Etymologie, Etimología, Étymologie, Etimologia, Etymology
US Vereinigte Staaten von Amerika, Estados Unidos de América, États-Unis d'Amérique, Stati Uniti d'America, United States of America
Informatik, Informatique, Informatics

9

90 Nanometer (W3)



(E?)(L1) http://www.webopedia.com/TERM/9/90_nanometer.html

90 nanometer is the buzzword of choice (2000-2004) for an advanced semiconductor manufacturing process that combines higher-performance, lower-power transistors, strained silicon, high-speed copper interconnects and low-k dielectric material. Some of the new technologies in 90 nm are strained silicon which causes one type of transistor to switch faster, ...
...


Erstellt: 2010-11

A

ABEND (W3)

Der Abend ist normalerweise der normale Abschluss des Tages. Es gibt aber auch ein "ABEND", das einen unnormalen Abschluss bezeichnet.
Das engl. "ABEND" ist die Abkürzung für "ABnormal END". Es wird vor allem in der Datenverarbeitung benutzt und bezeichnet z.B. ein beliebtes Verhalten eines PCs. Eingeführt wurde der Begriff allerdings mit einer Fehlermeldung der IBM Grossrechner der "frühen" Jahre.

Mittlerweile hat es im Zusammenhang mit E-Mails eine weitere Bedeutung erhalten: "Abwesend durch erzwungenen Netz-Entzug", zur Information von Kommunikationspartnern, dass man (aus unterschiedlichen Gründen) (zeitweise) nicht erreichbar ist.

(E?)(L?) http://www.dicofr.com/cgi-bin/n.pl/dicofr/firstchar/a
(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
abend | abend reason | abnormal end of task (abend) | transaction abend code | user transaction abend code

(E?)(L1) http://www.isaca.org/glossary.htm
(E3)(L1) http://www.jargon.net/jargonfile/
(E3)(L1) http://www.jargon.net/jargonfile/t/TheJargonLexicon.html
(E?)(L?) http://jargonf.org/wiki/Cat%C3%A9gorie:A
(E?)(L?) http://dictionary.reference.com/
(E?)(L1) http://www.urbandictionary.com/
(E?)(L?) http://www.webopedia.com/TERM/A/ABEND.html
(E?)(L?) http://en.wikipedia.org/wiki/List_of_computer_term_etymologies
(E?)(L?) http://www.wordsmith.org/awad/archives/0900

(1) Acronym for "abnormal end" of task. It refers to software crashes or lossage. Derives from an error message on the IBM 360.
(2) Acronym for "Absent By Enforced Net Deprivation". Sent in e-mail subject lines warning friends and others of forced loss of Internet access (due to moving, network outages, or illness).


abort (W2)

(E?)(L?) http://www.webopedia.com/TERM/A/abort.html
To stop a program or function before it has finished naturally. The term "abort" refers to both requested and unexpected terminations. For example, many applications let you abort a search or a print job. On the other hand, programs can abort unexpectedly for any of the following reasons: When a program aborts, you are usually returned to the operating system shell level. Contrast abort with crash, which makes the entire system, including the operating system, unusable.

Der Begriff für einen unerwarteten Programmabbruch steht auch für den Abbruch einer Schwangerschaft. In beiden Fällen steht das lat. "abortus" = "Abgang" von lat. "ab-oiri" = "abgehen", "verschwinden" Pate. Aber auch der eher umgangssprachliche Ausdruck "Abort" für "Toilette" verdankt seine Bezeichnung, der Tatsache, dass es sich um einen eher "abgelegenen Ort" handelt. Dass an diesem Ort auch etwas "abgeht" und "verschwindet" kann als mnemotische Unterstützung dienen.

Neben dem "Abort" gibt es in der Informationstechnik auch den "Abend". Dies ist die Abkürzung für "abnormal end". Aber auch darin steckt das "ab" in der Bedeutung "weg". Auf dieses "ab" geht auch die "Ebbe" zurück.

ACM (W3)

"ACM" steht für "Association of Computing Machinery".

(E?)(L?) http://cacm.acm.org/news/
(E?)(L?) http://cacm.acm.org/browse-by-subject

Each subject page displays all of the Communications of the ACM research, practice, news and opinion articles categorized as relevant to that subject.

Artificial Intelligence | Communications / Networking | Computer Applications | Computer Systems | Computers and Society | Data / Storage and Retrieval | Education | Entertainment | Hardware | Human-Computer Interaction | Information Systems | Legal Aspects | Management | Performance and Reliability | Personal Computing | Search | Security | Software | Theory


ADA (W3)

Die Programmiersprache "ADA" wurde benannt nach "Augusta Ada Byron" (1815-52), der Tochter von Lord Byron, die Charles Babbage half, Programme für den ersten mechanischen Computer zu entwickeln.

Der weibliche Vorname "Ada" soll seinerseits als Verkürzung von "Adam" gebildet worden sein. Andere Aussagen beziehen den Namen "Ada" allerdings auf den Namen "mad", der auf einem angelsächsischen "ead" = "glücklich" beruhen soll. Weiterhin werden die Namen "Eadith", "Eada", "Auda", "Ada", "Idonea" mit der Bedeutung "tauglich", "ordentlich", "fromm", "aufrichtig", "reich" ins Spiel gebracht.

Eine weitere Variante sieht in dem weiblichen Vornamen "Ada" eine Kurzform von Namen, die mit "Adel-" beginnen, wie etwa "Adelheid" und "Adelgunde".

Auch wird die Herkunft aus dem Hebräischen in Erwägung gezogen und als Bedeutung "Die (vom Herrn) Geschmückte", "Schmuck" angegeben.

Nicht unterschlagen möchte ich auch die Zurückführung auf den Vornamen "Edith", der seinerseits auf germ. "ed" = "Reichtum", "Glück" zurück geführt wird.

(E?)(L?) http://www.3sat.de/nano/cstuecke/36240/index.html

...
"Ada" ist ein Hightech-Zimmer, benannt nach der Tochter des berühmten Dichters, die die erste computerähnliche Maschine programierte. Ada hört, sieht, fühlt und lernt und ist ein Zimmer, das sich freut, wenn es Besuch erhält und den Besuch wieder hinausschmeisst, wenn es genug hat.
...


"ADA" findet man auch als Abkürzung für:

Und "Ada" findet man auch in den Varianten: "Ada 83" | "Ada 95" | "Ada 9X" | "Ada Core Technologies" | "Ada Lovelace" | "Ada Programming Support Environment" | "Ada Semantic Interface Specification" | "Ada Software Repository" | "Ada++" | "Ada-O" | "Ada/Ed".

(E1)(L1) http://www.ahnenforschung.net/cgi-bin/mdbase/mdb.cgi?list=A&db=vornamen
(E1)(L1) http://www.babynamewizard.com/namipedia/girl/ada


Als botanische Bezeichnung:

(E?)(L?) http://davesgarden.com/guides/botanary/go/7242/

Named for "Ada", sister of Artemis in Greek mythology


(E?)(L?) http://www.dtic.mil/doctrine/dod_dictionary/index.html
"ADA" als Abkürzung für "aerial damage assessment" und "air defense artillery".

(E?)(L?) http://www.oocities.org/edgarbook/names/names1.html
(E?)(L?) http://www.etymonline.com/index.php?term=Ada
(E3)(L1) http://www.jargon.net/jargonfile/a/Ada.html
(E?)(L?) http://wiki-de.genealogy.net/Ada_(Vorname)
(E1)(L1) http://www.gens.labo.net/it/nomi/genera.html?nome=ADA
(E?)(L?) http://mizian.com.ne.kr/englishwiz/library/names/etymology_of_first_names.htm#A
(E1)(L1) http://dictionary.reference.com/browse/Ada
(E1)(L1) http://www.sacklunch.net/personalnames/A/Ada.html
(E?)(L?) http://www.searchforancestors.com/surnames/origin/a/ada.php
(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpA,00.html
(E?)(L1) http://whatis.techtarget.com/definition/0,,sid9_gci211523,00.html
Ada

(E?)(L1) http://whatis.techtarget.com/definition/0,,sid9_gci960405,00.html
Ada Byron, countess of Lovelace | Ada Lovelace

(E?)(L1) http://whatis.techtarget.com/file-extension/Ada-FileFormat.html
".ada" findet man auch als Dateiendung zur Kennzeichnung von Dateien, die ein "Ada-Programm" enthalten.

(E1)(L1) http://www.tous-les-prenoms.com/prenoms/filles/ada.html
(E?)(L1) http://www.urbandictionary.com/define.php?term=Ada
(E2)(L1) http://webopedia.internet.com/TERM/A/Ada.html
The high-level programming language has been developed in the late 1970s and early 1980s for the United States Defense Department. Ada was designed to be a general-purpose language for everything from business applications to rocket guidance systems. One of its principal features is that it supports real-time applications. In addition, Ada incorporates modular techniques that make it easier to build and maintain large systems. Since 1986, Ada has been the mandatory development language for most U.S. military applications. In addition, Ada is often the language of choice for large systems that require real-time processing, such as banking and air traffic control systems.

Ada is named after "Augusta Ada Byron" (1815-52), daughter of Lord Byron, and Countess of Lovelace. She helped Charles Babbage develop programs for the analytic engine, the first mechanical computer. She is considered by many to be the world's first programmer.

(E?)(L?) http://www.zoope.com/a/a_names.html


Adobe Gamma Loader.exe (W3)

(E?)(L?) http://www.processlibrary.com/directory/files/adobe%20gamma%20loader/
(E6)(L?) http://www.tasklist.org/task_AdobeGammaLoader_exe_119.html
Um welches "Gamma" es sich bei diesem Adobe Feature handelt, ist mir leider nicht bekannt. Es dürfte aber etwas mit Farbkanälen zu tun haben.

Alto
Alto Operating System
AOS
Lisa (Personalcomputer) (W3)

Als die Spanier im heutigen Kalifornien auf riesige Bäume stiessen nannten sie diese Gegend "Palo Alto" = "Grosser Baum" (eigentlich eher "hoher Stab"). Daraus entwickelte sich in der San Francisco Bay die gleichnamige Stadt "Palo Alto".

Bekannt wurde die Stadt wegen der 1885 gegründeten "Stanford University" und wegen der vielen Forschungsinstitute und der Elektronikindustrie, die sich in neuerer Zeit dort ansiedelten.

Eine dieser Firmen, Xerox, baute dort ab 1973 den nach der Stadt benannten Mikrocomputer "Alto". Das besondere an diesem Computer war - zu seiner zeit - die grafische Benutzeroberfläche und die Maussteuerung.

Das Betriebssystem dieses Computer hieß konsequenterweise "Alto Operating System" ("AOS").

Eine andere bekannte Firma in Palo Alto ist die 1976 von Steve Jobs und Steven Wozniak gegründete Computerfirma "Apple". Allerdings verlegte Apple 1978 seinen Sitz von Palo Alto nach Cupertino (Kalifornien).

Steve Jobs war es auch, der 1980 die grafische Benutzeroberfläche und die Maussteuerung aus dem XeroxPARC in seinem Personalcomputer übernahm und vermarktete. Diesen nannte er allerdings nach seiner Tochter "Lisa".

Innere Streitigkeiten bei Apple und der hohe Preis verhinderten jedoch einen Erfolg des Personalcomputers "Lisa".

(E?)(L?) http://www.apple.com/
(E?)(L?) http://www.apple-history.com/


arachnotaxis

(Kunstwort) Zusammenziehung aus griech. "arachne" = "Spinne", "Spinnennetz" und griech. "taxis" = "Ordnung" zur Bezeichnung strukturierter URL-Listen, deren Einträge zum Auffinden entsprechender Webseiten dienen. Dieser Methode bedienen sich vor allem Suchmaschinen (>search engine) und Suchverzeichnisse im Internet (>directory); vgl. arachniography.

ascusc
JCMC - Journal of Computer-Mediated Communication

(E?)(L?) http://www.ascusc.org/jcmc/


ascusc
Nicknames, Play and Identity on Internet Relay Chat

(E?)(L?) http://www.ascusc.org/jcmc/vol1/issue2/bechar.html


Avatar (W3)

(E?)(L?) http://www.yourdictionary.com/cgi-bin/wotd.cgi?word=avatar
(E2)(L2) http://www.blueprints.de/wortschatz/
eine fiktive Figur im Cyberspace; ist in indischen Religionen die Verkörperung eines Gottes auf Erden

(Sanskrit, "Avatara", "Herabstieg"), Als "Avatare" werden im Hinduismus die verschiedenen menschlichen und tierischen Verkörperungen des Gottes Wischnu bezeichnet. In jeder Weltperiode inkarniert Wischnu, um die Guten zu retten und die Bösen zu bestrafen und so die göttliche Ordnung wiederherzustellen.
Heute bezeichnet man als "Avatare" auch virtuelle Personen, die nicht nur als Figur, sondern auch aus Persönlichkeit bestehen. Bekanntes Beispiel eines Avatars ist Lara Croft aus dem Computerspiel Tomb Raider.
(© blueprints Team)

B

barett

(E?)(L?) http://barett.com/technology/portals.htm
Portals - The domain name... net. co. uk. org. uk. plc. uk. ltd. uk Simply enter the domain name...

Information From our offices in London, England, UK and Los Angeles, California, USA we service the main Internet markets today. London Office Phone

BASIC (W3)

Die Bezeichnung "BASIC" steht für engl. "Beginner's All-purpose Symbolic Instruction Code", etwa dt. "Allzweck-Programmiersprache für Anfänger".

Die Programmiersprache wurde im Jahr 1965 am Dartmouth College als Lehr- und Lernsprache entwickelt. Im Jahr 1981 wurde sie auf den ersten IBM-PCs ausgeliefert. "BASIC" wurde auch auf dem Commodore C64 und auf Nixdorf-Rechnern eingesetzt.

Ein Nachfolger von "BASIC" ist etwa "VBA" ("Visual Basic for Applications"), eine Makro-Programmiersprache für Office-Anwendungen.

(E?)(L?) http://web.archive.org/web/20080308170629/http://www.bartleby.com/68/44/744.html

BASIC 2, BASIC ENGLISH


(E?)(L?) https://www.buerger-cert.de/glossar

BASIC (Beginners All purpose Symbolic Instruction Code)


(E?)(L?) http://www.businessdictionary.com/definition/BASIC.html

BASIC


(E?)(L?) http://www.catb.org/jargon/html/B/BASIC.html

BASIC


(E6)(L2) http://www.computerhilfen.de/lexikon.php

BASIC


(E?)(L?) http://beat.doebe.li/bibliothek/w00563.html

BASIC (Programmiersprache)


(E?)(L?) http://www.etymonline.com/index.php?term=BASIC

BASIC


(E?)(L?) http://h2g2.com/dna/h2g2/alabaster/A645121

BASIC - the Programming Language
...
The BASIC Origins

So, "BASIC", the "Beginners All-purpose Symbolic Instruction Code", was written in the early 1960s by two Dartmouth mathematics Profs, Thomas Kurtz and John Kemeny. The intent was to have a language that was easy to learn that could be used on the GE225 time-sharing system that Dartmouth was about ready to launch. The pair thought that the most popular languages of the day, including Fortran and ALGOL, were too complex for non-technical folks to learn. Using elements from both Fortran and ALGOL, and adding things like line numbers to make trouble shooting easier, Kemeny and Kurtz developed BASIC, at first only having 14 commands, including the famous GOTO. BASIC could be learned in as little as two sessions, a tremendous advantage over other languages that could take months.

The time-sharing system would allow many users to log in at the same time, running programs remotely via terminals around the campus in the Maths and Science departments. BASIC may have been the first language written with the intent of being used by non-computer professionals. Many early time-sharing systems used BASIC, including those powered by GE machines and DEC PDP-11 systems.
...


(E?)(L?) http://www.ib.hu-berlin.de/~wumsta/infopub/textbook/umfeld/rehm10.html

Nachdem Mitte der 1950er Jahre die Periode der Maschinensprachen einschließlich ihrer Weiterentwicklung ihren Abschluß gefunden hatte, begann danach die systematische Entwicklung problemorientierter Programmiersprachen, die zu immer komplizierteren, aber dafür immer benutzerfreundlicheren Sprachen führte: ein Laie konnte sie nach kurzer Einarbeitung beherrschen.

So entwickelten in den Jahren 1963-1965 John G. Kemeny und Thomas E. Kurtz am Dartmouth College in Hanover (N. H.) die leicht zu lernende problemorientierte Programmiersprache "BASIC" (Abk. für engl.: "Beginner's All-purpose Symbolic Instruction Code" ["Symbolischer Allzweck-Befehlscode für Anfänger"]), die sich besonders für die mathematisch-wissenschaftliche Programmierung (u.a. von Tischrechnern) eignet und sich mit verschiedenen Ergänzungen als Dialogsprache (d.i. eine für den Dialogbetrieb geeignete Programmiersprache) insbesondere bei Home- und Personal Computern bewährt hat.

1975 schrieben William H. Gates (* 1955), Student der Harvard University, und Paul Allan die Universal-Programmiersprache BASIC für Mikrocomputer um.


(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp

BASIC (beginner's all-purpose symbolic instruction code) | iSeries BASIC


(E?)(L1) http://www.iwebtool.com/computer_glossary/

BASIC


(E?)(L1) http://www.jamillan.com/v_index.htm

BASIC


(E3)(L1) http://www.jargon.net/jargonfile/b/BASIC.html

BASIC


(E?)(L?) http://jargonf.org/wiki/BASIC

BASIC


(E?)(L?) http://www1.ku-eichstaett.de/SLF/EngluVglSW/OnOn-Total.pdf

...
6.7. Acronyms

As already mentioned in the discussion on Dirven/Verspoor, acronyms play a paramount role in a highly modern society. For precision, I would like to underline that only spoken initialisms should be called acronyms; in my view it is not helpful that Algeo (1978, 1980) also defined cases like Dr. as acronyms. Ph.D., on the other hand, is a true acronym. Some acronyms are pronounced letter by letter, others as syllables - with possible differences in different varieties: some pronounce "VAT" as [vat], some as []vi:ec}ti:].

Like clipping, acronymy is based on a contiguity of parts of a linguistic form, where only some sounds - or better: letters - are selected for the new coinage. It is a particularity of acronymy that the short form sometimes seems mentally prior to the long form or at least concurrent. Then it passes through the phases described by Stekauer. And also Bauer (1983: 237) observes:

'In some cases it seems that the name of a particular object is specially chosen to give a suitable acronym. This seems to be true of "BASIC" ["Beginners' All-purpose Symbolic Instruction Code"] or, for example, the "Federation of Inter-State Truckers", "FIST". In other cases, the acronym spells something which seems to be appropriate in some metaphorical case, as for example with "WASP" ["White Anglo-Saxon Protestant"].'


(E?)(L?) http://learningenglish.voanews.com/media/video/the-50th-anniversary-of-the-language-that-changed-the-world/1920409.html

The 50th Anniversary of the Language That Changed the World

Published 05/26/2014

May 1st marked the 50th anniversary of a special computer language. Two college professors designed BASIC to permit college students not trained in mathematics to use computers.
...


(E?)(L?) http://www.oedilf.com/db/Lim.php?Word=BASIC

BASIC


(E2)(L1) http://dictionary.reference.com/browse/BASIC

BASIC


(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpB,00.html

BASIC


(E?)(L1) http://www.webopedia.com/Programming/Programming_Languages

BASIC | GW-BASIC | QBASIC | Visual Basic | Visual Basic Editor | Visual Basic for Applications


(E?)(L?) http://en.wikipedia.org/wiki/List_of_ISO_standards

ISO 10279 BASIC programming language


(E?)(L?) http://de.wikipedia.org/wiki/Atari-Heimcomputer

...
Die elektronische Architektur der XL-Computer unterscheidet sich nur geringfügig von der der 400/800-Baureihe. Es kamen lediglich einige Veränderungen in der Speicherverwaltung (OS ausblendbar), die nun ab Werk eingebaute Programmiersprache "Atari-BASIC" und ein nach außen geführtes Parallel Bus Interface (PBI), um Erweiterungen effizienter anbinden zu können, hinzu.
...


(E?)(L?) http://de.wikipedia.org/wiki/BASIC

"BASIC" ist eine imperative Programmiersprache. Sie wurde 1964 von John G. Kemeny und Thomas E. Kurtz am Dartmouth College entwickelt und verfügte in ihrer damaligen Form noch nicht über die Merkmale der strukturierten Programmierung, sondern arbeitete mit Zeilennummern und Sprungbefehlen (GOTO). Mittlerweile gibt es eine Vielzahl verschiedener BASIC-Dialekte, von denen einige der jüngeren alle Elemente höherer Programmiersprachen aufweisen, so etwa Objektorientierung.

Das Akronym "BASIC" steht für "Beginner’s All-purpose Symbolic Instruction Code", was so viel bedeutet wie "symbolische Allzweck-Programmiersprache für Anfänger". Die Abkürzung als Wort gesehen bedeutet außerdem "grundlegend". Dies zeigt das Design-Ziel klar: Eine einfache, für Anfänger geeignete Programmiersprache zu erschaffen. Außer in manchen Produktnamen wird das Wort "BASIC" grundsätzlich in Großbuchstaben geschrieben.
...


(E?)(L?) http://de.wikipedia.org/wiki/Texas_Instruments_TI-99/4A




Erstellt: 2014-05

BIOS (W3)

"BIOS" steht für "Basic Input Output System".

(E?)(L?) http://www.bios-kompendium.de/
Hans-Peter Schulz (Rufus) Herausgeber und Inhaber des "BIOS Kompendium" stellt ihnen hier in deutsch und kostenlos ausführliche Informationen zu den diversen BIOS und Einstell-Optionen zur Verfügung.

(E?)(L1) http://openbook.galileocomputing.de/kit/
(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
Basic Input/Output System (BIOS) | BIOS | NetBIOS (Network Basic Input/Output System)

(E?)(L1) http://www.iwebtool.com/computer_glossary/
(E?)(L1) http://www.iwebtool.com/what_is_bios.html
(E?)(L?) http://www.iwebtool.com/what_is_netbios.html
(E6)(L?) http://www.javvin.com/protocolsuite.html
NBSS: NetBIOS Session Service over TCP/IP
NetBIOS: Network Basic Input Output System
NetBEUI: NetBIOS Extended User Interface

(E?)(L1) http://www.kublikon.de/lexikon/html/b.php
(E?)(L1) http://www.rfc-editor.org/
(E?)(L?) http://www.rfc-editor.org/cgi-bin/rfcsearch.pl
Based on your search of [NetBIOS] in the All Fields field 7 matches were found

(E?)(L1) http://www.sophos.com/pressoffice/news/articles/2001/11/va_glossary.html#bios
(E6)(L?) http://www.tasklist.org/tasklist_b.html
A comprehensive list of processes running in your computer: BIOS1.EXE | Bios32.exe | biosefui.exe

(E?)(L1) http://whatis.techtarget.com/
AMIBIOS | BIOS | NetBIOS

(E?)(L1) http://whatis.techtarget.com/definition/0,,sid9_gci213814,00.html


Bit
bit (W3)

Das Kürzel "bit" für "binary digit", der kleinsten Informationseinheit, wurde 1946 von John Tukey, einem Statistiker des "Weissen Hauses", eingeführt.

In der Datenverarbeitung gibt es mittlerweile eine unübersehbare Zahl von Programmen: "Microcode, Betriebsysteme, Systemprogramme, Anwendungsprogramme, Compiler (die eine benutzerfreundliche Computersprache in eine maschinenfreundliche Computersprache übersetzen), Anwendungsprogramme, Datenbanksysteme, ... Aber alle diese Programme und auch alle Daten werden im Hintergrund nur mit Hilfe zweier Zeichen abgespeichert: 0 und 1 - ja und nein - an und aus, wie immer man sie bezeichnen möchte. Ob Programme oder Daten - alles wird in Bits abgelegt. Der Verarbeitende Teil des Computers frisst auf der einen Seite eine "endlose" Kette von Nullen und Einsen und spukt auf der anderen Seite eine ebenso endlos erscheinende Kette von Nullen und Einsen wieder aus. Alles, was Sie hier sehen und die Verwaltung und die Verfahren zur menschenfreundlichen Darstellung auf dem Bildschirm - alles nur Bits und Bytes.

"BIT" ist dabei die Abkürzung von "Binary digiT" = "binäres Zeichen" von lat. "binarius" = dt. "zwei enthaltend" und lat. "digitus" = dt. "Finger".

(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
binary digit (bit) | bit | bit data | bit map | bit mask | bit string | bitmap | bits per inch (bpi) | bits per second (bps) | concatenation bit | gigabits per second (Gbps) | kilobit ( Kb Kb) | kilobits per second (kbps) | low bit rate (LBR) | megabit (Mb) | megabits per second (Mbps) | parity bit | robbed-bit signaling (RBS) | terabit (Tb) |

(E3)(L1) http://webopedia.internet.com/TERM/b/bit.html


(E?)(L1) http://www.iwebtool.com/computer_glossary/
Bit

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpB,00.html
bit | bit bucket | bit depth | bit error rate | bit map | bit padding | bit per second | bit rate | bit robbing | bit stream | bit stuffing | Bit Torrent | bit/sec | BitLocker | bitmap | BITNET | BitPass | bits per second | BitTorrent | bitwise | gigabit | Gigabit Ethernet | gigabit interface converter | kilobit | kilobits per second | megabit | most significant bit or byte | petabit | quadbit | terabit | zone-bit recording | zoned-bit recording | 10-Gigabit Ethernet | 16-bit grayscale | | 8-bit grayscale

(E?)(L1) http://whatis.techtarget.com/file-extension-list-A/0,289933,sid9,00.html
BIT

Erstellt: 2011-10

Blue Screen (W3)

Blue Screen (W3)

Der "Blue Screen", "Bluescreen" ist ein kostenloses Feature von Microsoft. Anders jedoch als die meisten anderen Feature ist dieses nicht parametriesierbar. Der Bluescreen ist weder planbar noch reproduzierbar. Der Bluescreen läßt sich auch nicht deinstallieren. Der Bluescreen hängt wie ein Damoklesschwert über der täglichen Arbeit am PC. Der Bluescreen kommt wann er will, aber dann mit gravierenden Folgen. In gewisser Weise hat der Bluescreen Ähnlichkeiten mit einem schwarzen Loch. Gleich nach dem Bluescreen ist auch wirklich nur noch der schwarze Bildschirm zu sehen, bis der PC wieder startet. Dateien, die dem Bluescreen zu nahe kommen verschwinden auf nimmerwiedersehen. Nicht nur dass die noch nicht gespeicherten Änderungen verschwinden. - Nein der gesamte Inhalt einer geöffneten Datei wird vom Bluescreen mit Blanks überschrieben.

Als "Blue Screen" wird allerdings auch eine Filmtechnik bezeichnet, bei der Spezialeffekte mit Hilfe einer blauen Wand und dem Überblenden mehrerer Bilder erzielt werden. Um den PC Blue Screen hiervon zu unterscheiden wird er auch als "Blue Screen of Death" bezeichnet.

(E?)(L?) http://www.bender-verlag.de/lexikon/index.php?pos=B

Lexikon der Filmbegriffe
Blue Screen / Blue Screen-Verfahren
Siehe auch:


(E?)(L?) http://www.computerwissen.de/windows/windows-probleme-loesen/artikel/so-gehen-sie-einem-bluescreen-auf-den-grund.html
(E?)(L?) http://entertainment.howstuffworks.com/blue-screen.htm




(E?)(L?) http://jargonf.org/wiki/blue_screen
(E?)(L?) http://www.oedilf.com/db/Lim.php?Word=blue screen
Limericks on blue screen

(E?)(L?) http://www.wasistwas.de/sport-kultur/alle-artikel/artikel/link//5b1be38bea/article/lexikon-blue-screen.html

Lexikon: Blue Screen

Spiderman schwingt durch New Yorker Häuserschluchten, Harry Potter zeigt auf dem Besen sein Quidditchtalent - all das passiert natürlich nicht wirklich, sondern ist nur mit Hilfe des so genannten Blue Screen Verfahrens möglich.
...


(E?)(L?) http://www.wasistwas.de/sport-kultur/alle-artikel/artikel/link//bc014c405f/article/was-ist-ein-blue-screen-verfahren.html

Was ist ein Blue Screen Verfahren?

"Blue - Screen" heißt übersetzt "Blaue Leinwand". Das Blue Screen - Verfahren gibt die Möglichkeit Akteure in unmöglichen Umgebungen zu filmen, ohne sie dabei zu gefährden. Sie können - scheinbar - an Hochäusern hängen, im All schweben oder einfach nur in einem Studiio sitzen, während sich im Hintergrund ständig das Bild wechselt.
...


(E?)(L1) http://www.webopedia.com/TERM/B/blue_screen.html
(E?)(L?) http://de.wikipedia.org/wiki/Blue_Screen_(Fehlermeldung)

Ein Blue Screen (auch Bluescreen; zu deutsch: Blauer Bildschirm, von Microsoft offiziell Bugcheck genannt), auch scherzhaft "Blue Screen of Death" ("Blauer Bildschirm des Todes", kurz auch "BSoD") oder Blauer Tod (in Anlehnung an den Schwarzen Tod) genannt, ist eine Beschreibung einer bestimmten Kategorie von Fehlermeldungen (stop errors), die insbesondere von Microsoft-Windows-Betriebssystemen angezeigt werden. Um Schäden an Betriebssystem und Hardware zu verhindern, wird nach einem kritischen Systemfehler das System gestoppt und die Bedienoberfläche des Betriebssystems vollständig durch einen blauen Bildschirm ersetzt, auf dem in weißer Schrift die Fehlerinformationen erscheinen.

Ausgelöst werden diese Meldungen in den häufigsten Fällen nicht durch Fehler in Anwendungsprogrammen, sondern durch Fehler in Gerätetreibern oder in der Hardware. Wird der Blue Screen nicht von einem Defekt in der Hardware ausgelöst, so handelt es sich entweder um einen Programmierfehler in einem Treiber, im Betriebssystemkern, der oft mittels eines Patches vom entsprechenden Hersteller behoben werden kann, oder um eine fehlerhafte Systemkonfiguration. In bestimmten Fällen kann auch ein Fehler in der Softwarearchitektur zu Grunde liegen, der bis zum Ende der Lebensdauer des Produktes erhalten bleibt.
...


(E?)(L?) http://www.www-kurs.de/glossar.htm


(E1)(L1) http://books.google.com/ngrams/graph?corpus=8&content=Blue Screen
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

Engl. "Blue Screen" taucht in der Literatur um das Jahr 1980 auf.

Erstellt: 2011-12

Blue Screen of Death (W3)

Blue Screen of Death (W3)

Der "Blue Screen", "Bluescreen" ist ein kostenloses Feature von Microsoft. Anders jedoch als die meisten anderen Feature ist dieses nicht parametriesierbar. Der Bluescreen ist weder planbar noch reproduzierbar. Der Bluescreen läßt sich auch nicht deinstallieren. Der Bluescreen hängt wie ein Damoklesschwert über der täglichen Arbeit am PC. Der Bluescreen kommt wann er will, aber dann mit gravierenden Folgen. In gewisser Weise hat der Bluescreen Ähnlichkeiten mit einem schwarzen Loch. Gleich nach dem Bluescreen ist auch wirklich nur noch der schwarze Bildschirm zu sehen, bis der PC wieder startet. Dateien, die dem Bluescreen zu nahe kommen verschwinden auf nimmerwiedersehen. Nicht nur dass die noch nicht gespeicherten Änderungen verschwinden. - Nein der gesamte Inhalt einer geöffneten Datei wird vom Bluescreen mit Blanks überschrieben.

Als "Blue Screen" wird allerdings auch eine Filmtechnik bezeichnet, bei der Spezialeffekte mit Hilfe einer blauen Wand und dem Überblenden mehrerer Bilder erzielt werden. Um den PC Blue Screen hiervon zu unterscheiden wird er auch als "Blue Screen of Death", "BSoD", bezeichnet.

(E?)(L?) http://www.catb.org/jargon/html/B/Blue-Screen-of-Death.html

...
The following entry from the Salon Haiku Contest, seems to have predated popular use of the term:

???Windows?NT?crashed.
???I?am?the?Blue?Screen?of?Death
???No?one?hears?your?screams.


(E?)(L?) http://www.netlingo.com/inframes.cfm
(E?)(L?) http://www.oedilf.com/db/Lim.php?Word=Blue Screen of Death
Limericks on Blue Screen of Death

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpB,00.html
(E?)(L1) http://www.urbandictionary.com/define.php?term=Blue+Screen+of+Death
(E?)(L?) http://www.webopedia.com/TERM/b/blue_screen_of_death.html


(E1)(L1) http://books.google.com/ngrams/graph?corpus=8&content=Blue Screen of Death
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

Engl. "Blue Screen of Death" taucht in der Literatur nicht signifikant auf.

Erstellt: 2011-12

Bluescreen (W3)

Der "Bluescreen" ist ein kostenloses Feature von Microsoft. Anders jedoch als die meisten anderen Feature ist dieses nicht parametriesierbar. Der Bluescreen ist weder planbar noch reproduzierbar. Der Bluescreen läßt sich auch nicht deinstallieren. Der Bluescreen hängt wie ein Damoklesschwert über der täglichen Arbeit am PC. Der Bluescreen kommt wann er will, aber dann mit gravierenden Folgen. In gewisser Weise hat der Bluescreen Ähnlichkeiten mit einem schwarzen Loch. Gleich nach dem Bluescreen ist auch wirklich nur noch der schwarze Bildschirm zu sehen, bis der PC wieder startet. Dateien, die dem Bluescreen zu nahe kommen verschwinden auf nimmerwiedersehen. Nicht nur dass die noch nicht gespeicherten Änderungen verschwinden. - Nein der gesamte Inhalt einer geöffneten Datei wird vom Bluescreen mit Blanks überschrieben.

(E2)(L1) http://www.mundmische.de/


(E?)(L?) http://www.oedilf.com/db/Lim.php?Word=bluescreen
Limericks on bluescreen

(E?)(L?) http://www.pcwelt.de/ratgeber/Windows-Probleme-So-beseitigen-Sie-Bluescreens-bei-Windows-423706.html

...
Wenn Ihr PC bei einem Bluescreen sofort neu startet, ohne dass Sie die Meldung entziffern können, schalten Sie den automatischen Windows-Neustart ab. Die Option dazu finden Sie via Start/Systemsteuerung/Leistung und Wartung/System/Erweitert. Wählen Sie dort unter "Starten und Wiederherstellen" die Einstellungen. Es öffnet sich ein Fenster, in dem Sie "Automatisch Neustart durchführen" deaktivieren. In Windows Vista steckt die Option unter Systemsteuerung/System und Wartung/System/Erweiterte Systemeinstellungen.
...
Mit etwas Glück finden Sie die Lösung zu Ihrem Problem unter den fünf häufigsten Gründen für einen PC-Absturz. Diese sind im Folgenden beschrieben. Außerdem geben wir Ihnen allgemeine Ratschläge, um einem Absturz vorzubeugen und die Ursache zu beseitigen.


(E?)(L?) http://www.vvork.com/?tag=blue-screen
»accidentalbluescreen« by John Michael Boling

(E1)(L1) http://books.google.com/ngrams/graph?corpus=8&content=Bluescreen
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

Engl. "Bluescreen" taucht in der Literatur um das Jahr 1980 auf.

Fehlermeldung (Ereignisanzeige) nachträglich anzeigen lassen (WINDOWS 7):

Fehler und Warnungen lassen sich dank Datumsangabe relativ genau einem Absturz zuordnen. Ein Doppelklick auf den Eintrag liefert weitere Infos.

Fehlermeldung vom 02.12.2011

  - Provider
   [ Name]  Microsoft-Windows-Kernel-Power
   [ Guid]  {331C3B3A-2005-44C2-AC5E-77220C37D6B4}
   EventID 41
...


Danach habe folgenden Tip befolgt:

(E?)(L?) http://answers.microsoft.com/de-de/windows/forum/windows_7-performance/st%C3%A4ndige-freezes-unter-windows-7-64bit/b31d3bb6-12ce-4e05-9eb0-8a6b26b844f0

• Energiesparplan auf Höchste Leistung (Festplatten ausschalten: NIE (muss seperat angewählt werden, da standardmäßig auf 20" eingestellt))


Erstellt: 2011-12

Blush Cluster - Rose

(E?)(L?) http://www.apictureofroses.com/cms/rose/L-094-noisette-noisettiana-blush-rose-pink-white.htm

"Blush Noisette"
"R. noissettiana"
ORIGINAL BOTANICAL NAME "Rosa Noisettiana"
ORIGINAL FRENCH NAME "Rosier de Philippe Noisette"
CURRENT BOTANTICAL NAME "R. noissettiana"
COMMON NAME "Blush Noisette"
OTHER NAMES "Phillipe Noisette Rose", "Blush Cluster", "Flesh-Coloured Noisette"
...


(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=15366


(E?)(L?) http://www.welt-der-rosen.de/duftrosen/duftrosen.htm

"Blush Noisette", "Rosier de Philippe Noisette", "Blush Cluster", "Flesh-coloured Noisette", "Rosa x noisettiana", Noisette (FR) 1825 "Noisetterose", Alte Rose lilarosa remontierend, fast dauerblühend, starker Gewürznelkenduft, fast stachellos. Die erste der sogenannten "Noisette-Rosen". Kombinationen mit Clematis sehr schön - z. B. mit der Clematis Hybride "Ashva" (hellviolette Blüten mit rötlichen Streifen und einem gewellten Rand) oder der Clematis viticella Etoile Violette.


boot - to boot
booten
bootstrap
bootstrapping
reboot (W1)

Das Hochfahren eines Rechners wird auch dt. "booten", engl. "boot" genannt. Dass der "Stiefel" (engl. "boot") zum Verb wurde und in der Informationsverarbeitung landete, könnte auf die umgangssprachliche Bedeutung "jemandem einen Fußtritt geben" zurück gehen. Aber die Entwicklung scheint etwas interessanter zu sein.

Ausgangspunkt war anscheinend engl. "bootstrap" = "Stiefelschlaufe". Diese Lederschlaufe dient(e) dazu einen Stiefel anzuziehen.

In Analogie zu Baron von Münchhausens Abenteuer, bei dem er sich und sein Pferd an den eigenen Haaren aus dem Sumpf zog, erhielt engl. "bootstrapping" auch die übertragene Bedeutung "sich an den eigenen Stiefelschlaufen hochziehen" (engl. "pull oneself up by one's own bootstraps"). Allgemein bezeichnet "bootstrapping" = "einen Prozess starten", einen Vorgang bei dem ein einfaches System ein komplexeres System startet. Und so fand er seinen Weg in verschiedene technische Bereiche (Elektrotechnik, Informatik, Statistik, Finanzwirtschaft, Wissenschaft, Medizin).

Das engl. "bootstrapping" findet man im US-Englisch seit Mitte des 19. Jh. Möglicherweise entstand es im Umfeld der Cowboys, die sich jeden Morgen mit dem Anziehen der Stiefel auch psychisch auf einen neuen harten Tag vorbereiteten. Das "bootstrapping" bedeutete also jeden morgen auch eine mentale Initialzündung.

In der Computerei tauchte das Wort dann in den 1950er Jahren auf. Dort bezeichnete "bootstrapping" das komplizierte Starten eines Computers. Möglicherweise wurden die Science-fiction-affinen Computer-Freaks zu dieser Begriffsübernahme durch Robert Heinleins 1941 erschienene Zeitreise-Story "By His Bootstraps" angeregt.

Jedenfalls war "bootstrapping" recht passend, da die Aufeinanderfolge von Hardware-nahen Startprogrammen, die das Betriebssystem suchen und starten und schließlich die Anwendungsprogramme und das Laden von Daten ermöglichen, recht bildlich mit dem Ziehen an den "Stiefelschlaufen" verglichen werden kann. Zumal in den Anfangstagen der Computerei das Startprogramm noch über externe Eingabegeräte, z.B. per Lochkarten eingelesen werden mußte.

Dieser Prozess erinnert schon etwas an das "Herausziehen an den eigenen Haaren" bzw. an das "lifting oneself by one's own bootstraps". Und so erhielt das Initialprogramm auch die Bezeichnung "bootstrap loader".

Aber das war schon bald zu lang und wurde zu "bootstrap" und schließlich zu "to boot" abgekürzt. Und da man in den Anfangstagen - und teilweise auch heute noch - den Computer mehrmals starten muß bis er richtig funktioniert, entstand die Bezeichnung "reboot" = "repeating the process".

(E?)(L?) http://37signals.com/bootstrapped

Bootstrapped, Profitable, & Proud
Our Bootstrapped, Profitable, & Proud series profiles companies that have over one million dollars in revenues, didn’t take VC, and are profitable.




(E6)(L1) http://www.anglizismenindex.de/
boot | booten | bootstrap | boot-up | bootlegging

(E3)(L1) http://www.besoindaide.com/ccm/repar/partitio.htm

...
Ce programme, une fois en mémoire, va déterminer sur quelle partition le système va s'amorcer, et il va démarrer le programme (appelé "bootstrap") qui va amorcer le système d'exploitation présent sur cette partition.
...


(E?)(L?) http://www.businessdictionary.com/terms-by-letter.php?letter=B
boot | booting | bootstrapping

(E?)(L?) http://isi.cbs.nl/glossary/bloken00.htm
| balanced bootstrap | bootstrap aggregation | bootstrap methods | bootstrap test | iterated bootstrap

(E?)(L1) http://www.fao.org/fi/glossary/

DEFINITION
A statistical methodology used to quantify the uncertainty associated with estimates obtained from a model. The bootstrap is often based on Monte Carlo resampling of residuals from the initial model fit.


(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
BOOTP | bootstrap data set (BSDS) | Bootstrap Protocol (BOOTP) | bootstrapping

(E?)(L?) http://www.investopedia.com/terms/b/
Boot | Booth School of Business | Bootstrap | Bootstrapping

(E?)(L?) http://www.investopedia.com/categories/bonds.asp
Bootstrapping

(E?)(L?) http://www.investorwords.com/cgi-bin/letter.cgi?b
bootstrap

(E3)(L1) http://mypage.iu.edu/~shetter/miniatures/bootstrapping.htm

166. Your own Bootstraps
Making use of the resources you already have (Apr 06)
Linguistics makes use of the term bootstrapping to study the way in which language learners, especially children acquiring their native language, learn at successively more complex levels by building on more fundamental knowledge already available.
...


(E?)(L1) http://www.iwebtool.com/computer_glossary/
Boot | Boot Disk

(E?)(L?) http://www.jargonf.org/
boot | Boot Camp | boot camp | boot sector | bootable | booter | bootloader | bootP | bootstrap | Bootstring

(E6)(L?) http://www.javvin.com/protocolsuite.html
BOOTP: Bootstrap Protocol

(E?)(L?) http://www.lib.ru/ENGLISH/american_idioms.txt
by one's own bootstraps | by the bootstraps | pull oneself up by the bootstraps | pull oneself up by one's own bootstraps

(E?)(L?) http://www.llengua.info/vocterm/llistat.php?letra=B
bootstrap protocol

(E?)(L?) http://www.oedilf.com/db/Lim.php?Word=???
Limericks on "boot" | "bootable" | "bootblack" | "boot camp" | "boot cut" | "booted" | "bootee" | "Bootes" | "booth" | "booth babe" | "booth bunny" | "Booth, Edwin Thomas" | "bootheel" | "Boot Hill" | "Booth, John Wilkes" | "Booth, Junius Brutus" | "boot hook" | "bootie" | "booties" | "bootiful" | "bootilicious" | "bootjack" | "bootlace" | "bootleg" | "bootlegger" | "bootless" | "bootlessly" | "bootlessness" | "bootlick" | "bootlicker" | "boot out" | "boot sale" | "bootstrap" | "bootstrap loader" | "bootstrapping" | "booty" | "booty call" | "bootylicious"

(E?)(L?) http://www.owad.de/owad-archive-quiz.php4?id=1670
bootleg

(E1)(L1) http://www.owad.de/owad-archive-quiz.php4?id=1775
bootstrap

(E?)(L?) http://www.parasearch.de/mysteria/x/x1127.htm

Bootstrap-Theorie ("Schnürsenkel"-Theorie)
Radikales physikalisches Denkmodell von Geoffrey Chew, das für einen speziellen Teil von subatomaren Teilchen (Hadronen) entwickelt wurde, doch in seiner Ausweitung zu einem allgemeinen naturphilosophischen Konzept zahlreiche New-Age-Denker ( New Age ) beeinflußt hat.
...


(E?)(L?) http://www.pcwelt.de/start/software_os/vista/news/96350/index.html?NLC-Newsletter&id=96350
So bootet Windows Vista

(E?)(L?) http://www.phrases.org.uk/meanings/p.html

Pull yourself up by your bootstraps
...
It was known by the early 20th century. James Joyce alluded to it in Ulysses, 1922:
"There were others who had forced their way to the top from the lowest rung by the aid of their bootstraps."
...


(E2)(L1) http://dictionary.reference.com/browse/boot
(E2)(L1) http://dictionary.reference.com/browse/bootblack
(E2)(L1) http://dictionary.reference.com/browse/boot block
(E2)(L1) http://dictionary.reference.com/browse/boot camp
(E2)(L1) http://dictionary.reference.com/browse/booted
(E2)(L1) http://dictionary.reference.com/browse/bootee
(E2)(L1) http://dictionary.reference.com/browse/Boötes
(E2)(L1) http://dictionary.reference.com/browse/booth
(E2)(L1) http://dictionary.reference.com/browse/Boothia Peninsula
(E2)(L1) http://dictionary.reference.com/browse/bootie
(E2)(L1) http://dictionary.reference.com/browse/bootjack
(E2)(L1) http://dictionary.reference.com/browse/bootlace
(E2)(L1) http://dictionary.reference.com/browse/bootleg
(E2)(L1) http://dictionary.reference.com/browse/bootless
(E2)(L1) http://dictionary.reference.com/browse/bootlick
(E2)(L1) http://dictionary.reference.com/browse/bootstrap
(E2)(L1) http://dictionary.reference.com/browse/bootstrap memory
(E2)(L1) http://dictionary.reference.com/browse/booty


(E?)(L1) http://www.reiter1.com/Glossar/Glossar.htm
Bootstrap Siehe Resampling Siehe Randomisierungstest.
...
Bootstrap: Häufiges Ziehen aus der Stichprobe mit Zurücklegen, mögliche Kombinationen weren zufällig erzeugt.
Der Name "Bootstrap" bedeutet sinngemäss "Sich am eigenen Schopfe hochziehen" (Münchhausen), weil man so tut, als ob die Stichprobe die Grundgesamtheit sei.
...

(E?)(L?) http://www.rfc-editor.org/rfc-index2.html


(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpB,00.html
boot | Boot Camp | boot loader | boot manager | boot up | bootable floppy | booting | | BOOTP | bootstrap | Bootstrap Protocol | bootstrapping

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpC,00.html
cold boot | dual boot | Master Boot Record | Preboot Execution Environment | Preboot Execution Environment | reboot | warm boot

(E2)(L2) http://www.ureda.de/php/lexikon/ausgabe.php3?liststabe=B&kat=

Bootstrap-Hypothese
...
Für die physikalische Sicht wurde vor allem die damals neue Bootstrap-Hypothese herangezogen, die das Universum als dynamisches Gewebe untereinander verbundener Geschehnisse versteht.
...


(E?)(L1) http://www.usingenglish.com/reference/idioms/pull+yourself+up+by+your+bootstraps.html
Pull yourself up by your bootstraps

(E6)(L1) http://mathworld.wolfram.com/letters/B.html
Bootstrap Methods | Bootstrap Percolation

(E?)(L?) http://mathworld.wolfram.com/topics/AnimatedGIFs.html
Bootstrap Percolation

(E?)(L?) http://mathworld.wolfram.com/topics/InteractiveDemonstrations.html
Bootstrap Methods | Bootstrap Percolation

(E?)(L?) http://zbw.eu/stw/versions/latest/descriptor/about.de.html

Bootstrap-Verfahren
Bootstrap method (engl.)
benutzt für: Bootstrap-Statistik, Bootstrap approach, Bootstrapping
...


(E1)(L1) http://books.google.com/ngrams/graph?corpus=0&content=bootstrapping
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

Engl. "bootstrapping" taucht in der Literatur um das Jahr 1900 auf.

Erstellt: 2011-10

BSOD (W3)

"BSOD", "BSoD" steht für "blue screen of death".

(E?)(L?) http://www.catb.org/jargon/html/go01.html
(E?)(L?) http://www.jargonf.org/
(E3)(L1) http://www.netlingo.com/word/bsod.php
(E?)(L?) http://www.oedilf.com/db/Lim.php?Word=BSOD
Limericks on BSOD

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpB,00.html
(E?)(L?) http://www.webopedia.com/TERM/b/blue_screen_of_death.html
(E?)(L?) http://de.wikipedia.org/wiki/Blue_Screen_(Fehlermeldung)

Ein Blue Screen (auch Bluescreen; zu deutsch: Blauer Bildschirm, von Microsoft offiziell Bugcheck genannt), auch scherzhaft "Blue Screen of Death" ("Blauer Bildschirm des Todes", kurz auch "BSoD") oder Blauer Tod (in Anlehnung an den Schwarzen Tod) genannt, ist eine Beschreibung einer bestimmten Kategorie von Fehlermeldungen (stop errors), die insbesondere von Microsoft-Windows-Betriebssystemen angezeigt werden. Um Schäden an Betriebssystem und Hardware zu verhindern, wird nach einem kritischen Systemfehler das System gestoppt und die Bedienoberfläche des Betriebssystems vollständig durch einen blauen Bildschirm ersetzt, auf dem in weißer Schrift die Fehlerinformationen erscheinen.

Ausgelöst werden diese Meldungen in den häufigsten Fällen nicht durch Fehler in Anwendungsprogrammen, sondern durch Fehler in Gerätetreibern oder in der Hardware. Wird der Blue Screen nicht von einem Defekt in der Hardware ausgelöst, so handelt es sich entweder um einen Programmierfehler in einem Treiber, im Betriebssystemkern, der oft mittels eines Patches vom entsprechenden Hersteller behoben werden kann, oder um eine fehlerhafte Systemkonfiguration. In bestimmten Fällen kann auch ein Fehler in der Softwarearchitektur zu Grunde liegen, der bis zum Ende der Lebensdauer des Produktes erhalten bleibt.
...


(E?)(L?) http://www.www-kurs.de/gloss_b.htm#BSOD


Erstellt: 2011-12

Bug, Debugging (W1)

Why was there a bug in the computer? - It was looking for a byte to eat.

Der "bug" ist ein englischer "Käfer" bzw. eine "Wanze". Zu Zeiten, als die Rechen-Kapazität eines PC noch einen ganzen Saal benötigte, waren diese eine beliebte Zufluchtsstätte für verschiedene Kleintiere. Diese krabbelten ohne Rücksicht über Kabel, Röhren und Platinen. Manche wurden dabei auch mal gebraten und verursachten dabei kleinere Kurzschlüsse. Diese machten sich in fehlerhaften Berechnungen oder Schlimmerem bemerkbar. Und so waren die "bugs" weithin gefürchtet. Und auch heute noch - wo es kaum noch einen Platz für "Käfer" im Rechner gibt - schiebt man ihm jede Fehlfunktion oder unsaubere Programmierung unter den Chitinpanzer.

Das Entfernen von Fehlern nennt man übrigens entsprechend "Debugging".

Als Bezeichnung für einen technischen Fehler soll Grace Murray Hopper den "bug" eingeführt haben. Hopper erfand 1945 den ersten Großcomputer bei der US Navy. Als sie nach einem Maschinenausfall eine Motte darin fand, notierte sie in ihrem Laborbericht "a bug in the computer".

David Wilton weist auf seiner Site "wordorigins" darauf hin, dass der Term "Bug" bereits aus Thomas Edison's Labor entwichen sein könnte. Jedenfalls gibt es Hinweise auf seine Existenz bereits im Jahre 1878, also lange vor dem Computerzeitalter.

"bug" hat verschiedene Bedeutungen: ETYMOLOGY: Origin unknown.

"Bug" ist auch der Name eines geleich zweifach vorkomenden Flusses:

The text of the log entry (from September 9, 1947), reads "1545 Relay #70 Panel F (moth) in relay. First actual case of bug being found". This wording establishes that the term was already in use at the time in its current specific sense - and Hopper herself reports that the term "bug" was regularly applied to problems in radar electronics during WWII.

(E6)(L1) http://www.anglizismenindex.de/
(E3)(L1) http://www.besoindaide.com/ccm/histoire/ordinateur.htm
(E2)(L1) http://www.beyars.com/lexikon/lexikon_2278.html
Der dt. "Bug" bedeutet im Schmuckgeschäft einfach "Keine scharfe Kante".

(E?)(L?) http://www.catb.org/jargon/html/B/bug.html

...
Indeed, the use of bug to mean an industrial defect was already established in Thomas Edison's time, and a more specific and rather modern use can be found in an electrical handbook from 1896 (Hawkin's New Catechism of Electricity, Theo. Audel & Co.) which says: “The term ‘bug’ is used to a limited extent to designate any fault or trouble in the connections or working of electric apparatus.” It further notes that the term is “said to have originated in quadruplex telegraphy and have been transferred to all electric apparatus.”
...


(E1)(L1) http://www.cornelsen.de/teachweb/1.c.142406.de
(E?)(L?) http://www.cornelsen.de/teachweb/1.c.36177.de?parentID=1.c.142406.de
(E1)(L1) http://etimologias.dechile.net/?bug
(E3)(L1) http://www.doubletongued.org/index.php/dictionary/bug/
Ab 1936 gibt es auch Belege für "bug" = "an illegal lottery", "the numbers game"

(E?)(L?) http://www.dtic.mil/doctrine/dod_dictionary/index.html
"Bug" kann auch eine "Abhörwanze" bezeichnen.
(E?)(L?) http://www.etymonline.com/index.php?search=bug
(E?)(L?) http://www.etymonline.com/index.php?term=bug
Die Bezeichnung "bug" für "Insekt" ist seit 1622 bekannt. Der Werdegang ist nicht bekannt könnte aber auf mengl. "bugge" = "something frightening", "scarecrow" zurückgehen, das noch in engl. "bugbear" (1580) = "Buhmann", "Schreckgespenst" und "bugaboo" = "Schreckgespenst" zu finden ist. Möglich ist ein Zusammenhang mit schott. "bogill" = "goblin", "bugbear". Auch ein untergegangenes walisisches Wort "bwg" = "ghost", "goblin" (walis. "bwgwl" = "threat", davor "fear") und "bogey" = "Kobold", germ. "bögge", "böggelmann" = "goblin" stehen wohl damit in Zusammenhang.

