How can we help?

Join our newsletter to find out how we make postive, real-world contributions.


How can we help?

Join our newsletter to find out how we make postive, real-world contributions.


General

Who is PMT™?

PMT is a leading Service Provider and Tech house in the Banking, Retail, Insurance, FinTech and Communications industries.

 

Pattern Matched Technologies™ is a Fintech company that specialises where financial, telecommunications and commerce verticals intersect. Our experience spans over 14 years, while having innovated many various services and products, now standardised in the market.

 

  • Trust between all Parties involved whether it is staff, management, customers or suppliers.
  • Dedication to each Employee, Client, and Project.
  • Supplying service to Customers without exception, always exceeding their expectations.
  • Using experience and knowledge for mutual benefit.
  • Delivery focused on process & quality centered mindsets.

Is PMT™ BBBEE Accredited?

Pattern Matched Technologies™ acquired their Level 3 BBBEE rating in the last quarter of 2018

 

Download Certificate

What is WASPA?

The Wireless Application Service Providers’ Association (WASPA) was formed in 2004 as a self-regulatory body with a mandate to represent and regulate its voluntary members, which provide mobile-based Value Added Services (VAS), otherwise known as WASPs.

As of 2018, it has over 400 members.

Membership of an industry body with a recognised Code of Conduct has been made compulsory by Telkom Mobile, Cell C, MTN and Vodacom for all WASPs.

WASPA’s Code of Conduct and Advertising rules were developed and implemented in 2005. It has developed a complaints handling process, to enforce these rules, that is totally independent of the WASPA Board. Anyone may lodge a complaint and each complainant is given a reference number.

Complaints are handled by an independent secretariat who process complaints using a mandated civil procedure policy, while some 13 independent ICT lawyers and a 3-person appeals panel of ICT lawyers adjudicate the complaints lodged with the secretariat. An emergency panel of three WASPA adjudicators may sit to shut down offending services, pending a formal adjudication, where there is evidence of immediate and ongoing consumer harm.

These lawyers may adjudicate on any matter related to the WASPA Code of Conduct where a complaint has been lodged. All completed adjudications are posted publically on the WASPA web site. The adjudicators may sanction any infraction, which may include fines, suspensions, remedies, refunds, expulsion, or any combination thereof.

WASPA also has a compliance department who check advertising, and test services on a daily basis, for compliance with its Code of Conduct.

WASPA is also a prominent member of the International Audiotext Regulators Association.

Versatile hosting plans and pricing

PMT offers Hosting as a core service with comprehensive 24/7 Service Support and Monitoring.

 

  • Hybrid Cloud
  • Managed Hosting
  • Solaris
  • Dedicated & Management Solutions

Products

Amber™

Amber™ USSD is deployed for several large Banks in South Africa, providing reliable and easy access to the banking platform by means of self-service. Our Amber™ platform has proven its worth by facilitating over 16 million unique SIM subscribers/phone numbers on our platform in one month, with over 42 million transactions facilitated by one platform in a month.

 

 

 

More Info

Emerald™

Amber™ USSD is deployed for several large Banks in South Africa, providing reliable and easy access to the banking platform by means of self-service. Our Amber™ platform has proven its worth by facilitating over 16 million unique SIM subscribers/phone numbers on our platform in one month, with over 42 million transactions facilitated by one platform in a month.

 

 

 

More Info

Amethyst™

The Amethyst™ Wallet solution provides a sophisticated Chart Of Accounts (COA) that can be configured to suit your transactional needs while enabling core Mobile Money Transfer (MMT) transactions. Wallet technology is essentially a value store against which Debits and Credits move in accordance with required business interactions.

 

 

 

More Info

Crimson™

The Crimson™ Engine is built to apply the ISO 8583 financial switching specification and conforms to both Issuing and Acquiring methodologies and roles regarding any financial communication between systems. Crimson™ has been implemented in Debit Card switching engines that service large Retail and Bank applications, as well to service last mile integrations for retail acquiring at large scale.

 

 

 

More Info

Services

What is Erlang?

