Glossary Items

I

  1. A set of systems that includes a source system and a collection of consuming systems. Each system in a given identity domain uses the same unique identifier. The operational server enables the integration of information across multiple identity domains.
    A set of systems that includes a source system and a collection of consuming systems. Each system in a given identity domain uses the same unique identifier. The operational server enables the integration of information across multiple identity domains.
  2. Processes and policies involved in managing the lifecycle and value, type, and optional metadata of attributes in identity known in a particular identity domain.
    Identity management (IdM) is the task of controlling information about users on computers. Such information includes information that authenticates the identity of a user, and information that describes information and actions they are authorized to access and/or perform. It also includes the management of descriptive information about the user and how and by whom that information can be accessed and modified. Managed entities typically include users, hardware and network resources and even applications. Digital identity is an entity's online presence, encompassing personal identifying information (PII) and ancillary information. See OECD and NIST guidelines on protecting PII. It can be interpreted as the codification of identity names and attributes of a physical instance in a way that facilitates processing.
  3. The Identity of Things (IDoT) is an area of endeavor that involves assigning unique identifiers (UID) with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
    The metadata associated with the UID collectively defines the identity of an endpoint. Identity of things is an essential component of the Internet of Things (IoT), in which almost anything imaginable can be addressed and networked for exchange of data online. In this context, a thing can be any entity -- including both physical and logical objects -- that has a unique identifier and the ability to transfer data over a network.
  4. A process to determine that presented identity information associated with a particular entity is applicable for the entity to be recognized in a particular identity domain at some point in time.
    An Identity verification service is used by businesses to ensure that users or customers provide information that is associated with the identity of a real person. The service may verify the authenticity of physical identity documents such as a drivers license or passport, called documentary verification, or may verify identity information against authoritative sources such as a credit bureau or government data, called non-documentary verification. Identity verification service is used both online and in person to verify identity. These services are used by some social networking sites, Internet forums, dating sites and wikis to stop sockpuppetry, underage signups, spamming and illegal activities like harassment, scams, and money laundering. These services are required to establish bank accounts and other financial accounts in many jurisdictions. In financial industries, verifying identity is often required by regulation known as Know Your Customer or Customer Identification Program (CIP). In the US, one of the many bodies regulating these procedures is the Financial Crimes Enforcement Network (FinCEN). A non-documentary identity verification requires the user or customer to provide personal identity data which is sent to the identity verification service. The service checks public and private databases for a match on the information provided. Optionally, knowledge-based authentication questions can be presented to the person providing the information to ensure that he or she is the owner of the identity. An identity "score" is calculated, and the identity of the user or customer is either given the "verified" status, or not, based on the score.
  5. IEEE 802.11ac is a wireless networking standard in the 802.11 family (which is marketed under the brand name Wi-Fi), developed in the IEEE Standards Association process, providing high-throughput wireless local area networks (WLANs) on the 5 GHz band.
    This specification has expected multi-station WLAN throughput of at least 1 gigabit per second and a single link throughput of at least 500 megabits per second (500 Mbit/s). This is accomplished by extending the air interface concepts embraced by 802.11n: wider RF bandwidth (up to 160 MHz), more MIMO spatial streams (up to eight), downlink multi-user MIMO (up to four clients), and high-density modulation (up to 256-QAM).
  6. A wireless standard that utilizes license-exempt, sub-1 GHz bands to provide long range Wi-Fi networks. The protocol is intended to be competitive with Bluetooth with its low power consumption, but with a wider coverage range.
    It utilizes sub 1 GHz license-exempt bands to provide extended range Wi-Fi networks, compared to conventional Wi-Fi networks operating in the 2.4 GHz and 5 GHz bands. It also benefits from lower energy consumption, allowing the creation of large groups of stations or sensors that cooperate to share the signal, supporting the concept of the Internet of Things (IoT). The protocol is intended to be competitive with Bluetooth with its low power consumption, but with a wider coverage range.
  7. A wireless standard that utilizes license-exempt, sub-1 GHz bands to provide long range Wi-Fi networks.
    It utilizes sub 1 GHz license-exempt bands to provide extended range Wi-Fi networks, compared to conventional Wi-Fi networks operating in the 2.4 GHz and 5 GHz bands. It also benefits from lower energy consumption, allowing the creation of large groups of stations or sensors that cooperate to share the signal, supporting the concept of the Internet of Things (IoT). The protocol is intended to be competitive with Bluetooth with its low power consumption, but with a wider coverage range.
  8. IEEE 802.11n-2009, commonly shortened to 802.11n, is a wireless networking standard that uses multiple antennas to increase data rates. The purpose of IEEE 802.11n-2009 is to improve network throughput over the two previous standards 802.11a and 802.11g.
    The purpose of IEEE 802.11n-2009 is to improve network throughput over the two previous standards 802.11a and 802.11g, with a significant increase in the maximum net data rate from 54 Mbit/s to 600 Mbit/s (slightly higher gross bit rate including for example error-correction codes, and slightly lower maximum throughput) with the use of four spatial streams at a channel width of 40 MHz.
  9. Amends wireless access in vehicular environments (WAVE) to the IEEE 802.11 Wi-Fi standard. The amendment defines a way to wirelessly exchange data without the need to establish a basic service set (BSS).
    The amendment defines a way to wirelessly exchange data without the need to establish a basic service set (BSS), since links to roadside infrastructure may be available only for a limited amount of time. 802.11p uses channels of 10 MHz bandwidth in the 5.9 GHz band.
  10. Low-cost, low-power consumption, low complexity, low to medium range communication standard at the link and the physical layers.
    IEEE standard 802.15.4 intends to offer the fundamental lower network layers of a type of wireless personal area network (WPAN) which focuses on low-cost, low-speed ubiquitous communication between devices. It can be contrasted with other approaches, such as Wi-Fi, which offer more bandwidth and require more power. It is the basis for the ZigBee, ISA100.11a, WirelessHART, MiWi, and Thread specifications, each of which further extends the standard by developing the upper layers which are not defined in IEEE 802.15.4. Alternatively, it can be used with 6LoWPAN and standard Internet protocols to build a wireless embedded Internet.
  11. Low-cost, low-power consumption, low complexity, low to medium range communication standard at the link and the physical layers. IEEE standard 802.15.4 intends to offer the fundamental lower network layers of a type of wireless personal area network (WPAN).
    IEEE standard 802.15.4 intends to offer the fundamental lower network layers of a type of wireless personal area network (WPAN) which focuses on low-cost, low-speed ubiquitous communication between devices. It can be contrasted with other approaches, such as Wi-Fi, which offer more bandwidth and require more power. It is the basis for the ZigBee, ISA100.11a, WirelessHART, MiWi, and Thread specifications, each of which further extends the standard by developing the upper layers which are not defined in IEEE 802.15.4. Alternatively, it can be used with 6LoWPAN and standard Internet protocols to build a wireless embedded Internet.
  12. IEEE 802.16 is a series of wireless broadband standards written by the Institute of Electrical and Electronics Engineers (IEEE). It intends to offer the fundamental lower network layers of a type of WPAN which focuses on low-cost, low-speed ubiquitous communication between devices.
    The IEEE Standards Board established a working group in 1999 to develop standards for broadband for wireless metropolitan area networks. The Workgroup is a unit of the IEEE 802 local area network and metropolitan area network standards committee. Although the 802.16 family of standards is officially called WirelessMAN in IEEE, it has been commercialized under the name WiMAX (Worldwide Interoperability for Microwave Access) by the WiMAX Forum industry alliance. The Forum promotes and certifies compatibility and interoperability of products based on the IEEE 802.16 standards.
  13. Image Targets represent images that the AR SDK can detect and track. Unlike traditional fiducial markers, data matrix codes, and QR codes, Image Targets do not need special black and white regions or codes to be recognized.
