Browse Definitions :
Definition

xenodochial

Xenodochial is an adjective describing something – such as a person, place or software application -- that is friendly to strangers. “Xenos” is a Greek word for “strangers;" according to the Oxford English Dictionary, xenodochial means "hospitable."

In agile software development, any project manager or architect must be xenodochial to be able to deal fairly and reasonably with many different stakeholders and customers. New developers and clients may be incorporated into a project, putting a high premium on the manager's ability to be friendly towards strangers. In a broader context, a xenodochial style of project management is crucial to deal effectively and appropriately with people from different cultural backgrounds and perspectives.

In user interface design, xenodochial is somewhat synonymous with the term “user-friendly.” Public terminals, kiosks and websites should convey information quickly and easily, with a minimal number of clicks or screens and be accessible to users regardless of ability level. Icons and universal symbols are both often used in well-designed interfaces, especially those that may deliver services or information to international travelers.

Operating systems like Unix that depend upon a user's foreknowledge of text commands can be fairly said not to be xenodochial. Linux distributions with a graphical user interface (GUI), by way of contrast, make that open source operating system considerably more xenodochial.

Learn More About IT:
The Agile Coach on InfoQ.com includes xenodochial on his list of A-Z agile methodologies.
David Travis included xenodochial under X in his list of usability terms.

This was last updated in June 2008

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close