English Dictionary: killer bee | by the DICT Development Group |
From WordNet (r) 3.0 (2006) [wn]: | |
| |
From WordNet (r) 3.0 (2006) [wn]: | |
| |
From Webster's Revised Unabridged Dictionary (1913) [web1913]: | |
Kohl-rabi \Kohl"-ra`bi\, n.; pl. {Kohl-rabies}. [G. Cf. {Cole}, {Rape} the plant.] (Bot.) A variety of cabbage, in which the edible part is a large, turnip-shaped swelling of the stem, above the surface of the ground. | |
From Webster's Revised Unabridged Dictionary (1913) [web1913]: | |
Kohl-rabi \Kohl"-ra`bi\, n.; pl. {Kohl-rabies}. [G. Cf. {Cole}, {Rape} the plant.] (Bot.) A variety of cabbage, in which the edible part is a large, turnip-shaped swelling of the stem, above the surface of the ground. | |
From U.S. Gazetteer (1990) [gazetteer]: | |
Kellerville, TX Zip code(s): 79057 | |
From Jargon File (4.2.0, 31 JAN 2000) [jargon]: | |
killer app The application that actually makes a sustaining market for a promising but under-utilized technology. First used in the mid-1980s to describe Lotus 1-2-3 once it became evident that demand for that product had been the major driver of the early business market for IBM PCs. The term was then restrospectively applied to VisiCalc, which had played a similar role in the success of the Apple II. After 1994 it became commonplace to describe the World Wide Web as the Internet's killer app. One of the standard questions asked about each new personal-computer technology as it emerges has become "what's the killer app?" | |
From Jargon File (4.2.0, 31 JAN 2000) [jargon]: | |
killer poke n. A recipe for inducing hardware damage on a machine via insertion of invalid values (see {poke}) into a memory-mapped control register; used esp. of various fairly well-known tricks on {bitty box}es without hardware memory management (such as the IBM PC and Commodore PET) that can overload and trash analog electronics in the monitor. See also {HCF}. | |
From The Free On-line Dictionary of Computing (15Feb98) [foldoc]: | |
killer poke A recipe for inducing hardware damage on a machine via insertion of invalid values (see {poke}) into a {memory-mapped} control {register}; used especially of various fairly well-known tricks on {bitty box}es without hardware memory management (such as the {IBM PC} and {Commodore} {PET}) that can overload analog electronics in the monitor. See also {HCF}. (1994-11-04) |