Glossary Items

C

  1. Capacity utilization is the extent to which an enterprise or a nation actually uses its installed productive capacity. It is the relationship between output that is actually produced with the installed equipment and the potential output which could be produced with it if capacity was fully used.
    Capacity utilization or capacity utilization is the extent to which an enterprise or a nation actually uses its installed productive capacity. It is the relationship between output that is actually produced with the installed equipment, and the potential output which could be produced with it, if capacity was fully used. One of the most used definitions of the "capacity utilization rate" is the ratio of actual output to the potential output. But potential output can be defined in at least two different ways.
  2. Carbon nanotubes are tubes made of carbon with diameters typically measured in nanometers. Carbon nanotubes often refer to single-wall carbon nanotubes (SWCNTs) with diameters in the range of a nanometer.
    Nanotubes have been constructed with length-to-diameter ratio of up to 132,000,000:1, significantly larger than for any other material. These cylindrical carbon molecules have unusual properties, which are valuable for nanotechnology, electronics, optics and other fields of materials science and technology. In particular, owing to their extraordinary thermal conductivity and mechanical and electrical properties, carbon nanotubes find applications as additives to various structural materials. For instance, nanotubes form a tiny portion of the materials in some (primarily carbon fiber) baseball bats, golf clubs, car parts or damascus steel.
  3. When dissimilar equipment and workstations to produce a family of similar components or subassemblies are arranged close together to save space and time, and simplify process routing and supervision. Workers are typically cross-trained to perform multiple tasks within a manufacturing cell.
    Cellular manufacturing involves the use of multiple cells in ;assembly line fashion. Each of these cells is composed of one or multiple different machines which accomplish a certain task. The product moves from one cell to the next, each station completing part of the manufacturing process. Often the cells are arranged in a U-shape design because this allows for the overseer to move less and have the ability to more readily watch over the entire process. One of the biggest advantages of cellular manufacturing is the amount of flexibility that it has. Since most of the machines are automatic, simple changes can be made very rapidly. This allows for a variety of scaling for a product, minor changes to the overall design, and in extreme cases, entirely changing the overall design. These changes, although tedious, can be accomplished extremely quickly and precisely.
  4. Cellular Modem allows a device to receive internet access over the mobile-cellular networks. Devices can also be configured to remotely connect to a server or device to enable off-site access and data collection.
    Devices can also be configured to remotely connect to a server or device to enable off site access and data collection.
  5. A cellular router is a transportable device that enables users to connect to the internet by means of a cellular gateway. Routers allow for multiple devices to be connected and controlled, and offer extra device and data transfer security to keep your information safe.
    Routers allow for multiple devices to be connected and controlled, while built in Open VPN, IPSEC, PPTP, and L2TP, and offer extra device and data transfer security to keep your information safe.
  6. There is a peripheral (slave) device or a central (master) device when connecting devices over BLE. The central device will typically have more computing resources and available energy - a computer or a tablet, for example.
    When connecting devices over BLE, there is a peripheral (slave) device or a central (master) device. The Bluetooth standard established this division to match the resources available on the devices. The central device will typically have more computing resources and available energy - a computer or a tablet, for example.
  7. A chatbot is an artificial intelligence (AI) powered software that can stimulate or conduct a conversation in natural language through dialogue or text.
  8. A spread spectrum technique uses wideband linear frequency modulated chirp pulses to encode information. A chirp is a sinusoidal signal whose frequency increases or decreases over time (often with a polynomial expression for the relationship between time and frequency).
    In digital communications, chirp spread spectrum (CSS) is a spread spectrum technique that uses wideband linear frequency modulated chirp pulses to encode information. A chirp is a sinusoidal signal whose frequency increases or decreases over time (often with a polynomial expression for the relationship between time and frequency).
  9. Chroma Key Video is defined as a video shot on a unique, brightly colored background (often called a green screen). It is the technique of layering two images or videos together based on color hues or the color intensity range.
