Search results
Appearance
- Advanced Micro Devices, Inc. (AMD) is an American multinational corporation and fabless semiconductor company based in Santa Clara, California, that develops...146 KB (15,180 words) - 04:12, 14 June 2024
- The Linux kernel is a free and open-source,: 4 UNIX-like kernel that is used in many computer systems worldwide. The kernel was created by Linus Torvalds...189 KB (17,696 words) - 12:00, 16 June 2024
- Flash memory is an electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed. The two main types of flash...185 KB (16,884 words) - 10:20, 12 June 2024
- A mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk...33 KB (3,718 words) - 08:30, 21 May 2024
- Parsing, syntax analysis, or syntactic analysis is the process of analyzing a string of symbols, either in natural language, computer languages or data...37 KB (4,856 words) - 16:24, 10 June 2024
- Character encoding is the process of assigning numbers to graphical characters, especially the written characters of human language, allowing them to be...30 KB (3,718 words) - 22:38, 24 May 2024
- An HTML element is a type of HTML (HyperText Markup Language) document component, one of several types of HTML nodes (there are also text nodes, comment...114 KB (12,794 words) - 05:00, 13 June 2024
- A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource. It is typically a plastic credit...115 KB (12,137 words) - 11:32, 14 May 2024
- Apache Hadoop ( /həˈduːp/) is a collection of open-source software utilities that facilitates using a network of many computers to solve problems involving...49 KB (5,093 words) - 03:30, 18 May 2024
- Computer graphics deals with generating images and art with the aid of computers. Computer graphics is a core technology in digital photography, film,...69 KB (8,761 words) - 21:42, 16 May 2024
- A media type (formerly known as a MIME type) is a two-part identifier for file formats and format contents transmitted on the Internet. Their purpose is...15 KB (1,703 words) - 15:08, 14 June 2024
- Extensible HyperText Markup Language (XHTML) is part of the family of XML markup languages which mirrors or extends versions of the widely used HyperText...59 KB (6,964 words) - 13:00, 13 June 2024
- The von Neumann architecture—also known as the von Neumann model or Princeton architecture—is a computer architecture based on a 1945 description by John...35 KB (4,173 words) - 04:35, 13 June 2024
- RISC-V (pronounced "risk-five": 1 ) is an open standard instruction set architecture (ISA) based on established reduced instruction set computer (RISC)...130 KB (13,557 words) - 07:43, 9 June 2024
- In computational complexity theory, a problem is NP-complete when: It is a decision problem, meaning that for any input to the problem, the output is either...30 KB (3,614 words) - 19:13, 15 June 2024
- Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed...40 KB (4,659 words) - 12:55, 13 May 2024
- Advanced Audio Coding (AAC) is an audio coding standard for lossy digital audio compression. It was designed to be the successor of the MP3 format and...67 KB (7,241 words) - 02:30, 31 May 2024
- Single-precision floating-point format (sometimes called FP32 or float32) is a computer number format, usually occupying 32 bits in computer memory; it...21 KB (3,070 words) - 15:04, 23 May 2024
- The usage share of an operating system is the percentage of computers that run that operating system (OS). These statistics are estimates as wide scale...139 KB (10,737 words) - 20:09, 29 May 2024
- MPEG-4 is a group of international standards for the compression of digital audio and visual data, multimedia systems, and file storage formats. It was...45 KB (2,747 words) - 09:49, 10 June 2024
- Bebo (/ˈbiːboʊ/ BEE-boh) was an American social networking website that originally operated from 2005 until its bankruptcy in 2013 and relaunched in February...19 KB (2,314 words) - 16:33, 3 June 2024
- In computer science, a B-tree is a self-balancing tree data structure that maintains sorted data and allows searches, sequential access, insertions, and...50 KB (7,042 words) - 13:17, 12 June 2024
- General-purpose computing on graphics processing units (GPGPU, or less often GPGP) is the use of a graphics processing unit (GPU), which typically handles...67 KB (6,689 words) - 10:44, 13 June 2024
- Resilient File System (ReFS), codenamed "Protogon", is a Microsoft proprietary file system introduced with Windows Server 2012 with the intent of becoming...31 KB (3,144 words) - 03:46, 17 May 2024
- A memory management unit (MMU), sometimes called paged memory management unit (PMMU), is a computer hardware unit that examines all memory references on...45 KB (6,671 words) - 10:11, 10 May 2024
- Computational science, also known as scientific computing, technical computing or scientific computation (SC), is a division of science that uses advanced...32 KB (3,373 words) - 18:29, 29 April 2024
- Texture mapping is a method for mapping a texture on a computer-generated graphic. Texture here can be high frequency detail, surface texture, or color...31 KB (3,812 words) - 17:30, 8 June 2024
- Analytics is the systematic computational analysis of data or statistics. It is used for the discovery, interpretation, and communication of meaningful...33 KB (3,318 words) - 09:32, 10 June 2024
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel. It first appeared in April 1974 and is an extended...55 KB (4,423 words) - 03:08, 7 June 2024
- Zigbee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power...38 KB (4,736 words) - 14:48, 5 June 2024
- The cd command, also known as chdir (change directory), is a command-line shell command used to change the current working directory in various operating...14 KB (1,431 words) - 15:49, 28 May 2024
- The Spring Framework is an application framework and inversion of control container for the Java platform. The framework's core features can be used by...66 KB (6,672 words) - 12:04, 13 June 2024
- The actor model in computer science is a mathematical model of concurrent computation that treats an actor as the basic building block of concurrent computation...80 KB (7,146 words) - 18:54, 29 May 2024
- WolframAlpha (/ˈwʊlf.rəm-/ WUULf-rəm-) is an answer engine developed by Wolfram Research. It is offered as an online service that answers factual queries...14 KB (1,181 words) - 19:12, 13 June 2024
- PL/I (Programming Language One, pronounced /piː ɛl wʌn/ and sometimes written PL/1) is a procedural, imperative computer programming language initially...96 KB (11,890 words) - 18:09, 16 May 2024
- Wikimapia (stylized as wikimapia) is a geographic online encyclopedia project. The project implements an interactive "clickable" web map that utilizes...15 KB (1,506 words) - 16:01, 13 April 2024
- In computer science, stream processing (also known as event stream processing, data stream processing, or distributed stream processing) is a programming...35 KB (4,575 words) - 14:51, 14 November 2023
- Iterative and incremental development is any combination of both iterative design (or iterative method) and incremental build model for development. Usage...19 KB (2,240 words) - 19:43, 21 May 2024
- In computing, traceroute and tracert are diagnostic command-line interface commands for displaying possible routes (paths) and transit delays of packets...14 KB (1,547 words) - 21:34, 16 May 2024
- Gizmo5 (formerly known as Gizmo Project and SIPphone) was a voice over IP communications network and a proprietary freeware soft phone for that network...11 KB (1,103 words) - 19:37, 25 January 2024
- The Stream Control Transmission Protocol (SCTP) is a computer networking communications protocol in the transport layer of the Internet protocol suite...23 KB (2,484 words) - 20:03, 26 April 2024
- Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has...42 KB (5,183 words) - 18:30, 6 June 2024
