This article does not cite any sources . (May 2017) (Learn how and when to remove this template message) |
Automatic system recovery is a device or process that detects a computer failure and attempts recovery. The device may make use of a Watchdog timer. This may also refer to a Microsoft recovery technology by the same name.
A peripheral or peripheral device is "an ancillary device used to put information into and get information out of the computer".
A computer is a machine that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming. Modern computers have the ability to follow generalized sets of operations, called programs. These programs enable computers to perform an extremely wide range of tasks. A "complete" computer including the hardware, the operating system, and peripheral equipment required and used for "full" operation can be referred to as a computer system. This term may as well be used for a group of computers that are connected and work together, in particular a computer network or computer cluster.
A watchdog timer is an electronic timer that is used to detect and recover from computer malfunctions. During normal operation, the computer regularly resets the watchdog timer to prevent it from elapsing, or "timing out". If, due to a hardware fault or program error, the computer fails to reset the watchdog, the timer will elapse and generate a timeout signal. The timeout signal is used to initiate corrective action or actions. The corrective actions typically include placing the computer system in a safe state and restoring normal system operation.
![]() | This computing article is a stub. You can help Wikipedia by expanding it. |
Dynamic DNS is a method of automatically updating a name server in the Domain Name Server (DNS), often in real time, with the active DDNS configuration of its configured hostnames, addresses or other information.
In computing and related technologies such as networking, failover is switching to a redundant or standby computer server, system, hardware component or network upon the failure or abnormal termination of the previously active application, server, system, hardware component, or network. Failover and switchover are essentially the same operation, except that failover is automatic and usually operates without warning, while switchover requires human intervention.
ASR may refer to:
In computing, a Parallel Sysplex is a cluster of IBM mainframes acting together as a single system image with z/OS. Used for disaster recovery, Parallel Sysplex combines data sharing and parallel computing to allow a cluster of up to 32 systems to share a workload for high performance and high availability.
Reliability, availability and serviceability (RAS) is a computer hardware engineering term involving reliability engineering, high availability, and serviceability design. The phrase was originally used by International Business Machines (IBM) as a term to describe the robustness of their mainframe computers.
Windows Preinstallation Environment is a lightweight version of Windows used for the deployment of PCs, workstations, and servers, or troubleshooting an operating system while it is offline. It is intended to replace MS-DOS boot disks and can be booted via USB flash drive, PXE, iPXE, CD-ROM, or hard disk. Traditionally used by large corporations and OEMs, it is now widely available free of charge via Windows Automated Installation Kit (WAIK).
In data storage, disk mirroring is the replication of logical disk volumes onto separate physical hard disks in real time to ensure continuous availability. It is most commonly used in RAID 1. A mirrored volume is a complete logical representation of separate volume copies.
BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining (CBC) or XTS mode with a 128-bit or 256-bit key. CBC is not used over the whole disk; it is applied to each individual sector.
An airport surveillance radar (ASR) is a radar system used at airports to detect and display the presence and position of aircraft in the terminal area, the airspace around airports. It is the main air traffic control system for the airspace around airports. At large airports it typically controls traffic within a radius of 60 miles (96 km) of the airport below an elevation of 25,000 feet. The sophisticated systems at large airports consist of two different radar systems, the primary and secondary surveillance radar. The primary radar typically consists of a large rotating parabolic antenna dish that sweeps a vertical fan-shaped beam of microwaves around the airspace surrounding the airport. It detects the position and range of aircraft by microwaves reflected back to the antenna from the aircraft's surface. In the US the primary radar operates at a frequency of 2.7 - 2.9 GHz in the S band with a peak radiated power of 25 kW and an average power of 2.1 kW. The secondary surveillance radar consists of a second rotating antenna, often mounted on the primary antenna, which interrogates the transponders of aircraft, which transmits a radio signal back containing the aircraft's identification, barometric altitude, and an emergency status code, which is displayed on the radar screen next to the return from the primary radar. It operates at a frequency of 1.03 - 1.09 GHz in the L band with peak power of 160 - 1500 W.
Proximity marketing is the localized wireless distribution of advertising content associated with a particular place. Transmissions can be received by individuals in that location who wish to receive them and have the necessary equipment to do so.
MINIX 3 is a project to create a small, high availability, high functioning Unix-like operating system. It is published under a BSD license and is a successor project to the earlier versions, MINIX 1 and 2.
In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection), and can automatically take countermeasures (intrusion prevention).
BMW Assist is a telematic roadside assistance service offered by BMW. BMW Assist is similar to GM's OnStar or Mercedes-Benz mbrace services as they both use the cellular network and Global Positioning telemetry to locate or guide the vehicle. BMW Assist can provide turn-by-turn directions, remote unlocking, vehicle diagnostics, airbag deployment notification, theft recovery and towing or flat tire repair. The service is included free in most new BMWs. After expiration, it can be purchased at a yearly rate. As of March, 2016, BMW assist is undergoing a "technology upgrade" in the US, and renewals are not being processed for MY2013 and older models. BMW has provided no estimated time for completion. Those whose memberships have expired no longer have the advantages of the Safety or Convenience plans. Members who have active service as of December 31, 2016 will have a choice to receive $200 compensation for losing service or to receive a hardware retrofit to continue service. There is a population for whom BMW did not allow renewal between March and December 2016, thus forcing them out of safety and security features.
Hardware virtualization is the virtualization of computers as complete hardware platforms, certain logical abstractions of their componentry, or only the functionality required to run various operating systems. Virtualization hides the physical characteristics of a computing platform from the users, presenting instead an abstract computing platform. At its origins, the software that controlled virtualization was called a "control program", but the terms "hypervisor" or "virtual machine monitor" became preferred over time.
NTBackup is the built-in backup application introduced in Windows NT around 1997 and part of all subsequent versions up to and including Windows 2000, Windows XP and Windows Server 2003. It uses a proprietary backup format (BKF) to back up files. Files can be backed up to tape, ZIP drives, floppy disks, and hard drives. It also features integration with Task Scheduler and has several command line switches for scheduled automated backups.
Voice search, also called voice-enabled, allows the user to use a voice command to search the Internet, a website, or an app.
Aquifer storage and recovery (ASR) is the direct injection of surface water supplies such as potable water, reclaimed water, or river water into an aquifer for later recovery and use. ASR has been done for municipal, industry and agriculture use.
A vehicle tracking system combines the use of automatic vehicle location in individual vehicles with software that collects these fleet data for a comprehensive picture of vehicle locations. Modern vehicle tracking systems commonly use GPS or GLONASS technology for locating the vehicle, but other types of automatic vehicle location technology can also be used. Vehicle information can be viewed on electronic maps via the Internet or specialized software. Urban public transit authorities are an increasingly common user of vehicle tracking systems, particularly in large cities.
Avast Antivirus is a family of internet security applications developed by Avast for Microsoft Windows, macOS, Android and iOS. The Avast Antivirus products include free and proprietary versions that provide computer security, browser security, antivirus software, firewall, anti-phishing, antispyware, and anti-spam among other services.
Remote monitoring and management (RMM) is the process of supervising and controlling IT systems by means of locally installed agents that can be accessed by a management service provider.