Browse Definitions:
  • August 31, 2005 31 Aug'05

    string

    In programming, a string is a contiguous (see contiguity) sequence of symbols or values, such as a character string (a sequence of characters) or a binary digit string (a sequence of binary values).  Continue Reading

  • August 31, 2005 31 Aug'05

    Speech Application Program Interface (SAPI)

    SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.  Continue Reading

  • August 31, 2005 31 Aug'05

    simplicity

    In information technology, simplicity is a quality that is frequently sought by both users and technologists, although, as users frequently attest, it is not always found.  Continue Reading

  • August 31, 2005 31 Aug'05

    shared memory

    In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.  Continue Reading

  • August 31, 2005 31 Aug'05

    script

    In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).  Continue Reading

  • August 31, 2005 31 Aug'05

    reentrant

    Reentrant is an adjective that describes a computer program or routine that is written so that the same copy in memory can be shared by multiple users.  Continue Reading

  • August 31, 2005 31 Aug'05

    recursion

    In computer programming, a recursion (noun, pronounced ree-KUHR-zhion) is programming that is recursive (adjective), and recursive has two related meanings: A recursive procedure or routine is one that has the ability to call itself.  Continue Reading

  • August 31, 2005 31 Aug'05

    Pascal

    Pascal is a strongly-typed third-generation language (3GL) with a one-pass compiler.  Continue Reading

  • August 31, 2005 31 Aug'05

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration)

    PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) is a paper mock-up technique that allows users to participate in the development process. A PICTIVE is a representation of a graphical user interface (...  Continue Reading

  • August 30, 2005 30 Aug'05

    newbie

    A newbie (pronounced NOO-bee) is a novice or neophyte: anyone who is new to any particular type of endeavor, such as a sport or a technology.  Continue Reading

  • August 30, 2005 30 Aug'05

    native

    In computer systems, native means "original" or "basic.  Continue Reading

  • August 29, 2005 29 Aug'05

    Cosmo

    Cosmo was a set of products for developing presentations and applications that took advantage of the Java programming language, 3-D environments using the Virtual Reality Modeling Language (VRML), and other multimedia elements.  Continue Reading

  • August 29, 2005 29 Aug'05

    K Desktop Environment (KDE)

    K Desktop Environment (KDE) is an Open Source graphical desktop environment for UNIX workstations.  Continue Reading

  • August 26, 2005 26 Aug'05

    Pango

    Pango is an open source project dedicated to creating a Unicode framework for rendering international text. The name Pango was created by combining the Greek prefix 'pan', meaning 'all,' with the Japanese word 'go,' meaning 'language.'  Continue Reading

  • August 26, 2005 26 Aug'05

    Sybase

    Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.  Continue Reading

  • August 25, 2005 25 Aug'05

    backward compatible (backward compatibility)

    Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.  Continue Reading

  • August 25, 2005 25 Aug'05

    module

    A module is a separate unit of software or hardware. Typical characteristics of modular components include portability, which allows them to be used in a variety of systems, and interoperability, which allows them to function with the components of ...  Continue Reading

  • August 25, 2005 25 Aug'05

    PC philanthropy

    PC philanthropy is sharing some of the unused resources of your personal computer, especially unused computer cycles, to benefit a social cause.  Continue Reading

  • August 25, 2005 25 Aug'05

    scam-baiting

    Scam-baiting is the practice of eliciting attention from the perpetrator of a scam by feigning interest in whatever bogus deal is offered.  Continue Reading

  • August 23, 2005 23 Aug'05

    ICE (In Case of Emergency)

    ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close