Browse Definitions :

Browse Definitions by Alphabet

UNS - UTC

  • unsolicited bulk e-mail - UBE (unsolicited bulk email) is a formal term for spam.
  • unsolicited bulk email - UBE (unsolicited bulk email) is a formal term for spam.
  • unsolicited commercial e-mail - UCE (unsolicited commercial e-mail) is a legal term used to describe an electronic promotional message sent to a consumer without the consumer's prior request or consent.
  • unsolicited commercial email - UCE (unsolicited commercial e-mail) is a legal term used to describe an electronic promotional message sent to a consumer without the consumer's prior request or consent.
  • unsourcing - Unsourcing is the transfer of an organization's customer service and support functions from paid employees to unpaid or low-paid online communities.
  • unstructured data - Unstructured data is information, in many different forms, that doesn't hew to conventional data models and thus typically isn't a good fit for a mainstream relational database.
  • Unstructured Supplementary Service Data - USSD (Unstructured Supplementary Service Data) is a Global System for Mobile(GSM) communication technology that is used to send text between a mobile phone and an application program in the network.
  • unstructured text - The unstructured text collected from social media activities plays a key role in predictive analytics for the enterprise because it is a prime source for sentiment analysis to determine the general attitude of consumers toward a brand or idea.
  • unsupervised learning - Unsupervised learning refers to the use of artificial intelligence (AI) algorithms to identify patterns in data sets containing data points that are neither classified nor labeled.
  • unzipping - Unzipping is the act of extracting the files from a zipped single file or similar file archive.
  • up converter - An HD (high-definition) upconverter, also known as a digital television (DTV) upconverter, is a device that converts the digital data on a DVD to a format that can be viewed directly on a high-definition television (HDTV) receiver without intermediate conversion to an analog signal.
  • up-sell - Up-sell is a marketing term for the practice of suggesting higher priced products or services to a customer who is considering a purchase.
  • upcharge - An upcharge is an additional fee that is added to a bill after a contract has already been negotiated.
  • upconverter - An HD (high-definition) upconverter, also known as a digital television (DTV) upconverter, is a device that converts the digital data on a DVD to a format that can be viewed directly on a high-definition television (HDTV) receiver without intermediate conversion to an analog signal.
  • upcycling - Upcycling is the practice of creating a useable product from waste or unwanted items or adapting an existing product in some way to add value.
  • update sequence number (USN) - An update sequence number (USN) is a 64-bit number in Active Directory that increments time as changes occur.
  • upgrade - In computers, an upgrade is a new version of or addition to a hardware or, more often, software product that is already installed or in use.
  • uplift modeling - Uplift modeling is a type of data analytics that uses predictive modeling to identify individuals who can be positively influenced by a specific outreach effort.
  • uplink - These terms should not be confused with downstream and upstream.
  • uploading - Uploading is the transmission of a file from one computer system to another, usually larger computer system.
  • UPN - In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.
  • UPnP - Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.
  • UpperCamelCase - UpperCamelCase (part of CamelCase) is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized within the new word that forms the name.
  • upright slash - The vertical line, also called the vertical slash or upright slash (|), is used in mathematical notation in place of the expression "such that" or "it is true that.
  • UPS - An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time when the primary power source is lost.
  • upskilling - Upskilling is a workplace trend that facilitates continuous learning by providing training programs and development opportunities that expand an employee's abilities and minimize skill gaps.
  • upstream - This term should not be confused with downlink.
  • uptime - Uptime is a computer industry term for the time during which a computer is operational.
  • uptime and downtime - Uptime is a computer industry term for the time during which a computer is operational.
  • Uptime Institute, Inc. - The Uptime Institute, Inc.
  • Uptime Institute’s data center tier standards - The Uptime Institute’s data center tier standards are a standardized methodology used to determine availability in a facility.
  • urban legend - An urban legend is a tale of contemporary folklore that purports to be true and is often designed to elicit an emotional response from the audience.
  • URI - A URI (Uniform Resource Identifier) is a sequence of characters that identifies a logical or physical resource on a network.
  • URI (Uniform Resource Identifier) - A URI (Uniform Resource Identifier) is a sequence of characters that identifies a logical or physical resource on a network.
  • URL - A URL (Uniform Resource Locator) is the unique address for a resource on the internet that includes the name of the protocol and the IP address used to locate the resource.
  • URL (Uniform Resource Locator) - A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet.
  • URL manipulation - URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).
  • URL manipulation (URL rewriting) - URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).
  • URL poisoning - URL poisoning, also known as location poisoning, is a method of tracking Web user behavior by adding an identification (ID) number to the page address (Uniform Resource Locator) line of the Web browser when a user visits a particular site.
  • URL poisoning (location poisoning) - URL poisoning, also known as location poisoning, is a method of tracking Web user behavior by adding an identification (ID) number to the page address (Uniform Resource Locator) line of the Web browser when a user visits a particular site.
  • URL rewriting - URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).
  • URL shortener - A URL shortener is a Web site that will create a short Uniform Resource Locator (URL) or Web page address from a long one so that the short version, which is easier to remember and enter, can be used instead.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • URN - A URN (Uniform Resource Name) is an Internet resource with a name that, unlike a URL, has persistent significance - that is, the owner of the URN can expect that someone else (or a program) will always be able to find the resource.
  • URN (Uniform Resource Name) - A URN (Uniform Resource Name) is an Internet resource with a name that, unlike a URL, has persistent significance - that is, the owner of the URN can expect that someone else (or a program) will always be able to find the resource.
  • US Department of Commerce purchasing abbreviations and acronyms - Abbreviations used by the United States Department of Commerce.
  • US Department of Health and Human Services (HHS) - The U.S.
