Browse Definitions :

Browse Definitions by Alphabet

GOO - GRA

  • Google Firebase - Google Firebase is a Google-backed application development software that enables developers to develop iOS, Android and Web apps.
  • Google Free Zone - Google Free Zone was an initiative created by Google that would allow Google members in certain parts of the world to access Gmail and other Google services for free.
  • Google Glass - Google Glass is a wearable, voice- and motion-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user's field of vision.
  • Google Hack Honeypot (GHH) - A Google hack honeypot is a system designed to be vulnerable to sophisticated search engine queries for the purpose of attracting hackers and studying their behavior.
  • Google hacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Google Hangouts - Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chats, either one-on-one or in a group.
  • Google Health - Google Health is a personal health record (PHR) service that allows users to centrally store and manage their health information online.
  • Google I/O - Google I/O is Google's developer conference held annually in San Francisco.
  • Google Knowledge Graph - Google Knowledge Graph is a knowledge base integrated with the Google search engine for a visually appealing and intuitive presentation of information related to queries.
  • Google Kubernetes Engine (GKE) - Google Kubernetes Engine (GKE) is a management and orchestration system for Docker containers and container clusters that run within Google's public cloud services.
  • Google Maps - Google Maps is a Web-based service that provides detailed information about geographical regions and sites around the world.
  • Google Mobile Services (GMS) - Google Mobile Services (GMS) is a collection of applications and API’s developed by Google that are available for Android devices, such as smartphones and tablets.
  • Google My Business - Google My Business is a free online business listing service that is integrated with the Google search engine.
  • Google News Initiative (GNI) - Google News Initiative (GNI) is a cooperative effort between Google and a number of large traditional news media providers to restore viewership of these channels as a claimed effort to support authoritative journalism.
  • Google Now - Google Now is a Web-based service provided by Google that serves as a day planner.
  • Google Pay (Android Pay) - Google Pay is the search company’s electronic wallet and payment service offering.
  • Google Play - Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.
  • Google Play (Android Market) - Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.
  • Google Play Protect - Google Play Protect is a malware protection and detection service built into Android devices that use Google Mobile Services.
  • Google Play services - The Google Play services app runs in the background on Android devices and gives apps access to core functionalities such as authentication services; it should not be disabled.
  • Google Preemptible VM - A Preemptible VM (PVM) is a Google Compute Engine (GCE) virtual machine (VM) instance that can be purchased for a steep discount as long as the customer accepts that the instance will terminate after 24 hours.
  • Google Project Zero - Google Project Zero is a security research unit within Google Inc.
  • Google scanning - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Google Sheets - Google Sheets is a web-based application that enables users to create, update and modify spreadsheets and share the data live online.
  • Google Stackdriver - Google Stackdriver is a tool that provides application and virtual machine monitoring services for Google Cloud Platform and Amazon Web Services.
  • Google Street View - Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world.
  • Google Titan - Google Titan is a security chip designed to protect computers from firmware-based rootkits and other malware-infecting firmware.
  • Google Transfer Appliance - Google Transfer Appliance is a high-capacity storage server that enables enterprises to transport large volumes of data to Google Cloud Storage.
  • Google Trends - Google Trends is a free service provided by Google that displays how often specific keywords, subjects and phrases have been searched for on Google over a period of time.
  • Google Voice - Google Voice allows registered members to link their mobile phones, IP telephony applications and land line phones to a single Google Voice phone number.
  • Google Wallet - Google Wallet is a mobile payment system developed by Google that allows smartphone users to store debit and credit card information for online and in-store purchases.
  • Google+ (Google Plus) - Google+ (pronounced Google plus) is Google's social networking platform.
  • Googlebot - Googlebot is the web crawling software search bot (also known as a spider or webcrawler) that gathers the web page information used to supply Google search engine results pages (SERP).
  • Googlehacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Googlewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Googlewhacking - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Googling - Googling is using the popular search engine Google.
  • googol - A googol is 10 to the 100th power (which is 1 followed by 100 zeros).
  • googol and googolplex - A googol is 10 to the 100th power (which is 1 followed by 100 zeros).
  • googolplex - A googol is 10 to the 100th power (which is 1 followed by 100 zeros).
  • Gopher - From about 1992 through 1996, Gopher was an Internet application in which hierarchically-organized text files could be brought from servers all over the world to a viewer on your computer.
  • gopherspace - Gopherspace is a term used to describe the aggregate of all the information on the thousands of Gopher servers in the world.
  • Gorilla Glass - Gorilla Glass is a scratch-resistant and durable glass product from Corning that is used to protect the screens of tablets, smartphone and other mobile devices.
  • Gorilla Glass 3 - Gorilla Glass 3 is a version of Corning's product for mobile device screens introduced at CES (Consumer Electronics Show) 2013.
  • gOS - gOS (pronounced gee-oss) is a Linux distribution designed for use with Web-based applications rather than software that must be purchased and installed.
  • GOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • gov - gov is one of the top-level domain names that can be used when choosing a domain name.
  • Governance Risk and Compliance - Governance, risk and compliance (GRC) is a combined area of focus developed to cover an organization's strategy to handle any interdependencies between the three components.
