This is for posts that have an introductory or general scope. There will be more of these early on, and less as we continue to cover ground.
A device that can measure something about its environment. Examples are movement, light, color, moisture, pressure, and many more.:
This is one of the four A number used to encrypt (or encode) information so that no one can read it. Keys are used when encoding and decoding. You shouldn't have to mess with keys yourself. enabling concepts of the The Internet of Things. A broad term covering many different applications where "things" are interconnected through the internet.. It deals with how In our context, a machine is anything that isn't human (or living). That includes electronic equipment like computers and phones. can sense their environment in many ways. You can find here all posts that include the role of sensing and how it works.
This is another of the four key enabling IoT concepts. It includes A generic phrase referring to large numbers of computers located somewhere far away and accessed over the internet. For the IoT, computing may be local, done in the same system or building, or in the cloud, with data shipped up to the cloud and then the result shipped back down.... and A process by which machines can be trained to perform tasks that required humans before. It's based on analysis of lots of data, and it might affect how some IoT devices work./Artificial Intelligence. Here you will find posts that discuss any of these topics.
This is yet another of the four key IoT concepts. The IoT doesn’t happen without lots of communication, and here you’ll find posts that deal with that communication.
A way of controlling some device electronically. It might turn the device on or off or change a setting or property or do any other thing that the device is capable of.:
This is the final IoT concept; it deals with how computers can control other devices. This category includes all posts related to actuation.
Refers to whether or not IoT devices or data are protected from unauthorized viewers.:
Because of the damage that A misused, but common term for an unauthorized person trying to break into a device or network. Originally, in this context, "hackers" referred to the good guys (or "white hats"), while "crackers" were the bad guys (black hats). can do – and have already done, this is an enormously important topic for the IoT. Any posts dealing with security can be found in this category.
Refers to whether or not information gathered about your usage of IoT devices by authorized people can be made public, or shared with others, without your consent. Different from (although related to) security, which protects such data and devices from access by unauthorized people. Different from privacy, which is more concerned about use of data by authorized people....:
Keeping data private is also critical for the IoT. Privacy is often lumped in with security, but it’s a distinct topic, and so it has its own category.