- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- probe message
In e-mail, a probe message is a type of bounce handling for e-mail address verification. It is commonly used in subscription-based mailing lists that easily become filled with invalid subscriber addresses. Once an e-mail has bounced from a specific address, a system will wait a specific amount of time then sends a warning message to […]
- digital home
As defined by the DLNA, the term digital home refers to a home network of CE, mobile and PC devices that cooperate transparently, delivering simple, seamless interoperability that enhances and enriches user experiences.
- orphan file
A file that no longer has a purpose. For example, when you uninstall an application, a few files that make up the application, or were generated by the application, may remain on your hard disk. These are orphan files since they serve no purpose without the application. In general, you can delete orphan files, but […]
- PEAP
Pronounced “peep” and short for Protected Extensible Authentication Protocol, a protocol developed jointly by Microsoft, RSA Security and Cisco for transmitting authentication data, including passwords, over 802.11 wireless networks. PEAP authenticates wireless LAN clients using only server-side digital certificates by creating an encrypted SSL/TLS tunnel between the client and the authentication server. The tunnel then […]
- SSTP
Short for Simple Symmetrical Transmission Protocol, SSTP is an application-layer protocol designed to allow two programs to engage in bi-directional, asynchronous communication. It supports multiple application endpoints over a single network connection between peer nodes and enables efficient utilization of communication resources. [Source: Groove Networks ]
