upload
Sun Microsystems Inc.
Sektör: Computer
Number of terms: 4807
Number of blossaries: 1
Company Profile:
Sun Microsystems is a multinational vendor of computers, computer software and hardware, and information technology services.
Una funzione di hardware dove le operazioni sono ridotti a più fasi, ognuna delle quali prende (in genere) un ciclo per completare. La pipeline viene riempita quando nuove operazioni possono essere emessi in ogni ciclo. Se non ci sono dipendenze tra istruzioni nel tubo, nuovi risultati possono essere consegnati ogni ciclo. Concatenamento implica il pipelining di istruzioni dipendenti. Se le istruzioni dipendente non possono essere incatenate, quando l'hardware non supporta concatenamenti di quelle istruzioni particolari, poi la pipeline bancarelle.
Industry:Computer
In generale, una struttura XML in cui uno o più elementi contiene testo intervallato con sottoelementi. Vedi anche dati.
Industry:Computer
In un sistema monoprocessore, un gran numero di thread sembra essere in esecuzione in parallelo. Questa operazione viene eseguita passando velocemente tra thread.
Industry:Computer
A distinct, individual item that can be included in an XML document by referencing it. Such an entity reference can name an entity as small as a character (for example, &lt;, which references the less-than symbol or left angle bracket, <). An entity reference can also reference an entire document, an external entity, or a collection of DTD definitions.
Industry:Computer
An authorization rule that determines who is permitted to execute one or more enterprise bean methods.
Industry:Computer
An authentication mechanism that uses HTTP over SSL, in which the server and, optionally, the client authenticate each other with a public key certificate that conforms to a standard that is defined by X.509 Public Key Infrastructure.
Industry:Computer
An authentication mechanism in which a Web application authenticates itself to a Web server by sending the server a message digest along with its HTTP request message. The digest is computed by employing a one-way hash algorithm to a concatenation of the HTTP request message and the client's password. The digest is typically much smaller than the HTTP request and doesn't contain the password.
Industry:Computer
An authentication mechanism employed by two parties for the purpose of proving each other's identity to one another.
Industry:Computer
An audit trail contains one record for each logged activity/event. It is a chronological record that enables the reconstruction, review, and examination of a sequence of activities.
Industry:Computer
An architecture for integration of J2EE products with enterprise information systems. There are two parts to this architecture: a resource adapter provided by an enterprise information system vendor and the J2EE product that allows this resource adapter to plug in. This architecture defines a set of contracts that a resource adapter must support to plug in to a J2EE product-for example, transactions, security, and resource management.
Industry:Computer