Als Maschinendefekt ist "bug" seit 1889 bekannt, evtl existent seit 1878.

Als Bezeichnung für eine Abhöreinrichtung tritt es seit 1919 auf.

Als Verb mit der Bedeutung "ärgern", "reizen" tritt es seit 1949 auf.

Als Bezeichnung für "eine Person mit einer fixen Idee" ist es seit 1841 zu finden.

(E?)(L?) http://www.fernsehserien.de/index.php?abc=H
In dem Film "Herbie, the Love Bug" (USA 1982) ist es die Bezeichnung für den "Wunderkäfer".

(E3)(L1) http://www.gutenberg.net/etext04/dcvgr10.txt




(E?)(L?) http://www.internet-abc.de/eltern/bug.php
(E3)(L1) http://www.jargon.net/jargonfile/b/bug.html
(E?)(L1) http://www.lebensmittellexikon.de/sch00240.php
Hier erfährt man, was ein dt. "Bug" ("Schulterstück") zum Essen ist.

(E?)(L?) http://jargonf.org/wiki/Cat%C3%A9gorie:B
(E?)(L?) http://www.musanim.com/mam/unknown.html
bug (1388)

(E?)(L?) http://www.netlingo.com/right.cfm?term=bug
(E?)(L1) http://www.philalex.de/lexikon/b.htm
Auch die Briefmarkensammler haben ihren "Bug", den "leichter Knick in der Marke".

(E?)(L?) http://www.rapdict.org/Bug
Im Rapperjargon bezeichnet "bug" ein "verrücktes Verhalten".

(E?)(L?) http://dictionary.reference.com/
(E?)(L?) http://dictionary.reference.com/help/faq/language/d27.html
What is the difference between a bug and an insect?

Ein engl. "bug" ist ein Mitglied der Ordnung "Hemiptera", dt. "Halbflügler" (Insekten, z. B. Wanzen). Insekten gehören zur Klasse der "Insecta" und sind durch einen dreiteiligen Körper gekennzeichnet, deshalb auch "Insekt" von lat. "insecare" = "einschneiden").

(E2)(L1) http://www.kruenitz1.uni-trier.de/cgi-bin/callKruenitz.tcl

"Bug", wird beim Fleisch-Einkauf, insgemein derjenige Theil genennet, der sich an einem Vieh (zahmen sowol, als Wildprett) um den Vorderlauf oder das Schulterblatt befindet, von dem Kamme an gerechnet, bis an die Brust, worzu bei dem Schweinevieh die vier ersten Ribben gerechnet werden.
...


(E?)(L?) http://webopedia.com/TERM/b/bug.html
According to folklore, the first computer bug was an actual bug. Discovered in 1945 at Harvard, a moth trapped between two electrical relays of the Mark II Aiken Relay Calculator caused the whole machine to shut down.

(E?)(L?) http://en.wikipedia.org/wiki/Computer_bug
(E?)(L?) http://www.www-kurs.de/gloss_b.htm#Bug
(E?)(L?) http://www.wordorigins.org/index.php/bug/


bugnet

(E?)(L?) http://www.bugnet.com/
gibt Berichte zu Sicherheitsmeldungen und Fehlerberichte heraus; auch als Newsletter;

Byte

Byte ist der grosse Bruder von "Bit". Es besteht aus 8 Bits. Es ist die erste sinntragende Einheit. Z.B. werden Buchstaben und Zahlen mit je einem Byte "verschlüsselt".

Die Abkürzung "byte" steht für "binary term". In der Datenverarbeitung bezeichnet "byte" eine Speichereinheit (üblicherweise 8Bit), zur Aufnahme eines Zeichens.

(E1)(L1) http://www.etymonline.com/
(E6)(L1) http://computer.howstuffworks.com/bytes.htm
(E?)(L?) http://dictionary.reference.com/
(E?)(L?) http://webopedia.com/TERM/B/byte.html
(E?)(L?) http://wissen.schoelnast.at/

Abbreviation for "binary term", a unit of storage capable of holding a single character. On almost all modern computers, a byte is equal to 8 bits. Large amounts of memory are indicated in terms of kilobytes (1,024 bytes), megabytes (1,048,576 bytes), and gigabytes (1,073,741,824 bytes).


Ein anderer Hinweis besagt, dass es sich um die Abkürzung für "by eight" handeln soll.

C

C++

A high-level programming language developed by Bjarne Stroustrup at Bell Labs. C++ adds object-oriented features to its predecessor, C. C++ is one of the most popular programming language for graphical applications, such as those that run in Windows and Macintosh environments.

Cato's Cluster - Rose

(E?)(L?) http://www.everyrose.com/everyrose/roses/browse.lasso

Cato's Cluster w White & White blend, Noisette (OGR)


(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=1026


Cato's Pink Cluster - Rose

(E?)(L?) http://www.everyrose.com/everyrose/roses/browse.lasso

Cato's Pink Cluster NR lp Light Pink, Noisette (OGR)


(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=1027


cbttape
MVS-Link-Liste
OS/390-Link-Liste
z/OS-Link-Liste

(E6)(L?) http://www.cbttape.org/
(E6)(L?) http://www.cbttape.org/links.phtml
Downloads
CBT - Top 10 Files - Updates - Overflow - JES3 - JES2 - CBT249 & Older - UCLAmail - Xmit Manager - MVS 3.8J - VM/370 R6 - OS/VS1 - PDS 8.5 - Linux/390 - MVT Mods - Fish's Herc Tools - PC Tools - AWSTAPE

Information
Newsletter - FAQ - Links - Mail & Newsgroups - Fun - Features - Order CD-ROM(s) - Steve Samson - Contribute files - Freebies - Linking to CBT site - Advertising here - Complaints - Workbench - Cross Links - Contact Us - Buy Gear

Interesting Computing Links

Erstellt: 2011-11

Champney's Pink Cluster - Rose

Mit roten hakenförmigen Stacheln und gelben, weißen oder rosa Blüten entstand die "Noisette-Rose" 1802 in South Carolina aus "R. moschata" und einer Rose namens "Pink China" (Parson) durch den Rosenzüchter Champneys unter dem Namen "Champneys' Pink Cluster". Samen der Rose "Champneys' Pink Cluster" wurden von "Phillipe Noisette" in Charleston zum Wachsen gebracht, der daraus die "Old Blush" bzw. "R. noisettiana" weiterentwickelte, die von Redouté im Jahr 1821 gemalt wurde. Diese wurde mit "Park's Yellow China" gekreuzt und führte so zu den gelben Noisette-Kletterrosen, darunter "Desprez a fleur Jaune" und "Marechal Niel".

(E?)(L?) http://www.antiqueroseemporium.com/item.tmpl$search?db=roses.db&eqskudatarq=301
(E?)(L?) http://www.classicroses.co.uk/products/roses/
(E?)(L?) http://www.classicroses.co.uk/productindex.php?type=rose&prodfinderformroseFamily=noisettes_and_close_relatives

Champney's Pink Cluster - (R.chinensis x R.moschata) Double pink flowers in large clusters. Moderately vigorous and hardy. Forerunner of the Noisettes.


(E?)(L?) http://www.countrysideroses.com/
(E?)(L?) http://www.countrysideroses.com/csr/RosePages/ChampneysPinkCluster.html
(E?)(L1) http://www.davidaustinroses.com/german/showrose.asp?showr=3385
(E?)(L?) http://www.everyrose.com/everyrose/roses/browse.lasso

Champneys' Pink Cluster lp Light Pink, Noisette (OGR) 1811


(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.frost-burgwedel.de/index.php?seite=rosenkatalog_liste
(E?)(L1) http://www.helpmefind.com/rose/pl.php?n=1063
(E?)(L?) http://www.oldroses.org/roses/rldb.asp

Champneys' Pink Cluster Noisette


(E?)(L?) http://www.pflanzen-im-web.de/pflanzen/pflanzen-suche/Rosen/index.php

Kletterrose "Champney's Pink Cluster" ~ Rosa Hybr.


(E?)(L?) http://www.rkdn.org/roses/rldb.asp

Champneys' Pink Cluster


(E?)(L1) http://www.rogersroses.com/gallery/chooserResult.asp

'Champneys' Pink Cluster'


(E6)(L1) http://www.rosefile.com/RosePages/Galleries.html
(E?)(L?) http://www.rosefile.com/RosePages/ClassNoisette.php

Champney's Pink Cluster


(E?)(L?) http://www.rosenzeit.com/rosenhang-karben/

Champneys Pink Cluster, Züchter Champney, 1811


(E?)(L?) http://www.welt-der-rosen.de/duftrosen/duftrosen.htm

Champney`s Pink Cluster, Champney`s Rose, Champneyana, Champney (USA) 1811 Noisette, Alte Rose Kletterose (auch in Bäume) rosa einmalblühend sehr stark duftend. Diese Rose begründete die "Noisetterosen".


Chaplin's Pink Cluster - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose


(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=1063


Chip graffiti (W3)

Nichtfunktionale Verzierungen auf Elektro-Chips werden auch als "Chip graffiti" bezeichnet.

(E2)(L1) http://www.wordspy.com/words/chipgraffiti.asp


Erstellt: 2010-04

Clay's Cluster - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose


(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=42037


Cloud Computing (W3)

"Cloud Computing" ("CC") ist die Bezeichnung für neue Angebote, bei denen IT-Ressourcen (Anwendungen, Rechnerleistung, Speicherplatz, Daten) dynamisch über das Internet bereitsgestellt werden und nach Verbrauch abgerechnet werden. In der Begriffswolke, die sich darum bildete findet man auch "Computing as a Sevice" ("CaaS"), "Infrastructure as a Sevice" ("IaaS"), "IT as a Service" ("ITaas"), "Platform as a Sevice" ("PaaS"), "Software as a Sevice" ("SaaS") und überhaupt "Everything as a Sevice" ("XaaS").

Wer genau den Begriff "Cloud Computing" geprägt hat, läßt sich anscheinend nicht mehr nachvollziehen. Als Vorläufer dürfte die Darstellung des Internets in Form einer "Wolke" angesehen werden. Die "Wolke" soll in beiden Fällen andeuten, dass die exakte Zuordnung (des Kommunikationsweges bzw. der Service-Erbringung) nicht möcglich oder nicht relevant ist.

(E?)(L?) http://www.bitkom.org/de/themen/36129_61111.aspx

Leitfaden Cloud Computing
Chancen für das Business im Fokus
Cloud Computing und die diesem Phänomen zugrunde liegenden Konzepte sind bisher in deutschen Unternehmen kaum bekannt. In der Überzeugung, dass sich mit Cloud Computing eine Revolution in der IT-Bereitstellung und –nutzung abzeichnet, will der BITKOM mit dem vorliegenden Leitfaden dazu beitragen, dass sich Unternehmen mit Cloud Computing auseinandersetzen und dessen Potenziale für ihr Business erkennen.
...
Der vorliegende Leitfaden umfasst 7 Kapitel. Entscheider finden im Kapitel 1 die wesentlichen Aussagen über die Relevanz von Cloud Computing für ihr Business. Das Kapitel 2 zeigt auf, welchen Einfluss Cloud Computing auf Wertschöpfungsketten ausübt. Im Kapitel 3 werden wesentliche Faktoren erörtert, die die Diffusionsgeschwindigkeit von Cloud Computing determinieren. Das Kapitel 4 ist juristischen Fragestellungen vorbehalten. Einsatzszenarien und –beispiele für Cloud Computing werden im Kapitel 5 erläutert, während das Kapitel 6 den Zusammenhang zwischen Cloud Computing und anderen Technologieentwicklungen beleuchtet. Den Leitfaden rundet eine Checkliste im Kapitel 7 ab.


(E?)(L?) http://www.bitkom.org/files/documents/BITKOM-Leitfaden-CloudComputing_Web.pdf

...
Cloud Computing ist eine Form der bedarfsgerechten und flexiblen Nutzung von ITLeistungen. Diese werden in Echtzeit als Service über das Internet bereitgestellt und nach Nutzung abgerechnet. Damit ermöglicht Cloud Computing den Nutzern eine Umverteilung von Investitions- zu Betriebsaufwand.
...


(E?)(L?) http://www.cio.de/news/cio_worldnews/2228661/

...
"Cloudonomics". This is a neologism coined by Joe Weinman meaning the "economics of cloud computing".
...


(E?)(L?) http://www.damangmedia.com/cloud-computing/

...
While it’s unclear who coined the term "cloud computing", it would seem Google CEO, Eric Schmidt first started throwing it around in the summer of 2006, the same month Amazon's EC2 platform was released. By the time Nicholas Carr published his best seller, “The Big Switch? in January of 2008 the term "cloud computing" has been used to describe anything computational and not running on-site.
...


(E?)(L?) http://communication.howstuffworks.com/cloud-computing.htm
How Cloud Computing Works

(E?)(L?) http://www.itchannelplanet.com/commentary/article.php/3765876/

...
The phrase "cloud computing" originates in a common symbol - a cartoonish cloud outline - used in network diagrams to represent processes that are either too complex to describe, or systems managed by others. It represents a "black box" in which things happen beyond our understanding or control.
...


(E?)(L?) http://www.johnmwillis.com/cloud-computing/who-coined-the-phrase-cloud-computing/

...
In doing my research for the guide, I think I have found the first public usage of the term "Cloud" as a metaphor for the "internet" in a paper published by MIT in 1996.
...


(E?)(L?) http://www.languagemonitor.com/?s=Cloud+Computing
999,996: "Cloud Computing" - The ‘cloud’ has been technical jargon for the Internet for many years. It is now passing into more general usage.

(E?)(L?) http://www.languagemonitor.com/news/top-words-of-2009
6. Cloud Computing - Using the Internet for a variety of computer services

(E?)(L?) http://cloudcomputing.sys-con.com/node/795054

...
"As for the origin of the term “cloud computing”, there are a few possibilities… ...


(E?)(L?) http://www.reuters.com/article/idUSTRE63M3BN20100423

Alastair Goldfisher
Fri Apr 23, 2010
...
In the more than three years since the term "cloud computing" was coined at the first Cloud Expo, venture capitalists have backed a range of companies that have developed virtualized computing resources to deliver software and information on-demand.
...


(E?)(L?) http://itknowledgeexchange.techtarget.com/overheard/overheard-the-new-vocabulary-of-cloud-computing-glossary/

cloud app | cloud arcs | cloud bridge | cloudcenter | cloud client | cloud enabler | cloud envy | cloud OS | cloud portability | cloud provider | cloud service architecture (CSA) | cloud storage | cloudburst | cloud as a service (CaaS) | cloud-oriented architecture (COA) | cloudsourcing | cloudstorm | cloudware | cloudwashing | external cloud | funnel cloud | hybrid cloud | internal cloud | personal cloud | private cloud | public cloud | roaming workloads | vertical cloud | virtual private cloud (VPC)


(E?)(L?) http://gevaperry.typepad.com/main/2008/08/new-cloud-compu.html
(E?)(L?) http://www.webopedia.com/TERM/c/cloud_computing.html

...
The standards for connecting the computer systems and the software needed to make cloud computing work are not fully defined at present time, leaving many companies to define their own cloud computing technologies. Systems offered by companies, like IBM's "Blue Cloud" technologies for example, are based on open standards and open source software which link together computers that are used to to deliver Web 2.0 capabilities like mash-ups or mobile commerce.
...


(E?)(L?) http://www.webopedia.com/DidYouKnow/Internet/2008/terms_to_know_2009.asp
(E?)(L?) http://www.webopedia.com/quick_ref/cloud_computing.asp

A Cloud Computing Dictionary Resource
A look at cloud computing, cloud terminology, cloud technologies, private versus public clouds, cloud computing vendors and fun cloud computing quotes.


(E?)(L?) http://en.wikipedia.org/wiki/Cloud_computing

...
The actual term "cloud" borrows from telephony in that telecommunications companies, who until the 1990s primarily offered dedicated point-to-point data circuits, began offering "Virtual Private Network" ("VPN") services with comparable quality of service but at a much lower cost. By switching traffic to balance utilization as they saw fit they were able to utilise their overall network bandwidth more effectively. The "cloud symbol" was used to denote the demarcation point between that which was the responsibility of the provider from that of the user. "Cloud computing" extends this boundary to cover servers as well as the network infrastructure.
...


(E?)(L?) http://www.zehn.de/die-10-groeszten-vorteile-des-cloud-computing-7241-0

Die 10 größten Vorteile des Cloud Computing
Von Jodok Batlogg am 09.12.2008
Cloud Computing ist die Zukunft des Internet. Warum? Weil es flexibel, sicher und cool ist
So wie am Ende des 19. Jahrhunderts Unternehmen ihre eigenen lokalen Stromgeneratoren zugunsten einer weitaus effizienteren ausgelagerten Stromproduktion aufgaben, werden Rechenleistungen in Zukunft nicht mehr vor Ort sondern in einer weltweit vernetzten Computer-Wolke erbracht werden.
Dafür gibt es gute Gründe.
Die zehn besten davon sind hier zusammengefasst.
...


Erstellt: 2010-05

cluster
Kloss
clod
clot
cleat
kloot
Klotz
glautós
gluda
*kludda
*gel- (W2)

Am 25.03.2005 schrieb René Bastian:


Bonjour, ich suche die Etymologie des Wortes "cluster" und bin auf Ihre Webseite gekommen, wo das Wort mit einem "?" gekennzeichnet ist. Das Wort ist in der Musik bekannt ("Tontraube", "grappe de sons"). In meinen lateinischen und griechischen Lexika: kein Resultat, (denn "klyster" hat wahrscheinlich nichts mit "cluster" zu tun)


Der Sprach-Brockhaus (1966) kennt: "die Kluster", Mundart, niederdeutsch : "Gruppe", "Traube".

Matthias Lexers "Mittehochdeutsches Taschenwterbuch" bringt leider nichts.

http://infos.aus-germanien.de/Cluster - in Unkenntnis der deutschen Sprache kommt das wort aus dem Englischen!

Googeln mit "kluster mundart" bringt schon einiges, aber alles daneben, denn Kluster ist nicht Kloster auf kölsch.

Mit dem, auch im Deutschen anzutreffenden, engl. "Cluster" werden in der Informationstechnik zum Beispiel "Gruppen von Terminals oder Rechnern" bezeichnet. Ganz allgemein können Gerätegruppen oder auch Gruppen von Datensätzen als "Cluster" bezeichnet werden.

In der Botanik oder Astronomie bezeichnet man mit "cluster" "Büschel", "(Sternen-)Haufen", "Menge", "Gruppe", "(Trauben- oder Bananen-)Bündel", (Atom-)Cluster usw.

Eine wirklich verbindliche Aussage zur Herkunft des engl. "cluster" habe ich nicht finden können. Es gibt jedoch vage Hinweise, dass es sich vielleicht um ein (lautmalerisches (?)) Wort handelt, das zur Familie der "Klösse" gehört.

Demnach könnte es zusammenhängen mit engl. "clod", "clot" = "(Erd-)Klumpen", engl. "cleat" = "Keil", "Scholle", niederl. "kloot" = "Ball", dt. "Kloß", ahd. "klo" = "Klumpen", "Knäuel", "Kugel", dt. "Klotz", mhd. "kloz" = "Klumpen", "Kugel" "Baumstumpf", griech. "glautós" = "Hinterbacken", russ. "gluda" = "Klumpen", "Kloß".

Falls dies zutrifft, geht es zurück auf ein germ. "*kludda", und weiter auf ide. "*g(e)leu", "*gel-" = "rund machen" = "to make round" (also: "zu einem "Klumpen" formen").

(E?)(L1) http://www.3sat.de/nano/
Clusterforschung

(E?)(L?) http://infos.aus-germanien.de/Cluster
(E2)(L1) http://www.beyars.com/lexikon/lexikon_c_1.html
Cluster-Ring

(E?)(L?) http://clusty.com/
(E6)(L2) http://www.computerhilfen.de/lexikon.php
Bad Cluster | Cluster

(E?)(L?) http://davesgarden.com/guides/terms/go/182/

To gather or grow into bunches.
A group of the same or similar elements gathered or occurring closely together; a bunch.


(E?)(L?) http://www.etymonline.com/index.php?l=c&p=16
(E?)(L1) http://www.ib.hu-berlin.de/%7Ewumsta/infopub/semiothes/lexicon/default/
Clusteranalyse

(E6)(L?) http://www-306.ibm.com/ibm/terminology/
base cluster | cluster | cluster configuration | Cluster feature | cluster formation | cluster joining | cluster membership list | cluster node | cluster queue | cluster queue manager | cluster resource | cluster resource group (CRG) | cluster resource group manager (CRGM) | cluster resource service | cluster service | cluster transmission queue | clustering | ClusterProven | cluster-receiver channel (CLUSRCVR) | cluster-sender channel (CLUSSDR) | device cluster resource group | High-Availability Cluster Multiprocessing for AIX (HACMP for AIX) | Microsoft Cluster Server (MSCS)

(E?)(L?) http://www.isaca.org/Pages/Glossary.aspx

Cluster controller


(E?)(L1) http://www.iwebtool.com/computer_glossary/
(E?)(L1) http://www.lookingatbuildings.org.uk/
Cluster block

(E?)(L?) http://technet.microsoft.com/de-de/library/cc772390(WS.10).aspx
(E6)(L?) http://www.musicplasma.com/
musikalische Beziehungen in Clustern

(E?)(L?) http://www.musiklehre.at/fachwortlexikon/a.htm
cluster

(E6)(L1) http://antwrp.gsfc.nasa.gov/apod/astropix.html
Globular Clusters - Open Clusters - Clusters of Galaxies

(E3)(L1) http://www.jargon.net/jargonfile/
clustergeeking

(E6)(L1) http://www.ngcic.org/
Clusters of Stars

(E?)(L?) http://www.searchenginedictionary.com/
Clustering

(E?)(L?) http://www.seds.org/~spider/ngc/ngc.html
Clusters of Stars

(E6)(L?) http://www.teachsam.de/deutsch/glossar_deu_w.htm
Clustering

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpA,00.html

application clustering | cluster | cluster computing | cluster panic | clustering | Exchange performance and clusters: SearchExchange.com Chapter Download | hardware clustering | Linux clusters: Learning Guide | operating system clustering | Real Application Cluster | software clustering | Windows clustering


(E?)(L?) http://www.theninemuses.net/hp/list.html
Cockroach Cluster

(E?)(L1) http://www.transtec.de/D/D/compendium/
(E?)(L?) http://linguistik.uni-erfurt.de:8080/lido/Lido consonant cluster | phoneme cluster

(E3)(L1) http://www.webopedia.com/totd.asp
cluster | lost cluster

(E?)(L?) http://wetter.rtl.de/
CLUSTER

(E?)(L1) http://www.wetteronline.de/lexikon/
Cloudcluster

(E6)(L1) http://mathworld.wolfram.com/letters/B.html
b-Cluster

(E6)(L1) http://mathworld.wolfram.com/letters/C.html
Cluster | Cluster Analysis | Cluster Perimeter | Cluster Prime

(E6)(L1) http://mathworld.wolfram.com/letters/F.html
FindClusters

(E6)(L1) http://mathworld.wolfram.com/K-MeansClusteringAlgorithm.html
K-Means Clustering Algorithm

(E6)(L1) http://mathworld.wolfram.com/letters/M.html
Mean Cluster Density | Mean Cluster Count Per Si...

(E6)(L1) http://mathworld.wolfram.com/letters/N.html
N-Cluster

(E6)(L1) http://mathworld.wolfram.com/letters/P.html
Prime Cluster

(E6)(L1) http://mathworld.wolfram.com/letters/S.html
s-Cluster

(E6)(L1) http://mathworld.wolfram.com/letters/T.html
Twin Prime Cluster

(E?)(L1) http://www.wordspot.com/electricsymbols.html

Clusters


(E1)(L?) http://www.wordspy.com/
Beowulf cluster - disease cluster - fast-food cluster

Cluster maiden's blush rose - Rosa alba - Rose

(E?)(L?) http://digitalgallery.nypl.org/nypldigital/dgkeysearchresult.cfm?keyword=Rosa+alba
(E?)(L?) http://digitalgallery.nypl.org/nypldigital/dgkeysearchresult.cfm?keyword=Cluster+maiden%27s+blush+rose

Rosa alba = Cluster maiden's blush rose.


(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose


Cluster Rose

Als engl. "Cluster Rose" bezeichnet man allgemein Rosen mit mehreren Blüten an einem Stil. Insbesondere bezeichnet es "Floribunda"-Rosen (Kreuzungen der Polyantharosen mit Teehybriden mit großen, edelrosenähnlichen Blüten).

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=21090


(E?)(L?) http://plants.usda.gov/java/nameSearch?keywordquery=rose&mode=comname&submit.x=14&submit.y=6

ROPI2 - Rosa pisocarpa A. Gray - cluster rose


Clustered Hermosa-type China/B - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=18625


Cluster-Flowered

Als engl. "Cluster-flowered" bezeichnet man allgemein Rosen mit mehreren Blüten an einem Stil. Insbesondere bezeichnet es "Floribunda"-Rosen (Kreuzungen der Polyantharosen mit Teehybriden mit großen, edelrosenähnlichen Blüten).

(E3)(L1) http://davesgarden.com/guides/terms/go/3416/

cluster-flowered rose


(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose


(E?)(L?) http://www.rosefile.com/RosePages/DevilsDiction.html
(E6)(L1) http://www.rosefile.com/RosePages/Galleries.html

...
"Cluster-Flowered" - In the classic Hybrid Tea form, a cane terminates in a single, large, perfectly formed flower. In contrast to this, Floribundas branch near the end of each cane and flowers are produced at the end of each branch in a cluster.
...



"Cluster-Flowered" - A longer, fancier, and less suggestive name for Floribunda. (see also Floribunda)


Cluster-Flowered Climbers - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E6)(L1) http://www.rosefile.com/RosePages/Galleries.html


COBOL
Totgesagt leben länger (W2)

(E?)(L?) http://webopedia.com/TERM/C/COBOL.html
Nach "FORTRAN" ist "COBOL" die zweitälteste "höhere Programmiersprache". Sie wurde in den 1950er/1960er jahren entwickelt und wird schon seit vielen Jahren als untergehend eingestuft. Dennoch ist sie immer noch die am häufigsten benutze Programmiersprache der Welt.
Sie wir hauptsächlich auf Grossrechnersystemen für Geschäfts-Anwendungen eingesetzt. Dies war auch die Absicht der Entwickler, die sie "COmmon Business Oriented Language" nannten, abgekürzt "COBOL".

Computermaus (W3)

Die "Computermaus" wurde am 10.12.1968 geboren.

(E?)(L?) http://www.computerwoche.de/knowledge_center/notebook_pc/1881191/

Was wären wir ohne Douglas C. Engelbart?
Die Computermaus feiert 40. Geburtstag
08.12.2008 um 11:20 Uhr
Kaum ein Computer-Benutzer könnte heute noch ohne sie auskommen. Eher würden manche wohl auf die Tastatur verzichten, um einen PC zu bedienen.

Vor genau 40 Jahren erblickte die erste Computermaus das Licht der Öffentlichkeit - lange bevor die ersten Personal Computer auf den Markt kamen. Am 9. Dezember 1968 demonstrierte der Computerpionier Douglas C. Engelbart erstmals seine Erfindung auf einer Konferenz in San Francisco. Außerhalb des anwesenden Fachpublikums stieß sie jedoch vorerst auf nur wenig Begeisterung. Und es sollte noch viele Jahre dauern, bis die Maus ihren weltweiten Siegeszug antreten konnte.
...


Coral Cluster - Rose

(E?)(L?) http://www.classicroses.co.uk/products/roses/
(E6)(L1) http://www.davidaustinroses.com/german/showrose.asp?showr=950
(E?)(L?) http://www.everyrose.com/everyrose/roses/browse.lasso

Coral Cluster op Orange Pink, Polyantha 1920


(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=1309


(E?)(L?) http://www.welt-der-rosen.de/duftrosen/duftrosen.htm

Coral Cluster Murrell (GB) 1920 Polyantha


cursory, cursor (W2)

(E?)(L?) http://www.owad.de/
= "something short", "brief" = "flüchtig", "rasch", "oberflächlich"
From lat. "cursorius" = "pertaining to running" from lat. "cursor" = "runner" from "currerre" = "to run". This root is found in many words borrowed from Latin, including "current", "corridor", "courier", "course", "corral" and Afrikaans "kraal" = "corral", "rural village". English "car" comes from Latin "carrus" = "wagon" of the same root, which also underlies "career", "charge", and "chariot", not to mention "carpenter" from lat. "carpentum" "a two-wheeled carriage".

D

Deadlock (W3)

Siehe auch unter "Maus friert ein".

Engl. "Deadlock" (wörtlich dt. "totes Schloß") kann übersetzt werden als dt. "ausweglose Situation in Verhandlungen", "Patt", "Pattsituation", "Sackgasse", "toter Punkt", "Verklemmung", "völliger Stillstand", und als Verb dt. "an einem toten Punkt anlangen", "blockieren", "in eine Sackgasse geraten", "sich festfahren", "steckenbleiben", "zum völligen Stillstand bringen".

Der erste Nachweis für "Deadlock" ("dead lock") findet sich im Jahr 1779 in dem Schauspiel "The Critic" von Richard Brinsley Sheridan (1751 - 1816) (der selbe Sheridan, der der englischen Sprache auch "Malapropism" hinzugefügt hat).

(E?)(L?) http://www.enotes.com/critic
(E?)(L?) http://www.gutenberg.org/ebooks/7108

Scarborough and the Critic von Richard Brinsley Sheridan


(E?)(L?) http://www.gutenberg.org/cache/epub/7108/pg7108.html

...
ACT III.
...
You see the ladies can't stab Whiskerandos — he durst not strike them, for fear of their uncles — the uncles durst not kill him, because of their nieces. — I have them all at a "dead lock"! — for every one of them is afraid to let go first. Sneer. Why, then they must stand there for ever! Puff. So they would, if I hadn't a very fine contrivance for't.
...


(E?)(L?) http://www.vocabulary.com/definition/deadlock
(E?)(L?) http://de.wikipedia.org/wiki/Richard_Brinsley_Sheridan
Im Strassenverkehr kann ein "Deadlock" entstehen, wenn sich zwei lange Autoschlangen gegenüberstehen, die beide jeweils nach links abbiegen möchten. Das Abbiegen nach links wird jedoch jeweils durch die andere Schlange blockiert.

                      |   |
                      |   |
                      |   |
______________________     ____________________________________
               aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
              a          b
bbbbbbbbbbbbbbbbbbbbbbbbb
_____________   ______________________________________________
            |   |
            |   |
            |   |
            |   |


Ein "Deadlock" in der Datenverarbeitung kann entstehen, wenn ein Prozess die Ressource A benutzt und zusätzlich auf die Ressource B wartet, während ein anderer Prozess die Ressource B benutzt und zusätzlich auf die Ressource A wartet. Jeder der zwei Prozesse blockiert genau die Ressource auf die der andere Prozess zugreifen möchte. Und jeder Prozess gibt "seine" Ressource erst frei, wenn er seine Aufgabe abgearbeitet hat. Und so warten beide Prozesse bis zum Ausschalten der DV-Anlage.

In den Anfängen der Datenverarbeitung traten solche Situationen öfters auf. Heutige ausgereifte Betriebssyteme sollten jedoch Vorsorge treffen, dass es nicht zu einer solchen Situation kommen kann.

Diese Situation scheint sich auch in "Books Ngram Viewer" widerzuspiegeln. Um das Jahr 1985 erreichte das Auftreten des Begriffs "Deadlock" einen Höhepunkt.

Und obwohl man es also nicht meinen sollte, treten Deadlock-Situationen auch heute noch in weltweit eingesetzten Betriebssystemen auf.

Nachdem ich mir einen neuen PC mit WINDOWS 7 64bit-Version gekauft hatte, hatte ich das Problem, dass alle paar Tage Maus und Tastatur einfroren und nur noch das Aus- und Einschalten des PCs ein Weiterarbeiten ermöglichte. Leider mit der unschönen Begleiterscheinung, dass nicht gespeicherte Daten verschwunden waren.

Ich verbrachte Tage, Wochen und Monate um bei Medion und Microsoft nach der Fehlerursache zu suchen - leider jedoch ohne wirklich brauchbare Hilfe.

Ich habe die Protokollierung meiner Suche inzwischen gelöscht um die Leser nicht zu ermüden. Aber es waren Monate, in denen ich mich immer wieder geärgert habe. Und es war nicht einmal nachzuvollziehen, wem ich diesen Ärger zu verdanken habe. Der Hardware-Lieferant verwies auf die Software und umgekehrt.

Die Hersteller scheinen es nicht als notwendig anzusehen, ihre Kunden über Probleme zu informieren. - Allein die Information und die Mitteilung, dass an einer Lösung gearbeitet wird, würde einen Großteil des aufgestauten Ärgers reduzieren.

(E?)(L?) http://www.catb.org/jargon/html/go01.html


Den ersten brauchbaren (und auch erklärenden) Hinweis fand ich dann in dem Newsletter "Windows 7 Secrets" vom 15.08.2011 von "www.computerwissen.de", Manfred Kratzl:

(E?)(L?) http://www.computerwissen.de/

Microsoft-Update gegen Abstürze bei hoher Speicherauslastung

Unter Windows 7 kann es bei Anwendungen mit hoher Speicherauslastung zu plötzlichen Abstürzen kommen. Das System friert dann an, Maus und Tastatur zeigen keine Reaktion, und Sie können den PC nur durch Aus- und Einschalten wieder reaktivieren.

Nach Angaben von Microsoft tritt das Problem normalerweise dann auf, wenn der Speicher-Manager sehr viele Aktionen beim Schreiben und Löschen im Arbeitsspeicher durchführen muss. Ursache des Problems ist eine sogenannte "Deadlock Situation" in der Datei "fltmgr.sys", dem Filesystem Filter Manager von Windows 7.

Mit dem Hotfix KB2575077 können Sie das Problem lösen. Es wird später Teil des Windows 7 Service Pack 2 sein. Das Update wird in zwei Versionen ausgeliefert: "Windows6.1-KB2575077-x64.msu" für Windows 7 64 Bit und "Windows6.1-KB2575077-x86.msu" für Windows 7 in der 32 Bit-Version.


(E?)(L?) http://www.etymonline.com/index.php?term=deadlock


(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
deadlock | transaction deadlock

(E3)(L1) http://www.jargon.net/jargonfile/t/TheJargonLexicon.html
(E?)(L?) http://www.jargonf.org/


In dem maschinell übersetzten Artikel von Microsoft findet man weitere Hinweise. Demnach scheint es jedoch ratsam zu sein, auf den nächsten offiziellen Softwareupdate zu warten, da der Hotfix noch im Teststadium ist.

(E?)(L?) http://support.microsoft.com/kb/2575077

Artikel-ID: 2575077 - Geändert am: Mittwoch, 10. August 2011 - Version: 1.0
Computer reagiert nach dem Zufallsprinzip aufgrund von Deadlock-Situation in Windows Server 2008 R2 oder Windows 7
Hotfix-Download ist verfügbar
Hotfix-Downloads anzeigen und anfordern
...


(E?)(L?) http://www.oedilf.com/db/Lim.php?Word=deadlock
(E?)(L?) http://www.oedilf.com/db/Lim.php?Word=deadlocked
Limericks on deadlock | deadlocked

(E?)(L?) http://www.owad.de/owad-archive-quiz.php4?id=2687


Die "PC Welt" berichtete bereits am 12.08.2011 im Newsletter darüber, dass ein "Hotfix Absturz-Problem bei Windows 7 beseitigt".

(E?)(L?) http://www.pcwelt.de/news/Windows-Hotfix-Hohe-Speicherauslastung-fuehrt-zu-Abstuerzen-bei-Windows-7-und-Windows-Server-2008-3337484.html

...
Microsoft bestätigt Speicher-Hänger unter Windows 7 und Windows Server 2008 R2. Ursache des Problems ist eine sogenannte Deadlock-Situation. Diese wird verursacht, wenn der Arbeitsspeicher stark ausgelastet wird. Die Redmonder haben für den Fehler einen Hotfix zum Download bereit gestellt.
...


(E2)(L1) http://dictionary.reference.com/browse/deadlock
(E?)(L?) http://www.rfc-editor.org/rfc-index2.html
0202 Possible Deadlock in ICP S.M. Wolfe, J. Postel [ July 1971 ] ( TXT = 2796 bytes) (Status: UNKNOWN)

(E?)(L?) http://help.sap.com/saphelp_glossary/de/index.htm
(E?)(L?) http://www.sex-lexis.com/Sex-Dictionary/holy%20deadlock
holy deadlock

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpD,00.html
(E?)(L1) http://www.webopedia.com/TERM/D/deadlock.html


(E1)(L1) http://ngrams.googlelabs.com/graph?corpus=0&content=Deadlock
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

Engl. "Deadlock" taucht in der Literatur um das Jahr 1850 auf.

Erstellt: 2011-08

defenestration (W3)

(E?)(L?) http://www.catb.org/jargon/html/D/defenestration.html
Das engl. "defenestration" = "aus dem Fenster werfen" geht zurück auf lat. "fenestra" = "window" = "Fenster".

In Anspielung auf das Microsoft-Betriebssystem "WINDOWS" bezeichnet in "Hackerkreisen" "defenestration" das ersetzen von WINDOWS durch ein anderes Betriebssytem.

Allgemein kann es aber auch bedeuten, dass man den aktuellen Bildschirminhalt des PC's durch einen anderen Inhalt ersetzt.

DHCP (W3)

"DHCP" steht für "Dynamic Host Configuration Protocol".

(E3)(L1) http://www.besoindaide.com/ccm/internet/dhcp.htm
(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
(E?)(L1) http://www.iwebtool.com/what_is_dhcp.html
(E?)(L?) http://www.javvin.com/protocolDHCP.html
(E?)(L?) http://jargonf.org/wiki/Cat%C3%A9gorie:D
DHCP | DHCPv6

(E?)(L?) http://www.netlingo.com/inframes.cfm


(E6)(L?) http://www.tasklist.org/task_DHCP_1084.html
(E?)(L?) http://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213894,00.html
(E?)(L?) http://www.www-kurs.de/gloss_d.htm#DHCP


dingbats

(E?)(L?) http://www.dingbats.com/


DLL - Dynamic Link Library (W3)

"DLL" steht für "Dynamic Link Library".

(E?)(L?) http://webopedia.com/TERM/D/DLL.html
Ein Begriff aus der "Windows-Welt": a library of executable functions or data that can be used by a Windows application.
Die entsprechenden Files haben die Dateinamenerweiterungen .dll, .exe., drv, oder .fon.

DNS - Domain Name Server

(E?)(L?) http://computer.howstuffworks.com/dns.htm
DNS heisst im Internet nicht Desoxyribonukleinsäure sondern "Domain Name Server".
Die Domain Name Server haben im Internet die Aufgabe, eine für den Menschen einprägsame Internetadresse in eine Maschineninterpretierbare Adresse der Form xxx.xxx.xxx.xxx umzusetzen.

DOS, QDOS (W3)

Das Betriebssystem "DOS" = "Disk Operating System" basiert auf "QDOS" = "quick and dirty operating system".

(E?)(L?) http://www.tecchannel.de/server/hardware/466465/index8.html

...
Als IBM 1980 mit dem IBM-PC ziemlich verspätet in das Homecomputer-Geschäft einstieg, brauchten die Verantwortlichen möglichst rasch ein Betriebssystem - und wandten sich an Bill Gates' Firma. Mit einem eigenen System konnte Gates damals zwar nicht dienen, er wollte sich das Geschäft aber auch nicht entgehen lassen.

Kurz entschlossen schloss Microsoft einen Vertrag über 186.000 Dollar mit IBM ab und kaufte zwei Tage später für 50.000 Dollar von der Firma Seattle Computer die CP/M-Variante "QDOS" - ein Akronym für "quick and dirty operating system". In leicht modifizierter Form wurde das System dann unter der Bezeichnung MS-DOS an IBM ausgeliefert.


E

Easter Egg (W3)

Als engl. "Easter Egg" werden verborgene Funktionen in Programmen genannt, mit denen sich die Entwickler ein „Denkmal“ gesetzt haben. Alte Bekannte sind der "Flugsimulator" in Microsoft Excel oder "Space Invadors" in Word. Aber auch in zahlreichen aktuellen Programmversionen lassen sich "Easter Eggs" finden. Oft sind sie im Umfeld der Versions- und Copyright-Angaben verborgen, und meist muss man Insider-Kenntnisse haben, um sie zu finden - wie die „about:robots“-Seite in Firefox.

A secret message or screen buried in an application. Typically, easter eggs are used to display the credits for the development team or to display a humorous message. To see an easter egg, you need to know a special procedure or sequence of keystrokes.

Die Bezeichnung ist natürlich auf das Suchen der Ostereier zurück zu führen.

(E6)(L1) http://www.anthus.com/Colors/Colors_E.html
"Easter Egg Yellow" als Farbe: - #ffd35f - Easter Egg Yellow


(E1)(L1) http://www.bartleby.com/81/5588.html
(E3)(L1) http://www.besoindaide.com/ccm/glossaire/index.htm
(E?)(L?) http://www.catb.org/jargon/html/go01.html
Easter egg | Easter egging

(E?)(L?) http://www.dicofr.com/cgi-bin/n.pl/dicofr/firstchar/e
(E?)(L?) http://www.eeggs.com/

The Easter Egg Archive


(E?)(L?) http://www.hagalil.com/lexikon/index.php?title=Easter_Egg
(E?)(L?) http://www.howstuffworks.com/big.htm
How to Decorate Easter Eggs

(E3)(L1) http://www.jargon.net/jargonfile/t/TheJargonLexicon.html
Easter egg | Easter egging

(E?)(L?) http://www.mogelpower.de/easter/
Die meistgefragten Easter Eggs | Die besten Easter Eggs

(E?)(L?) http://www.netlingo.com/inframes.cfm
(E?)(L?) http://dictionary.reference.com/
(E?)(L1) http://www.urbandictionary.com/define.php?term=Easter+egg
(E?)(L?) http://www.webopedia.com/TERM/e/easter_egg.html
(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpE,00.html


EJB (W3)

"EJB" steht für "Enterprise JavaBeans". Dabei handelt es sich um standardisierte Komponenten innerhalb eines Java-EE-Servers ("Java Enterprise Edition"). Sie vereinfachen die Entwicklung komplexer mehrschichtiger verteilter Softwaresysteme mittels Java. Mit Enterprise JavaBeans können wichtige Konzepte für Unternehmensanwendungen, z. B. Transaktions-, Namens- oder Sicherheitsdienste, umgesetzt werden, die für die Geschäftslogik einer Anwendung nötig sind.

Erstellt: 2010-08

Eliza

(E?)(L?) http://www.uwec.edu/jerzdg/orr/articles/IF/canon/Eliza.htm
(E?)(L?) http://i5.nyu.edu/~mm64/x52.9265/january1966.html
ist ein Computerprogramm zur Untersuchung der "natürlichen Kommunikation zwischen Mensch und Maschine".
Entwickelt wurde "Eliza" von Joseph Wiezenbaum
Eliza (Weizenbaum 1966) is the first chatterbot -- a computer program that mimics human conversation. In only about 200 lines of computer code, Eliza models the behavior of a psychiatrist (or, more specifically, the "active listening" strategies of a touchy-feely 1960s Rogerian therapist).

encyberpedia

(E?)(L?) http://www.encyberpedia.com/


ENIAC (W3)

(E?)(L?) http://www.at-mix.de/eniac.htm
(E?)(L?) http://www.geschichte-des-computers.de/eniac.php
(E?)(L?) http://www.heise.de/tp/r4/artikel/2/2235/4.html
(E?)(L?) http://www.seas.upenn.edu/~museum/
(E?)(L?) http://de.wikipedia.org/wiki/ENIAC
Die Abkürzung "ENIAC" steht für "Electronic Numerical Integrator And Computer".
Manchmal findet man auch (fälschlicherweise) "Electronic Numerical Integrator And Calculator".

(E?)(L?) http://www.heise.de/ct/06/05/links/020.shtml
ENIAC Emulatoren

F

faqs
What is Usenet?

(E?)(L?) http://www.faqs.org/faqs/usenet/what-is/part1/


Fairy Cluster - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=39279


(E?)(L?) http://www.welt-der-rosen.de/duftrosen/duftrosen.htm

The Fairy, Fairy, Fairy Rose, Fairy Cluster, Bentall (GB) 1932 Polyantha
...
mit dieser Rose begann die Beliebtheit der Bodendeckerrosen.
...


foldoc
Free Online-Dictionary of Computing

(E?)(L1) http://www.foldoc.org/

Free On-line Dictionary of Computing (started in 1985) is a searchable dictionary of acronyms, jargon, programming languages, tools, architecture, operating systems, networking, theory, conventions, standards, mathematics, telecoms, electronics, institutions, companies, projects, products, history, in fact anything to do with computing.
This dictionary is Copyright Denis Howe 1993 - 1999.


mit über 100.000 Einträgen rund um die Computerei.
Suche nach einzelnen Wörtern und nach Phrasen;

(E?)(L1) http://www.hyperdictionary.com/computer
The Computer Dictionary is based on the FOLDOC dictionary by Denis Howe. It consists of almost 14 thousand computer-related terms. To use the dictionary, you may search using the search box or you may browse the word listings by letter of the alphabet.

FOO, BAR, FOOBAR
Was sind FOO und BAR? (W3)

Ist das seit 1930 nachweisbare "FOOBAR" nun einfach nur ein Platzhalter beim Programmieren? Oder heisst es eigentlich "FUBAR" = "Fucked Up Beyond All Repair" = "irreparabel"? Oder ist es ein auf dt. "furchtbar" zurückgehender Germanismus.

(E?)(L?) http://www.pcwelt.de/know-how/tipps_tricks/software/107409/
(E?)(L?) http://www.faqs.org/rfcs/rfc3092.html
(E?)(L?) http://forum.leo.org/archiv/f.html
(E?)(L?) http://www.smokey-stover.com/
(E?)(L?) http://de.wikipedia.org/wiki/Metasyntaktische_Variable


Fork (W3)

Engl. "Fork" = dt. "Gabel", "Gabelung" kommt auch - mit einer neuen Bedeutung - im Open Source Umfeld vor.

Die dt. "Forke", ("Heuforke", "Mistforke") - und damit auch engl. "fork" - geht zurück auf lat. "furca" = dt. "zweizinkige Gabel".

(E?)(L?) http://www.computerwissen.de/freeware-open-source/open-source-news/artikel/was-ist-eigentlich-ein-fork.html

...
Dabei komm es hin und wieder vor, dass mehrere Mitglieder einer Open Source Community mit der Projektleitung unzufrieden sind. Oft hat das mit wirtschaftlichen Entscheidungen zu tun, manchmal auch mit technischen.

Wenn die Unzufriedenen es nicht schaffen, einen tragfähigen Kompromiss mit der Leitung zu erreichen, kopieren sie den Quelltext auf einen neuen Server und arbeiten auf eigene Faust damit weiter. Diese Abzweigung nennt man "Fork" (englisch: Gabelung). Die Open-Source-Lizenzen erlauben das ausdrücklich.
...


(E1)(L1) http://ngrams.googlelabs.com/graph?corpus=8&content=Fork
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

Engl. "Fork" taucht in der Literatur um das Jahr 1760 / 1820 auf.

Erstellt: 2013-09

G

GammaTray.exe (W3)

(E?)(L?) http://www.processlibrary.com/directory/files/gammatray/
Leider konnte ich nicht herausfinden, wieso der 3. Buchstabe des griechischen Alphabets hier verwendet wird.

Geek, geeky, geekiness (W3)

Das umgangssprachliche engl. "Geek" (1500) = "Computerspezialist", "Narr", "Dummkopf" ist mit dt. "Geck" und ndl. "gek" = "verrückt" verwandt. Entstanden sein soll es als lautmalerische Wort für "unverständlich Gesprochenes".

Abgeleitet vom Subst. "Geek" findet man das Adj. "geeky", also dt. "geckisch".
Auch "geekiness", dt. "Geckigkeit", findet man als abgeleitete Variante.

(E1)(L1) http://www.etymonline.com/index.php?term=geek
(E?)(L?) http://www.innergeek.us/deutsch
Wer 65 Prozent der Punkte erzielt kann sich zu den Geeks zählen, über 65 Prozent wird es kritisch.

Erstellt: 2010-02

(E?)(L?) http://www.innergeek.us/definition.html

What is a geek? (a subjective work in progress)
n. Slang ...


(E1)(L1) http://www.owad.de/owad-archive-quiz.php4?id=1871
(E1)(L1) http://www.takeourword.com/Issue051.html
(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpG,00.html
geek | geek speak | geekosphere | geekspeak

(E?)(L?) http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci212179,00.html
(E?)(L?) http://en.wikipedia.org/wiki/Geek

...
A person who is interested in technology, especially computing and new media. Geeks are adept with computers, and use the term hacker in a positive way, though not all are hackers themselves.
...
(E?)(L?) http://en.wiktionary.org/wiki/Geek

Etymology
From British dialect "geck" ("fool"); compare Dutch "gek" ("crazy") or "gekkie" ("crazy person").
...


(E1)(L1) http://www.word-detective.com/back-g.html#geek
(E1)(L1) http://www.wordorigins.org/index.php/site/geek/


GIGO (W3)

"GIGO" ist die Abkürzung für "Garabge in, garbage out".

(E?)(L1) http://www.iwebtool.com/computer_glossary/
(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpG,00.html
(E?)(L?) http://www.webopedia.com/TERM/g/garbage_in_garbage_out.html

"Garabge in, garbage out", often abbreviated as "GIGO", this is a famous computer axiom meaning that if invalid data is entered into a system, the resulting output will also be invalid. Although originally applied to computer software, the axiom holds true for all systems, including, for example, decision-making systems.


gopher (W3)

(E?)(L?) http://www.webopedia.com/totd.asp
A system that pre-dates the World Wide Web for organizing and displaying files on Internet servers. A Gopher server presents its contents as a hierarchically structured list of files. With the ascendance of the Web, many gopher databases were converted to Web sites which can be more easily accessed via Web search engines.
"Gopher" was developed at the University of Minnesota and named after the school's mascot. Two systems, Veronica and Jughead, let you search global indices of resources stored in Gopher systems.

H

Hacker
hack
hacken
Cracker (W3)

Die Bezeichnung engl. "Hacker" entstand um 1961 im Massachusetts Institute of Technology ("MIT"). Dort und an anderen Universitäten standen die ersten Computer. In deren Umfeld entstand ein neuer "Computer-Slang", der bis heute eine große Anzahl von Neologismen hervorbrachte und weiter hervorbringen wird.

Das Hackertum nahm seinen Ausgang am MIT. Dort gab es in den 1960er und 1950er Jahren den "Tech Model Railroad Club (TMRC)". Dieser Club betrieb eine gigantische Eisenbahnanlage. Innerhalb des Clubs gab es eine "S&P (Signaling and Power)" Abteilung, denen der ganze Eisenbahnkram wohl eher unwichtig war und die sich stattdessen mit dem Bau unglaublich komplexer Steuersystame für die riesige Eisenbahnanlage befaßten. Hier entstand der Begriff "Hack" für einen technischen Kniff und eine ganze Reihe anderer Begriffe, die die Basis des Hackerslangs wurden.

Ein anderer Hiweis geht noch etwas weiter zurück und führt "Hacker" zurück auf "jemand der Möbel mit der Axt herstellt".

Die Bezeichnung "hack" könnte dabei durchaus wörtlich zu nehmen sein. Die ersten Hacker mußten noch hardware-nah operieren und brachen dabei sicherlich auch das ein oder andere gerät gewaltsam auf. Die Bezeichnung soll auch schon etwas früher bei Radio-Bastlern aufgetaucht sein.

Mittlerweile ist der "Hacker" schon in die Jahre gekommen. Seine sich diversifizierenden Nachfolger heißen "Cracker", "Script-Kiddie", "Neophyte", "Elite Hacker", "Hacktivist".

Das engl. "hack" (mengl. "hakken", altengl. "haccian") und das dt. "hacken" sind Verbformen zum "Haken" und bedeuten eigentlich "mit einem Haken, hakenförmigen Gerät arbeiten". Und da die Finger beim Klimpern auf der Computer-Tastatur eine Hakenförmige Gestalt annehmen, lag die englische Slangbildung "to hack" nahe.

Der dt. "Hacker" ist z.B. ein "Arbeiter, der den Boden im Weinberg aufhackt".

(E?)(L?) http://www.catb.org/jargon/html/go01.html

dark-side hacker | hacker | hacker ethic | hacker humor | Hackers (the movie) | J. Random Hacker | true-hacker


(E?)(L?) http://www.ccc.de/hackerethics
(E?)(L?) http://koeln.ccc.de/artikel/buecher/levy-hackers.html
Eine Buchbesprechung von Steven Levys Buch "Hackers: Heroes of the Computer Revolution" (1984) und gleichzeitig eine kleine Etymologie des Wortes "Hacker".

(E?)(L?) http://www.hackerwatch.org/
Datensammlung über Hacker-Angriffe.

(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
(E?)(L?) http://www.isaca.org/Pages/Glossary.aspx
(E?)(L1) http://www.iwebtool.com/computer_glossary/
(E?)(L?) http://www.learnthenet.com/glossary/


(E?)(L?) http://news.netcraft.com/fullindex/




(E6)(L?) http://www.phrack.org/
Hacker magazine

(E?)(L?) http://www.schneier.com/crypto-gram-0609.html#12
In dem Artikel "What is a Hacker?" des Security-Experten Bruce Schneier findet man such:


...
"Hackers are as old as curiosity, although the term itself is modern. Galileo was a hacker. Mme. Curie was one, too. Aristotle wasn't. (Aristotle had some theoretical proof that women had fewer teeth than men. A hacker would have simply counted his wife's teeth. A good hacker would have counted his wife's teeth without her knowing about it, while she was asleep. A good bad hacker might remove some of them, just to prove a point.)
...


(E1)(L1) http://www.takeourword.com/Issue090.html

Issue 90: Letters to the Editors: hacking the etymology of hacker


(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpE,00.html

ethical hacker | ethical hacking


(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpH,00.html
(E?)(L?) http://www.u32.de/hacker.html

In der Presse und der Öffentlichkeit werden Kriminelle, die per Rechner und Netzen andere schädigen, oftmals als "Hacker" bezeichnet. Das ist aber eine völlig falsche Bezeichnung. Die korrekte Bezeichnung für solche Verbrecher ist "Cracker".
...


