Browse Definitions :
Definition

backward compatible (backward compatibility)

Backward compatible (or sometimes backward-compatible or backwards compatible) refers to a hardware or software system that can successfully use interfaces and data from earlier versions of the system or with other systems. For example, Perl, the scripting language, was designed to be backward compatible with awk, an earlier language that Perl was designed to replace.

Backward compatibility is more easily accomplished if the previous versions have been designed to be forward compatible, or extensible, with built-in features such as Hooks, plug-in, or an application program interface (API) that allows the addition of new features.

The term backward compatible (notice the "b") is sometimes used to describe hardware or software that is designed without regard for compatibility with earlier versions, causing the two versions to fight (or combat) each other. In this case, the two versions cannot share data easily and may have features that cause errors or crashes when they are installed on the same computer, often because the computer does not understand which version is being referred to. Even if the earlier version is removed, remaining vestiges of it may cause problems in running the newer version.

This was last updated in August 2005

Continue Reading About backward compatible (backward compatibility)

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

can you explain how Advance technology Attachment (ATA) can be backward compactible
Cancel

-ADS BY GOOGLE

Extensions de fichiers et formats de fichiers

Motorisé par:

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • intrusion prevention system (IPS)

    An intrusion prevention system (IPS) is a network security and threat prevention tool.

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • capacity management

    Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close