A

Active sensor – A device used to sense, detect and respond to input including heat, pressure or light.

Actuator – A mechanical device used to create movement in an electromechanical system by turning electrical energy into mechanical energy.

Access control – A security system that determines who and what is allowed into a secure facility or who is allowed access to computer facilities or networks.

Addressability – The ability of an entity to be uniquely identified.

Application software – A computer program built to provide a service to the user, for example Microsoft Word, which is used to write and edit text.

B

Band – The range of frequencies used to transmit information via technology to cell phones.

Big data – The collection and analysis of very large quantities of data to determine trends.

Bluetooth – Wireless technology used to transport data or audio over a short band range of 2.4 Mhz, for example, the connection of a computer to a cordless keyboard.

Body Area Network (BAN) – A network of wearable technology that can be implanted or carried on an individual’s body to collect data of the person wearing the device.

C

Cloud computing – The use of a remote server that is separate to your computer to house your data.

Communication model – A model used to collect and analyse built rules around the information surrounding communication.

Connected devices – The connection of various devices via an internet network in order for them to interact with each other.

D

Device – a hardware product used to interact and communicate with other technological products.

Device attack – The exploitation of a vulnerable device in order to take advantage of the information it and its network holds.

Downlink – The process of gathering data from a satellite to a ground receiver or device such as a mobile phone.

E

Encryption – The purposeful scrambling of online data to keep it secure, allowing only the receiver to read it.

Energy-harvesting technologies – Technology which draws small amounts of energy from external sources such as the sun or wind to operate small wireless devices.

Embedded Firmware – The flash memory chip placed within a device that holds software specific to controlling the device’s functions.

Embedded Software – The technology specifically built into the firmware that is placed within a device to control its functions.

F

Fast data – The analysis of small sets of data on a large scale in order to gather insights quickly and take action on the results.

Fleet management – The broad management of a range of vehicles using select applications that collect data and location-related information.

G

Gateway – A router or computer used to connect to different internet networks and devices for the convergence of various online tasks.

Global Positioning System (GPS) – A network of satellites and radio transmissions used to pinpoint the exact location of things on earth.

General Packet Radio Service (GPRS) – A wireless communication service used on and for 2G and 3G mobile communication systems.

H

Human to Machine Communication (H2M) – The contact and exchange in communication between a human and a device.

Haptics – The use of technology to produce tactile sensations within a device, for example, the vibration of a mobile phone.

Host – The hardware within a device that provides users access to resources within an internet network.

I

Identity of Things (IDoT) – The application of particular letters, words, symbols or numbers to devices and objects in order for them to correctly communicate and connect to other devices.

Internet Protocol (IP) – A protocol for communication used to allow computers to send and receive data across networks.

Internet of Things (IoT) – A connected system of computer devices, animals or people able to communicate information with one another without direct contact with one another.

J

JavaScript Object Notation (JSON) – A text-based and easy-to-read form of computer programming language.

L

Local Area Network (LAN) – A collection of computers, printers, scanners or phones connected by wired or wireless internet.

Long Term Evolution (LTE) – The most recent cellular network in use, offering high speed wireless internet connection.

M

Machine to Machine (M2M) – The ability for devices to transfer information between each other via a network connection, with the interference of humans.

Machine authentication – The verification of communication between human-to-machine or machine -to-machine via the input of a digital certificate or information without the help of a human.

Machine generated data – Information provided by the ongoing functioning of internet enabled devices.

N

Near Field Communication (NFC) – Wireless transfer of information between devices that are within a short distance of each other.

O

Operational technology – Hardware that automates and takes control over the use of devices.

P

Personal Area Network (PAN) – A number of connected devices in use by one person within a restricted network area.

Pervasive computing – The use of internal computers within a device in order to limit human input, such as a mobile phone ringing to make the user aware of an incoming phone call.

R

Remote sensing – The use of various wireless technologies to monitor and collect data from devices that are remotely located.

Radio Frequency Identification (RFID) – The process of identifying objects through radio waves over short distances.

S

Smart home – A house or living area that uses a variety of internet enabled devices to automate processes within the home, such as temperature control or security.

Software as a service (Saas) – The use of software, such as an email service, that is paid for on a monthly basis instead of upfront to eliminate large upfront costs.

T

Telemetry – An automated process of data collected from remote locations and transferred to a receiving device for analysis.

U

User – A human who is actively interacting with devices.

Universal authentication – The verification process used by a network to allow the rightful user to enter different sites without having to manually identify themselves every time.

V

Vehicle to vehicle communication – Wireless transference of data between various types of vehicles.

W

Wearable computing – The use of small computer related devices with embedded sensors on one’s body in order to track certain functions such as fitness.