Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
What is IoT security?
IoT security is the technology segment focused on safeguarding connected devices and networks in the internet of things. Continue Reading
What is IIoT (industrial internet of things)?
The industrial internet of things (IIoT) is the use of smart sensors, actuators and other devices, such as radio frequency identification tags, to enhance manufacturing and industrial processes. Continue Reading
What is sensor data? Examples of sensors and their uses
Sensor data is the output of a device that detects, analyzes and responds to some type of input from the physical environment. Continue Reading
-
What is a smart sensor and how does it work?
A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions when it detects specific input. It can also process data before passing it on. Continue Reading
What is internet of things device management (IoT device management)?
Internet of things device management (IoT device management) is the processes and tools used to remotely register, configure, provision, maintain and monitor connected devices from a centralized platform. Continue Reading
-
Definitions to Get Started
- What is IoT security?
- What is IIoT (industrial internet of things)?
- What is sensor data? Examples of sensors and their uses
- What is a smart sensor and how does it work?
- What is internet of things device management (IoT device management)?
- What is the artificial intelligence of things (AIoT)?
- What are IoT devices?
- What is a smart home? Everything you need to know
What is the artificial intelligence of things (AIoT)?
The artificial intelligence of things (AIoT) is the combination of AI technologies and the internet of things (IoT) infrastructure.Continue Reading
What are IoT devices?
Internet of things (IoT) devices are nonstandard computing hardware -- such as sensors, actuators or appliances -- that connect to a wired or wireless network to transmit data.Continue Reading
What is a smart home? Everything you need to know
A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.Continue Reading
What is an IoT gateway?
An IoT gateway is a physical device or software program that serves as the connection point between the cloud and internet of things devices, such as controllers, sensors and smart devices.Continue Reading
How to build a successful IoT strategy in 10 steps
IoT is key to digital transformation, offering improved efficiency, cost reduction and enhanced customer experience. Success requires strategy and secure execution.Continue Reading
-
What is internet of things privacy (IoT privacy)?
Internet of things privacy, or IoT privacy, is the special consideration required to protect individuals' information from exposure in the IoT environment.Continue Reading
What is IoT (internet of things)?
The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud.Continue Reading
What is the internet of medical things (IoMT)?
The internet of medical things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks.Continue Reading
What is IoT monitoring? Key use cases
IoT monitoring is the method of finding, configuring, securing, tracking and managing devices connected throughout an IoT environment.Continue Reading
What is IoT data analytics?
IoT data analytics is a comprehensive method of collecting, storing, processing, analyzing and, ultimately, presenting the vast amounts of data culled from IoT devices.Continue Reading
How IoT data collection works
IoT data collection enables organizations to constantly gather and analyze physical measurements, location data and operational metrics with internet-connected sensors and devices.Continue Reading
6 IoT architecture layers and components explained
Having a clearly defined IoT architecture framework greatly improves the chances for success of an enterprise's connected deployment.Continue Reading
AI and IoT: How do the internet of things and AI work together?
AI can compound the benefits of IoT by adding humanlike awareness and decision-making to the environment at hand to ultimately increase efficiency and improve processes.Continue Reading
What is IoT integration?
IoT integration is the process of linking smart devices, applications, databases and systems to facilitate data exchange and enable automated workflows.Continue Reading
9 IoT training certifications to take your next career step
IoT training certifications offering skills in IoT development, networking and security can give tech experts an advantage, especially when IoT skills are in high demand.Continue Reading
What is a smart city?
A smart city is a municipality that uses information and communication technology to increase operational efficiency, share information with the public and improve the quality of government services and citizen welfare.Continue Reading
What is a microcomputer?
A microcomputer is a complete computer on a small scale, designed for use by one person at a time.Continue Reading
What is a unique identifier (UID)?
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.Continue Reading
What is Google Glass?
Google Glass was a wearable, voice and motion-controlled Android device that resembled a pair of eyeglasses and displayed information directly in the user's field of vision. It was discontinued in March 2023.Continue Reading
What is an embedded system?
An embedded system is a combination of computer hardware and software designed for a specific function.Continue Reading
What is a microcontroller (MCU)?
A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system.Continue Reading
What is a drone (UAV)?
A drone is an unmanned aircraft. Drones are more formally known as 'unmanned aerial vehicles' (UAVs) or 'unmanned aircraft systems.'Continue Reading
How to approach IT/OT convergence training and certification
IT/OT convergence training involves rethinking existing processes and acquiring new skills to bridge the knowledge gap in areas like business process engineering and project management.Continue Reading
What is a smart home?
