Browse Definitions :
Definition

native

In computer systems, native means "original" or "basic." Here are several usages:

1) Microsoft stresses that its Internet Information Server ( IIS ) is "a native implementation of the current Internet standards for Web servers..." Microsoft is implying that its own implementation of a Web server is likely to perform better than Netscape's (or someone else's) Web server running on a Windows NT operating system.

2) In COBOL , a native character set is the default character set that comes with the computer specified in the OBJECT-COMPUTER paragraph.

3) In IBM's Virtual Telecommunications Access Method ( VTAM ), native mode refers to its use directly in the VM operating system rather than in another operating system whose emulation is being supported by the VM operating system.

4) If a computer application program is compiled to run with a particular processor and its set of instruction s, the result can be referred to as native code . If the same program is run on a computer with a different processor, software can be provided so that the computer emulates the old processor. In this case, the same application runs in "emulation mode" and almost certainly more slowly than in native mode on the original processor. (The application can be rewritten and recompiled so that it runs on the new processor in native mode.)

This was last updated in August 2005
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • privileged access management (PAM)

    Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close