  • governance software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • Governance, Risk and Compliance (GRC) - Governance, risk and compliance (GRC) is a combined area of focus developed to cover an organization's strategy to handle any interdependencies between the three components.
  • Government Accountability Office (GAO) - The U.S.
  • government cloud computing plan - The United States government cloud computing plan, officially called the Federal Cloud Computing Initiative, is a plan to transition the US federal government's information technology infrastructure to web-based IT services.
  • Government Information Awareness - Government Information Awareness (GIA) is a Web site dedicated to making it easy for U.
  • Government Information Security Reform Act - The Government Information Security Reform Act (formerly known as the Thompson-Liebermann Act) is a federal law that required U.
  • government off-the-shelf - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • government spyware - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • government to government - Government to government (G2G) is the electronic sharing of data and/or information systems between government agencies, departments or organizations.
  • government to government (G2G) - Government to government (G2G) is the electronic sharing of data and/or information systems between government agencies, departments or organizations.
  • government Trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • government Trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • governmental trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • governmentwide acquisition contract - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • governmentwide acquisition contract (GWAC) - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • GPF - General protection fault (GPF, sometimes seen as general protection error) the name of an error caused when an application program (for example, Microsoft Word or the Netscape Web browser) tries to access storage that is not designated for its use.
  • GPGPU (general purpose graphics processing unit) - A general-purpose GPU (GPGPU) is a graphics processing unit (GPU) that performs non-specialized calculations that would typically be conducted by the CPU (central processing unit).
  • GPL - The GNU General Public License, often shortened to GNU GPL (or simply GPL), lists terms and conditions for copying, modifying and distributing free software.
  • GPO - Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
  • gpresult - Gpresult is a command-line tool that shows the RSoP (Resultant Set of Policy) for a user or computer based on applied Group Policy settings.
  • GPRS - General Packet Radio Services (GPRS) is a best-effort packet-switching protocol for wireless and cellular network communication services.
  • GPRS (General Packet Radio Services) - General Packet Radio Services (GPRS) is a best-effort packet-switching protocol for wireless and cellular network communication services.
  • GPS - Global Positioning System (GPS) technology enables the user, through approximately 30 well-spaced, earth-orbiting satellites, to pinpoint one's geographic location through ground receivers and mobile devices.
  • GPS cache hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPS coordinates - GPS coordinates are a unique identifier of a precise geographic location on the earth, usually expressed in alphanumeric characters.
  • GPS jamming - GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.
  • GPS messaging - GPS (Global Positioning System) messaging is a wireless messaging system for location-specific rather than recipient-specific messages.
  • GPS messaging (Global Positioning System messaging or mid-air messaging) - GPS (Global Positioning System) messaging is a wireless messaging system for location-specific rather than recipient-specific messages.
  • GPS navigation system - A GPS navigation system is a GPS receiver and audio/video (AV) components designed for a specific purpose such as a car-based or hand-held device or a smartphone app.
  • GPS stash hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPS stash hunting - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPS tracking - GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely.
  • GPS treasure hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPT-3 - GPT-3, or the third generation Generative Pre-trained Transformer, is a neural network machine learning model trained using internet data to generate any type of text.
  • GPU supercomputer - A GPU supercomputer is a networked group of computers with multiple graphics processing units working as general-purpose GPUs (GPGPUs) in tandem on a single task.
  • GR/IR clearing accounts - A GR/IR (goods-receipt/invoice-receipt) clearing account is a bookkeeping device that can be used when goods arrive before the invoice is generated, or when an invoice arrives before the goods are delivered.
  • GraalVM - GraalVM is a tool for developers to write and execute Java code.
  • Grace Hopper nanosecond - A Grace Hopper nanosecond is a visual aid that represents how fast electricity can travel in one billionth of a second.
  • graceful degradation - Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.
  • graceful shutdown and hard shutdown - Graceful shutdown and hard shutdown are two opposing methods of turning off a computer.
  • Graffiti - There are several ways of entering data into a personal digital assistant (PDA) such as the well-known Palm.
  • gram - The gram (abbreviation, g or gm) is the cgs (centimeter/gram/second) unit of mass.
  • gram (g or gm) - The gram (abbreviation, g or gm) is the cgs (centimeter/gram/second) unit of mass.
  • Gramm Leach Bliley Act - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • Gramm-Leach-Bliley Act - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • Gramm-Leach-Bliley Act (GLBA) - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
  • GRand Unified Bootloader - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • granularity - Granularity is the relative size, scale, level of detail, or depth of penetration that characterizes an object or activity.
  • graph analytics - Graph analytics is a category of software tools and data mining techniques that help an analyst understand the relationship between entries in a graph database.
  • graph database - A graph database is a type of NoSQL database that uses graph theory to store, map and query relationships.
  • Graph Search - Graph Search is a search engine that is integrated with Facebook’s social graphs.
  • graphene - Graphene is a highly conductive allotrope of carbon whose atoms are arranged in a mesh- like form a single atom thick.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close