BYOD initiative requires a robust technology platform, good security and proper policy in place.
CALEA — The Communications Assistant for Law Enforcement Act. This relates to electronic surveillance, which has been a very hot topic in 2013. The Act requires that carriers and manufacturers enable their equipment, facilities, and services to ensure that they have built-in surveillance capabilities so that federal agencies can monitor communications.
CPNI — This stands for Customer Proprietary Network Information. This is the data collected about an individual user’s calls, such as time, date, duration and destination number of each call.
Caller ID — Caller ID is used to allow the called party to see the calling party’s name and telephone number before picking up the phone.
Click to call — The ability to initiate a phone call from the contact list on your computer with the click of a mouse.
Cloud Communications — Voice and data communications over the Internet. All applications, switching and storage are hosted by a third-party outside the organization and accessed over the Internet. With cloud communications, there is no major capital expenditure for an in-house PBX system and ongoing costs are more predictable than with a traditional premise-based solution.
Computer Telephony Integration (CTI) — Technology that enables integrated interaction on a telephone and a computer, such as click-to-call and screen pops.
Customer relationship management (CRM) — Software that manages all aspects of an organization’s interactions customers and prospects. A unified communications solution can make a CRM system more accessible across an organization because it creates a heightened level of accessibility.
Denial of Service (DoS) — DoS attacks are favorites of hackers, criminals, and other trouble-causing types. A DoS attack is an attempt to make a network unavailable to its intended users.
Direct Inward Dial (DID) — DID is used for call routing. Through DID, external callers are able to contact a user directly at their unique phone number.
Endpoint — An endpoint is an IP telephone, a softphone, or an analog telephone adapter device.
Extension — A standard extension is an individual user account on the cloud associated with a physical endpoint by a two to six digit number. A cloud extension is not associated with a physical endpoint, i.e., a voice mailbox, etc.
Find me, follow me — Generally, this is used as a call-forwarding feature. It improves worker productivity and customer service by ensuring that every call reaches the right person, regardless of where he or she is working.
Firewall — A key security feature that you’ve almost certainly heard of. The firewall sits between two networks, such as a company’s internal network and the Internet, and prevents unauthorized people from accessing the internal network.
Fixed mobile convergence (FMC) — This is exactly what it sounds like – the convergence of the fixed and mobile networks. FMC solutions integrate cellular services with private communications networks, whether they are wired or wireless.
Frame relay — A cost-efficient method of data transmission for intermittent traffic between LANs and between end-points in WANs. They’re less expensive than private leased lines because the carrier shares the frame relay bandwidth among many customers. This can have a negative impact on quality, and therefore requires detailed attention to engineering the solution.
Hosted VoIP — Also called Hosted. When we say “hosted” we mean that the hardware and PBX is hosted at an off-site location from where the VoIP telephone service is being used. Many businesses are embracing Hosted VoIP because it provides them robust communications, cost certainty and future-proofs their business, while eliminating major capital expenditures for new inhouse phone equipment.
Instant Messaging (IM) — Real-time communication over the Internet using text-based messages. Popular consumer-facing examples include G-chat, AIM, and iMessage. IM is usually a central feature of unified communications.
IP PBX — This stands for Internet Protocol-Private Branch Exchange. It’s a business phone system that delivers voice or video over a data network using IP.
IP phones — IP phones plug directly into the network and perform analog-to-digital and/or digital-to-analog conversions.
IP telephony — More commonly referred to as Voice over IP (VoIP). IP telephony uses the IP network to carry voice communications, replacing the public switched telephone network.
ITSP — Internet Telephony Service Provider. A company that provides VoIP services. We usually break them down into Interconnects, MSPs and Carriers.
Jitter — Generally caused by network congestion, which can create timing issues for when packets arrive, thereby contaminating voice calls and creating poor and/or unacceptable voice quality. This often manifests itself with “squawking” noises and other strange noises interrupting audio calls.
Latency — Latency is the time it takes for a caller’s voice to be transported – packetized, sent over the network, depacketized and replayed – to the other person. Too much latency is bad, making for a disjointed conversation flow. Ideally, latency should not exceed 100 milliseconds. Geographical distance or a lower-speed network connection can cause latency issues.