Smart home and building technology enables users to control lighting, thermostats, locks and security cameras remotely but faces challenges of security and complexity.Continue Reading
How to build a functional network for rugged IoT
Rugged IoT networks are cropping up everywhere. Understanding the necessary edge computing and network requirements is crucial for deploying a successful rugged IoT network.Continue Reading
An introduction to IoT penetration testing
IoT systems are complex, and that makes checking for vulnerabilities a challenge. Penetration testing is one way to ensure your IoT architecture is safe from cyber attacks.Continue Reading
How IoT helps support sustainable manufacturing
Implementing IoT can help manufacturers with sustainability goals stay on track through monitoring and automation. IoT can also help with compliance.Continue Reading
decentralized application (DApp)
A decentralized application (DApp) is a type of distributed, open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.Continue Reading
virtual reality sickness (VR motion sickness)
Virtual reality sickness (VR motion sickness) is the physical discomfort that occurs when an end user's brain receives conflicting signals about self-movement in a digital environment.Continue Reading
Best practices for strong IoT design SLAs
Companies that hire designers to develop their IoT systems should shop around first and ensure that they have strong and comprehensive SLAs.Continue Reading
embedded systems programming
Embedded systems programming, also known as embedded programming, facilitates the development of consumer-facing devices that don't use conventional operating systems the way that desktop computers and mobile devices do.Continue Reading
transponder
A transponder is a wireless communication, monitoring or control device that picks up and automatically responds to an incoming signal.Continue Reading
thing (in the internet of things)
A thing, in the context of the internet of things (IoT), refers to any entity or physical object such as a device that forms a network and has the ability to transfer data with other devices over the network.Continue Reading
An introduction to IoT logging types and practices
Collecting IoT data logs can help IT teams spot deployment issues and security alerts. For smooth operations, admins should identify what data they need and use the right hardware.Continue Reading
A look at how IoT and embedded systems work together
Embedded systems are a necessary part of IoT devices. Read more about how they work, their components and how to select the right type for an IoT device.Continue Reading
5 embedded system terms IoT admins must know
IoT devices require technology to bring software, hardware and signal processing components together. Embedded systems combine these three elements to streamline IoT product design.Continue Reading
Get acquainted with the types of actuators in IoT
Actuators are an essential hardware component of IoT products. Familiarize yourself with how actuators work, the different types of energy sources and the use cases for them.Continue Reading
man-in-the-middle attack (MitM)
A man-in-the-middle (MitM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.Continue Reading
A look at the top 5 IoT device types
You can find IoT products in the home, factories, vehicles and hospitals. Familiarize yourself with specific devices for each of these sectors and their pros and cons.Continue Reading
smartwatch
A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.Continue Reading
embedded operating system
An embedded operating system is a specialized operating system (OS) designed to perform a specific task for a device that is not a computer.Continue Reading
What is fog computing?
Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.Continue Reading
Get started programming the internet of things
To build IoT systems, IT pros must understand the complexities of programming IoT, including integration. In this excerpt, discover the first step to design full-stack IoT.Continue Reading
How to approach programming IoT for full stack development
Learn what challenges organizations must tackle when developing end-to-end IoT systems from 'Programming the Internet of Things' author Andy King.Continue Reading
How to secure IoT devices and protect them from cyber attacks
With just a handful of security measures, organizations and workers can prevent hackers from infiltrating IoT devices and protect user privacy.Continue Reading
Ace your wireless regulatory compliance tests today
With the growing use of wireless IoT technology, device designers must take care to navigate the complexity of regulatory compliance testing and certification.Continue Reading
Achieve IoT interoperability with market knowledge, strategy
Organizations embarking on IoT projects will find it easier to say 'IoT interoperability' than to ensure it; they must consider tools and partners to overcome compatibility issues.Continue Reading
mesh network topology (mesh network)
A mesh network is a network in which devices -- or nodes -- are linked together, branching off other devices or nodes.Continue Reading
meet-in-the-middle attack
Meet-in-the-middle is a known plaintext attack that can greatly reduce the number of brute-force permutations required to decrypt text that has been encrypted by more than one key.Continue Reading
Protecting your IoT devices protects your business
Organizations use IoT security standards and frameworks to secure IoT applications, data and devices, even for a fully remote workforce going forward. IoT security is more than a technology ...Continue Reading
Design your IoT device battery life
IoT engineers have several tactics they can use to extend the battery life of devices, such as energy harvesting, power saver mode and efficient hardware design.Continue Reading
Open source IoT tools to choose in 2021
Open source platforms can make developing IoT deployments easier, but organizations have multiple options to choose from, including these seven.Continue Reading
Prove your expertise with this IoT security quiz
Think you know all there is to know about securing IoT devices on an enterprise network? Test your grasp of IoT security threats with this quiz.Continue Reading
Democratizing machine learning will transform IoT
For the smart home to succeed, what happens in the home, will have to stay in the home and become smarter without the infinite compute capability of the cloud and with features such as voice ...Continue Reading
IoT interoperability standards complicate IoT adoption
IoT interoperability has complicated IoT adoption, but organizations must navigate the selection of competing standards, such as IP or MQTT, to get the most from IoT deployments.Continue Reading
RFID (radio frequency identification)
RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or...Continue Reading
AI and IoT convergence could herald a new era of technological change
With the right planning, tools and expertise, organizations that combine AI and IoT into AIoT will deliver benefits that only AI can help predict.Continue Reading
