text
stringlengths
16
172k
source
stringlengths
32
122
Dynamic random-access memory(dynamic RAMorDRAM) is a type ofrandom-accesssemiconductor memorythat stores eachbitof data in amemory cell, usually consisting of a tinycapacitorand atransistor, both typically based onmetal–oxide–semiconductor(MOS) technology. While most DRAM memory cell designs use a capacitor and transis...
https://en.wikipedia.org/wiki/Dynamic_random-access_memory
Column address strobe latency, also calledCAS latencyorCL, is the delay in clock cycles between the READ command and the moment data is available.[1][2]In asynchronousDRAM, the interval is specified in nanoseconds (absolute time).[3]Insynchronous DRAM, the interval is specified in clock cycles. Because the latency is d...
https://en.wikipedia.org/wiki/CAS_latency
Incomputing,mass storagerefers to thestorageof large amounts ofdatain apersistingandmachine-readablefashion. In general, the termmassinmass storageis used to meanlargein relation to contemporaneous hard disk drives, but it has also been used to meanlargerelative to the size ofprimary memoryas for example withfloppy di...
https://en.wikipedia.org/wiki/Mass_storage
Memory cellmay refer to:
https://en.wikipedia.org/wiki/Memory_cell_(disambiguation)
Incomputer science, amemory leakis a type ofresource leakthat occurs when acomputer programincorrectly managesmemory allocations[1]in a way thatmemorywhich is no longer needed is not released. A memory leak may also happen when anobjectis stored in memory but cannot be accessed by the running code (i.e.unreachable memo...
https://en.wikipedia.org/wiki/Memory_leak
Apage address register(PAR) contains thephysical addressesof pages currently held in themain memoryof a computer system. PARs are used in order to avoid excessive use of an address table in someoperating systems. A PAR may check a page's number against all entries in the PAR simultaneously, allowing it to retrieve the ...
https://en.wikipedia.org/wiki/Page_address_register
Stable storageis a classification ofcomputer data storagetechnology that guaranteesatomicityfor any given write operation and allows software to be written that isrobustagainst some hardware and power failures. To be considered atomic, upon reading back a just written-to portion of the disk, the storage subsystem must ...
https://en.wikipedia.org/wiki/Stable_storage
Static random-access memory(static RAMorSRAM) is a type ofrandom-access memory(RAM) that useslatching circuitry (flip-flop)to store each bit. SRAM isvolatile memory; data is lost when power is removed. Thestaticqualifier differentiates SRAM fromdynamicrandom-access memory(DRAM): Semiconductor bipolar SRAM was invente...
https://en.wikipedia.org/wiki/Static_random-access_memory
Anopen service interface definition(OSID) is a programmatic interface specification describing a service. These interfaces are specified by theOpen Knowledge Initiative(OKI) to implement aservice-oriented architecture(SOA) to achieveinteroperabilityamong applications across a varied base of underlying and changing tech...
https://en.wikipedia.org/wiki/Filing_Open_Service_Interface_Definition
TheGNOME Core Applications(also known as Apps for GNOME) are asoftware suiteofsoftware applicationsthat are packaged as part of the standardfree and open-sourceGNOMEdesktop environment. GNOME Core Applications have a consistent look and feel to the GNOME desktop, utilize theAdwaitadesign language and tightly integrate ...
https://en.wikipedia.org/wiki/GNOME_Core_Applications
TheGNU Core Utilitiesorcoreutilsis a collection ofGNUsoftwarethat implements many standard,Unix-basedshellcommands. The utilities generally providePOSIXcompliant interface when thePOSIXLY_CORRECTenvironment variable is set, but otherwise offers a superset to the standard interface. For example, the utilities supportlon...
https://en.wikipedia.org/wiki/GNU_Core_Utilities
A number of notablesoftware packageswere developed for, or are maintained by, theFree Software Foundationas part of theGNU Project. Summarising the situation in 2013,Richard Stallmanidentified nine aspects which generally apply to being a GNU package,[1]but he noted that exceptions and flexibility are possible when th...
https://en.wikipedia.org/wiki/List_of_GNU_packages
TheKDE Gearis a set of applications and supporting libraries that are developed by theKDE community,[3]primarily used onLinux-based operating systems but mostly multiplatform, and released on a common release schedule. The bundle is composed of over 200 applications. Examples of prominent applications in the bundle in...
