Synonyms containing application experts
We've found 5,199 synonyms:
In patent, industrial design rights and trademark laws, a priority right or right of priority is a time-limited right, triggered by the first filing of an application for a patent, an industrial design or a trademark respectively. The priority right allows the claimant to file a subsequent application in another country for the same invention, design, or trademark effective as of the date of filing the first application. When filing the subsequent application, the applicant must claim the priority of the first application in order to make use of the right of priority. The right of priority belongs to the applicant or his successor in title. The period of priority, i.e., the period during which the priority right exists, is usually 6 months for industrial designs and trademarks and 12 months for patents and utility models. The period of priority is often referred to as the priority year for patents and utility models. In patent law, when a priority is validly claimed, the date of filing of the first application, called the priority date, is considered to be the effective date of filing for the examination of novelty and inventive step or non-obviousness for the subsequent application claiming the priority of the first application. In other words, the prior art which is taken into account for examining the novelty and inventive step or non-obviousness of the invention claimed in the subsequent application would not be everything made available to the public before the filing date (of the subsequent application) but everything made available to the public before the priority date, i.e. the date of filing of the first application.
Certeon is a private company that was founded in 2003; it is funded by two leading venture-capital firms-Globespan Capital Partners and Sigma Partners. The first product shipment of Certeon's S-Series Application Acceleration Appliances was in February 2006. The company is headquartered in Burlington, Massachusetts. Products and Technologies Certeon delivers Application Intelligent Networking to global enterprises to dramatically accelerate distributed application response times over a WAN by 1000+ percent. Certeon's S-Series Application Acceleration Appliances effectively overcome the inherent issues that inhibit WAN acceleration such as limited bandwidth, high latency, packet loss, and network contention. The benefits of Certeon to enterprise clients accessing distributed applications from remote branch offices include the following: Speed-Accelerates your business Dramatic reduction in application response timesIncreased user productivityFaster deployment of collaborative environments and line-of-business applications Security-Accelerates HTTPS (SSL) traffic Maintains security from the desktop to the data centerWorks within existing security infrastructureHistorical data is encrypted on the S-Series Scalability-Maximizes productivity and reduces costs Optimizes use of bandwidthServices more users/applications from the same infrastructureSupports centralization of computing assets The Certeon solution is based on our patent-pending Secure Acceleration Technology (SAT) that accelerates all encrypted (HTTPS) and nonencrypted (HTTP) Web traffic from the desktop to the data center. SAT, with its Object Differencing Engine and Application Acceleration Blueprints, significantly improves application response times over a WAN by understanding specific application objects and application semantics. By adding this deep application intelligence to the network, Certeon dramatically reduces application response times.
Application software is all the computer software that causes a computer to perform useful tasks beyond the running of the computer itself. A specific instance of such software is called a software application, application or app. The term is used to contrast such software with system software, which manages and integrates a computer's capabilities but does not directly perform tasks that benefit the user. The system software serves the application, which in turn serves the user. Examples include enterprise software, accounting software, office suites, graphics software and media players. Many application programs deal principally with documents. Applications may be bundled with the computer and its system software or published separately, and can be coded as university projects. Application software applies the power of a particular computing platform or system software to a particular purpose. Some applications are available in versions for several different platforms; others have narrower requirements and are thus called, for example, a Geography application for Windows or an Android application for education or Linux gaming. Sometimes a new and popular application arises which only runs on one platform, increasing the desirability of that platform. This is called a killer application.
Under United States patent law, a provisional application is a legal document filed in the United States Patent and Trademark Office (USPTO), that establishes an early filing date, but does not mature into an issued patent unless the applicant files a regular non-provisional patent application within one year. There is no such thing as a "provisional patent".A provisional application includes a specification, i.e. a description, and drawing(s) of an invention (drawings are required where necessary for the understanding of the subject matter sought to be patented), but does not require formal patent claims, inventors' oaths or declarations, or any information disclosure statement (IDS). Furthermore, because no examination of the patentability of the application in view of the prior art is performed, the USPTO fee for filing a provisional patent application is significantly lower ($70 - $280 as of January 16, 2018) than the fee required to file a standard non-provisional patent application. A provisional application can establish an early effective filing date in one or more continuing patent applications later claiming the priority date of an invention disclosed in the provisional application by one or more of the same inventors. The same term is used in past and current patent laws of other countries with different meanings.
|Peer Review, Research|
Peer Review, Research
The evaluation by experts of the quality and pertinence of research or research proposals of other experts in the same field. Peer review is used by editors in deciding which submissions warrant publication, by granting agencies to determine which proposals should be funded, and by academic institutions in tenure decisions.
