Browse Definitions :
Definition

UIML (User Interface Markup Language)

UIML (User Interface Markup Language) is a descriptive language that lets you create a Web page that can be sent to any kind of interface device - for example, to a PC with a large display and a keyboard or to a "smart phone" with a tiny display and no keyboard. The advantage of UIML is that Web content can be created once without understanding the existing and future device types to which the content will be sent. A content developer uses the markup language (sometimes referred to as a set of tags) to describe user interface elements such as input boxes, text messages, menus, and buttons. A programmer can then write applications that use the UIML page to generate a page appropriate to each device type, such as a PC, smart phone, or voice output device, to which the content may need to be sent.

UIML is an application of the Extensible Markup Language (XML). One can think of it as the XML description that describes the data structure (names of fields or elements) of a user interface. A given UIML file also describes the specific content (text, names of images, and so forth) in those fields or elements. UIML also allows you to describe possible user input events and resulting actions. The markup is described in the UIML Specification, which also includes the formal XML document type definition (DTD) for UIML. Since UIML requires the specification of user interface elements (often called widgets) in terms of names used by specific language development tool kits (for example, Java AWT or Microsoft Foundation Classes - MFCL), you need to identify the specific toolkit and know the names for various elements and their properties that are used by the toolkit.

Harmonia, the software company where UIML was developed, has published it as an open source language and plans to submit it to a standards organization after comments have been received on version 2.0.

This was last updated in April 2005

Continue Reading About UIML (User Interface Markup Language)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close