- Industry: Consulting
- Number of terms: 1807
- Number of blossaries: 2
- Company Profile:
Gartner delivers technology research to global technology business leaders to make informed decisions on key initiatives.
Ability of a mobile user to access cellular services while away from the home network. This includes automated roaming between GSM networks, SIM-based roaming, where a user switches the SIM card into a mobile phone from a different network, or roaming across technologies (for example, between a WCDMA network and the GSM network of another operator). Roaming can take place within one country and across national boundaries. In a WLAN context, roaming occurs when a mobile device disassociates from one access point and then re-associates with a new access point.
Industry:Technology
Risk-Adjusted Value Management (RVM) is a Gartner methodology that significantly reduces the time and improves the quality of strategic planning and execution.
Industry:Technology
Gartner defines risk management and compliance consulting services as the bundle of expert-driven consulting services directed at assisting enterprises to identify, manage and mitigate IT and enterprise compliance risk. Although there are myriad types of risk and compliance in the life of an enterprise, we focus on risk and compliance advisory services directly affecting or influencing IT.
Industry:Technology
Gartner views rich Internet application (RIA) platforms as a composite construct, referring to technologies that enable organizations to build applications that provide a rich, responsive user experience. The term “RIA platform” is not consistently used in the industry. Gartner uses it in the broadest scope to aggregate multiple approaches and technologies into one overall concept that spans the JavaScript-enhanced browser, plug-in-enhanced browser and HTML5-powered browser, as well as outside-the-browser subcategories.
Industry:Technology
Rich Communication Suite (RCS) is a Global System for Mobile Communications Association (GSMA) initiative, aiming to develop specifications for Rich Communication Services. These include “enhanced” instant messaging, video calling and the ability to share documents and photos simultaneously during calls and service discovery. All services can be accessed from a subscriber’s contact list. RCS services will be available across any network and any device. Specifications have been defined and developed to date in five phases and/or releases.
Industry:Technology
RFID tags are generally small devices that respond to an RFID reader’s interrogation via radio frequency. Tags vary in terms of memory, the range over which they can be read, the level of read and write capabilities, and the availability of other computational functions. The tag can hold just a product’s serial number all the way up to a mass of information about the product and its history.
Passive RFID: A passive RFID tag has no battery. It harvests all its power from the radio interrogation of the RFID reader, including enough power to respond. This yields fairly low-cost devices, but they can be read only at a fairly short range (about 20 feet in the best operating conditions).
Active RFID: Active tags have batteries attached to them so that they can respond to a reader with more power. They are much more expensive than passive tags but have a much-greater range (up to 300 feet).
Smart Cards: Contactless smart cards are often referred to as RFID tags. From a technical perspective, they are just a specially packaged form of RFID tags.
Sensors: RFID tags don’t tell you anything about their environment. They can only tell you what is in the memory of the tag. However, a common application of RFID is to attach the tag to a sensor that can fill the tag’s memory with data. This is then communicated to other systems through RFID protocols. The sensory technology, while intertwined with RFID, is independent.
Industry:Technology
An RFID reader is a radio frequency device that emits a signal through an antenna. This signal is received by RFID tags that respond to interrogation by the reader. Responses are read by the reader, and through a variety of protocols the reader can communicate with all the RFID tags in its field. Readers generally take three forms. Portal readers are fixed in one location; RFID tags pass through them and communicate with the reader. Handheld readers are portable devices that can communicate with RFID tags. Mounted readers are a special type, placed on mobile equipment such as forklifts and cranes. They often communicate with tags in fixed locations.
Industry:Technology
Revenue assurance is the application of a process or software solution that enables a communications service provider (CSP) to accurately capture revenue for all services rendered. Instead of correcting errors after they occur, or not detecting and correcting them at all, revenue assurance enables the CSP to examine and plug dozens of actual or potential leakage points throughout the network and customer-facing systems, and to correct data before it reaches the billing system. The distinctions between revenue assurance and other disciplines are often blurred. Revenue assurance sometimes extends into areas such as network assurance, service assurance, business assurance, risk management and fraud management.
Industry:Technology
Revenue consists of the gross billings generated by a vendor, measured in unit currency.
Industry:Technology
An application development methodology that catalogs and makes available application components so that they may be incorporated into other applications.
Industry:Technology