Browse Definitions :

Browse Definitions by Alphabet

GS1 - GZI

  • GS1 - GS1 is a global, not-for-profit association that maintains standards for barcodes and RFID tags and for supply chain messaging such as Electronic Data Interchange (EDI).
  • GSA IT Schedule 70 - IT Schedule 70 is a long-term contract issued by the United States government.
  • GSM - GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
  • GSM (Global System for Mobile communication) - GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
  • GTAG - GTAG (Global Tag) is a standardization initiative of the Uniform Code Council (UCC) and the European Article Numbering Association (EAN) for asset tracking and logistics based on radio frequency identification (RFID).
  • GTAG (Global Tag) - GTAG (Global Tag) is a standardization initiative of the Uniform Code Council (UCC) and the European Article Numbering Association (EAN) for asset tracking and logistics based on radio frequency identification (RFID).
  • gTLD - A gTLD (generic top-level domain name) is the top-level domain name of an Internet address that identifies it generically as associated with some domain class, such as .
  • GUA - A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
  • guaranteed income - Guaranteed income is an umbrella term for a number of models designed to deliver funds to a given population.
  • guerilla marketing - In-house marketing is any marketing initiative that is not outsourced to a third party.
  • guest OS (guest operating system) - A guest OS (guest operating system) is the operating system installed on a virtual machine or partitioned disk.
  • guest virtual machine - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • guest virtual machine (guest VM) - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • guest VM - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • GUI - A GUI (usually pronounced "GOO-ee") is a graphical (rather than purely textual) user interface to a computer.
  • GUI (graphical user interface) - A GUI (usually pronounced "GOO-ee") is a graphical (rather than purely textual) user interface to a computer.
  • GUI testing (graphical user interface testing) - GUI testing is the process of ensuring proper functionality of the graphical user interface (GUI) for a given application and making sure it conforms to its written specifications.
  • GUID - A GUID (global unique identifier) is a term used by Microsoft for a number that its programming generates to create a unique identity for an entity such as a Word document.
  • GUID (global unique identifier) - A GUID (global unique identifier) is a term used by Microsoft for a number that its programming generates to create a unique identity for an entity such as a Word document.
  • Guidelines for Definition of Managed Objects - GDMO (Guidelines for Definition of Managed Objects) is a standard for defining objects in a network in a consistent way.
  • gummy bear hack - A gummy bear hack is an attempt to fool a biometric fingerprint scanner by using a gelatin-based candy to hold a fingerprint.
  • GVRP - GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network .
  • GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) - GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network .
  • GWAC - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • GWT (GWT Web Toolkit) - The GWT software development kit facilitates the creation of complex browser-based Java applications that can be deployed as JavaScript, for portability across browsers, devices and platforms.
  • GWX (Get Windows 10) - GWX (get Windows 10) is a Windows upgrade app that was initially installed after Windows update KB3035583; the app has been the subject of consumer complaints for manipulative design.
  • Gy - The gray (symbolized Gy) is the standard unit of absorbed ionizing-radiation dose, equivalent to one joule per kilogram (1 J · kg -1).
  • gyroscope - A gyroscope is a device with a spinning disc or wheel mechanism that harnesses the principle of conservation of angular momentum: the tendency for the spin of a system to remain constant unless subjected to external torque.
  • gzip - Gzip (GNU zip) is a free and open source algorithm for file compression.
  • gzip (GNU zip) - Gzip (GNU zip) is a free and open source algorithm for file compression.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close