- IBM Watson Media (formerly Ustream and IBM Cloud Video) is an American virtual events platform company which is a division of IBM. Prior to the IBM acquisition...8 KB (684 words) - 16:24, 10 June 2023
- Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and...45 KB (4,719 words) - 11:54, 3 June 2024
- OS X Lion, also known as Mac OS X Lion, (version 10.7) is the eighth major release of macOS, Apple's desktop and server operating system for Mac computers...71 KB (6,162 words) - 13:01, 5 June 2024
- A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...35 KB (4,123 words) - 04:47, 9 May 2024
- In cryptography, subliminal channels are covert channels that can be used to communicate secretly in normal looking communication over an insecure channel...11 KB (1,515 words) - 15:55, 16 April 2024
- The Power Mac G5 is a series of personal computers designed, manufactured, and sold by Apple Computer, Inc. from 2003 to 2006 as part of the Power Mac...30 KB (2,586 words) - 01:02, 4 June 2024
- Internet Small Computer Systems Interface or iSCSI (/aɪˈskʌzi/ eye-SKUZ-ee) is an Internet Protocol-based storage networking standard for linking data...26 KB (3,244 words) - 22:38, 25 March 2024
- A window manager is system software that controls the placement and appearance of windows within a windowing system in a graphical user interface. Most...25 KB (3,096 words) - 09:13, 2 June 2024
- XPath (XML Path Language) is an expression language designed to support the query or transformation of XML documents. It was defined by the World Wide...28 KB (3,136 words) - 08:56, 2 May 2024
- Infrastructure as a service (IaaS) is a cloud computing service model by means of which computing resources are supplied by a cloud services provider....7 KB (747 words) - 13:54, 8 May 2024
- The OLPC XO (formerly known as $100 Laptop, Children's Machine, 2B1) is a low cost laptop computer intended to be distributed to children in developing...56 KB (5,842 words) - 10:37, 12 May 2024
- MorphOS is an AmigaOS-like computer operating system (OS). It is a mixed proprietary and open source OS produced for the Pegasos PowerPC (PPC) processor...26 KB (1,833 words) - 07:35, 9 June 2024
- In computing, NaN (/næn/), standing for Not a Number, is a particular value of a numeric data type (often a floating-point number) which is undefined as...29 KB (3,688 words) - 13:23, 8 May 2024
- Behavior-driven development (BDD) involves naming software tests using domain language to describe the behavior of the code. BDD involves use of a domain-specific...30 KB (3,730 words) - 15:20, 16 April 2024
- In computer programming, dataflow programming is a programming paradigm that models a program as a directed graph of the data flowing between operations...14 KB (1,615 words) - 17:46, 10 March 2024
- Java applets are small applications written in the Java programming language, or another programming language that compiles to Java bytecode, and delivered...31 KB (3,522 words) - 05:54, 13 May 2024
- MMX is a single instruction, multiple data (SIMD) instruction set architecture designed by Intel, introduced on January 8, 1997 with its Pentium P5 (microarchitecture)...15 KB (1,447 words) - 17:39, 7 June 2024
- In mathematics, a spline is a function defined piecewise by polynomials. In interpolating problems, spline interpolation is often preferred to polynomial...26 KB (4,679 words) - 11:26, 9 April 2024
- Zstandard is a lossless data compression algorithm developed by Yann Collet at Facebook. Zstd is the corresponding reference implementation in C, released...19 KB (1,658 words) - 15:39, 14 June 2024
- Thrift is an interface definition language and binary communication protocol used for defining and creating services for programming languages. It was...12 KB (1,163 words) - 19:01, 23 March 2024
- SystemVerilog, standardized as IEEE 1800, is a hardware description and hardware verification language used to model, design, simulate, test and implement...34 KB (3,976 words) - 20:08, 26 May 2024
- Question answering (QA) is a computer science discipline within the fields of information retrieval and natural language processing (NLP) that is concerned...29 KB (3,394 words) - 11:45, 16 June 2024
- The ultimatum game is a game that has become a popular instrument of economic experiments. An early description is by Nobel laureate John Harsanyi in 1961...39 KB (4,727 words) - 12:43, 1 June 2024
- An instruction set architecture (ISA) is an abstract model of a computer, also referred to as computer architecture. A realization of an ISA is called...33 KB (1,795 words) - 21:05, 28 May 2024
- In computing, a linear-feedback shift register (LFSR) is a shift register whose input bit is a linear function of its previous state. The most commonly...37 KB (4,672 words) - 22:11, 31 March 2024
- This list is divided into proprietary or free software, and open source software, with several comparison tables of different product and vendor characteristics...59 KB (1,414 words) - 03:46, 23 May 2024
- Oracle APEX (also known as APEX) is an enterprise low-code application development platform from Oracle Corporation. APEX is used for developing and deploying...16 KB (1,621 words) - 19:32, 30 April 2024
- In automata theory, a finite-state machine is called a deterministic finite automaton (DFA), if each of its transitions is uniquely determined by its source...30 KB (4,495 words) - 13:00, 30 May 2024
- In computer science, a dynamic programming language is a class of high-level programming languages which at runtime execute many common programming behaviours...15 KB (1,714 words) - 21:28, 21 May 2024
- The 2017 Macron e-mail leaks were leaks of more than 20,000 e-mails related to the campaign of Emmanuel Macron during the 2017 French presidential elections...25 KB (2,505 words) - 04:25, 16 April 2024
- Nearest neighbor search (NNS), as a form of proximity search, is the optimization problem of finding the point in a given set that is closest (or most...27 KB (3,339 words) - 04:02, 4 March 2024
- Samsung SCH-U520 is a phone released on December 7, 2006 by the former U.S. wireless operator Alltel Wireless. The phone was the first phone to support...6 KB (573 words) - 10:36, 7 March 2023
- In cryptography, Camellia is a symmetric key block cipher with a block size of 128 bits and key sizes of 128, 192 and 256 bits. It was jointly developed...18 KB (1,768 words) - 18:34, 29 October 2023
- BitComet (originally named SimpleBT client from versions 0.11 to 0.37) is a cross-protocol BitTorrent, HTTP and FTP client written in C++ for Microsoft...16 KB (1,497 words) - 09:13, 5 December 2023
- The IBM 7090 is a second-generation transistorized version of the earlier IBM 709 vacuum tube mainframe computer that was designed for "large-scale scientific...24 KB (2,719 words) - 18:58, 31 May 2024
- ActiveX Document (also known as DocObject or DocObj) is a Microsoft technology that allows users to view and edit Microsoft Word, Excel, and PDF documents...5 KB (568 words) - 20:32, 21 June 2021
- In mathematical logic, a formula is satisfiable if it is true under some assignment of values to its variables. For example, the formula x + 3 = y {\displaystyle...12 KB (1,500 words) - 18:45, 26 November 2022
- In computing, a persistent data structure or not ephemeral data structure is a data structure that always preserves the previous version of itself when...42 KB (6,207 words) - 04:57, 22 April 2024
- Microsoft Build Engine, or MSBuild, is a set of free and open-source build tools for managed code under the Common Language Infrastructure as well as native...12 KB (942 words) - 05:57, 21 December 2023
- "An Open Letter to Hobbyists" is a 1976 open letter written by Bill Gates, the co-founder of Microsoft, to early personal computer hobbyists, in which...30 KB (3,475 words) - 09:14, 2 April 2024
