source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/192%20%28number%29
192 (one hundred [and] ninety-two) is the natural number following 191 and preceding 193. In mathematics 192 has the prime factorization . Because it has so many small prime factors, it is the smallest number with 14 divisors, namely 1, 2, 3, 4, 6, 8, 12, 16, 24, 32, 48, 64, 96, and 192 itself. Because its only prime ...
https://en.wikipedia.org/wiki/Maldivian%20writing%20systems
Several Dhivehi scripts have been used by Maldivians during their history. The early Dhivehi scripts fell into the abugida category, while the more recent Thaana has characteristics of both an abugida and a true alphabet. An ancient form of Nagari script, as well as the Arabic and Devanagari scripts, have also been ext...
https://en.wikipedia.org/wiki/Ovi%20%28magazine%29
Ovi (meaning Door in English) is a multilingual non-profit daily publication that carries articles about ideas and opinion. It is based in Helsinki. History and profile Launched in December 2004 by two immigrants to Finland, Asa Butcher and Thanos Kalamidas, Ovi carries contributions to society, politics and culture i...
https://en.wikipedia.org/wiki/Microsoft%20Software%20Assurance
Microsoft Software Assurance (SA) is a Microsoft maintenance program aimed at business users who use Microsoft Windows, Microsoft Office, and other server and desktop applications. The core premise behind SA is to give users the ability to spread payments over several years, while offering "free" upgrades to newer vers...
https://en.wikipedia.org/wiki/Daedalian%20Opus
is a puzzle game for the Game Boy and was released in July 1990. Gameplay The game is essentially a series of 36 jigsaw puzzles with pentominos that must be assembled into a specific shape. The puzzles start off with rectangular shapes and simple solutions, but the puzzles quickly grow more complex, with odder shapes ...
https://en.wikipedia.org/wiki/Porosimetry
Porosimetry is an analytical technique used to determine various quantifiable aspects of a material's porous structure, such as pore diameter, total pore volume, surface area, and bulk and absolute densities. The technique involves the intrusion of a non-wetting liquid (often mercury) at high pressure into a material ...
https://en.wikipedia.org/wiki/Glossary%20of%20Unified%20Modeling%20Language%20terms
Glossary of Unified Modeling Language (UML) terms provides a compilation of terminology used in all versions of UML, along with their definitions. Any notable distinctions that may exist between versions are noted with the individual entry it applies to. A Abstract - An indicator applied to a classifier (e.g., actor...
https://en.wikipedia.org/wiki/Motorboating%20%28electronics%29
In electronics, motorboating is a type of low frequency parasitic oscillation (unwanted cyclic variation of the output voltage) that sometimes occurs in audio and radio equipment and often manifests itself as a sound similar to an idling motorboat engine, a "put-put-put", in audio output from speakers or earphones. It...
https://en.wikipedia.org/wiki/Blotto%20%28biology%29
In biology, BLOTTO is a blocking reagent made from nonfat dry milk, phosphate buffered saline, and sodium azide. Its name is an almost-acronym of bovine lacto transfer technique optimizer. It constitutes an inexpensive source of nonspecific protein (milk casein) which blocks protein binding sites in a variety of experi...
https://en.wikipedia.org/wiki/Invention%20of%20radio
The invention of radio communication was preceded by many decades of establishing theoretical underpinnings, discovery and experimental investigation of radio waves, and engineering and technical developments related to their transmission and detection. These developments allowed Guglielmo Marconi to turn radio waves i...
https://en.wikipedia.org/wiki/Inverse%20tangent%20integral
The inverse tangent integral is a special function, defined by: Equivalently, it can be defined by a power series, or in terms of the dilogarithm, a closely related special function. Definition The inverse tangent integral is defined by: The arctangent is taken to be the principal branch; that is, −/2 < arctan(t) < ...
https://en.wikipedia.org/wiki/Asynchronous%20system
The primary focus of this article is asynchronous control in digital electronic systems. In a synchronous system, operations (instructions, calculations, logic, etc.) are coordinated by one, or more, centralized clock signals. An asynchronous system, in contrast, has no global clock. Asynchronous systems do not de...
