text
stringlengths
16
172k
source
stringlengths
32
122
File attributesare a type ofmetadatathat describe and may modify howfilesand/ordirectoriesin afilesystembehave. Typical file attributes may, for example, indicate or specify whether a file is visible, modifiable, compressed, or encrypted. The availability of most file attributes depends on support by the underlying fil...
https://en.wikipedia.org/wiki/File_attribute
Apple File System(APFS) is aproprietaryfile systemdeveloped and deployed byApple Inc.formacOSSierra (10.12.4)[6]and later,iOS10.3,tvOS10.2,[7]watchOS3.2,[8]and all versions ofiPadOS.[9][10]It aims to fixcore problemsofHFS+(also called Mac OS Extended), APFS's predecessor which had been in use since 1998. APFS is optimi...
https://en.wikipedia.org/wiki/APFS
Bcachefsis acopy-on-write(COW)file systemforLinux-based operating systems. Its primary developer, Kent Overstreet, first announced it in 2015, and it was added to theLinux kernelbeginning with 6.7.[1][2]It is intended to compete with the modern features ofZFSorBtrfs, and the speed and performance ofext4orXFS. Bcachefs...
https://en.wikipedia.org/wiki/Bcachefs
HAMMERis a high-availability64-bitfile systemdeveloped byMatthew DillonforDragonFly BSDusingB+ trees. Its major features include infinite NFS-exportablesnapshots,master–multislaveoperation, configurable history retention,fsckless-mount, andchecksumsto deal withdata corruption.[5]HAMMER also supports data blockdeduplica...
https://en.wikipedia.org/wiki/HAMMER_(file_system)
Resilient File System(ReFS),[6]codenamed "Protogon",[7]is aMicrosoftproprietaryfile systemintroduced withWindows Server 2012with the intent of becoming the "next generation"file systemafterNTFS. ReFS was designed to overcome problems that had become significant over the years since NTFS was conceived, which are relate...
https://en.wikipedia.org/wiki/ReFS
Windows Server 2012, codenamed "Windows Server 8", is the ninth major version of theWindows NToperating systemproduced byMicrosoftto be released under theWindows Serverbrand name. It is theserverversion of Windows based onWindows 8and succeeds theWindows 7-basedWindows Server 2008 R2, released nearly three years earli...
https://en.wikipedia.org/wiki/Windows_Server_2012
Thepartition type(orpartition ID) in a partition's entry in the partition table inside amaster boot record(MBR) is a byte value intended to specify thefile systemthe partition contains or to flag special access methods used to access these partitions (e.g. specialCHSmappings,LBAaccess, logical mapped geometries, specia...
https://en.wikipedia.org/wiki/List_of_partition_IDs
Amaster boot record(MBR) is a type ofboot sectorin the first block ofpartitionedcomputermass storage deviceslikefixed disksorremovable drivesintended for use withIBM PC-compatiblesystems and beyond. The concept of MBRs was publicly introduced in 1983 withPC DOS 2.0. The MBR holds the information on how the disc's sect...
https://en.wikipedia.org/wiki/Master_Boot_Record
TheGUID Partition Table(GPT) is a standard for the layout ofpartition tablesof a physicalcomputer storage device, such as ahard disk driveorsolid-state drive. It is part of theUnified Extensible Firmware Interface(UEFI) standard. It has several advantages overmaster boot record(MBR) partition tables, such as support f...
https://en.wikipedia.org/wiki/GUID_Partition_Table
Apple Partition Map(APM) is apartitionscheme used to define the low-level organization of data on disks formatted for use with68kandPowerPCMacintoshcomputers. It was introduced with theMacintosh II.[1] Disks using the Apple Partition Map are divided intological blocks, with 512 bytes usually belonging to eachblock. Th...
https://en.wikipedia.org/wiki/Apple_Partition_Map
In computing, arigid disk block(RDB) is the block on ahard diskwhere theAmigaseries of computers store the disk's partition and filesystem information. TheIBM's PCequivalent of the Amiga's RDB is themaster boot record(MBR). Unlike its PC equivalent, the RDB doesn't directly contain metadata for each partition. Instead...
