Browse Definitions :

Browse Definitions by Alphabet

G-C - GMA

  • G-Cloud (Government Cloud) - Government Cloud, also referred to as G-Cloud, is a U.
  • G-code - G-code (also known as RS-274) is the name of the most prevalent programming language for computer numerical control (CNC) in computer-aided design and manufacturing (CAD/CAM).
  • G-putty - G-putty is a polysilicone polymer infused with graphene.
  • G.711 - G.711 is the default pulse code modulation (PCM) standard for Internet Protocol (IP) private branch exchange (PBX) vendors, as well as for the public switched telephone network (PSTN).
  • G.729 - G.729 is a standard for Internet Protocol (IP) private branch exchange (PBX) vendors, as well as for the public switched telephone network (PSTN).
  • GAAP (generally accepted accounting principles) - GAAP (generally accepted accounting principles) is a collection of commonly followed accounting rules and standards for financial reporting.
  • GAFA (the big four) - GAFA is an acronym for Google, Apple, Facebook and Amazon (the second and fourth companies are sometimes reversed in order).
  • gag order - A gag order is a stipulation that those so-ordered will not divulge information learned in a particular situation, such as a court, a public office or a corporate environment.
  • gallium arsenide (GaAs) - Gallium arsenide (chemical formula GaAs) is a semiconductor compound used in some diode s, field-effect transistors (FETs), and integrated circuits (ICs).
  • gallium arsenide field-effect transistor (GaAsFET) - A gallium arsenide field-effect transistor (GaAsFET) is a specialized type of field-effect transistor (FET) that is used in amplifier circuits at very-high, ultra-high, and microwave radio frequencies.
  • game theory - Game theory is the study of mathematical models of negotiation, conflict and cooperation between individuals, organizations and governments.
  • gamification - Gamification is the application of game theory concepts and techniques to non-game activities.
  • gaming - Gaming is the running of specialized applications known as electronic games, especially on machines designed for such programs and, in a more recent trend, using personal computers on the Internet in which case the activity is known as online gaming.
  • gaming disorder - Gaming disorder is the obsessive and compulsive overuse of internet games and video games as an escape from life, resulting in the prioritization of gaming over daily activities and interests and the continuation of gaming despite the negative consequences that may occur.
  • gaming the system - Gaming the system is manipulation or exploitation of the rules designed to govern a given system in an attempt to gain an advantage over other users.
  • Gantt chart - A Gantt chart is a horizontal bar chart developed as a production control tool in 1917 by Henry L.
  • gap analysis - A gap analysis is a method of assessing the performance of a business unit to determine whether business requirements or objectives are being met and, if not, what steps should be taken to meet them.
  • garbage collection (GC) - Garbage collection (GC) is a memory recovery feature built into programming languages such as C# and Java.
  • garbage in, garbage out (GIGO) - GIGO (garbage in, garbage out) is a concise expression of a concept common to computer science and mathematics: the quality of output is determined by the quality of the input.
  • GARP (Generic Attribute Registration Protocol) - GARP (Generic Attribute Registration Protocol) is a local area network (LAN) protocol that defines procedures by which end stations and switches can register and de-register attributes, such as network identifiers or addresses, with each other.
  • Gartner - Gartner is an information technology (IT) research and consultancy company, formerly known as Gartner Group.
  • Gartner hype cycle - The hype cycle is a graphical representation of the life cycle stages a technology goes through from conception to maturity and widespread adoption.
  • Gartner Magic Quadrants - Gartner Magic Quadrants is a research method designed to monitor and evaluate the progress and positions of companies in a specific, technology-based market.
  • gas - A gas is a sample of matter that conforms to the shape of a container in which it is held and acquires a uniform density inside the container, even in the presence of gravity and regardless of the amount of substance in the container.
  • gas constant (universal molar gas constant) - The gas constant, also known as the universal molar gas constant, is a physical constant that appears in an equation defining the behavior of a gas under theoretically ideal conditions.
  • gaslighting - Gaslighting is a method of psychological manipulation based on undermining the target’s sense of reality, making them doubt their own perceptions, beliefs and/or memories.
  • gated content / ungated content - Gated content is online materials, such as white papers, articles or videos, that require the user to fill out a form before they can access them.
  • gatekeeper - A gatekeeper is a management tool for H.
  • gateway - A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.
  • Gbps (billions of bits per second) - Gbps stands for billions of bits per second and is a measure of bandwidth on a digital data transmission medium such as optical fiber.
  • GDSN (Global Data Synchronization Network) - GDSN (Global Data Synchronization Network) is an internet-based network that enables trading partners to exchange product-identification data in a standardized way in real time.
  • GE Healthcare - GE Healthcare is a subsidiary of General Electric Co.
