• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • hardwired

    Refers to elements of a program or device that cannot be changed. Originally, the term was used to describe functionality that was built into the circuitry (i.e., the wires) of a device. Nowadays, however, the term is also used to describe constants built into software.

  • MACDefender

    MACDefender, or Mac Defender, is a Trojan horse that first appeared in early 2011, masquerading as an antivirus program in an attempt to get users to share their credit card information over an unsecured site. The MACDefender rogue antivirus software targets Mac users via a phishing scam that redirects the users from legitimate sites to […]

  • internal bus

    Another name for an internal data bus. Also, an expansion bus is often referred to as an internal bus.

  • page template

    A page template, or Web page template, often refers to a predesigned Web page that you can customize. The page template would include font, style, formatting, tables, graphics and other elements commonly found on a Web page. Using a Web authoring program, you can open the page template and easily customize the template to meet […]

  • thread bump

    In online forums and other online discussion spaces bump is the word used to describe an action (e.g. a message post) so that a particular thread is returned to the top in the list of threads. Some users may even post a message with only the word “bump” to indicate they are posting only to […]