A device that broadcast a wireless local area network (WLAN) signal
A hardware device that allows other Wi-Fi devices to connect to a wired network, most of the time with a broadband connection permitting Internet access
An action resulting in the removal of any personally identifiable information from data sets
Andromeda is a user engagement platform built by Queentessence, start-up founded by industry veterans who spent years helping international brands set up reliable guest WiFi services.
For customers to access specific computer resources, including the network, users are most of the times required to be authenticated. This also applies to Wireless networks. Andromeda various methods to accomplish this. The authentication is the cornerstone from which derives user data Analytics, Traceability and Accountability.
Information resulting from the systematic analysis of data or statistics.
The acronym stands for asymmetric digital subscriber line. This comes directly from the copper phone wires.
This acronym stands for 'Application Programming Interface'. APIs are used to connect two or more applications so that they may speak to each other and perform joint functions.
A web browser is an application that permits web content to be displayed.
Bandwidth is the maximum achieved transfer rate for data across a given path for a given specific amount of time. It is typically expressed in bits per seconds. A "bit" is the smallest unit which can only store 0 or 1. A group of 8 bits are needed to encode a single character of text, resulting in a byte. Example: e.g. 0 1 0 0 1 0 1 0. With a given bandwidth, here is how you would go about figuring out how long it would take to download a specif file over the network. Let's say you have a 150 megabytes video file you care to download and your cable broadband offers you a 150 megabit per second connectivity (Mbp/s). Without the distinction made between bytes and bits, a second would be required for you to do so. However, you must divide 150 by 8 for you to obtain the exact value of eight seconds for the download, assuming a perfect speed.
Beamforming is a technic that has been developed by WiFi gear manufacturers. It essential is the utilization of antenna arrays to orient efficiently the signal towards the device requesting the connection. This results in a cleaner less cluttered radio environment, as opposed to a blindfold 360° broadcasting
In the world of digital marketing, beacons are used to engage with customers. Small battery powered hardware that receives location data of nearby devices having Bluetooth enabled.
The term used to define the portion of the network from which end-user data is transported to a node to a major network often called the backbone
This acronym stands for Basic Service Set Identifier. The BSSID is the MAC address of the AP's radio or the service set. An access point can have more than one radio or service set.
A cloud controller is a storage appliance that automatically moves data from on-premises storage to cloud storage.
A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time
Customer experience. User experience
For WIFI gear vendors, it is manufacturers who now offer cloud-based options and services, as opposed to legacy on-premises software.
It is the acronym used to define software that helps manage customer relationships along with associated data.
Jargon used by Queentessence for a palet of actions to be chosen from, in order to engage clients.
The California Consumer Privacy Act arrived shortly after GDPR. It is a state statute intended to enhance privacy rights along with consumer protection for residents of California in the US.
The term used to describe a web page displayed to a WiFi user before being granted access. It is the most assertive moment as far as communication (check Queentessence pre-roll patent). https://patents.google.com/patent/US7734283B2/en
The term used to describe Andromedas' module for venue owners to engage their customers meaningfully.
This accronym stands for Command Line Interface
A data processing agreement (DPA) is a legally binding document to be entered into between the controller and the processor
A data processor is a person or organization who deals with personal Data Subject collected information.
A demilitarized zone is a computer or small subnetwork that sits between a trusted internal network (corporate, private LAN) and an untrusted external network, like the public Internet.
A person whose personal data is being collected, held or processed.
A responsible person who determines the purposes and how any personal data from the data subject are to be processed.
Acronym for the Domain Name System used to resolves the names of internet sites with hard to remember underlying IP addresses.
Conversion of analogue to digital, whereas digitalization is the use of digital technologies and digitized data to impact how work gets done.
dBm stands for decibel milliwatts, here used in WIFI radio. The closer to 0 that number is, the better the signal strength will be.
DNS filtering is the process of using the Domain Name System, considered to be the entry point from which control can be exercised, to block malicious websites and filter out harmful or inappropriate content.
