Using a computer at the application level. The term end-user is used to distinguish the person for whom the product was designed from the person who programs, services, or installs the product. Developers working on a personal computer in a professional capacity, for example, are not considered end-users.
SIP or H.323 terminal or gateway. An endpoint can call and be called. It generates and terminates the information stream.
The code or software used as the basis for building a game. The game engine literally powers the entire game. Some developers license a game engine to other developers who build a new game based on the technology of the game engine.
(n.) In a biometric security system, a person who has a reference template in the system��s database. Compare with impostor.
(n.) In a biometric security system, the initial process of collecting biometric data samples from a person and subsequently storing the data in a reference template representing a user��s identity to be used for later comparison.
(n.) A business organization. In the computer industry, the term is often used to describe any large organization that utilizes computers. An intranet, for example, is a good example of an enterprise computing system.