    Image Targets represent images that the AR SDK can detect and track. Unlike traditional fiducial markers, data matrix codes and QR codes, Image Targets do not need special black and white regions or codes to be recognized. The SDK detects and tracks the features that are naturally found in the image itself by comparing these natural features against a known target resource database. Once the Image Target is detected, the SDK will track the image as long as it is at least partially in the camera field of view.
  14. Individualized, or customized, production refers to the concept of an intelligent, highly automated production system that allows high variance and dynamism in the product range with production costs at the level of mass production.
    The goal is to resolve the conflict between the customes desire for individualization and the process efficiency of production in an industrial setting. A batch size of 1 is the highest level of customized production. Besides proprietary solutions in the automotive sector, Industrie 4.0 with its universally networked production environments represents the world most advanced approach for implementing customized production.
  15. An industrial control system is a general term that encompasses several types of control systems used in industrial production, including SCADA systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC).
    Computer hardware and software that monitor and control industrial processes that exist in the physical world, where operator-driven supervisory commands can be pushed to remote station devices. Industries such as electrical, water, oil, and gas are typical ICS users.
  16. The industrial Internet draws together fields such as machine learning, big data, the Internet of things, and machine-to-machine communication to ingest data from machines, analyze it, and use it to adjust operations.
    The industrial Internet draws together fields such as machine learning, big data, the Internet of things and machine-to-machine communication to ingest data from machines, analyze it (often in real-time), and use it to adjust operations.
  17. Internet of things technologies, processes, and business models applied to industry (B2B). Industrial Internet of Things (IIoT) is a subdiscipline of IoT, encompassing connected large-scale machinery and industrial systems such as factory-floor monitoring, HVAC, smart lighting, and security.
    A subdiscipline of IoT, encompassing connected large-scale machinery and industrial systems such as factory-floor monitoring, HVAC, smart lighting, and security. This is M2M communication where, for example, equipment can send real-time information to an application so operators can better understand how efficiently that equipment is running. Also referred to as Industry 4.0, Industrie 4.0, and Industrial IoT.
  18. The industrial, scientific, and medical radio band refers to a group of radio bands or parts of the radio spectrum that are internationally reserved for the use of radio frequency (RF) energy intended for scientific, medical, and industrial requirements rather than for communications.
    The use of ISM equipment generates electromagnetic interference that interrupts radio communications that make use of the same frequency. Therefore, this equipment was restricted to specific frequency bands. Generally, the communication equipment that operates in these bands should tolerate the interference created by ISM equipment, and therefore users do not have any regulatory protection from the use of ISM equipment. In the US, the ISM bands are 915MHz, 2.4 GHz, and 5.5 GHz, whereas 2.4 GHz is the global unlicensed frequency and has increasing amounts of interference.
  19. Industry 4.0, or the fourth industrial revolution, is the current trend of automation and data exchange in manufacturing technologies. It includes cyber-physical systems, the Internet of things and cloud computing.
    For example, in an Industrie 4.0 factory, self-predictive systems would trigger maintenance processes autonomously and automatically adapt logistics to the resulting changes in production. The term, also known as Industry 4.0, was first used at the Hannover Messe in 2011.
  20. A sensor that uses an inertial measurement unit (IMU) via onboard accelerometers and gyroscopes to better estimate the object or vehicle position. Inertial guidance is used in collaboration with other sensors and software to localize the object or vehicle.
  21. An inertial measurement unit (IMU) is an electronic device that measures and reports a body's specific force, angular rate, and sometimes the magnetic field surrounding the body, using a combination of accelerometers and gyroscopes, sometimes also magnetometers.
    A MEMS module which measures angular velocity and linear acceleration using an accelerometer triad and an angular rate sensor triad. Other IMU sensors may include magnetometers and pressure sensors.
  22. Information and communication technology (ICT) is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on.
    The term ICT is also used to refer to the convergence of audio-visual and telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the telephone network with the computer network system using a single unified system of cabling, signal distribution and management.
