Browse Definitions :

Smart grid

Terms related to smart grids, including definitions about utility electricity delivery systems and words and phrases about smart meters and distributing, monitoring and billing electrical power.

SMA - WSA

  • smart grid - Smart grid is a generic label for the application of computer intelligence and networking abilities to a dumb electricity distribution system.
  • smart home hub (home automation hub) - A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.
  • smart meter hack - A smart meter hack is the unauthorized access of such a device or its data transmissions for the purpose of obtaining or altering communications between it and the responsible utility.
  • smart sensor - A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then process data before passing it on.
  • surge suppressor (surge protector) - A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients.
  • susceptance - Susceptance (symbolized B) is an expression of the ease with which alternating current (AC) passes through a capacitance or inductance.
  • system operator (sysop) - A sysop is the person who runs a computer server.
  • system-on-a-chip (SoC) - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • tesla (T) - The tesla (symbolized T) is the standard unit of magnetic flux density.
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.
  • volt per meter (V/m) - The standard unit of electric field (E-field) strength is the volt per meter (V/m).
  • volt-ampere (VA) - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • voltage regulator module (VRM) - A voltage regulator module (VRM) is an installable module that senses a computer's microprocessor voltage requirements and ensures that the correct voltage is maintained.
  • Wi-Fi HaLow (802.11ah) - HaLow is based on the WiFi Alliance 802.
  • wireless access point - A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN).
  • WRAN (wireless regional area network) - A wireless regional area network (WRAN) is techology based on IEEE 802.
  • WSAN (wireless sensor and actuator network) - A wireless sensor and actuator network (WSAN) is a group of sensors that gather information about their environment and actuators, such as servos or motors, that interact with them.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close