• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • pulse amplitude modulation

    A form of signal modulation in which the data is encoded in the amplitude of a series, or train, of regularly recurrent signal pulses. PAM is used less frequently than PCM.

  • Unstructured Data

    The phrase unstructured data usually refers to information that doesn’t reside in a traditional row-column database. As you might expect, it’s the opposite of structured data — the data stored in fields in a database. Examples of Unstructured Data Unstructured data files often include text and multimedia content. Examples include e-mail messages, word processing documents, […]

  • next hop

    Common routing term that indicates the IP address of the next hop to which packets for the entry should be forwarded.

  • hack tool

    A term used by the Symantec Security Response Center to describe tools that are used by a hacker (or unauthorized user) to attack, gain unwelcome access to or perform identification of your computer. Hack tools also generally attempt to gain information on or access hosts or bypass obvious security mechanisms inherent to the system it […]

  • ultraportable

    (ul´´-tra-p��rt´&-b&l) (n.) A class of laptop computer that is designed around its portability. Ultraportables typically weigh less than four pounds and, when closed, are 1.5″ thin or thinner. A common ultraportable also will have wireless networking capabilities, can have an internal optical drive, and capabilities to connect to an external storage device. Since the devices […]