- A portable application (portable app), sometimes also called standalone, is a program designed to operate without changing other files or requiring other...15 KB (1,672 words) - 18:34, 17 March 2024
- In cryptography, XTEA (eXtended TEA) is a block cipher designed to correct weaknesses in TEA. The cipher's designers were David Wheeler and Roger Needham...10 KB (1,005 words) - 19:00, 14 April 2024
- A modified Harvard architecture is a variation of the Harvard computer architecture that, unlike the pure Harvard architecture, allows memory that contains...12 KB (1,649 words) - 16:19, 30 December 2023
- In mathematics and computer programming, exponentiating by squaring is a general method for fast computation of large positive integer powers of a number...21 KB (3,379 words) - 09:03, 14 June 2024
- Resistive random-access memory (ReRAM or RRAM) is a type of non-volatile (NV) random-access (RAM) computer memory that works by changing the resistance...52 KB (6,177 words) - 10:12, 10 June 2024
- Selectable Mode Vocoder (SMV) is variable bitrate speech coding standard used in CDMA2000 networks. SMV provides multiple modes of operation that are selected...3 KB (396 words) - 01:29, 8 June 2024
- In the fields of digital electronics and computer hardware, multi-channel memory architecture is a technology that increases the data transfer rate between...23 KB (2,029 words) - 17:47, 25 May 2024
- In computer science, storage virtualization is "the process of presenting a logical view of the physical storage resources to" a host computer system,...26 KB (3,819 words) - 14:42, 11 February 2024
- The BEAR and LION block ciphers were invented by Ross Anderson and Eli Biham by combining a stream cipher and a cryptographic hash function. The algorithms...2 KB (218 words) - 07:15, 27 April 2022
- The ThinkPad Tablet is a tablet computer made by Lenovo as part of its series of Android-based tablet devices and is targeted towards business users. Lenovo's...17 KB (1,618 words) - 23:16, 8 August 2023
- Sleep mode (or suspend to RAM) is a low power mode for electronic devices such as computers, televisions, and remote controlled devices. These modes save...11 KB (1,468 words) - 02:40, 12 June 2024
- In computing, Java Web Start (also known as JavaWS, javaws or JAWS) is a deprecated framework developed by Sun Microsystems (now Oracle) that allows users...13 KB (1,670 words) - 22:53, 24 February 2024
- In the theory of computation, a branch of theoretical computer science, a pushdown automaton (PDA) is a type of automaton that employs a stack. Pushdown...26 KB (4,019 words) - 07:17, 18 April 2024
- Georg C. F. Greve (born 10 March 1973 in Helgoland, Germany) is a software developer, physicist, author and currently co-founder and president at Vereign...7 KB (698 words) - 20:37, 1 March 2024
- The following tables compare general and technical information for a number of HTML editors. Please see the individual products' articles for further information...36 KB (759 words) - 11:51, 4 May 2024
- The Microsoft Windows platform specific Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography API...6 KB (617 words) - 07:45, 19 July 2021
- A digital identity is data stored on computer systems relating to an individual, organization, application, or device. For individuals, it involves the...48 KB (5,686 words) - 16:31, 12 June 2024
- SdlBasic is a multiplatform interpreter for BASIC, using the SDL libraries. Its interpreter core is based on wxBasic. The interpreter can be very useful...4 KB (400 words) - 22:51, 13 April 2024
- The Dragon 32 and Dragon 64 are home computers that were built in the 1980s. The Dragons are very similar to the TRS-80 Color Computer, and were produced...19 KB (2,186 words) - 08:08, 7 February 2024
- In artificial intelligence, a differentiable neural computer (DNC) is a memory augmented neural network architecture (MANN), which is typically (but not...14 KB (798 words) - 04:00, 4 May 2024
- Asynchronous circuit (clockless or self-timed circuit): Lecture 12 : 157–186 is a sequential digital logic circuit that does not use a global clock circuit...57 KB (5,984 words) - 22:55, 22 April 2024
- In artificial intelligence and philosophy[verification needed], case-based reasoning (CBR), broadly construed, is the process of solving new problems based...17 KB (2,144 words) - 07:23, 7 March 2024
- Explainable AI (XAI), often overlapping with interpretable AI, or explainable machine learning (XML), either refers to an artificial intelligence (AI)...61 KB (6,768 words) - 23:03, 15 June 2024
- The Transport Layer Security (TLS) protocol provides the ability to secure communications across or inside networks. This comparison of TLS implementations...131 KB (4,493 words) - 15:55, 9 May 2024
- A mechanical computer is a computer built from mechanical components such as levers and gears rather than electronic components. The most common examples...20 KB (1,722 words) - 01:22, 4 May 2024
- In the field of database design, a multi-model database is a database management system designed to support multiple data models against a single, integrated...9 KB (1,011 words) - 03:22, 11 April 2024
- Hunk is the executable file format of tools and programs of the Amiga Operating System based on Motorola 68000 CPU and other processors of the same family...16 KB (2,068 words) - 10:47, 15 November 2023
- The move-to-front (MTF) transform is an encoding of data (typically a stream of bytes) designed to improve the performance of entropy encoding techniques...12 KB (1,562 words) - 11:24, 14 March 2024
- make menuconfig is one of five similar tools that can configure Linux source, a necessary early step needed to compile the source code. make menuconfig...10 KB (696 words) - 01:13, 14 May 2024
- Web Services Discovery provides access to software systems over the Internet using standard protocols. In the most basic scenario there is a Web Service...12 KB (1,389 words) - 02:56, 19 August 2023
- Separation of content and presentation (or separation of content and style) is the separation of concerns design principle as applied to the authoring...4 KB (487 words) - 08:40, 3 June 2024
- Extreme programming (XP) is an agile software development methodology used to implement software systems. This article details the practices used in this...19 KB (2,717 words) - 08:24, 24 March 2024
- In computer science, an LL parser (Left-to-right, leftmost derivation) is a top-down parser for a restricted context-free language. It parses the input...30 KB (4,363 words) - 12:34, 21 March 2024
- An off-by-one error or off-by-one bug (known by acronyms OBOE, OBO, OB1 and OBOB) is a logic error that involves a number that differs from its intended...10 KB (1,428 words) - 00:38, 3 June 2024
- In computing, Internet Key Exchange (IKE, versioned as IKEv1 and IKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol...19 KB (2,339 words) - 10:35, 1 November 2023
- Self is an general-purpose, high-level, object-oriented programming language based on the concept of prototypes. Self began as a dialect of Smalltalk,...23 KB (2,932 words) - 07:18, 9 June 2024
- In computer science, an interval tree is a tree data structure to hold intervals. Specifically, it allows one to efficiently find all intervals that overlap...24 KB (3,577 words) - 21:32, 11 June 2024
- Federico Faggin (Italian pronunciation: [fedeˈriːko fadˈdʒin], Venetian: [faˈdʒiŋ]; born 1 December 1941) is an Italian-American physicist, engineer, inventor...42 KB (4,744 words) - 00:35, 10 June 2024
- libtorrent is an open-source implementation of the BitTorrent protocol. It is written in and has its main library interface in C++. Its most notable features...18 KB (1,981 words) - 09:43, 2 May 2024
- In computer programming, a nondeterministic algorithm is an algorithm that, even for the same input, can exhibit different behaviors on different runs...5 KB (556 words) - 09:21, 24 August 2023
