• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • variable length subnet mask

    Variable Length Subnet Mask, abbreviated as VLSM, is a means to specify a different subnet mask for the same network number on different subnets. With VLSM, a network administrator can use a long mask on networks with few hosts and a short mask on subnets with many hosts. To use VLSM, the routing protocol must […]

  • memory leak

    A bug in a program that prevents it from freeing up memory that it no longer needs. As a result, the program grabs more and more memory until it finally crashes because there is no more memory left.

  • VoIP call

    A Voice over IP call, or VoIP call, utilizes packet-switched Voice over Internet Protocol (VoIP) or Internet telephony as opposed to the circuit-switched telephony used by the traditional Public Switched Telephone Network (PSTN). The advantage to VoIP phone calls is that unlike regular long-distance calls, calls made through a VoIP phone service are free – […]

  • Web Authoring

    (web â´th&r-ing) (1) (adj.) A category of software that enables the user to develop a Web site in a desktop publishing format. The software will generate the required HTML coding for the layout of the Web pages based on what the user designs. Typically, the user can toggle back and forth between the graphical design […]

  • cyberloafing

    Slang term used to describe employees who surf the net, write e-mail or other Internet-elated activities at work that are not related to their job. These activities are performed during periods of time when they are being paid by their employer. The individual is called a cyberloaf(er), while the act is cyberloafing. Same as cyberslacking.