• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • awk

    An interpreted programming language that is included in most versions of UNIX. The name is derived from the initials of its creators — Alfred Aho, Peter Weinberger, and Brian Kernighan — who developed the language in 1977 and 1978. The language is particularly designed for filtering and manipulating textual data. In this respect, it is […]

  • MAE

    Short for Metropolitan Area Ethernet, a Network Access Point (NAP) where Internet Service Providers (ISPs) can connect with each other. The original MAE was set up by a company called MFS and is based in Washington, D.C. Later, MFS built another one in Silicon Valley, dubbed MAE-West. In addition to the MAEs from MFS, there […]

  • Internet radio

    An audio broadcasting service that is transmitted through the Internet. Internet radio is similar in nature to Internet broadcasting, also called webcasting. However, those listening to the continuous stream audio broadcast have no control over the stream, similar to traditional radio broadcasting. Many radio stations worldwide offer their broadcast via Internet radio to a worldwide […]

  • motion compensation and prediction

    In video editing motion compensation provides a prediction for the macroblock. When prediction is applied, the DCT is applied to conform to the prediction errors instead of to image samples. Good motion compensation prediction will result in a lower bit rate and still maintain decent quality. Also called motion compensated prediction.

  • rogue peer

    A rogue peer is an end-user computer-usually a laptop-that has both bridging and wireless enabled. Since the basic functions of an access point are bridging and wireless access, any laptop that has these capabilities presents a similar vulnerability or worse. The vulnerability with a rogue peer can be much more severe than with a rogue […]