  23. One of the main categories of Cloud computing services, Infrastructure as a Service (IaaS) provides virtualized computing resources online. An on-demand business model for IT-capacities
    An on-demand business model for IT-capacities. Instead of owning IT-infrastructure or server space, you rent it and pay for it on a per-use basis. Those capacities are usually owned, maintained, and provided by a cloud service.
  24. When a technology produces self-sustaining innovation and development, it is effectively an innovation dynamo. Electricity led to electronics. Electronics led to modern computing. Modern computing, combined with telecommunications, led to today’s Internet and the IIoT.
    Electricity led to electronics. Electronics led to modern computing. Modern computing combined with telecommunications led to today’s Internet and the IIoT. The post-war development of plastics shows how a new technology not only changes business models, but works with developments in other areas to spur greater innovations.
  25. Integrated Mobility Platforms (IMPs) are a key solution to urban traffic management. By integrating different modes of transport, IMPs drastically simplify route planning and make traveling more efficient, while being able to provide highly customer-tailored solutions.
    11
  26. Any type of equipment, instrument, or machine that has its own computing capability. As computing technology becomes more advanced and less expensive, it can be built into an increasing number of devices of all kinds.
    As computing technology becomes more advanced and less expensive, it can be built into an increasing number of devices of all kinds. In addition to personal and handheld computers, the almost infinite list of possible intelligent devices includes cars, medical instruments, geological equipment, and home appliances.
  27. A management approach that applies technology and new service paradigms to the challenge of improving business performance. Intelligent Enterprise is making its machines smarter to drive new levels of operational efficiency, evolution, and innovation.
    The Intelligent Enterprise is making its machines smarter―embedding software intelligence into every aspect of its business to drive new levels of operational efficiency, evolution, and innovation.
  28. A system with sensors measuring smoke and carbon monoxide, giving both early warnings, howling alarms and speaks with a human voice telling where the smoke is or when carbon monoxide levels are rising.
    In addition to giving a message on the smartphone or tablet if the smoke or CO alarm goes off.
  29. Smart thermostats are home automation devices responsible for controlling a home's heating, and sometimes air conditioning. They allow the user to control the temperature of their home throughout the day using a schedule, such as setting a lower temperature at night.
    Thermostat that learns the users programming schedule after a few days, and from that programs itself. Can be used with an app to connect to the thermostat from a smart telephone, where control, watching the energy history, how much energy is saved and why can be displayed. They allow the user to control the temperature of their home throughout the day using a schedule, such as setting a lower temperature at night.
  30. I2C, pronounced I-squared-C, is a serial bus that provides communication between sensors and microcontrollers such as the Arduino. It is typically used for attaching lower-speed peripheral ICs to processors and microcontrollers.
    Inter-Integrated Circuit, pronounced I-squared-C, is a multi-master, multi-slave, single-ended, serial computer bus invented by Philips Semiconductor (now NXP Semiconductors). It is typically used for attaching lower-speed peripheral ICs to processors and microcontrollers. Alternatively I?C is spelled I2C (pronounced I-two-C) or IIC.
  31. Interactive video is a type of digital video that supports user interaction. These videos play like regular video files but include clickable areas, or hotspots, that perform an action when you click on them.
    Interactive video (also known as IV ) is a type of digital video that supports user interaction. These videos play like regular video files, but include clickable areas, or hotspots, that perform an action when you click on them.
  32. Internet of Everything (IoE) subtly distinguishes itself by emphasizing the connection of people to things. It is a philosophy in which technology's future is comprised of many different types of appliances, devices, and items connected to the global Internet.
    A term being promoted by Cisco as a variation or extension of IoT. IoE subtly distinguishes itself by emphasizing the connection of people to things. It is a philosophy in which technology's future is comprised of many different types of appliances, devices and items connected to the global Internet.
  33. A network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.
    Internet-connected physical devices, in many cases everyday objects (things), that can communicate their status, respond to events, or even act autonomously. This enables communication among those things, closing the gap between the real and the virtual world and creating smarter processes and structures that can support us without needing our attention. IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS), and the Internet.
