Differentiated service

Last updated

Differentiated service is a design pattern for business services and software, in which the service varies automatically according to the identity of the consumer and/or the context in which the service is used. It is sometimes known as smart service or context-aware service.

Contents

Concept

Differentiated service is extensively covered in a few narrow technical areas, such as telecoms networks and internet (see Differentiated services). It is also mentioned in some marketing sources, with reference to customer segmentation. But the general principle of service differentiation extends far beyond these domains, and it is one of the mechanisms for implementing flexibility in a service-oriented architecture (SOA).

Various dimensions of the service can be differentiated, including:

Differentiating factors can include identity (including personalization) and context (including presence).

Examples

See also

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cyber security, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

In marketing, market segmentation is the process of dividing a broad consumer or business market, normally consisting of existing and potential customers, into sub-groups of consumers based on shared characteristics.

Mass customization makes use of flexible computer-aided systems to produce custom products. Such systems combine the low unit costs of mass production processes with the flexibility of individual customization.

Porter's generic strategies describe how a company pursues competitive advantage across its chosen market scope. There are three/four generic strategies, either lower cost, differentiated, or focus. A company chooses to pursue one of two types of competitive advantage, either via lower costs than its competition or by differentiating itself along dimensions valued by customers to command a higher price. A company also chooses one of two types of scope, either focus or industry-wide, offering its product across many market segments. The generic strategy reflects the choices made regarding both the type of competitive advantage and the scope. The concept was described by Michael Porter in 1980.

Context awareness refers, in information and communication technologies, to a capability to take into account the situation of entities, which may be users or devices, but are not limited to those. Location is only the most obvious element of this situation. Narrowly defined for mobile devices, context awareness does thus generalize location awareness. Whereas location may determine how certain processes around a contributing device operate, context may be applied more flexibly with mobile users, especially with users of smart phones. Context awareness originated as a term from ubiquitous computing or as so-called pervasive computing which sought to deal with linking changes in the environment with computer systems, which are otherwise static. The term has also been applied to business theory in relation to contextual application design and business process management issues.

Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.

Yield management is a variable pricing strategy, based on understanding, anticipating and influencing consumer behavior in order to maximize revenue or profits from a fixed, time-limited resource. As a specific, inventory-focused branch of revenue management, yield management involves strategic control of inventory to sell the right product to the right customer at the right time for the right price. This process can result in price discrimination, in which customers consuming identical goods or services are charged different prices. Yield management is a large revenue generator for several major industries; Robert Crandall, former Chairman and CEO of American Airlines, gave yield management its name and has called it "the single most important technical development in transportation management since we entered deregulation."

A service delivery platform (SDP) is a set of components that provides a service(s) delivery architecture for a type of service delivered to consumer, whether it be a customer or other system. Although it is commonly used in the context of telecommunications, it can apply to any system that provides a service. Although the TM Forum (TMF) is working on defining specifications in this area, there is no standard definition of SDP in industry and different players define its components, breadth, and depth in slightly different ways.

The term mobile commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum, to mean "the delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology." Many choose to think of Mobile Commerce as meaning "a retail outlet in your customer’s pocket."

Industrial market segmentation is a scheme for categorizing industrial and business customers to guide strategic and tactical decision-making. Government agencies and industry associations use standardized segmentation schemes for statistical surveys. Most businesses create their own segmentation scheme to meet their particular needs. Industrial market segmentation is important in sales and marketing.

ISO/IEC 27002 is an information security standard published by the International Organization for Standardization (ISO) and by the International Electrotechnical Commission (IEC), titled Information security, cybersecurity and privacy protection — Information security controls.

Micromarketing was first referred to in the UK marketing press in November 1988 in respect of the application of geodemographics to consumer marketing. The subject of micromarketing was developed further in an article in February 1990, which emphasised understanding markets at the local level, and also the personalisation of messages to individual consumers in the context direct marketing. Micromarketing has come to refer to marketing strategies which are variously customised to either local markets, to different market segments, or to the individual customer.

A target market, also known as serviceable obtainable market (SOM), is a group of customers within a business's serviceable available market at which a business aims its marketing efforts and resources. A target market is a subset of the total market for a product or service.

Gigabit Home Networking (G.hn) is a specification for wired home networking that supports speeds up to 2 Gbit/s and operates over four types of legacy wires: telephone wiring, coaxial cables, power lines and plastic optical fiber. Some benefits of a multi-wire standard are lower equipment development costs and lower deployment costs for service providers.

Location awareness refers to devices that can determine their location. Navigational instruments provide location coordinates for vessels and vehicles. Surveying equipment identifies location with respect to a well-known location wireless communications device.

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.

Network intelligence (NI) is a technology that builds on the concepts and capabilities of deep packet inspection (DPI), packet capture and business intelligence (BI). It examines, in real time, IP data packets that cross communications networks by identifying the protocols used and extracting packet content and metadata for rapid analysis of data relationships and communications patterns. Also, sometimes referred to as Network Acceleration or piracy.

Net bias is the counter-principle to net neutrality, which indicates differentiation or discrimination of price and the quality of content or applications on the Internet by ISPs. Similar terms include data discrimination, digital redlining, and network management.

Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. The term has become established to demonstrate the technological and functional differences between traditional information technology (IT) systems and industrial control systems environment, the so-called "IT in the non-carpeted areas".

The zero trust security model, also known as zero trust architecture (ZTA), and sometimes known as perimeterless security, describes an approach to the strategy, design and implementation of IT systems. The main concept behind the zero trust security model is "never trust, always verify," which means that users and devices should not be trusted by default, even if they are connected to a permissioned network such as a corporate LAN and even if they were previously verified. ZTA is implemented by establishing strong identity verification, validating device compliance prior to granting access, and ensuring least privilege access to only explicitly authorized resources. Most modern corporate networks consist of many interconnected zones, cloud services and infrastructure, connections to remote and mobile environments, and connections to non-conventional IT, such as IoT devices. The reasoning for zero trust is that the traditional approach — trusting users and devices within a notional "corporate perimeter", or users and devices connected via a VPN — is not relevant in the complex environment of a corporate network. The zero trust approach advocates mutual authentication, including checking the identity and integrity of users and devices without respect to location, and providing access to applications and services based on the confidence of user and device identity and device health in combination with user authentication. The zero trust architecture has been proposed for use in specific areas such as supply chains.