    Popular for AR experiences, Chroma Key Video allows for the projection of video content into live environments. It is defined as video shot on a unique, brightly colored background (often called a green screen). Best practices in video production recommend using green or blue colored backgrounds for the best results. This technique allows the video editor to remove the brightly coloured areas in the footage and replace those regions with transparent pixels. This technique is often used in weather broadcasts on local television news.
  10. Class 1 Bluetooth offers a greater wireless data transfer distance (over 100m, up to 1km) through using greater power consumption (100mW). Primarily for industrial use cases, as it has a very long range.
    Primarily for industrial use cases, as it has a very long range. Connecting two Class 1 devices with both high sensitivity and high power can allow ranges far in excess of the typical 100m, depending on the throughput required by the application. Some such devices allow open field ranges of up to 1 km and beyond between two similar devices without exceeding legal emission limits.
  11. Class 2 Bluetooth enables short-range wireless data transmission (10-20m), which has a low power consumption of around 2.5mW. Most commonly found in mobile devices.
    Most commonly found in mobile devices. Most Bluetooth applications are battery powered Class 2 devices, with little difference in range whether the other end of the link is a Class 1 or Class 2 device as the lower powered device tends to set the range limit.
  12. Cloud communications are Internet-based voice and data communications where telecommunications applications, switching, and storage are hosted by a third-party outside of the organization using them, and they are accessed over the public Internet.
    Cloud communications providers deliver voice & data communications applications and services, hosting them on servers that the providers own and maintain, giving their customers access to the “cloud.” Because they only pay for services or applications they use, customers have a more cost-effective, reliable and secure communications environment, without the headaches associated with more conventional PBX system deployment. Companies can cut costs with cloud communications services without sacrificing features. The success of Google and others as cloud-based providers has demonstrated that a cloud-based platform can be just as effective as a software-based platform, but at a much lower cost. In the past, businesses have been able to do this for IT services, but not telecom. Cloud communications is attractive because the cloud can now become a platform for voice, data and video.
  13. Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.
    An approach where information technology capacities (such as storage or applications) are separated from the individual computer and are supplied through the Internet (or an Intranet-based service) at the user’s demand. The “as-a-Service” moniker is sometimes used for cloud computing services, such as Software-as-a-Service, Platform-as-a-Service, and Infrastructure-as-a-Service. The backend for many IoT devices may be delivered via the cloud.
  14. Cloud economics is a branch of knowledge concerned with the principles, costs, and benefits of cloud computing. As CIOs are challenged to deliver IT services with the greatest value for the business, they must determine precisely how cloud services will affect an IT budget and staffing needs.
    Cloud economics is a branch of knowledge concerned with the principles, costs and benefits of cloud computing. Because CIOs are constantly challenged to deliver IT services with the greatest value for the business, they must determine specifically how cloud services will affect an IT budget and staffing needs. In assessing cloud economics, CIOs and IT leaders weigh the costs pertaining to infrastructure, management, research and development (R&D), security and support to determine if moving to the cloud makes sense given their organization's specific circumstances.
  15. Cloud native stands for an approach to building applications and services specifically for a cloud environment by exploring the advantages of the cloud computing delivery model.
  16. Cloud orchestration is the use of programming techniques to manage the interconnections and interactions among workloads on public and private cloud infrastructure.
    Cloud orchestration products can simplify the intercomponent communication and connections to other apps and users and ensure that links are correctly configured and maintained. When evaluating cloud orchestration products, it is recommended that administrators first map the workflows of the applications involved. This step will help the administrator visualize how complicated the internal workflow for the application is and how often information flows outside the set of app components. This, in turn, can help the administrator decide which type of orchestration product will help automate workflow best and meet business requirements in the most cost-effective manner.
  17. Cloud robotic is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centered on the benefits of converged infrastructure and shared services for robotics.
