Browse Definitions :

Browse Definitions by Alphabet

GPU - GRI

  • GPU supercomputer - A GPU supercomputer is a networked group of computers with multiple graphics processing units working as general-purpose GPUs (GPGPUs) in tandem on a single task.
  • GR/IR clearing accounts - A GR/IR (goods-receipt/invoice-receipt) clearing account is a bookkeeping device that can be used when goods arrive before the invoice is generated, or when an invoice arrives before the goods are delivered.
  • GraalVM - GraalVM is a tool for developers to write and execute Java code.
  • Grace Hopper nanosecond - A Grace Hopper nanosecond is a visual aid that represents how fast electricity can travel in one billionth of a second.
  • graceful degradation - Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.
  • graceful shutdown and hard shutdown - Graceful shutdown and hard shutdown are two opposing methods of turning off a computer.
  • Graffiti - There are several ways of entering data into a personal digital assistant (PDA) such as the well-known Palm.
  • gram - The gram (abbreviation, g or gm) is the cgs (centimeter/gram/second) unit of mass.
  • gram (g or gm) - The gram (abbreviation, g or gm) is the cgs (centimeter/gram/second) unit of mass.
  • Gramm Leach Bliley Act - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • Gramm-Leach-Bliley Act - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • Gramm-Leach-Bliley Act (GLBA) - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • GRand Unified Bootloader - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • granularity - Granularity is the relative size, scale, level of detail, or depth of penetration that characterizes an object or activity.
  • graph analytics - Graph analytics is a category of software tools and data mining techniques that help an analyst understand the relationship between entries in a graph database.
  • graph database - A graph database is a type of NoSQL database that uses graph theory to store, map and query relationships.
  • Graph Search - Graph Search is a search engine that is integrated with Facebook’s social graphs.
  • graph theory - Graph theory is the study of points and lines.
  • graphene - Graphene is a highly conductive allotrope of carbon whose atoms are arranged in a mesh- like form a single atom thick.
  • graphene transistor - A graphene transistor is a nanoscale device based on graphene, a component of graphite with electronic properties far superior to those of silicon.
  • graphic equalizer - A graphic equalizer is a high-fidelity audio control that allows the user to see graphically and control individually a number of different frequency bands in a stereophonic system.
  • graphical password - A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
  • graphical password or graphical user authentication (GUA) - A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
  • graphical user authentication - A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
  • graphical user interface - A GUI (usually pronounced "GOO-ee") is a graphical (rather than purely textual) user interface to a computer.
  • graphics accelerator - A graphics accelerator (a chipset attached to a video board) is a computer microelectronics component to which a computer program can offload the sending and refreshing of images to the display monitor and the computation of special effects common to 2-D and 3-D images.
  • graphics card - A video adapter (alternate terms include graphics card, display adapter, video card, video board and almost any combination of the words in these terms) is an integrated circuit card in a computer or, in some cases, a monitor that provides digital-to-analog conversion, video RAM, and a video controller so that data can be sent to a computer's display.
  • Graphics Interchange Format - The GIF (pronounced DJIF by many, including its designer; pronounced GIF with a hard G by many others) stands for Graphics Interchange Format and is one of the two most common file formats for graphic images on the World Wide Web.
  • Graphics Interchange Format Version 89a - A GIF89a graphics file is an image formatted according to Graphics Interchange Format (GIF) Version 89a (July, 1989).
  • graphics processing unit (GPU) - A graphics processing unit (GPU) is a computer chip that renders graphics and images by performing rapid mathematical calculations.
  • graphics tablet - A digitizer tablet (also known as a digitizer or graphics tablet) is a tool used to convert hand-drawn images into a format suitable for computer processing.
  • GraphQL - GraphQL is a query language that allows developers to ask for specific data and return that data from multiple sources through a single API call.
  • graphs - Data visualization is a graphical representation of numerical data.
