Browse Definitions :

Browse Definitions by Alphabet

LEA - LEX

  • lead time (in purchasing/procurement) - In procurement, lead time includes the first effort to initiate procurement of goods or services up to the time of their arrival.
  • lead trajectory - A lead trajectory is a projected path of a lead or potential customer as it applies to a goal, such as signing the customer up for a service or making a sale.
  • lead-to-revenue management (L2RM) - Lead-to-revenue management (L2RM) is a collection of sales and marketing processes that aims to maximize the income gained from each stage of the customer journey.
  • leaderboard - A leaderboard is a popular type of banner advertisement.
  • leadership - Leadership is the ability of an individual or a group of individuals to influence and guide followers or other members of an organization.
  • Leadership in Energy and Environmental Design - LEED (Leadership in Energy and Environmental Design) is an ecology-oriented building certification program run under the auspices of the U.
  • leadership skills - Leadership skills are the strengths and abilities individuals demonstrate that help the oversee processes, guide initiatives and steer their employees toward the achievement of goals.
  • leadership traits - Leadership traits are the personal qualities that shape effective leaders.
  • leaf-spine (leaf-spine architecture) - Leaf-spine is a two-layer network topology composed of leaf switches and spine switches.
  • leaky app - A leaky app is a small software program – typically a mobile app – that transmits user data across the Internet.
  • leaky bucket - The leaky bucket is an analogy for describing how inputs and outputs work in a wide variety of business and technology contexts.
  • leaky bucket algorithm - The leaky bucket algorithm is used to implement traffic policing and traffic shaping in Ethernet and cellular data networks.
  • leaky feeder - A leaky feeder is a coaxial cable that has small sections of its copper shielding stripped away to allow radio frequency (RF) signals to escape.
  • leaky pipeline - A leaky pipeline is a system designed to channel something from one place to another that is flawed in such a way that it loses some quantity of what it carries before it reaches the destination.
  • lean client - A thin client, sometimes called a lean client, is a low-cost, centrally-managed computer that relies heavily on a server for its computational role.
  • lean data transfer - Throttled data transfer, also known as data transfer throttling or lean data transfer, is the deliberate regulation of the data transfer rate in a communications system.
  • lean management - Lean manufacturing is a methodology that focuses on minimizing waste within manufacturing systems while simultaneously maximizing productivity.
  • lean management - Lean management is an approach to managing an organization that supports the concept of continuous improvement, a long-term approach to work that systematically seeks to achieve small, incremental changes in processes in order to improve efficiency and quality.
  • lean manufacturing (lean production) - Lean manufacturing is a methodology that focuses on minimizing waste within manufacturing systems while simultaneously maximizing productivity.
  • Lean Six Sigma - Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.
  • lean software development - Lean software development is a concept that emphasizes optimizing efficiency and minimizing waste in the development of software.
  • lean startup - Lean startup is an approach to building new businesses based on the belief that entrepreneurs must investigate, experiment, test and iterate as they develop products.
  • LEAP - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • LEAP (Lightweight Extensible Authentication Protocol) - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • leapfrog migration - Leapfrog migration is the process of making an application upgrade directly to the newest version of the application without having to migrate through in-between versions first.
  • Learn IT: How Spam Affects Email Marketing Campaigns - 1. What's the difference between spam and legitimate email marketing? Spam is unsolicited bulk email (UBE).
  • Learn IT: Malware - Emerging strains of malware include new evasion and obfuscation techniques that are designed to fool security administrators and anti-malware products, as well as end users.
  • Learn IT: multi-factor authentication basics (MFA basics) - Learn an IT concept in ten easy steps.
  • Learn IT: Software development - Learn an IT concept in 10 easy steps.
  • Learn IT: systems management - Systems management is the supervision of the information technology systems in an enterprise.
  • Learn IT: The Power of the Database - An introduction to the power of the database.
  • learnability - Learnability is a quality of products and interfaces that allows users to quickly become familiar with them and able to make good use of all their features and capabilities.
