Here you can find out more about the most important special terms from the Ex, technology and cellular technology area.
Devices and services awarded the ‘Android™ Enterprise Recommended’ seal fulfil Google’s highest business requirements.
Through this programme, Google presents devices and services that have been tested by Google for complex and robust corporate use. Companies can use the search function to select their desired criteria when looking for new devices for their employees, thus ensuring that the proposed models fulfil the necessary requirements. Google’s certification guarantees defined hardware specifications, as well as compatibility with Enterprise Mobility Management (EMM) software — a prerequisite for Android™ Zero Touch (AZT) — the contactless enrolment and management of devices. AER devices and applications are kept up to date by the manufacturer’s service guarantee, which includes regular updates and security patches.
ADB (Android™ Debug Bridge) is an important tool that enables developers to communicate with Android™ devices. Commands can be sent directly from a computer to a smartphone or tablet via a USB or Wi-Fi connection. ADB is primarily used for debugging, installing apps, transferring files, and reading device data. It is a key component in the development and maintenance of Android™ systems.
Android™ Zero Touch is Google’s automated mass provisioning solution for Android™ devices in companies.
IT administrators can use it to set up and manage a large number of devices simultaneously, without the need for manual configuration, according to company-specific requirements.
Integration with an Enterprise Mobility Management (EMM) provider is required.
Devices are automatically configured with the desired apps, settings, and security policies the first time they are switched on, eliminating the need for end users or IT staff to intervene on site.
A separate platform for specific application software (applications) has been developed for certain devices in the i.safe MOBILE product portfolio – the App World. These devices run on the i.safe MOBILE Operating System. App World therefore offers a user-friendly way to download and use apps quickly and easily.
The “App World” is free of charge and there is no account necessary.
ATEX (ATmosphères EXplosibles) is an EU product directive (2014/34/EU) that defines the minimum requirements for devices and protective systems in potentially explosive atmospheres. The directive ensures occupational health and safety in hazardous areas, in accordance with EN 60079 standards.
A distinction is made between:
ATEX Product Directive 2014/34/EU: Regulations for manufacturers of explosion-protected devices
ATEX Operating Directive 1999/92/EC: Regulations for system operators.
All products intended for use in potentially explosive atmospheres must fulfil these ATEX requirements before being placed on the EU market.
More about the guidelines here.
Augmented reality superimposes digital information and objects onto the real environment. Using the camera on a smartphone, tablet or head-mounted tablets (HMT), the real environment is captured and additional elements, such as graphics, diagrams, annotations or 3D models, are added to it on the screen.
Main applications:
Differentiation: Unlike virtual reality (VR), augmented reality (AR) does not replace the real world with a virtual environment, but rather supplements it with useful additional information.
A barcode is a machine-readable labelling system consisting of parallel bars of different widths that encode data. These codes can be scanned using optical readers, such as barcode scanners (e.g. Trigger Handle IS-TH1), and the data can then be processed electronically.
Types:
1D codes: Classic barcodes (e.g. EAN, Code 128).
2D codes: Area codes, such as QR codes or Data Matrix.
Applications:
Product identification, warehouse management, stock taking and automatic data collection in retail, logistics and industry.
To the Use Cases
Bluetooth® is an industry-standard wireless technology for transmitting data between devices over short distances (approximately 10–100 metres). This technology enables paired devices to transmit data, audio, video and images wirelessly via a radio link.
Range:
Dependent on Bluetooth class, environmental conditions (e.g. rooms and obstacles) and radio interference from other devices.
Applications:
Connecting smartphones, tablets, headphones, loudspeakers, keyboards, scanners, and other mobile devices for wireless data exchange.
In a BYOD (Bring Your Own Device) environment, employees use their own mobile devices, such as laptops, smartphones and tablets, for work purposes.
Companies define clear guidelines that specify the extent to which, and the conditions under which, private devices are granted access to the company network. These guidelines also regulate the processing and storage of sensitive company data. However, using private devices for professional purposes can pose significant security risks.
