• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • proof-of-concept virus

    A proof of concept virus is written by an individual with advanced programming skills, usually to ‘show off’ their programming talents or to point out a vulnerability in a specific software. Usually authors of proof-of-concept viruses will send these programs to an anti-virus software developer, and the programmer would be more apt to produce a […]

  • SELinux

    Short for Security-enhanced Linux, SELinux is a Linux variation that can be fully integrated into the Linux 2.6 kernel series and also several Linux distributions. SELinux has no concept of a root user, instead it includes enhanced security functionality through enforced mandatory access controls (MAC). SELinux was created by the National Security Agency as an […]

  • ETNO

    Acronym for The European Telecommunications Network Operators’ Association. The European Telecommunications Network Operators’ Association was established in May 1992 and has become the principal policy group for European electronic communications network operators. ETNO’s primary purpose is to establish a constructive dialogue between its member companies and decision-makers and other actors involved in the development of […]

  • vlog

    (n.) Short for video blog, it is the term used to describe a blog that includes or consists of video clips. Typically updated daily (or with regular frequency) vlogs often reflect the personality or cause of the author. Also called vog. (v.) To author a video blog. Other forms: vlogger (a person who video blogs).

  • nanny cam

    A type of wireless or wired video surveillance system marketed to parents who want to use an in-home surveillance device to monitor their caregiver’s interactions with their children. Many video surveillance systems used as nanny cams can be hidden in small objects such as a child’s stuffed toy. There are privacy and legal issues to […]