Browse Definitions :

Internet of Things

The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human interaction.

5G - LPW

  • 5G NR (new radio) - 5G NR (new radio) is a set of standards that replace the LTE network 4G wireless communications standard.
  • active RFID (active radio frequency identification) - Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
  • active sensor - An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection.
  • actuator - An actuator is a mechanism that turns energy into a controlled motion.
  • addressability - Addressability is the capacity for an entity to be targeted and found.
  • Advanced Message Queuing Protocol (AMQP) - Advanced Message Queuing Protocol (AMQP) is an open source published standard for asynchronous messaging by wire.
  • advanced metering infrastructure (AMI) - Advanced metering infrastructure (AMI) is an architecture for automated, two-way communication between a smart utility meter with an IPaddress and a utility company.
  • agbot (agricultural robot) - An agbot, also called an agribot, is an autonomous robot used in farming to help improve efficiency and reduce reliance on manual labor.
  • agri-tech - Agri-tech is the use of technology for farming that is developed to improve efficiency and profitability.
  • Alexa Voice Services (AVS) - Alexa Voice Service (AVS) is Amazon's suite of services built around its voice-controlled AI assistant for the home or other environments.
  • Amazon Prime Air drone - Amazon's Prime Air drone is a delivery system in development that uses remote-controlled robotic vehicles to transport goods from the warehouse to the consumer.
  • ambient backscatter - Ambient backscatter is a method of networking by way of alternately reflecting and absorbing radio frequencies (RF) in an environment.
  • ambient intelligence (AmI) - Ambient intelligence is the element of a pervasive computing environment that enables it to interact with and respond appropriately to the humans in that environment.
  • Android Things - Android Things is an embedded operating system made by Google for Android-based IoT devices.
  • Apple HomePod - Apple HomePod is the company’s Wi-Fi connected smart speaker that supports multi-room setups.
  • aquaculture - Aquaculture is the farming of aquatic animals or plants, including breeding, raising and harvesting in all types of water environments in controlled conditions.
  • Artificial Intelligence of Things (AIoT) - The Artificial Intelligence of Things (AIoT) is the combination of artificial intelligence (AI) technologies with the Internet of Things (IoT) infrastructure to achieve more efficient IoT operations, improve human-machine interactions and enhance data management and analytics.
  • AWS IoT (Amazon Web Services internet of things) - AWS IoT is an Amazon Web Services platform that collects and analyzes data from internet-connected devices and sensors -- called the internet of things -- and connects that data to AWS cloud applications.
  • blockchain dApp - A blockchain dApp is an evolving concept that describes a blockchain-enabled website in which the management of assets and organizations is decentralized.
  • Blue Gene - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • Bluetooth Low Energy (Bluetooth LE) - Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.
  • bring your own wearables - Bring your own wearables (BYOW) is a trend toward the use of employee-owned wearable computing devices in a business setting.
  • car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.
  • Cellular Vehicle to Everything (C-V2X) - Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
  • Chief IoT Officer (Chief Internet of Things Officer) - A Chief Internet of Things Officer is an enterprise executive in charge of how smart products are developed and implemented to best support company objectives and goals.
  • cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
  • coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
  • Compute Card (Intel Compute Card) - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Constrained Application Protocol (CoAP) - Constrained Application Protocol (CoAP) is a protocol for low-power compute-constrained devices to operate in the internet of things (IoT).
  • context awareness - Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly.
  • control network - A control network is a network of nodes that collectively monitor, sense, and control or enable control of an environment for a particular purpose.
  • critical infrastructure and key resources (CIKR) - Critical infrastructure and key resources (CIKR) is the collective of natural and man-made resources, along with the systems for their processing and delivery, upon which a nation depends on for functioning.
  • dedicated short-range communication (DSRC) - Dedicated short-range communication (DSRC) is a wireless communication technology designed to allow automobiles in the intelligent transportation system (ITS) to communicate with other automobiles or infrastructure technology.
  • deep learning (deep neural network) - Deep learning is an aspect of artificial intelligence (AI) that is concerned with emulating the learning approach that human beings use to gain certain types of knowledge.
  • device attack - A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access.
  • digital pill - A digital pill is a capsule with embedded sensors that send healthcare-related data to external parties.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • drone (UAV) - A drone, in technological terms, is an unmanned aircraft.
  • drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
  • e-textile (electronic textile) - An e-textile is a fabric developed with electronics in it to enable conductivity.
  • edge computing - Edge computing is an IT architecture in which raw data is processed as near to the data source as possible instead of being sent over the Internet to a remote data center for processing.
  • ELF (extremely low frequency) - ELF (extremely low frequency) refers to an electromagnetic field having a frequency much lower than the frequencies of signals typically used in communications.
  • embedded device hacking - Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device.
  • embedded firmware - Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
  • embedded operating system - An embedded operating system (OS) is a specialized operating system designed to perform a specific task for a device that is not a computer.
  • embedded software - Hardware makers use embedded software to control the functions of various hardware devices and systems.
  • embedded system - An embedded system is a combination of computer hardware and software, either fixed in capability or programmable, designed for a specific function or functions within a larger system.
  • embedded system security - While trends like BYOD, the IoT and automation speed ahead, the security of embedded systems often lags.
