Browse Definitions :

Browse Definitions by Alphabet

  • Google Gemini (formerly Bard) - Google Gemini -- formerly called Bard -- is an artificial intelligence (AI) chatbot tool designed by Google to simulate human conversations using natural language processing (NLP) and machine learning.
  • Google Glass - Google Glass is a wearable, voice- and motion-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user's field of vision.
  • Google Hangouts - Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chats, either one-on-one or in a group.
  • Google Kubernetes Engine (GKE) - Google Kubernetes Engine (GKE) is a managed Kubernetes service for containers and container clusters running on Google Cloud infrastructure.
  • Google Maps - Google Maps is a web-based service that provides detailed information about geographical regions and sites worldwide.
  • Google Mobile Services (GMS) - Google Mobile Services (GMS) is a collection of applications and application programming interfaces (APIs) developed by Google for manufacturers of Android devices, such as smartphones and tablets.
  • Google Pay (Android Pay) - Google Pay is the search company’s electronic wallet and payment service offering.
  • Google Play - Google Play, formerly known as Android Market, is the official online store for digital media distributed by Google.
  • Google Play Protect - Google Play Protect is a malware protection and detection service built into Android devices that use Google Mobile Services.
  • Google Search Generative Experience (SGE) - Google Search Generative Experience (SGE) is a set of search and interface capabilities that integrates generative AI-powered results into Google search engine query responses.
  • Google Search Labs - Google Search Labs is a program from Alphabet's Google division to provide new capabilities and experiments for Google Search in a preview format before they become publicly available.
  • Google Sheets - Google Sheets is a web-based application that enables users to create, update and modify spreadsheets and share the data live online.
  • Google Street View - Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world.
  • Google Transfer Appliance - Google Transfer Appliance is a high-capacity storage server that enables enterprises to transport large volumes of data to Google Cloud Storage.
  • Google Trends - Google Trends is a free service provided by Google that displays how often specific keywords, subjects and phrases have been searched for on Google over a period of time.
  • Google+ (Google Plus) - Google+ (pronounced Google plus) was a Google social networking platform discontinued for personal use in 2019.
  • googol and googolplex - A googol is 10 to the 100th power, which is 1 followed by 100 zeros.
  • governance, risk and compliance (GRC) - Governance, risk and compliance (GRC) refers to an organization's strategy for handling the interdependencies among the following three components: corporate governance policies, enterprise risk management programs, and regulatory and company compliance.
  • government to government (G2G) - Government to government (G2G) is a term used to describe interactions between governments, typically at the national level.
  • government Trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • governmentwide acquisition contract (GWAC) - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • gpresult - Gpresult is a command-line tool that shows the RSoP (Resultant Set of Policy) for a user or computer based on applied Group Policy settings.
  • GPRS (General Packet Radio Services) - General Packet Radio Services (GPRS) is a best-effort packet-switching protocol for wireless and cellular network communication services.
  • GPS coordinates - GPS coordinates are a unique identifier of a precise geographic location on the earth, usually expressed in alphanumeric characters.
  • GPS jamming - GPS jamming is the act of using a frequency transmitting device to block or interfere with radio communications.
  • GPS tracking - GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely.
  • GPT-3 - GPT-3, or the third-generation Generative Pre-trained Transformer, is a neural network machine learning model trained using internet data to generate any type of text.
  • GPT-4 - GPT-4 is OpenAI's large multimodal language model that generates text from textual and visual input.
  • GR/IR clearing account (goods receipt/invoice receipt clearing account) - A GR/IR clearing account (goods receipt/invoice receipt clearing account) is a bookkeeping device that can be used when goods arrive before the invoice is generated or when an invoice arrives before the goods are delivered.
  • GraalVM - GraalVM is a tool for developers to write and execute Java code.
  • graceful degradation - Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.
  • graceful shutdown and hard shutdown - Graceful shutdown and hard shutdown are two opposing methods of turning off a computer.
  • gram (g or gm) - The gram (abbreviation, g or gm) is the cgs (centimeter/gram/second) unit of mass.
  • Gramm-Leach-Bliley Act (GLBA) - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
  • graph analytics - Graph analytics is a category of software tools and data mining techniques that help an analyst understand the relationship between entries in a graph database.
  • graph database - A graph database is a type of NoSQL database that uses graph theory to store, map and query relationships.
  • graph neural networks (GNNs) - Graph neural networks (GNNs) are a type of neural network architecture and deep learning method that can help users analyze graphs, enabling them to make predictions based on the data described by a graph's nodes and edges.
