Accelerating the Industrial Internet of Things
Log In
Terms
807 terms
term missing? Just let us know via Add New Term.
AnalyticsAnalytics
Analytics
Synthesis of knowledge from information.
Android WearAndroid Wear
Android Wear
An open-source platform that extends the Android system to wearables.
Anomaly DetectionAnomaly Detection
Anomaly Detection
A statistical technique that determines what patterns are normal and then identifies items that do not conform to those patterns.
Another Neat Tool (ANT)Another Neat Tool (ANT)
Another Neat Tool (ANT)
A Java-based software tool for automating software build processes.
ANTANT
ANT
ANT is a proprietary (but open access) multicast wireless sensor network technology designed and marketed by ANT Wireless.
Anti-Device TamperingAnti-Device Tampering
Anti-Device Tampering
An accessory that is mounted directly on the door stop which prevents accidental closure of the door and the consequent possible restart of the machine or system.
Apache KafkaApache Kafka
Apache Kafka
Apache Kafka is an open-source message broker project developed by the Apache Software Foundation written in Scala.
Apache StormApache Storm
Apache Storm
Apache Storm is a distributed computation framework written predominantly in the Clojure programming language.
Apio MeshApio Mesh
Apio Mesh
An IoT Mesh Sensor System developed by Apio.
Appache CassandraAppache Cassandra
Appache Cassandra
Apache Cassandra is an open source distributed database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure.
App CloudApp Cloud
App Cloud
A platform for developing IoT applications using Salesforce platform developed by Salesforce.
Application Enablement ToolsApplication Enablement Tools
Application Enablement Tools
Application enablement is an approach which brings telecommunications network providers and developers together to combine their network and web abilities in creating and delivering high demand advanced services and new intelligent applications.
Application Programming Interface (API)Application Programming Interface (API)
Application Programming Interface (API)
In computer programming, an application programming interface (API) is a set of routines, protocols, and tools for building software applications.
Application SoftwareApplication Software
Application Software
Programs that enable specific, end-user actions.
Application Specific Sensor Nodes (ASSN)Application Specific Sensor Nodes (ASSN)
Application Specific Sensor Nodes (ASSN)
Integrating sensors and sensor fusion in a single device, ASSNs have a built-in intelligence to cope with the complexity of applying multiple sensors to a specific problem such as augmented reality, navigation, positioning, and more.
Approachable HardwareApproachable Hardware
Approachable Hardware
More businesses and individuals are able to leverage a vast ecosystem of tools to design, produce, and distribute hardware than on their own.
Architecting ResilienceArchitecting Resilience
Architecting Resilience
IT-Systems that are able to avoid accident and failure.
Architecture FrameworkArchitecture Framework
Architecture Framework
Conventions, principles and practices for the description of architectures established within a specific domain of application and/or community of stakeholders.
Architecture LayerArchitecture Layer
Architecture Layer
A logical partitioning of the architecture.
Architecture ViewArchitecture View
Architecture View
Work product expressing the architecture of a system from the perspective of specific system concerns.
ArduinoArduino
Arduino
A single-board microcontroller used for prototyping without having to deal with breadboards or soldering.
ArkessaArkessa
Arkessa
Carrier-independent provider of IoT communications services, designed to provide management of multiple cellular carriers.
AR OverlayAR Overlay
AR Overlay
An image or graphic superimposed over an Image Target. This is the basics of AR technology
Artificial Intelligence (AI) Artificial Intelligence (AI)
Artificial Intelligence (AI)
 A technology that gives computers the ability to learn based on data, previous experiences, and their environment in order to make decisions in order maximize results.
AR Video PlaybackAR Video Playback
AR Video Playback
A video anchored in 3D space (typically superimposed on an Image Target) while maintaining the view of the physical environment as opposed to full screen playback.  
AssuranceAssurance
Assurance
Grounds for justified confidence that a claim has been or will be achieved.
AT CommandsAT Commands
AT Commands
Attention commands, developed by Dennis Hayes, that are used to set data connections.
Atomicity, Consistency, Isolation, Durability (ACID )Atomicity, Consistency, Isolation, Durability (ACID )
Atomicity, Consistency, Isolation, Durability (ACID )
A set of properties that guarantee that database transactions are processed reliably.
51% Attack51% Attack
51% Attack
The situation when more than half of the computing power used for mining a particular crypto currency is controlled by one entity. It can be used for malicious action on the network.
Attack DetectionAttack Detection
Attack Detection
The process of identifying that an attack has been attempted, is occurring or has occurred.”
test test