2,925 Results found   |   Page 1 of 147

Gartner client? Log in for personalized search results.

Gartner Information Technology (IT) Glossary - A comprehensive dictionary of Information Technology (IT) terms and definitions. Learn the key terminology related to the Information Technology (IT) industry with this glossary.
Gartner Sales Glossary - A comprehensive dictionary of sales terms and definitions. Learn the key terminology related to the sales industry with this glossary.
... Gartner Webinars Expert insights and strategies to address your priorities and solve your most pressing challenges. ...
... Optimize your spend and reduce risk with BuySmart™, which allows you to systematically discover, evaluate and select technology vendors — all in service of better, data-driven decisions. Want to learn more? Read: A Step-by-Step Guide to Enterprise Technology Buying Read: How to Evaluate Technology Ve ...
... Data mesh is a cultural and organizational shift for data management focusing on federation technology that emphasizes the authority of localized data management. Data mesh is intended to enable easily accessible data by the business. Data assets are analyzed for usage patterns by subject matter exp ...
... A data fabric is an emerging data management design for attaining flexible, reusable and augmented data integration pipelines, services and semantics. A data fabric supports both operational and analytics use cases delivered across multiple deployment and orchestration platforms and processes. Data ...
... Marketing technology (martech) is a set of integrated technologies that enables marketing capabilities, such as efficiently and effectively targeting, acquiring and retaining customers. Want to learn more? Learn: What Role Does Marketing Technology Play in Your Digital Marketing Strategy? Read: A Ste ...
... Secure access service edge (SASE) delivers converged network and security as a service capabilities, including SD-WAN, SWG, CASB, NGFW and zero trust network access (ZTNA). SASE supports branch office, remote worker and on-premises secure access use cases. SASE is primarily delivered as a service an ...
... OpenTelemetry is a collection of specifications, tools, APIs and SDKs that describe and support the implementation of an open-source instrumentation and observability framework for software. The initiative, curated by the Cloud Native Computing Foundation (CNCF), defines three flavors of telemetry — ...
... AI trust, risk and security management (AI TRiSM) ensures AI model governance, trustworthiness, fairness, reliability, robustness, efficacy and data protection. This includes solutions and techniques for model interpretability and explainability, AI data protection, model operations and adversarial ...
... The digital immune system (DIS) approach includes practices and technologies for software design, development, automation, operation and analytics, and uses these to create a superior user experience and to reduce system failures that impact business performance. DISs interlink practices from the ar ...
... Adaptive AI systems support a decision-making framework centered around making faster decisions while remaining flexible to adjust as issues arise. These systems aim to continuously learn based on new data at runtime to adapt more quickly to changes in real-world circumstances. The AI engineering fr ...
... Cloud-native refers to something created to optimally leverage or implement cloud characteristics. Those cloud characteristics are part of the original definition of cloud computing, and include capabilities delivered as a service. Cloud computing characteristics also include scalable and elastic, s ...
... A metaverse is a collective virtual 3D shared space, created by the convergence of virtually enhanced physical and digital reality. A metaverse is persistent, providing enhanced immersive experiences. Gartner expects that a complete metaverse will be device-independent, and will not be owned by a si ...
... Malware is "malicious software" specifically designed to cause damage and disruption to computer systems and devices. To combat the many potential malware threats - viruses, worms, Trojan horses, ransomware, spyware, adware, bots - security and risk management professionals deploy a variety of strat ...
... A superapp is an app that provides end-users (customers, partners or employees) with a set of core features plus access to independently created mini-apps. The superapp is built as a platform to deliver a mini-apps ecosystem that users can choose from to activate for consistent and personalized app ...
... Data modeling is a family of techniques used to describe the kinds of information that are important to an enterprise. Formal data modeling originally emerged to meet the demands of database designers. Want to learn more? Read: Everything You Need to Know About Data and Analytics Download: IT Roadmap ...
... Security service edge (SSE) secures access to the web, cloud services and private applications. Capabilities include access control, threat protection, data security, security monitoring, and acceptable-use control enforced by network-based and API-based integration. SSE is primarily delivered as a ...
... “Chief data and analytics officer” (CDAO) refers to the business leadership role that has the primary enterprise accountability for value creation by means of the organization’s data and analytics assets, as well as the data and analytics ecosystem. Equivalent titles for this role are chief data off ...
... Identity and Access Management (IAM) is a security and business discipline that includes multiple technologies and business processes to help the right people or machines to access the right assets at the right time for the right reasons, while keeping unauthorized access and fraud at bay. Explore o ...
of 147
BuySmart™

... Optimize your spend and reduce risk with BuySmart™, which allows you to systematically discover, evaluate and select technology vendors — all in service of better, data-driven decisions. Want to learn more? Read: A Step-by-Step Guide to Enterprise Technology Buying Read: How to Evaluate Technology Ve ... Gartner Glossary

Access More

Speak with a Gartner specialist to learn how you can access peer and practitioner research backed by proprietary data, insights, advice and tools to help you achieve stronger performance.