- Link-state routing protocols are one of the two main classes of routing protocols used in packet switching networks for computer communications, the others...17 KB (2,426 words) - 03:32, 16 June 2024
- Multimodal interaction provides the user with multiple modes of interacting with a system. A multimodal interface provides several distinct tools for input...31 KB (4,852 words) - 15:55, 14 March 2024
- In computer science, a consistency model specifies a contract between the programmer and a system, wherein the system guarantees that if the programmer...57 KB (7,619 words) - 04:21, 3 March 2024
- Event-driven architecture (EDA) is a software architecture paradigm concerning the production and detection of events. An event can be defined as "a significant...20 KB (2,510 words) - 00:05, 22 March 2024
- Open publishing is a term used by Matthew Arnison in March 2001 to describe the online process of creating text, audio and video news by methods that are...4 KB (448 words) - 10:35, 26 September 2021
- Spaghetti sort is a linear-time, analog algorithm for sorting a sequence of items, introduced by A. K. Dewdney in his Scientific American column. This...3 KB (387 words) - 22:05, 24 April 2024
- GhostNet (simplified Chinese: 幽灵网; traditional Chinese: 幽靈網; pinyin: YōuLíngWǎng) is the name given by researchers at the Information Warfare Monitor to...16 KB (1,541 words) - 17:09, 7 June 2024
- Semantic interoperability is the ability of computer systems to exchange data with unambiguous, shared meaning. Semantic interoperability is a requirement...18 KB (2,475 words) - 04:35, 28 January 2024
- Win4Lin is a discontinued proprietary software application for Linux which allowed users to run a copy of Windows 9x, Windows 2000 or Windows XP applications...8 KB (767 words) - 18:41, 21 March 2024
- Chipmunk Basic is a freeware interpreter for the BASIC programming language maintained by Ron Nicholson. Chipmunk basic was originally developed for the...2 KB (217 words) - 01:11, 22 April 2024
- The binding properties pattern is combining multiple observers to force properties in different objects to be synchronized or coordinated in some way....4 KB (414 words) - 09:30, 8 March 2024
- In a computer operating system that uses paging for virtual memory management, page replacement algorithms decide which memory pages to page out, sometimes...47 KB (6,235 words) - 16:15, 7 January 2024
- In configuration management, a baseline is an agreed description of the attributes of a product, at a point in time, which serves as a basis for defining...7 KB (1,007 words) - 11:38, 12 August 2023
- 3D video coding is one of the processing stages required to manifest stereoscopic content into a home. There are three techniques which are used to achieve...738 bytes (62 words) - 17:31, 12 August 2022
- stat() is a Unix system call that returns file attributes about an inode. The semantics of stat() vary between operating systems. As an example, Unix command...16 KB (1,900 words) - 10:20, 21 May 2024
- The NS32000, sometimes known as the 32k, is a series of microprocessors produced by National Semiconductor. The first member of the family came to market...33 KB (3,554 words) - 00:12, 3 June 2024
- CH /ˌsiːˈeɪtʃ/ is a proprietary cross-platform C and C++ interpreter and scripting language environment. It was originally designed by Harry Cheng as a...15 KB (1,498 words) - 22:11, 23 April 2024
- AspectJ is an aspect-oriented programming (AOP) extension for the Java programming language, created at PARC. It is available in Eclipse Foundation open-source...13 KB (1,321 words) - 04:05, 21 March 2024
- Database tuning describes a group of activities used to optimize and homogenize the performance of a database. It usually overlaps with query tuning, but...5 KB (652 words) - 12:53, 16 April 2023
- MUSIC-N refers to a family of computer music programs and programming languages descended from or influenced by MUSIC, a program written by Max Mathews...9 KB (1,127 words) - 00:25, 7 March 2023
- An American flag sort is an efficient, in-place variant of radix sort that distributes items into buckets. Non-comparative sorting algorithms such as radix...7 KB (988 words) - 23:16, 2 May 2024
- Electronic billing or electronic bill payment and presentment, is when a seller such as company, organization, or group sends its bills or invoices over...8 KB (1,031 words) - 17:34, 23 March 2024
- Interactive geometry software (IGS) or dynamic geometry environments (DGEs) are computer programs which allow one to create and then manipulate geometric...27 KB (1,718 words) - 20:21, 15 May 2024
- A property, in some object-oriented programming languages, is a special sort of class member, intermediate in functionality between a field (or data member)...17 KB (1,741 words) - 14:24, 24 June 2023
- Ascender Corporation was a digital typeface foundry and software development company in the Chicago suburb of Elk Grove Village, Illinois. It was founded...9 KB (982 words) - 00:41, 9 February 2024
- The OpenBSD operating system focuses on security and the development of security features.: xxvii According to author Michael W. Lucas, OpenBSD "is widely...30 KB (3,213 words) - 23:29, 8 April 2024
- An embedded pushdown automaton or EPDA is a computational model for parsing languages generated by tree-adjoining grammars (TAGs). It is similar to the...9 KB (1,315 words) - 09:16, 16 December 2023
- In time series analysis, dynamic time warping (DTW) is an algorithm for measuring similarity between two temporal sequences, which may vary in speed. For...36 KB (4,325 words) - 09:18, 6 June 2024
- A federation is a group of computing or network providers agreeing upon standards of operation in a collective fashion. The term may be used when describing...4 KB (467 words) - 19:50, 29 August 2021
- Microsoft BizTalk Server is an inter-organizational middleware system (IOMS) that automates business processes through the use of adapters which are tailored...15 KB (1,346 words) - 14:55, 14 June 2024
- A data structure diagram (DSD) is the visual representation of a certain kind of data model that contains entities, their relationships, and the constraints...4 KB (481 words) - 13:56, 18 December 2023
- The Evolution of Cooperation is a 1984 book written by political scientist Robert Axelrod that expands upon a paper of the same name written by Axelrod...46 KB (4,822 words) - 15:58, 24 May 2024
- A message broker (also known as an integration broker or interface engine) is an intermediary computer program module that translates a message from the...7 KB (692 words) - 12:14, 23 May 2024
- A flicker fixer or scan doubler is a piece of computer hardware that de-interlaces an output video signal. The flicker fixer accomplishes this by adjusting...3 KB (430 words) - 21:19, 31 March 2024
- In numerical analysis, the Kahan summation algorithm, also known as compensated summation, significantly reduces the numerical error in the total obtained...27 KB (3,532 words) - 06:58, 9 February 2024
- Windows Internet Name Service (WINS) is the Microsoft implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names...2 KB (211 words) - 20:17, 6 January 2023
- Software rendering is the process of generating an image from a model by means of computer software. In the context of computer graphics rendering, software...11 KB (1,336 words) - 20:42, 22 January 2024
- Combustion was a computer program for motion graphics, compositing, and visual effects developed by Discreet Logic, a division on Autodesk, and originally...2 KB (162 words) - 00:55, 1 February 2024
- In economics, dynamic inconsistency or time inconsistency is a situation in which a decision-maker's preferences change over time in such a way that a...23 KB (3,104 words) - 12:18, 1 May 2024
