• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • Data Sending Trojan

    A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. These Trojans can look for specific pre-defined data (e.g., just credit card information or passwords), or they could install a keylogger and send all recorded […]

  • precedence

    A characteristic of operators that indicates when they will be evaluated when they appear in complex expressions. Operators with high precedence are evaluated before operators with low precedence. For example, the multiplication operator (*) has higher preference than the addition operator (+), so the expression 2+3*4 equals 14, not 20. You can override precedence rules […]

  • memristor

    Short for memory resistor, memristor is a passive two-terminal electronic device that is designed to express only the property of memristance. Memristors are being tested by HP Labs to create a more dense and energy-efficient memory chip. It is believed that chips embedded with memristors would function similar to flash drives and retain data, even […]

  • Fasgrolia

    Fasgrolia is the name for the fast -growing language of abbreviations, initialisms, and acronyms.

  • twinaxial cable

    Abbreviated as twinax, a twinaxial cable is a cable with three conductors. Two conductors are insulated wires in the center of the cable. The other conductor surrounds the first two conductors and they are separated by a layer of insulation. Typically, twinax is used to connect AS/400 computers with its devices.