Category:All articles with vague or ambiguous time
From HandWiki
This is a category to help keep count of the total number of articles with the {{When}} template. They should all be in one of the dated categories. See also Category:Vague or ambiguous time.
Pages in category "All articles with vague or ambiguous time"
The following 200 pages are in this category, out of 482 total.
(previous page) (next page)M
- Microphone
- Microsoft Binary Format
- Microsoft Office password protection
- Minimal counterexample
- Misattribution of memory
- Mobile data offloading
- Mobile identity management
- Mobile web
- MObStor
- Model military vehicle
- Mortality rate
- Mp3PRO
- MP4 file format
- MPP (file format)
- Multimedia Home Platform
- Multimedia Messaging Service
- Multiprotocol Label Switching
- Municipal wireless network
N
O
- Object storage
- Objective-C
- OCR-A
- One true church
- OPC Unified Architecture
- Open Cloud Computing Interface
- Open Java Interface
- OpenVanilla
- Operations research
- Operations support system
- Optical character recognition
- Orders of magnitude (length)
- Orders of magnitude (probability)
- Ordinal collapsing function
- Outgroup favoritism
- Overselling
P
- P-cycle protection
- Packet switching
- Padding (cryptography)
- Panama Papers (Africa)
- Pandemonium architecture
- Paradise Papers
- Parataxonomy
- Parchive
- Parental controls
- Paris meridian
- Password cracking
- Patch (computing)
- PC game
- Peer instruction
- Percolation theory
- Perfect magic cube
- Perl language structure
- Personal web page
- Photo manipulation
- Photograph manipulation
- Pitch detection algorithm
- PKCS
- Point-to-Point Protocol over Ethernet
- Position-independent code
- Power Architecture
- Power take-off
- Power-line communication
- Primate archaeology
- Privacy
- Privacy and blockchain
- Programmable Array Logic
- Programmable logic controller
- PropBank
- Protected Extensible Authentication Protocol
- Psi-theory
- Psychedelics in problem-solving experiment
R
- R-value (insulation)
- R5000
- Radio-frequency identification
- Randomized algorithm
- Ransomware
- RDMA over Converged Ethernet
- Real-time computer graphics
- RealAudio
- Realtek Remote Control Protocol
- Religious studies
- Rendering (computer graphics)
- Ricci flow
- Richards controller
- Robots exclusion standard
- Robots.txt
- Rustock botnet
S
- Scalable Vector Graphics
- Scheme 48
- Science On a Sphere
- Scientific method and religion
- Scythe
- Semi-Automatic Ground Environment
- Semi-Supervised Learning
- Service-oriented infrastructure
- Skimming (casinos)
- Sky Mirror
- Small Form-factor Pluggable
- Small form-factor pluggable transceiver
- SmartMedia
- SOA security
- Software as a service
- Software load testing
- Solid modeling
- Solid-state drive
- Spaced retrieval
- Spamming
- Spatial anxiety
- Spectre (security vulnerability)
- Speech recognition
- Spherical Earth
- Stereopsis
- Stick figure
- Sticky keys
- Stream recorder
- Streaming SIMD Extensions
- Streaming television
- Sudoku
- Supply chain
- SVG
- SystemVerilog
T
- Talossa
- Tapeless production
- List of TCP and UDP port numbers
- Technical details of Netflix
- Telephone slamming
- Tetration
- Text Retrieval Conference
- Text to speech in digital television
- Three-dimensional face recognition
- Time-lapse photography
- Timeline of computing 1950–1979
- Timeline of computing 1990–1999
- Tone-Lok
- TOPS
- TOPS (file server)
- Transistor–transistor logic
- Tree of knowledge system
- Trefftz method
- Trident
- Tripling-oriented Doche–Icart–Kohel curve
- Type–length–value