Skip the navigation

QuickStudy Directory

July 20, 2007 12:00 PM ET

QuickStudies Sorted Alphabetically

A - E


3G Wireless  02.21.00

4G Wireless  10.11.10

64-bit CPUs  04.12.04

AJAX  07.11.05

Anti-aliasing  05.27.02

Application Programming Interface (API)  01.10.00

Aspect-Oriented Programming (AOP)  10.06.03

Asynchronous Transfer Mode (ATM)  01.03.00

Authentication  03.27.00

Backup Strategies  07.03.06

Balanced Scorecard  01.24.00

Battery Technologies  04.22.02

Bayesian Logic And Filters  02.07.05

Binary Compatibility  11.18.02

Biometric Authentication  04.04.05

Blade Servers  06.23.08

Blogs  04.28.03

Bluefin  11.25.02

Botnets  03.28.07

Buffer Overflow  07.14.03

Business Process Execution Language (BPEL)  06.20.05

Cables That Bind  02.25.02

Cache Memory  04.03.00

Capability Maturity Model Integration (CMMI)  01.24.05

Change Management  02.14.00

Checkpoint and Restart  03.11.02

Circuit-Switched vs. Packet-Switched Networks  03.20.00

Cloud Computing  08.04.08

Collaboration Software  07.19.04

Color Space  01.28.02

Color Temperature  01.29.07

Competitive Intelligence  01.31.00

Component Object Model (COM)  08.16.04

Computer Forensic  04.17.06

Creative Commons  01.10.00

Customer Relationship Management (CRM)  02.28.00

Cycle Time  05.22.06

Darwin Information Typing Architecture (DITA)  04.02.07

Data Collections: Bases, Marts, Warehouses  04.15.02

Data Cubes  03.29.04

Data Models  04.14.03

Data Scrubbing  02.10.03

Decision-Support Systems  07.01.02

Deep Web  12.19.05

Denying Network Service  07.15.02

Digital Light Processing (DLP)  11.29.04

Digital Rights Management  06.23.03

Digital Signatures  04.10.00

Digital Subscriber Line  02.07.00

Direct Access File System  10.21.02

Directories  03.13.00

Directory Services Markup Language (DSML)  04.10.00

DMCA  12.02.02

Drupal  02.22.10

Emoticons and Internet Shorthand  01.14.02

Emulation or Virtualization?  06.22.09

Enterprise Information Integration (EII)  09.19.05

Error Checking and Correction  11.01.04

ETL  02.02.04

Event Correlation  07.28.03

Extensible Access Method  02.09.09

Back to Top

F - R


Faraday Cages  08.23.06

Fighting Spam  05.12.03

Filing It Away  09.02.02

Flash  01.16.06

Flash Memory  06.07.10

Form Factor  08.02.04

Fuzzy Logic  08.30.04

Global Positioning Systems  12.01.08

Graphic File Formats  01.15.07

Grid Computing  12.23.02

Grid Storage  10.18.04

High-Definition TV  10.20.08

High-Density Storage  02.02.09

High-Speed Serials: USB and 1394  05.13.02

Identity-Based Encryption  11.17.08

Intellectual Property (IP)  01.03.00

Internet Interruptus  04.27.09

Internet2  08.28.06

It's the Law!  08.12.02

LAMP  09.25.06

LDAP  02.11.02

LEED Certification  09.03.07

Logical Volume Manager  03.17.03

Making Microchips  07.08.02

Markup Languages  08.08.05

MDA  06.26.06

Measuring Web Site Traffic  06.17.02

Mesh Networks  08.10.09

MicroElectroMechanical Systems (MEMS)  03.05.07

MIMO  03.13.06

MPEG Standards  10.07.02

MTBF  10.31.05

NDMP  05.08.06

Netiquette  03.04.02

Network Access Quarantine Control  05.19.06

Open Grid Services Architecture  11.05.07

Open-Source Licensing  08.05.02

Optical Character Recognition  07.29.02

Optical Networking  01.21.02

Packet-Switched vs. Circuit-Switched Networks  03.20.00

Parallel vs. Serial Storage  11.17.03

Peer-to-Peer Network  04.08.02

Perl  01.07.02

Perpendicular Recording  07.31.06

Phase-Change Memory  05.07.07

Phishing  01.19.04

PHP  02.04.02

Platform for Privacy Preferences Project (P3P)  10.28.02

Podcasting  10.03.05

Power to the Portables: Battery Technologies  04.22.02

Preboot Execution Environment  02.13.06

Predictive Analytics  10.09.06

Presence Technology  03.10.03

Privacy Glossary  03.15.04

Project Portfolio Management  03.18.02

Protocols  08.29.05

Python  05.02.05

Radio Frequency Identification  12.16.02

Random Numbers  04.01.02

RATs  07.25.05

Replication  06.03.02

Representational State Transfer (REST)  08.06.07

Revenue Optimization Software  03.31.03

Rich Internet Applications  04.06.09

Risk Management  01.17.00

Rootkits  01.30.06

RosettaNet  08.11.03

RSS  05.31.04

Ruby on Rails  11.28.05

Back to Top

S - Z


SAML Secures Web Services  08.26.02

Scale-Free Networks  11.04.02

Search Engine Optimization  06.04.07

Semantic Web  02.27.06

Serial vs. Parallel Storage  11.17.03

Server Partitioning  03.06.03

Session Initiation Protocol  02.03.03

Simple Network Management Protocol (SNMP)  09.16.02

The Singularity  07.24.06

Smart Grid  05.11.09

SOA  03.01.04

Social Networks  10.01.07

SPML  10.20.03

Steganography: Hidden Data  06.10.02

Storage Virtualization  10.06.08

Struts  05.29.06

Supercomputers  05.30.05

System Development Life Cycle (SDLC)  05.14.02

Tape Types  08.25.03

Topic Maps  10.04.04

Transactional Memory  09.22.08

Transmission Control Protocol/Internet Protocol (TCP/IP)  01.17.00

UDDI: Looking Up Web Services  09.09.02

Ultrawideband (UWB)  04.10.06

UMTS  09.11.06

Unified Messaging  07.22.02

Urban Legends: It's Too Good to Be True!  10.14.02

Value-Added Networks (VANs)  12.13.04

Virtual Machines  04.24.06

Virtual Private Network (VPN)  07.15.02

Virtual tape  03.27.06

VLIW Microprocessors  02.14.00

VoiceXML  07.05.04

VoIP  02.28.06

Wavelets  03.07.05

Web Caching  08.19.02

Web Harvesting  06.21.04

WebDAV  11.03.03

WiMax  12.01.03

Windows Installer  12.15.03

Windows Registry  04.29.02

Wireless LANs  03.25.02

Wireless Markup Language  01.24.00

Wireless Security  06.24.02

XACML  05.19.03

XBRL Extensible Business Reporting Language  10.05.09

XSL  05.03.04

ZigBee  05.15.06

Back to Top

Our Commenting Policies