- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- gateway antivirus
A feature of network security appliances that provides integrated antivirus security on the appliance to block potential threats before reaching the network. Gateway antivirus allows corporate and enterprise to check for viruses at the application layer using a web-based scanning service. A number of security vendors offer gateway antivirus solutions and the phrase is commonly […]
- warez
Pronounced wayrz or wayrss. Commercial software that has been pirated and made available to the public via a BBS or the Internet. Typically, the pirate has figured out a way to de-activate the copy-protection or registration scheme used by the software. Note that the use and distribution of warez software is illegal. In contrast, shareware […]
- Free Cooling
In data center terminology, free cooling is the phrase used to describe a strategy for reducing energy consumption by leveraging the natural low air temperatures and cooler climates in some geographical regions. In this process, naturally occurring cold outside air is used inside the data center to aid the cooling process. Leveraging cooler outside air […]
- jabber
(1) An error in which a faulty device (usually a NIC ) continuously transmits corrupted or meaningless data onto a network. This may halt the entire network from transmitting data beacuse other devices will perceive the network as busy. (2) A sent data packet greater than the maximum 1518 bytes specified in IEEE 802.3. To […]
- DAO
(1) Short for data access objects, objects that work with the Jet database engine. DAO objects are generally created with Visual Basic. Once created, a DAO object can be accessed and manipulated by any application that can use the Jet engine. This includes all of the applications in Microsoft Office, such as MS-Word, MS-Access, and […]