- Industry: Consulting
- Number of terms: 1807
- Number of blossaries: 2
- Company Profile:
Gartner delivers technology research to global technology business leaders to make informed decisions on key initiatives.
Enhanced messaging service (EMS) uses some features defined in the Short Message Service (SMS) specification to enhance the user experience when sending messages. A thin client is added to the mobile phone and by using standard SMS parameter fields, such as the user data header, binary-encoded and concatenated messages can be sent that display enriched content, such as italicized, emboldened or underlined text, predefined sounds, monophonic tunes and static or animated images.
Industry:Technology
Enhanced e-books refer to books that include supplementary audio, video and features, such as games or puzzles. Enhanced e-books are particularly popular in the categories of children’s books, cooking, travel and the general area of learning. Similar to DVDs with bonus material, the content complements the original text and graphics; unlike most DVDs, enhanced books generally are priced higher than the same content without enhanced features.
Industry:Technology
Part of the 3GPP set of standards and based on GSM and shared media packet data, Enhanced Data Rates for Global Evolution (EDGE) uses a different and more efficient modulation scheme: the eight-phase shift key (8-PSK), rather than the Gaussian minimum shift keying (GMSK) modulation scheme used over the radio interface by GSM and GPRS. This enhanced modulation technique opens up more bandwidth per radio carrier or cell. EDGE supports peak data rates of up to 384 kbps per cell, assuming that all eight time slots are used and that one time slot is not reserved for signaling. As with GPRS, bandwidth is shared by all concurrent users operating in the same cell. EDGE requires higher radio signal quality than that found in an average GSM network before higher data throughput speeds can be reached. EDGE also provides enhanced GRPS capabilities for data using 8-PSK, and when fully integrated with adaptive multirate (AMR), EDGE 2 also provides superior voice capacity to the GSM network.
Industry:Technology
Energy trading and risk management (ETRM) systems involve commercial decision making and market execution using an integrated system that enables data exchanges among trade floor, operations, credit, contract and accounting functions. Integral to the process are event and trade identification/capture, comprehensive risk management strategies/policies, scheduling/nomination/transportation and settlement execution. The process also provides for price transparency, market monitoring, controlled access and regulatory compliance.
Industry:Technology
Energy management systems (EMSs) make up the “central nervous system” of the power transmission network and are the critical governing component of the power grid’s operational reliability. EMSs perform state estimation, contingency analysis and other advanced applications. Operator training applications offer offline study modes and real-time simulations.
Industry:Technology
An endpoint protection platform (EPP) is a solution that converges endpoint device security functionality into a single product that delivers antivirus, anti-spyware, personal firewall, application control and other styles of host intrusion prevention (for example, behavioral blocking) capabilities into a single and cohesive solution. More advanced EPP solutions are starting to integrate with vulnerability, patch and configuration management capabilities for more proactive protection. Beyond fighting malware, modern EPP products are expanding to include data protection features, such as disk and file encryption, data loss prevention, and device control. The majority of the EPP market is focused on PC-type endpoints; however, these solutions increasingly are starting to encompass management and tracking of other mobile devices, such as tablets and smartphones.
Industry:Technology
Encapsulation describes the binding and the hiding of the underlying implementation of an object’s data and operations. The data is wrapped in a particular type of protocol header. The set of operations that is accessible is the object’s interface.
Industry:Technology
Emotion detection is the task of recognizing a person’s emotional state — for example, anger, confusion or deceit across both voice and nonvoice channels. The most common technique analyzes the characteristics of the voice signal, with word use as an additional input, if available.
Industry:Technology
Emerging data protection schemes implement algorithms that deliver a higher mean time between data loss (MTBDL) than redundant array of independent disks (RAID) technology. These schemes take advantage of improvements in microprocessor performance and new algorithms to reduce rebuild times and storage protection overhead, while making protection levels a user-defined option. The availability of ever-larger-capacity disks is making the deployment of these new protection schemes a necessity.
Industry:Technology
Emergent structures describes structures that are unknown or unplanned prior to social interactions, but that emerge and evolve as activity unfolds. Emergent structures may be processes, content categorization, organizational networks and hidden virtual teams. These structures are used to gain a better understanding of the true nature of things to more effectively organize, manage or interact with a community, or to optimize its efforts.
Industry:Technology