https://en.wikipedia.org/wiki/List_of_KDE_applications
TheUnix philosophy, originated byKen Thompson, is a set of cultural norms and philosophical approaches tominimalist,modularsoftware development. It is based on the experience of leading developers of theUnixoperating system. Early Unix developers were important in bringing the concepts of modularity and reusability int...
https://en.wikipedia.org/wiki/Unix_philosophy
util-linuxis a package ofutilitiesdistributed by theLinux Kernel Organizationfor use in aLinuxoperating system. Afork,util-linux-ng(withngmeaning "next generation"), was created when development stalled,[4]but as of January 2011[update]has been renamed back toutil-linux, and is the official version of the package.[5] ...
https://en.wikipedia.org/wiki/Util-linux
Apath(orfilepath,file path,pathname, or similar) is atext stringthat uniquely specifies an item in ahierarchical file system. Generally, a path is composed of directory names, special directory specifiers and optionally afilename, separated bydelimiting text. The delimiter varies by operating system and in theory can b...
https://en.wikipedia.org/wiki/Path_(computing)
Aclient portalis an electronic gateway to a collection of digital files, services, and information, accessible over theInternetthrough aweb browser. The term is most often applied to a sharing mechanism between anorganizationand itsclients.[1]The organization provides a secure entry point, typically via awebsite, that...
https://en.wikipedia.org/wiki/Client_portal
Network-attached storage(NAS) is a file-levelcomputer data storageserver connected to acomputer networkproviding data access to aheterogeneousgroup of clients. In this context, the term "NAS" can refer to both the technology and systems involved, or a specializedcomputer appliancedevice unit built for such functionalit...
https://en.wikipedia.org/wiki/Network-attached_storage
Incomputer science,resource contentionis a conflict over access to ashared resourcesuch asrandom access memory,disk storage,cache memory, internalbusesor external network devices. A resource experiencing ongoing contention can be described asoversubscribed. Resolving resource contention problems is one of the basic fu...
https://en.wikipedia.org/wiki/Resource_contention
Incomputing,time-sharingis theconcurrentsharing of a computing resource among many tasks or users by giving eachtaskorusera small slice ofprocessing time. This quick switch between tasks or users gives the illusion ofsimultaneousexecution.[1][2]It enablesmulti-taskingby a single user or enables multiple-user sessions. ...
https://en.wikipedia.org/wiki/Time-sharing
Empiricalmethods Prescriptiveand policy Thetragedy of the commonsis the concept that, if many people enjoy unfettered access to a finite, valuable resource, such as apasture, they will tend to overuse it and may end up destroying its value altogether. Even if some users exercised voluntary restraint, the other users ...
https://en.wikipedia.org/wiki/Tragedy_of_the_commons
Virtual private network(VPN) is anetwork architecturefor virtually extending aprivate network(i.e. anycomputer networkwhich is not the publicInternet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus maki...
https://en.wikipedia.org/wiki/Virtual_private_network
Awebsite(also written as aweb site) is anyweb pagewhose content is identified by a commondomain nameand is published on at least oneweb server. Websites are typically dedicated to a particular topic or purpose, such as news, education, commerce, entertainment, orsocial media.Hyperlinkingbetween web pages guides the nav...
https://en.wikipedia.org/wiki/Website
Network-attached storage(NAS) is a file-levelcomputer data storageserver connected to acomputer networkproviding data access to aheterogeneousgroup of clients. In this context, the term "NAS" can refer to both the technology and systems involved, or a specializedcomputer appliancedevice unit built for such functionalit...
https://en.wikipedia.org/wiki/Clustered_NAS
Astorage area network(SAN) orstorage networkis acomputer networkwhich provides access to consolidated,block-level data storage. SANs are primarily used to accessdata storagedevices, such asdisk arraysandtape librariesfromserversso that the devices appear to theoperating systemasdirect-attached storage. A SAN typically ...
https://en.wikipedia.org/wiki/Storage_area_network
Direct-attached storage(DAS) isdigital storagedirectly attached to thecomputeraccessing it, as opposed to storage accessed over a computer network (i.e.network-attached storage). DAS consists of one or more storage units such ashard drives,solid-state drives,optical disc driveswithin anexternal enclosure. The term "DAS...