Erlang is a programming language used to build massively scalable soft real-time systems with requirements on high availability. Some of its uses are in telecoms, banking, e-commerce, computer telephony and instant messaging. Erlang’s runtime system has built-in support for concurrency, distribution and fault tolerance.

Reference: https://www.erlang.org/

What hosting services do you provide?

Hybrid Cloud

Using hybrid Cloud we have the ability to run a mix of on and off premise solutions, leveraging the best features and cutting edge while still maintaining an audible and managed service.

 

Choose from any Cloud flavour

With compatibility on all major Cloud service providers, we not only reduce the requirements for dedicated hardware but also greatly extend the hosting capabilities.

 

Managed Hosting

By partnering with Teraco Data Environments we provide the best of breed dedicated and managed data center solutions. PCI and ISO compliance audits, with the backing of our hosting providers. Dedicated or shared hardware for bespoke needs from Banking isolation up to physical network segregation, we tailor for a range of providers.

 

Sun Solaris

Oracle Sun Solaris PCI-compliant hosted solutions. These solutions utilise Linux or Solaris Virtual Machines

What is an MIS report?

An MIS report is a tool PMT uses to evaluate business processes and operations.

Pretend you are the manager of a medium-sized company’s customer service department. Your staff takes phone calls and emails from over 300 customers every day. For the most part, they do a very good job, but recently, customers have started to complain that it takes too long to get their questions answered. Upper management at your company is concerned about this and wants to know what they can do to fix the problem. But before they make a decision, they need you to give them more information. How will you do this?

 

This is where MIS reports come in. MIS stands for management information system. Business managers at all levels of an organization, from assistant managers to executives, rely on reports generated from these systems to help them evaluate their business’ daily activities or problems that arise, make decisions, and track progress. MIS system reporting is used by businesses of all sizes and in every industry.

Our Products

Click here to find out more about our Products and how they can help your business.

Learn More

Questions?

Can’t find what you’re looking for or have more questions? Click here and we’ll get back to you.

Contact us

Helpful resources

The Protection of Personal Information Bill
WASPA - Code of Conduct
Protection of Personal Information Act
The Consumer Protection Act
Access to Information Act

Helpful resources

Looking for a career?

Visit our careers page to see all the careers currently on offer.

Career Opportunities

The Protection of Personal Information Bill

The Protection of Personal Information Bill (Bill 9B-2009) was approved by the Portfolio Committee on Justice and Constitutional Development on 5 September 2012. The Bill will now be considered by the National Assembly and the National Council of Provinces (NCOP).

 

Download

WASPA - Code of Conduct

Protection of Personal Information Act

The Consumer Protection Act

Know your rights and know how to enforce them, please download the Consumer Protection Act for your convenience.

 

Download

Access to Information Act

Access to Information Act

 

