Terms
![]() ![]() |
Analytics
Synthesis of knowledge from information. |
![]() ![]() |
Android Wear
An open-source platform that extends the Android system to wearables. |
![]() ![]() |
Anomaly Detection
A statistical technique that determines what patterns are normal and then identifies items that do not conform to those patterns. |
![]() ![]() |
Another Neat Tool (ANT)
A Java-based software tool for automating software build processes. |
![]() ![]() |
ANT
ANT is a proprietary (but open access) multicast wireless sensor network technology designed and marketed by ANT Wireless. |
![]() ![]() |
Anti-Device Tampering
An accessory that is mounted directly on the door stop which prevents accidental closure of the door and the consequent possible restart of the machine or system. |
![]() ![]() |
Apache Kafka
Apache Kafka is an open-source message broker project developed by the Apache Software Foundation written in Scala. |
![]() ![]() |
Apache Storm
Apache Storm is a distributed computation framework written predominantly in the Clojure programming language. |
![]() ![]() |
Apio Mesh
An IoT Mesh Sensor System developed by Apio. |
![]() ![]() |
Appache Cassandra
Apache Cassandra is an open source distributed database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure. |
![]() ![]() |
App Cloud
A platform for developing IoT applications using Salesforce platform developed by Salesforce. |
![]() ![]() |
Application Enablement Tools
Application enablement is an approach which brings telecommunications network providers and developers together to combine their network and web abilities in creating and delivering high demand advanced services and new intelligent applications. |
![]() ![]() |
Application Programming Interface (API)
In computer programming, an application programming interface (API) is a set of routines, protocols, and tools for building software applications. |
![]() ![]() |
Application Software
Programs that enable specific, end-user actions. |
![]() ![]() |
Application Specific Sensor Nodes (ASSN)
Integrating sensors and sensor fusion in a single device, ASSNs have a built-in intelligence to cope with the complexity of applying multiple sensors to a specific problem such as augmented reality, navigation, positioning, and more. |
![]() ![]() |
Approachable Hardware
More businesses and individuals are able to leverage a vast ecosystem of tools to design, produce, and distribute hardware than on their own. |
![]() ![]() |
Architecting Resilience
IT-Systems that are able to avoid accident and failure. |
![]() ![]() |
Architecture Framework
Conventions, principles and practices for the description of architectures established within a specific domain of application and/or community of stakeholders. |
![]() ![]() |
Architecture Layer
A logical partitioning of the architecture. |
![]() ![]() |
Architecture View
Work product expressing the architecture of a system from the perspective of specific system concerns. |
![]() ![]() |
Arduino
A single-board microcontroller used for prototyping without having to deal with breadboards or soldering. |
![]() ![]() |
Arkessa
Carrier-independent provider of IoT communications services, designed to provide management of multiple cellular carriers. |
![]() |
AR Overlay
An image or graphic superimposed over an Image Target. This is the basics of AR technology |
![]() ![]() |
Artificial Intelligence (AI)
A technology that gives computers the ability to learn based on data, previous experiences, and their environment in order to make decisions in order maximize results. |
![]() |
AR Video Playback
A video anchored in 3D space (typically superimposed on an Image Target) while maintaining the view of the physical environment as opposed to full screen playback. |
![]() ![]() |
Assurance
Grounds for justified confidence that a claim has been or will be achieved. |
![]() ![]() |
AT Commands
Attention commands, developed by Dennis Hayes, that are used to set data connections. |
![]() ![]() |
Atomicity, Consistency, Isolation, Durability (ACID )
A set of properties that guarantee that database transactions are processed reliably. |
![]() |
51% Attack
The situation when more than half of the computing power used for mining a particular crypto currency is controlled by one entity. It can be used for malicious action on the network. |
![]() ![]() |
Attack Detection
The process of identifying that an attack has been attempted, is occurring or has occurred.” |