Browse Definitions :

Browse Definitions by Alphabet

LOG - NIC

  • Login VSI (Login Virtual Session Indexer) - Login VSI (Login Virtual Session Indexer) is a software company that specializes in products IT can use to monitor and test loads for server-based computing, VDI and desktop as a service.
  • logistic regression - Logistic regression is a statistical analysis method used to predict a data value based on prior observations of a data set.
  • logistics - Logistics is the process of planning and executing the efficient transportation and storage of goods from the point of origin to the point of consumption.
  • Logistics Execution System - The Logistics Execution System (LES), a major component of the supply chain management (SCM) application from SAP, allows an administrator to manage the information and processes involved in all stages of the supply chain, from procuring raw materials to distributing finished products.
  • logistics management - Logistics management is the governance of supply chain management functions that helps organizations plan, manage and implement processes to move and store goods.
  • logo - A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.
  • logon - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
  • logon (or login) - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
  • LOINC - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • LOINC (Logical Observation Identifiers Names and Codes) - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • LOL - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • LOM - Lights-out management (LOM) is the ability for a system administrator to monitor and manage servers by remote control.
  • long distance carrier - A long-distance carrier is a telephone company that provides connections between local exchanges in different geographic areas.
  • long ICMP - On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.
  • Long Term Evolution - LTE (Long-Term Evolution) is a standard for 4G wireless technology that offers increased network capacity and speed for cellphones and other cellular devices compared with 3G.
  • long-haul optics - Long-haul optics refers to the transmission of visible light signals over optical fiber cable for great distances, especially without or with minimal use of repeaters.
  • long-tail keywords - Long-tail keywords, in the context of advertising and SEO, are detailed keyword phrases that a potential customer might use to search online when ready to purchase.
  • longest delay in queue - Longest delay in queue (LDQ) is the longest time period that a customer in a queue waits before either connecting with an agent or hanging up.
  • longevity testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • longitude - Latitude and longitude are angles that uniquely define points on a sphere.
  • longitudinal study - A longitudinal study is an observational research method in which data is gathered for the same subjects repeatedly over a period of time.
  • longitudinal time code - Longitidinal time code (LTC) is a timing signal that is part of an audio tape recording.
  • longitudinal time code (LTC) - Longitidinal time code (LTC) is a timing signal that is part of an audio tape recording.
  • look to book - The look-to-book ratio is a figure used in the travel industry that shows the percentage of people who visit a travel Web site compared to those who actually make a purchase.
  • look-to-book ratio - The look-to-book ratio is a figure used in the travel industry that shows the percentage of people who visit a travel Web site compared to those who actually make a purchase.
  • Lookout Mobile Security - Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets.
  • loop - In computer programming, a loop is a sequence of instructions that is continually repeated until a certain condition is reached.
  • loopback test - A loopback test is a test in which a signal in sent from a communications device and returned (looped back) to it as a way to determine whether the device is working right or as a way to pin down a failing node in a network.
  • loose coupling - Loose coupling is a method of interconnecting the components in a system or network so that those components, also called elements, depend on each other to the least extent practicable.
  • loot box - In video games, a loot box is an in-game purchase consisting of a virtual container that awards players with items and modifications based on chance.
  • LoRa Alliance - The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).
  • lossless - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossless and lossy compression - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossless compression - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossy - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • lossy compression - Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.
  • Lotus iNotes Web Access - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • Lotus Notes - Notes is a sophisticated groupware application from the Lotus Corporation, a subsidiary of IBM.
  • Lotus Notes & Domino - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • LotusScript - LotusScript is a script language for use in a Lotus Notes client program or as a scheduled agent within a Domino server program.
  • low earth orbit (LEO) satellite - A low earth orbit (LEO) satellite is an object, generally an electronic piece of equipment, that circles around the earth at lower altitudes than geosynchronous satellites.
  • low-capacity snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
  • low-code and no-code development platforms - Low-code/no-code development platforms are types of visual software development environments that allow enterprise developers and citizen developers to drag and drop application components, connect them together and create mobile or web apps.
  • low-light imaging - Low-light imaging is a technology used to improve visibility in dimly lit environments.
  • lowerCamelCase - lowerCamelCase (part of CamelCase) is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words (except the first one) capitalized within the new word that forms the name.
  • loyalty card program - A loyalty card program is an incentive plan that allows a retail business to gather data about its customers.
  • loyalty punch card - A loyalty punch card is a token that lets a customer earn free merchandise or discounts after a certain number of purchases.
