Search results
- A system on a chip or system-on-chip (SoC /ˌˈɛsoʊsiː/; pl. SoCs /ˌˈɛsoʊsiːz/) is an integrated circuit that integrates most or all components of a computer...43 KB (4,742 words) - 19:32, 9 April 2024
- A registered user is a user of a website, program, or other systems who has previously registered. Registered users normally provide some sort of credentials...4 KB (418 words) - 15:15, 15 May 2024
- Claris International Inc., formerly FileMaker Inc., is a computer software development company formed as a subsidiary company of Apple Computer (now Apple...16 KB (1,688 words) - 21:55, 10 May 2024
- In computing, umask is a command that determines the settings of a mask that controls how file permissions are set for newly created files. It may also...20 KB (1,754 words) - 00:17, 5 November 2023
- An ultra-mobile PC, or ultra-mobile personal computer (UMPC), is a miniature version of a pen computer, a class of laptop whose specifications were launched...21 KB (2,685 words) - 07:07, 9 May 2024
- Information extraction (IE) is the task of automatically extracting structured information from unstructured and/or semi-structured machine-readable documents...20 KB (2,542 words) - 23:11, 30 December 2023
- D²B (Domestic Digital Bus, IEC 61030) is an IEC standard for a low-speed multi-master serial communication bus for home automation applications. It was...1 KB (107 words) - 01:37, 21 September 2022
- ReactiveX (Rx, also known as Reactive Extensions) is a software library originally created by Microsoft that allows imperative programming languages to...9 KB (1,085 words) - 20:32, 21 April 2024
- Twisted is an event-driven network programming framework written in Python and licensed under the MIT License. Twisted projects variously support TCP,...10 KB (1,051 words) - 15:54, 20 April 2023
- A deblocking filter is a video filter applied to decoded compressed video to improve visual quality and prediction performance by smoothing the sharp edges...4 KB (528 words) - 09:00, 13 March 2024
- IEC standard 61511 is a technical standard which sets out practices in the engineering of systems that ensure the safety of an industrial process through...6 KB (801 words) - 22:14, 5 April 2022
- lsh is a free software implementation of the Secure Shell (SSH) protocol version 2, by the GNU Project including both server and client programs. Featuring...5 KB (355 words) - 17:46, 25 January 2024
- iPlanet was a product brand that was used jointly by Sun Microsystems and Netscape Communications Corporation when delivering software and services as...6 KB (649 words) - 22:04, 28 November 2021
- Intel Clear Video is a semiconductor intellectual property core which implements some steps of some video decompression algorithms. The scope is to calculate...1 KB (126 words) - 08:10, 21 April 2023
- The Intel Cluster Ready certification is a marketing program from Intel. It is aimed at hardware and software vendors in the low-end and mid-range cluster...4 KB (458 words) - 08:36, 16 January 2022
- A panel is "a particular arrangement of information grouped together for presentation to users in a window or pop-up". In ISPF, a panel is "a predefined...1 KB (139 words) - 13:18, 7 March 2021
- In telecommunication, data signaling rate (DSR), also known as gross bit rate, is the aggregate rate at which data passes a point in the transmission path...5 KB (555 words) - 13:31, 9 January 2024
- The IEEE Gustav Robert Kirchhoff Award is a Technical Field Award established by the IEEE Board of Directors in 2003. This award is presented for outstanding...4 KB (337 words) - 05:18, 6 February 2023
- 3Dconnexion is a German manufacturer of human interface devices for manipulating and navigating computer-generated 3D imagery. These devices are often...4 KB (338 words) - 08:45, 6 July 2023
- In computer security, an attack vector is a specific path, method, or scenario that can be exploited to break into an IT system, thus compromising its...2 KB (290 words) - 05:58, 16 September 2022