Software  >   Systems Software  >   Utility Software  >   File Conversion Programs  >  

Uuencode

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Uudecode, UNIX to UNIX Encoding
DEFINITION: Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network. It originated for use between users of UNIX systems (its name stood for "UNIX-to-UNIX encoding"). However, it's available or easily obtainable for use in all operating systems and most e-mail applications provide it as an encoding alternative, especially for  … 
Definition continues below.
UuencodeReports
226 - 250 of 495 Matches Previous Page  | Next Page
Improve payroll: Can the cloud help?
sponsored by Workday
VIDEO: Learn about the solution that takes advantage of SaaS software to improve the payroll process.
Posted: 08 Sep 2014 | Premiered: 16 Dec 2011

Workday

Introducing Red Hat CloudForms 3.0
sponsored by Red Hat
WEBCAST: Did you know that the number one challenge people face when making the shift to cloud is management? Take a look at this brief webcast to learn about the software that will help you organization management.
Posted: 05 Dec 2013 | Premiered: Nov 5, 2013

Red Hat

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Improving Teammate Communication, Collaboration and Productivity on Task Order RFPS
sponsored by SpringCM
CASE STUDY: Concurrent Technologies Corporation (CTC) selected a solution called Privia by SpringCM that enable CTC to keep all teammates and internal participants on task without program manager or contract administrator intervention.
Posted: 18 Nov 2008 | Published: 18 Nov 2008

SpringCM

Increasing Data Center Density While Driving down Power and Cooling Costs
sponsored by Intel Corporation
WHITE PAPER: This paper discusses various technologies that can help IT managers plan and implement a more comprehensive and effective strategy for expanding data center capabilities while reducing power consumption.
Posted: 24 Jul 2008 | Published: 01 Jun 2006

Intel Corporation

Information Security Magazine - October 2013
sponsored by SearchSecurity.com
EZINE: For the 8th consecutive year, Information Security readers voted to determine the best security products. More than 1,000 voters participated in our Readers' Choice Awards 2013.
Posted: 01 Oct 2013 | Published: 01 Oct 2013

SearchSecurity.com

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine

Information Security Roles and Responsibilities Made Easy
sponsored by Information Shield, Inc.
SOFTWARE LISTING: Reducing the total cost of information security services by properly documented roles and responsibilities.
Posted: 14 Feb 2008 | Published: 01 Jan 2007


Integrated Change and Release Management: A Defect Resolution Use-case Scenario
sponsored by IBM Software Group
WHITE PAPER: This paper introduces the IBM Rational change and release management solution to help companies streamline and accelerate their software and systems delivery lifecycle.
Posted: 15 Feb 2008 | Published: 01 Oct 2007

IBM Software Group

Integrated Solutions for Defect and Project Tracking
sponsored by TechExcel
WHITE PAPER: This paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market.
Posted: 05 Jun 2008 | Published: 05 Jun 2008

TechExcel

Is Parallel Programming Hard?
sponsored by Intel
TECHNICAL ARTICLE: This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.
Posted: 10 Nov 2009 | Published: 28 Oct 2009

Intel

Is Time to Market King?
sponsored by IBM
WHITE PAPER: The common thread of successful software development is enabling collaboration in context - making the process transparent so stakeholders remain informed and empowered to contribute. Once this thread is established, technology can be implemented that provides the glue for stakeholders to collaborate and meet their time to market or goals.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

IBM

Is Utility Hosting Right For Your Business?
sponsored by AT&T Corp
WHITE PAPER: Compared to dedicated hosting, utility hosting is easily scalable and standardized as a turnkey package. Its chief advantage is that you pay only for the computing capacity that you use. A good time to adopt this solution is when change is taking place.
Posted: 04 Aug 2010 | Published: 04 Aug 2010

AT&T Corp

IT Consolidation with VMware and Dell EqualLogic iSCSI SANs
sponsored by Dell and VMware
WHITE PAPER: Dell EqualLogic™ PS Series iSCSI SANs help to reduce the cost and complexity of IT Consolidation and uniquely integrate with VMware® Infrastructure to enable the fully virtualized IT environment.
Posted: 14 May 2009 | Published: 14 May 2009

Dell and VMware

IT Risk Management: Guide to Software Risk Assessments and Audits
sponsored by Veracode, Inc.
WHITE PAPER: Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Veracode, Inc.

It's 2008: Do You Know Where Your Talent Is? - Connecting People to What Matters
sponsored by SAP America, Inc.
WHITE PAPER: Demand for knowledge workers is rising even as their skills and abilities are falling into short supply. This research report about acquisition and retention strategies questions the "war for talent" approach to these emerging trends.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

SAP America, Inc.

It's Not Too Soon to Think About Windows Licensing
sponsored by Dell, Inc. and Microsoft
EGUIDE: While you may not be ready to hop on the Windows 8 bandwagon quite yet, it's never too early to start the planning process. This expert E-guide from SearchConsumerization.com provides the best strategies for upgrading your operating systems and explores the benefits it can provide your organization.
Posted: 13 Nov 2012 | Published: 13 Nov 2012

Dell, Inc. and Microsoft

J2EE without Application Server (J2EE Is Easy!)
sponsored by Atomikos
WHITE PAPER: This article proposes a further simplification of J2EE, by showing a way to eliminate the overhead of the runtime platform: the application server.
Posted: 01 Mar 2008 | Published: 01 Feb 2008

Atomikos

JDSU with Infobright: Ensuring the Highest Quality of Service to World’s Largest Communication Service ProvidersRelease 12.1
sponsored by Infobright, Inc.
PRESENTATION TRANSCRIPT: Chuck Gruber, Principal Architect, JDSU and Graham Toppin, Vice President of Engineering, Infobright led an information-packed webinar to on how JDSU is leveraging Infobright's analytic database to troubleshoot the largest networks in the world. If you missed it, read this presentation transcript to get caught up.
Posted: 27 Oct 2011 | Published: 27 Oct 2011

Infobright, Inc.

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

Keeping It Simple: How to Protect Growing VMware Environments
sponsored by BakBone
WHITE PAPER: VMware has evolved to meet the needs of its growing customer base and has built an excellent foundation for data protection. It's Designed to work in conjunction with third-party backup software applications.
Posted: 16 Jul 2008 | Published: 01 Jul 2008

BakBone

Key best practices for cloud testing
sponsored by IBM
EGUIDE: This expert e-guide explains the benefits of testing software in cloud environments. Read this and gain tips for cloud testing, including ensuring a plan is in place in case of an interruption to service, learning the differences between testing in private and public clouds, exploring the risks of moving to a cloud-based testing solution and more.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

IBM

Key Opportunities and pitfalls on the road to continuous delivery
sponsored by ZeroTurnaround
EGUIDE: In this e-guide, experts discuss the opportunities of continuous delivery in ALM and the challenges, as well as five lessons for making continuous integration simple.
Posted: 14 Nov 2012 | Published: 14 Nov 2012

ZeroTurnaround
226 - 250 of 495 Matches Previous Page    8 9 10 11 12 13    Next Page
 
UUENCODE DEFINITION (continued): …  e-mail attachments. If you're sending e-mail with an attachment and you suspect your recipient(s) may not have a MIME-compliant system (for example, an older PC or UNIX system), you may want to specify "Uuencode" for the attachment to an e-mail note. (In Eudora, when writing a note, look for the little box set to a default of "MIME" and change it to "Uuencode.")Basically, what Uuencode does is to translate or convert a file or e-mail attachment (it can be an image, a text file, or a program) from its binary or bit-stream representation into the 7-bit ASCII set of text characters. Text can … 
Uuencode definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement