Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information...
    138 KB (17,546 words) - 12:03, 18 May 2024
  • A key generator (key-gen) is a computer program that generates a product licensing key, such as a serial number, necessary to activate for use of a software...
    6 KB (698 words) - 04:07, 11 May 2024
  • Thumbnail for .ie
    .ie is the country code top-level domain (ccTLD) which corresponds with the ISO 3166-1 alpha-2 code for Ireland. The Internet Assigned Numbers Authority...
    12 KB (1,144 words) - 09:51, 27 October 2023
  • WinWAP was a web browser for Windows CE mobile devices. It was first released in 1999. Article about Winwap in Finnish IT Magazine Tietoviikko...
    987 bytes (24 words) - 10:50, 23 March 2024
  • In computer science, a tail call is a subroutine call performed as the final action of a procedure. If the target of a tail is the same subroutine, the...
    40 KB (4,209 words) - 08:10, 28 April 2024
  • Thumbnail for Perfect Dark (P2P)
    Perfect Dark (パーフェクトダーク) is a peer-to-peer file-sharing (P2P) application from Japan designed for use with Microsoft Windows. It was launched in 2006....
    13 KB (1,323 words) - 21:52, 25 April 2024
  • In software development, a neutral build is a software build that reflects the current state of the source code checked into the source code version control...
    6 KB (707 words) - 09:08, 19 October 2023
  • In computer science, asynchronous I/O (also non-sequential I/O) is a form of input/output processing that permits other processing to continue before the...
    24 KB (3,455 words) - 06:46, 3 April 2024
  • InterBase is a relational database management system (RDBMS) currently developed and marketed by Embarcadero Technologies. InterBase is distinguished from...
    16 KB (1,647 words) - 16:57, 27 November 2023
  • Thumbnail for XtratuM
    XtratuM is a bare-metal hypervisor specially designed for embedded real-time systems available for the instruction sets LEON2/3/4 (SPARC v8), ARM v7 and...
    5 KB (618 words) - 17:08, 4 January 2024
  • Thumbnail for John the Ripper
    John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platforms...
    6 KB (591 words) - 17:00, 23 May 2024
  • TC Works Spark was a 2-track audio editing application for the Mac OS 9 and Mac OS X, developed by TC Works, the former computer recording subsidiary of...
    4 KB (294 words) - 00:11, 13 February 2024
  • Nagle's algorithm is a means of improving the efficiency of TCP/IP networks by reducing the number of packets that need to be sent over the network. It...
    10 KB (1,285 words) - 21:07, 13 May 2024
  • Pocket Frogs is a life simulation video game developed and published by NimbleBit for the iOS App Store and Google Play Store. It was released as a free...
    10 KB (1,110 words) - 12:12, 9 August 2023
  • The Apple Loops Utility software was a small companion utility for Soundtrack Pro, GarageBand, Logic Express, and Logic Pro, all made by Apple Inc. that...
    2 KB (241 words) - 04:47, 6 January 2023
  • RootkitRevealer is a proprietary freeware tool for rootkit detection on Microsoft Windows by Bryce Cogswell and Mark Russinovich. It runs on Windows XP...
    3 KB (125 words) - 00:37, 9 September 2023
  • TestComplete is a functional automated testing platform developed by SmartBear Software. TestComplete gives testers the ability to create automated tests...
    11 KB (1,009 words) - 02:28, 24 March 2023
  • PersonalJava was a Java edition for mobile and embedded systems based on Java 1.1.8. It has been superseded by the CDC's Personal Profile, which is not...
    996 bytes (60 words) - 09:59, 20 October 2023
  • Online consultations or e-consultations refer to an exchange between government and citizens using the Internet. They are one form of online deliberation...
    5 KB (612 words) - 06:28, 15 March 2024
  • Software-defined protection (SDP) is a computer network security architecture and methodology that combines network security devices and defensive protections...
    4 KB (470 words) - 20:02, 26 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)