- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- VPDN
Acronym for Virtual Private Dial-up Network. A network that extends remote access to a private network using a shared infrastructure. VPDNs use Layer 2 tunnel technologies (L2F, L2TP, and PPTP) to extend the Layer 2 and higher parts of the network connection from a remote user across an ISP network to a private network. VPDNs […]
- CLI
(1) Short for command line interface, a user interface common to MS-DOS computers. The user sees the command line on the monitor and a promptthat is waiting to accept instructions from the user. The user types in the command, the computer acts on that command and then issues a new prompt for the next instruction […]
- drag
(1) In graphical user interfaces, drag refers to moving an icon or other image on a display screen. To drag an object across a display screen, you usually select the object with a mouse button (“grab” it) and then move the mouse while keeping the mouse button pressed down. The term drag is also used […]
- virtual router
(n.) An abstract object managed by VRRP that acts as a default router for hosts on a shared LAN. It consists of a Virtual Router Identifier and a set of associated IP addresses across a common LAN.
- JDK
Short for Java Development Kit, a software development kit (SDK) for producing Java programs. The JDK is developed by Sun Microsystem’s JavaSoft division. The most recent versions include the JavaBeans component architecture and support for JDBC.