  • geek - In computers and the Internet, a geek is a person who is inordinately dedicated to and involved with technology.
  • geekosphere - The geekosphere is the physical ambiance around you and your workstation.
  • Gen V attack (5th generation cyberattack) - Gen V attack is a 5th generation cyberattack that is typically defined by the threat level and sophistication of the attack, including very large data breaches.
  • Genchi Genbutsu - Genchi Genbutsu is the Japanese principle of going to and directly observing a location and its conditions in order to understand and solve any problems faster and more effectively.
  • General Data Protection Regulation (GDPR) - The General Data Protection Regulation (GDPR) is legislation that updated and unified data privacy laws across the European Union (EU).
  • general ledger (GL) - A general ledger (GL) is a set of numbered accounts a business uses to keep track of its financial transactions and to prepare financial reports.
  • general protection fault (GPF) - General protection fault (GPF, sometimes seen as general protection error) the name of an error caused when an application program (for example, Microsoft Word or the Netscape Web browser) tries to access storage that is not designated for its use.
  • general-purpose computer - A general-purpose computer is one that, given the appropriate application and required time, should be able to perform most common computing tasks.
  • Generally Accepted Recordkeeping Principles (the Principles) - Generally Accepted Recordkeeping Principles is a framework for managing records in a way that supports an organization's immediate and future regulatory, legal, risk mitigation, environmental and operational requirements.
  • Generation 1 VM (generation 1 virtual machine) - A Generation 1 VM is a virtual machine that uses the original Hyper-V BIOS-based architecture.
  • Generation Facebook (Generation F) - Generation Facebook (Generation F) is a term used to define millennials who have grown up using social media as their primary networking tool.
  • Generation Z - Generation Z is the demographic cohort following Generation Y -- which is more popularly known as the Millennial Generation.
  • generative adversarial network (GAN) - A generative adversarial network (GAN) is a type of AI machine learning (ML) technique made up of two nets that are in competition with one another in a zero-sum game framework.
  • generative modeling - Generative modeling is the use of artificial intelligence (AI), statistics and probability in applications to produce a representation or abstraction of observed phenomena or target variables that can be calculated from observations.
  • Generic Access Network (GAN) - The Generic Access Network (GAN) is an evolving wireless communications system in which mobile phone sets function seamlessly between local area networks (LANs) and wide-area networks (WANs).
  • Generic Routing Encapsulation (GRE) - Generic Routing Encapsulation (GRE) is a simple protocol that encapsulates packets in order to route other protocols over IP networks, as defined by RFC 2784.
  • genomics - Genomics is the study of human genes and chromosomes.
  • geo-fencing (geofencing) - Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries.
  • geo-marketing - Geo-marketing is a tool that uses geographic, or location-based, information to help companies put together marketing strategies and campaigns.
  • geo-replication - Geo-replication is a type of data storage replication in which the same data is stored on servers in multiple geographic locations.
  • geolocation - Geolocation is the detection of the physical location of an Internet connected computing device.
  • geolocation data - Geolocation data is information associated with an electronic device that can be used to identify its physical location.
  • geospatial analysis - Geospatial analysis is the gathering, display, and manipulation of imagery, GPS, satellite photography and historical data, described explicitly in terms of geographic coordinates or implicitly, in terms of a street address, postal code, or forest stand identifier as they are applied to geographic models.
  • geostationary satellite - A geostationary satellite is an earth-orbiting satellite, placed at an altitude of approximately 35,800 kilometers (22,300 miles) directly over the equator, that revolves in the same direction the earth rotates (west to east).
  • geotagging - Geotagging is the addition of geographical information, usually in the form of latitude and longitude coordinates, to Web sites, images, videos, smartphone transmissions, and various other data types and sources.
  • geothermal cooling - Geothermal cooling is a type of renewable energy system that moves heat from a building to below the earth’s surface, using the ground like a heatsink.
  • gesture recognition - Gesture recognition is the mathematical interpretation of a human motion by a computing device.
  • Get Windows 10 app - Get Windows 10 is an application that confirms if a computer is qualified to upgrade to Windows 10 for free and provides information on some of the key features in Microsoft's newest operating system.
  • GFEBS (General Fund Enterprise Business System) - GFEBS (General Fund Enterprise Business System) is a Web-based enterprise resource planning (ERP) system for the United States Army.
  • Ghost - Ghost is a software product from Symantec that can clone (copy) the entire contents of a hard disk to another computer's hard disk or to storage media.
  • ghost asset - A ghost asset is a fixed asset in a general ledger (GL) that cannot be accounted for because it is physically missing or otherwise rendered unusable.
