• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • dual-ring topology

    A network topology in which two concentric rings connect each node on a network instead of one network ring that is used in a ring topology. Typically, the secondary ring in a dual-ring topology is redundant. It is used as a backup in case the primary ring fails. In these configurations, data moves in opposite […]

  • HACMP

    Short for high availability cluster multiprocessing, HACMP is an IBM cluster system for AIX-based computing platforms. IBM’s HACMP product was first released in 1991. All popular applications work with HACMP including DB2, Oracle, SAP, WebSphere, and others.

  • Hactivism

    Hactivism is the concept of hacking into a Web site or computer system in order to communicate a politically or socially motivated message. Hactivists conduct the same types of disruptive actions as malicious hackers but do so as a way to draw attention to a cause rather than as a means to cause harm or […]

  • Microsoft Safety Scanner

    Microsoft Safety Scanner is a free security tool that provides on-demand scanning for viruses, spyware and other malicious software. The Safety Scanner tool additionally offers the capability to remove some forms of malware. Microsoft Safety Scanner can be downloaded through Microsoft’s Safety and Security Center web site, which also provides the latest service packs, drivers, […]

  • i.LINK

    The name given to the Sony Corp. implementation of the IEEE 1394 standard. It’s the 4-pin or 6-pin bi-directional digital cable link between your Sony camcorder products and devices such as your PC or digital television, for example. i.LINK is also called FireWire or IEE 1394.