Our specialized IoT Glossary is your trusted guide to exploring technology terms and definitions. The intention of the glossary is to offer definitions for “technical terms” or “specialized jargon” in a way that might be readily understood by those who have deep understandign of the IoT industry or have not developed expertise in the field.

AJAX progress indicator
Search: (clear)
  • a

  • Active sensor
    Active sensor requires an external power source to operate and they transmit and detect the energy at the same time

  • Artificial Intelligence
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines that work and react like humans. It includes activities such as learning speech recognition planning reasoning problem solving and self-correction.

  • Asset Tracking
    Asset Tracking across the supply chain allows for real-time position monitoring and visibility of the assets

  • Automation
    Automation enables reduction of human intervention in different ways such as with machinery optimization factory processes to make them automatic controlled and more efficient

  • b

  • Big Data
    Extremely large data sets that may be analysed computationally to reveal patterns trends and associations.

  • Bluetooth Low Energy
    The term "Bluetooth Low Energy" is referred to: a Bluetooth network used for internet-connected machines

  • c

  • Condition Monitoring
    It is a monitoring process in which the main goal is to identify and keep updated about the machinery condition and status so as to predict future faults.

  • Connected Car
    A connected car is a vehicle which is equipped with devices that can connect to other devices networks and services within or outside the car and exchange different types of information to form a collectively safer better experience with more functionalities for the customers

  • Connectivity
    Connectivity is a popular word used for the ability of a given device/program to connect with other devices or programs.

  • d

  • Developer Tools
    A programming tool or software development tool is a computer program/tool that software developers use to create debug maintain or otherwise support other programs and applications

  • Distribution of Letters
    The term "Distribution of Letters" is referred to:  a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like)

  • e

  • Embedded Firmware
    The term "Embedded Firmware" is referred to: flash chip where the special software is stored in an embedded device to control it.

  • f

  • Fleet Management
    Fleet Management solutions are solutions that enable smart monitoring of vehicles fuel optimization and real time status of the fleet and assets

  • Fog Computing
    Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network. Also known as Edge Computing or fogging fog computing facilitates the operation of compute storage and networking services between end devices and cloud computing data centers

  • i

  • IaaS
    Infrastructure as a Service (IaaS) is a form of cloud computing that provides resources over the Internet. In IaaS one can host hardware software servers storage application and other infrastructure components and handle system maintenance backup and resiliency planning among other tasks

  • Identity and Access Management
    "Identity and Access Management is the security discipline that ensures appropriate access to resources across heterogeneous technology environments. IAM technology can be used to initiate, capture, record and manage user identities and ensure that right individuals access the right resources at the right times"

  • IoT Applications
    "IoT applications are used to automate various tasks safely. They are useful in all kinds of spheres like security, smart homes, smart cities, agriculture, entertainment and many others"

  • p

  • Pervasive Computing
    Pervasive Computing ist ein aufkommender Trend der mit dem Einbau von Mikro-Prozessoren in alltägliche Objekte zusammenhängt und es den Objekten erlaubt Informationen zu kommunizieren. Es ist auch als Ubiquitous Computing bekannt

  • Predictive Maintenance
    Predictive Maintenance identifiziert bevorstehende Ausfälle mit Hilfe von Daten die Anomalien oder Störungen erfassen

  • Private Cloud
    Die Private Cloud besitzt die selben Funktionen wie die Public Cloud unterscheidet sich aber dadurch dass sie lediglich für eine einzige Organisation zugänglich ist so soll Sicherheit innerhalb der Oganisation gewährleistet werden.

  • r

  • Remote Monitoring
    Remote MonitoringRemote Monitoring hilft Unternehmen Assets die über die ganze Welt verteilt sein können aus der Ferne zu kontrollieren und automatisch upzudaten

  • s

  • SaaS
    Software as a Service ist ein Software-Lizenzierungsmodell und Delivery Model bei dem Software zentral gehosted wird und über ein Subscription Model verfügbar ist. SaaS wird typischweise durch Thin-Client Technologie angeboten und per Webbrowser genutzt. SaaS ist zum gängiges Delivery Model zahlreicher Geschäfts- und Softwarelösungen etabliert.

  • v

  • Visualization
    "Visualization is a process of interpreting the data that is collected and analysed in visual terms, using images, diagrams, graphs or animations to communicate a message or show results"