Accelerating the Industrial Internet of Things
Log In
807 terms
term missing? Just let us know via Add New Term.
Attack VectorAttack Vector
Attack Vector
Path or means (e.g. viruses, e-mail attachment, Web pages, etc.) by which an attacker can gain access to a computer or network server in order to deliver malicious payloads or outcome.
Characteristic or property of an entity that can be used to describe its state, appearance, or other aspects.
Audio ProfileAudio Profile
Audio Profile
Hardware profile used with Bluetooth applications that include custom AT commands and functionality dedicated to wireless streaming of audio.
Augmented EntityAugmented Entity
Augmented Entity
A physical entity is represented by a virtual entity on the digital level.
Augmented Reality (AR)Augmented Reality (AR)
Augmented Reality (AR)
A technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view. 
Augmented Reality Viewer App (AR app)Augmented Reality Viewer App (AR app)
Augmented Reality Viewer App (AR app)
An AR app that is designed to provide Augmented Reality viewing experiences across multiple brands and content types.  
Authenticated IdentityAuthenticated Identity
Authenticated Identity
Identity information for an entity created to record the result of identity authentication.
Preventing unauthorized access and misuse of personal information.
Authentication, Authorization, and Accounting (AAA)Authentication, Authorization, and Accounting (AAA)
Authentication, Authorization, and Accounting (AAA)
Authentication, Authorization, and Accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
Granting of rights, which includes the granting of access based on access rights.
Automated Identification and Mobility Technologies (AIM)Automated Identification and Mobility Technologies (AIM)
Automated Identification and Mobility Technologies (AIM)
A group of technologies that are used to identify, store, and communicate data. An example would be a barcode, though there are many technologies in this area that are used for different services and are often used in combination.
Automatic incident detection (AID)Automatic incident detection (AID)
Automatic incident detection (AID)
Automatic incident detection (AID) aims to detect incidents automatically and quickly so that the problem can be dealt with and the roads restored to normal operation as soon as possible. The detection system could be CCTV using image processing.
The use or introduction of automaticequipment in a manufacturing or other process or facility.
Autonomic ComputingAutonomic Computing
Autonomic Computing
Autonomic computing refers to the self-managing characteristics of distributed computing resources, adapting to unpredictable changes while hiding intrinsic complexity to operators and users.
Autonomous CircuitsAutonomous Circuits
Autonomous Circuits
An autonomous circuit is a circuit that produces a time-varying output without having a time-varying input.
The ability of an intelligent system to independently compose and select among different courses of action to accomplish goals based on its knowledge and understanding of the world, itself, and the situation.
AutoSim IoT SimulatorAutoSim IoT Simulator
AutoSim IoT Simulator
An IoT simulator developed by Automatski and uses a variety of protocols.
Azure IoT SuiteAzure IoT Suite
Azure IoT Suite
A cloud based IaaS and PaaS developed by Microsoft.
A range of frequencies used by a technology for communication purposes.
Bar CodesBar Codes
Bar Codes
A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location.
Base Station (BS)Base Station (BS)
Base Station (BS)
The radios and other equipment at the cell sites that are used to communicate with the cellular devices.
Base Station Controller (BSC)Base Station Controller (BSC)
Base Station Controller (BSC)
A base station controller (BSC) is a critical mobile network component that controls one or more base transceiver stations (BTS), also known as base stations or cell sites.
Base Transceiver Station (BTS)Base Transceiver Station (BTS)
Base Transceiver Station (BTS)
This is a machine that enables wireless communication between user equipment, for example a mobile phone or a computer, and networks like the GSM network. The data is received through an antenna and is then processed and transmitted by the BTS to create a wireless connection.
Low-cost devices that communicate with smartphone apps indoors, without the need for GPS.
Belief-Desire-Intention (BDI)Belief-Desire-Intention (BDI)
Belief-Desire-Intention (BDI)
The belief-desire-intention software model (usually referred to simply, but ambiguously, as BDI) is a software model developed for programming intelligent agents.
Beyond MobilityBeyond Mobility
Beyond Mobility
The connected world including cars, homes, and wearables are creating a rapidly expanding world of access to the customer.
Big DataBig Data
Big Data
Data sets so large that they cannot be used with traditional database tools.
Biometrics refers to metrics related to human characteristics.
Biotechnology is the use of biological processes, organisms, or systems to manufacture products intended to improve the quality of human life.
Blended WorkforceBlended Workforce
Blended Workforce
A labour force involving close collaboration between humans and intelligent machines in the form of augmentation.
test test