Use Cases.
515 terms
Digital Footprint
A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and the information you submit to online services.
|
Digital Manufacturing
Digital manufacturing focuses on reducing the time and cost of manufacturing by integrating and using data from design, production, and product use; digitizing manufacturing operations to improve the product, process, and enterprise performance, and tools for modeling and advanced analytics.
|
Digital Signal Controller
The Digital signal controller is a hybrid of microcontrollers and digital signal processors (DSPs). DSCs have fast interrupt responses, offer control-oriented peripherals like PWMs and watchdog timers.
|
Digital Signal Processors
A digital signal processor is a specialized microprocessor (or a SIP block), with its architecture optimized for the operational needs of digital signal processing.
|
Digital Signature
The signature is used to verify that the person who sends a particular transaction is, in fact, the owner of that wallet. It guarantees the contents of a message have not been altered in transit.
|
Digital Supply Chain
The digital supply chain merges the major business processes of all parties involved from the suppliers to the manufacturer and the end customer. The main value includes the acceleration of the production and logistics processes, and the reduction of data acquisition and the optimization.
|
Digital Transformation
Digital transformation is the integration of digital technology into all areas of a business, fundamentally changing how you operate and deliver value to customers. It's also a cultural change that requires organizations to continually challenge the status quo, and get comfortable with failure.
|
Digitization
Digitization is the process of moving information onto a format that can be understood by a computer for that data to be used in computational calculations.
|
Diminished Reality
Diminished reality is a term used to describe the control over one's reality and the ability to block out real or digital information at will. Diminishes parts of the physical world by removing unwanted objects from view.
|
Directed Acyclic Graph
A directed acyclic graph (DAG) is a directed graph data structure that uses a topological ordering. The sequence can only go from earlier to later. Its main application is an alternative to the Blockchain protocol, provided by IOTA and marketed as the Tangle.
|
Distributed Cloud
Distributed cloud means the distribution of public cloud services to locations outside the cloud provider’s physical data centers, but which are still controlled by the provider.
|
Distributed Denial of Service Attack
A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing a denial of service for users of the targeted system.
|
Distributed Memory and Processing
In computer science, distributed memory refers to a multiprocessor computer system in which each processor has its own private memory. In contrast, a shared memory multiprocessor offers a single memory space used by all processors.
|
Distributed Version Control
In computer programming, distributed revision control, also known as distributed version control or decentralized version control, allows many software developers to work on a given project without requiring them to share a common network.
|
Docker
Docker is an open source software platform that creates, deploys and manages virtualized application containers on a common operating system (OS) through a related tool ecosystem.
|
Domain Model
A domain model is a system of abstractions that describes selected aspects of a sphere of knowledge, influence, or activity. The model can then be used to solve problems related to that domain.
|
Domain Name System
The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network.
|
Domotics
A combination of domestic and robotics - also a composite of the Latin domus and informatics, domotics includes home automation systems, home robots, whole house audio/visual systems, and security systems.
|
Double Spending
A double spend is an attack where the given set of coins is spent in more than one transaction. The risk that a digital currency can be spent twice. A 51% attack is one such attack.
|
Downlink
Downlink is the process of downloading data onto an end node from a server/target address. In a cellular network, this would be seen as data being sent from a cellular base station to a mobile handset.
|
Edge Computing
Edge computing is pushing the frontier of computing applications, data, and services away from centralized nodes to the logical extremes of a network. It enables analytics and knowledge generation to occur at the source of the data.
|
Edge Gateway
Edge gateway provides an entry point into enterprise or service provider core networks. The gateway node is considered to be on the "edge" of the network as all data must flow through it before coming in or going out of the network.
|
Electrical Computer-aided Design
Electrical Computer-aided Design (ECAD) is a real-time standalone, easy-to-use, multi-user electrical design tool that helps in efficiently defining the electrical interconnections for complex electrical systems.
|
Electromagnetic Field
An electromagnetic field (EMF) is a physical field produced by electrically charged objects. It affects the behavior of charged objects in the vicinity of the field.
|
Electronic Control Unit
An Electronic Control Unit (ECU) is a device, such as a sensor or an actuator, that is connected to other devices via a CAN Bus. A vehicle can contain dozens of ECUs for functions such as mirror adjustment, airbags, cruise control, entertainment, and, most significantly, engine control.
|
Electronic Paper
Electronic paper, e-paper, and electronic ink are display technologies that mimic the appearance of ordinary ink on paper. An ideal e-paper display can be read in direct sunlight without the image appearing to fade.
|
Electronic Serial Number
An Electronic Serial Number (ESN) is a numeric identifier that uniquely identifies a CDMA phone in the United States. When a cellular call is placed on a mobile telephone, the ESN is transmitted to a base station, and the number is used to authenticate the validity of the phone.
|
Embedded Device Hacking
The exploiting of vulnerabilities in embedded software to gain control of the device. Embedded systems exist in a wide variety of devices including Internet and wireless access points, IP cameras, security systems, drones, and industrial control systems.
|
Embedded Firmware
The flash memory chip that stores specialized software running in a chip in an embedded device to control its functions. Hardware makers use embedded firmware to control the functions of various hardware devices and systems.
|
Embedded Software
Embedded software is computer software written to control machines or devices that are not typically thought of as computers. It is typically specialized for the particular hardware that it runs on and has time and memory constraints.
|