Browse Definitions :

Browse Definitions by Alphabet

GOO - GPS

  • Google Cloud Key Management Service (KMS) - Google Cloud Key Management Service (KMS) is a cloud service for managing encryption keys for other Google cloud services that enterprises can use to implement cryptographic functions.
  • Google Cloud Platform (GCP) - Google Cloud Platform is a suite of public cloud computing services offered by Google.
  • Google Cloud Print - Google Cloud Print is an online service that lets users print documents and other files from supported apps and mobile devices to any compatible printer.
  • Google Cloud Spanner - Google Cloud Spanner is a distributed relational database service that runs on Google Cloud.
  • Google Cloud Storage - Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.
  • Google Cloud Storage Coldline - Google Cloud Storage Coldline is a public cloud cold storage service from Google intended for archiving and disaster recovery.
  • Google Cloud Storage Nearline - Google Cloud Storage Nearline is a public cloud storage service from Google intended for data archiving, backup and disaster recovery.
  • Google Compute Engine - Google Compute Engine is an Infrastructure as a Service (IaaS) offering that allows clients to run workloads on Google's physical hardware.
  • Google Coop - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
  • Google Docs - Google Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online.
  • Google dork - A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet.
  • Google dork query - Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries.
  • Google Drive - Google Drive is a free cloud-based storage service that enables users to store and access files online.
  • Google Duplex - Google Duplex is an artificial intelligence (AI) chat agent that can carry out specific verbal tasks, such as making a reservation or appointment, over the phone.
  • Google E-A-T - Google EAT (Expertise Authority Trustworthiness) is a ranking system for online content.
  • Google Fi - Google Fi is virtual carrier network service for pervasive Wi-Fi.
  • Google Fiber - Google Fiber is a project whose goal is to build a fiber optic communications infrastructure.
  • Google Firebase - Google Firebase is a Google-backed application development software that enables developers to develop iOS, Android and Web apps.
  • Google Free Zone - Google Free Zone was an initiative created by Google that would allow Google members in certain parts of the world to access Gmail and other Google services for free.
  • Google Glass - Google Glass is a wearable, voice- and motion-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user's field of vision.
  • Google Hack Honeypot (GHH) - A Google hack honeypot is a system designed to be vulnerable to sophisticated search engine queries for the purpose of attracting hackers and studying their behavior.
  • Google hacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Google hacking (Google scanning or Engine hacking) - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Google Hangouts - Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chats, either one-on-one or in a group.
  • Google Health - Google Health is a personal health record (PHR) service that allows users to centrally store and manage their health information online.
  • Google I/O - Google I/O is Google's developer conference held annually in San Francisco.
  • Google Knowledge Graph - Google Knowledge Graph is a knowledge base integrated with the Google search engine for a visually appealing and intuitive presentation of information related to queries.
  • Google Kubernetes Engine (GKE) - Google Kubernetes Engine (GKE) is a management and orchestration system for Docker containers and container clusters that run within Google's public cloud services.
  • Google Maps - Google Maps is a Web-based service that provides detailed information about geographical regions and sites around the world.
  • Google Mobile Services (GMS) - Google Mobile Services (GMS) is a collection of applications and API’s developed by Google that are available for Android devices, such as smartphones and tablets.
  • Google My Business - Google My Business is a free online business listing service that is integrated with the Google search engine.
  • Google News Initiative (GNI) - Google News Initiative (GNI) is a cooperative effort between Google and a number of large traditional news media providers to restore viewership of these channels as a claimed effort to support authoritative journalism.
  • Google Now - Google Now is a Web-based service provided by Google that serves as a day planner.
  • Google Pay (Android Pay) - Google Pay is the search company’s electronic wallet and payment service offering.
  • Google Play - Google Play, formerly known as the Android Market, is the official app store for Android smartphones and tablets.
  • Google Play (Android Market) - Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.
  • Google Play Protect - Google Play Protect is a malware protection and detection service built into Android devices that use Google Mobile Services.
  • Google Play services - The Google Play services app runs in the background on Android devices and gives apps access to core functionalities such as authentication services; it should not be disabled.
  • Google Preemptible VM - A Preemptible VM (PVM) is a Google Compute Engine (GCE) virtual machine (VM) instance that can be purchased for a steep discount as long as the customer accepts that the instance will terminate after 24 hours.
  • Google Project Zero - Google Project Zero is a security research unit within Google Inc.
  • Google scanning - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Google Spreadsheets - Google Spreadsheets is a Web-based application that allows users to create, update and modify spreadsheets and share the data live online.
  • Google Stackdriver - Google Stackdriver is a tool that provides application and virtual machine monitoring services for Google Cloud Platform and Amazon Web Services.
  • Google Street View - Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world.
  • Google Titan - Google Titan is a security chip designed to protect computers from firmware-based rootkits and other malware-infecting firmware.
  • Google Transfer Appliance - Google Transfer Appliance is a high-capacity storage server that enables enterprises to transport large volumes of data to Google Cloud Storage.
  • Google Trends - Google Trends is a free service provided by Google that displays how often specific keywords, subjects and phrases have been searched for on Google over a period of time.
  • Google Voice - Google Voice allows registered members to link their mobile phones, IP telephony applications and land line phones to a single Google Voice phone number.
