• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • must-carry

    In digital television the term must-carry is used to describe the legal obligation of a cable company (the carrier) to carry analog or digital signal broadcasts.

  • contact image sensor

    (kon´takt im´ij sen´s&r) (n.) Abbreviated as CIS, a type of optical flatbed scanner that does not use the traditional CCD arrays that rely on a system of mirrors and lenses to project the scanned image onto the arrays. CIS scanners gather light from red, green and blue LEDs (which combine to provide white light) and […]

  • branch

    In tree structures, a branch is a single line of the tree that ends with a leaf. The Windows File Manager, for example, has an Expand Branch command that shows all sub-directories of a specified directory.

  • lossless compression

    Refers to data compression techniques in which no data is lost. The PKZIP compression technology is an example of lossless compression. For most types of data, lossless compression techniques can reduce the space needed by only about 50%. For greater compression, one must use a lossy compression technique. Note, however, that only certain types of […]

  • undocumented

    Refers to features that are not described in the official documentation of a product. This lack of documentation can occur for a variety of reasons, including oversight. More often, though, undocumented features are features that were included because they were useful to the programmers developing the product but were deemed either unnecessary or potentially dangerous […]