upload
Gartner, Inc.
Industry: Consulting
Number of terms: 1807
Number of blossaries: 2
Company Profile:
Gartner delivers technology research to global technology business leaders to make informed decisions on key initiatives.
Infonomics is the emerging discipline of managing and accounting for information with the same or similar rigor and formality as other traditional assets (e.g., financial, physical, intangible, human capital). Infonomics posits that information itself meets all the criteria of formal company assets, and, although not yet recognized by generally accepted accounting practices, increasingly, it is incumbent on organizations to behave as if it were to optimize information’s ability to generate business value.
Industry:Technology
Statutory board of the Singapore government, operating under the Ministry of Information, Communications and The Arts (MICA). The IDA is a single agency for the integrated planning, policy formulation, regulation and industry development of the IT and telecommunications sectors in Singapore. See also MICA.
Industry:Technology
Infocentric refers to an organization that curates, manages and leverages information as an actual enterprise asset. This includes having distinct functions for information inventorying or asset management, information productization, data science (or advanced analytics), data governance, information valuation, and having a chief executive uniquely responsible for information assets, for example. a chief data officer.
Industry:Technology
The standardization of IT services through predesigned and preconfigured solutions that are highly automated and repeatable, scalable and reliable, and meet the needs of many organizations. information access with search Information access technologies interact with applications such as document management, Web content management and other repositories to provide users with insight into their content. Increasingly, information access technology is also expected to include results from enterprise applications, such as CRM and legacy systems. In addition, it looks outside enterprises to access Internet-based content. Information access technology is often acquired as an embedded aspect of other applications, and portal, ECM, business application and other vendors frequently include enterprise search as part of their products. The first and most mature information access technology is search engine technology. It is typically applied to unstructured data in document repositories. It includes both enterprise and desktop search. Increasingly, automatic categorization, creative visualization, content analytics and taxonomy support technologies are being added to this category.
Industry:Technology
A software producer that is not owned or controlled by a hardware manufacturer; a company whose primary function is to distribute software. Hardware manufacturers that distribute software (such as IBM and Unisys) are not ISVs, nor are users (such as banks) that may also sell software products. ISVs typically offer products that the primary vendor (i.e., IBM) does not offer, allowing clients of that vendor to round out their software needs. ISVs create price competition and also increase the pace of technology innovation in their markets.
Industry:Technology
These applications manage and administer compensation plans, quotas, crediting and adjustments, while processing commissionable transactions for direct and partnered sales organizations generating transaction registers and commission statements. They provide extensive reporting and ad hoc query capabilities for sales management and finance, as well as “what if” modeling for financial analysis and plan design.
Industry:Technology
Immersive learning environments (ILEs) are learning situations that are constructed using a variety of techniques and software tools, including game-based learning, simulation-based learning and virtual 3D worlds. ILEs are distinguished from other learning methods by their ability to simulate realistic scenarios and environments that give learners the opportunity to practice skills and interact with other learners.
Industry:Technology
Image recognition technologies strive to identify objects, people, buildings, places, logos, and anything else that has value to consumers and enterprises. Smartphones and tablets equipped with cameras have pushed this technology from mainly industrial applications (for example, sorting fruit) to consumer applications. For example, logos, cars, landmarks, wine labels, and book and album covers can be identified by consumer smartphones, using a mobile app that accesses image recognition software in the cloud. Image recognition has the potential to transform a picture into a hyperlink to something on the Internet (for example, information, service, coupon or video).It can also be used to initiate a search—which is one of the main reasons why Google and Amazon have been investing in this technology. In addition, image recognition has applications in security and content management. Our definition of image recognition does not include video analytics or video search, although video analysis frequently incorporates image recognition technologies.
Industry:Technology
Identity-proofing services, which verify people’s identities before the enterprise issues them accounts and credentials, are based on “life history” or transaction information aggregated from public and proprietary data sources. These services are also used as an additional interactive user authentication method, especially for risky transactions, such as accessing sensitive confidential information or transferring funds to external accounts. Identity-proofing services are typically used when accounts are provisioned over the Web or in a call center. However, they can also be used in face-to-face interactions.
Industry:Technology
An identity-aware network (IAN) monitors a user’s behavior on the network. Policy enforcement points within the network may be used to control a user’s traffic based on the identity and access management (IAM) policies assigned to that user.
Industry:Technology
© 2024 CSOFT International, Ltd.