Glossary Items

M

  1. M-Bus is a European standard covering remote readout of meters and can be used with different types of consumption meters and various types of valves and actuators.
    Data (e.g. heat energy) can be read out electronically. In that case, transmission is serial via a 2-wire line with reversed polarity protection, from the connected slaves (meters) to a master. M-bus meters are available for the acquisition of heat, water, electricity and gas.
  2. The authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Unlike user authentication, the process does not involve any action on the part of a human.
    Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Digital certificates used in machine authorization are like a form of digital passport providing trusted identification for the purpose of securely exchanging information over the Internet. Digital credentials are much like forms of machine-provided ID and password. Machine authentication is used to authorize machine interactions on both wired and wireless networks to enable computers and other machines to interact and exchange information autonomously. The processes of machine authentication can be performed by simple devices such as sensors and meters in infrastructure.
  3. Also known as machine-generated data, this is digital information created by the activity of computers, mobile phones, embedded systems, and other networked devices.
    Machine data is digital information created by the activity of computers, mobile phones, embedded systems and other networked devices. Such data became more prevalent as technologies such as radio frequency identification (RFID) and telematics advanced. More recently, machine data has gained further attention as use of the Internet of Things, Hadoop and other big data management technologies has grown. Application, server and business process logs, call detail records and sensor data are prime examples of machine data. Internet clickstream data and website activity logs also factor into discussions of machine data. Combining machine data with other enterprise data types for analysis is expected to provide new views and insight on business activities and operations. For example, some large industrial manufacturers are analyzing machine data on the performance of field equipment in near-real-time, together with historical performance data, to better understand service problems and to try to predict equipment maintenance issues before machines break down. Other examples of applications that center on the use of machine data include setups for monitoring oil and gas pipelines, natural disaster warning systems based on feeds from marine sensors, forecasting systems that take data from satellites and weather stations to help predict weather in small geographic areas, and a building energy management system that analyzes HVAC and elevator data to improve efficiency. Further use cases are likely to arise as emerging machine learning applications begin to mature.
  4. A subfield of computer science that evolved from the study of pattern recognition in artificial intelligence. Machine learning is a subfield of computer science that evolved from the study of pattern recognition and computational learning theory in artificial intelligence.
    Machine learning is a subfield of computer science that evolved from the study of pattern recognition and computational learning theory in artificial intelligence. Machine learning explores the study and construction of algorithms that can learn from and make predictions on data. Such algorithms operate by building a model from example inputs in order to make data-driven predictions or decisions, rather than following strictly static program instructions.
  5. Technologies that allow both wireless and wired devices to communicate and perform actions with other devices of the same type without the assistance of a human.
    Technologies that allow both wireless and wired systems to communicate with other devices of the same type. A broad term describing technology that allows for one connected device to communicate and exchange information with another connected device, without the assistance of a human.
  6. Machine Type Communications (MTCI) is a 3rd Generation Partnership Project standard describing machine-to-machine communications. MTC has a wide range of potential applications and is gaining interest among mobile network operators, equipment vendors, specialist companies, and research bodies.
    MTC has a wide range of potential applications and is gaining interest among mobile network operators, equipment vendors, specialist companies, and research bodies.
  7. Magnetometers are measurement instruments used for two general purposes: to measure the magnetization of a magnetic material like a ferromagnet, or to measure the strength and, in some cases, the direction of the magnetic field at a point in space.
    Magnetometers are widely used for measuring the Earth's magnetic field and in geophysical surveys to detect magnetic anomalies of various types. They are also used in the military to detect submarines. Consequently, some countries, such as the USA, Canada and Australia classify the more sensitive magnetometers as military technology, and control their distribution.
  8. A mainnet is a Blockchain that carries out the functionality of transferring digital currency from senders to recipients. This is different from a testnet, which is just a test of such transaction functionality.
    A mainnet is a Blockchain that carries out the functionality of transferring digital currency from senders to recipients. This is different to a testnet, which is just a test of such transaction functionality. Mainnet is the actual end-product, and is available for the public to use, like Ethereums mainnet Blockchain for example.
  9. Malware or malicious software is designed to cause damage or disruption to a computer, server, or computer network. A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware.
  10. In cryptography and computer security, a man-in-the-middle attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two.
  11. The time of actual production from the moment a customer order arrives on the plant floor to the completion of all product manufacturing, assembly, and testing.