  • ghost imaging - Ghost imaging, often called cloning, is a software-driven data backup process that copies the contents of a computer hard disk in a single compressed file or set of files, referred to as an image.
  • ghost worker - Ghost worker is a term coined by computer scientist Siddharth Suri and Harvard researcher Mary L.
  • ghosting (in the workplace) - Ghosting is to cease communications without notification.
  • giant - In networks, a giant is a packet, frame, cell, or other transmission unit that is too large.
  • gibibyte (GiB) - A gibibyte (GiB) is a unit of measure of capacity used in computing.
  • GID (group ID or global index file) - In a Unix system, a GID (group ID) is a name that associates a system user with other users sharing something in common (perhaps a work project or a department name).
  • GIF89a (Graphics Interchange Format Version 89a) - A GIF89a graphics file is an image formatted according to Graphics Interchange Format (GIF) Version 89a (July, 1989).
  • gift economy - A gift economy is one in which services or goods are given without an agreement as to a suitable payment or trade to be made in return.
  • gig economy - A gig economy is a free market system in which temporary positions are common and organizations hire independent workers for short-term commitments.
  • gigabit - In data communications, a gigabit is one billion bits, or 1,000,000,000 (that is, 10^9) bits.
  • Gigabit Ethernet (GbE) - Gigabit Ethernet (GbE), a transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second, or 1 gigabit (Gb).
  • gigabit Ethernet phone (gigE phone) - A gigabit Ethernet phone, or gigE phone, is a VoIP telephone that connects to and uses gigabit Ethernet transmission technology to communicate with other phones.
  • gigabit interface converter (GBIC) - A gigabit interface converter (GBIC) is a transceiver that converts electric currents (digital highs and lows) to optical signals, and optical signals to digital electric currents.
  • gigabyte (GB) - A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion bytes.
  • GIMP (GNU Image Manipulation Program) - GIMP (GNU Image Manipulation Program) is a freely available open source application for creating and manipulating graphic images that runs on Linux, other Unix-based operating systems, and also on Windows and Mac OS X.
  • Git - Git is a free and open source distributed code management and version control system that is distributed under the GNU General Public License version 2.
  • git stash - Git stash is a built-in command with the distributed version control tool in Git that locally stores all the most recent changes in a workspace and resets the state of the workspace to the prior commit state.
  • GitHub - GitHub is a web-based revision control hosting service for software development and code sharing.
  • GitLab - GitLab is an open source code repository and collaborative development platform.
  • GitOps - GitOps is a paradigm designed around Kubernetes to allow developers and IT operations teams to use Git for cluster management and application delivery.
  • Glassware 2.0 - Glassware 2.
  • glitch - In several usages in information technology, a glitch (pronounced GLIHTCH) is a sudden break in function or continuity, sometimes of a transient nature, with a varying degree of seriousness.
  • global catalog (Active Directory) - A global catalog is a data storage source containing partial representations of objects found in a multidomain Active Directory Domain Services (ADDS) forest.
  • global deduplication - Global deduplication is a method of preventing redundant data when backing up data to multiple deduplication devices.
  • global namespace - Global namespace is a feature that provides a consolidated view into multiple Network File Systems (NFS), Common Internet File Systems (CIFS), network-attached storage (NAS) systems or file servers that are in different physical locations.
  • Global Positioning System (GPS) - The GPS (Global Positioning System) is a 'constellation' of approximately 30 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location.
  • Global Update Manager (GUM) - Global Update Manager is a cluster component in the Windows Cluster Architecture.
  • globalization - Globalization is the process by which ideas, goods and services spread throughout the world.
  • globbing - Globbing is the process of expanding a non-specific file name containing a wildcard character into a set of specific file names that exist in storage on a computer, server, or network.
  • glocalization - Glocalization is the concept that in a global market, a product or service is more likely to succeed when it is customized for the locality or culture in which it is sold.
  • glue code (glue code language) - Glue code is custom-written programming that connects incompatible software components.
  • glue logic - Glue logic is a special form of digital circuitry that allows different types of logic chips or circuits to work together by acting as an interface between them.
  • Gluon (deep learning library) - Gluon is an open source deep learning library jointly created by AWS and Microsoft that helps developers build, train and deploy machine learning models in the cloud.
  • GlusterFS (Gluster File System) - GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store multiple petabytes of data.
  • glyph - In information technology, a glyph (pronounced GLIHF ; from a Greek word meaning carving) is a graphic symbol that provides the appearance or form for a character.
  • Gmail - Gmail (pronounced Gee-mail) is a free Web-based e-mail service that provides users with a gigabyte of storage for messages and provides the ability to search for specific messages.
  • Gmail Smart Compose - Gmail Smart Compose is a predictive text feature to help save effort in composing email messages.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close