Browse Definitions :

Browse Definitions by Alphabet

LIS - LOG

  • LISP (list processing) - LISP, an acronym for list processing, is a programming language that was designed for easy manipulation of data strings.
  • list price - The list price is the stated value for which something is offered for sale through a particular channel such as a showroom, a retail store, a catalog or a retail, wholesale or distributor website.
  • list processing - LISP, an acronym for list processing, is a programming language that was designed for easy manipulation of data strings.
  • list processing (language) - LISP, an acronym for list processing, is a programming language that was designed for easy manipulation of data strings.
  • list server - A list server (mailing list server) is a program that handles subscription requests for a mailing list and distributes new messages, newsletters, or other postings from the list's members to the entire list of subscribers as they occur or are scheduled.
  • list server (mailing list server) - A list server (mailing list server) is a program that handles subscription requests for a mailing list and distributes new messages, newsletters, or other postings from the list's members to the entire list of subscribers as they occur or are scheduled.
  • listener - An event sink, sometimes called a listener, is a piece of coding that specifies how a server or computer is to handle given events.
  • listicle - A listicle is an index whose point items are supplemented with additional related commentary.
  • listserv - Listserv, like Majordomo, is a small program that automatically redistributes e-mail to names on a mailing list.
  • listserv (mailing list server) - Listserv, like Majordomo, is a small program that automatically redistributes e-mail to names on a mailing list.
  • LiteOS - LiteOS is a lightweight, open source IoT device and smartphone OS from the Chinese smartphone manufacturer Huawei.
  • Lithium Ion battery - A Lithium Ion (Li-Ion) battery is a rechargeable battery with twice the energy capacity of a Nickel-Cadmium battery and greater stability and safety.
  • lithium polymer battery (LiPo) - A lithium-polymer battery (LiPo) is a rechargeable battery that, in the case of true LiPo, uses solid polymer for the electrolyte and lithium for one of the electrodes.
  • litigation hold - Litigation hold is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company.
  • litigation hold (preservation orders or hold orders) - Litigation hold is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company.
  • little-endian - Endianness is a term that describes the order in which a sequence of bytes are stored in computer memory.
  • live cam - A cam, homecam, or Webcam is a video camera, usually attached directly to a computer, whose current or latest image is requestable from a Web site.
  • live chat (live support) - Live chat (live support) provides the means to engage with users, as they’re actively visiting an organization’s owned media properties.
  • live migration - Live migration is the movement of a virtual machine from one physical host to another while continuously powered-up.
  • live USB (operating system on a stick) - Windows To Go is a feature of Windows 8 Enterprise edition that allows administrators to put a full blown copy of Windows 8 on an external USB 3.
  • LiveJournal - LiveJournal is a social media platform that allows users to keep a blog, journal or diary and share their interests with LiveJournal friends or communities around the world.
  • LivePerson - LivePerson is a software as a service (SaaS) provider that develops customer engagement and conversational commerce applications and platforms.
  • living documentation - Living documentation is a dynamic method of system documentation that provides information that is current, accurate and easy to understand.
  • LLC - The Logical Link Control (LCL) layer is one of two sublayers of the Data-Link layer in the Open Systems Interconnection (OSI) model of communication.
  • lldpnetmap - Lldpnetmap is a troubleshooting command that displays to which physical switch an ESXi host is connected.
  • LMDS - LMDS (Local Multipoint Distribution System) is a system for broadband microwave wireless transmission direct from a local antenna to homes and businesses within a line-of-sight radius, a solution to the so-called last-mile technology problem of economically bringing high-bandwidth services to users.
  • LMGTFY (Let Me Google That For You) - LMGTFY (Let Me Google That For You) is a website that creates a demonstration of how to conduct a user-specified Google search.
  • LMS - A learning management system (LMS) is a software application or web-based technology used to plan, implement and assess a specific learning process.
