Browse Definitions :

Browse Definitions by Alphabet

GRI - GZI

  • Gridstore HyperConverged Appliance (HCA) - Gridstore HyperConverged Appliance (HCA) is an all-flash storage device that includes compute, virtualization and networking resources.
  • grok - To grok (pronounced GRAHK) something is to understand something so well that it is fully absorbed into oneself.
  • Groovy - Groovy is a dynamic object-oriented programming language for the Java virtual machine (JVM) that can be used anywhere Java is used.
  • gross domestic product (GDP) - Gross domestic product (GDP) is the total amount of dollars made within a given location in the selling of all goods and services before deductions.
  • gross revenue - Gross revenue is the total of all money generated by a business, without taking into account any part of that total that has been or will be used for expenses.
  • ground - A ground is a direct electrical connection to the earth, a connection to a particular point in an electrical or electronic circuit, or an indirect connection that operates as the result of capacitance between wireless equipment and the earth or a large mass of conductive material.
  • ground-plane antenna - A ground-plane antenna is a variant of the dipole antenna, designed for use with an unbalanced feed line such as coaxial cable.
  • Group Address Registration Protocol. - GARP (Generic Attribute Registration Protocol) is a local area network (LAN) protocol that defines procedures by which end stations and switches can register and de-register attributes, such as network identifiers or addresses, with each other.
  • group chat - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • group ID - In a Unix system, a GID (group ID) is a name that associates a system user with other users sharing something in common (perhaps a work project or a department name).
  • Group Policy - Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers.
  • Group Policy Editor (GP Editor) - Group Policy Editor is a tool that helps administrators manage policy settings in Microsoft Management Console (MMC) snap-ins.
  • Group Policy Management Console - The Group Policy Management Console (GPMC) is an interface that enables Active Directory administrators to manage Group Policy Objects (GPOs) from one console.
  • Group Policy Object - In the Windows 2000 operating system, a Group Policy Object (GPO) is a collection of settings that define what a system will look like and how it will behave for a defined group of users.
  • Group Policy Object (GPO) - Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
  • Group Policy Preferences - Group Policy Preferences are a set of extensions, introduced in Windows Server 2008, that increase the functionality of Group Policy Objects.
  • group think - Group think (also spelled groupthink) is a phenomenon that occurs when group's need for consensus supersedes the judgment of individual group members.
  • Groupon - Groupon is a marketing service that offers its subscribers daily discount coupons by email, Facebook and Twitter feeds.
  • groupware - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • growth hacker - A growth hacker is a marketing professional with high-level IT skills.
  • growth hacking - Growth hacking is an approach to driving product adoption, usage and sales by experimental, innovative and low-cost means.
  • growth potential - Growth potential is an organization's future ability to generate larger profits, expand its workforce and ramp up its production.
  • gRPC - gRPC is a high performance, open source framework developed by Google to handle remote procedure calls (RPCs).
  • GRUB - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • GRUB (GRand Unified Bootloader) - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • GS1 - GS1 is a global, not-for-profit association that maintains standards for barcodes and RFID tags and for supply chain messaging such as Electronic Data Interchange (EDI).
  • GSA IT Schedule 70 - IT Schedule 70 is a long-term contract issued by the United States government.
  • GSM - GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
  • GSM (Global System for Mobile communication) - GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
  • GSX Server - GSX Server is a server virtualization program for Windows and Linux produced and distributed by VMware, a subsidiary of EMC Corporation and headquartered in Palo Alto, California.
  • GTAG - GTAG (Global Tag) is a standardization initiative of the Uniform Code Council (UCC) and the European Article Numbering Association (EAN) for asset tracking and logistics based on radio frequency identification (RFID).
  • GTAG (Global Tag) - GTAG (Global Tag) is a standardization initiative of the Uniform Code Council (UCC) and the European Article Numbering Association (EAN) for asset tracking and logistics based on radio frequency identification (RFID).
  • gTLD - A gTLD (generic top-level domain name) is the top-level domain name of an Internet address that identifies it generically as associated with some domain class, such as .
  • gTLD (generic top-level domain name) - A gTLD (generic top-level domain name) is the top-level domain name of an Internet address that identifies it generically as associated with some domain class, such as .
  • GUA - A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
  • guaranteed income - Guaranteed income is an umbrella term for a number of models designed to deliver funds to a given population.
  • guerilla marketing - In-house marketing is any marketing initiative that is not outsourced to a third party.
  • guest OS (guest operating system) - A guest OS (guest operating system) is the operating system installed on a virtual machine or partitioned disk.
  • guest virtual machine - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • guest virtual machine (guest VM) - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • guest VM - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • GUI - A GUI (usually pronounced "GOO-ee") is a graphical (rather than purely textual) user interface to a computer.
  • GUI (graphical user interface) - A GUI (usually pronounced "GOO-ee") is a graphical (rather than purely textual) user interface to a computer.
  • GUI testing (graphical user interface testing) - GUI testing is the process of ensuring proper functionality of the graphical user interface (GUI) for a given application and making sure it conforms to its written specifications.
  • GUID - A GUID (global unique identifier) is a term used by Microsoft for a number that its programming generates to create a unique identity for an entity such as a Word document.
  • GUID (global unique identifier) - A GUID (global unique identifier) is a term used by Microsoft for a number that its programming generates to create a unique identity for an entity such as a Word document.
  • gummy bear hack - A gummy bear hack is an attempt to fool a biometric fingerprint scanner by using a gelatin-based candy to hold a fingerprint.
  • GVRP - GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network .
  • GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) - GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network .
  • GWAC - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • GWT (GWT Web Toolkit) - The GWT software development kit facilitates the creation of complex browser-based Java applications that can be deployed as JavaScript, for portability across browsers, devices and platforms.
  • GWX (Get Windows 10) - GWX (get Windows 10) is a Windows upgrade app that was initially installed after Windows update KB3035583; the app has been the subject of consumer complaints for manipulative design.
  • Gy - The gray (symbolized Gy) is the standard unit of absorbed ionizing-radiation dose, equivalent to one joule per kilogram (1 J · kg -1).
  • Gyricon - Gyricon is a type of electronic paper (sometimes called e-paper) developed at Xerox's Palo Alto Research Center (PARC).
  • gyroscope - A gyroscope is a device with a spinning disc or wheel mechanism that harnesses the principle of conservation of angular momentum: the tendency for the spin of a system to remain constant unless subjected to external torque.
  • gzip - Gzip (GNU zip) is a free and open source algorithm for file compression.
  • gzip (GNU zip) - Gzip (GNU zip) is a free and open source algorithm for file compression.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • block cipher

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close