Any device or machine, especially one whose name cannot be recalled. Often either clever or complicated.
(informal) Any consumer electronics product.
(computing) A sequence of machine code instructions crafted as part of an exploit that attempts to divert execution to a memory location chosen by the attacker.
(computer science) A technique for converting a part of one problem to an equivalent part of another problem. Used in constructing reductions.