(E?)(L?) http://learningenglish.voanews.com/archive/learningenglish-programs-radio-words-stories/latest/978/987.html




(E?)(L?) http://www.webopedia.com/TERM/H/hacker.html
(E?)(L?) http://www.webopedia.com/DidYouKnow/_index.asp

Are Cable Internet Connections Vulnerable to Hackers?


(E?)(L?) http://www.wordorigins.org/index.php/big_list/
(E1)(L1) http://www.wordsmith.org/words/hacker.html

...
[Originally, someone who makes furniture with an axe.]
...


(E1)(L1) http://www.wordsmith.org/awad/archives/0900


(E1)(L1) http://ngrams.googlelabs.com/graph?corpus=0&content=Hacker
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

Engl. "Hacker" taucht in der Literatur um das Jahr 1660 auf.

(E?)(L?) http://corpora.informatik.uni-leipzig.de/


Erstellt: 2013-02

Ham (W3)

Das englische Wort für "Schinken" verspricht, gegenüber dem zerkleinerten und gekochten Dosenfleisch Spam, der "wahre Jakob" zu sein und dient daher gelegentlich im Hacker- oder Computer-Jargon als Begriff für "erwünschte E-Mails".

Hardware (W3)

(E?)(L?) http://www.webopedia.com/TERM/H/hardware.html


Harley Hahn's guide to MUDs

(E?)(L?) http://www.harley.com/muds/


Haynesville Pink Cluster - Rose

(E?)(L?) http://www.everyrose.com/everyrose/roses/browse.lasso

Haynesville Pink Cluster pb Pink blend, Noisette (OGR)


(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=3205


Hello World (W3)

Wann es zum "Standard" wurde, den Anfängererfolg beim Erlernen einer Programmiersprache mit der Bildschirmausgabe dt. "Hallo Welt", engl. "Hello World" zu demonstrieren ist nicht mehr exakt nachweisbar.


Das erste Programm, das zu Demozwecken (z.B. in einer neuen Programmiersprache) geschrieben wird, gibt traditionell die Meldung "Hello World!" aus. Als Name für Variablen oder sonstige Namen in Demoprogrammen nehmen die Informatiker immer "foo" und "bar" (Ausnahme: Python-Programmierer sagen "spam" und "eggs", weil auch der Name der Programmiersprache von "Monty Python" abstammt), und bei Kryptologen heißen die beiden Gesprächspartner immer Alice und Bob.


(E?)(L?) http://www.catb.org/jargon/html/H/hello-world.html
(E?)(L?) http://gizmodo.com/5076017/phoenix-mars-lander-looks-back-on-its-re+birth

Hello World, Phoenix Lander Here


(E?)(L?) http://jargonf.org/wiki/hello_world

hello world


(E3)(L1) http://www.jargon.net/jargonfile/h/helloworld.html


(E?)(L?) http://www2.latech.edu/~acm/helloworld/

Index of /~acm/helloworld

| Parent Directory | 4d.html | 4dos.html | Back.gif | CAVisualObjects.html | CORC.html | Ccgi.html | Ccgi.html.bak | Cshell.html | DProgram.html | Filenet.html | Front.gif | HTML.html | HW1.GIF | HW2.GIF | HelloWorld.shtml | IBM1401.html | IDL.html | ISETL.html | Intercal.html | LUAProgram.html | LaTeX.html | MOS6510.html | MUF.html | MUMPS.html | NewNames.txt | PHP.html | PeopleCode.html | REXX.html | Rebol.html | SAS.html | SLIQ.html | TACL.html | TAL.html | TclTk.html | TeX.html | ThinBasic.html | UserLand.html | VHDL.html | WindowsBatchFile.html | Xip.html | abc.html | action.html | ada.html | algol.html | alpha4.html | amigae.html | aml.html | ample.html | apl.html | aplus.html | applescript.html | arexx.html | asm.html | asm370.html | asm68000.html | asmAtari.html | awk.html | bash.html | basic.html | bc.html | befunge.html | blitz.html | blue.html | brainfck.html | c++.html | c++.html.bak | c.html | calc.html | caml.html | casio.html | cc++.html | cl.html | clipper.html | clips.html | clu.html | cobol.html | codeworks.html | conclean.html | cpl.html | cpm.html | csharp.htm | dataflex.html | dbase.html | dc1.html | dcalgol.html | delphi.html | dos.html | dosdebug.html | dtacs.html | dylan.html | easytreive.html | eiffel.html | erlang.html | escape_html.pl | euphoria.html | exec.html | exec2.html | focus.html | forth.html | fortran.html | foxpro.html | futurebasic.html | gambas.html | haskell.html | hello.gif | helloWdetail.gif | hp48.html | hypertalk.html | icon.html | irc.html | j.html | java.html | javascript.html | jcl.html | ksh.html | lambdacore.html | lingo.html | lisp.html | logo.html | lpc.html | macos.html | makefile.html | malbolge.html | maple.html | mathematica.html | matlab.html | mheg5.html | miranda.html | miva.html | ml.html | modual2.html | motif.html | msql.html | multilang.html | mush.html | mvsjcl.html | mw.html | natural.html | naturalii.html | netclist.html | oberon.html | objectivec.html | ocl.html | omnimark.html | openvms.html | os2.html | paradox.html | parallaxis.html | pascal.html | pcl.html | perl.html | perltk.html | pilot.html | pl1.html | pop11.html | postscript.html | power.html | procomm.html | prograph.html | progress4gl.bak.html | progress4gl.html | prolog.html | prometheus.html | python.html | qbasic.html | rpf.html | rpg.html | ruby.htm | sal.html | sandsplus.html | sas.html | sather.html | scheme.html | scilab.html | scl.html | sed.html | self.html | sh.html | simula.html | smalltalk.html | snobol.html | sql.html | sr.html |submission_guidelines.html | svendsk.html | tcl.html | tcsh.html | terse.html | test.html | test.html.bak | test.test.bak | ti8185.html | ti82.html | ti8384.html | ti92.html | tinyfugue.html | tinymux.html | tinymux.htmo | tk.html | tsoclist.html | turing.html | uLPC.html | vdBASE.html | verilog.html | vi.html | visualbasic.html | visualc++.html | vms.html | vrml.html | win31api.html | winnt95.html | wp.html | xbase.html | z80.html | zsh.html


(E?)(L?) http://www.rawbw.com/~rem/HelloPlus/hellos.html

Index of Hello World! programs and beyond
...


(E?)(L1) http://whatis.techtarget.com/definition/Hello-World
(E?)(L?) http://vimeo.com/1553583

Hello World! or: How I Learned to Stop Listening and Love the Noise


(E?)(L?) http://www.youtube.com/watch?v=zX09WnGU6ZY

Lego Hello World




(E1)(L1) http://books.google.com/ngrams/graph?corpus=0&content=Hello World
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

Engl. "Hello World" taucht in der Literatur um das Jahr 1900 / 1980 auf.

Erstellt: 2012-10

Herbemont's Musk Cluster - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=23719


Hotkey (W3)

(E?)(L?) http://www.autohotkey.com/
(E?)(L?) http://www.autohotkey.com/docs/Hotkeys.htm
(E?)(L?) http://www.autohotkey.com/docs/KeyList.htm

"Hotkeys" are sometimes referred to as "shortcut keys" because of their ability to easily trigger an action (such as launching a program or keyboard macro).


Die "Hotkey" wird selten auch "Schnelltaste" genannt und bietet eine "schnelle", "heisse" Möglichkeit eine Funktion aufzurufen. Das Kopieren und Einfügen von Text kann z.B. statt dem etwas umständlichen Aufruf über das Menu durch die Tastenkombinationen "Strg" + "C" bzw. "Strg" + "V" durchgeführt werden.

HTML - Hypertext Markup Language (W3)

(E?)(L?) http://www.willcam.com/cmat/html/crossref.html
(E?)(L1) http://webopedia.internet.com/TERM/H/HTML.html
(E?)(L1) http://www.htmlgoodies.com/
Diese Sprache wird zur Erstellung von Webseiten (z.B. auch dieser Seite) in grossem Umfang weltweit verwendet.
Das Angebot "htmlgoodies" schliesst auch einen Newsletter ein, der über HTML informiert, Fragen von Benutzern beantwortet und dabei oft Codeschnipsel für bestimmte Funktionen bereitstellt, ergänzt durch News aus der Branche (englisch).

Hythe Cluster - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=34611


I

ibm
IBM’s 100 Icons of Progress

Die Firmengeschichte der IBM spiegelt auch die allgemeine Entwicklung der Datenverarbeitung wider.

(E?)(L?) http://www.ibm.com/ibm100/us/en/icons/

In the span of a century, IBM has evolved from a small business that made scales, time clocks and tabulating machines to a globally integrated enterprise with 400,000 employees and a strong vision for the future. The stories that have emerged throughout our history are complex tales of big risks, lessons learned and discoveries that have transformed the way we work and live. These 100 iconic moments - these Icons of Progress - demonstrate our faith in science, our pursuit of knowledge and our belief that together we can make the world work better.

Featured: September 20, 2011 A Business and Its Beliefs A Business and Its Beliefs
Corporate cultures usually flow from the CEO downward, but from the start C-T-R, and later IBM, took a different path. It intentionally built a culture that flows up from its people, centered on a set of shared beliefs about the company’s place in the world and how to act in achieving that. This has been the key to IBM’s vitality for over a century. In 2003, IBM CEO Sam Palmisano again turned to IBMers to help form the company’s values via a “ValuesJam,” an online, three-day event. The results were strikingly familiar—in keeping with those set by Thomas Watson Sr. in 1914.

Featured: September 16, 2011 Sustainable Cocoa Sustainable Cocoa
Recently, IBM completed the initial genomic sequence of cocoa—in conjunction with chocolate maker Mars, Incorporated, and the United States Department of Agriculture-Agricultural Research Service (USDA-ARS)—in hopes of developing new strains of heartier, higher-yielding and blight-resistant cocoa, not to mention better-tasting chocolate. The project marks a significant scientific milestone that is already starting to benefit farmers, particularly in West Africa where about 70 percent of the world’s cocoa crop is produced. It’s one example of how IBM is leveraging emerging technologies to allow more directed breeding of sustainable food resources.

Featured: September 14, 2011 Preserving the Legacy of Film Preserving the Legacy of Film
Due to disintegrating film stock, the world’s film history is evaporating. IBM is working to save cinematic history through a collaboration with University of California Los Angeles and The Film Foundation, digitizing historical film content and building an electronic archive. IBM is also partly responsible for the digital video in use on the Internet today, having worked in the early 1990s to develop encoding and decoding standards that made digital video possible.

Featured: September 13, 2011 Deep Blue Deep Blue
In the mid 1980s, two PhD students at Carnegie Mellon University, Murray Campbell and Feng-hsiung Hsu, set out to build a chess machine that could beat the best human player. IBM Research hired the two scientists and gave them the resources to build Deep Blue, a dedicated chess-playing supercomputer. In 1997, in a historic match, Deep Blue became the first computer to defeat a reigning world chess champion. “In brisk and brutal fashion,” The New York Times reported, “the I.B.M. computer Deep Blue unseated humanity, at least temporarily, as the finest chess playing entity on the planet.” After a noted absence, Deep Blue led the way for IBM’s return to the supercomputing business.

Featured: September 09, 2011 The Cell Broadband Engine The Cell Broadband Engine
Gaming is serious business. In 2000, Sony Group and Toshiba Corporation issued a challenge to provide power-efficient and cost-effective high-performance processing for a wide range of applications, including the most demanding consumer appliance: game systems. The result came five years later with the release of the Cell Broadband Engine multi-core technology, developed jointly by IBM, Sony Group and Toshiba Corporation. Today, besides the Sony PlayStation 3 computer entertainment system, the Cell Broadband Engine can be found in several Toshiba REGZA televisions, video production equipment from Sony, the IBM BladeCenter QS20, QS21 and QS22 servers, as well as IBM Roadrunner, one of the world’s most power-efficient supercomputers.

Featured: September 08, 2011 Exploring Undersea Frontiers Exploring Undersea Frontiers
In 1965, an IBM communications system was one of the only links connecting oceanauts in the world’s first ocean floor colony to a support team on the surface. The project, led by famous French sea explorer Jacques Cousteau, was a highlight of IBM’s involvement in undersea research, which included projects in underwater crime scene investigation and the microscopic analysis of compounds from 35,000 feet under the ocean surface.

Featured: September 07, 2011 The Preservation of Culture Through Technology
Through its computer technologies—starting with punched card data processing in the late 1940s through the creation of virtual worlds of today—IBM has helped bridge time and distance by preserving, recording and even re-creating ancient languages and cultures. IBM has undertaken cultural preservation projects with institutions in Russia, Spain, Indonesia, the United States, Italy, China and Egypt.

Featured: September 02, 2011 Racetrack Memory Racetrack Memory
The Future of Data Storage
IBM researcher Stuart Parkin pioneered the development of racetrack memory, starting in about 2004. Parkin conceived of a device consisting of a city of skyscrapers—each one only hundreds of atoms wide—of magnetic material, with each floor of each skyscraper containing a single bit of data. The technique utilizes the spin of electrons to manipulate these bits, in effect shooting them around a racetrack, up and down the column. Though it may take a few years before it can be commercialized, once completed, it could allow for the kind of mass storage that now requires a disk drive to fit on a thumbnail-size chip that barely uses any energy. A handheld device could hold a few thousand movies, run for weeks at a time on a single battery and be practically unbreakable.

Featured: August 30, 2011 Popularizing Math and Science Popularizing Math and Science
In the mid-twentieth century, IBM worked with Charles and Ray Eames to make films and design exhibitions that brought widespread popular appeal to math and science concepts. These included Mathematica, the interactive museum exhibit, and the film “Powers of Ten”, both of which remain culturally and historically significant today. IBM continues to promote math and science through programs such as TryScience, a website offering fun-oriented science content, and Transition to Teaching, which supports employees in encore careers as math and science teachers.

Featured: August 26, 2011 Pioneering Speech Recognition Pioneering Speech Recognition
At the Seattle World’s Fair in 1962, IBM showcased the world’s most advanced speech recognition system, the “Shoebox.” It could understand 16 words, including the numbers zero through nine as well as minus, plus, subtotal, total, false and off. Visitors to the IBM pavilion could speak to the Shoebox via microphone, often looking on in amazement as it printed answers to simple arithmetic. After the Shoebox breakthrough, the development of speech recognition accelerated, aided by the exponential growth in computing power. The technology significantly increased computing access for people with vision, mobility and other impairments. Today, speech recognition is pervasive, and features a broad vocabulary and astonishing accuracy.

Featured: August 23, 2011 The Application of Spintronics The Application of Spintronics
IBM has been leading the research and application into an emerging technology called spintronics—short for “spin electronics”—which was coined in 1996 to describe devices that take advantage of “spin,” a quantum-mechanical property of an electron. The physics of spintronics allow for significantly increased data capacity and may enable the leap to quantum computing.

Featured: August 19, 2011 Nanotechnology Nanotechnology
Our everyday computing devices depend on breakthroughs in chip technology. As chips get smaller, they must also get smarter. IBM’s research in nanotechnology has led to innovations in not only chip technology, but healthcare as well, including sequencing the DNA strand at the nano level and developing a nanostructure that can fight the Methicillin-resistant Staphylococcus aureus (MRSA) infection.

Featured: August 16, 2011 The Professional Sales Force The Professional Sales Force
Thomas Watson Sr. believed a sales force could be a competitive advantage. Soon after taking charge of C-T-R in 1914, he established a dress code, no-drinking policy and the Hundred Percent Club to encourage employees to achieve 100 percent of their sales target. By the 1920s, he’d established a unique sales school in Endicott. Hiring only the best college graduates, IBM would put them through six weeks of intensive training. The IBM sales force became known worldwide for a new standard of professional service, and for cultivating client relationships founded on trust.

Featured: August 12, 2011 The Invention of Stream Computing The Invention of Stream Computing
In 2009, IBM announced the availability of its stream computing software, a breakthrough in real-time data analytics. Stream computing gathers multiple streams of data “on the fly,” using advanced algorithms to deliver nearly instantaneous analysis to decision makers. Flipping the traditional data analytics strategy in which data is collected in a database to be searched or queried for answers, stream computing can be used for complex, dynamic situations that require immediate decisions, such as predicting the spread of an epidemic or monitoring changes in the condition of premature babies.

Featured: August 09, 2011 Pioneering Genetic Privacy Pioneering Genetic Privacy
In October 2005, IBM became the first major corporation in the world to establish a genetics privacy policy that prohibits current or future employees’ genetic information from being used in employment decisions. “What I.B.M. is doing is significant because you have a big, leadership company that is saying to its workers, ‘We aren’t going to use genetic testing against you,’” said Arthur Caplan, director of the Center for Bioethics at the University of Pennsylvania medical school in an interview with The New York Times.

Featured: August 02, 2011 The Mobilization of Relief Efforts The Mobilization of Relief Efforts
The tragic series of devastating tsunamis in December of 2004 killed more than 230,000 people and left 1.5 million people homeless. Within hours, country by country, IBM was assembling resources for relief, including a customized database to help track victims and goods; a wireless system running a disaster management network—in addition to material goods, counseling and training. It is just one example of how IBM assists in crisis management, reconstruction and aid distribution, applying its expertise and resources to ease suffering and rebuild lives.

Featured: July 29, 2011 Relational Database Relational Database
Until the mid-1970s, computers sorted information using rigid, one-off database programs. IBM researcher E. F. “Ted” Codd wanted to improve the way data was sorted and handled. He sought to create a generalized description of how to store, update and extract data with accuracy, and query responses so any changes to data produced consistent results. In 1970, Codd completed his definition of the relational database which became the foundation for IBM DB2 products.

Featured: July 22, 2011 Copper Interconnects Copper Interconnects
The Evolution of Microprocessors
In 1997, IBM researchers surged ahead of a crowded field when they announced that manufacturing chips with copper interconnects would make microprocessors faster, smaller and less expensive than using aluminum. Copper wires conducted electricity with about 40 percent less resistance than aluminum, which resulted in an additional 15 percent burst in microprocessor speed. It was another breakthrough that created a new inflection point in the industry and positioned IBM as the global leader.

Featured: July 19, 2011 Innovating the Self-Service Kiosk Innovating the Self-Service Kiosk
IBM built upon magnetic stripe technology to continually expand its applications for self-service transactions, reaching a breakthrough in the IBM 2984, one of the earliest automated teller machines (ATMs). The self-service kiosk was activated by a magnetic-strip credit card and could be installed in the wall of a bank to dispense money day or night. Today, IBM is an industry leader in self-service kiosk innovation, enabling transactions in postal-service kiosks, airport check-in terminals, hotels, fitness centers, stores and other locations, as well as in banks.
Featured: July 15, 2011 The Invention of the Rewritable Magneto-Optical Disk The Invention of the Rewritable Magneto-Optical Disk In the early 1970s, IBM scientists were investigating metallic films that displayed unique magnetic characteristics. Watson Research Center scientists Praveen Chaudhari, Jerome J. Cuomo and Richard J. Gambino were examining the magnetic structure and electronic properties of these films when they discovered the special magnetic materials that made rewritable-optical-disk data storage possible. For their work, they received the 1995 US National Medal of Technology—the nation’s highest award for technical innovation.

Featured: July 13, 2011 Information-Based Medicine Information-Based Medicine
In 2006, IBM helped create EuResist, a project that would help doctors prescribe more effective, tailored drug “cocktails” to HIV patients, using a database of more than 33,000 previous treatment cases. Through healthcare innovations such as EuResist, the World Community Grid and the Watson computer, IBM is leading the world in using data analysis and information technology to build smarter systems to more effectively fight illnesses such as AIDS, HIV and cancer.

Featured: July 12, 2011 The Punched Card Tabulator The Punched Card Tabulator
In the late 1880s, Herman Hollerith, a young technical whiz at the US Census Bureau, had an idea for a machine that could count and sort census results far faster than human clerks. The bureau funded Hollerith’s work, and the first tabulating machines helped count the 1890 census, saving the bureau several years’ work and more than US$5 million. Hollerith left the bureau to form the Tabulating Machine Company, selling his system to other countries’ census offices and then to businesses such as railroads and retailers. Hollerith had little competition, and his machines and punched cards became the standard for the industry. In 1911, financier Charles Flint bought the Tabulating Machine Company and merged it with the International Time Recording Company and the Computing Scale Company of America to form the Computing-Tabulating-Recording Company, or C-T-R, later renamed IBM.

Featured: July 08, 2011 Medicine On Demand Medicine On Demand
Malaria kills about 800,000 people each year, the vast majority of whom live in Sub-Saharan Africa. But stock-outs of malaria treatments in many Sub-Saharan African countries continue to be a problem. Launched in 2009, “SMS for Life” aims to reduce out-of-stock incidents for five key malaria medicines in the region. As Tanzanian health workers send weekly stock count text messages to a centralized database, district managers and the National Malaria Control Programme can use any Internet browser to access supply levels and provide regions with adequate medicine. Inexpensive IBM solutions like this increase inventory visibility throughout the supply chain and help detect signs of an epidemic—increasing public safety and reducing needless deaths.

Featured: July 07, 2011 Radiotype Wireless Data Transmission Radiotype Wireless Data Transmission
In 1935, Antarctic explorer Admiral Richard Byrd used an IBM Radiotype machine to transmit, by microwaves, the word “WATSON” from the South Pole to a lab in New Jersey—approximately 11,000 miles—signaling a new method in text transmission. When the US entered World War II, IBM lent Radiotype machinery to the Signal Corps, which sent a wartime peak of 50 million words each day among six stations at 100 words per minute. Though IBM did not pursue a market for Radiotype after the war, it showed a new generation what was possible in data communications, and helped drive the adoption of more advanced networking technologies.

Featured: July 06, 2011 TAKMI TAKMI
Bringing Order to Unstructured Data
Before 1997, the process of analytics dealt only with structured information. Most of the world’s information, however, is chaotic, unstructured data and text. In response, IBM developed TAKMI, which provides businesses with detailed information, trend identification and otherwise-undetectable insights—helping inform problem-solving and context-based decision-making. Although TAKMI was created to analyze call center logs, IBM quickly realized its potential for broader applications. A medical version of the TAKMI system is analyzing medical publications, taking inventory, and mapping unstructured medical data to identify patterns and enable intelligent clinical decisions.

Featured: July 01, 2011 A Commitment to Employee Education A Commitment to Employee Education
Thomas Watson Sr. said “there is no saturation point in education” and in 1916, he created the IBM Education Program. Over the next two decades, the program expanded to include management education, study clubs and the construction of a schoolhouse and laboratory. Between 1938 and 1952, 40 percent of Endicott employees were enrolled in classes, covering 33 subjects. In 1961 alone, 17,000 employees participated in courses. Today, IBM continues to evolve its commitment to education by offering thousands of learning experiences across roles and geographies in a multitude of in-person and virtual formats.

Featured: June 29, 2011 The First Nationwide Smart Energy and Water Grid The First Nationwide Smart Energy and Water Grid The island nation of Malta turned to IBM to help mitigate its two most pressing issues—water shortage and skyrocketing energy costs. The result is a combination smart water/grid system launched in 2009 that uses instrumented digital meters to monitor waste, incentivize efficient resource use, deter theft and reduce dependence on oil and processed seawater. Together, Malta and IBM are building the world’s first national smart utility system.

Featured: June 28, 2011 New Business Models for Telecom New Business Models for Telecom
To capture the breakneck growth in India’s telecommunications market, Bharti Airtel needed a new business model. The communications service provider (CSP) worked with IBM business consultants to outsource and integrate functions such as network management, help-desk support and IT. This freed the company to focus on high-value objectives such as new services and customer loyalty. Since 2004, Bharti Airtel has grown from six million subscribers to more than 150 million. This year, Bharti expands its model to Africa, where IBM will manage the computing technology and services for a mobile network spanning 16 countries.

Featured: June 24, 2011 CICS CICS
Securing Online Transactions
In the late 1960s, IBM engineer Ben Riggins was working on implementing IBM computers for the Virginia Electric Power Company. VEPCO was interested in setting up customer service centers that were tied in electronically to the company’s mainframe—except no software existed to execute transactions from the field. Riggins developed a piece of software called IBM CICS (Customer Information Control System). CICS blossomed into standard IT middleware, and now processes millions of transactions each day. It is considered one of the most important software products of all time, and one of the most profitable products in the history of IBM.

Featured: June 23, 2011 Cryptography for a Connected World Cryptography for a Connected World
In a world increasingly dependent on electronic data, protected data storage emerged as a critical security concern across all industries and in government. Preparing for this challenge, IBM developed its Data Encryption Standard (DES), a cryptographic algorithm to secure data. In 1977, the US National Bureau of Standards, working with the National Security Agency, adopted DES as the official Federal Information Processing Standard. It quickly became the international standard of protecting sensitive information, keeping the world’s data secure for more than two decades. The wide acceptance of DES solidified IBM’s thought leadership position and holistic approach to data management.

Featured: June 21, 2011 Innovating the Fan Experience Innovating the Fan Experience
Since 1990, IBM has worked with the All England Tennis Club to make the Wimbledon Championships the smartest professional tennis tournament, delivering a front-row experience to millions of fans around the world. Wimbledon is one of the IBM Media and Entertainment division’s efforts to help its clients, from professional sports leagues to music and movie production companies, develop new business models that embrace innovative ways of delivering content to customers.

Featured: June 16, 2011 IBM Is Founded IBM Is Founded
In 1911, international businessman Charles Flint engineered the merger of Hollerith’s Tabulating Machine Company with two other firms—the Computing Scale Company of America, an Ohio manufacturer of meat slicers and scales, and the International Time Recording Company, a maker of industrial clocks. This new conglomerate was named Computing-Tabulating-Recording Company, and it bore the seeds of what would become IBM. Recognizing the need for strong leadership to integrate such disparate organizations, Flint hired Thomas Watson Sr. as a general manager in 1914. Ten years later, with revenues of $11 million or roughly 13 times its original annual sales, 3384 employees and a strong vision for the future, C-T-R changed its name to International Business Machines.

Featured: June 15, 2011 A Global Volunteer Network A Global Volunteer Network
The IBM On Demand Community was established in 2003 as an online system for IBM employees and retirees to formalize their participation in volunteerism. It takes a uniquely IBM approach with a systems-management foundation, the capability of scaling on a global level and a focus on expertise-based service. The global system connects the strengths and skills of each employee and retiree with programs, resources, software and tracking solutions for a host of volunteer opportunities in education and with not-for-profit organizations. In the past five years, IBM surpassed 10 million hours of volunteer work tracked through the On Demand Community system.

Featured: June 14, 2011 Smarter Planet Smarter Planet
In 2008, IBM launched the Smarter Planet agenda as a way to help forward-thinking leaders in business, government and civil society around the world capture the potential of smarter systems to achieve economic growth, near-term efficiency, sustainable development and societal progress. Predicated on the world becoming more instrumented, interconnected and intelligent, Smarter Planet is IBM’s latest “big bet” on the future, with wide-ranging possibilities for improving the transportation, education, energy, food and water systems that run our everyday work and personal lives.

Featured: June 09, 2011 The Globally Integrated Enterprise The Globally Integrated Enterprise
In an essay featured in the May/June 2006 edition of Foreign Affairs magazine, and in a speech given in Bangalore, India, the same year, Samuel Palmisano, chairman and CEO of IBM, outlined his vision of the new globally integrated enterprise. It is the successor to the multinational corporation, which featured smaller versions of the parent company in multiple countries. A globally integrated enterprise is truly global—locating operations and functions anywhere in the world, based on the right cost, availability of skills and supportive business environment. This model is more nimble and less duplicative, and operates well across the flatter world.

Featured: June 08, 2011 The Networked Business Place The Networked Business Place
IBM PROFS (Professional Office System) was an electronic communication system for the automated office environment. Released in 1981, it supported emails, document creation and management, scheduling functions and spreadsheets, and could be linked to other applications, such as databases. Operated by menu-driven user interfaces, built on the mainframe and properties of virtualization, PROFS was the antecedent to office-wide intranets, providing a platform for early virtual collaboration. IBM’s belief in the power of collaboration continued well beyond PROFS and eventually led to the development of w3—the largest intranet in the world.

Featured: June 07, 2011 The Automation of Personal Banking The Automation of Personal Banking
The check-clearing process in banking was dramatically enhanced with the introduction of the IBM 801 Bank Proof machine, unveiled in 1934. As a new type of proof machine, the 801 listed, separated and endorsed checks, in addition to recording totals. Since this innovation, IBM has helped reinvent banking around the world, tailoring automated solutions to local business needs and behaviors and bringing greater convenience and efficiency to everyday financial transactions.

Featured: June 03, 2011 The Social Security System The Social Security System
In the midst of the Great Depression, Franklin D. Roosevelt signed the Social Security Act—creating a gigantic, nationwide information problem with the stroke of a pen. Suddenly, the federal government needed acres of accounting machines to track the paychecks of every working American. There was really only one company that could provide that data processing backbone: IBM. The company provided more than 400 punch card tabulating machines to establish records for 26 million workers.

Featured: June 01, 2011 The DNA Transistor The DNA Transistor
IBM’s DNA Transistor offers a high-tech, low-cost method for reading the human genome sequence. This 2009 breakthrough technology may soon be used to create better patient profiles, tailor-made diagnoses and treatments informed by genetics—driving down the cost of healthcare, while drastically improving quality of care and quality of life.

Featured: May 26, 2011 Corporate Leadership in Environmental Responsibility Corporate Leadership in Environmental Responsibility IBM’s environmental programs date back to 1971 when Thomas Watson Jr., formalized the company’s global commitment to environmental protection in a pioneering Corporate Policy on IBM’s Environmental Responsibilities. It called for IBM to address not only the waste that results from manufacturing its products but also to consider the consequences of processes that are established during product development—what became, decades later, a regulatory focus known as “pollution prevention.” Today, thousands of IBMers in diverse roles are actively engaged in driving and implementing the company’s environmental programs and requirements. By the late 1990s, IBM became the first enterprise to achieve a single global registration covering IBM’s global operations to the ISO 14001 Environmental Management System Standard.

Featured: May 25, 2011 The Origins of Computer Science The Origins of Computer Science
At the end of World War II, the Watson Scientific Computing Laboratory at Columbia University became a pioneering powerhouse, marrying academics with corporate research and development. One year after its 1945 opening, the Laboratory also provided the basis for the world’s first computer science curriculum. The course introduced students to the foundational principles of automated data processing. Many of the students who attended these classes became the first proponents of the electronic data processing field.

Featured: May 20, 2011 The Apollo Missions The Apollo Missions
The seeds of IBM’s involvement in space exploration were planted when Thomas J. Watson established an Astronomical Computing Bureau at Columbia University in the 1930s—decades before NASA was founded. Considered one of history’s greatest scientific achievements, the moon landing is evidence of IBM’s willingness to explore ambitious ideas long before they revealed a path to profitability. IBM has taken part in every US manned space effort in history, working on systems for Mercury, Gemini-Titan and Apollo-Saturn missions, and for the historic 1969 Apollo 11 mission to the Moon. IBM has also helped develop Mission Control for the Gemini, Skylab and US-Soviet Apollo-Soyuz projects, as well as for the Space Shuttle program.

Featured: May 18, 2011 Fractal Geometry Fractal Geometry
In 1967, IBM researcher Benoît Mandelbrot published the initial findings of what he would later describe as “fractal geometry”—a concept by which mankind could use mathematical properties to describe the rough, non-Euclidean geometrical irregularities that exist in nature. Highly contested in its early years, fractal geometry has since informed significant contributions to science, industry, mathematics, and the arts. This new way of viewing our surroundings, this new perception of reality, has since led to a number of remarkable discoveries about the worlds of nature and man.

Featured: May 16, 2011 Silicon Germanium Chips Silicon Germanium Chips
In 1994, IBM Research patented a method for making low-cost semiconductor chips from Silicon Germanium (SiGe). SiGe was more readily available than the more rare, more expensive materials used at the time, and it improved speed and versatility in integrated circuits. Introducing germanium into the base layer of an otherwise all-silicon chip allowed for significant improvements in operating frequency, current, noise, and power capabilities. These cheaper, smaller, more energy efficient chips expanded the wireless industry, as SiGe chips were used in everything from radar to space exploration. Today, SiGe technology powers a new generation of mobile devices and smart technology.

Featured: May 12, 2011 Magnetic Tape Storage Magnetic Tape Storage
In the late 1940s, inspired in part by Bing Crosby’s pioneering use of magnetic tape to record his radio shows, IBM engineers started experimenting with tape as a data storage successor to the punched card. 3M developed tape to IBM specifications, while IBM worked on reels with rapid start and stop times, moving tape at 100 to 200 inches per second. The engineers hit upon the idea of using a vacuum column to suck in loops of tape and buffer it from the jarring stops and starts. In 1952, IBM announced the first magnetic tape storage unit, the IBM 726.

Featured: May 10, 2011 The Invention of Service Science The Invention of Service Science
Just as IBM in the 1940s helped create the academic discipline of computer science, so the company is again extending scientific rigor to key emerging dimensions of a changing world. With the world’s economy shifting from manufacturing to services, Service Science, Management and Engineering (SSME) introduces an important new field of study to enable deeper understanding of how this shift manifests itself in particular organizations and across business and society. Since 2003, IBM has worked with 450 university faculties in 54 countries, as well as governments and industry leaders, to build SSME curricula.

Featured: May 05, 2011 Pioneering Machine-Aided Translation Pioneering Machine-Aided Translation
IBM developed its first translation system for the League of Nations in 1931. The system was based upon the 1927 Filene-Finlay patent and enabled speech to be translated and read at the same time using low-power radio and headphones. Listeners could dial in to access the system in their native language. IBM continued its commitment to automatic translation with a system that translated Russian (chosen for complexity) to English in 1934, English to Braille in 1959 and Chinese to English in 1963. Bidirectional English-to-Arabic translation software was deployed in 2006 to improve communication between English-speaking military personnel and Iraqi forces and citizens.

Featured: May 03, 2011 The Creation of the World Trade Corporation The Creation of the World Trade Corporation
Throughout his tenure as CEO and President of IBM, Thomas J. Watson Sr. maintained a deep interest in international relations. It was under his reign that the company became truly multinational, aggressively expanding operations to Asia, Latin America and Africa. In 1949, Watson created the IBM World Trade Corporation, a wholly owned subsidiary, to manage these proliferating operations. In doing so, he hired local people who understood the particularities of the business environments and local cultures in each country. They in turn, trained IBM’s global leadership in the requirements of managing vastly more complex organizations and relationships. Symbolic of his commitment to practice fair and ethical business practices around the world, Watson adopted for the company the new slogan, “World Peace Through World Trade.”

Featured: May 02, 2011 IGF IGF
Financing Technical Innovation
IBM Global Financing (IGF) enables the world’s leading corporations to implement critical e-business solutions, by offering total solutions financing. Since its inception, it has become the largest IT financier in the world, offering businesses of all sizes leasing and financing solutions for hardware, software and services acquired not only from IBM, but from the vendors that best suit the needs of the technology and customer. Today, IGF has thriving customers in more than 50 countries.

Featured: April 27, 2011
Smarter Healthcare Management Smarter Healthcare Management
Guang Dong Hospital in southern China treats more than 10,000 patients daily and is known for integrating traditional Chinese medicine with contemporary Western medical practices. IBM is helping the hospital deploy an electronic, patient-centered records system that offers access to a patient’s medical data from any location. Electronic medical records have the potential to save the healthcare industry billions of dollars and prevent billions more misdiagnoses. IBM is working with a variety of industry stakeholders to drive the digitization of records, a critical step in improving patient care. In addition to working with hospitals, IBM is partnering with Google and Continua Health Alliance to allow individuals to create personal health profiles that capture key medical information.

Featured: April 26, 2011
Breaking the Petaflop Barrier Breaking the Petaflop Barrier
The IBM computer built for the “Roadrunner project” at Los Alamos National Lab in 2008 was the first in the world to operate at speeds faster than one quadrillion calculations per second—one petaflop. The world’s first “hybrid” supercomputer (using two different processor architectures), Roadrunner is twice as energy-efficient as the next computer—using about half the electricity to maintain the same level of computing power.

Featured: April 20, 2011
e-business e-business
As booming dot-com start-ups brought electronic commerce to consumers, big companies looked on wondering what to do. In the late 1990s, IBM offered a helping hand by recognizing the trend and using its strengths in mainframes, transactions and networking to create a strategy called “e-business.” This was a turning point for corporate America in the Internet Age, showing that big companies—not just Silicon Valley upstarts—had an important future in Web-based collaboration and business.

Featured: April 19, 2011
The Optimization of Oil Supplies The Optimization of Oil Supplies
IBM has a long history of using emerging technology to help energy companies find, extract, process and use oil. From using 3-D seismic modeling to locate fields to designing sensing technologies to track oil flow and equipment for optimal safety, IBM is at the forefront of helping the oil industry remain safer, more sustainable, and more productive. As one example, IBM has partnered with companies in Venezuela since 1938, when Mene Grande Oil Company in Maracaibo received its first IBM machines through a new venture called C. A. Watson de Maquinas Commerciales—IBM’s operating name in Venezuela. Since oil was first discovered in Venezuela, IBM has been there, providing technology and infrastructures that adapt according to the needs of the industry.

Featured: April 18, 2011
High-Temperature Superconductors High-Temperature Superconductors
Superconductors are perfect conductors of electricity and have unusual magnetic properties. The problem, though, was that they only worked at minus 459 degrees Fahrenheit—temperatures only reachable in lab experiments. In 1986, Georg Bednorz and Alex Müller were working with perovskites at IBM’s research lab and found they would superconduct at temperatures far warmer than all previous records. This breakthrough opened a path to numerous useful applications. Superconductors made MRI machines cheaper and faster, helping them spread to hospitals around the world. High-speed rail travel even relies on superconductors. In 1987, Bednorz and Müller were awarded the Nobel prize for their discovery.

Featured: April 13, 2011
The Management of Transportation Flow The Management of Transportation Flow
The city of Stockholm, Sweden, had a traffic congestion problem. To spur less car use there, IBM developed a road charging system that would directly charge drivers who used city center roads during peak business hours. The system, launched in 2007, covered a 24-square kilometer inner city area with 18 barrier-free control points equipped with cameras and a mix of payment channels. The result was a drop in traffic, increased green vehicle and public transportation use, and an improved overall quality of life for the city’s residents. Today, key lessons learned in the Stockholm project are helping IBM to bring its “smarter” systems approach to aid cities such as Brisbane, Singapore and London in resolving longstanding urban issues.

Featured: April 12, 2011
Deep Thunder Deep Thunder
IBM researcher Lloyd Treinish developed a hyper-local weather forecasting capability that combined algorithms, computer modeling and visualization to predict short-range, very local weather. His system was first used at the Atlanta Olympics in 1996. By understanding and anticipating weather patterns, businesses and government agencies could better utilize resources, reduce costs and curtail the negative impact of storms—preserving structures and property and saving lives.

Featured: April 11, 2011
WebSphere WebSphere
With the height of the dot com boom ahead of him, the head of IBM Software group Steve Mills called his three top men into his office to discuss how they should “Webify” the company’s top enterprise software tools. The conversation led to the advent of IBM’s WebSphere application server, released in early 1998. Initially, the WebSphere team focused on rapid development and deployment of Web applications supporting HTTP, Servlet and Java Server Pages apps. However, IBM quickly extended WebSphere to transactional applications and beyond, driven by customer needs, and anticipating market shifts. Today, the WebSphere suite of products and services helps businesses set up, operate and integrate electronic applications across multiple computing platforms.

Featured: April 07, 2011
Tracking Infectious Diseases Tracking Infectious Diseases
In 1976, the World Health Organization utilized the IBM System/370 at the United Nations’ International Computing Center in Geneva to precisely map trends and outbreaks of smallpox so that it could best allocate its limited personnel and resources to the most urgent locations. The system became a global model for demographic tracking. Since then, IBM has worked to understand the spread of many epidemics and pandemics. It partnered with the Centers for Disease Control to model the spread of H1N1—the “swine flu”—and developed the Spatiotemporal Epidemiological Modeler for use in tracking bird flu, dengue fever, and other infectious diseases that threaten human wellbeing.

Featured: April 04, 2011
IBM 603 IBM 603
The First Commercial Electronic Calculator
The first electronic calculator ever placed into production, the IBM 603, was the first commercial product to incorporate electronic arithmetic circuits. This marked a major shift for IBM, from mechanical to electronic computation. Born from the company’s continuing focus on electronic development, the 603 was part of a program to make an electronic “super calculator” that would perform calculations faster than 1944’s ASCC, a 51-foot-long machine. The result was a considerably smaller device that used vacuum tubes to perform multiplication far more rapidly than earlier electromechanical devices. For the first time, calculations could be done instantaneously.

Featured: March 30, 2011
World Community Grid World Community Grid
Although the world’s information processing capacity is growing exponentially, so are the planet’s systemic challenges. IBM’s World Community Grid, released in 2004, makes use of pervasive networking and crowdsourcing to apply supercomputer levels of processing power to urgent healthcare and societal needs. Tapping thousands of individuals’ idle computers, World Community Grid significantly accelerates the progress of cash-strapped scientific and public-service projects. The Grid demonstrates IBM’s commitment to human progress by marrying its human capital and technology resources for research.

Featured: March 29, 2011
Building an Equal Opportunity Workforce Building an Equal Opportunity Workforce
One year before the 1954 Supreme Court decision Brown v. the Board of Education and 11 years before the Civil Rights Act of 1964, Thomas J. Watson, Jr. issued a policy letter to his employees stating: “It is the policy of this organization to hire people who have the personality, talent and background necessary to fill a given job, regardless of race, color or creed.” IBM has historically taken an intellectual approach to its hiring process, being truly blind to human traits beyond expertise and character. Its diversity initiatives reflect this thinking and have helped redefine the workplace.

Featured: March 24, 2011
The IBM 700 Series The IBM 700 Series
Computing Comes to Business
The 1950s brought challenges for IBM, the undisputed leader in data processing. To stay ahead of the Soviet Union, the US government began helping 14 organizations to develop electronic computers. IBM’s future—and its pride—was at stake. In response, IBM created the 701 in 1951, its first commercial computer. The machine amazed the world. Time wrote that it would “open up new horizons by rapidly working out complex equations to help discover new products, improve old ones, find out which answers to problems are the best.” IBM President Thomas J. Watson, Jr. said the 701 was “the machine that carried us into the electronics business.”

Featured: March 22, 2011
Smarter Water Management Smarter Water Management
In 2009, IBM and the Marine Institute in Ireland completed the SmartBay pilot information system. The system monitors and analyzes wave conditions, marine life and pollution levels in and around Galway Bay, using an infrastructure of sensors and computational technology interconnected across the bay to collect and distribute information on coastal conditions. The system shifts data gathering from manual to instrumented—allowing researchers to respond quickly to critical challenges, including pollution. The project serves as an example for coastal towns everywhere looking to mitigate pollution and flooding while managing fishing stock. By studying Galway Bay—home to some of the world’s roughest surf—IBM researchers also hope to learn important lessons about harnessing energy from wave power.

Featured: March 17, 2011
Predictive Crime Fighting Predictive Crime Fighting
For several generations IBM has partnered with local governments and police operations to provide technology that aids law enforcement and security. In 1963 the company helped the New York Police Department reduce the time required to identify fingerprints from hours to mere minutes. Today, law enforcement officials in New York, Chicago, Memphis and other cities around the world continue to use data and predictive analytics to take smarter approaches to fighting crime.

Featured: March 16, 2011
The Selectric Typewriter The Selectric Typewriter
The typewriter industry changed forever with the invention of the IBM Selectric typewriter in 1961. Prior to this innovation, the conventional typewriter’s basket of type bars inevitably tended to tangle, slowing a typist’s speed. The Selectric was fitted with a golf ball-shaped typing head that replaced the type bar carriage, reducing the amount of space the typewriter took up on the desktop. The silver-colored “golf ball” element circumvented the jamming issue: with no bars to tangle, typists’ speed and productivity soared. The IBM Selectric became the most successful electric typewriter model ever made, dominating the high-end office typewriter market for 25 years.

Featured: March 15, 2011
A Global Innovation Jam A Global Innovation Jam
IBM’s 2006 Innovation Jam was the largest IBM online brainstorming session ever held. IBM brought together more than 150,000 employees, clients, and constituents from 104 countries and 67 companies. As a result, ten new IBM businesses were launched around innovations ranging from electronic health record systems to branchless banking. In all, IBM committed a seed investment totaling $100 million in innovative services and products as a result of the Jam.

Featured: March 14, 2011
Linux Linux
The Era of Open Innovation
IBM’s decision to support Linux brought the power of open source innovation to IBM servers, systems and solutions. In 2000, IBM announced it would invest $1 billion in Linux, with a concerted focus on improving the operating system from within the Linux community, transitioning all IBM systems to run Linux and optimizing existing IBM hardware and software to become Linux-ready. The commitment caught the attention of CEOs and CIOs all over the world, drove down customer costs while increasing flexibility and represented a significant validation of open source innovation. Today, Linux is the fastest-growing operating system in the world.

Featured: March 11, 2011
A Culture of Think A Culture of Think
In a sales meeting at NCR, an angry Thomas Watson Sr. barked at his staff “what you men have to do is THINK!” With that, he wrote THINK on a flip board and told an assistant to put the word on plaques and give them out. When Watson joined the nascent C-T-R in 1914, he brought the THINK slogan with him. By the1920s, C-T-R became IBM, THINK signs appeared in many locations and the slogan became synonymous with the company as it attracted the media spotlight. With THINK as the mantra, Watson created a culture of independent thinkers and impassioned sellers, empowering a large, dispersed workforce.

Featured: March 10, 2011
The Making of International Business Machines The Making of International Business Machines
In the 1920s, Computer-Tabulating-Recording Company was not very big and not very international, but it was a fast-growing, small tech company with outsized ambitions. One of those was to be a global company, at a time when few companies thought that way. Watson began sending lieutenants overseas to start branch companies that would be run by local managers, an unusual approach when most companies appointed Americans to run overseas operations. Inspired by broad company names like General Electric and General Motors, Watson changed C-T-R’s name to International Business Machines, emphasizing its global aspirations. Today IBM operates in over 170 countries.

Featured: March 09, 2011
The Accessible Workforce The Accessible Workforce
In 1941, IBM hired a legally blind employee, psychologist Dr. Michael Supa, to assist in the hiring of 181 people with disabilities over the following two years. Dr. Supa later helped IBM make its products more adaptable to the needs of the visually impaired. His motto was “No person is handicapped if he has the right job.” Dr. Supa is just one example of IBM’s progressive employment practices, which started with the hiring of its first disabled employee in 1914—76 years before the Americans with Disabilities Act. IBM has pioneered a number of technology solutions that enhance accessibility, such as the Home Page Reader, an early Braille printer and speech recognition technology.

Featured: March 08, 2011
Good Design Is Good Business Good Design Is Good Business
Thomas Watson Jr. hired architect and industrial designer Eliot Noyes in 1956 to create the Corporate Design Program at IBM as its first Consultant Design Director. The program brought an increased design sensibility to architecture, graphics, industrial design, interiors, exhibits and fine art procurement at IBM. Noyes designed a system for the presentation of IBM products as well as the larger IBM brand, from the showroom at 590 Madison Avenue to products like the IBM Dictation Machine. From aesthetic to function, design reflected IBM‘s true corporate mission to use advanced technology to improve the way people live and do business.

Featured: March 07, 2011
The PC The PC
Personal Computing Comes of Age
On August 12, 1981, at a press conference at the Waldorf Astoria ballroom in New York City, Phillip “Don” Estridge announced the IBM Personal Computer (IBM 5150) with a price tag of $1,565. Two decades earlier, an IBM computer often cost as much as nine million dollars and required an air-conditioned quarter-acre of space with a staff of 60. The new IBM PC was not only faster, it put a computer within every household’s reach. The IBM PC helped revolutionize the way the world does business. One year later, it earned Time magazine’s “Person of the Year” award.

Featured: March 04, 2011
Blue Gene Blue Gene
The driving strategy behind IBM’s $100 million dollar, 5-year development project in the 1990s was to leverage Scalable Parallel Processing with practical purpose: weather prediction, oil exploration, and complex manufacturing processes. To “do more with less,” IBM engineers embarked on a quest to dramatically increase the computer’s speed and efficiency while decreasing its size. Designed in partnership with the Lawrence Livermore National Laboratory, the first Blue Gene helped biologists observe the previously invisible processes of protein folding and gene development. Each iteration took the technology further - and together, the Blue Gene series revolutionized the economics of supercomputing.

Featured: March 03, 2011
FORTRAN FORTRAN
The Pioneering Programming Language
Programming early computers meant using an arcane “machine code” specific to each computer. IBM programmer John Backus found a better solution. In 1957, he and his team produced the first high-level language, FORTRAN (for FORmula TRANslating System). A FORTRAN program could run on any system with a FORTRAN compiler, which translated Backus’s code to machine code almost as efficiently as a good programmer. For the first time, code was comprehensible to people other than programmers, giving mathematicians and scientists the ability to write programs they could share on different systems. FORTRAN was a significant step toward freeing software from the constraints of its hardware.

Featured: March 02, 2011
The Mapping of Humanity's Family Tree The Mapping of Humanity's Family Tree
Who am I? How did we get here? Launched in 2005, National Geographic’s Genographic Project aims to answer these questions. IBM and the Genographic Project began gathering human DNA from across the world and analyzing it for genetic markers that signal a deviation—or branch—in our family tree. By examining our ancestral roots, researchers can draw a more complete picture of humanity’s migratory history. IBM is providing the analytics to read the more than 400,000 samples collected so far. Through this project, IBM has gained tremendous knowledge of genetic variation and has become the world’s first company with a genetic non-discrimination policy.

Featured: March 01, 2011
Sabre Sabre
The First Online Reservation System
IBM worked for six years with American Airlines to develop a reservation system that would allow the company to quickly track, fill and file records of the hundreds of passengers that packed its new jets. The system was an enormous success, and similar models were later sold to Pan Am and Delta. The Sabre system enabled a major transformation not only of airline reservations, but also of revenue management, cargo, pricing, scheduling and operations. More significantly, Sabre paved the way for real-time online transactions—also known as Online Transaction Processing (OLTP)—a precursor of everything from ATM machines to Internet commerce.

Featured: February 28, 2011
Corporate Service Corps Corporate Service Corps
The IBM Corporate Service Corps (CSC) program was launched in 2008 to create leadership development opportunities for IBMers while delivering expertise-based service for the communities and organizations in emerging markets. To date 1000 IBMers have participated in CSC projects that tackle issues from local economic development, entrepreneurship, transportation and education, to government services, healthcare and disaster recovery. Corporate Service Corps teams now serve in over twenty countries around the world.

Featured: February 25, 2011
The IBM Punched Card The IBM Punched Card
From the beginning of tabulation, stiff rectangular cards punched with holes became the way data was recorded and stored. As IBM grew to dominate data processing by the 1920s, its cards—which only worked on IBM machines and vice-versa—became the global industry standard. In 1928, IBM improved on the cards’ design so more data could be stored on a single card. From the 1950s through about 1970, IBM punched cards were the primary way corporations and governments stored and accessed information, making the cards the most durable, successful data storage medium since the book.

Featured: February 24, 2011
The First Corporate Pure Science Research Laboratory The First Corporate Pure Science Research Laboratory
“Think” was at the core of Watson’s being. In 1944, he established the Watson Scientific Computing Laboratory at Columbia University, the first corporate laboratory dedicated to pure scientific research. There, a handful of scientists used machines previously dedicated to accounting to investigate everything from atomic fission to the orbit of the moon. Embedding IBM within a university helped to develop a diverse new field of thinkers. Today, eight IBM labs work with government and university research labs worldwide. This new model of “collaboratories” allows the company to stretch its budget and access some of the best minds on the planet.

Featured: February 23, 2011
DRAM DRAM
The Invention of On-Demand Data
In the mid-1960s, IBM researcher Bob Dennard developed the world’s first one-transistor memory, calling it “dynamic random access memory,” or DRAM. Finally, mainframes could be outfitted with short-term memory to act as a buffer to the data stored on disk drives. The memory chips would hold information the computer was working on right then, so it could go back to the disk drive only when it needed something new. This vastly sped up the process of accessing and using stored information. DRAM instantly made computer memory smaller, denser and cheaper, all while requiring less power.

Featured: February 22, 2011
Automated Test Scoring Automated Test Scoring
IBM pioneered the measurement of academic performance with 1937’s IBM 805 Test Scoring Machine. This machine was able to score tests in less time than it took to manually mark the answer sheet, and was many times more accurate. Its innovative pencil-mark sensing technology gave rise to the ubiquitous phrase, “Please completely fill in the oval.” The innovation came into use just prior to World War II, when the government relied on the machine to process and place large numbers of applicants into jobs.

Featured: February 21, 2011
Scanning Tunneling Microscope Scanning Tunneling Microscope
The scanning tunneling microscope (STM) revolutionized our ability to manipulate solid surfaces the size of atoms. Gerd Binnig and Heinrich Rohrer of IBM’s Zurich Research Center were awarded the 1986 Nobel Prize in Physics for discovering the STM. And the STM, in turn, has led to other discoveries on a “nano” scale, playing an essential role in the blossoming of nanotechnology. It was vital in the 1990s discovery of fullerenes, which led to the development of the carbon nanotube. The Nobel committee said the invention opened up “entirely new fields... for the study of the structure of matter.”

Featured: February 17, 2011
The Optimization of Global Railways The Optimization of Global Railways
IBM’s first customer in Italy, the Italian state-owned Ferrovie dello Stato (Italian Railways) turned to IBM in 1928 to automate its administrative processes. The result was an inventory of spare parts that drastically reduced waste and statistical traffic analysis that helped to schedule and allocate trains. Italian Railways was one of the first organizations to fully exploit the advantages of IBM’s large-scale, large-volume data management capabilities. IBM’s work there led to railway engagements in India, the Netherlands, Australia, Belgium, Brazil, Canada, Chile, China, Colombia, Cuba, France, Guatemala, Hungary, Mexico, Poland and Yugoslavia.

