Browse Definitions:
  • August 31, 2005 31 Aug'05


    In programming, a string is a contiguous (see contiguity) sequence of symbols or values, such as a character string (a sequence of characters) or a binary digit string (a sequence of binary values).  Continue Reading

  • August 31, 2005 31 Aug'05

    Speech Application Program Interface (SAPI)

    SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.  Continue Reading

  • August 31, 2005 31 Aug'05


    In information technology, simplicity is a quality that is frequently sought by both users and technologists, although, as users frequently attest, it is not always found.  Continue Reading

  • August 31, 2005 31 Aug'05

    shared memory

    In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.  Continue Reading

  • August 31, 2005 31 Aug'05


    In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).  Continue Reading

  • August 31, 2005 31 Aug'05


    Reentrant is an adjective that describes a computer program or routine that is written so that the same copy in memory can be shared by multiple users.  Continue Reading

  • August 31, 2005 31 Aug'05


    In computer programming, a recursion (noun, pronounced ree-KUHR-zhion) is programming that is recursive (adjective), and recursive has two related meanings: A recursive procedure or routine is one that has the ability to call itself.  Continue Reading

  • August 31, 2005 31 Aug'05


    Pascal is a strongly-typed third-generation language (3GL) with a one-pass compiler.  Continue Reading

  • August 31, 2005 31 Aug'05

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration)

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) is a paper mock-up technique that allows users to participate in the development process. A PICTIVE is a representation of a graphical user interface (...  Continue Reading

  • August 30, 2005 30 Aug'05


    A newbie (pronounced NOO-bee) is a novice or neophyte: anyone who is new to any particular type of endeavor, such as a sport or a technology.  Continue Reading

  • August 30, 2005 30 Aug'05


    In computer systems, native means "original" or "basic.  Continue Reading

  • August 29, 2005 29 Aug'05


    Cosmo was a set of products for developing presentations and applications that took advantage of the Java programming language, 3-D environments using the Virtual Reality Modeling Language (VRML), and other multimedia elements.  Continue Reading

  • August 29, 2005 29 Aug'05

    K Desktop Environment (KDE)

    K Desktop Environment (KDE) is an Open Source graphical desktop environment for UNIX workstations.  Continue Reading

  • August 26, 2005 26 Aug'05


    Pango is an open source project dedicated to creating a Unicode framework for rendering international text. The name Pango was created by combining the Greek prefix 'pan', meaning 'all,' with the Japanese word 'go,' meaning 'language.'  Continue Reading

  • August 26, 2005 26 Aug'05


    Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.  Continue Reading

  • August 25, 2005 25 Aug'05

    backward compatible (backward compatibility)

    Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.  Continue Reading

  • August 25, 2005 25 Aug'05


    A module is a separate unit of software or hardware. Typical characteristics of modular components include portability, which allows them to be used in a variety of systems, and interoperability, which allows them to function with the components of ...  Continue Reading

  • August 25, 2005 25 Aug'05

    PC philanthropy

    PC philanthropy is sharing some of the unused resources of your personal computer, especially unused computer cycles, to benefit a social cause.  Continue Reading

  • August 25, 2005 25 Aug'05


    Scam-baiting is the practice of eliciting attention from the perpetrator of a scam by feigning interest in whatever bogus deal is offered.  Continue Reading

  • August 23, 2005 23 Aug'05

    ICE (In Case of Emergency)

    ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.