System resource

Computer simulation, one of the main cross-computing methodologies.

Any physical or virtual component of limited availability within a computer system.

- System resource

100 related topics


URI fragment

Documents that are connected by hyperlinks.

In computer hypertext, a URI fragment is a string of characters that refers to a resource that is subordinate to another, primary resource.

Light-weight Linux distribution

One that uses lower memory and/or has less processor-speed requirements than a more "feature-rich" Linux distribution.

Lubuntu is described by its developers as light-weight in comparison to Ubuntu

The lower demands on hardware ideally result in a more responsive machine, and/or allow devices with fewer system resources (e.g. older or embedded hardware) to be used productively.

Priority inheritance

Method for eliminating unbounded priority inversion.

Charles Babbage, sometimes referred to as the "father of computing".

Using this programming method, a process scheduling algorithm increases the priority of a process (A) to the maximum priority of any other process waiting for any resource on which A has a resource lock (if it is higher than the original priority of A).


Special filesystem in Unix-like operating systems that presents information about processes and other system information in a hierarchical file-like structure, providing a more convenient and standardized method for dynamically accessing process data held in the kernel than traditional tracing methods or direct access to kernel memory.

Evolution of Unix and Unix-like systems, starting in 1969

/proc/interrupts, /proc/iomem, /proc/ioports and the directory /proc/irq, giving some details about the devices (physical or logical) using the various system resources


Free and open-source web browser based on the GTK port of Apple's WebKit rendering engine, called WebKitGTK.

GNOME Web 41
GNOME Web 41
Web Inspector, showing a Safari-like user interface
The GNOME Web 41 preferences
Support for phone and tablet form-factors was added in version 3.34
Bookmark management of GNOME Web in version 41
GNOME Web 3.36 (March 2020) in "Web Application mode", showing the Wikipedia main page
Epiphany 2.26.1 (left) showing its larger user interface chrome area than in 3.2.0 (right)

As a component of GNOME Core Applications, it provides full integration with GNOME settings and other components like GNOME Keyring to securely store passwords, following the GNOME Human Interface Guidelines and the GNOME software stack to provide first-class support for the all new-adopted edge technologies such as Wayland and the latest major GTK versions, multimedia support using GStreamer, small package size (2.6MB) and very fast execution/startup time due to using shared components; other features include the reader mode, mouse gestures, smart bookmarks, praised web application integration mechanism, built-in ad blocking, the "Insert Emoji" option in the context menu for quick and easy inserting of Emoji and Miscellaneous Symbols and Pictographs into the text boxes, Google Safe Browsing, supports reading and saving MHTML, an archive format for web pages that combines all the files of web pages into only one single file; and consume fewer system resources than the major cross-platform web browsers.

Capacity management

To ensure that information technology resources are sufficient to meet upcoming business requirements cost-effectively.

EDVAC, one of the first stored-program computers

Influences on demand for computing resources

Asynchronous I/O

Form of input/output processing that permits other processing to continue before the transmission has finished.


But such an approach (called synchronous I/O, or blocking I/O) would block the progress of a program while the communication is in progress, leaving system resources idle.

Speculative execution

Optimization technique where a computer system performs some task that may not be needed.

Charles Babbage, sometimes referred to as the "father of computing".

The objective is to provide more concurrency if extra resources are available.

Privilege escalation

A diagram describing privilege escalation. The arrow represents a rootkit gaining access to the kernel, and the little gate represents normal privilege elevation, where the user has to enter an Administrator username and password.
Privilege rings for the x86 available in protected mode

Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

Handle leak

A page from the Harvard Mark II electromechanical computer's log, featuring a dead moth that was removed from the device.

A handle leak is a type of software bug that occurs when a computer program asks for a handle to a resource but does not free the handle when it is no longer used.