Browse Definitions :

Browse Definitions by Alphabet

GOO - GRA

  • Google Now - Google Now is a Web-based service provided by Google that serves as a day planner.
  • Google Pay (Android Pay) - Google Pay is the search company’s electronic wallet and payment service offering.
  • Google Play - Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.
  • Google Play (Android Market) - Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.
  • Google Play Protect - Google Play Protect is a malware protection and detection service built into Android devices that use Google Mobile Services.
  • Google Play services - The Google Play services app runs in the background on Android devices and gives apps access to core functionalities such as authentication services; it should not be disabled.
  • Google Preemptible VM - A Preemptible VM (PVM) is a Google Compute Engine (GCE) virtual machine (VM) instance that can be purchased for a steep discount as long as the customer accepts that the instance will terminate after 24 hours.
  • Google Project Zero - Google Project Zero is a security research unit within Google Inc.
  • Google scanning - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Google Sheets - Google Sheets is a web-based application that enables users to create, update and modify spreadsheets and share the data live online.
  • Google Stackdriver - Google Stackdriver is a tool that provides application and virtual machine monitoring services for Google Cloud Platform and Amazon Web Services.
  • Google Street View - Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world.
  • Google Titan - Google Titan is a security chip designed to protect computers from firmware-based rootkits and other malware-infecting firmware.
  • Google Transfer Appliance - Google Transfer Appliance is a high-capacity storage server that enables enterprises to transport large volumes of data to Google Cloud Storage.
  • Google Trends - Google Trends is a free service provided by Google that displays how often specific keywords, subjects and phrases have been searched for on Google over a period of time.
  • Google Voice - Google Voice allows registered members to link their mobile phones, IP telephony applications and land line phones to a single Google Voice phone number.
  • Google Wallet - Google Wallet is a mobile payment system developed by Google that allows smartphone users to store debit and credit card information for online and in-store purchases.
  • Google+ (Google Plus) - Google+ (pronounced Google plus) is Google's social networking platform.
  • Googlebot - Googlebot is the web crawling software search bot (also known as a spider or webcrawler) that gathers the web page information used to supply Google search engine results pages (SERP).
  • Googlehacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Googlewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Googlewhacking - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Googling - Googling is using the popular search engine Google.
  • googol - A googol is 10 to the 100th power (which is 1 followed by 100 zeros).
  • googol and googolplex - A googol is 10 to the 100th power (which is 1 followed by 100 zeros).
  • googolplex - A googol is 10 to the 100th power (which is 1 followed by 100 zeros).
  • Gopher - From about 1992 through 1996, Gopher was an Internet application in which hierarchically-organized text files could be brought from servers all over the world to a viewer on your computer.
  • gopherspace - Gopherspace is a term used to describe the aggregate of all the information on the thousands of Gopher servers in the world.
  • Gorilla Glass - Gorilla Glass is a scratch-resistant and durable glass product from Corning that is used to protect the screens of tablets, smartphone and other mobile devices.
  • Gorilla Glass 3 - Gorilla Glass 3 is a version of Corning's product for mobile device screens introduced at CES (Consumer Electronics Show) 2013.
  • gOS - gOS (pronounced gee-oss) is a Linux distribution designed for use with Web-based applications rather than software that must be purchased and installed.
  • GOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • gov - gov is one of the top-level domain names that can be used when choosing a domain name.
  • Governance Risk and Compliance - Governance, risk and compliance (GRC) is a combined area of focus developed to cover an organization's strategy to handle any interdependencies between the three components.
  • governance software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • governance, risk management and compliance (GRC) - Governance, risk and compliance (GRC) refers to an organization's strategy for handling the interdependencies between corporate governance policies, enterprise risk management (ERM) programs, and regulatory and company compliance.
  • Government Accountability Office (GAO) - The U.S.
  • Government Information Awareness - Government Information Awareness (GIA) is a Web site dedicated to making it easy for U.
  • Government Information Security Reform Act - The Government Information Security Reform Act (formerly known as the Thompson-Liebermann Act) is a federal law that required U.
  • government off-the-shelf - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • government spyware - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • government to government - Government to government (G2G) is the electronic sharing of data and/or information systems between government agencies, departments or organizations.
  • government to government (G2G) - Government to government (G2G) is the electronic sharing of data and/or information systems between government agencies, departments or organizations.
  • government Trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • government Trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • governmental trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • governmentwide acquisition contract - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • governmentwide acquisition contract (GWAC) - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • GPF - General protection fault (GPF, sometimes seen as general protection error) the name of an error caused when an application program (for example, Microsoft Word or the Netscape Web browser) tries to access storage that is not designated for its use.
  • GPGPU (general purpose graphics processing unit) - A general-purpose GPU (GPGPU) is a graphics processing unit (GPU) that performs non-specialized calculations that would typically be conducted by the CPU (central processing unit).
  • GPL - The GNU General Public License, often shortened to GNU GPL (or simply GPL), lists terms and conditions for copying, modifying and distributing free software.
  • GPO - Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
  • gpresult - Gpresult is a command-line tool that shows the RSoP (Resultant Set of Policy) for a user or computer based on applied Group Policy settings.
  • GPRS - General Packet Radio Services (GPRS) is a best-effort packet-switching protocol for wireless and cellular network communication services.
