Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Spyware (a portmanteau for spying software) is any software with malicious behavior that aims to gather information about a person or organization and...
    58 KB (6,553 words) - 09:12, 30 May 2024
  • In the BitTorrent file distribution system, a torrent file or meta-info file is a computer file that contains metadata about files and folders to be distributed...
    18 KB (2,303 words) - 23:06, 9 June 2024
  • Thumbnail for StrongARM
    The StrongARM is a family of computer microprocessors developed by Digital Equipment Corporation and manufactured in the late 1990s which implemented the...
    20 KB (2,616 words) - 07:19, 19 May 2024
  • S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public-key encryption and signing of MIME data. S/MIME is on an IETF standards...
    11 KB (1,516 words) - 14:35, 15 February 2024
  • Thumbnail for WinZip
    WinZip is a trialware file archiver and compressor for Microsoft Windows, macOS, iOS and Android. It is developed by WinZip Computing (formerly Nico Mak...
    15 KB (590 words) - 14:59, 1 July 2024
  • In theoretical computer science and formal language theory, a regular grammar is a grammar that is right-regular or left-regular. While their exact definition...
    8 KB (985 words) - 19:53, 11 May 2024
  • IEEE 802.11k-2008 is an amendment to IEEE 802.11-2007 standard for radio resource measurement. It defines and exposes radio and network information to...
    3 KB (390 words) - 22:37, 23 July 2023
  • BATCH-11/DOS-11, also known simply as DOS-11, is a discontinued operating system by Digital Equipment Corporation (DEC) of Maynard, Massachusetts. The...
    3 KB (380 words) - 19:55, 7 February 2022
  • Compute!'s Gazette (ISSN 0737-3716), stylized as COMPUTE!'s Gazette, was a computer magazine of the 1980s, directed at users of Commodore's 8-bit home...
    4 KB (349 words) - 13:24, 26 November 2022
  • A time series database is a software system that is optimized for storing and serving time series through associated pairs of time(s) and value(s). In...
    11 KB (804 words) - 16:53, 5 July 2024
  • A computer number format is the internal representation of numeric values in digital device hardware and software, such as in programmable computers and...
    18 KB (2,161 words) - 21:35, 5 June 2024
  • GoldWave is a commercial digital audio editing software product developed by GoldWave Inc, first released to the public in April 1993. GoldWave: Audio...
    8 KB (714 words) - 08:48, 7 February 2024
  • Semantic analytics, also termed semantic relatedness, is the use of ontologies to analyze content in web resources. This field of research combines text...
    5 KB (531 words) - 18:53, 2 May 2022
  • StatView is a statistics application originally released for Apple Macintosh computers in 1985. StatView was one of the first statistics applications to...
    5 KB (665 words) - 20:01, 20 August 2022
  • The Power A5000 was a planned Amiga clone computer, announced by German DCE Computer Service GmbH and British Amiga peripherals manufacturer Power Computing...
    2 KB (250 words) - 15:14, 3 June 2023
  • LView Pro (LVP) is a bitmap graphics editor for computers running the Microsoft Windows operating system developed by Leonardo H. Loureiro, who owns the...
    5 KB (492 words) - 03:47, 5 April 2021
  • Color digital images are made of pixels, and pixels are made of combinations of primary colors represented by a series of code. A channel in this context...
    8 KB (1,020 words) - 00:50, 25 December 2023
  • WWIV was a brand of bulletin board system software popular from the late 1980s through the mid-1990s. The modifiable source code allowed a sysop to customize...
    14 KB (1,804 words) - 21:19, 3 July 2024
  • Volumetric capture or volumetric video is a technique that captures a three-dimensional space, such as a location or performance. This type of volumography...
    23 KB (3,217 words) - 04:27, 29 June 2024
  • Authentication and Key Agreement (AKA) is a security protocol used in 3G networks. AKA is also used for one-time password generation mechanism for digest...
    3 KB (380 words) - 03:34, 17 April 2022
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)