Acceleration Sensing A MEMS concept referring to the increase in movement of an object from one point to another along a straight line or axis. Accelerometer A tool that measures changes in gravitational acceleration in the unit it may be installed in. A recurring fee-based system where a facility manager outsources electronic access control to a third party, where each facility do not need Access Control as a Service to maintain a dedicated server. A recurring fee-based system where a facility manager outsources electronic access control to a third party, where each facility do not need ACaaS to maintain a dedicated server. Access Control A system that determines who, when, and where people are allowed to enter or exit a facility or area. An access point connects users to other users within the network and also can serve as the point of interconnection between the WLAN and Access Point a fixed wire network. An access point connects users to other users within the network and also can serve as the point of interconnection between the WLAN and AP a fixed wire network. Active Sensor A sensing device that requires an external source of power to operate. A device combined with an application to record and analyze physiological metrics such as heartrate, sleep quality, skin temperature, calories Activity Tracker burned and more. Actuator An actuator is a type of motor that is responsible for moving or controlling a mechanism or system. Adaptive architecture is a system which changes its structure, behaviour or resources according to demand. The adaptation made is usually Adaptive Architectures to non-functional characteristics rather than functional ones. The construction of complex three-dimensional parts from 3D digital model data by depositing successive layers of material. Metal, polymer, and ceramic materials can be used to manufacture parts of a geometry that often cannot be produced by any other manufacturing Additive Manufacturing technology. Addressability The capacity for an entity to be targeted and found. Address Resolution Protocol A communication protocol used to convert an IP address into a physical address. ARP Address Resolution Protocol. A communication protocol used to convert an IP address into a physical address. Ad-hoc networks An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. Ad hoc queries An Ad-Hoc Query is a query that cannot be determined prior to the moment the query is issued. Advanced cruise-assist highway systems (AHS) are systems that aim to reduce traffic accidents, enhance safety, improve transportation Advanced cruise-assist highway systems efficiency as well as to reduce the operational work of drivers. Advanced cruise-assist highway systems (AHS) are systems that aim to reduce traffic accidents, enhance safety, improve transportation AHS efficiency as well as to reduce the operational work of drivers. Advanced Driver Assistance Systems Digital feature that incorporates into vehicles to enhance driver safety and performance. ADAS Advanced Driver Assistance Systems. Digital feature that incorporates into vehicles to enhance driver safety and performance. Advanced Encryption Standard The specification for encryption of electronic data established in 2001. AES Advanced Encryption Standard. The specification for encryption of electronic data established in 2001. The process of leveraging the most advanced technology available at the current time in order to maximize the output and/or product quality Advanced Manufacturing of a manufacturing facility. Advanced Materials New materials and modifications to existing materials to obtain superior performance in one or more characteristics. Advanced Message Queuing Protocol An open-source standard for business message communication and message-oriented middleware. AMQP Advanced Message Queuing Protocol. An open-source standard for business message communication and message-oriented middleware. Advances in Data Science Improvements in deep learning and cognitive-computing technologies are driving enterprise adoption. AerCore A communication platform developed by Aeris. Aeris Carrier-independent provider of IoT communications services, designed to provide management of multiple cellular carriers. Aervoyance A Machine to Machine Analytics developed by Aeris. Tools, techniques, and initiatives (such as lean and flexible manufacturing) to help a plant and/or organization rapidly respond to their Agile Manufacturing customers, the market, and innovations. AllJoyn AllJoyn is a system that allows devices to communicate with other devices around them. AltBeacon An open and interoperable proximity beacon specification. Altimeter An instrument used to measure the altitude of an object above a fixed level. Sensor-filled environments that interpret and react to human events and activity, and learning to adapt over time, the environment’s operation and services change based on that activity. Ambient Intelligence. Sensor-filled environments that interpret and react to human events and activity, and learning to adapt over time, the AML environment’s operation and services change based on that activity. American Standard Code for Information InterchangeASCII abbreviated from American Standard Code for Information Interchange, is a character-encoding scheme. ASCII ASCII abbreviated from American Standard Code for Information Interchange, is a character-encoding scheme. Analytics Synthesis of knowledge from information. Wear An open-source platform that extends the Android system to wearables. Anomaly Detection A statistical technique that determines what patterns are normal and then identifies items that do not conform to those patterns. Another Neat Tool A Java-based software tool for automating software build processes. ANT ANT is a proprietary (but open access) multicast technology designed and marketed by ANT Wireless. An accessory that is mounted directly on the door stop which prevents accidental closure of the door and the consequent possible restart of Anti-Device Tampering the machine or system. Apache Kafka Apache Kafka is an open-source message broker project developed by the Apache Software Foundation written in Scala. Apache Storm Apache Storm is a distributed computation framework written predominantly in the Clojure programming language. Apio Mesh An IoT Mesh Sensor System developed by Apio. Apache Cassandra is an open source distributed database management system designed to handle large amounts of data across many Apache Cassandra commodity servers, providing high availability with no single point of failure. App Cloud A platform for developing IoT applications using Salesforce platform developed by Salesforce. Application enablement is an approach which brings telecommunications network providers and developers together to combine their network Application Enablement Tools and web abilities in creating and delivering high demand advanced services and new intelligent applications. In computer programming, an application programming interface (API) is a set of routines, protocols, and tools for building software Application Programming Interface applications. In computer programming, an application programming interface (API) is a set of routines, protocols, and tools for building software API applications. Application Software Programs that enable specific, end-user actions. Integrating sensors and sensor fusion in a single device, ASSNs have a built-in intelligence to cope with the complexity of applying multiple Application Specific Sensor Nodes sensors to a specific problem such as augmented reality, navigation, positioning, and more. Application Specific Sensor Nodes. Integrating sensors and sensor fusion in a single device, ASSNs have a built-in intelligence to cope with ASSN the complexity of applying multiple sensors to a specific problem such as augmented reality, navigation, positioning, and more. More businesses and individuals are able to leverage a vast ecosystem of tools to design, produce, and distribute hardware than on their Approachable Hardware own. Architecting Resilience IT-Systems that are able to avoid accident and failure. Conventions, principles and practices for the description of architectures established within a specific domain of application and/or community Architecture Framework of stakeholders. Architecture Layer A logical partitioning of the architecture. Architecture View Work product expressing the architecture of a system from the perspective of specific system concerns. A single-board used for prototyping without having to deal with or soldering. Arkessa Carrier-independent provider of IoT communications services, designed to provide management of multiple cellular carriers. AR Overlay An image or graphic superimposed over an Image Target. This is the basics of AR technology A technology that gives computers the ability to learn based on data, previous experiences, and their environment in order to make decisions in order maximize results. Artificial Intelligence. A technology that gives computers the ability to learn based on data, previous experiences, and their environment in AI order to make decisions in order maximize results. A video anchored in 3D space (typically superimposed on an Image Target) while maintaining the view of the physical environment as AR Video Playback opposed to full screen playback. Assurance Grounds for justified confidence that a claim has been or will be achieved. AT Commands Attention commands, developed by Dennis Hayes, that are used to set data connections. Atomicity Consistency Isolation Durability A set of properties that guarantee that database transactions are processed reliably. ACID Atomicity Consistency Isolation Durability. A set of properties that guarantee that database transactions are processed reliably. The situation when more than half of the computing power used for mining a particular crypto currency is controlled by one entity. It can be 51% attack used for malicious action on the network. Attack Detection The process of identifying that an attack has been attempted, is occurring or has occurred. Path or means (e.g. viruses, e-mail attachment, Web pages, etc.) by which an attacker can gain access to a computer or network server in Attack Vector order to deliver malicious payloads or outcome. Attribute Characteristic or property of an entity that can be used to describe its state, appearance, or other aspects. Hardware profile used with Bluetooth applications that include custom AT commands and functionality dedicated to wireless streaming of Audio Profile audio. Augmented Entity A physical entity is represented by a virtual entity on the digital level. Augmented Reality Viewer App An AR app that is designed to provide Augmented Reality viewing experiences across multiple brands and content types. Augmented Reality Viewer App. An AR app that is designed to provide Augmented Reality viewing experiences across multiple brands and AR App content types. Augmented Reality A technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view. Augmented Reality. A technology that superimposes a computer-generated image on a user's view of the real world, thus providing a AR composite view. Authenticated Entity Identity information for an entity created to record the result of identity authentication. Authentication Preventing unauthorized access and misuse of personal information. Authentication, Authorization, and Accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, Authentication, Authorization, and Accounting enforcing policies, auditing usage, and providing the information necessary to bill for services. Authentication, Authorization, and Accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, AAA enforcing policies, auditing usage, and providing the information necessary to bill for services. Authorization Granting of rights, which includes the granting of access based on access rights. A group of technologies that are used to identify, store, and communicate data. An example would be a barcode, though there are many Automated Identification and Mobility Technologies technologies in this area that are used for different services and are often used in combination. Automated Identification and Mobility Technologies. A group of technologies that are used to identify, store, and communicate data. An example would be a barcode, though there are many technologies in this area that are used for different services and are often used in AIM combination. Automatic incident detection (AID) aims to detect incidents automatically and quickly so that the problem can be dealt with and the roads Automatic Incident Detection restored to normal operation as soon as possible. The detection system could be CCTV using image processing. Automatic incident detection (AID) aims to detect incidents automatically and quickly so that the problem can be dealt with and the roads AID restored to normal operation as soon as possible. The detection system could be CCTV using image processing. The use or introduction of automaticequipment in a manufacturing or other process or facility. Autonomic computing refers to the self-managing characteristics of distributed computing resources, adapting to unpredictable changes while Autonomic Computing hiding intrinsic complexity to operators and users. Autonomous Circuits An autonomous circuit is a circuit that produces a time-varying output without having a time-varying input. The ability of an intelligent system to independently compose and select among different courses of action to accomplish goals based on its Autonomy knowledge and understanding of the world, itself, and the situation. AutoSim IoT Simulator An IoT simulator developed by Automatski and uses a variety of protocols. Azure IoT Suite A cloud based IaaS and PaaS developed by Microsoft. Band A range of frequencies used by a technology for communication purposes. A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, Bar codes identification cards, and postal mail to identify a particular product number, person, or location. A base station controller (BSC) is a critical mobile network component that controls one or more base transceiver stations (BTS), also known Base station controller as base stations or cell sites. A base station controller (BSC) is a critical mobile network component that controls one or more base transceiver stations (BTS), also known BSC as base stations or cell sites. Base station The radios and other equipment at the cell sites that are used to communicate with the cellular devices. BS Base station. The radios and other equipment at the cell sites that are used to communicate with the cellular devices. This is a machine that enables wireless communication between user equipment, for example a mobile phone or a computer, and networks like the GSM network. The data is received through an antenna and is then processed and transmitted by the BTS to create a wireless Base Transceiver Station connection. Base Transceiver Station. This is a machine that enables wireless communication between user equipment, for example a mobile phone or a computer, and networks like the GSM network. The data is received through an antenna and is then processed and transmitted by the BTS to BTS create a wireless connection. Beacons Low-cost devices that communicate with smartphone apps indoors, without the need for GPS. The belief-desire-intention software model (usually referred to simply, but ambiguously, as BDI) is a software model developed for Belief Desire Intention programming intelligent agents. The belief-desire-intention software model (usually referred to simply, but ambiguously, as BDI) is a software model developed for BDI programming intelligent agents. Beyond Mobility The connected world including cars, homes, and wearables are creating a rapidly expanding world of access to the customer. Big Data Data sets so large that they cannot be used with traditional database tools. Biometrics Biometrics refers to metrics related to human characteristics. Biotechnology is the use of biological processes, organisms, or systems to manufacture products intended to improve the quality of human Biotechnology life. Blended Workforce A labour force involving close collaboration between humans and intelligent machines in the form of augmentation. A container data structure comprising of the transactions made on that particular Blockhain. Different Blockchains have different block sizes Block (e.g. Bitcoin’s block size is 1MB). Blockchain A distributed database, based on a ledger of transactions, that powers cryptocurrencies like Bitcoin. Block Explorer A software tool that allows you to view all transactions ever done on a particular Blockchain. Block Height The number of blocks of a particular Blockchain since the genesis block. Block Reward An incentive to block miners for securing the network by providing hash power to it. Bluemix A mix of IoT Platform, API, Visualization, and analytics offerings in a PaaS model developed by IBM. Bluetooth A wireless technology standard for exchanging data over short distances. Bluetooth Low Energy Ultra-low power version of the Bluetooth technology that is up to 15 times more efficient than Bluetooth. BLE Bluetooth Low Energy. Ultra-low power version of the Bluetooth technology that is up to 15 times more efficient than Bluetooth. Body Area Network A wireless network of wearable computing devices and physiological sensors, which may even be embedded inside the body. Body Area Network. A wireless network of wearable computing devices and physiological sensors, which may even be embedded inside the BAN body. Boot Loaders Boot loader, also called a boot manager, is a small program that places the operating system (OS) of a computer into memory. Brillo An underlying operating system for the IoT developed by Google, supporting Wi-Fi, Bluetooth Low Energy, and Android-based things. Bring Your Own Device Enterprise term recognizing that people are bringing their own Wi-Fi enabled devices into the corporate network. BYOD Bring Your Own Device. Enterprise term recognizing that people are bringing their own Wi-Fi enabled devices into the corporate network. Brownfield Brownfield describes the problem and the process of having to consider already existing systems when implementing new software systems. Building an Innovation Dynamo When a technology produces self-sustaining innovation and development, it is effectively an innovation dynamo. Building Automation and Control Networks Communications protocol for building automation and control networks. BACnet Building Automation and Control Networks. Communications protocol for building automation and control networks. Business Impact Analysis Process of analyzing operational functions and the effect that a disruption might have upon them. Business Logic Used to describe processes that are necessary to enable or execute communication between an end user and a database/server. Business Process Execution Language BPEL is an XML-based language that allows Web services in a service-oriented architecture (SOA) to interconnect and share data. BPEL BPEL is an XML-based language that allows Web services in a service-oriented architecture (SOA) to interconnect and share data. Business Process Model and Notation BPMN is a graphical representation for specifying business processes in a business process model. BPMN BPMN is a graphical representation for specifying business processes in a business process model. Camera A camera is an optical instrument for recording images, which may be stored locally, transmitted to another location, or both. CAN Bus A message-based, multi-master serial protocol for transmitting and receiving vehicle data within a Controller Area Network (CAN). Carbon Nanotube Carbon nanotubes are allotropes of carbon with a cylindrical nanostructure. CNT Carbon nanotubes are allotropes of carbon with a cylindrical nanostructure. Card Not Present The type of credit transaction where the merchant never sees the actual card. CNP Card Not Present. The type of credit transaction where the merchant never sees the actual card. When dissimilar equipment and workstations to produce a family of similar components or subassemblies are arranged close together to save space and time, and simplify process routing and supervision. Workers are typically cross-trained to perform multiple tasks within a Cellular Manufacturing manufacturing cell. Cellular Modem Allows a device to receive Internet access over the cellular mobile networks. Cellular Router Allows connected devices to access servers and devices by making an IP connection through the cellular mobile network. Central Device One of the two types of devices defined by the BLE standard. Chief IoT Officer One of the CxO class of corporate officers, the CIoT coordinates the integration of IoT into the enterprise. CIoT Chief IoT Officer. One of the CxO class of corporate officers, the CIoT coordinates the integration of IoT into the enterprise. Lighter, purpose-built protocols that allow the “things” in IoT to communicate and interchange. Built for machine-to-machine communication, Chirps they are efficient, extensible data frames that have an open-source structure, private data fields, and a simple checksum. Chirp Spread Spectrum A spread spectrum technique that uses wideband