  • GPRS (General Packet Radio Services) - General Packet Radio Services (GPRS) is a best-effort packet-switching protocol for wireless and cellular network communication services.
  • GPS - Global Positioning System (GPS) technology enables the user, through approximately 30 well-spaced, earth-orbiting satellites, to pinpoint one's geographic location through ground receivers and mobile devices.
  • GPS cache hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPS coordinates - GPS coordinates are a unique identifier of a precise geographic location on the earth, usually expressed in alphanumeric characters.
  • GPS jamming - GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.
  • GPS messaging - GPS (Global Positioning System) messaging is a wireless messaging system for location-specific rather than recipient-specific messages.
  • GPS navigation system - A GPS navigation system is a GPS receiver and audio/video (AV) components designed for a specific purpose such as a car-based or hand-held device or a smartphone app.
  • GPS stash hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPS stash hunting - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPS tracking - GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely.
  • GPS treasure hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
  • GPT-3 - GPT-3, or the third generation Generative Pre-trained Transformer, is a neural network machine learning model trained using internet data to generate any type of text.
  • GPU supercomputer - A GPU supercomputer is a networked group of computers with multiple graphics processing units working as general-purpose GPUs (GPGPUs) in tandem on a single task.
  • GR/IR clearing accounts - A GR/IR (goods-receipt/invoice-receipt) clearing account is a bookkeeping device that can be used when goods arrive before the invoice is generated, or when an invoice arrives before the goods are delivered.
  • GraalVM - GraalVM is a tool for developers to write and execute Java code.
  • Grace Hopper nanosecond - A Grace Hopper nanosecond is a visual aid that represents how fast electricity can travel in one billionth of a second.
  • graceful degradation - Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.
  • graceful shutdown and hard shutdown - Graceful shutdown and hard shutdown are two opposing methods of turning off a computer.
  • gram - The gram (abbreviation, g or gm) is the cgs (centimeter/gram/second) unit of mass.
  • gram (g or gm) - The gram (abbreviation, g or gm) is the cgs (centimeter/gram/second) unit of mass.
  • Gramm Leach Bliley Act - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • Gramm-Leach-Bliley Act - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • Gramm-Leach-Bliley Act (GLBA) - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
  • GRand Unified Bootloader - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • granularity - Granularity is the relative size, scale, level of detail, or depth of penetration that characterizes an object or activity.
  • graph analytics - Graph analytics is a category of software tools and data mining techniques that help an analyst understand the relationship between entries in a graph database.
  • graph database - A graph database is a type of NoSQL database that uses graph theory to store, map and query relationships.
  • Graph Search - Graph Search is a search engine that is integrated with Facebook’s social graphs.
  • graphene transistor - A graphene transistor is a nanoscale device based on graphene, a component of graphite with electronic properties far superior to those of silicon.
  • graphic equalizer - A graphic equalizer is a high-fidelity audio control that allows the user to see graphically and control individually a number of different frequency bands in a stereophonic system.
  • graphical password - A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
  • graphical user authentication - A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
  • graphical user interface - A GUI (usually pronounced "GOO-ee") is a graphical (rather than purely textual) user interface to a computer.
  • graphics accelerator - A graphics accelerator (a chipset attached to a video board) is a computer microelectronics component to which a computer program can offload the sending and refreshing of images to the display monitor and the computation of special effects common to 2-D and 3-D images.
  • graphics card - A video adapter (alternate terms include graphics card, display adapter, video card, video board and almost any combination of the words in these terms) is an integrated circuit card in a computer or, in some cases, a monitor that provides digital-to-analog conversion, video RAM, and a video controller so that data can be sent to a computer's display.
  • Graphics Interchange Format - The GIF (pronounced DJIF by many, including its designer; pronounced GIF with a hard G by many others) stands for Graphics Interchange Format and is one of the two most common file formats for graphic images on the World Wide Web.
  • Graphics Interchange Format Version 89a - A GIF89a graphics file is an image formatted according to Graphics Interchange Format (GIF) Version 89a (July, 1989).
  • graphics processing unit (GPU) - A graphics processing unit (GPU) is a computer chip that renders graphics and images by performing rapid mathematical calculations.
  • graphics tablet - A digitizer tablet (also known as a digitizer or graphics tablet) is a tool used to convert hand-drawn images into a format suitable for computer processing.
  • GraphQL - GraphQL is a query language that allows developers to ask for specific data and return that data from multiple sources through a single API call.
  • graphs - Data visualization is a graphical representation of numerical data.
  • GRASP (General Responsibility Assignment Software Patterns) - GRASP (General Responsibility Assignment Software Patterns) is a design pattern in software development used to assign responsibilities for different modules of code.
  • Grasshopper - Grasshopper is a free Android app made to teach the basics of coding in JavaScript.
  • grating light valve - Using grating light valve (GLV) technology, picture elements (pixels) are formed on the surface of a silicon chip and become the source for display projection on anything from an auditorium screen down to a handheld computer display.
  • grating light valve (GLV) - Using grating light valve (GLV) technology, picture elements (pixels) are formed on the surface of a silicon chip and become the source for display projection on anything from an auditorium screen down to a handheld computer display.
  • gravitation - Gravity, also called gravitation, is a force that exists among all material objects in the universe, attracting objects with non-zero mass toward each other.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk exposure

    Risk exposure is the quantified potential loss from business activities currently underway or planned.

SearchSecurity
  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • object storage

    Object storage, also called object-based storage, is an approach to addressing and manipulating data storage as discrete units, ...

  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

Close