A campus network is a local area network (LAN) that extends across the premises of an organisation, such as a university, company or research centre.
It connects multiple buildings via high-performance cables, such as fibre optics. This enables the quick exchange of data and the sharing of central services, such as servers, printers and learning platforms. Campus networks provide stable internal networking and enable all connected areas to share internet access.
In cloud computing, IT resources such as servers, storage and software are not operated in-house, but utilised via the internet as required.
These flexible services are billed according to usage. Rather than making significant investments in their own technology (capital expenditure, or CAPEX), companies typically only pay for the services they use (operating expenditure, or OPEX).
This enables them to reduce costs and respond more quickly to changes.
It also makes IT more efficient and easier to access.
The Dangerous Substances and Explosive Atmospheres Regulations (DSEAR) are British regulations that govern the safe handling of hazardous substances in the workplace.
Its purpose is to prevent explosions or fires caused by flammable gases, vapours, dusts or liquids.
Employers must recognise and assess hazards, and take appropriate measures to protect employees and equipment.
DSEAR applies to many sectors, including the chemical, industrial and agricultural sectors, wherever highly flammable substances are handled.
Digital Mobile Radio (DMR) is a digital transmission standard for voice and data used in non-public radio networks.
It is primarily used in mobile radio and the amateur radio service.
Compared to analogue radio technologies, DMR enables efficient and reliable communication, offering better voice quality, a greater range, and additional functions such as data transmission and encryption.
It is caused by a combination of five factors:
Due to their large surface area relative to their volume, finely dispersed particles burn extremely quickly. During ignition, pressure waves are created that stir up more dust, thus triggering a self-reinforcing chain reaction.
Enterprise Mobility Management (EMM) encompasses the technologies, processes and guidelines that companies use to securely manage mobile devices, applications and data. The aim is to enable the use of mobile devices, such as smartphones and tablets, in the workplace while protecting company data.
EMM encompasses Mobile Device Management (MDM), which involves managing mobile devices according to company guidelines; Mobile Application Management (MAM), which involves managing authorised apps tailored to the company; and Mobile Content Management (MCM), which involves managing company-relevant content and apps on cloud services, email servers, file servers, and company SharePoint sites.
EMM ensures that security guidelines are adhered to, access is controlled, and data can be encrypted, whether the devices belong to the company or are privately owned (e.g. as part of BYOD).
“EAC” stands for ‘Eurasian Conformity’.
An “EAC” certificate is an official document valid throughout the EAEU area — the customs union, as well as Kazakhstan, Armenia, and Kyrgyzstan.
An explosion is a physical reaction that releases large amounts of energy in the form of thermal, pressure, and kinetic energy.
The cause of an explosion can be a chemical reaction (e.g. gas explosion), a physical process (e.g. dust explosion), or nuclear processes.
In potentially explosive atmospheres, strict safety measures and explosion-protected equipment are required to prevent ignition sources.
Explosion protection should either prevent explosions from occurring, or minimise the consequences if they do.
It is an important aspect of technical safety, particularly in areas where hazardous substances are handled.
An explosion occurs when flammable substances, oxygen and an ignition source are present.
This is not only possible in the chemical industry, but also in the food industry, for example when certain types of dust are produced.
For this reason, companies must carry out a risk assessment in accordance with the Industrial Safety Regulations and implement appropriate explosion protection measures.
A feature phone is a mobile phone that offers fewer functions than a smartphone but more than a basic phone that only makes calls and sends text messages.
Feature phones typically have a physical keypad, a small display, and basic functions such as SMS, simple games, a calendar, and sometimes a basic camera.
They are characterized by longer battery life and robust construction, making them suitable for industrial applications.
In a gas explosion, an explosive gas mixture ignites and explodes. If an explosive atmosphere (a mixture of flammable gases and oxygen) comes into contact with a source of ignition, a gas explosion can result. The quantity of the explosive gas mixture, as well as the pressure and temperature of the gas, determines whether a deflagration or detonation occurs.
