Search results
Appearance
- Advanced Micro Devices, Inc. (AMD) is an American multinational corporation and fabless semiconductor company based in Santa Clara, California, that develops...146 KB (15,180 words) - 22:34, 16 June 2024
- The Linux kernel is a free and open-source,: 4 UNIX-like kernel that is used in many computer systems worldwide. The kernel was created by Linus Torvalds...189 KB (17,696 words) - 12:00, 16 June 2024
- Flash memory is an electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed. The two main types of flash...185 KB (16,884 words) - 10:20, 12 June 2024
- A mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk...33 KB (3,718 words) - 08:30, 21 May 2024
- Parsing, syntax analysis, or syntactic analysis is the process of analyzing a string of symbols, either in natural language, computer languages or data...37 KB (4,856 words) - 16:24, 10 June 2024
- Character encoding is the process of assigning numbers to graphical characters, especially the written characters of human language, allowing them to be...32 KB (3,870 words) - 06:24, 17 June 2024
- An HTML element is a type of HTML (HyperText Markup Language) document component, one of several types of HTML nodes (there are also text nodes, comment...114 KB (12,794 words) - 05:00, 13 June 2024
- A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource. It is typically a plastic credit...115 KB (12,137 words) - 11:32, 14 May 2024
- Computer graphics deals with generating images and art with the aid of computers. Computer graphics is a core technology in digital photography, film,...69 KB (8,761 words) - 21:42, 16 May 2024
- Extensible HyperText Markup Language (XHTML) is part of the family of XML markup languages which mirrors or extends versions of the widely used HyperText...59 KB (6,964 words) - 13:00, 13 June 2024
- A media type (formerly known as a MIME type) is a two-part identifier for file formats and format contents transmitted on the Internet. Their purpose is...15 KB (1,703 words) - 15:08, 14 June 2024
- Apache Hadoop ( /həˈduːp/) is a collection of open-source software utilities that facilitates using a network of many computers to solve problems involving...49 KB (5,093 words) - 03:30, 18 May 2024
- The von Neumann architecture—also known as the von Neumann model or Princeton architecture—is a computer architecture based on a 1945 description by John...35 KB (4,173 words) - 04:35, 13 June 2024
- RISC-V (pronounced "risk-five": 1 ) is an open standard instruction set architecture (ISA) based on established reduced instruction set computer (RISC)...130 KB (13,557 words) - 07:43, 9 June 2024
- In computational complexity theory, a problem is NP-complete when: It is a decision problem, meaning that for any input to the problem, the output is either...30 KB (3,614 words) - 19:13, 15 June 2024
- Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed...40 KB (4,659 words) - 12:55, 13 May 2024
- Advanced Audio Coding (AAC) is an audio coding standard for lossy digital audio compression. It was designed to be the successor of the MP3 format and...67 KB (7,241 words) - 02:30, 31 May 2024
- Single-precision floating-point format (sometimes called FP32 or float32) is a computer number format, usually occupying 32 bits in computer memory; it...21 KB (3,070 words) - 15:04, 23 May 2024
- The usage share of an operating system is the percentage of computers that run that operating system (OS). These statistics are estimates as wide scale...139 KB (10,737 words) - 20:09, 29 May 2024
- MPEG-4 is a group of international standards for the compression of digital audio and visual data, multimedia systems, and file storage formats. It was...45 KB (2,747 words) - 09:49, 10 June 2024
- In computer science, a B-tree is a self-balancing tree data structure that maintains sorted data and allows searches, sequential access, insertions, and...50 KB (7,042 words) - 13:17, 12 June 2024
- General-purpose computing on graphics processing units (GPGPU, or less often GPGP) is the use of a graphics processing unit (GPU), which typically handles...67 KB (6,689 words) - 10:44, 13 June 2024
- Resilient File System (ReFS), codenamed "Protogon", is a Microsoft proprietary file system introduced with Windows Server 2012 with the intent of becoming...31 KB (3,144 words) - 03:46, 17 May 2024
- A memory management unit (MMU), sometimes called paged memory management unit (PMMU), is a computer hardware unit that examines all memory references on...45 KB (6,671 words) - 10:11, 10 May 2024
- Computational science, also known as scientific computing, technical computing or scientific computation (SC), is a division of science that uses advanced...32 KB (3,373 words) - 18:29, 29 April 2024
