Glossary Items

T

  1. Telehash is a peer to peer data distribution and communication protocol that is designed to be decentralized and secure. Telehash is also a set of implementations of the protocol which is still in heavy development
    Telehash is also a set of implementations of the protocol which is still in heavy development. As a security-sensitive application, it has yet to receive a third-party security review. TeleHash is similar to BitTorrent Sync in that it allows users of the software to share data securely without any central server authority. There are implementations in C, Python, Ruby, Erlang, Javascript, Go, and Objective-C.
  2. An IT concept regarding the long-distance transmission of data. Telematics includes anything from GPS systems to navigation systems. In vehicles on the move, telematics refers to the integrated use of telecommunications and informatics that show the vehicles current position on a map.
    Telematics is a translation of the French word "télématique" which was first coined by Simon Nora and Alain Minc in 1978 report to the French government on the computerization of society. It referred to the transfer of information over telecommunications and was a merging of the French words "telecommunications" and "informatique". The original broad meaning of telematics continues to be used in academic fields but in commerce it now generally means vehicle telematics. In vehicles on the move, telematics refers to the integrated use of telecommunications and informatics, such as dashboard screens that show the vehicles current position on a map or in centralized tracking applications.
  3. TensorFlow is an open source software library for numerical computation using data flow graphs. Nodes in the graph represent mathematical operations, while the graph edges represent the multidimensional data arrays (tensors) communicated between them.
    Nodes in the graph represent mathematical operations, while the graph edges represent the multidimensional data arrays (tensors) communicated between them. The flexible architecture allows you to deploy computation to one or more CPUs or GPUs in a desktop, server, or mobile device with a single API. TensorFlow was originally developed by researchers and engineers working on the Google Brain Team within Google's Machine Intelligence research organization for the purposes of conducting machine learning and deep neural networks research, but the system is general enough to be applicable in a wide variety of other domains as well.
  4. The terabyte is a multiple of the unit byte for digital information. The prefix tera represents the fourth power of 1000, and means 1012 in the International System of Units (SI), and therefore one terabyte is one trillion (short scale) bytes.
    The prefix tera represents the fourth power of 1000, and means 1012 in the International System of Units (SI), and therefore one terabyte is one trillion (short scale) bytes. The unit symbol for the terabyte is TB. A related unit, the tebibyte (TiB), using a binary prefix, is equal to 10244 bytes. One terabyte is about 0.9095 TiB. Despite the introduction of these standardized binary prefixes, the terabyte is still also commonly used in some computer operating systems, primarily Microsoft Windows, to denote 1099511627776 (10244 or 240) bytes for disk drive capacity.
  5. A thingbot is something with an embedded system and an Internet connection that has been coopted by a hacker to become part of a botnet of networked things.
    A thingbot is something with an embedded system and an Internet connection that has been coopted by a hacker to become part of a botnet of networked things. The Internet of Things (IoT) is a scenario in which objects and entities are provided with unique identifiers and the ability to automatically transfer data over a network. A thing, in this context, could be a dedicated computing device such as a PC, notebook, smartphone or tablet, or almost anything else. A thingbot might be coopted to send spam or malware or to host illicit content, all without the knowledge of the owner. In December 2013 a researcher at Proofpoint, an enterprise security firm, discovered that hundreds of thousands of spam emails were being logged through a security gateway. Proofpoint traced the attacks to a botnet made up of 100,000 hacked appliances.
  6. The concept of delivering IoT functionality without the end-user having to operate or maintain extensive hardware, e.g. services such as Hadoop can be delivered in the cloud to receive and process the data generated by IoT-enabled sensor networks.
    The Internet of Things (IoT) is a trend in which the physical world is becoming a type of giant information system through sensors and telematics embedded in physical objects and linked through wireless networks. As with all new and exciting technologies, it's difficult to separate hype from reality. Certainly the IoT, with its promise of connecting homes and cars, smart grids and smart manufacturing fit into this category. What is different this time around is the convergence of disruptive technologies such as cloud and mobile, shrinking hardware and ubiquitous connectivity, increasing business use cases that are rewriting traditional business rulebook.
