- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- VDSL
Very High Speed Digital Subscriber Linetransmits data in the 13 Mbps – 55 Mbps range over short distances, usually between 1000 and 4500 feet (300 – 1500 meters), of twisted pair copper wire. The shorter the distance, the faster the connection rate. As the final length of cable into the home or office, VDSL connects […]
- e-mail spoofing
Forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. The main protocol that is used when sending e-mail — SMTP — does not include a way to authenticate. There is an SMTP service extension (RFC 2554) that allows an SMTP client to negotiate […]
- printout
A printed version of text or data. Another term for printout is hard copy.
- slack space
The unused space in a disk cluster. The DOS and Windows file systems use fixed-size clusters. Even if the actual data being stored requires less storage than the cluster size, an entire cluster is reserved for the file. The unused space is called the slack space. DOS and older Windows systems use a 16-bit file […]
- Big Iron
(1) Slang term used to mean a mainframe, a very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. It is widely believed that the term Big Iron was derived from early mainframes, which were enclosed in room-size metal frames. (2) Slang term used by hackers to describe large, expensive […]