Definitions

  • D

    drone photography

    Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.

  • E

    embedded device hacking

    Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device. Attackers have hacked embedded systems to spy on the devices, to take control of them or simply to disable (brick) them.

  • embedded firmware

    Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.

  • embedded operating system

    An embedded operating system is a specialized OS for use in the computers built into larger systems. An embedded system is a computer that is part of a different kind of machine. Examples include computers in cars, traffic lights, digital televisions, ATMs, airplane controls, point of sale (POS) terminals, digital cameras, GPS navigation systems, elevators, digital media receivers and smart meters, among many other possibilities. 

  • embedded software

    Hardware makers use embedded software to control the functions of various hardware devices and systems. Embedded software controls device functions in the same way that a computer’s operating system controls the function of software applications.

  • embedded system

    An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is designed for a specific function or for specific functions within a larger system.

  • embedded system security

    While trends like BYOD, the IoT and automation speed ahead, the security of embedded systems often lags. As attacks on embedded systems and firmware become more common, however, it becomes increasingly crucial to protect these ubiquitous devices.

  • embedded systems programming

    Embedded systems programming is the programming of an embedded system in some device using the permitted programming interfaces provided by that system.

  • F

    fog computing (fog networking, fogging)

    Fog computing, also known as fog networking or fogging, brings the benefits of the cloud closer to where data is created: at the network's edge.

  • G

    gateway

    A gateway is a network node that connects two networks using different protocols together. While a bridge is used to join two similar types of networks, a gateway is used to join two dissimilar networks.

  • Google Glass

    Google Glass is a wearable, voice-controlled Android device that resembles a pair of glasses and displays information directly in the user's field of vision.

  • H

    headless system

    A headless system is a computer that operates without a monitor, graphical user interface (GUI) or the typical peripherals used to control it, such as a keyboard and mouse. Headless computers are often used in embedded systems and servers.

  • HiP7 and HiP8

    HiP7 and HiP8 are abbreviations for two versions of HiPerMOS, a complementary-metal-oxide-semiconductor (CMOS) microchip technology invented by Motorola.

  • home automation

    Home automation is the use of one or more computers to control basic home functions and features automatically and sometimes remotely.

  • I

    Identity of Things (IDoT)

    The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close