Use Cases.

515 terms
Datagram Transport Layer Security
In information technology, the Datagram Transport Layer Security (DTLS) communications protocol provides communications security for datagram protocols. DTLS allows datagram-based applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
Data Integrity
Data integrity, in terms of data and network security, is the assurance that information can only be accessed or modified by those authorized to do so.
Data Janitor
Data Janitor is a subtask of data science concerned with the cleaning up of dirty or duplicative data.A data janitor sifts through data for companies in the information technology industry.
Datakinesis
A term coined by Marc Blackmer, datakinesis occurs when an action taken in cyberspace has a result in the physical world. Industrial Control Systems, for example, are vulnerable to datakinetic attacks where physical equipment such as valves and sensors are compromised and damaged by hackers.
Data Lake
Coined by Pentaho CTO James Dixon, a data lake is a massive data repository, designed to hold raw data until it’s needed and to retain data attributes so as not to preclude any future uses or analysis.
Data Mining
Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both.
Data Normalization
Data normalization is the process of reducing data to its canonical form. Database normalization is the process of organizing the fields and tables of a relational database to minimize redundancy and dependency.
Data Privacy
Right of individuals to control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
Data Science
Data science utilizes data preparation, statistics, predictive modeling, and machine learning to investigate problems in various domains such as agriculture, marketing optimization, fraud detection, risk management, marketing analytics, public policy, etc.
Data Stream
In connection-oriented communication, a data stream is a sequence of digitally encoded coherent signals (packets of data or data packets) used to transmit or receive information that is in the process of being transmitted.
Data Supply Chain
Data ecosystems are complex and littered with data silos, limiting the value that organizations can get out of their own data by making it difficult to access.
Data Velocity
The speed with which data is generated and processed. Matching the speed of decision to the speed of action - Business leaders have been bombarded with statistics about the soaring volume of data that they can mine for valuable insights.
DATEX-II
DATEX II is a standard developed for information exchange between traffic management centres developed in line with the ITS (Intelligent Transport Systems) Action Plan.
Decentralized Application
A decentralized application operates autonomously and stores its data on a Blockchain. The back-end code for a Dapp runs on a peer-to-peer network rather than on a centralized server.
Decentralized Artificial Intelligence
Distributed Artificial Intelligence is a subfield of artificial intelligence research dedicated to the development of distributed solutions for problems. It is closely related to and a predecessor of the field of multi-agent systems.
Decentralized Autonomous Organization
A Decentralized Autonomous Organization (DAO) is an organization that runs without human intervention. Governance is strictly restricted to pre-coded rules.
Dedicated Short-Range Communication
Dedicated Short-Range Communication (DSRC) is a wireless communication technology designed to allow automobiles in the intelligent transportation system (ITS) to communicate with other automobiles or infrastructure technology.
Degrees of Freedom
An engineering concept used in MEMS that describes the directions in which an object can move and generally the number of independent variables in a dynamic system.
De-identification
De-identification is the process used to prevent someone's personal identity from being revealed. The process must include the removal of both direct identifiers (name, email address, etc.) and the proper handling of quasi-identifiers (sex, marital status, profession, postal code, etc.).
Delegated Proof of Stake
Delegated Proof of Stake (DPoS) is a consensus algorithm developed to secure a blockchain by ensuring representation of transactions within it. It is an implementation of technology-based democracy, using voting and election process to protect the blockchain from centralization and malicious usage.
Denial of Service Attack
A denial of service attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. In a distributed denial-of-service, large numbers of compromised systems (sometimes called a botnet) attack a single target.
Device Attack
A device attack is an exploit that takes advantage of a vulnerable device to gain access to a network. The term "device attack" was coined to differentiate such exploits from those targeting personal computers.
Device Cloud Networks
An IoT device management platform. Device Cloud Networks deliver a platform for M2M enablement, focusing on addressing the needs that have historically challenged the growth, penetration, and business opportunities by giving the ability to connect devices simply and easily.
Device Driver
A device driver is a program that controls a particular type of device that is attached to your computer. When buying an operating system, many device drivers are built into the product.
deviceJS
An open source JavaScript library for IoT devices developed by deviceJS. deviceJS is like jQuery for IoT. It lets you build node.js/io.js web applications while selecting, controlling and listening to a large variety of smart devices.
Device Provisioning
The term provisioning for a device means to evolve a device to a state in which it can be handed off to an end-user, or end-user team, for their specific use in a functional manner.
DevOps
DevOps is the combination of cultural philosophies, practices, and tools that automates the processes to deliver application between the IT and software development team.
Digital Data Storage
This format is used to store computer data on audiotape. Digital Data Storage is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
Digital Disruption
Digital disruption is the change that occurs when new digital technologies and business models affect the value proposition of existing goods and services.
Digital Enhanced Cordless Telecommunications
Digital Enhanced Cordless Telecommunications (DECT) is used primarily in the home and small office systems but is also available in many private branch exchange (PBX) systems for medium and large businesses.

联系我们

欢迎与我们交流!

* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

Thank you for your message!
We will contact you soon.