Browse Definitions :

Browse Definitions by Alphabet

U - USB

  • U (measurement) - A U is a standard unit of measure for designating the height in computer enclosures and server rack cabinets.
  • U-SQL - U-SQL is a Microsoft query language that combines a declarative SQL-like syntax with C# programming, enabling it to be used to process both structured and unstructured data in big data environments.
  • U.2 SSD (formerly SFF-8639) - A U.2 SSD is a high-performance data storage device designed to support the Peripheral Component Interconnect Express (PCIe) interface using a small form factor (SFF) connector that is also compatible with standard Serial-Attached SCSI (SAS) and Serial Advanced Technology Attachment (SATA)-based spinning disks and solid-state drives (SSDs).
  • U.S. Department of Homeland Security (DHS) - The U.S.
  • UART (Universal Asynchronous Receiver/Transmitter) - A UART (Universal Asynchronous Receiver/Transmitter) is the microchip with programming that controls a computer's interface to its attached serial devices.
  • Uber - Uber is a transportation company with an app that allows passengers to hail a ride and drivers to charge fares and get paid.
  • uberAir - uberAIR is an app-hailed air vehicle ride service in the planning stages at Uber.
  • UberFLEET - UberFLEET is a smartphone application that allows partners with Uber, a popular rideshare application, to oversee their fleet drivers.
  • ubiquitous networking - Ubiquitous networking is the pervasion of communications infrastructure and wireless technologies throughout the environment such that they enable continuous connectivity.
  • ubiquitous sensor network (USN) - A ubiquitous sensor network (USN) is one that connects all possible sensors in a given network or environment which, theoretically, could be global.
  • Ubuntu - Ubuntu (pronounced oo-BOON-too) is an open source Debian-based Linux distribution.
  • Ubuntu Core - Ubuntu Core is a transactional version of the Ubuntu Linux OS, made specifically for internet of things (IoT) devices and large container deployments.
  • UCaaS (Unified Communications as a Service) - Unified communications as a service (UCaaS) is a cloud delivery model that offers a variety of communication and collaboration applications and services.
  • UDDI (Universal Description, Discovery, and Integration) - UDDI (Universal Description, Discovery, and Integration) is an XML-based registry for businesses worldwide to list themselves on the Internet.
  • Ultra DMA (UDMA or Ultra DMA/33) - Ultra DMA (UDMA, or, more accurately, Ultra DMA/33) is a protocol for transferring data between a hard disk drive through the computer's data paths (or bus) to the computer's random access memory (RAM).
  • Ultra High-Definition TV (UHDTV) - Ultra-high-definition (UHD) television, also abbreviated UHDTV, is a digital television display format in which the horizontal screen resolution is on the order of 4000 pixels (4K UHD) or 8000 pixels (8K UHD).
  • Ultra Low Energy (ULE) - Ultra Low Energy (ULE) is a telecommunications technology based on DECT (Digital Enhanced Cordless Telecommunications) which is the de-facto standard for voice calls, integrated in millions of devices worldwide.
  • ultra wideband - Ultra wideband (also known as UWB or as digital pulse wireless) is a wireless technology for transmitting large amounts of digital data over a wide spectrum of frequency bands with very low power for a short distance.
  • ultra-mobile personal computer (UMPC or Ultra-mobile PC) - Ultra-mobile PC (UMPC) is a design specification for a hand-held computer that is larger than a PDA but smaller than a laptop.
  • ultrabook - An ultrabook is a category of thin and light laptop computers designed to bridge the market gap between tablets and premium notebook PCs.
  • ultracapacitor - An ultracapacitor, also called a supercapacitor, is an electrical component capable of holding hundreds of times more electrical charge quantity than a standard capacitor.
  • UML (Unified Modeling Language) - UML (Unified Modeling Language) is a standard notation for the modeling of real-world objects as a first step in developing an object-oriented design methodology.
  • UMTS (Universal Mobile Telecommunications Service) - UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps).
  • unary - The term unary defines operators in Boolean (binary) algebra, trinary algebra, arithmetic, and set theory.
  • unauthenticated security scan (logged-out secuity scan) - An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.
  • uncanny valley - The uncanny valley is a common unsettling feeling people experience where androids (humanoid robots) and audio/visual simulations closely resemble humans in many respects but are not quite realistic.
  • uncertainty principle - The uncertainty principle is the concept that precise, simultaneous measurement of some complementary variables -- such as the position and momentum of a subatomic particle -- is impossible.
  • uncloud (cloud repatriation) - Unclouding, also called cloud repatriation, is the retrieval of applications and data from a cloud computing platform.
  • uncompressing (or decompressing) - Uncompressing (or decompressing) is the act of expanding a compression file back into its original form.
  • Undernet - For terms frequently used in online keyboard chatting, see chat acronyms/IRC/BBS.
  • unexplained wealth order (UWO) - An unexplained wealth order (UWO) is an investigative tool used by law enforcement that can be used with other civil powers to identify and retrieve the proceeds of criminal activities from the recipients.
