Glossary Items

E

  1. Edge computing is pushing the frontier of computing applications, data, and services away from centralized nodes to the logical extremes of a network. It enables analytics and knowledge generation to occur at the source of the data.
    It enables analytics and knowledge generation to occur at the source of the data. This approach requires leveraging resources that may not be continuously connected to a network such as laptops, smartphones, tablets and sensors. Edge Computing covers a wide range of technologies including wireless sensor networks, mobile data acquisition, mobile signature analysis, cooperative distributed peer-to-peer ad hoc networking and processing also classifiable as Local Cloud/Fog computing and Grid/Mesh Computing, mobile edge computing, cloudlet, distributed data storage and retrieval, autonomic self-healing networks, remote cloud services, augmented reality, and more. Edge computing pushes applications, data and computing power (services) away from centralized points to the logical extremes of a network. Edge computing replicates fragments of information across distributed networks of web servers, which may be vast and include many networks. As a topological paradigm, edge computing is also referred to as mesh computing, peer-to-peer computing, autonomic (self-healing) computing, grid computing, and other names implying non-centralized, nodeless availability. To ensure acceptable performance of widely dispersed distributed services, large organizations typically implement edge computing by deploying Web server farms with clustering. Previously available only to very large corporate and government organizations, technology advancement and cost reduction for large-scale implementations have made the technology available to small and medium-sized business.
  2. Edge gateway provides an entry point into enterprise or service provider core networks. The gateway node is considered to be on the "edge" of the network as all data must flow through it before coming in or going out of the network.
    The gateway node is considered to be on the "edge" of the network as all data must flow through it before coming in or going out of the network. It may also translate data received from outside networks into a format or protocol recognized by devices within the internal network.
  3. Electrical Computer-aided Design (ECAD) is a real-time standalone, easy-to-use, multi-user electrical design tool that helps in efficiently defining the electrical interconnections for complex electrical systems.
  4. An electromagnetic field (EMF) is a physical field produced by electrically charged objects. It affects the behavior of charged objects in the vicinity of the field.
    An electromagnetic field (also EMF or EM field) is a physical field produced by electrically charged objects. It affects the behavior of charged objects in the vicinity of the field.
  5. An Electronic Control Unit (ECU) is a device, such as a sensor or an actuator, that is connected to other devices via a CAN Bus. A vehicle can contain dozens of ECUs for functions such as mirror adjustment, airbags, cruise control, entertainment, and, most significantly, engine control.
    A vehicle can contain dozens of ECUs for functions such as mirror adjustment, window power, airbags, cruise control, entertainment, and, most significantly, engine control. To form a CAN, two or more ECUs are needed.
  6. Electronic paper, e-paper, and electronic ink are display technologies that mimic the appearance of ordinary ink on paper. An ideal e-paper display can be read in direct sunlight without the image appearing to fade.
    Unlike conventional backlit flat panel displays that emit light, electronic paper displays reflect light like paper. This may make them more comfortable to read, and provide a wider viewing angle than most light-emitting displays. The contrast ratio in electronic displays available as of 2008 approaches newspaper, and newly developed displays are slightly better. An ideal e-paper display can be read in direct sunlight without the image appearing to fade.
  7. An Electronic Serial Number (ESN) is a numeric identifier that uniquely identifies a CDMA phone in the United States. When a cellular call is placed on a mobile telephone, the ESN is transmitted to a base station, and the number is used to authenticate the validity of the phone.
    When a cellular call is placed on a mobile telephone, the ESN is transmitted to a base station, and the number is used to authenticate the validity of the phone in respect to the cellular service the phone is attempting to use. The ESN is embedded within the signal and transmitted each time a cellular call is placed.
  8. The exploiting of vulnerabilities in embedded software to gain control of the device. Embedded systems exist in a wide variety of devices including Internet and wireless access points, IP cameras, security systems, drones, and industrial control systems.
