Browse Definitions :

IoT Agenda

IoT Agenda covers all aspects of Internet of Things (IoT) technology and strategy as it relates to enterprise IT, including the technologies that enhance and enable internal business processes and the resulting IoT products.

Go to:  IoT Agenda

Recently on  IoT Agenda

The cold truth about weather for facilities managers -- and how IoT can help

By collecting and analyzing real-time weather data, says ServiceChannel's Hugues Meyrath, facilities managers can increase efficiency, cost savings and uptime of their businesses. Learn how.

More Highlights
Definitions
  • internet of things (IoT)

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  • wearable computer

    A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.

  • Artificial Intelligence of Things (AIoT)

    The Artificial Intelligence of Things (AIoT) is the combination of artificial intelligence (AI) technologies with the Internet of Things (IoT) infrastructure to achieve more efficient IoT operations, improve human-machine interactions and enhance data management and analytics.

Browse IoT Agenda Topics

Business

Exploring the Internet of Things from an Enterprise perspective? Here we focus on security, network connectivity, data analytics and storage, product development and manufacturing, strategies, and IoT business models.

Recent Definitions

  • internet of things (IoT)

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  • wearable computer

    A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.

  • delivery drone

    A delivery drone is a type of unmanned aerial vehicle (UAV) used for distributing packages to consumers through advanced AI technology.

Highlights

More Business Topics

Back to Top

Network

The IoT network infrastructure topic section offers comprehensive resources on building and managing a network architecture capable of handling the Internet of Things. Learn about the advantages and disadvantages of different technologies and get guidance on various frameworks and protocols such as Bluetooth LTE, Wi-Fi and Zigbee.

Recent Definitions

  • spray-on antenna

    A spray-on antenna is a conductive material that can be dissolved in liquid and sprayed onto a surface to create a lightweight, flexible antenna.

  • wearable technology

    Wearable technology is any kind of electronic device designed to be worn on the user’s body.

  • quantum internet

    The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.

Highlights

More Network Topics

Back to Top

Platform

The Internet of Things platform topic section outlines the systems on which IoT applications and programs run. Read through for comprehensive resources on available platforms and vendors, and compare various platforms that aim to be the platform of choice, including AllJoyn, Predix, Brillo, Arduino and Edison.

Recent Definitions

  • device mesh

    A device mesh is an ad hoc network in the internet of things (IoT). The term, which was coined by research firm Gartner, describes an ever-changing mesh network consisting of the endpoint devices that people use to access applications, information and other people.

  • microcomputer

    A microcomputer is a complete computer on a smaller scale and is generally a synonym for the more common term, personal computer or PC, a computer designed for an individual.

  • RFID tagging

    RFID tagging uses small radio frequency identification devices to track and identify objects.

Highlights

More Platform Topics

Back to Top

Security

The Internet of Things security topic section includes comprehensive resources about identity and access management for IoT, attack vectors and mitigations, intellectual property protection, preventing and defending against threats and more.

Recent Definitions

  • friendly virus

    A friendly virus is malware that is designed to be helpful in some way rather than destructive or annoying, as is typically the case with conventional viruses.

  • IoT security (internet of things security)

    IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).

  • IoT policy (Internet of Things policy)

    An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.

Highlights

More Security Topics

Back to Top

Industry and Verticals

The use cases for Internet of Things deployments are tremendous. Learn about various IoT implementations across verticals including healthcare, industrial and manufacturing.

Recent Definitions

  • wearable computer

    A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.

  • Artificial Intelligence of Things (AIoT)

    The Artificial Intelligence of Things (AIoT) is the combination of artificial intelligence (AI) technologies with the Internet of Things (IoT) infrastructure to achieve more efficient IoT operations, improve human-machine interactions and enhance data management and analytics.

  • AI hearing aid

    An AI hearing aid is a wearable device that can incorporate capabilities such as fitness tracking, audio streaming and translation in addition to the conventional function of enhancing sound for the user.

Highlights

More Industry and Verticals Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close