  34. The special considerations required to protect the information of individuals from exposure in the IoT environment, where almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.
    Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network. As endpoints (things) in the IoT environment transmit data autonomously, they also work in conjunction with other endpoints and communicate with them. Interoperability of things is essential to the IoT's functioning so that, for example, networked elements of a home work together smoothly.
  35. Internet of Vehicles (IoV) technology refers to dynamic mobile communication systems that communicate between vehicles and public networks using V2V (vehicle-to-vehicle), V2R (vehicle-to-road), V2H (vehicle-to-human) and V2S (vehicle-to-sensor) interactions.
    IoV enables information sharing and the gathering of information on vehicles, roads and their surrounds. Moreover, it features the processing, computing, sharing and secure release of information onto information platforms. Based on this data, the system can effectively guide and supervise vehicles, and provide abundant multimedia and mobile Internet application services.
  36. Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). IPv4 is a connectionless protocol for use on packet-switched networks. It operates on a best effort delivery model,
    It is one of the core protocols of standards-based internetworking methods in the Internet, and was the first version deployed for production in the ARPANET in 1983. IPv4 is a connectionless protocol for use on packet-switched networks. It operates on a best effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol (TCP).
  37. Internet Protocol Version 6 (IPv6) is also called IPng (Internet Protocol next generation), and it is the newest version of the Internet Protocol (IP) reviewed in the IETF standards committees to replace the current version of IPv4 (Internet Protocol Version 4).
    IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4.
  38. Interoperability is the ability of a system or a product to work with other systems or products without special effort on the part of the customer. It becomes a quality of increasing importance for information technology products as the concept that "The network is the computer" becomes a reality.
    Interoperability becomes a quality of increasing importance for information technology products as the concept that "The network is the computer" becomes a reality. For this reason, the term is widely used in product marketing descriptions. A good example of the first approach is the set of standards that have been developed for the World Wide Web. These standards include TCP/IP, Hypertext Transfer Protocol, and HTML. The second kind of interoperability approach is exemplified by the Common Object Request Broker Architecture (CORBA) and its Object Request Broker (ORB). Compatibility is a related term. A product is compatible with a standard but interoperable with other products that meet the same standard (or achieve interoperability through a broker).
  39. An IoT botnet is a group of hacked computers, smart appliances, and Internet-connected devices that have been co-opted for illicit purposes. An IoT botnet is larger in scale, with hundreds of thousands of compromised devices.
    A conventional botnet is made up of computers that have been remotely accessed without the owners’ knowledge and set up to forward transmissions to other computers on the Internet. The Internet of Things (IoT) is made up of not only dedicated computers but also cardiac implant monitors, household and industrial appliances, automobiles, mechanical sensors and other devices equipped with IP addresses and the ability to transmit data over a network. In the IoT context, these are known as things.
  40. IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things. IoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals, and/or people.
  41. A 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme. IPv6 addresses are classified by the primary addressing and routing methodologies common in networking: unicast addressing, anycast addressing, and multicast addressing.
    IPv6 addresses are classified by the primary addressing and routing methodologies common in networking: unicast addressing, anycast addressing, and multicast addressing. An IP address serves the purpose of uniquely identifying an individual network interface of a host, locating it on the network, and thus permitting the routing of IP packets between hosts. For routing, IP addresses are present in fields of the packet header where they indicate source and destination of the packet.
  42. IPv6 over Low -Power Wireless Personal Area Networks (6LoWPAN) is the name of a concluded working group in the Internet area of the IETF (Internet Engineering Task Force).
    The 6LoWPAN concept originated from the idea that the Internet Protocol could and should be applied even to the smallest devices, and that low-power devices with limited processing capabilities should be able to participate in the Internet of Things.
  43. IT-OT Convergence is a process of integrating information technology (IT) systems. It is used for data-centric computing with operational technology (OT) systems to monitor events, processes, and devices and make adjustments in enterprise and industrial operations.
test test