Browse Definitions :

Browse Definitions by Alphabet

UNL - USE

  • Unlicensed Mobile Access - The Generic Access Network (GAN) is an evolving wireless communications system in which mobile phone sets function seamlessly between local area networks (LANs) and wide-area networks (WANs).
  • unlocked cell phone - An unlocked cell phone is a cellular telephone handset that can be used with more than one service provider, making it easy for a user to switch from one cellular network to another.
  • Unmanned Systems Technology (UST) - Unmanned Systems Technology (UST) is the software and hardware systems that drive semi- and fully-autonomous vehicles.
  • unobtainium - Unobtainium is a term used to refer to a material that cannot be accessed.
  • Unshielded Twisted Pair (UTP) - Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).
  • unsolicited bulk e-mail - UBE (unsolicited bulk email) is a formal term for spam.
  • unsolicited bulk email - UBE (unsolicited bulk email) is a formal term for spam.
  • unsolicited commercial e-mail - UCE (unsolicited commercial e-mail) is a legal term used to describe an electronic promotional message sent to a consumer without the consumer's prior request or consent.
  • unsolicited commercial email - UCE (unsolicited commercial e-mail) is a legal term used to describe an electronic promotional message sent to a consumer without the consumer's prior request or consent.
  • unsourcing - Unsourcing is the transfer of an organization's customer service and support functions from paid employees to unpaid or low-paid online communities.
  • unstructured data - Unstructured data is information, in many different forms, that doesn't hew to conventional data models and thus typically isn't a good fit for a mainstream relational database.
  • Unstructured Supplementary Service Data - USSD (Unstructured Supplementary Service Data) is a Global System for Mobile(GSM) communication technology that is used to send text between a mobile phone and an application program in the network.
  • unstructured text - The unstructured text collected from social media activities plays a key role in predictive analytics for the enterprise because it is a prime source for sentiment analysis to determine the general attitude of consumers toward a brand or idea.
  • unsupervised learning - Unsupervised learning is the training of an artificial intelligence (AI) algorithm using information that is neither classified nor labeled and allowing the algorithm to act on that information without guidance.
  • unzipping - Unzipping is the act of extracting the files from a zipped single file or similar file archive.
  • up converter - An HD (high-definition) upconverter, also known as a digital television (DTV) upconverter, is a device that converts the digital data on a DVD to a format that can be viewed directly on a high-definition television (HDTV) receiver without intermediate conversion to an analog signal.
  • up-sell - Up-sell is a marketing term for the practice of suggesting higher priced products or services to a customer who is considering a purchase.
  • upcharge - An upcharge is an additional fee that is added to a bill after a contract has already been negotiated.
  • upconverter - An HD (high-definition) upconverter, also known as a digital television (DTV) upconverter, is a device that converts the digital data on a DVD to a format that can be viewed directly on a high-definition television (HDTV) receiver without intermediate conversion to an analog signal.
  • upcycling - Upcycling is the practice of creating a useable product from waste or unwanted items or adapting an existing product in some way to add value.
  • update sequence number (USN) - An update sequence number (USN) is a 64-bit number in Active Directory that increments time as changes occur.
  • upgrade - In computers, an upgrade is a new version of or addition to a hardware or, more often, software product that is already installed or in use.
  • uplift modeling - Uplift modeling is a type of data analytics that uses predictive modeling to identify individuals who can be positively influenced by a specific outreach effort.
  • uplink - These terms should not be confused with downstream and upstream.
  • uploading - Uploading is the transmission of a file from one computer system to another, usually larger computer system.
  • UPM - Federated presence management (FPM), also called unified presence management, is a technology that allows device users to control all aspects of their communications with other users, regardless of the make or platform of the devices.
  • UPN - In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.
  • UPnP - Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.
  • UpperCamelCase - UpperCamelCase (part of CamelCase) is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized within the new word that forms the name.
  • upright slash - The vertical line, also called the vertical slash or upright slash (|), is used in mathematical notation in place of the expression "such that" or "it is true that.
  • UPS - An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time when the primary power source is lost.
  • upskilling - Upskilling is a workplace trend that facilitates continuous learning by providing training programs and development opportunities that expand an employee's abilities and minimize skill gaps.
  • upstream - This term should not be confused with downlink.
  • uptime - Uptime is a computer industry term for the time during which a computer is operational.
  • uptime and downtime - Uptime is a computer industry term for the time during which a computer is operational.
  • Uptime Institute, Inc. - The Uptime Institute, Inc.
  • Uptime Institute’s data center tier standards - The Uptime Institute’s data center tier standards are a standardized methodology used to determine availability in a facility.
  • urban legend - An urban legend is a tale of contemporary folklore that purports to be true and is often designed to elicit an emotional response from the audience.
  • URI - A URI (Uniform Resource Identifier) is a sequence of characters that identifies a logical or physical resource on a network.
  • URI (Uniform Resource Identifier) - A URI (Uniform Resource Identifier) is a sequence of characters that identifies a logical or physical resource on a network.
  • URL - A URL (Uniform Resource Locator) is the unique address for a resource on the internet that includes the name of the protocol and the IP address used to locate the resource.
  • URL (Uniform Resource Locator) - A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet.
  • URL manipulation - URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).
  • URL manipulation (URL rewriting) - URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).
  • URL poisoning - URL poisoning, also known as location poisoning, is a method of tracking Web user behavior by adding an identification (ID) number to the page address (Uniform Resource Locator) line of the Web browser when a user visits a particular site.
  • URL poisoning (location poisoning) - URL poisoning, also known as location poisoning, is a method of tracking Web user behavior by adding an identification (ID) number to the page address (Uniform Resource Locator) line of the Web browser when a user visits a particular site.