Means receiving data from a remote system, often an FTP server, an email server, or other similar system.
Relates to the usage of the Internet, mobile devices, social media, and search engines to reach consumers.
Stands for Dynamic Host Configuration Protocol used to assign IP addresses dynamically to devices connected to a network. The IP Address is generated on the fly and can its status can change according to parameters such as lease time.
The amount of time a person is retained in a particular location
This Acronym stands for denial of service. a Dos attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily disrupting services of a host connected to the Internet.
Used to identify one or more IP addresses.
While you may find many acronyms for DBI, the term used in our industry relates to Antenna manufacturers who use dBi to measure antenna performance.
Andromeda's module used to engage clients in a meaningful way
Email Validation is a process of validating the correctness and existence of a collected email so that it may be used with certainty onward.
Queentessence used terminology to define the control panel from which clients (end users) may dispose of their data the way they so chose.
Represents the connecting to each other a number of computer systems to form a local area network (LAN).
The action to occupy, attract, or involve someone's interest or attention.
The Extensible Authentication Protocol (EAP) is a protocol used for wireless networks that expands on authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the Internet in a secure fashion.
the process of converting data into a code so that unauthorized access, especially may be prevented.
A permanent software programmed into a read-only memory
File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and a server on a computer network.
Optical fiber is a super thin (as a human hair) transport medium in which light pulses travel, binaries zeros and ones. Fiber optic is used to carry digital information over long distances, overcoming coper limitations in terms of rate and distances.
Part of a computer system or network designed to block unauthorized access. Custom firewall policies can be tailored to prevent certain types of data flowing inbound, outbound while permitting others.
A geofence is a virtual perimeter for a real-world geographic area, often used to trigger actions
Gateways are used to regulate traffic between two different networks. Metaphorically speaking, it would look like a physical barrier preventing or letting people pass thru.
The General Data Protection Regulation (GDPR) is the toughest privacy and security law in the world. Though it was drafted and passed by the European Union, it imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU.
A Hotspot refers to a physical location, often a public venue equipped by an access point used to connect devices using WIFI technology.
A network host is a computer or other device connected to a computer network. It generally works to serve information resources, services, and applications to users or other hosts on the network.
Acronym for Health Insurance Portability and Accountability Act of 1996, which was enacted by the 104th United States Congress and signed by President Bill Clinton in 1996.
HTTP and HTTPS are protocol used retrieve web pages from web servers. HTTP is not secure whereas HTTPS is a secure protocol which uses TLS/SSL certificate to ensure the authentication.
Is the introductory or entry point page of a website, typically serving as a table of contents.
Most of the time depicted with color coded shades, heatmaps reveal passage ways intensity
An IP address is a unique address that identifies a device on the Internet or a local network. It allows a system to be recognized by other systems connected via the Internet protocol. There are two primary types of IP address formats used today — IPv4 and IPv6
Apple proprietary technology and protocol used to perform actions when in proximity to an iBeacon
IEEE 802.11 refers to the set of standards that define communication for wireless local area networks or LANs or VLANs. 802.11 is branded to consumers as WiFi. IEEE oversees the technology evolutions.
Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. IMAP is defined by RFC 3501.
IPSEC stands for IP Security. It is an Internet Engineering Task Force (IETF) standard suite of protocols between 2 communication points across the IP network that provide data authentication, integrity, and confidentiality. It also defines the encrypted, decrypted and authenticated packets.
Stands for Internet Service Provider
The Internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction
A Key Performance Indicator (KPI) is a measurable value that demonstrates how effectively a company is achieving key business objectives. KPIs are used to evaluate their success at reaching targets.
A 4G mobile communications standard.
A landing page is sometimes known as a "lead capture page", "static page", or a "destination page". This is the single web page that appears in response to clicking on a search engine optimized search result, marketing promotion, marketing email, or an online advertisement.
Computer network in a small area like a home, office, or school.
