Browse Definitions :
Definition

predictive text

Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field. Predictions are based on the context of other words in the message and the first letters typed. Because the end user simply taps on a word instead of typing it it out on a soft keyboard, predictive text can significantly speed up the input process. 

Apple has included a predictive text bar feature called QuickType in the iOS 8 release. QuickType has a machine learning component that allows the software to build custom dictionaries. This allows the software to remember such things as whether or not the end user uses slang when communicating with specific people and adjust its text predictions accordingly. Android introduced a predictive text bar with its release of Jelly Bean 4.1 in 2012.

One of the earliest applications for predictive text was T9 (text on 9 keys). T9 made typing on mobile phones and other small devices easier than multi-tapping, which required the user to tap numbers up to four times to register letter characters. T9 improved the user experience by associating groups of letters on each phone key with words in a dictionary. Software in the device correlated sequences of key presses with words in the dictionary and prioritized predictions by frequency of use.

Although predictive text technologies are becoming increasingly sophisticated, the software is still notoriously error-prone. Erroneous predictive text input on Apple devices is sometimes referred to as the Cupertino effect. The name was inspired by the way early spell checkers would change the word cooperation to Cupertino, which just happens to be the city in California where Apple has its corporate headquarters.

This was last updated in September 2014

Continue Reading About predictive text

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

  • Malware quiz: Test your knowledge of types and terms

    Malware trends are constantly evolving, but older techniques are still often used in cyber attacks today. Test your knowledge of ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

  • continuous data protection

    Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data ...

Close