IoT Definitions

This glossary explains the meaning of key words and phrases that information technology (IT) and business professionals use when discussing IoT and related software products. You can find additional definitions by visiting WhatIs.com or using the search box below.

  • M

    meet-in-the-middle attack

    Meet-in-the-middle is a type of attack that can exponentially reduce the number of brute force permutations required to decrypt text that has been encrypted by more than one key. Such an attack makes it much easier for an intruder to gain access to data.

  • Memory Spot

    Memory Spot is the trade name for a passive transponder under development by Hewlett-Packard that contains a chip capable of storing large data files such as digital photographs, databases or musical selections... (Continued)

  • MEMS (micro-electromechanical systems)

    A MEMS (microelectromechanical system) is a miniature machine that has both mechanical and electronic components.

  • mesh network topology (mesh network)

    A mesh network is a local area network (LAN) that employs one of two connection arrangements, full mesh topology or partial mesh topology.

  • microcomputer

    A microcomputer is a complete computer on a smaller scale and is generally a synonym for the more common term, personal computer or PC, a computer designed for an individual.

  • microcontroller

    A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system.

  • microserver

    A microserver, also known as a server appliance, is a compact, less expensive, modular hardware platform designed to make installation and maintenance simpler than traditional enterprise-class rack servers.

  • MQTT (MQ Telemetry Transport)

    MQTT (MQ Telemetry Transport) is a lightweight messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information.

  • N

    Nest Labs

    Nest Labs is a home automation specialist company that produces programmable Wi-Fi-enabled products that can be remotely controlled through a Web service or an associated smart home app.

  • P

    passive sensor

    Passive sensor technologies gather target data through the detection of vibrations, light, radiation, heat or other phenomena occurring in the subject’s environment.  They contrast with active sensors, which include transmitters that send out a signal, a light wavelength or electrons to be bounced off the target, with data gathered by the sensor upon their reflection.

  • pervasive computing (ubiquitous computing)

    Pervasive computing (ubiquitous computing) is the growing trend of embedding computational capability into everyday objects to enable them to communicate and perform useful tasks.

  • R

    reference architecture

    A reference architecture is a document or set of documents to which a project manager or other interested party can refer to for best practices. By using a reference architecture, a project team can potentially save time and avoid mistakes by learning from past experiences.

  • remote sensing

    Remote sensing is the use of various technologies to make observations and measurements from a target that is usually at a distance or on a scale beyond those observable to the naked eye. Remote sensing technologies include: LiDAR, radar, infrared radiation (IR), thermal, seismic, sonar, electric field sensing and GPS.

  • RF-powered computing

    RF-powered computing is the use of radio frequency (RF) signals to enable the operation and communication of low-power devices, typically for machine-to-machine (M2M) networking.

  • RFID (radio frequency identification)

    RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close