  • graphic equalizer - A graphic equalizer is a high-fidelity audio control that allows the user to see graphically and control individually a number of different frequency bands in a stereophonic system.
  • graphics processing unit (GPU) - A graphics processing unit (GPU) is a computer chip that renders graphics and images by performing rapid mathematical calculations.
  • GraphQL - GraphQL is an open source query language that describes how a client should request information through an API.
  • GRASP (General Responsibility Assignment Software Patterns) - GRASP (General Responsibility Assignment Software Patterns) is a design pattern in software development used to assign responsibilities for different modules of code.
  • grawlix - A grawlix is a sequence of typographical symbols used to represent a non-specific, profane word or phrase.
  • grayscale - Grayscale is a range of shades of gray without apparent color.
  • Great Firewall of China - The Great Firewall of China is the name that western media has given to the combination of tools, services and rules that the government of the People's Republic of China uses to block certain internet content from those within China's borders.
  • green cloud - Green cloud refers to the potential environmental benefits that green IT services delivered over the internet can offer to individual companies and society as a whole.
  • green collar job - A green collar job is an employment opportunity that helps create or support environmental and sustainable practices and technologies.
  • green computing - Green computing, also known as green technology, is the use of computers and other computing devices and equipment in energy-efficient and eco-friendly ways.
  • green data center - A green data center is a repository for the storage, management and dissemination of data in which the mechanical, lighting, electrical and computer systems are designed to maximize energy efficiency and minimize environmental impact.
  • green IT (green information technology) - Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products and minimizing resource use whenever possible.
  • green software - Green software, also known as sustainable software, is software that is designed, developed and implemented to limit energy consumption and have minimal environmental impact.
  • greenfield deployment - A greenfield deployment is the design, installation and configuration of computer infrastructure where none existed before, for example, in a new office.
  • greenhouse gas - A greenhouse gas lets the sun's rays warm the Earth's surface but restricts the heat from escaping into space.
  • greenwashing - Greenwashing is a term used to describe a false, misleading or untrue action or set of claims made by an organization about the positive impact that a company, product or service has on the environment.
  • greylist (or graylist) - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • grid computing - Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
  • Groovy - Groovy is a dynamic object-oriented programming language for the Java virtual machine (JVM) that can be used anywhere Java is used.
  • gross revenue - Gross revenue is the total of all money generated by a business, without taking into account any part of that total that has been or will be used for expenses.
  • ground - A ground is a direct electrical connection to the earth, a connection to a particular point in an electrical or electronic circuit, or an indirect connection that operates as the result of capacitance between wireless equipment and the earth or a large mass of conductive material.
  • Group Policy - Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers.
  • Group Policy Editor (GP Editor) - Group Policy Editor is a tool that helps administrators manage policy settings in Microsoft Management Console (MMC) snap-ins.
  • Group Policy Management Console (GPMC) - Group Policy Management Console (GPMC) is a Microsoft Management Console snap-in that provides a graphical user interface that enables Active Directory (AD) administrators to manage Group Policy Objects (GPOs) from one console.
  • Group Policy Object (GPO) - Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
  • Group Policy Preferences - Group Policy Preferences are a set of extensions, introduced in Windows Server 2008, that increase the functionality of Group Policy Objects.
  • group think - Group think (also spelled groupthink) is a phenomenon that occurs when group's need for consensus supersedes the judgment of individual group members.
  • gRPC - GRPC is a high-performance remote procedure call framework released by Google in August 2016.
  • GRUB (GRand Unified Bootloader) - GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up.
  • GS1 - GS1 is a global, not-for-profit association that maintains standards for barcodes and RFID tags and for supply chain messaging such as Electronic Data Interchange (EDI).
  • GSA IT Schedule 70 - GSA IT Schedule 70 is a long-term contract issued by the U.
  • GSM (Global System for Mobile communication) - GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
  • guest operating system (guest OS) - A guest operating system is the operating system installed on either a virtual machine (VM) or partitioned disk.
  • guest virtual machine (guest VM) - A guest virtual machine (VM) is the software component of a VM, an independent instance of an operating system (OS), called a guest OS, and its associated software and information.
  • GUID (global unique identifier) - A GUID (globally unique identifier) is a 128-bit text string that represents an identification (ID).
  • GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) - GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a standards-based protocol that facilitates control of virtual local area networks (VLANs) within a larger network.
  • gzip (GNU zip) - Gzip (GNU zip) is a free and open source algorithm for file compression.
  • What is generative AI? Everything you need to know - Generative AI is a type of artificial intelligence technology that can produce various types of content, including text, imagery, audio and synthetic data.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close