Use a zero trust approach to combat IoT security risks
Cyber attacks on IoT and CMS have grown throughout 2020 and organizations must step up their network security measures with tactics such as zero-trust.Continue Reading
Operation IoT interoperability: Testing device compatibility
Organizations can't just connect IoT devices to their network and assume everything will work. They must test and confirm that each part can connect and cooperate.Continue Reading
Returning to live events in smart arenas
With increased precautions and IoT technology in place, consumers can find comfort in returning to in-person events at arenas or stadiums with better safety precautions to reduce the spread of germs.Continue Reading
Comprehend control loops to unlock analytics for IoT
Applying analytics to IoT quickly becomes a convoluted task. Architects must master the control loop to direct its design and deliver rapid business insights.Continue Reading
5 components of IoT streaming architecture
Software architects must create the basic IoT streaming architecture model for event flows before they can add unique features to their IoT applications.Continue Reading
Command tech conversations with IoT terminology you must know
Tech professionals should learn this IoT terminology to put the technology into context, start their journey and join emerging discussions with the same knowledge base.Continue Reading
MQTT (MQ Telemetry Transport)
MQTT (MQ Telemetry Transport) is a lightweight open messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information in low-bandwidth environments.Continue Reading
Gain an edge on IoT storage
IoT storage on the edge is growing exponentially, so it's important companies prepare for and meet all its challenges.Continue Reading
smart home hub (home automation hub)
A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.Continue Reading
time series database (TSDB)
A time series database (TSDB) is a software system optimized to sort and organize information measured by time.Continue Reading
Monetization metrics: understanding the units of value that matter to customers
Monetization metrics are a critical component to IoT product profitability, and product managers must understand how to use it in order to identify and price the units of value that are important ...Continue Reading
pervasive computing (ubiquitous computing)
Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way...Continue Reading
machine-to-machine (M2M)
Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.Continue Reading
embedded system security
Embedded system security is a strategic approach to protecting software running on embedded systems from attack. An embedded system is a programmable hardware component with a minimal operating system and software.Continue Reading
iBeacon
iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.Continue Reading
Nest Labs
Nest Labs was a home automation specialist company that produced programmable Wi-Fi-enabled products that can be remotely controlled through a Web service or an associated smart home app.Continue Reading
gateway
A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.Continue Reading
remote sensing
Remote sensing is the use of various technologies to make observations and measurements at a target that is usually at a distance or scale beyond those observable to the naked eye.Continue Reading
Combining IoT with the power of blockchain to get over the logistics hurdles
From hefty delays to IT failures, risks are unabating for logistics firms. Atlas City's Chris Justice reveals how IoT and blockchain can help.Continue Reading
intranet of things
An intranet of things is a closed network that includes smart sensors and actuators.Continue Reading
smart manufacturing (SM)
Smart manufacturing (SM) is a technology-driven approach that utilizes Internet-connected machinery to monitor the production process. The goal of SM is to identify opportunities for automating operations and use data analytics to improve ...Continue Reading
wearable computer
A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.Continue Reading
Does broad-based heart rate monitoring open up room for 'Mickey Mouse medicine?'
Broad-based heart rate monitoring wearables are being met with praise and criticism. As VivaLNK's Jiang Li explains, a balance needs to be struck between making connected health devices accessible ...Continue Reading
Monetizing connected car data: Preparing for the next billion-dollar industry
To accurately monetize connected car data, says Actian's Lewis Carr, it's important to realize it's not about the car itself, but the people driving them -- and meeting their desires in real time.Continue Reading
5 questions to ask before piloting AI for advanced analytics in manufacturing
To pilot a successful enterprise AI project, it is critical to consider what you are trying to solve, what improvements will be reached and more, suggests ClearSky Data's Laz Vekiarides.Continue Reading
Z-Wave
Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.Continue Reading
LPWAN (low-power wide area network)
Low-power WAN (LPWAN) is a wireless wide area network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges.Continue Reading
Zigbee
Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.Continue Reading
Internet of Everything (IoE)
The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.Continue Reading
smart home app (home automation app)
A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, typically from a smartphone or tablet.Continue Reading
smart bulb (smart light bulb)
A smart bulb is a networked LED light bulb that has additional features to enable automation, presence-sensing capabilities and customization.Continue Reading
drone photography
Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.Continue Reading
embedded firmware
Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.Continue Reading
embedded software
Hardware makers use embedded software to control the functions of various hardware devices and systems. Embedded software controls device functions in the same way that a computer’s operating system controls the function of software applications.Continue Reading
The enterprise IoT wave rolls in: How to prepare
The possibilities for IoT might be boundless. Find out areas where architects can prepare for and take advantage of an increasingly connected world.Continue Reading
machine authentication
Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Unlike user authentication, the process does not involve any...Continue Reading
Bluetooth Low Energy (Bluetooth LE)
Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.0 specification as an alternative to Bluetooth Classic. Like its predecessor, Bluetooth LE uses frequency hopping wireless technology in the 2.4 GHz unlicensed radio ...Continue Reading
active sensor
An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection. Active sensors contrast with passive sensors, which simply ...Continue Reading