Browse Definitions :
Definition

Adobe Buzzword

Adobe Buzzword is a free, Web-based word processor similar to Google Docs in which document s are created, edited and stored online. Files can be accessed from any computer with an Internet connection and a full-featured Web browser . Buzzword is the creation of Virtual Ubiquity, a company based in Waltham, Massachusetts. Adobe acquired Virtual Ubiquity in October 2007.

Visually, Buzzword resembles Microsoft Word. A streamlined interface allows the user to create, edit, revise and format text, use multiple font s, take advantage of keyboard shortcuts, insert images and export files into Microsoft Word. Text can be composed and moved so it flows around images and tables. One of the most significant features of Buzzword is called WYSIWYP , an acronym for "what you see is what you print," coined after WYSIWYG . The WYSIWYP feature is intended to resolve a problem that has plagued users of word processors ever since computers replaced typewriters: printouts often differ from their on-screen counterparts.

Buzzword's online nature gives it noteworthy advantages and disadvantages. The application can be ideal for collaborative projects in which multiple authors work together from geographically diverse locations. Because documents are stored online and can also be stored on users' computers, there is no risk of total data loss as a result of a localized catastrophe. However, the Internet-based nature of the program has given rise to concerns among some authors that their work may not be private or secure.

This was last updated in November 2007

Continue Reading About Adobe Buzzword

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close