  • learning aid - A cheat sheet is a piece of paper with information written down on it that an unethical person might create if they weren't prepared for a test.
  • learning curve - Learning curves are a visualization of the difficulty estimated in learning a subject over a period of time as well as relative progress throughout the process of learning.
  • learning experience platform (LXP) - A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (SaaS).
  • Learning Guide: Firewalls - How to select the right firewall for your needs.
  • Learning Guide: ROI - Discover more about return on investment, including how to calculate ROI, in this learning guide.
  • Learning Guide: Spyware - Why spyware isn't just a home-user problem.
  • learning management system - A learning management system (LMS) is a software application or Web-based technology used to plan, implement, and assess a specific learning process.
  • learning management system (LMS) - A learning management system (LMS) is a software application or web-based technology used to plan, implement and assess a specific learning process.
  • Learning Path: Basic Computer Concepts - A progressive list of terminology to teach yourself about computer basics.
  • Learning Path: Basic Network Concepts - This page provides a sequence of definitions that introduces and defines basic network concepts.
  • Learning Path: CRM (Customer Relationship Management) - A progressive list of terminology to teach yourself about CRM.
  • Learning Path: Electronics - So that you can give yourself a quick tutorial on electronics, we've arranged our definitions in this Learning Path in a sequence, with more basic building block topics placed at the beginning.
  • Learning Path: Network and Web Site Administration - NETWORK AND WEB SITE ADMINISTRATION.
  • Learning Path: Network Infrastructure - NETWORK INFRASTRUCTURE.
  • Learning Path: Operating Systems and Applications - A progressive list of terminology to teach yourself about operating systems and applications.
  • Learning Path: Telephony and Wide Area Networks - TELEPHONY AND WIDE AREA NETWORKS.
  • Learning Path: Testing network cable - This pages provides a learning path that uses a sequence of definitions from whatis.
  • Learning Paths - We call the idea "Learning paths.
  • leased line - A leased line is a bidirectional telephone line that has been rented for private voice, data exchange or telecommunication use.
  • least cost routing (LCR) - Least cost routing (LCR) is a process that allows telecommunications providers to select the lowest cost carrier for bandwidth provision for their voice communications.
  • LEC - LEC (local exchange carrier) is the term for a public telephone company in the U.
  • LEC (local exchange carrier) - LEC (local exchange carrier) is the term for a public telephone company in the U.
  • LECs - LEC (local exchange carrier) is the term for a public telephone company in the U.
  • LED - A light-emitting diode (LED) is a semiconductor device that emits visible light when an electric current passes through it.
  • LED backlight LCD television - LED TV is a type of LCD television that uses light-emitting diodes (LEDs) to backlight the display instead of the cold cathode fluorescent lights (CCFLs) used in standard LCD televisions.
  • LED light bulb - An LED light bulb is a solid-state lighting (SSL) device that fits in standard screw-in connections but uses LEDs (light-emitting diodes) to produce light.
  • LED TV - LED TV is a type of LCD television that uses light-emitting diodes (LEDs) to backlight the display instead of the cold cathode fluorescent lights (CCFLs) used in standard LCD televisions.
  • LED TV (LED-backlight LCD television) - LED TV is a type of LCD television that uses light-emitting diodes (LEDs) to backlight the display instead of the cold cathode fluorescent lights (CCFLs) used in standard LCD televisions.
  • LED-backlight LCD television - LED TV is a type of LCD television that uses light-emitting diodes (LEDs) to backlight the display instead of the cold cathode fluorescent lights (CCFLs) used in standard LCD televisions.
  • lede - A lede is the introductory part of an article, which may be the first sentence or as much as a paragraph.
  • LEED - LEED (Leadership in Energy and Environmental Design) is an ecology-oriented building certification program run under the auspices of the U.
  • LEED (Leadership in Energy and Environmental Design) - LEED (Leadership in Energy and Environmental Design) is an ecology-oriented building certification program run under the auspices of the U.
  • leet - Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters.
  • leet speak - Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters.
  • leet speak (leet) - Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters.
  • leetspeak - Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters.
  • leetspeek - Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters.