A gas deflagration is similar to a gas explosion in that it occurs through the sudden ignition of a flammable gas-air mixture. The main difference lies in the intensity and speed of the reaction.
Google Workspace (formerly G Suite) is Google’s cloud-based productivity and collaboration package for companies, educational institutions, and organisations.
It comprises core applications such as Gmail, Google Drive, Docs, Sheets, Slides, Google Meet, Google Calendar and Google Chat.
These applications enable real-time collaborative work, centralised file storage and professional communication via a dedicated domain.
They are based on the concepts of cloud computing and groupware.
GPS (Global Positioning System) is a satellite navigation system that can be used to determine your exact location on Earth.
GPS receivers, which are installed in devices such as smartphones, cars and watches, receive signals from several satellites. These signals are used to calculate the current location, which is often accurate to within a few metres. GPS is used for navigation, localisation and tracking, among many other applications, such as hiking, driving and logistics.
HMI (Human Machine Interface) refers to the user interface between humans and machines.
This interface — the part of a machine, system or device that enables interaction between user and machine — allows people to operate, monitor and control technical systems.
In industrial environments, HMIs are often designed as touchscreens, control panels or mobile applications to ensure intuitive and safe operation.
IECEx (International Electrotechnical Commission System for Certification to Standards Relating to Equipment for Use in Explosive Atmospheres) is an international certification procedure for electronic devices used in potentially explosive atmospheres.
The IECEx’s aim is to implement a standardised, international system for certifying explosion-proof devices. Hazardous areas in which explosive atmospheres can occur are divided into different classes. The IECEx scheme, established by the IEC, aims to ensure that uniform Ex equipment standards, test marks and test reports (ExTRs) are recognised worldwide.
Currently, IECEx certification is valid in Australia and New Zealand without the need for conversion to national certificates. Only IECEx-approved devices may currently be used in Europe.
Industry 4.0 represents the fourth industrial revolution. It encompasses the digitalisation and intelligent networking of machines, systems and products within the industry. Modern technologies such as the Internet of Things (IoT), artificial intelligence, cloud computing and big data can be used to make production processes more efficient, flexible and autonomous.
The ultimate goal is to create a ‘smart factory’ where systems can control and optimise themselves in response to changes.
The IP protection class indicates the degree to which devices (e.g. mobile phones) are protected against the ingress of solid objects (the first digit of the code) and the degree to which the housing protects the device against water ingress (the second digit of the code).
IEC stands for ‘International Electrotechnical Commission’. It is an international organisation based in Geneva that sets standards in the field of electrical engineering.
Through its work, the IEC promotes high-quality infrastructure and international trade in electrical and electronic goods.
This promotes technical innovation, the development of affordable infrastructure, and efficient, sustainable access to energy. It also facilitates intelligent urbanisation and transport systems, and mitigates climate change while increasing the safety of people and the environment.
The Internet of Things (IoT) is a network of physical objects, such as devices, vehicles and houses, connected to the internet.
These smart devices are equipped with sensors and software, have a unique address on the network, and can communicate with each other automatically via machine-to-machine communication (M2M)
The aim is to automate tasks in areas such as smart homes, order systems and emergency call systems.
Unlike Industry 4.0, the IoT encompasses both industrial and private applications. Users can also control the devices regardless of their location, for example via an app.
Intrinsic safety is a special technology that ensures electrical devices remain safe in hazardous environments, such as those with a potentially explosive atmosphere.
Even if a device malfunctions due to a short circuit, impact or static charge, it must not generate sparks or trigger ignition.
This is achieved through special designs and protective measures, such as low-current sources or designated break points.
Intrinsically safe devices are commonly employed in measurement and control technology, particularly in industries such as chemicals and oil.
The ability to store electrical energy in components such as capacitors or coils is also considered.
ISO 14001 is an internationally recognised standard for environmental management systems.
It sets out requirements that organisations can use to improve their environmental performance and ensure compliance with legal requirements.
The aim is to systematically identify, manage and reduce environmental impacts over time.
