Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ARM (stylised in lowercase as arm, formerly an acronym for Advanced RISC Machines and originally Acorn RISC Machine) is a family of RISC instruction set...
    139 KB (13,599 words) - 18:01, 15 June 2024
  • Parsing, syntax analysis, or syntactic analysis is the process of analyzing a string of symbols, either in natural language, computer languages or data...
    37 KB (4,856 words) - 16:24, 10 June 2024
  • Thumbnail for Race condition
    A race condition or race hazard is the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the...
    35 KB (4,368 words) - 20:07, 28 May 2024
  • Mac OS X Server is a series of discontinued Unix-like server operating systems developed by Apple Inc. based on macOS. It provided server functionality...
    27 KB (2,433 words) - 20:30, 11 May 2024
  • In processor design, microcode serves as an intermediary layer situated between the central processing unit (CPU) hardware and the programmer-visible instruction...
    73 KB (8,711 words) - 00:53, 18 June 2024
  • Thumbnail for HP-UX
    HP-UX (from "Hewlett Packard Unix") is Hewlett Packard Enterprise's proprietary implementation of the Unix operating system, based on Unix System V (initially...
    27 KB (2,953 words) - 22:53, 18 April 2024
  • Thumbnail for Apollo Guidance Computer
    The Apollo Guidance Computer (AGC) was a digital computer produced for the Apollo program that was installed on board each Apollo command module (CM) and...
    57 KB (6,899 words) - 14:28, 1 June 2024
  • In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator...
    11 KB (1,054 words) - 03:57, 19 March 2024
  • Computer display standards are a combination of aspect ratio, display size, display resolution, color depth, and refresh rate. They are associated with...
    46 KB (912 words) - 02:28, 13 April 2024
  • Thumbnail for KWin
    KWin is a window manager for the X Window System and a Wayland compositor. It is released as a part of KDE Plasma 5, for which it is the default window...
    9 KB (302 words) - 08:42, 31 May 2024
  • This glossary of computer science is a list of definitions of terms and concepts used in computer science, its sub-disciplines, and related fields, including...
    216 KB (23,796 words) - 21:30, 6 June 2024
  • Thumbnail for Yonah (microprocessor)
    Yonah is the code name of Intel's first generation 65 nm process CPU cores, based on cores of the earlier Banias (130 nm) / Dothan (90 nm) Pentium M microarchitecture...
    12 KB (1,063 words) - 16:23, 9 June 2024
  • giFT Internet File Transfer (giFT) is a computer software daemon that allows several file sharing protocols to be used with a simple client having a graphical...
    14 KB (1,140 words) - 07:39, 22 December 2023
  • Thumbnail for Sharp Zaurus
    The Sharp Zaurus is the name of a series of personal digital assistants (PDAs) made by Sharp Corporation. The Zaurus was the most popular PDA during the...
    26 KB (3,522 words) - 05:53, 16 March 2024
  • Thumbnail for PowerBASIC
    PowerBASIC, formerly Turbo Basic, is the brand of several commercial compilers by PowerBASIC Inc. that compile a dialect of the BASIC programming language...
    21 KB (2,273 words) - 18:41, 9 August 2023
  • An overlay network is a computer network that is layered on top of another (logical as opposed to physical) network. The concept of overlay networking...
    11 KB (1,423 words) - 14:24, 12 June 2024
  • Amiga Basic is an interpreted implementation of the BASIC programming language for the Amiga. It was designed and written by Microsoft. Amiga Basic shipped...
    7 KB (832 words) - 15:16, 6 April 2024
  • Xcitium, formerly known as Comodo Security Solutions, Inc., is a cybersecurity company headquartered in Bloomfield, New Jersey. The company was founded...
    29 KB (2,850 words) - 12:49, 18 June 2024
  • In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002...
    15 KB (1,777 words) - 09:31, 18 June 2024
  • In computer science, a recursive descent parser is a kind of top-down parser built from a set of mutually recursive procedures (or a non-recursive equivalent)...
    10 KB (1,067 words) - 06:31, 4 June 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)