    Businesses use throughput time to measure how long it takes for a company to manufacture a product and get it on its way to the customer. Businesses should delicately balance efficiency and quickness in manufacturing a product and product quality. While an organization will save money if they can minimize their cycle time, the extent of this minimization should be carefully aligned with the strategy of the business and the needs of its customers.There are four components that go into calculating total manufacturing cycle time. They are: process time, inspection time, move time, and queue time. Those four variables have the following relationship that are calculated in the throughput time formula:Manufacturing cycle time = Process time + Inspection time + Move time + Queue time
  12. Markerless AR is used to denote an Augmented Reality application that does not need any pre-knowledge of a uses environment to overlay 3D content into a scene and hold it to a fixed point in space.
    This term is used to denote an Augmented Reality application that does not need any pre-knowledge of a uses environment to overlay 3D content into a scene and hold it to a fixed point in space. Until recently, most AR fell under the category of marker-based AR, which required the user to place a tracker — an image encoded with information that translated by complex software to produce a 3D object that maintains special orientation within a scene — in order to achieve the desired effect.
  13. Mechanical Computer-aided Design (MCAD) software is used to create and modify geometry, including both 2D and 3D, to order to design, assess and document mechanical components, sheet metal components, assemblies, products, as well as molds, dies, and other toolings.
  14. A combination of the words “mechanical” and “electronics,” mechatronics brings together electrical engineering, control engineering, computer engineering, and mechanical engineering disciplines.
    A warehouse inventory robot would be a mechatronic device, whereas an IoT-enabled sensor device, such as a weather station, could be better classified as a Cyber-Physical System (CPS).
  15. In the IEEE 802 reference model of computer networking, the medium access control or media access control (MAC) layer is the lower sublayer of the data link layer (layer 2) of the seven-layer OSI model.
    In the IEEE 802 reference model of computer networking, the medium access control or media access control (MAC) layer is the lower sublayer of the data link layer (layer 2) of the seven-layer OSI model. The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
  16. Mediated Reality is the technological process by which the WearComp user can mediate all visual input and output. Mediation includes overlaying virtual objects on "real life," and taking away or otherwise visually altering objects.
    Alters our perception of reality by adding and removing information through a device such as a headset or smartphone in real-time. In other words, augmented reality plus diminished reality equals mediated reality. & Mediated reality offers an improved visual experience, rather than just using AR or DR alone.
  17. Mesh Networking is an ad-hoc, local area network infrastructure where the nodes communicate directly with each other without the need to pass through a central structure such as an ISP.
    In a full mesh topology, each network node (workstation or other device) is connected directly to each of the others. In a partial mesh topology, some nodes are connected to all the others, but others are only connected to those nodes with which they exchange the most data. Mesh networks are expected to play an important part in the Internet of Things (IoT). Unlike nodes in a star topology, which require a router to deliver Internet service, network nodes can "talk" directly to each other without requiring the assistance of an Internet connection. A big advantage of this decentralized topology is that there cannot be a single point of failure (SPoF). If one node can no longer operate, the others can still communicate with each other, directly or through one or more intermediate nodes.
  18. A middleware program that translates a message from the messaging protocol of the sender into the messaging protocol of the receiver. Many messaging patterns (like publish-subscribe) can work without a message broker.
    In a telecommunication network where programs communicate by exchanging formally-defined messages (that is, through the act of messaging ), a message broker is an intermediary program that translates a message from the formal messaging protocol of the sender to the formal messaging protocol of the receiver. Message broker programs are sometimes known as middleware. Many messaging patterns (like publish-subscribe) can work without a message broker. One pattern that requires a message broker is workload queues, that is message queues that are handled by multiple receivers. Such queues must be managed, transacted, and usually stored reliably, at a single point.
  19. An open, lightweight M2M communications protocol for the transfer of telemetry messages. MQTT is a publish-subscribe based "light weight" messaging protocol for use on top of the TCP/IP protocol.
    MQTT is a publish-subscribe based "light weight" messaging protocol for use on top of the TCP/IP protocol. It is designed for connections with remote locations where a "small code footprint" is required or the network bandwidth is limited. The publish-subscribe messaging pattern requires a message broker. The broker is responsible for distributing messages to interested clients based on the topic of a message.
  20. Middleware that allows for synchronous as well as asynchronous (queue) messaging between distributed systems. Message-oriented middleware is software or hardware infrastructure supporting the sending and receiving of messages between distributed systems.
    Message oriented middleware is software or hardware infrastructure supporting the sending and receiving of messages between distributed systems. Because businesses, institutions, and technologies change continually, the software systems that serve them must be able to accommodate such changes. Following a merger, the addition of a service, or the expansion of available services, a business can ill afford to recreate its information systems.
