Accelerating the
Industrial Internet of Things
Create New Record
807 terms
Term missing? Just let us know via Add New Term.
AnalyticsAnalytics Analytics
Synthesis of knowledge from information.
Android WearAndroid Wear Android Wear
An open-source platform that extends the Android system to wearables.
Anomaly DetectionAnomaly Detection Anomaly Detection
A statistical technique that determines what patterns are normal and then identifies items that do not conform to those patterns.
Another Neat Tool (ANT)Another Neat Tool (ANT) Another Neat Tool (ANT)
A Java-based software tool for automating software build processes.
ANT is a proprietary (but open access) multicast wireless sensor network technology designed and marketed by ANT Wireless.
Anti-Device TamperingAnti-Device Tampering Anti-Device Tampering
An accessory that is mounted directly on the door stop which prevents accidental closure of the door and the consequent possible restart of the machine or system.
Apache KafkaApache Kafka Apache Kafka
Apache Kafka is an open-source message broker project developed by the Apache Software Foundation written in Scala.
Apache StormApache Storm Apache Storm
Apache Storm is a distributed computation framework written predominantly in the Clojure programming language.
Apio MeshApio Mesh Apio Mesh
An IoT Mesh Sensor System developed by Apio.
Appache CassandraAppache Cassandra Appache Cassandra
Apache Cassandra is an open source distributed database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure.
App CloudApp Cloud App Cloud
A platform for developing IoT applications using Salesforce platform developed by Salesforce.
Application Enablement ToolsApplication Enablement Tools Application Enablement Tools
Application enablement is an approach which brings telecommunications network providers and developers together to combine their network and web abilities in creating and delivering high demand advanced services and new intelligent applications.
Application Programming Interface (API)Application Programming Interface (API) Application Programming Interface (API)
In computer programming, an application programming interface (API) is a set of routines, protocols, and tools for building software applications.
Application SoftwareApplication Software Application Software
Programs that enable specific, end-user actions.
Application Specific Sensor Nodes (ASSN)Application Specific Sensor Nodes (ASSN) Application Specific Sensor Nodes (ASSN)
Integrating sensors and sensor fusion in a single device, ASSNs have a built-in intelligence to cope with the complexity of applying multiple sensors to a specific problem such as augmented reality, navigation, positioning, and more.
Approachable HardwareApproachable Hardware Approachable Hardware
More businesses and individuals are able to leverage a vast ecosystem of tools to design, produce, and distribute hardware than on their own.
Architecting ResilienceArchitecting Resilience Architecting Resilience
IT-Systems that are able to avoid accident and failure.
Architecture FrameworkArchitecture Framework Architecture Framework
Conventions, principles and practices for the description of architectures established within a specific domain of application and/or community of stakeholders.
Architecture LayerArchitecture Layer Architecture Layer
A logical partitioning of the architecture.
Architecture ViewArchitecture View Architecture View
Work product expressing the architecture of a system from the perspective of specific system concerns.
ArduinoArduino Arduino
A single-board microcontroller used for prototyping without having to deal with breadboards or soldering.
ArkessaArkessa Arkessa
Carrier-independent provider of IoT communications services, designed to provide management of multiple cellular carriers.
AR OverlayAR Overlay AR Overlay
An image or graphic superimposed over an Image Target. This is the basics of AR technology
Artificial Intelligence (AI) Artificial Intelligence (AI) Artificial Intelligence (AI)
 A technology that gives computers the ability to learn based on data, previous experiences, and their environment in order to make decisions in order maximize results.
AR Video PlaybackAR Video Playback AR Video Playback
A video anchored in 3D space (typically superimposed on an Image Target) while maintaining the view of the physical environment as opposed to full screen playback.  
AssuranceAssurance Assurance
Grounds for justified confidence that a claim has been or will be achieved.
AT CommandsAT Commands AT Commands
Attention commands, developed by Dennis Hayes, that are used to set data connections.
Atomicity, Consistency, Isolation, Durability (ACID )Atomicity, Consistency, Isolation, Durability (ACID ) Atomicity, Consistency, Isolation, Durability (ACID )
A set of properties that guarantee that database transactions are processed reliably.
51% Attack51% Attack 51% Attack
The situation when more than half of the computing power used for mining a particular crypto currency is controlled by one entity. It can be used for malicious action on the network.
Attack DetectionAttack Detection Attack Detection
The process of identifying that an attack has been attempted, is occurring or has occurred.”