source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/The%20Elements%20of%20Programming%20Style
The Elements of Programming Style, by Brian W. Kernighan and P. J. Plauger, is a study of programming style, advocating the notion that computer programs should be written not only to satisfy the compiler or personal programming "style", but also for "readability" by humans, specifically software maintenance engineers,...
https://en.wikipedia.org/wiki/List%20of%20battery%20sizes
This is a list of the sizes, shapes, and general characteristics of some common primary and secondary battery types in household, automotive and light industrial use. The complete nomenclature for a battery specifies size, chemistry, terminal arrangement, and special characteristics. The same physically interchangeabl...
https://en.wikipedia.org/wiki/Glaisher%E2%80%93Kinkelin%20constant
In mathematics, the Glaisher–Kinkelin constant or Glaisher's constant, typically denoted , is a mathematical constant, related to the -function and the Barnes -function. The constant appears in a number of sums and integrals, especially those involving gamma functions and zeta functions. It is named after mathematicia...
https://en.wikipedia.org/wiki/AES%20key%20schedule
AES uses a key schedule to expand a short key into a number of separate round keys. The three AES variants have a different number of rounds. Each variant requires a separate 128-bit round key for each round plus one more. The key schedule produces the needed round keys from the initial key. Round constants The rou...
https://en.wikipedia.org/wiki/Baire%20space%20%28set%20theory%29
In set theory, the Baire space is the set of all infinite sequences of natural numbers with a certain topology. This space is commonly used in descriptive set theory, to the extent that its elements are often called "reals". It is denoted NN, ωω, by the symbol or also ωω, not to be confused with the countable ordina...
https://en.wikipedia.org/wiki/CO-OPN
The CO-OPN (Concurrent Object-Oriented Petri Nets) specification language is based on both algebraic specifications and algebraic Petri nets formalisms. The former formalism represent the data structures aspects, while the latter stands for the behavioral and concurrent aspects of systems. In order to deal with large s...
https://en.wikipedia.org/wiki/Spacecraft%20design
The design of spacecraft covers a broad area, including the design of both robotic spacecraft (satellites and planetary probes), and spacecraft for human spaceflight (spaceships and space stations). Origin Spacecraft design was born as a discipline in the 1950s and 60s with the advent of American and Soviet space ex...
https://en.wikipedia.org/wiki/Ettingshausen%20effect
The Ettingshausen effect (named for Albert von Ettingshausen) is a thermoelectric (or thermomagnetic) phenomenon that affects the electric current in a conductor when a magnetic field is present. Ettingshausen and his PhD student Walther Nernst were studying the Hall effect in bismuth, and noticed an unexpected perpen...
https://en.wikipedia.org/wiki/Lemniscate%20constant
In mathematics, the lemniscate constant is a transcendental mathematical constant that is the ratio of the perimeter of Bernoulli's lemniscate to its diameter, analogous to the definition of for the circle. Equivalently, the perimeter of the lemniscate is . The lemniscate constant is closely related to the lemniscat...
https://en.wikipedia.org/wiki/Undeletion
Undeletion is a feature for restoring computer files which have been removed from a file system by file deletion. Deleted data can be recovered on many file systems, but not all file systems provide an undeletion feature. Recovering data without an undeletion facility is usually called data recovery, rather than unde...
https://en.wikipedia.org/wiki/Cauchy%20index
In mathematical analysis, the Cauchy index is an integer associated to a real rational function over an interval. By the Routh–Hurwitz theorem, we have the following interpretation: the Cauchy index of r(x) = p(x)/q(x) over the real line is the difference between the number of roots of f(z) located in the right half...
https://en.wikipedia.org/wiki/Rail%20India%20Technical%20and%20Economic%20Service
RITES Ltd, formerly known as Rail India Technical and Economic Service Limited a Navaratna, Central Public Sector Undertaking under the Ministry of Railways, incorporated on April 26, 1974 is a multidisciplinary engineering and consultancy organization, providing a comprehensive range of services from concept to commis...
