QuickStudies sorted alphabetically
3G Wireless 02.21.00
4G Wireless 10.11.10
64-bit CPUs 04.12.04
AJAX 07.11.05
Anti-aliasing 05.27.02
Application Programming Interface (API) 01.10.00
Aspect-Oriented Programming (AOP) 10.06.03
Asynchronous Transfer Mode (ATM) 01.03.00
Authentication 03.27.00
Backup Strategies 07.03.06
Balanced Scorecard 01.24.00
Battery Technologies 04.22.02
Bayesian Logic And Filters 02.07.05
Binary Compatibility 11.18.02
Biometric Authentication 04.04.05
Blade Servers 06.23.08
Blogs 04.28.03
Bluefin 11.25.02
Botnets 03.28.07
Buffer Overflow 07.14.03
Business Process Execution Language (BPEL) 06.20.05
Cables That Bind 02.25.02
Cache Memory 04.03.00
Capability Maturity Model Integration (CMMI) 01.24.05
Change Management 02.14.00
Checkpoint and Restart 03.11.02
Circuit-Switched vs. Packet-Switched Networks 03.20.00
Cloud Computing 08.04.08
Collaboration Software 07.19.04
Color Space 01.28.02
Color Temperature 01.29.07
Competitive Intelligence 01.31.00
Component Object Model (COM) 08.16.04
Computer Forensic 04.17.06
Creative Commons 01.10.00
Customer Relationship Management (CRM) 02.28.00
Cycle Time 05.22.06
Darwin Information Typing Architecture (DITA) 04.02.07
Data Collections: Bases, Marts, Warehouses 04.15.02
Data Cubes 03.29.04
Data Models 04.14.03
Data Scrubbing 02.10.03
Decision-Support Systems 07.01.02
Deep Web 12.19.05
Denying Network Service 07.15.02
Digital Light Processing (DLP) 11.29.04
Digital Rights Management 06.23.03
Digital Signatures 04.10.00
Digital Subscriber Line 02.07.00
Direct Access File System 10.21.02
Directories 03.13.00
Directory Services Markup Language (DSML) 04.10.00
DMCA 12.02.02
Drupal 02.22.10
Emoticons and Internet Shorthand 01.14.02
Emulation or Virtualization? 06.22.09
Enterprise Information Integration (EII) 09.19.05
Error Checking and Correction 11.01.04
ETL 02.02.04
Event Correlation 07.28.03
Extensible Access Method 02.09.09
Faraday Cages 08.23.06
Fighting Spam 05.12.03
Filing It Away 09.02.02
Flash 01.16.06
Flash Memory 06.07.10
Form Factor 08.02.04
Fuzzy Logic 08.30.04
Global Positioning Systems 12.01.08
Graphic File Formats 01.15.07
Grid Computing 12.23.02
Grid Storage 10.18.04
High-Definition TV 10.20.08
High-Density Storage 02.02.09
High-Speed Serials: USB and 1394 05.13.02
Identity-Based Encryption 11.17.08
Intellectual Property (IP) 01.03.00
Internet Interruptus 04.27.09
Internet2 08.28.06
It's the Law! 08.12.02
LAMP 09.25.06
LDAP 02.11.02
LEED Certification 09.03.07
Logical Volume Manager 03.17.03
Making Microchips 07.08.02
Markup Languages 08.08.05
MDA 06.26.06
Measuring Web Site Traffic 06.17.02
Mesh Networks 08.10.09
MicroElectroMechanical Systems (MEMS) 03.05.07
MIMO 03.13.06
MPEG Standards 10.07.02
MTBF 10.31.05
NDMP 05.08.06
Netiquette 03.04.02
Network Access Quarantine Control 05.19.06
Open Grid Services Architecture 11.05.07
Open-Source Licensing 08.05.02
Optical Character Recognition 07.29.02
Optical Networking 01.21.02
Packet-Switched vs. Circuit-Switched Networks 03.20.00
Parallel vs. Serial Storage 11.17.03
Peer-to-Peer Network 04.08.02
Perl 01.07.02
Perpendicular Recording 07.31.06
Phase-Change Memory 05.07.07
Phishing 01.19.04
PHP 02.04.02
Platform for Privacy Preferences Project (P3P) 10.28.02
Podcasting 10.03.05
Power to the Portables: Battery Technologies 04.22.02
Preboot Execution Environment 02.13.06
Predictive Analytics 10.09.06
Presence Technology 03.10.03
Privacy Glossary 03.15.04
Project Portfolio Management 03.18.02
Protocols 08.29.05
Python 05.02.05
Radio Frequency Identification 12.16.02
Random Numbers 04.01.02
RATs 07.25.05
Replication 06.03.02
Representational State Transfer (REST) 08.06.07
Revenue Optimization Software 03.31.03
Rich Internet Applications 04.06.09
Risk Management 01.17.00
Rootkits 01.30.06
RosettaNet 08.11.03
RSS 05.31.04
Ruby on Rails 11.28.05
SAML Secures Web Services 08.26.02
Scale-Free Networks 11.04.02
Search Engine Optimization 06.04.07
Semantic Web 02.27.06
Serial vs. Parallel Storage 11.17.03
Server Partitioning 03.06.03
Session Initiation Protocol 02.03.03
Simple Network Management Protocol (SNMP) 09.16.02
The Singularity 07.24.06
Smart Grid 05.11.09
SOA 03.01.04
Social Networks 10.01.07
SPML 10.20.03
Steganography: Hidden Data 06.10.02
Storage Virtualization 10.06.08
Struts 05.29.06
Supercomputers 05.30.05
System Development Life Cycle (SDLC) 05.14.02
Tape Types 08.25.03
Topic Maps 10.04.04
Transactional Memory 09.22.08
Transmission Control Protocol/Internet Protocol (TCP/IP) 01.17.00
UDDI: Looking Up Web Services 09.09.02
Ultrawideband (UWB) 04.10.06
UMTS 09.11.06
Unified Messaging 07.22.02
Urban Legends: It's Too Good to Be True! 10.14.02
Value-Added Networks (VANs) 12.13.04
Virtual Machines 04.24.06
Virtual Private Network (VPN) 07.15.02
Virtual tape 03.27.06
VLIW Microprocessors 02.14.00
VoiceXML 07.05.04
VoIP 02.28.06
Wavelets 03.07.05
Web Caching 08.19.02
Web Harvesting 06.21.04
WebDAV 11.03.03
WiMax 12.01.03
Windows Installer 12.15.03
Windows Registry 04.29.02
Wireless LANs 03.25.02
Wireless Markup Language 01.24.00
Wireless Security 06.24.02
XACML 05.19.03
XBRL Extensible Business Reporting Language 10.05.09
XSL 05.03.04
ZigBee 05.15.06