Browse Definitions :

Browse Definitions by Alphabet

LOC - LOY

  • location intelligence (LI) - Location intelligence (LI) is a business analysis tool capability that enables companies to gather geographic- and location-related data to better understand global, regional and local business trends.
  • location poisoning - URL poisoning, also known as location poisoning, is a method of tracking Web user behavior by adding an identification (ID) number to the page address (Uniform Resource Locator) line of the Web browser when a user visits a particular site.
  • Location Routing Number - In the U.S.
  • Location Routing Number (LRN) - In the U.S.
  • location-based marketing (LBM) - Location-based marketing (LMS) is a direct marketing strategy that uses a mobile device's location to alert the device's owner about an offering from a near-by business.
  • location-based service - A location-based service (LBS) is a software application for a mobile device that requires knowledge about where the mobile device is located.
  • location-based service (LBS) - A location-based service (LBS) is a software application for a mobile device that requires knowledge about where the mobile device is located.
  • lock - A lock is a mechanism for controlling access to something.
  • locked down device (LDD) - A locked down device (LDD) is a mobile device, typically a smartphone, that is shipped by a vendor with the ability to accept only the SIM card that originally came with it.
  • locking - A lock is a mechanism for controlling access to something.
  • locomotion - Locomotion is directional movement that enables someone or something to move from one location to another.
  • log - An access log is a list of all the requests for individual files that people have requested from a Web site.
  • log (log file) - A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system.
  • log analytics - Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.
  • log management - Log management is the collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of the large volumes of log data created within an information system.
  • logarithm - A logarithm is an exponent used in mathematical calculations to depict the perceived levels of variable quantities such as visible light energy, electromagnetic field strength, and sound intensity.
  • logarithm (logarithmic) - A logarithm is an exponent used in mathematical calculations to depict the perceived levels of variable quantities such as visible light energy, electromagnetic field strength, and sound intensity.
  • logarithmic - A logarithm is an exponent used in mathematical calculations to depict the perceived levels of variable quantities such as visible light energy, electromagnetic field strength, and sound intensity.
  • Loggly - Loggly is a cloud-based enterprise log management and analytics tool.
  • logic analyzer - A logic analyzer (occasionally called a logical analyzer) is a laboratory test instrument designed to display and evaluate digital signals.
  • logic bomb - In a computer program, a logic bomb, also called slag code, is programming code, inserted surreptitiously or intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount of time or the failure of a a program user to respond to a program command.
  • logic bomb - A logic bomb, sometimes referred to as slag code, is a string of malicious code used to cause harm to a network when the programmed conditions are met.
  • logic chip - A microprocessor is a computer processor on a microchip.
  • logic gate - A logic gate is an elementary building block of a digital circuit.
  • logic gate (AND, OR, XOR, NOT, NAND, NOR and XNOR) - A logic gate is an elementary building block of a digital circuit.
  • logic level - A logic level is one of several states that a digital signal can possess, expressed as a DC (direct-current) voltage with respect to electrical ground.
  • logic simulator - A logic simulator is a computer program that allows designers and experimenters to conduct virtual tests of complex digital systems before working with any hardware.
  • logical AND symbol - For a practical application, see logic gate.
  • logical block addressing - Logical block addressing is a technique that allows a computer to address a hard disk larger than 528 megabytes.
  • logical block addressing (LBA) - Logical block addressing is a technique that allows a computer to address a hard disk larger than 528 megabytes.
  • logical equivalence - Logical equivalence is a type of relationship between two statements or sentences in propositional logic or Boolean algebra.
  • logical implication - Logical implication is a type of relationship between two statements or sentences.
  • logical interface (LIF) - A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.
  • logical LAN - A VLAN (virtual LAN) abstracts the idea of the local area network (LAN) by providing data link connectivity for a subnet.
  • Logical Link Control layer - The Logical Link Control (LCL) layer is one of two sublayers of the Data-Link layer in the Open Systems Interconnection (OSI) model of communication.
  • Logical Link Control layer (LCL layer) - The Logical Link Control (LCL) layer is one of two sublayers of the Data-Link layer in the Open Systems Interconnection (OSI) model of communication.
  • logical negation symbol - The logical negation symbol is used in Boolean algebra to indicate that the truth value of the statement that follows is reversed.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • Logical Observation Identifiers Names and Codes - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • logical OR symbol - For a practical application, see logic gate.
  • logical partition - A logical partition (LPAR) is the division of a computer's processor s, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s.
  • logical partition (LPAR) - A logical partition (LPAR) is the division of a computer's processor s, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s.
  • logical router - A logical router is a configured partition of a traditional network hardware, or "physical," router.
  • logical unit - In IBM's Systems Network Architecture (SNA), a logical unit (LU) identifies an end user in an SNA network.
  • logical unit (LU) - In IBM's Systems Network Architecture (SNA), a logical unit (LU) identifies an end user in an SNA network.
  • logical unit number - A logical unit number (LUN) identifies one or more physical or virtual storage devices to a SCSI initiator in a host server to enable data exchange.
  • logical unit number (LUN) - A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute input/output (I/O) commands with a host computer, as defined by the Small System Computer Interface (SCSI) standard.
  • logical volume management (LVM) - Logical volume management (LVM), a form of storage virtualization, offers system administrators a more flexible approach to managing disk storage space than traditional partitioning.
  • login - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
  • Login VSI (Login Virtual Session Indexer) - Login VSI (Login Virtual Session Indexer) is a software company that specializes in products IT can use to monitor and test loads for server-based computing, VDI and desktop as a service.
