Browse Definitions :

Internet of Things

The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human interaction.

5G - IOT

  • 5G New Radio (NR) - 5G New Radio (NR) is a set of standards that replace the LTE network 4G wireless communications standard.
  • active RFID (active radio frequency identification) - Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
  • active sensor - An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection.
  • actuator - An actuator is a mechanism that turns energy into a controlled motion.
  • Advanced Message Queuing Protocol (AMQP) - Advanced Message Queuing Protocol (AMQP) is an open source published standard for asynchronous messaging by wire.
  • agri-tech - Agri-tech is the use of technology for farming that is developed to improve efficiency and profitability.
  • ambient intelligence (AmI) - Ambient intelligence (AmI) is the element of a pervasive computing environment that enables it to interact with and respond appropriately to the humans in that environment.
  • ampere hour (Ah or amp hour) - Ampere hour -- sometimes abbreviated as Ah or amp hour -- is the amount of energy charge in a battery that enables 1 ampere of current to flow for one hour.
  • ampere per meter (A/m, Oe, oersted) - The ampere per meter (symbolized A/m) is the International Unit of magnetic field strength.
  • ampere per meter squared (A/m 2) - The ampere per meter squared, symbolized A/m 2, is the International Unit of electric current density.
  • apparent power - Apparent power is a measure of alternating current (AC) power that is computed by multiplying the root-mean-square (rms) current by the root-mean-square voltage.
  • application programming interface (API) - An application programming interface (API) is code that enables two software programs to communicate.
  • application service provider (ASP) - An application service provider (ASP) is a company that offers individuals or enterprises access to applications and related services over the internet.
  • artificial intelligence of things (AIoT) - The artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.
  • AWS IoT (Amazon Web Services internet of things) - AWS IoT is an Amazon Web Services platform that collects and analyzes data from internet-connected devices and sensors -- called the internet of things -- and connects that data to AWS cloud applications.
  • bandwidth (network bandwidth) - Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.
  • bit (binary digit) - A bit (binary digit) is the smallest unit of data that a computer can process and store.
  • blockchain dApp - A decentralized application (dApp) is a type of distributed open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.
  • Bluetooth Low Energy (Bluetooth LE) - Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.
  • bulk power system (BPS) - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • capacitor (capacitance) - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacity on demand (COD) - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.
  • carbon offset - A carbon offset is a credit that a person or organization can buy to decrease its carbon footprint.
  • Categories of twisted-pair cabling systems - A twisted-pair cabling system is a cable consisting of one or several pairs of copper wires.
  • Cellular Vehicle to Everything (C-V2X) - Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
  • charge (electric charge) - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
  • charge-coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.
  • cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
  • coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
  • conductor - A conductor, or electrical conductor, is a substance or material that allows electricity to flow through it.
  • context awareness - Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly.
  • critical infrastructure and key resources (CIKR) - Critical infrastructure and key resources (CIKR) is the collective of natural and man-made resources, along with the systems for their processing and delivery, upon which a nation depends on for functioning.
  • customer acquisition cost - Customer acquisition cost is the fee associated with convincing a consumer to buy your product or service, including research, marketing and advertising costs.
  • customer premises equipment (CPE) - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
  • data transfer rate (DTR) - The data transfer rate (DTR) is the amount of digital data that's moved from one place to another in a given time.
  • decision support system (DSS) - A decision support system (DSS) is a computer program application used to improve a company's decision-making capabilities.
  • dedicated short-range communication (DSRC) - Dedicated short-range communication (DSRC) is a wireless communication technology designed to allow automobiles in the intelligent transportation system (ITS) to communicate with other automobiles or infrastructure technology.
  • deep learning - Deep learning is a type of machine learning and artificial intelligence (AI) that imitates the way humans gain certain types of knowledge.
  • dielectric constant - The dielectric constant of a substance or material is a measure of its ability to store electrical energy.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • distributed energy resources (DER) - Distributed energy resources (DER) are the combination of physical and virtual resources used in the production and storage of energy at or near where it will be used and separate from the main grid.
  • drone (UAV) - A drone is an unmanned aircraft.
  • drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
  • EEPROM (electrically erasable programmable read-only memory) - EEPROM (electrically erasable programmable read-only memory) is a user-modifiable ROM.
  • electromagnetic field - An electromagnetic field, sometimes referred to as an EM field, is generated when charged particles, such as electrons, are accelerated.
  • electromagnetic interference (EMI) - Electromagnetic interference (EMI) is unwanted noise or interference in an electrical path or circuit caused by an outside source.
  • electromagnetic pulse (EMP) - An electromagnetic pulse (EMP) is an intense burst of electromagnetic (EM) energy caused by an abrupt, rapid acceleration of charged particles, usually electron s.
  • embedded device - An embedded device is part of a larger computing system and has a specific purpose.
  • embedded device hacking - Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device.
  • embedded firmware - Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
  • embedded operating system - An embedded operating system is a specialized operating system (OS) designed to perform a specific task for a device that is not a computer.