  21. A smart building, smart equipment, sensor integration developed by Johnson Controls. The Metasys system is a leading Building Automation System and the foundation of modern building efficiency.
    The Metasys system is a leading Building Automation System and the foundation of modern building efficiency. It enhances occupant comfort, safety, security, and productivity, and it provides more system control and easier access to information than other Building Automation Systems. It is a complete family of systems and servers designed to work together as one cohesive system.
  22. Micro-Electro-Mechanical Systems (MEMS) is a miniaturized mechanical and electro-mechanical element typically used for measurements. They usually consist of a central unit that processes data and several components that interact with the surroundings, such as microsensors.
    MEMS are separate and distinct from the hypothetical vision of molecular nanotechnology or molecular electronics. MEMS are made up of components between 1 to 100 micrometers in size (i.e. 0.001 to 0.1 mm), and MEMS devices generally range in size from 20 micrometers to a millimetre (i.e. 0.02 to 1.0 mm). They usually consist of a central unit that processes data (the microprocessor) and several components that interact with the surroundings such as microsensors.
  23. A microcontroller (MCU) is a small computer on a single chip. The chip contains a CPU, a clock, non-volatile memory for the program (ROM or flash), volatile memory for input and output (RAM), and an I/O control unit.
    Local processing capability is most often provided by MCUs, which provide the “real-time” embedded processing.
  24. The study and manufacture of very small electronic designs and components. Microelectronics is a subfield of electronics. As the name suggests, microelectronics relates to the study and manufacture (or microfabrication) of very small electronic designs and components.
    Microelectronics is a subfield of electronics. As the name suggests, microelectronics relates to the study and manufacture (or microfabrication) of very small electronic designs and components. Usually, but not always, this means micrometre-scale or smaller. These devices are typically made from semiconductor materials. Many components of normal electronic design are available in a microelectronic equivalent. These include transistors, capacitors, inductors, resistors, diodes and (naturally) insulators and conductors can all be found in microelectronic devices. Unique wiring techniques such as wire bonding are also often used in microelectronics because of the unusually small size of the components, leads and pads. This technique requires specialized equipment and is expensive. Digital integrated circuits (ICs) consist mostly of transistors. Analog circuits commonly contain resistors and capacitors as well. Inductors are used in some high frequency analog circuits, but tend to occupy large chip area if used at low frequencies; gyrators can replace them in many applications. As techniques improve, the scale of microelectronic components continues to decrease. At smaller scales, the relative impact of intrinsic circuit properties such as interconnections may become more significant. These are called parasitic effects, and the goal of the microelectronics design engineer is to find ways to compensate for or to minimize these effects, while always delivering smaller, faster, and cheaper devices.
  25. A microprocessor is a computer processor that incorporates the functions of a computer's central processing unit (CPU) on a single integrated circuit (IC), or at most a few integrated circuits.
    The microprocessor is a multipurpose, programmable device that accepts digital data as input, processes it according to instructions stored in its memory, and provides results as output. It is an example of sequential digital logic, as it has no internal memory. Microprocessors operate on numbers and symbols represented in the binary numeral system.
  26. Microservices is a software architecture style. It is based on small building blocks that focus on a single responsibility and function and uses a modular approach to combine large complex applications.
  27. An IoT platform designed for use on mobile devices, IOS, Android, Tablets. It utilizes all of the smart features of the modern mobile phone and can add value through communication, collaboration, and ease of use.
    A Mobility Platform can be used by employees through existing devices and does not need to be taught as a new program such as when dealing with computer software. The average person uses their phone every day so they have an innate knowledge of the user experience. A Mobility Platform can be designed to extend a solution to the other edge of IoT, the human edge.
  28. Mobile Personal Emergency Response System (MPERS) is a wearable device, such as a pendant, that is connected to a cellular network enabling the user to summon help indoors or outdoors.
    Practical 1_x000D_ Practical 2
  29. A mobile station comprises all user equipment and software needed for communication with a mobile network. The term refers to the global system connected to the mobile network.
    A mobile station (MS) comprises all user equipment and software needed for communication with a mobile network. The term refers to the global system connected to the mobile network, i.e. a mobile phone or mobile computer connected using a mobile broadband adapter. This is the terminology of 2G systems like GSM. In 3G systems, a mobile station (MS) is now referred to as user equipment (UE).
  30. Mobile Station ISDN (MSISDN) is a number uniquely identifying a subscription in a GSM or a UMTS mobile network. The MSISDN, together with IMSI are two important numbers used for identifying a mobile subscriber.
