Browse Definitions :

Smart grid

Terms related to smart grids, including definitions about utility electricity delivery systems and words and phrases about smart meters and distributing, monitoring and billing electrical power.

SMA - WSA

  • smart grid - Smart grid is a generic label for the application of computer intelligence and networking abilities to a dumb electricity distribution system.
  • smart home hub (home automation hub) - A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.
  • smart meter hack - A smart meter hack is the unauthorized access of such a device or its data transmissions for the purpose of obtaining or altering communications between it and the responsible utility.
  • smart sensor - A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then process data before passing it on.
  • surge suppressor (surge protector) - A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients.
  • susceptance - Susceptance (symbolized B) is an expression of the ease with which alternating current (AC) passes through a capacitance or inductance.
  • system operator (sysop) - A sysop is the person who runs a computer server.
  • system-on-a-chip (SoC) - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • tesla (T) - The tesla (symbolized T) is the standard unit of magnetic flux density.
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.
  • volt per meter (V/m) - The standard unit of electric field (E-field) strength is the volt per meter (V/m).
  • volt-ampere (VA) - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • voltage regulator module (VRM) - A voltage regulator module (VRM) is an installable module that senses a computer's microprocessor voltage requirements and ensures that the correct voltage is maintained.
  • Wi-Fi HaLow (802.11ah) - HaLow is based on the WiFi Alliance 802.
  • wireless access point - A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN).
  • WRAN (wireless regional area network) - A wireless regional area network (WRAN) is techology based on IEEE 802.
  • WSAN (wireless sensor and actuator network) - A wireless sensor and actuator network (WSAN) is a group of sensors that gather information about their environment and actuators, such as servos or motors, that interact with them.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close