When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Review of Spectrum’s new Xumo streaming box with Cloud DVR ...

    www.aol.com/review-spectrum-xumo-streaming-box...

    If you signed up for Cloud DVR (cDVR) service, you can click on a show while browsing the guide and a “record” button should appear. If you’re watching a show live, you can press “up” on ...

  3. Xfinity - Wikipedia

    en.wikipedia.org/wiki/Xfinity

    Xfinity Voice (formerly Comcast Digital Voice) is a Voice Over IP cable telephony service that was launched in 2005 in some markets, [75] and to all of Comcast's markets in 2006. Comcast's older service, Comcast Digital Phone, continued to offer service for a brief period, until Comcast shut it down around in late 2007. [ 76 ]

  4. Xfinity Flex - Wikipedia

    en.wikipedia.org/wiki/Xfinity_Flex

    Xfinity Flex (formerly Xfinity Instant TV) is an American over-the-top internet television service owned by Comcast.The service – which is structured as a virtual multichannel video programming distributor – is only available to Comcast Xfinity internet customers.

  5. Digital video recorder - Wikipedia

    en.wikipedia.org/wiki/Digital_video_recorder

    A PC-based DVR's architecture is a classical personal computer with video capture cards designed to capture video images. An embedded type DVR is specifically designed as a digital video recorder with its operating system and application software contained in firmware or read-only memory.

  6. OpenCable Application Platform - Wikipedia

    en.wikipedia.org/wiki/OpenCable_Application_Platform

    The OpenCable Application Platform, or OCAP, is an operating system layer designed for consumer electronics that connect to a cable television system, the Java-based middleware portion of the platform.

  7. Cold boot attack - Wikipedia

    en.wikipedia.org/wiki/Cold_boot_attack

    In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) by performing a hard reset of the target machine.