- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- Logical Domain
In virtualization terminology, Logical Domains (LDom) is a technology for server virtualization that enable users to allocate system resources, such as memory or devices into logical groupings in order to create multiple virtual machines. Each of these virtual machines can use its own operating system, have its own resources and also be identified as a […]
- CU-SeeMe
A videoconferencing program that utilizes the Internet to transmit audio and video signals. There is a freeware version of CU-SeeMe developed at Cornell University. In June 2001, CU-SeeMe merged with First Virtual Communications, and has extended the point-to-point capabilities of the original CU-SeeMe application into a software multipoint control unit, known as Conference Server – […]
- zoning
(zōn´ing) (n.) The process of allocating resources in a SAN to load balance the devices connected to the network. Zoning allows the network administrator to separate the SAN into units and allocate storage to those units based on need. Zoning protects the SAN system from such threats as viruses, data corruption and malicious hackers as […]
- Kevin Mitnick
) Kevin David Mitnick is one of the most famous criminal hackers to be jailed and convicted. Born August 6, 1963, Mitnick earned the title of ‘the most wanted computer criminal in U.S. history’.In 1995 he was arrested, and then served close to five years in a federal prison for the charges of wire fraud, […]
- expanded memory
Also known as EMS (Expanded Memory Specification), expanded memory is a technique for utilizing more than 1MB of main memory in DOS -based computers. The limit of 1MB is built into the DOS operating system. The upper 384K is reserved for special purposes, leaving just 640K of conventional memory for programs. There are several versions […]