Accelerating the
Industrial Internet of Things
Create New Record
  • (115)
  • (137)
  • (45)
  • (43)
  • (42)
  • (20)
  • (13)
  • (25)
  • (22)
  • (20)
  • (9)
  • (3)
711 terms
Term missing? Just let us know via Add New Term.
Another Neat Tool (ANT)Another Neat Tool (ANT) Another Neat Tool (ANT)
A Java-based software tool for automating software build processes.
ANT is a proprietary (but open access) multicast wireless sensor network technology designed and marketed by ANT Wireless.
Anti-Device TamperingAnti-Device Tampering Anti-Device Tampering
An accessory that is mounted directly on the door stop which prevents accidental closure of the door and the consequent possible restart of the machine or system.
Apache KafkaApache Kafka Apache Kafka
Apache Kafka is an open-source message broker project developed by the Apache Software Foundation written in Scala.
Apache StormApache Storm Apache Storm
Apache Storm is a distributed computation framework written predominantly in the Clojure programming language.
Apio MeshApio Mesh Apio Mesh
An IoT Mesh Sensor System developed by Apio.
Appache CassandraAppache Cassandra Appache Cassandra
Apache Cassandra is an open source distributed database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure.
App CloudApp Cloud App Cloud
A platform for developing IoT applications using Salesforce platform developed by Salesforce.
Application Enablement ToolsApplication Enablement Tools Application Enablement Tools
Application enablement is an approach which brings telecommunications network providers and developers together to combine their network and web abilities in creating and delivering high demand advanced services and new intelligent applications.
Application Programming Interface (API)Application Programming Interface (API) Application Programming Interface (API)
In computer programming, an application programming interface (API) is a set of routines, protocols, and tools for building software applications.
Application SoftwareApplication Software Application Software
Programs that enable specific, end-user actions.
Application Specific Sensor Nodes (ASSN)Application Specific Sensor Nodes (ASSN) Application Specific Sensor Nodes (ASSN)
Integrating sensors and sensor fusion in a single device, ASSNs have a built-in intelligence to cope with the complexity of applying multiple sensors to a specific problem such as augmented reality, navigation, positioning, and more.
Approachable HardwareApproachable Hardware Approachable Hardware
More businesses and individuals are able to leverage a vast ecosystem of tools to design, produce, and distribute hardware than on their own.
Architecting ResilienceArchitecting Resilience Architecting Resilience
IT-Systems that are able to avoid accident and failure.
Architecture FrameworkArchitecture Framework Architecture Framework
Conventions, principles and practices for the description of architectures established within a specific domain of application and/or community of stakeholders.
Architecture LayerArchitecture Layer Architecture Layer
A logical partitioning of the architecture.
Architecture ViewArchitecture View Architecture View
Work product expressing the architecture of a system from the perspective of specific system concerns.
ArduinoArduino Arduino
A single-board microcontroller used for prototyping without having to deal with breadboards or soldering.
ArkessaArkessa Arkessa
Carrier-independent provider of IoT communications services, designed to provide management of multiple cellular carriers.
AssuranceAssurance Assurance
Grounds for justified confidence that a claim has been or will be achieved.
AT CommandsAT Commands AT Commands
Attention commands, developed by Dennis Hayes, that are used to set data connections.
Atomicity, Consistency, Isolation, Durability (ACID )Atomicity, Consistency, Isolation, Durability (ACID ) Atomicity, Consistency, Isolation, Durability (ACID )
A set of properties that guarantee that database transactions are processed reliably.
Attack DetectionAttack Detection Attack Detection
The process of identifying that an attack has been attempted, is occurring or has occurred.”
Attack VectorAttack Vector Attack Vector
Path or means (e.g. viruses, e-mail attachment, Web pages, etc.) by which an attacker can gain access to a computer or network server in order to deliver malicious payloads or outcome.
AttributeAttribute Attribute
Characteristic or property of an entity that can be used to describe its state, appearance, or other aspects.
Audio ProfileAudio Profile Audio Profile
Hardware profile used with Bluetooth applications that include custom AT commands and functionality dedicated to wireless streaming of audio.
Augmented EntityAugmented Entity Augmented Entity
A physical entity is represented by a virtual entity on the digital level.
Authenticated IdentityAuthenticated Identity Authenticated Identity
Identity information for an entity created to record the result of identity authentication.
AuthenticationAuthentication Authentication
Preventing unauthorized access and misuse of personal information.
Authentication, Authorization, and Accounting (AAA)Authentication, Authorization, and Accounting (AAA) Authentication, Authorization, and Accounting (AAA)
Authentication, Authorization, and Accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.