https://en.wikipedia.org/wiki/Carrier%20generation%20and%20recombination
In the solid-state physics of semiconductors, carrier generation and carrier recombination are processes by which mobile charge carriers (electrons and electron holes) are created and eliminated. Carrier generation and recombination processes are fundamental to the operation of many optoelectronic semiconductor devices...
https://en.wikipedia.org/wiki/Chkrootkit
Chkrootkit (Check Rootkit) is a widely used Unix-based utility designed to aid system administrators in examining their systems for rootkits. Operating as a shell script, it leverages common Unix/Linux tools such as the strings and grep command. The primary purpose is to scan core system programs for identifying signat...
https://en.wikipedia.org/wiki/DShield
DShield is a community-based collaborative firewall log correlation system. It receives logs from volunteers worldwide and uses them to analyze attack trends. It is used as the data collection engine behind the SANS Internet Storm Center (ISC). DShield was officially launched end of November 2000 by Johannes Ullrich. S...
https://en.wikipedia.org/wiki/Latch-up
In electronics, a latch-up is a type of short circuit which can occur in an integrated circuit (IC). More specifically, it is the inadvertent creation of a low-impedance path between the power supply rails of a MOSFET circuit, triggering a parasitic structure which disrupts proper functioning of the part, possibly even...
https://en.wikipedia.org/wiki/Mathematical%20psychology
Mathematical psychology is an approach to psychological research that is based on mathematical modeling of perceptual, thought, cognitive and motor processes, and on the establishment of law-like rules that relate quantifiable stimulus characteristics with quantifiable behavior (in practice often constituted by task pe...
https://en.wikipedia.org/wiki/Hardware%20overlay
In computing, hardware overlay, a type of video overlay, provides a method of rendering an image to a display screen with a dedicated memory buffer inside computer video hardware. The technique aims to improve the display of a fast-moving video image — such as a computer game, a DVD, or the signal from a TV card. Most ...
https://en.wikipedia.org/wiki/Chapman%20function
A Chapman function describes the integration of atmospheric absorption along a slant path on a spherical earth, relative to the vertical case. It applies to any quantity with a concentration decreasing exponentially with increasing altitude. To a first approximation, valid at small zenith angles, the Chapman function f...
https://en.wikipedia.org/wiki/KPDX
KPDX (channel 49) is a television station licensed to Vancouver, Washington, United States, serving the Portland, Oregon area as an affiliate of MyNetworkTV. It is the only major commercial station in Portland that is licensed to the Washington side of the market. KPDX is owned by Gray Television alongside Fox affilia...
https://en.wikipedia.org/wiki/B%C3%A9zout%20matrix
In mathematics, a Bézout matrix (or Bézoutian or Bezoutiant) is a special square matrix associated with two polynomials, introduced by and and named after Étienne Bézout. Bézoutian may also refer to the determinant of this matrix, which is equal to the resultant of the two polynomials. Bézout matrices are sometimes ...
https://en.wikipedia.org/wiki/WESH
WESH (channel 2) is a television station licensed to Daytona Beach, Florida, United States, serving the Orlando area as an affiliate of NBC. It is owned by Hearst Television alongside Clermont-licensed CW affiliate WKCF (channel 18). The stations share studios on North Wymore Road in Eatonville (using a Winter Park add...
https://en.wikipedia.org/wiki/Beck%27s%20monadicity%20theorem
In category theory, a branch of mathematics, Beck's monadicity theorem gives a criterion that characterises monadic functors, introduced by in about 1964. It is often stated in dual form for comonads. It is sometimes called the Beck tripleability theorem because of the older term triple for a monad. Beck's monadicit...
https://en.wikipedia.org/wiki/Beck%27s%20theorem%20%28geometry%29
In discrete geometry, Beck's theorem is any of several different results, two of which are given below. Both appeared, alongside several other important theorems, in a well-known paper by József Beck. The two results described below primarily concern lower bounds on the number of lines determined by a set of points in ...
