UNIX Operating System
The Unix operating system is a set of programs that act as a link between the computer and the user. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops. systems also have a(GUI) similar to Microsoft Windows.
Voice over Internet Protocol
Refers to sending voice and fax phone calls over data networks, particularly the Internet. This technology offers cost savings by making more efficient use of the existing network.
Web Services on Mobile Platform
In practice, the web service typically provides an object-oriented web-based interface to a database server, utilized for example by another web server, or by a mobile application, that provides a user interface to the end user.
Wireless Fidelity
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.
Interferometric Modulator
The color is selected with an electrically switched light modulator comprising a microscopic cavity that is switched on and off using driver integrated circuits similar to those used to address liquid crystal displays (LCD).
Google Wave
Google Wave is an internet application made by Google. Google describes Wave as an application which “lets you communicate and collaborate in real time”. This means that Wave can be used for several people to edit a document at the same time.
Google App Engine
Google App Engine (often referred to as GAE or simply App Engine) is a web framework and cloud computing platform for developing and hosting web applications in Google-managed data centers. Applications are sandboxed and run across multiple servers.
Enterprise Resource Planning (ERP)
ERP is business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.
Online Voting System
In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons.
Phishing Technology
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details.
Data Warehousing
Data warehousing is the process of constructing and using a data warehouse. A data warehouse is constructed by integrating data from multiple heterogeneous sources that support analytical reporting, structured and/or ad hoc queries, and decision making.
Asynchronous Transfer Mode
ATM is a switching technique used by telecommunication networks that uses asynchronous time-division multiplexing to encode data into small, fixed-sized cells.