    Attackers have hacked embedded systems to spy on the devices, to take control of them or simply to disable (brick) them. Embedded systems exist in a wide variety of devices including Internet and wireless access points, IP cameras, security systems, pace makers, drones and industrial control systems.
  9. The flash memory chip that stores specialized software running in a chip in an embedded device to control its functions. Hardware makers use embedded firmware to control the functions of various hardware devices and systems.
    Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
  10. Embedded software is computer software written to control machines or devices that are not typically thought of as computers. It is typically specialized for the particular hardware that it runs on and has time and memory constraints.
    Embedded software is computer software, written to control machines or devices that are not typically thought of as computers. It is typically specialized for the particular hardware that it runs on and has time and memory constraints.
  11. Embedded system security is the reduction of vulnerabilities and protection against threats in software running on embedded devices. It is a strategic method to protecting software running on an embedded system from attack.
    Traditionally, many of the hardware and hardware systems controlled by embedded software have not been easily interfaced with as they had little need to be exposed. Trends like machine-to-machine (M2M) communication, the Internet of Things and remotely-controlled industrial systems, however, have increased the number of connected devices and simultaneously made these devices targets.
  12. Emergent behavior is the behavior of a system that does not depend on its individual parts but on their relationships with one another. Thus emergent behavior cannot be predicted by examination of a system's individual parts.
    Emergent behavior is behavior of a system that does not depend on its individual parts, but on their relationships to one another. Thus emergent behavior cannot be predicted by examination of a system's individual parts. It can only be predicted, managed, or controlled by understanding the parts and their relationships. Emergent behavior is also known as emergence, emergent property, or “the whole is greater than the sum of the parts.”
  13. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks.
    The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. Modern encryption algorithms play a vital role in the security assurance of IT systems and communications as they can provide confidentiality.
  14. Endpoint authentication is an authentication mechanism used to verify the identity of a network's external or remote connecting device. These endpoint devices include laptops, smartphones, tablets, and servers.
    This method ensures that only valid or authorized endpoint devices are connected to a network. These endpoint devices include laptops, smartphones, tablets and servers.
  15. A communication endpoint is a type of communication network node. One of two components that either implements and exposes an interface to other components or uses the interface of another component.
    A communication endpoint is a type of communication network node. It is an interface exposed by a communicating party or by a communication channel. An example of the latter type of a communication endpoint is a publish-subscribe topic or a group in group communication systems. A communication endpoint is a discoverable node of communication whose scope may be varied to narrow or broaden the discovery zone. Endpoints facilitate a standard programmable layer of abstraction whereby heterogeneous software systems and/or subsystems may communicate with each other and that the means of communication are decoupled from the communicating subsystems.
  16. The process by which energy is derived from external sources and stored for small, wireless autonomous devices (biological, chemical, induction). Applications can be found in wireless sensor networks or wearable tech. Energy sources are, among others, sun, wind, or kinetic energy.
    Technologies which use small amounts of energy from close proximity to power small wireless devices. Applications can be found in wireless sensor networks or wearable tech. Energy sources are, among others, sun, wind, or kinetic energy.
  17. An IoT protocol focused on Wireless Standard for Connected Devices. The core technology is the self-powered RF technology developed by EnOcean for maintenance-free sensors, which can be installed wherever desired.
    Core technology is the self-powered RF technology developed by EnOcean for maintenance-free sensors, which can be installed wherever desired. The EnOcean Alliance stands for the incremental development of the interoperable standard and for a secure future of the innovative RF sensor technology.
  18. A security feature of Google's Eddystone beacon protocol, Ephemeral Identifier 's are beacon IDs that change frequently. Google has stated that these frames will be secure and usable for personal beacons, such as luggage or key chains, allowing only authorized clients to decode them.
    The full specification is not yet available, but Google has stated that these frames will be secure and usable for personal beacons, such as luggage or key chains, allowing only authorised clients to decode them.
  19. Equipment-as-a-service (EaaS) is rapidly moving from a specialized notion pioneered by the providers of medical and other specialized devices to general adoption. The ease of connecting all sorts of equipment and devices in the internet of things (IoT).