https://en.wikipedia.org/wiki/Internet%20Fibre%20Channel%20Protocol
Internet Fibre Channel Protocol (iFCP) is a gateway-to-gateway network protocol standard that provides Fibre Channel fabric functionality to Fibre Channel devices over an IP network. It is officially ratified by the Internet Engineering Task Force. Its most common forms are in 1 Gbit/s, 2 Gbit/s, 4 Gbit/s, 8 Gbit/s, an...
https://en.wikipedia.org/wiki/Certified%20ethical%20hacker
Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to ...
https://en.wikipedia.org/wiki/BitTorrent%20protocol%20encryption
Protocol encryption (PE), message stream encryption (MSE) or protocol header encrypt (PHE) are related features of some peer-to-peer file-sharing clients, including BitTorrent clients. They attempt to enhance privacy and confidentiality. In addition, they attempt to make traffic harder to identify by third parties in...
https://en.wikipedia.org/wiki/Bigraph
A bigraph can be modelled as the superposition of a graph (the link graph) and a set of trees (the place graph). Each node of the bigraph is part of a graph and also part of some tree that describes how the nodes are nested. Bigraphs can be conveniently and formally displayed as diagrams. They have applications in the...
https://en.wikipedia.org/wiki/Floating%20body%20effect
The floating body effect is the effect of dependence of the body potential of a transistor realized by the silicon on insulator (SOI) technology on the history of its biasing and the carrier recombination processes. The transistor's body forms a capacitor against the insulated substrate. The charge accumulates on this ...
https://en.wikipedia.org/wiki/Location%20identifier
A location identifier is a symbolic representation for the name and the location of an airport, navigation aid, or weather station, and is used for staffed air traffic control facilities in air traffic control, telecommunications, computer programming, weather reports, and related services. ICAO location indicator Th...
https://en.wikipedia.org/wiki/Patrick%20Flanagan
Patrick Flanagan (October 11, 1944 - December 19, 2019) was an American New Age author and inventor. Flanagan wrote books focused on Egyptian sacred geometry and Pyramidology. In 1958, at the age of 14, while living in Bellaire, Texas, Flanagan invented the neurophone, an electronic device that claims to transmit sou...
https://en.wikipedia.org/wiki/Edy
Edy, provided by Rakuten, Inc. in Japan is a prepaid rechargeable contactless smart card. While the name derives from euro, dollar, and yen, it works with yen only. History Edy was launched on January 18, 2001, by BitWallet, with financing primarily from Sony, in addition to then other companies, including NTT Docomo...
https://en.wikipedia.org/wiki/Finnix
Finnix is a Debian-based Live CD operating system, developed by Ryan Finnie and intended for system administrators for tasks such as filesystem recovery, network monitoring and OS installation. Finnix is a relatively small distribution, with an ISO download size of approximately 100 MiB, and is available for the x86 a...
https://en.wikipedia.org/wiki/Supplicant%20%28computer%29
In computer networking, a supplicant is an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an authenticator attached to the other end of that link. The IEEE 802.1X standard uses the term "supplicant" to refer either to hardware or to software. In practice, a supplicant is a software ...
https://en.wikipedia.org/wiki/Vital%20theory
According to the vital force theory, the conduction of water up the xylem vessel is a result of vital action of the living cells in the xylem tissue. These living cells are involved in ascent of sap. Relay pump theory and Pulsation theory support the active theory of ascent of sap. Emil Godlewski (senior) (1884) propo...
https://en.wikipedia.org/wiki/Driver%20circuit
In electronics, a driver is a circuit or component used to control another circuit or component, such as a high-power transistor, liquid crystal display (LCD), stepper motors, SRAM memory, and numerous others. They are usually used to regulate current flowing through a circuit or to control other factors such as other...
https://en.wikipedia.org/wiki/Plotkin%20bound
In the mathematics of coding theory, the Plotkin bound, named after Morris Plotkin, is a limit (or bound) on the maximum possible number of codewords in binary codes of given length n and given minimum distance d. Statement of the bound A code is considered "binary" if the codewords use symbols from the binary alphab...
