Browse Definitions :
Definition

Adobe Buzzword

Adobe Buzzword is a free, Web-based word processor similar to Google Docs in which document s are created, edited and stored online. Files can be accessed from any computer with an Internet connection and a full-featured Web browser . Buzzword is the creation of Virtual Ubiquity, a company based in Waltham, Massachusetts. Adobe acquired Virtual Ubiquity in October 2007.

Visually, Buzzword resembles Microsoft Word. A streamlined interface allows the user to create, edit, revise and format text, use multiple font s, take advantage of keyboard shortcuts, insert images and export files into Microsoft Word. Text can be composed and moved so it flows around images and tables. One of the most significant features of Buzzword is called WYSIWYP , an acronym for "what you see is what you print," coined after WYSIWYG . The WYSIWYP feature is intended to resolve a problem that has plagued users of word processors ever since computers replaced typewriters: printouts often differ from their on-screen counterparts.

Buzzword's online nature gives it noteworthy advantages and disadvantages. The application can be ideal for collaborative projects in which multiple authors work together from geographically diverse locations. Because documents are stored online and can also be stored on users' computers, there is no risk of total data loss as a result of a localized catastrophe. However, the Internet-based nature of the program has given rise to concerns among some authors that their work may not be private or secure.

This was last updated in November 2007

Continue Reading About Adobe Buzzword

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close