Browse Definitions :

Browse Definitions by Alphabet

GRA - GVR

  • gravitational acceleration - Gravitational acceleration (symbolized g) is an expression used in physics to indicate the intensity of a gravitational field.
  • gravitational wave - A gravity wave (or gravitational wave) is a ripple in the curvature of the space-time continuum (the enmeshed combination of our three perceived physical dimensions, plus time) created by the movement of matter.
  • gravity - Gravity, also called gravitation, is a force that exists among all material objects in the universe, attracting objects with non-zero mass toward each other.
  • gravity (or gravitation) - Gravity, also called gravitation, is a force that exists among all material objects in the universe, attracting objects with non-zero mass toward each other.
  • gravity wave - A gravity wave (or gravitational wave) is a ripple in the curvature of the space-time continuum (the enmeshed combination of our three perceived physical dimensions, plus time) created by the movement of matter.
  • grawlix - A grawlix is a sequence of typographical symbols used to represent a non-specific, profane word or phrase.
  • gray - The gray (symbolized Gy) is the standard unit of absorbed ionizing-radiation dose, equivalent to one joule per kilogram (1 J · kg -1).
  • gray (Gy) - The gray (symbolized Gy) is the standard unit of absorbed ionizing-radiation dose, equivalent to one joule per kilogram (1 J · kg -1).
  • gray box analysis - Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program.
  • gray box testing - Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program.
  • gray box testing (gray box) - Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program.
  • gray goo - Gray goo (in British spelling, "grey goo") is a term used to describe what life on our planet might become if self-replicating robots or nanomachines got out of control and began to use up life forms for their own energy needs in some unstoppable way.
  • gray goo (or grey goo) - Gray goo (in British spelling, "grey goo") is a term used to describe what life on our planet might become if self-replicating robots or nanomachines got out of control and began to use up life forms for their own energy needs in some unstoppable way.
  • gray hat - Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.
  • gray market - The gray market (sometimes spelled as "grey market") is the collective system of unauthorized sales channels for products.
  • graylist - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • graynet - Greynet is a term for the use of unauthorized applications on a corporate network.
  • grayscale - Grayscale is a range of shades of gray without apparent color.
  • GRC - Governance, risk and compliance (GRC) is a combined area of focus developed to cover an organization's strategy to handle any interdependencies between the three components.
  • GRC software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • GRE - Generic Routing Encapsulation (GRE) is a simple protocol that encapsulates packets in order to route other protocols over IP networks, as defined by RFC 2784.
  • Greasemonkey - Greasemonkey is a browser extension that enables users to customize how Web sites display on their computers.
  • GreasemonkIE - Greasemonkey is a browser extension that enables users to customize how Web sites display on their computers.
  • Great Firewall of China - The Great Firewall of China is a national effort to protect Chinese corporate and state secrets and infrastructure from cyberattacks.
  • great recession - Great recession is a label used by journalists and  economists to describe a severe, prolonged economic downturn.
  • great recession (Great Recession) - Great recession is a label used by journalists and  economists to describe a severe, prolonged economic downturn.
  • greedy algorithm - A greedy algorithm is a mathematical process that looks for simple, easy-to-implement solutions to complex, multi-step problems by deciding which next step will provide the most obvious benefit.
  • green cloud - Green cloud is a label that describes the potential environmental benefits that information technology services delivered over the Internet can offer society.
  • green computing - Green computing is the use of computers and related resources in an environmentally responsible manner.
  • green data center - A green data center is a repository for the storage, management, and dissemination of data in which the mechanical, lighting, electrical and computer systems are designed for maximum energy efficiency and minimum environmental impact.
  • green incentives - A green data center is a repository for the storage, management, and dissemination of data in which the mechanical, lighting, electrical and computer systems are designed for maximum energy efficiency and minimum environmental impact.
  • green IT (green information technology) - Green IT (green information technology) is the practice of environmentally sustainable computing.
  • green marketing - Astroturfing is the artificial creation of a grassroots buzz for a product, service or political viewpoint.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.
  • green procurement - Green procurement is a continuous commitment to start-to-finish process management with consideration for environmental impact in business activities used to meet needs for materials, goods, utilities and services.
  • green roof - A green roof is the use of rooftop space for the growing of plants, either decorative vegetation or food crops.
  • green screen (blue screen) - Green screen (also blue screen) is the use of a single color as a backdrop in filming to make it simpler and easier to add backgrounds, characters or other images.
  • green storage - Green storage is the practice of using a variety of "clean energy" storage methods and products to cut down on a data center's carbon footprint, as well as cost.
  • Green Technology Terms: Glossary - This is a WhatIs.
  • green washing - Greenwashing is the practice of making an unsubstantiated or misleading claim about the environmental benefits of a product, service, technology or company practice.
  • greenfield deployment - In networking, a greenfield deployment is the installation and configuration of a network where none existed before, for example in a new office.
  • greenhouse effect - The Greenhouse effect is the warming effect of the sun on greenhouse gases like CO2 that act to trap this heat in our atmosphere.
  • greenhouse gas - A greenhouse gas is a gas that absorbs infrared (IR) radiation and radiates heat in all directions.
  • greenwashing - Greenwashing is the practice of making an unsubstantiated or misleading claim about the environmental benefits of a product, service, technology or company practice.
  • Gregorian calendar - The Gregorian calendar is the calendar in current use in the Western world, both as the civil and Christian ecclesiastical calendar.
  • grep - Grep, a UNIX command and also a utility available for Windows and other operating systems, is used to search one or more files for a given character string or pattern and, if desired, replace the character string with another one.
  • grey goo - Gray goo (in British spelling, "grey goo") is a term used to describe what life on our planet might become if self-replicating robots or nanomachines got out of control and began to use up life forms for their own energy needs in some unstoppable way.
  • grey hat - Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.