https://en.wikipedia.org/wiki/Direct-attached_storage
Peer-to-peer file sharingis the distribution and sharing ofdigital mediausingpeer-to-peer(P2P) networking technology. P2P file sharing allows users to access media files such as books, music, movies, and games using a P2P software program that searches for other connected computers on a P2P network to locate the desire...
https://en.wikipedia.org/wiki/Peer-to-peer_file_sharing
Incomputing, ashared resource, ornetwork share, is acomputer resourcemade available from onehostto other hosts on acomputer network.[1][2]It is a device or piece of information on a computer that can be remotely accessed from another computer transparently as if it were a resource in the local machine. Network sharing ...
https://en.wikipedia.org/wiki/Disk_sharing
Adistributed file system for cloudis afile systemthat allows many clients to have access to data and supports operations (create, delete, modify, read, write) on that data. Each data file may be partitioned into several parts calledchunks. Each chunk may be stored on different remote machines, facilitating the parallel...
https://en.wikipedia.org/wiki/Distributed_file_system_for_cloud
Early research and development: Merging the networks and creating the Internet: Commercialization, privatization, broader access leads to the modern Internet: Examples of Internet services: TheGopherprotocol (/ˈɡoʊfər/ⓘ) is acommunication protocoldesigned for distributing, searching, and retrieving documents inInte...
https://en.wikipedia.org/wiki/Gopher_(protocol)
The following lists identify, characterize, and link to more thorough information onfile systems. Many olderoperating systemssupport only their one "native" file system, which does not bear any name apart from the name of the operating system itself. Disk file systems are usually block-oriented. Files in a block-orien...
https://en.wikipedia.org/wiki/List_of_file_systems#Distributed_file_systems
CacheFSis a family of software technologies designed to speed updistributed file systemfile access for networked computers.[citation needed]They store copies (caches) of files on secondary memory, typically a localhard disk, so that if a file is accessed again, it can be fetched locally at much higher speeds than netwo...
https://en.wikipedia.org/wiki/CacheFS
Incomputer science, arecord-oriented filesystemis afile systemwhere data is stored as collections ofrecords. This is in contrast to a byte-oriented filesystem, where the data is treated as an unformatted stream ofbytes. There are several different possible record formats; the details vary depending on the particular sy...
https://en.wikipedia.org/wiki/Record-oriented_filesystem
Batch renamingis a form ofbatch processingused torenamemultiplecomputer filesand folders in an automated fashion, in order to save time and reduce the amount of work involved. Some sort ofsoftwareis required to do this. Such software can be more or less advanced, but most have the same basic functions. Batch renaming ...
https://en.wikipedia.org/wiki/Batch_renaming
The following tables compare general and technical information for a number of notablefile managers. This table shows theoperating systemsthat the file managers can run on, without emulation. Information about what common file manager views are implemented natively (without third-party add-ons). Note that the "Colum...
https://en.wikipedia.org/wiki/Comparison_of_file_managers
Adisk utilityis autility programthat allows a user to perform various functions on acomputer disk, such asdisk partitioningandlogical volume management, as well as multiple smaller tasks such as changingdrive lettersand othermount points, renaming volumes,disk checking, anddisk formatting, which are otherwise handled s...
https://en.wikipedia.org/wiki/Disk_space_analyzer
Incomputing, thedesktop metaphoris aninterface metaphorwhich is a set of unifying concepts used bygraphical user interfacesto help users interact more easily with the computer.[1]The desktop metaphor treats thecomputer monitoras if it is the top of the user'sdesk, upon whichobjectssuch asdocumentsandfoldersof documents...
https://en.wikipedia.org/wiki/Desktop_metaphor
Incomputing,spatial navigationis the ability to navigate between focusable elements, such ashyperlinksand form controls, within a structured document oruser interfaceaccording to the spatial location. This method is widely used inapplication softwarelikecomputer games. In the pastWeb browsershave usedtabbing navigati...
https://en.wikipedia.org/wiki/Spatial_navigation
The following is a comparison of notablefile systemdefragmentationsoftware:
https://en.wikipedia.org/wiki/List_of_defragmentation_software
TheFAT file systemis afile systemused onMS-DOSandWindows 9x family of operating systems.[3]It continues to be used onmobile devicesandembedded systems, and thus is a well-suited file system for data exchange between computers and devices of almost any type and age from 1981 through to the present. A FAT file system is...
