Browse Definitions :

Browse Definitions by Alphabet

U - WHA

  • U (measurement) - A U is a standard unit of measure for designating the height in computer enclosures and server rack cabinets.
  • U-SQL - U-SQL is a Microsoft query language that combines a declarative SQL-like syntax with C# programming, enabling it to be used to process both structured and unstructured data in big data environments.
  • U.2 SSD (formerly SFF-8639) - A U.2 SSD is a high-performance data storage device designed to support the Peripheral Component Interconnect Express (PCIe) interface using a small form factor (SFF) connector that is also compatible with standard Serial-Attached SCSI (SAS) and Serial Advanced Technology Attachment (SATA)-based spinning disks and solid-state drives (SSDs).
  • U.S. Department of Homeland Security (DHS) - The U.S.
  • UART (Universal Asynchronous Receiver/Transmitter) - A UART (Universal Asynchronous Receiver/Transmitter) is the microchip with programming that controls a computer's interface to its attached serial devices.
  • Uber - Uber is a transportation company with an app that allows passengers to hail a ride and drivers to charge fares and get paid.
  • UberFLEET - UberFLEET is a smartphone application that allows partners with Uber, a popular rideshare application, to oversee their fleet drivers.
  • ubiquitous sensor network (USN) - A ubiquitous sensor network (USN) is one that connects all possible sensors in a given network or environment which, theoretically, could be global.
  • Ubuntu - Ubuntu (pronounced oo-BOON-too) is an open source Debian-based Linux distribution.
  • Ubuntu Core - Ubuntu Core is a transactional version of the Ubuntu Linux OS, made specifically for internet of things (IoT) devices and large container deployments.
  • UCaaS (Unified Communications as a Service) - Unified communications as a service (UCaaS) is a cloud delivery model that offers a variety of communication and collaboration applications and services.
  • UDDI (Universal Description, Discovery, and Integration) - UDDI (Universal Description, Discovery, and Integration) is an XML-based registry for businesses worldwide to list themselves on the Internet.
  • Ultra High-Definition TV (UHDTV) - Ultra-high-definition (UHD) television, also abbreviated UHDTV, is a digital television display format in which the horizontal screen resolution is on the order of 4000 pixels (4K UHD) or 8000 pixels (8K UHD).
  • ultra wideband - Ultra wideband (also known as UWB or as digital pulse wireless) is a wireless technology for transmitting large amounts of digital data over a wide spectrum of frequency bands with very low power for a short distance.
  • ultrabook - An ultrabook is a category of thin and light laptop computers designed to bridge the market gap between tablets and premium notebook PCs.
  • UML (Unified Modeling Language) - UML (Unified Modeling Language) is a standard notation for the modeling of real-world objects as a first step in developing an object-oriented design methodology.
  • UMTS (Universal Mobile Telecommunications Service) - UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps).
  • unauthenticated security scan (logged-out secuity scan) - An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.
  • uncanny valley - The uncanny valley is a common unsettling feeling people experience where androids (humanoid robots) and audio/visual simulations closely resemble humans in many respects but are not quite realistic.
  • Unicode - Unicode is an entirely new idea in setting up binary codes for text or script characters.
  • unified communications (UC) - Unified communications (UC) is an umbrella term for the integration of multiple enterprise communication tools -- such as voice calling, video conferencing, instant messaging (IM), presence, content sharing, etc.
  • unified communications and collaboration (UCC) - Unified communications and collaboration (UCC) is the collection of technology and software that combines enterprise communication with real time, asynchronous cooperation capabilities.
  • unified computing system (UCS) - A unified computing system (UCS) is is a converged data center architecture that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • unified endpoint management (UEM) - Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.
  • Unified Extensible Firmware Interface (UEFI) - Unified Extensible Firmware Interface, or UEFI, specifies how a software program connects a computer's firmware to its operating system and attached computing hardware.
  • unified field theory or Theory of Everything (TOE) - Unified field theory is sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying together all known phenomena to explain the nature and behavior of all matter and energy in existence.
  • unified storage (multiprotocol storage) - Unified storage -- sometimes called network unified storage or multiprotocol storage -- is a storage system that makes it possible to run and manage files and applications from a single device.
  • unified threat management (UTM) - Unified threat management (UTM) describes an information security (infosec) system that provides a single point of protection against threats, including viruses, worms, spyware and other malware, and network attacks.
  • Uniform Resource Identifier (URI) - A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.
  • uninterruptible power supply (UPS) - An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time when incoming power is interrupted.
  • union symbol - The union symbol () denotes the union of two set s.
  • unique device identifier (UDID) - A unique device identifier (UDID) is a 40-character string assigned to certain Apple devices including the iPhone, iPad, and iPod Touch.
  • unique identifier (UID) - A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.
  • unique selling point (USP) - A unique selling point (USP), also called a unique selling proposition, is a marketing statement that differentiates a product or brand from its competitors.
  • Unisys - Unisys is an American multinational information technology company that provides hardware, software, IT services and consulting.
  • unit testing - Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation.
  • United Launch Alliance (ULA) - United Launch Alliance (ULA) is a private aerospace launch provider.
  • United States Secret Service (USSS) - The United States Secret Service (USSS) is a federal law enforcement agency mandated by Congress to carry out two sets of primary objectives: provide protection for designated sites and events as well as national and visiting leaders, and preserve the integrity of the U.
  • Universal 2nd Factor (U2F) - Universal 2nd Factor (U2F) is a type of physical authentication device that uses encryption and private keys to protect and unlock supported accounts.
  • universal basic income (UBI) - Universal basic income (UBI) is a model for providing all citizens of a country or other geographic area with a given sum of money, regardless of their income, resources or employment status.
  • Universal Naming Convention (UNC) - In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on.
  • Universal Plug and Play (UPnP) - Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.
  • Universal Service Fund (USF) - The Universal Service Fund (USF) is a United States government program that supports telecommunications access and affordability in rural and low-income communities.