  • grey net - Greynet is a term for the use of unauthorized applications on a corporate network.
  • greylist - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • greylist (or graylist) - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • greynet - Greynet is a term for the use of unauthorized applications on a corporate network.
  • grid authentication - Grid authentication is a method of ensuring that an end user is who he claims to be by requiring him to enter values from specific cells in a grid whose content should be only accessible to him and the service provider.
  • grid computing - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
  • Gridstore HyperConverged Appliance (HCA) - Gridstore HyperConverged Appliance (HCA) is an all-flash storage device that includes compute, virtualization and networking resources.
  • grok - To grok (pronounced GRAHK) something is to understand something so well that it is fully absorbed into oneself.
  • Groovy - Groovy is a dynamic object-oriented programming language for the Java virtual machine (JVM) that can be used anywhere Java is used.
  • gross domestic product (GDP) - Gross domestic product (GDP) is the total amount of dollars made within a given location in the selling of all goods and services before deductions.
  • gross revenue - Gross revenue is the total of all money generated by a business, without taking into account any part of that total that has been or will be used for expenses.
  • ground - A ground is a direct electrical connection to the earth, a connection to a particular point in an electrical or electronic circuit, or an indirect connection that operates as the result of capacitance between wireless equipment and the earth or a large mass of conductive material.
  • Group Address Registration Protocol. - GARP (Generic Attribute Registration Protocol) is a local area network (LAN) protocol that defines procedures by which end stations and switches can register and de-register attributes, such as network identifiers or addresses, with each other.
  • group chat - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • group ID - In a Unix system, a GID (group ID) is a name that associates a system user with other users sharing something in common (perhaps a work project or a department name).
  • Group Policy - Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers.
  • Group Policy Editor (GP Editor) - Group Policy Editor is a tool that helps administrators manage policy settings in Microsoft Management Console (MMC) snap-ins.
  • Group Policy Management Console - The Group Policy Management Console (GPMC) is an interface that enables Active Directory administrators to manage Group Policy Objects (GPOs) from one console.
  • Group Policy Object - Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
  • Group Policy Object (GPO) - Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
  • Group Policy Preferences - Group Policy Preferences are a set of extensions, introduced in Windows Server 2008, that increase the functionality of Group Policy Objects.
  • group think - Group think (also spelled groupthink) is a phenomenon that occurs when group's need for consensus supersedes the judgment of individual group members.
  • Groupon - Groupon is a marketing service that offers its subscribers daily discount coupons by email, Facebook and Twitter feeds.
  • groupware - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • growth hacker - A growth hacker is a marketing professional with high-level IT skills.
  • growth hacking - Growth hacking is an approach to driving product adoption, usage and sales by experimental, innovative and low-cost means.
  • growth potential - Growth potential is an organization's future ability to generate larger profits, expand its workforce and ramp up its production.
  • gRPC - gRPC is a high performance, open source framework developed by Google to handle remote procedure calls (RPCs).
  • GRUB - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • GRUB (GRand Unified Bootloader) - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • GS1 - GS1 is a global, not-for-profit association that maintains standards for barcodes and RFID tags and for supply chain messaging such as Electronic Data Interchange (EDI).
  • GSA IT Schedule 70 - IT Schedule 70 is a long-term contract issued by the United States government.
  • GSM - GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
  • GSM (Global System for Mobile communication) - GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
  • GTAG - GTAG (Global Tag) is a standardization initiative of the Uniform Code Council (UCC) and the European Article Numbering Association (EAN) for asset tracking and logistics based on radio frequency identification (RFID).
  • GTAG (Global Tag) - GTAG (Global Tag) is a standardization initiative of the Uniform Code Council (UCC) and the European Article Numbering Association (EAN) for asset tracking and logistics based on radio frequency identification (RFID).
  • gTLD - A gTLD (generic top-level domain name) is the top-level domain name of an Internet address that identifies it generically as associated with some domain class, such as .
  • GUA - A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
  • guaranteed income - Guaranteed income is an umbrella term for a number of models designed to deliver funds to a given population.
  • guerilla marketing - In-house marketing is any marketing initiative that is not outsourced to a third party.
  • guest OS (guest operating system) - A guest OS (guest operating system) is the operating system installed on a virtual machine or partitioned disk.
  • guest virtual machine - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • guest virtual machine (guest VM) - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • guest VM - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • GUI - A GUI (usually pronounced "GOO-ee") is a graphical (rather than purely textual) user interface to a computer.
  • GUI (graphical user interface) - A GUI (usually pronounced "GOO-ee") is a graphical (rather than purely textual) user interface to a computer.
  • GUI testing (graphical user interface testing) - GUI testing is the process of ensuring proper functionality of the graphical user interface (GUI) for a given application and making sure it conforms to its written specifications.
  • GUID - A GUID (global unique identifier) is a term used by Microsoft for a number that its programming generates to create a unique identity for an entity such as a Word document.
  • GUID (global unique identifier) - A GUID (globally unique identifier) is a 128-bit text string that represents an identification (ID).
  • Guidelines for Definition of Managed Objects - GDMO (Guidelines for Definition of Managed Objects) is a standard for defining objects in a network in a consistent way.
  • gummy bear hack - A gummy bear hack is an attempt to fool a biometric fingerprint scanner by using a gelatin-based candy to hold a fingerprint.
  • GVRP - GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network .
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk exposure

    Risk exposure is the quantified potential loss from business activities currently underway or planned.

SearchSecurity
  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • object storage

    Object storage, also called object-based storage, is an approach to addressing and manipulating data storage as discrete units, ...

  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

Close