  • Unicode - Unicode is an entirely new idea in setting up binary codes for text or script characters.
  • unicorn - A unicorn, in an investment context, is a tech startup that is assessed at a valuation of $1 billion or more.
  • unified communications (UC) - Unified communications (UC) is an umbrella term for the integration of multiple enterprise communication tools -- such as voice calling, video conferencing, instant messaging (IM), presence, content sharing, etc.
  • unified communications and collaboration (UCC) - Unified communications and collaboration (UCC) is the collection of technology and software that combines enterprise communication with real time, asynchronous cooperation capabilities.
  • unified computing system (UCS) - A unified computing system (UCS) is is a converged data center architecture that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • unified endpoint management (UEM) - Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.
  • Unified Extensible Firmware Interface (UEFI) - Unified Extensible Firmware Interface, or UEFI, specifies how a software program connects a computer's firmware to its operating system and attached computing hardware.
  • unified field theory or Theory of Everything (TOE) - Unified field theory is sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying together all known phenomena to explain the nature and behavior of all matter and energy in existence.
  • unified network management - Unified network management is the administration of both wired and wireless networks through a single interface.
  • unified storage (multiprotocol storage) - Unified storage -- sometimes called network unified storage or multiprotocol storage -- is a storage system that makes it possible to run and manage files and applications from a single device.
  • unified threat management (UTM) - Unified threat management (UTM) describes an information security (infosec) system that provides a single point of protection against threats, including viruses, worms, spyware and other malware, and network attacks.
  • Uniform Resource Identifier (URI) - A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.
  • unikernel - A unikernel is a library-based operating system that only includes functionalities required by the specific application that runs on it.
  • uninterruptible power supply (UPS) - An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time when incoming power is interrupted.
  • union symbol - The union symbol () denotes the union of two set s.
  • unipolar signaling (unipolar transmission) - Unipolar signaling, also called unipolar transmission ,is a baseband method of sending binary data over wire or cable.
  • unique device identifier (UDID) - A unique device identifier (UDID) is a 40-character string assigned to certain Apple devices including the iPhone, iPad, and iPod Touch.
  • Unique Identification Authority of India (UIDAI) - Unique Identification Authority of India (UIDAI) is the issuing authority of Aadhaar cards (aka unique identification numbers or UIDs).
  • unique identifier (UID) - A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.
  • unique selling point (USP) - A unique selling point (USP), also called a unique selling proposition, is a marketing statement that differentiates a product or brand from its competitors.
  • unique user - In Web marketing, a unique user is, for a specified period of time such as a day or month, an individual that has visited a Web site or received specific content, such as ads, e-mail, or newsletters.
  • Unisys - Unisys is an American multinational information technology company that provides hardware, software, IT services and consulting.
  • unit testing - Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation.
  • United Launch Alliance (ULA) - United Launch Alliance (ULA) is a private aerospace launch provider.
  • United States Census - The United States Census is a national survey conducted every ten years to enumerate the population for taxation and political representation.
  • United States Department of Transportation - The United States Department of Transportation (USDOT or DOT) is a cabinet agency of the U.
  • United States Secret Service (USSS) - The United States Secret Service (USSS) is a federal law enforcement agency mandated by Congress to carry out two sets of primary objectives: provide protection for designated sites and events as well as national and visiting leaders, and preserve the integrity of the U.
  • Universal 2nd Factor (U2F) - Universal 2nd Factor (U2F) is a type of physical authentication device that uses encryption and private keys to protect and unlock supported accounts.
  • universal acceptance (UA) - Universal acceptance (UA) is a best practice that ensures all domain names and email addresses work with all applications, devices and systems.
  • universal basic income (UBI) - Universal basic income (UBI) is a model for providing all citizens of a country or other geographic area with a given sum of money, regardless of their income, resources or employment status.
  • universal constructor - A universal constructor is a device that can self-replicate - that is, make copies of itself.
  • Universal Mobile Telecommunications System (UMTS) - UMTS (Universal Mobile Telecommunications System) is a so-called "third-generation (3G)," broadband, packet -based transmission of text, digitized voice, video, and multimedia at data rates up to and possibly higher than 2 megabits per second (Mbps), offering a consistent set of services to mobile computer and phone users no matter where they are located in the world.