Managed IP Telephony Services — Hosted services. Typically, the end-customer business owns the IP PBX and related equipment, while the carrier or VAR provides management and maintenance for the phone system.
Mobile device management (MDM) — MDM software secures, monitors and manages mobile devices. It’s used to enforce data and configurations for mobile devices, and includes the ability to lock or delete data from a lost or stolen mobile device.
Mobile unified communications (mobile UC) — A mobile UC solution seamlessly pulls together common telephony functions, voice, presence, chat, data, applications, and other technologies from a smartphone or tablet.
Mobility Router — Allows users to make and receive calls from enterprise and personal mobile phone numbers by automatically selecting the best network (Wi-Fi or cellular) to optimize cost, call quality and battery life.
Origination & Termination — Origination refers to inbound calls or minutes from the PSTN. Termination refers to outbound calls or minutes from the PSTN.
Packets — In VoIP, voice is converted into data packets that are transmitted over the IP network and then reassembled into voice by an endpoint VoIP device.
Packet loss — Packet loss occurs when one or more packets of data fail to reach their destination, resulting in a metallic sound or conversation dropouts. It can be caused by network congestion, distance and poor line quality. Excessive packet loss is perceived as broken or missing communication.
Post Dial Delay (PDD) — The interval between dialing the last digit of the called number and hearing the ringback tone.
Presence status — Or just “presence” for short. This is the ability to see a colleague’s presence status – whether they’re in the office, away from their desk, etc.
Private branch exchange (PBX) — A term dating back to the days of switchboard operators referring to an organization’s telephone exchange.
Public Switched Telephone Network (PSTN) — The network of the public circuit-switched telephone lines, which allows any phone in the world to connect with any other phone.
Quality of service (QoS) — a measure of the overall performance of the network. It takes into consideration factors such as error rates, bandwidth, throughput, transmission delay, availability and jitter.
Real-Time Transport Protocol (RTP) — An IP standard for delivering audio and video over IP networks.
Reliability — Reliability is determined by calculating how often the system fails compared to the percentage of the time that the system is available. The system should be available at least 99.999 percent of the time.
RespOrg — Stands for “Responsible Organization,” the process of transferring “Toll Free” telephone numbers from one carrier to another.
Service level agreement (SLA) — Part of a service contract that defines the level of service. An SLA for voice quality typically includes call completion rate, PDD, and some measure of voice quality
Session border controller (SBC) — Network device used to register, setup, control, and tear down VoIP multimedia communications sessions. An SBC ensures that only approved traffic passes into the heart of your business. An SBC also hides your internal network and your users IP addresses from the outside world, which provides additional security protection.
Session Initiation Protocol (SIP) — SIP is a text-based signaling protocol used to control multimedia communication sessions over IP networks. SIP handles call controls such as ring, hold, transfer, conference, etc.
SIP Trunking — VoIP service used to deliver communication services to a customer’s SIP-based PBX or endpoint, usually to a publically routable IP domain.
Softphone — A softphone is voice software that emulates a VoIP telephone on a Computer, Smartphone, or Tablet.
Trunk line — Trunk lines connect the PBX to a public switched telephone network. With a cloud-based solution, SIP trunks are used to make this connection.
Unified communications (UC) — The seamless integration of voice, presence, chat, data, applications, and other technologies to improve communications, processes, and business productivity.
Unified Communications and Collaboration (UCC) — UCC integrates multiple communications channels to enable communication and collaboration across a company.
Unified messaging — The integration of email, SMS, fax, voicemail and video messaging into a single interface which is accessible from a variety of devices. It simplifies the user experience because all types of messages are stored in one place.
Virtual LANs (VLANs) — Used to “logically separate” devices and departments on the same Ethernet wire.
Virtual private network (VPN) — A private network extended across a public network, i.e. the Internet. It enables the sharing of data across public networks in a typically more secure and functional way.
Virtualization — Allows companies to consolidate servers, increase operational flexibility and deliver higher application availability. Virtualization utilizes a group of servers in a way that allows for running multiple operating systems simultaneously on the same machine.
Voice over IP (VoIP) — Voice calls over the IP data network. VoIP converts analog voice signals into digital data packets and supports real-time, two-way transmission of conversations using Internet Protocol.