https://en.wikipedia.org/wiki/Parallels%20Workstation
Parallels Workstation is the first commercial software product released by Parallels, Inc., a developer of desktop and server virtualization software. The Workstation software consists of a virtual machine suite for Intel x86-compatible computers (running Microsoft Windows or Linux) (for Mac version, see Parallels Desk...
https://en.wikipedia.org/wiki/D-Bus
D-Bus (short for "Desktop Bus") is a message-oriented middleware mechanism that allows communication between multiple processes running concurrently on the same machine. D-Bus was developed as part of the freedesktop.org project, initiated by GNOME developer Havoc Pennington to standardize services provided by Linux de...
https://en.wikipedia.org/wiki/Navigation%20mesh
A navigation mesh, or navmesh, is an abstract data structure used in artificial intelligence applications to aid agents in pathfinding through complicated spaces. This approach has been known since at least the mid-1980s in robotics, where it has been called a meadow map, and was popularized in video game AI in 2000. ...
https://en.wikipedia.org/wiki/Going%20up%20and%20going%20down
In commutative algebra, a branch of mathematics, going up and going down are terms which refer to certain properties of chains of prime ideals in integral extensions. The phrase going up refers to the case when a chain can be extended by "upward inclusion", while going down refers to the case when a chain can be exten...
https://en.wikipedia.org/wiki/Slipstream%20%28computer%20science%29
A slipstream processor is an architecture designed to reduce the length of a running program by removing the non-essential instructions. It is a form of speculative computing. Non-essential instructions include such things as results that are not written to memory, or compare operations that will always return true. A...
https://en.wikipedia.org/wiki/Colortrak
Colortrak was a trademark used on several RCA color televisions beginning in the 1970s and lasting into the 1990s. After RCA was acquired by General Electric in 1986, GE began marketing sets identical to those from RCA. GE sold both RCA and GE consumer electronics lines to Thomson SA in 1988. RCA televisions with the C...
https://en.wikipedia.org/wiki/Lazarus%20%28software%29
Lazarus is a free, cross-platform, integrated development environment (IDE) for rapid application development (RAD) using the Free Pascal compiler. Its goal is to provide an easy-to-use development environment for programmers developing with the Object Pascal language, which is as close as possible to Delphi. Software...
https://en.wikipedia.org/wiki/OpenID
OpenID is an open standard and decentralized authentication protocol promoted by the non-profit OpenID Foundation. It allows users to be authenticated by co-operating sites (known as relying parties, or RP) using a third-party identity provider (IDP) service, eliminating the need for webmasters to provide their own ad ...
https://en.wikipedia.org/wiki/DrayTek
DrayTek () is a network equipment manufacturer of broadband CPE (Customer Premises Equipment), including firewalls, VPN devices, routers, managed switches and wireless LAN devices. The company was founded in 1997. The earliest products included ISDN based solutions, the first being the ISDN Vigor128, a USB terminal ada...
https://en.wikipedia.org/wiki/Test%20and%20test-and-set
In computer architecture, the test-and-set CPU instruction (or instruction sequence) is designed to implement mutual exclusion in multiprocessor environments. Although a correct lock can be implemented with test-and-set, the test and test-and-set optimization lowers resource contention caused by bus locking, especiall...
https://en.wikipedia.org/wiki/Direct%20sum
The direct sum is an operation between structures in abstract algebra, a branch of mathematics. It is defined differently, but analogously, for different kinds of structures. To see how the direct sum is used in abstract algebra, consider a more elementary kind of structure, the abelian group. The direct sum of two a...
https://en.wikipedia.org/wiki/Diffusing%20update%20algorithm
The diffusing update algorithm (DUAL) is the algorithm used by Cisco's EIGRP routing protocol to ensure that a given route is recalculated globally whenever it might cause a routing loop. It was developed by J.J. Garcia-Luna-Aceves at SRI International. The full name of the algorithm is DUAL finite-state machine (DUAL ...
https://en.wikipedia.org/wiki/Hermite%20interpolation
In numerical analysis, Hermite interpolation, named after Charles Hermite, is a method of polynomial interpolation, which generalizes Lagrange interpolation. Lagrange interpolation allows computing a polynomial of degree less than that takes the same value at given points as a given function. Instead, Hermite interpo...