  • embedded systems programming - Embedded systems programming is the programming of an embedded system in some device using the permitted programming interfaces provided by that system.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
  • fast data - Fast data is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value.
  • FBI Alert Number I-091015-PSA - FBI Alert Number I-091015-PSA is a public service announcement from the United States Federal Bureau of Investigation to inform individuals and organizations about the importance of Internet of Things (IoT) security, including potential vulnerabilities and protective measures that should be taken to mitigate risk associated with them.
  • fog computing (fog networking, fogging) - Fog computing, also known as fog networking or fogging, is a decentralized computing infrastructure in which data, compute, storage and applications are distributed in the most logical, efficient place between the data source and the cloud.
  • fourth industrial revolution - The fourth industrial revolution is the current environment in which disruptive technologies and trends such as the Internet of Things (IoT) and artificial intelligence (AI) are changing the way we live and work.
  • FPV drone (first-person view drone) - An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.
  • Fuchsia OS - Fuchsia OS is a cross-device, open source operating system from Google.
  • G-putty - G-putty is a polysilicone polymer infused with graphene.
  • gateway - A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.
  • Google Glass - Google Glass is a wearable, voice-controlled Android device that resembles a pair of glasses and displays information directly in the user's field of vision.
  • haptics - Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.
  • headless system - A headless system is a computer that operates without a monitor, graphical user interface (GUI) or the typical peripherals used to control it, such as a keyboard and mouse.
  • HiP7 and HiP8 - HiP7 and HiP8 are abbreviations for two versions of HiPerMOS, a complementary-metal-oxide-semiconductor (CMOS) microchip technology invented by Motorola.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • Identity of Things (IDoT) - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
  • IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
  • in-circuit emulator (ICE) - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • industrial automation - Industrial automation is the control of machinery and processes used in various industries by autonomous systems, which may involve robots or computer software.
  • Industrial Internet Consortium (IIC) - The Industrial Internet Consortium (IIC) is a non-profit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine environments.
  • industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes.
  • injectable ID chip (biochip transponder) - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • INSTEON protocol - INSTEON protocol is a communication language for home automation device control by Smartlabs.
  • Intel Atom - Atom is Intel's family of x86 and x86-64 processors that are optimized for small computing devices, such as smartphones and mobile Internet devices (MIDs).
  • Intel Compute Card - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Intel Quark - Intel Quark is an embedded system-on-a-chip (SoC) processor design intended for smaller mobile devices like wearable computers.
  • Intel Xeon D-2100 - The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of Internet of Things (IoT) and smart devices.
  • intelligent device - An intelligent device is any type of equipment, instrument, or machine that has its own computing capability.
  • intelligent electronic device (IED) - An intelligent electronic device (IED) is a device that is added to industrial control systems (ICS) to enable advanced power automation.
  • interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
  • Internet of Everything (IoE) - The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
  • internet of things (IoT) - The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
  • Internet of Things privacy (IoT privacy) - Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.
  • intranet of things - An intranet of things is, depending on your viewpoint, either an element of the all-encompassing Internet of Things (IoT) or an alternative model that uses similar systems and technologies but limits the accessibility of its things to the corporate network.
  • IoMT (Internet of Medical Things) or healthcare IoT - The Internet of Medical Things (IoMT) is a network of machine-to-machine communication between medical devices and healthcare IT systems.
  • IoT analytics (Internet of Things analytics) - IoT analytics is the application of data analysis tools and procedures to realize value from the huge volumes of data generated by connected Internet of Things devices.
  • IoT attack surface - The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.
  • IoT botnet (Internet of Things botnet) - An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.
  • IoT Cloud (Salesforce IoT Cloud) - IoT Cloud is a platform from Salesforce.
  • IoT devices (internet of things devices) - IoT devices, or any of the many things in the internet of things, are nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.
  • IoT gateway - An Internet of Things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
  • IoT middleware (Internet of Things middleware) - Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
  • IoT OS (Internet of Things operating system) - An IoT OS is an operating system that is designed to perform within the constraints that are particular to Internet of Things devices, including restrictions on memory, size, power and processing capacity.
  • IoT policy (Internet of Things policy) - An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.
  • IoT security (internet of things security) - IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).
  • IPv6 address - An IPv6 address is a 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme.
  • item-level RFID (item-level radio frequency identification) - Item-level RFID involves individual unit tagging, as opposed to tagging cartons or pallets of items.
  • LiteOS - LiteOS is a lightweight, open source IoT device and smartphone OS from the Chinese smartphone manufacturer Huawei.
  • LoRa Alliance - The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).
  • LPWAN (low-power wide area network) - Low-power WAN (LPWAN) is a wireless wide area network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges.
  • M2M economy (machine-to-machine economy) - A machine-to-machine (M2M) economy is one in which machines are autonomous market participants that have their own bank accounts.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • GPS jamming

    GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

Close