Browse Definitions :
  • August 31, 2005 31 Aug'05

    string

    In programming, a string is a contiguous (see contiguity) sequence of symbols or values, such as a character string (a sequence of characters) or a binary digit string (a sequence of binary values).  Continue Reading

  • August 31, 2005 31 Aug'05

    Speech Application Program Interface (SAPI)

    SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.  Continue Reading

  • August 31, 2005 31 Aug'05

    simplicity

    In information technology, simplicity is a quality that is frequently sought by both users and technologists, although, as users frequently attest, it is not always found.  Continue Reading

  • August 31, 2005 31 Aug'05

    shared memory

    In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.  Continue Reading

  • August 31, 2005 31 Aug'05

    script

    In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).  Continue Reading

  • August 31, 2005 31 Aug'05

    reentrant

    Reentrant is an adjective that describes a computer program or routine that is written so that the same copy in memory can be shared by multiple users.  Continue Reading

  • August 31, 2005 31 Aug'05

    recursion

    In computer programming, a recursion (noun, pronounced ree-KUHR-zhion) is programming that is recursive (adjective), and recursive has two related meanings: A recursive procedure or routine is one that has the ability to call itself.  Continue Reading

  • August 31, 2005 31 Aug'05

    Pascal

    Pascal is a strongly-typed third-generation language (3GL) with a one-pass compiler.  Continue Reading

  • August 31, 2005 31 Aug'05

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration)

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) is a paper mock-up technique that allows users to participate in the development process. A PICTIVE is a representation of a graphical user interface (...  Continue Reading

  • August 30, 2005 30 Aug'05

    newbie

    A newbie (pronounced NOO-bee) is a novice or neophyte: anyone who is new to any particular type of endeavor, such as a sport or a technology.  Continue Reading

  • August 30, 2005 30 Aug'05

    native

    In computer systems, native means "original" or "basic.  Continue Reading

  • August 29, 2005 29 Aug'05

    Cosmo

    Cosmo was a set of products for developing presentations and applications that took advantage of the Java programming language, 3-D environments using the Virtual Reality Modeling Language (VRML), and other multimedia elements.  Continue Reading

  • August 29, 2005 29 Aug'05

    K Desktop Environment (KDE)

    K Desktop Environment (KDE) is an Open Source graphical desktop environment for UNIX workstations.  Continue Reading

  • August 26, 2005 26 Aug'05

    Pango

    Pango is an open source project dedicated to creating a Unicode framework for rendering international text. The name Pango was created by combining the Greek prefix 'pan', meaning 'all,' with the Japanese word 'go,' meaning 'language.'  Continue Reading

  • August 26, 2005 26 Aug'05

    Sybase

    Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.  Continue Reading

  • August 25, 2005 25 Aug'05

    backward compatible (backward compatibility)

    Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.  Continue Reading

  • August 25, 2005 25 Aug'05

    module

    A module is a separate unit of software or hardware. Typical characteristics of modular components include portability, which allows them to be used in a variety of systems, and interoperability, which allows them to function with the components of ...  Continue Reading

  • August 25, 2005 25 Aug'05

    PC philanthropy

    PC philanthropy is sharing some of the unused resources of your personal computer, especially unused computer cycles, to benefit a social cause.  Continue Reading

  • August 25, 2005 25 Aug'05

    scam-baiting

    Scam-baiting is the practice of eliciting attention from the perpetrator of a scam by feigning interest in whatever bogus deal is offered.  Continue Reading

  • August 23, 2005 23 Aug'05

    ICE (In Case of Emergency)

    ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

  • WPA3

    WPA3, also known as Wi-Fi Protected Access 3, is the third version of the security certification program developed by the Wi-Fi ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

Close