  • URL rewriting - URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).
  • URL shortener - A URL shortener is a Web site that will create a short Uniform Resource Locator (URL) or Web page address from a long one so that the short version, which is easier to remember and enter, can be used instead.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • URN - A URN (Uniform Resource Name) is an Internet resource with a name that, unlike a URL, has persistent significance - that is, the owner of the URN can expect that someone else (or a program) will always be able to find the resource.
  • URN (Uniform Resource Name) - A URN (Uniform Resource Name) is an Internet resource with a name that, unlike a URL, has persistent significance - that is, the owner of the URN can expect that someone else (or a program) will always be able to find the resource.
  • US Department of Commerce purchasing abbreviations and acronyms - Abbreviations used by the United States Department of Commerce.
  • US Department of Health and Human Services (HHS) - The U.S.
  • USA Patriot Act - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • USA Patriot Act - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • usability - Also see human-computer interaction and graphical user interface.
  • usage-based pricing - Usage-based pricing is a consumption-based pricing model in which customers are only charged when they use a product or service.
  • USAPA - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • USART (Universal Synchronous/Asynchronous Receiver/Transmitter) - A USART (Universal Synchronous/Asynchronous Receiver/Transmitter) is a microchip that facilitates communication through a computer's serial port using the RS-232C protocol.
  • USB - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • USB (Universal Serial Bus, USB 3.0, SuperSpeed USB) - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • USB 3 - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB 3 - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • USB 3.0 - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB 3.0 - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • USB 3.0 (SuperSpeed USB) - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB 30 - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB flash drive - A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash memory and can attach to a keychain.
  • USB Killer - USB Killer is a device that connects to USB drives and delivers a surge which can damage or destroy unprotected hardware.
  • USB redirection (Universal Serial Bus redirection) - USB redirection lets end users plug peripheral devices into local USB ports and access them from virtual desktops.
  • USB-C (USB Type C) - USB-C is a connection type standard designed to replace all USB types on the computer and device ends of future USB with a single reversible connector.
  • USB3 - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • use case - A use case is a methodology used in system analysis to identify, clarify, and organize system requirements.
  • use case diagram (UML use case diagram) - A use case is a methodology used in system analysis to identify, clarify, and organize system requirements; a use case diagram is a graphic depiction of the interactions among the elements of a system.
  • Usenet - Usenet is a collection of user-submitted notes or messages on various subjects that are posted to servers on a worldwide network.
  • user acceptance testing - In software development, user acceptance testing (UAT) - also called beta testing, application testing, and end user testing - is a phase of software development in which the software is tested in the "real world" by the intended audience.
  • user acceptance testing (UAT) - In software development, user acceptance testing (UAT)—also called application testing, and end user testing—is a phase of software development in which the software is tested in the "real world" by the intended audience.
  • user account provisioning - User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system.
  • user authentication - User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input.
  • user behavior analytics (UBA) - User behavior analytics (UBA) is a process in which security teams use monitoring tools to track, collect and assess the network activities of all individuals accessing those system to detect potentially malicious activity.
  • User Datagram Protocol - UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss-tolerating connections between applications on the internet.
  • user engagement - User engagement is an assessment of an individual's response to some type of offering, such as a product, a service or a website.
  • user environment management (UEM) - User environment management is a technology designed to allow IT to oversee a user's complete desktop experience, including the profile, any policies IT applies and customizations the user makes.
  • user environment virtualization (UE virtualization) - User environment virtualization is the abstraction of personalized computer settings from their operating system and applications.
  • user exit - In computer software, a user exit is a place in a software program where a customer can arrange for their own tailor-made program to be called.
  • user group - In personal or business computing, a user group is a set of people who have similar interests, goals, or concerns.
  • user input device - A data glove is an interactive device, resembling a glove worn on the hand, which facilitates tactile sensing and fine-motion control in robotics and virtual reality.
  • user installed application - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • user installed application (UIA) - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • user interface - In a computer user interface, a workplace is a personalized view of a company and its processes that builds on the popular desktop metaphor.
  • user interface (UI) - The user interface (UI) is the point of human-computer interaction and communication in a device.
  • user interface redressing - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • User Principal Name - In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.
  • User Principal Name (UPN) - In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.
  • user profile - In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.
  • user script - A user script is programming that modifies the appearance or behavior of an application.
  • user self-provisioning - User self-provisioning, also known as cloud self-service, is a system that allows end users to set up and launch applications and services in a cloud computing environment without the direct intervention of an IT organization or a service provider.
  • user session (visit) - In tabulating statistics for Web site usage, a user session (sometime referred to as a visit) is the presence of a user with a specific IP address who has not visited the site recently (typically, anytime within the past 30 minutes).
  • user story - A user story is a tool used in Agile development to capture a description of a software feature from an end-user perspective.
  • user-generated content (UGC) - User-generated content (UGC) is the words and photos that unpaid contributors create and provide to publications, particularly Web properties.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close