https://en.wikipedia.org/wiki/FAT_file_fragmentation
Adisk compressionsoftware utilityincreases the amount of information that can be stored on ahard diskdrive of given size. Unlike afile compressionutility, which compresses only specified files—and which requires theuserto designate the files to be compressed—anon-the-fly disk compressionutility works automatically thro...
https://en.wikipedia.org/wiki/Disk_compression
This is alist of file formatsused bycomputers, organized by type.Filename extensionis usually noted in parentheses if they differ from thefile format's name or abbreviation. Manyoperating systemsdo not limit filenames to one extension shorter than 4 characters, as was common with some operating systems that supported t...
https://en.wikipedia.org/wiki/List_of_file_formats
Lists of filename extensionsinclude:
https://en.wikipedia.org/wiki/List_of_filename_extensions
.propertiesis afile extensionforfilesmainly used inJava-related technologies to store the configurable parameters of anapplication. They can also be used for storing strings forInternationalization and localization; these are known as Property Resource Bundles. Each parameter is stored as a pair ofstrings, one storing...
https://en.wikipedia.org/wiki/.properties
Aclustered file system(CFS) is afile systemwhich is shared by being simultaneouslymountedon multipleservers. There are several approaches toclustering, most of which do not employ a clustered file system (onlydirect attached storagefor each node). Clustered file systems can provide features like location-independent ...
https://en.wikipedia.org/wiki/Clustered_file_system
Incomputer science,shared memoryismemorythat may be simultaneously accessed by multiple programs with an intent to provide communication among them or avoid redundant copies. Shared memory is an efficient means of passing data between programs. Depending on context, programs may run on a single processor or on multiple...
https://en.wikipedia.org/wiki/Shared_memory
Incomputing(specificallydata transmissionanddata storage), ablock,[1]sometimes called aphysical record, is a sequence ofbytesorbits, usually containing some whole number ofrecords, having a fixed length; ablock size.[2]Data thusstructuredare said to beblocked. The process of putting data into blocks is calledblocking, ...
https://en.wikipedia.org/wiki/Block_storage
Incomputing, afile systemorfilesystem(often abbreviated toFSorfs) governsfileorganization and access. Alocalfile system is a capability of anoperating systemthat services the applications running on the samecomputer.[1][2]Adistributed file systemis aprotocolthat provides file access betweennetworkedcomputers. A file s...
https://en.wikipedia.org/wiki/File_storage
Cloud storageis a model ofcomputer data storagein whichdata, said to be on "the cloud", is storedremotelyin logicalpoolsand is accessible to users over a network, typically theInternet. Thephysical storagespans multipleservers(sometimes in multiple locations), and the physical environment is typically owned and managed...
https://en.wikipedia.org/wiki/Cloud_storage
Object access method(OAM) is anaccess methodunderz/OSwhich is designed for the storage of large numbers of large files, such as images. It has a number of distinguishing features, e.g. compared toVSAM: OAM is used in conjunction withIBM Db2. An example use case for OAM would be storing medical images in a Db2 database...
https://en.wikipedia.org/wiki/Object_access_method
9P(or thePlan 9 Filesystem ProtocolorStyx) is anetwork protocoldeveloped for thePlan 9 from Bell Labsdistributed operating systemas the means of connecting the components of a Plan 9 system. Files are key objects in Plan 9. They representwindows,networkconnections,processes, and almost anything else available in the op...
https://en.wikipedia.org/wiki/9P_(protocol)
AnAdvanced Encryption Standard instruction set(AES instruction set) is a set of instructions that are specifically designed to performAES encryptionand decryption operations efficiently. These instructions are typically found in modern processors and can greatly accelerate AES operations compared to software implementa...
https://en.wikipedia.org/wiki/AES_instruction_set
TheFMA instruction setis an extension to the 128- and 256-bitStreaming SIMD Extensionsinstructions in thex86microprocessorinstruction setto performfused multiply–add(FMA) operations.[1]There are two variants: FMA3 and FMA4 instructions have almost identical functionality, but are not compatible. Both containfused mult...
https://en.wikipedia.org/wiki/FMA3_instruction_set
TheFMA instruction setis an extension to the 128- and 256-bitStreaming SIMD Extensionsinstructions in thex86microprocessorinstruction setto performfused multiply–add(FMA) operations.[1]There are two variants: FMA3 and FMA4 instructions have almost identical functionality, but are not compatible. Both containfused mult...