  • Google Wallet - Google Wallet is a mobile payment system developed by Google that allows smartphone users to store debit and credit card information for online and in-store purchases.
  • Google+ (Google Plus) - Google+ (pronounced Google plus) is Google's social networking platform.
  • Googlebot - Googlebot is the web crawling software search bot (also known as a spider or webcrawler) that gathers the web page information used to supply Google search engine results pages (SERP).
  • Googlehacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Googlewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Googlewhacking - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Googling - Googling is using the popular search engine Google.
  • googol - A googol is 10 to the 100th power (which is 1 followed by 100 zeros).
  • googol and googolplex - A googol is 10 to the 100th power (which is 1 followed by 100 zeros).
  • googolplex - A googol is 10 to the 100th power (which is 1 followed by 100 zeros).
  • Gopher - From about 1992 through 1996, Gopher was an Internet application in which hierarchically-organized text files could be brought from servers all over the world to a viewer on your computer.
  • gopherspace - Gopherspace is a term used to describe the aggregate of all the information on the thousands of Gopher servers in the world.
  • Gorilla Glass - Gorilla Glass is a scratch-resistant and durable glass product from Corning that is used to protect the screens of tablets, smartphone and other mobile devices.
  • Gorilla Glass 3 - Gorilla Glass 3 is a version of Corning's product for mobile device screens introduced at CES (Consumer Electronics Show) 2013.
  • gOS - gOS (pronounced gee-oss) is a Linux distribution designed for use with Web-based applications rather than software that must be purchased and installed.
  • GOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • gov - gov is one of the top-level domain names that can be used when choosing a domain name.
  • Governance Risk and Compliance - Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components.
  • governance software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • Governance, Risk and Compliance (GRC) - Governance, risk and compliance (GRC) is a combined area of focus developed to cover an organization's strategy to handle any interdependencies between the three components.
  • Government Accountability Office (GAO) - The U.S.
  • government cloud computing plan - The United States government cloud computing plan, officially called the Federal Cloud Computing Initiative, is a plan to transition the US federal government's information technology infrastructure to web-based IT services.
  • Government Information Awareness - Government Information Awareness (GIA) is a Web site dedicated to making it easy for U.
  • Government Information Awareness (GIA) - Government Information Awareness (GIA) is a Web site dedicated to making it easy for U.
  • Government Information Security Reform Act - The Government Information Security Reform Act (formerly known as the Thompson-Liebermann Act) is a federal law that required U.
  • government off-the-shelf - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • government spyware - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • government to government - Government to government (G2G) is the electronic sharing of data and/or information systems between government agencies, departments or organizations.
  • government to government (G2G) - Government to government (G2G) is the electronic sharing of data and/or information systems between government agencies, departments or organizations.
  • government Trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • government Trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • governmental trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • governmentwide acquisition contract - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • governmentwide acquisition contract (GWAC) - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • GPF - General protection fault (GPF, sometimes seen as general protection error) the name of an error caused when an application program (for example, Microsoft Word or the Netscape Web browser) tries to access storage that is not designated for its use.
  • GPGPU (general purpose graphics processing unit) - A general-purpose GPU (GPGPU) is a graphics processing unit (GPU) that performs non-specialized calculations that would typically be conducted by the CPU (central processing unit).
  • GPL - The GNU General Public License, often shortened to GNU GPL (or simply GPL), lists terms and conditions for copying, modifying and distributing free software.
  • GPO - In the Windows 2000 operating system, a Group Policy Object (GPO) is a collection of settings that define what a system will look like and how it will behave for a defined group of users.
  • gpresult - Gpresult is a command-line tool that shows the RSoP (Resultant Set of Policy) for a user or computer based on applied Group Policy settings.
  • GPRS - General Packet Radio Services (GPRS) is a packet-based wireless communication service that promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users.
  • GPRS (General Packet Radio Services) - General Packet Radio Services (GPRS) is a best-effort packet-switching protocol for wireless and cellular network communication services.
  • GPS - Global Positioning System (GPS) technology enables the user, through approximately 30 well-spaced, earth-orbiting satellites, to pinpoint one's geographic location through ground receivers and mobile devices.
  • GPS cache hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPS coordinates - GPS coordinates are a unique identifier of a precise geographic location on the earth, usually expressed in alphanumeric characters.
  • GPS jamming - GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.
  • GPS messaging - GPS (Global Positioning System) messaging is a wireless messaging system for location-specific rather than recipient-specific messages.
  • GPS messaging (Global Positioning System messaging or mid-air messaging) - GPS (Global Positioning System) messaging is a wireless messaging system for location-specific rather than recipient-specific messages.
  • GPS navigation system - A GPS navigation system is a GPS receiver and audio/video (AV) components designed for a specific purpose such as a car-based or hand-held device or a smartphone app.
  • GPS stash hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPS stash hunting - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPS tracking - GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely.
  • GPS treasure hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • block cipher

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close