https://en.wikipedia.org/wiki/Practical%20Action
Practical Action (previously known as the Intermediate Technology Development Group, ITDG) is a development charity registered in the United Kingdom which works directly in four regions of the developing world – Latin America, East Africa, Southern Africa and South Asia, with particular concentration on Peru, Bolivia, ...
https://en.wikipedia.org/wiki/Flag%20%28programming%29
In computer programming, flag can refer to one or more bits that are used to store a binary value or a Boolean variable for signaling special code conditions, such as file empty or full queue statuses. Flags may be found as members of a defined data structure, such as a database record, and the meaning of the value co...
https://en.wikipedia.org/wiki/Perpendicular%20recording
Perpendicular recording (or perpendicular magnetic recording, PMR), also known as conventional magnetic recording (CMR), is a technology for data recording on magnetic media, particularly hard disks. It was first proven advantageous in 1976 by Shun-ichi Iwasaki, then professor of the Tohoku University in Japan, and fi...
https://en.wikipedia.org/wiki/Springburn%20Museum
Springburn Museum was set up in the reading room of the Springburn Library, Glasgow, Scotland, as the first independent community museum in the city, presenting material on the industrial heritage of the area. The Museum was opened by Tom Weir in 1986. It continued to provide a community based resource for historical...
https://en.wikipedia.org/wiki/Integrated%20amplifier
An integrated amplifier (pre/main amp) is an electronic device containing an audio preamplifier and power amplifier in one unit, as opposed to separating the two. Most modern audio amplifiers are integrated and have several inputs for devices such as CD players, DVD players, and auxiliary sources. Vintage integrated a...
https://en.wikipedia.org/wiki/Fibred%20category
Fibred categories (or fibered categories) are abstract entities in mathematics used to provide a general framework for descent theory. They formalise the various situations in geometry and algebra in which inverse images (or pull-backs) of objects such as vector bundles can be defined. As an example, for each topologic...
https://en.wikipedia.org/wiki/Ames%20strain
The Ames strain is one of 89 known strains of the anthrax bacterium (Bacillus anthracis). It was isolated from a diseased 14-month-old Beefmaster heifer that died in Sarita, Texas in 1981. The strain was isolated at the Texas Veterinary Medical Diagnostic Laboratory and a sample was sent to the United States Army Medic...
https://en.wikipedia.org/wiki/Cowboy%20coding
Cowboy coding is software development where programmers have autonomy over the development process. This includes control of the project's schedule, languages, algorithms, tools, frameworks and coding style. Typically, little to no coordination exists with other developers or stakeholders. A cowboy coder can be a lone...
https://en.wikipedia.org/wiki/Insteon
Insteon is a proprietary home automation (domotics) system that enables light switches, lights, thermostats, leak sensors, remote controls, motion sensors, and other electrically powered devices to interoperate through power lines, radio frequency (RF) communications, or both. It employed a dual-mesh networking topolo...
https://en.wikipedia.org/wiki/Secure%20telephone
A secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-middle attack. Concerns about massive growth of telephone tapping incidents led to growin...
https://en.wikipedia.org/wiki/IMSI-catcher
An international mobile subscriber identity-catcher, or IMSI-catcher, is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is co...
https://en.wikipedia.org/wiki/Kruskal%E2%80%93Szekeres%20coordinates
In general relativity, Kruskal–Szekeres coordinates, named after Martin Kruskal and George Szekeres, are a coordinate system for the Schwarzschild geometry for a black hole. These coordinates have the advantage that they cover the entire spacetime manifold of the maximally extended Schwarzschild solution and are well-b...
https://en.wikipedia.org/wiki/Telecentre
A telecentre is a public place where people can access computers, the Internet, and other digital technologies that enable them to gather information, create, learn, and communicate with others while they develop essential digital skills. Telecentres exist in almost every country, although they sometimes go by a differ...
