Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • The Psychopathy Checklist or Hare Psychopathy Checklist-Revised, now the Psychopathy Checklist—revised (PCL-R), is a psychological assessment tool that...
    42 KB (4,753 words) - 05:53, 23 May 2025
  • 2008 and 2011. Catalyst is a new software-development tool that allows developers to write apps that can run on macOS, iOS and iPadOS. Apple demonstrated...
    34 KB (2,264 words) - 21:47, 11 May 2025
  • Threat model (category Computer security exploits)
    Microsoft as a mnemonic for developers to find 'threats to our products'. STRIDE can be used as a simple prompt or checklist, or in more structured approaches...
    18 KB (2,046 words) - 16:21, 25 November 2024
  • National Vulnerability Database (category Security vulnerability databases)
    of security checklists, security related software flaws, misconfigurations, product names, and impact metrics. NVD supports the Information Security Automation...
    5 KB (529 words) - 04:51, 25 May 2025
  • Thumbnail for Requirements analysis
    seen to this day. Provides a checklist of requirements. Provide a contract between the project sponsor(s) and developers. For a large system can provide...
    25 KB (2,957 words) - 19:19, 25 May 2025
  • versions) are not aligned with their own security recommendations, such as Oracle Database Security Checklist, which is hard to amend as many applications...
    14 KB (1,744 words) - 12:13, 10 May 2025
  • checkpoints for government organizations and developers to follow. It eliminates ambiguity in understanding what needs to be achieved for compliance....
    20 KB (1,790 words) - 21:07, 18 October 2024
  • accessibility by all possible users. For example, a tool to be used only by few specialized software developers might be acquired even if its accessibility...
    7 KB (744 words) - 18:21, 18 November 2024
  • evangelist was to convince software developers to write software products for the Macintosh. When software developers need help from within Apple, evangelists...
    36 KB (3,495 words) - 04:45, 5 March 2025
  • Open Vulnerability and Assessment Language (category Computer security procedures)
    standardized names for vulnerabilities and other security issues) XCCDF - eXtensible Configuration Checklist Description Format Security Content Automation...
    6 KB (847 words) - 04:11, 9 March 2025
  • Chromecast now open to developers with the Google Cast SDK". Google Developers Blog. Roettgers, Janko (February 3, 2014). "Get ready for tons of new Chromecast...
    26 KB (2,501 words) - 20:06, 28 April 2025
  • developers made on Montgomery County". Washington Jewish Week. Retrieved 2022-04-22. "Jews for Urban Justice (Washington, D.C.) records". Center for Jewish...
    36 KB (4,141 words) - 06:32, 27 April 2025
  • into an archive. These scripts are intended for use with security operating systems baselines or checklists. The 3.2.3 release was published in September...
    6 KB (771 words) - 16:05, 8 August 2024
  • large QA staff for testing various games from different developers. Despite the large QA infrastructure most publishers have, many developers retain a small...
    24 KB (3,094 words) - 12:45, 17 February 2025
  • Thumbnail for Video game
    often requiring developers to replace such imagery with fictional ones. This ruling was relaxed in 2018 to allow for such imagery for "social adequacy"...
    142 KB (14,988 words) - 15:14, 3 May 2025
  • for developers and Google Workspace". March 14, 2023. Dischler, Jerry (January 16, 2025). "Google Workspace enables the future of AI-powered work for every...
    68 KB (7,272 words) - 18:16, 8 May 2025
  • Thumbnail for Chromecast
    Chromecast (section Security)
    Chromecast now open to developers with the Google Cast SDK". Google Developers Blog. Roettgers, Janko (February 3, 2014). "Get ready for tons of new Chromecast...
    83 KB (7,963 words) - 23:24, 19 May 2025
  • Norton AntiVirus and Norton Internet Security, a related product, held a 25% US retail market share for security suites as of 2017. Competitors, in terms...
    40 KB (3,997 words) - 14:02, 8 May 2025
  • tasks and are widely used by web developers: Web browsers open separate Transmission Control Protocol (TCP) connections for each Hypertext Transfer Protocol...
    14 KB (1,735 words) - 05:53, 12 March 2025
  • Thumbnail for Web Content Accessibility Guidelines
    2008, The WCAG Samurai, a group of developers independent of the W3C, and led by Joe Clark, published corrections for, and extensions to, the WCAG 1.0....
    41 KB (3,175 words) - 08:52, 27 May 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)