Skip to content

Care Technology Glossary of Terms

We have compiled a list of key terms used in the technology-enabled care sector. This resource will be continuously reviewed and updated. Please inform us if there are any terms you would like to see added to the glossary.

AJAX progress indicator
  • See First-Time Call Failures.
  • Calling line identification allows the person receiving the call to see the caller’s number. Within telecare, the Alarm Receiving Centre often use this to identify the alarm device associated with an incoming alarm call. CLI is not guaranteed to be delivered.
  • LTE Cat-M (also known as LTE-M) is a low-power wide area network (LPWAN) technology designed to support “Massive IoT”, i.e. billions of IoT devices with mobile/cellular technologies.
  • European Committee for Electrotechnical Standardisation. The body responsible for the development of the TS 50134-9 digital alarm protocol.
  • This is when data storage and processing is done using a network of remote computers on the Internet rather than local servers. It is commonly used to back up data and host applications. It enables data and applications to be accessed from anywhere with a suitable device connected to the Internet.
  • CSP’s offer telecommunications services or some combination of information and media services, content, entertainment and application services over networks, leveraging the network infrastructure as a rich, functional platform.
  • See social alarms.
  • Another term for Technology-Enabled Care. It involves the convergence of health and care technology, digital, media, and mobile telecommunications to enable a more effective, data-rich, and responsive integrated healthcare experience.
  • This refers to the capability of devices to interconnect and interoperate with other devices, platforms, systems, and applications.
  • Cyber security is the combination of people, policies, processes, and technologies an enterprise employs to protect its cyber (digital) assets. Cyber security is optimised to levels that business leaders define, balancing the resources required with usability/manageability and the amount of risk offset. Subsets of cybersecurity include IT security, IoT security, and information security.