- Industri: Consulting
- Number of terms: 1807
- Number of blossaries: 2
- Company Profile:
Gartner delivers technology research to global technology business leaders to make informed decisions on key initiatives.
Most systems include a processor-check capability that allows the controlling computer to test itself and the rest of the system. If a fault is found, an alarm light is lit and a message is given on the system printer teletype, if one is provided. This feature also expedites service since the computer can pinpoint faulty equipment, saving diagnostic time.
Industry:Technology
Self-service business intelligence is defined here as end users designing and deploying their own reports and analyses within an approved and supported architecture and tools portfolio.
Industry:Technology
A group of instructions capable of assigning blocks of memory as they are needed.
Industry:Technology
A message that contains data as well as the metadata that describes the format and the meaning (i.e., the syntax and the semantics) of that data. For example, Extensible Markup Language (XML) is a self-describing message format that consists of tag/value pairs.
Industry:Technology
Gartner defines selective sourcing when an internal IT organization decouples or carves up the scope of business or IT processes for purposes of individually or selectively sourcing each component separately and distinctly. The main business driver is to determine the best risk-reward combination for each individual scope of work. Most often, this is done to allow for extensive competition to achieve the highest-quality performance at the best price point. The overall role of overseeing (program management) and managing the delivery, risk and overall legal compliance across the entire scope of services across all the individual components lies with the internal IT organization.
Industry:Technology
This category includes security information and event management software products providing:
Security event management — The ability to process near-real-time data from security devices and systems to determine when security events of interest have occurred
Security information management — Reporting and historical analysis to support security policy compliance management and the generation of security metrics
Industry:Technology
Security information and event management (SIEM) technology supports threat detection and security incident response through the real-time collection and historical analysis of security events from a wide variety of event and contextual data sources. It also supports compliance reporting and incident investigation through analysis of historical data from these sources. The core capabilities of SIEM technology are a broad scope of event collection and the ability to correlate and analyze events across disparate sources.
Industry:Technology
Secure Web gateway solutions protect Web-surfing PCs from infection and enforce company policies. A secure Web gateway is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. These gateways must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly included.
Industry:Technology