Browse Definitions:
  • August 31, 2005 31 Aug'05

    string

    In programming, a string is a contiguous (see contiguity) sequence of symbols or values, such as a character string (a sequence of characters) or a binary digit string (a sequence of binary values).  Continue Reading

  • August 31, 2005 31 Aug'05

    Speech Application Program Interface (SAPI)

    SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.  Continue Reading

  • August 31, 2005 31 Aug'05

    simplicity

    In information technology, simplicity is a quality that is frequently sought by both users and technologists, although, as users frequently attest, it is not always found.  Continue Reading

  • August 31, 2005 31 Aug'05

    shared memory

    In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.  Continue Reading

  • August 31, 2005 31 Aug'05

    script

    In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).  Continue Reading

  • August 31, 2005 31 Aug'05

    reentrant

    Reentrant is an adjective that describes a computer program or routine that is written so that the same copy in memory can be shared by multiple users.  Continue Reading

  • August 31, 2005 31 Aug'05

    recursion

    In computer programming, a recursion (noun, pronounced ree-KUHR-zhion) is programming that is recursive (adjective), and recursive has two related meanings: A recursive procedure or routine is one that has the ability to call itself.  Continue Reading

  • August 31, 2005 31 Aug'05

    Pascal

    Pascal is a strongly-typed third-generation language (3GL) with a one-pass compiler.  Continue Reading

  • August 31, 2005 31 Aug'05

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration)

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) is a paper mock-up technique that allows users to participate in the development process. A PICTIVE is a representation of a graphical user interface (...  Continue Reading

  • August 30, 2005 30 Aug'05

    newbie

    A newbie (pronounced NOO-bee) is a novice or neophyte: anyone who is new to any particular type of endeavor, such as a sport or a technology.  Continue Reading

  • August 30, 2005 30 Aug'05

    native

    In computer systems, native means "original" or "basic.  Continue Reading

  • August 29, 2005 29 Aug'05

    Cosmo

    Cosmo was a set of products for developing presentations and applications that took advantage of the Java programming language, 3-D environments using the Virtual Reality Modeling Language (VRML), and other multimedia elements.  Continue Reading

  • August 29, 2005 29 Aug'05

    K Desktop Environment (KDE)

    K Desktop Environment (KDE) is an Open Source graphical desktop environment for UNIX workstations.  Continue Reading

  • August 26, 2005 26 Aug'05

    Pango

    Pango is an open source project dedicated to creating a Unicode framework for rendering international text. The name Pango was created by combining the Greek prefix 'pan', meaning 'all,' with the Japanese word 'go,' meaning 'language.'  Continue Reading

  • August 26, 2005 26 Aug'05

    Sybase

    Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.  Continue Reading

  • August 25, 2005 25 Aug'05

    backward compatible (backward compatibility)

    Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.  Continue Reading

  • August 25, 2005 25 Aug'05

    module

    A module is a separate unit of software or hardware. Typical characteristics of modular components include portability, which allows them to be used in a variety of systems, and interoperability, which allows them to function with the components of ...  Continue Reading

  • August 25, 2005 25 Aug'05

    PC philanthropy

    PC philanthropy is sharing some of the unused resources of your personal computer, especially unused computer cycles, to benefit a social cause.  Continue Reading

  • August 25, 2005 25 Aug'05

    scam-baiting

    Scam-baiting is the practice of eliciting attention from the perpetrator of a scam by feigning interest in whatever bogus deal is offered.  Continue Reading

  • August 23, 2005 23 Aug'05

    ICE (In Case of Emergency)

    ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close