- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- Excel borders
In the Microsoft Excel program, “borders” is a built-in tool that lets users access predefined border styles to add a border around two or more cells on a spreadsheet. You can also use the borders tool to create your own custom border.
- CompTia Security+
The CompTia Security+ certification is an internationally recognized industry credential. Security+ certifies that information security professionals are knowledgeable and experienced in information security (at least 2 years). Training and preparation for the Security+ certification can be completed online or at training centers around the world.
- ZigBee
Pioneered by Philips Semiconductors, ZigBee is a low data rate, two-way standard for home automation and data networks. The standard originates from the Firefly Working Group and provides a specification for up to 254 nodes including one master, managed from a single remote control. Real usage examples of ZigBee includes home automation tasks such as […]
- cable head-end
A cable television company’s local facility that originates and communicates cable modem and cable TV services to its subscribers. The cable company’s head-end includes the CMTS, which is essential in providing high-speed Internet access to cable subscribers.
- multiplier lock
The multiplier lock is used by CPU manufacturers to prevent consumers and dealers from overclocking the CPU. When overclocking became mainstream, profit margins for CPU manufacturers lowered because users wouldn’t need to upgrade to a faster processor. When locked, the multiplier–the factor by which the bus speed is multiplied to derive the CPU speed–is stuck […]