In typography, the portion of a lowercase letter that rises above the main body of the letter (that is, above the height of a lowercase x). For example, the letter t's ascender is the part of the vertical line above the horizontal line.
Google's project program for developing a line of hands-free, head-mounted intelligent devices that can be worn by users as eyewear.
Read more »
Short for enterprise resource planning, ERP is business management software that allows an organization to use a system of integrated applications...
Companies initiate private cloud projects to enable their IT infrastructure to become more capable of quickly adapting to continually evolving...
A cloud backup (cloud computer backup) refers to backing up data to a remote, cloud-based server. As a form of cloud storage, cloud backup data is...
Raring Ringtail is the Ubuntu codename for version 13.04 of the Ubuntu Linux-based operating system.
ReRAM, or resistive memory cells, is a type of non-volatile memory that is considered to be a type of memristor technology.
A phrase that has become widely adopted to refer to mobile workers bringing their own mobile devices, such as smartphones, laptops and PDAs, into...
Short for customer relationship management, CRM entails all aspects of interaction a company has with its customer, whether it be sales or service...
The mobile operating system is the software platform on top of which other programs, called application programs, can run on mobile devices.
The phrase used to describe a cloud computing platform that is implemented within the corporate firewall, under the control of the IT department....
Connect with Webopedia on Facebook!
Connect with Webopedia on Twitter!
Not technically fitting into either the virus or spam category we have spyware and adware, which are growing concerns for Internet users.
Read More »
Did You Know? Archive »
This Webopedia.com guide to Twitter hashtags for technology topics provides descriptions of the most popular tech-related hashtags used in Twitter..
Do you need to secure your Android device? From password managers to finding a lost or stolen device, here are three Android security apps worth c..
When it comes to your private cloud project it's easy to make mistakes that in hindsight look obvious, but can be hard to predict if you lack expe..
Effective BYOD (bring your own device) management starts with knowing the benefits of having employees use consumer technologies at work, then lea..
Quick Reference Archive »