A type of non-volatile memory composed of a thin layer of material that can be easily magnetized in only one direction. When a magnetic field is applied to circular area of this substance that is not magnetized in the same direction, the area is reduced to a smaller circle, or bubble.
It was once widely believed that bubble memory would become one of the leading memory technologies, but these promises have not been fulfilled. Other non-volatile memory types, such as EEPROM, are both faster and less expensive than bubble memory.
- bubble sort
A simple but popular sorting algorithm. Bubble sorting is used frequently as a programming exercise because it is relatively easy to understand. It is not, however, particularly efficient. Other sorting algorithms, such as heap sorts, merge sorts and quicksorts, are used more often in real applications.
- buddy list
Often used in conjunction with AOL programs, a buddy list is a window that shows all your buddies (friends, family, coworkers, and others) who are signed on to AOL, CompuServe, or AIM. Whenever they sign on, their screen names appear in your “Buddy List” and you can communicate with them instantly. The buddy list represents […]
(n.) A temporary storage area, usually in RAM. The purpose of most buffers is to act as a holding area, enabling the CPU to manipulate data before transferring it to a device. Because the processes of reading and writing data to a disk are relatively slow, many programs keep track of data changes in a […]
- buffer credits
Formally called buffer-to-buffer credit (BBC) spoofing, and also called buffer-to-buffer credits, this is a technology that effectively removes limitations on data throughput for long-distance transmissions in a Fibre Channel storage area network (SAN). Usually Fibre Channel protocols limit the distance between the source and the destination network to within a few kilometers. Using buffer-to-buffer credits […]
- buffer overflow
The condition wherein the data transferred to a buffer exceeds the storage capacity of the buffer and some of the data “overflows” into another buffer, one that the data was not intended to go into. Since buffers can only hold a specific amount of data, when that capacity has been reached the data has to […]