  • GRASP (General Responsibility Assignment Software Patterns) - GRASP (General Responsibility Assignment Software Patterns) is a design pattern in software development used to assign responsibilities for different modules of code.
  • Grasshopper - Grasshopper is a free Android app made to teach the basics of coding in JavaScript.
  • grating light valve - Using grating light valve (GLV) technology, picture elements (pixels) are formed on the surface of a silicon chip and become the source for display projection on anything from an auditorium screen down to a handheld computer display.
  • grating light valve (GLV) - Using grating light valve (GLV) technology, picture elements (pixels) are formed on the surface of a silicon chip and become the source for display projection on anything from an auditorium screen down to a handheld computer display.
  • gravitation - Gravity, also called gravitation, is a force that exists among all material objects in the universe, attracting objects with non-zero mass toward each other.
  • gravitational acceleration - Gravitational acceleration (symbolized g) is an expression used in physics to indicate the intensity of a gravitational field.
  • gravitational constant - The gravitational constant, symbolized G, is a physical constant that appears in the equation for Newton's law of gravitation.
  • gravitational wave - A gravity wave (or gravitational wave) is a ripple in the curvature of the space-time continuum (the enmeshed combination of our three perceived physical dimensions, plus time) created by the movement of matter.
  • gravity - Gravity, also called gravitation, is a force that exists among all material objects in the universe, attracting objects with non-zero mass toward each other.
  • gravity (or gravitation) - Gravity, also called gravitation, is a force that exists among all material objects in the universe, attracting objects with non-zero mass toward each other.
  • gravity wave - A gravity wave (or gravitational wave) is a ripple in the curvature of the space-time continuum (the enmeshed combination of our three perceived physical dimensions, plus time) created by the movement of matter.
  • gravure - Gravure is a printing method in which an image is applied to a printing substrate by use of a metal plate mounted on a cylinder.
  • gravure - Test yourself.
  • grawlix - A grawlix is a sequence of typographical symbols used to represent a non-specific, profane word or phrase.
  • gray - The gray (symbolized Gy) is the standard unit of absorbed ionizing-radiation dose, equivalent to one joule per kilogram (1 J · kg -1).
  • gray (Gy) - The gray (symbolized Gy) is the standard unit of absorbed ionizing-radiation dose, equivalent to one joule per kilogram (1 J · kg -1).
  • gray box analysis - Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program.
  • gray box testing - Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program.
  • gray box testing (gray box) - Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program.
  • gray goo - Gray goo (in British spelling, "grey goo") is a term used to describe what life on our planet might become if self-replicating robots or nanomachines got out of control and began to use up life forms for their own energy needs in some unstoppable way.
  • gray goo (or grey goo) - Gray goo (in British spelling, "grey goo") is a term used to describe what life on our planet might become if self-replicating robots or nanomachines got out of control and began to use up life forms for their own energy needs in some unstoppable way.
  • gray hat - Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.
  • gray hat (or grey hat) - Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.
  • gray market - The gray market (sometimes spelled as "grey market") is the collective system of unauthorized sales channels for products.
  • graylist - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • graynet - Greynet is a term for the use of unauthorized applications on a corporate network.
  • grayscale - Grayscale is a range of shades of gray without apparent color.
  • GRC - Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components.
  • GRC (governance, risk management and compliance) software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • GRC software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • Greasemonkey - Greasemonkey is a browser extension that enables users to customize how Web sites display on their computers.
  • GreasemonkIE - Greasemonkey is a browser extension that enables users to customize how Web sites display on their computers.
  • Great Firewall of China - The Great Firewall of China is a national effort to protect Chinese corporate and state secrets and infrastructure from cyberattacks.
  • great recession - Great recession is a label used by journalists and  economists to describe a severe, prolonged economic downturn.
  • great recession (Great Recession) - Great recession is a label used by journalists and  economists to describe a severe, prolonged economic downturn.
  • greedy algorithm - A greedy algorithm is a mathematical process that looks for simple, easy-to-implement solutions to complex, multi-step problems by deciding which next step will provide the most obvious benefit.