Download

Glossary

TermDefinition
ACLAccess Control List. A list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects.
ADActive Directory.
AESAdvanced Encryption Standard.
AGGREGATION ACCOUNTAggregation Account is an account opened to facilitate the pay-in and pay out process for any financial system.
AGNAgent Entity. Agent within the system such as Amethyst™ of Emerald™.
A/MAgent-Merchant Entity. Both functions enacted within the system.
AMLAnti-money laundering (AML) refers to a set of procedures, laws or regulations designed to stop the practice of generating income through illegal actions.
APIApplication Programming Interface. A protocol intended to be used as an interface used by software components to communicate with each other.
ARCAcquired Retail and Cross-sell.
APPSmart Phone Application Entity.
ARHIAmber™ Remote HTTP Interface.
ARTIAmber™ Remote TCP Interface.
ATMAutomated Teller Machine.
ATTORNEYS ACCOUNTThis account is suited to Attorneys who are acting as trustees; the attorney will hold the funds on the Customers behalf.
BABusiness Analysis
BEBack-end.
BCPBusiness Continuity Planning.
BROKERAGE ACCOUNTThis account is used when building a stock/bonds or mutual funds portfolio.
BRSBusiness requirements specifications are specifications which once delivered, provide value. Products, systems, software, and processes are ways of how to deliver, satisfy, or meet business requirements.
BULK SMSApplication that allows the sending of an SMS to multiple recipients
BUNDLEA collection of services sold as a group usually at a discounted price or single tariff. Can also refer to an amount of data/voice minutes.
B2BBusiness-to-business. Commerce transactions between businesses conducted via the Internet.
CAPCentral Administration Portal Entity. Administrative portal of a specific product of system.
CCChange control is a systematic approach to managing all changes made to a product or system. The purpose is to ensure that no unnecessary changes are made, that all changes are documented, that services are not unnecessarily disrupted and that resources are used efficiently.
CEMCommon Entity Model component within specific product system.
CERTIFICATESSL Certificates are small data files that digitally bind a cryptographic key to an organization's details. When installed on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a browser.
CFTCombat Finance Terrorist.
CLEARING ACCOUNTA clearing account is usually a temporary account containing costs or amounts that are to be transferred to another account.
CLOUD (CLOUD COMPUTING)The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
CLIClient Entity. The Client of PMT for whom the system is being built.
CPCCentral Processing Centre.
CODCertificate of Deposits are known as time deposits, because the account holder has agreed to keep the money in the account for a specified amount of time, anywhere from three months to six years.
CORBAThe Common Object Request Broker Architecture (CORBA) is a standard defined by the Object Management Group (OMG) that enables software components written in multiple computer languages and running on multiple computers to work together.
CRMCustomer Relationship Management.
CRONJOBTime-based job scheduler in Unix-like computer operating systems.
CSPCustomer Selected PIN.
CSVComma-Separated Values. Comma separated Values file contains different values separated by a delimiter, which acts as a database table or an intermediate form of a database table
CURRENT ACCOUNTEnables users to deposit, withdraw and transact at a lesser cost on banking fees or on a packaged deal for bundles transaction amounts at a single monthly fee.
CUSCustomer Entity. End Consumer consuming the service of the PMT Client.
DBADatabase Administration
DBDatabase. A database is an organized collection of data.
DBMSDatabase Management System. A software package designed to define, manipulate, retrieve and manage data in a database.
DEVDevelopment
DEPLOYMENTThe processes involved in getting new software or hardware up and running properly in its environment, including installation, configuration, running, testing, and making necessary changes.
DMZA demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the Internet.
DNSDomain Name Service. A distributed hierarchical naming system for computers, services, or any resource connected to the Internet or a private network.
DRDisaster Recovery. The process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity.
EFTElectronic funds transfer. The electronic exchange, transfer of money from one account to another.
ENDPOINTWhere a service connects to the network. In a service-oriented architecture, any single network interaction involves two endpoints: one to provide a service, and the other to consume it. In web services, an endpoint is specified by a URI.
ERLANGErlang is a general-purpose programming language and runtime environment. Erlang has built-in support for concurrency, distribution and fault tolerance. See: http://www.erlang.org.
ERPEnterprise Resource Planning. ERP facilitates the flow of information between all business functions inside the boundaries of the organization and manages the connections to outside stakeholders.