linear frequency modulated chirp pulses to encode information. CSS Chirp Spread Spectrum. A spread spectrum technique that uses wideband linear frequency modulated chirp pulses to encode information. Chroma Key Video The technique of layering two images or videos together based on colour hues or the colour intensity range. Class 1 Bluetooth Offers a greater wireless data transfer distance (over 100m, up to 1km) through using greater power consumption (100mW). Class 2 Bluetooth Short-range wireless data transmission (10-20m) which has low power consumption of around 2.5mW. Cloud communications are Internet-based voice and data communications where telecommunications applications, switching and storage are Cloud Communications hosted by a third-party outside of the organization using them, and they are accessed over the public Internet. Cloud Computing A model for enabling ubiquitous network access to a shared pool of configurable computing resources. Advances in cloud, mobile platforms, and application development are eliminating the technological and cost barriers associated with digital Cloud Economics industry platforms. Cloud Orchestration The automated management of a cloud, which includes all services and systems that are part of the cloud as well as the flow of information. Cloud is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet Cloud Robotics technologies centred on the benefits of converged infrastructure and shared services for robotics. Code Division Multiple Access A form of multiplexing, which allows numerous signals to occupy a single channel to optimize bandwidth. CDMA Code Division Multiple Access. A form of multiplexing, which allows numerous signals to occupy a single channel to optimize bandwidth. Intelligent devices that can scan and determine which radio frequencies are quiet and rapidly pick one or more over which to transmit and Cognitive Radio receive data. Cognitive Radio. Intelligent devices that can scan and determine which radio frequencies are quiet and rapidly pick one or more over which to CR transmit and receive data. Type of composition whose elements interact in a non-directed fashion, each according to their own plans and purposes without a predefined Collaboration pattern of behavior. Communication Model Communication models try to capture, explain, simplify, and then model communication. Companion Device In wearables, a companion device requires a parent device, such as a smartphone, to fully operate. A messaging pattern in which more consumers get messages from a common source (i.e. queue), but each message is delivered to only one Competing Consumers consumer. Complementary Metal-Oxide Semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of Complementary Metal-Oxide-Semiconductor today's computer microchips. Complementary Metal-Oxide Semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of CMOS today's computer microchips. Complex Event Processing The discovery or detection of complex events by combining and correlating data. CEP Complex Event Processing. The discovery or detection of complex events by combining and correlating data. Component Modular, deployable, and replaceable part of a system that encapsulates implementation and exposes a set of interfaces. Capability of a component to interact with any other component in recombinant fashion to satisfy requirements based on the expectation of Composability the behaviors of the interacting parties. Materials comprised of two or more components with significantly different physical or chemical properties, that when combined, produce a material that behaves differently from the individual components. The individual components remain separate and distinct within the finished Composites structure. Computer-aided design (CAD) is the use of a wide range of computer-based tools that assist engineers, architects, and other design Computer-Aided Design professionals in their design activities. Computer-aided design (CAD) is the use of a wide range of computer-based tools that assist engineers, architects, and other design CAD professionals in their design activities. In general, computer-aided manufacturing (CAM) refers to the use of computer systems to plan, manage, and control the operations of a Computer-Aided Manufacturing manufacturing plant through either direct or indirect computer interface with the plant's production resources. In general, computer-aided manufacturing (CAM) refers to the use of computer systems to plan, manage, and control the operations of a CAM manufacturing plant through either direct or indirect computer interface with the plant's production resources. The digital control of a physical machine that consists of a series of integrated actuators, power electronics, sensors, and dedicated computer Computer Numerical Control running under a real-time operating system. Confidentiality Property that information is not made available or disclosed to unauthorized individuals, entity, or processes. Confirmation Hashing a transaction and adding it to the particular Blockchain successfully. Connect Platform An IoT machine to mobile platform developed by Arrayent. Components that make up the . Many have built-in sensors and/or actuators and collect data to help users or other devices Connected Devices make informed decisions and monitor or affect outside events. Connectivity Protection A part of the Edge Layer that serves to ensure that device connectivity doesn’t fail if there is a network failure or an unreliable connection. Consensus This is realized when all network participants agree on the validity of the transactions. Constrained Application Protocol An application layer protocol used in resource-constrained devices that allows Internet connectivity and remote control. Constrained Application Protocol. An application layer protocol used in resource-constrained devices that allows Internet connectivity and CoAP remote control. The COBie approach simplifies the capture and recording of building project handover data, basically by entering things like serial numbers Construction Operations Building Information Exchangeas the project progresses. The COBie approach simplifies the capture and recording of building project handover data, basically by entering things like serial numbers COBie as the project progresses. Trust-based marketing is a marketing theory based on building consumer relationships through trustworthy dialogue and unbiased Consumer Trust information. This category is the most fascinating, as it refers to monitoring unknown factors (environmental, interaction between machines and Context-Aware Automation and Decision Optimizationinfrastructures, etc.) and having machines make decisions that are as “human-like” as possible. Context-Aware Automation and Decision Optimization. This category is the most fascinating, as it refers to monitoring unknown factors (environmental, interaction between machines and infrastructures, etc.) and having machines make decisions that are as “human-like” as CAADO possible. Big data analytics solutions, combined with the proliferation of edge devices collecting highly contextual data, are allowing businesses to craft Contextual Experiences experiences that are unique for each user. is an open source operating system for networked, memory-constrained systems with a particular focus on low-power wireless Contiki Internet of Things devices. Controller User that interacts across a network to affect a physical entity. In automobiles, a CAN connects Electronic Control Units (ECUs) using a multi-master serial bus (the CAN bus) to control actuators or receive Controller Area Network feedback from sensors. In automobiles, a CAN connects Electronic Control Units (ECUs) using a multi-master serial bus (the CAN bus) to control actuators or receive CAN feedback from sensors. COPE is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use Corporate Owned, Personally Enabled them as if they were personally-owned notebook computers, tablets or smartphones. COPE is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use COPE them as if they were personally-owned notebook computers, tablets or smartphones. Cortex-A Cortex-A refers to a series of processors from ARM that are equipped with ARMv7 and ARMv8 command sets. Cortex-M Cortex-M is a family of microprocessors developed by ARM which is mainly used in . Corto An open source application framework platform developed by Corto. Total cost of ownership is a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or Cost of Ownership system. Total cost of ownership is a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or TCO system. A protocol for communication between a CPE and Auto-Configuration Server (ACS) that encompasses secure auto-configuration as well as CPE WAN Management Protocol other CPE management functions within a common framework. CPE WAN Management Protocol. A protocol for communication between a CPE and Auto-Configuration Server (ACS) that encompasses CWMP secure auto-configuration as well as other CPE management functions within a common framework. CR2032 A battery rated at 3.0 volts commonly used in watches, wireless doorbells, and other small devices. Cross-cutting concern Concern that affects the whole system and thus may impact multiple layers of the architecture. Cross-domain Integration and Management Cross-domain Integration and Management helps product developers to ensure that they realize the best product possible. Cross-Training Training employees in several skill sets so they can fill in for one another as needed. A novel system for inventors and entrepreneurs to bypass traditional funding methods such as venture capital by raising small amounts from Crowdfunding a large group of individual backers. Crowdsource The process of obtaining needed services, ideas, or content by soliciting contributions from a large group of people. A cryptocurrency is an alternative, digital and virtual currency that uses cryptography to process and control transactions, as well as to create Cryptocurrency new units. Cryptographics Technologies and techniques that prevent attacks on other systems through IoT devices. Cumulocity A M2M device visualization, management, and integration developed by Cumulocity. Custom Campaign App An AR App with 1 to 5 experiences that is published and available through the Apple App Store and/or Google Play. An AR App with 1 to 5 experiences, used for a tradeshow or live event that is distributed to dedicated event iPads. Event apps are not Custom Event App available on the Apple App Store or Google Play. Event Apps typically have a life span of 3 to 6 months. Cyber Physical Systems A cyber physical system is a system of collaborating computational elements controlling physical entities. CPS Cyber Physical Systems. A cyber physical system is a system of collaborating computational elements controlling physical entities. DALI DALI is a standardized interface for lighting control. DASH7 is an “instant-on”, long range, low power wireless communications standard for applications requiring modest bandwidth like text DASH7 messages, sensor readings, or location-based advertising coordinates. Dashboard A user interface that presents key information in a summarized form, often as graphs or other widgets. Data aggregator Data aggregation is any process in which information is gathered and expressed in a summary form, for purposes such as statistical analysis. Data at rest is an information technology term referring to inactive data which is stored physically in any digital form (e.g. databases, data Data at Rest Encryptions warehouses, spreadsheets, archives, tapes, off-site backups, mobile devices etc.). Data Brokering Brokering of data through market mechanisms. Data centers are physical or virtual infrastructure used by enterprises to house computer, server and networking systems and components for the company's information technology (IT) needs, which typically involve storing, processing and serving large amounts of mission-critical Data Center data to clients in a client/server architecture. Data Classification Data classification is the process of organizing data into categories for its most effective and efficient use. Data Distribution Service An Object Management Group standard for publish/subscribe middleware for distributed systems. DDS Data Distribution Service. An Object Management Group standard for publish/subscribe middleware for distributed systems. Data-Driven Decision Management An approach to business governance valuing decisions that can be backed up with verifiable data. DDDM Data-Driven Decision Management. An approach to business governance valuing decisions that can be backed up with verifiable data. Data Encryption The process of encoding a message so that it can be read only by the sender and the intended recipient. Data governance (DG) refers to the overall management of the availability, usability, integrity, and security of the data employed in an Data Governance enterprise. Data governance (DG) refers to the overall management of the availability, usability, integrity, and security of the data employed in an DG enterprise. In information technology, the Datagram Transport Layer Security communications protocol provides communications security for datagram Datagram Transport Layer Security protocols. In information technology, the Datagram Transport Layer Security communications protocol provides communications security for datagram DTLS protocols. A subtask of data science concerned with the cleaning up of dirty or duplicative data. Oftentimes the janitor must get data into the correct Data Janitor columns and sort it. Datakinesis A term coined by Marc Blackmer, datakinesis occurs when an action taken in cyberspace has a result in the physical world. Coined by Pentaho CTO James Dixon, a data lake is a massive data repository, designed to hold raw data until it’s needed and to retain data Data Lake attributes so as not to preclude any future uses or analysis. Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and Data Mining summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data Normalization Data normalization is the process of reducing data to its canonical form. Data Science The extraction of knowledge from large volumes of data that are structured or unstructured. Data Scientist A job that combines statistics and programming, using languages such as R, to make sense of massive data sets. In connection-oriented communication, a data stream is a sequence of digitally encoded coherent signals (packets of data or data packets) Data Stream used to transmit or receive information that is in the process of being transmitted. Data ecosystems are complex and littered with data silos, limiting the value that organizations can get out of their own data by making it Data Supply Chain difficult to access. Data Velocity Speed with which data is generated and processed. DATEX II is a standard developed for information exchange between traffic management centres developed in line with the ITS (Intelligent DATEX-II Transport Systems) Action Plan. Decentralized Application A decentralized application which is open source, operates autonomously and stores its data on a Blockchain. Dapp Decentralized Application. A decentralized application which is open source, operates autonomously and stores its data on a Blockchain. A Decentralized Autonomous Organization is an organization that runs without human intervention. Governance is strictly restricted to pre- Decentralized Autonomous Organization coded rules. Decentralized Autonomous Organization. A Decentralized Autonomous Organization is an organization that runs without human intervention. DAO Governance is strictly restricted to pre-coded rules. Intelligence evolves in the swarm. Decentralized intelligence will play an important role in Industry 4.0: all parties can communicate with one another – workpiece with machine, machine with machine or with higher-level processes. No central “brain” will control and monitor the Decentralized Intelligence things, but rather autonomous productionunits will carry out this function for both heterogeneous and homogeneous teams. Counteracting the rapid growth of data is the plummeting cost of storing it, enabling companies to maintain vast data lakes that can later be Decreasing Cost of Storage used to uncover analytical value. Dedicated short-range communication (DSRC) is a wireless communication technology designed to allow automobiles in the intelligent transportation system (ITS) to communicate with other automobiles or infrastructure technology. DSRC technology operates on the 5.9 GHz Dedicated Short-Range Communication band of the radio frequency spectrum and is effective over short to medium distances. An engineering concept used in MEMS that describes the directions in which an object can move and generally the number of independent Degrees of Freedom variables in a dynamic system. Degrees of Freedom. An engineering concept used in MEMS that describes the directions in which an object can move and generally the DoF number of independent variables in a dynamic system. De-identification The stripping away of personally identifiable information from data prior to its use. An alternative consensus mechanism where transactions on a Blockchain are validated by voted delegates. That requires coin holders to Delegated Proof of Stake vote for “delegates”, who are then responsible for validating transactions and maintaining the particular Blockchain. Delegated Proof of Stake. An alternative consensus mechanism where transactions on a Blockchain are validated by voted delegates. That DPOS requires coin holders to vote for “delegates”, who are then responsible for validating transactions and maintaining the particular Blockchain. Denial of Service Attack An attempt to make a machine or network resource unavailable to its intended users. DoS Denial of Service Attack. An attempt to make a machine or network resource unavailable to its intended users. Device Attack An exploit that takes advantage of a vulnerable device to gain access to a network. Device Cloud Networks An IoT device management platform. DCN Device Cloud Networks. An IoT device management platform. Device Drivers A device driver is a program that controls a particular type of device that is attached to your computer. DeviceHive A M2M platform developed by DeviceHive. deviceJS An open source JavaScript library for IoT devices developed by deviceJS. The term provisioning for a device means to evolve a device to a state in which it can be handed-off to an end user, or end-user team, for Device Provisioning their specific use in a functional manner. deviceWISE IoT Platform for Factories An IoT platform for factories developed by TELIT. DigiMesh DigiMesh is a proprietary peer-to-peer wireless networking topology developed by Digi International. Digital Data Storage This format is used to store computer data on audio tape. DDstorage Digital Data Storage. This format is used to store computer data on audio tape. Digital disruption is the change that occurs when new digital technologies and business models affect the value proposition of existing goods Digital Disruption and services. Digital Enhanced Cordless Telecommunications It originated in Europe, where it is the universal standard, replacing earlier cordless phone standards, such as 900 MHz CT1 and CT2. Digital Enhanced Cordless Telecommunications. It originated in Europe, where it is the universal standard, replacing earlier cordless phone DECT standards, such as 900 MHz CT1 and CT2. Whenever you use the Internet, or even your cell phone, a digital footprint is the mark you leave behind. Managing and securing digital Digital Footprint footprints will be one area of focus for many IT leaders. Aims to improve product design and manufacturing processes across the board seamless integration of information technology systems Digital Manufacturing across the supply chain. Digital Signal Controller A digital signal controller (DSC) is a hybrid of microcontrollers and digital signal processors (DSPs). DSC Digital Signal Controller. A digital signal controller (DSC) is a hybrid of microcontrollers and digital signal processors (DSPs). A digital signal processor is a specialized microprocessor (or a SIP block), with its architecture optimized for the operational needs of digital Digital Signal Processors signal processing. Digital Signal Processors. A digital signal processor is a specialized microprocessor (or a SIP block), with its architecture optimized for the DSP operational needs of digital signal processing. A digital code generated by public key encryption that is attached to an electronically transmitted document to verify its contents and the Digital Signature sender’s identity. The digital supply chain merges the major business processes of all parties involved – from the suppliers to the manufacturer and the end Digital Supply Chain customer. The process of moving information onto a format that can be understood by a computer in order for that data to be used in computational Digitization calculations. Diminished Reality A term used to describe the control over one's reality and the ability to block out real or digital information at will. DIN Rail A metal rail used for mounting electrical