- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
- Clutter
Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]
- Micro-Virtualization
Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
- Mobile Application Management (MAM)
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
- a Microvisor
The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]
- credential
(n.) An object that is verified when presented to the verifier in an authentication transaction. Credentials may be bound in some way to the individual to whom they were issued, or they may be bearer credentials. The former are necessary for identification, while the latter may be acceptable for some forms of authorization. Electronic credentials […]
- floating
(adj.) In graphical user interfaces, floating refers to application elements that you can move to different places. Many applications support floating toolbars, which are collections of icons that represent tools. By moving them wherever you want on the screen, you can create your own customized working environment. In addition to toolbars, many graphics programs support […]
- Google Now
Google Now is an intelligent personal assistant feature available for the Google Android and Apple iOS platforms. As with Apple’s Siri voice assistant, Google Now can answer queries and perform actions via voice commands using a natural language user interface. The real power of Google Now is that it additionally relies on a user’s preferences […]
- Scrapbook
In Macintosh environments, a desk accessory (DA) that enables you to store objects for future use. The Scrapbook is similar to the clipboard, but it allows more than one item to be stored in it at once. Also, it retains its contents when the computer is turned off.
- Journalism 2.0
A slang term used to describe how the Internet has changed journalism, enabling journalists to cover more stories in different ways. The slang term “Journalism 2.0” is used to reference the Web 2.0 technologies such as blogging, audio, video, social networks, and online reporting tools that journalists use today.��