Terms
514 terms
term missing? Just let us know via Add New Term.
Embedded System SecurityEmbedded System Security
Embedded System Security
Embedded system security is the reduction of vulnerabilities and protection against threats in software running on embedded devices. It is a strategic method to protecting software running on an embedded system from attack.
Emergent BehaviorEmergent Behavior
Emergent Behavior
Emergent behavior is the behavior of a system that does not depend on its individual parts but on their relationships with one another. Thus emergent behavior cannot be predicted by examination of a system's individual parts.
EncryptionEncryption
Encryption
Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks.
EndpointEndpoint
Endpoint
A communication endpoint is a type of communication network node. One of two components that either implements and exposes an interface to other components or uses the interface of another component.
End Point AuthenticationEnd Point Authentication
End Point Authentication
Endpoint authentication is an authentication mechanism used to verify the identity of a network's external or remote connecting device. These endpoint devices include laptops, smartphones, tablets, and servers.
Energy HarvestingEnergy Harvesting
Energy Harvesting
The process by which energy is derived from external sources and stored for small, wireless autonomous devices (biological, chemical, induction). Applications can be found in wireless sensor networks or wearable tech. Energy sources are, among others, sun, wind, or kinetic energy.
EnOceanEnOcean
EnOcean
An IoT protocol focused on Wireless Standard for Connected Devices. The core technology is the self-powered RF technology developed by EnOcean for maintenance-free sensors, which can be installed wherever desired.
Ephemeral IdentifierEphemeral Identifier
Ephemeral Identifier
A security feature of Google's Eddystone beacon protocol, Ephemeral Identifier 's are beacon IDs that change frequently. Google has stated that these frames will be secure and usable for personal beacons, such as luggage or key chains, allowing only authorized clients to decode them.
Equipment-as-a-ServiceEquipment-as-a-Service
Equipment-as-a-Service
Equipment-as-a-service (EaaS) is rapidly moving from a specialized notion pioneered by the providers of medical and other specialized devices to general adoption. The ease of connecting all sorts of equipment and devices in the internet of things (IoT).
Ethereum Virtual MachineEthereum Virtual Machine
Ethereum Virtual Machine
The Ethereum Virtual Machine (EVM) is a Turing complete virtual machine that allows anyone to deploy smart contracts on the Ethereum Blockchain without affecting the Ethereum Blockchain operations as EVM is designed to work in a sandbox environment.
Event Driven ArchitectureEvent Driven Architecture
Event Driven Architecture
The event-driven architecture (EDA) is a software architecture pattern promoting the production, detection, consumption of, and reaction to events. Events can be as varied as a driver picking up a package, a machine measurement hitting a threshold, or a specific customer arriving at a retail outlet.
Event Stream ProcessingEvent Stream Processing
Event Stream Processing
Event Stream Processing (ESP) is a set of technologies designed to assist the construction of event-driven information systems. ESP technologies include event visualization, event databases, event-driven middleware, and event processing languages, or complex event processing (CEP).
Exabyte (10^18 byte)Exabyte (10^18 byte)
Exabyte (10^18 byte)
The exabyte is a multiple of the unit byte for digital information. The prefix exa indicates multiplication by the sixth power of 1000 (1018) in the International System of Units (SI).
Extended RealityExtended Reality
Extended Reality
A term refers to all real-and-virtual combined environments and human-machine interactions generated by computer technology and wearables. The levels of virtuality range from partially sensory inputs to immersive virtuality also called VR.
Extended TrackingExtended Tracking
Extended Tracking
The concept that a target pose information will be available even when the Target is no longer in the field of view of the camera or cannot directly be tracked for other reasons.
Extensible Messaging and Presence ProtocolExtensible Messaging and Presence Protocol
Extensible Messaging and Presence Protocol
Extensible Messaging and Presence Protocol (XMPP) is a communications protocol for message-oriented middleware based on XML (Extensible Markup Language).
External Machine Interface ProtocolExternal Machine Interface Protocol
External Machine Interface Protocol
External Machine Interface Protocol (EMI) is an extension to the UCP (Universal Computer Protocol). It is used to connect to Short Message Service Centers, which store, transform, and send short messages.
Federated Object Naming ServiceFederated Object Naming Service
Federated Object Naming Service
Federated Naming Service (F-ONS) provides a method for hooking up or federating, multiple naming services under a single, simple uniform interface for the essential naming and directory operations.
Field of ViewField of View
Field of View
Field of View (FoV) represents the visual area in which users can see virtual content in an augmented reality headset. This term can also be explained as a measurement of the angle formed by the distance from the user to a fixed point in space and the bounds of vision.
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet.
FirmwareFirmware
Firmware
Firmware is a software program or set of instructions programmed on a hardware device. The firmware provides the necessary instructions for how the device communicates with the other computer hardware.
Firmware Over-the-AirFirmware Over-the-Air
Firmware Over-the-Air
Firmware Over-the-Air (FOTA) is a process of updating a mobile phone’s operating system and software over the network, rather than having the consumer come into a service center for updates.
Firmware Update Management ObjectFirmware Update Management Object
Firmware Update Management Object
An open mobile alliance specification for updating the firmware of mobile devices over the air. FUMO allows mobile operators to update mobile devices across network infrastructure without requiring consumers or network engineers to initiate upgrades through direct contact
Fog ComputingFog Computing
Fog Computing
Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network. In a fog computing environment, much of the processing takes place in a data hub on a smart mobile device or the edge of the network in a smart router or other gateway devices.
Frequency BandFrequency Band
Frequency Band
In telecommunication, a frequency band is a specific range of frequencies in the radio frequency (RF) spectrum, which is divided among ranges from very low frequencies (vlf) to extremely high frequencies (ehf). Each band has a defined upper and lower frequency limit.
5G5G
5G
The fifth generation of mobile networks or 5th generation wireless systems denotes the next major phase of mobile telecommunications standards beyond the current 4G/IMT-Advanced standards, which has speeds beyond what the current 4G can offer.
General Packet Radio ServiceGeneral Packet Radio Service
General Packet Radio Service
General Packet Radio Service (GPRS), which supports a wide range of bandwidths, is an efficient use of limited bandwidth and is particularly suited for sending and receiving small bursts of data, such as e-mail and Web browsing, as well as large volumes of data.
Genesis BlockGenesis Block
Genesis Block
Genesis Block is the initial block on a particular Blockchain. A Blockchain is a chain of data blocks. The genesis block is almost always hardcoded into the software of the applications that utilize its blockchain.
GeofenceGeofence
Geofence
A virtual border applied to a physical space e.g., geofencing, might be defined around a nursery, and when a mobile device crosses the nursery boundary, an alert is generated.
Geospatial MetadataGeospatial Metadata
Geospatial Metadata
A metadata record is a file of information, usually presented as an XML document, which captures the basic characteristics of a data or information resource.
test test