- MiWi is a proprietary wireless protocol supporting peer-to-peer, star network connectivity. It was designed by Microchip Technology. MiWi uses small, low-power...8 KB (714 words) - 09:54, 20 May 2024
- Pascal MicroEngine is a series of microcomputer products manufactured by Western Digital from 1979 through the mid-1980s, designed specifically to run...10 KB (1,264 words) - 18:00, 4 February 2024
- STARAN in the information technology industry might be the first commercially available computer designed around an associative memory. The STARAN computer...2 KB (168 words) - 01:04, 28 May 2022
- Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer...12 KB (1,404 words) - 11:56, 10 June 2024
- In computer science and formal methods, a SAT solver is a computer program which aims to solve the Boolean satisfiability problem. On input a formula over...29 KB (3,558 words) - 15:26, 22 December 2023
- Core War is a 1984 programming game created by D. G. Jones and A. K. Dewdney in which two or more battle programs (called "warriors") compete for control...20 KB (2,547 words) - 19:59, 17 May 2024
- The fat tree network is a universal network for provably efficient communication. It was invented by Charles E. Leiserson of the Massachusetts Institute...7 KB (731 words) - 08:42, 28 August 2023
- Configurators, also known as choice boards, design systems, toolkits, or co-design platforms, are responsible for guiding the user[who?] through the c...9 KB (1,054 words) - 10:55, 24 August 2023
- The Covox Speech Thing is an external digital-to-analog converter (DAC) that plugs into the parallel printer port of a PC. It converts 8-bit digital sound...20 KB (2,121 words) - 04:33, 5 June 2024
- A bokode is a type of data tag which holds much more information than a barcode over the same area. They were developed by a team led by Ramesh Raskar...3 KB (341 words) - 08:01, 24 March 2023
- DICT is a dictionary network protocol created by the DICT Development Group in 1997, described by RFC 2229. Its goal is to surpass the Webster protocol...11 KB (1,068 words) - 22:08, 3 January 2024
- Idris is a purely-functional programming language with dependent types, optional lazy evaluation, and features such as a totality checker. Idris may be...10 KB (899 words) - 21:24, 3 June 2024
- Design rule for Camera File system (DCF) is a JEITA specification (number CP-3461) which defines a file system for digital cameras, including the directory...11 KB (1,472 words) - 16:07, 29 January 2024
- In the mathematics of computational complexity theory, computability theory, and decision theory, a search problem is a type of computational problem represented...4 KB (534 words) - 01:54, 18 January 2023
- In software architecture, a messaging pattern is an architectural pattern which describes how two different parts of an application, or different systems...11 KB (1,582 words) - 23:59, 5 July 2023
- In computer science, a logistic model tree (LMT) is a classification model with an associated supervised training algorithm that combines logistic regression...2 KB (220 words) - 22:26, 5 May 2023
- T/Maker (Table Maker) was one of the first spreadsheet programs designed for the personal computer user and released by Peter Roizen in 1979. The application...6 KB (558 words) - 03:40, 19 September 2021
- Java Data Objects (JDO) is a specification of Java object persistence. One of its features is a transparency of the persistence services to the domain...6 KB (669 words) - 06:49, 30 October 2023
- Frama-C stands for Framework for Modular Analysis of C programs. Frama-C is a set of interoperable program analyzers for C programs. Frama-C has been developed...7 KB (681 words) - 22:51, 28 February 2024
- Adaxa Suite is a fully integrated[vague] Open Source Enterprise Resource Planning (ERP) Suite. Adaxa Suite has a General Public License GPL/GPL2 license...3 KB (352 words) - 06:01, 18 April 2024
- The SQL/Schemata, or Information and Definition Schemas, part of the SQL standard is defined by ISO/IEC 9075-11:2008. SQL/Schemata defines the information...1 KB (139 words) - 15:43, 25 June 2019
- Xenu, or Xenu's Link Sleuth, is a computer program that checks websites for broken hyperlinks. It is written by Tilman Hausherr and is proprietary software...6 KB (594 words) - 08:46, 26 December 2023
- Database testing usually consists of a layered process, including the user interface (UI) layer, the business layer, the data access layer and the database...10 KB (1,303 words) - 19:21, 10 August 2023
- Service choreography in business computing is a form of service composition in which the interaction protocol between several partner services[clarification...18 KB (1,847 words) - 05:34, 22 July 2023
- An object code optimizer, sometimes also known as a post pass optimizer or, for small sections of code, peephole optimizer, forms part of a software compiler...10 KB (950 words) - 05:42, 7 April 2024
- In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data...22 KB (2,153 words) - 20:16, 12 March 2024
- Information flow in an information theoretical context is the transfer of information from a variable x {\displaystyle x} to a variable y {\displaystyle...15 KB (2,376 words) - 07:14, 19 April 2024
- First-order equational logic consists of quantifier-free terms of ordinary first-order logic, with equality as the only predicate symbol. The model theory...7 KB (835 words) - 12:35, 15 April 2022
- TCP NAT traversal and TCP hole punching (sometimes NAT punch-through) in computer networking occurs when two hosts behind a network address translation...9 KB (1,271 words) - 21:29, 28 December 2023
- The U-matrix (unified distance matrix) is a representation of a self-organizing map (SOM) where the Euclidean distance between the codebook vectors of...2 KB (220 words) - 20:09, 29 September 2023
- Change impact analysis (IA) or impact analysis is the analysis of changes within a deployed product or application and their potential consequences.[b...8 KB (856 words) - 15:05, 31 January 2024
- Software product management (sometimes also referred to as digital product management, or in the right context just product management) is the discipline...11 KB (1,348 words) - 21:38, 11 June 2024
- ProZ.com is a membership-based website targeting freelance translators. Founded in 1999, it is mainly used for posting and responding to translation job...8 KB (743 words) - 14:59, 25 January 2024
- Helios is a discontinued Unix-like operating system for parallel computers. It was developed and published by Perihelion Software. Its primary architecture...11 KB (1,310 words) - 05:46, 13 May 2024
- "In object-oriented systems with multiple inheritance, some mechanism must be used for resolving conflicts when inheriting different definitions of the...11 KB (1,549 words) - 23:32, 9 April 2024
- Software evolution is the continual development of a piece of software after its initial release to address changing stakeholder and/or market requirements...16 KB (2,041 words) - 22:15, 26 January 2024
- In computational geometry, the Bentley–Ottmann algorithm is a sweep line algorithm for listing all crossings in a set of line segments, i.e. it finds the...24 KB (3,312 words) - 06:50, 11 March 2024
- Chaff is an algorithm for solving instances of the Boolean satisfiability problem in programming. It was designed by researchers at Princeton University...2 KB (170 words) - 23:56, 28 September 2023
- Fine Artist is a raster graphics editor program created by Microsoft Kids in 1993. Using this program, it is possible to create paintings. The interface...3 KB (238 words) - 18:45, 8 June 2024
- Ehcache (/ˈiːeɪtʃkæʃ/ EE-aytch-kash) is an open source Java distributed cache for general-purpose caching, Java EE and light-weight containers[clarify]...3 KB (210 words) - 14:46, 10 October 2023