Featured: February 14, 2011
A Computer Called Watson A Computer Called Watson
IBM’s latest computer, code-named “Watson” leverages the leading edge Question-Answering technology, allowing the computer to process and understand natural language. It incorporates massively parallel analytical capabilities to emulate the human mind’s ability to understand the actual meaning behind words, distinguish between relevant and irrelevant content, and ultimately, demonstrate confidence to deliver precise final answers. In February of 2011, Watson will make history by being the first computer to compete against humans on television’s venerable quiz show, Jeopardy!.

Featured: February 11, 2011
The Rise of the Internet The Rise of the Internet
In 1987, IBM, working with the U.S. National Science Foundation and our partners at MCI and Merit designed a new high-speed National Science Foundation Network (NSFNET) to connect US universities and 6 US-based supercomputer centers. The NSFNET greatly increased the capacity of the Internet (increasing the bandwidth of backbone links from 56 Kilobits/sec to 1.5 Megabits/sec to 45 Megabits/sec) and greatly increased the reliability and reach of the Internet—reaching more than 50 million users in 93 countries when management of the Internet infrastructure was transferred to the telecom carriers and commercial Internet Service Providers in 1995.

Featured: February 10, 2011
RAMAC RAMAC
The First Magnetic Hard Disk
The world’s first hard disk drive was the size of two kitchen refrigerators set side by side. It contained 50 disks spinning at 1,200 revolutions per minute, supplying data at 100,000 bits per second. It was the IBM RAMAC (Random Access Method of Accounting and Control), and it allowed enterprises to think about data in new ways—mixing and matching it on the fly, allowing each bit of information to be read or changed randomly. Along with IBM’s magnetic tape drive, the 1956 release of RAMAC essentially launched the data storage industry.

Featured: February 08, 2011
Excimer Laser Surgery Excimer Laser Surgery
In 1981, three IBM scientists—Rangaswamy Srinivasan, James Wynne and Samuel Blum—discovered how the newly invented excimer laser could remove specific human tissue without harming the surrounding area and do so on an extremely minute scale—a process that became the foundation for LASIK and PRK surgery. The painless procedure, which changes the shape of the cornea, has improved the vision and quality of life for millions of people around the world.

Featured: February 04, 2011
Magnetic Stripe Technology Magnetic Stripe Technology
In 1969, IBM engineer Forrest Parry had a problem. He was trying to affix a strip of magnetized tape with a piece of plastic to create an identity card for the CIA, but he was struggling to combine the two components. When he mentioned the problem to his wife, who happened to be ironing clothing at the time, she suggested that he use the iron to melt the strip on. He tried it, and it worked. The magnetic stripe, when combined with point-of-sale devices and data networks, was one of the catalysts that accelerated the proliferation of credit card usage around the world, transforming commerce forever.

Featured: February 03, 2011
The First Salaried Workforce The First Salaried Workforce
Thomas Watson Sr. always believed in making his workers feel dignified. In 1934, he bucked a trend toward paying factory workers in piecework, instead paying by the hour. Continuing the tradition, in 1958 IBM became the first industrial organization to place all regular, hourly-rated domestic employees on a salary basis. This change in pay practice made all domestic employees part of same basic compensation plan, providing its workforce with economic stability and equality.

Featured: February 02, 2011
Optimizing the Food Supply Optimizing the Food Supply
IBM worked with the Danish government in 1988 to create a nationwide cattle registry. This National Cattle Database collected and managed a breadth of information on 1.2 million bovine animals—including yield, breeding abilities, herdbook, medical history and even udder size and shape. The database has enabled farmers to optimize the breeding and yield of every cow and provided the Danish government with the visibility and traceability critical to the export of agricultural products. IBM continues to help governments, farmers and fisheries around the world develop smarter food chains to maximize yield and ensure safety and quality.

Featured: February 01, 2011
The Floppy Disk The Floppy Disk
The IBM engineers who developed the floppy disk never could have dreamed that it would soon become instilled in the fabric of consumers' lives. It was originally designed for large-scale systems, as a more efficient form factor for IBM's System/370 mainframe data loads. But soon, the disk's small size and ever-increasing storage capabilities led to its adoption by smaller systems as well. Usable, durable and flexible, the floppy disk quickly became ubiquitous as the preferred storage medium for the emerging personal computer industry.

Featured: January 28, 2011
SAGE SAGE
The First National Air Defense Network
In the depths of the cold war, IBM was contracted to help safeguard the United States by building an air defense system known as the Semi-Automatic Ground Environment (SAGE). When fully deployed in 1963, the system consisted of 27 centers throughout North America, each occupying an acre of floor space. SAGE was the first large computer network to provide man-machine interaction in real time. It provided the user with speed, altitude, and weapons availability data. Fortunately, while SAGE made available a number of formative computer technologies, much of its capabilities never had to be put into use.

Featured: January 26, 2011
IBM 1401: The Mainframe IBM 1401: The Mainframe
In 1959, IBM introduced the 1401, the first high-volume, stored-program, core-memory transistorized mainframe computer. Its versatility in running enterprise applications of all kinds helped it become the most popular computer model in the world in the early 1960s. IBM also introduced the 1403 chain printer, which launched the era of high-speed, high-volume impact printing. The 1403 was unsurpassed in quality until the advent of the laser printer in the 1970s. The 1401 was the first computer system in the world to reach 10,000 unit sales.

Featured: January 25, 2011
UPC UPC
The Transformation of Retail
The UPC barcode system came into being as the result of one man's breakthrough moment, while working under a dramatically tight deadline. This 1973 invention turned into one of the most profound contributions to industrial technology. A truly universal standard, the UPC is among the most recognized designs in history, and typically IBM: an elegantly simple matrix of information that can be customized for almost any type of transaction and can yield as much data as needed. For retailers, the UPC meant savings, better customer service, precise inventory control, and rich stores of marketing data. UPC changed the point-of-sale experience forever.

Featured: January 21, 2011
Patents and Innovation
By hiring engineer and inventor James W. Bryce in 1917, Thomas Watson Sr. showed his commitment to pure inventing. Bryce and his team established IBM as a long-term leader in the development and protection of intellectual property. By 1929, 90 percent of IBM's products were the result of Watson's investments in R&D. In 1940, the team invented a method for adding and subtracting using vacuum tubes—a basic building block of the fully electronic computers that transformed business in the1950s. This pattern—using innovation to create intellectual property—shaped IBM's history.


Erstellt: 2011-04

ibm
IBM-Jargon-Abkürzungen

(E?)(L?) http://techsupport.services.ibm.com/guides/acronyms.html
Weitere Hinweise zu den Bezeichnungen gibt es auf der angegebenen Seite.
The following terms and acronyms are used frequently in the course of solving customers' problems:

ibm
IBM-Terminology-Glossary

(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
This Web site consolidates several of the main glossaries created for IBM products in one convenient location. Other glossaries may be available on IBM Internet sites for specific products or technologies. To find a glossary that is not listed here, conduct a search on the IBM home page or the home page of the relevant product.

This Web site consolidates the terminology from many IBM products in one convenient location. In addition to base computer terminology, terms and definitions from the following brands and product families are included:
CICS | iSeries | Lotus | Tivoli | WebSphere
Terms from other brands such as Rational, DB2, and zSeries will be added in the near future.

Am 03.08.2004 waren folgende englische Begriffe im Glossary mit Erklärungen aufgeführt:



IBM eServer

(E?)(L?) http://www.ibm.de/
(E?)(L?) http://www-1.ibm.com/partnerworld/pwhome.nsf/vAssetsLookup/bp_eserv_guidelines.pdf/$File/bp_eserv_guidelines.pdf
"Im Jahr 2000 hat IBM die vier Serverlinien unter dem Namen IBM e-server zusammengeführt. Das Ergebnis ist eine Serverfamilie, die sich durch wegweisende Technologie auszeichnet: zSeries (Mainframes), iSeries (integrierte Server), pSeries (UNIX-Systeme), xSeries (Intel-Server)
Schon heute ist die Bedeutung der Buchstaben kaum noch bekannt.
Der Link verweist auf ein Dokument (IBM eServer USAGE GUIDELINES), das einige Hinweise zur Corporate Identity der eServer enthält. Auf Seite 12 wird die "NAMING ARCHITECTURE" beschrieben.

IEEE

(E?)(L?) http://www.ieee.org/
("Ei Triple-i") = "Institute of Electrical Engineers"
Das IEEE befasst sich mit der Normierung auf dem Gebiet der Elektronik. Eine Projektgruppe befasste sich mit der Normierung lokaler Netzwerke. Die Gruppe traf sich zum ersten Mal am 29.02.1980. Seitdem hiess sie Projektgruppe 802 (Im Jahre 80 im Februar). Die entwickelten Normen hiessen dann 802.x, z.B. befasst sich die Norm 802.9 mit integrierten Sprach- und Datennetzen (um wieder etwas näher zum Thema dieser Homepage zu kommen).
Diese Nummerung wurde auch von der ISO übernommen als y802.x

Informatics (W3)

(E?)(L?) http://www.wikipedia.org/wiki/Informatics


irchelp
IRC Communication Research Resources

(E?)(L?) http://www.irchelp.org/irchelp/communication-research


irchelp
about multilingualism in the IRC (Internet Relay Chat)

(E?)(L?) http://www.irchelp.org/irchelp/misc/foreign.html


IRQ Numbers (W3)

(E6)(L1) http://webopedia.com/quick_ref/IRQnumbers.asp
"IRQ" steht für "Interrupt Request".

Prior to plug-and-play devices, users had to set IRQ values of devices manually when adding the device, such as a modem or printer, to a system. The following list of IRQ numbers specifies what each of the 16 IRQ lines are used for.

isaca
IT-Glossary

(E?)(L?) http://www.isaca.org/Pages/Glossary.aspx

Access control | Access control table | Access method | Access path | Access rights | Accountability | ACK (acknowledgement) | Active recovery site (mirrored) | Active response | Address | Address space | Addressing | adjusting period | Administrative controls | allocation entry | Alpha | Analog | Anomaly | Anomaly detection | Anonymity | Anonymous File Transfer Protocol (FTP) | Antivirus software | Appearance | Appearance of independence | Applet | application | Application acquisition review | Application controls | Application development review | Application implementation review | Application layer | Application maintenance review | Application program | Application programming | Application programming interface (API) | Application proxy | application security | Application software tracing and mapping | Application system | Arithmetic-logic unit (ALU) | Artificial intelligence | ASP/MSP (application or managed service provider) | Assembler | Assembly language | Asymmetric key (public key) | Asynchronous Transfer Mode (ATM) | Asynchronous transmission | Attest reporting engagement | Attitude | Attribute sampling | Audit | Audit accountability | Audit authority | Audit charter | Audit evidence | Audit expert systems | Audit objective | Audit plan | Audit program | Audit responsibility | Audit risk | Audit sampling | Audit trail | auditability | Authentication | authorization | Automated teller machine (ATM) | Availability | Backup | Bandwidth | Bar case | Bar code | Base case | Baseband | Batch control | Batch processing | Baud rate | | Binary code | Biometric locks | Biometrics | Black box testing | Blackbox testing | Border router | Bridge | Broadband | Brouters | Brute force | BSP (business service provider) | budget | budget formula | budget hierarchy | budget organization | Buffer | Bulk data transfer | Bus | Bus topology | Business impact analysis (BIA) | business process integrity | Business process reengineering (BPR) | Business risk | Business-to-consumer e-commerce (B2C) | Bypass label processing (BLP) | CAATs | Cadbury | Capacity stress testing | Card swipes | Cathode ray tube (CRT) | Central office (CO) | Central processing unit (CPU) | Centralized data processing | Certificate authority (CA) | Certificate Revocation List | Challenge/response token | Check digit | Check digit verification (self-checking digit) | Checkpoint restart procedures | Ciphertext | Circuit-switched network | Circular routing | Cleartext | Client-server | | Coaxial cable | COBIT® | COCO | Cohesion | Cold site | Combined Code on Corporate Governance | Communications controller | Comparison program | Compensating control | Completeness check | Compliance testing | Components (as in component-based development) | Comprehensive audit | Computationally greedy | Computer sequence checking | computer server | Computer-aided software engineering (CASE) | Computer-assisted audit technique (CAATs) | Concurrent access | Confidentiality | Console log | consumer | Content filtering | Continuity | Continuous auditing approach | Control group | Control objective | Control Objectives for Enterprise Governance | Control perimeter | Control risk | control risk self-assessment | Control section | Control weakness | Controls | corporate exchange rate | Corporate governance | Corrective controls | COSO | Coupling | Coverage | Credentialed analysis | credit risk | Criteria | Cross-certification | Cryptography | data analysis | Data communications | Data custodian | Data dictionary | Data diddling | Data Encryption Standard (DES) | data flow | data integrity | Data leakage | Data owner | Data security | Data structure | Database | Database administrator (DBA) | Database management system (DBMS) | Database replication | Database specifications | Datagram | Data-oriented systems development | DDoS (distributed denial-of-service) attack | Decentralization | Decision support systems (DSS) | Decoy server | Decryption | Decryption key | Default deny policy | Default password | Detailed IS ontrols | Detection risk | Dial-back | Dial-in access controls | Digital certificate | digital certification | Digital signature | Direct reporting engagement | Discovery sampling | Diskless workstations | Distributed data processing network | DMZ (demilitarized zone) | DNS (domain name system) | DoS (denial-of-service) attack | Downloading | Downtime report | Dry-pipe fire extinguisher system | Due care | Due professional care | Dumb terminal | Duplex routing | Dynamic analysis | Echo checks | e-commerce | Edit controls | Editing | Electronic cash | Electronic data interchange (EDI) | Electronic funds transfer (EFT) | Electronic signature | Electronic vaulting | E-mail/interpersonal messaging | Embedded audit module | Encapsulation (objects) | Encryption | Encryption key | End-user computing | Engagement letter | Enterprise governance | enterprise resource planning | error | Error risk | Ethernet | Evidence | Exception reports | Executable code | Expert systems | Exposure | Extended Binary-coded Decimal Interchange Code | Extensible Markup Language (XML) | External router | Fail-over | Fail-safe | False negative | False positive | Fault tolerance | Feasibility study | Fiber optic cable | Field | File | File layout | File server | Filtering router | FIN (final) | Financial audit | Finger | Firewall | Firmware | fiscal year | foreign exchange risk | Format checking | Fourth generation language (4GL) | Frame relay | Fraud risk | FTP (file transfer protocol) | Full duplex | Function point analysis | Gateway | General computer controls | Generalized audit software | Geographic disk mirroring | Half duplex | Handprint scanner | Harden | Hardware | Hash function | Hash total | Hexadecimal | Hierarchical database | Honey pot | Hot site | HTTP (hyper text transfer protocol) | HTTPS (hyper text transfer protocol secure) | Hub | hyperlink | hypertext | ICMP (internet control message protocol) | Idle standby | IDS (intrusion detection system) | Image processing | implementation life cycle review | Incremental testing | Independence | Independent appearance | Independent attitude | Indexed sequential access method (ISAM) | Indexed sequential file | Information engineering | Information processing facility (IPF) | Inherent risk | Inheritance (objects) | Initial program load (IPL) | Input controls | Integrated services digital network (ISDN) | Integrated test facilities (ITF) | Integrity | Intelligent terminal | interest rate risk | Interface testing | Internal control | Internal control structure | Internal penetrators | Internal storage | Internet | Internet banking | Internet Engineering Task Force (IETF) | Internet Inter-ORB Protocol (IIOP) | Internet packet (IP) spoofing | intranet | Intrusion | Intrusion detection | Intrusive monitoring | IP (Internet protocol) | IPSec (Internet protocol security) | Irregularities | ISO17799 | ISP (Internet service provider) | IT governance | Job control language (JCL) | journal entry | Judgment sampling | L2F (Layer 2 forwarding) | L2TP (Layer 2 tunneling protocol) | Latency | LDAP (Lightweight Directory Access Protocol) | Leased lines | legal risk | Librarian | Limit check | Link editor (linkage editor) | liquidity risk | Local area network (LAN) | Local loop | Log | Logical access controls | Logoff | Logon | Logs/Log file | Machine language | Magnetic card reader | Magnetic ink character recognition (MICR) | Management information system (MIS) | Man-in-the-middle attack | manual journal entry | Mapping | Masking | Masqueraders | Master file | Materiality | Memory dump | Message switching | Microwave transmission | Middleware | Misuse detection | Modem (modulator-demodulator) | Monetary unit sampling | Monitor | Monitoring policy | Multiplexing | Multiplexor | Mutual takeover | NAT (Network Address Translation) | Netware | Network | Network administrator | Network hop | Node | Noise | Non-intrusive monitoring | nonrepudiable trnasactions | Nonrepudiation | Normalization | Numeric check | Object code | Object Management Group (OMG) | Object orientation | Objectivity | object-oriented system development | Offline files | Offsite storage | Online data processing | Open systems | Operating system | Operating system audit trails | Operational audit | Operational control | operational risk | Operator console | Optical character recognition | Optical scanner | Output analyzer | Outsourcing | Packet | Packet filtering | Packet switching | Parallel simulation | Parallel testing | Parity check | Partitioned file | Passive assault | Passive response | Password | Password cracker | payment system | Penetration testing | Performance indicators | Performance testing | Peripherals | Permanent virtual circuit (PVC) | Personal identification number (PIN) | Pervasive IS controls | Piggy backing | Plaintext | Point-of-presence (POP) | Point-of-sale systems (POS) | Polymorphism (objects) | Population | Port | Posting | PPP (point-to-point protocol) | PPTP (point-to-point tunneling protocol) | Preventive controls | price risk | Privacy | Private key | Private key cryptosystems | Privilege | Procedure | Production programs | Production software | Professional competence | Program evaluation and review technique (PERT) | Program flowcharts | Program narratives | Project sponsor | Project team | Promiscuous mode | Protection domain | Protocol | Protocol converter | Protocol stack | Prototyping | Proxy server | Public key | Public key cryptosystem | Public key infrastructure | Queue | Quick ship | RADIUS | Random access memory (RAM) | Range check | rapid application development | Real-time analysis | Real-time processing | Reasonable assurance | Reasonableness check | Reciprocal agreement | Record | Record, screen and report layouts | Recovery point objective (RPO)- | Recovery testing | Recovery time objective (RTO) | Redo logs | Redundancy check | Reengineering | registration authority (RA) | Regression testing | Relevant audit evidence | Reliable audit evidence | Remote job entry (RJE) | Remote procedure calls (RPCs) | Repository | repudiation | reputational risk | Request for proposal (RFP) | Requirements definition | Residual risk | Reverse engineering | RFC (request for comments) | Ring topology | Risk | Risk assessment | Rootkit | Rotating standby | Rounding down | Router | RS-232 interface | RSA | Rulebase | Run instructions | Run-to-run totals | Sampling risk | Scheduling | Screening routers | secure socket layer (SSL) | Security administrator | Security management | Security perimeter | Security policy | Security software | Security testing | security/transaction risk | Segregation/separation of duties | Sequence check | Sequential file | Service bureau | Service level agreement (SLA) | Service provider | Service user | Shell | Signatures | Simple fail-over | Simple Object Access Protocol (SOAP) | Single point of failure | Smart card | SMTP (Simple Mail Transport Protocol) | Sniff | Sniffing | Software | Source code | Source code compare programs | Source documents | Source lines of code (SLOC) | Spanning port | Split data systems | Split DNS | Spoofing | Spool (simultaneous peripheral operations online) | Standing data | Star topology | Static analysis | Statistical sampling | strategic risk | Structured programming | Structured Query Language (SQL) | Subject matter | Substantive testing | Sufficient audit evidence | Surge suppressor | SWIFT | Switch | Symmetric key encryption | SYN (synchronize) | Synchronous transmission | System exit | System flowcharts | System narratives | System software | System testing | Systems acquisition process | Systems analysis | Systems development life cycle (SDLC) | Table look-ups | TACACS+ | Tape management system (TMS) | Taps | TCP (transmission control protocol) | TCP/IP protocol | Tcpdump | technical infrastructure security | Telecommunications | Teleprocessing | Telnet | Terminal | Terms of reference | Test data | Test generators | Test programs | Third-party review | Threat | Token | Token ring topology | Top-level management | Topology | Transaction | Transaction log | Transaction protection | Trap door | Trojan horse | Trust | Trusted processes | Trusted systems | Tuple | Twisted pairs | UDP (User Datagram Protocol) | Uninterruptible power supply (UPS) | Unit testing | Universal Description, Discovery and Integration | UNIX | Uploading | Useful audit evidence | Utility programs | Utility software | Vaccine | Validity check | Value-added network (VAN) | Variable sampling | Verification | virtual organizations | Virtual private network (VPN) | Virus | Voice mail | Vulnerabilities | vulnerability | Vulnerability analysis | War dialler | Warm-site | waterfall development | web page | Web Services Description Language (WSDL) | web site | Whitebox testing | Wide area network (WAN) | Windows NT | Wiretapping | World Wide Web Consortium (W3C) | Worm | X.25 | X.25 interface | X.500


isoc
Languages on the Internet

(E?)(L?) http://www.isoc.org/inet96/proceedings/a5/a5_3.htm


isoc
Study of language distribution on the internet

(E?)(L?) http://www.isoc.org:8030/palmares.en.html


It from Bit (W3)

Der Slogan "It from Bit" stammt von dem Physiker John Wheeler von der Princeton-Universität. Damit wollte er zum Ausdruck bringen, dass physikalisches Sein und Informationsgehalt untrennbar miteinander verbunden sind.

iwebtool
Computer Glossary

(E?)(L1) http://www.iwebtool.com/computer_glossary/

An easy to use glossary of computer and Internet terms with definitions that are easy to understand. Terms and definitions relating to computer, technology, Internet resources and much more.




Erstellt: 2006-08

J

Java (W3)
Programmiersprache

Der Name der Programmiersprache "Java" geht zunächst zurück auf amerik. "Java" = dt. "Kaffee", eine Bezeichnung, die insbesondere bei amerikanischen Programmierern verbreitet war. Diese Bezeichnung ist ihrerseits eine Kurzform für "Kaffee aus Java". Und "Java" schließlich ist eine indonesische Insel, die kleinste Insel der Großen Sundainseln.

Die Programmiersprache "Java" wurde von der Firma Sun entwickelt und erstmals am 23. Mai 1995 als neue, objekt-orientierte, einfache und plattformunabhängige Programmiersprache vorgestellt.

Aber auch Programmiersprachen haben ihren Stammbaum. So geht die Programmiersprache "Java" auf die Sprache "Oak" zurück, die 1991 von Bill Joy, James Gosling und Mike Sheridan im Green-Projekt entwickelt wurde. Ziel war es, eine einfache und plattformunabhängige Programmiersprache zu schaffen, mit der nicht nur normale Computer wie Unix-Workstations, PCs und Apple-Computer programmiert werden können, sondern auch die in Haushalts- oder Industriegeräten eingebauten Micro-Computer, wie z.B. in Waschmaschinen und Videorekordern, Autos und Verkehrsampeln, Kreditkarten und Sicherheitssystemen und vor allem auch in TV-Settop-Boxes für "intelligente" Fernsehapparate.

Allgemein anerkannt wurde Java aber erst seit 1996 in Verbindung mit Web-Browsern und Internet-Anwendungen sowie mit der Idee eines "NC" ("Network Computer"), der im Gegensatz zum "PC" ("Personal Computer") nicht lokal installierte, maschinenspezifische Software-Programme benötigt, sondern die Software in Form von Java-Klassen dynamisch über das Netz (Intranet) von einem zentralen Server laden kann. Diese Idee wurde später zu einem allgemeinen "Application Service Providing" ("ASP") erweitert.

Bei Java-Programmen muss zwischen zwei grundsätzlichen Arten unterschieden werden:

(E?)(L?) http://www.abkuerzungen.de/result.php?searchterm=java&language=de&style=standard
Als Verballhornung findet man auch die Abkürzung "java" = engl. "just another vague acronym".

(E?)(L?) http://www.hoooliday.com/tipps-info/kaffee/kaffee-lexikon-a.php

...
Ankola-Kaffee - "Java" - Indonesien - Kaffeeanbau in Asien
Kaffee wird im ganzen Inselstaat angebaut und "Java" steht für einen der grossen Namen des Kaffees. "Java" produziert einen aromatischen, säurearmen Kaffee, der von Natur aus mild und ausgewogen im Geschmack ist. Er ist etwas säurebetonter als Sumatra- oder Sulawesi-Kaffee und würziger im Geschmack. Die besten Plantagen sind Blawin, Jambit, Kayumas und Pankur. "Mokka Java" ist eine Mischung aus Java und jemenitischem Mokka.
...
Der erste systematische Kaffee-Anbau der Sorte Arabica wurde im 15. Jahrhundert in Terrassengärten im Südjemen betrieben. Ab Mitte des 17. Jahrhunderts wurde die Monopolstellung der Araber beim Kaffee-Anbau durchbrochen und der Arabica-Kaffee verbreitete sich nach und nach über Sri Lanka, "Java" und Südamerika weltweit.
...
1620 gründeten die Holländer ihre Plantagen in "JAVA"
...


(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
Java | Java 2 Connector security | Java 2 Platform Enterprise Edition (J2EE) | Java 2 Platform Standard Edition (J2SE) | Java 2 Software Development Kit Standard Edition (J2SDK, Standard Edition) | Java API for XML (JAX) | Java API for XML-based RPC (JAX-RPC) | Java archive (JAR) | Java Authentication and Authorization Service ( JAAS JAAS) | Java bean | Java class | Java client application | Java Command Language (Jacl) | Java connector development kit (JCDK) | Java Cryptography Extension (JCE) | Java Database Connectivity (JDBC) | Java Developer Connection (JDC) | Java Development Kit (JDK) | Java file | Java interpreter | Java Message Service (JMS) | Java Naming and Directory Interface (JNDI) | Java Native Interface (JNI) | Java platform | Java Profiling Agent | Java project | Java Remote Method Invocation (RMI) | Java Runtime Environment (JRE) | Java run-time environment (JRE) | Java Secure Socket Extension (JSSE) | Java transformer | Java virtual machine (JVM) | Java Virtual Machine Profiler Interface (JVMPI) | Java wrapper | JavaBeans | Javadoc | JavaGateway | JavaMail API | JavaScript | JavaServer Pages (JSP)

(E?)(L1) http://www.iwebtool.com/computer_glossary/


(E?)(L?) http://www.javacafe.at/start.htm

"Java Café" ist eine Mischung aus besten Arabica Rohkaffeesorten. Die sorgsam gerösteten, handverlesenen Arabica Bohnen erhalten in unserer Gourmet-Rösterei eine unverkennbare Note - exklusiv, edel und voll im Geschmack.

Kaffee ist mehr als ein Getränk - Kaffee bedeutet Genuss, Entspannung, Inspiration. Eine gehobene Gastronomie legt Wert auf Kaffee der Spitzenklasse. Als erfahrene Betreuer der Gastronomie haben wir uns eingehend mit den Wünschen echter Kaffeegenießer befasst. Das Ergebnis heisst "Java Café" - rein und ursprünglich wie das Paradies.


(E?)(L?) http://www.kaffeezentrale.de/d/anbau/detail.cfm?ID=518A0855-2C59-4ADB-B7005A7471CF5BD1

Indonesien
Kaffee wird im ganzen Inselstaat angebaut und "Java" steht für einen der grossen Namen des Kaffees. "Java" produziert einen aromatischen, säurearmen Kaffee, der von Natur aus mild und ausgewogen im Geschmack ist. Er ist etwas säurebetonter als Sumatra- oder Sulawesi-Kaffee und würziger im Geschmack. Die besten Plantagen sind Blawin, Jambit, Kayumas und Pankur. "Mokka Java" ist eine Mischung aus Java und jemenitischem Mokka.
...


(E?)(L?) http://java.seite.net/
ist eine Programmiersprache, die 1991 von drei Mitarbeitern der Firma SUN (Patrick Naughton, Mike Sheridan, James Gosling) für ein Handheld entwickelt wurde. Die Software zur interaktiven Steuerung elektronischer Geräte hieß ursprünglich "Oak" = ("Eiche"), nach dem Baum vor dem Fenster der Programmierer.
Aus patentrechtlichen Gründen musste 1995 ein neuer Name gesucht werden. In einer Abstimmung stehen zur Auswahl "JAVA" nach dem Haustrunk "Peet's Java-Kaffee", "Silk" und "DNA". "Java" steht in den USA umgangssprachlich auch generell für Kaffee. (Ähnlich wie Uhu oder Patex auch generell für Klebstoff benutzt wird.)
Quelle: com!online 07/2002

seite - Kaffee & Kuchen - die führende deutsche Java-Seite von Christoph Bergmann und Hannes Gamperl

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpJ,00.html
Java | Java 2 Platform, Enterprise Edition | Java 2 Platform, Micro Edition | Java archive file | Java Authentication and Authorization Service | Java Card | Java chip | Java Cryptography Extension | Java Data Objects | Java Database Connectivity | Java Development Kit | Java Foundation Classes | Java Management Extensions | Java Message Service | Java Messaging Service | Java Naming and Directory Interface | Java Online Analytical Processing | Java Ring | Java Runtime | Java Runtime Environment | Java Script | Java Server Page | Java Speech API Markup Language | Java Telephony Application Programming Interface | Java virtual machine | Javabean | JavaBeans | JavaScript | JavaScript: Learning Guide | Personal Java | PersonalJava

(E?)(L1) http://whatis.techtarget.com/file-extension-list-A/0,289933,sid9,00.html


(E?)(L?) http://de.wikipedia.org/wiki/Arabica-Kaffee

Nach der indonesischen Insel "Java" wird Arabica-Kaffee auch "Java-Bohne" genannt.


Erstellt: 2010-08

K

L

Listserv

(E?)(L?) http://www.webopedia.com/TERM/M/mailing_list_server.html
An automatic mailing list server developed by Eric Thomas for BITNET in 1986. When e-mail is addressed to a LISTSERV mailing list, it is automatically broadcast to everyone on the list. The result is similar to a newsgroup or forum, except that the messages are transmitted as e-mail and are therefore available only to individuals on the list.
LISTSERV is currently a commercial product marketed by L-Soft International. Although LISTSERV refers to a specific mailing list server, the term is sometimes used incorrectly to refer to any mailing list server. Another popular mailing list server is Majordomo, which is freeware.

M

Mainframe (W3)

(E?)(L1) http://www.vikingwaters.com/htmlpages/mainframe.htm
(E?)(L1) http://www-1.ibm.com/ibm/history/reference/glossary_m.html
Mainframe Definition
Mainframe is an industry term for a large computer, typically manufactured by a large company such as IBM or Cray for the commercial applications of Fortune 1000 businesses and other large-scale computing purposes such as global weather forecasting and scientific research.
Historically, a mainframe is associated with centralized rather than distributed computing. Today, IBM refers to its larger processors as "large servers" and emphasizes that they can be used to serve distributed users and smaller servers (often mid-frames or microprocessor machines) in a computing network.
Modern desktop machines have far more power than early mainframes. However, the mainframe manufacturers have kept pace to produce machines that do jobs their smaller brethren could never accomplish. Mainframes still house 90% of the data major businesses rely on for mission-critical applications. This is because mainframes have superior performance, reliability, scalability, and security compared to microprocessors.

mainframe: n. A computer, usually in a computer center, with extensive capabilities and resources to which other computers may be connected so that they can share facilities. Originally referred to the central processing unit of a large computer, which occupied the largest or central frame (rack).

Malware

(E?)(L?) http://www.malware.org/malware.htm
ist keine Mal-Software, sondern eine Software mit bösen Absichten
Short for malicious software. Software designed specifically to damage or disrupt a system, such as a virus or a Trojan Horse.
(vgl.auch: frz. "mal" = "Schlechtes", "Böses", "Unheil", "Schaden"

Microchip Graffiti (W3)

Der "Microchip Graffiti" ist eine kleine graphische Spielerei der Entwickler indem sie Microchips verzieren.

(E?)(L?) http://www.netlingo.com/inframes.cfm


Erstellt: 2010-04

microsoft
Batch Programs - Windows

(E?)(L?) http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/batch.mspx

Using batch files

With "batch files", which are also called "batch programs" or "batch scripts", you can simplify routine or repetitive tasks. A "batch file" is an unformatted text file that contains one or more commands and has a ".bat" or ".cmd" file name extension. When you type the file name at the command prompt, "Cmd.exe" runs the commands sequentially as they appear in the file.

You can include any command in a batch file. Certain commands, such as "for", "goto", and "if", enable you to do conditional processing of the commands in the batch file. For example, the "if command" carries out a command based on the results of a condition. Other commands allow you to control input and output and call other batch files.

The standard error codes that most applications return are "0" if no error occurred and "1" (or higher value) if an error occurred. Please refer to your application help documentation to determine the meaning of specific error codes.

For more information about batch file operations, see the following topics: For more information about commands that you can use in batch files, click a command:


Erstellt: 2012-01

microsoft
Command-line Reference - Windows

(E?)(L?) http://technet.microsoft.com/de-de/library/cc754340(WS.10).aspx

Letzte Aktualisierung: Oktober 2010

Betrifft: Windows 7, Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, Windows Server 2008 R2, Windows Vista

You can use the Windows command reference to familiarize yourself with new and enhanced command-line tools, to learn about the command shell, and to automate command-line tasks by using batch files or scripting tools.

The following sections contain information about the syntax and usage of the command line tools.


(E?)(L?) http://technet.microsoft.com/de-de/library/cc772390(WS.10).aspx

A-Z List
Letzte Aktualisierung: Oktober 2010
Betrifft: Windows 7, Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, Windows Server 2008 R2, Windows Vista

Alphabetical listing of commands:

| Adprep | Append | Arp | Assoc | At | Attrib | Auditpol | Autochk | Autoconv | Autofmt | Bcdedit | Bitsadmin | Bootcfg | Break | Cacls | Call | Cd | Certreq | Certutil | Change | Chcp | Chdir | Chglogon | Chgport | Chgusr | Chkdsk | Chkntfs | Choice | Cipher | Clip | Cls | Cmd | Cmdkey | Color | Comp | Compact | Convert | Copy | Csvde | Date | Dcdiag | Dcpromo | Defrag | Del | Dfscmd | Dir | Dirquota | Diskcomp | Diskcopy | Diskedit | DiskPart | DiskRAID | Diskshadow | Dnscmd | Doskey | Driverquery | Dsacls | Dsadd | Dsamain | Dsdbutil | Dsget | Dsmgmt | Dsmod | Dsmove | Dsquery | Dsrm | Echo | Edit | Endlocal | Erase | Eventcreate | Exit | Extract | Fc | Filescrn | Find | Findstr | Flattemp | For | Forfiles | Format | Freedisk | Fsutil | Ftp | Ftype | Goto | Gpresult | Graftabl | Hashgen | Help | Icacls | If | Ipconfig | Irftp | Klist | Ktmutil | Ktpass | Label | Ldifde | Ldp | Logman | Logoff | Lpq | Lpr | mapadmin | Md | Mkdir | Mklink | Mode | More | Mount | Mountvol | Move | Msdt | Msg | Msiexec | Msinfo32 | Mstsc | Netdom | Netsh | Net computer | Net group | Net localgroup | Net print | Net user | Nfsadmin | Nfsshare | Nfsstat | Nlb | Nltest | Nslookup | Ntbackup | Ntdsutil | Openfiles | Path | Pause | Perfmon | Popd | Print | Prncnfg.vbs | Prndrvr.vbs | Prnjobs.vbs | Prnmngr.vbs | Prnport.vbs | Prnqctl.vbs | Prompt | Pubprn.vbs | Pushd | Qappsrv | Qprocess | Query | Quser | Qwinsta | Rasdial | Rcp | Rd | Rdpsign | Reagentc | Recover | Redircmp | Redirusr | Reg | Regsvr32 | Relog | Rem | Ren | Rename | Repadmin | Replace | Reset session | Rmdir | Robocopy | Rpcinfo | Rsh | Runas | Rundll32 | Rwinsta | Sc | Schtasks | Servermanagercmd | Set | Setlocal | Setspn | Setx | Shadow | Shift | Showmount | Shutdown | Sort | Start | Storrept | Subst | Systeminfo | Takeown | Taskkill | Tasklist | Telnet | Tftp | Time | Timeout | Title | Tlntadmn | Tracerpt | Tree | Tscon | Tsdiscon | Tskill | Tsprof | Type | Typeperf | Umount | Ver | Verify | Vol | Vssadmin | Waitfor | Wbadmin | Wdsutil | Wecutil | Wevtutil | Where | Whoami | Winsat | Wmic | Xcopy


Erstellt: 2012-01

Moore's Law, Moores Gesetz (W3)

"Moore's Law" trägt den Namen von "Gordon Moore", einem der Gründer von INTEL. Am 19.April 1965 prognostizierte er in einem Artikel, daß sich die Vielzahl der Transistoren auf einem Chip etwa alle zwei Jahre verdoppelt.

Bisher liegt er mit seiner Vorhersage ganz gut: waren es 1976 2.300 Transistoren auf 12mm**2 so waren es 2005 592Mio. auf 432mm**2.

Moores Gesetz besagt dass sich die Packdichte der Transistoren auf einem Mikroprozessor - und damit die Leistung gemessen in MIPS - alle 18 Monate verdoppelt.

Gordon "Moore" war ein Mitbegründer von Intel, der diese These aufstellte.

(E?)(L?) http://news.com.com/FAQ+Forty+years+of+Moores+Law/2100-1006_3-5647824.html?=tag=3Dnl
(E?)(L?) http://www.computerwoche.de/index.cfm?pageid=254&artid=55740
(E?)(L?) http://beat.doebe.li/
(E?)(L?) http://www.golem.de/0504/37475.html
(E?)(L?) http://www.heise.de/newsticker/data/jk-11.02.03-000/
(E?)(L?) http://www.intel.com/pressroom/kits/bios/moore.htm
(E?)(L?) http://www.intel.com/research/silicon/mooreslaw.htm
Includes Moore's original paper, a comparison of transistors on Intel processors from 1971 through 2003, and related material.

(E3)(L1) http://www.jargon.net/jargonfile/
(E?)(L?) http://www.owad.de/
Moore's Law (2000-02-08)
(E3)(L1) http://www.webopedia.internet.com/TERM/M/Moores_Law.html
(E3)(L1) http://www.webopedia.com/quick_ref/bios/m.asp
(E?)(L?) http://en.wikipedia.org/wiki/Moore's_Law
(E?)(L?) http://en.wikipedia.org/wiki/Gordon_Moore

Moore is widely known for "Moore's Law," in which he predicted that the number of transistors the industry would be able to place on a computer chip would double every couple of years. In 1995, he updated his prediction to once every two years. While originally intended as a rule of thumb in 1965, it has become the guiding principle for the industry to deliver ever-more-powerful semiconductor chips at proportionate decreases in cost.

Moore's Law soll noch 20 Jahre Gültigkeit behalten ... - ... meint zumindest Gordon Moore selbst

Vor 40 Jahren formulierte Intel-Mitbegründer "Gordon Moore" seine als "Moore's Law" bekannt gewordene Theorie, nach der sich die Zahl der Transistoren auf einem Halbleiter alle 18 Monate verdoppeln lässt. Nun bekräftigte Moore diese Aussage im Rahmen einer Telefonkonferenz.


Moore'sches Gesetz (W3)

Im Jahr 1968 stellte Gordon Moore das Gesetz auf, dass sich die Komplexität von Mikrochips alle zwölf bis achtzehn Monate verdoppelt.

(E?)(L?) http://de.wikipedia.org/wiki/Mooresches_Gesetz

Das mooresche Gesetz (englisch "Moore's law"; deutsch „Gesetz“ im Sinne von „Gesetzmäßigkeit“) sagt aus, dass sich die Komplexität integrierter Schaltkreise mit minimalen Komponentenkosten regelmäßig verdoppelt; je nach Quelle werden 12 bis 24 Monate als Zeitraum genannt.

Unter Komplexität verstand Gordon Moore, der das Gesetz 1965 formulierte, die Anzahl der Schaltkreiskomponenten auf einem Computerchip. Gelegentlich ist auch von einer Verdoppelung der Integrationsdichte die Rede, also der Anzahl an Transistoren pro Flächeneinheit. Dieser Technologiefortschritt bildet eine wesentliche Grundlage der „digitalen Revolution“.

Ursprünglich sprach Moore selbst von einer jährlichen Verdoppelung, korrigierte 1975 jedoch seine Angabe auf eine Verdoppelung alle zwei Jahre (siehe auch Wirth’sches Gesetz). Moores damaliger Intel-Kollege David House brachte 18 Monate als Abschätzung ins Spiel, was heute die verbreitetste Variante des mooreschen Gesetzes ist und auch den Rahmen bildet, an dem die Halbleiterindustrie ihre Entwicklungspläne auf mehrere Jahre hinaus festmacht. Real verdoppelt sich die Leistung neuer Computerchips im Mittel etwa alle 20 Monate.

Auf Intels Entwicklerforum (IDF) im Herbst 2007 sagte Moore das Ende seines Gesetzes voraus: Es werde wahrscheinlich noch 10 bis 15 Jahre Bestand haben, bis eine fundamentale Grenze erreicht sei. Allerdings prognostizierte Pat Gelsinger, Chef der Digital-Enterprise-Sparte von Intel, bereits ein halbes Jahr später, dass das mooresche Gesetz noch bis 2029 Gültigkeit behalten würde. Im Oktober 2009 erklärte Martin Strobel in seiner Funktion als Pressesprecher von Intel Deutschland im Detail, weshalb man zuversichtlich sei, „das mooresche Gesetz noch eine ganze Weile erfüllen zu können“.

Inhaltsverzeichnis ...


(E1)(L1) http://ngrams.googlelabs.com/graph?corpus=8&content=Moore'sches Gesetz
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

Dt. "Moore'sches Gesetz" taucht in der Literatur nicht signifikant auf.

(E?)(L?) http://corpora.informatik.uni-leipzig.de/


Erstellt: 2013-03

MUD (W3)

(E?)(L?) http://www.apocalypse.org/pub/u/lpb/muddex/mudline.html
Eine kleine Wortgeschichte zu "MUD" findet sich in "Language and the Internet" von David Crystal, Cambridge. Ich versuche die Ausführungen möglichst sinngemäss zusammenzufassen.

"MUD" entstand zunächst als Acronym aus "Multi-User Dingeon" einem der ersten führenden Fantasy-Rollenspiele in den 1970er Jahren, die durchaus heute noch gespielt werden (Dungeons and Dragons (TM)). "MUD" hat dann teilweise seine Rolle als Abkürzung verloren und wurde bzw. wird auch als "Mud" oder "muds" in Wortkombinationen benutzt.
Heute wird "MUD" oft auch mit "Multi-User Dimension" widergegeben, um von dem Image als Monsterspiele weg zu kommen.
Aus der Abkürzung "MUD" entstanden dann Derivate wie "LPMUD" für "MUDs", die mit LPC, einer bestimmten Programmiersprache, geschrieben wurden (auch interessant: entwickelt vom schwedischen Wissenschaftler "Lars Pensjö"). Daneben gab es "DikuMUD" ("Datalogistik Institute Kobenhavns Universitet") oder "TinyMUD" wegen seines geringeren Programmieraufwandes auf Grund anderer Techniken.

Interessant ist, dass sich daraus dann (sprach-)spielerische Ableitungen wie "MUCK" und "MUSH" gebildet haben, die erst im Nachhinein mit z.B. "Multi-User Shared Hallucination" interpretiert wurden.

David Crystal führt noch einige weiter Ableitungen auf die mittlerweile mit "MU*" zusammengefasst werden. (Der "*" steht hier für beliebige Buchstabenerweiterungen.) Ein Beispiel ist auch die Acronym-Hierarchie "MOO" = "MUD Object Orientated", woraus sich wieder viele Ableitungen gebildet haben.

Viele weiter Informationen und Links findet man unter http://www.apocalypse.org/pub/u/lpb/muddex/

MVS
Multiple Virtual Storage (W3)

(E?)(L1) http://search390.techtarget.com/sDefinition/0,,sid10_gci212618,00.html
"MVS" = "Multiple Virtual Storage" is the operating system from IBM that is installed on most of its mainframe and large server computers. "MVS" has been said to be the operating system that keeps the world going. The payroll, accounts receivable, transaction processing, database management, and other programs critical to the world's largest businesses are usually run on an MVS system. Although MVS tends to be associated with a monolithic, centrally-controlled information system, IBM has in recent years repositioned it as a "large server" in a network-oriented distributed environment, using a 3-tier application model.
...

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpM,00.html
MVS

mudconnect
History of MUDs

(E?)(L?) http://www.mudconnect.com/mud_intro.html


N

nanoacre (W3)

Engl. "nanoacre" = dt. "Mini-Acker", setzt sich zusammen aus griech. "nãnos" = dt. "Zwerg" und engl. "Acre" = 4047 qm. Es wird im Jargon der Informatiker jedoch im übertragenen Sinn verwendet.

(E?)(L?) http://www.catb.org/jargon/html/go01.html
(E3)(L1) http://www.jargon.net/jargonfile/n/nanoacre.html

"nanoacre": A unit (about 2 mm square) of real estate on a VLSI chip. The term gets its giggle value from the fact that VLSI nanoacres have costs in the same range as real acres once one figures in design and fabrication-setup costs.


Erstellt: 2010-11

NanoBoard (W3)

(E?)(L?) http://www.webopedia.com/TERM/N/NanoBoard.html

...
"NanoBoard" is a registered trademark of Altium Limited.
...


Erstellt: 2010-11

nanocomputer (W3)

Engl. "nanocomputer" = dt. "Mini-Computer", setzt sich zusammen aus griech. "nãnos" = dt. "Zwerg" und engl. "computer" für "Rechner".

(E?)(L?) http://www.catb.org/jargon/html/go01.html
(E6)(L?) http://www.homecomputermuseum.de/comp/333_de.htm
SGS-ATES - Modell: Nanocomputer Training System NBZ80-S, ab 1979

(E3)(L1) http://www.jargon.net/jargonfile/t/TheJargonLexicon.html
(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpN,00.html
(E?)(L1) http://www.webopedia.com/Computer_Science/Pervasive_Computing
(E?)(L1) http://www.webopedia.com/Computer_Science/Nanotechnology


Erstellt: 2010-11

Nanolithography (W3)

Engl. "Nanolithography", setzt sich zusammen aus griech. "nãnos" = dt. "Zwerg", griech. "líthos" = dt. "Stein", "Felsen" und griech. "gráphein" = dt. "kerben", "ritzen", "schreiben". Die "Nanolithography" kommt bei der Herstellung von Nanocomputern zum Einsatz.

(E?)(L?) http://www.nanoproducts.de/index.php?mp=info&file=nanotechnologieglossar
Dip Pen Nanolithography

(E?)(L?) http://www.oqlf.gouv.qc.ca/ressources/bibliotheque/dictionnaires/terminologie_nanotechnologie/anglais.html
dip pen nanolithography | nanolithography

(E?)(L?) http://www.techportal.de/de/26/2/lexikon,public,lexilist,0/
Dip Pen Nanolithography (DPN)

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpN,00.html
(E?)(L?) http://whatis.techtarget.com/definition/0,,sid9_gci515046,00.html
(E?)(L1) http://www.webopedia.com/TERM/N/nanolithography.html


Erstellt: 2010-11

Nerd (W3)

Die Bezeichnung "Nerd" könnte auf eine Zeile in dem Buch "If I Ran the Zoo" (1950), von Dr. Seuss zurückgehen. Dort heißt es: "And then, just to show them, I'll sail to Ka-Troo / And Bring Back an It-Kutch, a Preep and a Proo, / A Nerkle, a Nerd, and a Seersucker, too!". Um 1970 scheint es dann in die Welt ausgebrochen zu sein. Während es Mitte der 1960er jahre noch die Bedeutung "annoying misfit", dt. "lästiger Außenseiter", erhielt es später eine positive Wendung hin zu einem "Intelligenzbolzen", allerdings mit dem Beigeschmack (Konnotation) "Fachidiot".

(E?)(L?) http://www.insecure.org/stf/hackenc.txt

...
"NERD" - Derogatory term for a "computer geek"; has been adopted as a badge of honor for some. Reminds that no matter how cool the stuff we do with computers is, we're still geeks, so get over it.

[I just looked up the etymology of the word "nerd" in the dictionary, and my main conclusion was that etymologists must have a lot of spare time on their hands, because apparently there's this huge controversy over where this word came from, and the earliest reference is in a Dr. Seuss book, and then it became a slang term in the 1950s, and some people say it's a coincidence and others say there's some complicated relation, and all I can say is that it's just not that important, but these etymologists have enough time to learn UNIX security, and if they'd just read some books on TCP/IP, they could probably be really good hackers. Suggestion - if any evil foreign governments out there want to hire some people to train to be hackers, get etymologists. They have tolerance for the tremendously boring. That is all. End rant.]
...


(E3)(L1) http://www.jargon.net/jargonfile/n/nerd.html
(E?)(L?) http://www.pbs.org/opb/nerds2.0.1/
PBS's Nerds 2.0.1 - A follow-up to the original

NERO burning ROM (W3)

(E?)(L?) http://www.nero.com/de/recorder.htm
Der Name des CD-ROM-Brennprogramm spielt an auf den römischen Kaiser "Nero", der (vermutlich) "Rom" in Brand setzen liess, um Platz für neue Prachtbauten zu schaffen.

Auf der angegebenen Seite findet man Informationen über die von der aktuellen InCD Version unterstützen CD-Brenner.

Netiquette, Netikette, Etikette

(E?)(L?) http://www.albion.com/netiquette
(E?)(L?) ftp://ftp.isi.edu/in-notes/rfc1855.txt
(E?)(L?) http://www.chemie.fu-berlin.de/outerspace/netnews/netiquette.html
(E?)(L?) http://www.faqs.org/
(E?)(L?) http://www.ping.at/guides/netmayer/
Ein typischer Begriff der Cyberlanguage ist "Netiquette" als wortspielerische Bildung aus "Net" und "Etiquette", "the do's and don'ts of online communication".

"Netikette" setzt sich zusammen aus "Net" = "Netz", "Internet" und "Etikette".

Die "Etikette", die "festgelegten Umgangsformen" haben die gleiche Quelle wie "das Etikett" zur "Preisauszeichnung". Die Umgangsformen am französischen Hof waren auf Handzetteln schriftlich festgelegt. Und so übertrug sich die Bezeichnung für "die an einem Pfahl festgesteckte Markierung" auf die dort festgelegten Anstandsregeln.

Hiermit steht auch das frz. "estiquer" = "feststecken" und eben auch das dt. "stecken" in Zusammenhang. Auch engl. "sticker", das nicht nur "Aufklebezettel" sondern auch "Schlachter", "Dorn" und "Stachel" bedeuten kann, gehört zu dieser Wortgruppe.

Die "Netiquette Guidelines" werden in einem RFC beschrieben:
This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

New White Cluster Moss - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=31571


(E?)(L?) http://www.welt-der-rosen.de/duftrosen/moosrose.htm

Quatre Saisons Blanc Mousseux, Perpetual White Moss, Rosier de Thionville, New White Cluster Moss, Laffay (FR) 1835 Bemooste Damascena-Hybride, Alte Rose weiß remontierend (der Name "Quatre Saisons" = "Vier Jahreszeiten"- ist von daher übertrieben), sehr starker Duft


NT

hat seinen Ursprung in VMS. Eine Entwicklungstruppe bei DEC machte den Versuch, das VMS-Betriebssystem für den PC umzuschreiben. DEC stoppte das Projekt und Microsoft übernahm die Entwicklertruppe. WINDOWS/NT war geboren. (googeln: "vms dec nt")

O

P

PC - Personal Computer (W3)

(E?)(L?) http://www.wikipedia.org/wiki/personal_computer


PC
Personal Computer
AT
Advanced Technology (W3)

(E?)(L?) http://www.geschichte-des-computers.de/pc.php
Die Begriffe "Personal Computer" und die Kurzform "PC" kamen in den 1980er Jahren auf. 1981 stieg IBM in den Markt der Kleincomputer ein und nahm INTEL und Microsoft als Partner auf.

Einige Jahre bei allen PC-Besitzern in aller Munde, aber heute schon wieder vergessen war die Bezeichnung "Advanced Technology" und die Kurzform "AT".

Erstellt: 2013-01

Pink Cluster (Hybrid Musk, Harris, 1997) - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=37386
(E?)(L1) http://www.rogersroses.com/gallery/chooserResult.asp


Pink Cluster (Floribunda, Morse, 1938) - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose
(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=12027


patch pumpkin, pumpkin holder, pumpking (W3)

Der Ausdruck entstand in der Perl Entwicklergemeinschaft. Er geht zurück auf einen Plüsch-Kürbis, der einmal in einer Entwicklerrunde umging und an den gewisse Zugriffsrechte geknüpft waren. Derjenige, der gerade im Besitz des "patch pumpkin" ist, ist der "pumpkin holder".

Der Inhaber des "patch pumpkin" wird auch "pumpking" genannt.

(E?)(L?) http://www.catb.org/jargon/html/P/patch-pumpkin.html
(E?)(L?) http://www.catb.org/jargon/html/P/pumpkin-holder.html
(E?)(L?) http://www.catb.org/jargon/html/P/pumpking.html
(E?)(L?) http://jargonf.org/wiki/pumpking


PQI (W3)

"PQI" steht für "Drive image file (PowerQuest)".

(E?)(L1) http://whatis.techtarget.com/file-extension-list-A/0,289933,sid9,00.html
(E?)(L1) http://whatis.techtarget.com/file-extension/PQI-FileFormat.html


Erstellt: 2010-02

prompt (W3)

(E?)(L?) http://webopedia.com/TERM/p/prompt.html
Ein "Prompt" ist eine Meldung des Computers, die anzeigt, dass eine Usereingabe notwendig ist. Man kann auch öfters hören, dass jemand "gepromptet" wurde, im Sinne von "aufgefordert werden".

Das Wort gibt es auch als frz. "prompt" = "schnell" und ist wahrscheinlich von dort nach Deutschland und England gewandert. Es lässt sich weiter zurückverfolgen bis zu lat. "promptus" = "bereit" und lat. "promere" = "hervorholen".

Q

R

raster blaster (W3)

Der "Ghetto Blaster", der anscheinend mit Bezug auf viele seiner Besitzer auch "Rasta Blasta" (für "Rastafari Blaster") genannt wird. Und in der Informatik handelt es sich - soweit ich es verstehen konnte - anscheinend um einen Chip, der speziell bei der Verarbeitung von Bildern eingesetzt wird (vgl. das aus Druckverfahren und Fotografie stammende "Bild-Raster").