    Nowadays smartphones, tablets and computers utilize data and processing power from the cloud as a matter of course. In the context of Industry 4.0, robots too will be able to access decentralized data in networks or in the cloud, thereby significantly boosting their performance and flexibility. The robot itself will only require a small chip to control functionality, motion and mobility. For the task at hand, specific services will be retrieved from the cloud or individual robots networked on an ad hoc basis to form temporary production teams. Another effect of the cloud: robots learn from one another. If one robot encounters an obstacle, for example, it posts this information to the connected systems, which can use it to respond intelligently to the obstacle.
  18. Code-division multiple access (CDMA) is a channel access method used by various radio communication technologies. A form of multiplexing, which allows numerous signals to occupy a single channel to optimize bandwidth.
    Digital cellular phone service method that separates multiple transmissions over a finite frequency allocation using Spread Spectrum techniques (concept invented and patented by Hedy Lamar).
  19. Cognitive Radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones.
    Cognitive Radio is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones. This optimizes the use of available radio-frequency (RF) spectrum while minimizing interference to other users. There are two main types of cognitive radio, full cognitive radio and spectrum-sensing cognitive radio. Full cognitive radio takes into account all parameters that a wireless node or network can be aware of. Spectrum-sensing cognitive radio is used to detect channels in the radio frequency spectrum.
  20. Communication models are systematic representations of the process, which helps in understanding how communication works can be done. Communication models try to capture, explain, simplify, and then model communication.
    Following the basic concept, communication is the process of sending and receiving messages or transferring information from one part (sender) to another (receiver). This common conception of communication views communication as a means of sending and receiving information. The strengths of this model are simplicity, generality, and quantifiability. One of the oldest and most famous models, the Shannon and Weaver Model, was created in 1949.
  21. In wearables, a companion device requires a parent device, such as a smartphone, to fully operate. The opposite would be a standalone device that can do everything on its own.
    The opposite would be a standalone device that can do everything on its own. A companion wearable will typically use Bluetooth to communicate with the parent.
  22. Complementary Metal-Oxide-Semiconductor (CMOS) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips. CMOS transistors use almost no power when not needed.
    CMOS transistors use almost no power when not needed. As the current direction changes more rapidly, however, the transistors become hot. This characteristic tends to limit the speed at which microprocessors can operate.
  23. The discovery or detection of complex events by combining and correlating data. Event processing that combines data from multiple sources to infer events or patterns that suggest more complicated circumstances.
    Event processing that combines data from multiple sources to infer events or patterns that suggest more complicated circumstances.
  24. Composability is a capability of a component to interact with any other component in recombinant fashion to satisfy requirements based on the expectation of the behaviors of the interacting parties.
    Composability is a system design principle that deals with the inter-relationships of components. A highly composable system provides recombinant components that can be selected and assembled in various combinations to satisfy specific user requirements.
  25. Materials comprised of two or more components with significantly different physical or chemical properties, that when combined, produce a material that behaves differently from the individual components. The individual components remain separate and distinct within the finished structure.
    Examples of engineered composite materials include: carbon fiber-reinforced polymers, metal matric composites, ceramic matrix composites, cement, concrete. Wood is an example of a naturally occurring composite material.
  26. Computer Numerical Control ( CNC) refers to the digital control of a physical machine that consists of a series of integrated actuators, power electronics, sensors, and a dedicated computer running under a real-time operating system.
    Computer numerical control (CNC) can control multiple machines, usually when they are grouped in a manufacturing cell. This is a form of digital automation.
  27. Computer-Aided Design (CAD) is the use of a wide range of computer-based tools that assist engineers and other design professionals in their design activities. It is the main geometry authoring tool within the PLM process and involves both software and sometimes special-purpose hardware.
    It is the main geometry authoring tool within the Product Lifecycle Management process and involves both software and sometimes special-purpose hardware.
  28. Computer-Aided Engineering (CAE) is the use of computer software mainly for simulation analysis, verification, and improvement of design. A typical CAE process encompasses preprocessing, solving, and postprocessing steps.