https://en.wikipedia.org/wiki/Kernel%20density%20estimation
In statistics, kernel density estimation (KDE) is the application of kernel smoothing for probability density estimation, i.e., a non-parametric method to estimate the probability density function of a random variable based on kernels as weights. KDE answers a fundamental data smoothing problem where inferences about t...
https://en.wikipedia.org/wiki/Intragenomic%20conflict
Intragenomic conflict refers to the evolutionary phenomenon where genes have phenotypic effects that promote their own transmission in detriment of the transmission of other genes that reside in the same genome. The selfish gene theory postulates that natural selection will increase the frequency of those genes whose p...
https://en.wikipedia.org/wiki/Auf%20Wiedersehen%20Monty
Auf Wiedersehen Monty (German for "Goodbye Monty") is a computer game for the ZX Spectrum, Commodore 64, Amstrad CPC, MSX and Commodore 16. Released in 1987, it is the fourth game in the Monty Mole series. It was written by Peter Harrap and Shaun Hollingworth with music by Rob Hubbard and Ben Daglish. Gameplay The pl...
https://en.wikipedia.org/wiki/Fault%20tolerance
Fault tolerance is the property that enables a system to continue operating properly in the event of the failure of one or more faults within some of its components. If its operating quality decreases at all, the decrease is proportional to the severity of the failure, as compared to a naively designed system, in which...
https://en.wikipedia.org/wiki/Nucleic%20acid%20double%20helix
In molecular biology, the term double helix refers to the structure formed by double-stranded molecules of nucleic acids such as DNA. The double helical structure of a nucleic acid complex arises as a consequence of its secondary structure, and is a fundamental component in determining its tertiary structure. The term ...
https://en.wikipedia.org/wiki/Volterra%20integral%20equation
In mathematics, the Volterra integral equations are a special type of integral equations. They are divided into two groups referred to as the first and the second kind. A linear Volterra equation of the first kind is where f is a given function and x is an unknown function to be solved for. A linear Volterra equatio...
https://en.wikipedia.org/wiki/Comb%20drive
Comb-drives are microelectromechanical actuators, often used as linear actuators, which utilize electrostatic forces that act between two electrically conductive combs. Comb drive actuators typically operate at the micro- or nanometer scale and are generally manufactured by bulk micromachining or surface micromachinin...
https://en.wikipedia.org/wiki/Megahertz%20myth
The megahertz myth, or in more recent cases the gigahertz myth, refers to the misconception of only using clock rate (for example measured in megahertz or gigahertz) to compare the performance of different microprocessors. While clock rates are a valid way of comparing the performance of different speeds of the same mo...
https://en.wikipedia.org/wiki/Sparklies
Sparklies is a form of interference on analogue satellite television transmissions. Sparklies are black or white 'hard' interference dots (as opposed to the 'soft' interference patterns of terrestrial television), caused either by too weak or too strong a signal. When within the satellite's rated reception footprint, ...
https://en.wikipedia.org/wiki/Radical%20axis
In Euclidean geometry, the radical axis of two non-concentric circles is the set of points whose power with respect to the circles are equal. For this reason the radical axis is also called the power line or power bisector of the two circles. In detail: For two circles with centers and radii the powers of a point ...
https://en.wikipedia.org/wiki/Fortinet
Fortinet is a cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems. Fortinet has offices located all over the world. Brothers Ken Xie and Michael Xie founded Fortinet in 2000. The company's ...
https://en.wikipedia.org/wiki/Power%20of%20a%20point
In elementary plane geometry, the power of a point is a real number that reflects the relative distance of a given point from a given circle. It was introduced by Jakob Steiner in 1826. Specifically, the power of a point with respect to a circle with center and radius is defined by If is outside the circle, ...
https://en.wikipedia.org/wiki/Xinu
Xinu Is Not Unix (Xinu, a recursive acronym), is an operating system for embedded systems, originally developed by Douglas Comer for educational use at Purdue University in the 1980s. The name is both recursive, and is Unix spelled backwards. It has been ported to many hardware platforms, including the DEC PDP-11 and V...