https://en.wikipedia.org/wiki/FMA4_instruction_set
Advanced Vector Extensions(AVX, also known asGesher New Instructionsand thenSandy Bridge New Instructions) areSIMDextensions to thex86instruction set architectureformicroprocessorsfromIntelandAdvanced Micro Devices(AMD). They were proposed by Intel in March 2008 and first supported by Intel with theSandy Bridge[1]micr...
https://en.wikipedia.org/wiki/Advanced_Vector_Extensions
wolfSSLis a small, portable, embedded SSL/TLS library targeted for use by embedded systems developers. It is anopen sourceimplementation ofTLS(SSL 3.0, TLS 1.0, 1.1, 1.2, 1.3, andDTLS1.0, 1.2, and 1.3) written in theC programming language. It includes SSL/TLS client libraries and an SSL/TLS server implementation as wel...
https://en.wikipedia.org/wiki/WolfSSL
TheF16C[1](previously/informally known asCVT16) instruction set is anx86instruction set architectureextension which provides support for converting betweenhalf-precisionand standard IEEEsingle-precision floating-point formats. The CVT16 instruction set, announced byAMDon May 1, 2009,[2]is an extension to the 128-bitSS...
https://en.wikipedia.org/wiki/F16C
Intel MPX(Memory Protection Extensions) are a discontinued set of extensions to thex86instruction set architecture. Withcompiler,runtime libraryandoperating systemsupport, Intel MPX claimed to enhance security tosoftwareby checkingpointer referenceswhose normal compile-time intentions are maliciously exploited at runti...
https://en.wikipedia.org/wiki/Memory_Protection_Extensions
AArch64orARM64is the64-bitExecution state of theARM architecture family. It was first introduced with theArmv8-Aarchitecture, and has had many extension updates.[2] An Execution state, in ARMv8-A, ARMv8-R, and ARMv9-A, defines the number ofbitsin the primaryprocessor registers, the availableinstruction sets, and other...
https://en.wikipedia.org/wiki/AArch64#Scalable_Vector_Extension_(SVE)
ARM(stylised in lowercase asarm, formerly an acronym forAdvanced RISC Machinesand originallyAcorn RISC Machine) is a family ofRISCinstruction set architectures(ISAs) forcomputer processors.Arm Holdingsdevelops the ISAs and licenses them to other companies, who build the physical devices that use the instruction set. It...
https://en.wikipedia.org/wiki/VFP_(instruction_set)
ARM(stylised in lowercase asarm, formerly an acronym forAdvanced RISC Machinesand originallyAcorn RISC Machine) is a family ofRISCinstruction set architectures(ISAs) forcomputer processors.Arm Holdingsdevelops the ISAs and licenses them to other companies, who build the physical devices that use the instruction set. It...
https://en.wikipedia.org/wiki/NEON_(instruction_set)
TheFMA instruction setis an extension to the 128- and 256-bitStreaming SIMD Extensionsinstructions in thex86microprocessorinstruction setto performfused multiply–add(FMA) operations.[1]There are two variants: FMA3 and FMA4 instructions have almost identical functionality, but are not compatible. Both containfused mult...
https://en.wikipedia.org/wiki/FMA_instruction_set
TheXOP(eXtended Operations[1])instruction set, announced byAMDon May 1, 2009, is an extension to the 128-bitSSEcore instructions in thex86andAMD64instruction set for theBulldozerprocessor core, which was released on October 12, 2011.[2]However AMD removed support for XOP fromZen (microarchitecture)onward.[3] The XOP i...
https://en.wikipedia.org/wiki/XOP_instruction_set
TheLinux kernelis afree and open source,[11]: 4Unix-likekernelthat is used in manycomputer systemsworldwide. The kernel was created byLinus Torvaldsin 1991 and was soon adopted as the kernel for theGNUoperating system(OS) which was created to be afreereplacement forUnix. Since the late 1990s, it has been included in ma...
https://en.wikipedia.org/wiki/Linux_kernel
Xen(pronounced/ˈzɛn/) is afree and open-sourcetype-1hypervisor, providing services that allow multiple computeroperating systemsto execute on the samecomputer hardwareconcurrently. It was originally developed by theUniversity of Cambridge Computer Laboratoryand is now being developed by theLinux Foundationwith support ...
