• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • Toggle

    To switch from one setting to another. The term toggle implies that there are only two possible settings and that you are switching from the current setting to the other setting. A toggle switch is a switch that has just two positions. For example, light switches that turn a light on or off are toggle […]

  • TCB

    Short for trusted computing base. TCB refers to the totality of protection mechanisms (hardware, firmware and software) that provide a secure computing environment. The TCB includes everything that must be trusted — access control, authorization and authentication procedures, cryptography, firewalls, virus protection, data backup, and even human administration — in order for the right level […]

  • A-List blogger

    A term used to describe a group of elite bloggers who post daily on their blogs and receive a huge number of links back to the blog they write. The defining element of an A-List blogger is the size of the blog’s readership (e.g. its traffic). See “The History of Blogging” in the Quick Reference […]

  • K6

    A microprocessor from AMD that supports the MMX instruction set. The K6 is completely compatible with Intel’s Pentium processors.

  • Data Loss Prevention (DLP)

    Data loss prevention, or DLP, refers to technology or software developed to protect and prevent the potential for data loss or theft. Data loss protection software is designed to monitor, detect and prevent the loss of data while it’s at rest, either in on-premises storage drives or in the cloud, as well as when it’s […]