Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based security-focused hypervisor called a microvisor that creates hardware-isolated micro virtual machines (micro-VMs) for each computing task that utilizes data originating from an unknown source. Tasks in this sense are the computation that takes place within […]
Mobile Application Management (MAM) is a term that refers to software and services used to secure, manage and distribute mobile applications used in enterprise settings on mobile devices like smartphones and tablet computers. Mobile Application Management can apply to company-owned mobile devices as well as BYOD (“Bring Your Own Devices”). MAM solutions typically offer a […]
In computer viruses @mm is part of the McAfee naming convention for viruses and Trojans. McAfee attaches the @mm suffix to the end of a virus name to indicate that this virus can transmit itself via e-mail. The double m indicates a high-volume transmission, usually hundreds of e-mails per infected machine.
In computer viruses, @m is part of the McAfee naming convention for viruses and Trojans. McAfee attaches the @m suffix to the end of a virus name to indicate that this virus can transmit itself via e-mail. The single m indicates that this is a low-volume transmission, usually one e-mail transmitted per e-mail that a […]
Microsoft Office is Microsoft’s ubiquitous office suite for Microsoft Windows and Apple Mac OS X operating systems. Microsoft Office made its debut in 1990, with successive releases adding to the suite’s primary word processor (Microsoft Word), spreadsheet (Microsoft Excel), and presentation (Microsoft PowerPoint) applications with an e-mail / personal information manager application (Microsoft Outlook), database […]
(med’i-kuhl ahy-den’ti-tee theft) (n.) 1. The theft of personal information in order to obtain medical care, pharmaceutical services or even insurance coverage. As a result, erroneous entries may be placed into the victim’s existing medical records and impact the health care or insurance coverage of the victim. 2. False claims submitted using a patient��s personal […]
Slang term used to describe a tweet (a Twitter message) that you later regret having sent. See “Cool Twitter Tools for Better Tweeting” in the Did You Know…? section of
In computer programming, mandelbug is a classification of an unusual software bug that is so complex that its behavior appears chaotic or there is no practical solution to fix it. An examplele of this type of bug would be a fundamental design flaw in an operating system. The mandelbug was named after Professor Benoit Mandelbrot, […]
Monitter is the name of a free Twitter tool that lets users monitter the Twitter service for a set of three keywords. Monitter then shows you what people are tweeting for the keywords.
A motherboard form factor that is smaller than the standard ATX size of 300mm x 240mm. The Mini-ITX is 170mm x 170mm (slightly smaller than the micro-ATX) and reduces the size of standard desktops and computer towers. Mini-ITX was developed by VIA Technologies. See What You Need to Know About Motherboards in the Quick Reference […]