https://en.wikipedia.org/wiki/Xen_hypervisor
CPU-Zis afreewaresystem profilingandmonitoringapplication forMicrosoft WindowsandAndroidthat detects thecentral processing unit,RAM,motherboardchipset, and other hardware features of a modernpersonal computerorAndroid device. CPU-Z is more comprehensive in virtually all areas compared to the tools provided in Windows ...
https://en.wikipedia.org/wiki/CPU-Z
Spectreis one of thespeculative execution CPU vulnerabilitieswhich involveside-channel attacks. These affect modernmicroprocessorsthat performbranch predictionand other forms ofspeculative execution.[1][2][3]On most processors, the speculative execution resulting from a branch misprediction may leave observable side ef...
https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)
Speculative Store Bypass(SSB) (CVE-2018-3639) is the name given to a hardware security vulnerability and its exploitation that takes advantage ofspeculative executionin a similar way to theMeltdownandSpectresecurity vulnerabilities.[1]It affects theARM,AMDandIntelfamilies of processors. It was discovered by researchers...
https://en.wikipedia.org/wiki/Speculative_Store_Bypass
Theproc filesystem(procfs) is a special filesystem inUnix-likeoperating systems that presents information aboutprocessesand other system information in a hierarchical file-like structure, providing a more convenient and standardized method for dynamically accessing process data held in the kernel than traditionaltracin...
https://en.wikipedia.org/wiki/Cpuinfo
Linear hashing(LH) is a dynamic data structure which implements ahash tableand grows or shrinks one bucket at a time. It was invented by Witold Litwin in 1980.[1][2]It has been analyzed by Baeza-Yates and Soza-Pollman.[3]It is the first in a number of schemes known as dynamic hashing[3][4]such as Larson's Linear Hashin...
https://en.wikipedia.org/wiki/Linear_hashing
Incomputer science, aJudy arrayis adata structureimplementing a type ofassociative arraywith high performance and low memory usage.[1]Unlike most otherkey-value stores, Judy arrays use no hashing, leverage compression on their keys (which may be integers or strings), and can efficiently represent sparse data; that is, ...
https://en.wikipedia.org/wiki/Judy_array
Incomputer science, aradix tree(alsoradix trieorcompact prefix treeorcompressed trie) is adata structurethat represents aspace-optimizedtrie(prefix tree) in which each node that is the only child is merged with its parent. The result is that the number of children of every internal node is at most theradixrof the radix...
https://en.wikipedia.org/wiki/Radix_tree
This is a list ofhash functions, includingcyclic redundancy checks,checksumfunctions, andcryptographic hash functions. Adler-32is often mistaken for a CRC, but it is not: it is achecksum.
https://en.wikipedia.org/wiki/Non-cryptographic_hash_functions
Perceptual hashingis the use of afingerprinting algorithmthat produces a snippet,hash, orfingerprintof various forms ofmultimedia.[1][2]A perceptual hash is a type oflocality-sensitive hash, which is analogous iffeaturesof the multimedia are similar. This is in contrast tocryptographic hashing, which relies on theavala...
https://en.wikipedia.org/wiki/Perceptual_hashing
Onwebsitesthat allow users to create content,content moderationis the process of detecting contributions that are irrelevant, obscene, illegal, harmful, or insulting. The purpose of content moderation is to remove or apply a warning label to problematic content or allow users toblockandfiltercontent themselves.[1]It is...
https://en.wikipedia.org/wiki/Content_moderation
AnInternet filterissoftwarethat restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over theInternetvia theWeb,Email, or other means. Such restrictions can be applied at various levels: a government can attempt to apply them nationwide (seeInt...
https://en.wikipedia.org/wiki/Internet_filter
Incomputer science, askip list(orskiplist) is aprobabilisticdata structurethat allowsO(log⁡n){\displaystyle O(\log n)}average complexityfor search as well asO(log⁡n){\displaystyle O(\log n)}average complexity for insertion within anordered sequenceofn{\displaystyle n}elements. Thus it can get the best features of a sor...
https://en.wikipedia.org/wiki/Skip_list
Incomputer science, aperfect hash functionhfor a setSis ahash functionthat maps distinct elements inSto a set ofmintegers, with nocollisions. In mathematical terms, it is aninjective function. Perfect hash functions may be used to implement alookup tablewith constant worst-case access time. A perfect hash function can...