  • Unix - Unix -- trademarked as UNIX -- is a multiuser, multitasking operating system (OS) designed for flexibility and adaptability.
  • unknown known - An unknown known is information that an individual or organization has in its possession but whose existence, relevance or value has not been realized.
  • unknown unknown - An unknown unknown is unidentified information.
  • unlocked cell phone - An unlocked cell phone is a cellular telephone handset that can be used with more than one service provider, making it easy for a user to switch from one cellular network to another.
  • unobtainium - Unobtainium is a term used to refer to a material that cannot be accessed.
  • Unshielded Twisted Pair (UTP) - Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).
  • unstructured data - Unstructured data is information, in many different forms, that doesn't follow conventional data models, making it difficult to store and manage in a mainstream relational database.
  • unstructured text - The unstructured text collected from social media activities plays a key role in predictive analytics for the enterprise because it is a prime source for sentiment analysis to determine the general attitude of consumers toward a brand or idea.
  • unsupervised learning - Unsupervised learning refers to the use of artificial intelligence (AI) algorithms to identify patterns in data sets containing data points that are neither classified nor labeled.
  • unzipping - Unzipping is the act of extracting the files from a zipped single file or similar file archive.
  • upcharge - An upcharge is an additional fee that is added to a bill after a contract has already been negotiated.
  • update sequence number (USN) - An update sequence number (USN) is a 64-bit number in Active Directory that increments time as changes occur.
  • uploading - Uploading is the transmission of a file from one computer system to another, usually larger computer system.
  • UpperCamelCase - UpperCamelCase (part of CamelCase) is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized within the new word that forms the name.
  • upskilling - Upskilling is a workplace trend that facilitates continuous learning by providing training programs and development opportunities that expand an employee's abilities and minimize skill gaps.
  • uptime and downtime - Uptime is a computer industry term for the time during which a computer is operational.
  • Uptime Institute's data center tier standards - Data center tiers are a system created by Uptime Institute LLC to describe the availability of infrastructure resources in a facility.
  • URL (Uniform Resource Locator) - A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the Internet.
  • URL manipulation (URL rewriting) - URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).
  • URN (Uniform Resource Name) - A URN (Uniform Resource Name) is an Internet resource with a name that, unlike a URL, has persistent significance - that is, the owner of the URN can expect that someone else (or a program) will always be able to find the resource.
  • US Department of Health and Human Services (HHS) - The U.S.
  • USA Patriot Act - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • usage-based pricing - Usage-based pricing is a consumption-based pricing model in which customers are charged only when they use a product or service.
  • USART (universal synchronous/asynchronous receiver/transmitter) - A USART (universal synchronous/asynchronous receiver/transmitter) is hardware that enables a device to communicate using serial protocols.
  • USB 3.0 (SuperSpeed USB) - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • USB flash drive - A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash memory and can attach to a keychain.
  • USB Killer - USB Killer is a device that connects to USB drives and delivers a surge which can damage or destroy unprotected hardware.
  • USB redirection (Universal Serial Bus redirection) - USB redirection lets end users plug peripheral devices into local USB ports and access them from virtual desktops.
  • USB-C (USB Type C) - USB-C is a connection type standard designed to replace all USB types on the computer and device ends of future USB with a single reversible connector.
  • use case - A use case is a methodology used in system analysis to identify, clarify and organize system requirements.
  • use case diagram (UML use case diagram) - A use case diagram is a way to summarize details of a system and the users within that system.
  • user acceptance testing (UAT) - User acceptance testing (UAT), also called application testing or end-user testing, is a phase of software development in which the software is tested in the real world by its intended audience.
  • user account provisioning - User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system.
  • user authentication - User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer of credentials during interactions on a network to confirm a user's authenticity.
  • user behavior analytics (UBA) - User behavior analytics (UBA) is the tracking, collecting and assessing of user data and activities using monitoring systems.
  • User Datagram Protocol (UDP) - User Datagram Protocol (UDP) is a communications protocol that is primarily used to establish low-latency and loss-tolerating connections between applications on the internet.
  • user experience - User experience (UX) design is the process and practice used to design and implement a product that will provide positive and relevant interactions with users.
  • user group - In personal or business computing, a user group is a set of people who have similar interests, goals or concerns.
  • user interface (UI) - The user interface (UI) is the point of human-computer interaction and communication in a device.
  • User Principal Name (UPN) - In Microsoft Active Directory, a User Principal Name (UPN) is a username and domain in an email address format.
  • user story - A user story is a tool in Agile software development used to capture a description of a software feature from a user's perspective.
  • USSD (Unstructured Supplementary Service Data) - USSD (Unstructured Supplementary Service Data) is a GSM (Global System for Mobile) communications protocol that is used to send text messages.
  • utility computing - Utility computing is a service provisioning model where a provider makes computing resources, infrastructure management and technical services available to customers as they need them.
  • utility storage - Utility storage is a service model in which a provider makes storage capacity available to an individual, organization or business unit on a pay-per-use basis.
  • Uuencode (Uuencode/Uudecode) - Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.
  • UUID (Universal Unique Identifier) - A UUID (Universal Unique Identifier) is a 128-bit value used to uniquely identify an object or entity on the internet.
  • UX research - UX (user experience) research is the study of learning what end users of a system or product need and want, then employing those insights to enhance the design process for products, services or software.
  • What is user-generated content and why is it important? - User-generated content (UGC) is published information that an unpaid contributor provides to a website.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

CIO
  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

HRSoftware
  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close