  • embedded software - Hardware makers use embedded software to control the functions of various hardware devices and systems.
  • embedded system - An embedded system is a combination of computer hardware and software designed for a specific function.
  • embedded system security - Embedded system security is a strategic approach to protecting software running on embedded systems from attack.
  • embedded systems programming - Embedded systems programming is the programming of an embedded system in some device using the permitted programming interfaces provided by that system.
  • Energy Star - Energy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency.
  • EPROM (erasable programmable read-only memory) - EPROM (erasable programmable read-only memory) is memory that does not lose its data when the power supply is cut off.
  • farad (F) - A farad (F) is the standard unit of capacitance in the International System of Units (SI).
  • faraday - The faraday is a dimensionless unit of electric charge quantity, equal to approximately 6.
  • Faraday constant - Faraday's constant, symbolized by the italic uppercase letter F, is the physical constant representing the electric charge in a mole.
  • fiber to the home (FTTH) - Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point directly to individual buildings such as residences, apartment buildings and businesses to provide high-speed internet access.
  • firmware - Firmware is programming that's written to a hardware device's non-volatile memory.
  • fixed wireless - Fixed wireless networking refers to the operation of wireless devices in fixed locations such as homes and offices.
  • fixed-mobile convergence (FMC) - Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks.
  • flux - In physics, flux is a measure of the number of electric or magnetic field lines passing through a surface in a given amount time.
  • Fourth Industrial Revolution - The Fourth Industrial Revolution is the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way modern people live and work.
  • FPV drone (first-person view drone) - An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.
  • frame relay - Frame relay is a packet-switching telecommunications service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
  • frequency - For an oscillating or varying current, frequency is the number of complete cycles per second in alternating current direction.
  • frequency-shift keying (FSK) - Frequency-shift keying (FSK) is a method of transmitting digital signals using discrete signals.
  • fuel cell - A fuel cell is an electrochemical cell that derives its energy from combustible substances such as hydrogen, methane, propane, methanol, diesel fuel or even gasoline.
  • gateway - A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.
  • Google Glass - Google Glass is a wearable, voice- and motion-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user's field of vision.
  • GPS jamming - GPS jamming is the act of using a frequency transmitting device to block or interfere with radio communications.
  • ground - A ground is a direct electrical connection to the earth, a connection to a particular point in an electrical or electronic circuit, or an indirect connection that operates as the result of capacitance between wireless equipment and the earth or a large mass of conductive material.
  • Hamming code - Hamming code is an error correction system that can detect and correct errors when data is stored or transmitted.
  • haptics - Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.
  • headless system - A headless system is a computer that operates without a monitor, graphical user interface (GUI) or the typical peripherals used to control it, such as a keyboard and mouse.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
  • industrial automation - Industrial automation is the control of machinery and processes used in various industries by autonomous systems, which may involve robots or computer software.
  • industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes.
  • injectable ID chip (biochip transponder) - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • intelligent system - An intelligent system is an advanced computer system that can gather, analyze and respond to the data it collects from its surrounding environment.
  • International System of Units (SI) - The International System of Units is a global standard for expressing the magnitudes or quantities of important natural phenomena.
  • International Telecommunication Union (ITU) - The International Telecommunication Union (ITU) is an agency of the United Nations (UN) whose purpose is to coordinate telecommunication operations and services throughout the world.
  • Internet of Everything (IoE) - The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
  • Internet of Things privacy (IoT privacy) - Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.
  • intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
  • IoMT (Internet of Medical Things) or healthcare IoT - The Internet of Medical Things (IoMT) is a network of machine-to-machine communication between medical devices and healthcare IT systems.
  • IoT analytics (Internet of Things analytics) - IoT analytics is the application of data analysis tools and procedures to realize value from the huge volumes of data generated by connected Internet of Things devices.
  • IoT attack surface - The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.
  • IoT botnet (Internet of Things botnet) - An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.
  • IoT Cloud (Salesforce IoT Cloud) - IoT Cloud is a platform from Salesforce.
  • IoT devices (internet of things devices) - IoT devices are the nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.
  • IoT gateway - An Internet of Things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
  • IoT middleware (Internet of Things middleware) - Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
  • IoT policy (Internet of Things policy) - An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.
  • IoT security (internet of things security) - IoT security is the technology segment focused on safeguarding connected devices and networks in the internet of things (IoT).
Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

CIO
  • value stream management

    Value stream management is an emerging business process intended to gauge the flow of value into business resources and ...

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • Net Promoter Score (NPS)

    Net Promoter Score (NPS) is a metric that organizations use for assessing customer loyalty toward their brand, products or ...

  • B2C (business-to-consumer)

    B2C, or business-to-consumer, is a retail model where products or services move directly from a business to the end user who has ...

  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

Close