CAB Protocol provides a real estate developer and/or a facility manager with a suite of standardized methods for exchanging real-time data between building automation systems.
Cadlock is used to access AutoCad drawings protected by CadVault, a CadLock Incorporated product for digital rights management of graphical and non-graphical elements within AutoCAD drawing files.
Call of Duty is a first-person and third-person shooter video game series franchise. The series began on the PC, and later expanded to consoles and handhelds. The Call of Duty games are published and owned by Activision. Users can play together online.
Control And Provisioning of Wireless Access Points Control Protocol
Description
Control And Provisioning of Wireless Access Points (CAPWAP) is a protocol used for Access Controllers (AC) to manage and control Wireless Termination Points (WTPs). CAPWAP is designed to centralize WLANs. CAPWAP control represents the control traffic passed from the WTP to AC or vice versa.
Control And Provisioning of Wireless Access Points Data Protocol
Description
Control And Provisioning of Wireless Access Points (CAPWAP) is a protocol used for Access Controllers (AC) to manage and control Wireless Termination Points (WTPs). CAPWAP is designed to centralize WLANs. CAPWAP data represents the data traffic passed from the WTP to AC or vice versa.
The Core-Based Trees protocol (CBT) is designed to build and maintain a shared multicast distribution tree that spans only those networks and links leading to interested receivers. CBT builds a shared multicast distribution tree per group, and is suited for inter- and intra-domain multicast routing. CBT may use a separate multicast routing table, or it may use that of an underlying unicast routing table, to establish paths between senders and receivers.
Compact Disc Database (CDDB) is a database for software applications to look up audio CD (compact disc) information over the Internet. This is performed by a client which calculates a (nearly) unique disc ID and then queries the database. As a result, the client is able to display the artist name, CD title, track list and some additional information.
The Coherent File Distribution Protocol (CFDP) has been designed to speed up one-to-many file transfer operations that exhibit traffic coherence on media with broadcast capability. Examples of such coherent file transfers are identical diskless workstations booting simultaneously, software upgrades being distributed to more than one machines at a site, a certain "object" (bitmap, graph, plain text, etc.) that is being discussed in a real-time electronic conference or class being sent to all participants, and so on. A CFDP client that wants to receive a file first contacts a server to acquire a "ticket" for the file in question. This server could be a suitably modified BOOTP server, the equivalent of the tftpd daemon, etc. The server responds with a 32-bit ticket that will be used in the actual file transfers.
Clients-Oriented File Transfer Protocol (cFTP) is a client-oriented PHP-based file transfer protocol that allows the user to create a repository to send/receive files with multiple clients. The user can create multiple clients accounts with a very easy to use front end, and upload an unlimited number of files under each account, with the ability to add a title and description to each one.
CHAOSNet is one of the earliest local area network hardware implementations. The Chaosnet protocol implementation was over CATV coaxial cable modeled on the early Xerox PARC 3 megabit/second Ethernet, over ARPANET, and over Transmission Control Protocol (TCP).
The Character Generator Protocol (CHARGEN) is a service of the Internet Protocol Suite. It is intended for testing, debugging, and measurement purposes.
Check Point Management Interface (CPMI) is a proprietary protocol of Check Point Software Technologies. CPMI provides security services for their VPN-1 virtual private network/firewall software. The protocol contributes to Check Point Software's Open Platform for Security (OPSEC), which is a framework for network security. Typically CPMI uses TCP port 18190 as default.
Common Internet File System (CIFS) is a standard protocol that allows users to share files across intranets and the internet. It is cross platform since it works in Windows OS and is also supported in MAC OS and Linux OS. CIFS protocol defines a remote file system protocol. It is implemented over TCP/IP and utilizes the DNS for scalability and is using Microsoft NetBIOS protocol. The protocols origin is from Microsofts SMB protocol group.
The Cisco Video Surveillance Solution relies on an IP network infrastructure to link all components. The designs of a highly available hierarchical network have been proven and tested for many years and allow applications to converge on an intelligent and resilient infrastructure.
Cisco Network Admission Control (NAC) is a system that provides integrated network security solutions. It offers authentication and authorization of wired, wireless, and VPN users and devices (access control), end-point security policies, simple guest access control, audition and information logging of network activity. Typically NAC uses UDP ports 8905 and 8906.
Cisco-ip-phone is a VoIP telephone used mainly in corporations; it can be used on or off site. The telephone uses the Internet as its infrastructure. The telephone unifies the use of voice, video, data and mobile applications. Cisco Phone is using SIP or Skinny as underlying protocol.
Tag Distribution Protocol (TDP) is a two party protocol that runs over a connection oriented transport layer with guaranteed sequential delivery. Tag Switching Routers use TDP to communicate tag binding information to their peers. TDP supports multiple network layer protocols including but not limited to IPv4, IPv6, IPX and AppleTalk.