(E?)(L?) http://www.catb.org/jargon/html/go01.html
(E3)(L1) http://www.jargon.net/jargonfile/r/rasterblaster.html

"raster blaster" /n./ [Cambridge] Specialized hardware for bitblt operations (a blitter). Allegedly inspired by "Rasta Blasta", British slang for the sort of portable stereo Americans call a "boom box" or "ghetto blaster".


Erstellt: 2010-09

RISC (W3)

Ein weiterer wichtiger (aber schon wieder vergessener) Begriff aus der PC-Geschichte ist "RISC". Es bezeichnete eine Technologie, die mit einem auf das notwendige reduzierten Befehlssatz auskam, den "Reduced Instruction Set Computer".

Der erste "RISC-Computer" (eigentlich sollte "RISC" ja ausreichen) wurde 1986 auf der CeBIT von IBM vorgestellt. Heute interessieren derartige Einsparungen nicht mehr.

(E?)(L?) http://www.geschichte-des-computers.de/pc.php


(E?)(L?) http://www.ibm.com/ibm100/us/en/icons/

Featured: July 20, 2011 RISC Architecture RISC Architecture

The first prototype computer employing RISC (reduced instruction set computer) architecture was developed at IBM in 1980. By allowing commands to access previously unused memory space, RISC enabled computers to work approximately twice as fast as other machines on the same number of circuits. RISC was an important innovation in system design because it eliminated wasted space in the information pipeline, and was widely viewed as the dominant computing architecture of the future. Its creator, John Cocke, received for his efforts the US National Medal of Science (1994) and the US National Medal of Technology (1991).


(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp

reduced instruction set computer (RISC) | RISC


(E?)(L1) http://www.iwebtool.com/computer_glossary/


(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpR,00.html

RISC | second generation RISC


Erstellt: 2013-01

ROM (W3)

"ROM" steht für "Read Only Memory".

(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
CD-ROM (compact disc-read-only memory) | read-only memory (ROM) | ROM

(E?)(L1) http://www.iwebtool.com/computer_glossary/
CD-ROM | ROM

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpC,00.html
CD-ROM | CD-ROM XA | CDROM | electrically erasable programmable ROM | EEPROM | EPROM | HD-ROM | PROM | ROM

(E6)(L1) http://whatis.techtarget.com/fileFormatA/0,289933,sid9,00.html
ROM

(E?)(L?) http://www.wasistwas.de/
Für was steht die Abkürzung ROM?

Royal Cluster - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose


(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=38272
(E?)(L?) http://www.rosenwiki.de/index.php/Spezial:Alle_Seiten
(E?)(L?) http://www.rosenwiki.de/index.php/Kategorie:Multiflora-Hybride


S

scientificamerican

(E?)(L?) http://www.scientificamerican.com/article.cfm?articleID=00048144-10D2-1C70-84A9809EC588EF21&catID=2
Ein Artikel von Tim Barnes-Lee über das semantische Web;

setgamma.exe (W3)

Die Bezeichnung dieser ausführbaren Datei als "setgamma.exe" beruht auf ihrer Anwendung im Bereich der graphischen Darstellung.

(E6)(L?) http://www.tasklist.org/task_setgamma_exe_1167.html

Part of the RadeonTweaker program for adjusting ATI Radeon graphics cards. Allows you to adjust the gamma (or brightness) when playing a full-screen game without switching back to the desktop


shortcut, short cut (W3)

Ein "shortcut" ist allgemein eine "Abkürzung", wörtlich "kurzer Schnitt".

In der Computerwelt bezeichnet "Shortcut" oder "short cut" Tastenkombinationen, um bestimmte Funktionen auf schnellem Weg (auch ohne Maus/Mouse) aufzurufen.

ETYMOLOGY: From "cut" = "direct route".

(E?)(L?) http://www.etymonline.com/index.php?search=short+cut&searchmode=none

...
"Short cut" is from 1568.
...


Das besondere an dieser Seite ist, dass man die Bezeichnungen für die "Kurzwahltasten" in mehreren Sprachen angegeben sind.

(E?)(L?) http://www.eulanda.de/inside/bedienerhandbuch/anhang/shortcuts/Default.htm

Die Warenwirtschaft EULANDA® unterstützt zur direkten Ansteuerung von Funktionen "Kurztasten" (= "Shortcuts"). Diese Tastenbezeichnungen sind in den verschiedenen Sprachen und Ländern unterschiedlich bezeichnet. Diese Tabelle listet die Kurztasten für die unterstützten Sprachen auf.

ENGLISH | CHINESE GB | DUTCH | FRENCH | GERMAN
...


(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
keyboard shortcut | shortcut bar | shortcut key

(E?)(L?) http://dictionary.reference.com/
(E?)(L?) http://www1.seslisozluk.com/?word=short cut

2. A "short cut" is a quicker way of getting somewhere than the usual route.


(E?)(L1) http://whatis.techtarget.com/definition/0,,sid9_gci1076600,00.html

keyboard shortcut
A "keyboard shortcut" is a combination of keys that, when pressed simultaneously, perform some task that ordinarily requires use of a mouse or other input device and may take longer to do. In Windows XP, for example, pressing "Control-Alt-Delete" will bring up the task manager utility for application and system monitoring and control. Other popular keyboard shortcuts include "Control-C" (copy), "Control-P" (print), "Control-V" (paste), "Control-X" (cut), and "Control-Z" (undo).


(E?)(L1) http://whatis.techtarget.com/definition/0,,sid9_gci212981,00.html

shortcut
In general, a "shortcut" is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the regular operation. In Windows 95 and later operating systems, a "shortcut" is a computer desktop icon that enables a user to easily see and select a particular program or data object. The operating system comes with some shortcuts already visible on the desktop. A user can remove these or add new ones.

To create a shortcut in Windows 95 or 98, click on My Computer, then click on your "C" drive (or other drive where your files may be). Find the folder or file that you want to put on your desktop, click on it with the right mouse button, and select Create Shortcut from the pop-up menu. A new icon will now appear in My Computer. Hold the left mouse button down and drag the new icon to your desktop (you may need to minimize the My Computer window to do this). Now your new file or program will always be visible for quick selection on your desktop without having to go through Start menus or the Windows file manager.

In the Macintosh operating system, a shortcut is called an "alias".


(E?)(L?) http://de.wikipedia.org/wiki/Shortcut


Software (W3)

(E?)(L?) http://www.webopedia.com/TERM/S/software.html


SPOF - single point of failure (W3)

a generic phrase for any component of a system that upon failure will cause a malfunction in the entire system. A SPOF can be a hardware or electrical component or a software component.

SPOOL, spool file, Drucker-Spooling, Spooler, Spooling (W3)

(E?)(L1) http://www.anglizismenindex.de/
(E?)(L1) http://www.archmatik.de/
(E1)(L1) http://www.etymonline.com/s10etym.htm
(E3)(L1) http://www.jargon.net/jargonfile/s/spool.html
(E3)(L1) http://www.jargon.net/jargonfile/s/spoolfile.html
In der Datenverarbeitung wird oftmals von einem "Spool" gesprochen. Dies ist ein Zwischenspeicher z.B. in Magnetplattenspeichern. Lange Zeit dachte ich es handelt sich dabei um eine Wort "spool" = dt. "Spule". Da ja in früheren Zeiten Speicher in Form von Magnetspulen realisiert wurden. Dann entdeckte ich jedoch irgendwann, dass es eine Abkürzung ist und für "Serial Peripheral Operations OnLine" = "serielle Online-Ein-/Ausgabe-Operationen" steht.
Allerdings ist nicht auszuschliessen, dass dieses Kunstwort bewusst in Anspielung auf diese Historie gebildet wurde.

Aus dieser zum Wort gewordenen Abkürzung sind dann natürlich weitere Ableitungen gebildet worden. Das Verb engl. "spool" = dt. "spoolen" und engl. "spooling" und "Spooler".

In der Anglizismenliste des VDS wird "spool" mit "Warteschlange" übersetzt.

Als "Spooling" bezeichnet man die Technik, die Daten zwischenspeichert. Beispiel: In einem UUCP-Netz geschieht die Übertragung der Aufträge bzw. Files meistens asynchron, d. h. die Files müssen zwischengespeichert werden. (siehe auch Drucker-Spooling)

SQL - structured query language

(E?)(L?) http://www.webopedia.com/
SQL is a standardized query language for requesting information from a database. The original version called SEQUEL (structured English query language) was designed by an IBM research center in 1974 and 1975. SQL was first introduced as a commercial database system in 1979 by Oracle Corporation.
Historically, SQL has been the favorite query language for database management systems running on minicomputers and mainframes. Increasingly, however, SQL is being supported by PC database systems because it supports distributed databases (databases that are spread out over several computer systems). This enables several users on a local-area network to access the same database simultaneously.
Although there are different dialects of SQL, it is nevertheless the closest thing to a standard query language that currently exists. In 1986, ANSI approved a rudimentary version of SQL as the official standard, but most versions of SQL since then have included many extensions to the ANSI standard. In 1991, ANSI updated the standard. The new standard is known as SAG SQL.

Strg-Alt-Entf
Steuerung-Alt-Entfernen (W3)

(E?)(L?) http://www.heute.t-online.de/ZDFheute/artikel/21/0,1367,COMP-0-2100341,00.html
Erfinder von "Steuerung-Alt-Entfernen" geht in Rente - David Bradley räumt Büro bei IBM

Der Programmierer geht in Rente, sein Programm bleibt aber weiter der Rettungsanker bei alltäglichen PC-Abstürzen: David Bradley, Erfinder des wohl weltweit bekanntesten Tastaturbefehls "Steuerung-Alt-Entfernen", verlässt am Freitag, den 30. Januar 2004, seinen Arbeitsplatz beim PC-Hersteller IBM.
...

Was wäre Bill Gates wohl ohne David Bradley?

Erstellt: 2013-01

stuhenderson
MVS-Themen

(E?)(L?) http://www.stuhenderson.com/XMVSTRND.HTM
Since the 1960's, IBM's "MVS" operating system, or some version of it, has been the predominant system software for IBM's family of mainframe computers. MVS has been the environment for which the best-known and most widely used security products have been developed, and it has influenced our thinking about security for all computer systems. But MVS security is not a static concept; it is a moving target on which security product vendors and infosecurity professionals must keep focused. Data security officers need to understand the history of MVS security, and they should be aware of the recent developments.
Weitere Abkürzungen, die in diesem Dokument vorkommen:

Hier findet man auch einen Abschnitt: "MVS History: Security Through Hardware".

Suncluster (KORgrapet) - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose


(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=22806


T

tecchannel
Codenamen im Ueberblick

(E?)(L1) http://www.tecchannel.de/server/prozessoren/402091/entschluesselt_codenamen_im_ueberblick/

Ob Intel, ATI oder Microsoft, alle geben zukünftigen Produkten während der Entwicklung erst einmal einen Codenamen. Wir zeigen, wer und was hinter den teils merkwürdigen Namen steckt.
VON MIKE HARTMANN UND CHRISTIAN VILSBECK
Ob klangvolle Bezeichnungen wie "Montecito", biblische Namen wie "Isaiah" oder schlichte Modellnummern wie "R423", jeder Hersteller hat seine eigenen Vorlieben, mit denen er seine Produkte während der Entwicklungsphase belegt. Manchmal darf der Chefentwickler seiner Lieblingskneipe zu Ruhm und Ehre verhelfen, manchmal wird einfach nur lieblos durchnummeriert.
Doch während der Hersteller seine eigenen Codenamen leicht im Griff behält, verliert ein Außenstehender schnell den Überblick. Daher haben wir auf den folgenden Seiten die wichtigsten Codenamen zusammengestellt. Sortiert nach Gattungen und Herstellern finden Sie die technischen Spezifikationen und die geplanten Erscheinungstermine der zugehörigen Produkte. Wo es sinnvoll ist, bieten wir Ihnen auch Links zu weiter führenden Beiträgen.


Auf den darauf folgenden Seiten findet man einige allgemeine Hinweise zur Namensgebung der einzelnen Firmen und die Codenamen (22.11.2004):

techtarget
Computing-Dictionary
Internet-Dictionary
IT-Definitions
IT Encyclopedia
Informatik-Lexikon
IT-Lexikon
Etymologie-Suche
Etymology-Search

Die Site "www.whatis.com" wird automatisch auf die Site "whatis.techtarget.com" umgeleitet.

Definitions for thousands of the most current IT-related words. - englisch, Software, Hardware
Was ist z.B. ein "patch"?

In der riesigen "WhatIs"-Liste von Techtarget muß man zwar lange suchen, aber zu einigen Begriffen aus der Internet- und Computer-Szene kann man hier auch Wortgeschichten finden.

Man findet hier neben der umfangreichen Enzyklopädie mit Begriffen aus der Informationstechnik auch "Guides and Tutorials" über verschiedenen Themengebiete (mit jeweils mehreren Beiträgen), wie etwa:

(E?)(L1) http://whatis.techtarget.com/
(E?)(L?) http://www.whatis.com/

IT-specific encyclopedia, definitions for thousands of the most current IT-related words, plus fast references: every file format in the world, chat acronyms, plus, plus ...
Definitions for thousands of the most current IT-related words.


(E?)(L1) http://whatis.techtarget.com/definition/0,,sid9_gci532335,00.html
Backup and Recovery | Business Intelligence | Compliance | Computing Fundamentals | CRM | Data Management | Databases | Electronics | Hardware | Internet | iSeries | Learning and Careers | Messaging and E-Mail | Multimedia & Graphics | Networking | Open Source | Operating Systems | Oracle | Personal Computing | Programming | SAP | Security | Storage | Virtualization | Voice over IP (VoIP) | Wireless & Mobile

Die Begriffs-Definitionen in der IT-Enzyklopädie enthallten oftmals auch Erklärungen zum Hintergrund der Begriffsbildung oder zumindest Erklärungen zu vielen Akronymen der IT-Welt. Und wenn beides nicht zutrifft, so handelt es sich doch immerhin noch um eine grosse Sammlung von Neologismen die im Zusammenhang mit Computerei und Internet in den letzten 30 Jahren das Licht der IT-Welt erblickt haben.

In der Enzyklopädie waren am 27.04.2007 folgende Begriffe zu finden:

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpA,00.html
Alphabetical: A - 500 terms

A Programming Language | A+ | A-Law | A-Plus | A-weighted decibels | A.I. | a2b | AA | AAA | AAA server | AARP | AAUI | abacus | abampere | abandonware | ABAP | ABAP Objects | ABAP Workbench | ABBH | ABCD | ABCD data switch | abcoulomb | abend | abfarad | abhenry | abohm | absiemens | absolute truth | absolute value | Abstract Syntax Notation One | Abstract Window Toolkit | abstraction | abvolt | abwatt | AC | AC-3 | Accelerated Graphics Port | Accelerated Hub Architecture | Accelerated SAP | AcceleratedASP | | accelerator | acceptable use policy | access | access control list | access log | access method | access point | access point mapping | access provider | access time | accessability | ACD | ACF2 | ACH | ACID | ACK | ACL | ACM | acoustic coupler | acoustic wave | ACPI | ACR | Acrobat | acronym | acronyms used in online chatting | Acrylic | ACT | ACTA | ActionScript | Active Directory | active matrix display | active network | Active Server Page | Active Template Library | ActiveX | ActiveX control | ActiveX Data Objects | ACTS | ad-hoc network | adapter | adaptive enterprise | adaptive organization | Adaptive Server Enterprise | adaptive software | adaptive technology | ADAT | ADC | add-in | add-on | address | Address Resolution Protocol | address sign | address space | addressable call endpoint | administrator code | Admiral admittance | ADO | ADPCM | ADSI | ADSL | ADSL Terminal Unit - Remote | ADSM | ADSTAR Distributed Storage Management | Advanced Backup: Storage University | Advanced Business Application Programming | Advanced Configuration and Power Interface | Advanced Encryption Standard | Advanced Function Printing | Advanced Intelligent Network | Advanced Mobile Phone Service | Advanced Peer-to-Peer Networking | Advanced Planner and Optimizer | Advanced Program-to-Program Communication | Advanced Research Projects Agency | Advanced Research Projects Agency Network | Advanced Technology Attachment | Advanced Television | Advanced Television Enhancement Forum | Advanced Television Systems Committee | advertising terminology on the Internet | adware | AES | AES/EBU | AF | AFC | affective computing | AFIS | AFM | AFS | AGate | agent | aggregate | aggregator | agile applet | agile software development | aglet | AGP | Ah | AHA | AI | AIBO | AIFF | AIM | AIN | air interface | Airborne Internet | AIT | AIX | Ajax | Ajax quiz: Do you speak Geek? | Ajax: Learning Guide | akamaize | AKO | ALE | aleph | algebraic number | alias | aliasing | alien crosstalk | All our Information Kits | All our quizzes | All our Webcasts | All our Words-to-Go | Aloha | Alohanet | Alpha | alphameric | alphanumeric | Alphanumerish | alt. | Altair | alternate newsgroup | alternating current | ALU | AM | amateur radio | Amaya | Amazon EC2 | Amazon Elastic Compute Cloud | Amazon S3 | Amazon Simple Storage Service | ambient temperature | AMD | AMD-K6 | Amdahl's law | amelioration pattern | American National Standards Institute | American Radio Relay League | American Registry of Internet Numbers | American Wire Gauge | Amiga | amount of substance | amount of substance concentration | amp hour | ampere | ampere hour | ampere per meter | ampere per meter squared | amplification factor | amplifier | AMPS | AMR | AMR slot | AMTOR | AMU | anacronym | analog | analog computing | Analog Display Services Interface | analog telephone adapter | analytical CRM | Analytical Engine | analytics | Ananova | anchor | AND | Andrew | Andrew file system | android | angle symbol | angstrom | angstrom unit | angular degree | | ANI | animated GIF | anime | anisotropic filtering | Anna | Anna Kournikova virus | annoyware | anonymizer | anonymous e-mail | anonymous FTP | anonymous Web surfing | ANSI | Ant | antenna | anthropomorphism | anti-replay protocol | anti-spam cocktail | anti-spyware software | anti-virus software | antialiasing | antidisintermediation | antiferromagnetically-coupled media | Antigen | Antikythera mechanism | antimatter | antipattern | antivirus software | any key | anycast | AoE | AOP | AP | Apache | APAR | API | APL | APO | apogee | apparent power | APPC | Apple | Apple attachment unit interface | Apple Computer | AppleScript | Appleshare | applet | AppleTalk | AppleTalk Address Resolution Protocol | appliance | appliance computing | Applicability Statement 1 | Applicability Statement 2 | applicant tracking system | application | | Application Compatibility Toolkit | Application development freeware and shareware guide | application firewall | application integration | Application layer | Application Link Enabling | application portability | application program | application program interface | application programming interface | application security | application server | application service provider | Application Service Provider Industry Consortium | application service virtualization | application virtualization | application-specific integrated circuit | approximate equality | apps-on-tap | apronym | aptent | arachniography | arachnotaxis | Archie | architecture | archival | archival data | archival storage | archive | archive of Web sites | ArchiveSink | archiving | ARCNET | area | area code | ARIN | arithmetic mean | arithmetic-logic unit | ARJ | ARM processor | Army Knowledge Online | ARP | ARQ | array | Array in a Manger: Do you speak Geek? | ARRL | artificial intellect | artificial intelligence | artificial passenger | artilect | AS | AS/400 | AS/400e | AS1 | AS2 | ASAP | ASE | ASHRAE | Asia Cellular Satellite System | ASIC | Asimov's Three Laws of Robotics | ASIO | ASN.1 | ASP | ASP .NET Ajax | ASP to ASP.NET Migration: Learning Guide | ASP+ | ASP.NET | aspect ratio | aspect-oriented programming | ASPI | ASPI driver | ASPIC | ASR | assembler | assembler language | assembly language | assistive software | assistive technology | assistive technology software | Association for Computing Machinery | ASSP | astronomical unit | astroturf marketing | astroturfing | ASUG | asymmetric | asymmetric communication | asymmetric communications | asymmetric cryptography | asynchronous | asynchronous groupware | Asynchronous JavaScript and XML | Asynchronous Pulsed Radiated Incident Light | asynchronous transfer mode | AT Attachment Packet Interface | at sign | ATA | ATA over Ethernet | ATAPI | ATE | Athlon | ATL | Atlas | ATM | atom | Atom (XML) | atomic | atomic clock | atomic data | atomic force microscopy | atomic mass unit | atomic memory | atomic storage | atomicity, consistency, isolation, and durability | ATRN | ATS | ATSC | attachment unit interface | attack vector | attempt | attenuation | attenuation-to-crosstalk ratio | attosecond | attribute | ATU-R | ATV | ATX | AU | audible ring | audio | Audio Engineers Society/European Broadcasting Union | audio frequency | audio introduction | audio noise | audio production | audio spotlight | Audio Visual Interleaved file | Audio/Modem Riser | audio/video | audit trail | auditor | Augusta Ada King, countess of Lovelace | AUI | AUP | Austrumi | authenticate | authenticated e-mail | Authenticated TURN | authentication | authentication ticket | authentication, authorization, and accounting | authorization | authorized program analysis report | auto-provisioning | auto-storage provisioning | autoexec.bat | autofax | autoloader | autoloader | automagically | Automated Best Value System | Automated Clearing House | Automated Fingerprint Identification System | automated speech recognition | automated tape library | automated test equipment | Automatic Call Distributor | automatic callback | Automatic Coin Telephone System | automatic language translation | Automatic Number Identification | Automatic Private IP Addressing | automatic repeat request | automatic storage provisioning | automatic vehicle locator | autonomic computing | Autonomic Computing: Glossary | autonomous robot | autonomous system | autonomous transaction | AutoPlay | autoresponder | AutoRun | autotrunking | AV | availability | Avalon | avatar | average | average bouncing busy hour | average handle time | AVI file | Avogadro Constant | Avoid resume blunders | AWG | awk | AWT | AXT | azimuth and elevation

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpB,00.html
Alphabetical: B - 481 terms

B | B channel | B-channel | B-tree | B2B | B2C | B2E | B2G | B8ZS | Babbage | | back door | Back Orifice | back-end | back-pressure sensor | backbone | backdoor | backhaul | backlink | backplane | backronym | backscatter | backscatter body scanning | backscatting | backside bus | backtracking | backup | Backup and recovery glossary | Backup and recovery: Do you speak geek? | Backup and recovery: Learning Guide | backup domain controller | backup on the Web | Backup School: Storage University | backup storage | backup with DAT USB | backward combatible | backward compatible | backward explicit congestion notification | backward mapping | BAL | balanced scorecard | balanced scorecard methodology | balloon for wireless | balun | BAM | band | bandpass filter | bandwidth | bandwidth test | banner | banner blindness | banner-blind | BAPI | BAPI: Learning Guide | bar | bar code | bar code reader | barcode | barcode data | barcode reader | bare metal environment | bare metal restore | barnacle | baseband | baseband video | bash | | basic input/output system | Basic Rate Interface | Basis | Basis: Learning Guide | bastion host | batch | batch file | batch job | batch processing | battery | baud | Bayesian filter | Bayesian logic | BBCs | BBS | bc set | Bcc | BCP | BDC | beaming | Bean | Bearer Independent Call Control | BECN | becquerel | BEDO DRAM | beep code | beeper | Beginners All-Purpose Symbolic Instruction Code | Bel | Bell Communications Research | Bell operating company | Bellcore | | BeOS | Beowulf | BER | Berrycasting | bespoke | best and final offer | best practice | best practices | beta | beta test | Betamax | bevel | BEx | Bezier curve | BGAN | BGAN (Broadband Global Area Network) | BGP | bi-level image | BIA | bias | BIC | BICC | bid for placement | bifurcation | Big Blue | Big Chief tablet | big-endian | big-endian and little-endian | binary | binary 8-zero substitution | binary digit | binary file | binary large object | binary prefix multipliers | Binary Runtime Environment for Wireless | binary search | binary tree | binary-safe function | bind | binder | BinHex | BioAPI | BioAPI Consortium | biochip | biochip transponder | bioinformatics | biomechatronics | biometric | Biometric Application Programming Interface (BAPI): Glossary | biometric authentication | biometric identification | biometric payment | Biometric Terms: Glossary | biometric verification | biometrics | biomimetics | biotechnology | bipolar 8-zero substitution | bipolar signaling | bipolar transistor | bipolar transmission | birdie | bis | BISDN | Bison | | BizTalk | black body | black box | black hat | black hole | black level | Black Tuesday | Blackberry | blackbody | blackbody radiation | blackhole | blackhole list | blacklist | blade PC | blade server | Blade Servers: Learning Guide | blended agent | blended attack | blended exploit | blended threat | blind courtesy copy | BLOB | block | block cipher | blog | blog dictionary | blog glossary | blog lexicon | blog terms | Blog terms: Glossary | blogging | blogging definitions | blogging terms | Blogging Terms: Glossary: Glossary | blogosphere | bloviate | Blowfish | Blu-ray | blue bomb | Blue Book | Blue Gene | blue laser | | Blue Tooth | Bluebird | BlueGene | Bluejacking | bluesnarf | bluesnarfing | BMAN | BMI | BNC | BO2K | board | BOB | BOC | Bochs | bogie | bogomips | Bohr radius | boilerplate | bolt-on | Boltzmann's constant | Bongo | bookmark | bookmark management site | bookmark portal | books (text) online | Boole, George | Boolean | | Border Gateway Protocol | bot | bot network | bot worm | bot-worm | botnet | bottleneck | botworm | Boulwarism | bounce | bounce e-mail | bounce mail | bouncing | Bourne Again Shell | Bourne shell | boustrophedon | BPCP | BPCS | BPEL | BPEL4WS | BPELWS | BPL | BPM | BPMI | BPML | BPR | bps | Braille display | Braille-ready file | brain dump | brain fingerprinting | brain machine interface | brain-computer interface | brain-dump | braindump | branch in a box | branch office box | branch-in-a-box | brand | brand spoof | brand spoofing | BRB | bread crumb trail | bread crumbing | breadcrumb trail | breadcrumbs | breathalyzer cell phone | BREW | BRI | brick server | bricks and mortar | bridge | bridge disc | bridge disk | bridge tap | brightness | British thermal unit | broad agency announcement | broadband | broadband dialup | Broadband Global Area Network | Broadband over Power Line | Broadband Over Powerline | broadband voice gateway | broadcast | broadcast flag | Broadvision | brochureware | brouter | brownfield deployment | browser hijacker | browser-safe palette | browserless Web | brute force | brute force cracking | BS 15000 | BS 7799 | BS7799 | BSA | BSB | BSD | BSM | BSP | BSRAM | BTM | BTP | Btu | BTW | bubble help | bucket brigade | buckytube | buddy avatar | buddy icon | buddy list | buffer | buffer credits | buffer flush | buffer overflow | buffer-to-buffer credits | bug | Bugbear | build | build tool | built-in obsolescence | bulk data transfer | bulletin board service | bulletin board system | Bullfighter | bump mapping | bundling | burn | burn rate | BURN-Proof | Burning Man | | burst | Burst Extended Data Output DRAM | burst SRAM | bus | bus master | bus network | Bush, Vannevar | business activity monitoring | Business Application Programming Interface | Business Configuration Set | business continuance | business continuity | business continuity plan | business impact analysis | business information center (BIC) | Business Information Warehouse | business intelligence | Business Intelligence: Learning Guide | business metric | business performance management | Business Planning and Control System | business portal | business process | business process contingency plan | Business Process Execution Language for Web Services | business process management | Business Process Management Initiative | Business Process Modeling Language | business process outsourcing | business process reengineering | business service provider | Business Software Alliance | business technology management | Business Transaction Protocol | business warehouse | business-IT alignment | business-to-business | butt splice | buzz marketing | Buzzword Alert : July 18, 2006: Buzzword | Buzzword Alert from WhatIs.com: DST patch, self-morphing Trojans, and Google Apps: Buzzword Alert | Buzzword Alert from WhatIs.com: geospatial apps, cyberbullying, SOA and agile development: Buzzword Alert | Buzzword Alert from WhatIs.com: unified communications, data deduplication, PoE, 802.11n and the Long Tail: Buzzword Alert | Buzzword Alert: Ajax, ITIL, Hyperion and quantum computers: Buzzword Alert | Buzzword Alert: August 15, 2006: Buzzword | Buzzword Alert: August 2, 2006: Buzzword | Buzzword Alert: August 22, 2006: Buzzword | Buzzword Alert: August 30, 2006: Buzzword | Buzzword Alert: August 8, 2006: Buzzword | Buzzword Alert: CES, OS X, WAN optimization and full disk encryption (FDE): Buzzword Alert | Buzzword Alert: Crowdsourcing, cryptography, interoperability and SMiShing: Buzzword Alert | Buzzword Alert: Enterprise 2.0, recentralization, mobile-to-mobile convergence and drive-by pharming: Buzzword Alert | Buzzword Alert: iPhone, convergence, IPTV, common short code, Blu-ray and HDMI: Buzzword Alert | Buzzword Alert: July 24, 2006: Buzzword | Buzzword Alert: July 9, 2006: Buzzword | Buzzword Alert: June 20, 2006 | Buzzword Alert: June 21, 2006: Buzzword | Buzzword Alert: net neutrality, Skype Trojans, spam botnets, DRM and business intelligence: Buzzword Alert | Buzzword Alert: November 1, 2006: Buzzword | Buzzword Alert: November 16, 2006: Buzzword | Buzzword Alert: November 8, 2006: Buzzword | Buzzword Alert: October 11, 2006: Buzzword | Buzzword Alert: October 18, 2006: Buzzword | Buzzword Alert: October 25, 2006: Buzzword | Buzzword Alert: October 4, 2006: Buzzword | Buzzword Alert: September 13, 2006: Buzzword | Buzzword Alert: September 20, 2006: Buzzword | Buzzword Alert: September 28, 2006: Buzzword | Buzzword Alert: September 6, 2006: Buzzword | Buzzword Alert: SIP phones, fixed-mobile convergence, virtual appliances, ERP SaaS and deduplication: Buzzword | Buzzword Alert: Top 20 IT Buzzwords of 2006: Buzzword | Buzzword Alert: Vaporware | Buzzword Alert: Vista, Office 2007, dialectric materials and vlogs | Buzzword Alert: Vista, PS3, BPL, Google Adsense and the Peanut Butter Manifesto: Buzzword | Buzzword Alert: VoIP security, SOA governance, Zimbra, Office 2007 and tunnelless VPN: Buzzword | Buzzword Alert: Wireless | buzzword bingo | BW | BYE packet | bypass | bypass IRC | Bypass IVRS - Talk to a real person - cheatsheet | byte | byte code | bytecode

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpC,00.html
Alphabetical: C - 818 terms

C | C sharp | C shell | C# | C++ | C-sharp | C/N | C14N | C2 | C3D | C6 | CA | CA-ACF2 | CAB | cabinet file | Cabir | cable | cable head-end | cable modem | cable modem termination system | cable TV | CableLabs Certified Cable Modems | cache | cache coherence | cache cramming | cache engine | cache memory | cache poisoning | cache server | cached | CAD | CAD/CAM | caddy | CAE | cal | calculator | CALEA | calibrate | Calibrated Vectored Cooling | calibration | California Security Breach Information Act | call admission control | call center | Call Center Terms: Glossary | call control | call deflection | call detail record | call failure rate | call forwarding | call logging | call monitoring | call recording | call signaling | callback | callback messaging | caller ID spoofing | CallXML | calm technology | calorie | cam | camcorder | CamelCase | campus | Camram | Can Spam | Can Spam Act of 2003 | cancelbot | candela | candela per meter squared | candidate management system | canned air | cannibalization | cannibalize | cannibalizing | canonical | canonicalisation | canonicalization | canonify | canonization | canonize | CAP | Capability Maturity Model | capacitance | capacitor | capacity on demand | capacity optimization | capacity planning | capacity-optimized storage | capacity-optimized transport | CAPI | CAPTCHA | captive portal | capture | capture board | card | Card Bus | CardBus | cardinal | cardinality | carding | care-of address | Career horoscopes | Career Horoscopes: A geeky look ahead at 2007 | Carnivore | carrier | carrier hotel | Carrier Sense Multiple Access/Collision Detect | Carrier Sensitive Routing | carrier-to-noise ratio | carrierless amplitude/phase | Cartesian coordinates | cartridge | CAS | cascading style sheet | Cascading Style Sheet, level 1 | CASE | case study | cast shadow | CAT 1 | CAT 2 | CAT 3 | CAT 4 | CAT 5 | CAT 5E | CAT 6 | CAT 7 | catalog | Catalogue of Life | catastrophic failure | catchment area | Categories of twisted pair cabling systems | Category 5 | cathode ray tube | CATT | CATV | CB | CBC | CBR | CBT | CCD | CCIE | CCJ | CCK | CCNA | CCNP | CCO | CCoA | CCS | CCTV | CD | CD burner | CD Plus | CD recorder | CD-Bridge Disc | CD-Bridge Disk | CD-i | CD-Magneto Optical | CD-MO | CD-R | CD-R shelf life | CD-RW | CDC | CDDI | CDE | CDF | CDI | CDMA | CDMA 2000 | CDMA One | CDMA2000 | CDN | CDO | CDP | CDPD | CDR | cdr shelf life | CDSL | CE router | Celeron | cell | cell breathing | Cell of Origin | cell phone | cell phone spam | cell phone virus | cell phone worm | Cell processor | cell-Internet phone | cell-phone unlocking | cellphone virus | cellphone worm | cellspace | cellular | cellular automata | cellular automaton | cellular phone | cellular telephone | cellular-Internet phone | censorware | centimeter | centimeter cubed per gram | centimeter per second squared | central office | central processing unit | centrex | Centrino | Centronics parallel interface | centum call second | CEO | CEO and others | CEP | CERN | CERT | certificate authority | Certificate of Competency | Certificate Revocation List | certification | certified 8(a) firm | certified e-mail | Certified Information Systems Security Professional | Certified Internet Webmaster | Certified Wireless Networking Professional | CF card | CFB | CFI | CFML | CFO | CFR | CGA | CGI | CGI scanner | cgs | cgs system of units | chaffing | chaffing and winnowing | Challenge-Handshake Authentication Procedure | challenge-response authentication mechanism | challenge-response system | Chameleon Card | change data capture | change data capture (CDC) | change management | change mode | channel | channel 64 | channel bank | channel bonding | Channel Definition Format | channel extender | Channel Service Unit/Data Service Unit | channel-associated signaling | channelized T-1 | channelized T1 | CHAP | CHAP | character | characteristic impedance of free space | characters per inch | charge | charge quantity | charge-coupled device | Charles Babbage | chassis | chat abbreviations | chat acronyms | chat room | chat terms | chatterbot | chatting | Cheapernet | cheat sheet | cheatsheet | check digit | Check your spelling and grammar | checksum | checksum character | chembot | chemical robot | Chernobyl virus | Chief Compliance Officer | Chief Executive Officer | Chief Financial Officer | Chief Information Officer | Chief Security Officer | Chief Technology Officer | Chief Visionary Officer | Chinese wall | Chinese wall method | chip | chip art | chip set | chipping rate | chipset | chiral fiber | chmod | choreography | chorus | CHTML | chucking | churn | churn rate | CICS | CIDR | CIFS | CIM | CIO | cipher | cipher block chaining | ciphertext | ciphertext feedback | CIR | circuit | circuit bending | circuit switched data | circuit-switched | circular mil | CISC | Cisco Carrier Sensitive Routing | Cisco Certified Internetwork Expert | Cisco Certified Network Associate | Cisco Certified Network Professional | CISP-PCI | CISSP | citation style guides | Citizen's Band Radio | Citrix | CIW | Clarus | class | Class C2 | class diagram | class library | Class of Service | classification of data | Classless Inter-Domain Routing | Claude Shannon | CLC | clean room | clean room design | clean room technique | cleanroom | cleanroom technique | clear box | clear channel | clear zone | cleartext | CLEC | CLI | click | click fraud | click rate | click stream | click-through rate | click-to-callback | clicks and mortar | clickstream analysis | clickstream analytics | clickthrough | clickthrough rate | client | client/server | clip art | Clipper | cloak of invisibility | cloaking | clock cycle | clock speed | clocks or cycles per instruction | clone | closed caption | closed captions | closed circuit television | cloud | CLR | CM | CMDB | CMDM | CMIP | CMM | CMOS | CMP-50 cable | CMR | CMS | CMTS | CMYB | CMYK | CNR | CO | co-branding | co-browsing | co-location | co-opetition | coarse wavelength division multiplexing | coax | coaxial antenna | coaxial cable | coaxial cable (illustrated) | COBOL | cobot | cobranding | cocooning | COD | Codd | code | code review | code-division multiple access | codec | coded orthogonal frequency division multiplexing | coding error | coefficient | COFDM | cognitive biometric | cognitive modeling | cognitive radio | Cognos | CoIP | COLD | cold backup | | cold buffer | Cold Fusion | cold fusion | cold server | cold site | cold/warm/hot server | ColdFusion | ColdFusion Markup Language | coldset | coldset Web offset printing | collaboration | Collaboration Data Objects | collaboration diagram | collaboration software | collaborative authoring | collaborative browsing | collaborative citizen journalism | collaborative CRM | Collaborative Master Data Management | collaborative robot | collaborative software | Collaborative software: Glossary | collaborative tagging | collision | collocated | collocation | colocated | colocated care-of address | colocation | colocation center | Color in the Office | Color printing: Choosing the right printer | color thin film transistor | column address strobe | com | COM+ | combinatorial logic | comma-separated values file | command | command injection | command interpreter | command line interface | comment | Commerce XML | commercial off-the-shelf | Commercial Processing Workload | commit | committed information rate | Common Application Programming Interface | Common Business Oriented Language | common channel signaling | Common Desktop Environment | common gateway interface | Common Information Model | Common Internet File System | Common Language Infrastructure | Common Language Runtime | Common Management Information Protocol | Common Object Request Broker Architecture | Common Programming Interface | common short code (CSC) | common test platform | Communication and Networking Riser | communication diagram | communication server | Communications Assistance for Law Enforcement Act | communications over Internet Protocol | community computing | community technology center | compact disc | compact disk | Compact HTML | CompactFlash | CompactFlash card | compaction | competitive local exchange carrier | Compiere | compile | compiled | Complementary Code Keying | complementary metal-oxide semiconductor | complex event processing | complex instruction set computer | complex number | compliance | compliance testing | Compliance: Glossary | component | Component Object Model | Component Object Model + | component video | composite video | composition | compound | compound document | compressed | compressed air | compression | compression artifact | computational grid | computational origami | computational reflection | Compute Intensive Workload | compute-intensive | Computed Dental Radiography | Computer Aided Test Tool | computer barnacle | computer based training | Computer Emergency Readiness Team | computer file | computer forensics | computer operator | Computer Output to Laser Disk | computer pidgin language | computer room air conditioning unit | computer-aided manufacturing | computer-assisted software engineering | Computer-based Discovery | computer-based training | computer-intensive | Computer-Supported Cooperative Work | computer-telephony integration | concatenate | concatenating | concatenation | concentration | concentrator | concurrent processing | Concurrent Versions System | conditional access | conductance | conferencing over Internet Protocol | CONFIG.SYS | configuration | configuration item | configuration management | configuration management database | configure | conformal coating | conformance | conformance testing | connection | connection-oriented | connectionless | connectoid | Connector/ODBC | Constellation | Consumer Data Privacy | consumer packaged goods | consumer privacy | contact center | Contact Center: Glossary | contact port numbers | container | content | content aggregator | content caching | content delivery | content delivery network | Content Discovery | content distribution | content filtering | content managemen | content management system | Content Protection for Removable Media | content replication | Content Scrambling System | content spoofing | content-addressed storage | context-driven testing | contextual collaboration | contiguity | contiguous | continuation symbol | continuous backup | continuous data protection | contract delivery date | contracting officer | control network | Control Objectives for Information and Related Technology | Control-Alt-Delete | CONUS | conventional memory | convergence | Conversational Monitor System | COO | cook-off test | cooked data | cool | Coordinated Universal Time | coordinates | Copper Distributed Data Interface | coprocessor | COPS | copy board | copyleft | copyright | CORBA | cordless mouse | core competency | core dump | core router | corporate area network (CAN) | corporate governance | corporate performance management | corporate portal | corportal | CoS | cosine wave | Cosmo | cost center | cost per call | COTS | COTS, MOTS, GOTS, and NOTS | coulomb | coulomb per centimeter squared | coulomb per meter cubed | counter | counterfeit detector pen | countermeasure | counting board | courseware | courtesy copy | CPG | CPI | CPL | CPM | CPNI | CPRM | CPU | CPU | CPW | CR | CRA | CRAC | cracker | cracking | CRAM | crash | Crash Course: Spyware | crawler | CRC | CRC-4 | Creating Your First Podcast: Learning | credential/session prediction | creeping featuritis | creepy whisper | crimeware | crippleware | critical path method | critical section routine | CRL | CRM | CRM analytics | CRM chat | CRM Real-time Analytics | CRON script | crontab | cross media queuing | cross section | cross-bar switch | cross-engineering | cross-media queuing | cross-post | cross-sell | cross-site request forgery | cross-site scripting | cross-site tracing | crossbar latch | crossfade | crossover cable | crosstalk | crowdcasting | CRT | crumb | Crusoe | cryptanalysis | crypto | cryptographic checksum | cryptography | cryptology | cryptoperiod | cryptotrojan | cryptovirus cryptoworm | cryptoworm | Crypzip | Crystal Reports | CSD | CSMA/CA | CSMA/CD | CSO | CSR | CSRF | CSS | CSS1 | CSSL1 | CSU/DSU | CSV file | CTC | CTD | CTI | CTO | CTP | CTR | Ctrl-Alt-Delete | cubic foot | cubic meter | cubicle | cuckoo egg | CUL | cumulative trauma disorder | curie | Curl | current | curses | cursor | CUSeeMe | custom factory integration | customer acquisition cost | Customer Analytics | customer data integration | Customer Data Privacy | customer edge router | Customer Information Control System | customer interaction center | customer life cycle | customer lifecycle | customer managed relationship | customer premises equipment | customer privacy | Customer Proprietary Network Information | customer relationship analysis | customer relationship management | customer segmentation | customer self-service | customer service and support | customer service chat | customer valuation | customer-facing | customer-managed relationship | CUT | cut-and-paste attack | CVC | CVO | CVS | CWDM | CWNP | cXML | cyan, magenta, yellow, and black pigment model | cycle time | cycles per second | cyclic redundancy checking | Cyclic Redundancy Checking 4 | Cygwin | cypherpunk | Cyrix

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpD,00.html
Alphabetical: D - 648 terms

D-AMPS | D-channel | D-VHS | D2D2T | DAB | DAC | daemon | DAFS | daily build and smoke test | Daily Tech Trivia Archives: 2.20.06 - 3.31.06: Daily quiz question | Daily Tech Trivia: Daily quiz question | daisy chain | DAML | Damn Small Linux | DAMPS | DAO | dark energy | dark fiber | Darwin | DAS | DASD | dashboard | DAT | DAT USB drive | DAT USB tape drive | data | Data Access Arrangement | Data Access Objects | data aggregation | data analysis | data at rest | data availability | data binding | data categorization | data center | Data Center Markup Language | data classification | data cleansing | Data Communication Equipment | data corruption | data decryption IC | Data Decryption Integrated Circuits | data deduplication | data dictionary | data dredging | data encryption IC | Data Encryption Standard | data encryption/decryption IC | data file | data fishing | data glove | data governance | data hiding | data integration | data integrity | data key | data life cycle management | data lifecycle management | data link control | data link layer | data management | Data management freeware and shareware guide. | data mart | data miner | data mining | data modeling | Data Over Cable Systems Interface | data preprocessing | Data Privacy | data quality | data quality assurance | Data Quality: Learning Guide | data rate | data rates | data replication | data repository | data scrubbing | data set | data source name | data source object | Data Space Transfer Protocol | data splitting | data streaming | data structure | data switch | Data Terminal Equipment | data transfer rate | data transfer throttling | data type | data warehouse | Data-Link layer | database | database administrator | database cursor | database management system | database marketing | database of record | database replication | Database: Glossary | Database: Learning Guide | datacard | datagram | DataTAC | daughterboard | DAW | Daylight Saving Time | Daylight Saving Time patch | Daylight Savings Time | dB | DB-15 | DB-25 | DB-50 | DB-68 | DB-9 | DB-xx | DB2 | DB2: Learning Guide | DBA | DBMS | DBOR | DBS | DC | DCE | DCIT | DCML | DCOM | DDBMS | DDCD | DDE | DDK | DDoS | DDoS attack | DDR SDRAM | DDS | DDS-1 | DDS-2 | DDS-3 | DDS-4 | de-perimeterisation | de-perimeterization | dead media | Debian | Debian Linux | debounced | debouncing | debug | debugger | debugging | DEC | decibel | decibels related to dipole antenna | decibels relative to carrier | decibels relative to isotropic radiator | decibels relative to one millivolt | decibels relative to one milliwatt | decibels relative to reference level | decimal | decipher | decision support system | decision tree software | decode | decoding | decompilation | decompile | | decompressing | decrypt | decryption | dedicated hosting | dedicated line | dedicated server | dedicated short range communication | deep link | Deep Space Network | deep Web | default | Defense Acquisition Regulatory Council | Defense Acquisition Regulatory Council (DARC) | Defense Advanced Research Projects Agency | Defense Advanced Research Projects Agency Network | Defense Contract Management Agency (DCMA) | defense contractor | Defense Message System | Defrag | | degree Fahrenheit | degree per second | degree per second squared | delimiter | deliverable | Delphi | demand-based switching | demarc | demilitarized zone | demo | demo and demoscene | demographics | demogroup | demomaker | demon | demoparty | demoscene | demutualization | DEN | dendrimer | deniable encryption | denial of service | denial of service attack | denial-of-service | denial-of-service attack | dense wavelength division multiplexing | deobfuscate | deperimeterisation | deperimeterization | deploy | deployment | depository | deprecate | deprecated | deprecation | DER | derived object | DES | design by committee | design pattern | design reuse | desktop | desktop administration | desktop computer | Desktop Linux: Learning Guide | desktop management | Desktop Management Interface | Desktop Management Task Force | desktop search | desktop security | desktop supercomputer | desktop theme | development environment | device | device driver | device relationship management | deviceCOM | DFS | DG | DHA | DHTML | diagonal-parity RAID | dial peer | dial peer hunting | dial-up | | Dialed Number Identification Service | dialog box | dichotomizing search | DICOM | dictionaries | Dictionaries we recommend | dictionary attack | DID | DidTheyReadIt | dielectric | dielectric constant | dielectric material | Difference Engine | Differentiated Services | DiffServ | digiboard | digicard | digit | digitization | digitize | digitizing | digizine | Dilbert | DIME | DIMM | diode | dipole antenna | direct access | Direct Access File System | direct access storage device | direct broadcast satellite | direct current | direct electronic recording machines | direct email marketing | Direct Internet Message Encapsulation | Direct Inward Dialing | direct marketing | Direct Memory Access | Direct Outward Dialing | Direct R/3 | Direct Rambus | direct sequence spread spectrum | direct-attached storage | Direct-to-Edit | direct-to-home satellite | directional sound | directory | directory climbing | directory harvest attack | Directory Services Markup Language | directory traversal | Directory-Enabled Networking | DirectX | dirty data | DirXML | disappearing e-mail | disassemble | disassembler | discontinuous transmission | discoveries | discrete | discrete multitone | discussion board | discussion group | dish antenna | disintermediation | disk cache | disk duplexing | disk mirroring | Disk Operating System | disk striping | disk-to-disk-to-tape | diskette | DiskOnKey | disparity | displacement | display | display adapter | display mode | display modes | displayboard | Displays : Glossary | disposable computer | disposable PC | disruption-tolerant network | disruptive technology | distance | distance learning | Distance Vector Multicast Routing Protocol | distributed | distributed authoring | Distributed Component Object Model | distributed computing | Distributed Computing Environment | distributed database | distributed database management system | distributed denial-of-service attack | distributed DoS attack | distributed file system | Distributed interNet Applications Architecture | distributed learning | Distributed Management Task Force | distribution | distribution list | distributive numerical control | distro | dither | dithered | dithering | division sign | DKNF | DLC | DLL | DLM | DLT | DMA | DMB | DMCA | DMI | DMOZ | DMP | DMR | DMS | DMT | DMTF | DMZ | DNA | DNC | DNG | DNIS | DNS | DNS cache poisoning | DNS poisoning | DO | do not call list | do not call registry | Do You Speak Geek: Famous People in IT Quiz | Do you speak Geek: File Extension Quiz: WhatIs.com Quiz | Do you speak Geek: Internet Protocols and Technologies | Do you speak Geek: Special Summer Edition: WhatIs.com Quiz | Do You Speak Geek? | Do you speak geek? Down in the engine room | Do you speak Geek? Great Geeks in History Quiz: WhatIs.com Quiz | Do you speak podcasting?: Quiz | Do you speek Geek: Every File Format in the World Quiz: Quiz | do-it-yourself marketing | dock | docking station | DoCoMo | DOCSIS | document | document management | Document Object Model | document reader | Document Style Semantics and Specification Language | Document Type Definition | documentation | DOD | dog-food | dogcow | DOI | DOLS | DOM | domain | domain controller | domain name | domain name system | domain name system poisoning | domain sniper | DomainKeys | domestic outsourcing | Domino | Domino Extensible Language | Domino Off-Line Services | dongle | DoPa | Doppler effect | DOS | DOS Protected Mode Interface | DOS/V and WIN/V | dot address | dot com | dot NET | dot pitch | dot product | dot.com | DOT4 | dotcom | dots per inch | dotted quad | double data rate synchronous dynamic random access memory | Double Density CD | double factorial | double integral sign | Double-Density Compact Disk | double-parity RAID | double-slit experiment | doubler | doublewhack | down converter | downconverter | downlink | downlink and uplink | download | download pop-up | downloading | downsizing | downstream | downtime | dpi | DPMI | DQA | draft document | DRAM | DRDRAM | drilldown | drive-by download | drive-by pharming | drive-by spamming | driver | driver development kit | DRM | drop shadow | drop-down menu | dropout | droupie | DRP | DS | DS-CDMA | DS0 | DS1 | DS2 | DS3 | DS4 | DSLAM | DSML | DSN | DSNG | DSO | DSO exploit | DSP | DSR | DSRC | DSS | DSSSL | DST | DST patch | DSTP | DT Code of Practice | DTD | DTE | DTH | DTMF | DTMF | DTN | DTTV | DTV | DTV Guide | DTV up converter | DTV upconverter | DTX | dual core | dual core processing | dual core processor | dual in-line memory module | dual tone multi frequency | dual-layer magnetic tape | dual-side magnetic tape | Dublin Core | duct tape marketing | duh | dumb | dumb network | dumb terminal | dump site | dumpster diving | duotone | duplex | duty cycle | DVB | DVD | DVD Forum | DVD-A | DVD-Audio | DVD-AudioV | DVD-RAM | DVI | DVMRP | Dvorak keyboard | DWDM | DXL | dynalink | dynamic | dynamic analysis | dynamic and static | dynamic backup | Dynamic Data Exchange | dynamic DNS service | dynamic fonts | dynamic function loading | Dynamic Host Configuration Protocol | dynamic HTML | dynamic IP address | dynamic jitter buffer | dynamic link library | dynamic multi-pathing | dynamic packet filter | dynamic port numbers | dynamic random access memory | dynamic range | dynamic signage | Dynamic Source Routing | dynamic SQL | dyne

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpE,00.html
Alphabetical: E - 433 terms

