Browse Definitions :

Browse Definitions by Alphabet

UTF - UXG

  • UTF 16 - UTF-16 (16- bit Unicode Transformation Format) is a standard method of encoding Unicode character data.
  • UTF-16 - UTF-16 (16- bit Unicode Transformation Format) is a standard method of encoding Unicode character data.
  • UTF-16 (16- bit Unicode Transformation Format) - UTF-16 (16- bit Unicode Transformation Format) is a standard method of encoding Unicode character data.
  • utility - In computers, a utility is a small program that provides an addition to the capabilities provided by the operating system.
  • utility computing - Utility computing is a service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate.
  • utility storage - Utility storage is a service model in which a provider makes storage capacity available to an individual, an organization or a business unit on a pay-per-use basis.
  • UTM - A unified threat management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.
  • UTP - Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).
  • UUCP - UUCP (UNIX-to-UNIX Copy Protocol) is a set of UNIX programs for copying (sending) files between different UNIX systems and for sending commands to be executed on another system.
  • UUCP (UNIX-to-UNIX Copy Protocol) - UUCP (UNIX-to-UNIX Copy Protocol) is a set of UNIX programs for copying (sending) files between different UNIX systems and for sending commands to be executed on another system.
  • Uudecode - Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.
  • Uuencode - Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.
  • Uuencode (Uuencode/Uudecode) - Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.
  • UUID (Universal Unique Identifier) - A UUID (Universal Unique Identifier) is a 128-bit number used to uniquely identify some object or entity on the Internet.
  • UWB - Ultra wideband (also known as UWB or as digital pulse wireless) is a wireless technology for transmitting large amounts of digital data over a wide spectrum of frequency bands with very low power for a short distance.
  • UX (user experience) - User experience (UX) encompasses all aspects of an end user's interaction with and attitude toward a given IT system or services, including the interface, graphics and design.
  • UXGA - UXGA (Ultra Extended Graphics Array) is a display modein which the resolutionis 1600 pixels horizontally by 1200 pixels vertically (1600 x 1200).
  • UXGA (Ultra Extended Graphics Array) - UXGA (Ultra Extended Graphics Array) is a display modein which the resolutionis 1600 pixels horizontally by 1200 pixels vertically (1600 x 1200).

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close