https://en.wikipedia.org/wiki/Abel%20polynomials
The Abel polynomials are a sequence of polynomials named after Niels Henrik Abel, defined by the following equation: This polynomial sequence is of binomial type: conversely, every polynomial sequence of binomial type may be obtained from the Abel sequence using umbral calculus. Examples For , the polynomials are F...
https://en.wikipedia.org/wiki/Wastebasket%20taxon
Wastebasket taxon (also called a wastebin taxon, dustbin taxon or catch-all taxon) is a term used by some taxonomists to refer to a taxon that has the purpose of classifying organisms that do not fit anywhere else. They are typically defined by either their designated members' often superficial similarity to each other...
https://en.wikipedia.org/wiki/Oligodynamic%20effect
The oligodynamic effect (from Greek oligos, "few", and dynamis, "force") is a biocidal effect of metals, especially heavy metals, that occurs even in low concentrations. In modern times, the effect was observed by Carl Nägeli, although he did not identify the cause. Brass doorknobs and silverware both exhibit this eff...
https://en.wikipedia.org/wiki/MIL-STD-498
MIL-STD-498, Military Standard Software Development and Documentation, was a United States military standard whose purpose was to "establish uniform requirements for software development and documentation." It was released Nov. 8, 1994, and replaced DOD-STD-2167A, DOD-STD-2168, DOD-STD-7935A, and DOD-STD-1703. It was...
https://en.wikipedia.org/wiki/Lie%20algebra%20cohomology
In mathematics, Lie algebra cohomology is a cohomology theory for Lie algebras. It was first introduced in 1929 by Élie Cartan to study the topology of Lie groups and homogeneous spaces by relating cohomological methods of Georges de Rham to properties of the Lie algebra. It was later extended by to coefficients in an...
https://en.wikipedia.org/wiki/Cyberinfrastructure
United States federal research funders use the term cyberinfrastructure to describe research environments that support advanced data acquisition, data storage, data management, data integration, data mining, data visualization and other computing and information processing services distributed over the Internet beyond ...
https://en.wikipedia.org/wiki/Beam%27s%20eye%20view
Beam's eye view (abbreviated BEV) is an imaging technique used in radiation therapy for quality assurance and planning of external beam radiotherapy (EBRT). These are primarily used to ensure that the relative orientation of the patient and the treatment machine are correct. The BEV image will typically include the ima...
https://en.wikipedia.org/wiki/Miller%20Puckette
Miller Smith Puckette (born 1959) is the associate director of the Center for Research in Computing and the Arts as well as a professor of music at the University of California, San Diego, where he has been since 1994. Puckette is known for authoring Max, a graphical development environment for music and multimedia syn...
https://en.wikipedia.org/wiki/Hazard%20pointer
In a multithreaded computing environment, hazard pointers are one approach to solving the problems posed by dynamic memory management of the nodes in a lock-free data structure. These problems generally arise only in environments that don't have automatic garbage collection. Any lock-free data structure that uses the ...
https://en.wikipedia.org/wiki/Neighbor%20Discovery%20Protocol
The Neighbor Discovery Protocol (NDP), or simply Neighbor Discovery (ND), is a protocol of the Internet protocol suite used with Internet Protocol Version 6 (IPv6). It operates at the link layer of the Internet model, and is responsible for gathering various information required for network communication, including th...
https://en.wikipedia.org/wiki/T-norm
In mathematics, a t-norm (also T-norm or, unabbreviated, triangular norm) is a kind of binary operation used in the framework of probabilistic metric spaces and in multi-valued logic, specifically in fuzzy logic. A t-norm generalizes intersection in a lattice and conjunction in logic. The name triangular norm refers to...
https://en.wikipedia.org/wiki/List%20of%20common%20household%20pests
This is a list of common household pests – undesired animals that have a history of living, invading, causing damage, eating human foods, acting as disease vectors or causing other harms in human habitation. Mammals Mice Field mice House mice Possums Brushtail possum Ringtail possum Rats Black rats Brown rats Wood rat...