E and M | E Ink | E&M | e- | E-1 | E-2 | E-3 | E-4 | E-5 | e-biz | e-bomb | e-brokerage | e-business | E-carrier system | E-CD | e-commerce | e-commerce hosting | e-contact center | e-copy | e-cycling | e-discovery | e-form | e-government | e-inclusion | e-learning | e-mail | e-mail archiving | e-mail authentication | e-Mail Discoverability | e-mail extractor | e-mail forgery | e-mail list | e-mail postage | e-mail program | e-mail rage | e-mail reflector | e-mail retention | E-mail Security School: Security School | e-mail server | E-mail shareware and freeware guide | e-mail spoofing | e-mail virus | e-nose | e-outsourcing | e-paper | e-postage | e-procurement | e-services | e-signature | e-signature bill | e-speak | e-support | e-tailing | e-tailware | e-thrombosis | e-ticket | e-voting | e-waste | E-ZPass | E. F. Codd | E.164 | E1 | E1, E2, E3... | E2 | E2E | E2K | E3 | e3000 | E4 | E5 | E911 | EA | EAI | EAP | ear and mouth | early adopter | Earth's mean orbital speed | Earth's mean radius | Earth-Moon-Earth | Easy Pass | EasyPass | EBCDIC | Ebenezer Scrooge IT Test | EBIT | EBITD | EBITDA | eBook | EBPP | ebXML | ebXML Initiative | eCash | ECASS | ECB | ECC | Echelon | Eclipse | Eclipse Foundation | Eclipse Platform | Eclipse: Learning Guide | ECMAScript | Edapt | EDD | eddress | EDFA | Edgar F. Codd | EDGE | edge device | edge router | EDI | ediscovery | EDM | EDO RAM | EDP | EDRAM | edu | | edutainment | EES | EFF | EFS | EFTAM | EGA | egg-vertising | Eggdrop | EggFusion | egosurf | egosurfing | EGP | egress | EIA | EIDE | Eiffel | EIGRP | EIM | EIP | EISA | EJB | elearning | electric field strength | Electric plugs for each country | electrical charge | electro-optical fingerprint recognition | Electrohippies Collective | electromagnetic bomb | electromagnetic field | electromagnetic interference | electromagnetic pulse | electromagnetic radiation spectrum | electromotive force | electron | electron rest mass | electronic bill presentment and payment | Electronic Code Book | Electronic Content Discovery | Electronic Controlled Acoustic Shadow System | Electronic Data Discovery | Electronic Data Interchange | Electronic Data Management | electronic data processing | electronic discovery | Electronic Document Discovery | Electronic Evidence | Electronic Evidence Discovery | Electronic File Transfer Access Method | Electronic Frontier Foundation | Electronic Funds Transfer | Electronic Industries Alliance | Electronic Industries Association | Electronic Information Discovery | electronic ink | electronic newspaper | electronic nose | electronic paper | electronic postmaster | electronic program guide | electronic publishing on demand | electronic resume | Electronic Signatures in Global and National Commerce Act | electronic terrorism | electronic ticket | electronic voting | Electronic-discovery | electrophotography | electrostatic discharge | electrostatic field | elegant solution | element | element-of symbol | elementary charge | ELF | Elk Cloner | elliptical curve cryptography | Elm | EM field | Emacs | email | Email Discoverability | eMail Evidence Discovery | email response management service | eMail Search and Discovery | emanation monitoring | embedded system | embedded systems | embedded systems programming | EmbeddedJava | EME | emerging small business | EMF | EMI | | EMP | employee self-service | empty set | EMR-shielding | EMS | emulation | emulator | enantiomorph | encapsulate | encapsulation | enclave | encoder | encoding | encoding and decoding | encoding/decoding | encrypt | Encrypting File System | encryption | encryption/decryption IC | encyclopedias | end effector | End System-to-Intermediate System protocol | end user | End User License Agreement | end-of-message | endless loop | endpoint security | energy | engine | Engine hacking | English system of units | engraving | enhanced 911 | enhanced CD | Enhanced Data GSM Environment | enhanced dynamic RAM | Enhanced Integrated Drive Electronics | Enhanced Interior Gateway Routing Protocol | Enhanced Messaging Service | Enhanced MetaFile | Enhanced Specialized Mobile Radio | Enhanced Synchronous DRAM | enhancement | entanglement | enterprise | enterprise application integration | enterprise architecture | Enterprise Identity Mapping | enterprise information portal | Enterprise JavaBeans | enterprise performance management | enterprise relationship management | enterprise resource management | enterprise resource planning | enterprise risk management | Enterprise Search and Discovery | enterprise server | Enterprise Service Bus (ESB): Learning Guide | Enterprise Services Architecture | Enterprise Spend Management | enterprise storage | enterprise vault | Enterprise-ready Linux e-mail: Learning Guide | entities | entity | entity relationship model | entity-relationship diagram | entity-relationship model | entrepreneur | entropy | ENUM | enviromatics | environment | environment variable | environmental infomatics | Environmental Resource Management | EOM | epaper | EPG | EPIC | EPM | EPOC | epoch | EPOD | EPOP | EPP/ECP | ER model | eraser pointer | erbium amplifier | erbium-doped fiber amplifier | ERD | erg | ergonomic | ergonomics | erlang | Erlang B | Erlang C | Erlang programming language | ERM | ERM Group | ERMS | ERP | error checking and correcting | error correction code | error handling | Error messages for Windows 2000 | Error messages for Windows XP Pro | error-checking | errors | ES-IS | escalation plan | ESCD | ESCON | Escrowed Encryption Standard | ESD | ESDI | ESDRAM | eServer iSeries 400 | ESMR | ESMTP | ESS | EtherExpress | EtherLoop | Ethernet | Ethernet Glossary | Ethernet modem | Ethernet point-of-presence | Ethernet/IP | | ethical worm | ETL | ETRN | ETSI | EULA | Euler's constant | Eurekster | euro | European Computer Driving License | European Global Navigation Satellite System | European Telecommunications Satellite Organization | European Telecommunications Standards Institute | EUTELSAT | EUVL | EV DO | EV-DO | EVDO | event sink | evergreen | Evernet | evil twin | EWSD | exbi | Excel | Exchange | Exchange Rate Mechanism | Exchange Server Performance: Learning Guide | exchange-to-exchange | executable | execute | execution | executive dashboard | Exim | exit program | exit routine | Expert Advice: Printer Management | expert system | explicit parallelism | Explicitly Parallel Instruction Computing | exploit | exploratory model | exponent | exponential assembly | exponential function | export | Expression | Expression Graphic Designer | Expression Interactive Designer | Expression Web Designer | extended binary-coded decimal interchange code | extended data output RAM | extended desktop | Extended Industry Standard Architecture | Extended Simple Mail Transfer Protocol | Extended System Configuration Data | extensible | Extensible Access Control Markup Language | extensible application markup language | Extensible Authentication Protocol | Extensible Business Reporting Language | Extensible Forms Description Language | Extensible Hypertext Markup Language | Extensible Markup Language | Extensible Messaging and Presence Protocol | Extensible Name Service | Extensible Open Router Platform | Extensible Public Relations Language | Extensible Rights Markup Language | Extensible Stylesheet Language | Extensible User-interface Language | extension | extent | Exterior Gateway Protocol | external storage | extract, transform, load | extranet | extrapolation and interpolation | Extreme Programming | extreme ultraviolet lithography | extremely low frequency | eye candy | eye-in-hand system | ezine | EZPass

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpF,00.html
Alphabetical: F - 376 terms

F | factorial | Fahrenheit | failover | fair and reasonable price | Fair Information Practices | fair use | false acceptance | false positive | false rejection | false rejection rate | fan in | fan out | fan-in | fan-out | FAQ | FAQ on netowrk certification and training: FAQ | FAQ on routers: FAQ | FAQ on VPN: FAQ | FAQ: Active Directory: FAQ | FAQ: Exchange and Small Business Server issues: FAQ | FAQ: Exchange Server backup and recovery: FAQ | FAQ: Group Policy: FAQ | FAQ: SAP Basis administration: FAQ | FAQ: Windows Career and Certification: FAQ | FAR | farad | faraday | Faraday cage | Faraday constant | fast clear down | fast dial-up | Fast Ethernet | Fast Guide to Case Studies | Fast Guide to Collaborative Software | Fast Guide to DTV | Fast Guide to free IT book excerpts | Fast Guide to Helpful Tips | Fast Guide to IT Humor | Fast Guide to Job Hunting and Career Resources | Fast Guide to RAM | Fast Guide to Regulatory Compliance | Fast Guide to Storage Technologies | Fast guide to writing resumes and cover letters | Fast Guide: Friday Geeking | Fast Guide: Online PC Museums | fast packet technology | Fast Page Mode DRAM | Fast Reference for Mathematical Symbols | fast reference for storage | fast retransmit and recovery | Fast track to iSeries: Learning Guide | FastCGI | FasTrak | FAT | fat client | fat Mac | fat provisioning | fatal exception | fault management | fault tolerance | fault-management platform | fault-tolerant | fax | Fax Group | fax server | faxserver | FC-PGA | FC/IP | FCAPS | Fcc | FCIP | FDDI | FDISK | FDM | FDMA | feather | feathering | feature creep | Feature Group D | FEC | FECN | FECN/BECN | FED | Federal Acquisition Regulation | federal compliance | Federal Information Processing Standard | Federal Information Security Management Act | federated identity management | Federation of Telecommunications Engineers of the European Community | feed line | feed reader | feedline | feeping creaturitis | FeliCa | female connector | femtosecond | ferret | ferroelectric RAM | ferrule | FET | fetch | FFIEC compliance | FG-D | FH-CDMA | fib | Fib Contest Contenders | Fib poem contest | Fibbery contest | Fibbing contest | fiber channel | Fiber Connectivity | Fiber Distributed Data Interface | fiber optic | Fiber Optic Service | fiber to the curb | fiber to the home | fiber to the premises | fiberless optics | | Fibre Channel | Fibre Channel over IP | Fibre Channel over TCP/IP | Fibre Channel tunneling | FICON | FidoNet | field | field emission display | field-effect transistor | field-programmable gate array | field-replaceable unit | FIFO | file | file allocation table | file extension | file format | file formats | file name extension | file replication | file server | file sharing | file system | file transfer | File Transfer Access and Management | File Transfer Access Method | File Transfer Protocol | FileMaker | filer | filesystem | filter | FIM | Financial Modernization Act of 1999 | Financial Products Markup Language | Financial Services Markup Language | Find and replace (FnR) wildcards for Microsoft Word | find me | find me / follow me | fine structure constant | finger | finger image | fingernail storage | fingerprint scanning | fingerscanning | finite state machine | FiOS | fire fighting | firefighting | Firefox | firehose effect | Firestarter | firewall | Firewall Builder | Firewall: Learning Guide | FireWire | firmware | First Amendment of the Internet | first call resolution | first computer virus | first law of thermodynamics | first mover | first-order logic | first-order predicate calculus | fishing | FISMA | five 9s | five nines | fixed data | fixed wireless | fixed-content data | fixed-mobile convergence | fixed-mobile substitution | Fizt | flag | flamebait | flaming | flanging | Flash | Flash ad | Flash drive | flash memory | flash memory card | flash mob | flash RAM | flashmob | FlashMob supercomputer | flat file | flat file system | Flex | flexfield | flexible organic LED | flexible organic light emitting device | flexible transistor | flexo | flexography | flip chip-pin grid array | flip-flop | floating ad | floating point unit | floating-point operations per second | floating-point unit | Flock | flooding | FLOP | floppy | floppy disk | FLOPS | flow control | flowchart | FLT | flushing the queue | flux | fly-out menu | FM | FMC | FMP | FMP5 | FMS | fnord | FnR wildcards | folder | FOLED | folksonomy | follow me | font | foo | Foo Camp | foot | foot cubed | foot per second | foot per second squared | foot squared | foot-pound-second system of units | footbath | footprint | footprinting | for your information | force | foreign agent | foreign key | foreign network | forensic animation | forensic watermark | forest-and-tree model | form factor | format | FormMail | Fortezza | Forth | FORTRAN | Fortress | forum | Forum freeware | forward compatible | Forward DNS lookup | forward error correction | forward explicit congestion notification | four-way server | Fourier analysis | Fourier series | Fourier synthesis | fourth generation | foxed | FP | FPGA | FPM DRAM | FpML | fps system of units | FPU | FQA | FQDN | fractal | fractal image examples | fractional T-1 | fractional T1 | FRAD | FRAM | frame | frame rate | frame relay | frame relay access device | frames | framework | free software | Free Software Foundation | free-space optics | free-space photonics | FreeBSD | Freelance Graphics | freemail | Freephone | Freephone | freeware | Freeware and shareware library | frequency | frequency division multiple access | frequency-division multiplexing | frequency-hopping spread spectrum | frequency-shift keying | frequently-asked questions | front-end | frontend | frontside bus | Frost | FRR | FSB | FSF | FSK | FSML | FSO | FSP | FTAM | FTP | FTP cable | FTTC | FTTH | FTTP | FUBAR | FUD | full and open competition | full duplex | | full-duplex | full-service provider | full-text database | full-text search file | fullerene | fully qualified domain name | function | function key | functional programming | functional specification | functionality | Furby | futzing | futzing around | fuzzy logic | fuzzy matching | fuzzy number | fuzzy search | Fwbuilder

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpG,00.html
Alphabetical: G - 230 terms

G | G.703 | G.lite | G3 | G4 | GaAs | GaAsFET | gain | Galileo | gallium arsenide | gallium arsenide field-effect transistor | gallium nitride | GALP | gamer | gaming | gamma | GaN | Gantt chart | gap analysis | garbage | garbage collecting | GARP (Generic Attribute Registration Protocol) | GARP VLAN Registration Protocol | gas | gas constant | gatekeeper | gateway | GB | GBIC | Gbps | GDMO | gender changer | General Packet Radio Services | general protection fault | General Public License | Generalized Markup Language | Generalized Multiprotocol Label Switching | Generic Access Network | Generic Attribute Registration Protocol | generic top-level domain name | Generic VLAN Registration Protocol | genetic engineering | genetic modification | genetic programming | geocache | geographic information system | George Boole | George Simon Ohm | geostationary satellite | geotargeting | gesture recognition | Ghost | ghost imaging | ghost site | Ghostscript | GHz | GIA | giant | giant magnetoresistive effect | gibi | GID | GIF | GIF89a | giga | gigaflop | gigahertz | gigapop | GII | GIS | glass house | glassfet | GLB Act | glitch | Glite | glob | global information infrastructure | global positioning stash hunt | Global Positioning System | global spy network | Global System for Mobile communication | Global Tag | global unique identifier | globalism | globality | globalization | Globalnaya Navigatsionnay Sputnikovaya Sistema | globbing | glocalization | GLONASS | glossaries about information technology | Glossary: Robotics | glyph | Gmail | GML | GMPLS | GMT | GNOME | GNSS | GNSS | GNU | GNU Network Object Model Environment | Gnutella | go bosh | goat | going forward | gold code | Good Automated Laboratory Practices | good worm | Google | Google Adsense | Google Alert | Google Base | Google bomb | Google Coop | Google hacking | Google scanning | Google Spreadsheets | Googlehacking | Googlewhack | Googlewhacking | Googling | | Gopher | gopherspace | GOTS | gov | Government Information Awareness | government off-the-shelf | GPF | GPL | GPO | GPRS | GPS | GPS cache hunt | GPS messaging | GPS stash hunt | GPS treasure hunt | graceful degradation | gram | Gramm-Leach-Bliley Act | granularity | graph theory | graphic equalizer | graphical password | graphical user authentication | graphical user interface | graphics accelerator | graphics card | Graphics Interchange Format | grasping plan | grating light valve | gravesite | | gravitational constant | gravitational wave | gravity | gravity wave | gravure | gray | gray box | gray box analysis | gray box testing | gray goo | gray hat | graylist | graynet | grayscale | Greasemonkey | GreasemonkIE | Greeking | green computing | green data center | green incentives | green machine | green marketing | green route | greenfield deployment | Gregorian calendar | gremlin | grep | grey goo | grey hat | grey net | grey route | greylist | greynet | grid computing | Grid computing: Learning Guide | grid storage | grok | ground | ground-plane antenna | Group Address Registration Protocol. | group chat | Group Policy Object | groupware | grumble line | GSM | GSX Server | GTAG | gTLD | GUA | guerilla marketing | guest OS | guest OS | GUI | GUID | Guidelines for Definition of Managed Objects | GVRP | Gyricon

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpH,00.html
Alphabetical: H - 326 terms

H | H-1B | H.245 | H.248 | H.264 | H.323 | h2g2 | HA | | HailStorm | hairpin | hairpinning | hakspeak | half duplex | half life | half-duplex | half-life | half-open scanning | Halloween geek quiz | Halloween II: Do you speak -- eek! -- Geek? | Halloween tech quiz | Halloween: Do you speak geek? | HALO | ham | ham radio | Hamming code | handheld | Handheld Device Markup Language | handie talkie | Handle to Registry Key | handoff | handshake | handshaking | Handspring | handtop | hang | hangup | haptics | hard bounce | hard copy | hard disk | hard disk drive | hard drive | hard drive overwrite | hard drive overwriter | hard drive shredder | hard phone | hard-drive encryption | hardcode | hardphone | hardware | hardware abstraction layer | hardware load-balancing device | hardware VPN | harmonic | Hartree energy | hash | hash buster | hash busting | hash function | hashing | HAVi | HBA | HCI | HD down converter | HD downconverter | HD up converter | HD upconverter | HD-DVD | HD-SDI downconverter | HDCD | HDCP | HDD | HDLC | HDMI | HDML | HDSL | | head-end | headend | header | headroom | Health Insurance Portability and Accountability Act | heap | heat | heat sink | Heating, Refrigerating, and Air Conditioning Engineers | heating, ventilation, and air conditioning | heatset | heatset Web offset printing | heatsink | heavyweight thread | Heisenberg indeterminancy principle | helical antenna | helical scan | HELLO packet | help application | help desk | help file | help system | henry | henry per meter | Herman Hollerith | hertz | heterogeneous | heuristic | heuristics | | hexadecimal | HFC | HFTP | HHD | HI-MEMS cyborg insects | hiccup | hidden Internet | HIDS | HIDS/NIDS | Hierarchical Mobile IPv6 | Hierarchical Storage Management | Higgins Project | Higgins Trust Framework | High Altitude Long Operation | high availability | High Definition Multimedia Interface | high definition television | High Level Assembler | High Performance File System | High Performance Storage System | high speed dial-up | high-definition radio | high-density DVD | high-density server | High-Level Data Link Control | high-performance computing | High-Performance Parallel Interface | High-Speed Circuit-Switched Data | high-speed dialup | High-Speed Downlink Packet Access | High-Speed Serial Interface | hijacking | hijackware | HiP7 | HiP7 and HiP8 | HiP8 | HIPAA | HIPAA: Learning Guide | HIPAA: Learning Guide | HiperLAN | HiPerMOS | HIPPI | histogram | history | history of the Internet | hit | HITA | HLASM | HLD | HLR | HMIPv6 | HOLAP | hole | hologram | holographic storage | holographic versatile disc | holostorage | home address | home agent | home automation | Home Location Register | home network | home page | Home Phoneline Networking Alliance | home school | home schooling | home server | homecam | Homeland Security | Homeland Security Presidential Directive No. 7 | HomePNA | HomeRF | homologation | honey pot | honeynet | Honeynet Project | hook | hoot and holler | hoot-n-holler | hop | hop off | hop on | hopoff | Hopper, Grace | horizontal scalability | horn antenna | Horoscopes for Geeks | horsepower | Hospitality Financial and Technology Professionals | Hospitality Information Technology Association | host | host bus adapter | host file hijack | host intrusion detection systems | hosted AM | hosted application management | hosted CRM | hosting | hosting reseller | hot aisle/cold aisle | hot backup | hot fix | hot key | hot server | hot site | hot site and cold site | hot spot | hot standby | Hot Standby Router Protocol | hot swap | hot zone | hot/cold aisle | hoteling | hotfix | hotspot | HotSync | hour | How do I...choose a VPN for my small business? | How do you pronounce IT? | How many bytes for... | How spyware gets in your computer | How to deploy a successful patch: Learning Guide | | How to write a compelling cover letter | How to write a resume that commands attention | How you can clean up spyware | How you can prevent spyware | HP | HP 9000 | HP e3000 | HP OpenView | HP Virtual Server Environment | HP VSE | HP-GL | HP-UX | HP9000 | HPC | HPFS | HPGL | HPNA | HPSS | HS | HSB | HSCSD | HSDPA | HSM | HSPD-7 | HSRP | HSS | HSSI | HT | HTF | htm | HTML | HTML 4.0 | HTML comment | HTML validator | HTML::Mason | HTTP | HTTP 1.1 | HTTP over SSL | HTTP querystring | HTTP/S | HTTPD | HTTPS | hub | hue, saturation, and brightness | human factors | human factors engineering | Human Genome Project | human-computer interaction | humanware | hundred call second | hundred dollar laptop | hundred dollar PC | Hungarian notation | HVAC | HVD | hybrid fiber coaxial | hybrid fiber coaxial network | hybrid hard drive | hybrid Insect MEMS | hybrid online analytical processing | hybrid virus | hybrid virus/worm | Hydra | hyper | hyper LAN | Hyper-G | Hyper-Threading | HyperCard | HyperLAN | hyperlink | hypermedia | Hypersonic Sound | hyperspace | HyperTerminal | hypertext | Hypertext Transfer Protocol | Hypertext Transfer Protocol 1.1 | Hypertext Transfer Protocol daemon | HyperTransport | hypervisor | Hz

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpI,00.html
Alphabetical: I - 463 terms

I&T | i-Mode | i-Net | I-SPY Act | i.LINK | I.T. | I/O | I18N | I2C | I2C bus | I2S | i5 | i5 Series | i5/OS | IA-64 | IAB | IANA | IAO | IAP | IBF | IBM | IBM Lotus Instant Messaging & Web Conferencing | IBM Workplace | iButton | IC | IC-BPMS | ice | ICE (In Case of Emergency) | IceNewk | ICM file | ICMP | ICMP bug | ICMP sweep | icon | ICP | ICQ | ICR | ICT | ICT4D | ID chip | ID management | ID3 | ID3 tag | ID3v1 | ID3v2 | IDE | IDEA | IDEF | iDEN | identification chip | identity card | | identity federation | identity management | identity theft | IDF | IDL | IDoc | idoru | IDS | IE | IEC | IEEE | IEEE 1284 parallel interface standard | IEEE 1284.4 | IEEE 1394 | IEEE Computer Society | IEEE Standards Association | IEEE-CS | IEEE-SA | IETF | iFCP | IGMP | IGP | IGRP | IIOP | IIS | iJacking | IKE | ILEC | iLINK | illegal operation | Illustrated definitions | ILM | ILOVEYOU virus | IM | IM bot | IM spam | IM worm | iMac | image | image compression | image map | image of the early universe | image of the universe | image setter | image spam | imagesetter | imaginary number | imaging | IMAP | IMHO | IMing | imitation game | impedance | implementation | import | impression | IMS | IMT-2000 direct spread | in house | in the wild | in-band signaling | in-house marketing | incident response | incident response plan | incident response policy | Incompleteness Theorem | increment | Incremental Revenue (Value) Analysis | incubator | incumbent local exchange carrier | Indefeasible Right of Use | indemnification | indemnity | indempotency | Indeo | independent software vendor | Indexed Sequential Access Method | Indigo | inductance | inductor | industrial strength | Industry Standard Architecture | inertia | iNet | InfiniBand | infinite loop | infinite sequence | infinite series | infinity | InfoCard | infomediary | infomercial | infonesia | information | Information and Communications Technologies for Development | information and communications technology | Information and Content Exchange | information appliance | information architecture | Information Awareness Office | information design | information filtering | Information Kit: Grid Computing | Information Kit: Linux, Unix, and All the Little ixes | Information Kit: offshore outsourcing | Information Kit: PDAs in the Workplace | Information Kit: Voice over IP | information life cycle management | information lifecycle management | information signature | Information Society | information storage and retrieval system | information technology | Information Technology Information Sharing and Analysis Center | Information Technology Infrastructure Library | information theory | information war | infosurfing | infotainment | infranet | Infranet Initiative | infrared | Infrared Data Association | infrared radiation | infrared transmission | infrared wireless | infrastructure | infrastructure management | Ingres | ingress | inheritance | INI | initial extent | initial program load | initial public offering | initialization | injectable ID chip | ink jet printer | ink jet printers | inkjet printer | inkjet printers | inode | iNotes | input/output | Input/Output Supervisor | insect robot | insecure relay | insider threat | insourcing | InstallAnywhere | installation restore point | Installfest | | InstallShield | instant message | instant messaging | Instant Messaging: Glossary | instant spam | instant translation | instantiate | instantiation | Institute of Electrical and Electronics Engineers | Institute of Electrical and Electronics Engineers Computer Society | instruction | int | integer | integer overflow | integrated circuit | integrated circuit for encryption/decryption | Integrated Definition | integrated development environment | Integrated Drive Electronics | integrated search | integrated T-1 | integrated T1 | integrated threat management | integration | integration and testing | Integration Repository | integration server | integration testing | integration-centric BPM | integrity | integrity check-value | intellectual capital | intellectual property core | intelligence community | intelligent agent | intelligent character recognition | intelligent database | intelligent device | Intelligent Mobile Gateway | Intelligent Network | intelligent peripheral interface | Intelligent Platform Management Interface | intelligent pop-up blocker | intelligent switch | intelligent virtual agent | intentional programming | intentional software | Inter-IC bus | interaction diagram | interaction management | interactive agent | Interactive System Productivity Facility | interactive TV | Interactive Voice Response | interactivity | interexchange carrier | interface | interface device | Interior Gateway Protocol | Interior Gateway Routing Protocol | interlace | interlaced display | interlaced GIF | intermediary | intermediate distribution frame | Intermediate System-to-Intermediate System protocol | internal net | internalnet | international callback | International Electrotechnical Commission | International Organization for Standardization | international private leased circuit | International Standard Book Number | International Standard Recording Code | international standardization organization | International System of Units | International Technical Support Organization | internationalisation | internationalization | internesia | Internet | Internet access provider | Internet Advertising Bureau | Internet advertising terms | Internet appliance | Internet Architecture Board | Internet Assigned Numbers Authority | Internet Business Framework | Internet caller ID | Internet commerce provider | Internet Control Message Protocol | Internet Corporation for Assigned Names and Numbers | Internet Engineering Task Force | Internet Explorer | Internet Explorer Administration Kit | Internet Group Management Protocol | Internet Information Server | Internet Inter-ORB Protocol | Internet Key Exchange | Internet mailer | Internet map | Internet maps | Internet Message Access Protocol | Internet Open Trading Protocol | Internet presence provider | Internet presence provider and promoter | Internet problems | Internet Protocol | Internet Protocol Security | Internet Protocol television | Internet ratings | Internet refrigerator | Internet Relay Chat | Internet Research Task Force | | Internet Server Application Program Interface | Internet service provider | Internet Society | Internet time | Internet timeline | Internet traffic | Internet Transaction Server | Internet voting | Internet2 | Internetwork Packet Exchange | internetworking | InterNIC | interoperability | interpreted | interprocess communication | interrupt | interrupt request | intersection symbol | interstitial | Intertainment | intrabody signaling | intranet | intrusion | intrusion detection | Intrusion Detection and Prevention: Learning Guide | intrusion detection system | intrusion prevention | inverse mapping | inverse multiplexing | inverse-square law | invisible Internet | IO.SYS | ion | ionizing radiation | IOS | IP | IP address | IP address forgery | IP addressing | IP core | IP PBX | IP SAN | IP spoofing | IP storage | IP storage area network | IP tables | IP telephony | IP-PBX | IP/PBX | IPC | iPhone | iPhone demonstration (video) | iPhone image | IPI | IPL | iPlanet | IPLC | IPng | IPO | IPO | iPod | IPP | IPPBX | IPPP | IPS | IPsec | iptables | IPTV | IPv6 | IPX | IR | IR wireless | IRC | IrDA | IRIX | IRQ | irrational number | IRTF | IRU | IS | IS-IS | ISA | ISA | ISA Server | ISAM | ISAPI | ISBN | iSCSI | ISDN | iSeries | ISO | ISO 14000 and 14001 | ISO 20000 | ISO 9000 | ISO 9660 | ISO date format | ISO/IEC 17799 | ISO17799 | ISO20000 | ISOC | isochronous | isotope | isotropic radiator | ISP | ISPF | ISPs | ISRC | ISRS | issue tracking system | ISV | IT | IT Alphabet Soup Archive: 2.20.06 - 3.31.06: Daily quiz question | IT Alphabet Soup: Daily quiz question | IT blogs | IT horoscopes | IT Infrastructure Library | IT Olympics | IT Service Management | IT Survival Kit: Find a Job/Get a Raise | IT Survival Kit: Networking refreshers | IT Survival Kits | IT-ISAC | ITAA | Itanium | iterative | ITIL | ITS | ITSM | ITSO | ITU-T | ITV | IVR | IVRS | IWSR | IXC

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpJ,00.html
Alphabetical: J - 123 terms

J# | J/Direct | J2EE | J2EE: Learning Guide | J2ME | JAAS | Jabber | jabber (in networks) | jack | JAD | Jaguar | jam | jam sync | JAR file | JAX-RPC | Jaz drive | JBIG | JBIG2 | JBOD | JBoss | JCE | JCL | JDBC | JDBC Connector | JDK | JDO | JEDEC SDRAM | jello | JES | JES2 | JES3 | JFC | JHTML | jiffy | Jigsaw | Jikes | Jini | JIT | jitter | jitter buffer | JMS | JMX | JNDI | job | job control language | Job Entry Subsystem | job scheduler | job step | Joe | Joe job | Joeing | John von Neumann | Joint Academic Network | Joint Application Development | Joint Bi-level Image Experts Group | Joint Photographic Experts Group | JOLAP | Joliet | jolt | Joost | Josephson effect | Josephson interferometer | Josephson junction | Josephson tunneling | joule | journaling file system | joy stick | joystick | JPEG | JPG | JRE | JRun | JScript | JSML | JSP | JTAPI | Juarez | Jughead | Julian calendar | Julian date | jumbogram | jump page | jumper | jumper block | jumper cable | jumper setting | JUnit | junk e-mail | just a bunch of disks | | JVM | JXTA | Jython

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpK,00.html
Alphabetical: K - 79 terms

K Desktop Environment | K-12 | k-business | K-map | K56flex | K6 | K7 | Karnaugh map | Katmai | Kazaa | Kazaa Media Desktop | Kbps | KBW | Kbyte | KDE | Keep It Simple, Stupid | keitai | kelvin | Kerberos | Kermit | kernel | kernel panic | key | key chain | key chain drive | key fob | key logger | key performance indicator | key station | key string | keyboard | keyboard wedge | keychain drive | keylogger | keylogging software | keyphone | keystone jack | keystone plug | keystroke logger | kHz | kibi | Kibi, mebi, gibi, tebi, pebi, and all that | kill switch | killer app | killswitch | kilo | Kilo, mega, giga, tera, peta, and all that | kilocalorie | kilogram | kilogram per meter cubed | kilogram-meter per second | kilowatt-hour | kinetic energy | kiosk | Kirchhoff's Laws for current and voltage | KISS Principle | Klez | KLOC | kludge | KM | KMD | knowbot | knowledge | knowledge base | knowledge management | knowledge management software | knowledge warehouse | knowledge worker | Korn shell | KPI | Kriz virus | | KVM switch | KW

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpL,00.html
Alphabetical: L - 282 terms

L1 | L1 and L2 | l10n | L2 | L2TP | lamb | lambda | lambda calculus | lambda switching | lamer | LAMP | LAN | LAN party | LANDesk Client Manager | landing page | landscape | Langmuir-Blodgett film | laptop | laptop computer | laptops for children | laser | laser diode | laser printer | laserdisc | last-mile technology | LATA | latency | latest discovery | latitude | latitude and longitude | law of diminishing returns | lawful interception | layer | layer 2 | layer 3 | layer 4-7 router | Layer Two Tunneling Protocol | layering | lazy loading | LB film | LBA | LBS | LCC | LCD | LCP | LDAP | LDAP injection | LDCM | LDIF | LDQ | lead generation | leaderboard | lean client | lean data transfer | lean management | lean production | lean programming | Learn IT: Malware | Learn IT: Defeating Spam in the Enterprise | Learn IT: How Spam Affects Email Marketing Campaigns | Learn IT: Instant Messaging in the Workplace | Learn IT: Software Development | Learn IT: Unleashing the Power of the Database | Learn IT: Web Services | learning aid | Learning Guide: Firewalls | Learning Guide: ROI | Learning Guide: Spyware | Learning guides and tutorials | learning management system | Learning Path: Basic Computer Concepts | Learning Path: Basic Network Concepts | Learning Path: Computer Details | Learning Path: CRM (Customer Relationship Management) | Learning Path: Cyberculture | Learning Path: Cybers and Virtuals | Learning Path: E-Business | Learning Path: Electronics | Learning Path: Internet Ideas and Issues | Learning Path: malware | Learning Path: Learning Path: Network and Web Site Administration | Learning Path: Network Infrastructure | Learning Path: New Technologies | Learning Path: Operating Systems and Applications | Learning Path: Programming | Learning Path: Security | Learning Path: Strange or Interesting Terms | Learning Path: Telephony and Wide Area Networks | Learning Path: Television and Cable TV | Learning Path: Testing network cable | Learning Path: Transmission Methods | Learning Path: Using Your Computer | Learning Path: Well-known Standards and Organizations | Learning Path: Wireless and Cellular | Learning Path: Wires and Cables | Learning Paths | leased line | LEC | LEC | LECs | LED | leet | leet speak | leetspeak | leetspeek | legacy | legacy application | legacy operating system | legacy platform | Legal Discovery | lemniscate | length | LEO | | Leonardo Pisano | Leonardo's car | letterpress | level of support | leverage | Lex | LexiBot | lexical scoping | LI | Li-Ion battery | library | license | lifestyle polygraph | Light | light-emitting diode | light-emitting polymer | lights out management | lights-out management | lightweight | Lightweight Directory Access Protocol | lightweight thread | lightweight, middleweight, and heavyweight threads | LILO | limit | limited combustible cable | Lindows | line doubler | line information database | line print terminal | line-of-business application | linear IC | linear integrated circuit | linear tape | Linear Tape-Open | linearity | link | link checker | Link Control Protocol | link encryption | Link Quality Source Routing | link type | linkrot | Linspire | Linus Torvalds | Linux | Linux basics for Windows pros: Learning Guide | Linux Foundation | Linux freeware and shareware guide | LInux LOader | Linux logo | Linux Standard Base | liquid | liquid | liquid cooling | liquid crystal display | liquid robot | liquid-tight strain-relief connector | LISP | list processing (language) | list server | list washing | listener | listserv | Litestep | liteware | Lithium Ion battery | little-endian | live cam | live capture | live migration | LiveDistro | LLC | LMDS | LMS | LNP | load balance | load balancing | load coil | loader | loading | loading coil | LOB | local access and transport area | local area network | local exchange carrier | local loop | Local Number Portability | localization | location poisoning | Location Routing Number | location-based services | lock | locking | log | logarithm | logarithmic | logic bomb | logic gate | logical AND symbol | logical block addressing | logical equivalence | logical implication | Logical Link Control layer | logical negation symbol | logical OR symbol | logical partition | logical router | logical unit | logical unit number | Logistics Execution System | logon | Logwatch | LOL | LOM | long distance carrier | long ICMP | long tail | long-distance carrier | long-haul optics | longest delay in queue | longitude | longitudinal time code | look to book | look-to-book ratio | loop | loopback | loopback test | lossless | lossless and lossy compression | lossless compression | lossy | lossy compression | Lotus iNotes Web Access | Lotus Notes | Lotus Notes & Domino | Lotus Workplace | LotusScript | LotusScript: Learning Guide | lowerCamelCase | LPAR | LPT | LPT1 | LPT2 | LPT3 | LQSR | LRN | LSB | LSB project | LTC | LTO | LU 6.2 | luddism | Luddite | LUHN formula | lumen | luminous flux | luminous intensity | LUN | lurking | lux | Lynx | LZW compression

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpM,00.html
Alphabetical: M - 510 terms

M | M theory | m-commerce | m-Life | m-payment | M-theory | M2M | Mac | MAC address | MAC layer | Mac mini | Mac OS | machine code | machine vision | machine-to-machine | Macintosh | macro | macro instruction | macro virus | MAE | magnetic field | magnetic field strength | magnetic permeability | magnetic potential | magnetic resonance imaging | magnetic strip reader | magnetic stripe reader | magnetic tape | magneto-optical | magneto-optical drive | magnetomotive force | magnetoresistive head technology | magnetoresistive RAM | magstripe reader | MAID | mail bomb | mail router | mail server | mail server program | mail transport agent | mail user agent | mailing list | mailing list server | main storage | mainframe | Major IT players: How'd they start out? | Majordomo | make | Make Whatis.com your home page | makefile | male connector | Malicious Computer Code: Glossary | malware | malware throttling | Malware: Glossary | Malware: Learning Guide | Mammoth | MAN | man in the browser | man in the middle | man in the middle attack | man page | managed bean | managed learning environment | managed security service provider | managed security services | managed service provider | management information base | management information systems | management service provider | Manchester encoding | manual restore point | Manufacturing Message Specification | MAPI | mapping service | maps | Mapuccino | marcom | Marimba | market segmentation | marketing encyclopedia | markup | marshalling | mash-up | mask | Mason | masquerade | mass | Massachusetts General Hospital Utility Multi-Programming System | massive array of idle disks | massively parallel processing | master | Master and Commander: Do you speak business? | master data management | master file table | master/slave | masthead | material density | material quantity | math coprocessor | math symbols | Mathematical Symbols | MathML | MathXML | matrix | Matrix, The | matter | MAU | maximum segment size | maximum transmission unit | Maya | MB | MBean | MBone | mbox | Mbps | MBR | MCA | MCL | MCM | Mcps | MCSE | MD2 | MD4 | MD5 | MDD | MDI | MDI/MDIX | MDIX | MDM | MDp | MDRAM (Multibank Dynamic RAM) | mean | mean opinion score | mean-swap-between-failure | meaning of life | measurement units | mebi | media | Media Access Control address | Media Access Control layer | media access management | media attachment unit | media gateway | Media Gateway Control Protocol | media type | median | medium | medium earth orbit satellite | mega | | megachips per second | Megaco | megaflop | megahertz | megapixel | megatransfer | Melissa virus | meme | memory | memory card | memory leak | Memory Spot | Memory Stick | MEMS | menu | MEO | MEO satellite | MEPIS | Merced | Mersenne prime | Mesh Connectivity Layer | mesh network | message | message authentication code | message board | message broker | message integrity code | message queueing | message transfer agent | message-driven processing | messages | messaging | Messaging Application Program Interface | messaging server | messaging software | meta | meta refresh | meta tag | metabase | metabolomics | metacharacter | metadata | metadata repository | metadatabase | metafile | MetaFrame | metainformation | metal-oxide semiconductor field-effect transistor | metasyntactic variable | Metcalfe's Law | meter | meter cubed | meter cubed per kilogram | meter per second | meter per second squared | meter squared | meter-kilogram-second system of units | metered services | method | metric | metric system | metropolitan area network | mezzanine | MFC | MFP | MFSK | MFSK16 | MFT | mho | MHP | MIB | MICR | Micro Channel Architecture | micro fuel cell | micro-electromechanical systems | microcent | microchip | microchip art | microcode | microcommerce | microcomputer | microfarad | microfluidics | microformat | microformats | microhand | micrometer | micromovie | micron | micropayment | microprocessor | microrobot | microsatellite | microsecond | microsite | Microsoft | Microsoft Antigen | Microsoft Certified Solution Developer | Microsoft Certified Systems Engineer | Microsoft Exchange | Microsoft Foundation Class Library | Microsoft Internet Explorer | Microsoft Management Console | Microsoft Point-to-Point Encryption | Microsoft SQL Server | Microsoft Transaction Server | Microsoft Virtual Server | microwave | microwave integrated circuit | mid-air messaging | middleware | middleweight thread | MIDI | midrange | migration | mil | military off-the-shelf | | milli | milliampere hour | million instructions per second | Millipede | millisecond | MILNET | MIM | MIME | MIMO | Mini-ITX | miniaturized satellite | minicom | minicomputer | minisite | Minix | minutiae | MIP map | mipmap | MIPS | MIPv6 | Mira | mirror | mirror site | mirroring | MIS | MISO | MIT OCW | MIT OpenCourseWare | mks system of units | MLE | mLife | MMC | MMDS | MME | MMS | MMX | mnemonic | MO drive | mobbing | Mobile and Wireless Development: Learning Guide | mobile blog | mobile commerce | mobile computing | mobile device management | Mobile IP | Mobile IPv6 | mobile node | mobile payment | mobile phone | mobile phone spam | mobile phone virus | mobile phone worm | mobile satellite services | Mobile Telephony Fast Reference Guide | Mobile Telephony Protocols: Glossary | Mobile Telephony: Do you speak Geek on the phone? | Mobile Veepers | mobile VPN | mobile wallet | mobility agent | Mobitex | moblog | moblogging | mobo | mobster | mock object | mode (statistical) | model-driven development | model-view-controller | modem | modem bonding | modem doubling | modem error-correcting protocols | modem lights | modem teaming | modem V.xx standards | modification detection code | moire effect | MOLAP | mole | mole per meter cubed | molecular cross latch | molecular manufacturing | molecule | Molex | momentum | moniker | monitor | monotonicity | Monte Carlo analysis | Monte Carlo method | MOO | Moof | moof monster | Moon's mean radius | moonbounce | Moore's Law | More job search tips and advice | Morphis | Morse code | Mortimer | MOS | Mosaic | MOSFET | Mosquito teen repeller | motherboard | motherboard tattoo | Motif | motion plan | MOTS | mount | mounting | mouse | mouse miles | mouse potato | mouseover | mousepad | Mozilla | MPE | MPE/iX | MPEG | MPEG standards | MPEG-4 AVC | MPLS | MPP | MPPE | MQSeries | MR | MRAM | MRI | mrouter | MrSID | MS-DOS | MSAU | MSB | MSBF | MSIE | MSP | MSS | MSSP | MSXML | MT/sec | MTA | MTBF | Mtops | MTS | MTU | mu | mu-Law | MUA | MUD | multi-core | multi-core processing | multi-core processor | multi-frequency shift keying | | multi-part virus | Multi-Purpose Internet Mail Extensions | Multi-resolution Seamless Image Database | multi-tapping | Multi-User Dungeon | multicast | Multicast Backbone | Multicast Dissemination Protocol | Multicast Internet | multicast router | multicasting | multichannel marketing | Multichannel Multipoint Distribution Service | multicore processor | Multics | multidimensional database | multidimensional online analytical processing | multifactor authentication (MFA) | multifunction peripheral | multifunction printer | multifunction product | multihome | multihomed | multilink bundle | multimedia | Multimedia Card | Multimedia Home Platform | Multimedia Messaging Service | Multimedia Messaging System | MultiMediaCard | multimode fiber | multipartite virus | Multiple Document Interface | multiple frequency shift keying | Multiple Virtual Storage | multiple-zone recording | multiplexed | Multiplexed Information and Computing Service | multiplexing | multiprocessing | multiprogramming | Multiprotocol Label Switching | Multiprotocol Lambda Switching | multisession CD | multistation access unit | multitasking | multithreading | MULTOS | MUMPs | munge | munging | Murker | Murkogram | Murphy's Laws of Information Technology | mutex | mux | MyODBC | myoelectric signal | mySAP | MySAP Workplace | MySpace | MySQL | MySQL Connector/ODBC | mystery whisperer | Mytob | MyWeb2.0

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpN,00.html
Alphabetical: N - 271 terms

| n00b | N1 | NAC | Nagios | nagling | nagware | NAK | named pipe | namespace | NAND | nanite | NAP | Napster | narrowband | narrowcasting | NAS | NAS accelerator | NAS accelerators | NAT | National Call Fee Access | National Computer Security Center | national ID card | national identity card | National Institute of Standards and Technology | National Security Agency | National Television Standards Committee | native | native code | NATO off-the-shelf | natural language | natural number | Navy Knowledge Online | NBA | NBAD | NBMA | NCFA | NCM | NCSA | NCSC | NDIS | NDMP | NDS | Near Field Communication | near-end crosstalk | near-line storage | nearshore outsourcing | NED | nematic liquid crystal | neo-luddite | neologism | nerd | Nessus | nested | net | Net appliance | net filter | Net fridge | net metering | Net neutrality | NetBEUI | Netcaster | netfilter | netfilter/iptables | Netfinity | netiquette | netizen | netmask | NetPC | NetRexx | netroots | Netscape | Netscape Server Application Programming Interface | netsplit | NetWare | NetWeaver | network | network access control | network access point | network access server | Network Address Translation | network analyzer | network behavior analysis | network behavior anomaly detection | Network Cabling Tutorials | network computer | network configuration management | Network Data Management Protocol | network encryption | Network File System | network forensics | Network Information System | network interface card | network interface unit | network intrusion detection systems | Network Job Entry | Network layer | network load balancing | network neutrality | Network Node Manager | network operating system | network operations center | network order | network PC | network perimeter | network scanning | Network Service Access Point | network service provider | network terminating unit | network terminator 1 | Network Time Protocol | network tracking tool | network unified storage | network virtualization | network-attached storage | networking | networking chip | Networking freeware and shareware guide | Netzip | neural network | neuromarketing | neutrino | neutron | new media | new product development | newb | newbie | Nework Address Translator | newsgroup | NewsML | newsXML | newton | newton-second | NeXT | NeXT computer | Next Generation Secure Computing Base | Next Hop Resolution Protocol | NFAT | NFC | NFS | NGSCB | Ni-Cd battery | Ni-MH battery | Ni2 | nibble | NIC | NIC handle | niche off-the-shelf | Nickel-Cadmium battery | Nickel-Metal Hydride | Nickel-Metal Hydride battery | NIDS | Nikola Tesla | nil | Nimda | NIS | NIS | NIS+ | NIST | NIST 800 Series | NIST-F1 | nit | NJE | NKO | NLX | NNI | NNM | NNTP | no op | no-swipe credit card | NOAA Weather Radio | NOC | node | noise | nomadic computing | nomadicity | non-breaking space | non-broadcast multiple access | non-disclosure agreement | non-geographic number | non-heatset | non-interlaced display | non-repudiation | non-return-to-zero | non-virtual hosting | non-volatile storage | nonce | nonlinearity | nonrepudiation | nonuniform rational B-spline | nonvolatile memory | nonvolatile RAM | nonvolatile storage | noob | NOR | norm | normal forms | normalization | normative | Northbridge | Northwood | NOT | not element-of symbol | notebook computer | Notes | NOTS | Novell Directory Services | NPD | nroff | NRZ | NSA | NSAP | NSFNET | nslookup | NSP | NT | NT file system | NT1 | NTFS | NTP | NTS | NTSC | nuclear fusion | nuclear time unit | nuking | null modem | null set | NUMA | number portability | number theory | Number Translation Service | numbers | numeric coprocessor | NUnit | NUS | NVRAM | NVS | NWay | NWR | nym | Nyquist Theorem

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpO,00.html
Alphabetical: O - 240 terms

OA&M | OA&M | OASIS | obfuscate | obfuscation | obfuscator | OBI | object | object code | Object Linking and Embedding | Object Management Group | Object Request Broker | object-oriented | object-oriented database management system | object-oriented programming | obliquity | OC levels | OC-1 | OC-12 | OC-192 | OC-2 | OC-256 | OC-3 | OC-48 | OC-768 | OC-x | occupancy | occupations | | OCR | OCSP | octal | octet | OCW | OCX | OD computing | ODBC | ODBMS | ODI | ODL | ODMA | ODMR | ODP | ODS | Oe | OEM | oersted | OFB | OFDM | office cubicle | office hoteling | offline | offline backup | offline folder file | offset lithography | offset printing | offshore outsourcing | Offshore Outsourcing: Do you speak geek? | offshoring | Ogg Vorbis | Ogo | OH | ohm | Ohm's Law | ohnosecond | OK | OLAP | OLE | OLE DB | OLTP | OMG | On Demand Computing | on the fly | on-demand computing | On-Demand Mail Relay | on-demand printing | on-screen display | on-screen keyboard | ONE | one-armed router | one-molecule transistor | one-time pad | one-to-one marketing | one-way pager | OneWebDay | online | online analytical processing | online backup | Online Certificate Security Protocol | online citation | Online Customer Privacy | online forum | online mapping | Online Public Access Catalog | online service provider | Online Service System | online transaction processing | online voting | onscreen keyboard | onshore outsourcing | ontology | ooblick | OODBMS | OOP | OOPSLA | OPAC | open | Open Buying on the Internet | open courseware | Open Data-Link Interface | Open Database Connectivity | Open Directory Project | Open Document Management API | Open eBook Forum | Open GL | Open Net Environment | Open Network Management System | Open Profiling Standard | open relay | Open Service Gateway Initiative | Open Shortest Path First protocol | Open Software Foundation | open source | open source beer | Open Source Development Labs | open source software | open system | Open Systems Interconnection | open test standard | open ticket | Open Web Application Security Project | Open Web Application Security Project Top Ten | open-source | OpenCourseWare | OpenGL | OpenNMS | OpenServing | OpenType | OpenView | OpenVMS | OpenVPN | OpenVZ | Opera | operand | operating system | operating system commanding | operational data store | operational support system | operations research | operator | OPML | OPS | opt-in email | optical amplifier | Optical Carrier levels (OCx) | optical character recognition | optical computer | optical disc | optical disk | optical fiber | optical media | optical mouse | optical storage | optical transceiver chip | optical wireless | Optivity Telephony Manager | optoelectronics | optoisolator | OR | Oracle | Orange Book | ORB | ORBS | order of magnitude | ordinal | org | organic LED | organic light-emitting diodes | organic thin-film transistor | organic transistor | Organization for the Advancement of Structured Information Standards | original equipment manufacturer | orphan file | orthogonal | orthogonal frequency-division multiplexing | OS | OS 10 | OS 10.2 | OS commanding | OS Security | OS X | OS X widget | OS-9 | OS/2 | OS/390 | OS/400 | | OSD | OSDL | OSF | OSGi | OSI | OSI Reference Model illustrated | OSP | OSPF | OSS | OST file | OTA | OTFT | OTM | OTS | Our Favorite Cheat Sheets | Our Favorite IT Sniglets | Our Favorite Technology Blogs | Our Favorite Technology Quotations | Our Latest Discovery | Our Latest Discovery Archive | out of the box | out-of-band signaling | outlet | outline | Outliner | output feedback | outsource | outsourcing | Outsourcing: Glossary | Over the Air | Over-the-Air | overclocking | overhead | overstuffing | oversubscription | OWASP | OWASP Top Ten | ownership tag

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpP,00.html
Alphabetical: P - 620 terms

P and NP | P equals NP | P versus NP | P-Ink | P/390 | P2P | P2V | P3P | P4 | PABX | packet | packet analyzer | packet filter | packet filtering | Packet Hound | packet mangling | packet monkey | packet switching | packet writing | Packet-Level Procedure | packet-switched | packet-switching | PacketHound | PACS | page | page description language | pagefile | pagejacking | pager | paid inclusion | PAIR | PAL | palette | Palladium | Palm | Palm OS | PAM | PAN | panel | Pango | Panther | paper and binding sizes | para-site | paradigm | paradox | parallel | Parallel Advanced Technology Attachment | Parallel ATA | parallel file system | parallel presence detect | parallel processing | parallel processing software | parallel sysplex | Parallel Virtual Machine | parameter | parameter RAM | parameter tampering | paravirtualization | parity | Parlay | parse | parser | parsing | partition | partner relationship management | Pascal | pascal (unit of pressure or stress) | pass phrase | passive FTP | passive optical network | passphrase | passthought | password | | password cracker | password cracking | password synchronization | Passwords: Do you speak geek? | Pasta Theory | Pasta Theory of Programming | PASV FTP | PATA | patch | patch management | patch panel | Patch Tuesday | path | path control | path to profitability | pathing | Patriot Act | Patriot Grid | PatriotGrid | | pay-per-click fraud | pay-per-use | pay-per-view | payload | PayPal | PBX | PC | PC blade | PC Card | PC demo | PC philanthropy | PC-DOS | PC100 Synchronous Dynamic Random Access Memory | PC100SDRAM | PCI | PCI | PCI-CISP | PCI-X | PCL | PCM | PCMCIA | PCMCIA card | PCS | PDA | PDC | PDD-63 | PDF | PDL | PDM | PDP-11 | peak | peak-to-peak | PEBCAK | pebi | peer review | peer-to-peer | peer-to-peer computing | peering | Pel | penetration testing | penguin | Pentium | Pentium 3 | Pentium 4 | Peoplesoft | per cent symbol | per mil symbol | percent change | percent increase / percent decrease | percent symbol | performance | perigee | perimeter | peripheral | Peripheral Component Interconnect | Peripheral Component Interconnect Extended | Perl | permanent data | permanent virtual circuit | permeability | permeability of free space | permission marketing | permittivity | permittivity of free space | Personal Access Communications System | personal area network | personal communications services | personal computer | Personal Computer - Disk Operating System | Personal Computer Memory Card International Association | Personal Computer Memory Card International Association card | Personal Data Privacy | personal firewall | Personal Handyphone System | Personal Home Page | personal operating space | personal portal | Personal Response System | Personal Search Syndication | personal supercomputer | personal TV receiver | personal video recorder | personal video station | Personal Web Server | personality profile | Personality Test: What kind of geek are you? | personalization | PERT | PERT chart | PERT/CPM | pervasive computing | peta | petaflop | pF/m | PFC | PGP | Ph | phantom dialing | pharming | phase | Phase Alternation Line | phase change | phase-lock loop | phase-locked loop | phase-shift keying | phase-state low electron drive memory | phased antenna system | phaser | phish | phisher | | PHOLED | Phone numbers | phosphorescent organic light-emitting device | Photo CD | photo messaging | photoconductivity | photon | photonic computer | photonic ink | photonic network | photonic switching | photonics | photosensor | photovoltaic cell | photovoltaics | phreak | PHS | PHTML | phtml suffix | physical layer | physical security | physical to virtual | physical unit | physical units table | pi | Pick | pico | picofarad per meter | picoliter | picosatellite | picosecond | PICS | PICTIVE | pictograph | picture element | picture messaging | pie chart | pie graph | PIN | pin or PIN | pin out | ping | ping of death | ping storm | ping strangeness | ping sweep | pink noise | pinout | PIO | pipe | pipeline burst cache | pipelining | piracy | pirate | pirating | pivot table | pixel | pixelate | pixelated | pixelation | pixels per inch | pixie dust | pixilated | pizza box server | pk | PKCS | PKI | PKUNZIP | PKZIP | PL/1 | PL/I | PL/S | PL/SQL | place shifting | placeshifter | placeshifting | plain old telephone service | plaintext | Planck's constant | planned obsolescence | planogram | plasma | plasma display | Plastic Interface for Collaborative Technology Initiatives | plastic pin grid array | platform | Platform for Internet Content Selection | Platform for Privacy Preferences | Platform for Privacy Preferences Project | PLATO | Playstation | PLC | PLEDM | plenum | plesiochronous | PLL | PLMN | plotter | plug | Plug and Play | plug-and-play | plug-in | PLUGE pattern | pluton | PM | PMML | PNG | PNG | PnP | pod slurping | podcast | Podcast: What is a blade server? | Podcast: True IT Bloopers | Podcast: What are Spam, Spim, Sping, Splog and Spit? | Podcast: What is a cognitive biometric? | Podcast: What is a Google bomb? | Podcast: What is a media-aware network? | Podcast: What is a portable application? | Podcast: What is a web content management system? | | Podcast: What is an information dashboard? | Podcast: What is crowdsourcing? | Podcast: What is FFIEC compliance? | Podcast: What is Joost? | Podcast: What is pretexting? | Podcast: What is RSS? | Podcast: What is SOA? | Podcast: What is Software as a Service (SaaS)? (Part I) | Podcast: What is Software as a Service (SaaS)? (Part II) | Podcast: What is SSI Injection? | Podcast: What is the deep Web? | Podcast: What is the shelf-life of CD-Rs? | Podcast: What is war driving? | Podcast: What is Web texting? | podcaster | podcasting | Podcasting Terms: Glossary | Podcasts, webcasts, narrowcasts and the rest of the casts: Glossary | podosphere | podslurping | PoE | point of presence | point-of-presence | point-of-sale data | point-of-sale terminal | Point-to-Point Protocol | Point-to-Point Tunneling Protocol | pointing stick | PoIP | poison reverse | polar coordinates | polarity | polarization | policy | Policy Analysis of Internet Routing | policy server | policy-based management | policy-based networking | Polish logic | Polish notation | polite cell phone | polled interrupt | polling | polyLED | polymer LED | polymorphic malware | polymorphism | polynomial | PON | Pong | POP | POP 3 | pop-under | pop-up | pop-up ad | pop-up blocker | pop-up download | pop-up menu | pop-up transition ad | POP3 | port | port 80 | port forwarding | port knocking | port mirroring | port number | port redirector | port replicator | port scan | porta-person | porta-person video | portability | portable | portable app | portable computer | Portable Document Format | portable keyboard | portable media center | Portable Network Graphics | Portable Operating System Interface | portal | Portal Markup Language | portal software | porting | portlet | portrait | POS | POS data | POS scanner | POS terminal | positional assembly | positron | POSIX | POST | postcardware | postfix notation | PostgreSQL | Postscript | Postscript Printer Description file | potential energy | POTS | power | power factor controller | power factor correction | Power over Ethernet | power PC | power-down | Power-Line Communications | power-of-10 notation | power-off | power-on | Power-On Self-Test | power-up | PowerBuilder | Powercast | PowerPC | PowerPoint | PPD | PPD file | PPGA | ppi | PPP | PPPoE | PPTP | Practical Extraction and Reporting Language | PRAM | Pray over Internet Protocol | Pray over IP | pre-N | preamble | predication | predictive analytics | predictive churn modeling | predictive dialer | predictive model | Predictive Model Markup Language | predictive modeling | predictive technology | predictor | preemptive multitasking | prefix multiplier | prefix notation | Premium Rate Service | presence awareness | presence technology | presentation layer | presentation software | Presidential Decision Directive 63 | pressure | pressure sensing | pressure, standard | pretexting | Pretty Good Privacy | PRI | price scanner | primary domain controller | primary key | Primary Rate Interface | primary storage | prime contract | | primitive | PRINCE 2 | PRINCE2 | principle of obliquity | print server | printer | Printer Control Language | Printing terms: Glossary | Printing/output freeware and shareware guide | printout | privacy | private automatic branch exchange | private branch exchange | private key | private port numbers | privilege | privileges | Prize-winning Fibbers! | PRM | PRNG | probability | problem program | problems | procedural language extension to structured query language | process | processor | processor serial number | product | product development | product development management | profile | program | program language generations | program layer | program temporary fix | programmable read-only memory | Programmed Data Processor-11 | Programmed Input/Output | Programmed Logic for Automatic Teaching Operations | programming language generations | Programming Language/System | progressive JPEG | project management | project plan | project planning | ProLiant | promiscuous mode | propagation delay | propeller head | propellor head | proper subset symbol | proportion | proportionality | proprietary | protected mode | Protecting America's Critical Infrastructures | protocol | protocol analyzer | protocol-independent multicast | proton | prototype | prototyping | Prototyping Model | provision | provisioning | proximity sensing | proxy | proxy server | PRS | PS/2 | PS/2 connector | PS1 | PS2 | PS3 | pseudo-infinite loop | pseudo-random number generator | pseudocode | pseudonymous profile | PSK | PSK31 | PSS | PST file | PSTN | PTF | PTR | PTT | PU | public domain software | public folder | public key | public key certificate | public key infrastructure | public land mobile network | public sector | public switched telephone network | Public-Key Cryptography Standards | pulsing zombie | PunchOut | PUP | Puppy | Puppy Linux | pure-play | Purple Book | push | push technology | Push to Talk | PV cell | PVC | PVM | PVS | PWS | PXE |