ERPCErlang Remote Procedure Call. A remote procedure call is a method to call a function on a remote node and collect the answer.
ESCROW ACCOUNTAn Escrow Account is a financial instrument held by a third party on behalf of two parties
E1E-carrier level 1, or E1 carrier. E-carrier is a European telecommunications standard. The level 1 is a wire technology used by telecommunication operators with a data rate of2Mbit/s.
FAILOVERSwitching to a redundant or standby server, system, hardware or environment upon the failure or abnormal termination of the previously active application, server, system, hardware component, or network in a controlled environment.
FEFront-end.
FHSFile System Hierarchy Standard. Defines the directory structure and directory contents in Linux operating systems.
FICAFinancial Intelligence Centre Act (FICA) The purpose of FICA is to combat money laundering activities by, among other things, establishing a Financial Intelligence Centre and imposing certain duties on institutions and other persons that might be used for money laundering purposes.
FRSFunctional Requirements Specification documents the operations and activities that a system must be able to perform.
GENOBJECTGeneral Data Object.
GN6Basic FICA registration that allows customers to transact to R25000 and transfer up to R1000 per day
GPRSGeneral Packet Radio Service. A technology for radio transmission of small packets of data between cellular phones and the Internet.
GREPA Unix command used to search files for the occurrence of a string of characters that matches a specified pattern.
GSMGlobal System for Mobile communications. A standard to describe protocols for second generation (2G) digital cellular networks.
GUIGraphical User Interface.
GWGateway. A gateway is an internetworking system capable of joining together two networks that use different base protocols.
HLRHome Location Registry. The main database of permanent subscriber information for a mobile network.
HSMA hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing.
HTMLHyper Text Markup Language is a standardised system for tagging text files to achieve font, colour, graphic, and hyperlink effects on World Wide Web pages.
HTTPHypertext Transfer Protocol. A protocol (utilizing TCP) to transfer hypertext requests and information between servers and browsers.
HTTPSSecure Hypertext Transfer Protocol.
HYBRID SLAA Hybrid SLA is used when a partnership exists between the entity and PMT and the costs of the work done are shared between the two partners
ICCIDIntegrated Circuit Card Identifier: a physical number printed onto a SIM card by an MNO during SIM Personalisation.
IDLInterface Description Language (or Interface Definition Language). A specification language used to describe a software component's interface.
IETFInternal Engineering Task Force is a body that defines standard Internet operating protocols such as TCP/IP.
IMEINumber used to identify a phone - 3GPP, iDEN mobile phones and satellite phones.
IMPSInstant Messaging and Presence Service.
IMSIInternational Mobile Subscriber Identity. A unique number usually fifteen digits associated with all GSM and UMTS network mobile phone users. It is stored in the SIM inside the phone and is sent by the phone to the network.
INThe Intelligent Network, typically stated as its acronym IN, is a network architecture intended both for fixed as well as mobile telecom networks. It allows operators to differentiate themselves by providing value-added services in addition to the standard telecom services such as PSTN, ISDN and GSM services on mobile phones.
IN -BUNDLERates that are charged for a service that is part of a bundle. E.g If you get 25 free sms a month, the “in-bundle” rate is R0.00 until all 25 SMS’s are used.
INVESTMENT ACCOUNTIs an account held at a financial facility for the purpose of a long-term investment for capital preservation, growth or fixed income.
IoDSAThe Institute of Directors in Southern Africa NPC (IoDSA) is a professional body recognised by the South African Qualifications Authority (SAQA) and a non-profit company (NPC) that exists to promote corporate governance, and to maintain and enhance the credibility of directorship as a profession
IORInteroperable Object Reference. A CORBA reference that uniquely identified an object on a remote CORBA server.
IPInternal Protocol.
ITInformation Technology
IVRInternal Voice Response.
ISDNAn international communications standard for sending voice, video and data over digital telephone lines or normal telephone wires. ISDN supports data transfer rates of 64kbps.
ISOInternational Organization for Standardization. An international-standard-setting body composed of representatives from various national standards organizations.
ISO8583International Standards Organization standard 8583. A meta-protocol providing a set of rules for the definition of financial transaction protocols.
ISTQBThe International Software Testing Qualifications Board (ISTQB) is a software testing qualification certification organisation that operates internationally.
JPEGJoint Photographic Experts Group.
LACLocation Area Code. A LAC is used for paging in order to indicate in which Location Area a mobile subscriber is currently situated.
LANLocal Area Network