  • Greeking - Greeking is the use of unreadable dummy text in places reserved for text when prototyping the design or general layout of pages in magazines, books, brochures, advertisements, Web pages, and other visual media.
  • green cloud - Green cloud is a label that describes the potential environmental benefits that information technology services delivered over the Internet can offer society.
  • green computing - Green computing is the use of computers and related resources in an environmentally responsible manner.
  • green data center - A green data center is a repository for the storage, management, and dissemination of data in which the mechanical, lighting, electrical and computer systems are designed for maximum energy efficiency and minimum environmental impact.
  • green incentives - A green data center is a repository for the storage, management, and dissemination of data in which the mechanical, lighting, electrical and computer systems are designed for maximum energy efficiency and minimum environmental impact.
  • green IT (green information technology) - Green IT (green information technology) is the practice of environmentally sustainable computing.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.
  • green procurement - Green procurement is a continuous commitment to start-to-finish process management with consideration for environmental impact in business activities used to meet needs for materials, goods, utilities and services.
  • green roof - A green roof is the use of rooftop space for the growing of plants, either decorative vegetation or food crops.
  • green route - A green route is one of three categories of Internet route states defined by the Policy Analysis of Internet Routing (PAIR) project, an initiative dedicated to the development of tools that ISPs (Internet service providers), network operators, and end users can use to troubleshoot Internet routing and policy problems.
  • green screen (blue screen) - Green screen (also blue screen) is the use of a single color as a backdrop in filming to make it simpler and easier to add backgrounds, characters or other images.
  • green storage - Green storage is the practice of using a variety of "clean energy" storage methods and products to cut down on a data center's carbon footprint, as well as cost.
  • Green Technology Terms: Glossary - This is a WhatIs.
  • greenfield deployment - In networking, a greenfield deployment is the installation and configuration of a network where none existed before, for example in a new office.
  • greenhouse effect - The Greenhouse effect is the warming effect of the sun on greenhouse gases like CO2 that act to trap this heat in our atmosphere.
  • greenhouse gas - A greenhouse gas is a gas that absorbs infrared (IR) radiation and radiates heat in all directions.
  • greenwashing - Greenwashing is the practice of making an unsubstantiated or misleading claim about the environmental benefits of a product, service, technology or company practice.
  • Gregorian calendar - The Gregorian calendar is the calendar in current use in the Western world, both as the civil and Christian ecclesiastical calendar.
  • gremlin - A gremlin is an imaginary creature that causes trouble in devices and systems of all kinds.
  • grep - Grep, a UNIX command and also a utility available for Windows and other operating systems, is used to search one or more files for a given character string or pattern and, if desired, replace the character string with another one.
  • grey goo - Gray goo (in British spelling, "grey goo") is a term used to describe what life on our planet might become if self-replicating robots or nanomachines got out of control and began to use up life forms for their own energy needs in some unstoppable way.
  • grey hat - Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners.
  • grey net - Greynet is a term for the use of unauthorized applications on a corporate network.
  • grey route - A grey route is one of three categories of Internet routes defined by the Policy Analysis of Internet Routing (PAIR) project, an initiative dedicated to the development of tools that ISPs (Internet service providers), network operators, and end users can use to troubleshoot Internet routing and policy problems.
  • greylist - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • greylist (or graylist) - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • greynet - Greynet is a term for the use of unauthorized applications on a corporate network.
  • greynet (or graynet) - Greynet is a term for the use of unauthorized applications on a corporate network.
  • grid authentication - Grid authentication is a method of ensuring that an end user is who he claims to be by requiring him to enter values from specific cells in a grid whose content should be only accessible to him and the service provider.
  • grid computing - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
  • grid storage - Grid storage is a general term for any approach to storing data that employs multiple self-contained storage nodes interconnected so that any node can communicate with any other node without the data having to pass through a centralized switch.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • block cipher

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close