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpQ,00.html
Alphabetical: Q - 162 terms

Q signaling | Q.931 | Q931 | QA/QC | QAM | QC | QDOS | QFE | QoS | QPS | QSIG | quad | Quad FastEthernet | quad tree | Quagga | quality | quality assurance | quality control | Quality of Service | quantum | quantum computer | quantum computing | quantum cryptography | quantum dot | Quantum Extended Graphics Array | quantum indeterminacy | quantum interference | quantum measurement indeterminacy | quantum mirage | quantum theory | quark | Quarter Video Graphics Array | qubit | queries-per-second | query | Query by Example | querystring | queue | queueing theory | Quick Fix Engineering | Quick Place | Quick Web | QuickPlace | Quicktime | quiesce | quiet zone | quintessence | quiz | Quiz -- Software development | Quiz: Do You Know Me? You Should! | Quiz: IT terms that sound like animals | Quiz: Malware | Quiz: A taste for tech? | Quiz: Artificial Intelligence | Quiz: AS/400 | Quiz: Authentication Methods | Quiz: Believe it or Not (Answers) | Quiz: Believe it or Not: Do you speak Geek? | Quiz: Business Intelligence | Quiz: Common Vulnerabilities | Quiz: Compliance | Quiz: Computer Nostalgia | Quiz: Computer Nostalgia 2.0 | Quiz: Cryptography | Quiz: Cryptography answer key | Quiz: Customers and Call Centers | Quiz: Data Storage | Quiz: Database Basics | Quiz: Database II | Quiz: Do you eat Geek? | Quiz: Do you speak Geek during the holidays? | Quiz: Do you speak Geek, Greek, or Elvish? | Quiz: Do you speak geek? | Quiz: Do you speak project management? | Quiz: E-business trends and technologies | Quiz: E-mail Marketing and the Spam Problem | Quiz: Ego-Booster | Quiz: Ethernet | Quiz: Firewalls | Quiz: Getting Your Message Across the Network | Quiz: Greening the cube farm | Quiz: Halloween IV: Can you shriek Geek? | Quiz: Help Desk Basics | Quiz: How do you pronounce IT in Geek? | Quiz: HP | Quiz: IM lingo 4U | Quiz: Improve your memory! | Quiz: In the Spammer's Lair | Quiz: integrated threat management | Quiz: Intrusion prevention fundamentals | Quiz: iSeries (AS/400) Commands | Quiz: iSeries (AS/400) History | Quiz: IT lives! | Quiz: IT Potpourri | Quiz: IT's About Taxes | Quiz: IT's about time! | Quiz: IT's all about communication | Quiz: IT's Greek to me! | Quiz: Laptops | Quiz: Linux Basics | Quiz: Looney Tunes | Quiz: March of the Penguin (Linuxworld Boston, 2006) | Quiz: More fun with open source | Quiz: Name my claim to fame! | Quiz: Nasties in the news | Quiz: Negotiating -- Do you speak business? | Quiz: Netiquette savvy or savage? | Quiz: Networking Hardware | Quiz: Online threats to privacy | Quiz: Open and shut! | Quiz: Operating Systems | Quiz: Peripherals | Quiz: Presence Technology | Quiz: Printers and printing | Quiz: Processing Power | Quiz: Protocols | Quiz: Recycling electronic equipment | Quiz: Romancing the Geek | Quiz: Ruling Your IT Universe | Quiz: Securing Your Network | Quiz: Security Attacks | Quiz: Security Awareness for End Users | Quiz: Security Basics | Quiz: Servers | Quiz: Short & Sweet! | Quiz: Spam, Spam and More Spam | Quiz: SQL Server 2000 | Quiz: Storage Smarts | Quiz: Talkin' tech turkey | Quiz: TCP/IP | Quiz: Tech or treat! | Quiz: Test your regulatory compliance smarts | Quiz: The robots are coming! | Quiz: Top tech picks for 2006 | Quiz: Troubleshooting | Quiz: Unleashing the Power of the Database | Quiz: Virtual virtuosity | Quiz: Virtualization News | Quiz: Web Management Basics | Quiz: Web server security | Quiz: Web Services | Quiz: Web Site Performance | Quiz: What the Dickens! | Quiz: What's the Big Idea? | Quiz: Who Done IT? A Murder Mystery | Quiz: Winter Blues | Quiz: Wireless | Quiz: Wireless LANs | Quiz: Wireless Standards and Protocols | Quiz: Workstations | Quiz: Writing for business | Quizzes | QVGA | QWERTY | QWERTY keyboard | QXGA

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpR,00.html
Alphabetical: R - 389 terms

R-BGAN | R-value | R/2 | R/3 | R/3 Repository | R/390 | RA | RAC | race condition | raceway | RACF | rack | rack server | rack-mounted | RAD | radar | radian | radian per second | radian per second squared | radiant intensity | radiation shield | Radio Data System | radio detection and ranging | radio frequency | radio frequency identification | radio paper | radioactivity | RADIUS | RAID | RAID-6 | RAID_ADG | Rails | RAIN | rain fade | RAM | RAMAC | RAMAC (original) | Rambus | Rambus DRAM | RAMDAC | RAND | random access memory | random array of independent nodes | random number | random numbers | range (statistical) | range scan | rapid application development | RARP | RAS | raster | raster graphics | raster image processor | rasterized | ratio | rational number | Rational Rose | Rational Unified Process | RavMonE virus | raw data | raw spool files | ray casting | ray tracing | raytracing | RBAC | RBOC | RCA connector | RCA video | RCP | RD | RDBMS | RDF | RDF Site Summary | RDMA | rDNS | RDO | RDP | RDRAM | RDS | reach | reactance | reactive power | read-only memory | readerboard | reagent | real life | real number | real time | real-time | real-time analytics | real-time clock | real-time collaboration | Real-time CRM Analytics | real-time data analytics | real-time data integration | real-time intelligence | real-time operating system | Real-Time Transport Protocol | real-world time | RealAudio | Really Simple Syndication | reasonable and nondiscriminatory | recency, frequency, monetary analysis | receptacle | reciprocal meter | reciprocity | recommended sites | reconfigurable processor | reconfigurable tactile display | record | record standardization | recordable DVD | Recording Industry Association of America | recovery | recovery point objective | recovery time objective | recursion | recursive acronym | Red Book | Red Hat | Red Hat Linux | red route | red screen of death | Red Sox | red team | red teaming | Red-hat Package Manager | redact | redacted | redacting | redaction | redirect | redirection | reduced instruction set computer | redundancy | redundant | redundant array of independent nodes | redundant array of inexpensive disks | reentrant | refactoring | reference data | refresh | refresh rate | refurbish | refurbished | refurbishing | regex | regional Bell operating company | Regional BGAN | register | Register of Known Spam Operations | registered port numbers | registration authority | registration, admission, and status | registry | regression testing | regular expression | rehome | REJ | relational database | relational database management system | relational online analytical processing | relative ID | relative identifier | reliability | Reliability, Availability and Serviceability | reliable array of independent nodes | reload | remailer | remote access | remote access server | Remote Access Server Application Program Interface | Remote Authentication Dial-In User Service | Remote Data Objects | Remote Desktop Protocol (RDP) | Remote Direct Memory Access | Remote DMA | Remote Function Call | Remote Installation Service | Remote Job Entry | Remote Method Invocation | Remote Network Access Application | Remote Network Monitoring | remote printing | Remote Procedure Call | remote storage replication | remote wake-up | remote wakeup | remote-control software | render | Rendezvous | rendundant array of independent disks | reparse point | repeat unique user | repeater | replicate | replication | replicator | Report Program Generator | repository | representational state transfer | reprographics | Request for Comments | request for proposal | request for quotation | requirements analysis | requirements creep | requirements engineering | requirements stability index | research starting places | Reseau Numerique a Integration de Services | reseller | reseller hosting | Resilient Packet Ring | resistance | resistor | resolution | Resource Access Control Facility | Resource Description Framework | Resource Reservation Protocol | response time | responsibility | REST | restore | restore point | Restriction of Hazardous Substances Directive | retractable e-mail | return merchandise authorization | return on investment | return-to-zero | reuse-oriented development | reuse-oriented model | reverb | reverberation | Reverse Address Resolution Protocol | reverse DNS | reverse engineering | reverse proxy server | reverse Telnet | rewritable DVD | Rexx | RF | RFC | RFID | RFID hacking | RFID Learning Guide: Learning Guide | RFID tagging | RFID virus | RFM | RFM analysis | RFP | RFQ | RGB | RIAA | RIBLOE | rich client | Rich Client Platform | rich media | Rich Site Summary | Rich Text Format | RID | ridge | right of use | rights | rights to light | Rijndael | RIMM | ring | ring back | ring network | ring tone | ringback | ringing tone | ringtone | RIP | ripper | RIS | risk analysis | risk management | Riven | Rivest-Shamir-Adleman | RJ | RJ-11 | RJ-14 | RJ-45 | RJ-XX | rlogin | RMI | RMON | rms | Rnext | RNIS | roam | roaming | roaming service | Robokoneko | robot | robot blimp | robot kitten | robotic dirigible | robotic vacuum | robotics | Robson | robust | rocker switch | Rocket eBook | ROD | Roentgen | rogue | RoHS | ROI | ROKSO | ROLAP | Role-based access control (RBAC) | role-playing game | roll back | rollback | rollout | rollover | Rollyo | Roomba | root directory | root server system | root-mean-square | rootkit | rootkits | RoR | Rosetta | ROT-13 | | ROTFL | rotoscoping | round-trip delay | round-trip time | roundtripping | route poisoning | router | Routers: Do you speak geek? | routine | routing | Routing Information Protocol | routing switch | routing table | roving analysis port | row | row address strobe | RPC | RPG | RPM | RPM Package Manager | RPO | RPR | RS-232C | RSA | RSI | RSS | RSS feed | RSS feeds on WhatIs.com | RSS reader | RSS: Glossary | RSS: Learning Guide | RSVP | RTC | RTD | RTF | RTO | RTOS | RTP | RTT | Ruby | Ruby on Rails | rule base | run book | runbook | running disparity | runt | runtime | RUP | RWU | RZ

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpS,00.html
Alphabetical: S - 942 terms

S interface | S-HTTP | S-Video | S. 877 | S.M.A.R.T. | S/390 | S/MIME | S/N | S/PDIF | SA | SAA | SaaS on demand | Sable | SACD | Safari | Safe Harbor | safe mode | SafeWeb | sales cycle | sales force automation | sales force automation software | salt | SAM | Samba | Same Time | Sametime | SAML | sample rate | SAN | SAN file system | SAN island | SAN routing | SAN School: Storage University | sandbox | SAP | SAP CRM: Learning Guide | SAP Exchange Infrastructure | SAP Integration Adapter | SAP Integration Repository | SAP Integration Server | SAP NetWeaver: Learning Guide | SAP Security: Learning Guide | SAP User Conference | SAP XI: Learning Guide | SAPPHIRE | SAR | Sarbanes Oxley | Sarbanes-Oxley | Sarbanes-Oxley Act | SAS | SAS 70 | SASID | SATA | satellite | satellite (transmission) | satellite Internet connection | satellite news gathering | satellite radio | satellite return Internet connection | saturation | SAX | SB-1386 | SCADA | scalability | scalable | scalable font | Scalable Processor Architecture | Scalable Vector Graphics | scalar | scam-baiting | scan converter | scan set | ScanDisk | scannable resume | scanner | scanner-friendly resume | scanning tunneling microscope | Scarlet Book | SCART connector | schema | schemata | Schrodinger's cat | SCI | scientific notation | SCM | Scooba | Scooter | SCORM | screaming cell phone | screen | screen capture | screen name | screen order | screen pop | screen printing | screen saver | screen scraping | screen shot | script | script kiddie | script kiddy | scrub | scrubbing | Scrum | SCSI | SCTP | scumware | scuzzy | SD | SD card | SD2 | SDARS | SDDL | SDH | SDI | SDK | SDL | SDLC | SDLC model | SDMA | SDP | SDR | SDRAM | SDTV | SDWT | sealed box computer | seamless interface | search engine | search engine optimization | Search for Extraterrestrial Intelligence | search-and-replace | SearchCRM.com's Data Quality: Learning Guide | SearchCRM.com: Learning Guide | searching | SearchSecurity.com: SearchSecurity.com's Learning Guide Library | SearchWebServices.com Chapter Downloads: Chapter Library | SearchWebServices.com's new and updated learning guides: Learning Guides | SearchWinIT.com: Learning Guides | Seasonal hint # 1 | Seasonal hint # 10 | Seasonal hint # 2 | Seasonal hint # 3 | Seasonal hint # 5 | Seasonal hint # 6 | Seasonal hint # 7 | Seasonal hint # 8 | Seasonal hint # 9 | Seasonal hint #4 | seat | seat management | second | Second Life | second-hand | second-level domain | secondary storage | secret key | Secret Word of the Day Archive 2.20.06 - 3.31.06: Daily quiz question | Secret Word of the Day: Daily quiz question | Section 508 | sector | Secure Electronic Transaction | Secure HTTP | Secure Multi-Purpose Internet Mail Extensions | Secure Shell | Secure Shell Charter | Secure Socket Shell | Secure Sockets Layer | security | Security Assertion Markup Language | security audit | security certification | security clearance | Security Descriptor Definition Language | Security freeware and shareware guide | security ID | security identifier | security policy | security token | SED | SED TV | SeeBeyond | segment | segmentation | segmentation and reassembly | SEI | seize | self-assembly | self-destructing email | self-directed work team | self-healing | Self-Monitoring Analysis & Reporting Technology | self-replication | Self-Scanned Amorphous Silicon Integrated Display | self-scanning | self-scanning checkout | self-sending spam | Semantic Web | Semantic Web Agreement Group | semantics | semaphore | semiconductor | Sender ID | sender pays | sender permitted from | Sender Policy Framework | sendmail | SeniorNet | Sensitive Personal Data | sensor network | SEO | Sequenced Packet Exchange | sequencer | sequential consistency | Sequential Couleur avec Memoire | sequential logic | SerDes | serendipity | serial | Serial Advanced Technology Attachment | Serial ATA | serial communications interface | Serial Line Internet Protocol | serial peripheral interface | serial port server | serial presence detect | serial server | Serial Storage Architecture | serial-attached SCSI | serial-attached storage | serializer/deserializer | serigraphy | server | server accelerator card | server blade | server consolidation | server farm | Server Message Block Protocol | server space provider | server sprawl | server virtualization | server-based computing | server-push | server-side include | serverless backup | servers | service assurance | service contact port numbers | service level | service level agreement | service level management | Service Location Protocol | service oriented architecture | service oriented integration | service oriented management | service pack | Service Profile Identifier | Service Providers: Glossary | service set identifier | service-oriented architecture | service-oriented integration | service-oriented management | Services Provisioning Markup Language | servlet | session | Session Description Protocol | session hijacking | session ID | Session Initiation Protocol | session key | Session layer | session prediction | session replay | set | set theory | set-top box | SETI | SFA | SFF | SFP | SFS | SFT III | SFX | SGF | SGFXML | SGI | SGML | SGRAM | shadow password file | shadow RAM | Shannon's Law | Shannon, Claude | shape-shifting chembot | Shareable Content Object Reference Model | shared hosting | shared memory | shared source | shareware | shebang | sheep | sheep dipping | sheepdip | sheepdip computer | sheet-fed offset printing | shelfware | shell | shell command injection | shell script | shielded twisted pair | Shimmer | Shockwave | shopping cart | shopping cart software | short message | Short Message Service | short messaging | Shoshkele | shotgun debugging | shoulder surfing | shovelware | show control | SHTML | shuffle mode | SI | SIBR | SIBR contract | SID | sideband | Siebel | Siebel Systems | siemens | SIG | signal | Signal Computing System Architecture | signal-to-noise ratio | signaling | Signaling System 7 | Signaling Transport | Signalling Connection Control Part | signature file | significant figures | SIGTRAN | silence machine | silence suppression | silicon | Silicon Alley | silicon cockroach | Silicon Graphics | Silicon-on-Insulator | SIM card | SIMD | SIMM | SIMO | SIMPLE | Simple API for XML | Simple Mail Transfer Protocol | Simple Network Management Protocol | Simple Object Access Protocol | Simple Traversal of UDP through NAT | simplex | simplicity | Simputer | Simula | simultaneous peripheral operations online | sine wave | single in-line memory module | Single Instruction Multiple Data | single mode fiber | single sign on | single sign-on | single unique user | Single UNIX Specification | Single-Carrier Radio Transmission Technology | single-electron memory | single-factor authentication (SFA) | single-image random-dot stereogram | single-sourcing | single-system image | singleton | SIP | SIP authentication | SIP for Instant Messaging and Presence Leveraging Extensions | SISO | site | site map | sitelet | SiteSweeper | six degrees of separation | skin | skin effect | Skinny Client Control Protocol | skinny Linux | SKU | skunk works | skunkworks | skuzzy | Skype | SkypeOut | skyscraper | SLA | slag code | slamming | Slashdot Effect | slave | SLD | slice and dice | sliding windows | Slingbox | SLIP | slivercasting | slot | Slot 1 | slot time | slow-scan television | slowness movement | SLP | slurping | small and medium-size business | Small Business Extensible Markup Language | Small Business Innovative Research contract | Small Computer System Interface | Small Disadvantaged Business Concern | small form factor | small form-factor pluggable | Small Office Home Office | Small Particle Reagent | small to medium enterprise | small world | small world problem | small-unit metric system | Smalltalk | SMART | smart antenna | smart appliance | smart building | smart card | Smart Display | smart frame | smart home | smart home or building | smart matter | smart phone | smart radio | smart tag | Smart Tags | smart watch | smart wristwatch | smartboard | SmartDownload | SmartMedia | SmartMedia card | smartphone | SMB | SMB protocol | smbclient | SMBXML | SMDS | SME | SMF | SMI-S | SMIL | smiley | SMiShing | smoke testing | SMP | SMPTE | SMR | SMS | SMS spam | SMTP | smurf | smurf attack | smurfing | SNA | SNAFU | snail mail | snake oil | snap-in | snarf attack | sneakernet | SNG | sniffer | sniffer keystroke logger | sniglet | SNMP | snoop server | snooping | Snort | SnortSnarf | SNR | SOA | SOA record | SOA/SOI: Learning Guide | SOA: Learning Guide | SOAP | SOAP fault | SOAP: Learning Guide | sobriety cell phone | SoC | SoC test | SoC testing | | social engineering | social networking | social search | social search engine | Society of Heating, Refrigerating, and Air Conditioning Engineers | Society of Motion Picture and Television Engineers | Socket 370 | Socket 7 | sockets | socks | soft bounce | soft copy | soft handoff | soft keyboard | soft phone | softcopy | softphone | softswitch | software | software as a service | software bug | software developer's kit | software development life cycle | Software development: Glossary | Software Engineering Institute (SEI) | software keyboard | software license | software piracy | software requirements specification | Software Security | Software Update Services | software-defined radio | SOHO | SOI | solar fade | Solaris | SOLED | solenoid | solid | solid angular measure | solid-state | solid-state storage | soliton | SOM | sonar | SONET | sosofo | sound beam | sound card | Sound Designer II | sound wave | source code | source code analysis | source data | source quench | Source Quench Introduced Delay | source-route transparent bridging | Southbridge | SOX | SP | space | spacer GIF | spaghetti code | spam | spam blog | spam cocktail | spam confidence level | spam filter | spam for life | spam kit | spam over Internet telephony | spam ping | spam trap | Spam: Glossary | Spam: Learning Guide | spamblock | spambot | spamdexing | spamhaus | Spamhaus Project | spanning tree protocol | SPARC | Sparkle | spatial division multiple access | SPD | SPDIF | SPEC | Special Interest Group | Specialized Mobile Radio | Specific Biometric Techniques: Glossary | specific gravity | specific volume | specification of a sequence of flow objects | spectrum | spectrum analyzer | spectrum efficiency | speculation | Speech Application Program Interface | speech recognition | speech synthesis | speed of gravity | speed of light | speed of sound | speeds | spend management | SPF | SPI | SPID | spider | spim | spin | sping | spintronics | spiral model | SPIT | splash ad | splash page | splay tree | spline | split | split horizon | splitter | splitterless | splog | splogger | SPML | spod | Spoken Text Markup Language | spontaneous area network | spoof | spoofing | spool | SPR | spread spectrum | spreadsheet | sprite | spybot | spyware | Spyware glossary | Spyware: Learning Guide | SQL | SQL injection | SQL Server | SQL Server 2005: Learning Guide | SQL Server memory management: Chapter Download | SQL: Learning Guide | SQLJ | SQLJ Java | square foot | square meter | square root symbol | Squeak | SQUID | SRAM | SRM | SRS | SS7 | SSA | SSADM | SSH | SSH Charter | SSI | SSI injection | SSID | SSL | SSL card | SSL VPN | SSO | SSP | SST | SST virus | SSTV | stack | stack smashing | stackable hub | stacked organic light-emitting device | stale data | stamped e-mail | stamped multisession CD standard | standalone dump | standard definition television | Standard Generalized Markup Language | Standard Industrial Classification Code | Standard MIDI File | Standard Performance Evaluation Corporation | standard temperature and pressure | standard units | standardization | standby | standby power | standing-wave ratio | Stanford Bunny | Stanford Bunny: Linear elastic model (video) | Stanford Bunny: Neohookean elastic model (video) | star network | Star processor | StarBand | StarOffice | start of authority record | stash hunt | statampere | statcoulomb | state diagram | state machine | stateful inspection | stateless | statement of work (SOW) | Statement on Auditing Standards No. 70 | statfarad | stathenry | static | static analysis | static IP address | static IP address/dynamic IP address | static jitter buffer | static random access memory | statistical mean | statistical mean, median, mode, and range | statistical time-division multiplexing | statohm | statsiemens | statvolt | statwatt | STDM | stealth | stealth virus | Stefan-Boltzmann constant | steganographic | steganography | stepless frequency control | stepper motor | stepping | steradian | stickiness | STM | STML | stochastic | stockkeeping unit | stop list | stop word | stop words | storage | storage area management | storage area network | storage at the edge | storage card | storage consolidation | storage convergence | storage distance extension | storage encryption | storage filer | storage management | Storage Management Initiative Specification | storage media | storage medium | storage network | storage provisioning | storage reference | storage replication service | storage resource management (SRM) | storage security | storage service provider | storage technologies | storage tunneling | storage utilization | storage virtualization | storage zoning | stored procedure | Stored Procedure primer: Chapter Download | stove-piped development | STP | strange matter | Stratellite | straw man | strawman | stream cipher | Stream Control Transmission Protocol | streaming | streaming media | streaming sound | streaming video | Streamlined Sales Tax | stretchable silicon | string | string theory | strobe | strong password | strongly-typed | Structured Graph Format | structured programming | Structured Query Language | Structured Systems Analysis & Design Method | Structured Wireless-Aware Network | Strunk's rules | stub | Stuff I've Seen | STUN | style sheet | stylus | subcarrier | subcontract | subnet | subnet mask | subnetwork | subpoena | subscriber identity module | subset symbol | substrate | sudo | suffix | suite | sum | summation | Sun | sun interference | Sun Microsystems | Sun ONE | SunOS | Super Audio CD | Super DMCA | Super Video | supercomputer | supercomputer center | supercomputer centers | superconducting quantum interference device | superconductivity | superconductor | SuperDLT | Superdome | superhet | superheterodyne | supernet | supernetting | superposition | superscalar | superstitial | superstring theory | supervisor call | supervisory control and data acquisition | SuperZap | supplier exchange | supplier relationship management | supply chain management | support | support level | surd | surf | surface-conduction electron-emitter display | surge protector | surge suppressor | susceptance | SuSE | sustaining technology | SVC | SVG | SVGA | SWAG | SWAN | swap file | swap space | SWIFT | Swing | swirl | SWiSH | switch | switch-on-a-chip | Switched Multimegabit Data Service | switched virtual circuit | switching fabric | SWR | Sybase | Symantec | symbology | symetric key | symmetric communications | symmetric multiprocessing | SYN flooding | SYN scanning | sync-and-stabilize | SynchBurst SRAM | SynchML | synchronicity | synchronize and stabilize | synchronize-and-stabilize | Synchronized Multimedia Integration Language | synchronous | Synchronous Data Link Control | synchronous DRAM | Synchronous Graphics RAM | synchronous groupware | Synchronous Optical Network | Synclink | Synclink Dynamic RAM | syndication | synergy | syntax | synthetic backup | sysadmin | sysop | sysplex | sysplex and Parallel Sysplex | system | System 5 | system administrator | system checkpoint | system monitor | system operator | System Performance Evaluation Cooperative | System Restore | system tray | System V | system-on-a-chip | systems administrator | Systems Application Architecture | systems development life cycle | systems development life cycle model | systems development lifecycle | systems management | Systems Management: Glossary | Systems Network Architecture | systems thinking | Systems, Application and Products in Data Processing

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpT,00.html
Alphabetical: T - 378 terms

T | T interface | T Model | T-1 | T-carrier system | T-Rex | T-SQL | T1 | T3 | T9 | tabbed browsing | tabbed document interface | table | Table of Physical Constants | Table of Physical Units | table space | tablespace | tablet | tablet computer | Tablet PC | TACACS | TACACS+ | tag | Tag Image File Format | tagging | tags | talk time | talkback | talker | talking translator | Tamagotchi | tap | tape | tape backup | tape drive | tape library | TAPI | tar | tarball | tarpitting | task | task bar | taskbar | taxonomy | TCB | TCG | Tcl | Tcl/Tk | TCO | TCP | TCP offload engine | TCP port numbers | TCP Wrapper | TCP/IP | TCP/IP accelerator network interface card | TCP/IP offload engine | tcpdump | TCPMAN | TD-SCDMA | TDD | TDI | TDM | TDMA | teach box | team collaboration | tebi | Technical Office Protocol | techno-fiend | technobabble | TechTarget Featured Topics | TechTarget Webcasts | teen buzz | teergrube | telco | telecenter | telecentre | telechir | Telecommunications Act of 1996 | Telecommunications Display Device | Telecommunications Management Network | telecommute | telecommuter | telecommuting | teleconference | teledactyl | telegram | telegraph | telematics | telemetrics | telemetry | teleoperation | telephone jacks | telephone network standards | Telephony | Telephony Application Program Interface | teleportation | telepresence | telerobotics | teletypewriter | television over IP | telework | Telnet | temperature | temperature, standard | Tempest | Tempest-shielding | template | Temporal Key Integrity Protocol | terahertz | Teraplex | terbo | terminal | terminal adapter | terminal emulation | terminal proxy server | terminal server | Terminal Server product | terminal services | Terminal Services: Learning Guide | terminate and stay resident | Terrestrial Trunked Radio | tesla | test-driven design | test-driven development | testing | testing your bandwidth | TETRA | texel | text | text editor | text on nine keys | text reader | text telephone | text-to-speech | texture mapping | texture sensing | TFT | TFTP | thang | The 10 Most Misunderstood Terms in IT | The Big Murkowski | The design process (database): Chapter Download | | The Honor Roll | The interview: Be prepared! | The Open Group | The Real-Time Operating System Nucleus | The Remote Insight Board -- Lights Out Edition | The speed of... | The Vault of Tech Terror | theory of everything | theory of relativity | thermal grease | thermal ink transfer printing | thermal printing | thermal transfer printer | thermographic printing | thermography | Thicknet | Thickwire | thin client | thin provisioning | thin server | thin-film disk | thin-film transistor | Thing | Thinnet | Thinwire | third-party relay | thought recognition | thrashing | thread | thread-safe | threat management | threat modeling | three finger salute | Three Laws of Robotics (Isaac Asimov) | throttled data transfer | | thumbnail | thunk | thyristor | THz | TIA | TIA-942 | Tibco | TiBook | TIFF | Tiger | tiger team | tilda | tilde | Tim Berners-Lee | time | time division multiple access | time division synchronous code division multiple access | time shifting | time stamp | time-division multiplexing | time-to-live | timeline | timeshifting | timestamp | TIN number | tin whiskers | tipping point | Titanium | TiVo | Tivoli | Tk | TKIP | TLD | TLS | TLS VPN | TM | TMN | tModel | TMQL | TN display | TNIC | TO-DDI | TOE | token | Token Ring | TOLED | Tomcat | tool bar | Tool Command Language | Tool Kit | toolbar | toothing | TOP | Top 10 Spyware Threats | Top terms in 2006 | top-level domain | Topic Map | Topic Map Query Language | topology | topsite | toroid | torture test | Torvalds, Linus | Toslink | Toslink connector | Toslink plug | total cost of ownership | Total Information Awareness | Total Quality Management | touch pad | touch screen | touchpad | tower server | TP | TP0 | TP0-TP4 | TP1 | TP2 | TP3 | TP4 | TPC | TPM | TPS | TQM | trace route | track back | Track Points | TrackBack | trackball | tracking software | TrackPoint | Training for CISSP Certification: School | transact-SQL | transaction | Transaction Processing Performance Council | Transaction Server | transactional e-mail | transceiver | transcendental number | transcoding | transconductance | transcription error | transducer | transistor | transistor-to-transistor logic | transit | transition ad | Transmeta | Transmission Control Protocol | Transmission Control Protocol/Internet Protocol | transparent | transparent computing | transparent GIF | transparent semiconductor | transponder | Transport layer | Transport layer protocols | Transport Layer Security | transport protocols | Transport Service Access Point | Transport Services Access Point | trap | trap door | trapdoor | Travan | traveling-wave tube | tree network | tree structure | triangulation | trigger | trigraph | trinary | triplecast | triplewhack | Trivial File Transfer Protocol | Trojan | Trojan horse | troll | TRON | tropical year | tropo | tropospheric propogation | trouble report | trouble ticket | true color | | true power | TrueType | truncate | trunk | trunking | trusted computing | trusted computing base | Trusted Computing Group | trusted PC | trusted platform module | truth table | TSAP | TSQL | TSR | TTL | TTS | tty command | tunnel | tunneling | tuple | Turing Test | turnkey | Turtle Firewall | Tux | TV/IP | TWAIN | | twin-spindle system | twinaxial cable | twip | twips | twisted nematic display | twisted pair | two-factor authentication | two-spindle system | two-way pager | Twofish | TWT | type II error | typeface | typosquatting

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpU,00.html
Alphabetical: U - 154 terms

U | U interface | U.S. Navy purchasing abbreviations and acronyms | UART | UAT | UBE | uber geek | | UC | UCCnet | UCCnet: Learning Guide | UCE | UCM | UDA | UDDI | UDDI: Learning Guide | UDF | UDO | UDP | UHDV | UHF | UI | UIML | ultra density optical | Ultra DMA | ultra HD | | ultra wideband | ultra-HD | ultrapersonal computer | ultrasound | ultrawideband | UMA | UML | UMS | UMTS | UN laptop | unary | UNC | uncertainty principle | uncompressing | undelete | undeleting | Undernet | Understanding TCP/IP | Understanding Your Authentication Options: Learning Guide | unicast | Unicode | unified communications | unified field theory | unified messaging | Unified Modeling Language | unified storage | unified threat management | Uniform Resource Identifier | Uniform Resource Locator | Uniform Resource Name | uninterruptible power supply | union symbol | unipolar signaling | unipolar transmission | unique user | unit testing | universal access server | Universal ADSL | Universal Asynchronous Receiver/Transmitter | universal authentication | universal constructor | Universal Coordinated Time | Universal Data Access | Universal Description, Discovery, and Integration | Universal Disk Format | Universal Mobile Telecommunications Service | universal molar gas constant | Universal Naming Convention | universal network | Universal Plug and Play | Universal Resource Identifier | Universal Resource Locator | Universal Serial Bus | Universal Time Coordinated | Universal Unique Identifier | Unix | UNIX 03 | UNIX 93 | UNIX 95 | UNIX 98 | Unix-to-Linux: Learning Guide | Unlicensed Mobile Access | unlocked cell phone | Unshielded Twisted Pair | unsolicited bulk e-mail | unsolicited commercial e-mail | Unstructured Supplementary Service Data | Unwilling accomplices (e-mail server attacks): SearchExchange.com Chapter Download | unzipping | up converter | up-sell | upconverter | | uplink | uploading | UPN | UPnP | UpperCamelCase | upright slash | UPS | upstream | uptime | uptime and downtime | Uptime Institute, Inc. | urban legend | URI | URN | US Department of Commerce purchasing abbreviations and acronyms | USA Patriot Act | usability | USAPA | USB | USB | USB drive | use case | Usenet | user acceptance testing | User Datagram Protocol | user exit | user group | user input device | user interface | User Interface Markup Language | User Principal Name | user profile | user script | user session | USSD | UTC | utility | utility computing | UTM | UTP | UUCP | Uuencode | UUID | UWB | UXGA

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpV,00.html
Alphabetical: V - 298 terms

v-commerce | v-rep | V.22 | V.22bis | V.32 | V.32bis | V.32terbo | V.34 | V.34bis | V.35 | V.42 | V.90 | V.xx | V2P | V2V | VA | vacuum tube | VAD | validator | value chain | value-added network | value-added reseller | vam | vampire tap | VAN | | vandal | vanilla | Vannevar Bush | vaporware | VAR | variable | variable manipulation | varicode | VAX | VAX | VB | VB .NET | VB.NET | VBI | vBNS | VBS.SST | VBScript | VC | vCalendar | vCard | VCD | vCom | vCommerce | VCR | VCSEL | VDD | VDI | VDS | VDT | vector | vector graphics | vector graphics rendering | Vector Markup Language | vectored interrupt | vectorized | Veepers | vendor | Vendor Independent Messaging | Venice Project | venture capital | verbose logging | VeriChip | Veronica | Versioned Object Base | versioning | vertical blanking interval | vertical cavity surface emitting laser | vertical interval time code | vertical line | vertical market | vertical portal | vertical scalability | vertical slash | vertical solutions provider | very high-speed Backbone Network Service | very high frequency | Very Large Database | very large-scale integration | very long instruction word | Very Small Aperture Terminal | VESA | VESA Local Bus | vestigial sideband | VFAT | VGA | VGA card | VHE | VHF | VHS | vi | vidblog | video adapter | video blog | video board | video card | Video CD | video display unit | video e-mail | Video of the Week: Videos | video or visual display terminal | video RAM | video telephony | Video: Robotic Despair | videocasette recorder | Videocast: What is the difference between UC and UM? | videoconference | videophone | view | Vim | VIM specification | viral marketing | virtual | Virtual Address eXtension | virtual agent | virtual area network | virtual asset | virtual call center | virtual circuit | virtual commerce | virtual community | virtual dedicated server | virtual desktop infrastructure (VDI) | virtual desktop manager | virtual device driver | Virtual Earth | Virtual File Allocation Table | Virtual Home Environment | virtual honeynet | virtual hosting | Virtual Instrument file | virtual ISP | virtual keyboard | virtual kill switch | virtual LAN | virtual learning environment | virtual machine | virtual machine monitor | virtual memory | Virtual Memory System | virtual microscopy | virtual network adapter | virtual network computing | virtual organization | Virtual PC | virtual phone number | virtual private LAN service | virtual private network | virtual private network appliance | virtual private server | virtual reality | Virtual Reality Modeling Language | virtual rep | Virtual Router Redundancy | virtual routing and forwarding | virtual server | Virtual Storage Access Method | virtual storage area network | Virtual Storage Portal | virtual symmetric multiprocessing | virtual systems management | virtual tape | virtual tape system | Virtual Telecommunications Access Method | virtual to physical | virtual to virtual | virtualization | virtualization manager | Virtualization: Learning Guide | Virtuozzo | virus | virus kit | virus throttling | virus-assembled battery | viseme | VisiCalc | visitor-based networking | Visor | VISP | Visual Basic | Visual Basic .NET | Visual Basic 2005: Learning Guide | Visual C# 2005: Learning Guide | visual computing | visual display | Visual FoxPro | Visual InterDev | Visual J# | Visual Studio .NET | Visual Studio 2005 Team Collaboration: Learning Guide | Visual Studio 2005: Learning Guide | visualization | Vital Product Data | VITC | Vitria | vixel | VK | VLAN | VLAN hopping | VLDB | VLE | VLIW | vlog | vlog (video blog) | vlogging | VLSI | VM | VMEbus | VML | VMM | VMS | VMware | VNC | VOB | vocoder | voice activation detection | voice authentication | voice commerce | voice ID | voice identification | voice logger | Voice Markup Language | Voice over Internet Protocol | Voice over IP | Voice over IP: Learning Guide | Voice Over Misconfigured Internet Telephones | Voice over WLAN | voice portal | voice recognition | voice spam | voice-activated e-mail | voice-enabled e-mail | voiceprint | VoiceXML | VoIP | VoIP caller ID | VoIP gateway | VoIP phone | VoIP spam | VoIP trunk gateway | VoIP: Glossary | volatile | volt | volt per meter | volt-ampere | voltage | voltage regulator module | voltmeter | volume | volume (amount of physical bulk) | vomit | von Neumann, John | Vonage | Voodoo | Vorbis | vortal | VoWi-Fi | VoWLAN | VoWLAN cellular | voxel | VoxML | VPD | VPLS | VPN | VPN appliance | VPN routing and forwarding | VPS | VRAM | VRF | VRM | VRML | VRRP | VSAM | VSAN | VSAT | VSM | VSMP (virtual symmetric multiprocessing) | VSP | VSTO | VTAM | Vulcan nerve pinch | vulnerability analysis | vulnerability assessment | vulnerability disclosure | vulnerability scanner | VWSR

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpW,00.html
Alphabetical: W - 358 terms

W-CDMA | W2K | W32.Kriz virus | W32/Rjump | W3C | W3C log | WAD | WAFS | WAIS | wait state | Wake on LAN | walkie talkie | wall display | wall time | walled garden | wallet | wallpaper | WAN | WAN interface card | WAP | war dialer | war dialing | war driving | wardriving | wares | warez | warm server | Warp | WASC | WASP | watchdog timer | water cooling | waterfall model | watermark | WATS | watt | watt per steradian | watt-hour | wav | wave a dead chicken | Wave file | wave number | wave polarization | waveform | waveguide | wavelength | wavelength division multiplexing | wavelength illustration | wavelength switching | wavelength-division multiplexing | wavelet | wavetable | waving a dead chicken | WAX | Wayback Machine | WBEM | WBI | WBT | WCDMA | WCF | WDT | weak password | wearable computer | wearable robot | Web accelerator | Web analytics | Web anonymizer | Web application security | Web Application Security Consortium | Web archives | Web Based Enterprise Management | Web beacon | Web beaconing | | Web bug | Web cam | Web compression | Web development freeware and shareware | Web farm | Web filter | Web filtering | Web hosting | Web Intermediaries | Web intermediary | Web marketing and advertising terms | web Methods | Web mining | web offset printing | Web page filter | Web presence | Web Proxy Autodiscovery | Web ring | Web Security School: Security School | Web self-service | Web server | Web server farm | Web service | Web Service Choreography Interface | Web services | Web services choreography | Web Services Coordination | Web Services Description Language | Web Services Interoperability Organization | Web Services Security | Web Services Transaction | Web Services: Glossary | Web site | Web site hosting | Web Solution Platform | Web Standards Project | Web year | Web-based backup | Web-Based Enterprise Management | Web-based training | Web-Braille | Web-enabled refrigerator | webby | webcam | Webcast | Webcasting | Webcasts | WebDAV | Webification | Webify | Webisode | weblog | WebLogic | Webmaster | webMethods | WebNFS | Website | WebSphere | WebSphere Development Studio Client (WDSC) | Websphere MQ | WebSphere Portal: Learning Guide | webtone | WebTV | wedge | weenie | weight | weighted fair queueing | weights and measures | Weird and wonderful geekspeak: Do you speak Geek? | well-known port numbers | WEP | Werner Heisenberg | WetPC | WF | WfM | WFQ | WFS | WGA | WGate | whack-a-mole | What is an intrusion detection system? | What is IT? Puzzle 1: Word puzzle | What is RSS? | What is Sametime?: Podcasts | What is spyware? | what you see is what you get | WhatIs.com Learning Center | WhatIs.com Podcasts: WhatIs.com podcasts | whip antenna | Whistler | White Book | white box | white hat | white list | white noise | white paper | white space | whiteboard | whitelist | Who was the inventor of xerography? | Who's Who in IT: Question #1 | Who's Who in IT: Question #2 | Who's Who in IT: Question #3 | Who's Who in IT: Question #4 | Who's Who in IT: Question #5 | whole number | WHQL | Why spyware isn't just a home-user problem | Wi-Fi | Wi-Fi cell phone | Wi-Fi finder | wi-fi mesh | Wi-Fi Protected Access | Wi-Fi VoIP | Wi-Max | Wibree | WIC | wide area network | wide-area file services | Wide-Area Information Servers | wide-area telephone service | wideband | wideband CDMA | wideband code-division multiple access | WiDEN | widget | Wiegand | Wien's constant | WiFi | wifi blimp | WiFi mesh | wiki | Wikipedia | wildcard character | Willamette | WiMAX | Win32s | Win9x | WinAMP | Winbind | WinChip | window | Window RAM | windowing system | Windows / Linux Migration & interoperability: Learning Guide | Windows 2000 | Windows 98 | Windows 9x | Windows CardSpace | Windows CE | Windows Communication Foundation | Windows File System | Windows Genuine Advantage | Windows Hardware Quality Labs | Windows Internet Naming Service | Windows Management Instrumentation | Windows Me | Windows Media Player (WMP) | Windows NT | Windows Presentation Foundation | Windows Product Activation | Windows Server Update Services | Windows Update Services | Windows Workflow Foundation | Windows XP | Windows XP key changer | windows, icons, mouse, and pull-down menus | Wine | WinFrame | WinFX | Wingate | wink | wink release | winner's curse | winnowing | WinNuke | WINS | Winsock | Winsock 2 | Wintel | WinWF | WinZip | wire gauges | wire speed | Wired Equivalent Privacy | Wired for Management | wireless | Wireless Abstract XML | Wireless Application Protocol | wireless application service provider | wireless ASP | wireless backhaul | Wireless Bitmap | wireless blanket | wireless cable | Wireless FAQs: FAQ | Wireless Gateways | wireless ISP | wireless LAN | Wireless LAN glossary | Wireless LAN Routers | wireless local area network | Wireless Local Area Network Routers | wireless local number portability | Wireless Markup Language | wireless mesh network | wireless mesh networking | wireless number portability | wireless personal area network | wireless point of sale | wireless POS | Wireless Power Platform | wireless router | Wireless security: Learning Guide | wireless service provider | Wireless Transport Layer Security | wireless USB | wireless VoIP | wireless Web | Wireless: Glossary | Wireless: Learning Guide | WirelessMAN | wireline-to-wireless number portability | Wirth's Law | WISP | wizard | WLAN | WLPN | WMI | WML | WMP | wolf | word processor | Words-to-Go | Words-to-Go: Voice over IP | work | work load | workaround | workflow | working draft | workload | Workplace | workplace (user interface) | workstation | World Wide Web Distributed Authoring and Versioning | worm | WORM (write once, read many) | Would the real (e-mail) sender please stand up?: SearchExchange.com Chapter Download | WPA | WPAD | WPAN | WPF | WPOS | WRAM | wrap plug | wrapper | writable DVD | write-only code | writing tablet | WS-Coordination | WS-I | WS-I Organization | WS-Security | WS-Transaction | WSCI | WSDL | WSDL: Learning Guide | WSUS | WTLS | WTS | WUS | WUSB | WYSIWYG

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpX,00.html
Alphabetical: X - 79 terms

X | X (compact disc access time) | x and y coordinates | x coordinate | X dimension | X server | X terminal | X Window System | X# | X-Box | X-engineering | X-modem | X-ray body scanning | X.25 | X.400 | X.500 | x2 | x86 | XACL | XACML | Xalan | XAML | Xanadu | XBRL | XDMA | xDSL | Xen | Xeon | Xerces | xerography | XFDL | XGA | XGA and XGA-2 (Extended Graphics Array) | XHR | XHTML | XIPC | XJACK | XMI | XML | XML bomb | XML Core Services | XML namespace | XML Pointer Language | XML Query Language | XML Schema Definition | XML Security: Learning Guide | XML: Learning Guide | XMLHttpRequest | XMLNews | Xmodem | XMPP | XMT | XNS | XO | XO-I | Xon/Xoff | XOR | XORP | XP key changer | XPath | XPath injection | XPointer | XPRL | XQL | XQuery | XrML | XSD | XSL | XSL Transformations | XSLT | xSP | XSRF | XSS | XSS hole | XST | XTACACS | | XUL | XyWrite

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpY,00.html
Alphabetical: Y - 15 terms

Y | y coordinate | Y-modem | Y/C Video | yacc | Yagi antenna | | Yellow Book | Ymodem | yotta | Your PC Graveyards | Yukon

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpZ,00.html
Alphabetical: Z - 48 terms

z coordinate | Z Object Publishing Environment | z-buffering | Z-modem | z/OS | z/VM | Z39.50 | z990 | Zachman framework | zap | ZBR | zero | Zero Administration | ZIF | ZIF socket | ZigBee | zinc whiskers | zine | zip codes | Zip disk | Zip drive | zipping | Zippo | Zmodem protocol | zoetrope | zombie | zombie army | zone | zone file | zone recording | zone-density recording | zoning | zoo | Zoomed Video | zoopraxiscope | Zope | Zotob | zphone | ZRTP | zsh | Zulu | Zune | ZV port

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alp9,00.html
Alphabetical: # - 113 terms

"Just for Fun" freeware and shareware guide | $100 laptop | $100 personal computer | .ini | .NET | .NET 3.0 | .ogg | .pst | .shtml | .Tel | .vi | 0-day | 10-high-day busy period | 1000BASE-T | 100BASE-T | 1080p | 10BASE-2 | 10BASE-36 | 10BASE-5 | 10BASE-F | 10BASE-T | 10BASE2 | 10BASE36 | 10BASE5 | 10BASEF | 10BASET | 10g | 10GBASE-T | 1170 | 11th dimension | 121 | 1284.4 | 12X | 136 browser colors with names | 1394 | 14000 | 14001 | 1:1 marketing | 1GL | 1NF | 1X | 1xRTT | 2.5G | 2000-year-old computer | 2001 | 2002/95/EC | 216-color browser-safe palette | 24/7 | 24X | 24x7 | 2600 | 2GL | 2NF | 2X | 3-D | 3-D browser | 3000 | 3D | 3D web browser | 3G | 3GL | 3NF | 4-G | 42 | 4G | 4GL | 4X | 5 terms you need to know before you employ VoIP | 50X | 5GL | 6 Sigma | 8-track tape | 8-VSB | 80 | 802.11 | 802.11 Fast Guide | 802.11a | 802.11b | 802.11d | 802.11e | 802.11g | 802.11h | 802.11i | 802.11j | 802.11k | 802.11m | 802.11n | 802.11x | 802.15 | 802.16 | 802.16a | 802.16c | 802.1X | 802.3 | 802.5 | 802.xx Fast Reference | 8X | 9000 | 911 | 9660 | 99.999 | @

techtarget
File Extension
Datei-Endungen

(E6)(L1) http://whatis.techtarget.com/fileFormatA/0,289933,sid9,00.html
Definitions for thousands of the most current IT-related words.

"Every File Format in the World"
This is a list of file name extension or suffixes that indicate the format or usage of a file and a brief description of that format. We don't really show the file format itself here. In fact, many formats are proprietary and we couldn't show them to you. In some cases, we link to a definition of the file format or to related information.

In general, if you have the program that uses the file format, that program can be used to open or otherwise use the file. Some file formats (for example, the GIF file format used for Web page images) are standard formats that can be opened by any program that supports that standard format.

