- Industry: Consulting
- Number of terms: 1807
- Number of blossaries: 2
- Company Profile:
Gartner delivers technology research to global technology business leaders to make informed decisions on key initiatives.
Channel integration refers to strategies aimed at consolidating — either physically or logically — customer information and its use to provide an all-encompassing view of the customer.
Industry:Technology
Channel capacity is an expression of the maximum data traffic that can be handled by the channel.
Industry:Technology
A channel bank is the equipment typically used in a telephone central office that performs multiplexing of lower-speed, digital channels into a higher-speed composite channel. The channel bank also detects and transmits signaling information for each channel and transmits framing information so that time slots allocated to each channel can be identified by the receiver.
Industry:Technology
A superset of Web analytics, channel analytics are not restricted to Web channels, but include direct mail, the customer contact center, mass media, store or branch locations, and all other distribution or customer-contact channels. The different elements of business — for example, payment and shipment processes, and customer support and authentication — need to be measured and analyzed. Channel analytics examine costs, usage, efficiency, integrity, integration with other systems and the value of each channel, separately and in relation to each other.
Industry:Technology
Change management is the automated support for development, rollout and maintenance of system components (i.e., intelligent regeneration, package versioning, state control, library control, configuration management, turnover management and distributed impact sensitivity reporting).
Industry:Technology
An information technology certification by the Network Professional Association (NPA) requiring two years of experience, two vendor certifications and a passing grade on the core fundamentals exam.
Industry:Technology
A certification program administered by the International Information Systems Security Certification Consortium (ISC2).
Industry:Technology
A document defining all the operational practices that will be used to maintain the required level of public-key infrastructure (PKI) security. To prove that issued certificates are valid, an enterprise must demonstrate (usually through an audit) adherence to its CPS. The Internet Engineering Task Force’s (IETF’s) request for comment (RFC) 2527 contains draft guidelines for the format and content of a CPS.
Industry:Technology
Also known as a “certificate authority,” a certification authority (CA) is an internal or third-party entity that creates, signs and revokes digital certificates that bind public keys to user identities. A repository or directory stores digital certificates and certificate revocation lists (CRLs) to allow users to obtain the public keys of other users and determine revocation status. Typically, the repository is a traditional X.500 directory or a database that supports Lightweight Directory Access Protocol (LDAP).
Industry:Technology
A “hot lists” that identifies certificates that have been withdrawn, canceled or compromised or that should not be trusted because of other identified reasons. CRLs should be replicated to all subscribing servers to a specific root certification authority.
Industry:Technology