    The MSISDN together with IMSI are two important numbers used for identifying a mobile subscriber. The latter is stored in the SIM, i.e. the card inserted into the mobile phone, and each IMSI uniquely identifies the mobile station, its home wireless network, and the home country of the home wireless network, while the former is the number used for routing calls to the subscriber.
  31. Mobile Virtual Network Operator (MVNO) is a mobile operator that does not own spectrum or have its own network infrastructure. An MVNO has business arrangements with traditional mobile operators to buy network time, which it then sells to its own customers.
    MVNO is a mobile operator that does not own spectrum or have its own network infrastructure. An MVNO has business arrangements with traditional mobile operators to buy network time, which it then sells to its own customers. MVNOs work independently of mobile network operators (MNOs) and can set their own pricing structure subject to the rates they've agreed to pay MNOs. MVNOs do not own any core mobile network-related infrastructure such as radio access networks or mobile switching centers.
  32. Modbus is an open and widely used de facto standard applied in a large number of application areas, such as the industrial sector, buildings, traffic, and energy.
    The Modbus protocol is used to establish masterslave/client-server communication between intelligent devices. Using Modbus, a master (e.g. automation station) and several slaves (e.g. chillers) can be interconnected. Data transmission takes place through one of the three operating modes: Modbus ASCII, RTU, or TCP.
  33. A molecular sensor or chemosensor is a molecule that interacts with an analyte to produce a detectable change. Molecular sensors combine molecular recognition with some form of the reporter, so the presence of the guest can be observed.
    Molecular sensors combine molecular recognition with some form of reporter so the presence of the guest can be observed. The term supramolecular analytical chemistry has recently been coined to describe the application of molecular sensors to analytical chemistry.
  34. Monitor-Analyze-Plan-Execute-Knowledge (MAPE-K) control loop was first introduced by IBM in their white paper: "An architectural blueprint for autonomic computing." It collects the details from the managed resources.
    MAPE-K control loop was first introduced by IBM in their white paper: "An architectural blueprint for autonomic computing." It collects the details from the managed resources e.g. topology information, metrics (e.g. offered capacity and throughput), configuration property settings and so on. It performs complex data analysis and reasoning on the symptoms provided by the monitor function.
  35. Monitoring and stream analytics compare and analyze data that are available to the smart factory from diverse sources – devices, sensors, infrastructure, etc.
    In real time these analytics make comparisons with data records from the past and recognize anomalies, which can be categorized as faults with the aid of machine learning. On this basis intelligent systems can initiate immediate countermeasures and generate forecasts and recommended actions for the future.
  36. Short for Remote - a mote is a wireless transceiver that also acts as a remote sensor. The ability to log onto a network from a distant location. Generally, this implies a computer, a modem, and some remote access software to connect to the network.
    The ability to log onto a network from a distant location. Generally, this implies a computer, a modem, and some remote access software to connect to the network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer actually becomes a full-fledged host on the network. The remote access software dials in directly to the network server. The only difference between a remote host and workstations connected directly to the network is slower data transfer speeds.
  37. Infrared motion sensors that reliably send alerts to alarm panel (or dialer) and with a system implementing reduced false alarms algorithms and adaption to environmental disturbances.
    Motion detection can be achieved by either mechanical or electronic methods. When motion detection is accomplished by natural organisms, it is called motion perception. The principal methods by which motion can be electronically identified are optical detection and acoustic detection. Infrared light or laser technology may be used for optical detection. Motion detection devices, such as PIR motion detectors, have a sensor that detects a disturbance in the infrared spectrum. Once detected, a signal can activate an alarm or a camera that can capture an image or video of the motioner.
  38. Multi-tenancy is a kind of software operation model where a single instance of a software application servers multiple users. Each customer/​organization is called a tenant.
  39. A MEMS concept referring to the detection of the combined input along multiple axes using multiple sensing types, such as acceleration and rotation. Typical applications include antenna stabilization, robotics, and dead-reckoning.
    Typical applications include antenna stabilization, robotics and dead-reckoning.
  40. The input-output concept in the context of antennas. A radio technology using multiple antennas at both the transmitter and receiver to improve communication performance. MIMO is an important part of wireless communication standards, such as IEEE 802.11n (Wi-Fi).
    A radio technology using multiple antennas at both the transmitter and receiver to improve communication performance. MIMO is an important part of wireless communication standards such as IEEE 802.11n (Wi-Fi).
test test