Browse Definitions :
Definition

embedded device

An embedded device is an object that contains a special-purpose computing system. The system, which is completely enclosed by the object, may or may not be able to connect to the Internet.

Embedded systems have extensive applications in consumer, commercial, automotive, industrial and healthcare markets. It's estimated that by 2015, over 15 billion embedded devices will be connected to the Internet, a phenomenon commonly referred to as the Internet of Things

Generally, an embedded device's operating system will only run a single application which helps the device to do its job. Examples of embedded devices include dishwashers, banking ATM machines, routers, point of sale terminals (POS terminals) and cell phones. Devices that can connect to the Internet are called smart or intelligent. If an embedded device can not connect to the Internet, it is called dumb.

Embedded devices in complex manufactured products, such as automobiles, are often headless. This simply means that the device's software does not have a user interface (UI). In such cases, an in-circuit emulator (ICE) is temporarily installed between the embedded device and an external computer to debug or update the software.

Because embedded systems have limited computing resources and strict power requirements, writing software for embedded devices is a very specialized field that requires knowledge of both hardware components and programming.

See also: embedded system, embedded systems programming

This was last updated in April 2014
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close