- Texture mapping is a method for mapping a texture on a computer-generated graphic. Texture here can be high frequency detail, surface texture, or color...31 KB (3,812 words) - 17:30, 8 June 2024
- Analytics is the systematic computational analysis of data or statistics. It is used for the discovery, interpretation, and communication of meaningful...33 KB (3,318 words) - 09:32, 10 June 2024
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel. It first appeared in April 1974 and is an extended...55 KB (4,423 words) - 03:08, 7 June 2024
- Bebo (/ˈbiːboʊ/ BEE-boh) was an American social networking website that originally operated from 2005 until its bankruptcy in 2013 and relaunched in February...19 KB (2,314 words) - 16:33, 3 June 2024
- Zigbee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power...38 KB (4,736 words) - 14:48, 5 June 2024
- The cd command, also known as chdir (change directory), is a command-line shell command used to change the current working directory in various operating...14 KB (1,431 words) - 15:49, 28 May 2024
- The Spring Framework is an application framework and inversion of control container for the Java platform. The framework's core features can be used by...66 KB (6,672 words) - 12:04, 13 June 2024
- The actor model in computer science is a mathematical model of concurrent computation that treats an actor as the basic building block of concurrent computation...80 KB (7,146 words) - 18:54, 29 May 2024
- WolframAlpha (/ˈwʊlf.rəm-/ WUULf-rəm-) is an answer engine developed by Wolfram Research. It is offered as an online service that answers factual queries...14 KB (1,181 words) - 19:12, 13 June 2024
- PL/I (Programming Language One, pronounced /piː ɛl wʌn/ and sometimes written PL/1) is a procedural, imperative computer programming language initially...96 KB (11,890 words) - 18:09, 16 May 2024
- Wikimapia (stylized as wikimapia) is a geographic online encyclopedia project. The project implements an interactive "clickable" web map that utilizes...15 KB (1,506 words) - 16:01, 13 April 2024
- In computer science, stream processing (also known as event stream processing, data stream processing, or distributed stream processing) is a programming...35 KB (4,575 words) - 14:51, 14 November 2023
- Iterative and incremental development is any combination of both iterative design (or iterative method) and incremental build model for development. Usage...19 KB (2,240 words) - 19:43, 21 May 2024
- In computing, traceroute and tracert are diagnostic command-line interface commands for displaying possible routes (paths) and transit delays of packets...14 KB (1,547 words) - 21:34, 16 May 2024
- Gizmo5 (formerly known as Gizmo Project and SIPphone) was a voice over IP communications network and a proprietary freeware soft phone for that network...11 KB (1,103 words) - 19:37, 25 January 2024
- Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has...42 KB (5,183 words) - 18:30, 6 June 2024
- The Stream Control Transmission Protocol (SCTP) is a computer networking communications protocol in the transport layer of the Internet protocol suite...23 KB (2,484 words) - 20:03, 26 April 2024
- Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and...45 KB (4,719 words) - 11:54, 3 June 2024
- OS X Lion, also known as Mac OS X Lion, (version 10.7) is the eighth major release of macOS, Apple's desktop and server operating system for Mac computers...71 KB (6,162 words) - 13:01, 5 June 2024
- A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...35 KB (4,123 words) - 04:47, 9 May 2024
- IBM Watson Media (formerly Ustream and IBM Cloud Video) is an American virtual events platform company which is a division of IBM. Prior to the IBM acquisition...8 KB (684 words) - 16:24, 10 June 2023
- The Power Mac G5 is a series of personal computers designed, manufactured, and sold by Apple Computer, Inc. from 2003 to 2006 as part of the Power Mac...30 KB (2,586 words) - 01:02, 4 June 2024
- In cryptography, subliminal channels are covert channels that can be used to communicate secretly in normal looking communication over an insecure channel...11 KB (1,515 words) - 15:55, 16 April 2024
- Internet Small Computer Systems Interface or iSCSI (/aɪˈskʌzi/ eye-SKUZ-ee) is an Internet Protocol-based storage networking standard for linking data...26 KB (3,244 words) - 22:38, 25 March 2024
- A window manager is system software that controls the placement and appearance of windows within a windowing system in a graphical user interface. Most...25 KB (3,096 words) - 09:13, 2 June 2024