• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • voxel

    Short for volume pixel, the smallest distinguishable box-shaped part of a three-dimensional image. Voxelization is the process of adding depth to an image using a set of cross-sectional images known as a volumetric dataset. These cross-sectional images (or slices) are made up of pixels. The space between any two pixels in one slice is referred […]

  • FDE hard drive

    Short for full-disk encryption (FDE) hard drive it is a Seagate technology that performs encryption on the disk drive at the hardware level. The hard drive contains an ASIC chip that is used to encrypt every bit of data as it is written and also decrypts data as it is being read. The drive requires […]

  • portable image storage device

    A small, portable storage device used for storing and viewing your digital images. The device is a portable hard drive in an enclosure that resembles handheld game consoles. The device usually offers USB and memory card readers as options for transferring your images directly to the device, as well as an LCD display for viewing […]

  • Linux/CDorked

    A highly advanced and stealthy form of malware that targets backdoor exploits in Web servers like Apache, nginx and lighttpd. Linux/CDorked is one of the first strains of malware to reside entirely in memory, leaving little to no trace of itself on an infected server’s hard drives. According to an ESET security researcher in an […]

  • autosave

    A feature supported by many applications in which the program automatically saves data files at predetermined intervals. This is an important feature because it reduces the amount of work you would lose if your system crashed. Usually, you can specify how often you want the application to save data.