ISO 9001 is the world’s most recognised quality management (QM) standard. Applicable regardless of industry or size, it defines the requirements for a QM system.
Companies can use it to optimise their processes and increase customer satisfaction.
The standard is based on key QM principles, including customer orientation, process orientation, continuous improvement, and relationship management.
In “kiosk mode”, which is a special operating mode for digital devices such as computers, tablets and smartphones, access is restricted to one defined application only. All other functions and system areas are blocked. “Kiosk mode” is primarily used in public or commercial areas, such as information terminals, vending machines, schools and trade fairs.
The aim is to provide a secure, stable and user-friendly environment in which users can only access the desired function. This prevents operating errors and protects against unauthorised access.
Lone Worker Protection refers to the safeguarding of employees who work alone, away from others, particularly in hazardous environments, and who are protected by technical assistance. In the event of an emergency and/or accident, an alarm can be sent to the company’s control or rescue centre by actively triggering an emergency button (SOS button) on a mobile device or by using special sensors (position, impact or motion).
For mobile devices, Lone Worker Protection is typically activated via an app that allows users to customise the protection settings according to their work situation.
Long Term Evolution (LTE) is the third-generation mobile communications standard (3.9G). LTE Advanced, also known as LTE+, is the 4G mobile communications standard and is backward compatible with LTE. Compared to LTE, LTE Advanced allows transmission rates of 1000 Mbit/s for downloads and 500 Mbit/s for uploads. LTE+ supports carrier aggregation, which increases the data rate per user and allows network operators to use the available radio spectrum flexibly.
The next step up from LTE Advanced is LTE Advanced Pro, also known as 4.5G, which offers an even higher performance level of over 500 Mbit/s.
The latest 5G mobile communications standard utilises higher frequency ranges to enable data rates of up to 10 Gbit/s, increased data throughput and frequency capacity, and real-time transmissions with latency of less than one millisecond.
Machine learning is a branch of artificial intelligence. It enables computers or machines to learn from experience without having to be reprogrammed for every task. Using algorithms, systems can recognise patterns, errors or goals in data and automatically make decisions or optimise processes.
Machines can learn independently or from other networked devices. Machine learning can help optimise production processes in real time, particularly in Industry 4.0, for example through cloud systems or networked machines.
Machine-to-Machine communication (M2M) is a term from the IoT environment that describes the automatic exchange of information between machines/devices without human intervention. M2M communication enables devices to transmit data, receive commands and perform actions autonomously. This technology is fundamental for Industry 4.0, smart cities and automated systems.
MIL-STD is the abbreviation for US Military Standard. MIL-STD testing of products for use under military conditions is conducted directly by the US Department of Defense.
Products that meet these standards are extremely robust and resistant to extreme environmental conditions such as temperature fluctuations, vibrations, humidity and mechanical stress.
Mission Critical Push-to-Talk (MCPTT) is push-to-talk communication — fast and simple voice communication via the press of a button — for mission-critical applications such as emergency services, police, fire departments and rescue services.
MCPTT provides reliable, prioritized voice communication over mobile networks (LTE/5G) and ensures that critical communications are always transmitted, even under extreme conditions.
Mixed Reality (MR) describes the blending of reality with artificial, computer-generated 2D or 3D objects.
Unlike AR and VR, MR creates an environment where physical and digital objects coexist and interact in real time. Users can manipulate both real and virtual objects simultaneously.
MR finds applications in training, design, maintenance and collaborative work scenarios.
Mobile application management (MAM) involves managing mobile applications (apps, software and services) on smartphones and tablets on a company-specific basis. The aim is to protect business data while enabling flexible app use, including on private devices as part of the BYOD (Bring Your Own Device) concept.
MAM forms part of an EMM (Enterprise Mobility Management) suite, which offers companies a central platform for controlling, securing and distributing mobile applications without having to manage the entire device.
Mobile Content Management (MCM) is a system that manages and secures company content on mobile devices. It provides controlled access to files and applications stored in the cloud, on mail and file servers, or in SharePoint.