  • LNP - Local Number Portability (LNP) is the ability of a telephone customer in the U.
  • load balance - Load balancing is a technique used to distribute workloads uniformly across servers or other compute resources to optimize network efficiency, reliability and capacity.
  • load balancing - Load balancing is a technique used to distribute workloads uniformly across servers or other compute resources to optimize network efficiency, reliability and capacity.
  • load bank - A load bank is a device that generates a prescribed amount of electricity draw to test the reliability of electrical switching, generator output, uninterruptable power supply (UPS) systems and cooling in a data center.
  • load coil - A loading coil is an induction device placed on a local loop longer than 18,000 feet that carries analog signals.
  • Load DynamiX - Load DynamiX is a storage performance testing appliance that can simulate production workloads and virtual desktop infrastructure workloads to determine how a system handles stress before putting that system into production.
  • load shedding - Load shedding is a reduction of power demand by a utility provider during peak or stressed times.
  • load testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • load-sharing mirror - A load-sharing mirror or load-balancing mirror is a mirror image copy of a site or service that not only acts as a backup but actively shares in serving a portion of traffic.
  • loader - In a computer operating system, a loader is a component that locates a given program (which can be an application or, in some cases, part of the operating system itself) in offline storage (such as a hard disk), loads it into main storage (in a personal computer, it's called random access memory), and gives that program control of the computer (allows it to execute its instruction s).
  • loading - In a computer operating system, a loader is a component that locates a given program (which can be an application or, in some cases, part of the operating system itself) in offline storage (such as a hard disk), loads it into main storage (in a personal computer, it's called random access memory), and gives that program control of the computer (allows it to execute its instruction s).
  • LOB - An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.
  • LOB (line-of-business) - An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.
  • local access and transport area - LATA (local access and transport area) is a term in the U.
  • local access and transport area (LATA) - LATA (local access and transport area) is a term in the U.
  • local area network - A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.
  • local area network (LAN) - A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.
  • local exchange carrier - LEC (local exchange carrier) is the term for a public telephone company in the U.
  • Local Group Policy Editor - Local Group Policy Editor is a user interface that allows all Local Group Policy objects and their settings to be managed in one place.
  • local loop - In telephony, a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses.
  • Local Multipoint Distribution System - LMDS (Local Multipoint Distribution System) is a system for broadband microwave wireless transmission direct from a local antenna to homes and businesses within a line-of-sight radius, a solution to the so-called last-mile technology problem of economically bringing high-bandwidth services to users.
  • Local Number Portability - Local Number Portability (LNP) is the ability of a telephone customer in the U.
  • local wipe - Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration.
  • localization - Localization (sometimes shortened to "L10n") is the process of adapting a product or service to a particular language, culture and desired local "look-and-feel.
  • localization - Localization (sometimes shortened to "L10n") is the process of adapting a product or service to a particular language, culture and desired local "look-and-feel.
  • location awareness - Location awareness is a component of presence technology that delivers information about a device's physical location to another user or application.
  • location based service - A location-based service (LBS) is a software application for a mobile device that requires knowledge about where the mobile device is located.
  • location intelligence (LI) - Location intelligence (LI) is a business analysis tool capability that enables companies to gather geographic- and location-related data to better understand global, regional and local business trends.
  • location poisoning - URL poisoning, also known as location poisoning, is a method of tracking Web user behavior by adding an identification (ID) number to the page address (Uniform Resource Locator) line of the Web browser when a user visits a particular site.
  • Location Routing Number - In the U.S.
  • location-based marketing (LBM) - Location-based marketing (LMS) is a direct marketing strategy that uses a mobile device's location to alert the device's owner about an offering from a near-by business.
  • location-based service - A location-based service (LBS) is a software application for a mobile device that requires knowledge about where the mobile device is located.
  • location-based service (LBS) - A location-based service (LBS) is a software application for a mobile device that requires knowledge about where the mobile device is located.