- BitClout is an open source blockchain-based social media platform. On the platform, users can post short-form writings and photos, award money to posts...15 KB (1,336 words) - 22:07, 24 February 2024
- In computer science and operations research, randomized rounding is a widely used approach for designing and analyzing approximation algorithms. Many combinatorial...24 KB (4,052 words) - 03:12, 2 December 2023
- OpenAI Codex is an artificial intelligence model developed by OpenAI. It parses natural language and generates code in response. It powers GitHub Copilot...13 KB (1,306 words) - 01:56, 1 April 2024
- The roofline model is an intuitive visual performance model used to provide performance estimates of a given compute kernel or application running on multi-core...16 KB (1,700 words) - 01:13, 4 January 2024
- Grammar systems theory is a field of theoretical computer science that studies systems of finite collections of formal grammars generating a formal language...5 KB (487 words) - 18:22, 9 January 2023
- A functional software architecture (FSA) is an architectural model that identifies enterprise functions, interactions and corresponding IT needs. These...14 KB (2,004 words) - 23:34, 21 October 2020
- A semantic grid is an approach to grid computing in which information, computing resources and services are described using the semantic data model. In...2 KB (288 words) - 23:12, 10 February 2023
- In databases, a synonym is an alias or alternate name for a table, view, sequence, or other schema object. They are used mainly to make it easy for users...5 KB (762 words) - 17:47, 7 February 2022
- MAPPER Systems, now known as Business Information Server, BIS, is a fourth-generation programming language originally from Sperry Univac. Now owned by...16 KB (2,278 words) - 04:13, 2 April 2024
- The Nuclear Instrumentation Module (NIM) standard defines mechanical and electrical specifications for electronics modules used in experimental particle...5 KB (427 words) - 22:36, 28 June 2023
- The Windows 9x series of operating systems (e.g. Windows 95, Windows 98) used a monolithic kernel to power the inner components of such operating systems...18 KB (2,235 words) - 16:51, 11 June 2024
- In algebra, a presentation of a monoid (or a presentation of a semigroup) is a description of a monoid (or a semigroup) in terms of a set Σ of generators...5 KB (785 words) - 21:24, 18 January 2022
- In network science, a gradient network is a directed subnetwork of an undirected "substrate" network where each node has an associated scalar potential...12 KB (1,512 words) - 05:19, 10 January 2024
- Middleware analysts are computer software engineers with a specialization in products that connect two different computer systems together. These products...10 KB (1,305 words) - 12:21, 4 September 2022
- Cydoor is a spyware and adware first detected in 2003. The Cydoor software downloads advertisements from the Cydoor servers, to be displayed in the Cydoor-supported...4 KB (349 words) - 22:39, 29 April 2024
- The market for zero-day exploits is commercial activity related to the trafficking of software exploits. Software vulnerabilities and "exploits" are used...20 KB (2,883 words) - 19:01, 31 July 2023
- In cryptography, a key ceremony is a ceremony held to generate or use a cryptographic key. A public example is the signing of the DNS root zone for DNSSEC...13 KB (1,507 words) - 14:37, 8 June 2024
- In mathematics, the Lagrangian theory on fiber bundles is globally formulated in algebraic terms of the variational bicomplex, without appealing to the...2 KB (255 words) - 16:02, 21 June 2023
- Compunet was a United Kingdom-based interactive service provider,[vague] catering primarily for the Commodore 64 but later for the Amiga and Atari ST....9 KB (1,305 words) - 17:17, 5 January 2024
- In computer graphics, the centripetal Catmull–Rom spline is a variant form of the Catmull–Rom spline, originally formulated by Edwin Catmull and Raphael...14 KB (2,179 words) - 14:13, 31 May 2024
- Zone Routing Protocol, or ZRP is a hybrid wireless networking routing protocol that uses both proactive and reactive routing protocols when sending information...4 KB (544 words) - 22:58, 9 May 2023
- Double boot (also known as cold double boot, double cold boot, double POST, power-on auto reboot, or fake boot) is a feature of the BIOS, and may occur...2 KB (221 words) - 08:59, 11 January 2023
- In cryptocurrencies, an unspent transaction output (UTXO) is a distinctive element in a subset of digital currency models. A UTXO represents a certain...10 KB (1,269 words) - 16:50, 9 June 2024
- ptrace is a system call found in Unix and several Unix-like operating systems. By using ptrace (an abbreviation of "process trace") one process can control...12 KB (1,270 words) - 14:50, 8 January 2024
- The Wiener's attack, named after cryptologist Michael J. Wiener, is a type of cryptographic attack against RSA. The attack uses the continued fraction...12 KB (1,792 words) - 15:03, 3 May 2024
- Xvfb or X virtual framebuffer is a display server implementing the X11 display server protocol. In contrast to other display servers, Xvfb performs all...5 KB (475 words) - 04:32, 25 May 2024
- An ontology chart is a type of chart used in semiotics and software engineering to illustrate an ontology. The nodes of an ontology chart represent universal...5 KB (681 words) - 15:45, 7 January 2024
- Masking threshold within acoustics (a branch of physics that deals with topics such as vibration, sound, ultrasound , and infrasound), refers to a process...3 KB (413 words) - 11:35, 9 October 2022
- In mathematics, the constant problem is the problem of deciding whether a given expression is equal to zero. This problem is also referred to as the identity...3 KB (364 words) - 02:18, 5 May 2023
- Projective texture mapping is a method of texture mapping that allows a textured image to be projected onto a scene as if by a slide projector. Projective...4 KB (587 words) - 20:21, 10 November 2022
- An iSCSI target is a storage resource located on an iSCSI server (more generally, one of potentially many instances of iSCSI storage nodes running on that...4 KB (85 words) - 03:13, 11 April 2022
- Joyce Weisbecker (born 1958) is an American retired[citation needed] engineer and actuary. She became the first female commercial video game designer in...4 KB (338 words) - 05:37, 6 April 2024
- Language equations are mathematical statements that resemble numerical equations, but the variables assume values of formal languages rather than numbers...9 KB (1,127 words) - 17:09, 13 January 2024
- User-in-the-Loop (UIL) refers to the notion that a technology (e.g., network) can improve a performance objective by engaging its human users (Layer 8)...14 KB (2,068 words) - 21:49, 5 February 2023
- In computer networking, hypercube networks are a type of network topology used to connect and route data between multiple processing units or computers...5 KB (717 words) - 21:05, 1 April 2024
- Frame-bursting is a communication protocol feature used at the link layer in communication networks to alter the transmission characteristics in order...4 KB (445 words) - 03:47, 17 May 2023
- ICMP hole punching is a technique employed in network address translator (NAT) applications for maintaining Internet Control Message Protocol (ICMP) packet...4 KB (513 words) - 14:05, 15 July 2022
- Following the development of Keynesian economics, applied economics began developing forecasting models based on economic data including national income...8 KB (929 words) - 14:08, 14 January 2022
- In cryptography, a pseudorandom ensemble is a family of variables meeting the following criteria: Let U = { U n } n ∈ N {\displaystyle U=\{U_{n}\}_{n\in...845 bytes (98 words) - 11:13, 16 February 2024
