- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- greynet
Programs that network users download and install on their computers — usually without permission from or knowledge of the IT department. While some greynet applications are often useful (for example, instant messaging, streaming media and RSS software, peer-to-peer file sharing, peer-to-peer collaboration and proxy applications), they can also include or malicious programs (such as spyware).
- HTML Microdata
HTML microdata, an HTML5 specification, is used to label content to describe a specific type of information. It is machine-readable data that is embedded in HTML documents and compatible with other data formats, including RDF and JSON. The purpose of the microdata specification is to help automated programs to better understand the content of your […]
- screenager
A slang term used to describe teenagers who spend too much time in front of the screen (television or computer screens).
- patch cord
Also known as a patch cable, a patch cord is a piece of copper wire or fiber optic cable that connects circuits on a patch panel.
- Internet Telephony
A category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls. For users who have free, or fixed-price Internet access, Internet telephony software essentially provides free telephone calls anywhere in the world. To date, however, Internet telephony does not offer the same quality of telephone service […]