Programs On Popular Programming Languages

Apt

Debian's Advanced Packaging Tool whose main binary is apt-get. Most questions about APT are off topic for Stack Overflow, unless it is clearly related to a programming tool...

Rms

In Java ME MIDP, RMS stands for Record Management System API, a persistent storage mechanism, through which MIDlets can persistently store data and retrieve it later. It is also a popular R package where it is an acronym for "Regression Modeling Strategies"...

Lucene.net

Lucene.Net is a source code, class-per-class, API-per-API, algorithmic port of the Java Lucene search engine to the C# and .NET platform utilizing the Microsoft .NET Framework and .NET Standard...


P2p

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application...

Lan

LAN, or Local Area Network, is a computer network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines...

Centos5

CentOS is a Linux distribution aiming for 100% binary compatibility with RHEL...

Expression

Combination of several programming symbols and values intending to produce a result..

Mutex

A mutex ("mutual exclusion") is a mechanism to ensure integrity when the same data or resource is accessed (in particular, changed) concurrently from several threads...

Iterator

An iterator is an object-oriented programming pattern that allows traversal through a collection, agnostic of the actual implementation or object addresses in physical memory. It is one of the Gang of Four's behavioral design patterns...


Jsonp

JSON with Padding (JSONP) is a technique for working around cross-domain Ajax limitations...

Accurev

AccuRev is a commercial version control system...

Finder

The Finder is the default file manager used on Mac OS and Mac OS X operating systems...

Transpose

Transposition is an operation that applies to matrices wherein the rows and columns are swapped..

Transition

Using javascript or css to animate an element from one state to another...

Cassini

The Cassini Web Server is an open-source lightweight web server distributed with ASP.NET as an example of an ASP.NET web server written in C#...


Trayicon

for questions about creating a tray icon for a software application, customising the behaviour of a tray icon, and adding application control or monitoring to a tray icon. For questions which relate the system notification area or system tray in general, use the notification-area or system-tray tag instead...

File-permissions

For questions relating to file read/write permissions, user groups, executable bits etc. Be sure to include a tag for the operating system (Windows or Unix) and tag for operating system version...


Boo

Boo is an object oriented, statically typed programming language for the Common Language Infrastructure, with a Python-inspired syntax and a special focus on language and compiler extensibility...

Overriding

Method overriding, in object oriented programming, is a language feature that allows a subclass or child class to provide a specific implementation of a method that is already provided by one of its superclasses or parent classes...

Dispose

Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources..

Destructor

A special method in object-oriented programming which is invoked when an object is destroyed..

Configurationmanager

In the .Net framework, ConfigurationManager is a built-in object that provides access to configuration files...

Patch

A patch is a piece of software designed to fix problems with, or update a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance...

Inode

In computing, an inode (index node) is a data structure found in many Unix file systems. Each inode stores all the information about a file system object (file, device node, socket, pipe, etc.), except data content and file name...

Regsvr32

You can use the Regsvr32 tool (Regsvr32.exe) to register and unregister OLE controls such as DLL or ActiveX Controls (OCX) files in the Windows Registry...

Entity-relationship

An entity-relationship model (ERM) is an abstract and conceptual representation of data, information aspects of a business domain or its process requirements. Ultimately ERM is being implemented in a database...



Deadlock

Situation where two (or more) operations need overlapping sets of resources, and neither can complete because they cannot obtain all locks necessary to complete an operation and release their locks...

Children

Children is the set of all nodes within a hierarchical data structure which have a node above them...

Plsql

PL/SQL (Procedural Language/Structured Query Language) is Oracle Corporation's procedural language extension for SQL. Questions about PL/SQL should probably be tagged "oracle" as well. Questions with regular DML or DDL statements should be tagged with "sql" and "oracle", NOT with "plsql"...

Jvm

The Java Virtual Machine (JVM) enables a set of computer software programs and data structures to use a virtual machine model for the execution of other computer programs and scripts. Use this tag for questions dealing with tools provided by a JVM or how it works in a specific scenario...

Cil

Common Intermediate Language is the object-oriented assembly language used by the .NET Framework and Mono. .NET languages compile to CIL, which is assembled into an object code that has a bytecode-style format...

Myisam

MyISAM is a non-transactional storage engine for MySQL. It provides high-speed storage and retrieval, as well as fulltext searching capabilities. Also, it is the default storage engine type for versions prior to 5.5...

Innodb

InnoDB is an ACID-compliant transactional storage engine for MySQL that uses MultiVersion Concurrency Control (MVCC)...

Ordinals

Ordinal numbers, representing position in an order...

Antivirus

Antivirus or anti-virus software is software used to prevent, detect and remove malware...

Mstest

Microsoft .NET Unit Testing Framework (MSTest)..

Reportviewer2008

Microsoft Report Viewer 2008 is a .NET control that allows you to integrate reporting into your application. Only use if your question is specifically related to features of this version...

3des

In cryptography, Triple DES, or 3DES, is the common name for the Triple Data Encryption Algorithm (TDEA or Triple DEA) block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block...


Offline

Refers to the status of being unable to connect to a network; in most situations, this is specifically referring to the Internet...

Error-logging

The process of recording errors in log file for diagnostic and Q&A purposes...

Memory-leaks

A memory leak occurs when a program fails to release memory that it has allocated but is no longer using and is not recoverable...

Rtf

The Rich Text Format (often abbreviated RTF) is a proprietary document file format with published specification developed by Microsoft Corporation since 1987 for Microsoft products and for cross-platform document interchange...

Exploit

An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack...

