meaning of proprietary

1. A proprietor or owner; one who has exclusive title to a thing; one who possesses, or holds the title to, a thing in his own right.
2.
A body proprietors, taken collectively.
3.
A monk who had reserved goods and effects to himself, notwithstanding his renunciation of all at the time of profession.
4.
Belonging, or pertaining, to a proprietor; considered as property; owned; as, proprietary medicine.
5.
proprietary 1. In marketroid-speak, superior; implies a product imbued with exclusive magic by the unmatched brilliance of the companys own hardware or software designers. 2. In the language of hackers and users, inferior; implies a product not conforming to open-systems standards, and thus one that puts the customer at the mercy of a vendor who can inflate service and upgrade charges after the initial sale has locked the customer in. [Jargon File] PROSE 1. PROblem Solution Engineering. Numerical problems including differentiation and integration. "Computing in Calculus", J. Thames, Research/Development 265 May 1975. 2. A constraints-and-sequencing system similar to Kaleidoscope. "Reflexive Constraints for Dynamic Knowledge Bases", P. Berlandier et al in Proc First Intl CS Conf 88: AI: Theory and Appls, Dec 1988. ProSet A derivative of SETL with Ada-like syntax developed at the University of Essen in 1990. Formerly known as SETL/E. ["SETL/E, A Prototyping System Based on Sets", E. E. Doberkat et al, in Tagungsband TOOL90, W. Zorn ed, pp. 109-118, U Karlsruhe, Nov 1990]. ["ProSet - A Language for Prototyping with Sets", E. -E. Doberkat et al, in Proc Third Intl Workshop on Rapid System Prototyping, N. Kanopoulos ed, IEEE Comp Soc Press, June 1992, pp. 235-248]. PROSPER ["PROSPER: A Language for Specification by Prototyping", J. Leszczylowski, Comp Langs 143:165-180 1989]. Prospero A tool for organising Internet resources. Prospero allows each user to organise the contents of remote file servers into his own virtual file system with his own hierarchical name space consisting of links to remote objects. Remote indexing services are made available by treating the results as a virtual directory. A "union link" allows the contents of the links target directory to appear as part of the directory containing the link. Arbitrary filters can be associated with links to modify the representation of the target directory as desired. Prospero directories can be shared between users. The Prospero protocol is used for communication between clients and servers in the archie system. A prototype of Prospero has been available since December 1990. It interfaces with Sun NFS, the Andrew File System and FTP with local caching and Archie. Support for World-Wide Web and WAIS is planned 1992. E-mail: edu>. ftp://prospero. isi. edu/pub/prospero. ProTalk Quintus. An object-oriented Prolog. protected mode An operating mode of Intel 80x86 processors. The opposite of real mode. The Intel 8088, Intel 8086, Intel 80188 and Intel 80186 had only real mode, processors beginning with the Intel 80286 feature a second mode called protected mode. In real mode, addresses are generated by adding an address offset to the value of a segment register shifted left four bits. As the segment register and address offset are 16 bits long this results in a 20-bit address. This is the origin of the one megabyte 2^20 limit in real mode. There are 4 segment registers on processors before the Intel 80386. The 80386 introduced two more segment registers. Which segment register is used depends on the instruction, on the addressing mode and of an optional instruction prefix which selects the segment register explicitly. In protected mode, the segment registers contain an index into a table of segment descriptors. Each segment descriptor contains the start address of the segment, to which the offset is added to generate the address. In addition, the segment descriptor contains memory protection information. This includes an offset limit and bits for write and read permission. This allows the processor to prevent memory accesses to certain data. The operating system can use this to protect different processes memory from each other, hence the name "protected mode". While the standard register set belongs to the CPU, the segment registers lie "at the boundary" between the CPU and MMU. Each time a new value is loaded into a segment register while in protected mode, the corresponding descriptor is loaded into a descriptor cache in the Segment-MMU. On processors before the Pentium this takes longer than just loading the segment register in real mode. Addresses generated by the CPU which are segment offsets are passed to the MMU to be checked against the limit in the segment descriptor and are there added to the segment base address in the descriptor to form a linear address. On a 80386 or later, the linear address is further processed by the paged MMU before the result the physical address appears on the chips address pins. The 80286 doesnt have a paged MMU so the linear address is output directly as the physical address. The paged MMU allows for arbitrary remapping of four klilobyte memory blocks pages through a translation table stored in memory. A few entries of this table are cached in the MMUs Translation Lookaside Buffer to avoid excessive memory accesses. After processor reset, all processors start in real mode. Protected mode has to be enabled by software. On the 80286 there exists no documented way back to real mode apart from resetting the processor. Later processors allow switching back to real mode by software. Software which has been written or compiled to run in protected mode must only use segment register values given to it by the operating system. Unfortunately, most application code for MS-DOS, written before the 286, will fail in protected mode because it assumes real mode addressing and writes arbitrary values to segment registers, e. g. in order to perform address calculations. Such use of segment registers is only really necessary with data structures that are larger than 64 kilobytes and thus dont fit into a single segment. This is usually dealt with by the huge memory model in compilers. In this model, compilers generate address arithmetic involving segment registers. A solution which is portable to protected mode with almost the same efficiency would involve using a table of segments instead of calculating new segment register values ad hoc. To ease the transition to protected mode, Intel 80386 and later processors provide "virtual 86 mode".
6.
an unincorporated business owned by a single person who is responsible for its liabilities and entitled to its profits


Related Words

proprietary | proprietary colony | proprietary drug |

Developed & Maintained By Taraprasad.com

Treasure Words