  • USA Patriot Act - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • USA Patriot Act - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • usability - Also see human-computer interaction and graphical user interface.
  • usage-based pricing - Usage-based pricing is a consumption-based pricing model in which customers are only charged when they use a product or service.
  • USAPA - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • USART (Universal Synchronous/Asynchronous Receiver/Transmitter) - A USART (Universal Synchronous/Asynchronous Receiver/Transmitter) is a microchip that facilitates communication through a computer's serial port using the RS-232C protocol.
  • USB - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • USB (Universal Serial Bus, USB 3.0, SuperSpeed USB) - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • USB 3 - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB 3 - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • USB 3.0 - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB 3.0 - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • USB 3.0 (SuperSpeed USB) - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB 30 - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB flash drive - A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash memory and can attach to a keychain.
  • USB Killer - USB Killer is a device that connects to USB drives and delivers a surge which can damage or destroy unprotected hardware.
  • USB redirection (Universal Serial Bus redirection) - USB redirection lets end users plug peripheral devices into local USB ports and access them from virtual desktops.
  • USB-C (USB Type C) - USB-C is a connection type standard designed to replace all USB types on the computer and device ends of future USB with a single reversible connector.
  • USB3 - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • use case - A use case is a methodology used in system analysis to identify, clarify, and organize system requirements.
  • use case diagram (UML use case diagram) - A use case diagram is a way to summarize details of a system and the users within that system.
  • Usenet - Usenet is a collection of user-submitted notes or messages on various subjects that are posted to servers on a worldwide network.
  • user acceptance testing - In software development, user acceptance testing (UAT) - also called beta testing, application testing, and end user testing - is a phase of software development in which the software is tested in the "real world" by the intended audience.
  • user acceptance testing (UAT) - In software development, user acceptance testing (UAT)—also called application testing, and end user testing—is a phase of software development in which the software is tested in the "real world" by the intended audience.
  • user account provisioning - User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system.
  • user authentication - User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input.
  • user behavior analytics (UBA) - User behavior analytics (UBA) is a process in which security teams use monitoring tools to track, collect and assess the network activities of all individuals accessing those system to detect potentially malicious activity.
  • User Datagram Protocol - UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss-tolerating connections between applications on the internet.
  • user engagement - User engagement is an assessment of an individual's response to some type of offering, such as a product, a service or a website.
  • user environment management (UEM) - User environment management is a technology designed to allow IT to oversee a user's complete desktop experience, including the profile, any policies IT applies and customizations the user makes.
  • user environment virtualization (UE virtualization) - User environment virtualization is the abstraction of personalized computer settings from their operating system and applications.
  • user exit - In computer software, a user exit is a place in a software program where a customer can arrange for their own tailor-made program to be called.
  • user group - In personal or business computing, a user group is a set of people who have similar interests, goals, or concerns.
  • user input device - A data glove is an interactive device, resembling a glove worn on the hand, which facilitates tactile sensing and fine-motion control in robotics and virtual reality.
  • user installed application - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • user installed application (UIA) - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • user interface - In a computer user interface, a workplace is a personalized view of a company and its processes that builds on the popular desktop metaphor.
  • user interface (UI) - The user interface (UI) is the point of human-computer interaction and communication in a device.
  • user interface redressing - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • User Principal Name - In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.
  • User Principal Name (UPN) - In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.
  • user profile - In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.
  • user script - A user script is programming that modifies the appearance or behavior of an application.
  • user self-provisioning - User self-provisioning, also known as cloud self-service, is a system that allows end users to set up and launch applications and services in a cloud computing environment without the direct intervention of an IT organization or a service provider.
  • user session (visit) - In tabulating statistics for Web site usage, a user session (sometime referred to as a visit) is the presence of a user with a specific IP address who has not visited the site recently (typically, anytime within the past 30 minutes).
  • user story - A user story is a tool used in Agile development to capture a description of a software feature from an end-user perspective.
  • user-generated content (UGC) - User-generated content (UGC) is the words and photos that unpaid contributors create and provide to publications, particularly Web properties.
  • user-interface redressing - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • USGCB (United States Government Configuration Baseline) - The United States Government Configuration Baseline, or USGCB, is a government-wide initiative that provides guidance on information security configuration best practices for IT products leveraged by federal agencies.
  • USSD - USSD (Unstructured Supplementary Service Data) is a Global System for Mobile(GSM) communication technology that is used to send text between a mobile phone and an application program in the network.
  • USSD (Unstructured Supplementary Service Data) - USSD (Unstructured Supplementary Service Data) is a GSM (Global System for Mobile) communications protocol that is used to send text messages.
  • Ustream - Ustream is an online video service provider that enables anybody with a camera and Internet connection to conduct a live interactive video broadcast to a global audience from anywhere in the world.
  • UTC - Coordinated Universal Time (abbreviated as UTC, and therefore often spelled out as Universal Time Coordinated and sometimes as Universal Coordinated Time) is the standard time common to every place in the world.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close