- Industry: Computer; Software
- Number of terms: 54848
- Number of blossaries: 7
- Company Profile:
Apple Inc., formerly Apple Computer, Inc., is an American multinational corporation headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software and personal computers.
The period of time during which a program is being executed, as opposed to compile time or load time. Can also refer to the runtime environment, which designates the set of conventions that arbitrate how software is generated into executable code, how code is mapped into memory, and how functions call one another.
Industry:Software; Computer
A property of an audio unit or other audio device that specifies a time lag, in samples, to allow for improved robustness of driver operation. The safety offset required for a given architecture includes time needed for memory access and to account for inaccuracies in a driver’s timestamp resolution. Safety offset contributes to latency.
Industry:Software; Computer
(1) (n.) An instantaneous amplitude of the signal in a single audio channel, represented as an integer, floating-point, or fixed-point number. See also fixed-point sample. (2) (v.) To collect samples from an audio source, typically an analog audio source. Sampling typically involves collecting samples at regular, very brief intervals such as 1/44,100 seconds. (3) (n.) An excerpt of a longer recording. When the excerpt is intended to be played repeatedly, it is called a loop. (4) (v.) To record a sample to use as a loop or for inclusion in a another recording. (5) In QuickTime, a single element of a sequence of time-ordered data.
Industry:Software; Computer
A cryptographic key that cannot be made public without compromising the security of the cryptographic method. In symmetric key cryptography, the secret key is used both to encrypt and decrypt the data. In asymmetric key cryptography, the secret key is paired with a public key. Whichever one is used to encrypt the data, the other is used to decrypt it. See also public key, public key cryptography.
Industry:Software; Computer
Encrypted storage of data that requires a user or process to authenticate itself before the data is decrypted. Secure storage persists when the power is turned off.
Industry:Software; Computer
The Mac OS X and iPhone implementation of SSL (Secure Transport Layer) and TLS, used to create secure connections over TCP/IP connections such as the Internet. On Mac OS X, Secure Transport includes an API that is independent of the underlying transport protocol. The CFNetwork and URL Loading System APIs use the services of Secure Transport.
Industry:Software; Computer
In Mac OS X, a process used by the Security Server to communicate with the user through dialogs and other user interface elements.
Industry:Software; Computer
A Mac OS X API providing a set of Objective-C methods that are wrappers for the Authentication Services functions plus a set of classes that display security-related UI elements.
Industry:Software; Computer
A daemon running in Mac OS X and iPhone OS that implements security protocols for such purposes as encryption, decryption, and authorization computation. The use of the Security Server to perform actions with cryptographic keys allows the keys to be maintained in a separate address space from the client application, keeping them more secure. In Mac OS X, the Security Server uses a process called the Security Agent to communicate with the user through dialogs and other user interface elements.
Industry:Software; Computer