- Branche: Consulting
- Number of terms: 1807
- Number of blossaries: 2
- Company Profile:
Gartner delivers technology research to global technology business leaders to make informed decisions on key initiatives.
These embed a wireless WAN or WLAN connection to connect to services designed to enhance media playback, including direct-to-device content downloads, music ID capabilities, music discovery features, social networking features and streaming Internet radio functions. Some products can run applications and browse the Web.
Industry:Technology
Connected imaging devices include digital still cameras (DSCs) and digital camcorders with embedded wireless LAN (WLAN) or wireless WAN digital cellular connections. The wireless connection is typically used to send photos to a PC, an online photo service or social networking site, or as an attachment to an email. The advantage is that you can send photos or videos as soon as they are taken instead of waiting until they are downloaded to a PC.
Industry:Technology
Connected game handhelds use an embedded WAN digital cellular or WLAN connection to link to services designed to enhance the gaming experience, including online gaming and downloading games and game content.
Industry:Technology
Media tablets, e-readers, portable navigation devices, media players, imaging devices and mobile gaming devices.
Industry:Technology
The amount of time that a circuit, typically in a circuit switched environment, is in use. See holding time.
Industry:Technology
Configure, price and quote (CPQ) application suites provide an integrated set of software applications supporting the configuration, pricing and quote generation activities that accompany solution and negotiated selling. CPQ application suites are also deployed to support self-service sales environments, including business-to-consumer (B2C) and B2B sales environments. CPQ systems typically include pricing engines, proposal generators, quoting systems, and rules or constraint engines, and are complemented by approval and authorization workflows.
Industry:Technology
CM software includes both stand-alone products and suites of products that can initially provision/configure desktops, servers or mobile devices, and then manage the change of configuration settings, software, and increasingly the files and data on those elements on an ongoing basis. Included in this category are stand-alone products for software distribution, various discovery requirements, remote control, software packaging, personality migration, software usage metering and mobile device management. Also included here are product suites that lead with provisioning and CM but may include features such as asset discovery, automated backup, bare-metal boot, self-healing functionality, data synchronization, security, virtualization — both application and hosted virtual desktops (HVD) — or even help desk features. When these features are sold as stand-alone products, revenue is counted in other categories. There are many tools that offer one or more of the functions above, and these are included as well. Some solutions for servers, for instance, offer robust configuration auditing and remediation, and others have more-targeted solutions with deep configuration auditing and reporting to meet a variety of auditing requirements (such as security, regulatory, Payment Card Industry Data Security Standard, “gold” or trusted configuration baselining). This category also contains CM database tools and supporting technology to discover and populate them, which includes IT service dependency mapping tools.
CM is for production systems only. CM is distinct from software configuration management (SWCM), which is used by programmers to manage the change and configuration of development systems. Some SWCM and CM vendors are partnering to provide a linkage between systems. Finally, the CM category does not include vendors that position products primarily as electronic software distribution or as content distribution used in Internet distribution scenarios (B2B or business-to-consumer (B2C)).
Industry:Technology
Configuration auditing tools provide change detection, configuration assessment, and reconciliation of detected changes against approved requests for changes (RFCs) and mitigation. Configuration settings are assessed against company-specific policies, or industry-recognized security configuration assessment templates used for auditing and security hardening. These tools focus on requirements specific to servers or PCs, but some also address network components, applications, databases and virtual infrastructures.
Industry:Technology
1. Any equipment, such as a wire or cable, that can carry an electric current.
2. One wire of a multiwire cable.
Industry:Technology
A way to measure the usage of software licenses. Software can be licensed in one of the following ways: individual (it cannot be shared with other users); site (a limited number of people can use the software); concurrent use (usage is limited to a maximum number of users at a particular time). The software vendor usually sets the guidelines on the type of software license. Monitoring is facilitated by the vendor or by the user. When software usage is measured by the user, the vendor can require a user to supply detailed reports or can rely on the user’s pledge. Enterprises can avoid liability and save money by accurately measuring the number of users.
Industry:Technology