Internet of Things (IoT) Definitions
This glossary explains the meaning of key words and phrases that information technology (IT) and business professionals use when discussing IoT and related software products. You can find additional definitions by visiting WhatIs.com or using the search box below.
-
A
active RFID (active radio frequency identification)
Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
-
active sensor
An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection. Active sensors contrast with passive sensors, which simply detect and respond to some type of input from the physical environment.
-
artificial intelligence of things (AIoT)
Artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.
-
iBeacon
iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
-
B
Bluetooth Low Energy (Bluetooth LE)
Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.0 specification as an alternative to Bluetooth Classic. Like its predecessor, Bluetooth LE uses frequency hopping wireless technology in the 2.4 GHz unlicensed radio band to interconnect nearby devices.
-
decentralized application (DApp)
A decentralized application (DApp) is a type of distributed, open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.
-
C
Cellular Vehicle to Everything (C-V2X)
Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
-
D
device mesh
A device mesh is an ad hoc network in the internet of things (IoT). The term, which was coined by research firm Gartner, describes an ever-changing mesh network consisting of the endpoint devices that people use to access applications, information and other people.
-
drone (UAV)
A drone is an unmanned aircraft.
-
drone photography
Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
-
drone services (UAV services)
Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
-
E
embedded firmware
Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
-
embedded operating system
An embedded operating system is a specialized operating system (OS) designed to perform a specific task for a device that is not a computer.
-
embedded software
Hardware makers use embedded software to control the functions of various hardware devices and systems. Embedded software controls device functions in the same way that a computer’s operating system controls the function of software applications.
-
embedded system
An embedded system is a combination of computer hardware and software designed for a specific function.
-
embedded system security
Embedded system security is a strategic approach to protecting software running on embedded systems from attack. An embedded system is a programmable hardware component with a minimal operating system and software.
-
embedded systems programming
Embedded systems programming, also known as embedded programming, facilitates the development of consumer-facing devices that don't use conventional operating systems the way that desktop computers and mobile devices do.
-
F
What is fog computing?
Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.
-
G
gateway
A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.
-
Google Glass
Google Glass is a wearable, voice- and motion-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user's field of vision.
-
H
headless system
A headless system is a computer that operates without a monitor, graphical user interface (GUI) or the typical peripherals used to control it, such as a keyboard and mouse. Headless computers are often used in embedded systems and servers.
-
I
industrial internet of things (IIoT)
The industrial internet of things (IIoT) is the use of smart sensors, actuators and other devices, such as RFID tags, to enhance manufacturing and industrial processes.
-
injectable ID chip (biochip transponder)
An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
-
Internet of Everything (IoE)
The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
-
internet of medical things (IoMT) or healthcare IoT
The internet of medical things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks.
-
internet of things (IoT)
The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud.
-
internet of things device management (IoT device management)
Internet of things device management (IoT device management) involves remotely registering, configuring, provisioning, maintaining and monitoring connected devices from a centralized platform that IT administrators can access with an internet connection from anywhere on any device.
-
internet of things privacy (IoT privacy)
Internet of things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment.
-
intranet of things
An intranet of things is a closed network that includes smart sensors and actuators.
-
IoT devices (internet of things devices)
Internet of things (IoT) devices are nonstandard computing hardware -- such as sensors, actuators or appliances -- that connect wirelessly to a network and can transmit data.
-
IoT gateway
An internet of things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
-
IoT security (internet of things security)
IoT security (internet of things security) is the technology segment focused on safeguarding connected devices and networks in IoT.
-
IPv6 address
An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
-
L
LPWAN (low-power wide area network)
Low-power WAN (LPWAN) is a wireless wide area network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges.
-
M
machine authentication
Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Unlike user authentication, the process does not involve any action on the part of a human.
-
machine-to-machine (M2M)
Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
-
man-in-the-middle attack (MitM)
A man-in-the-middle (MitM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
-
meet-in-the-middle attack
Meet-in-the-middle is a known plaintext attack that can greatly reduce the number of brute-force permutations required to decrypt text that has been encrypted by more than one key.
-
MEMS (micro-electromechanical systems)
A MEMS (micro-electromechanical system) is a miniature machine that has both mechanical and electronic components.