(E?)(L1) http://whatis.techtarget.com/file-extension-list-A/0,289933,sid9,00.html

A | A | AA | AAM | AAS | AB | ABF | ABK | ABK | ABM | ABO | ABS | AC$ | ABS | ABS | ACA | ACA | ACB | ACC | ACD | ACE | ACF | ACI | ACL | ACM | ACM | ACM | ACP | ACR | ACS | ACT | ACT | ACT | ACT | ACV | AD | ADB | ADB | ADC | ADD | ADF | ADI | ADL | ADM | ADM | ADN | ADP | ADP | ADP | ADR | ADR | ADS | ADT | ADT | ADX | ADX | ADX | ADZ | AE | AEP | AF2 | AF3 | AFC | AFI | AFM | AFM | AG | AI | AI | AIF | AIFC | AIFF | AIM | AIN | AIO | AIS | AIS | AIS | AIX | AKB | AKW | ALAW | ALIAS | ALB | ALI | ALL | ALL | ALS | ALT | AM | AMF | AMF | AMG | AMG | AMI | AMS | AMS | AMU | AN | ANC | ANI | ANM | ANN | ANS | ANT | AOM | AOM | AOS | AOT | AP | AP | APC | APC | APD | APD | APE | APE | APF | APF | API | API | APL | APL | APP | APP | APP | APP | APP | APP | APR | APR | APR | APS | APS | APT | APT | APX | APX | AQ | ARC | ARC | ARF | ARI | ARI | ARJ | ARK | ARL | ARR | ART | ART | ART | ART | ART | ART | ARX | ARX | AS | ASA | ASC | ASC | ASD | ASD | ASD | ASD | ASE | ASF | ASF | ASF | ASF | ASH | ASI | ASM | ASM | ASO | ASP | ASP | ASP | AST | AST | ASV | ASX | ASX | ASX | AT2 | ATM | ATT | ATW | AU | AU | AUD | AUP | AUX | AUX | AVA | AVG | AVB | AVI | AVR | AVS | AVS | AVX | AW | AW | AWD | AWE | AWK | AWM | AWR | AWS | AXL | AXT | AXX | A3L | A4L | A5L | A3M | A4M | A4P | A3W | A5W | B | BAD | BAK | BAL | BAND | BAR | BAS | BAT | BB | BBL | BBM | BBS | BCH | BCH | BCM | BCO | BCP | BCW | BDB | BDF | BDF | BDR | BEZ | BF2 | BFC | BFM | BFX | BG | BGA | BGI | BGL | BHF | BI | BIB | BIB | BIB | BIF | BIF | BIFF | BIN | BIO | | BK | BK | BK$ | BK! | BK1 | BK2 | BK3 | BK4 | BK5 | BK6 | BK7 | BK8 | BK9 | BKP | BKS | BKS | BKW | BLB | BLD | BLK | BLK | BM | BMA | BMF | BMF | BMK | BMP | BM1 | BN | BNK | BNK | BOL | BOM | BOO | BOOK | BOX | BPC | BPL | BPS | BPT | BPX | BQY | BR | BRD | BRK | BR0 | BRW | BRX | BRZ | BSA | BSC | BSC | BSC | BSP | BS1 | BS_ | BTM | BTR | BUD | BUG | BUN | BUP | BUT | BUY | BV1 | BV2 | BV3 | BV4 | BV5 | BV6 | BV7 | BV8 | BV9 | BW | BW | BWB | BWR | BWV | BYU | BZ | BZ2 | B1N | B30 | B4 | B8 | B_W | B&W | B&W | C | C | CA | CAB | CAC | CAD | CAG | CAL | CAL | CAL | CAM | CAN | CAP | CAP | CAP | CAR | CAS | CAT | CAT | CB | CBC | CBF | CBI | CBL | CBM | CBR | CBT | CBZ | CC3 | CCA | CCB | CCC | CCD | CCE | CCF | CCF | CCH | CCL | CCM | CCO | CCO | CCT | CDA | CDB | CDB | CDB | CDB | CDF | CDF | CDFS | CDI | CDK | CDM | CDM | CDM | CDR | CDR | CDR | CDT | CDT | CDX | CDX | CE | CEF | CEG | CEL | CEL | CER | CEX | CF | CFB | CFG | CFL | CFM | CFM | CFM | CFN | CFO | CFP | CGA | CGI | CGM | CH | CH | CH3 | CH4 | CHD | CHF | CHI | CHK | CHK | CHL | CHM | CHN | CHP | CHR | CHT | CHT | CHT | CIF | CIF | CIF | CIL | CIM | CIN | CIX | CK1 | CK2 | CK3 | CK4 | CK5 | CK6 | CKB | CKF | CL | CL3 | CLASS | CLC | CLG | CLL | CLO | CLP | CLP | CLP | CLR | CLR | CLS | CLS | CLX | CLX | CLX | CM | CMA | CMD | CMD | CMD | CMD | CMF | CFM | CMG | CMK | CMM | CMP | CMP | CMP | CMP | CMP | CMR | CMV | CMX | CMYK | CNC | CNF | CNM | CNQ | CNT | CNV | CNV | CNV | COB | COB | COD | COD | COD | COD | COE | COL | COL | COM | CON | CP | CP8 | CPD | CPD | CPD | CPE | CPF | CPF | CPH | CPI | CPI | CPJ | CPL | CPL | CPL | CPM | CPO | CPP | CPP | CPR | CPS | CPS | CPT | CPT | CPT | CPT | CPX | CPY | CPZ | CRC | CRC | CRD | CRF | CRH | CRP | CRP | CRP | CRS | CRT | CRT | CRT | CRU | CS1 | CS4 | CS16 | CSA | CSC | CSG | CSH | CSM | CSM | CSO | CSP | CSS | CSS | CSS | CST | CSV | CSV | CT | CT | CTB | CTC | CTF | CTL | CTL | CTX | CTX | CTX | CUE | CUE | CUE | CUL | CUR | CURSOR | CUT | CV | CV | CVG | CVS | CWK | CWS | CXT | CXX | CZIP | C-- | C00 | C01 | C86 | DAA | DAO | DAP | DAR | DAT | DAT | DAT | DAT | DAT | DB | DBC | DBF | DBF | DBF | DBK | DBK | DBO | DBQ | DBS | DBS | DBS | DBS | DBT | DBV | DBW | DBX | DBX | DBX | DC | DC2 | DCA | DCA | DCF | DCF | DCL | DCIM | DCM | DCP | DCR | DCS | DCS | DCS | DCT | DCT | DCT | DCU | DCX | DCX | DCX | DCX | DC5 | DD | DDB | DDF | DDI | DDIF | DDP | DEB | DEF | DEF | DEF | DEF | DEFI | DEM | DEM | DEM | DEP | DER | DEV | DEWF | DEZ | DFD | DFI | DFL | DFM | DFS | DFV | DGN | DGN | DGS | DH | DHP | DHT | DHS | DIA | DIB | DIC | DIC | DICM | DIF | DIF | DIF | DIF | DIG | DIG | DIP | DIR | DIR | DIR | DIR | DIS | DIS | DIS | DIZ | DJS | DJS | DJVU | DKB | DL | DLD | DLG | DLL | DLL | DLS | DLS | DLS | DMD | DMF | DMF | DMG | DMO | DMP | DMS | DOB | DOC | DOC | DOC | DOC | DOC | DOC | DOG | DOH | DOS | DOS | DOS | DOT | DOT | DOX | DOX | DOZ | DP | DP | DPL | DPR | DPT | DRA | DRAW | DRC | DRG | DRG | DRG | DRS | DRV | DRV | DRW | DRW | DRW | DRW | DS4 | DR9 | DS4 | DSC | DSD | DSF | DSG | DSK | DSK | DSM | DSM | DSM | DSN | DSN | DSN | DSP | DSP | DSP | DSQ | DSR | DSR | DSS | DSS | DST | DST | DSW | DSW | DSX | DT_ | DTA | DTA | DTD | DTED | DTF | DTF | DTM | DTP | DTP | DTP | DUN | DUP | DUS | DV | DVC | DVF | DVI | DVI | DVP | DVP | DW2 | DWC | DWD | DWF | DWF | DWG | DWG | DWH | DWI | DWP | DWS | DX | DXB | DXF | DXF | DXF | DXN | DXR | DYN | D2D | D64 | e00 | EASM | EBJ | ECW | ECW | ED5 | ED6 | EDA | EDB | EDE | EDD | EDK | EDQ | EDS | EDT | EDV | EEB | EFA | EFE | EFK | EFQ | EFS | EFT | EFV | EFX | EFX | EGA | EGM | EL | ELC | ELM | ELT | EMAIL | EMB | EMD | EMF | EML | EMS | EMU | EMZ | ENC | ENC | ENC | END | ENFF | ENG | ENG | ENV | ENV | EPD | EPHTML | EPI | EPRT | EPS | EPS | EPS2 | EPS | EPSF | EPSI | EQN | ER1 | ERD | ERM | ERR | ERR | ERX | ESH | ESL | ESPS | EST | EST | ESU | ET | ETH | ETX | EUI | EVT | EVY | EWD | EWL | EXT2 | EXT3 | EX3 | EXC | EXC | EXC | EXE | EXP | EXT | EZP | E00 | F | F | FAC | FAQ | FAR | FAS | FAS | FAV | FAX | FBK | FC | FCD | FCM | FD | FD | FDB | FDF | FDW | FEB | FEM | FES | FF | FFA | FFF | FFF | FFL | FFL | FFO | FFT | FFX | FH3 | FH4 | FH9 | FI | FIF | FIG | FIL | FIL | FIL | FILE | FIN | FIT | FIT | FITS | FITS | FIX | FKY | FLA | FLAC | FLB | FLC | FLD | FLD | FLF | FLF | FLI | FLI | FLF | FLL | FLM | FLO | FLP | FLP | FLP | FLP | FLP | FLP | FLP | FLS | FLT | FLT | FLT | FLT | FLT | FLT | FLV | FLW | FLX | FM | FM | FM1 | FM3 | FM3 | FMB | FMB | FMF | FMK | FML | FMO | FMP | FMT | FMT | FMT | FMT | FMX | FN3 | FNC | FNC | FND | FNG | FNK | FNT | FNX | FO1 | FO2 | FOG | FOL | FON | FON | FON | FON | FOR | FOR | FOT | FOT | FP | FP | FP1 | FP3 | FP5 | FPC | FPT | FPT | FPW | FPX | FR3 | FRF | FRG | FRK | FRM | FRM | FRM | FRM | FRM | FRM | FRO | FRP | FRS | FRT | FRX | FRX | FSF | FSL | FSL | FSL | FSM | FST | FSX | FT | FTB | FTF | FTG | FTM | FTP | FTS | FTW | FW | FW2 | FW3 | FW4 | FWB | FWP | FWS | FX | FXD | FXP | FXS | FZB | FZF | FZV | F01 | F06 | F07 | F08 | F09 | F10 | F11 | F12 | F13 | F14 | F15 | F16 | F2R | F3R | F77 | F90 | F96 | G | GAL | GAM | GB | GBC | GBL | GC1 | GC3 | GCD | GCP | GDB | GDF | GDM | GED | GED | GED | GED | GEM | GEM | GEN | GEN | GEO | GetRight | GFB | GFC | GFI | GFT | GFX | GHO | GHS | GIB | GID | GIF | GIM | GIW | GIX | GKH | GKS | GL | GBL | GBM | GLB | GLB | GLM | GLS | GLY | GMF | GMP | GMP | GMR | GNA | GNO | GNT | GNX | GOC | GOH | GP | GP3 | GPH | GPK | GPP | GR2 | GRA | GRA | GRB | GRD | GRF | GRF | GRM | GRM | GRP | GRP | GRY | GS1 | GSD | GSM | GSM | GSM | GSM | GSP | GSP | GSW | GTH | GTH | GTK | GT2 | GUP | GVL | GVP | GWI | GWP | GWX | GWZ | GXL | GZ | G721 | G723 | G8 | H | HA | HAM | HAM | HAP | HBI | HBK | HBK | HCM | HCOM | HCR | HDF | HDF | HDF | HDF | HDF | HDL | HDR | HDR | HDR | HDR | HDW | HDX | HDX | HED | HEL | HEX | HFI | HGL | HH | HH | HHH | HHP | HIT | HLB | HLP | HLP | HMI | HMM | HMP | HNC | HOG | HOG | HOG | HOT | HP8 | HPC | HPF | HPF | HPG | HPG | HPI | HPJ | HPK | HPM | HPM | HPP | HPP | HQX | HRF | HRM | HS2 | HSC | HSI | HST | HST | HT | HTA | HTC | HTM | HTML | HTT | HTX | HWD | HWP | HXM | HXM | HXX | HY1 | HY2 | HYC | HYD | HYM | HYP | H! | H++ | H-- | I | I00 | IAN | IAX | IBM | ICA | ICA | ICB | ICC | ICC | ICD | ICL | ICM | ICN | ICO | ICS | ID | IDB | IDD | IDE | IDF | IDIF | IDL | IDQ | IDW | IDX | IDX | IDX | IDX | IDX | IFD | IFD | IFF | IFF | IFO | IFO | IFP | IFS | IFS | IFS | IGES | IGF | IIF | IIM | ILB | ILBM | ILK | IM8 | IMA | IMA | IMF | IMG | IMG | IMP | IMQ | IMR | IMS | IN$ | IN3 | INB | INC | IND | IND | INDD | INF | INF | INF | INI | INI | INI | INK | INL | INP | INRS | INS | INS | INS | INS | INS | INS | INS | INS | INT | INT | INX | IO | IOB | IOC | IOF | ION | IPL | IPS | IQY | ISO | IRS | ISD | ISH | ISO | ISP | IST | ISU | IT | ITF | IT | ITI | ITS | ITS | IV | IVD | IVP | IVT | IVX | IW | IW | IWA | IWC | IWM | IWP | IZT | J62 | JAD | JAR | JAS | JBD | JBF | JBX | JCP | JCW | JDF | JFF | JIF | JFIF | JMG | JMP | JN1 | JNB | JNT | JOB | JOR | JOU | JPC | JPE | JPEG | JPG | JPG2 | JS | JSD | JSM | JSM | JSM | JSP | JTF | JTF | JTF | JTK | JTP | JW | JWL | JXX | JZZ | K25 | KAR | KB | KB | KBD | KBM | KCL | KDC | KEX | KEY | KEY | KEY | KEY | KFX | KIZ | KKW | KMD | KMP | KMS | KMV | KMZ | KOS | KPL | KPP | KPS | KQP | KR1 | KRZ | KSF | KSF | KYB | KYE | L | L | L | LAB | LAB | LAB | LAN | LAY | LAY | LBG | LBL | LBL | LBL | LBM | LBM | LBO | LBR | LBR | LBT | LBX | LCF | LCH | LCK | LCL | LCN | LCS | LCW | LD | LD1 | LDB | LDF | LDIF | LDL | LDS | LEG | LES | LET | LET | LET | LET | LEV | LEX | LFD | LFP | LFT | LFT | LG | LGC | LGD | LGO | LGO | LGO | LHA | LHA | LHW | LIB | LIF | LIF | LIM | LIN | LIN | LIS | LIS | LIT | LIX | LJ | LK | LKO | LL3 | LLX | LNK | LNK | LNK | LNT | LOD | LOG | LOK | LP | LPC | LPD | LPI | LRC | LRC | LRF | LRS | LSF | LSL | LSL | LSP | LSS | LST | LST | LST | LST | LTM | LU | LVL | LWA | LWD | LWF | LWLO | LWO | LWOB | LWP | LWSC | LWZ | LYR | LZD | LZH | LZS | LZS | LZW | LZX | M | M | M | M11 | M1U | M1V | M2P | M3 | M3D | M3U | M4 | M4A | M4A | M4B | M4P | M_U | MA3 | MAC | MAC | MAD | MAF | MAG | MAG | MAGIC | MAI | MAK | MAK | MAM | MAN | MAN | MAP | MAP | MAP | MAP | MAP | MAP | MAP | MAP | MAQ | MAR | MAR | MAS | MAT | MAT | MAUD | MAX | MAX | MAX | MAX | MAZ | MAZ | MB | MB1 | MBK | MBOX | MBX | MCC | MCC | MCD | MCF | MCF | MCI | MCP | MCP | MCP | MCR | MCW | MCW | MD | MDA | MDA | MDB | MDE | MDF | MDI | MDI | MDI | MDI | MKP | MDL | MDL | MDL | MDL | MDL | MDM | MDN | MDT | MDT | MDW | MDX | MDZ | ME | MEB | MED | MED | MEM | MEM | MEM | MEM | MEQ | MER | MER | MES | MES | MET | MET | MET | MEU | MEX | MEX | MF | MFG | MGF | MGF | MHP | MHT | MHTM | MHTML | MI | MI | MIC | MID | MIF | MIFF | MII | MIM | MIME | MIX | MIX | MIX | MIX | MIX | MJF | MK | MKE | MKI | MKP | MKS | ML3 | MLB | MLI | MLID | MLM | MM | MMAP | MMC | MME | MMF | MMF | MMG | MML | MMM | MMM | MMO | MMP | MMP | MN2 | MN3 | MND | MND | MNG | MNG | MNI | MNT | MNU | MNU | MNU | MNU | MNU | MNX | MNX | MNY | MOB | MOD | MOD | MOD | MOD | MOD | MOF | MON | MOV | MOV | MOZ | MP2 | MP4A | MPA | MPC | MPD | MPE | MPEG | MPG | MPM | MPP | MPP | MPQ | MPR | MPT | MPV | MPX | MPX | MPZ | MRB | MRI | MRS | MSA | MSC | MSC | MSD | MSDL | MSF | MSG | MSI | MSN | MSN | MSP | MSP | MSS | MSS | MSS | MSS | MST | MST | MST | MSV | MSW | MSX | MTH | MTM | MTW | MTX | MU | MUL | MUS | MUS | MUS | MUS10 | MV | MVA | MVB | MVC | MVE | MVF | MVI | MVL | MVL | MVW | MWF | MWP | MXD | MXT | MYP | NAN | NAP | NAP | NB | NC | NCB | NCC | NCD | NCF | NCF | NCH | NCO | NDB | NDB | NDO | NDX | NDX | NDX | NEO | NES | NET | NET | netCDF | NEW | NEZ | NFF | NFO | NFO | NFT | NG | NIL | NIST | NLB | NLM | NLO | NLS | NLU | NLX | NOD | NP | NP | NPI | NRF | NRG | NRI | NRL | NRL | NSF | NSO | NST | NSV | NS2 | NS3 | NS4 | NT | NTF | NTR | NTS | NTS | NTX | NUF | NWC | NWS | NXT | O | O | O | OAS | OAZ | OB | OBD | OBD | OBJ | OBR | OBS | OBV | OBZ | OCF | OCR | OCX | ODC | ODG | ODI | ODIF | ODIF | ODL | ODP | ODS | ODS | ODT | OFD | OFF | OFN | OFT | OGG | OGM | OKR | OKT | OLB | OLB | OLD | OLE | OLI | OMC | OMF | OO1 | OOGL | OOM | OPJ | OPL | OPN | OPO | OPT | OPT | OPW | OPX | OPX | OPX | ORA | ORC | ORG | OR2 | OR3 | ORA | OSS | OST | OTG | OTI | OTL | OTL | OTL | OTT | OTX | OUT | OV | OV1 | OV2 | OVD | OVL | OVR | O$$ | P | P | P | PA | PA1 | PAB | PAC | PAC | PAD | PAF | PAK | PAK | PAL | PAL | PAN | PAQ | PAR | PAR | PAR | PART | PART | PART | PAS | PAT | PAT | PAT | PAT | PB | PB | PB | PB1 | PBA | PBD | PBD | PBF | PBI | PBI | PBK | PBL | PBL | PBM | PBM | PBN | PBO | PBR | PBT | PC | PC3 | PC8 | PCB | PCC | PCD | PCD | PCE | PCF | PCH | PCH | PCI | PCJ | PCK | PCL | PCM | PCM | PCP | PCS | PCS | PCT | PCW | PCX | PDA | PDB | PDB | PDB | PDB | PDD | PDF | PDF | PDF | PDF | PDL | PDM | PDP | PDQ | PDS | PDS | PDS | PDS | PDS | PDS | PDT | PDV | PDW | PDX | PDX | PDX | PDX | PE3 | PE3 | PE4 | PEB | PED | PEM | PEQ | PER | PES | PET | PF | PF | PFA | PFB | PFC | PFC | PFC | PFD | PFF | PFK | PFM | PFS | PFT | PG | PGI | PGL | PGM | PGM | PGN | PGP | PGS | PH | PH | PH | PH | PHN | PHN | PHO | PHR | PHR | PHS | PHTML | PHTML | PI1 | PI2 | PI3 | PIC | PIC | PIC | PIC | PIC | PICT | PIF | PIF | PIF | PIF | PIG | PIN | PIN | PINS | PIX | PIX | PJ | PJ | PJT | PJT | PJX | PK | PKA | PKG | PKG | PKR | PKT | PL | PL | PL | PL | PL | PL1 | PL3 | PLB | PLC | PLG | PLI | PLL | PLM | PLN | PLR | PLS | PLS | PLS | PLT | PLT | PLT | PLT | PLT | PLY | PLY | PM | PM | PM3 | PM4 | PM5 | PM6 | PMC | PMD | PMM | PN3 | PNG | PNG | PNG | PNG | PNM | PNT | PNT | PNT | PNTG | POG | POH | POL | POL | POP | POP | POT | POV | POW | PP | PP4 | PPA | PPB | PPD | PPF | PPI | PPL | PPM | PPO | PPP | PPP | PPS | PPS | PPS | PPS | PPT | PPX | PQB | PR2 | PR2 | PR3 | PR3 | PRC | PRD | PRE | PRE | PRE | PREL | PRF | PRF | PRF | PRF | PRF | PRG | PRG | PRG | PRI | PRJ | PRM | PRM | PRN | PRND | PRN | PRN | PRN | PRO | PRO | PRO | PRO | PRP | PRS | PRS | PRS | PRT | PRT | PRT | PRT | PRT | PRV | PRX | PRZ | PS | PSA | PSB | PSD | PSE | PSF | PSI | PSM | PSM | PSM | PSP | PSP | PSR | PST | PT3 | PT3 | PT4 | PTB | PTB | PTB | PTD | PTD | PTF | PTF | PTL | PTM | PTM | PTN | PTR | PTX | PUB | PUB | PUB | PUD | PUT | PVD | PVL | PVT | PW | PWD | PWL | PWP | PWP | PWZ | PX | PXW | PXL | PY | PY | PYC | PZD | PZO | PZP | PZS | PZT | PZX | P3 | P10 | P16 | P22 | P65 | P7C | QAD | QAG | QAP | QBE | QBE | QBO | QBS | QBM | QBW | QCP | QD0 | QD1 | QD2 | QD3 | QD3D | QD4 | QD5 | QD6 | QD7 | QD8 | QD9 | QDF | QDK | QDT | QDV | QEF | QEL | QFL | QFX | QIC | QIF | QIF | QLB | QLB | QLC | QLP | QM | QM4 | QPR | QPR | QPX | QQT | QRP | QRP | QRS | QRT | QRY | QRY | QSD | QST | QT | QTI | QTIF | QTM | QTP | QTS | QTS | QTX | QUE | QUE | QW | QWK | QXD | QXL | QXP | QXT | R | R | RA | RAD | RAM | RAO | RAR | RAR | RAS | RAT | RAV | RAV | RAW | RAW | RAW | RBF | RBH | RC | RC | RC | RCG | RD1 | RDF | RDF | RDF | RDI | RDL | RDX | RDZ | REC | REC | REC | REC | RED | REF | REG | REG | REG | REM | REP | REP | REP | REP | REP | REQ | RES | RES | RES | REV | REX | REX | REZ | RF | RFT | RGB, | RGX | RH | RI | RIB | RIC | RIF | RIF | RIP | RIX | RL1 | RL2 | RL4 | RL8 | RLA | RLB | RLC | RLE | RLZ | RM | RMB | RMD | RMF | RMF | RMI | RMK | RMVB | RPS | RN | RND | RNO | ROL | ROV | ROQ | RPD | RPL | RPL | RPM | RPT | RRS | RS | RSB | RSC | RSL | RSM | RSP | RS_ | RTC | RTF | RTF | RTL | RTM | RTK | RTL | RTP | RTS | RTS | RTS | RUL | RUN | RVP | RVW | RWS | RWX | RXX | R8 | R8P | S | S | SAI | SAL | SAM | SAM | SAR | SAS | SAS7BCAT | SAS7BDAT | SAS7BNDX | SAV | SAV | SAV | SAVE | SB | SBD | SBD | SBF | SBI | SBK | SBL | SBP | SBP | SBQ | SBR | SBT | SBV | SB! | SC | SC | SC2 | SC2 | SC3 | SC3 | SC3 | SC4 | SC7 | SCA | SCC | SCC | SCD | SCD | SCD | SCF | SCF | SCF | SCH | SCH | SCI | SCI | SCI | SCM | SCM | SCN | SCN | SCN | SCO | SCP | SCP | SCR | SCR | SCR | SCR | SCR | SCR | SCT | SCT | SCT | SCT01 | SCTP | SCV | SCX | SCX | SCX | SCX | SCY | SD | SD2 | SD2 | SD7 | SDA | SDC | SDD | SDF | SDI | SDK | SDL | SDN | SDP | SDPC | SDR | SDS | SDT | SDV | SDW | SDW | SDX | SEA | SEC | SEC | SED | SEL | SEP | SEP | SEQ | SEQ | SES | SES | SESSION | SET | SET | SET | SET | SEW | SF | SF | SF2 | SF2 | SFD | SFI | SFI | SFI | SFI | SFK | SFL | SFL | SFL | SFN | SFP | SFP | SFP | SFR | SFS | SFT | SFT | SFW | SFX | SG | SG1 | SGF | SGF | SGI | SGI | SGML | SGP | SGT | SH | SH | SH3 | SHB | SHB | SHG | SHK | SHK | SHM | SHN | SHP | SHP | SHP | SHP | SHR | SHS | SHT | SHTML | SHW | SHW | SHW | SHX | SHX | SIF | SIG | SIG | SIG | SIK | SIK | SIT | SIZ | SIZED | SKA | SKF | SKL | SL | SL | SLB | SLC | SLD | SLDASM | SLDDRW | SLDPRT | SLI | SLK | SLL | SLT | SM | SM | SM | SM | SM | SM3 | SMD | SMF | SMK | SMK | SMK | SMM | SMP | SMP | SMS | SMT | SMT | SMW | SMZIP | SNA | SND | SND | SND | SND | SNDR | SNDT | SNG | SNG | SNM | SNO | SNP | SNP | SO | SOL | SOM | SOM | SON | SOU | SP | SP2 | SP3 | SP4 | SPA | SPC | SPC | SPD | SPD | SPD | SPF | SPG | SPI | SPI | SPL | SPL | SPL | SPL | SPL | SPL | SPL | SPM | SPP | SPPACK | SPR | SPR | SPR | SPRITE | SPS | SPS | SPT | SPT | SPU | SPW | SPX | SPZ | SQC | SQL | SQL | SQP | SQR | SQZ | SPZ | SRE | SRF | SRM | SRP | SRZ | SS | SS4 | SS5 | SSA | SSD | SSD01 | SSD | SSF | SSP | SSV | ST | ST | ST | ST | STA | STA | STB | STD | STD | STD | STF | STL | STM | STM | STM | STM | STO | STP | STQ | STR | STR | STS | STS | STT | STY | STW | STW | STX | STX | STY | SUI | SUM | SUN | SUP | SVD | SVF | SVG | SVG | SVG | SVP | SVS | SVX | SVX | SVY | SW | SWA | SWF | SWG | SWP | SWP | SWP | SXC | SXD | SXW | SY1 | SY3 | SYD | SYLK | SYM | SYM | SYM | SYN | SYN | SYS | SYS | SYS | SYS | SYS | SYW | SYW | S3I | S3M | S$$ | T | T | T | TAB | TAB | TAG | TAH | TAL | TAR | TAR | TAZ | TAZ | TAZ | TB1 | TB2 | TBF | TBK | TBK | TBK | TBK | TBL | TBL | TBO | TBS | TBX | TC | TC | TCF | TCH | TCL | TCW | TD | TD0 | TD2 | TD4 | TDB | TDB | TDDD | TDF | TDF | TDH | TDK | TDS | TDW | TEF | TEL | TEM | TEM | TEX | TEX | TEX | TF | TFA | TFC | TFH | TFM | TFM | TFM | TFS | TFW | TG1 | TGA | TGA | TGA | TGQ | TGV | TGZ | THAI | THEME | THM | THN | THS | TIF | TIFF | TIG | TIL | TIM | TIS | TJF | TLB | TLB | TLB | TLB | TLC | TLE | TLP | TLX | TMD | TMF | TMO | TMP | TMS | TNV | TOC | TOL | TORRENT | TOS | TOS | TP | TP | TP4 | TPB | TPF | TPH | TPL | TPL | TPL | TPL | TPL | TPP | TPP | TPU | TPU | TPV | TPW | TPW | TPW | TPX | TPZ | TPZ | TP3 | TR | TR2 | TRA | TRC | TRE | TRK | TRIF | TRM | TRM | TRN | TRN | TRS | TRW | TS | TSH | TSK | TST | TSV | TTF | TTK | TTO | TUB | TUV | TV | TV1 | TV2 | TV3 | TV4 | TV5 | TV6 | TV7 | TV8 | TV9 | TVF | TWF | TWW | TX8 | TXB | TXF | TXF | TXF | TXI | TXT | TXW | TYM | TZ | TZB | T2T | T44 | T64 | U | UAP | UB | UC2 | UCN | UDF | UDF | UDW | UE2 | UFO | UG | UHS | UI | UI | UIF | UIH | UL | ULAW | ULD | ULT | UMB | UNI | UNI | UNX | UPD | UPD | UPI | UPO | UPX | URF | USA | USE | USP | USR | USR | USR | USR | UU | UU | UUE | UUE | UW | UWF | V | V | VAL | VAL | VAL | VAN | VAP | VAR | VAR | VBA | VBP | VBR | VBS | VBW | VBX | VBX | VC | VC | VCB | VCE | VCE | VCF | VCF | VCF | VCT | VCW | VCX | VDA | VDA | VDR | VDX | VDX | VDX | VEL | VEW | VEW | VFL | VF | VFM | VFN | VGA | VGA | VGD | VGR | VI | VI | VIC | VID | VID | VID | VID | VIF | VIFF | VIK | VIR | VIS | VIV | VIZ | VLB | VLM | VM | VMC | VMD | VMF | VMF | VML | VMS | VNC | VO | VOB | VOC | VOC | VOC | VOF | VOX | VOX | VOX | VP | VPG | VQA | VQE | VQF | VQL | VRF | VRM | VRML | VRP | VRS | VS | VSD | VSL | VSM | VSN | VSP | VSP | VSS | VSS | VST | VST | VSW | VUE | VUE | VUE | VW | VWP | VWP | VWR | VXD | V8 | W | W30 | W30 | W31 | W3L | W44 | WAB | WAD | WAL | WAS | WAV | WAX | WB1 | WB2 | WB3 | WBC | WBF | WBK | WBL | WBR | WBT | WBT | WBZ | WCD | WCF | WCM | WCM | WCP | WD1 | WD2 | WDB | WDF | WDG | WDM | WEB | WEB | WFB | WFD | WFD | WFL | WFM | WFN | WFP | WFT | WFX | WG1 | WG2 | WGP | WI | WID | WIF | WIL | WIM | WIN | WIN | WIN | WIS | WIZ | WIZ | WK1 | WK3 | WK4 | WKB | WKE | WKQ | WKS | WKS | WKS | WKS | WLD | WLF | WLK | WLL | WMA | WMC | WMC | WMC | WMF | WMV | WMZ | WN | WNF | WOA | WOC | WORKFLOW | WOW | WP | WPA | WP4 | WP5 | WP6 | WPD | WPD | WPF | WPF | WPF | WPG | WPG | WPK | WPM | WPS | WPS | WPT | WPW | WQ! | WQ1 | WQ2 | WR1 | WR1 | WRAP | WRD | WRG | WRI | WRK | WRK | WRL | WRP | WRP | WRS | WRZ | WS | WS1 | WS2 | WS3 | WS4 | WS5 | WS6 | WS7 | WSD | WSP | WST | WSZ | WTA | WV | WVL | WVW | WWB | WWK | WWL | WXD | WXP | X | X | XAR | XBM | XCF | XCI | XDL | XEF | XEM | XEP | XES | XET | XEV | XEZ | XFD | XFN | XFN | XFT | XFT | XFX | XHTML | XI | XI | XIF | XIF | XIF | XIF | XLA | XLA | XLB | XLB | XLC | XLD | XLK | XLL | XLL | XLM | XLR | XLS | XLT | XLT | XLT | XLT | XLV | XLW | XM | XMI | XML | XNF | XNK | XON | XPM | XQT | XQT | XXX | XR1 | XRF | XSX | XTB | XTP | XWD | XWF | XWK | XWP | XWP | XWS | XX | XXE | XY | XY3 | XY4 | XYP | XYW | X01 | X02 | X03 | X04 | X05 | X06 | X07 | X08 | X09 | X16 | X32 | Y | Y | YAL | YBK | YUV | YZ | Y01 | Y02 | Y03 | Y04 | Y05 | Y06 | Y07 | Y08 | Y09 | Z | Z | ZAP | ZAP | ZDG | XDP | ZER | ZGM | ZIP | ZOM | ZOO | ZVD | Z3 | 000 | 000-20009 | 1ST | 001-999 | 8 | 113 | 12M | 123 | 1PH | 1-STEP | 2D | 2GR | 386 | 3D | 3DM | 3DS | 3DT | 411 | 4GE | 4GL | 4V | 669 | 669 | 7 | 7Z | #01 | $$$ | ~PR | ~$~ | ~AP | ~DE | ~MN | @@@


teraflop (W3)

"teraflop" setzt sich zusammen aus "tera" und einer Abkürzung von "FLoating point OPerations" ("point" wurde vernachlässigt). Und zu "tera" findet man bei "alphadictionary" folgenden Hinweis:

(E?)(L?) http://www.alphadictionary.com/goodword/word/teraflop

...
The prefix "tera-" is even more unusual; it comes from Greek "teras" = "monster", and does not even suggest its meaning here, "trillion". The Greek word came from an old PIE verb meaning "do", "make", the same root that gave Sanskrit "karma" = "act", "deed".
...


a failed terrorist plot but a trillion (billion outside the US) "FLoating point OPerations", used in measuring the speed of a computer processor.

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpB,00.html
Buzzword Alert: Teraflops, Vienna, DRM, social networking and RSA: Buzzword Alert

(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpT,00.html


The Clustered-Flowered Rose - Rose

(E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose


(E?)(L?) http://www.helpmefind.com/rose/pl.php?n=14337


tier, tirade, Tiramisu, tire (W3)

Das engl. "tier" hat nichts mit Zoologie zu tun sondern bedeutet "Reihe", "Lage", "Rang", "Stufe".

In diesem speziellen Fall geht es um Rechenzentren, die von "Tier I" bis "Tier IV" klassifiziert werden. "Tier I" entspricht dabei der geringsten Sicherheitsstufe und "Tier IV" entspricht einem sehr gesicherten und mit redundanter Technik ausgestattetem Rechenzentrum.

Das engl. "tier" (1560) = dt. "Lage", "Rang", "Reihe", "Schicht", "Stufe", geht zurück auf mfrz., mengl. "tire" = "row", "rank", "sequence", "order". Dies geht weiter zurück auf altfrz. "tirer" = "herausziehen".

Bei "www.etymonline.com" findet man die These, dass engl. "tier" mit mhd. "ziere", ahd. "ziari" = dt. "glänzend", "herrlich", "prächtig" und damit mit dt. "Zier" = "Schönheit", "Pracht", "Schmuck" zusammenhängt.

Näherliegender scheint mir die Verwandtschaft von engl. "tier" mit dt., frz. "Tirade" = "Wortschwall" zu sein, das auf die Bedeutung "länger anhaltendes Ziehen", "sich Hinziehendes", zurück geht.

Interessanterweise geht auch die Süßspeise "Tiramisu" auf "tirer" zurück. Das ital. "tirami su" bedeutet ursprünglich "zieh mich hoch" und spielt auf die Muntermacheranteile Kaffee und Alkohol an.

Ein weiterer interessanter Verwandter ist engl. "tire" = "Reifen". Über das engl. "attire" = "kleiden", "anziehen" (dress or clothe, especially in fine or elaborate garments) wurde es zum "Radkleid" also zum "das Rad anziehenden Reifen".

(E?)(L?) http://www.etymonline.com/index.php?term=tier
(E?)(L?) http://www-306.ibm.com/software/globalization/terminology/index.jsp
business logic tier

(E?)(L?) http://www.processor.com/editorial/article.asp?article=articles/p2818/31p18/31p18.asp
(E?)(L1) http://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpN,00.html
n-tier | tier | tiered storage | two-tiered Internet | 2-tier Internet | 3-tier application

(E?)(L?) http://www.uptimeinstitute.com/
(E?)(L?) http://www.webopedia.com/TERM/d/data_center_tiers.html
(E?)(L?) http://www.webopedia.com/TERM/T/tiered_storage.html
(E?)(L?) http://www.webopedia.com/TERM/T/two_tier.html
(E?)(L?) http://www.webopedia.com/DidYouKnow/Computer_Science/2006/tiered_storage.asp
(E?)(L?) http://www.webopedia.com/quick_ref/app.arch.asp

...
The four tiers, as classified by The Uptime Institute include the following: ...


Erstellt: 2011-01

U

Ubiquitous Computing
Ubiquitous Networking
ubiquitouscomputer (W3)

"Ubiquitous Computing" bezeichnet der vollkommene Computerisierung unseres Lebens. Das Design-Prinzip des allgegenwärtigen (engl.: ubiquitous) Computers wurde 1988 von Mark Weiser entwickelt.

(E?)(L?) http://beat.doebe.li/bibliothek/w00533.html
(E?)(L?) http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci759337,00.html
(E?)(L?) http://www.wissensnavigator.com/interface2/knowledge/computing/ubiquitous_computing/index.htm


(E6)(L1) http://computer.howstuffworks.com/ubiquitous-network.htm

How Ubiquitous Networking Will Work

Inside this Article Mobile computing devices have changed the way we look at computing. Laptops and personal digital assistants (PDAs) have unchained us from our desktop computers. A group of researchers at AT&T Laboratories Cambridge are preparing to put a new spin on mobile computing. In addition to taking the hardware with you, they are designing a "ubiquitous networking system" that allows your program applications to follow you wherever you go.
...


Der Vorschlag für das deutsche Äauivalent von "ubiquitouscomputer" ist "Überallrechner", "Ubiquitärrechner".

(E6)(L1) http://www.anglizismenindex.de/


ucar
Scoville, Thomas
The Elements Of Style: UNIX As Literature

(E?)(L?) http://www.rap.ucar.edu/staff/tres/elements.html

If there's nothing different about UNIX people, how come so many were liberal-arts majors?
It's the love of words that makes UNIX stand out.
...


UNIX
von "UNiplexed Information and Computing System (UNICS)"

Das Betriebssystem (BS) wurde 1969 von AT&T entwickelt. Es wurde als erstes BS in einer höheren Programmiersprache ("C") geschrieben. Daher war es weitgehend plattformunabhängig.

Uuencode
Unix-to-Unix encode

(E?)(L?) http://webopedia.com/TERM/U/Uuencode.html

A set of algorithms for converting files into a series of 7-bit ASCII characters that can be transmitted over the Internet. Originally, "uuencode" stood for "Unix-to-Unix encode", but it has since become a universal protocol used to transfer files between different platforms such as Unix, Windows, and Macintosh. Uuencoding is especially popular for sending e-mail attachments. Nearly all e-mail applications support uuencoding for sending attachments and uudecoding for receiving attachments.

Another popular encoding algorithm is BinHex, which is often used for transferring Macintosh files, such as PICT graphics files.


V

Version Number (W3)

Die "Versionsnummer", engl. "version number" scheint erst mit der Entwicklung von Software so richtig in Erscheinung getreten zu sein.

(E?)(L?) http://www.rfc-editor.org/rfc-index2.html
2145 Use and Interpretation of HTTP Version Numbers J. C. Mogul, R. Fielding, J. Gettys, H. Frystyk [ May 1997 ] ( TXT = 13659 bytes) (Status: INFORMATIONAL)
  • 2144 The CAST-128 Encryption Algorithm C. Adams [ May 1997 ] ( TXT = 37532 bytes) (Status: INFORMATIONAL)

    (E?)(L?) http://help.sap.com/saphelp_glossary/en/index.htm
    version number (BC-CUS) version number (BC-DOC-DTL) version numbering exit

    (E?)(L?) http://technologizer.com/2009/07/14/version-numbers/

    ...
    When did version numbers come into use?

    I wish I could tell you – actually, I’m hoping that someone reading this will be able to. I do know that the FORTRAN II programming language came along in 1958, so software developers having been using numbers to keep track of software versions for more than half a century. By the early 1970s, Unix’s developers were keeping track of its evolution using “edition” numbers – second edition, third edition, and so on – which referred to the revisions to the Unix manual.

    I’m not sure if there was a period when version numbers weren’t widely used for personal computer software, but if so, it wasn’t long. When I got into computers in 1978, standard version numbers and point releases (such as Radio Shack’s famously unusable TRS-DOS 2.1) were already part of the culture.
    ...


    (E1)(L1) http://ngrams.googlelabs.com/graph?corpus=0&content=Version Number
    Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

    Engl. "Version Number" taucht in der Literatur um das Jahr 1950 auf.

    Erstellt: 2012-01

  • Vista, Windows Vista (W3)

    Das neue Microsoft Betriebssystem "Vista", das 2007 das Licht der Welt erblickte, ist die konsequente Fortführung des vorhergehenden "WINDOWS" (= "Fenster", wörtlich "Windauge"), heißt "Vista" doch "Blick", "Sicht", "Perspektive".

    "vista" mit seinen verschiedenen Bedeutungen geht zurück auf lat. "videre" = "sehen". Nahe verwandt ist die "Vision".
    span. "vista" = "Sehen", "Sehvermögen", "Blick", "Aussicht"
    ital. "vista" = "Sehen", "Anblick", "Sicht"
    engl. "vista" = "Ausblick", "Aussicht"

    ...
    ETYMOLOGY: Italian, from feminine past participle of "vedere", "to see", from Latin "vidre". See "weid-" in Appendix I.
    ...

    Eine Stadt in Kalifornien

    Und als Abkürzung für "Volunteers In Service To America".

    (E?)(L?) http://www.dicofr.com/cgi-bin/n.pl/dicofr/definition/20050807150547
    Windows Vista

    (E?)(L?) http://www.etymonline.com/index.php?search=vista
    (E?)(L?) http://www.gai-netconsult.de/download/security/secjournal/SecJournal_0729.pdf


    (E?)(L?) http://www.jargonf.org/wiki/Windows_Vista
    Windows Vista

    (E?)(L?) http://jargonf.org/wiki/Windows_Vista
    Windows Vista

    (E?)(L?) http://www.onelook.com/?w=vista&loc=wotd
    vista



    (E?)(L?) http://www.pcwelt.de/start/software_os/vista/news/96350/index.html?NLC-Newsletter&id=96350

    Alles zu Windows Vista von Markus Pilzweger
    11.10.2007, 09:55 Uhr
    ...
    Die PC-WELT steht Ihnen mit Rat und Tat zur Seite. Bei uns finden Sie alles, was rund um Vista wichtig ist. Wie wird das System optimal eingerichtet? Wie wird Vista abgesichert? Oder wie erstellen Sie eine Vista-Setup-DVD? Diese Fragen und noch viel mehr beantworten wir Ihnen in den folgenden Ratgebern zu Windows Vista.


    (E?)(L?) http://dictionary.reference.com/
    (E?)(L?) http://searchwinit.techtarget.com/sDefinition/0,,sid1_gci1140209,00.html
    Vista

    (E?)(L?) http://searchwinit.techtarget.com/sDefinition/0,,sid1_gci1246462,00.html

    Vista glossary
    So many terms, so little time! Vista was released in January 2007 with new features, new versions, new abilities - and new names for those things that were already familiar. Our glossary can help you figure out what's what in Windows Vista in short order.
    ...


    visual6502
    Visual Transistor-level Simulation of the 6502 CPU and other chips!

    (E?)(L?) http://www.visual6502.org/

    ...
    Have you ever wondered how the chips inside your computer work? How they process information and run programs? Are you maybe a bit let down by the low resolution of chip photographs on the web or by complex diagrams that reveal very little about how circuits work? Then you've come to the right place!
    ...
    You can see this operation right now in your browser (except for Internet Explorer) with our interactive "JavaScript simulation". We suggest a fast computer and lots of memory for this version.
    ...


    (E?)(L?) http://www.visual6502.org/JSSim/

    This simulator uses HTML5 features only found on the latest versions of browsers and needs lots of RAM. If you have trouble, please check compatibility.

    Sorry, Microsoft Internet Explorer not supported - showing you a picture instead!

    ...


    Erstellt: 2011-01

    W

    webopedia
    Who's Who in Internet and Computer Technology

    (E3)(L1) http://www.webopedia.com/quick_ref/bios/m.asp
    (E?)(L?) http://www.webopedia.com/quick_ref/bios/_index.asp

    The people listed in this section have made major contributions to the field of computer and Internet technology. Some are computer scientists whose developments have paved the way for the Internet of today; some are founders of companies that have influenced the direction of new developments and e-commerce trends. The one thing they all have in common is that the Internet would not be what it is today without the work they have done. As the technology leaps forward at a rapid pace, the list will continue to grow as new innovators make their mark on the industry. We realize that there are hundreds of people who have shaped the industry, and we strongly encourage our readers to submit the name of any person that deserves to be included in our list.

    Abramson, Norm | Allen, Paul | Andreessen, Marc | Atanasoff, John | Babbage, Charles | Ballmer, Steve | Baran, Paul | Bechtolsheim, Andy | Berners-Lee, Tim | Berry, Clifford | Bezos, Jeff | Bhatia, Sabeer | Boole, George | Bosack, Len | Bosak, Jon | Canion, Rod | Case, Steve | Cerf, Vint | Chen, Peter | Clark, Jim | Codd, Edgar | Cox, Alan | Cray, Seymour | Daines, Bernard | Dell, Michael | Dijkstra, Edsger | Ellison, Larry | Engelbart, Doug | Ershov, Andrei | Gates, Bill | Geschke, Chuck | Goldfarb, Charles | Gosling, James | Grove, Andy | Heart, Frank | Hopper, Grace | Jobs, Steve | Joy, Bill | Kahn, Robert | Kay, Alan | Kernighan, Brian | Khosla, Vinod | Kleinrock, Leonard | Lerner, Sandy | Licklider, J.C.R. | Lovelace, Ada Byron | McNealy, Scott | Metcalfe, Bob | Minsky, Marvin | Moore, Gordon | Noorda, Ray | Noyce, Bob | Postel, Jonathan | Ritchie, Dennis | Roberts, Ed | Shugart, Alan | Stallman, Richard | Stroustrup, Bjarne | Thompson, Ken | Tomlinson, Ray | Torvalds, Linus | Turing, Alan | von Neumann, John | Wall, Larry | Warnock, John | Wozniak, Steve | Yourdon, Ed | Zuse, Konrad


    webopedia
    Did You Know? Archive

    (E?)(L?) http://www.webopedia.com/DidYouKnow/_index.asp

    Internet Computer Science Hardware Software didyouoknowblurbpage.html V


    Erstellt: 2011-11

    Windows (W3)

    Das Betriebssystem "Windows" zeigt die einzelnen Programmoberflächen in Fensterähnlicher Weise an.

    (E?)(L?) http://search.about.com/?q=WINDOWS

    About.com offers expert, quality information that helps people find solutions to daily needs.


    (E?)(L?) http://adventskalender.computerwissen.de/tuerchen-nr-1/

    Täglich nutzen wir alle unsere Computer wie selbstverständlich, ohne dabei auch nur einmal über diese spannenden Fragen nachzudenken:

    Woher kommt der Name „Windows“? Was bedeutet bidirektionale Kommunikation? Warum heißt es eigentlich „online“ sein und was hat der Papst mit AOL zu tun?

    Eckart von Hirschhausen gibt die Antworten darauf in diesem amüsanten Video.


    (E?)(L?) http://www.besoindaide.com/ccm/win/winintro.htm

    ...
    La première version de Microsoft Windows (Microsoft Windows 1.0) est apparue en novembre 1985. Il s'agissait d'une interface graphique, inspirée de l'interface des ordinateurs Apple de l'époque. Windows 1.0 n'a pas eu de succès auprès du public, pas plus que Microsoft Windows 2.0, lancé le 9 décembre 1987.
    ...


    (E?)(L?) http://www.computerhilfen.de/info/windows

    In unseren Windows Tipps sammeln wir praktische Anleitungen, um Windows Probleme in den Griff zu bekommen oder schneller mit dem PC arbeiten zu können.


    (E?)(L?) http://www.iwebtool.com/what_is_windows.html

    What is Windows?


    (E?)(L?) http://www.jamillan.com/v_sigla8.htm#Windows


    (E?)(L?) http://www.netlingo.com/word/windows.php


    (E2)(L1) http://dictionary.reference.com/browse/Windows

    Windows


    (E?)(L?) http://www.tecchannel.de/pc_mobile/windows/

    PC + Mobil - Windows


    (E?)(L?) http://whatis.techtarget.com/definitions/W/page/6




    (E?)(L?) http://www.webopedia.com/Operating_Systems/Windows

    Windows - Terms

    | .INI File | ACPI | administrative privileges | ADS | Aero | areal density | ASD Agent | BCD | BDC | bit rate | BitLocker Hard Drive Encryption | blue screen of death | Boot Configuration Data | bootable diskette | byte | CDFS | ClearType | clock tick | COM | Cryptography API: Next Generation | data transfer rate | DCC | DDE | DEP | Dial-Up Networking | DirectPlay | DirectX | DLL | Domain Join | DPI - dots per inch | EFS | ERD | ESCD | fdisk | FTS file | Games Explorer | GID file | gigabyte | GINA | GPF | GUID | Hardware Compatibility List | himem.sys | HWID - Hardware Identification | hybrid hard disk drive | ICF | ipconfig | IRPStackSize | Kbps | kilobit | Last Known Good configuration | Ldifde | Linux on Windows | LMHOSTS file | local area connections | Mac OS X Server | MAPI | MBR | MCSE | megabyte | Metro | MFLOP | Microsoft Band | Microsoft Forefront Endpoint Security | Microsoft Management Console | Microsoft Office SharePoint Server | Microsoft Operations Manager | Microsoft Secure Boot | Microsoft Security Software | Microsoft Surface tablet | Microsoft Windows | Microsoft Windows 8 | Microsoft Windows XP operating system | MIF | MMC | MOSS | MSCDEX | MSCONFIG | MSCS | MTS | nanosecond | Network Load Balancing | network map | Network Neighborhood | NLB | NTFS - NT File System | NTLDR - NT Loader | OCX - OLE Control Extension | OLE - Object Linking and Embedding | OLE for Process Control | On-Screen Keyboard | OPC | OSR 2 | Parental Controls | PDC | pica | PIF - Program Information file | pinned item list | pixel | Play To | qubit | RDP | registry | Remote Access Service | Remote Desktop | Remote Desktop Protocol | Routing and Remote Access Service | safe mode | Server Appliance Kit | shadow copy | SharePoint Solution Packages | SID - security identifier | Smartdrive | Snipping Tool | SP | SUS | swap file | System Restore | Task Manager | Task Pane | taskbar | UAC | UNC | USB boot | User Account Control | USMT | VFAT | WHQL | WHS | WHS add-in | WHS Console | WIM | win.com | Win32 | Win32s | Windows | Windows 2000 | Windows 7 | Windows 7 HomeGroup | Windows 8 | Windows 8 codename | Windows 9 | Windows 95 | Windows 98 | Windows CE | Windows Defender | Windows DNA | Windows Genuine Advantage | Windows Home Server | Windows Image Management | Windows Imaging Format | Windows Mail | Windows Meeting Space | Windows Network Setup Wizard | Windows NT | Windows Phone 8 | Windows Photo Gallery | Windows ReadyBoost | Windows RT | Windows Server 2012 Essentials | Windows Server 2012 R2 | Windows Server 8 | Windows Server 8 codename | Windows Server Blue | Windows Sidebar | Windows SideShow | Windows terminal | Windows Touch | Windows universal apps – Universal Project | Windows Vista | Windows XP ICS Internet Gateway | Windows XP Mode | Windows XP Network Bridge | Windows XP security update hack | Winlogon | WINS - Windows Internet Naming Service | Winsock | Wintel | WMA | WMI | Wolfpack | WOW | ZAW - Zero Administration for Windows | Zero Administration Kit |


    (E?)(L?) http://www.webopedia.com/TERM/W/Windows.html

    When spelled with a capital "W", "Windows" is short for "Microsoft Windows".


    (E?)(L?) http://de.wikipedia.org/wiki/Microsoft_Windows

    ...
    Der Name rührt daher, dass die Benutzeroberflächen von Anwendungen als rechteckige Fenster auf dem Bildschirm dargestellt werden.
    ...


    (E?)(L?) https://www.youtube.com/watch?v=3Y26Cy8nU5Y

    6.2 Eckart von Hirschhausen - Die Windows-Prophezeiung - Quatsch Comedy Club Classics


    (E1)(L1) http://books.google.com/ngrams/graph?corpus=0&content=Windows
    Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.

    Engl. "Windows" taucht in der Literatur um das Jahr 1580 / 1660 / 1986 auf.

    Erstellt: 2014-11

    WINDOWS - Anleitung erstellen

    Manchmal möchte man jemandem erklären, welche Schritte am PC notwendig sind um eine bestimmte Einstellung vorzunehmen.

    Dazu bietet WINDOWS eine kleine DIA-Show als Schnellanleitung zu erstellen.

    Zum Aufruf der Aufnahmefunktion: [WINDOWS-Taste]+[R] drücken
    "psr" eingeben und [ok]
    Es öffnet sich ein flaches Fenster mit der Bezeichnung "Problemaufzeichnung"
    Mit [Aufzeichnung starten] beginnt die Aufzeichnung der Aktivitäten am Bildschirm.
    bis [Aufzeichnung beenden] angeklickt wird.
    Abgespeichert wird im zip-Format
    Der Empfänger (oder man selbst) kann sich dann die Anleitung ansehen.

    Erstellt: 2013-10

    wolframalpha
    Computational Sciences

    (E?)(L1) http://www.wolframalpha.com/examples/ComputationalScience.html

    Cellular Automata Substitution Systems Turing Machines Computational Complexity Mathematica Programming Image Processing


    Erstellt: 2011-10

    wolframalpha
    Web & Computer Systems

    (E?)(L1) http://www.wolframalpha.com/examples/WebAndComputerSystems.html

    Web & Internet Notable Computers Data Transfer RAID Character Encodings String Processing Hashing Display Resolution Passwords CAPTCHA Base Conversion CIDR


    Erstellt: 2011-10

    wordspot

    (E?)(L1) http://www.wordspot.com/electricsymbols.html
    Electric Symbols: Internet Words and Culture - by John Fraim
    How words used on the Internet reflect our culture.
    Abstract
    The mous Sapir-Whorf Hypothesis posits a linguistic determinism arguing language plays a central role in creation of a worldview. In the sense that language is a product of words, one can say that a culture's worldview is affected and influenced by the words of its particular language. Words both create and communicate worldviews. The greatest potential in history for the observation and analysis of words exists on the Internet. Indeed, the Internet can be considered history's greatest observatory and laboratory of words.

    X

    x86-Architektur (W3)

    Vor 25 Jahren (1978) stellte die Chipfirma Intel ihren ersten 16-Bit-Prozessor unter dem Namen 8086 vor. Niemand erwartete damals, dass diese relativ einfache Architektur so einen immensen Erfolg haben würde. Doch bis heute bildet die x86-Architektur die Basis für alle Prozessor-Generationen in den verschiedenen PCs, so das Computermagazin c't in der Ausgabe 13/2003.

    Die x86er-Prozessor-Architektur steckt noch immer in jedem PC. Dabei war der 8086-Prozessor damals gar nicht revolutionär, sondern nur eine logische Fortentwicklung bestehender 8-Bit-Systeme. Durchgesetzt hat er sich einige Jahre später vor allem, weil IBM den ersten Personal Computer mit einem 8088-Prozessor ausstattete.

    Weit über 100 Millionen 8086/88-Prozessoren haben Intel und diverse Lizenznehmer in der Folge bis etwa 1990 verkauft. Dabei sollte der Prozessor nur ein kurzlebiger Lückenfüller sein, weil bereits ein 32-Bit-Prozessor als sein Thronerbe auserkoren war.

    xephon

    (E?)(L1) http://www.xephon.com/


    Y

    Yellow Cluster - Rose

    (E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose


    (E?)(L?) http://www.helpmefind.com/rose/pl.php?n=27616


    Youngher's White Cluster - Rose

    (E?)(L?) http://www.floralibrary.com/flora?Terms=cluster+rose


    (E?)(L?) http://www.helpmefind.com/rose/pl.php?n=35668


    Z

    zjournal
    zSeries-Journal

    Die IBM hat ihre Rechner um die Jahrtausendwende in Serien aufgeteilt. Die Grossrechnerserie heisst seit dem (Status: 08.01.2004) "zSeries". Das "z" soll dabei für "zero downtime" stehen. Rein theoretisch ist dies auch möglich - durch vielfache Redundanzen und Lastverteilungsfunktionen. Tatsache ist, dass diese Rechnerkonzeption (HW+SW) eine wirklich hohe Verfügbarkeit vorweisen kann.

    Konsequenterweise heisst das News-Journal zu dieser Technologie "zJournal".

    (E?)(L?) http://www.zjournal.com/

    news relevant to users of IBM zSeries and S/390 systems

    zJournal's Mission Statement

    Contrary to countless reports, the mainframe is not dead and won't be for a long time. In fact, up to 80 percent of the nation's data is being stored and processed on mainframe computers, With that in mind, "z/Journal" is dedicated to providing useful, reliable, and interesting information on a wide variety of topics directly relevant to IT professionals using IBM "zSeries" and "S/390" systems.


    mit Newsletter:
    To keep up with the latest news and issues associated with IBM's zSeries and S/390 systems, and to be notified when z/Journal articles are posted on www.zjournal.com, sign up now to receive z/Journal's weekly z/Journal z/Flash e-Newsletter.