upload
Gartner, Inc.
Industry: Consulting
Number of terms: 1807
Number of blossaries: 2
Company Profile:
Gartner delivers technology research to global technology business leaders to make informed decisions on key initiatives.
IP Multimedia Subsystem (IMS) is a standardized, open architecture based on SIP and the Diameter authentication, authorization and accounting (AAA) protocol. IMS defines how applications and services are delivered to customers, regardless of which network they run on. It separates session control from the actual applications for maximum flexibility, and can be used for centralized user profiles. It helps carriers to control sessions and provides the ability to charge for applications. In addition to voice switching, control and applications carriers are also deploying data and video control layers, and IMS multimedia. They are also building more nimble and agnostic service layers with architectures such as NG service delivery platforms (SDPs). This area includes, for example, deployments of IP television (IPTV) and video overlays, as well as service enablers such as presence, instant messaging (IM)/chat, third-party exposure and application stores. The area is often associated with Telco 2.0.
Industry:Technology
Next-generation application delivery architecture. In the IMS architecture, applications can be created, controlled and changed, regardless of the kind of network or platform on which they run. IMS promises to bring flexibility, operational effectiveness, openness and standardization to the delivery of applications across fixed and mobile networks. It specifies a Session Initiation Protocol (SIP)-based control layer, with open interfaces to the transport and services layers above, and has a centralized end-user profile depository. IMS is aimed at bringing improved interoperability among networks and offers carriers control over applications on a per-session basis for increased flexibility. There are three logical elements within the IMS architecture: the session control layer, the interworking or gateway layer and the application layer.
Industry:Technology
A line that terminates with an IP phone or voice endpoint that was shipped, installed, and in use and attached to an IP-enabled PBX or IP-PBX phone system.
Industry:Technology
IP datacasting uses DVB-H technology to transmit digital multimedia data to mobile devices in the form of IP datagrams. Content can be optimized for mobile handsets by adapting it to their small screens.
Industry:Technology
IP Centrex platforms offer a broad range of PBX replacement and new services. These products typically work with a variety of end-user devices and interfaces, including analog and digital phones, IP desktop phones, PDAs and mobile phones, all of which are widely used in enterprises. These platforms offer a wide variety of enhanced features, such as: unified messaging (including visual voice mail); click to talk; enhanced find-me/follow-me capabilities; Microsoft Outlook integration, with “click to call” features; the ability to return calls and voice mail from a browser; Web-based call management to monitor and control service features and capabilities; automatic call distribution capabilities; selective call acceptance; collaborative applications; presence management; and instant messaging.
Industry:Technology
A unique number assigned by an Internet authority that identifies a computer on the Internet. The number consists of four groups of numbers between 0 and 255, separated by periods (dots). For example, 195.112.56.75 is an IP address.
Industry:Technology
A unique number assigned by an Internet authority that identifies a computer on the Internet. The number consists of four groups of numbers between 0 and 255, separated by periods (dots). For example, 195.112.56.75 is an IP address.
Industry:Technology
Introspection is the use of hypervisor- and virtual machine monitor (VMM)-level APIs to expose low-level system information from all virtual machines (VMs) hosted by the VMM. The APIs can enable security and management capabilities that span multiple VMs without requiring the installation of an agent on each, without requiring virtual network reconfiguration and with potentially better performance than agents running in a separate VM. Introspection also provides separation of the security policy enforcement from the container it is protecting.
Industry:Technology
A network internal to an enterprise that uses the same methodology and techniques as the Internet. It is not necessarily connected to the Internet and is commonly secured from it using firewalls. Intranets often use an organization’s local-area networks (LANs) or wide-area networks (WANs). Services include websites, collaboration, workflow and messaging services, and application development.
Industry:Technology
Interoperable storage encryption improves OS/application independent standardized cryptography and key management by embedding these technologies in the controllers of self-encrypting drives (SEDs). SEDs simplify secure large-scale drive imaging, migration and end-of-life sanitation. Seagate introduced proprietary SEDs in the mid-2000s using DriveTrust Technology. In 2009, the Trusted Computing Group (TCG) released open specifications for drives, arrays and storage interfaces. All major mass storage manufacturers support the TCG model.
Industry:Technology