• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • shortcut key

    A special key combination that causes a specific command to be executed. Typically, shortcut keys combine the Ctrl or Alt keys with some other keys. In Windows environments, for example, Ctrl +C is used as the shortcut key to copy. On PCs, the function keys are also often used as shortcut keys. Most applications come […]

  • Jelly Bean (Android Codename)

    Jelly Bean is the dessert-themed Android codename for the 4.1 and 4.2 updates of the open source Android mobile operating system. Jelly Bean 4.1 debuted in June 2012 as the successor to the v4.0 “Ice Cream Sandwich” release, and was followed by Jelly Bean 4.2 in October 2012. New additions in Android Jelly Bean include […]

  • Data Center Tiers

    A four tier system that provides a simple and effective means for identifying different data center site infrastructure design topologies. The Uptime Institute’s tiered classification system is an industry standard approach to site infrastructure functionality addresses common benchmarking standard needs. The four tiers, as classified by The Uptime Institute include the following: Tier 1: composed […]

  • AF Servo

    On a digital SLR camera, an AF (auto-focus) Servo refers to the capability of the camera to continuously focus on a moving subject. When using the camera, you would normally press the shutter button to a halfway point, allow the camera’s auto-focus to engage, then press the shutter button all the way down to capture […]

  • Zero-Day exploit

    Called either Day Zero or Zero-Day, it is an exploit that takes advantage of a security vulnerability on the same day that the vulnerability becomes publicly or generally known. Zero-Day exploits are usually posted by well-known hacker groups. Software companies may issue a security bulletin or advisory when the exploit becomes known, but companies may […]