• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • Return key

    Almost all computer keyboards have a key marked Return or Enter; the two names are synonymous. The Return key moves the cursor (or insertion point) to the beginning of the next line. But more important, it returns control to whatever program is currently running. After a program requests information from you (by displaying a prompt), […]

  • expansion board

    A printed circuit board that you can insert into a computer to give it added capabilities. For example, all of the following are expansion boards: video adapters graphics accelerators sound cards accelerator boards internal modems Expansion boards for PCs can be half-size (also half-length) or full-size (also full-length). Most PCs have slots for each type […]

  • accounting

    In information technology, accounting is the process of keeping track of a user’s activity while accessing a network’s resources, including the amount of time spent in the network, the services accessed while there and the amount of data transferred during the session. Accounting data is used for trend analysis, capacity planning, billing, auditing and cost […]

  • Routing and Remote Access Service

    Routing and Remote Access Service (RRAS), a Microsoft API that makes it possible to create applications to administer the routing and remote access service capabilities of the operating system. RRAS makes it possible for a computer to function as a network router, and developers can also use RRAS to implement routing protocols. The RRAS server […]

  • pharming

    Similar in nature to e-mail phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming ‘poisons’ a DNS server by infusing false information into the DNS server, resulting in […]