• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • page break

    The end of a page of text. In word-processing systems, you can enter special codes, called hard page breaks or forced page breaks, that cause the printer to advance to the next page. Without hard page breaks, the word processor automatically begins a new page after a page has been filled (this depends on the […]

  • FOMC

    Online chat acronym for “falling off my chair”. FOMC is commonly used in newsgroups/a>, chat rooms, instant messaging, text messaging, SMS, e-mail and other real time text-based communications.

  • punchdown block

    (n.) A device that connects one group of wires to another group of wires through a system of metal pegs that the wires are attached to, often used in telecommunications closets that support local-area networks. Punchdown blocks are the predecessors to patch panels and were commonly used to support low-bandwidth Ethernet and token-ring networks. Punchdown […]

  • Graphic Interchange Format (GIF)

    Pronounced jiff or giff (hard g) stands for graphics interchange format, a bit-mapped graphics file format used by the World Wide Web, CompuServe and many BBSs. GIF supports color and various resolutions. It also includes data compression, but because it is limited to 256 colors, it is more effective for scanned images such as illustrations […]

  • anti spam (anti-spam)

    (adj.) The phrase anti spam (or anti-spam)Refers to any software, hardware or process that is used to combat the proliferation of spam or to keep spam from entering a system. For example, a Bayesian filter is an anti spam software application, and the use of opt-in e-mail is an anti spam process.