Browse Definitions :
Definition

vCard

A vCard is an electronic business (or personal) card and also the name of an industry specification for the kind of communication exchange that is done on business or personal cards. You may have seen a vCard attached to an e-mail note someone has sent you. Because vCard is a published industry specification, software application developers can create programs that process vCards by letting you view them, or drag-and-drop them to an address book or some other application. vCards can include images and sound as well as text.

vCard was developed by a consortium founded by Apple, AT&T, IBM, and Siemens, which turned the specification over to an industry group, the Internet Mail Consortium (IMC) in 1996. The vCard specification makes use of the "person" object defined by the CCITT X.500 Series Recommendation for Directory Services and can be considered an extension of it. A vCard contains a name, address information, date and time, and optionally photographs, company logos, sound clips, and geo-positioning information.

To open (look at) a vCard that someone has attached to an e-mail note, your e-mail program needs to support vCards and not all such programs do yet. However, if you have an online address book or personal information manager that supports vCards, you can move it to that program for viewing or for addition to that program's database. (If you can't open a vCard you've received, remember that its information may be repeated elsewhere in the note. It's basically just a business card.)

A promising future use of a vCard will be as a way to quickly fill in application forms on the Web. Just drag-and-drop your own vCard to the form and you won't have so many blanks to fill in. For software developers, there is a Personal Data Interchange (PDI) Software Development Kit (SDK). The specification is located at the Internet Mail Consortium's Web site where you can also find out about vCalendar , a similar exchange standard for personal time scheduling.

This was last updated in April 2005
SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close