Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Asynchronous Transfer Mode
    Asynchronous Transfer Mode (ATM) is a telecommunications standard defined by the American National Standards Institute and ITU-T (formerly CCITT) for digital...
    32 KB (3,539 words) - 13:32, 26 April 2024
  • Object-oriented design (OOD) is the process of planning a system of interacting objects to solve a software problem. It is a method for software design...
    10 KB (1,310 words) - 13:53, 10 April 2024
  • Thumbnail for VMEbus
    VMEbus (Versa Module Eurocard bus) is a computer bus standard physically based on Eurocard sizes. In 1979, during development of the Motorola 68000 CPU...
    16 KB (1,618 words) - 05:04, 5 May 2024
  • In computer science and operations research, approximation algorithms are efficient algorithms that find approximate solutions to optimization problems...
    21 KB (2,775 words) - 11:07, 13 August 2023
  • Thumbnail for Pyjs
    Pyjs (formerly Pyjamas before May 2012), is a rich web application framework for developing client-side web and desktop applications in Python. The resulting...
    7 KB (742 words) - 22:49, 30 April 2024
  • Thumbnail for Apache Struts 1
    Apache Struts 1 is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage...
    7 KB (684 words) - 02:21, 12 April 2024
  • To reinvent the wheel is to attempt to duplicate—most likely with inferior results—a basic method that has already previously been created or optimized...
    7 KB (914 words) - 15:47, 8 May 2024
  • Thumbnail for SRM firmware
    The SRM firmware (also called the SRM console) is the boot firmware written by Digital Equipment Corporation (DEC) for computer systems based on the DEC...
    4 KB (525 words) - 17:33, 13 November 2022
  • In classic Mac OS System 7 and later, and in macOS, an alias is a small file that represents another object in a local, remote, or removable file system...
    15 KB (1,827 words) - 21:12, 10 April 2024
  • SIGDA, Association for Computing Machinery's Special Interest Group on Design Automation, is a professional development organization for the Electronic...
    3 KB (269 words) - 20:26, 2 May 2024
  • Thumbnail for AT (form factor)
    In the era of IBM compatible personal computers, the AT form factor comprises the dimensions and layout (form factor) of the motherboard for the IBM AT...
    7 KB (785 words) - 16:03, 11 April 2024
  • Graybird is a Trojan horse that hides its presence on compromised computers and downloads files from remote Web sites. There are many variations of this...
    980 bytes (77 words) - 22:40, 29 April 2024
  • A business rule defines or constrains some aspect of a business. It may be expressed to specify an action to be taken when certain conditions are true...
    9 KB (1,288 words) - 22:44, 11 December 2023
  • Alias analysis is a technique in compiler theory, used to determine if a storage location may be accessed in more than one way. Two pointers are said to...
    6 KB (893 words) - 02:55, 6 August 2023
  • Fruit is a chess engine developed by Fabien Letouzey. In the SSDF rating list released on November 24, 2006, Fruit version 2.2.1 had a rating of 2842....
    8 KB (695 words) - 19:29, 19 June 2023
  • Thumbnail for High-speed multimedia radio
    High-speed multimedia radio (HSMM) is the implementation of high-speed wireless TCP/IP data networks over amateur radio frequency allocations using commercial...
    27 KB (2,628 words) - 02:53, 1 May 2024
  • Haystack is a project at the Massachusetts Institute of Technology to research and develop several applications around personal information management...
    4 KB (398 words) - 03:01, 26 March 2024
  • GPRS Tunnelling Protocol (GTP) is a group of IP-based communications protocols used to carry general packet radio service (GPRS) within GSM, UMTS, LTE...
    17 KB (2,229 words) - 18:38, 21 August 2022
  • The Swedish Chess Computer Association (Swedish: Svenska schackdatorföreningen, SSDF) is an organization that tests computer chess software by playing...
    6 KB (261 words) - 15:34, 16 November 2021
  • A UDP flood attack is a volumetric denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking...
    3 KB (383 words) - 02:42, 25 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)