ERP News

From the IoT to BIM and DDoS to GDPR: Breaking down technological jargon

445 0
From the IoT to BIM and DDoS to GDPR

From the IoT to BIM and DDoS to GDPR

The devices and systems we use seem to change or get updated on a daily basis.

As the world changes and our lives become increasingly interconnected, a range of new words and phrases are frequently added to the technological lexicon.

 Autonomous vehicle

A vehicle, such as a car or truck, that uses technology and sensors to drive without the need for human assistance.

Uber, Tesla and Alphabet — through its subsidiary Waymo — are just some of the big businesses working on self-driving technologies.

BIM

According to the Institution of Structural Engineers, Building Information Modeling, or BIM, is centered on utilizing digital tools “to efficiently produce information” in order to allow assets to be constructed, maintained and operated.

Biometrics

The U.S. Department of Homeland Security (DHS) describes biometrics as being “unique physical characteristics” that can be utilized for “automated recognition.” Think fingerprints, iris scans and voice recognition.

The applications of biometrics are diverse and wide ranging. Today, we can unlock our smartphones with our fingerprints and use our voices to gain access to sensitive information, such as our banking details.

For its part, the DHS says it uses biometrics to, among other things, “detect and prevent illegal entry into the U.S.” and enforce federal laws.

Blockchain

A tamper-proof, distributed digital ledger that records transactions. Instead of different parties in a transaction keeping their own records of that transaction — which could potentially differ and cause confusion — blockchain creates one “master” record. This cannot be changed once a transaction has been recorded. As technology giant IBM notes: “All parties must give consensus before a new transaction is added to the network.”

DDoS

Stands for Distributed Denial of Service. The U.K.’s National Crime Agency (NCA) says that DDoS attacks usually take place when a group of “compromised, controlled computers” send messages to a computer or server simultaneously. The messages are sent involuntarily, the NCA adds.

GDPR:

In the European Union, the General Data Protection Regulation will apply from May this year. It will update the 1995 Data Protection Directive, which was introduced at a time when the digital age was in its infancy, and will impact both citizens and businesses.

Among other things, the GDPR will boost people’s right to be forgotten and guarantee free, easy access to their personal data. Organizations and businesses will also have to inform people about data breaches that could negatively impact them, and do this “without undue delay.” Relevant data protection supervisory authorities will also need to be told of any breaches.

Internet of Things

The European Commission describes the internet of things as merging “physical and virtual worlds, creating smart environments.”

Think of devices that are connected to the internet and able to “talk” to one another. One example would be a thermostat in your home that you control with your smartphone from your office.

Read More Here

Article Credit: CNBC

Leave A Reply

Your email address will not be published.

*

code