https://en.wikipedia.org/wiki/Minimal_perfect_hash_function
Incryptography, azero-knowledge proof(also known as aZK prooforZKP) is a protocol in which one party (the prover) can convince another party (the verifier) that some given statement is true, without conveying to the verifier any informationbeyondthe mere fact of that statement's truth.[1]The intuition underlying zero-k...
https://en.wikipedia.org/wiki/Zero-knowledge_proof#Zero-Knowledge_Proof_protocols
VMEbus(Versa Module Eurocard[1]bus) is acomputer busstandard physically based onEurocardsizes. In 1979, during development of theMotorola 68000CPU, one of their engineers, Jack Kister, decided to set about creating a standardized bus system for 68000-based systems.[2]The Motorola team brainstormed for days to select t...
https://en.wikipedia.org/wiki/VMEbus
Incomputer architecture, abus(historically also called adata highway[1]ordatabus) is a communication system that transfersdatabetween components inside acomputeror between computers.[2]It encompasses bothhardware(e.g., wires,optical fiber) andsoftware, includingcommunication protocols.[3]At its core, a bus is a shared ...
https://en.wikipedia.org/wiki/Computer_bus
Common Hardware Reference Platform(CHRP) is a standardsystem architectureforPowerPC-based computer systems published jointly byIBMandApplein 1995. Like its predecessorPReP, it was conceptualized as a design to allow various operating systems to run on an industry standard hardware platform, and specified the use ofOpe...
https://en.wikipedia.org/wiki/Common_Hardware_Reference_Platform
TheOpenPOWER Foundationis a collaboration aroundPower ISA-based products initiated byIBMand announced as the "OpenPOWER Consortium" on August 6, 2013.[5]IBM's focus is to open up technology surrounding their Power Architecture offerings, such as processor specifications, firmware, and software with a liberal license, a...
https://en.wikipedia.org/wiki/OpenPOWER_Foundation
Power ISAis areduced instruction set computer(RISC)instruction set architecture(ISA) currently developed by theOpenPOWER Foundation, led byIBM. It was originally developed by IBM and the now-defunctPower.orgindustry group. Power ISA is an evolution of thePowerPCISA, created by the mergers of the core PowerPC ISA and th...
https://en.wikipedia.org/wiki/Power_ISA
Power ISAis areduced instruction set computer(RISC)instruction set architecture(ISA) currently developed by theOpenPOWER Foundation, led byIBM. It was originally developed by IBM and the now-defunctPower.orgindustry group. Power ISA is an evolution of thePowerPCISA, created by the mergers of the core PowerPC ISA and th...
https://en.wikipedia.org/wiki/Power_Architecture
Power Architecture Platform Reference(PAPR) is an initiative fromPower.orgto make a new open computing platform based onPower ISAprocessors. It follows two previous attempts made in the 1990s,PRePandCHRP. The PAPR specification provides the foundation for development of standard server computers. Various operating sys...
https://en.wikipedia.org/wiki/Power_Architecture_Platform_Reference
ThePowerOpen Environment(POE), created in 1991 from theAIM alliance, is anopen standardfor running aUnix-basedoperating systemon thePowerPCcomputer architecture. TheAIM alliancewas announced on October 2, 1991, yielding the historic first technology partnership between Apple and IBM. One of its many lofty goals was to...
https://en.wikipedia.org/wiki/PowerOpen_Environment
PowerPC Reference Platform(PReP) was a standardsystem architectureforPowerPC-based computer systems (as well as areference implementation) developed at the same time as the PowerPC processor architecture. Published byIBMin 1994, it allowed hardware vendors to build a machine that could run various operating systems, in...
https://en.wikipedia.org/wiki/PowerPC_Reference_Platform
The following is alist of PowerPC processors. 32-bit and 64-bit PowerPC processors have been a favorite of embedded computer designers. To keep costs low on high-volume competitive products, the CPU core is usually bundled into a system-on-chip (SOC) integrated circuit. SOCs contain the processor core, cache and the p...
