Browse Definitions :

Browse Definitions by Alphabet

LOG - NIC

  • logic chip - A microprocessor is a computer processor on a microchip.
  • logic gate - A logic gate is an elementary building block of a digital circuit.
  • logic gate (AND, OR, XOR, NOT, NAND, NOR and XNOR) - A logic gate is an elementary building block of a digital circuit.
  • logic level - A logic level is one of several states that a digital signal can possess, expressed as a DC (direct-current) voltage with respect to electrical ground.
  • logical AND symbol - For a practical application, see logic gate.
  • logical block addressing - Logical block addressing is a technique that allows a computer to address a hard disk larger than 528 megabytes.
  • logical block addressing (LBA) - Logical block addressing is a technique that allows a computer to address a hard disk larger than 528 megabytes.
  • logical equivalence - Logical equivalence is a type of relationship between two statements or sentences in propositional logic or Boolean algebra.
  • logical implication - Logical implication is a type of relationship between two statements or sentences.
  • logical interface (LIF) - A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.
  • logical LAN - A VLAN (virtual LAN) is a subnetwork which can group together collections of devices on separate physical local area networks (LANs).
  • logical negation symbol - The logical negation symbol is used in Boolean algebra to indicate that the truth value of the statement that follows is reversed.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • Logical Observation Identifiers Names and Codes - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • logical OR symbol - For a practical application, see logic gate.
  • logical partition - A logical partition (LPAR) is the division of a computer's processor s, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s.
  • logical partition (LPAR) - A logical partition (LPAR) is the division of a computer's processor s, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s.
  • logical unit - In IBM's Systems Network Architecture (SNA), a logical unit (LU) identifies an end user in an SNA network.
  • logical unit (LU) - In IBM's Systems Network Architecture (SNA), a logical unit (LU) identifies an end user in an SNA network.
  • logical unit number - A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute input/output (I/O) commands with a host computer, as defined by the Small System Computer Interface (SCSI) standard.
  • logical unit number (LUN) - A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute input/output (I/O) commands with a host computer, as defined by the Small System Computer Interface (SCSI) standard.
  • logical volume management (LVM) - Logical volume management (LVM), a form of storage virtualization, offers system administrators a more flexible approach to managing disk storage space than traditional partitioning.
  • login - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
  • Login VSI (Login Virtual Session Indexer) - Login VSI (Login Virtual Session Indexer) is a software company that specializes in products IT can use to monitor and test loads for server-based computing, VDI and desktop as a service.
  • logistic regression - Logistic regression is a statistical analysis method to predict a binary outcome, such as yes or no, based on prior observations of a data set.
  • logistics - Logistics is the process of planning and executing the efficient transportation and storage of goods from the point of origin to the point of consumption.
  • logistics management - Logistics management is the governance of supply chain management functions that helps organizations plan, manage and implement processes to move and store goods.
  • logo - A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.
  • logon - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
  • logon (or login) - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
  • LOINC - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • LOINC (Logical Observation Identifiers Names and Codes) - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • LOL - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • LOM - Lights-out management (LOM) is the ability for a system administrator to monitor and manage servers by remote control.
  • Long Term Evolution - LTE (Long-Term Evolution) is a standard for 4G wireless technology that offers increased network capacity and speed for cellphones and other cellular devices compared with 3G.
  • long-tail keywords - Long-tail keywords, in the context of advertising and SEO, are detailed keyword phrases that a potential customer might use to search online when ready to purchase.
  • longevity testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • longitude - Latitude and longitude are angles that uniquely define points on a sphere.
  • longitudinal study - A longitudinal study is an observational research method in which data is gathered for the same subjects repeatedly over a period of time.
  • longitudinal time code - Longitidinal time code (LTC) is a timing signal that is part of an audio tape recording.
  • longitudinal time code (LTC) - Longitidinal time code (LTC) is a timing signal that is part of an audio tape recording.
  • look to book - The look-to-book ratio is a figure used in the travel industry that shows the percentage of people who visit a travel Web site compared to those who actually make a purchase.
  • look-to-book ratio - The look-to-book ratio is a figure used in the travel industry that shows the percentage of people who visit a travel Web site compared to those who actually make a purchase.
  • Lookout Mobile Security - Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets.
  • loop - In computer programming, a loop is a sequence of instructions that is continually repeated until a certain condition is reached.
  • loopback test - A loopback test is a test in which a signal in sent from a communications device and returned (looped back) to it as a way to determine whether the device is working right or as a way to pin down a failing node in a network.
  • loose coupling - Loose coupling is a method of interconnecting the components in a system or network so that those components, also called elements, depend on each other to the least extent practicable.
  • loot box - In video games, a loot box is an in-game purchase consisting of a virtual container that awards players with items and modifications based on chance.
  • LoRa Alliance - The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).
  • lossless - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossless and lossy compression - Lossless and lossy file compression describe whether all original data can be recovered when the file is uncompressed.