  • Universal Naming Convention (UNC) - In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on.
  • Universal Plug and Play (UPnP) - Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.
  • Universal Service Fund (USF) - The Universal Service Fund (USF) is a United States government program that supports telecommunications access and affordability in rural and low-income communities.
  • universal set - A universal set is the collection of all objects in a particular context or theory.
  • Universal Windows app - A Universal Windows app is a software program that uses the Windows 8 or Windows 10 codebase and runs the same way on PCs, Windows tablets and smartphones.
  • Unix - Unix -- trademarked as UNIX -- is a multiuser, multitasking operating system (OS) designed for flexibility and adaptability.
  • unknowable risk - An unknowable risk is a potential threat to an organization's processes that is not known and cannot be quantified or controlled.
  • unknown known - An unknown known is information that an individual or organization has in its possession but whose existence, relevance or value has not been realized.
  • unknown unknown - An unknown unknown is unidentified information.
  • unlocked cell phone - An unlocked cell phone is a cellular telephone handset that can be used with more than one service provider, making it easy for a user to switch from one cellular network to another.
  • Unmanned Systems Technology (UST) - Unmanned Systems Technology (UST) is the software and hardware systems that drive semi- and fully-autonomous vehicles.
  • unobtainium - Unobtainium is a term used to refer to a material that cannot be accessed.
  • Unshielded Twisted Pair (UTP) - Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).
  • unstructured data - Unstructured data is information, in many different forms, that doesn't follow conventional data models, making it difficult to store and manage in a mainstream relational database.
  • unstructured text - The unstructured text collected from social media activities plays a key role in predictive analytics for the enterprise because it is a prime source for sentiment analysis to determine the general attitude of consumers toward a brand or idea.
  • unsupervised learning - Unsupervised learning refers to the use of artificial intelligence (AI) algorithms to identify patterns in data sets containing data points that are neither classified nor labeled.
  • unzipping - Unzipping is the act of extracting the files from a zipped single file or similar file archive.
  • upcharge - An upcharge is an additional fee that is added to a bill after a contract has already been negotiated.
  • upcycling - Upcycling is the practice of creating a useable product from waste or unwanted items or adapting an existing product in some way to add value.
  • update sequence number (USN) - An update sequence number (USN) is a 64-bit number in Active Directory that increments time as changes occur.
  • upgrade - In computers, an upgrade is a new version of or addition to a hardware or, more often, software product that is already installed or in use.
  • uploading - Uploading is the transmission of a file from one computer system to another, usually larger computer system.
  • UpperCamelCase - UpperCamelCase (part of CamelCase) is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized within the new word that forms the name.
  • upskilling - Upskilling is a workplace trend that facilitates continuous learning by providing training programs and development opportunities that expand an employee's abilities and minimize skill gaps.
  • uptime and downtime - Uptime is a computer industry term for the time during which a computer is operational.
  • Uptime Institute's data center tier standards - Data center tiers are a system created by Uptime Institute LLC to describe the availability of infrastructure resources in a facility.
  • URL (Uniform Resource Locator) - A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the Internet.
  • URL manipulation (URL rewriting) - URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • URL-minder - URL-minder is an agent or robot program (bot) that notifies you when a particular Web page has changed.
  • URN (Uniform Resource Name) - A URN (Uniform Resource Name) is an Internet resource with a name that, unlike a URL, has persistent significance - that is, the owner of the URN can expect that someone else (or a program) will always be able to find the resource.
  • US Department of Health and Human Services (HHS) - The U.S.
  • USA Patriot Act - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • usability - Also see human-computer interaction and graphical user interface.
  • usage-based pricing - Usage-based pricing is a consumption-based pricing model in which customers are only charged when they use a product or service.
  • USART (Universal Synchronous/Asynchronous Receiver/Transmitter) - A USART (Universal Synchronous/Asynchronous Receiver/Transmitter) is a microchip that facilitates communication through a computer's serial port using the RS-232C protocol.
  • USB 3.0 (SuperSpeed USB) - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • hockey stick growth

    Hockey stick growth is a growth pattern in a line chart that shows a sudden and extremely rapid growth after a long period of ...

  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

Close