- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- reboot
To restart a computer. In DOS, you can reboot by pressing the Alt, Control and Delete keys simultaneously. This is called a warm boot. You can also perform a cold boot by turning the computer off and then on again. On a PC running Microsoft Windows you reboot by selecting the “Shut Down” option from […]
- Key Fob
A fob, or more commonly called a key fob, is a small security hardware device with built-in authentication used to control and secure access to network services and data. The key fob displays a randomly generated access code, which changes periodically, usually every 30 to 60 seconds. A user first authenticates themselves on the key […]
- Hyper CD-ROM
The Hyper CD-ROM is a tri-dimensional multilayer optical memory, based on the phenomenon of controlled extinction of the fluorescence. The Hyper CD-ROM allows the recording of information inside the a glass disk using laser beams. The glass disk has a storing capacity of over 10,000 Gigabytes (GB) of memory. The Hyper CD-ROM was invented by […]
- PhotoREt
An HP printing technology that helps provide more vivid prints from digital photos. HP printers that use HP PhotoREt technology have two separate ink cartridges. One tricolor cartridge contains full dye-load inks in cyan, magenta, and yellow while the second ink cartridge contains light dye-load inks of light cyan and light magenta, as well as […]
- line printer
A high-speed printer capable of printing an entire line at one time. A fast line printer can print as many as 3,000 lines per minute. The disadvantages of line printers are that they cannot print graphics, the print quality is low, and they are very noisy.