https://en.wikipedia.org/wiki/Amiga_Rigid_Disk_Block
This article presents atimelineof events in the history of 16-bitx86DOS-familydisk operating systemsfrom 1980 to present.Non-x86 operating systems named "DOS"are not part of the scope of this timeline. Also presented is a timeline of events in the history of the 8-bit8080-based and 16-bit x86-basedCP/Moperating system...
https://en.wikipedia.org/wiki/Timeline_of_DOS_operating_systems
Microsoft Windowswas announced byBill Gateson November 10, 1983, 2 years before it was first released.[1]Microsoft introduced Windows as agraphical user interfaceforMS-DOS, which had been introduced two years earlier, on August 12, 1981. The product line evolved in the 1990s from anoperating environmentinto a fully com...
https://en.wikipedia.org/wiki/History_of_Microsoft_Windows
fdiskis acommand-line utilityfordisk partitioning. It has been part ofDOS,DRFlexOS,IBMOS/2, and early versions ofMicrosoft Windows, as well as certain ports ofFreeBSD,[2]NetBSD,[3]OpenBSD,[4]DragonFly BSD[5]andmacOS[6]for compatibility reasons.Windows 2000and its successors have replaced fdisk with a more advanced tool...
https://en.wikipedia.org/wiki/FDISK
TheCXFS file system(ClusteredXFS) is aproprietaryshared disk file systemdesigned bySilicon Graphics(SGI) specifically to be used in astorage area network(SAN) environment. A significant difference between CXFS and other shared disk file systems is that data andmetadataare managed separately from each other. CXFS provi...
https://en.wikipedia.org/wiki/CXFS
Stratisis auser-spaceconfigurationdaemonthat configures and monitors existing components fromLinux's underlying storage components oflogical volume management(LVM) andXFSfilesystem viaD-Bus. Stratis is not a user-levelfilesystemlike theFilesystem in Userspace(FUSE) system. Stratis configuration daemon was originally d...
https://en.wikipedia.org/wiki/Stratis_(configuration_daemon)
Aversioning file systemis any computerfile systemwhich allows acomputer fileto exist in several versions at the same time. Thus it is a form ofrevision control. Most common versioning file systems keep a number of old copies of the file. Some limit the number of changes per minute or per hour to avoid storing large ...
https://en.wikipedia.org/wiki/Versioning_file_system
Double boot(also known ascold double boot,double cold boot,double POST,power-onauto reboot, orfake boot) is a feature of theBIOS, and may occur after changes to the BIOS' settings or thesystem's configuration, or apower failurewhile the system was in one of certainsleep modes. Changing some parameters in the BIOS will...
https://en.wikipedia.org/wiki/Double_boot
TheExtended System Configuration Data(ESCD) is a specification for configuringx86computers of theISA PNPera. The specification was developed byCompaq,IntelandPhoenix Technologies. It consists of a method for storing configuration information innonvolatile BIOS memoryand threeBIOSfunctions for working with that data.[1]...
https://en.wikipedia.org/wiki/Extended_System_Configuration_Data
Input/Output Control System(IOCS) is any of several packages on earlyIBMentry-level andmainframecomputers that providedlow levelaccess torecordson peripheral equipment. IOCS provides functionality similar to 1960s packages from other vendors, e.g.,File Control Processor(FCP)[1]in RCA 3301 Realcom Operating System,GEFRC...
https://en.wikipedia.org/wiki/Input/Output_Control_System
Advanced Configuration and Power Interface(ACPI) is anopen standardthatoperating systemscan use to discover and configurecomputer hardwarecomponents, to performpower management(e.g. putting unused hardware components to sleep), auto configuration (e.g.Plug and Playandhot swapping), and status monitoring. It was first r...
https://en.wikipedia.org/wiki/ACPI
Incomputing, theSystem Management BIOS(SMBIOS) specification definesdata structures(and access methods) that can be used to read management information produced by theBIOSof acomputer.[1]This eliminates the need for theoperating systemto probe hardware directly to discover what devices are present in the computer. The ...
https://en.wikipedia.org/wiki/System_Management_BIOS
Unified Extensible Firmware Interface(UEFI,/ˈjuːɪfaɪ/or as an acronym)[c]is aspecificationfor the firmwarearchitectureof acomputing platform. When a computeris powered on, the UEFI-implementation is typically the first that runs, before starting theoperating system. Examples includeAMI Aptio,Phoenix SecureCore,TianoCor...
