Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Jakarta Servlet
    A Jakarta Servlet, formerly Java Servlet is a Java software component that extends the capabilities of a server. Although servlets can respond to many...
    22 KB (1,976 words) - 18:03, 13 September 2024
  • Thumbnail for Google matrix
    A Google matrix is a particular stochastic matrix that is used by Google's PageRank algorithm. The matrix represents a graph with edges representing links...
    16 KB (1,798 words) - 20:04, 13 June 2024
  • Sleipnir is a tabbed web browser developed by Fenrir Inc. The browser's main features are customization and tab functions. It supports HTML5 and multiple...
    13 KB (1,354 words) - 01:07, 2 May 2024
  • This is a comparison of notable free and open-source configuration management software, suitable for tasks like server configuration, orchestration and...
    48 KB (3,669 words) - 04:58, 9 September 2024
  • XPath (XML Path Language) is an expression language designed to support the query or transformation of XML documents. It was defined by the World Wide...
    28 KB (3,136 words) - 02:50, 24 July 2024
  • Think Blue Linux (sometimes ThinkBlue Linux) was a port of Linux to IBM S/390 (later, zSeries) mainframe computers, done by the Millenux subsidiary of...
    1 KB (102 words) - 00:35, 3 September 2022
  • Thumbnail for CP/CMS
    CP/CMS (Control Program/Cambridge Monitor System) is a discontinued time-sharing operating system of the late 1960s and early 1970s. It is known for its...
    23 KB (3,121 words) - 12:52, 5 October 2024
  • Windows CE 5.0 (codenamed "Macallan") is a successor to Windows CE 4.2, the third release in the Windows CE .NET family. It was first released on July...
    5 KB (402 words) - 14:41, 25 April 2024
  • Thumbnail for Microsoft Data Access Components
    Microsoft Data Access Components (MDAC; also known as Windows DAC) is a framework of interrelated Microsoft technologies that allows programmers a uniform...
    58 KB (6,845 words) - 08:52, 30 May 2024
  • Lektz is an eBook business platform developed by AEL Data, operating in the UK and India. The platform has DRM, ebook reader applications, virtual book...
    7 KB (623 words) - 13:45, 28 June 2024
  • Thumbnail for Apple–Intel architecture
    The Apple–Intel architecture, or Mactel, is an unofficial name used for Macintosh personal computers developed and manufactured by Apple Inc. that use...
    22 KB (2,308 words) - 19:22, 4 November 2024
  • Carrara is a full-featured 3D computer graphics application featuring figure posing and editing, as well as nature modeling, in addition to traditional...
    7 KB (732 words) - 16:31, 26 July 2024
  • The top-level domain .asia is the officially designated regional domain in the Internet for Asia and the Pacific. It is a sponsored generic top-level-domain...
    12 KB (1,425 words) - 20:08, 24 February 2024
  • This article describes the calling conventions used when programming x86 architecture microprocessors. Calling conventions describe the interface of called...
    42 KB (4,712 words) - 12:37, 28 October 2024
  • Thumbnail for Becky!
    Becky! Internet Mail is an e-mail client software for Microsoft Windows developed by the Japanese company RimArts from Matsudo, Chiba. Becky! was originally...
    5 KB (476 words) - 04:08, 9 April 2024
  • The name of the protocol may also be the name of the primary or original application software that uses it. Comparison of file-sharing applications "The...
    6 KB (159 words) - 03:25, 21 October 2024
  • There are two types of Java programming language application programming interfaces (APIs): The official core Java API, contained in the Android (Google)...
    7 KB (494 words) - 23:01, 22 October 2024
  • Electronic participation (e-participation) refers to the use of ICT in facilitating citizen participation in government-related processes, encompassing...
    27 KB (2,951 words) - 21:02, 18 February 2024
  • dar (disk archive) is a computer program, a command-line archiving tool intended as a replacement for tar in Unix-like operating systems.[citation needed]...
    5 KB (434 words) - 16:45, 14 September 2023
  • A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack...
    57 KB (6,051 words) - 14:07, 19 September 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)