• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • agate line

    In desktop publishing and word processing, it is the term used to describe a standard print advertising space, commonly used in newspaper adverts. An agate line is one column wide by one agate in depth, or 1/14 of an inch. As the column width varies by publication, the agate line is not an absolute size.

  • Google Sitemaps

    Google Sitemaps is an experiment in Web crawling by using Sitemaps to inform and direct Google search crawlers. Webmasters can place a Sitemap-formatted file on their Web server which enables Google crawlers to find out what pages are present and which have recently changed, and to crawl your site accordingly. Google Sitemaps is intended for […]

  • CISC

    Pronounced sisk, and stands for complex instruction set computer. Most personal computers, use a CISC architecture, in which the CPU supports as many as two hundred instructions. An alternative architecture, used by many workstations and also some personal computers, is RISC (reduced instruction set computer), which supports fewer instructions.

  • TnL

    TnL or T&L, short for Transform and Lighting it refers to a hardware feature found on some graphics cards. TnL is separate engines on the GPU that enable extremely high polygon count scenes. With TnL technology some or all of the 3-D information normally processed by the computer processor is processed by the GPU. Transform […]

  • front end

    (1) For software applications, front end is the same as user interface. (2) In client/server applications, the client part of the program is often called the front end and the server part is called the back end. (3) Compilers, the programs that translate source code into object code, are often composed of two parts: a […]