upload
Gartner, Inc.
Industry: Consulting
Number of terms: 1807
Number of blossaries: 2
Company Profile:
Gartner delivers technology research to global technology business leaders to make informed decisions on key initiatives.
An on-demand workforce staffing strategy using contract workers, agency staffing, independent contractors and people who will work directly for an enterprise on an on-call basis.
Industry:Technology
Contextual presence is a context-specific list that is created according to specific and current needs. Contextual presence allows users such as medical staff, technical assistants and financial brokers to determine who is available to assist with a specific customer request. Contextual presence lists can be integrated with location services.
Industry:Technology
Context-enriched services are those that combine situational and environmental information with other information to proactively offer enriched, situation-aware and usable content, functions and experiences. The term denotes services and APIs that use information about the user to optionally and implicitly fine-tune the software action with better situational awareness. Such services can proactively push content to the user at the moment of need, or suggest products and services that are most attractive to the user at a specific time.
Industry:Technology
Context-enriched content is the content, information and data ranging from articles to advertising based on the user’s context that is served to whatever medium the recipient is using to interact with that content. The media may be a Web browser, a mobile phone, a media tablet or printed materials. Context-enriched content is differentiated from traditional communications by incorporating the user’s context and an assessed understanding of the user’s need in the moment.
Industry:Technology
Context-aware security is the use of supplemental information to improve security decisions at the time they are made, resulting in more accurate security decisions capable of supporting dynamic business and IT environments. The most commonly cited context information types are environmental (such as location and time). However, context information valuable to information security exists throughout the IT stack, including IP, device, URL and application reputation; business value context; and the threat context in which the decision is made.
Industry:Technology
Context-aware computing  is a style of computing in which situational and environmental information about people, places and things is used to anticipate immediate needs and proactively offer enriched, situation-aware and usable content, functions and experiences.
Industry:Technology
A core enabling technology for effective portals, this application collects, analyzes and distributes personalization and customization information.
Industry:Technology
Gartner defines CoDA as an architectural style that builds on service-oriented architecture (SOA) and event-driven architecture (EDA) interaction and partitioning styles, and adds formal mechanisms for the software elements that discover and apply the user’s context in real time. CoDA provides a framework for solution architects that allows them to define and implement the technology, information and process components that enable services to use context information to improve the quality of the interactions with the user. The technologies may include context brokers, state monitors, sensors, analytic engines and cloud-based transaction processing engines.
Industry:Technology
Generally refers to the combination of user identity, environmental, process and community-based information about the customer, leading to real-time offers, delivered at the right time via the right touchpoint, and valuable to the customer. Refers to meanings that are clear to the sender or receiver (e.g., application or person), either because they are stated elsewhere in the message or because they have been predefined (e.g., the number “30” means “30 pounds of flour” in one message and “30 cases of orange soda” in another message). Sender and receiver may have different interpretations of meaning (i.e., different context). For example, “customer” could be the party that pays the freight bill in a billing application, but the receiver of the item (which might not be the payer) in a warehousing application.
Industry:Technology
A method of line control in which the terminals request to transmit. If the channel in question is free, transmission proceeds; if it is not free, the terminal must wait until it becomes free.
Industry:Technology
© 2024 CSOFT International, Ltd.