- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- exploit
A tool developed by hackers that is used to perform malicious attacks on computer systems. They are usually scripts that are designed to exploit weaknessness in software over a network, most commonly the Internet. Zero-Day is a common type of exploit.
- AIDC
(pronounced as separate letters) Short for automatic identification and data capture, or collection, a generic term for the process of capturing or collecting data via automatic means (i.e., without the use of a keyboard), such as RFID, bar code scanning, biometrics, smart cards, OCR or magnetic strips, and subsequently storing that data in a microprocessor-controlled […]
- Intercast
A protocol created by Intel in 1996 for broadcasting information, such as Web pages and programs, along with television signals to a PC. With Intercast, a user can watch television on one portion of a PC monitor while receiving relevant information often about the broadcast from the Web on another. To browse the Web for […]
- pit
The recessed area on a CD or DVD where data is stored. CDs and DVDs store data in lands and pits. The lands represent 1 and the pits represent 0 in binary computing. The bits are read by the disc drive that uses a laser beam to distinguish between the lands and pits based on […]
- Multitasking
The ability to execute more than one task at the same time, a task being a program. The terms multitasking and multiprocessing are often used interchangeably, although multiprocessing implies that more than one CPUis involved. In multitasking, only one CPU is involved, but it switches from one program to another so quickly that it gives […]