• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • Event Queue

    In enterprise messaging systems (EMS), the Event Queue (or Queues if running in more than one instance) is a queue of events (or asynchronous messages ) that is waiting to be processed by the receiving program.

  • Incident Management Activities

    In ITIL terminology, Incident Management Activities includes best practices for dealing with incident management, which is a set pattern of actions that can be taken to resolve the incident. Incident Management Activities include the following: Incident detection and reporting Classification and initial support Investigation and diagnosis Resolution and recovery Incident closure Incident ownership

  • URL (Uniform Resource Locator)

    URL is the abbreviation of Uniform Resource Locator. URL is the global address of documents and other resources on the World Wide Web. Parts of a URL The first part of the URL is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and […]

  • extended memory

    Memory above and beyond the standard 1MB (megabyte) of main memory that DOS supports. Extended memory is only available in PCs with an Intel 80286 or later microprocessor. Two types of memory can be added to a PC to increase memory beyond 1MB: expanded memory and extended memory. Expanded memory conforms to a published standard […]

  • member server

    As defined by Microsoft, in Active Directory server roles, computers that function as servers within a domain can have one of two roles: member server or domain controller. A member server is a computer that runs an operating system in the Windows 2000 Server family or the Windows Server 2003 family, belongs to a domain, […]