  7. Threat analysis is an essential step in identifying the probability of terrorist attack and results in a threat assessment. The examination of threat sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment.
    Threat analysis is an essential step in identifying probability of terrorist attack and results in a threat assessment.
  8. Threat modeling is an approach for analyzing the security of an application. It is a structured analysis to identify, quantify, and address the information security risks associated with an application or a system.
    Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application.
  9. A MEMS concept referring to the measurement of the inclination or angle of change with respect to gravity. Typical applications include industrial equipment platform stabilization and landscape/portrait detection on handheld devices.
    A tilt sensor can measure the tilting in often two axes of a reference plane in two axes. In contrast, a full motion would use at least three axes and often additional sensors. One way to measure tilt angle with reference to the earths ground plane, is to use an accelerometer. Typical applications can be found in the industry and in game controllers.
  10. Traceability here refers to the ability to fully trace all raw materials, producers, upstream suppliers, individual parts as well as the complete product and its consumers in the digital value creation chain.
  11. A technology that allows a device to estimate its position relative to the environment around it. In augmented reality, tracking is the method by which a computer anchors content to a fixed point in space, allowing users to walk and/or look around it.
    In augmented reality, tracking is the method by which a computer anchors content to a fixed point in space, allowing users to walk and/or look around it, as defined by the degrees of freedom allowed by the display device. In marker-based tracking, computers recognize a two-dimensional image or code on which it anchors the content. In markerless tracking, the computer uses some other mapping technique (usually SLAM) to determine a surface on which to anchor content.
  12. Hashing a transaction and adding it to the particular Blockchain successfully. Usually, more than one confirmation is required for the transaction to go through to ensure the transaction is legitimate and not unsupported.
    Each transaction made on a Blockchain needs miners to add it to a block and confirm it. Usually more than one confirmation is required for the transaction to go through to ensure the transaction is legitimate and not unsupported (e.g. sending 2 Litecoins from a wallet that only contains 1 Litecoin).
  13. A characteristic of ubiquitous computing where smart devices respond to users’ needs in the background. The devices are invisible (“transparent”) in the sense that they operate without the conscious thought or interaction of the user who is benefiting from the object or Thing.
    The devices are invisible (“transparent”) in the sense that they operate without the conscious thought or interaction of the user who is benefiting from the object or Thing.
  14. Also known as the see-through display, transparent displays are an electronic display that allows the user to see what is shown on the glass screen while still being able to see through it.
    Transparent displays with OLEDs are the most commonly produced forms of see-through displays on the market or in development. OLED screens have two layers of glass on both sides of the OLED, which consist of an emissive and conductive layer. Electrical impulses travel through the conductive layer and produce light at the emissive layer. This is different from LCD's in that OLED's produce their own light, which allows the screens to be much thinner, while LCD's need to be backlit. The narrow gap between the pixels of the screen as well as the clear cathodes within allow the screens to be transparent. These types of screen have been notoriously difficult and expensive to produce in the past, but are now becoming more common as the method of manufacturing them is advancing.
  15. Trust is a relationship between two entities or elements. It consists a set of activity and security policy in which element x trusts element y if and only if x has confidence that y will behave in a well-defined way that does not violate the given security policy.
    One party (trustor) is willing to rely on the actions of another party (trustee); the situation is directed to the future. In addition, the trustor (voluntarily or forcedly) abandons control over the actions performed by the trustee. As a consequence, the trustor is uncertain about the outcome of the other's actions; they can only develop and evaluate expectations. The uncertainty involves the risk of failure or harm to the trustor if the trustee will not behave as desired.
  16. Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust". The term refers to any distinct boundary within which a system trusts all sub-systems (including data).
    Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust". The term refers to any distinct boundary within which a system trusts all sub-systems (including data). An example of an execution trust boundary would be where an application attains an increased privilege level (such as root). A data trust boundary is a point where data comes from an untrusted source. For example, user input or a network socket.
test test