We have compiled a list of key terms used in the technology-enabled care sector. This resource will be continuously reviewed and updated. Please inform us if there are any terms you would like to see added to the glossary.
- Call failures See First-Time Call Failures.
- Calling Line Identifier (CLI) Calling line identification allows the person receiving the call to see the caller’s number. Within telecare, the Alarm Receiving Centre often use this to identify the alarm device associated with an incoming alarm call. CLI is not guaranteed to be delivered.
- CAT-M LTE Cat-M (also known as LTE-M) is a low-power wide area network (LPWAN) technology designed to support “Massive IoT”, i.e. billions of IoT devices with mobile/cellular technologies.
- CENELEC European Committee for Electrotechnical Standardisation. The body responsible for the development of the TS 50134-9 digital alarm protocol.
- Cloud computing This is when data storage and processing is done using a network of remote computers on the Internet rather than local servers. It is commonly used to back up data and host applications. It enables data and applications to be accessed from anywhere with a suitable device connected to the Internet.
- Communication Service Provider (CSP) CSP’s offer telecommunications services or some combination of information and media services, content, entertainment and application services over networks, leveraging the network infrastructure as a rich, functional platform.
- Community alarms See social alarms.
- Connected care/health Another term for Technology-Enabled Care. It involves the convergence of health and care technology, digital, media, and mobile telecommunications to enable a more effective, data-rich, and responsive integrated healthcare experience.
- Connectivity This refers to the capability of devices to interconnect and interoperate with other devices, platforms, systems, and applications.
- Cyber security Cyber security is the combination of people, policies, processes, and technologies an enterprise employs to protect its cyber (digital) assets. Cyber security is optimised to levels that business leaders define, balancing the resources required with usability/manageability and the amount of risk offset. Subsets of cybersecurity include IT security, IoT security, and information security.