Ssis

SSIS (Microsoft SQL Server Integration Services) is a platform for building enterprise-level data integration and data transformations solutions. SSIS is used to perform ETL operations; i.e. extract, transform and load data...

Netbeans

NetBeans refers to both a platform framework for Java desktop applications, and an integrated development environment (IDE) for developing with Java and other languages...

Timestamp

A timestamp is the time at which an event is recorded by a computer system. The timestamp term may also refer to Unix Time or to the timestamp data type...

Checksum

A checksum or hash sum is a fixed-size datum computed from an arbitrary block of digital data for the purpose of detecting accidental errors that may have been introduced during its transmission or storage. The integrity of the data can be checked at any later time by recomputing the checksum and comparing it with the stored one...

Visibility

Visibility is an attribute of an object. It may refer to the concept of having something visible (or not) on the graphical interface, or a symbol visibility in linkage. This tag should not be used in place of the more specific tags [tag:memory-visibility] or [tag:class-visibility]...

Scope

Scope is an enclosing context where values and expressions are associated. Use this tag for questions about different types of scope as well for questions where scope may be unclear...

Specman

Specman is a simulator for `e` (IEEE 1647), an Aspect Oriented Programming (AOP) hardware verification language that enables constrained-random stimulus generation and coverage...

Cas

Central Authentication Service, a trusted system to authenticate a user or Code Access Security, a Microsoft .NET system for limiting actions that untrusted code can perform...

Ria

A Rich Internet Application (RIA) is a web application that has many of the characteristics of desktop applications. RIA here typically refers to the .NET RIA Services/WCF RIA Services framework...

Reportviewer

The Microsoft ReportViewer control enables web and client applications that run on the .NET Framework to display reports designed using SQL Server Reporting Services (SSRS)...


Action

An Action is a response of the program on occurrence detected by the program that may be handled by the program events...

Code-analysis

Code Analysis is the process of analyzing the code of the application to discover, review, validate or verify certain properties of the application. This is useful during the process of development and for testing the application before it is put in production mode, especially for checking the security related aspects...

Split

Use this tag for questions about separating an item (e.g. a string) into parts, often by a delimiter or regular expression...

Dcom

Distributed COM (DCOM) is a protocol that enables software components to communicate with one another over a network...

Netstat

netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems...

Esx

ESX is VMware's bare-metal hypervisor and forms the basis of its enterprise virtualization platform...

Recovery

Use this tag on any questions related to data recovery (in contrast to data restore)...



Redhat

For issues relating to Red Hat platforms, products, and/or services...

Model-driven

An interface to support model component of the Struts2 MVC architecture...

Dashboard

A dashboard is a user interface that organizes and presents information in a way that is easy to read to the user of a website. A dashboard typically indicates items which require urgent actions at the top of the page, moving into less important statistics at the bottom...

Db4o

db4o is an open source embeddable object database for Java and .NET...

Windows-xp

Windows XP is a Microsoft graphical operating system edition for use on personal computers. Important note: This tag is exclusively for programming questions directly related to Windows XP; questions about general software issues should be directed to Super User. This tag is for all flavors of XP, including XP Home Edition, XP Professional, XP x64, Itanium-64, XP Embedded, and XP Tablet...

Visual-web-developer

Visual Web Developer Express is a freeware web development tool, with the role of former ASP.NET Web Matrix, that allows developers to evaluate the web development and editing capabilities of the other Visual Studio 2005/2008/2010 editions at no charge...

Facebook

Facebook Platform lets developers integrate their apps directly into the Facebook social networking service. Use this tag for questions which may arise when developing FOR Facebook. This tag is NOT for support questions about using the Facebook website or the official Facebook app. It is also NOT for questions of the “I want to implement a feature similar to what Facebook has” variety...

Sleep

sleep is a system call that suspends a process or thread for a specified amount of time..

Hostmonster

Hostmonster is a web hosting solution provided by Endurance International Group..

Bittorrent

BitTorrent is a peer-to-peer file-sharing protocol...




Uri

A Uniform Resource Identifier (or URI) is a string of characters used to identify a name or resource. URI is legacy terminology. In most cases, the term URL should be used instead...

Fstream

fstream provides an iostream interface for file I/O in C++...

Iostream

The C++ iostream library is an object-oriented library that provides input and output functionality using streams. The iostreams classes support type-safe I/O of built-in types and can be extended to support user-defined types by overloading the >> and << operators...

Bits

A bit (a contraction of binary digit) is the basic capacity of information in computing and telecommunications; a bit represents either 1 or 0 (one or zero) only. The representation may be implemented, in a variety of systems, by means of a two state device...

Gwt-gin

GIN brings automatic dependency injection to GWT client-side code...

Gist

Gist is a simple way to share snippets and pastes with others. (Provided by Github.)..

Billing

Billing is the process of sending a bill to a customer..

Computer-forensics

Examining digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information...

Ntlm

NTLM (NT LAN Manager) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users...

Main

In many programming languages, the main function, subroutine, or method marks the entry point of the program. It is generally the first-programmer-written function run when a program starts...



Etl

ETL is an acronym for Extract, Transform, and Load. It refers to a process of extracting data from source systems, transforming the data in some way (manipulating it, filtering it, combining it with other sources), and finally loading the transformed data to target system(s)...

Arm

This tag is used for questions related to the ARM (Advanced RISC Machine) family of computers; that is machines or electronics running on ARM processor cores or systems using an ARM core...


Jcifs

JCIFS is an Open Source client library that implements the CIFS/SMB networking protocol in 100% Java...

Intranet

An Internet Protocol-based computer network for sharing information and services inside an organisation..