Browse Definitions :
Definition

Microsoft Live Mesh

Live Mesh is a software-plus-services platform from Microsoft that synchronizes data between multiple computers, mobile devices and online services. The data is then accessible through any Web browser. The name of the platform is based upon from the concept of a mesh network, connecting the applications and data that an individual owns or regularly uses into a network.

To use Live Mesh, a user must first install client software, Mesh Operating Environment (MOE), on a personal computer and then add devices to the platform. Afterwards, whenever the user saves a file, folder, message, user permission or other new data on any one of the enabled devices, that action is ported into a feed and syndicated throughout the network. Live Mesh uses FeedSync, an extension to RSS and Atom, to aggregate the various data sources into single "newsfeed" that reflects all of that user's mesh activity. The platform includes an online storage service, Live Desktop, that enables designated folders and files to be accessible online through any Web browser. Users can connect directly to devices and manage synchronization settings from a remote desktop.

Live Mesh was introduced as a way for consumers to synchronize data, share information and collaborate with others. Developers can build or create applications on the platform. Live Mesh is a major component of Microsoft's cloud computing strategy, where user data or Web-based applications are stored and delivered as needed from data centers.

Live Mesh is based upon the existing technologies developed for other Microsoft Live services. Initial versions of the technology only work on PCs with Windows installed. Vista users must have User Account Control (UAC) enabled. Support for Linux, Apple computers, iPhones and Linux is expected in future iterations.


LEARN MORE ABOUT IT

The Live Mesh team maintains a blog at MSDN.com.

Jon Udell recorded an interview with Ray Ozzie introducing Live Mesh.

Ina Fried created an FAQ at News.com, "Making sense of Live Mesh."
This was last updated in May 2008

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close