Browse Definitions :

Browse Definitions by Alphabet

USB - WHA

  • USB redirection (Universal Serial Bus redirection) - USB redirection lets end users plug peripheral devices into local USB ports and access them from virtual desktops.
  • USB-C (USB Type C) - USB-C is a connection type standard designed to replace all USB types on the computer and device ends of future USB with a single reversible connector.
  • use case - A use case is a methodology used in system analysis to identify, clarify, and organize system requirements.
  • use case diagram (UML use case diagram) - A use case diagram is a way to summarize details of a system and the users within that system.
  • user acceptance testing (UAT) - User acceptance testing (UAT), also called application testing or end-user testing, is a phase of software development in which the software is tested in the real world by its intended audience.
  • user account provisioning - User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system.
  • user authentication - User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer of credentials during interactions on a network to confirm a user's authenticity.
  • user behavior analytics (UBA) - User behavior analytics (UBA) is the tracking, collecting and assessing of user data and activities using monitoring systems.
  • User Datagram Protocol (UDP) - User Datagram Protocol (UDP) is a communications protocol that is primarily used to establish low-latency and loss-tolerating connections between applications on the internet.
  • user environment management (UEM) - User environment management is a technology designed to allow IT to oversee a user's complete desktop experience, including the profile, any policies IT applies and customizations the user makes.
  • user group - In personal or business computing, a user group is a set of people who have similar interests, goals or concerns.
  • user installed application (UIA) - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • user interface (UI) - The user interface (UI) is the point of human-computer interaction and communication in a device.
  • User Principal Name (UPN) - In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.
  • user profile - In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.
  • user self-provisioning - User self-provisioning, also known as cloud self-service, is a system that allows end users to set up and launch applications and services in a cloud computing environment without the direct intervention of an IT organization or a service provider.
  • user session (visit) - In tabulating statistics for Web site usage, a user session (sometime referred to as a visit) is the presence of a user with a specific IP address who has not visited the site recently (typically, anytime within the past 30 minutes).
  • user story - A user story is a tool used in Agile development to capture a description of a software feature from an end-user perspective.
  • USGCB (United States Government Configuration Baseline) - The United States Government Configuration Baseline, or USGCB, is a government-wide initiative that provides guidance on information security configuration best practices for IT products leveraged by federal agencies.
  • USSD (Unstructured Supplementary Service Data) - USSD (Unstructured Supplementary Service Data) is a GSM (Global System for Mobile) communications protocol that is used to send text messages.
  • Ustream - Ustream is an online video service provider that enables anybody with a camera and Internet connection to conduct a live interactive video broadcast to a global audience from anywhere in the world.
  • UTF-16 (16- bit Unicode Transformation Format) - UTF-16 (16- bit Unicode Transformation Format) is a standard method of encoding Unicode character data.
  • utility - In computers, a utility is a small program that provides an addition to the capabilities provided by the operating system.
  • utility computing - Utility computing is a service provisioning model where a provider makes computing resources, infrastructure management and technical services available to customers as they need them.
  • utility storage - Utility storage is a service model in which a provider makes storage capacity available to an individual, organization or business unit on a pay-per-use basis.
  • UUCP (UNIX-to-UNIX Copy Protocol) - UUCP (UNIX-to-UNIX Copy Protocol) is a set of UNIX programs for copying (sending) files between different UNIX systems and for sending commands to be executed on another system.
  • Uuencode (Uuencode/Uudecode) - Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.
  • UUID (Universal Unique Identifier) - A UUID (Universal Unique Identifier) is a 128-bit value used to uniquely identify an object or entity on the internet.
  • UX (user experience) - User experience (UX) encompasses all aspects of an end user's interaction with and attitude toward a given IT system or services, including the interface, graphics and design.
  • UX research - UX (user experience) research is the study of learning what end users of a system or product need and want, then employing those insights to enhance the design process for products, services or software.
  • UXGA (Ultra Extended Graphics Array) - UXGA (Ultra Extended Graphics Array) is a display modein which the resolutionis 1600 pixels horizontally by 1200 pixels vertically (1600 x 1200).
  • What is user-generated content and why is it important? - User-generated content (UGC) is published information that an unpaid contributor provides to a website.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
SearchCIO
SearchHRSoftware
  • recruitment

    Recruitment is the process of finding, screening, hiring and eventually onboarding qualified job candidates.

  • recruitment management system

    A recruitment management system (RMS) is a set of tools designed to manage the recruiting process.

  • applicant tracking system (ATS)

    An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job ...

SearchCustomerExperience
  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

Close