https://en.wikipedia.org/wiki/List_of_PowerPC_processors
There are several ways in whichgame consolescan be categorized. One is by itsconsole generation, and another is by itscomputer architecture. Game consoles have long used specialized and customizedcomputerhardwarewith the base in some standardizedprocessorinstruction set architecture. In this case, it isPowerPCandPower ...
https://en.wikipedia.org/wiki/List_of_PowerPC-based_game_consoles
[3] +3DNow!++SSE +SSE2+PowerNow!+AMD64+NX Bit +SSE3-PowerNow!+Cool'n'Quiet+AMD-V +SSE4a+Enhanced 3DNow! +SSE4.1+SSE4.2+AVX+Turbo Core 2.0+IOMMU+AES+CLMUL+FMA4+XOP+CVT16+F16C+ABM+ECC +AVX1.1+Turbo Core 3.0+FMA3+BMI1+TBM+EVP +AVX2+BMI2 GloFo14LP +SHA-FMA4-TBM-XOP-3DNow-3DNow!+-Enhanced 3DNow! (2550–3600 all) (...
https://en.wikipedia.org/wiki/Table_of_AMD_processors
This is an overview ofchipsetssold under theAMDbrand, manufactured before May 2004 by the company itself, before the adoption ofopen platform approachas well as chipsets manufactured byATI Technologiesafter October 2006 as the completion of the ATI acquisition. Cyrix 6x86 (FSB) (Slot A,Socket A),Alpha 21264 (FSB) ...
https://en.wikipedia.org/wiki/List_of_AMD_chipsets
APU features table Launched in 2003, the initial platform for mobileAMDprocessors consists of: MMX,SSE,SSE2,Enhanced 3DNow!,NX bit MMX, SSE, SSE2, Enhanced 3DNow!, NX bit MMX, SSE, SSE2, Enhanced 3DNow!, NX bit MMX, SSE, SSE2, Enhanced 3DNow!, NX bit MMX, SSE, SSE2,SSE3, Enhanced 3DNow!, NX bit MMX, SSE, SSE2, S...
https://en.wikipedia.org/wiki/List_of_AMD_mobile_processors
Athlonis a family of CPUs designed byAMD, targeted mostly at the desktop market. The name "Athlon" has been largely unused as just "Athlon" since 2001 when AMD started naming its processorsAthlon XP, but in 2008 began referring to single core 64-bit processors from theAMD Athlon X2andAMD Phenomproduct lines. Later the ...
https://en.wikipedia.org/wiki/List_of_AMD_Athlon_processors
TheAthlon XPmicroprocessor fromAMDis a seventh-generation32-bitCPU targeted at the consumer market. AHL1200DHT3B
https://en.wikipedia.org/wiki/List_of_AMD_Athlon_XP_processors
TheAthlon 64microprocessor fromAdvanced Micro Devices(AMD) is an eighth-generationcentral processing unit(CPU). Athlon 64 was targeted at the consumer market. Some features for Athlon 64 processors include:[1] "Code name" (Steppings,Process) (USD) (USD) (USD) (USD) ADA3400DAA4BY (E6) (USD) (USD) (USD) (USD) ...
https://en.wikipedia.org/wiki/List_of_AMD_Athlon_64_processors
TheAMDAthlon X2processor family consists of processors based on both theAthlon 64 X2and thePhenomprocessor families. The original Athlon X2 processors were low-power Athlon 64 X2Brisbaneprocessors, while newer processors released in Q2 2008 are based on theK10Kumaprocessor.
https://en.wikipedia.org/wiki/List_of_AMD_Athlon_X2_processors
TheSempronis a name used for AMD's low-end CPUs, replacing theDuronprocessor. The name was introduced in 2004, and processors with this name continued to be available for the FM2/FM2+ socket in 2015. SMS3100BQX3LF
https://en.wikipedia.org/wiki/List_of_AMD_Sempron_processors
Turion 64is a family of CPUs designed byAMDfor the mobile computing market.
https://en.wikipedia.org/wiki/List_of_AMD_Turion_processors
Opteronis acentral processing unit(CPU) family within theAMD64line. Designed byAdvanced Micro Devices(AMD) for theservermarket,Opteroncompeted with Intel'sXeon. The Opteron family is succeeded by theZen-basedEpyc, andRyzen Threadripperand Threadripper Pro series. For Socket 940 and Socket 939 Opterons, each chip has a...
https://en.wikipedia.org/wiki/List_of_AMD_Opteron_processors