- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- EDI
Short for Electronic Data Interchange, the transfer of data between different companies using networks, such as VANs or the Internet. As more and more companies get connected to the Internet, EDI is becoming increasingly important as an easy mechanism for companies to buy, sell, and trade information. ANSI has approved a set of EDI standards […]
- cartooney
A slang term used to mean “cartoon attorney.” The word is used to describe a type of email spam message — or unsolicited email — that is written in such a way that a spammer wants the recipient to believe lawyers and legal threats that they mention in the e-mail are legitimate. These types of […]
- stemming
In search engine terminology, stemming is the comparison of a search engine query to the root form of a word used in the query. For example, a user may search for the term “cheaper,” but a search engine that uses stemming technology may return search results (SERP) for any word that contains the root form […]
- HTML5
HTML5 is a W3C specification that defines the fifth major revision of the Hypertext Markup Language (HTML). One of the major changes in HTML5 is in respect to how HTML addresses Web applications. Other new features in HTML5 include specific functions for embedding graphics, audio, video, and interactive documents. New elements also allow you to […]
- Virtual Memory
)(n.) An imaginary memory area supported by some operating systems (for example, Windows but not DOS) in conjunction with the hardware. You can think of virtual memory as an alternate set of memory addresses. Programs use these virtual addresses rather than real addresses to store instructions and data. When the program is actually executed, the […]