https://en.wikipedia.org/wiki/UEFI
Das U-Boot(subtitled "the Universal Boot Loader" and often shortened toU-Boot; seeHistoryfor more about the name) is anopen-sourceboot loaderused inembedded devicesto perform various low-level hardware initialization tasks and boot the device's operating system kernel. It is available for a number ofcomputer architectu...
https://en.wikipedia.org/wiki/Das_U-Boot
Inoperating systems,memory managementis the function responsible for managing the computer'sprimary memory.[1]: 105–208 The memory management function keeps track of the status of each memory location, eitherallocatedorfree. It determines how memory is allocated among competing processes, deciding which gets memory, ...
https://en.wikipedia.org/wiki/Memory_management_(operating_systems)
Container Linux(formerlyCoreOS Linux) is a discontinuedopen-sourcelightweightoperating systembased on theLinux kerneland designed for providing infrastructure forclustereddeployments. One of its focuses wasscalability. As an operating system, Container Linux provided only the minimal functionality required for deployin...
https://en.wikipedia.org/wiki/Container_Linux
Insystem administration,orchestrationis theautomatedconfiguration, coordination,[1]deployment,development, andmanagementofcomputer systemsandsoftware.[2]Many tools existto automate server configuration and management. Orchestration is often discussed in the context ofservice-oriented architecture,virtualization,provis...
https://en.wikipedia.org/wiki/Orchestration_(computing)
Flatpakis autilityforsoftware deploymentandpackage managementforLinux. It provides asandboxenvironment in which users can runapplication softwarein (partial) isolation from the rest of the system.[5][6]Flatpak was known asxdg-app until 2016.[7] Applications using Flatpak need permissions to access resources such asBlu...
https://en.wikipedia.org/wiki/Flatpak
cgroups(abbreviated fromcontrol groups) is aLinux kernelfeature that limits, accounts for, and isolates theresource usage(CPU, memory, disk I/O, etc.[1]) of a collection ofprocesses. Engineers atGooglestarted the work on this feature in 2006 under the name "process containers".[2]In late 2007, the nomenclature changed...
https://en.wikipedia.org/wiki/Cgroups
Namespacesare a feature of theLinux kernelthat partition kernel resources such that one set ofprocessessees one set of resources, while another set of processes sees a different set of resources. The feature works by having the same namespace for a set of resources and processes, but those namespaces refer to distinct ...
https://en.wikipedia.org/wiki/Linux_namespaces
Ahypervisor, also known as avirtual machine monitor(VMM) orvirtualizer, is a type of computersoftware,firmwareorhardwarethat creates and runsvirtual machines. A computer on which a hypervisor runs one or more virtual machines is called ahost machine, and each virtual machine is called aguest machine. The hypervisor pre...
https://en.wikipedia.org/wiki/Hypervisor
Portable application creators allow the creation ofportable applications(also called portable apps). They usually useapplication virtualization. Noagentorclientis required for these (also called "agentless" solutions):
https://en.wikipedia.org/wiki/Portable_application_creators
TheOpen Container Initiative(OCI) is aLinux Foundationproject, started in June 2015 byDocker,CoreOS, and the maintainers of appc (short for "App Container") to designopen standardsforoperating system-level virtualization(containers).[1][2][3]At launch, OCI was focused onLinux containersand subsequent work has extended ...
https://en.wikipedia.org/wiki/Open_Container_Initiative
Asandboxis atesting environmentthat isolates untestedcodechanges and outright experimentation from theproduction environmentor repository[1]in the context ofsoftware development, includingweb development,automation,revision control,configuration management(see alsochange management), andpatch management. Sandboxing pr...
https://en.wikipedia.org/wiki/Sandbox_(software_development)
Aseparation kernelis a type of securitykernelused to simulate a distributed environment. The concept was introduced byJohn Rushbyin a 1981 paper.[1]Rushby proposed the separation kernel as a solution to the difficulties and problems that had arisen in the development and verification of large, complex security kernels ...
https://en.wikipedia.org/wiki/Separation_kernel
Serverless computingis "a cloud service category in which the customer can use different cloud capability types without the customer having to provision, deploy and manage either hardware or software resources, other than providing customer application code or providing customer data. Serverless computing represents a ...