  29. Computer-Aided Manufacturing (CAM) refers to the use of computer systems to plan, manage, and control the operations of a manufacturing plant through either direct or indirect computer interface with the plant's production resources.
    Computer-aided manufacturing often refers to software that takes the geometric design authored with CAD software as input and outputs manufacturing instructions that are downloaded to automated equipment such as a computer numerically controlled (CNC) machine tool. Is also referred to as computer-assisted manufacturing.
  30. Computer-Aided Translation (CAT) refers to the language translation process that includes software or hardware to support and facilitate the translation by using AI search and comparison technology.
  31. Configuration Management is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life.
    Configuration management is the detailed recording and updating of information that describes an enterprises hardware and software. Such information typically includes the versions and updates that have been applied to installed software packages and the locations and network addresses of hardware devices.
  32. Connected retail means seamlessly connecting with customers via personalized marketing, the combination of a physical store and digital experience, supply chain, and multiple payment methods.
  33. Consensus makes sure all the ledgers have the exact same copy of the particular Blockchain history. This is realized when all network participants agree on the validity of the transactions.
    Consensus makes sure all the ledgers have the exact same copy of the particular Blockchain history. The ones that do not are ruled out of the network and do not get rewarded a mining fee.
  34. Constrained Application Protocol (CoAP) is a specialized Internet Application Protocol for constrained devices, as defined in RFC 7252. It enables those constrained devices called "nodes" to communicate with the wider Internet using similar protocols.
    Based on the popular REST model, CoAP is a specialized web transfer protocol for use with constrained nodes and constrained networks (e.g., low-power, lossy) in the IoT. A specialized web transfer protocol for use with constrained nodes and constrained networks in the Internet of Things.
  35. The Construction Operations Building Information Exchange (COBie) approach simplifies the capture and recording of building project handover data, basically by entering things like serial numbers as the project progresses.
    COBie breaks down the design into Facility, Floor, Space and Zone elements. COBie can be displayed in several interoperable formats.
  36. In computer science, a container stands for an executable unit of software in which application code is packaged, along with its libraries and dependencies, in common ways so that it can be run anywhere, whether it be on a desktop, traditional IT, or the cloud.
  37. Context-Aware Automation and Decision Optimization refer to monitoring unknown factors (environmental, interaction between machines and infrastructures, etc.) and having machines make decisions that are as “human-like” as possible.
    Here’s an example that can help illustrate this: In a traffic collision avoidance system (TCAS), when two airplanes approach each other on a collision path, the ‘machines’ in the two airplanes take over.
  38. Big data analytics solutions, combined with the proliferation of edge devices collecting highly contextual data, are allowing businesses to craft experiences that are unique for each user.
    Contextualized Experience is a tailored, adaptive, and sometimes predictive customer experience that combines and extend existing segmentation and personalization techniques with in-the-moment details. The main purpose of contextualize experiences can be simplified as maximizing relevance to the user.
  39. Contiki is an open source operating system for networked, memory-constrained systems with a particular focus on low-power wireless Internet of Things devices.
    Examples of where Contiki is used include street lighting systems, sound monitoring for smart cities, radiation monitoring systems, and alarm systems.
  40. A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities. In computing, controllers may be cards, microchips, or separate hardware devices for the control of a peripheral device.
    A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities. In computing, controllers may be cards, microchips or separate hardware devices for the control of a peripheral device. In a general sense, a controller can be thought of as something or someone that interfaces between two systems and manages communications between them.
  41. A Controller Area Network (CAN) is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each others' applications without a host computer.
    ECUs can be subsystems such as airbags, transmission, antilock brakes, or most importantly, engine control. The standard consists of ISO 11898-1 and ISO 11898-2.
  42. Corporate Owned, Personally Enabled (COPE) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets, or smartphones.
    A compromise around pure BYOD, COPE devices allow the user to control much of the data on the device, but the enterprise controls the security model. COPE allows an organization to source and deliver computing devices and services to employees and is how most organizations provide handheld or portable devices/gadgets to their employees. These devices can include but are not limited to laptops/notebooks, smartphones, tablets PCs and/or software services.