As part of an EMM (Enterprise Mobility Management) suite, MCM serves as a central platform for securely and efficiently providing company data to mobile devices.
Mobile Device Management (MDM) allows mobile devices to be managed centrally according to defined company guidelines. IT administrators can use MDM to secure and control both company-owned and privately owned devices (BYOD) that access sensitive company data.
MDM forms part of a comprehensive EMM suite and is used to securely and standardise the management of mobile devices in a corporate environment.
Near Field Communication (NFC) is an international standard for transmitting data contactlessly over very short distances (a few centimetres). Based on RFID (Radio Frequency Identification), the technology utilises electromagnetic induction.
Due to its short range, NFC is considered secure and is often used for contactless payments (micropayments) with smartphones. It is also increasingly being used in the Internet of Things (IoT) to connect to de-energised devices or simplify user control, for example.
Noise cancellation (noise suppression) is a technology for actively reducing ambient noise, applied before voice processing and transmission. This technology uses microphones to capture ambient noise and generates counter-sound waves to neutralize unwanted sounds.
This significantly improves voice quality in noisy environments and enables clear communication even in industrial settings or loud outdoor conditions.
Personnel Protection Technologies (PPT) include technologies and sensors integrated into mobile devices to prevent or minimize hazards during work. These include fall detection sensors, gas sensors, lone worker protection, emergency buttons (SOS), GPS tracking, and automatic alarm systems. PPT technologies help to increase workplace safety and enable rapid response in emergency situations.
Push-to-talk (PTT) is a communication method whereby a voice message is sent to one person or a defined group in real time by pressing a special button. Similar to a walkie-talkie, PTT is often used in safety-critical areas, such as the construction industry and by emergency services.
Push-to-talk over cellular (PTToC or PoC) is a technology that enables voice communication via the mobile phone network at the touch of a button, in a similar way to traditional radio devices. Users can communicate with individuals or groups via a PTT-enabled mobile device (e.g. a smartphone).
Combining the convenience of modern mobile devices with the speed of radio communication, PTToC is often used in security- or logistics-related applications.
Personnel Protection Technologies (PPT) include technologies and sensors integrated into mobile devices to prevent or minimize hazards during work. These include fall detection sensors, gas sensors, lone worker protection, emergency buttons (SOS), GPS tracking, and automatic alarm systems. PPT technologies help to increase workplace safety and enable rapid response in emergency situations.
Radio frequency identification (RFID) is a radio technology used for contactless identification and location of objects or living beings. An RFID system comprises a transponder containing a unique code and a reader that can read this code wirelessly.
In industry, RFID is used for access authorisations, tracking goods and locating people, among other applications. Data is transmitted via electromagnetic waves and can be read using an RFID scanner.
Rugged means robust and refers to mobile phones, smartphones or tablets that are particularly resistant for industrial and outdoor use.
Rugged devices are characterized by reinforced housings, protection against water and dust (high IP ratings), shock resistance, and extended operating temperature ranges.
They are specifically designed for use in harsh environments such as construction sites, factories, or emergency services.
Security updates for Android are regular updates that address known vulnerabilities in the system.
These updates protect devices against viruses, malware, and hacker attacks, while also securing personal data such as passwords, photos, and messages. They also improve the device’s stability and reliability. As Android is an open system that includes many different devices and manufacturers, these updates are particularly important. If they are not installed, the device remains vulnerable to security threats. Therefore, security updates should always be carried out promptly to protect your smartphone or tablet as effectively as possible.
A smart product is a digital, networked product equipped with sensors, software and communication technology. It can collect, process and exchange data, react to its environment, and often interact with other devices.
Examples include smart household appliances, connected cars and industrial machines that can report their status or react automatically to changes.
Smart production is the intelligent, digital networking of all components of the production process — from machines and systems to products and logistics — as part of Industry 4.0.These components communicate with each other in real time.
Using
companies can optimise their production processes autonomously, perform predictive maintenance and respond flexibly to changes in demand or disruptions.