LBSLocation-Based Services. An information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device.
LDAPLightweight Directory Access Protocol.
MANDATE ACCOUNTAlso known as a joint/shared account, is a bank account shared by two or more individuals.
MAPMobile Application Part. An SS7 protocol, which provides an application layer for the various nodes in GSM and UMTS mobile core, networks and GPRS core networks to communicate with each other in order to provide services to mobile phone users.
MCCMobile Country Code. A three-digit number uniquely identifying a given country.
MERCHANT ACCOUNTA Merchant account is a type of bank that allows businesses to accept payments by payment cards
MERMerchant Entity. Merchant that sells or distributes goods and services.
MIBManagement Information Base. It comprises a collection of objects in a (virtual) database used to manage entities (such as routers and switches) in a network.
MIDPMobile Information Device Profile. MIDP is a specification published for the use of Java on embedded devices such as mobile phones and PDAs.
MISManagement Information System. An organized collection of people, procedures, software, databases and devices that provide routine information to managers and decision makers.
MMSMultimedia Messaging Service. A system that enables cellular phones to send and receive pictures and sound clips as well as text messages.
MMTMobile Money Transfer. An E-Money management system.
MNCMobile Network Code. A two or three digit number used to uniquely identify a given network from within a specified country. The MNC is part of the IMSI.
MNOMobile Network Operator. A telephone company that provides services for mobile phone subscribers.
MOBILE ORIGINATINGTraffic or commands that originate from the End Users Mobile device
MOBILE TERMINATINGTraffic or commands that terminate at the End Users Mobile device
MPLSMulti Protocol Label Switching
MSINMobile Subscriber Identification Number: a subset of the IMSI, a number used to identify the subscriber identity.
MSISDNMobile Station International integrated Systems Digital networking Number. A number uniquely identifying a subscription in a GSM or UMTS mobile network. Simply put, it is the telephone number to the SIM card in a mobile/cellular phone.
MSUMessage Signalling Unit. The basic data exchange unit in SS7 networks.
MTPMessage Transfer Part. Part of the Signalling System 7 (SS7) used for communication in Public Switched Telephone Networks. MTP is responsible for reliable, unduplicated and in-sequence transport of SS7 messages between communication partners.
NATNetwork Address Translation. In computer networking, network address translation is the process of modifying network address information in datagram (IP) packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another.
NEFTNational Electronic Fund Transfer.
NESTATNetwork Statistics. A command-line tool that displays the status of network connections (both incoming and outgoing) TCP, UDP, RAW, or UNIX.
NFCNear Field Communication. Short-range high frequency wireless communication technology, which enables the exchange of data between devices over about a 10-centimeter distance.
NOTICE DEPOSIT ACCOUNTIs an account that requires a 7-32 day notice for funds to be withdrawn.
NOTICE POOLING ACCOUNTThis account maximises the effectiveness of working capital, achieves flexibility and realises interest savings with either a single currency or multi-currency pooling services.
NRCNoise Reduction Coefficient.
NSLOOKUPName Server Lookup. A UNIX utility used to query Internet domain name servers. An nslookup is usually used to find the IP address corresponding to a hostname.
NTPNetwork Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
NUMPORTThe method of determining whether a mobile number has changed from one Mobile Network to another
ODOverdraft.
OSOperating System.
OPSOperations
ORBERThe Orber application is a CORBA-compliant Object Request Broker (ORB), which provides CORBA functionality in an Erlang environment. Essentially, the ORB channels communication or transactions between nodes in a heterogeneous environment.
OTPOTP (Open Telecom Platform) is a large collection of libraries for Erlang to do everything from compiling ASN.1 to providing a WWW server. Most projects using “Erlang” are actually using “Erlang/OTP”, i.e. the language and the libraries. OTP is also open source.
OTPOne Time PIN.A one-time pin is a pin that is valid for only one login session or transaction.
OUTSOutsystems Platform Entity.
OWASPOpen Web Application Security Project.
PATCHA small piece of code inserted into a program to improve its functioning or to correct an error.
PCI-DSSThe Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes.
PDFPortable Document Format.
PDFPersonal development planning is the process of creating an action plan based on awareness, values, reflection, goal-setting and planning for personal development within the context of a career, education, relationship or for self-improvement.
PIDProcess Identifier is the number assigned to a process by the operating system.
PIIPersonal Identify Information.
PINPersonal Identification Number, this number is used with the SMS interface and Mobile Phone Application (MAP), and should be kept private. It is 4 to 5 digits long.