https://en.wikipedia.org/wiki/Saprobiont
Saprobionts are organisms that digest their food externally and then absorb the products. This process is called saprotrophic nutrition. Fungi are examples of saprobiontic organisms, which are a type of decomposer. Saprobiontic organisms feed off dead and/or decaying biological materials. Digestion is accomplished by ...
https://en.wikipedia.org/wiki/Mimic%20function
A mimic function changes a file so it assumes the statistical properties of another file . That is, if is the probability of some substring occurring in , then a mimic function , recodes so that approximates for all strings of length less than some . It is commonly considered to be one of the basic techniques fo...
https://en.wikipedia.org/wiki/Multi-adjoint%20logic%20programming
Multi-adjoint logic programming defines syntax and semantics of a logic programming program in such a way that the underlying maths justifying the results are a residuated lattice and/or MV-algebra. The definition of a multi-adjoint logic program is given, as usual in fuzzy logic programming, as a set of weighted rule...
https://en.wikipedia.org/wiki/Waterproofing
Waterproofing is the process of making an object or structure waterproof or water-resistant so that it remains relatively unaffected by water or resisting the ingress of water under specified conditions. Such items may be used in wet environments or underwater to specified depths. Water-resistant and waterproof often ...
https://en.wikipedia.org/wiki/Attribute-oriented%20programming
Attribute-oriented programming (@OP) is a technique for embedding metadata, namely attributes, within program code. Attribute-oriented programming in various languages Java With the inclusion of Metadata Facility for Java (JSR-175) into the J2SE 5.0 release it is possible to utilize attribute-oriented programming ri...
https://en.wikipedia.org/wiki/How%20to%20Lie%20with%20Statistics
How to Lie with Statistics is a book written by Darrell Huff in 1954, presenting an introduction to statistics for the general reader. Not a statistician, Huff was a journalist who wrote many how-to articles as a freelancer. The book is a brief, breezy illustrated volume outlining the misuse of statistics and errors i...
https://en.wikipedia.org/wiki/Spermatheca
The spermatheca (pronounced plural: spermathecae ), also called receptaculum seminis (plural: receptacula seminis), is an organ of the female reproductive tract in insects, e.g. ants, bees, some molluscs, oligochaeta worms and certain other invertebrates and vertebrates. Its purpose is to receive and store sperm from ...
https://en.wikipedia.org/wiki/Directory%20System%20Agent
A Directory System Agent (DSA) is the element of an X.500 directory service that provides User Agents with access to a portion of the directory (usually the portion associated with a single Organizational Unit). X.500 is an international standard developed by the International Organization for Standardization (ISO) and...
https://en.wikipedia.org/wiki/Linear%20actuator
A linear actuator is an actuator that creates linear motion (i.e., in a straight line), in contrast to the circular motion of a conventional electric motor. Linear actuators are used in machine tools and industrial machinery, in computer peripherals such as disk drives and printers, in valves and dampers, and in many o...
https://en.wikipedia.org/wiki/Extension%20by%20new%20constant%20and%20function%20names
In mathematical logic, a theory can be extended with new constants or function names under certain conditions with assurance that the extension will introduce no contradiction. Extension by definitions is perhaps the best-known approach, but it requires unique existence of an object with the desired property. Addition...
https://en.wikipedia.org/wiki/Gumstix
Gumstix is an American multinational corporation headquartered in Redwood City, California. It develops and manufactures small system boards comparable in size to a stick of gum. In 2003, when it was first fully functional, it used ARM architecture system on a chip (SoC) and an operating system based on Linux 2.6 kerne...
https://en.wikipedia.org/wiki/Code%20point
A code point, codepoint or code position is a unique position in a quantized n-dimensional space that has been assigned a semantic meaning. In other words, a code point is a particular position in a table, where the position has been assigned a meaning. The table has discrete positions (1, 2, 3, 4, but not fractions) ...
https://en.wikipedia.org/wiki/Orthomode%20transducer
An orthomode transducer (OMT) is a waveguide component that is commonly referred to as a polarisation duplexer. Orthomode is a contraction of orthogonal mode. Orthomode transducers serve either to combine or to separate two orthogonally polarized microwave signal paths. One of the paths forms the uplink, which is trans...
