Terms
|
Apache Storm
Apache Storm is a distributed computation framework written predominantly in the Clojure programming language. Apache Storm makes it easy to reliably process unbounded streams of data, doing for real-time processing what Hadoop did for batch processing. |
|
Appache Cassandra
Apache Cassandra is an open-source distributed database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure. |
|
Application Enablement
Application enablement is an approach that brings telecommunications network providers and developers together to combine their network and web abilities in creating and delivering high demand advanced services and new intelligent applications. |
|
Application Programming Interface
Application Programming Interface (API) is a set of routines, protocols, and tools for building software applications. In IoT, an API lets the developer access the functionality of a device or sensor, such as a thermometer’s readings. APIs can be public or restricted to authorized users only. |
|
Application Specific Sensor Nodes
Integrating sensors and sensor fusion in a single device, Application Specific Sensor Nodes (ASSNs) have built-in intelligence to cope with the complexity of applying multiple sensors to a specific problem such as augmented reality, navigation, positioning, and more. |
|
Architecting Resilience
Architecting Resilience is IT-Systems that can avoid accidents and failures. System resilience implies the capability to resist perturbances and crises, to recover from emergencies and near-catastrophes, and the ability to adapt to a continually changing environment. |
|
Architecture Framework
An enterprise architecture framework defines how to create and use enterprise architecture. An architecture framework provides principles and practices for creating and using the architecture description of a system. |
|
Architecture Layer
Architecture Layer is a logical partitioning of the system architecture. An architecture layer uses many layers for allocating the different responsibilities of e.g., a software product. |
|
Architecture View
Architecture views are representations of the overall architecture that are meaningful to one or more stakeholders in the system. The architect develops a set of views that will enable the architecture to be communicated to all the stakeholders. |
|
Arduino
A single-board microcontroller used for prototyping without having to deal with breadboards or soldering. The software to operate an Arduino is free and open-source. |
|
AR Overlay
An image or graphic superimposed over an Image Target. This is the basics of AR technology |
|
Artificial Intelligence
A technology that gives computers the ability to learn based on data, previous experiences, and their environment to make decisions to maximize results. AI is the simulation of human intelligence processes by machines, especially computer systems. |
|
AR Video Playback
AR Video Playback is a video anchored in 3D space (typically superimposed on an Image Target) while maintaining the view of the physical environment as opposed to full-screen playback. |
|
Assurance
Assurance is a part of corporate governance in which management provides accurate and current information to the stakeholders about the efficiency and effectiveness of its policies and operations and the status of its compliance with the statutory obligations. |
|
AT Commands
AT commands, developed by Dennis Hayes, are used to set data connections. The set of short string commands allows developers to set up calls with a modem, as well as perform far more complex tasks. |
|
Atomicity, Consistency, Isolation, Durability
In computer science, ACID (Atomicity, Consistency, Isolation, Durability) is a set of properties that guarantee that database transactions are processed reliably. In the context of databases, a single logical operation on the data is called a transaction. |
|
51% Attack
A 51% attack is an attack on a blockchain by a group of miners who control more than 50% of the network's mining hash rate. Attackers with majority control of the network can interrupt the recording of new blocks by preventing other miners from completing blocks. |
|
Attack Detection
An attack detection is the process of identifying that an attack has been attempted, is occurring, or has occurred. General attack detection, and recovery/resilience to cope with IoT-specific threats, such as compromised nodes, malicious code hacking attacks. |
|
Attack Vector
An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome. |
|
Attribution
In computer science, attribution is a characteristic or property of an entity that can be used to describe its state, appearance, or other aspects. A usually good quality or feature that someone or something has. |
|
Audio Profile
Audio Profile is a hardware profile used with Bluetooth applications that include custom AT commands and functionality dedicated to the wireless streaming of audio. Examples for Audio Profiles include A2DP. |
|
Augmented Entity
A physical entity is represented by a virtual entity on the digital level. An augmented entity combines the two and stands for any combination of the two entities. |
|
Augmented Reality
A technology that superimposes a computer-generated image on the users' views of the real world, thus providing a composite view. Augmented Reality (AR) employs device cameras or sensors to map and identify the external environment to create an interactive experience of a real-world environment. |
|
Augmented Reality Viewer App
An augmented reality app is a software application that integrates digital visual content (and sometimes audio and other types) into the uses real-world environment. AR software is used for training, work, and consumer applications in many industries. |
|
Authenticated Identity
Authenticated identity refers to the identity information for an entity created to record the result of identity authentication. User authentication occurs within most human-to-computer interactions other than guest accounts, automatically logged-in accounts, and kiosk computer systems. |
|
Authentication
In computing, authentication is the process of verifying the identity of a person or device, preventing unauthorized access and misuse of personal information. |
|
Authentication, Authorization, and Accounting
Authentication, Authorization, and Accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. |
|
Authorization
Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use. |
|
Automated Identification and Mobility Technologies
Automatic Identification and Mobility (AIM) technologies are a diverse family of technologies that share the common purpose of identifying, tracking, recording, storing, and communicating essential business, personal, or product data. |
|
Automatic Incident Detection
Automatic incident detection (AID) aims to detect incidents automatically and quickly so that the problem can be dealt with and the roads restored to normal operation as soon as possible. The detection system could be CCTV using image processing. |