https://en.wikipedia.org/wiki/Sipgate
Sipgate, stylised as sipgate, is a European VoIP and mobile telephony operator. Company Sipgate was founded in 2004 and became one of Germany's largest VoIP service providers for consumers and small businesses. Through its network, which used SIP protocol, it allowed making low-cost national and international calls ...
https://en.wikipedia.org/wiki/Bach%27s%20algorithm
Bach's algorithm is a probabilistic polynomial time algorithm for generating random numbers along with their factorizations, named after its discoverer, Eric Bach. It is of interest because no algorithm is known that efficiently factors numbers, so the straightforward method, namely generating a random number and then ...
https://en.wikipedia.org/wiki/Johnson%20bound
In applied mathematics, the Johnson bound (named after Selmer Martin Johnson) is a limit on the size of error-correcting codes, as used in coding theory for data transmission or communications. Definition Let be a q-ary code of length , i.e. a subset of . Let be the minimum distance of , i.e. where is the Hamming...
https://en.wikipedia.org/wiki/Introduction%20to%20Automata%20Theory%2C%20Languages%2C%20and%20Computation
Introduction to Automata Theory, Languages, and Computation is an influential computer science textbook by John Hopcroft and Jeffrey Ullman on formal languages and the theory of computation. Rajeev Motwani contributed to later editions beginning in 2000. Nickname The Jargon File records the book's nickname, Cinderel...
https://en.wikipedia.org/wiki/Rustproofing
Rustproofing is the prevention or delay of rusting of iron and steel objects, or the permanent protection against corrosion. Typically, the protection is achieved by a process of surface finishing or treatment. Depending on mechanical wear or environmental conditions, the degradation may not be stopped completely, unle...
https://en.wikipedia.org/wiki/SpareMiNT
SpareMiNT is a software distribution based on FreeMiNT, which consists of a MiNT-like operating system (OS) and kernel plus GEM compatible AES (Application Environment Services). Features and compatibility The English language distribution is intended for the Atari ST and derivative m68k computers, clones and emulato...
https://en.wikipedia.org/wiki/Lattice%20model%20%28finance%29
In finance, a lattice model is a technique applied to the valuation of derivatives, where a discrete time model is required. For equity options, a typical example would be pricing an American option, where a decision as to option exercise is required at "all" times (any time) before and including maturity. A continuous...
https://en.wikipedia.org/wiki/Commercial%20use%20of%20space
Commercial use of space is the provision of goods or services of commercial value by using equipment sent into Earth orbit or outer space. This phenomenon – aka Space Economy (or New Space Economy) – is accelerating cross-sector innovation processes combining the most advanced space and digital technologies to develop...
https://en.wikipedia.org/wiki/Square-free%20polynomial
In mathematics, a square-free polynomial is a polynomial defined over a field (or more generally, an integral domain) that does not have as a divisor any square of a non-constant polynomial. A univariate polynomial is square free if and only if it has no multiple root in an algebraically closed field containing its coe...
https://en.wikipedia.org/wiki/Lists%20of%20animals
Animals are multicellular eukaryotic organisms in the biological kingdom Animalia. With few exceptions, animals consume organic material, breathe oxygen, are able to move, reproduce sexually, and grow from a hollow sphere of cells, the blastula, during embryonic development. Over 1.5 million living animal species have ...
https://en.wikipedia.org/wiki/Radon%20mitigation
Radon mitigation is any process used to reduce radon gas concentrations in the breathing zones of occupied buildings, or radon from water supplies. Radon is a significant contributor to environmental radioactivity and can cause serious health problems such as lung cancer. Mitigation of radon in the air by active soil ...
https://en.wikipedia.org/wiki/Matthew%20Hennessy
Matthew Hennessy is an Irish computer scientist who has contributed especially to concurrency, process calculi and programming language semantics. Career During 1976–77, Matthew Hennessy was an assistant professor at the University of Waterloo in Canada. Then during 1977–78, he was a visiting professor at the Universi...