The goal is to achieve self-organising, adaptive production that is more efficient and higher quality, while reducing costs and offering greater customisation.
A smart service is a digitally supported, customised and automated service that is often provided in real time through the use of data, sensors, artificial intelligence and networking technologies.
Based on smart products, it extends them with value-adding services such as automatic maintenance, personalised recommendations and remote monitoring.
TETRA is a standard for digital trunked radio that enables the construction of universal networks as a standardized platform for various mobile services.
TETRA is primarily used by emergency services, security services and industrial organizations for mission-critical communication.
It offers group communication, individual calls, data transmission and emergency functions in a secure, reliable network.
UEM (Unified Endpoint Management) is an IT management solution that centrally manages all of a company’s end devices — including smartphones, tablets, laptops, desktop PCs, and IoT devices — via a standardised platform.
Combining traditional mobile device management (MDM) with PC management, UEM gives IT administrators unified control over security policies, app distribution, device configuration and compliance, regardless of operating system or device type.
Key features include device enrolment, policy management, application management, security monitoring and remote support.
These features are particularly important in BYOD (Bring Your Own Device) environments and hybrid working models.
Virtual reality (VR) is a technology that allows you to immerse yourself in a computer-generated environment.
The experience is so realistic that you feel as though you are right in the middle of it. VR goggles are usually used for this purpose and show images that react to movements.
In industry and research, VR is primarily used for development and training purposes.
This environment looks so real that you feel like you are right in the middle of it. This is usually achieved using a VR headset that displays images and reacts to movements.
A white paper is a document containing specialist information of a high quality on a specific topic.
This may take the form of case studies, research findings or ‘how-to’ content.
Ours offer insights into how our explosion-protected mobile devices work with PToC software, scanning solutions and industrial applications.
Each white paper contains technical information and application examples to help you make the most of your i.safe MOBILE devices.
According to IEEE 802.11ax, Wi-Fi® 6 is the current wireless standard and the successor to Wi-Fi® 5 (802.11ac).
Designed to enhance the speed, efficiency and stability of wireless networks, it is particularly beneficial in environments with numerous connected devices, such as homes, offices and public hotspots.
Wi-Fi 6 enables higher data rates, shorter response times, and improved energy efficiency. The latter can extend the battery life of mobile devices, for example.
The standard also offers higher network capacity and operates in the 2.4 GHz and 5 GHz frequency bands. Devices with Wi-Fi 6 are backwards compatible and can communicate with older Wi-Fi devices.
Wi-Fi® 6E, an extension of the Wi-Fi® 6 (IEEE 802.11ax) wireless standard, introduces an important innovation by making use of the 6 GHz frequency band, in addition to the 2.4 GHz and 5 GHz bands that were previously used. This new band offers more free channels, enabling faster and more stable connections that are less prone to interference, particularly in densely populated areas with numerous WLANs.
The 6 GHz band enables Wi-Fi 6E to deliver even higher speeds, lower latency and better performance when many devices are active simultaneously. Wi-Fi® 6E offers significant benefits, particularly for contemporary applications such as high-resolution streaming, online gaming and virtual reality.
However, both the router and the end devices must support Wi-Fi® 6E for this to be possible. The use of the 6 GHz band has now been approved in Germany and many other countries, making Wi-Fi® 6E increasingly important.
A wireless wide area network (WWAN) connects mobile devices to the internet via mobile phone masts. Unlike a WLAN, a WWAN offers a greater range, particularly outdoors, and is operated by mobile phone providers. Radio network types used include GSM, UMTS, LTE and 5G.
Both WLAN (wireless local area network) and WWAN (wireless wide area network) are wireless networks, but they differ in terms of range and usage. WLAN is typically used at home or in the office, connecting devices to the internet via a router — ideal for short distances. WWAN, on the other hand, uses the mobile network (e.g. LTE or 5G) and offers internet access over long distances — for example, when travelling with a SIM card. It is particularly useful when WLAN is unavailable.