equipment and racks. DAG is a directed graph data structure that uses a topological ordering. The sequence can only go from earlier to later. Its main application is Directed Acyclic Graph an alternative to the Blockchain protocol, provided by IOTA and marketed as the ‘Tangle’. Directed Acyclic Graph. DAG is a directed graph data structure that uses a topological ordering. The sequence can only go from earlier to DAG later. Its main application is an alternative to the Blockchain protocol, provided by IOTA and marketed as the ‘Tangle’. Google has developed a software framework called DistBelief that can utilize computing clusters with thousands of machines to train large Distbelief models. A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing Distributed Denial of Service Attack denial of service for users of the targeted system. Distributed Denial of Service Attack. A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack DDOS a single target, thereby causing denial of service for users of the targeted system. Distributed Generation Decentralized, modular, and flexible power generation located close to the serviced loads. Distributed Memory and Processing In computer science, distributed memory refers to a multiprocessor computer system in which each processor has its own private memory. In computer programming, distributed revision control, also known as distributed version control or decentralized version control, allows many Distributed Version Control software developers to work on a given project without requiring them to share a common network. An open, standards-based protocol for the electric utility industry with interoperability between substation computers, remote terminal units, DNP3 Protocol intelligent electronic devices and master stations. DNP3 Protocol. An open, standards-based protocol for the electric utility industry with interoperability between substation computers, remote DNP3 terminal units, intelligent electronic devices and master stations. Do It Yourself Enthusiasts generally tinker with gadgets or software to improve the functionality or do custom-install projects in their homes. DIY Do It Yourself. Enthusiasts generally tinker with gadgets or software to improve the functionality or do custom-install projects in their homes. Domain Model In software engineering a domain model is a conceptual model of the domain that incorporates both behavior and data. The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a Domain Name System private network. Domain Name System. The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource DNS connected to the Internet or a private network. A combination of domestic and robotics - also a composite of the Latin domus and informatics, domotics includes home automation systems, Domotics home , whole house audio/visual systems, and security systems. Double Spending The risk that a digital currency can be spent twice. Downlink Abbreviated as DL or D/L, downlink is the process of downloading data onto an end node from a server/target address. DWG A format for different computer-aided design programs, including AutoCAD. Eagle.IO A data management platform developed by Eagle.IO. A short-hand for “digital” or “connected” ecosystem, which is a distributed, adaptive, open socio-technical system with properties of self- Ecosystem organization, scalability and sustainability inspired from natural ecosystems. Eddystone An open beacon message format (Frame) from Google. is pushing the frontier of computing applications, data, and services away from centralized nodes to the logical extremes of Edge Computing a network. An edge gateway serves as a network entry point for devices typically talking to cloud services. They also often provide network translation Edge Gateway between networks that use different protocols. Edison Intel's development board, slightly larger than a standard SD-card, targeting the wearable vertical. Electric Imp is a Los Altos, California and Cambridge, England based technology company that provides connectivity for the Internet of Electric Imp Things through a cloud service and embedded hardware and software platform, enabling devices to be connected to the Internet. Electrodermal Response A change in the electrical properties of the skin based on "arousal" factors such as an emotional response. EDR Electrodermal Response. A change in the electrical properties of the skin based on "arousal" factors such as an emotional response. A field of force that consists of both electric and magnetic components, resulting from the motion of an electric charge and containing a Electromagnetic Field definite amount of electromagnetic energy. Electromagnetic Field. A field of force that consists of both electric and magnetic components, resulting from the motion of an electric charge EMF and containing a definite amount of electromagnetic energy. Electronic Control Unit Also known as a node, an Electronic Control Unit is a device, such as a sensor or actuator, that is connected to other devices via a CAN Bus. Electronic Control Unit. Also known as a node, an Electronic Control Unit is a device, such as a sensor or actuator, that is connected to other ECU devices via a CAN Bus. Electronic Paper Electronic paper, e-paper and electronic ink are display technologies that mimic the appearance of ordinary ink on paper. Electronic Serial Number An ESN is a numeric identifier that uniquely identifies a CDMA phone in the United States. ESN Electronic Serial Number. An ESN is a numeric identifier that uniquely identifies a CDMA phone in the United States. Electrostatic Discharge A discharge can occur when two electrical objects with different electrical charge come in contact with each other. ESD Electrostatic Discharge. A discharge can occur when two electrical objects with different electrical charge come in contact with each other. Element Unit that is indivisible at a given level of abstraction and has a clearly defined boundary. Embedded Device Hacking The exploiting of vulnerabilities in embedded software to gain control of the device. Embedded Firmware The flash memory chip that stores specialized software running in a chip in an embedded device to control its functions. Embedded Software Specialized programming in a chip or on firmware in an embedded device to control its functions. Embedded System Security Embedded system security is the reduction of vulnerabilities and protection against threats in software running on embedded devices. Embrace, Extend, and Extinguish A strategy associated with Microsoft to defeat open standards with proprietary extensions. Emergent Behavior Behavior of a system realized by the interactions of its components. For a technology to become much more deeply ingrained in an economy, transfer factors must be developed. These factors induce wider Enabling Transfer Factors changes in the behaviour of firms, consumers and society. Enabling Transfer Factors. For a technology to become much more deeply ingrained in an economy, transfer factors must be developed. ETF These factors induce wider changes in the behaviour of firms, consumers and society. Encryption In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Endpoint One of two components that either implements and exposes an interface to other components or uses the interface of another component. End Point Authentication Endpoint authentication is an authentication mechanism used to verify the identity of a network's external or remote connecting device. The process by which energy is derived from external sources and stored for small, wireless autonomous devices (biological, chemical, Energy Harvesting induction). Energy Harvesting. The process by which energy is derived from external sources and stored for small, wireless autonomous devices EH (biological, chemical, induction). This is an enhancement made to 2G GSM networks to improve data transfer speeds and provides downlink speeds of up to 1 Mbit/s and Enhanced Data Rates for GSM Evolution uplink speeds of up to 400 kbit/s. Enhanced Data Rates for GSM Evolution. This is an enhancement made to 2G GSM networks to improve data transfer speeds and provides EDGE downlink speeds of up to 1 Mbit/s and uplink speeds of up to 400 kbit/s. EnOcean An IoT protocol focused on Wireless Standard for Connected Devices. Environment Context determining the setting and circumstances of all interactions and influences with the system of interest. Ephemeral Identifier A security feature of Google's Eddystone beacon protocol, EID's are beacon IDs that change frequently. EID Ephemeral Identifier. A security feature of Google's Eddystone beacon protocol, EID's are beacon IDs that change frequently. Equipment-as-a-service is rapidly moving from a specialized notion pioneered by the providers of medical and other specialized devices to Equipment-as-a-Service general adoption. Equipment-as-a-Service. Equipment-as-a-service is rapidly moving from a specialized notion pioneered by the providers of medical and other EaaS specialized devices to general adoption. From the Chinese company Espressif Systems, the ESP8266 places a complete Wi-Fi network component set or "stack" on a single, tiny and ESP8266 relatively inexpensive chip. Establishing the Business Commons Building on a technological foundation, countries must create a sound business commons. EtherCAT A fieldbus system developed by Beckhoff, which allows for real-time Ethernet. The Ethereum Virtual Machine is a Turing complete virtual machine that allows anyone to deploy smart contracts on the Ethereum Ethereum Virtual Machine Blockchain. Ethereum Virtual Machine. The Ethereum Virtual Machine is a Turing complete virtual machine that allows anyone to deploy smart contracts EVM on the Ethereum Blockchain. Ethernet Ethernet is a family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs). European Article Number Worldwide standardized 13-digit bar code numbering scheme for identifying packages, shipping containers, parts practically anything. European Article Number. Worldwide standardized 13-digit bar code numbering scheme for identifying packages, shipping containers, parts EAN practically anything. Event Driven Architecture Event-driven architecture is a software architecture pattern promoting the production, detection, consumption of, and reaction to events. Event Driven Architecture. Event-driven architecture is a software architecture pattern promoting the production, detection, consumption of, EDA and reaction to events. Event Stream Processing A set of technologies designed to assist the construction of event-driven information systems. ESP Event Stream Processing. A set of technologies designed to assist the construction of event-driven information systems. Eurotech’s Everyware Software Framework (ESF) is an inclusive and targeted Java OSGi software framework for M2M multiservice Everyware Software Framework gateways, smart devices and IoT applications. Everyware Software Framework. Eurotech’s Everyware Software Framework (ESF) is an inclusive and targeted Java OSGi software ESF framework for M2M multiservice gateways, smart devices and IoT applications. EvoThings Studio An IoT Design/Connection Platform developed by EvoThings. Exabyte The exabyte is a multiple of the unit byte for digital information. 10^18 byte Exabyte. The exabyte is a multiple of the unit byte for digital information. Exosite is a internet of things software as a service company that develops software for companies that views and analyzes data collected Exosite from sensors built into physical objects. A term referring to all real-and-virtual combined environments and human-machine interactions generated by computer technology and Extended Reality wearables. The levels of virtuality range from partially sensory inputs to immersive virtuality, also called VR. Extended Reality. A term referring to all real-and-virtual combined environments and human-machine interactions generated by computer XR technology and wearables. The levels of virtuality range from partially sensory inputs to immersive virtuality, also called VR. The concept that a target's pose information will be available even when the Target is no longer in the field of view of the camera or cannot Extended Tracking directly be tracked for other reasons. Extensible Messaging and Presence Protocol (XMPP) is a communications protocol for message-oriented middleware based on XML Extensible Messaging and Presence Protocol (Extensible Markup Language). Extensible Messaging and Presence Protocol. Extensible Messaging and Presence Protocol (XMPP) is a communications protocol for XMPP message-oriented middleware based on XML (Extensible Markup Language). An extension to the UCP (Universal Computer Protocol) and is used to connect to Short Message Service Centers which store, transform, External Machine Interface Protocol and send short messages. External Machine Interface Protocol. An extension to the UCP (Universal Computer Protocol) and is used to connect to Short Message EMI Service Centers which store, transform, and send short messages. Federated Naming Service provides a method for hooking up, or federating, multiple naming services under a single, simple uniform interface Federated Object Naming Service for the basic naming and directory operations. Federated Object Naming Service. Federated Naming Service provides a method for hooking up, or federating, multiple naming services F-ONS under a single, simple uniform interface for the basic naming and directory operations. Feedback loops in software Enable companies to learn how their customers use and modify their software. Field of View represents the visual area in which users can see virtual content in an augmented reality headset. Also known as "FoV," this term can also be explained as a measurement of the angle formed by the distance from the user to a fixed point in space and the bounds of Field of View vision to the left and right of that point. Field of View. Field of View represents the visual area in which users can see virtual content in an augmented reality headset. Also known as "FoV," this term can also be explained as a measurement of the angle formed by the distance from the user to a fixed point in space and the FoV bounds of vision to the left and right of that point. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP- File Transfer Protocol based network, such as the Internet. File Transfer Protocol. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to FTP another host over a TCP-based network, such as the Internet. Firmware Firmware is a software program or set of instructions programmed on a hardware device. The process of updating a mobile phone’s operating system and software over the network, rather than having the consumer come into a Firmware Over-the-Air service center for updates. Firmware Over-the-Air. The process of updating a mobile phone’s operating system and software over the network, rather than having the FOTA consumer come into a service center for updates. Firmware Update Management Object An open mobile alliance specification for updating the firmware of mobile devices over the air. FUMO Firmware Update Management Object. An open mobile alliance specification for updating the firmware of mobile devices over the air. Fitness Band A type of activity tracker worn on the wrist, with sensors specifically related to exercise and activity measuring. Fluentd Fluentd is an open source data collector for unified logging layer. Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network. Form Factor The physical size, pin-out, and configuration of a component. Frame The language a beacon uses to communicate externally. Future Internet Future Internet is a general term for research activities on new architectures for the Internet. FI Future Internet. Future Internet is a general term for research activities on new architectures for the Internet. 1G 1G networks (NMT, C-Nets, AMPS, TACS) are considered to be the first analog cellular systems, which started early 1980s. 2.5G is the second and a half generation wireless service, which is the intermediate step in mobile communications, between second (2G) 2.5G and third (3G) generation networks. The second generation of GSM cellular technology that improved performance by adding to the cellular radio spectrum to help solve 2G coverage issues and drops in signal due to urban obstacles. 3G The third generation of GSM cellular technology, offering substantially improved data transfer rates over its predecessor, 2G. The fifth generation of mobile networks or 5th generation wireless systems denotes the next major phase of mobile telecommunications 5G standards beyond the current 4G/IMT-Advanced standards, which has speeds beyond what the current 4G can offer. Galileo Intel's line of Arduino-certified development boards. Intel Intel's line of Arduino-certified development boards. Gateway A link between two computer systems or programs, which allows them to share information with each other (e.g. router). A wireless communications standard on 2G and 3G cellular networks which supports a number of bandwidths and provides data rates of 56- General Packet Radio Service 114 kbps. General Packet Radio Service. A wireless communications standard on 2G and 3G cellular networks which supports a number of bandwidths GPRS and provides data rates of 56-114 kbps. Genesis Block The initial block on a particular Blockchain. A virtual border applied to a physical space e.g. geofencing might be defined around a nursery, and when a mobile device crosses the Geofence nursery boundary, an alert is generated. GeoJSON is an open standard format designed for representing simple geographical features, along with their non-spatial attributes, based GeoJSON on JavaScript Object Notation. A metadata record is a file of information, usually presented as an XML document, which captures the basic characteristics of a data or Geospatial Metadata information resource. 2.4 GHz A short-range wireless band commonly used in wireless technologies such as Wi-Fi, Bluetooth, and ZigBee. Global Navigation Satellite System The Russian global navigation satellite system with a constellation made of 24 satellites orbiting Earth. GLONASS Global Navigation Satellite System. The Russian global navigation satellite system with a constellation made of 24 satellites orbiting Earth. Global Navigation Satellite System GNSS is a satellite system that is used to pinpoint the geographic location of a user's receiver anywhere in the world. Global Navigation Satellite System. GNSS is a satellite system that is used to pinpoint the geographic location of a user's receiver anywhere GNSS in the world. Short for Global Positioning System, a worldwide MEOsatellite navigational system formed by 24 satellites orbiting the earth and their Global Positioning System corresponding receivers on the earth. Global Positioning System. Short for Global Positioning System, a worldwide MEOsatellite navigational system formed by 24 satellites GPS orbiting the earth and their corresponding receivers on the earth. Global Scheduler A software component that regulates how IoT services access the different resources managed by the OpenIoT platform. An open source sensor middleware platform enabling the development and deployment of sensor services with almost zero-programming Global Sensor Networks effort. Global Sensor Networks. An open source sensor middleware platform enabling the development and deployment of sensor services with GSN almost zero-programming effort. This is the most widely used digital cellular network and the basis for mobile communication such as phone calls and the short message Global System for Mobile Communication service (SMS). Global System for Mobile Communication. This is the most widely used digital cellular network and the basis for mobile communication such GSM as phone calls and the short message service (SMS). The fourth generation of GSM cellular technology, also referred to as LTE, and the latest upgrade to the GSM network, providing greater data 4G LTE transfer speeds. glTF is a royalty-free format for exporting 3D models and scenes from one program and importing them into an application to view in GL Transmission Format augmented or virtual reality. It is an open-source project run by Kronos. GL Transmission Format. glTF is a royalty-free format for exporting 3D models and scenes from one program and importing them into an gITF application to view in augmented or virtual reality. It is an open-source project run by Kronos. Google Cloud Platform is a cloud computing platform by Google that offers hosting on the same supporting infrastructure that Google uses Google Cloud Platform internally for end-user products like Google Search and YouTube. Grafana 2.0 An open source graphing and visualization platform developed by Grafana. Graphical User Interface A user interface that allows users to interact with a device through graphics, icons and visual elements. GUI Graphical User Interface. A user interface that allows users to interact with a device through graphics, icons and visual elements. Graphic Processors GPUs are used in embedded systems, mobile phones, personal computers, workstations, and game consoles. GPU Graphic Processors. GPUs are used in embedded systems, mobile phones, personal