- In proof theory, ludics is an analysis of the principles governing inference rules of mathematical logic. Key features of ludics include notion of compound...4 KB (493 words) - 12:07, 29 October 2021
- Safe semantics is a computer hardware consistency model. It describes one type of guarantee that a data register provides when it is shared by several...7 KB (959 words) - 22:58, 27 March 2023
- The Next Hop Resolution Protocol (NHRP) is an extension of the ATM ARP routing mechanism that is sometimes used to improve the efficiency of routing computer...4 KB (401 words) - 17:48, 3 October 2023
- This is a list of algebraic number theory topics. These topics are basic to the field, either as prototypical examples, or as basic objects of study. Algebraic...2 KB (187 words) - 13:07, 20 March 2022
- Snarf is a term used by computer programmers and the UNIX community meaning to copy a file or data over a network, for any purpose, with additional specialist...3 KB (313 words) - 16:57, 9 May 2024
- JUNG (the Java Universal Network/Graph Framework) is an open-source graph modeling and visualization framework written in Java, under the BSD license....4 KB (267 words) - 23:17, 7 January 2024
- Neural cliques are network-level memory coding units in the hippocampus. They are functionally organized in a categorical and hierarchical manner. Researchers...5 KB (641 words) - 19:18, 31 May 2021
- Timway (simplified Chinese: 添达; traditional Chinese: 添達; pinyin: Tiān Dá) is a web portal and directory primarily serving Hong Kong. The Timway Hong Kong...7 KB (707 words) - 01:37, 10 May 2024
- Praxeme is a methodology for enterprise architecture which provides a structured approach to the design and implementation of an enterprise information...12 KB (1,421 words) - 13:26, 20 September 2023
- Polychotomous key refers to the number of alternatives which a decision point may have in a non-temporal hierarchy of independent variables. The number...2 KB (165 words) - 16:53, 17 September 2022
- Xara Flare Open Vector File Format is a format that was introduced in 1997 by XARA to compete with the Macromedia Flash format. The format was open and...1 KB (130 words) - 13:09, 31 January 2023
- In formal language theory, an LL grammar is a context-free grammar that can be parsed by an LL parser, which parses the input from Left to right, and constructs...14 KB (1,997 words) - 10:49, 7 December 2023
- In software engineering, an amelioration pattern is an anti-pattern formed when an existing software design pattern was edited (i.e. rearranged, added...1 KB (115 words) - 21:50, 12 February 2024
- Information space is the set of concepts, and relations among them, held by an information system; it describes the range of possible values or meanings...3 KB (326 words) - 16:08, 9 January 2024
- In algebraic number theory, a reflection theorem or Spiegelungssatz (German for reflection theorem – see Spiegel and Satz) is one of a collection of theorems...4 KB (567 words) - 15:13, 29 October 2021
- A multi-bearer network (MBN) is a network having the capability to carry a data packet via one of several alternative bearers. To be more precise, the...4 KB (546 words) - 17:06, 8 June 2024
- HP nPartitions are hard partition technology in HP's Virtual Server Environment. nPartitions (or nPar) are electrically isolated from other nPar partitions...5 KB (737 words) - 21:47, 5 May 2024
- An Active message (in computing) is a messaging object capable of performing processing on its own. It is a lightweight messaging protocol used to optimize...5 KB (612 words) - 01:13, 22 October 2018
- A load-balanced switch is a switch architecture which guarantees 100% throughput with no central arbitration at all, at the cost of sending each packet...7 KB (1,012 words) - 15:09, 14 September 2022
- The Winston Smith Project (Italian: Progetto Winston Smith, or PWS) is an informational and operational project for the defence of human rights on the...15 KB (1,970 words) - 16:35, 5 March 2023
- Process Control Daemon (PCD) is an open source, light-weight system level process manager/controller for Embedded Linux based projects (such as consumer...8 KB (1,094 words) - 16:10, 7 March 2023
- Authenticated Identity Body or AIB is a method allowing parties in a network to share authenticated identity, thereby increasing the integrity of their...2 KB (233 words) - 03:30, 28 April 2024
- In model checking, a field of computer science, a region is a convex polytope in R d {\displaystyle \mathbb {R} ^{d}} for some dimension d {\displaystyle...15 KB (2,734 words) - 20:24, 30 October 2023
- Design Space Exploration (DSE) refers to systematic analysis and pruning of unwanted design points based on parameters of interest. While the term DSE...4 KB (524 words) - 10:07, 14 February 2023
- Regular semantics is a computer hardware consistency model. It describes a type of guarantee provided by a processor register that is shared by several...5 KB (825 words) - 16:30, 25 April 2024
- A file format is a procedure to encode information for storage in a computer file. The databank format is an ASCII file format for time series econometric...2 KB (216 words) - 20:16, 31 July 2020
- The Deadline Scheduler is an I/O scheduler, or disk scheduler, for the Linux kernel. It was written in 2002 by Jens Axboe. The main purpose of the Deadline...8 KB (1,102 words) - 22:09, 12 May 2024
- A System Deployment Image (aka SDI) is a file format used primarily with Microsoft products to contain an arbitrary disk image, including boot sector information...4 KB (492 words) - 08:54, 30 May 2024
- AutoMan is a series of software implementations used both for job scheduling and console operations automation for z/OS. These implementations range from...4 KB (461 words) - 06:33, 18 September 2023
- Semantic analysis is a method for eliciting and representing knowledge about organisations.[vague] Initially the problem must be defined by domain experts...1 KB (147 words) - 19:41, 26 October 2020
- Chih-Wei Huang (黃志偉) is a developer and promoter of free software who lives in Taiwan. He is famous for his work in the VoIP and internationalization and...7 KB (722 words) - 18:43, 19 February 2024
- Utilising the DW/BI system is the final step before business users gain access to the information. The first impression the business community gets is...2 KB (207 words) - 11:48, 30 January 2024
- In object-oriented programming, an indexer allows instances of a particular class or struct to be indexed just like arrays. It is a form of operator overloading...3 KB (314 words) - 15:25, 6 February 2023
- An Interest Flooding Attack (IFA) is a denial-of-service attack in an Information-centric network (or Content-Centric Networking (CCN) or Named Data Networking...3 KB (279 words) - 14:11, 5 February 2024
- Application Lifecycle Framework (ALF) was an Eclipse Foundation project to develop an open framework[vague] for system integration and interoperability...2 KB (118 words) - 18:44, 22 April 2024
- In computer security, the Zardoz list, more formally known as the Security-Digest list, was a famous semi-private full disclosure mailing list run by Neil...3 KB (318 words) - 03:34, 29 May 2023
- SLR grammars are the class of formal grammars accepted by a Simple LR parser. SLR grammars are a superset of all LR(0) grammars and a subset of all LALR(1)...4 KB (684 words) - 19:47, 9 March 2022
- A virtual security appliance is a computer appliance that runs inside virtual environments. It is called an appliance because it is pre-packaged with a...8 KB (1,131 words) - 04:22, 28 April 2022
- Hybrid testing is what most frameworks evolve/develop into over time and multiple projects. The most successful automation frameworks generally accommodate...2 KB (216 words) - 21:59, 19 January 2024
- The Monroe Calculating Machine Mark XI (or Monrobot XI) was a general-purpose stored-program electronic digital computer introduced in 1960 by the Monroe...17 KB (2,066 words) - 22:40, 29 April 2024