  • locked down device (LDD) - A locked down device (LDD) is a mobile device, typically a smartphone, that is shipped by a vendor with the ability to accept only the SIM card that originally came with it.
  • locking - A lock is a mechanism for controlling access to something.
  • locomotion - Locomotion is directional movement that enables someone or something to move from one location to another.
  • log - An access log is a list of all the requests for individual files that people have requested from a Web site.
  • log (log file) - A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system.
  • log analytics - Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.
  • log management - Log management is the collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of the large volumes of log data created within an information system.
  • logarithm - A logarithm is an exponent used in mathematical calculations to depict the perceived levels of variable quantities such as visible light energy, electromagnetic field strength, and sound intensity.
  • logarithmic - A logarithm is an exponent used in mathematical calculations to depict the perceived levels of variable quantities such as visible light energy, electromagnetic field strength, and sound intensity.
  • Loggly - Loggly is a cloud-based enterprise log management and analytics tool.
  • logic analyzer - A logic analyzer (occasionally called a logical analyzer) is a laboratory test instrument designed to display and evaluate digital signals.
  • logic bomb - A logic bomb, sometimes referred to as slag code, is a string of malicious code used to cause harm to a network when the programmed conditions are met.
  • logic bomb - A logic bomb is a string of malicious code that is inserted intentionally into a program to harm a network when certain conditions are met.
  • logic chip - A microprocessor is a computer processor on a microchip.
  • logic gate - A logic gate is an elementary building block of a digital circuit.
  • logic gate (AND, OR, XOR, NOT, NAND, NOR and XNOR) - A logic gate is an elementary building block of a digital circuit.
  • logic level - A logic level is one of several states that a digital signal can possess, expressed as a DC (direct-current) voltage with respect to electrical ground.
  • logic simulator - A logic simulator is a computer program that allows designers and experimenters to conduct virtual tests of complex digital systems before working with any hardware.
  • logical AND symbol - For a practical application, see logic gate.
  • logical block addressing - Logical block addressing is a technique that allows a computer to address a hard disk larger than 528 megabytes.
  • logical block addressing (LBA) - Logical block addressing is a technique that allows a computer to address a hard disk larger than 528 megabytes.
  • logical equivalence - Logical equivalence is a type of relationship between two statements or sentences in propositional logic or Boolean algebra.
  • logical implication - Logical implication is a type of relationship between two statements or sentences.
  • logical interface (LIF) - A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.
  • logical LAN - A VLAN (virtual LAN) is a subnetwork which can group together collections of devices on separate physical local area networks (LANs).
  • Logical Link Control layer - The Logical Link Control (LCL) layer is one of two sublayers of the Data-Link layer in the Open Systems Interconnection (OSI) model of communication.
  • logical negation symbol - The logical negation symbol is used in Boolean algebra to indicate that the truth value of the statement that follows is reversed.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • Logical Observation Identifiers Names and Codes - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • logical OR symbol - For a practical application, see logic gate.
  • logical partition - A logical partition (LPAR) is the division of a computer's processor s, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s.
  • logical partition (LPAR) - A logical partition (LPAR) is the division of a computer's processor s, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s.
  • logical router - A logical router is a configured partition of a traditional network hardware, or "physical," router.
  • logical unit - In IBM's Systems Network Architecture (SNA), a logical unit (LU) identifies an end user in an SNA network.
  • logical unit (LU) - In IBM's Systems Network Architecture (SNA), a logical unit (LU) identifies an end user in an SNA network.
  • logical unit number - A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute input/output (I/O) commands with a host computer, as defined by the Small System Computer Interface (SCSI) standard.
  • logical unit number (LUN) - A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute input/output (I/O) commands with a host computer, as defined by the Small System Computer Interface (SCSI) standard.
  • logical volume management (LVM) - Logical volume management (LVM), a form of storage virtualization, offers system administrators a more flexible approach to managing disk storage space than traditional partitioning.
  • login - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close