• Microsoft Edge

    Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]

  • Clutter

    Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder. The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile […]

  • Micro-Virtualization

    Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]

  • Mobile Application Management (MAM)

    Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]

  • a Microvisor

    The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments. Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a […]

  • CISSP

    (Certification for Information System Security Professional) A certification reflecting the qualifications of information systems security practitioners. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC)2 (www.isc2.org). The (ISC)2 promotes the […]

  • ASIX Electronics Corporation

    The corporate name of a fabless semiconductor supplier with focus on networking, communication and connectivity applications. ASIX Electronics develops a number of computer networking controllers, including embedded networking solutions for Fast Ethernet and Gigabit Ethernet. The company was founded in May 1995 in Hsinchu Science Park, Taiwan.

  • Linux Virtualization

    Linux virtualization refers to running one or more virtual machines on a physical computer that’s operated by the Linux open source operating system. Linux virtualization can be used for isolating specific apps, programming code or even an operating system itself, as well as for security and performance testing purposes. Powerful computers and hardware have made […]

  • server-side include

    Abbreviated SSI. A type of HTML comment that directs the Web server to dynamically generate data for the Web page whenever it is requested. The basic format for SSIs are:

  • 45 nanometer

    45 nanometer (45 nm) is the buzzword of choice (2007-2008) for an advanced semiconductor manufacturing process that Intel used for mass chip production, starting in late 2007. The 45 nanometer manufacturing process uses new materials, including hafnium-based high-k gate dielectrics and metal gates, to reduce electrical current leakage in transistors. Contrast with 90 nanometer.