https://en.wikipedia.org/wiki/Serverless_computing
Snapis a softwarepackaginganddeploymentsystem developed byCanonicalforoperating systemsthat use theLinuxkernel and thesystemdinitsystem. The packages, calledsnaps, and the tool for using them,snapd, work across a range ofLinux distributions[3]and allowupstreamsoftware developers to distribute their applications directl...
https://en.wikipedia.org/wiki/Snap_(software)
Software-defined storage(SDS) is a marketing term forcomputer data storagesoftware for policy-based provisioning and management of data storage independent of the underlying hardware. Software-defined storage typically includes a form ofstorage virtualizationto separate the storage hardware from the software that manag...
https://en.wikipedia.org/wiki/Storage_hypervisor
Avirtual private server(VPS) orvirtual dedicated server(VDS) is avirtual machinesoldas a serviceby anInternet hostingcompany.[1] A virtual private server runs its own copy of anoperating system(OS), and customers may havesuperuser-level access to that operating system instance, so they can install almost any software...
https://en.wikipedia.org/wiki/Virtual_private_server
Virtual resource partitioning(VRP) is anoperating system-level virtualizationtechnology that allocates computing resources (such asCPU&I/O) to transactions. Conventional virtualization technologies allocate resources on anoperating system(Windows,Linux...) wide basis. VRP works 2 levels deeper by allowing regulation an...
https://en.wikipedia.org/wiki/Virtual_resource_partitioning
Inalgebra, thezero-product propertystates that the product of twononzero elementsis nonzero. In other words,ifab=0,thena=0orb=0.{\displaystyle {\text{if }}ab=0,{\text{ then }}a=0{\text{ or }}b=0.} This property is also known as therule of zero product, thenull factor law, themultiplication property of zero, thenonexis...
https://en.wikipedia.org/wiki/Zero-product_property
This is aglossary of commutative algebra. See alsolist of algebraic geometry topics,glossary of classical algebraic geometry,glossary of algebraic geometry,glossary of ring theoryandglossary of module theory. In this article, all rings are assumed to becommutativewith identity 1.
https://en.wikipedia.org/wiki/Glossary_of_commutative_algebra
Inmathematics, and more specifically incombinatorial commutative algebra, azero-divisor graphis anundirected graphrepresenting thezero divisorsof acommutative ring. It has elements of theringas itsvertices, and pairs of elements whose product is zero as itsedges.[1] There are two variations of the zero-divisor graph c...
https://en.wikipedia.org/wiki/Zero-divisor_graph
Inabstract algebra, thesedenionsform a 16-dimensionalnoncommutativeandnonassociativealgebraover thereal numbers, usually represented by the capital letter S, boldfaceSorblackboard boldS{\displaystyle \mathbb {S} }. The sedenions are obtained by applying theCayley–Dickson constructionto theoctonions, which can be mathe...
https://en.wikipedia.org/wiki/Sedenion
Indeterminate formis a mathematical expression that can obtain any value depending on circumstances. Incalculus, it is usually possible to compute thelimitof the sum, difference, product, quotient or power of two functions by taking the corresponding combination of the separate limits of each respective function. For e...
https://en.wikipedia.org/wiki/0/0
Johann Bernoulli[a](also known asJeanin French orJohnin English; 6 August [O.S.27 July] 1667 – 1 January 1748) was aSwissmathematician and was one of the many prominent mathematicians in theBernoulli family. He is known for his contributions toinfinitesimal calculusand educatingLeonhard Eulerin the pupil's youth. Joha...
https://en.wikipedia.org/wiki/Johann_Bernoulli#Disputes_and_controversy
InIBM System/360through present dayz/Architecture, anaddress constantor"adcon"is anassembly languagedata typewhich contains theaddressof a location incomputer memory. An address constant can be one, two, three or four bytes long, although an adcon of less than four bytes is conventionally used to hold an expression for...
https://en.wikipedia.org/wiki/Address_constant
Incomputer science, abounded pointeris apointerthat is augmented with additional information that enable the storage bounds within which it may point to be deduced.[1]This additional information sometimes takes the form of two pointers holding the upper and loweraddressesof the storage occupied by the object to which t...
https://en.wikipedia.org/wiki/Bounded_pointer
In someprogramming languages,constis atype qualifier(akeywordapplied to adata type) that indicates that the data is read-only. While this can be used to declareconstants,constin theC familyof languages differs from similar constructs in other languages in that it is part of thetype, and thus has complicated behavior wh...
