Browse Definitions :
Definition

context awareness

Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly. Contextual or context-aware computing uses software and hardware to automatically collect and analyze data to guide responses.

Context includes any information that’s relevant to a given entity, such as a person, a device or an application. As such, contextual information falls into a wide range of categories including time, location, device, identity, user, role, privilege level, activity, task, process and nearby devices/users.

Web browsers, cameras, microphones and Global Positioning Satellite (GPS) receivers and sensors are all potential sources of data for context-aware computing. A context-aware system may gather data through these and other sources and respond according to pre-established rules or through computational intelligence. Such a system may also base responses on assumptions about context.  For user applications, context awareness can guide services and enable enhanced experiences including augmented reality, context-relevant information delivery and contextual marketing messages.

Although often defined as a property of mobile devices used to present relevant, actionable information to the end user, context awareness is also a technological driver for M2M (machine to machine) and Internet of Things (IoT), ubiquitous computing and event-driven computing environments.

This was last updated in May 2016

Continue Reading About context awareness

SearchNetworking
  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of ...

  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

SearchSecurity
  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close