https://en.wikipedia.org/wiki/Nintendo%20Wi-Fi%20USB%20Connector
The Nintendo Wi-Fi USB Connector is a wireless game adapter, developed by Nintendo and Buffalo Technology, which allows the Nintendo DS, Wii and 3DS users without a Wi-Fi connection or compatible Wi-Fi network to establish an Internet connection via a broadband-connected PC. When inserted into the host PC's USB port, t...
https://en.wikipedia.org/wiki/Dragon%20Buster
is a platform, action role-playing dungeon crawl game developed by Namco and released in 1984. It runs on Namco Pac-Land hardware, modified to support vertical scrolling. In Japan, the game was ported to the Family Computer (Famicom), MSX, and X68000; the latter version was later released for the Virtual Console in the...
https://en.wikipedia.org/wiki/E-social%20science
E-social science is a more recent development in conjunction with the wider developments in e-science. It is social science using grid computing and other information technologies to collect, process, integrate, share, and disseminate social and behavioural data. External links UK National Centre for e-Social Science ...
https://en.wikipedia.org/wiki/Event%20monitoring
In computer science, event monitoring is the process of collecting, analyzing, and signaling event occurrences to subscribers such as operating system processes, active database rules as well as human operators. These event occurrences may stem from arbitrary sources in both software or hardware such as operating syste...
https://en.wikipedia.org/wiki/Technical%20illustration
Technical Illustration is illustration meant to visually communicate information of a technical nature. Technical illustrations can be components of technical drawings or diagrams. Technical illustrations in general aim "to generate expressive images that effectively convey certain information via the visual channel to...
https://en.wikipedia.org/wiki/Spectrum%20of%20a%20theory
In model theory, a branch of mathematical logic, the spectrum of a theory is given by the number of isomorphism classes of models in various cardinalities. More precisely, for any complete theory T in a language we write I(T, κ) for the number of models of T (up to isomorphism) of cardinality κ. The spectrum problem ...
https://en.wikipedia.org/wiki/Parasitic%20structure
In a semiconductor device, a parasitic structure is a portion of the device that resembles in structure some other, simpler semiconductor device, and causes the device to enter an unintended mode of operation when subjected to conditions outside of its normal range. For example, the internal structure of an NPN bipola...
https://en.wikipedia.org/wiki/Friendly%20number
In number theory, friendly numbers are two or more natural numbers with a common abundancy index, the ratio between the sum of divisors of a number and the number itself. Two numbers with the same "abundancy" form a friendly pair; n numbers with the same "abundancy" form a friendly n-tuple. Being mutually friendly is ...
https://en.wikipedia.org/wiki/Redundant%20code
In computer programming, redundant code is source code or compiled code in a computer program that is unnecessary, such as: recomputing a value that has previously been calculated and is still available, code that is never executed (known as unreachable code), code which is executed but has no external effect (e.g.,...
https://en.wikipedia.org/wiki/Matrox%20Parhelia
The Matrox Parhelia-512 is a graphics processing unit (GPU) released by Matrox in 2002. It has full support for DirectX 8.1 and incorporates several DirectX 9.0 features. At the time of its release, it was best known for its ability to drive three monitors ("Surround Gaming") and its Coral Reef tech demo. As had happe...
https://en.wikipedia.org/wiki/Matrox%20G400
The G400 is a video card made by Matrox, released in September 1999. The graphics processor contains a 2D GUI, video, and Direct3D 6.0 3D accelerator. Codenamed "Toucan", it was a more powerful and refined version of its predecessor, the G200. Overview The Matrox G200 graphics processor had been a successful product,...
https://en.wikipedia.org/wiki/P-y%20method
In geotechnical civil engineering, the p–y is a method of analyzing the ability of deep foundations to resist loads applied in the lateral direction. This method uses the finite difference method and p-y graphs to find a solution. P–y graphs are graphs which relate the force applied to soil to the lateral deflection of...
