Browse Definitions :
  • August 31, 2005 31 Aug'05

    string

    In programming, a string is a contiguous (see contiguity) sequence of symbols or values, such as a character string (a sequence of characters) or a binary digit string (a sequence of binary values).  Continue Reading

  • August 31, 2005 31 Aug'05

    Speech Application Program Interface (SAPI)

    SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.  Continue Reading

  • August 31, 2005 31 Aug'05

    simplicity

    In information technology, simplicity is a quality that is frequently sought by both users and technologists, although, as users frequently attest, it is not always found.  Continue Reading

  • August 31, 2005 31 Aug'05

    shared memory

    In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.  Continue Reading

  • August 31, 2005 31 Aug'05

    script

    In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).  Continue Reading

  • August 31, 2005 31 Aug'05

    reentrant

    Reentrant is an adjective that describes a computer program or routine that is written so that the same copy in memory can be shared by multiple users.  Continue Reading

  • August 31, 2005 31 Aug'05

    recursion

    In computer programming, a recursion (noun, pronounced ree-KUHR-zhion) is programming that is recursive (adjective), and recursive has two related meanings: A recursive procedure or routine is one that has the ability to call itself.  Continue Reading

  • August 31, 2005 31 Aug'05

    Pascal

    Pascal is a strongly-typed third-generation language (3GL) with a one-pass compiler.  Continue Reading

  • August 31, 2005 31 Aug'05

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration)

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) is a paper mock-up technique that allows users to participate in the development process. A PICTIVE is a representation of a graphical user interface (...  Continue Reading

  • August 30, 2005 30 Aug'05

    newbie

    A newbie (pronounced NOO-bee) is a novice or neophyte: anyone who is new to any particular type of endeavor, such as a sport or a technology.  Continue Reading

  • August 30, 2005 30 Aug'05

    native

    In computer systems, native means "original" or "basic.  Continue Reading

  • August 29, 2005 29 Aug'05

    Cosmo

    Cosmo was a set of products for developing presentations and applications that took advantage of the Java programming language, 3-D environments using the Virtual Reality Modeling Language (VRML), and other multimedia elements.  Continue Reading

  • August 29, 2005 29 Aug'05

    K Desktop Environment (KDE)

    K Desktop Environment (KDE) is an Open Source graphical desktop environment for UNIX workstations.  Continue Reading

  • August 26, 2005 26 Aug'05

    Pango

    Pango is an open source project dedicated to creating a Unicode framework for rendering international text. The name Pango was created by combining the Greek prefix 'pan', meaning 'all,' with the Japanese word 'go,' meaning 'language.'  Continue Reading

  • August 26, 2005 26 Aug'05

    Sybase

    Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.  Continue Reading

  • August 25, 2005 25 Aug'05

    backward compatible (backward compatibility)

    Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.  Continue Reading

  • August 25, 2005 25 Aug'05

    module

    A module is a separate unit of software or hardware. Typical characteristics of modular components include portability, which allows them to be used in a variety of systems, and interoperability, which allows them to function with the components of ...  Continue Reading

  • August 25, 2005 25 Aug'05

    PC philanthropy

    PC philanthropy is sharing some of the unused resources of your personal computer, especially unused computer cycles, to benefit a social cause.  Continue Reading

  • August 25, 2005 25 Aug'05

    scam-baiting

    Scam-baiting is the practice of eliciting attention from the perpetrator of a scam by feigning interest in whatever bogus deal is offered.  Continue Reading

  • August 23, 2005 23 Aug'05

    ICE (In Case of Emergency)

    ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close