• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • constrictor

    In DRM, a constrictor is a software component that degrades the quality of a video signal. When the signal is copied, it produces a low-grade analog copy making it useless to pirates to copy and distribute. When these signals are resampled back to high resolution the signal will still be poorer quality than the original.

  • Graph Search Optimization (GSO)

    A subset of the more general search engine optimization (SEO) that focuses on ways to optimize the content of a company or individual in an effort to improve their search results on Facebook’s Graph Search. While Graph Search is still in private beta and Facebook has not yet detailed the algorithms and formulas used for […]

  • job

    A task performed by a computer system. For example, printing a file is a job. Jobs can be performed by a single program or by a collection of programs.

  • real printer

    Refers to the printer hardware attached to a serial or parallel port at a unique hardware device address. The printer device driver in the kernel communicates with the printer hardware and provides an interface between the printer hardware and a virtual printer.

  • GTbot

    Short for Global Threat bot, a GTbot is a renamed mIRC client (usually temp.exe) running in stealth mode. It uses the HideWindow program to enable it to run stealth, and can contain any number of Mirc bot scripts. This Trojan is usually downloaded by users on IRC networks when they are tricked into thinking it […]