computers, workstations, and game consoles. In contradiction to brownfield, a greenfield project is a one where no consideration of previous systems is needed, thus already existing Greenfield standards can be ignored. Gyroscope A gyroscope is a spinning wheel or disc in which the axis of rotation is free to assume any orientation. hackster.io An open source database of IoT projects and platforms developed by hackster.io. Hadoop An open-source software framework for distributed storage and distributed processing of very large data sets. Hadoop as a Service The running of Hadoop in the Cloud, requiring no local hardware or IT infrastructure. HaaS Hadoop as a Service. The running of Hadoop in the Cloud, requiring no local hardware or IT infrastructure. The primary distributed storage used by Hadoop applications. A HDFS cluster has a name node that manages the file system metadata and Hadoop Distributed File System data nodes to store the actual data. Hadoop Distributed File System. The primary distributed storage used by Hadoop applications. A HDFS cluster has a name node that HDFS manages the file system metadata and data nodes to store the actual data. Hana An IoT IaaS, PaaS, analytics, integration developed by SAP. SAP HANA An IoT IaaS, PaaS, analytics, integration developed by SAP. Haptic Technology Also referred to as Haptics or “touch feedback,” haptic technology applies tactile sensations to human interactions with machines. Haptics Also referred to as Haptics or “touch feedback,” haptic technology applies tactile sensations to human interactions with machines. Hard Fork The moment a protocol version which is different from the main chain’s protocol comes into existence. Hash The act of performing a hash function on the output data. This is used for confirming coin transactions. HBase Apache HBase is an open-source, distributed, versioned, non-relational database modeled after Google's Bigtable. Is a display device, worn on the head or as part of a helmet that has a small display optic in front of one (monocular HMD) or each eye Head-Mounted-Display (binocular HMD). Head-Mounted-Display. Is a display device, worn on the head or as part of a helmet that has a small display optic in front of one (monocular HMD HMD) or each eye (binocular HMD). Heating, Ventilation, and Air Conditioning Sometimes grouped with refrigeration as HVACR, these systems cover both vehicular and indoor building comfort control. Heating, Ventilation, and Air Conditioning. Sometimes grouped with refrigeration as HVACR, these systems cover both vehicular and indoor HVAC building comfort control. A term coined by design academics Anthony Dunne and Fiona Raby, Hertzian Space refers to the hidden electromagnetic environment Hertzian Space generated by the increasing number of wireless devices. Heterogeneous Network Small cell networks using both macro and small cells. HetNets allow mobile operators to better utilize their data networks’ capacity. Heterogeneous Network. Small cell networks using both macro and small cells. HetNets allow mobile operators to better utilize their data HetNet networks’ capacity. High Speed Downlink Packet Access This increases the capacity of UMTS/3G bandwidth to allow for faster download speeds for connected devices. High Speed Downlink Packet Access. This increases the capacity of UMTS/3G bandwidth to allow for faster download speeds for connected HSDPA devices. An improvement made to transfer speeds over 3G technology through the addition of two new protocols; HSDPA and HSUPA, which offers High Speed Packet Access potential downlink speeds of 14 Mbit/s and downlink of 5.76 Mbit/s. High Speed Packet Access. An improvement made to transfer speeds over 3G technology through the addition of two new protocols; HSDPA HSPA and HSUPA, which offers potential downlink speeds of 14 Mbit/s and downlink of 5.76 Mbit/s. High Speed Uplink Packet Access An improvement made to UMTS to enable faster uploading of data from devices, increasing capacity and throughput while reducing delay. HSUPA An improvement made to UMTS to enable faster uploading of data from devices, increasing capacity and throughput while reducing delay. Hologram A photograph of an interference pattern which, when suitably illuminated, produces a three-dimensional image. Homomorphic encryption is a form of encryption that allows computations to be carried out on ciphertext, thus generating an encrypted result Homomorphic Encryption which, when decrypted, matches the result of operations performed on the plaintext. Hop In computer networking, a hop is one portion of the path between source and destination. Computers that provide (or host) certain services or resources within a network that other participants within the network can then access and Host use. Tappable spots within the AR experience that reveal more content or options. Hotspots can be animated and are often shown as a glowing Hotspots orb. HP Helion HP Helion is a portfolio of open-source software and integrated systems for enterprise cloud computing. HCI (human-computer interaction) is the study of how people interact with computers and to what extent computers are or are not developed Human-Computer Interaction for successful interaction with human beings. Human-Computer Interaction. HCI (human-computer interaction) is the study of how people interact with computers and to what extent HCI computers are or are not developed for successful interaction with human beings. Another way of expressing the Quantified Self concept, the HIoT refers to the collection and optimization of physiological data from sensors Human Internet of Things applied to humans, generally with wearable tech. Human Internet of Things. Another way of expressing the Quantified Self concept, the HIoT refers to the collection and optimization of HIoT physiological data from sensors applied to humans, generally with wearable tech. Human-Machine Interface A user-interface consisting of hardware and software that lets a person send request/commands to a machine. HMI Human-Machine Interface. A user-interface consisting of hardware and software that lets a person send request/commands to a machine. The intersection between physical industries and digital technologies (e.g. precision agriculture, digital manufacturing, medical robotics, smart Hybrid Industries transportation). Hyperscale computing is a distributed computing environment in which the volume of data and the demand for certain types of workloads can Hyperscale Computing increase exponentially yet still be accommodated quickly in a cost-effective manner. HyperText Markup Language 5 HTML5 is a markup language used for structuring and presenting content on the World Wide Web. HTML 5 HTML5 is a markup language used for structuring and presenting content on the World Wide Web. Hypertext Transfer Protocol An application protocol for distributed, collaborative, hypermedia information systems. HTTP An application protocol for distributed, collaborative, hypermedia information systems. iBeacon Apple's brand name for their beacon technology. Identifier Also just ID, this marks objects for clear identification. Identity Recognizable attributes that are linked to an object, a person, etc. Identity Domain Environment where an entity can use a set of attributes for identification and other purposes. Processes and policies involved in managing the lifecycle and value, type and optional metadata of attributes in identity known in a particular Identity Management identity domain. Identity Management. Processes and policies involved in managing the lifecycle and value, type and optional metadata of attributes in identity IdM known in a particular identity domain. The Identity of Things (IDoT) is an area of endeavor that involves assigning unique identifiers (UID) with associated metadata to devices and Identity of Things objects (things), enabling them to connect and communicate effectively with other entities over the Internet. Identity of Things. The Identity of Things (IDoT) is an area of endeavor that involves assigning unique identifiers (UID) with associated IDoT metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet. Process to determine that presented identity information associated with a particular entity is applicable for the entity to be recognized in a Identity Verification particular identity domain at some point in time. IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network IEEE 802.11 (WLAN) computer communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands. IEEE 802.15.4 Low-cost, low-power consumption, low complexity, low to medium range communication standard at the link and the physical layers. IEEE 802.16 IEEE 802.16 is a series of wireless broadband standards written by the Institute of Electrical and Electronics Engineers (IEEE). IEEE 802.11ac is a wireless networking standard in the 802.11 family (which is marketed under the brand name Wi-Fi), developed in the IEEE 802.11ac IEEE Standards Association process, providing high-throughput wireless local area networks (WLANs) on the 5 GHz band. IEEE 802.11ah A wireless standard that utilizes license-exempt, sub-1 GHz bands to provide long range Wi-Fi networks. IEEE 802.11n IEEE 802.11n-2009, commonly shortened to 802.11n, is a wireless networking standard that uses multiple antennas to increase data rates. IEEE 802.11n-2009 IEEE 802.11n-2009, commonly shortened to 802.11n, is a wireless networking standard that uses multiple antennas to increase data rates. IEEE 802.11p Amends wireless access in vehicular environments (WAVE) to the IEEE 802.11 Wi-Fi standard. The image recognized by the App, which launches the AR experience. Images with high contrast and unique features with sharp edges are Image Target (also: trackable, trigger, marker, AR target)key pillars in supporting image recognition. Individualized, or customized, production refers to the concept of an intelligent, highly automated production system that allows high variance Individualized Production and dynamism in the product range with production costs at the level of mass production. Industrial control system is a general term that encompasses several types of control systems used in industrial production, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system Industrial Control System configurations such as programmable logic controllers (PLC) often found in the industrial sectors and critical infrastructures. Industrial Control System. Industrial control system is a general term that encompasses several types of control systems used in industrial production, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control ICS system configurations such as programmable logic controllers (PLC) often found in the industrial sectors and critical infrastructures. Industrial Internet A short-hand for the industrial applications of IoT, also known as the Industrial Internet of Things, or IIoT. Industrial Internet of Things Internet of things technologies, processes, and business models applied to industry (B2B). IIoT Industrial Internet of Things. Internet of things technologies, processes, and business models applied to industry (B2B). The industrial, scientific, and medical radio band refers to a group of radio bands or parts of the radio spectrum that are internationally reserved for the use of radio frequency (RF) energy intended for scientific, medical and industrial requirements rather than for Industrial, Scientific, and Medical Bands communications. Industrial, Scientific, and Medical Bands. The industrial, scientific, and medical radio band refers to a group of radio bands or parts of the radio spectrum that are internationally reserved for the use of radio frequency (RF) energy intended for scientific, medical and industrial ISM requirements rather than for communications. Industry 4.0, Industrie 4.0 or the fourth industrial revolution, is the current trend of automation and data exchange in manufacturing technologies. It includes cyber-physical systems, the Internet of things and cloud computing. The term "Industrie 4.0" originates from a project in the high-tech strategy of the German government, which promotes the computerization of manufacturing.Invoking a fourth Industrial Revolution, Industrie 4.0 creates intelligent manufacturing networks where decentralized smart factories can communicate and react to each other autonomously.Industry 4.0 creates what has been called a "smart factory". Within the modular structured smart factories, cyber-physical systems monitor physical processes, create a virtual copy of the physical world and make decentralized decisions. Over the Internet of Things, cyber-physical systems communicate and cooperate with each other and with humans in real time, and via the Internet of Services, Industrie 4.0 both internal and cross-organizational services are offered and used by participants of the value chain. A sensor that uses an inertial measurement unit (IMU) via onboard accelerometers and gyroscopes to better estimate the object or vehicle's Inertial Guidance position. Inertial guidance is used in collaboration with other sensors and software to localize the object or vehicle. An inertial measurement unit is an electronic device that measures and reports a body's specific force, angular rate, and sometimes the Inertial Measurement Unit magnetic field surrounding the body, using a combination of accelerometers and gyroscopes, sometimes also magnetometers. Inertial Measurement Unit. An inertial measurement unit is an electronic device that measures and reports a body's specific force, angular rate, and sometimes the magnetic field surrounding the body, using a combination of accelerometers and gyroscopes, sometimes also IMU magnetometers. Information and communication technology is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and Information and Communication Technologies applications associated with them, such as videoconferencing and distance learning. Information and Communication Technologies. Information and communication technology is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance ICT learning. Infrastructure as a Service One of the main categories of Cloud computing services, IaaS provides virtualized computing resources online. IaaS Infrastructure as a Service. One of the main categories of Cloud computing services, IaaS provides virtualized computing resources online. Integration Integration is the act of bringing together smaller components into a single system that functions as one. Integrity, in terms of data and network security, is the assurance that information can only be accessed or modified by those authorized to do Integrity so. Intelligent Device Any type of equipment, instrument, or machine that has its own computing capability. Intelligent Enterprise A management approach that applies technology and new service paradigms to the challenge of improving business performance. A system with sensors measuring smoke and carbon monoxide, giving both early warnings, howling alarms and speaks with a human voice Intelligent Fire Alarm telling where the smoke is or when carbon monoxide levels are rising. Intelligent Thermostat Smart thermostats are home automation devices responsible for controlling a home's heating, and sometimes air conditioning. Interactive Video A video with features, such as hotspots, that call for the user to interact with the video. Interface Named set of operations that characterize the behavior of an entity. Interim Standard 136 IS-136 is a mobile communications interim standard which extends the functions of the dual-mode system standard IS-54B. Interim Standard 136. IS-136 is a mobile communications interim standard which extends the functions of the dual-mode system standard IS- IS-136 54B. Interim Standard 95 Interim Standard 95 (IS-95) was the first ever CDMA-based digital cellular technology. IS-95 Interim Standard 95 (IS-95) was the first ever CDMA-based digital cellular technology. Inter-Integrated Circuit I2C, pronounced I-squared-C, is a serial bus that provides communication between sensors and microcontrollers such as the Arduino. I2C I2C, pronounced I-squared-C, is a serial bus that provides communication between sensors and microcontrollers such as the Arduino. The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices Internet worldwide. Internet Group Management Protocol This communication protocol is based on the IP protocol and is used to support group communication. IGMP This communication protocol is based on the IP protocol and is used to support group communication. Both the Internet of Automation (IoA) and the Internet of Robotics (IoR) make use of defined open communications and data standards to Internet of Automation network interoperable production processes even across company boundaries. Both the Internet of Automation (IoA) and the Internet of Robotics (IoR) make use of defined open communications and data standards to IoA network interoperable production processes even across company boundaries. Both the Internet of Automation (IoA) and the Internet of Robotics (IoR) make use of defined open communications and data standards to Internet of Robotics network interoperable production processes even across company boundaries. Both the Internet of Automation (IoA) and the Internet of Robotics (IoR) make use of defined open communications and data standards to IoR network interoperable production processes even across company boundaries. Internet of Energy Systems that tap existing grid networks to tailor electricity supply and demand services. IoE Systems that tap existing grid networks to tailor electricity supply and demand services. Internet of Everything A M2M, IoT Infrastructure developed by Cisco. Internet of Things Foundation A virtualization, database, PaaS and IaaS developed by IBM. A network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the Internet of Things external environment. A network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the IoT external environment. Internet of Things Platform A virtualization, database, PaaS, IaaS developed by Oracle. The special considerations required to protect the information of individuals from exposure in the IoT environment, where almost any physical Internet of Things Privacy or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network. IoV technology refers to dynamic mobile communication systems that communicate between vehicles and public networks using V2V (vehicle-to-vehicle), V2R (vehicle-to-road), V2H (vehicle-to-human) and V2S (vehicle-to-sensor) interactions. IoV technology refers to dynamic mobile communication systems that communicate between vehicles and public networks using V2V IoV (vehicle-to-vehicle), V2R (vehicle-to-road), V2H (vehicle-to-human) and V2S (vehicle-to-sensor) interactions. Internet Protocol Version 4 Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). IPv4 Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). Internet Protocol Version 6 is also called IPng (Internet Protocol next generation) and it is the newest version of the Internet Protocol (IP) Internet Protocol Version 6 reviewed in the IETF standards committees to replace the current version of IPv4 (Internet Protocol Version 4). Internet Protocol Version 6 is also called IPng (Internet Protocol next generation) and it is the newest version of the Internet Protocol (IP) IPv6 reviewed in the IETF standards committees to replace the current version of IPv4 (Internet Protocol Version 4). Interoperability Interoperability is the ability of a system or a product to work with other systems or products without special effort on the part of the customer. ioEYE Is a cloud based machine to machine software platform. Internet of Things botnet is a group of hacked computers, smart appliances, and Internet-connected devices that have been co-opted for illicit IoT Botnet purposes. IoTivity An open source reference architecture developed by IoTivity. IoT Security IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things. IoTSYS An IoT middleware platform developed by Iotsys. IPv6 Address A 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme. A satellite communication constellation that provides global voice and data coverage through its satellite network, operating on the 1618.85 to IRIDIUM 1626.5 MHz frequencies. ISO 18000–7 DASH7 Standard developed by DASH7 Alliance - a low power, low complexity, radio protocol for all sub 1GHz radio devices. Izot Platform An industrial and smart building sensor devices and controllers developed by Echelon. Jasper Carrier-independent provider of IoT communications services, designed to provide management of multiple cellular carriers. JSON grew out of a need for stateful, real-time server-to-browser communication without using browser plugins such as Flash or Java JavaScript Object Notation applets, which were the dominant method in the early 2000s. JSON grew out of a need for stateful, real-time server-to-browser communication without using browser plugins such as Flash or Java JSON applets, which were the dominant method in the early 2000s. Just-in-time (JIT) manufacturing is a production model in which items are created to meet demand, not created in surplus or in advance of Just In Time need. Just-in-time (JIT) manufacturing is a production model