• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • IOTP

    Internet Open Trading Protocol is an IETF specification which defines a way to create a trading environment that is more reliable and personal than existing methods by giving the consumer more opportunities to interact directly with all parties of a transaction. IOTP focuses on the transaction process; therefore, it is application and payment system independent. […]

  • YUV color space

    The YUV color space refers to the complete range of colors that can be displayed and recorded on digital video. The YUV color encoding system is used for analog television, such as NTSC and PAL.

  • link building

    In search engine optimization (SEO) terminology link building is the process of exchanging links with other Web sites to increase your own site’s backlinks and quality backlinks.

  • type-safe

    (adj.) Code that accesses only the memory locations it is authorized to access, and only in well-defined, allowable ways. Type-safe code cannot perform an operation on an object that is invalid for that object. The C# and VB.NET language compilers always produce type-safe code, which is verified to be type-safe during JIT compilation.

  • IBM ILOG

    IBM ILOG is a collection of tools, technologies and services designed to help customers more effectively and efficiently analyze, plan, track and improve business processes. IBM acquired the Business Rule Management Systems (BRMS), optimization, visualization and supply chain solutions provider in early 2009 and currently offers four main solutions in the IBM ILOG lineup as […]