  • legacy - A legacy application (legacy app) is a software program that is outdated or obsolete.
  • legacy application - A legacy application (legacy app) is a software program that is outdated or obsolete.
  • legacy operating system - A legacy platform, also called a legacy operating system, is an operating system (OS) no longer in widespread use, or that has been supplanted by an updated version of earlier technology.
  • legacy platform - A legacy platform, also called a legacy operating system, is an operating system (OS) no longer in widespread use, or that has been supplanted by an updated version of earlier technology.
  • legacy platform (legacy operating system) - A legacy platform, also called a legacy operating system, is an operating system (OS) no longer in widespread use, or that has been supplanted by an updated version of earlier technology.
  • legacy storage - Legacy storage is traditional storage hardware that is older and sometimes no longer sold by its vendor.
  • legal analytics - Legal analytics is the application of data analysis methods and technologies within the field of law to improve efficiency, gain insight and realize greater value from available data.
  • Legal Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • legal health record - A legal health record is the record of patient health that is created by a health care organization for its own business record.
  • lemmatization - Lemmatization is the grouping together of different forms of the same word.
  • lemniscate - A lemniscate is a plane curve with a characteristic shape, consisting of two loops that meet at a central point as shown below.
  • Lemon Wallet - Lemon Wallet is a digital wallet application that allows users to store digital copies of identification, insurance, loyalty and payment cards, providing a backup in case a physical wallet is lost, stolen or left at home.
  • length - Displacement (symbolized d or s), also called length or distance, is a one-dimensional quantity representing the separation between two defined points.
  • Lenovo Converged HX series - HX hyper-converged infrastructure appliances are designed for virtual desktop infrastructure (VDI), server virtualization, private and hybrid clouds, enterprise applications and remote/branch office (ROBO) environments.
  • Lenovo IdeaPad Yoga - The Lenovo IdeaPad Yoga is a line of convertible tablet computers that run the Windows operating system.
  • LEO - In general, a satellite is anything that orbits something else, as, for example, the moon orbits the earth.
  • Leonardo da Vinci's car - Da Vinci's car is a vehicle developed from the Renaissance artist/engineer/architect's drawings.
  • Leonardo Fibonacci - Leonardo Pisano, also known as Fibonacci (for filius Bonacci, meaning son of Bonacci), was an Italian mathematician who lived from 1170 - 1250.
  • Leonardo Fibonacci (Pisano) - Leonardo Pisano, also known as Fibonacci (for filius Bonacci, meaning son of Bonacci), was an Italian mathematician who lived from 1170 - 1250.
  • Leonardo Pisano - Leonardo Pisano, also known as Fibonacci (for filius Bonacci, meaning son of Bonacci), was an Italian mathematician who lived from 1170 - 1250.
  • Leonardo's car - Da Vinci's car is a vehicle developed from the Renaissance artist/engineer/architect's drawings.
  • LES - The Logistics Execution System (LES), a major component of the supply chain management (SCM) application from SAP, allows an administrator to manage the information and processes involved in all stages of the supply chain, from procuring raw materials to distributing finished products.
  • Let's Encrypt - Let's Encrypt is designed to simplify the acquisition of SSL/TLS digital certificates proving a site’s authenticity, while also providing encryption.
  • letter of intent - A letter of intent (LOI) is a document outlining the general plans of an agreement between two or more parties before a legal agreement is finalized.
  • letterpress - Letterpress is the oldest form of printing.
  • letterpress - Test yourself.
  • level of support (support level) - Level of support indicates a specific extent of technical assistance in the total range of assistance that is provided by an information technology product (such as a software product) to its customers.
  • LevelUp - LevelUp is a mobile payment (m-payment) and rewards service for consumer business transactions using smartphones.
  • leverage - In the physical sense, leverage is an assisted advantage.
  • Lex - Lex is a program designed to generate scanners, also known as tokenizers, which recognize lexical patterns in text.
  • Lex (lexical analyzer generator) - Lex is a program designed to generate scanners, also known as tokenizers, which recognize lexical patterns in text.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close