https://en.wikipedia.org/wiki/Plain%20old%20CLR%20object
In software engineering, a plain old CLR object, or plain old class object (POCO) is a simple object created in the .NET Common Language Runtime (CLR) that is unencumbered by inheritance or attributes. This is often used in opposition to the complex or specialized objects that object-relational mapping frameworks often...
https://en.wikipedia.org/wiki/JavaScript%20syntax
The syntax of JavaScript is the set of rules that define a correctly structured JavaScript program. The examples below make use of the log function of the console object present in most browsers for standard text output. The JavaScript standard library lacks an official standard text output function (with the excepti...
https://en.wikipedia.org/wiki/High%20availability
High availability (HA) is a characteristic of a system that aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period. Modernization has resulted in an increased reliance on these systems. For example, hospitals and data centers require high availability of their syste...
https://en.wikipedia.org/wiki/Richard%20M.%20Dudley
Richard Mansfield Dudley (July 28, 1938 – January 19, 2020) was Professor of Mathematics at the Massachusetts Institute of Technology. Education and career Dudley was born in Cleveland, Ohio. He earned his BA at Harvard College and received his PhD at Princeton University in 1962 under the supervision of Edward Nelso...
https://en.wikipedia.org/wiki/Air%20gap%20%28networking%29
An air gap, air wall, air gapping or disconnected network is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. It means a computer or network has no network...
https://en.wikipedia.org/wiki/Trace%20vector%20decoder
A Trace Vector Decoder (TVD) is computer software that uses the trace facility of its underlying microprocessor to decode encrypted instruction opcodes just-in-time prior to execution and possibly re-encode them afterwards. It can be used to hinder reverse engineering when attempting to prevent software cracking as par...
https://en.wikipedia.org/wiki/Cake%20number
In mathematics, the cake number, denoted by Cn, is the maximum of the number of regions into which a 3-dimensional cube can be partitioned by exactly n planes. The cake number is so-called because one may imagine each partition of the cube by a plane as a slice made by a knife through a cube-shaped cake. It is the 3D a...
https://en.wikipedia.org/wiki/Block%20walking
In combinatorial mathematics, block walking is a method useful in thinking about sums of combinations graphically as "walks" on Pascal's triangle. As the name suggests, block walking problems involve counting the number of ways an individual can walk from one corner A of a city block to another corner B of another city...
https://en.wikipedia.org/wiki/Epistemic%20modal%20logic
Epistemic modal logic is a subfield of modal logic that is concerned with reasoning about knowledge. While epistemology has a long philosophical tradition dating back to Ancient Greece, epistemic logic is a much more recent development with applications in many fields, including philosophy, theoretical computer scienc...
https://en.wikipedia.org/wiki/Chicken%20feet
Chicken feet are cooked and eaten in many countries. After an outer layer of hard skin is removed, most of the edible tissue on the feet consists of skin and tendons, with no muscle. This gives the feet a distinct gelatinous texture different from the rest of the chicken meat. Around the world China Chicken feet a...
https://en.wikipedia.org/wiki/Functional%20spinal%20unit
A functional spinal unit (FSU) (or motion segment) is the smallest physiological motion unit of the spine to exhibit biomechanical characteristics similar to those of the entire spine. A FSU consists of two adjacent vertebrae, the intervertebral disc and all adjoining ligaments between them and excludes other connecti...
https://en.wikipedia.org/wiki/The%20Return%20of%20Ishtar
is an action role-playing arcade video game released by Namco in 1986. It runs on Namco System 86 hardware and is the sequel to The Tower of Druaga, which was released two years earlier. The game's story directly starts after the first game, where Ki and Gil must venture down in the Tower of Druaga and escape it. It is...
https://en.wikipedia.org/wiki/S-PLUS
S-PLUS is a commercial implementation of the S programming language sold by TIBCO Software Inc. It features object-oriented programming capabilities and advanced analytical algorithms. Due to the increasing popularity of the open source S successor R, TIBCO Software released the TIBCO Enterprise Runtime for R (TERR) ...
https://en.wikipedia.org/wiki/Dot-matrix%20display
A dot-matrix display is a low-cost electronic digital display device that displays information on machines such as clocks, watches, calculators, and many other devices requiring a simple alphanumeric (and/or graphic) display device of limited resolution. The display consists of a dot matrix of lights or mechanical ind...