  • LPAR - A logical partition (LPAR) is the division of a computer's processor s, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s.
  • LPT - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPT (line print terminal) - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPT1 - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPT2 - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPT3 - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPWAN (low-power wide area network) - Low-power WAN (LPWAN) is a wireless wide area network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges.
  • LQSR - LQSR (Link Quality Source Routing) is a routing protocol for wireless mesh networks.
  • LRN - In the U.S.
  • LSB - The Linux Standard Base (LSB), also called the LSB project, is an ongoing effort to standardize the structure of Linux and related operating systems, with the intention of increasing compatibility among systems that use different versions (also known as distributions or flavors) of Unix.
  • LSB project - The Linux Standard Base (LSB), also called the LSB project, is an ongoing effort to standardize the structure of Linux and related operating systems, with the intention of increasing compatibility among systems that use different versions (also known as distributions or flavors) of Unix.
  • LTC - Longitidinal time code (LTC) is a timing signal that is part of an audio tape recording.
  • LTE - LTE (Long-Term Evolution) is a standard for 4G wireless technology that offers increased network capacity and speed for cellphones and other cellular devices compared with 3G.
  • LTE (Long-Term Evolution) - LTE (Long-Term Evolution) is a standard for 4G wireless technology that offers increased network capacity and speed for cellphones and other cellular devices compared with 3G.
  • LTE-Advanced (Long Term Evolution-Advanced) - Long Term Evolution-Advanced (LTE-Advanced) is a cellular networking standard that offers higher throughput than its predecessor, the Long Term Evolution (LTE) standard.
  • LTFS (Linear Tape File System) - LTFS (Linear Tape File System) is a file system specification that allows Linear Tape-Open (LTO) storage technology to be indexed.
  • LTO - LTO (Linear Tape-Open) tape is an open-format tape storage technology created by Hewlett-Packard (HP), International Business Machines (IBM) and Seagate Technology.
  • LTO (Linear Tape-Open) tape - LTO (Linear Tape-Open) tape is an open-format tape storage technology created by Hewlett-Packard (HP), International Business Machines (IBM) and Seagate Technology.
  • LTO-1 (Linear Tape-Open 1) - LTO-1 is the first tape format from the Linear Tape-Open Consortium.
  • LTO-10 (Linear Tape-Open 10) - LTO-10 is an unreleased tape format from the Linear Tape-Open Consortium.
  • LTO-2 (Linear Tape-Open 2) - LTO-2 is the second tape format from the Linear Tape-Open (LTO) Consortium.
  • LTO-3 (Linear Tape-Open 3) - LTO-3 is a tape format from the Linear Tape-Open Consortium first released in 2005 that has since been followed by LTO-4, LTO-5 and LTO-6.
  • LTO-4 (Linear Tape-Open 4) - LTO-4 is a tape format from the Linear Tape-Open Consortium that has been succeeded by LTO-5 and the current LTO-6 version.
  • LTO-5 - LTO-5 is a tape format released in 2010 by the Linear Tape-Open Consortium.
  • LTO-6 (Linear Tape-Open 6) - LTO-6 is the current tape format from the Linear Tape-Open Consortium first released in 2012 that will eventually be succeeded by LTO-7, LTO-8, LTO-9 and LTO-10.
  • LTO-7 (Linear Tape-Open 7) - LTO-7 is a tape format from the Linear Tape-Open (LTO) Consortium released in late 2015.
  • LTO-8 (Linear Tape-Open 8) - LTO-8 is a tape format from the Linear Tape-Open Consortium released in late 2017.
  • LTO-9 (Linear Tape-Open 9) - LTO-9 (Linear Tape-Open 9) is a future tape format from the Linear Tape-Open Consortium.
  • LU - In IBM's Systems Network Architecture (SNA), a logical unit (LU) identifies an end user in an SNA network.
  • LU 6.2 - APPC (Advanced Program-to-Program Communication, sometimes called LU 6.
  • luddism - A Luddite is a person who dislikes technology, especially technological devices that threaten existing jobs or interfere with personal privacy.
  • Luddite - A Luddite is a person who dislikes technology, especially technological devices that threaten existing jobs or interfere with personal privacy.
  • LUHN formula - The LUHN formula, also called modulus 10, is a simple algorithm used to validate the number on a credit card.
  • LUHN formula (modulus 10) - The LUHN formula, also called modulus 10, is a simple algorithm used to validate the number on a credit card.
  • lumen - The lumen (symbolized lm) is the International Unit of luminous flux.
  • LUN - A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute input/output (I/O) commands with a host computer, as defined by the Small System Computer Interface (SCSI) standard.
  • LUN management - LUN management is the process of assigning, provisioning and overseeing logical unit numbers (LUNs) across a storage environment.
  • LUN masking - LUN masking is a further constraint added to zoning, subdividing access to the port so that only LUNs authorized to access a specific server can access the corresponding port.
  • LUN zoning - LUN zoning is a method of configuring SAN fabric to match logical unit numbers (LUNs) to the proper servers.
  • Lustre - Lustre is an open source parallel distributed file system (DFS) specialized for large-scale cluster computing.
  • lux - The lux (symbolized lx) is the unit of illuminance in the International System of Units (SI).
  • lux (lx) - The lux (symbolized lx) is the unit of illuminance in the International System of Units (SI).
  • lx - The lux (symbolized lx) is the unit of illuminance in the International System of Units (SI).
  • LXD (Linux container hypervisor) - LXD is an open source container management extension for Linux Containers (LXC).
  • LZW compression - LZW compression is the compression of a file into a smaller file using a table-based lookup algorithm invented by Abraham Lempel, Jacob Ziv, and Terry Welch.
  • NICE Framework - The National Initiative for Cybersecurity Education Cybersecurity Workforce Framework (NICE Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • key fob

    A key fob is a small, programmable device that provides access to a physical object.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close