• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • label

    (1) A name. (2) For mass storage devices, a label is the name of a storage volume. It is sometimes referred to as a volume label. Each operating system has its own set of rules for labeling volumes. The label provides a mnemonic name that indicates what type of information is stored on the media. […]

  • PowerMat

    PowerMat is a wireless charging technology developed to wirelessly power electronic devices such as smartphones, tablets and wearable computing products. The Power Matters Alliance (PMA) is the group responsible for the development of PowerMat charging devices and the wireless charging technology. PowerMat solutions first hit the market in 2009, and in 2012 PowerMat products began […]

  • lockstep processor technique

    A processor lockstep is a technique used to achieve high reliability in a microprocessor system. This is done by adding a second identical processor to a system that monitors and verifies the operation of the system processor. * The two processors are initialized to the same state during system start-up, and they receive the same […]

  • RS-232C

    )Short for recommended standard-232C, a standard interface approved by the Electronic Industries Alliance (EIA) for connecting serial devices. In 1987, the EIA released a new version of the standard and changed the name to EIA-232-D. And in 1991, the EIA teamed up with Telecommunications Industry association (TIA) and issued a new version of the standard […]

  • hang

    To crash in such a way that the computer does not respond to input from the keyboard or mouse. If your computer is hung, you usually need to reboot it, although sometimes hitting the correct sequence of control characters will free it up.