Browse Definitions :
Definition

context awareness

Contributor(s): Ivy Wigmore

Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly. Contextual or context-aware computing uses software and hardware to automatically collect and analyze data to guide responses.

Context includes any information that’s relevant to a given entity, such as a person, a device or an application. As such, contextual information falls into a wide range of categories including time, location, device, identity, user, role, privilege level, activity, task, process and nearby devices/users.

Web browsers, cameras, microphones and Global Positioning Satellite (GPS) receivers and sensors are all potential sources of data for context-aware computing. A context-aware system may gather data through these and other sources and respond according to pre-established rules or through computational intelligence. Such a system may also base responses on assumptions about context.  For user applications, context awareness can guide services and enable enhanced experiences including augmented reality, context-relevant information delivery and contextual marketing messages.

Although often defined as a property of mobile devices used to present relevant, actionable information to the end user, context awareness is also a technological driver for M2M (machine to machine) and Internet of Things (IoT), ubiquitous computing and event-driven computing environments.

This was last updated in May 2016

Continue Reading About context awareness

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Considering that the context awareness is based on the data gathering - privacy? security? - how far is it safe to go?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close