https://en.wikipedia.org/wiki/Citrate%20synthase
The enzyme citrate synthase E.C. 2.3.3.1 (previously 4.1.3.7)] exists in nearly all living cells and stands as a pace-making enzyme in the first step of the citric acid cycle (or Krebs cycle). Citrate synthase is localized within eukaryotic cells in the mitochondrial matrix, but is encoded by nuclear DNA rather than mi...
https://en.wikipedia.org/wiki/Buffy%20coat
The buffy coat is the fraction of an anticoagulated blood sample that contains most of the white blood cells and platelets following centrifugation. Description After centrifugation, one can distinguish a layer of clear fluid (the plasma), a layer of red fluid containing most of the red blood cells, and a thin layer i...
https://en.wikipedia.org/wiki/Abhyankar%27s%20conjecture
In abstract algebra, Abhyankar's conjecture is a conjecture of Shreeram Abhyankar posed in 1957, on the Galois groups of algebraic function fields of characteristic p. The soluble case was solved by Serre in 1990 and the full conjecture was proved in 1994 by work of Michel Raynaud and David Harbater. Statement The pro...
https://en.wikipedia.org/wiki/Modal%20operator
A modal connective (or modal operator) is a logical connective for modal logic. It is an operator which forms propositions from propositions. In general, a modal operator has the "formal" property of being non-truth-functional in the following sense: The truth-value of composite formulae sometimes depend on factors oth...
https://en.wikipedia.org/wiki/Actigraphy
Actigraphy is a non-invasive method of monitoring human rest/activity cycles. A small actigraph unit, also called an actimetry sensor, is worn for a week or more to measure gross motor activity. The unit is usually in a wristwatch-like package worn on the wrist. The movements the actigraph unit undergoes are continuall...
https://en.wikipedia.org/wiki/Formal%20derivative
In mathematics, the formal derivative is an operation on elements of a polynomial ring or a ring of formal power series that mimics the form of the derivative from calculus. Though they appear similar, the algebraic advantage of a formal derivative is that it does not rely on the notion of a limit, which is in general...
https://en.wikipedia.org/wiki/Escher%20in%20the%20Palace
Escher in Het Paleis (Escher in The Palace) is a museum in The Hague, Netherlands, featuring the works of the Dutch graphical artist M. C. Escher. It is housed in the Lange Voorhout Palace since November 2002. In 2015 it was revealed that many of the prints on display at the museum were replicas, scanned from original...
https://en.wikipedia.org/wiki/Computer%20%28occupation%29
The term "computer", in use from the early 17th century (the first known written reference dates from 1613), meant "one who computes": a person performing mathematical calculations, before electronic computers became commercially available. Alan Turing described the "human computer" as someone who is "supposed to be fo...
https://en.wikipedia.org/wiki/Pascal%20MicroEngine
Pascal MicroEngine is a series of microcomputer products manufactured by Western Digital from 1979 through the mid-1980s, designed specifically to run the UCSD p-System efficiently. Compared to other microcomputers, which use a machine language p-code interpreter, the Pascal MicroEngine has its interpreter implemented...
https://en.wikipedia.org/wiki/Sabayon%20Linux
Sabayon Linux or Sabayon (formerly RR4 Linux and RR64 Linux), was an Italian Gentoo-based Linux distribution created by Fabio Erculiani and the Sabayon development team. Sabayon followed the "out of the box" philosophy, aiming to give the user a wide number of applications ready to use and a self-configured operating s...
https://en.wikipedia.org/wiki/Comparability
In mathematics, two elements x and y of a set P are said to be comparable with respect to a binary relation ≤ if at least one of x ≤ y or y ≤ x is true. They are called incomparable if they are not comparable. Rigorous definition A binary relation on a set is by definition any subset of Given is written if an...
