Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for System on a chip
    A system on a chip or system-on-chip (SoC /ˌˈɛsoʊsiː/; pl. SoCs /ˌˈɛsoʊsiːz/) is an integrated circuit that integrates most or all components of a computer...
    43 KB (4,742 words) - 19:32, 9 April 2024
  • Thumbnail for Registered user
    A registered user is a user of a website, program, or other systems who has previously registered. Registered users normally provide some sort of credentials...
    4 KB (418 words) - 15:15, 15 May 2024
  • Claris International Inc., formerly FileMaker Inc., is a computer software development company formed as a subsidiary company of Apple Computer (now Apple...
    16 KB (1,688 words) - 21:55, 10 May 2024
  • In computing, umask is a command that determines the settings of a mask that controls how file permissions are set for newly created files. It may also...
    20 KB (1,754 words) - 00:17, 5 November 2023
  • Thumbnail for Ultra-mobile PC
    An ultra-mobile PC, or ultra-mobile personal computer (UMPC), is a miniature version of a pen computer, a class of laptop whose specifications were launched...
    21 KB (2,685 words) - 07:07, 9 May 2024
  • Information extraction (IE) is the task of automatically extracting structured information from unstructured and/or semi-structured machine-readable documents...
    20 KB (2,542 words) - 23:11, 30 December 2023
  • D²B (Domestic Digital Bus, IEC 61030) is an IEC standard for a low-speed multi-master serial communication bus for home automation applications. It was...
    1 KB (107 words) - 01:37, 21 September 2022
  • ReactiveX (Rx, also known as Reactive Extensions) is a software library originally created by Microsoft that allows imperative programming languages to...
    9 KB (1,085 words) - 20:32, 21 April 2024
  • Thumbnail for Twisted (software)
    Twisted is an event-driven network programming framework written in Python and licensed under the MIT License. Twisted projects variously support TCP,...
    10 KB (1,051 words) - 15:54, 20 April 2023
  • A deblocking filter is a video filter applied to decoded compressed video to improve visual quality and prediction performance by smoothing the sharp edges...
    4 KB (528 words) - 09:00, 13 March 2024
  • IEC standard 61511 is a technical standard which sets out practices in the engineering of systems that ensure the safety of an industrial process through...
    6 KB (801 words) - 22:14, 5 April 2022
  • lsh is a free software implementation of the Secure Shell (SSH) protocol version 2, by the GNU Project including both server and client programs. Featuring...
    5 KB (355 words) - 17:46, 25 January 2024
  • iPlanet was a product brand that was used jointly by Sun Microsystems and Netscape Communications Corporation when delivering software and services as...
    6 KB (649 words) - 22:04, 28 November 2021
  • Intel Clear Video is a semiconductor intellectual property core which implements some steps of some video decompression algorithms. The scope is to calculate...
    1 KB (126 words) - 08:10, 21 April 2023
  • The Intel Cluster Ready certification is a marketing program from Intel. It is aimed at hardware and software vendors in the low-end and mid-range cluster...
    4 KB (458 words) - 08:36, 16 January 2022
  • Thumbnail for Panel (computer software)
    A panel is "a particular arrangement of information grouped together for presentation to users in a window or pop-up". In ISPF, a panel is "a predefined...
    1 KB (139 words) - 13:18, 7 March 2021
  • In telecommunication, data signaling rate (DSR), also known as gross bit rate, is the aggregate rate at which data passes a point in the transmission path...
    5 KB (555 words) - 13:31, 9 January 2024
  • The IEEE Gustav Robert Kirchhoff Award is a Technical Field Award established by the IEEE Board of Directors in 2003. This award is presented for outstanding...
    4 KB (337 words) - 05:18, 6 February 2023
  • Thumbnail for 3Dconnexion
    3Dconnexion is a German manufacturer of human interface devices for manipulating and navigating computer-generated 3D imagery. These devices are often...
    4 KB (338 words) - 08:45, 6 July 2023
  • In computer security, an attack vector is a specific path, method, or scenario that can be exploited to break into an IT system, thus compromising its...
    2 KB (290 words) - 05:58, 16 September 2022
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)