— U.S. National Library of Medicine
|Joint Photographic Experts Group|
Joint Photographic Experts Group
The Joint Photographic Experts Group (JPEG) is the joint committee between ISO/IEC JTC 1 and ITU-T (formerly CCITT) that created and maintains the JPEG, JPEG 2000, and JPEG XR standards. It is one of two sub-groups of ISO/IEC Joint Technical Committee 1, Subcommittee 29, Working Group 1 (ISO/IEC JTC 1/SC 29/WG 1) – titled as Coding of still pictures. In the ITU-T, its work falls in the domain of the ITU-T Visual Coding Experts Group (VCEG). ISO/IEC JTC1 SC29 Working Group 1 (working together with ITU-T Study Group 16 – SG16 and previously also with Study Group 8 – SG8) is responsible for the JPEG and JBIG standards. The scope of the organization includes the work of both the Joint Photographic Experts Group and Joint Bi-level Image Experts Group.In April 1983, ISO started to work to add photo quality graphics to text terminals. In the mid-1980s, both CCITT (now ITU-T) and ISO had standardization groups for image coding: CCITT Study Group VIII (SG8) – Telematic Services and ISO TC97 SC2 WG8 – Coding of Audio and Picture Information. They were historically targeted on image communication. In 1986, it was decided to create the Joint (CCITT/ISO) Photographic Expert Group. The JPEG committee was created in 1986. In 1988, it was decided to create the Joint (CCITT/ISO) Bi-level Image Group (JBIG). The group typically meets three times annually in North America, Asia and Europe. The group often meets jointly with the JBIG committee. The current JPEG president is Touradj Ebrahimi, who was previously chairman of the JPEG 2000 development group and led the MPEG-4 standards committee.
The Delphi method or Delphi technique ( DEL-fy; also known as Estimate-Talk-Estimate or ETE) is a structured communication technique or method, originally developed as a systematic, interactive forecasting method which relies on a panel of experts. The technique can also be adapted for use in face-to-face meetings, and is then called mini-Delphi or Estimate-Talk-Estimate (ETE). Delphi has been widely used for business forecasting and has certain advantages over another structured forecasting approach, prediction markets.Delphi is based on the principle that forecasts (or decisions) from a structured group of individuals are more accurate than those from unstructured groups. The experts answer questionnaires in two or more rounds. After each round, a facilitator or change agent provides an anonymised summary of the experts' forecasts from the previous round as well as the reasons they provided for their judgments. Thus, experts are encouraged to revise their earlier answers in light of the replies of other members of their panel. It is believed that during this process the range of the answers will decrease and the group will converge towards the "correct" answer. Finally, the process is stopped after a predefined stop criterion (e.g., number of rounds, achievement of consensus, stability of results), and the mean or median scores of the final rounds determine the results.
NetScaler was the leading provider of advanced web application control systems that enable enterprises, e-businesses and service providers to ensure the continuous, secure delivery of their web-based applications while dramatically lowering the cost of their operations. Citrix® NetScaler® web application delivery solutions are purpose built appliances that accelerate application performance up to five times, while simultaneously reducing datacenter costs. They provide visibility into the end-user application experience and comprehensive web application security in concert with advanced traffic management. Citrix NetScaler is an ideal solution for any enterprise seeking accelerated Web application performance, improved web application security and increased application availability.
Application security encompasses measures taken throughout the application's life-cycle to prevent exceptions in the security policy of an application or the underlying system through flaws in the design, development, deployment, upgrade, or maintenance of the application. Applications only control the use of resources granted to them, and not which resources are granted to them. They, in turn, determine the use of these resources by users of the application through application security. Open Web Application Security Project and Web Application Security Consortium updates on the latest threats which impair web based applications. This aids developers, security testers and architects to focus on better design and mitigation strategy. OWASP Top 10 has become an industrial norm in assessing Web Applications.
