Non-uniform memory accessNon-uniform memory access (NUMA) is a computer memory design used in multiprocessing, where the memory access time depends on the memory location relative to the processor. Under NUMA, a processor can access its own local memory faster than non-local memory (memory local to another processor or memory shared between processors). The benefits of NUMA are limited to particular workloads, notably on servers where the data is often associated strongly with certain tasks or users.
ComaA coma is a deep state of prolonged unconsciousness in which a person cannot be awakened, fails to respond normally to painful stimuli, light, or sound, lacks a normal wake-sleep cycle and does not initiate voluntary actions. The person may experience respiratory and circulatory problems due to the body's inability to maintain normal bodily functions. People in a coma often require extensive medical care to maintain their health and prevent complications such as pneumonia or blood clots.
Glasgow Coma ScaleThe Glasgow Coma Scale (GCS) is a clinical scale used to reliably measure a person's level of consciousness after a brain injury. The GCS assesses a person based on their ability to perform eye movements, speak, and move their body. These three behaviours make up the three elements of the scale: eye, verbal, and motor. A person's GCS score can range from 3 (completely unresponsive) to 15 (responsive). This score is used to guide immediate medical care after a brain injury (such as a car accident) and also to monitor hospitalised patients and track their level of consciousness.
Induced comaAn induced coma also known as a medically induced coma (MIC), barbiturate-induced coma, or drug-induced coma is a temporary coma (a deep state of unconsciousness) brought on by a controlled dose of an anesthetic drug, often a barbiturate such as pentobarbital or thiopental. Other intravenous anesthetic drugs such as midazolam or propofol may be used. Drug-induced comas are used to protect the brain during major neurosurgery, as a last line of treatment in certain cases of status epilepticus that have not responded to other treatments, and in refractory intracranial hypertension following traumatic brain injury.
Traumatic brain injuryA traumatic brain injury (TBI), also known as an intracranial injury, is an injury to the brain caused by an external force. TBI can be classified based on severity ranging from mild traumatic brain injury (mTBI/concussion) to severe traumatic brain injury. TBI can also be characterized based on mechanism (closed or penetrating head injury) or other features (e.g., occurring in a specific location or over a widespread area). Head injury is a broader category that may involve damage to other structures such as the scalp and skull.
Protocol stackThe protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family. Some of these terms are used interchangeably but strictly speaking, the suite is the definition of the communication protocols, and the stack is the software implementation of them. Individual protocols within a suite are often designed with a single purpose in mind. This modularization simplifies design and evaluation. Because each protocol module usually communicates with two others, they are commonly imagined as layers in a stack of protocols.
Communication protocolA communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of a physical quantity. The protocol defines the rules, syntax, semantics, and synchronization of communication and possible error recovery methods. Protocols may be implemented by hardware, software, or a combination of both. Communicating systems use well-defined formats for exchanging various messages.
Minimally conscious stateA minimally conscious state or MCS is a disorder of consciousness distinct from persistent vegetative state and locked-in syndrome. Unlike persistent vegetative state, patients with MCS have partial preservation of conscious awareness. MCS is a relatively new category of disorders of consciousness. The natural history and longer term outcome of MCS have not yet been thoroughly studied. The prevalence of MCS was estimated to be 9 times of PVS cases (adult and pediatric), or between 112,000 and 280,000 in the US by year 2000.
Point-to-Point ProtocolIn computer networking, Point-to-Point Protocol (PPP) is a data link layer (layer 2) communication protocol between two routers directly without any host or any other networking in between. It can provide loop connection authentication, transmission encryption, and data compression. PPP is used over many types of physical networks, including serial cable, phone line, trunk line, cellular telephone, specialized radio links, ISDN, and fiber optic links such as SONET.
Tunneling protocolIn computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. It involves allowing private network communications to be sent across a public network (such as the Internet) through a process called encapsulation. Because tunneling involves repackaging the traffic data into a different form, perhaps with encryption as standard, it can hide the nature of the traffic that is run through a tunnel.