https://en.wikipedia.org/wiki/WS-Discovery
Web Services Dynamic Discovery (WS-Discovery) is a technical specification that defines a multicast discovery protocol to locate services on a local network. It operates over TCP and UDP port 3702 and uses IP multicast address or . As the name suggests, the actual communication between nodes is done using web services...
https://en.wikipedia.org/wiki/OpenVAS
OpenVAS (Open Vulnerability Assessment Scanner, originally known as GNessUs) is the scanner component of Greenbone Vulnerability Management (GVM), a software framework of several services and tools offering vulnerability scanning and vulnerability management. All Greenbone Vulnerability Management products are free so...
https://en.wikipedia.org/wiki/Logical%20Disk%20Manager
The Logical Disk Manager (LDM) is an implementation of a logical volume manager for Microsoft Windows NT, developed by Microsoft and Veritas Software. It was introduced with the Windows 2000 operating system, and is supported in Windows XP, Windows Server 2003, Windows Vista, Windows 7, Windows 8, Windows 10 and Window...
https://en.wikipedia.org/wiki/CANopen
CANopen is a communication protocol and device profile specification for embedded systems used in automation. In terms of the OSI model, CANopen implements the layers above and including the network layer. The CANopen standard consists of an addressing scheme, several small communication protocols and an application la...
https://en.wikipedia.org/wiki/Trilinear%20coordinates
In geometry, the trilinear coordinates of a point relative to a given triangle describe the relative directed distances from the three sidelines of the triangle. Trilinear coordinates are an example of homogeneous coordinates. The ratio is the ratio of the perpendicular distances from the point to the sides (extend...
https://en.wikipedia.org/wiki/Metasploit
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7. Its best-known sub-project is the open-source Metasploit Framework, a tool fo...
https://en.wikipedia.org/wiki/Solaris%20IP%20network%20multipathing
The IP network multipathing or IPMP is a facility provided by Solaris to provide fault-tolerance and load spreading for network interface cards (NICs). With IPMP, two or more NICs are dedicated for each network to which the host connects. Each interface can be assigned a static "test" IP address, which is used to asses...
https://en.wikipedia.org/wiki/Bismuth%20telluride
Bismuth telluride () is a gray powder that is a compound of bismuth and tellurium also known as bismuth(III) telluride. It is a semiconductor, which, when alloyed with antimony or selenium, is an efficient thermoelectric material for refrigeration or portable power generation. is a topological insulator, and thus exhi...
https://en.wikipedia.org/wiki/Fermentek
Fermentek Ltd. is a biotechnological company in the Atarot industrial zone of Jerusalem, Israel. It specializes in the research, development and manufacture of biologically active, natural products isolated from microorganisms as well as from other natural sources such as plants and algae. The main microorganisms used...
https://en.wikipedia.org/wiki/Constant%20fraction%20discriminator
A constant fraction discriminator (CFD) is an electronic signal processing device, designed to mimic the mathematical operation of finding a maximum of a pulse by finding the zero of its slope. Some signals do not have a sharp maximum, but short rise times . Typical input signals for CFDs are pulses from plastic scint...
https://en.wikipedia.org/wiki/Phase%20converter
A phase converter is a device that converts electric power provided as single phase to multiple phase or vice versa. The majority of phase converters are used to produce three-phase electric power from a single-phase source, thus allowing the operation of three-phase equipment at a site that only has single-phase elect...
https://en.wikipedia.org/wiki/Nokia%20Business%20Center
Nokia Business Center (NBC) was a mobile email solution by Nokia, providing push e-mail and (through a paid-for client upgrade) calendar and contact availability to mobile devices. The server runs on Red Hat Enterprise Linux. It was discontinued in 2014. External links Press Release about support for IBM Lotus Notes ...
https://en.wikipedia.org/wiki/Indian%20rivers%20interlinking%20project
The Indian Rivers Inter-link is a proposed large-scale civil engineering project that aims to effectively manage water resources in India by linking Indian rivers by a network of reservoirs and canals to enhance irrigation and groundwater recharge, reduce persistent floods in some parts and water shortages in other par...