  • logistic regression - Logistic regression is a statistical analysis method used to predict a data value based on prior observations of a data set.
  • logistics - Logistics is the process of planning and executing the efficient transportation and storage of goods from the point of origin to the point of consumption.
  • Logistics Execution System - The Logistics Execution System (LES), a major component of the supply chain management (SCM) application from SAP, allows an administrator to manage the information and processes involved in all stages of the supply chain, from procuring raw materials to distributing finished products.
  • Logistics Execution System (LES) - The Logistics Execution System (LES), a major component of the supply chain management (SCM) application from SAP, allows an administrator to manage the information and processes involved in all stages of the supply chain, from procuring raw materials to distributing finished products.
  • logistics management - Logistics management is the governance of supply chain management functions that helps organizations plan, manage and implement processes to move and store goods.
  • logo - A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.
  • logon - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
  • logon (or login) - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
  • Logwatch - Logwatch is a log analysis program that parses through system logs and generates periodic reports based on criteria specified by the user.
  • LOINC - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • LOINC (Logical Observation Identifiers Names and Codes) - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • LOM - Lights-out management (LOM) is the ability for a system administrator to monitor and manage servers by remote control.
  • long distance carrier - A long-distance carrier is a telephone company that provides connections between local exchanges in different geographic areas.
  • long ICMP - On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.
  • long tail - The long tail is a frequency distribution pattern in which occurences are most densely clustered close to the Y-axis and the distribution curve tapers along the X-axis.
  • Long Term Evolution - Long Term Evolution (LTE) is a standard for 4G wireless broadband technology that offers increased network capacity and speed to mobile device users.
  • long-distance carrier - A long-distance carrier is a telephone company that provides connections between local exchanges in different geographic areas.
  • long-haul optics - Long-haul optics refers to the transmission of visible light signals over optical fiber cable for great distances, especially without or with minimal use of repeaters.
  • long-tail keywords - Long-tail keywords, in the context of advertising and SEO, are detailed keyword phrases that a potential customer might use to search online when ready to purchase.
  • longest delay in queue (LDQ) - Longest delay in queue (LDQ) is the longest time period that a customer in a queue waits before either connecting with an agent or hanging up.
  • longevity testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • longitude - Latitude and longitude are angles that uniquely define points on a sphere.
  • longitudinal study - A longitudinal study is an observational research method in which data is gathered for the same subjects repeatedly over a period of time.
  • longitudinal time code - Longitidinal time code (LTC) is a timing signal that is part of an audio tape recording.
  • longitudinal time code (LTC) - Longitidinal time code (LTC) is a timing signal that is part of an audio tape recording.
  • look to book - The look-to-book ratio is a figure used in the travel industry that shows the percentage of people who visit a travel Web site compared to those who actually make a purchase.
  • look-to-book ratio - The look-to-book ratio is a figure used in the travel industry that shows the percentage of people who visit a travel Web site compared to those who actually make a purchase.
  • Lookout Mobile Security - Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets.
  • loop - In computer programming, a loop is a sequence of instructions that is continually repeated until a certain condition is reached.
  • loopback - In telephone systems, a loopback is a test signal sent to a network destination that is returned as received to the originator.
  • loopback test - A loopback test is a test in which a signal in sent from a communications device and returned (looped back) to it as a way to determine whether the device is working right or as a way to pin down a failing node in a network.
  • loose coupling - Loose coupling is a method of interconnecting the components in a system or network so that those components, also called elements, depend on each other to the least extent practicable.
  • loot box - In video games, a loot box is an in-game purchase consisting of a virtual container that awards players with items and modifications based on chance.
  • LoRa Alliance - The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).
  • lossless - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossless and lossy compression - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossless compression - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossy - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossy compression - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • Lotus iNotes Web Access - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • Lotus Notes - Notes is a sophisticated groupware application from the Lotus Corporation, a subsidiary of IBM.
  • Lotus Notes & Domino - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • Lotus Workplace - Lotus Workplace is a set of customizable online work collaboration products from IBM's Lotus division.
  • LotusScript - LotusScript is a script language for use in a Lotus Notes client program or as a scheduled agent within a Domino server program.
  • low earth orbit (LEO) satellite - A low earth orbit (LEO) satellite is an object, generally an electronic piece of equipment, that circles around the earth at lower altitudes than geosynchronous satellites.
  • low-capacity snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
  • low-code and no-code development platforms - A low-code/no-code development platform is a visual software development environment that allows citizen developers to drag and drop application components, connect them together and create a mobile or web app.
  • low-light imaging - Low-light imaging is a technology used to improve visibility in dimly lit environments.
  • lowerCamelCase - lowerCamelCase (part of CamelCase) is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words (except the first one) capitalized within the new word that forms the name.
  • loyalty card program - A loyalty card program is an incentive plan that allows a retail business to gather data about its customers.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close