https://en.wikipedia.org/wiki/Cray_pointer
Incomputer science,dynamic dispatchis the process of selecting which implementation of apolymorphicoperation (methodor function) to call atrun time. It is commonly employed in, and considered a prime characteristic of,object-oriented programming(OOP) languages and systems.[1] Object-oriented systems model a problem as...
https://en.wikipedia.org/wiki/Fat_pointer
Afunction pointer, also called asubroutine pointerorprocedure pointer, is apointerreferencing executable code, rather than data.Dereferencingthe function pointer yields the referencedfunction, which can be invoked and passed arguments just as in a normal function call. Such an invocation is also known as an "indirect" ...
https://en.wikipedia.org/wiki/Function_pointer
In amultithreadedcomputingenvironment,hazard pointersare one approach to solving the problems posed bydynamic memory managementof the nodes in alock-freedata structure. These problems generally arise only in environments that don't haveautomatic garbage collection.[1] Any lock-free data structure that uses thecompare-...
https://en.wikipedia.org/wiki/Hazard_pointer
Incomputer programming, aniteratoris anobjectthat progressively provides access to each item of acollection, in order.[1][2][3] A collection may provide multiple iterators via itsinterfacethat provide items in different orders, such as forwards and backwards. An iterator is often implemented in terms of the structure...
https://en.wikipedia.org/wiki/Iterator
Incomputer programming, anopaque pointeris a special case of anopaque data type, adata typedeclared to be apointerto arecordordata structureof some unspecified type. Opaque pointers are present in severalprogramming languagesincludingAda,C,C++,DandModula-2. If the language isstrongly typed,programsandproceduresthat h...
https://en.wikipedia.org/wiki/Opaque_pointer
In someprogramming languages,constis atype qualifier(akeywordapplied to adata type) that indicates that the data is read-only. While this can be used to declareconstants,constin theC familyof languages differs from similar constructs in other languages in that it is part of thetype, and thus has complicated behavior wh...
https://en.wikipedia.org/wiki/Pointee
Incomputer science,pointer swizzlingis the conversion of references based on name orpositioninto directpointerreferences (memory addresses). It is typically performed duringdeserializationorloadingof a relocatable object from a disk file, such as anexecutable fileor pointer-baseddata structure. The reverse operation, ...
https://en.wikipedia.org/wiki/Pointer_swizzling
Incomputer programming, areferenceis a value that enables a program to indirectly access a particulardatum, such as avariable's value or arecord, in thecomputer'smemoryor in some otherstorage device. The reference is said toreferto the datum, and accessing the datum is calleddereferencingthe reference. A reference is ...
https://en.wikipedia.org/wiki/Reference_(computer_science)
Incomputer science, atagged pointeris apointer(concretely amemory address) with additional data associated with it, such as anindirection bitorreference count. This additional data is often "folded" into the pointer, meaning stored inline in the data representing the address, taking advantage of certain properties of m...
https://en.wikipedia.org/wiki/Tagged_pointer
Incomputer programming, avariableis an abstract storage location paired with an associatedsymbolic name, which contains some known or unknown quantity ofdataorobjectreferred to as avalue; or in simpler terms, a variable is a named container for a particular set of bits ortype of data(likeinteger,float,string, etc...).[...
https://en.wikipedia.org/wiki/Variable_(computer_science)
Zero-based numberingis a way ofnumberingin which the initial element of asequenceis assigned theindex0, rather than the index 1 as is typical in everyday non-mathematical or non-programming circumstances. Under zero-based numbering, the initial element is sometimes termed thezerothelement,[1]rather than thefirstelement...
https://en.wikipedia.org/wiki/Zero-based_numbering
Cache hierarchy,ormulti-level cache, is a memory architecture that uses a hierarchy of memory stores based on varying access speeds to cache data. Highly requested data is cached in high-speed access memory stores, allowing swifter access bycentral processing unit(CPU) cores. Cache hierarchy is a form and part ofmemor...
https://en.wikipedia.org/wiki/Cache_hierarchy
Incomputer science,locality of reference, also known as theprinciple of locality,[1]is the tendency of a processor to access the same set of memory locations repetitively over a short period of time.[2]There are two basic types of reference locality – temporal and spatial locality. Temporal locality refers to the reus...