PKIPublic Key Infrastructure.
PINGPing is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.
PIRPost Implementation Review. Review held after the implementation of a change to determine if the change has been implemented successfully and subsequently, if the expected benefits have been obtained.
PMTPattern Matched Technologies Pty (Ltd)
POCDATARAProtection of Constitutional Democracy Against Terrorist and Related Activities Act.
PORTA port is an endpoint of communication in an operating system
POSPoint of sale. A term used in the payments industry that refers to the physical location where a payment transaction takes place. POS is also used to describe credit card payment acceptance systems that are designed for the place of sale, such as card swipe terminals.
POSGRESQLAn object-relational database management system often referred to simply as Postgres.
POST-PAIDSubscriber is billed for their tariff plan/package and usage, usually after the billing cycle/month.
PRE-PAIDPayment in advance for airtime by purchasing vouchers/credit.
PPPayment Processor. A system that enables secure, real time processing of online credit and debit card transactions, including authentication and verification.
P2PPeer-to-peer. A network or data communications in which no dedicated server is involved.
QAQuality Assurance
RBUReversed Billed URL. A configuration setup on a URL where the client is not charged for the data when accessing the configured URL via their internet enabled device
REVOLVING ACCOUNTA revolving account is an account created by a lender to represent debts where the outstanding balance does not have to be paid in full every month by the borrower to the lender.
RFIDRadio-frequency identification. The wireless non-contact use of radio frequency electromagnetic fields to transfer data for the purpose of automatically identifying and tracking tags attached to objects.
RFIRequest for Information.
RFPRequest for proposal
RFQRequest for quote.
RPCRemote procedure call, a network protocol that allows a computer program running on one host to cause code to be executed on another host.
SASSerially Attached SCSI. A method used in accessing computer peripheral devices that employs a serial means of digital data transfer over thin cables.
SDLCThe systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
SCSISmall Computer System Interface, or SCSI (pronounced scuzzy), is a set of standards for physically connecting and transferring data between computers and peripheral devices.
SCTPStream Control Transmission Protocol (SCTP) is a Transport Layer protocol, serving in a similar role as the popular protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
SIMA smart card inside a mobile phone, carrying an identification number unique to the owner, storing personal data, and preventing operation if removed
SIM SECURITISATIONA method of securing access to applications if the SIM Card data such as IMEI, number last ported or MNO has changed
SIGTRANSIGTRAN is the name, derived from signalling transport, of the Internet Engineering Task Force (IETF) working group that produced specifications for a family of protocols that provide reliable datagram service and user layer adaptations for Signalling System 7 (SS7) and ISDN communications protocols. The SIGTRAN protocols are an extension of the SS7 protocol family. It supports the same application and call management paradigms as SS7 but uses an Internet Protocol (IP) transport called Stream Control Transmission Protocol (SCTP).
SLAA service level agreement (SLA) is a contract between a service provider (either internal or external) and the end user that defines the level of service expected from the service provider. SLAs are output-based in that their purpose is specifically to define what the customer will receive.
SMPPShort message peer-to-peer protocol. A telecommunications industry protocol for exchanging SMS messages between SMS peer entities such as short message service centres and/or External Short Messaging Entities.
SMSShort Message Service. A system that enables cellular phone users to send and receive text messages.
SMSCShort Message Service Centre (also SMS-C). A network element in the mobile telephone network, which delivers SMS messages.
SNMPSimple Network Management Protocol. It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects.
SOAService-oriented architecture. A flexible set of design principles used during the phases of systems development and integration in computing.
SOAPSimple Object Access Protocol. SOAP is a protocol for exchanging XML-based messages over computer networks, normally using HTTP/HTTPS. SOAP forms the foundation layer of the Web services stack, providing a basic messaging framework upon which abstract layers can be built.
SQLStructured Query Language
SS7Special Sensor Microwave/Imager. A sophisticated telecommunications protocol that provides out-of-band signalling and a data interface between phone company switches for the express purpose of reducing congestion in the PSTN.
SSLSSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser.
SSVSIM Swop Verification. The method in determining whether a mobile number has moved from one sim card to another