A conference treating a specific topic, at which experts and specialists present their views and discuss and analyze the information presented; the emphasis on conversation among the experts and with the audience distinguishes a colloquium from the more generic conference.
a book with an authoritative exposition of some topic, respected by many who are experts in the field
— Webster Dictionary
Hypermedia as the Engine of Application State (HATEOAS) is a component of the REST application architecture that distinguishes it from other network application architectures. With HATEOAS, a client interacts with a network application whose application servers provide information dynamically through hypermedia. A REST client needs little to no prior knowledge about how to interact with an application or server beyond a generic understanding of hypermedia. By contrast, clients and servers in CORBA interact through a fixed interface shared through documentation or an interface description language (IDL). The way that the HATEOAS constraint decouples client and server enables the server functionality to evolve independently.
An application server can be either a software framework that provides a generalized approach to creating an application-server implementation, without regard to what the application functions are, or the server portion of a specific implementation instance. In either case, the server's function is dedicated to the efficient execution of procedures for supporting its applied applications. Most Application Server Frameworks contain a comprehensive service layer model. An application server acts as a set of components accessible to the software developer through an API defined by the platform itself. For Web applications, these components are usually performed in the same running environment as its Web server, and their main job is to support the construction of dynamic pages. However, many application servers target much more than just Web page generation: they implement services like clustering, fail-over, and load-balancing, so developers can focus on implementing the business logic. In the case of Java application servers, the server behaves like an extended virtual machine for running applications, transparently handling connections to the database on one side, and, often, connections to the Web client on the other.
|Atomic Energy Regulatory Board|
Atomic Energy Regulatory Board
The Atomic Energy Regulatory Board (AERB) was constituted on 15 November 1983 by the President of India by exercising the powers conferred by Section 27 of the Atomic Energy Act, 1962 (33 of 1962) to carry out certain regulatory and safety functions under the Act. The regulatory authority of AERB is derived from the rules and notifications promulgated under the Atomic Energy Act, 1962 and the Environmental (Protection) Act, 1986. The headquarters is in Mumbai.The mission of the Board is to ensure that the use of ionising radiation and nuclear energy in India does not cause undue risk to health and the environment. Currently, the Board consists of a full-time Chairman, an ex officio Member, three part-time Members and a Secretary. AERB is supported by the Safety Review Committee for Operating Plants (SARCOP), Safety Review Committee for Applications of Radiation (SARCAR) and Advisory Committees for Project Safety Review (ACPSRs) (e.g. Pressurized heavy-water reactor, light water reactor, Prototype Fast Breeder Reactor and waste management projects). ACPSRs recommend to AERB issuance of authorisations at different stages of a plant of the Department of Atomic Energy (DAE), after reviewing the submissions made by the plant authorities based on the recommendations of the associated Design Safety Committees. The SARCOP carries out safety surveillance and enforces safety stipulations in the operating units of the DAE. The SARCAR recommends measures to enforce radiation safety in medical, industrial and research institutions which use radiation and radioactive sources. AERB also receives advice from the Advisory Committee on Nuclear Safety (ACNS). ACNS is composed of experts from AERB, DAE and institutions outside the DAE. ACNS provides recommendations on the safety codes, Guides and manuals prepared for siting, design, construction, operation, quality assurance and decommissioning/life extension of nuclear power plants which have been prepared by the respective advisory committees for each of these areas. It also advises the Board on generic safety issues. ACNS examines and advice on any specific matter that are referred to it by AERB. The administrative and regulatory mechanisms which are in place ensure multi-tier review by experts available nationwide. These experts come from reputed academic institutions and governmental agencies.
Application sharing is an element of remote access, falling under the collaborative software umbrella, that enables two or more users to access a shared application or document from their respective computers simultaneously in real time. Generally, the shared application or document will be running on a host computer, and remote access to the shared content will be provided to other users by the host user. To transfer one application from one computer to another, The application must reside on only one of the machines connected with each other.