https://en.wikipedia.org/wiki/Locality_of_reference#Spatial_and_temporal_locality_usage
Incomputing, acache(/kæʃ/ⓘKASH)[1]is a hardware or software component that stores data so that future requests for that data can be served faster; the data stored in a cache might be the result of an earlier computation or a copy of data stored elsewhere. Acache hitoccurs when the requested data can be found in a cache...
https://en.wikipedia.org/wiki/Cache_(computing)#Buffer_vs._cache
ACPU cacheis ahardware cacheused by thecentral processing unit(CPU) of acomputerto reduce the average cost (time or energy) to accessdatafrom themain memory.[1]A cache is a smaller, faster memory, located closer to aprocessor core, which stores copies of the data from frequently used mainmemory locations. Most CPUs hav...
https://en.wikipedia.org/wiki/CPU_cache#Cache_hierarchy_in_a_modern_processor
Random-access memory(RAM;/ræm/) is a form ofelectronic computer memorythat can be read and changed in any order, typically used to store workingdataandmachine code.[1][2]Arandom-accessmemory device allows data items to bereador written in almost the same amount of time irrespective of the physical location of data insi...
https://en.wikipedia.org/wiki/Memory_wall
Hierarchical storage management(HSM), also known astiered storage,[1]is adata storageanddata managementtechnique that automatically moves data between high-cost and low-coststorage media. HSM systems exist because high-speed storage devices, such assolid-state drivearrays, are more expensive (perbytestored) than slower...
https://en.wikipedia.org/wiki/Hierarchical_storage_management
Incomputing, amemory access patternorIO access patternis the pattern with which a system or program reads and writesmemoryonsecondary storage. These patterns differ in the level oflocality of referenceand drastically affectcacheperformance,[1]and also have implications for the approach toparallelism[2][3]and distribut...
https://en.wikipedia.org/wiki/Memory_access_pattern
Communication-avoiding algorithmsminimize movement of data within amemory hierarchyfor improving its running-time and energy consumption. These minimize the total of two costs (in terms of time and energy): arithmetic and communication. Communication, in this context refers to moving data, either between levels of memo...
https://en.wikipedia.org/wiki/Communication-avoiding_algorithm
Incomputer architecture,predicationis a feature that provides an alternative toconditionaltransfer ofcontrol, as implemented by conditionalbranchmachineinstructions. Predication works by having conditional (predicated) non-branch instructions associated with apredicate, aBoolean valueused by the instruction to control ...
https://en.wikipedia.org/wiki/Branch_predication
Incomputing,code generationis part of the process chain of acompiler, in which anintermediate representationofsource codeis converted into a form (e.g.,machine code) that can be readily executed by the target system. Sophisticated compilers typically performmultiple passesover various intermediate forms. This multi-st...
https://en.wikipedia.org/wiki/Code_generation_(compiler)
Theinstruction unit(I-unitorIU), also called, e.g.,instruction fetch unit(IFU),instruction issue unit(IIU),instruction sequencing unit(ISU), in acentral processing unit(CPU) is responsible for organizing program instructions to be fetched from memory, and executed, in an appropriate order, and for forwarding them to an...
https://en.wikipedia.org/wiki/Instruction_unit
Incomputer engineering,out-of-order execution(or more formallydynamic execution) is aninstruction schedulingparadigm used in high-performancecentral processing unitsto make use ofinstruction cyclesthat would otherwise be wasted. In this paradigm, a processor executesinstructionsin an order governed by the availability ...
https://en.wikipedia.org/wiki/Out-of-order_execution
Incomputer science, adynamic array,growable array,resizable array,dynamic table,mutable array, orarray listis arandom access, variable-sizelist data structurethat allows elements to be added or removed. It is supplied withstandard librariesin many modern mainstreamprogramming languages. Dynamic arrays overcome a limit ...
https://en.wikipedia.org/wiki/Dynamic_array
In theJava programminglanguage,heappollutionis a situation that arises when a variable of aparameterized typerefers to an object that is not of that parameterized type.[1]This situation is normally detected duringcompilationand indicated with anunchecked warning.[1]Later, duringruntimeheap pollution will often cause aC...
