enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Call logging - Wikipedia

    en.wikipedia.org/wiki/Call_logging

    The call logging trial proved successful and while it was initially designed to gather phone call data and cost of billing details specific to the customers' call's, a hidden benefit emerged such that local management were also able to see a pattern of the types of calls being generated, i.e. calls to and from certain businesses in addition to ...

  3. Phone log - Wikipedia

    en.wikipedia.org/wiki/Phone_log

    A phone log is metadata collected from telephone or mobile phones for the purpose of surveillance or espionage. This metadata may include: length of calls, phone numbers of both parties, phone-specific identification information, GPS location, call proximity, and/or computer converted voice-to-text transcripts of the phone call conversation. [ 1 ]

  4. Voice logging - Wikipedia

    en.wikipedia.org/wiki/Voice_logging

    Voice logging is the practice of regularly recording telephone conversations. Business sectors which often do voice logging include public safety (e.g. 9-1-1 and emergency response systems), customer service call centers (conversations are recorded for quality assurance purposes), and finance (e.g. telephone-initiated stock trades are recorded for compliance purposes).

  5. Subrah Iyar - Wikipedia

    en.wikipedia.org/wiki/Subrah_Iyar

    On May 29, 2007, Cisco Systems acquired WebEx for $3.2 billion. [5] After a 6-year break spending time with his 2 daughters, in 2012, Iyar co-founded and became CEO of Moxo. [6] Moxo is a digital client interaction platform that received funding from Cisco and KDDI from Japan. [7]

  6. Head-of-line blocking - Wikipedia

    en.wikipedia.org/wiki/Head-of-line_blocking

    HOL blocking can produce performance-degrading effects in input-buffered systems. This phenomenon limits the throughput of switches. For FIFO input buffers, a simple model of fixed-sized cells to uniformly distributed destinations, causes the throughput to be limited to 58.6% of the total as the number of links becomes large.

  7. Buffer underrun - Wikipedia

    en.wikipedia.org/wiki/Buffer_underrun

    In computing, buffer underrun or buffer underflow is a state occurring when a buffer used for communicating between two devices or processes is fed with data at a lower speed than the data is being read from it. This requires the program reading from the buffer to pause its processing while the buffer refills.

  8. Data buffer - Wikipedia

    en.wikipedia.org/wiki/Data_buffer

    In computer science, a data buffer (or just buffer) is a region of memory used to store data temporarily while it is being moved from one place to another. Typically, the data is stored in a buffer as it is retrieved from an input device (such as a microphone) or just before it is sent to an output device (such as speakers); however, a buffer may be used when data is moved between processes ...

  9. Ethernet flow control - Wikipedia

    en.wikipedia.org/wiki/Ethernet_flow_control

    An overwhelmed network node can send a pause frame, which halts the transmission of the sender for a specified period of time. A media access control (MAC) frame (EtherType 0x8808) is used to carry the pause command, with the Control opcode set to 0x0001 (hexadecimal). [1] Only stations configured for full-duplex operation may send pause frames.