    The ease of connecting all sorts of equipment and devices in the internet of things (IoT), EaaS is also becoming more feasible and affordable. Today, EaaS is poised to make rapid inroads into complex building systems, such as high-rise elevators or HVAC, as well as manufacturing environments.
  20. The Ethereum Virtual Machine (EVM) is a Turing complete virtual machine that allows anyone to deploy smart contracts on the Ethereum Blockchain without affecting the Ethereum Blockchain operations as EVM is designed to work in a sandbox environment.
    EVM serves as a runtime environment for smart contracts based on Ethereum. Any party willing to create a smart contract can do so using the EVM, without affecting the Ethereum Blockchain operations as EVM is designed to work in a sandbox environment.
  21. The event-driven architecture (EDA) is a software architecture pattern promoting the production, detection, consumption of, and reaction to events. Events can be as varied as a driver picking up a package, a machine measurement hitting a threshold, or a specific customer arriving at a retail outlet.
    A software architecture pattern promoting the production, detection, consumption of, and reaction to events.
  22. Event Stream Processing (ESP) is a set of technologies designed to assist the construction of event-driven information systems. ESP technologies include event visualization, event databases, event-driven middleware, and event processing languages, or complex event processing (CEP).
    ESP is a set of technologies designed to assist the construction of event-driven information systems. ESP technologies include event visualization, event databases, event-driven middleware, and event processing languages, or complex event processing (CEP). In practice, the terms ESP and CEP are often used interchangeably. ESP deals with the task of processing streams of event data with the goal of identifying the meaningful pattern within those streams, employing techniques such as detection of relationships between multiple events, event correlation, event hierarchies, and other aspects such as causality, membership and timing.
  23. The exabyte is a multiple of the unit byte for digital information. The prefix exa indicates multiplication by the sixth power of 1000 (1018) in the International System of Units (SI).
    The prefix exa indicates multiplication by the sixth power of 1000 (1018) in the International System of Units (SI). Therefore, one exabyte is one quintillion bytes (short scale). The symbol for the exabyte is EB. An exabyte (EB) is a unit of digital information storage used to denote the size of data. It is equivalent to 1 billion gigabytes (GB), 1,000 petabytes (PB) or 1,000,000,000,000,000,000 bytes (B).
  24. A term refers to all real-and-virtual combined environments and human-machine interactions generated by computer technology and wearables. The levels of virtuality range from partially sensory inputs to immersive virtuality also called VR.
    An increasingly popular initialization, XR is used as an umbrella term to refer to both augmented and virtual reality, where the X really acts as a variable to substitute any flavour of computer-assisted visual modification to reality.
  25. The concept that a target pose information will be available even when the Target is no longer in the field of view of the camera or cannot directly be tracked for other reasons.
    This allows you to launch the AR experience with an Image Target in the camera view persist the experience even when you’re not tracking the image. This is particularly useful for visualizing large or complex objects that may be larger than the Image Target. Two examples are:-Game or game-like experiences with a large amount of dynamic content that requires the user to point the device away from the target as the user follows the content-Visualizations of large objects like furniture, appliances, large home furnishings and even architectural models at the right scale and perspective.
  26. Extensible Messaging and Presence Protocol (XMPP) is a communications protocol for message-oriented middleware based on XML (Extensible Markup Language).
    XMPP enables the near-real-time exchange of structured yet extensible data between any two or more network entities. Originally named Jabber, the protocol was developed by the Jabber open-source community in 1999 for near real-time instant messaging (IM), presence information, and contact list maintenance. Designed to be extensible, the protocol has also been used for publish-subscribe systems, signalling for VoIP, video, file transfer, gaming, Internet of Things (IoT) applications such as the smart grid, and social networking services.
  27. External Machine Interface Protocol (EMI) is an extension to the UCP (Universal Computer Protocol). It is used to connect to Short Message Service Centers, which store, transform, and send short messages.
    The protocol was developed by CMG Wireless Data Solutions, now part of Acision.
test test