in which items are created to meet demand, not created in surplus or in advance of JIT need. An algorithm that produces estimates of the state of a system based on a sequence of noisy observations, making it an important topic in Kalman Filter control systems. Quantifiable measurements to evaluate performance of industrial solutions and processes within an operation. KPIs can be benchmarked and Key Performance Indicators compared across multiple facilities and include inputs spanning number of deliveries made, average downtime, cost per labor per shift, etc. Quantifiable measurements to evaluate performance of industrial solutions and processes within an operation. KPIs can be benchmarked and KPIs compared across multiple facilities and include inputs spanning number of deliveries made, average downtime, cost per labor per shift, etc. Kinoma Kinoma is a full development suite for IoT tool developed by Marvell. With KNX technology, advanced multiple disciplines as well as simple solutions can be implemented to satisfy individual requirements in KNX room and building automation in a flexible way. KNX PL-Link KNX PL-Link fully complies with the KNX standard. Layer 2 Tunneling Protocol A tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. L2TP A tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. Lean Manufacturing A manufacturing practice that aims to reduce wasted time, effort or other resources in the production process. The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations Least Privilege that the entity needs to perform its function. Legacy Technology An old method, technology, computer system, or application program, "of, relating to, or being a previous or outdated computer system. Level 0 Automated Vehicle The "no-automation" baseline of the 5-level NHTSA vehicle classification system. Level 1 Automated Vehicle Function-specific Automation is the second level of the 5-level NHTSA vehicle classification system. Level 2 Automated Vehicle Combined Function Automation is the third level of the 5-level NHTSA vehicle classification system. Level 3 Automated Vehicle Limited Self-Driving Automation is the fourth level of the 5-level NHTSA vehicle classification system. Level 4 Automated Vehicle Full Self-Driving Automation is the fifth and highest level of the 5-level NHTSA vehicle classification system. Light-Emitting Diode A semiconductor that generates light via electroluminescence. LED A semiconductor that generates light via electroluminescence. This refers to an optical technology employed by companies to enable objects to be displayed at varying focal planes, allowing for the illusion Light Field of depth in an augmented reality experience. Lightweight M2M OMA Lightweight M2M is a protocol from the Open Mobile Alliance for M2M or IoT device management. LWM2M OMA Lightweight M2M is a protocol from the Open Mobile Alliance for M2M or IoT device management. A public key infrastructure (PKI) supports the distribution and identification of public encryption keys, enabling users and computers to both Lightweight Public Key Infrastructures securely exchange data over networks such as the Internet and verify the identity of the other party. A public key infrastructure (PKI) supports the distribution and identification of public encryption keys, enabling users and computers to both PKI securely exchange data over networks such as the Internet and verify the identity of the other party. Linked Open Data Cloud A project started in 2007 that visualizes a graph of interlinked linked data sets. LOD A project started in 2007 that visualizes a graph of interlinked linked data sets. Local Area Network A network of devices in relatively close proximity, prior to the point of transmission over leased telecommunication lines. LAN A network of devices in relatively close proximity, prior to the point of transmission over leased telecommunication lines. Location Based Service Computer applications and services that employ location data as inputs. LBS Computer applications and services that employ location data as inputs. Location Privacy Preserving location privacy, where location can be inferred from things associated with people. Logistics Logistics is generally the detailed organization and implementation of a complex operation. LTE, often referred to as 4G, is the latest cellular network type, offering superior data transfer speeds than its predecessor, 3G, and it’s part Long Term Evolution of the GSM upgrade path. LTE, often referred to as 4G, is the latest cellular network type, offering superior data transfer speeds than its predecessor, 3G, and it’s part 4G of the GSM upgrade path. LTE, often referred to as 4G, is the latest cellular network type, offering superior data transfer speeds than its predecessor, 3G, and it’s part LTE of the GSM upgrade path. LonWorks The LonWorks-based communication protocol is one of the most widely deployed technologies worldwide. Standardized by the LoRa Alliance, the LoRaWAN specification allows low bit rate communication between connected objects in a wide area LoRaWAN network (WAN). 6LoWPAN is an acronym of IPv6 over Low power Wireless Personal Area Networks and is the name of a concluded working group in the 6LoWPAN Internet area of the IETF (Internet Engineering Task Force). Low Power and Lossy Networks These networks are comprised of embedded devices with limited power, memory, and processing resources. LLN These networks are comprised of embedded devices with limited power, memory, and processing resources. Low-Power, Wide-Area Network Non-cellular, M2M networks that rely on low data rates and primarly on unlicensed frequencies to transmit data with minimal energy usage. LPWAN Non-cellular, M2M networks that rely on low data rates and primarly on unlicensed frequencies to transmit data with minimal energy usage. A group of spatially distributed, independent devices that collect data by measuring physical or environmental conditions with minimal power Low Power Wireless Sensor Network consumption. LTE-Unlicensed First proposed by Qualcomm and Ericsson, LTE-U uses 4G LTE wireless technology in unlicensed spectrum. LTE-U First proposed by Qualcomm and Ericsson, LTE-U uses 4G LTE wireless technology in unlicensed spectrum. LTE-V is the application of vehicular connectivity over the existing operator mobile network infrastructure. LTE-V can be rapidly and inexpensively deployed by reusing the existing cellular infrastructure and spectrum. LTE-V has lower latency than DSRC and is suitable for LTE-Vehicular high density or bad weather scenarios. LTE-V is the application of vehicular connectivity over the existing operator mobile network infrastructure. LTE-V can be rapidly and inexpensively deployed by reusing the existing cellular infrastructure and spectrum. LTE-V has lower latency than DSRC and is suitable for LTE-V high density or bad weather scenarios. The authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital Machine Authentication certificate or digital credentials. Unlike user authentication, the process does not involve any action on the part of a human. Also known as machine-generated data, this is digital information created by the activity of computers, mobile phones, embedded systems, Machine Data and other networked devices. Machine Learning A subfield of computer science that evolved from the study of pattern recognition in artificial intelligence. Machine to Machine Direct communication between two Things. M2M Direct communication between two Things. Machine Type Communications A 3rd Generation Partnership Project (3GPP) standard describing machine-to-machine communications. MTC A 3rd Generation Partnership Project (3GPP) standard describing machine-to-machine communications. Magnetometers are measurement instruments used for two general purposes: to measure the magnetization of a magnetic material like a Magnetometer ferromagnet, or to measure the strength and, in some cases, the direction of the magnetic field at a point in space. Mainnet The main network wherein actual transactions take place on a distributed ledger. The time of actual production from the moment a customer order arrives on the plant floor to the completion of all product manufacturing, Manufacturing Cycle Time assembly, and testing. Augmented Reality that maps the physical environment real-time. Often uses a smartphone camera and sensors to position a virtual object in Markerless AR a room without the need for Image Targets. Augmented Reality that maps the physical environment real-time. Often uses a smartphone camera and sensors to position a virtual object in Dead Reckoning a room without the need for Image Targets. mbed OS An IoT operating system and M2M Platform developed by ARM. M-Bus is a European standard covering remote readout of meters and can be used with different types of consumption meters and various M-Bus types of valves and actuators. A combination of the words “mechanical” and “electronics,” mechatronics brings together electrical engineering, control engineering, Mechatronics computer engineering, and mechanical engineering disciplines. The “layer 2” in a network that allows the physical medium (radio waves or wire signals) to be organized to pass data back and forth. For low- Media Access Control rate data wireless applications, the MAC has many implications on performance. The “layer 2” in a network that allows the physical medium (radio waves or wire signals) to be organized to pass data back and forth. For low- MAC rate data wireless applications, the MAC has many implications on performance. Mediated Reality A mix of virtual information with visual information from the real world. Megabyte The megabyte is a multiple of the unit byte for digital information. Its recommended unit symbol is MB, but sometimes MByte is used. MB The megabyte is a multiple of the unit byte for digital information. Its recommended unit symbol is MB, but sometimes MByte is used. An ad-hoc, local area network infrastructure where the nodes communicate directly with each other without the need to pass through a Mesh Networking central structure such as an ISP. An ad-hoc, local area network infrastructure where the nodes communicate directly with each other without the need to pass through a Mesh Network Topology central structure such as an ISP. Message Broker A middleware program that translates a message from the messaging protocol of the sender into the messaging protocol of the receiver. Message-Oriented Middleware Middleware that allows for synchronous as well as asynchronous (queue) messaging between distributed systems. MoM Middleware that allows for synchronous as well as asynchronous (queue) messaging between distributed systems. Message Queue Telemetry Transport An open, lightweight M2M communications protocol for the transfer of telemetry messages. MQTT An open, lightweight M2M communications protocol for the transfer of telemetry messages. Metasys Platform A smart building, smart equipment, sensor integration developed by Johnson Controls. 868 MHz License-free RF band commonly used for short-range applications such as thermostats, burglar alarms, and industrial uses. 92 MHz License-free RF band commonly used for short-range applications. A full computer on a single chip. The chip contains a CPU, a clock, non-volatile memory for the program (ROM or flash), volatile memory for MicroController Unit input and output (RAM), and an I/O control unit. A full computer on a single chip. The chip contains a CPU, a clock, non-volatile memory for the program (ROM or flash), volatile memory for MCU input and output (RAM), and an I/O control unit. Micro-Electro-Mechanical Systems Miniaturized mechanical and electro-mechanical elements, typically used for measurements, such as accelerometers and gyroscopes. MEMS Miniaturized mechanical and electro-mechanical elements, typically used for measurements, such as accelerometers and gyroscopes. Microelectronics The study and manufacture of very small electronic designs and components. A microprocessor is a computer processor that incorporates the functions of a computer's central processing unit (CPU) on a single Microprocessor Unit integrated circuit (IC), or at most a few integrated circuits. A microprocessor is a computer processor that incorporates the functions of a computer's central processing unit (CPU) on a single MPU integrated circuit (IC), or at most a few integrated circuits. Mining Mining ensures the security and integrity of the data on a Blockchain. MinnowBoard Open source Intel development boards targeting the maker community. Mobile Directory Number MDN is a 10-digit telephone number that is dialed to reach a CDMA or TDMA cellphone. MDN MDN is a 10-digit telephone number that is dialed to reach a CDMA or TDMA cellphone. Mobile Network Operator Companies that operate traditional mobile communications networks. MNO Companies that operate traditional mobile communications networks. Mobile Personal Emergency Response System A wearable device, such as a pendant, that is connected to a cellular network enabling the user to summon help indoors or outdoors. mPERS A wearable device, such as a pendant, that is connected to a cellular network enabling the user to summon help indoors or outdoors. Mobile Station ISDN MSISDN is a number uniquely identifying a subscription in a GSM or a UMTS mobile network. MSISDN MSISDN is a number uniquely identifying a subscription in a GSM or a UMTS mobile network. Mobile Station Cellular radio handset or cellular M2M device. MS Cellular radio handset or cellular M2M device. Mobile Virtual Network Operator A wireless communications provider that leases the infrastructure over which it proves services. MVNO A wireless communications provider that leases the infrastructure over which it proves services. An IoT platform designed for use on mobile devices, IOS, Android, Tablets. It utilizes all of the smart features of the modern mobile phone Mobility Platform and can add value through communication, collaboration and the ease of use. Modbus is an open and widely used de facto standard applied in a large number of application areas, such as the industrial sector, buildings, Modbus traffic and energy. Molecular Sensors A molecular sensor or chemosensor is a molecule that interacts with an analyte to produce a detectable change. MongoDB MongoDB is a cross-platform document-oriented database. Monitor-Analyse-Plan-Execute-Knowledge Model for autonomic systems: Monitor, Analyse, Plan, Execute in interaction with a knowledge base. MAPE-K Model for autonomic systems: Monitor, Analyse, Plan, Execute in interaction with a knowledge base. Monitoring and stream analytics compare and analyze data that are available to the smart factory from diverse sources – devices, sensors, Monitoring & Stream Analytics infrastructure, etc. Mote Short for Remote - a mote is a wireless transceiver that also acts as a remote sensor. Infrared motion sensors which reliably sends alerts to alarm panel (or dialer) and with a system implementing reduced false alarms algorithms Motion Detection and adaption to environmental disturbances. A MEMS concept referring to the detection of the combined input along multiple axes using multiple sensing types, such as acceleration and Multiple DoF Sensing rotation. Multiple Input, Multiple Output Input-output concept in the context of antennas. MIMO Input-output concept in the context of antennas. M2X A Cloud based data Storage developed by AT&T. Nabto An IoT encrypted device to compute communications platform developed by Nabto. Nagios Software that monitors IT infrastructures and includes, for example, immediate problem detection. Nanoscience and nanotechnology are the study and application of extremely small things and can be used across all the other science fields, Nanotechnologies such as chemistry, biology, physics, materials science, and engineering. Natural Langauge Processesing Software enabling humans to interact naturally with technology and machines. NLP Software enabling humans to interact naturally with technology and machines. Nearables Coined for the similarity to “wearables,” this describes items with nearby tracking devices, or beacons, attached to them. Near Field Communication Protocol that enables smartphones and other devices to establish radio communication with each other by close proximity. NFC Protocol that enables smartphones and other devices to establish radio communication with each other by close proximity. Nebula Energy A cloud based energy monitoring platform developed by Nebula. .net Microframework A platform for connecting .net services and technology stacks developed by Microsoft. NETMF A platform for connecting .net services and technology stacks developed by Microsoft. Network In information technology, a network is a series of points or nodes interconnected by communication paths. Network Processor An integrated circuit which has a feature set specifically targeted at the networking application domain. NPU An integrated circuit which has a feature set specifically targeted at the networking application domain. Network Security A connected factory requires the use of standard communication protocols to enable machine-to-machine communication. Neul specializes in the industrial side of the internet things: the billions of sensors, instruments and meters that need only send tiny amounts NEUL of information intermittently. NodeMCU An open source firmware kit for IoT Devices developed by NodeMCU. Nodes Clients that own the Blockchain and are sharing blocks and transactions across the network. Non-functional Requirement Requirement that defines the overall qualities or attributes of the resulting system. Not Only SQL A broad class of database management systems. NoSQL A broad class of database management systems. Novel Methods for Assessing Trust Novel methods for assessing trust in people, devices and data, beyond reputation systems. OMA Device Management is a device management protocol specified by the Open Mobile Alliance (OMA) Device Management (DM) OMA Device Management Working Group and the Data Synchronization (DS) Working Group. On-Board Diagnostic Port An automotive term referring to a vehicle's self-diagnostic and reporting capability. OBD An automotive term referring to a vehicle's self-diagnostic and reporting capability. On-Board Diagnostic Port On-Board Diagnostic port (version 2) specifies the connector pinout, signaling protocols, and messaging format. Version 2 On-Board Diagnostic port (version 2) specifies the connector pinout, signaling protocols, and messaging format. OBD-II On-Board Diagnostic port (version 2) specifies the connector pinout, signaling protocols, and messaging format. Components of a Vehicle-to-Infrastructure (V2I) implementation located in a moving vehicle, communicating wirelessly with roadside On-Board Equipment equipment (RSE). Components of a Vehicle-to-Infrastructure (V2I) implementation located in a moving vehicle, communicating wirelessly with roadside OBE equipment (RSE). On-premises software is installed and runs on computers on the premises (in the building) of the person or organization using the software, On-Premise rather than at a remote facility, such as at a server farm or cloud - somewhere on the Internet. On-premises software is installed and runs on computers on the premises (in the building) of the person or organization using the software, On-Prem rather than at a remote facility, such as at a server farm or cloud - somewhere on the Internet. Open Building Information Xchange An IoT protocol focused on Open XML/Web Services platform for data exchange. oBIX An IoT protocol focused on Open XML/Web Services platform for data exchange. OpenHab An open source home automation platform developed by openHAB. Open Interconnect An open source certification authority platform developed by Open Interconnect Consortium. OIC An open source certification authority platform developed by Open Interconnect Consortium. OpenIoT A cloud M2M IoT developed by OpenIoT. The set of software and middleware components of the OpenIoT platform, along with the main structuring principles and inter-relationships OpenIoT Architecture driving their integration in an IoT-cloud platform. OPC is a standardized software interface facilitating the exchange of data between different types of devices, control systems and Open Platform Communications applications of different vendors. OPC is a standardized software interface facilitating the exchange of data between different types of devices, control systems and OPC applications of different vendors. OpenRemote An application development platform developed by OpenRemote. Open RTOS FreeRTOS is a popular real-time operating system kernel for embedded devices, that has been ported to 35 microcontrollers. Free RTOS FreeRTOS is a popular real-time operating system kernel for embedded devices, that has been ported to 35 microcontrollers. Open Source A type of software where the source code is available and can be modified and freely redistributed. Open Systems Interconnection Model A 7-layer conceptual model that characterizes and standardizes the communication functions of a computing system. OSI A 7-layer conceptual model that characterizes and standardizes the communication functions of a computing system. Operational technology (OT) is hardware and software that detects or causes a change through the direct monitoring and/or control of Operational Technology physical devices, processes and events in the enterprise. Operational technology (OT) is hardware and software that detects or causes a change through the direct monitoring and/or control of OT physical devices, processes and events in the enterprise. Optical character recognition or optical character reader is the mechanical or electronic conversion of images of typed, handwritten or printed Optical Character Recognition text into machine-encoded text. Optical character recognition or optical character reader is the mechanical or electronic conversion of images of typed, handwritten or printed OCR text into machine-encoded text. The optical engine is an optical setup containing electronics and controls. It does not include pumping sources and the heat removal interface Optical Engine of a fiber laser. Oracles An oracle is a data feed – provided by third party service – designed for use in smart contracts on a Blockchain. Orchestration Type of composition where one particular element is used by the composition to oversee and direct the other elements. Original equipment manufacturer (OEM) is a term used when one company makes a part or subsystem that is used in another company's Original Equipment Manufacturer end product. Original equipment manufacturer (OEM) is a term used when one company makes a part or subsystem that is used in another company's OEM end product. Outcome Economy An economic relationship in which payment is attached to a value achieved, rather than a service or product. OWASP Internet of Things Project An open source IoT security framework platform developed by OWASP. Paper Based Batteries A paper battery is an electric battery engineered to use a spacer formed largely of cellulose (the major constituent of paper). Part 90 Bands Small parts of the RF spectrum that are made available in small areas to businesses for data or voice communications. Passive Sensor A passive sensor is a device that detects and responds to some type of input from the physical environment. Patch management is an area of systems management that involves acquiring, testing, and installing multiple patches (code changes) to an Patch Management administered computer system. A network where a computer can act as a server for the others, allowing shared access to files and peripherals without the need for a central Peer to Peer server. Penetration Testing A method of evaluating the security of a network or system from internal or external threats. Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that Pen Testing an attacker could exploit. Peripheral Device One of the two types of devices defined by the BLE standard. Personal Area Network A computer network used for data transmission among digital devices. PAN A computer network used for data transmission among digital devices. Personal Emergency Response System A mobile duress panic alarm component of a monitoring system, typically for the residential market. PERS Personal Emergency Response System. A mobile duress panic alarm component of a monitoring system, typically for the residential market. Any information, that identifies or can be used to identify, contact, or locate the person to whom such information pertains, from which identification or contact information of an individual person can be derived, or that is or might be directly or indirectly linked to a natural Personally Identifiable Information person. Personally Identifiable Information. Any information, that identifies or can be used to identify, contact, or locate the person to whom such information pertains, from which identification or contact information of an individual person can be derived, or that is or might be directly or PII indirectly linked to a natural person. Personal Protection Drone A type of drone, or drone swarm, dedicated to an individual’s security. PPD A type of drone, or drone swarm, dedicated to an individual’s security. Pervasive Computing Another term for . Photoplethysmogram An optically obtained plethysmogram using an LED that measures the output volume of an organ, such as the heart. PPG An optically obtained plethysmogram using an LED that measures the output volume of an organ, such as the heart. Photovoltaics is the name of a method of converting solar energy into direct current electricity using semiconducting materials that exhibit the Photovoltaic photovoltaic effect, a phenomenon commonly studied in physics, photochemistry and electrochemistry. Photovoltaics is the name of a method of converting solar energy into direct current electricity using semiconducting materials that exhibit the PV photovoltaic effect, a phenomenon commonly studied in physics, photochemistry and electrochemistry. Physical Entity Entity that is the subject of monitoring and control actions. Physical Web Google’s open standard to allow IoT devices to communicate via web addresses. Planning and Scheduling Technologies A variety of software-based advanced planning, scheduling, and optimization systems. A short-hand for “technology” or “software” platform, which is the digital layer that allows business partners to connect and interact from any Platform applications or devices. Platform as a service is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage web Platform-as-a-Service applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app. Platform as a service is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage web PaaS applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app. Point-to-Point Tunneling Protocol is a protocol that allows corporations to extend their own corporate network through private "tunnels" over Point-to-Point Tunneling Protocol the public Internet. Point-to-Point Tunneling Protocol is a protocol that allows corporations to extend their own corporate network through private "tunnels" over PPTP the public Internet. Power Distribution Unit A physical device with multiple outlets that connects electrical power to recipient devices. PDU A physical device with multiple outlets that connects electrical power to recipient devices. Power over Ethernet The capability to deliver enough power to operate a device over an Ethernet connection. PoE The capability to deliver enough power to operate a device over an Ethernet connection. Power over WiFi A technology that can convert the signals sent by wireless routers into DC (direct current). PoWiFi A technology that can convert the signals sent by wireless routers into DC (direct current). Pre-Boot Authentication or Power-On Authentication (POA) serves as an extension of the BIOS or boot firmware and guarantees a secure, Pre-Boot Authentication tamper-proof environment external to the operating system as a trusted authentication layer. Pre-Boot Authentication or Power-On Authentication (POA) serves as an extension of the BIOS or boot firmware and guarantees a secure, PBA tamper-proof environment external to the operating system as a trusted authentication layer. The ability to manage power over a network connection. A PXE-enabled device can be shut down or restarted via a network connection, Preboot Execution Environment allowing for power-hungry devices to be managed remotely. The ability to manage power over a network connection. A PXE-enabled device can be shut down or restarted via a network connection, PXE allowing for power-hungry devices to be managed remotely. Dependable production planning and maximum machine availability through the avoidance of unscheduled downtime are the practical Predictive Maintenance advantages of what is internationally known as predictive maintenance. An industrial internet PaaS offering by General Electric that includes cloud, secure connected assets, data management and data science Predix components. Pressure Sensor A sensor that measures pressure, typically of gases or liquids. Right of individuals to control or influence what information related to them may be collected and stored and by whom and to whom that Privacy information may be disclosed. Privacy by Design Privacy by Design is an approach to systems engineering which takes privacy into account throughout the whole engineering process. A privacy impact assessment (PIA) is a tool for identifying and assessing privacy risks throughout the development life cycle of a program or Privacy Impact Assessment system. A privacy impact assessment (PIA) is a tool for identifying and assessing privacy risks throughout the development life cycle of a program or PIA system. Private Cloud A private cloud provides services with cloud characteristics but only within a single organization, for example, one company. The private key is paired with a public key to set off algorithms for transaction encryption and decryption. It is created as part of public key Private Key cryptography during asymmetric-key encryption and used to decrypt and transform a message to a readable format. Privilege Right granted to an individual, a program, or a process. PROFIBUS is a standard for fieldbus communication in automation technology and was first promoted in 1989 by BMBF (German department Process Field Bus of education and research) and then used by Siemens. PROFIBUS is a standard for fieldbus communication in automation technology and was first promoted in 1989 by BMBF (German department PROFIBUS of education and research) and then used by Siemens. A programmable logic controller, PLC, or programmable controller is a digital computer used for automation of typically industrial Programmable Logic Controller electromechanical processes, such as control of machinery on factory assembly lines, amusement rides, or light fixtures. A programmable logic controller, PLC, or programmable controller is a digital computer used for automation of typically industrial PLC electromechanical processes, such as control of machinery on factory assembly lines, amusement rides, or light fixtures. Proof of Stake A consensus distribution algorithm that rewards earnings based on the number of coins you hold. POS A consensus distribution algorithm that rewards earnings based on the number of coins you hold. Proof of Work A consensus distribution algorithm that requires computational power in the form of mining data blocks. POW A consensus distribution algorithm that requires computational power in the form of mining data blocks. ProSyst A cloud middleware IoT data exchange platform developed by ProSyst. In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients Proxy Server seeking resources from other servers. Public Address A string of alphanumeric characters that is uniquely tied to a specific private address. Used to send or receive transactions on the network. A public cloud is one based on the standard cloud computing model, in which a service provider makes resources, such as applications and Public Cloud storage, available to the general public over the Internet. A public key infrastructure supports the distribution and identification of public encryption keys, enabling users and computers to both Public Key Infrastructure securely exchange data over networks such as the Internet and verify the identity of the other party. A public key infrastructure supports the distribution and identification of public encryption keys, enabling users and computers to both PKI securely exchange data over networks such as the Internet and verify the identity of the other party. A public private partnership is a government service or private business venture which is funded and operated through a partnership of Public-Private Partnership government and one or more private sector companies. A public private partnership is a government service or private business venture which is funded and operated through a partnership of PPP government and one or more private sector companies. Public Sector Information Any content that is produced by a public sector body within its mandate. PSI Any content that is produced by a public sector body within its mandate. Pulse Oximeter A sensor that measures oxygen saturation in the blood. Python A widely used open-source programming language that can be implemented in variety of ways, including in embedded applications. Quality of service (QoS) is the overall performance of a telephony or computer network, particularly the performance seen by the users of the Quality of Service network. Quality of service (QoS) is the overall performance of a telephony or computer network, particularly the performance seen by the users of the QoS network. Quantified Self Sensors that monitor humans to compile data on moods, habits, diet, drug combinations, and virtually any human activity. Quantum Sensor A sensor that takes advantage of quantum correlations to produce measurements beyond what are possible with traditional sensors. RabbitMQ is an open source message broker software (sometimes called message-oriented middleware) that implements the Advanced RabbitMQ Message Queuing Protocol (AMQP). RacoWireless An IoT device management platform. Radio Frequency for Consumer Electronics A standardized specification for radio frequency-based remote controls for consumer electronics, enabling non line-of-sight communication. Radio Frequency for Consumer Electronics. A standardized specification for radio frequency-based remote controls for consumer electronics, RF4CE enabling non line-of-sight communication. Radio Frequency Identification The wireless use of electromagnetic fields to identify and track tags attached to objects. RFID Radio Frequency Identification. The wireless use of electromagnetic fields to identify and track tags attached to objects. Radio frequency is any of the electromagnetic wave frequencies that lie in the range extending from around 3 kHz to 300 GHz, which include Radio Frequency those frequencies used for communications or radar signals. Radio frequency is any of the electromagnetic wave frequencies that lie in the range extending from around 3 kHz to 300 GHz, which include RF those frequencies used for communications or radar signals. An inexpensive, credit-card sized personal computer designed so that kids worldwide can learn programming. RDF Schema A language for writing ontologies or a domain-specific vocabulary. RDFS A language for writing ontologies or a domain-specific vocabulary. The 3rd Generation Partnership Project is a collaboration between groups of telecommunications associations, known as the Organizational 3rd Generation Partnership Project Partners. The 3rd Generation Partnership Project is a collaboration between groups of telecommunications associations, known as the Organizational 3GPP Partners. Real-time Analysis Real-time analytics is the use of, or the capacity to use, all available enterprise data and resources when they are needed. Time Series Analysis Real-time analytics is the use of, or the capacity to use, all available enterprise data and resources when they are needed. Reliability Ability of a system or component to perform its required functions under stated conditions for a specified period of time. RADIUS servers are responsible for receiving user connection requests, authenticating the user, and returning all configuration information Remote-Authentication Dial-In User Service necessary for the client to deliver service. RADIUS servers are responsible for receiving user connection requests, authenticating the user, and returning all configuration information RADIUS necessary for the client to deliver service. Remote Control Devices which send digitally-coded pulses of infrared radiation to control functions. The use of various technologies to make observations and measurements at a target that is usually at a distance or on a scale beyond those Remote Sensing observable to the naked eye. An architecture for web standards, especially for the HTTP protocol. It is supposed to simplify the design of network applications compared Representational State Transfer to, for example, SOAP. An architecture for web standards, especially for the HTTP protocol. It is supposed to simplify the design of network applications compared REST to, for example, SOAP. Residential Gateways A typical residential gateway is a single internet connection shared by multiple devices connected through a LAN. Resource Description Framework A general-purpose language for representing information in the Web. RDF A general-purpose language for representing information in the Web. Resource Discovery The process of detecting an IoT resource (such as a sensor, service or database). RESTful Web Services Web services that are realized within the REST architecture are called RESTful Web Services. Risk Analysis Risk analysis can be defined in many different ways, and much of the definition depends on how risk analysis relates to other concepts. Risk Assessment Overall process of risk identification, risk analysisand risk evaluation. Risk Evaluation Process of comparing the results of risk analysiswith risk criteria to determine whether the riskand/or its magnitude is acceptable or tolerable. Risk Identification Risk identification involves determining which risks might affect the project and documenting their characteristics. Risk Management Coordinated activities to direct and control an organization with regard to risk. Accepting, avoiding, mitigating, sharing, or transferring riskto organizational operations (i.e., mission, functions, image, or reputation), Risk Response organizational assets, individuals, other organizations, or the Nation. Risk Tolerance Level of risk an entity is willing to assume in order to achieve a potential desired result. Robotic governance is a concept which, among other things, considers the ethical/moral, socio-cultural, socio-political and socio-economic Robotic Governance effects of robotics on society and provides a framework for solving problems resulting from these changes. Robotics is the branch of mechanical engineering, electrical engineering, electronic engineering and computer science that deals with the design, construction, operation, and application of robots, as well as computer systems for their control, sensory feedback, and information Robotics processing. Ability of an information assurance entity to operate correctly and reliably across a wide range of operational conditions, and to fail gracefully Robustness outside of that operational range. Rotation Sensing A MEMS concept referring to the measurement of how quickly an object turns. RS-232 In telecommunications, RS-232 is a standard for serial communication transmission of data. RS-485 A standard defining the electrical characteristics of drivers and receivers for use in balanced digital multipoint systems. Rules Engine A business rules engine is a software system that executes one or more business rules in a runtime production environment. The condition of the system operating without causing unacceptable riskof physical injury or damage to the health of people, either directly, or Safety indirectly as a result of damage to property or to the environment. Salesforce1 An analytics, business system integration developed by Salesforce. S7comm The S7 protocol is designed for transfering the data into the SCADA systems via the Ethernet. S7 The S7 protocol is designed for transfering the data into the SCADA systems via the Ethernet. Secure Shell A cryptographic network protocol for initiating text-based shell sessions on remote machines in a secure way. SSH A cryptographic network protocol for initiating text-based shell sessions on remote machines in a secure way. secureWISE A secure remote access to semiconductor equipment developed by TELIT. Security Condition of the system being protected from unintended or unauthorized access, change or destruction. Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, Security Control computer systems, or other assets. Function security consists of privileges unconditionally granted to a role and used to control access to a page or a specific widget or Security Functions functionality within a page, including services, screens, and flows, and typically used in control of the main menu. Rules, directives and practices that govern how assets, including sensitive information, are managed, protected and distributed within an Security Policy organization and its systems, particularly those which impact the systems and associated elements. Modular self-reconfiguring robotic systems or self-reconfigurable modular robots are autonomous kinematic machines with variable Self Configurable morphology. Self-Healing Self-healing is a phrase applied to the process of recovery, motivated by and directed by the patient, guided often only by instinct. Self Organising Networks A process where some form of coordination arises out of the interactions between components of a disordered system. SON A process where some form of coordination arises out of the interactions between components of a disordered system. A self-powered dynamic system is defined as a dynamic system powered by its own excessive kinetic energy, renewable energy or a Self Powering Sensors combination of both. Semantics In computer science, the term is frequently used to differentiate the meaning of an instruction from its format. Semantic Sensor Web Encoding sensor data with Semantic Web languages enables more expressive representation and analysis. SSW Encoding sensor data with Semantic Web languages enables more expressive representation and analysis. Sensitivity Measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection. Sensor A device used to measure a specific characteristic of the surrounding environment, such as temperature. Sensor Analytics Sensor analytics is the statistical analysis of data that is created by wired or wireless sensors. Sensor Fusion The process of combining and processing the raw data coming out of multiple sensors to generate usable information.] Sensor Hub A technology that connects sensor data and processes them. Sensor Web Enablement A suite of web service interfaces abstracting from the heterogeneity of sensor (network) communication. SWE A suite of web service interfaces abstracting from the heterogeneity of sensor (network) communication. Serial Peripheral Interface A specification developed by Motorola for use in short distance communication between sensors and microcontrollers such as Arduino. SPI A specification developed by Motorola for use in short distance communication between sensors and microcontrollers such as Arduino. A hardware profile used with Bluetooth applications that includes custom AT commands and functionality dedicated to wireless data Serial Port Profile connections and serial cable replacement. A hardware profile used with Bluetooth applications that includes custom AT commands and functionality dedicated to wireless data SPP connections and serial cable replacement. Service Distinct part of the functionality that is provided by an entity through interfaces. Service-Level Agreement A service-level agreement (SLA) is a part of a standardized service contract where a service is formally defined. Software License Agreement A service-level agreement (SLA) is a part of a standardized service contract where a service is formally defined. SLA A service-level agreement (SLA) is a part of a standardized service contract where a service is formally defined. Service Oriented Approach Service-oriented architecture is an approach used to create an architecture based upon the use of services. SOA Service-oriented architecture is an approach used to create an architecture based upon the use of services. Service Oriented Architecture A flexible, service-based model for construction, assembly and deployment of networks of services. Service Provider Infrastructure Infrastructure such as datacenters that support cloud computing services, in order to sustain scalability. Service Set Identifier The service set identifier (SSID) is chosen by the client device that starts the network. SSID The service set identifier (SSID) is chosen by the client device that starts the network. Shield A built-in security for applications developed by Salesforce. Shock Sensing A MEMS concept referring to the detection of sudden impacts at a predetermined level. The Short Message Peer-to-Peer (SMPP) in the telecommunications industry is an open, industry standard protocol designed to provide a flexible data communication interface for the transfer of short message data between External Short Messaging Entities (ESME), Routing Short Message Peer to Peer Entities (RE) and Message Centres. The Short Message Peer-to-Peer (SMPP) in the telecommunications industry is an open, industry standard protocol designed to provide a flexible data communication interface for the transfer of short message data between External Short Messaging Entities (ESME), Routing SMPP Entities (RE) and Message Centres. A low-bandwidth, wireless protocol that offers excellent range and obstacle penetration for short messages, giving a new low-powered and Sigfox cost-effective wireless transmission medium for IoT and M2M technologies. Signalling System No. 7 is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down most of the Signaling System 7 world's public switched telephone network (PSTN) telephone calls. Signalling System No. 7 is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down most of the SS7 world's public switched telephone network (PSTN) telephone calls. Signal Phase and Timing Refers to communications associated with the operations of signalized intersections. SPaT Refers to communications associated with the operations of signalized intersections. Simple Text Oriented Message Protocol It’s similar to HTTP and allows STOMP clients to communicate with most of the message brokers making it language-agnostic. Streaming Text Oriented Message Protocol It’s similar to HTTP and allows STOMP clients to communicate with most of the message brokers making it language-agnostic. STOMP It’s similar to HTTP and allows STOMP clients to communicate with most of the message brokers making it language-agnostic. SLAM is the computational problem of constructing or updating a map of an unknown environment while simultaneously keeping track of an Simultaneous Localization and Mapping agent's location within it. SLAM is the computational problem of constructing or updating a map of an unknown environment while simultaneously keeping track of an SLAM agent's location within it. Single Board Computer A complete, functioning computer with all functions (I/O, processor, memory) located on one board. SBC A complete, functioning computer with all functions (I/O, processor, memory) located on one board. Within a volume of time and space, the perception of an enterprise’s security posture and its threat environment; the comprehension/meaning Situational Awareness of both taken together (risk) and the projection of their status into the near future. Situation Awareness A field of study concerned with understanding of the environment critical to decision-makers in complex, dynamic areas. SA A field of study concerned with understanding of the environment critical to decision-makers in complex, dynamic areas. Six Degrees of Freedom Tracking Refers to the specific number of axes that a rigid body is able to freely move in three-dimensional space. 6DoF Tracking Refers to the specific number of axes that a rigid body is able to freely move in three-dimensional space. Six Sigma One method of preparing and controlling the compliance of processes and products with predetermined quality standards. A smart card is a device that includes an embedded integrated circuit chip (ICC) that can be either a secure microcontroller or equivalent Smart Cards intelligence with internal memory or a memory chip alone. Smart Contract A computer protocol that facilitates, verifies and/or enforces the negotiation or performance of a contract. Smart Data If Big Data is the oil of the future, then Smart Data is the fuel that drives the production of the future. A smart factory is a learning factory, where people leverage data and technology constantly. Essentially, it’s implementation of Industry 4.0 Smart Factory technology. Aims to reduce manufacturing costs from the perspective of real-time energy management, energy productivity, and process energy Smart Manufacturing efficiency. A smart meter is usually an electronic device that records consumption of electric energy in intervals of an hour or less and communicates Smart Meters that information at least daily back to the utility for monitoring and billing. New, intelligent platforms will be created for the implementation of Industrie 4.0. They will support collaborative industrial processes and use Smart Platform their services and applications to network people, things and systems. Smart Sensors Intelligent sensor takes some predefined action when it senses the appropriate input (light, heat, sound, motion, touch, etc.). bio-chemical Intelligent sensor takes some predefined action when it senses the appropriate input (light, heat, sound, motion, touch, etc.). A wristwatch, generally with a display, that interacts with the wearer and can communicate with a network wirelessly (the device may have a Smartwatch USB connection for charging and other functions). Machines in production which are intelligently interconnected, communicate with one another and can instantaneously react to deviations and Social Machines changes in an independent, situation-based manner are called social machines. Social The socialization of the Internet of Things, which is the integration of connected things into the social life. Soft Identities Soft identities are used where the real identity of the user can be used to generate various soft identities for specific applications. Software as a Service A subscription-based model where a monthly fee is charged for using software, rather than an upfront purchase. SaaS A subscription-based model where a monthly fee is charged for using software, rather than an upfront purchase. Software Development Kit An SDK consists of a group of development tools used to build an application for a specific platform. SDK An SDK consists of a group of development tools used to build an application for a specific platform. Software versioning is the process of assigning either unique version names or unique version numbers to unique states of computer Software Versioning software. Solidity Solidity is an Ethereum coding language which is contract-oriented, high-level language for implementing smart contracts. A quantified self-concept designed to increase the brain’s retention of knowledge. Available via apps and cloud-based technologies, spaced Spaced Repetition repetition operates on the theory that there is an optimum time between memorization drills to maximize retention. Stakeholder Individual, team, organization, or classes thereof, having an interest in the system of interest. In the course of any technical evolution, different solutions, formats and approaches usually compete with one another – developed and propagated by various fractions, committees or companies. Only standardization, with its exact and binding definition of framework parameters and the possible interfaces, makes it possible to create appropriate expansions, counterparts and communication bridges to a Standardization new technology. Statistical Analysis The science of collecting, exploring and presenting large amounts of data to discover underlying patterns and trends. SAS The science of collecting, exploring and presenting large amounts of data to discover underlying patterns and trends. Steel Collar Things in the workplace that replace or augment human labor. Optimised storage of data. Given the amount of information that the new IoT world may generate, it is essential to avoid that the storage Storage requirements and costs increase exponentially. Structured Data A model that organizes data elements and standardizes how the data elements relate to one another. SUB 1 GHZ Standard developed by DASH7 Alliance - a low power, low complexity, radio protocol for all sub 1GHz radio devices. A piece of hardware (the “smart card”) containing account information for a user on a GSM network, which is inserted into a SIM holder in Subscriber Identity Module GSM cellular devices. A piece of hardware (the “smart card”) containing account information for a user on a GSM network, which is inserted into a SIM holder in SIM GSM cellular devices. Supervisory Control and Data Acquisition SCADA is an industrial control system typically used for geographically dispersed assets, often scattered over large distances. SCADA SCADA is an industrial control system typically used for geographically dispersed assets, often scattered over large distances. SX1272 First-generation long-range wireless transceiver from Semtech, which introduced a new type of PHY layer modulation. System Configuration A system configuration in systems engineering defines the computers, processes, and devices that compose the system and its boundary. SC A system configuration in systems engineering defines the computers, processes, and devices that compose the system and its boundary. System on a Module A system on a module (SOM) is a Board level circuit that integrates a system function in a single module. SOM A system on a module (SOM) is a Board level circuit that integrates a system function in a single module. A or system on chip (SoC or SOC) is an integrated circuit (IC) that integrates all components of a computer or other Systems on a Chip electronic system into a single chip. A system on a chip or system on chip (SoC or SOC) is an integrated circuit (IC) that integrates all components of a computer or other SOC electronic system into a single chip. Telehash Telehash is a peer to peer data distribution and communication protocol that is designed to be decentralised and secure. Telematics An IT concept regarding the long-distance transmission of data. Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented Telnet communication facility using a virtual terminal connection. Temperature Monitoring Control of temperature inside industrial and medical fridges with sensitive merchandise. Temperature Sensor A device that measures temperature or a temperature gradient. Tensorflow TensorFlow? is an open source software library for numerical computation using data flow graphs. Terabyte The terabyte is a multiple of the unit byte for digital information. 10^12 byte TB The terabyte is a multiple of the unit byte for digital information. Intel Tera-Scale is a research program by Intel that focuses on development in Intel processors and platforms that utilize the inherent Tera Scale Computing parallelism of emerging visual-computing applications. Terrestrial Trunked Radio (formerly known as Trans-European Trunked Radio) is a professional mobile radio and two-way transceiver Terrestrial Trunked Radio (colloquially known as a walkie talkie) specification. Terrestrial Trunked Radio (formerly known as Trans-European Trunked Radio) is a professional mobile radio and two-way transceiver TETRA (colloquially known as a walkie talkie) specification. TTCN-3 is a strongly typed test scripting language used in conformance testing of communicating systems and a specification of test Testing and Test Control Notation Version 3 infrastructure interfaces that glue abstract test scripts with concrete communication environments. TTCN-3 is a strongly typed test scripting language used in conformance testing of communicating systems and a specification of test TTCN-3 infrastructure interfaces that glue abstract test scripts with concrete communication environments. Testnet The testnet is an alternative Blockchain, to be used for testing. Something with an embedded system and an Internet connection that has been co-opted by a hacker to become part of a botnet of Thingbot networked things. The concept of delivering IoT functionality without the end user having to operate or maintain extensive hardware e.g. services such as Things as a Service Hadoop can be delivered in the cloud to receive and process the data generated by IoT-enabled sensor networks. The concept of delivering IoT functionality without the end user having to operate or maintain extensive hardware e.g. services such as TaaS Hadoop can be delivered in the cloud to receive and process the data generated by IoT-enabled sensor networks. ThingStudio A freemium offering with add-on features, focused on data integration to standard visualization tools like HTML5 developed by ThingStudio. Thread An IoT home automation platform developed by ThreadGroup. Threat Potential cause of an unwanted incident, which may result in harm to a system or organization. The examination of threatsources against system vulnerabilities to determine the threats for a particular system in a particular operational Threat Analysis environment. Threat Modeling Structured analysis to identify, quantify, and address the information security risks associated with an application or a system. A MEMS concept referring to the measurement of the inclination or angle of change with respect to gravity. Typical applications include Tilt Sensing industrial equipment platform stabilization and landscape/portrait detection on handheld devices. Tizen An open source OS developed by Linux Foundation. A single utility program, a set of software routines or a complete integrated set of software utilities that are used to develop and maintain Toolkit applications and databases. There are toolkits for developing almost anything. Total Cost of Ownership A financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or system. TCO A financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or system. Total Quality Management A company-wide approach to improving quality and customer satisfaction–including fast response and service, as well as product. Traceability here refers to the ability to fully trace all raw materials, producers, upstream suppliers, individual parts or assemblies as well as the complete product and its consumers in the digital value creation chain. It is possible at all times to determine when, where and by whom the goods were produced, processed, stored, transported, used or disposed of. Irrespective of whether an individual part or a finished product is concerned, a distinction is made between two directions of traceability: from the manufacturer to the consumer and from the consumer to Traceability the manufacturer. Tracking A technology that allows a device to estimate its position relative to the environment around it. Short for transmitter-receiver. A transceiver both transmits and receives analog or digital signals and is normally built into a network interface Transceiver card. The core standard protocol for Internet-based communications. Some wireless systems “break” TCP/IP in order to lower the overhead of the Transmission Control Protocol on-air signals. The core standard protocol for Internet-based communications. Some wireless systems “break” TCP/IP in order to lower the overhead of the TCP on-air signals. Transparent Computing A characteristic of ubiquitous computing where smart devices respond to users’ needs in the background. Also known as see-through display, is an electronic display that allows the user to see what is shown on the glass screen while still being Transparent Displays able to see through it. Also known as see-through display, is an electronic display that allows the user to see what is shown on the glass screen while still being OLED able to see through it. Relationship between two entities and/or elements, consisting of a set of activity and a security policy in which element x trusts element y if and only if x has confidence that y will behave in a well-defined way (with respect to the activities) that does not violate the given security Trust policy. Trust Boundary Separation of different application or system domains in which different level of trustare required. Turing Complete The ability of a machine to perform calculations that any other programmable machines are capable of. A new FCC (Federal Communications Commission) program that makes unused TV station bands available for temporary and controlled use TV Whitespace in a small geographic area. Ubiquitous Bandwidth The concept of embedding microprocessors in everyday things so they can communicate information continuously. Ultra-Wide Bandwidth An emerging technology in the IoT domain that transmits signals across a much larger frequency range than conventional systems. UWB An emerging technology in the IoT domain that transmits signals across a much larger frequency range than conventional systems. Unified Service Description Language A model for enabling ubiquitous network access to a shared pool of configurable computing resources. USDL A model for enabling ubiquitous network access to a shared pool of configurable computing resources. The unique identifier that makes content addressable on the Internet by uniquely targeting items, such as text, video, images, and Uniform Resource Identifier applications. The unique identifier that makes content addressable on the Internet by uniquely targeting items, such as text, video, images, and URI applications. Uniform Resource Locator A particular type of URI that targets web pages so that when a browser requests them, they can be found and served to users. URL A particular type of URI that targets web pages so that when a browser requests them, they can be found and served to users. With reference to a given (possibly implicit) set of objects, a unique identifier (UID) is any identifier which is guaranteed to be unique among Unique ID all identifiers used for those objects and for a specific purpose. With reference to a given (possibly implicit) set of objects, a unique identifier (UID) is any identifier which is guaranteed to be unique among UID all identifiers used for those objects and for a specific purpose. A microchip controlling a computer’s interface to serial devices, converting the bytes it receives from the computer along parallel circuits into Universal Asynchronous Receiver a single serial bit stream. A 16550 UART has a 16-byte buffer. A microchip controlling a computer’s interface to serial devices, converting the bytes it receives from the computer along parallel circuits into Universal Asynchronous Transmitter a single serial bit stream. A 16550 UART has a 16-byte buffer. A microchip controlling a computer’s interface to serial devices, converting the bytes it receives from the computer along parallel circuits into UART a single serial bit stream. A 16550 UART has a 16-byte buffer. A network identity-verification method that allows users to move from site to site securely without having to enter identifying information Universal Authentication multiple times. Universal Mobile Telecommunications System Also referred to as 3G cellular technology, this is the third iteration of the GSM. UMTS Also referred to as 3G cellular technology, this is the third iteration of the GSM. Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish Universal Plug and Play functional network services for data sharing, communications, and entertainment. Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish UPnP functional network services for data sharing, communications, and entertainment. Unstructured Data Information that either does not have a pre-defined data model or is not organized in a pre-defined manner (e.g., pictures or video). Uplink Notified as UL or U/L, this is the process of sending data from your device/computer to a server or target address. Usage Capacity The ability to initiate, to participate in the execution of, or to consume the outcome of some tasks or functions. User An entity that is interested in interacting with a particular physical entity. User Datagram Protocol The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. UDP The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. User Endpoint An endpoint used by a user to interact. User Experience Design The process of producing user interfaces (UI's) to products that maximize usability and satisfaction. User Experience User Experience refers to a person's emotions and attitudes about using a particular product, system or service. UX User Experience refers to a person's emotions and attitudes about using a particular product, system or service. Validation Confirmation, through the provision of objective evidence, that the requirements for a specific intended use or application have been fulfilled. One of the most popular words to describe the potential outcomes of Industry 4.0, value-added refers to the savings these integrated Value-Added processes are expected to bring. V2X is the concept of vehicles communicating with their surroundings or elements of the traffic system around them through data exchange. It is a broad mode of communication that may entail more specitific types of communication: V2V (Vehicle-to-vehicle), V2P (Vehicle-to- Vehicle-to-Everything Pedestrian), V2N (Vehicle-to-network), V2I (Vehicle-to-Infrastructure),V2D (Vehicle-to-device), V2G (Vehicle-to-grid), etc. V2X is the concept of vehicles communicating with their surroundings or elements of the traffic system around them through data exchange. It is a broad mode of communication that may entail more specitific types of communication: V2V (Vehicle-to-vehicle), V2P (Vehicle-to- V2X Pedestrian), V2N (Vehicle-to-network), V2I (Vehicle-to-Infrastructure),V2D (Vehicle-to-device), V2G (Vehicle-to-grid), etc. Vehicle-to-Grid An energy management system where plug-in electric vehicles are able to communicate with a smart grid and help balance loads. V2G An energy management system where plug-in electric vehicles are able to communicate with a smart grid and help balance loads. Vehicle-to-Infrastructure The communication of smart cars and commercial vehicles with surrounding sensors, such as signal phase and timing (SPaT) information. V2I The communication of smart cars and commercial vehicles with surrounding sensors, such as signal phase and timing (SPaT) information. Vehicle-to-Vehicle Vehicle-to-vehicle (V2V) is an automobile technology designed to allow automobiles to "talk" to each other. V2V Vehicle-to-vehicle (V2V) is an automobile technology designed to allow automobiles to "talk" to each other. Verification Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled. Vibration Sensing A MEMS concept referring to the detection of periodic acceleration and deceleration. Video Motion Detection A technology that analyzes image data and the differences in a series of images. VMD A technology that analyzes image data and the differences in a series of images. Video Surveillance as a Service A managed data service that transfers the monitoring and storage of video to the cloud. VSaaS A managed data service that transfers the monitoring and storage of video to the cloud. Virtually Unlimited Compute Power Companies can analyze big data at scale as they have access to incredible compute power, largely due to the availability of cloud services. The computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical Virtual Reality way by a person using special electronic equipment. Virtual Sensor All the physical or virtual items (i.e. services, persons, sensors, GSN nodes) which provide their information through a GSN endpoint. If an inertial measurement unit (IMU) is used within the VO system, it is commonly referred to as Visual Inertial Odometry (VIO). VIO pairs a Visual-inertial odometry camera and inertia sensors in a device to estimate its position and orientation. If an inertial measurement unit (IMU) is used within the VO system, it is commonly referred to as Visual Inertial Odometry (VIO). VIO pairs a VIO camera and inertia sensors in a device to estimate its position and orientation. Vortex An intelligent data sharing platform developed by Prismtech. Vulnerability Weakness of an asset or security controlthat can be exploited by one or more threats. Systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after Vulnerability Assessment implementation. Waggle An open platform for intelligent attentive sensors. Wallet A file that houses private keys and allow access to view and allow transactions via a software client. A WAP gateway sits between mobile devices using the WAP protocol and the World Wide Web, passing pages from one to the other much WAP Gateway like a proxy. Waveguide Displays These are transparent displays through which digital content is projected for users to see in their field of view. Wearables Technology that can be worn, typically to quantify a physical process (such as heartbeat monitoring) or to augment human capabilities. Wearable Technology Technology that can be worn, typically to quantify a physical process (such as heartbeat monitoring) or to augment human capabilities. Weave A communication layer developed by Google enabling IoT devices to talk to one another, the cloud, and smartphones. The Web Services Business Process Execution Language, commonly known as BPEL (Business Process Execution Language), is an OASIS Web Services Business Process Execution Languagestandard executable language for specifying actions within business processes with web services. WS-BPEL Web Sockets WebSocket is a protocol providing full-duplex communication channels over a single TCP connection. Weightless An IoT wide area networking platform developed by Neul / Huawei. Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network Wi-Fi connections. Windows 10 IoT Core An embedded windows controller for IoT developed by Microsoft. 1-Wire is a device communications bus system designed by Dallas Semiconductor Corporation that provides low-speed data, signaling, and 1 Wire power over a single signal. IEEE 802.11p is an approved amendment to the IEEE 802.11 standard to add wireless access in vehicular environments, a vehicular Wireless Access in Vehicular Environments communication system. IEEE 802.11p is an approved amendment to the IEEE 802.11 standard to add wireless access in vehicular environments, a vehicular WAVE communication system. Wireless Charging Technology and standards that enable consumers to charge electronic devices without the need for wires. WirelessHart WirelessHART is a wireless sensor networking technology based on the Highway Addressable Remote Transducer Protocol (HART). A wireless local area network is a wireless computer network that links two or more devices using a wireless distribution method (often Wireless Local Area Network spread-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building. A wireless local area network is a wireless computer network that links two or more devices using a wireless distribution method (often WLAN spread-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building. A personal area network (PAN) is a computer network used for data transmission among devices such as computers, telephones and Wireless Personal Area Network personal digital assistants. A personal area network (PAN) is a computer network used for data transmission among devices such as computers, telephones and WPAN personal digital assistants. Wireless power is a generic term that refers to a number of different power transmission technologies that use time-varying electromagnetic Wireless Power fields. Wireless power is a generic term that refers to a number of different power transmission technologies that use time-varying electromagnetic WP fields. Wireless sensor and actor networks (WSANs) refer to a group of sensors and actors linked by wireless medium to perform distributed Wireless Sensor and Actuator Networks sensing and actuation tasks. Wireless sensor and actor networks (WSANs) refer to a group of sensors and actors linked by wireless medium to perform distributed WS&AN sensing and actuation tasks. Autonomous sensor nodes that are connected to one, or sometimes several, other sensors to cooperatively pass their data through wireless Wireless Sensor Network connections to a main location. Autonomous sensor nodes that are connected to one, or sometimes several, other sensors to cooperatively pass their data through wireless WSN connections to a main location. Wireless WAN is a wide area network in which separate areas of coverage or cells are connected wirelessly to provide service to a large Wireless Wide Area Network geographic area. Wireless Wide Area Network. Wireless WAN is a wide area network in which separate areas of coverage or cells are connected wirelessly to WWAN provide service to a large geographic area. Worldwide Interoperability for Microwave Access A wireless communications standard designed to provide data rates up to 1 Gbit/s for fixed stations. WiMAX A wireless communications standard designed to provide data rates up to 1 Gbit/s for fixed stations. WyzBee Board A single board, hosting, sensing, and visualization controller board developed by WyzBee. WyzBee IoT Debugger An IoT traffic debugger developed by WyzBee. WyzBee THING Boards An IoT application specific boards developed by WyzBee. Commonly known as EV-DO or CDMA 1xEV-DO is a 3G technology add-on for CDMA (Code Division Multiple Access) networks that allows 1xEV-DO for theoretical download speeds as fast as 2.4576Mbps. Xively An IoT Device Management Platform. 1xRTT (Single-Carrier Radio Transmission Technology) is an operational mode for CDMA2000 wireless communications that specifies a 1xRTT single (1x) 1.25MHz channel for data transfer. A complete embedded Linux development environment with tools, metadata, and documentation for the creation of custom Linux-based Yocto systems for embedded products, regardless of the hardware architecture. Zatar is an Internet of Things cloud service that connects IoT devices securely, quickly and seamlessly for rapid commercial service to power Zatar business solutions. Zenobox A hardware board for IoT sensors developed by Zenodys. Zettabyte The zettabyte is a multiple of the unit byte for digital information. 10^21 byte ZB Zettabyte. The zettabyte is a multiple of the unit byte for digital information. ZigBee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with Zigbee small, low-power digital radios. Z-Wave Z-Wave is a wireless communication technology used in security systems and also business and home automation. Data Filtration A part of the Edge Layer that reduces the amount of transmitted information, but retains the meaning of it. Device-Agnostic Control Part of the Edge Layer that provides site abstraction to allow the server and/or cloud application to be agnostic to the device implementation it controls. Direct Messaging A messaging mechanism in which the sender and receiver are directly connected or can exchange messages through one or more intermediate hops, which do not take ownership of each message but just forward it (routing). Edge Layer An architectural shift in IoT that breaks the norm of the traditional client-server model. This is the first layer of connectivity for devices to connect to before going to the server. Responsible for the local connectivity of devices and for managing the data collection and connection to this server. Embedded Device A computer with a dedicated function within a larger mechanical or electrical system; it is embedded as part of a complete device. Embedded Systems A computer with a dedicated function within a larger mechanical or electrical system; it is embedded as part of a complete device. Endpoint Device An Internet-capable device on a TCP/IP network. Flow-based Programming A type of programming that defines applications as networks of process that exchange data across defined connections by message-passing, where the connections are specified externally to the processes. Haze Computing A dynamic model for analytics applications wherein an application at the data source analyzes a pooled view of resources for the local and global compute available across the cloud, edge, and device layers. This information informs how and where data analytics take place. Home Automation A combination of hardware and software solutions that allow for the control and management of electronics, appliances, and devices within a home. Beacon Technology A small network transmitter used to identify, track, and interact with connected systems using Bluetooth low energy. iBeacon is an Apple trademark, but it is also available on Android devices. Internet Protocol Suite The language a computer uses to access theInternet. It consists of a suite of protocols designed to establish a network of networks to provide a host with access to the Internet. IoT Cloud Platform A cloud platform that provides a set of services that simplify the integration process between the services provided by cloud platforms and IoT devices. Some platforms include development tools and data analytics capabilities. IoT Development Board A board that can be used to prototype and create IoT hardware. There are several boards available on the market with different features. Lightweight Protocol Any protocol that has a lesser and leaner payload when being used and transmitted over a network connection. Long Range Communication Protocols Used to refer to universal long-range radio frequencies for multi-generation wireless standards such as 2G, 3G, 4G, and4G LTE. Low Power Devices Electronics that have been designed to use less electric power than traditional devices. These are necessary to the future success of IoT because, as sensors become more advanced, devices need to be able to operate for longer periods of time without relying on manual maintenance or loss of data. Messaging Protocols The way information is transferred and communicated amongst devices, the cloud, and data storage. Different protocols are used for different results. Message Queuing Telemetry Transport A lightweight messaging protocol that runs on the TCP/IP protocol. It is designed for communicating with small devices in remote locations with low network bandwidth. MQTT Message Queuing Telemetry Transport. A lightweight messaging protocol that runs on the TCP/IP protocol. It is designed for communicating with small devices in remote locations with low network bandwidth. Multi-Agent System A network of multiple agents which act in an environment and interact or communicate with each other to achieve their design objective. Operability Operability is the measure of how well a software system works when operating in production, whether that is the public cloud, a co-located datacenter, an embedded system, or a remote sensor forming part of an IoT network. Propagator The “leaves” of the network architecture tree that are serviced by intermediate branch network elements. They manage message routing protocol translation services. Real-time Operating System Designed to guarantee the completion of a task within a certain time constraint. Often used in safety-critical systems and when building IoT devices. RTOS Real-time Operating System. Designed to guarantee the completion of a task within a certain time constraint. Often used in safety-critical systems and when building IoT devices. Releasability The ability to quickly deploy changes to a software system, but also to quickly recover from disaster and adapt to changing technical and business challenges. Sensor Network A group of sensors with a communications infrastructure intended to monitor and collect data from multiple locations. Site-level Management Allows site-level arrangement across devices from different vendors using dissimilar protocols. Store and Forward A messaging mechanism in which a broker is involved between sender and receiver so that the broker gets ownership of the message from the sender, stores it for reliability, and then delivers the message itself to the receiver. Internet Protocol A basic client/server model communication protocol for the Internet and private networks. Ubiquitous Computing A method of enhancing computer use by making several computers available throughout a physical environment, but making them effectively invisible to the user.

Part of the Edge Layer that provides site abstraction to allow the server and/or cloud application to be agnostic to the device implementation it controls. A messaging mechanism in which the sender and receiver are directly connected or can exchange messages through one or more intermediate hops, which do not take ownership of each message but just forward it (routing). An architectural shift in IoT that breaks the norm of the traditional client-server model. This is the first layer of connectivity for devices to connect to before going to the server. Responsible for the local connectivity of devices and for managing the data collection and connection to this server.

A type of programming that defines applications as networks of process that exchange data across defined connections by message-passing, where the connections are specified externally to the processes. A dynamic model for analytics applications wherein an application at the data source analyzes a pooled view of resources for the local and global compute available across the cloud, edge, and device layers. This information informs how and where data analytics take place. A combination of hardware and software solutions that allow for the control and management of electronics, appliances, and devices within a home. A small network transmitter used to identify, track, and interact with connected systems using Bluetooth low energy. iBeacon is an Apple trademark, but it is also available on Android devices. The language a computer uses to access theInternet. It consists of a suite of protocols designed to establish a network of networks to provide a host with access to the Internet. A cloud platform that provides a set of services that simplify the integration process between the services provided by cloud platforms and IoT devices. Some platforms include development tools and data analytics capabilities.

Electronics that have been designed to use less electric power than traditional devices. These are necessary to the future success of IoT because, as sensors become more advanced, devices need to be able to operate for longer periods of time without relying on manual maintenance or loss of data. The way information is transferred and communicated amongst devices, the cloud, and data storage. Different protocols are used for different results. A lightweight messaging protocol that runs on the TCP/IP protocol. It is designed for communicating with small devices in remote locations with low network bandwidth. Message Queuing Telemetry Transport. A lightweight messaging protocol that runs on the TCP/IP protocol. It is designed for communicating with small devices in remote locations with low network bandwidth.

Operability is the measure of how well a software system works when operating in production, whether that is the public cloud, a co-located datacenter, an embedded system, or a remote sensor forming part of an IoT network. The “leaves” of the network architecture tree that are serviced by intermediate branch network elements. They manage message routing protocol translation services.

Real-time Operating System. Designed to guarantee the completion of a task within a certain time constraint. Often used in safety-critical systems and when building IoT devices. The ability to quickly deploy changes to a software system, but also to quickly recover from disaster and adapt to changing technical and business challenges.

A messaging mechanism in which a broker is involved between sender and receiver so that the broker gets ownership of the message from the sender, stores it for reliability, and then delivers the message itself to the receiver.

A method of enhancing computer use by making several computers available throughout a physical environment, but making them effectively invisible to the user.