  43. Cortex-M is a family of microprocessors developed by ARM, which is mainly used in microcontrollers. They range from the cheapest M0 processor up to the Cortex-M4, which is used for effective digital signal control.
    They range from the cheapest M0 processor up to the Cortex-M4, which is used for effective digital signal control. Applications are found in automotive, gaming, and intelligent consumer products.
  44. CPE WAN Management Protocol (CWMP) is a protocol for communication between a CPE and Auto-Configuration Server that encompasses secure auto-configuration as well as other CPE management functions within a common framework.
    TR-069 (Technical Report 069) is a technical specification that defines an application layer protocol for remote management of end-user devices. It was published by the Broadband Forum and entitled CPE WAN Management Protocol (CWMP). As a bidirectional SOAP/HTTP-based protocol, it provides the communication between customer-premises equipment (CPE) and Auto Configuration Servers (ACS). It includes both a safe auto configuration and the control of other CPE management functions within an integrated framework. The protocol addresses the growing number of different Internet access devices such as modems, routers, gateways, as well as end-user devices which connect to the Internet, such as set-top boxes, and VoIP-phones. The TR-069 standard was developed for automatic configuration and management of these devices by Auto Configuration Servers (ACS). The technical specifications are managed and published by the Broadband Forum. TR-069 was first published in May 2004, with amendments in 2006, 2007, 2010, July 2011 to version 1.3.
  45. A battery rated at 3.0 volts is commonly used in watches, wireless doorbells, and other small devices. Sometimes referred to as a “button cell” or “lithium coin,” the battery is shaped like a coin with dimensions of 20mm diameter x 3.2mm height (from which the “2032” is derived).
    Sometimes referred to as a “button cell” or “lithium coin,” the battery is shaped like a coin with dimensions of 20mm diameter x 3.2mm height (from which the “2032” is derived). The CR2032 is twice as thick as the CR2016.
  46. Concern that affects the whole system and thus may impact multiple layers of the architecture. In aspect-oriented software development, cross-cutting concerns are aspects of a program that affect other concerns.
    In aspect-oriented software development, cross-cutting concerns are aspects of a program that affect other concerns. These concerns often cannot be cleanly decomposed from the rest of the system in both the design and implementation, and can result in either scattering (code duplication), tangling (significant dependencies between systems), or both. For instance, if writing an application for handling medical records, the indexing of such records is a core concern, while logging a history of changes to the record database or user database, or an authentication system, would be cross-cutting concerns since they interact with more parts of the program.
  47. Cryptocurrency is an alternative, digital, and virtual currency that uses cryptography to process and control transactions, as well as to create new units.
    Contrary to currencies controlled by central banks, cryptocurrencies are managed in a decentralized and transparent fashion by its underlying network nodes. This is accomplished via the Blockchain, which is a distributed database, acting as a distributed ledger.Bitcoin is the most prominent example for a general cryptocurrency, whereas in the IIoT domain IOTA / MIOTA has been developed specifically with running transactions in the internet of things in mind.
  48. The practice and study of techniques for secure communication in the presence of third parties called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions.
    Cryptographic techniques that enable protected data to be stored pro- cessed and shared, without the information content being accessible to other parties. Technologies such as homomorphic and searchable encryption are potential candidates for developing such approaches.
  49. A cyber-physical system (CPS) is a system of collaborating computational elements controlling physical entities. The systems often include some form of sensor which can transfer attributes from the real world to the digital sphere.
    A smartphone, for example, combines software, hardware, etc., with a physical device. In general, many mobile or embedded technologies or devices can be called Cyber-Physical Systems, thus applications are manifold. The systems often include some form of sensor which can transfer attributes from the real world to the digital sphere.
  50. In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and thus cause potential harm. A threat can be either "intentional" (e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning.
    In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm. A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of a natural disaster such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.
test test