Find keyword or terms by letter
Click on a numbered or lettered box below to show list of keywords and terms.
Ubiquitous Computing
(Context: )
Definition
A concept in software engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. A user interacts with the computer, which can exist in many different forms, including laptop computers, tablets and terminals in everyday objects such as a refrigerator or a pair of glasses. The underlying technologies to support ubiquitous computing include Internet, advanced middleware, operating system, mobile code, sensors, microprocessors, new I/O and user interfaces, computer networks, mobile protocols, location and positioning, and new materials.
This paradigm is also described as pervasive computing, ambient intelligence, or "everyware". Each term emphasizes slightly different aspects. When primarily concerning the objects involved, it is also known as physical computing, the Internet of Things, haptic computing, and "things that think". Rather than propose a single definition for ubiquitous computing and for these related terms, a taxonomy of properties for ubiquitous computing has been proposed, from which different kinds or flavors of ubiquitous systems and applications can be described.
Ubiquitous computing touches on distributed computing, mobile computing, location computing, mobile networking, sensor networks, human–computer interaction, context-aware smart home technologies, and artificial intelligence.
Ultra Mobile Broadband (UMB)
(Context: )
Definition
The brand name for the project within 3GPP2 to improve the CDMA2000 mobile phone standard for next-generation applications and requirements. The system is based upon Internet (TCP/IP) networking technologies running over a next-generation radio system, with peak rates of up to 280 Mbit/s. Its designers intended for the system to be more efficient and capable of providing more services than the technologies it replaces. Commercialization is unlikely as Qualcomm, its main developer, 3GPP2, and major CDMA carriers, are concentrating on LTE instead. To provide compatibility with the systems it replaces, UMB supports handoffs with other technologies, including existing CDMA2000 1X and 1xEV-DO systems. However, 3GPP2 added this functionality to LTE, allowing LTE to become the single upgrade path for all wireless networks. According to the technology market research firm ABI Research, Ultra-Mobile Broadband might be “dead on arrival.” No carrier has announced plans to adopt UMB, and most CDMA carriers in Australia, USA, China, Japan, and Korea have already announced plans to adopt HSPA or LTE.
Unified Endpoint Management (UEM)
(Context: Software)
Definition
A class of software tools that provide a single management interface for mobile, PC and other devices. It is an evolution of, and replacement for, mobile device management (MDM) and enterprise mobility management (EMM) and client management tools.
https://www.vita.virginia.gov/media/vitavirginiagov/it-governance/ea/pdf/Event-Log-Management.pdf
Uniform Resource Locator (URL)
(Context: General)
Definition
An address, usually for locating Web pages. (e.g., FTP//:abc.org). The part before the first colon specifies the access scheme or protocol. Commonly implemented schemes include FTP, HTTP (World-Wide Web), gopher or WAIS. The “file” scheme should only be used to refer to a file on the same host. Other less commonly used schemes include news, telnet or mailto (e-mail). The part after the colon is interpreted according to the access scheme. In general, two slashes after the colon introduce a hostname (host:port is also valid, or for FTP user:passwd@host or user@host). The port number is usually omitted and defaults to the standard port for the scheme, e.g. port 80 for HTTP.
Unit Price Contracts
(Context: General)
Definition
The contractor is paid a preset amount per unit of service (e.g., $70 per hour for professional services or $1.08 per cubic yard of earth removed) and the total value of the contract is a function of the quantities needed to complete the work.
Universal Serial Bus (USB)
(Context: )
Definition
A standard for connecting devices.
Unlicensed National Information Infrastructure bands (U-NII)
(Context: General)
Definition
Designated by the FCC to provide short-range, high-speed wireless networking communication at low cost. U-NII consists of three frequency bands of 100 MHz each in the 5 GHz band: 5.15-5.25GHz (for indoor use only), 5.25-5.35 GHz and 5.725-5.825GHz. The three frequency bands were set aside by the FCC in 1997 to help schools connect to the Internet without the need for hard wiring (Adapted from Wi-Fi Planet).
Unstructured Data (Modifiable)
(Context: Software)
Definition
Data is stored as discrete files with no specific organization or relationships between the files. Modifiable unstructured data is files that are created and edited. For example, Word documents, Excel spreadsheets, notepad files, PowerPoint presentations etc. They are routinely updated / overwritten with new versions.
EA-Solution-Data-Availability-Requirements.pdf (virginia.gov)
Unstructured Data (Non-modifiable)
(Context: Software)
Definition
Data is stored as discrete files with no specific organization or relationships between the files. Non-modifiable data is generally images, video stream files, music stream files, etc. They are written and stored but not modified or edited after writing. Often the data is storage and managed by an application. Non-modifiable unstructured data can also include data types that would normally be modifiable but are being kept for data retention purposes, so modification is prohibited by policy.
EA-Solution-Data-Availability-Requirements.pdf (virginia.gov)
USB Flash Drive
(Context: General)
Definition
A small, lightweight, removable and rewritable data storage device.
User Behavior Analytics (UBA)
(Context: Information Systems Security)
Definition
A cybersecurity process about detection of insider threats, targeted attacks, and financial fraud that tracks a system's users. UBA looks at patterns of human behavior, and then analyzes them to detect anomalies that indicate potential threats.
https://www.vita.virginia.gov/media/vitavirginiagov/it-governance/ea/pdf/Event-Log-Management.pdf
User ID
(Context: General)
Definition
A unique symbol or character string that is used by an IT system to identify a specific user. See Logon ID.
Utility Service
(Context: General)
Definition
In this report, the term is used to connote a function or activity typically provided by an IT unit, which may be separated from IT work requiring business knowledge, and which may be provided by a central enterprise service (in-sourced) or by an external business (outsourced). An example would be web site hosting. You can provide hosting and WC3 accessibility levels without knowing the business of the agency or understanding the content of the website.