Browse Definitions :
Definition

deviceCOM

Contributor(s): Daniela Bruggemeier

DeviceCOM, from Intrinsyc Software, is a line of device and network integration products that is used to make Internet or PC devices work with each other on a network. Developed to provide Distributed Component Object Model (DCOM) services for Windows CE, Microsoft's embedded operating system for mobile devices, deviceCOM provides a development environment in which device-to-device communication is automatically managed so that application developers don't have to write programs to handle it. DCOM provides a development framework for distributed applications; deviceCOM supplies a connectivity framework between Windows CE-based devices and an enterprise's networked computers, through Microsoft's Web solution platform.

DeviceCOM was created specifically for distributed embedded applications and is said to have a small footprint and flexible protocol support, and to be fault-tolerant and firewall-friendly. Available for either Windows or Linux operating systems, deviceCOM is currently being used in a number of products, including industrial automation, mobile computing, and point-of-sale applications.

This was last updated in September 2005

Continue Reading About deviceCOM

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close