upload
Apple Inc.
Industria: Computer; Software
Number of terms: 54848
Number of blossaries: 7
Company Profile:
Apple Inc., formerly Apple Computer, Inc., is an American multinational corporation headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software and personal computers.
See mouse event coalescing.
Industry:Software; Computer
The UID of a process. Each process has three user IDs: the real user ID (RUID), effective user ID (EUID), and saved user ID (SUID). The RUID is always inherited from the user or process that executes the process. The EUID is normally the same as the RUID but can differ in special circumstances. It is the EUID that BSD checks to determine permissions. The SUID is used by BSD to enable a privileged process to switch in and out of privileged mode.
Industry:Software; Computer
See audio processing graph.
Industry:Software; Computer
A callback procedure or function that processes one or more events.
Industry:Software; Computer
An Apple-supplied audio unit used to interface with hardware input or output, so named because it interacts with the HAL (Hardware Abstraction Layer).
Industry:Software; Computer
An application or framework produced by Xcode.
Industry:Software; Computer
A specific type of event within an event class (for example, a mouse-down event). Compare event class.
Industry:Software; Computer
A self-contained part of a product. A product can have one or more components. The Mac OS X file system contains special locations for several types of components. For example, application binaries are placed in Application directories, plug-ins are housed in Plugin directories, fonts live in Fonts directories, and so on.
Industry:Software; Computer
In the Carbon Event Manager, an execution loop that obtains events from the Window Server and places them in an event queue. The event loop also fires timers.
Industry:Software; Computer
A server that has access to a store of authentication information and that can authenticate users. For example, an authentication server might verify a user’s identity by prompting the user for a name and password and comparing that information to the names and passwords in a database. In Kerberos authentication, the authentication server also looks up the user’s private key, generates a session key, and creates a TGT. See also ticket-granting server.
Industry:Software; Computer
© 2024 CSOFT International, Ltd.