- Spring Integration is an open source framework for enterprise application integration using the well-known Enterprise Integration Patterns. It is a lightweight[clarify]...2 KB (119 words) - 11:00, 9 April 2024
- A term graph is a representation of an expression in a formal language as a generalized graph whose vertices are terms[clarify]. Term graphs are a more...4 KB (434 words) - 23:14, 8 January 2024
- CAL (the Cal Actor Language) is a high-level programming language for writing (dataflow) actors, which are stateful operators that transform input streams...17 KB (2,538 words) - 05:51, 23 June 2022
- The confederate effect is the phenomenon of people falsely classifying human intelligence as machine (or artificial) intelligence during Turing tests....2 KB (253 words) - 10:25, 27 April 2024
- AGNITIO S.L. was a voice biometrics technology company, headquartered in Madrid, Spain. Biometric authentication uses unique biological characteristics...6 KB (533 words) - 15:07, 12 March 2024
- Throughout history, architects have often been chosen by setting up an architectural competition and awarding the commission on the basis of the most favoured...5 KB (459 words) - 01:42, 9 March 2023
- E-society, or "electronic society", is a society that consists of one or more e-Communities involved in the areas from e-Government, e-Democracy, and e-Business...2 KB (244 words) - 00:16, 23 January 2024
- In software engineering, the Extract Class refactoring is applied when a class becomes overweight with too many methods and its purpose becomes unclear...894 bytes (65 words) - 19:20, 7 September 2019
- I Write Like is a website created by Russian software programmer Dmitry Chestnykh, founder of software company Coding Robots. The site analyzes users'...5 KB (453 words) - 06:29, 19 September 2022
- CISPR 11 is an international standard analog to European standard EN 55011. This is the standard that is very often referenced in all European EMC standards...872 bytes (61 words) - 07:19, 29 February 2020
- In mathematics, symmetric convolution is a special subset of convolution operations in which the convolution kernel is symmetric across its zero point...4 KB (493 words) - 05:44, 31 January 2023
- In computer science, state space enumeration are methods that consider each reachable program state to determine whether a program satisfies a given property...1 KB (149 words) - 07:12, 29 April 2022
- Restful Objects is a standard covering RESTful interfaces to domain object models. The specification is published under a Creative Commons license. The...4 KB (357 words) - 09:51, 7 June 2024
- In computer programming, a usage message or help message is a brief message displayed by a program that utilizes a command-line interface for execution...4 KB (463 words) - 16:27, 5 June 2024
- Virtual worlds are an example of an early 21st-century post-convergent medium. Virtual worlds present a complex matrix of interdependent relationships...2 KB (260 words) - 03:55, 5 December 2021
- In automata theory and control theory, branches of mathematics, theoretical computer science and systems engineering, a noncommutative signal-flow graph...12 KB (1,654 words) - 22:41, 7 June 2024
- The Wave Mate Bullet was a Z80 single-board computer from 1982 which used the CP/M operating system. It was sold in Australia, the United States and Europe...2 KB (269 words) - 06:56, 24 February 2024
- StoredIQ was a company founded for information lifecycle management (ILM) of unstructured data. Founded in 2001 as Deepfile in Austin, Texas by Jeff Erramouspe...5 KB (380 words) - 20:03, 26 April 2024
- JArchitect is a static analysis tool for Java code. This tool supports a large number of code metrics, allows for visualization of dependencies using directed...3 KB (245 words) - 11:36, 17 August 2023
- The Broadcast/Multicast control (BMC) is a sublayer of layer 2 protocol of Radio Interface Protocol Architecture as per BMC-STD. It exists in the user...1 KB (187 words) - 11:53, 8 February 2024
- Environmental memory is the sum of explicit, persistent and structured data of knowledges, models and scientific expertise linked to an environmental observation...1 KB (115 words) - 16:36, 23 May 2024
- In philosophy, a core ontology is a basic and minimal ontology consisting only of the minimal concepts required to understand the other concepts. It must...2 KB (277 words) - 04:37, 27 August 2022
- TextEdit was the name of a collection of application programming interfaces (APIs) in the classic Mac OS for performing text editing. These APIs were originally...2 KB (255 words) - 03:04, 20 November 2020
- OneAPI is a set of application programming interfaces (APIs) supported by the GSM Association that exposes network capabilities[clarify] over the Internet...3 KB (410 words) - 01:17, 25 May 2023
- HDCopy is a disk image application for floppy disks that runs in MS-DOS. It can copy a floppy on the fly, or by using archives with IMG file extension...3 KB (273 words) - 14:40, 19 May 2024
- OnGreen is an online social and business platform committed to cleantech technologies.[vague] Entrepreneurs post plans to get connections, feedback and...4 KB (307 words) - 19:20, 22 February 2018
- Nuclear computation is a type of computation which allows threads to either spawn new threads or converge many threads to one. The aim of nuclear computation...4 KB (474 words) - 21:36, 16 March 2024
- A characteristic-based product configurator is a product configurator extension which uses a set of discrete variables, called characteristics (or features)...4 KB (461 words) - 07:56, 5 July 2021
- Negative Branch Reservations is an emerging phenomenon from Eliyahu Goldratt's Theory of Constraints. A Negative Branch Reservation is a cause and effect...849 bytes (82 words) - 12:10, 12 October 2019
- GFIRST is the United States Government Forum of Incident Response and Security Teams. Background: GFIRST was formed because there was a need and desire...3 KB (373 words) - 21:05, 17 May 2024
- Key or hash function should avoid clustering, the mapping of two or more keys to consecutive slots. Such clustering may cause the lookup cost to skyrocket...2 KB (102 words) - 17:58, 21 August 2021
- MexScript is a multi-paradigm computer scripting language used in a number[vague] of game resource archive file handlers.[clarification needed] It was...9 KB (906 words) - 07:36, 22 June 2023
- In telecommunications, Multi-Technology Operations System Interface (MTOSI) is a standard for implementing interfaces between OSSs. Service providers (carriers)...5 KB (683 words) - 14:07, 24 August 2022
- Array-Based Queuing Lock (ABQL) is an advanced lock algorithm that ensures that threads spin on unique memory locations thus ensuring fairness of lock...9 KB (1,045 words) - 14:29, 23 April 2024
- Semantic Interoperability Community of Practice (SICoP) is a group of people who seek to make the Semantic Web operational in their respective settings...987 bytes (91 words) - 18:08, 11 January 2021
- In TRIZ, inventive standards are a set of rules of synthesis and transformation of technical systems directly resulting from laws of evolution of these...2 KB (206 words) - 04:41, 1 April 2024
- In theoretical computer science and formal language theory, the complementation of an automaton[clarify] is the problem of computing an automaton that...3 KB (231 words) - 18:38, 6 January 2024
- An interpreter directive is a computer language construct, that on some systems is better described as an aspect of the system's executable file format...4 KB (370 words) - 22:31, 28 March 2023
- vx-underground also known as VXUG, is an educational website about malware and cybersecurity. It claims to have the largest online repository of malware...3 KB (257 words) - 01:22, 10 May 2024