-
mesh network topology (mesh network)
A mesh network is a network in which devices -- or nodes -- are linked together, branching off other devices or nodes.
-
micro-location
Micro-location is the process of pinpointing a person's placement to within a few inches or feet using various technologies.
-
microcomputer
A microcomputer is a complete computer on a smaller scale and is generally a synonym for the more common term, personal computer or PC, a computer designed for an individual.
-
microcontroller (MCU)
A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system.
-
mobile robot (mobile robotics)
A mobile robot is a machine controlled by software that use sensors and other technology to identify its surroundings and move around its environment.
-
MQTT (MQ Telemetry Transport)
MQTT (MQ Telemetry Transport) is a lightweight open messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information in low-bandwidth environments.
-
N
Nest Labs
Nest Labs was a home automation specialist company that produced programmable Wi-Fi-enabled products that can be remotely controlled through a Web service or an associated smart home app.
-
P
passive sensor
Passive sensor technologies gather target data through the detection of vibrations, light, radiation, heat or other phenomena occurring in the subject’s environment. They contrast with active sensors, which include transmitters that send out a signal, a light wavelength or electrons to be bounced off the target, with data gathered by the sensor upon their reflection.
-
pervasive computing (ubiquitous computing)
Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
-
R
remote sensing
Remote sensing is the use of various technologies to make observations and measurements at a target that is usually at a distance or scale beyond those observable to the naked eye.
-
RFID (radio frequency identification)
RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
-
RFID tagging
RFID tagging uses small radio frequency identification devices to track and identify objects.
-
S
sensor data
Sensor data is the output of a device that detects and responds to some type of input from the physical environment.
-
smart bulb (smart light bulb)
A smart bulb is a networked LED light bulb that has additional features to enable automation, presence-sensing capabilities and customization.
-
smart city
A smart city is a municipality that uses information and communication technologies (ICT) to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.
-
smart farming
Smart farming is a management concept focused on providing the agricultural industry with the infrastructure to leverage advanced technology – including big data, the cloud and the internet of things (IoT) – for tracking, monitoring, automating and analyzing operations.
-
smart home
A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
-
smart home app (home automation app)
A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, typically from a smartphone or tablet.
-
smart home hub (home automation hub)
A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.
-
smart manufacturing (SM)
Smart manufacturing (SM) is a technology-driven approach that utilizes Internet-connected machinery to monitor the production process. The goal of SM is to identify opportunities for automating operations and use data analytics to improve manufacturing performance.
-
smart sensor
A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then processes data before passing it on.
-
smart streetlight
A smart streetlight is a public lighting fixture that incorporates technology, such as cameras, light-sensing photocells and other sensors, to introduce real-time monitoring functionalities.
-
smart warehouse
A smart warehouse is a large building in which raw materials and manufactured goods are stored that uses machines and computers to complete common warehouse operations previously performed by humans.
-
smartwatch
A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.
-
system-on-a-chip (SoC)
System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
-
T
thing (in the internet of things)
A thing, in the context of the internet of things (IoT), refers to any entity or physical object such as a device that forms a network and has the ability to transfer data with other devices over the network.
-
time series database (TSDB)
A time series database (TSDB) is a software system optimized to sort and organize information measured by time.
-
transponder
A transponder is a wireless communication, monitoring or control device that picks up and automatically responds to an incoming signal.
-
U
unique identifier (UID)
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.
-
V
VeriChip
VeriChip is an injectable identification chip that can be inserted under the skin of a human being to provide biometric verification.
-
virtual reality sickness (VR motion sickness)
Virtual reality sickness (VR motion sickness) is the physical discomfort that occurs when an end user's brain receives conflicting signals about self-movement in a digital environment.
-
W
wearable computer
A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.
-
Windows Embedded
Windows Embedded is Microsoft’s embedded operating systems product group. Examples of embedded systems include computers in cars, traffic lights, digital televisions, ATMs, airplane controls, point of sale (POS) terminals, digital cameras, GPS navigation systems, elevators, digital media receivers and smart meters, among many other possibilities.
-
Z
Z-Wave
Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.
-
Zigbee
Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.