• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • F_Port

    The Fabric port (F_Port) within a Fibre Channel fabric switch that is used to connect an N_Port to a switch. F_Ports are intermediate ports in virtual point-to-point links between end ports and can only be attached to N_Ports.

  • Coinbit

    Coinbit is a Trojan horse designed to steal users’ Bitcoin wallets. Coinbit targets Windows computers by homing in on the standard file location for a Bitcoin wallet before e-mailing the wallet to an address designated by the creator of the malware. The malware ‘s full name is Infostealer.Coinbit, and it was first discovered in the […]

  • Facebook commerce (F-Commerce)

    In ecommerce terminology, Facebook commerce, or F-commerce, is a strategy that focuses on developing or designing ecommerce content and storefront sites within the Facebook social networking site. Option 1: Create Your Own Facebook Commerce F-commerce can take the form of shopping tabs, which are part of a customized Facebook application that enables online retailers to […]

  • cascading windows

    An arrangement of windows such that they overlap one another. Typically, the title bar remains visible so that you can always see which windows are open. Cascading windows are also called overlaid windows. An alternative arrangement of windows, in which every window is completely visible, is called tiled windows.

  • J2EE

    Short for Java 2 Platform Enterprise Edition. J2EE is a platform-independent, Java-centric environment from Sun for developing, building and deploying Web-based enterprise applications online. The J2EE platform consists of a set of services, APIs, and protocols that provide the functionality for developing multitiered, Web-based applications. Some of the key features and services of J2EE: At […]