upload
Sun Microsystems Inc.
المجال: Computer
Number of terms: 4807
Number of blossaries: 1
Company Profile:
Sun Microsystems is a multinational vendor of computers, computer software and hardware, and information technology services.
Electronic Business XML. A group of specifications designed to enable enterprises to conduct business through the exchange of XML-based messages. It is sponsored by OASIS and the United Nations Centre for the Facilitation of Procedures and Practices in Administration, Commerce and Transport (U.N./CEFACT).
Industry:Computer
A component that provides services in response to requests; either a servlet or a JSP page.
Industry:Computer
A component of an HTTP request URL that contains a set of parameters and values that affect the handling of the request.
Industry:Computer
Defines the queries for the finder and select methods of an entity bean having container-managed persistence. A subset of SQL92, EJB QL has extensions that allow navigation over the relationships defined in an entity bean's abstract schema.
Industry:Computer
Computer control behavior where a specific operation is begun upon receipt of an indication (signal) that a particular event has occurred. Asynchronous control relies on synchronization mechanisms called locks to coordinate processors. See also mutual exclusion, mutex lock, semaphore lock, single-lock strategy, spin lock.
Industry:Computer
A combination of local memory and processors at each node of the interconnect network topology. Each processor can directly access only a portion of the total memory of the system. Message passing is used to communicate between any two processors, and there is no global, shared memory. Therefore, when a data structure must be shared, the program issues send/receive messages to the process that owns that structure. See also interprocess communication, message passing.
Industry:Computer
Competitive-caching maintains cache coherence by using a hybrid of write-invalidate and write-update. Competitive-caching uses a counter to age shared data. Shared data is purged from cache based on a least-recently-used (LRU) algorithm. This can cause shared data to become private data again, thus eliminating the need for the cache coherency protocol to access memory (via backplane bandwidth) to keep multiple copies synchronized. See also cache, cache locality, false sharing, write-invalidate, write-update.
Industry:Computer
A combination of discrete tasks that has a clearly defined beginning and end. A group of tasks that are carried out as part of a process.
Industry:Computer
Component methods called by the container to notify the component of important events in its life cycle.
Industry:Computer
A combination of information from one or more sources.
Industry:Computer