  • lossless compression - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossy - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossy compression - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • low earth orbit (LEO) satellite - A low earth orbit (LEO) satellite is an object, generally an electronic piece of equipment, that circles around the earth at lower altitudes than geosynchronous satellites.
  • low-capacity snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
  • low-code and no-code development platforms - Low-code/no-code development platforms are types of visual software development environments that allow enterprise developers and citizen developers to drag and drop application components, connect them together and create mobile or web apps.
  • lowerCamelCase - lowerCamelCase (part of CamelCase) is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words (except the first one) capitalized within the new word that forms the name.
  • loyalty card program - A loyalty card program is an incentive plan that allows a retail business to gather data about its customers.
  • loyalty punch card - A loyalty punch card is a token that lets a customer earn free merchandise or discounts after a certain number of purchases.
  • LPAR - A logical partition (LPAR) is the division of a computer's processor s, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s.
  • LPT - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPT (line print terminal) - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPT1 - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPT2 - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPT3 - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPWAN (low-power wide area network) - Low-power WAN (LPWAN) is a wireless wide area network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges.
  • LTC - Longitidinal time code (LTC) is a timing signal that is part of an audio tape recording.
  • LTE - LTE (Long-Term Evolution) is a standard for 4G wireless technology that offers increased network capacity and speed for cellphones and other cellular devices compared with 3G.
  • LTE (Long-Term Evolution) - LTE (Long-Term Evolution) is a standard for 4G wireless technology that offers increased network capacity and speed for cellphones and other cellular devices compared with 3G.
  • LTE-Advanced (Long Term Evolution-Advanced) - Long Term Evolution-Advanced (LTE-Advanced) is a cellular networking standard that offers higher throughput than its predecessor, the Long Term Evolution (LTE) standard.
  • LTFS (Linear Tape File System) - LTFS (Linear Tape File System) is a file system specification that allows Linear Tape-Open (LTO) storage technology to be indexed.
  • LTO - LTO (Linear Tape-Open) tape is an open-format tape storage technology created by Hewlett-Packard (HP), International Business Machines (IBM) and Seagate Technology.
  • LTO (Linear Tape-Open) tape - LTO (Linear Tape-Open) tape is an open-format tape storage technology created by Hewlett-Packard (HP), International Business Machines (IBM) and Seagate Technology.
  • LTO-10 (Linear Tape-Open 10) - LTO-10 is an unreleased tape format from the Linear Tape-Open Consortium.
  • LTO-3 (Linear Tape-Open 3) - LTO-3 is a tape format from the Linear Tape-Open Consortium first released in 2005 that has since been followed by LTO-4, LTO-5 and LTO-6.
  • LTO-4 (Linear Tape-Open 4) - LTO-4 is a tape format from the Linear Tape-Open Consortium that has been succeeded by LTO-5 and the current LTO-6 version.
  • LTO-5 - LTO-5 is a tape format released in 2010 by the Linear Tape-Open Consortium.
  • LTO-6 (Linear Tape-Open 6) - LTO-6 is the current tape format from the Linear Tape-Open Consortium first released in 2012 that will eventually be succeeded by LTO-7, LTO-8, LTO-9 and LTO-10.
  • LTO-7 (Linear Tape-Open 7) - LTO-7 is a tape format from the Linear Tape-Open (LTO) Consortium released in late 2015.
  • LTO-8 (Linear Tape-Open 8) - LTO-8 is a tape format from the Linear Tape-Open Consortium released in late 2017.
  • LTO-9 (Linear Tape-Open 9) - LTO-9 (Linear Tape-Open 9) is a future tape format from the Linear Tape-Open Consortium.
  • LU - In IBM's Systems Network Architecture (SNA), a logical unit (LU) identifies an end user in an SNA network.
  • luddism - A Luddite is a person who dislikes technology, especially technological devices that threaten existing jobs or interfere with personal privacy.
  • Luddite - A Luddite is a person who dislikes technology, especially technological devices that threaten existing jobs or interfere with personal privacy.
  • LUHN formula - The LUHN formula, also called modulus 10, is a simple algorithm used to validate the number on a credit card.
  • LUHN formula (modulus 10) - The LUHN formula, also called modulus 10, is a simple algorithm used to validate the number on a credit card.
  • lumen - The lumen (symbolized lm) is the International Unit of luminous flux.
  • LUN - A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute input/output (I/O) commands with a host computer, as defined by the Small System Computer Interface (SCSI) standard.
  • LUN management - LUN management is the process of assigning, provisioning and overseeing logical unit numbers (LUNs) across a storage environment.
  • LUN masking - LUN masking is a further constraint added to zoning, subdividing access to the port so that only LUNs authorized to access a specific server can access the corresponding port.
  • LUN zoning - LUN zoning is a method of configuring SAN fabric to match logical unit numbers (LUNs) to the proper servers.
  • Lustre - Lustre is an open source parallel distributed file system (DFS) specialized for large-scale cluster computing.
  • lux - The lux (symbolized lx) is the unit of illuminance in the International System of Units (SI).
  • lux (lx) - The lux (symbolized lx) is the unit of illuminance in the International System of Units (SI).
  • lx - The lux (symbolized lx) is the unit of illuminance in the International System of Units (SI).
  • LXD (Linux container hypervisor) - LXD is an open source container management extension for Linux Containers (LXC).
  • LZW compression - LZW compression is the compression of a file into a smaller file using a table-based lookup algorithm invented by Abraham Lempel, Jacob Ziv, and Terry Welch.
  • NICE Framework - The National Initiative for Cybersecurity Education Cybersecurity Workforce Framework (NICE Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • information lifecycle management (ILM)

    Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, ...

  • WORM (write once, read many)

    In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage ...

  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

Close