https://en.wikipedia.org/wiki/Network%20on%20a%20chip
A network on a chip or network-on-chip (NoC or ) is a network-based communications subsystem on an integrated circuit ("microchip"), most typically between modules in a system on a chip (SoC). The modules on the IC are typically semiconductor IP cores schematizing various functions of the computer system, and are d...
https://en.wikipedia.org/wiki/Strong%20prime
In mathematics, a strong prime is a prime number with certain special properties. The definitions of strong primes are different in cryptography and number theory. Definition in number theory In number theory, a strong prime is a prime number that is greater than the arithmetic mean of the nearest prime above and be...
https://en.wikipedia.org/wiki/International%20Shark%20Attack%20File
The International Shark Attack File is a global database of shark attacks. The file reportedly contains information on over 6,800 shark attacks spanning from the early 1500s to the present day, and includes detailed, often privileged, information including autopsy reports and photos. It is accessible only to scientis...
https://en.wikipedia.org/wiki/Windows%20Workflow%20Foundation
Windows Workflow Foundation (WF) is a Microsoft technology that provides an API, an in-process workflow engine, and a rehostable designer to implement long-running processes as workflows within .NET applications. The latest version of WF was released as part of the .NET Framework version 4.5 and is referred to as (WF45...
https://en.wikipedia.org/wiki/Thom%20conjecture
In mathematics, a smooth algebraic curve in the complex projective plane, of degree , has genus given by the genus–degree formula . The Thom conjecture, named after French mathematician René Thom, states that if is any smoothly embedded connected curve representing the same class in homology as , then the genus o...
https://en.wikipedia.org/wiki/Samuel%20Francis%20Boys
Samuel Francis (Frank) Boys (20 December 1911 – 16 October 1972) was a British theoretical chemist. Education Boys was born in Pudsey, Yorkshire, England. He was educated at the Grammar School in Pudsey and then at Imperial College London. He graduated in Chemistry in 1932. He was awarded a PhD in 1937 from Cambridge ...
https://en.wikipedia.org/wiki/Computational%20electromagnetics
Computational electromagnetics (CEM), computational electrodynamics or electromagnetic modeling is the process of modeling the interaction of electromagnetic fields with physical objects and the environment using computers. It typically involves using computer programs to compute approximate solutions to Maxwell's equ...
https://en.wikipedia.org/wiki/Generalized%20Helmholtz%20theorem
The generalized Helmholtz theorem is the multi-dimensional generalization of the Helmholtz theorem which is valid only in one dimension. The generalized Helmholtz theorem reads as follows. Let be the canonical coordinates of a s-dimensional Hamiltonian system, and let be the Hamiltonian function, where , is the ...
https://en.wikipedia.org/wiki/Video%20game%20conversion
In video gaming parlance, a conversion is the production of a game on one computer or console that was originally written for another system. Over the years, video game conversion has taken form in a number of different ways, both in their style and the method in which they were converted. In the arcade video game ind...
https://en.wikipedia.org/wiki/One-way%20compression%20function
In cryptography, a one-way compression function is a function that transforms two fixed-length inputs into a fixed-length output. The transformation is "one-way", meaning that it is difficult given a particular output to compute inputs which compress to that output. One-way compression functions are not related to conv...
https://en.wikipedia.org/wiki/Word%20problem%20%28mathematics%29
In computational mathematics, a word problem is the problem of deciding whether two given expressions are equivalent with respect to a set of rewriting identities. A prototypical example is the word problem for groups, but there are many other instances as well. A deep result of computational theory is that answering t...
https://en.wikipedia.org/wiki/Altova
Altova is a commercial software development company with headquarters in Beverly, MA, United States and Vienna, Austria, that produces integrated XML, JSON, database, UML, and data management software development tools. Company Altova was founded in 1992 as an XML development software company. Its software is used by ...
https://en.wikipedia.org/wiki/Cryptovirology
Cryptovirology refers to the use of cryptography to devise particularly powerful malware, such as ransomware and asymmetric backdoors. Traditionally, cryptography and its applications are defensive in nature, and provide privacy, authentication, and security to users. Cryptovirology employs a twist on cryptography, sho...