STPSignal Transfer Point. A router that relays SS7 messages between signalling end-points (SEPs) and other signalling transfer points.
TCAPTransaction Capabilities Application Part. Part of the SS7 protocol that provides transactions within the signalling network. A typical use of TCAP is to verify a card number, for the credit card calling service.
TCPTransmission Control Protocol. One of the core protocols of the Internet Protocol Suite.
TCP/IPThe Internet Protocol Suite is the set of communications protocols used for the Internet and other similar networks. It is commonly also known as TCP/IP, named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard.
TEIThe Ethics Institute is an independent public institute producing original thought leadership and offering a range of ethics-related services and products.
TPFTransaction Processing Function component.
TPMTransactions per Minute. The number of database transactions performed per minute.
TPSTransactions per Second. The number of database transactions performed per second.
TRXTransaction. This could denote a Transaction Use Case or be used as shorthand for Transaction.
TSSTechnical system specification
TunnelComputer networks use a tunnelling protocol when one network protocol (the delivery protocol) encapsulates a different payload protocol. By using tunnelling one can (for example) carry a payload over an incompatible delivery-network, or provide a secure path through an untrusted network.
TXTText File Extension. A plain text document without any formatting data, readable on virtually all computer platforms and with all text editors and viewers in the world.
UATUser acceptance testing. The testing cycle in which the client signs off the newly created and tested features and improvements.
OUT OF BUNDLERates that are charged for a service once a bundle is exhausted. E.g If you get 25 free sms a month, the “out-of-bundle” rate is 70c per sms after all 25 free SMS’s are used up.
URLUniversal Resource Locator. A URL is a formatted text string used by Web browsers, email clients and other software to identify a network resource on the Internet.
USINUnique Subscriber Identity Number.
USRUser Entity. A User is a business actor accessing a CAP interface.
USSDUnstructured Supplementary Service Data. A USSD Gateway routes USSD messages based upon the ability of the delivery agent or the source to send and receive them. As USSD is a session-based protocol unlike its siblings (SMS and MMS), therefore, the session needs to be allocated to each and every interaction.
VASValue-added service. A telecommunications industry term for non-core services or, in short, all services beyond standard voice calls and fax transmissions. For mobile phones, while technologies like SMS, MMS and GPRS are usually considered value- added services, a distinction may also be made between standard (peer-to-peer) content and premium-charged content.
VCOSVoucher Class of service.
VCRVoucher generating Unit.
VLANVirtual Local Area Network
VPNA virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
VVNVoucher Verification Number. A three-digit number that can be used to redeem vouchers in special cases where the PIN is not available (In some cases also referred to as VVV – Voucher Verification Value).
WANWide Area Network
WAPWireless Application Protocol. A set of protocols for connecting cellular phones and other radio devices to the Internet.
WASPWireless Application Service Provider. A third party service provider who creates and distributes mobile content to subscribers via a MNO’s network and infrastructure. 
WASPAWireless Application Service Provider Association.
WEB SERVICEA Web service (also Web Service) is defined by the W3C as "a software system designed to support interoperable Machine to Machine interaction over a network." Web services are frequently just Web APIs that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. The W3C Web service definition encompasses many different systems, but in common usage the term refers to clients and servers that communicate using XML messages that follow the SOAP standard.
WSDLWeb Services Description Language. An XML-based language that provides a model for describing Web services.
XMLExtensible Markup Language. A meta-language that allows users to define their own customized markup languages.
XLSExcel File Format.
XMLRPCExtensible Markup Language Remote Procedure Call. A protocol, which uses XML to encode its calls and HTTP as a transport mechanism.
YOUTH ACCOUNTThe Youth Account provides savings on banking fees for people aged 18 years and younger.
W3CW3C is the main international standards organisation for the World Wide Web.
3DESTriple Data Encryption Standard.

Queries or concerns?

If you have any queries or would like to more information please send us a message, mail or give us a call.
Phone: +27 861 000 700 (RSA only)
Phone: +27 11 541 0441 (International)
Phone: +27 10 271 0680 (International)
Email: administration@patternmatched.com

Send a message




Queries or Questions?

If you have any queries or would like to more information please send us a message, mail or give us a call.
Phone: +27 861 000 700 (RSA only)
Phone: +27 11 541 0441 (International)
Phone: +27 10 271 0680 (International)
Email: administration@patternmatched.com

Send a message