Location-based entertainment or experiences (LBE) VR is one area that shows a lot of promise. LBE VR is mostly a place of business that hosts VR experiences, allowing users to physically interact with the environment in a way they can't in their own home. Location-Based Services relates to conventional Services as opposed to Virtual reality.
Loging out means to end access to a computer system or a website. Logging out informs the computer or website that the current user wishes to end the login session. Log out is also known as log off, sign off or sign out
A hardware device that converts data into a format suitable for a transmission medium so that it can be transmitted from one computer to another.
A man-in-the-middle (MitM) attack is when an attacker intercepts communications, between two parties either to secretly eavesdrop or modify traffic traveling between the two.
A network topology in which the infrastructure nodes connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to efficiently route data from/to clients.
A unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. Most devices capable of connecting to resources have an associated Mac Address.
In radio, multiple-input and multiple-output, or MIMO is a method for multiplying the capacity of ... Precoding is multi-stream beamforming, in the narrowest definition. In more general terms, it is considered to be all spatial processing that occurs ...
Marketing automation is technology that manages marketing processes and multifunctional campaigns, across multiple channels, automatically, as defined by Salesforce.
Choose not to participate in something, or optin out of a project.
Choosing or consenting to do or be involved in something.
When a computer or other device is not turned on or connected to other devices, it is said to be "offline." This is the opposite of being "online," when a device can readily communicate with other devices.
Power delivered to the device over the same cable used for data delivery. No need to run electricity cord alongside Ethernet data cable. Here the ++ means that four pairs are used, enhancing the wattage power output
Power delivered to the device over the same cable used for data delivery. No need to run electricity cord alongside the Ethernet data cable.
Relates to the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
An online video advertisement or institutional communication that plays before the desired content can be viewed by the user. Queentessence holds a patented related to pre-roll content, over wireless networks. US Patent No. 7,734,283
Presence Rewards Systems is a program envisioned by Queentessence rewarding clients based on their dwelling in the physical venue. One is to reasonably assume that dwelling will result in clients spending increase.
Proximity marketing is the localized wireless distribution of advertising content associated with a particular place. Transmissions can be received by individuals in that location who wish to receive them and have the necessary equipment to do so.
A proxy can have several computers usages. They can act as a gateway between a local network and a larger-scale network such as the internet. They can also provide increased performance and security as the content is 'locally cached', eliminating new pull requests of the data, therefore, increasing performance or speed.
Pseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced by one or more artificial identifiers, or pseudonyms
A QR code is a type of barcode that contains a matrix of dots. QR Codes are generated from unique data sets with which they are allowed to be linked when scanned with a scanner or a smartphone with built-in camera. The software on the device converts the dots within the code into numbers or a string of characters. It can be used to link a VCard, a For example, scanning a QR code with your phone might open a URL in your phone's web browser.
Similar to a telephone jack, only a little wider, RJ45 connectors are most commonly used to wire Ethernet cables
That's a type of malware that encrypts your computer files following threats to publish the victim's data unless a ransom is paid
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on port 1812, that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.
Responsive related to the Internet Jargon is an approach to web design that makes web pages render well on a variety of devices and window or screen sizes.
The right of access includes information about the processing purposes, the categories of personal data processed, the recipients or categories of recipients, the planned duration of storage or criteria for their definition, information about the rights of the data subject such as rectification, erasure or restriction.
The right to erasure is also known as 'the right to be forgotten' introduced by GDPR European regulations. This individual prerogative grants the right to have personal data erased.
Roaming, in the context of an 802.11 wireless network, is the process of a client moving an established Wi-Fi network association from one access point to another access point without losing connection.
A router is a networking device that forwards data packets between computer networks.
Queentessence terminology used to define a broader region where physical Sites may be found. A Sphere contains Sites. Sites can have one or more Areas.
Queentessence terminology used to define a physical venue. A site may or may not be comprised of sub-sections named Area
Unsolicited message sent to large numbers of recipients.
Acronym for software development kit. It is the collection of software development tools in one installable package. They ease the creation of applications by having a compiler, debugger and perhaps a software framework.