Citrix is an application that mediates users remotely to their corporate applications. ICA: Independed Computing Architecture is a designated protocol for application server system; it is used for transferring data between clients and servers.CGP: CGP is a tunneling protocol, the latest addition to the family of Citrix protocol.As of today it encapsulates ICA protocol but will be extended to other Citrix protocol such as RDP, HTTP/HTTPS.IMA: used for server-server communication. Server-Browser: Used mainly a control connection which has Published Application Name and triggers an ICA connection
Citrix is an application that mediates users remotely to their corporate applications. ICA: Independed Computing Architecture is a designated protocol for application server system; it is used for transferring data between clients and servers.CGP: CGP is a tunneling protocol, the latest addition to the family of Citrix protocol.As of today it encapsulates ICA protocol but will be extended to other Citrix protocol such as RDP, HTTP/HTTPS.IMA: used for server-server communication. Server-Browser: Used mainly a control connection which has Published Application Name and triggers an ICA connection
Cloanto is a service developed by the Cloanto Corporation for use in the company's software components for electronic marketing, publishing, commerce and internationalization.
The Common Management Information Protocol (CMIP) is the OSI specified network management protocol. Defined in ITU-T Recommendation X.711, ISO/IEC International Standard 9596-1. It provides an implementation for the services defined by the Common Management Information Service (CMIS) specified in ITU-T Recommendation X.710, ISO/IEC International Standard 9595, allowing communication between network management applications and management agents. CMIS/CMIP is the network management protocol specified by the ISO/OSI Network management model and is further defined by the ITU-T in the X.700 series of recommendations.
The Common Management Information Protocol (CMIP) is the OSI specified network management protocol. Defined in ITU-T Recommendation X.711, ISO/IEC International Standard 9596-1. It provides an implementation for the services defined by the Common Management Information Service (CMIS) specified in ITU-T Recommendation X.710, ISO/IEC International Standard 9595, allowing communication between network management applications and management agents. CMIS/CMIP is the network management protocol specified by the ISO/OSI Network management model and is further defined by the ITU-T in the X.700 series of recommendations.
Almanid Connection Endpoint (connendp) is a common module that serves the Almanid IdentityProtector. IdentityProtector is a backup product for Novell Directory Services and Novell eDirectory.
ContentServer is a Frontier 6 application that allows members of a website team to contribute to a Frontier-managed site, even if they don't use Frontier.
An earlier set of data conferencing and telephony extensions for Netscape Navigator from Netscape. It included an Internet phone, chat window, whiteboard and application sharing.
The Common Object Request Broker Architecture (CORBA) and the Internet Inter-ORB Protocol (IIOP) are two technologies that enable distributed computing across heterogeneous systems. CORBA defines the total architecture required for communication between distributed objects and IIOP is the most important specification of CORBA. IIOP focuses on interoperability of distributed objects in heterogeneous environments. CORBA enables an application's components to communicate without regard for their locations on a network. A CORBA-compliant object is guaranteed to be able to communicate with other distributed objects because the technology defines a common interface.
Courier Mail Server is a mail transfer agent (MTA) server that provides ESMTP, IMAP, POP3, SMAP, webmail, and mailing list services with individual components. It is best known for its IMAP server component. Individual components can be enabled or disabled at will. The Courier Mail Server implements basic web-based calendaring and scheduling services integrated in the webmail module.
Covia is used mainly by emergency response teams and the military to enable audio, video, data and other types of communication between multiple systems and devices running different operating systems.
Compaq Insight Manager Service (cpq-wbem) is a service used by the Compaq Insight Manager software. In 2002 Compaq was aquired by HP, and the Insight Manager software is now known as HP Insight Control.
CRYPTOAdmin a remote authentication solution, enabling its users to access a remote enterprise's LAN. The solution is built of two parts: the CRYPTOAdmin authentication server and CRYPTOCard tokens and smartcards. Together, these provide strongly secured access to a remote enterprise network.
The Computer Science Network (CSNET) was a computer network that began operation in 1981 in the United States. Its purpose was to extend networking benefits for computer science departments at academic and research institutions that could not be directly connected to ARPANET, due to funding or authorization limitations. The CSNET name service allowed manual and automated email address lookup based on various user attributes, such as name, title, or institution.
CU-SeeMe is an Internet video conferencing client. CU-SeeMe can make point-to-point video calls without a server or make multi-point calls through server software. Later commercial versions of CU-SeeMe could also make point-to-point or multi-point calls to other vendor's standard-based H.323 endpoints and servers.
CVSup is a computer program written for Unix/Linux based systems that synchronizes files and directories from one location to another while minimizing data transfer using file-type specific delta encoding when appropriate. CVSup was designed for keeping source code repositories - such as CVS - synchronized, but has been extended to support synchronizing any type of file.
CyberCash serves as a conduit through which payments can be transported quickly, easily and safely between buyers, sellers and their banks. The CyberCash system provides several separate payment services on the Internet including credit card and electronic cash.