https://en.wikipedia.org/wiki/Heap_pollution
Flat memory modelorlinear memory modelrefers to amemory addressingparadigm in which "memoryappears to the program as a single contiguousaddress space."[1]TheCPUcan directly (andlinearly)addressall of the availablememorylocations without having to resort to any sort ofbank switching,memory segmentationorpagingschemes. ...
https://en.wikipedia.org/wiki/Linear_address_space
Incomputer science, asingle address space operating system(orSASOS) is anoperating systemthat provides only one globally sharedaddress spacefor allprocesses. In a single address space operating system, numerically identical (virtual memory)logical addressesin different processes all refer to exactly the same byte of da...
https://en.wikipedia.org/wiki/Single_address_space_operating_system
ABrowser Helper Object(BHO) is aDLLmoduledesigned as apluginfor theMicrosoftInternet Explorerweb browserto provide added functionality. BHOs were introduced in October 1997 with the release ofversion 4of Internet Explorer. Most BHOs are loaded once by each new instance of Internet Explorer. However, in the case ofWindo...
https://en.wikipedia.org/wiki/Browser_Helper_Object
Abulletin board system(BBS), also called acomputer bulletin board service(CBBS),[1]is acomputer serverrunningsoftwarethat allows users to connect to the system using aterminal program. Once logged in, the user performs functions such asuploadinganddownloadingsoftware and data, reading news and bulletins, and exchanging...
https://en.wikipedia.org/wiki/Bulletin_board_system
Thejailmechanism is an implementation ofFreeBSD'sOS-level virtualisationthat allowssystem administratorsto partition aFreeBSD-derived computer system into several independent mini-systems calledjails, all sharing the same kernel, with very little overhead[1]. It is implemented through a system call, jail(2),[2]as well ...
https://en.wikipedia.org/wiki/FreeBSD_jail
Afree-netwas originally acomputer systemor network that provided public access to digital resources and community information, including personal communications, throughmodemdialup via thepublic switched telephone network. The concept originated in the health sciences to provide online help for medical patients.[1][2]W...
https://en.wikipedia.org/wiki/Free-net
Super Dimension Fortress(SDF, also known as freeshell.org) is anon-profitpublic accessUNIXshell provideron theInternet. It has been in continual operation since 1987 as a non-profitsocial club. The name is derived from the JapaneseanimeseriesSuper Dimension Fortress Macross; the original SDF server was aBulletin board ...
https://en.wikipedia.org/wiki/SDF_Public_Access_Unix_System
Slirp(sometimes capitalizedSLiRP) is asoftwareprogram thatemulatesaPPP,SLIP, orCSLIPconnection to theInternetusing a text-basedshell account. Its original purpose became largelyobsoleteas dedicated dial-up PPP connections andbroadband Internet accessbecame widely available and inexpensive. It then found additional use...
https://en.wikipedia.org/wiki/Slirp
Free software,libre software,libreware[1][2]sometimes known asfreedom-respecting softwareis computersoftwaredistributedunder termsthat allow users to run the software for any purpose as well as to study, change, distribute it and any adapted versions.[3][4][5][6]Free software is a matter ofliberty, not price; all users...
https://en.wikipedia.org/wiki/Free_software
Incomputer networks, atunneling protocolis acommunication protocolwhich allows for the movement of data from one network to another. They can, for example, allowprivate networkcommunications to be sent across a public network (such as theInternet), or for one network protocol to be carried over an incompatible network,...
https://en.wikipedia.org/wiki/Tunneling_protocol#Secure_shell_tunneling
The Big Electric Cat, named for anAdrian Belewsong, was a public access computer system inNew York Cityin the late 1980s, known onUsenetas nodedasys1. Based on aStride Computerbrandminicomputerrunning the UniStrideUnixvariant, the Big Electric Cat (sometimes known asBEC) provided dialupmodemusers with textterminal-bas...
https://en.wikipedia.org/wiki/The_Big_Electric_Cat
The Internet Adapter(TIA) was software created by Cyberspace Development in 1993 to allowSerial Line Internet Protocol(SLIP) connections over ashell account.[1][2]Point-to-Point Protocol(PPP) was added in 1995, by which time the software was marketed and sold byIntermindofSeattle. Shell accounts normally only allow the...
