Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • In distributed computing, a remote procedure call (RPC) is when a computer program causes a procedure (subroutine) to execute in a different address space...
    15 KB (1,750 words) - 01:05, 22 May 2024
  • Thumbnail for Crash (computing)
    In computing, a crash, or system crash, occurs when a computer program such as a software application or an operating system stops functioning properly...
    13 KB (1,441 words) - 16:04, 22 April 2024
  • A roaming user profile is a file synchronization concept in the Windows NT family of operating systems that allows users with a computer joined to a Windows...
    30 KB (4,176 words) - 11:39, 9 May 2024
  • An internal link is a type of hyperlink on a web page to another page or resource, such as an image or document, on the same website or domain. It is the...
    4 KB (440 words) - 19:27, 17 April 2024
  • ID3 is a metadata container most often used in conjunction with the MP3 audio file format. It allows information such as the title, artist, album, track...
    11 KB (1,190 words) - 23:22, 25 February 2024
  • Companies whose business centers on the development of open-source software employ a variety of business models to solve the challenge of making profits...
    71 KB (8,225 words) - 13:25, 8 May 2024
  • Jini (/ˈdʒiːni/), also called Apache River, is a network architecture for the construction of distributed systems in the form of modular co-operating services...
    5 KB (479 words) - 21:32, 7 November 2023
  • Samsung B7610 (also known as Samsung Omnia Pro B7610) is a smartphone produced by Samsung as part of their Omnia Series line of mobile phones. The B7610...
    5 KB (238 words) - 08:49, 16 February 2023
  • Vodafone 360 Samsung M1 is a Linux Mobile based handset mobile phone released in November 2009. This cellphone was specifically made for Vodafone's 360...
    1 KB (75 words) - 15:36, 11 June 2023
  • In computing, inline expansion, or inlining, is a manual or compiler optimization that replaces a function call site with the body of the called function...
    26 KB (3,376 words) - 04:04, 25 July 2023
  • Thumbnail for HP 2100
    The HP 2100 is a series of 16-bit minicomputers that were produced by Hewlett-Packard (HP) from the mid-1960s to early 1990s. Tens of thousands of machines...
    48 KB (5,975 words) - 15:28, 13 May 2024
  • In computer programming, a runtime library is a set of low-level routines used by a compiler to invoke some of the behaviors of a runtime environment,...
    4 KB (437 words) - 22:38, 21 November 2023
  • PBASIC is a microcontroller-based version of BASIC created by Parallax, Inc. in 1992. PBASIC was created to bring ease of use to the microcontroller and...
    5 KB (648 words) - 15:07, 20 March 2024
  • AVC-Intra is a type of video coding developed by Panasonic, and then supported in products made by other companies. AVC-Intra is available in Panasonic's...
    12 KB (1,239 words) - 22:47, 25 April 2024
  • Adobe ImageReady was a bitmap graphics editor that was shipped with Adobe Photoshop for six years. It was available for Windows, Classic Mac OS and Mac...
    4 KB (398 words) - 07:48, 27 February 2024
  • In computer programming, a directive or pragma (from "pragmatic") is a language construct that specifies how a compiler (or other translator) should process...
    11 KB (1,324 words) - 02:48, 14 January 2024
  • Pinnacle Studio is a video editing program originally developed by Pinnacle Systems as consumer-level software. Upon Pinnacle System's acquisition of Munich-based...
    5 KB (438 words) - 03:27, 6 February 2024
  • Network equipment providers (NEPs) – sometimes called telecommunications equipment manufacturers (TEMs) – sell products and services to communication service...
    12 KB (1,003 words) - 18:46, 23 August 2023
  • A computer architecture simulator is a program that simulates the execution of computer architecture. Computer architecture simulators are used for the...
    5 KB (598 words) - 06:54, 16 August 2023
  • The object-capability model is a computer security model. A capability describes a transferable right to perform one (or more) operations on a given object...
    8 KB (1,026 words) - 01:04, 12 March 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)