https://en.wikipedia.org/wiki/Lamina%20%28anatomy%29
Lamina is a general anatomical term meaning "plate" or "layer". It is used in both gross anatomy and microscopic anatomy to describe structures. Some examples include: The laminae of the thyroid cartilage: two leaf-like plates of cartilage that make up the walls of the structure. The vertebral laminae: plates of bo...
https://en.wikipedia.org/wiki/Cursor%20%28user%20interface%29
In human–computer interaction, a cursor is an indicator used to show the current position on a computer monitor or other display device that will respond to input. Etymology Cursor is Latin for 'runner'. A cursor is a name given to the transparent slide engraved with a hairline used to mark a point on a slide rule. T...
https://en.wikipedia.org/wiki/Two-photon%20excitation%20microscopy
Two-photon excitation microscopy (TPEF or 2PEF) is a fluorescence imaging technique that is particularly well-suited to image scattering living tissue of up to about one millimeter in thickness. Unlike traditional fluorescence microscopy, where the excitation wavelength is shorter than the emission wavelength, two-phot...
https://en.wikipedia.org/wiki/Eastern%20equine%20encephalitis
Eastern equine encephalitis (EEE), commonly called Triple E or sleeping sickness (not to be confused with African trypanosomiasis), is a disease caused by a zoonotic mosquito-vectored Togavirus that is present in North, Central, and South America, and the Caribbean. EEE was first recognized in Massachusetts, United St...
https://en.wikipedia.org/wiki/Cyclically%20reduced%20word
In mathematics, cyclically reduced word is a concept of combinatorial group theory. Let F(X) be a free group. Then a word w in F(X) is said to be cyclically reduced if and only if every cyclic permutation of the word is reduced. Properties Every cyclic shift and the inverse of a cyclically reduced word are cyclicall...
https://en.wikipedia.org/wiki/ResKnife
ResKnife is an open-source resource editor for the Apple Macintosh platform. It supports reading and writing resource maps to any fork (data, resource or otherwise) and has basic template-based and hexadecimal editing functionality. ResKnife can export resource data to flat files and supports third-party plug-in editor...
https://en.wikipedia.org/wiki/Master%20of%20Mathematics
A Master of Mathematics (or MMath) degree is a specific advanced integrated Master's degree for courses in the field of mathematics. United Kingdom In the United Kingdom, the MMath is the internationally recognized standard qualification after a four-year course in mathematics at a university. The MMath programme was ...
https://en.wikipedia.org/wiki/Subcloning
In molecular biology, subcloning is a technique used to move a particular DNA sequence from a parent vector to a destination vector. Subcloning is not to be confused with molecular cloning, a related technique. Procedure Restriction enzymes are used to excise the gene of interest (the insert) from the parent. Th...
https://en.wikipedia.org/wiki/KJZZ-TV
KJZZ-TV (channel 14) is an independent television station in Salt Lake City, Utah, United States. It is owned by Sinclair Broadcast Group alongside CBS affiliate KUTV (channel 2) and MyNetworkTV affiliate KMYU (channel 12) in St. George. The stations share studios on South Main Street in downtown Salt Lake City, while ...
https://en.wikipedia.org/wiki/Remote%20keyless%20system
A remote keyless system (RKS), also known as remote keyless entry (RKE) or remote central locking, is an electronic lock that controls access to a building or vehicle by using an electronic remote control (activated by a handheld device or automatically by proximity). RKS largely and quickly superseded keyless entry, a...
https://en.wikipedia.org/wiki/Requirements%20management
Requirements management is the process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders. It is a continuous process throughout a project. A requirement is a capability to which a project outcome (product or service) shou...
https://en.wikipedia.org/wiki/Virtual%20routing%20and%20forwarding
In IP-based computer networks, virtual routing and forwarding (VRF) is a technology that allows multiple instances of a routing table to co-exist within the same router at the same time. One or more logical or physical interfaces may have a VRF and these VRFs do not share routes. Therefore, the packets are only forward...