https://en.wikipedia.org/wiki/The_Internet_Adapter
The Whole Earth 'Lectronic Link,[2]normally shortened toThe WELLorThe Well,[3]is avirtual communityfounded in 1985. It is one of the oldest continuously operating virtual communities. By 1993 it had 7,000 members, a staff of 12, and gross annual income of $2 million.[4]A 1997 feature inWiredmagazine called it "The worl...
https://en.wikipedia.org/wiki/The_WELL
BusyBoxis asoftware suitethat provides severalUnix utilitiesin a singleexecutable file. It runs in a variety ofPOSIXenvironments such asLinux,Android,[8]andFreeBSD,[9]although many of the tools it provides are designed to work with interfaces provided by theLinux kernel. It was specifically created for embedded operati...
https://en.wikipedia.org/wiki/BusyBox
This article listscommandsprovided byMS-DOScompatibleoperating systems, especially as used onIBM PC compatibles. Many unrelated disk operating systems usethe DOS acronymand are not part of the scope of this list. Some commands are implemented asbuilt-into thecommand interpreterwhile others are externalapplications. Ov...
https://en.wikipedia.org/wiki/Internal_DOS_command
iOS jailbreakingis the use of aprivilege escalationexploitto remove software restrictions imposed byAppleon devices runningiOSand iOS-based[a]operating systems. It is typically done through a series ofkernelpatches. A jailbroken device typically permitsroot accesswithin the operating system and provides the right to in...
https://en.wikipedia.org/wiki/Jailbreaking_(iOS)
In manyUnixvariants, "nobody" is the conventional name of auser identifierwhich owns no files, is in no privileged groups, and has no abilities except those which every other user has. It is normally not enabled as auser account, i.e. has nohome directoryor logincredentialsassigned. Some systems also define an equivale...
https://en.wikipedia.org/wiki/Nobody_(username)
TheName Service Switch(NSS) is a feature found in the standard C library of variousUnix-likeoperating systems that connects a computer with a variety of sources of common configuration databases and name resolution mechanisms.[1]These sources include local operating system files (such as/etc/passwd,/etc/group, and/etc/...
https://en.wikipedia.org/wiki/Name_Service_Switch
Apower useris auserof computers, software and other electronic devices who uses advanced features of computer hardware,[1][2][3]operating systems,[4]programs, or websites[5]which are not used by the average user. A power user might not have extensive technical knowledge of the systems they use[6]but is rather character...
https://en.wikipedia.org/wiki/Power_user
Arootkitis a collection ofcomputer software, typically malicious, designed to enable access to acomputeror an area of itssoftwarethat is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.[1]The termrootkitis acompoundof "root" (the traditional ...
https://en.wikipedia.org/wiki/Rootkit
InUnixoperating systems, the termwheelrefers to auser accountwith awheel bit, a system setting that provides additional specialsystem privilegesthat empower a user to execute restrictedcommandsthat ordinary user accounts cannot access.[1][2] The termwheelwas first applied to computer user privilege levels after the in...
https://en.wikipedia.org/wiki/Wheel_(computing)
Incomputer software, anoperating environmentorintegrated applications environmentis theenvironmentin which users runapplication software. The environment consists of auser interfaceprovided by anapplications managerand usually anapplication programming interface(API) to the applications manager. An operating environme...
https://en.wikipedia.org/wiki/Operating_environment
This article compares variety of differentX window managers. For an introduction to the topic, seeX Window System.
https://en.wikipedia.org/wiki/Comparison_of_X_window_managers
In computing,directorimmediate mode[1][2]in an interactive programming system is the immediate execution ofcommands,statements, orexpressions. In many interactive systems, most of these can both be included in programs or executed directly in aread–eval–print loop(REPL). Most interactive systems also offer the possibi...
https://en.wikipedia.org/wiki/Direct_mode
This list includes notablecommand-line interpreters–programsthat interactivelyinterpretcommandsentered by theuserat thecommand-line. Mostoperating systemsare accessible via ashell– a command line interpreter. In some cases multiple shells are available. This category somewhat overlaps with the general programming sec...
https://en.wikipedia.org/wiki/List_of_command-line_interpreters
Aconsole applicationorcommand-line programis acomputer program(applicationsorutilities) designed to be used via atext-onlyuser interface, such as atext terminal, thecommand-line interfaceof someoperating systems(Unix,DOS,[1]etc.) or the text-based interface included with mostgraphical user interface(GUI) operating syst...
https://en.wikipedia.org/wiki/Console_application