A server is a computer that provides data to other computers. Many types of servers exist, including web servers, mail servers, and file servers.
Secure server-to-server file transfers protocole.
SMS stands for Short Message Service and is the most widely used type of text messaging. With a SMS, you can send a message of up to 160 characters to another device. Longer messages are normally split up into multiple messages.
A network is defined as a group of two or more computer systems linked together.
Social login is a form of single sign-on using existing information from a social networking service such as Facebook, Twitter or Google, to sign into a third party website instead of creating a new login account specifically for that website.
A Web site page that the user sees first before being given the option to continue to the main content of the site. In a wireless environment, this page is often referred to as the Captive Portal.
Stands for "Secure Shell." SSH is a method of securely communicating with another computer
SSID is the technical term for a wireless network name being displayed or broadcasted.
SSL. Stands for "Secure Sockets Layer." SSL is a secure protocol developed for sending information securely over the Internet. It is now widely used and very often expected from Internet users for most of the data that is being exchanged.
A network switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
Transmission control protocol/Internet protocol, used to govern the connection of computer systems to the Internet.
This acronym that stands for Universal Serial Bus. It is a computer port essentiallyt used to connect equipment to a computer.
Uniform Resource Identifier is a string of characters used to identify a resource on a computer network.
Uploading is the action of sending data to a remote server.
URL stands for Uniform Resource Locator, used to define a specify addresses on the World Wide Web.
UX and UI as synonyms, but they are quite different. UX stands for “user experience” while UI stands for “user interface.”
A virtual LAN or VLAN refers to the partitioning and isolation of a computer network at the data link layer, short of physically separating systems with distinctive cables.
Malicious code or program written to alter the way a computer operates. It generally spreads from one computer to others
Stands for Voice Over Protocol used in IP telephony
A virtual private network or VPN extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. It is like a dedicated highway or tunnel in which data is being securely transmitted.
A WiFi controller system is one which a centralized controller, will automate the system settings across a large number of WiFi AP’s (access points)
Abbreviation for Wireless Fidelity
WiFi as a service (WaaS) is a fully cloud-based management system, which allows organizations to provide secure, reliable, and fast WLAN access across various locations.
On the Internet, a walled garden is an environment that controls the user's access to Web content and services. Most WIFI Hotspots have Wall Gardens permitting selective content to be available before any user authentication has taken place.
A wide area network is a telecommunications network that extends over a large geographical area for the primary purpose of computer networking.
WEP is short for Wireless Encryption Protocol. A form of now considered weak encryption for wireless networks.
Wi-Fi 6 is the next generation standard in WiFi technology. Wi-Fi 6 also known as “AX WiFi" or "802.11ax WiFi” builds and improves on the current 802.11ac WiFi standard.
WiFi analytics involves the use of WiFi networks to collect data on WiFi devices such as smartphones and laptops and includes detailed information on the device behaviour, both physically in the space covered by the WiFi network, as well as the activity performed via the WiFi network's internet connection.
WiFi marketing is one of the most innovative and effective ways to advertise. It is about communicating a message or content directly to potential customers or users near the point of emission, here considered to be the WIFI access point.
Acronym for Wireless Internet Service Provider
Stands for "Wireless Local Area Network." A WLAN, or wireless LAN, is a network that allows devices to connect and communicate wirelessly.
Stands for "Wi-Fi Protected Access." WPA is a security protocol designed to create secure wireless (Wi-Fi) networks. It is similar to the WEP protocol but offers improvements in the way it handles security keys and the way users are authorized.
Wi-Fi Protected Access, Wi-Fi Protected Access II, and Wi-Fi Protected Access 3 are three security and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.
The acronym is used to describe other types of digital subscriber lines. The copper phone wires are used for the most part, although at times, some additional piece of equipment is needed to achieve higher speeds.
Queentessence terminology used to define a subsection from a broader one. Example: an outdoor terrasse of a restaurant. The resturant would be the site.