-
1 Data Collector Set
A computer management tool used to group data collectors into sets that run on the same schedule. -
2 Data Macros
"A feature that allows users to build business logic in a new and easy-to-use authoring environment. The declarative, macro-style logic will run on client and server and includes both UI-level and data-level actions." -
3 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
4 staging
"The process of running a management agent that imports data from a connected data source into the connector space, and then immediately stopping the run." -
5 Windows API
"The functions, messages, data structures, data types, and statements you can use in creating applications that run under Microsoft Windows 95 or later, including procedure declarations, user-defined type definitions, and constant declarations." -
6 LINQ to SQL
"A LINQ technology that provides a run-time infrastructure for managing relational data as objects. In LINQ to SQL, the data model of a relational database is mapped to an object model expressed in the programming language of the developer." -
7 profiling
"The collection of detailed performance data, such as memory, stack frame, and CPU utilization, during application execution. Analysis of the resulting data often leads to code optimizations that substantially improve application run-time behavior." -
8 decompression
"The process of reversing the procedure that is run by compression software. During decompression, the compressed data returns to its original file size and format so it can be accessed or played." -
9 RAM
The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off. -
10 random access memory
The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off. -
11 imperative security check
"A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method." -
12 connection manager
A logical representation of a run-time connection to a data source. -
13 Quality Windows Audio-Video Experience
"A collection of QoS-related software modules that run on devices in the home network. It supports multiple A/V streams (real-time flows requiring QoS) and data streams (best-effort flows, such as e-mail) simultaneously over the home network, while providing a high-quality A/V user experience."English-Arabic terms dictionary > Quality Windows Audio-Video Experience
-
14 qWave
"A collection of QoS-related software modules that run on devices in the home network. It supports multiple A/V streams (real-time flows requiring QoS) and data streams (best-effort flows, such as e-mail) simultaneously over the home network, while providing a high-quality A/V user experience." -
15 Platform Server Role
"A role that consists of the services that are used to process data. To run Microsoft Dynamics CRM, you must have at least one computer that is running the Platform Server role." -
16 Application Server role
"A role that consists of the services that provide users access to data and content. To run Microsoft Dynamics CRM, you must have at least one computer that is running the Application Server role." -
17 script injection attack
"An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code." -
18 Microsoft Assessment and Planning Toolkit
"A powerful inventory, assessment, and reporting tool that can run securely in small or large IT environments without requiring the installation of agent software on any computers or devices. The data and analysis provided by this toolkit can significantly simplify the planning process for migrating to Windows."English-Arabic terms dictionary > Microsoft Assessment and Planning Toolkit
-
19 MAP
"A powerful inventory, assessment, and reporting tool that can run securely in small or large IT environments without requiring the installation of agent software on any computers or devices. The data and analysis provided by this toolkit can significantly simplify the planning process for migrating to Windows." -
20 Business Logic Module
A module that contains Business Logic software and is called to enforce data constraints and/or perform tasks that are loaded and executed in a host-specific run-time environment.
- 1
- 2
См. также в других словарях:
Data (Hisar) — Data is a village of Jats located in Hisar district in Haryana, India. Data village … Wikipedia
Data, context and interaction — (DCI) is a paradigm used in computer software to program systems of communicating objects. Its goals are: To improve the readability of object oriented code by giving system behavior first class status; To cleanly separate code for rapidly… … Wikipedia
Run length limited — or RLL coding is a technique that is used to store data on recordable media. Specifically, RLL prevents long stretches of repeated bits from causing the signal recorded on media to not change for an excessive period, by modulating the data. RLL… … Wikipedia
Run-length encoding — (RLE) is a very simple form of data compression in which runs of data (that is, sequences in which the same data value occurs in many consecutive data elements) are stored as a single data value and count, rather than as the original run. This is … Wikipedia
Data Moving Tool — (DMT) is a Windows based ETL that Extracts, Transforms and Loads data to and from any data source. DMT was created by S.E.R. Software Solutions, a small California software company. DMT is designed to handle small to medium data volumes. Contents … Wikipedia
Data Transformation Services — Data Transformation Services, or DTS, is a set of objects and utilities to allow the automation of extract, transform and load operations to or from a database. The objects are DTS packages and their components, and the utilities are called DTS… … Wikipedia
Data General Nova — System Data General Nova 1200 front panel … Wikipedia
Data acquisition — is the process of sampling signals that measure real world physical conditions and converting the resulting samples into digital numeric values that can be manipulated by a computer. Data acquisition systems (abbreviated with the acronym DAS or… … Wikipedia
Data General — Industry Computer Fate Acquired Successor EMC Corporation Founded 1968 … Wikipedia
Data Intensive Computing — is a class of parallel computing applications which use a data parallel approach to processing large volumes of data typically terabytes or petabytes in size and typically referred to as Big Data. Computing applications which devote most of their … Wikipedia
Data migration — is the process of transferring data between storage types, formats, or computer systems. Data migration is usually performed programmatically to achieve an automated migration, freeing up human resources from tedious tasks. It is required when… … Wikipedia