Browse Definitions :

Browse Definitions by Alphabet

L1 - LIF

  • L1 and L2 - L1 and L2 are levels of cache memory in a computer.
  • L3 Harris Technologies - L3 Harris Technologies is a military technology company.
  • labor arbitrage - Labor arbitrage is the practice of searching for and then using the lowest-cost workforce to produce products or goods.
  • labor automation - Labor automation refers to the use of technology to perform specific tasks or jobs traditionally done by humans.
  • labor law - Labor law is legislation specifying responsibilities and rights in employment, particularly the responsibilities of the employer and the rights of the employee.
  • labor productivity ratio - The labor productivity ratio is a metric expressing the number of work units produced per time worked.
  • laboratory information system - A laboratory information system (LIS) is software that collects, stores and produces reports from medical test data.
  • Lakeside Software - Lakeside Software is a desktop monitoring software company known for its SysTrack product, which provides performance data and analytics for physical and virtual desktops.
  • lambda (general definition) - Lambda, the 11th letter of the Greek alphabet, is used as a symbol in optical fiber networking, in mathematics and in computer programming.
  • Lambda architecture - Lambda architecture is an approach to big data management that provides access to batch processing and near real-time processing with a hybrid approach.
  • LAMP (Linux, Apache, MySQL, PHP) - LAMP is an open source Web development platform that uses Linux as the operating system, Apache as the Web server, MySQL as the relational database management system and PHP as the object-oriented scripting language.
  • LAN-free backup - LAN-free backup is the process of backing up server data to a centralized storage device rather than moving it across a local-area network (LAN).
  • LANDesk Client Manager (LDCM) - LDCM (LANDesk Client Manager) is a software product from Intel that lets a system administrator for a local area network () see the configurations and monitor the status of personal computer on the LAN.
  • landline - A landline is a telephone that transmits signals converted from audio data through physical media, such as wire or fibre optic cable, rather than through wireless transmission as is the case with mobile phones.
  • landscape - In printing from a computer, landscape refers to a mode in which content is printed for reading on the longer length of the sheet of paper.
  • language modeling - Language modeling (LM) is the use of various statistical and probabilistic techniques to determine the probability of a given sequence of words occurring in a sentence.
  • Language Workbench - A Language Workbench (LWB) is a development toolset that facilitates the development and editing of domain specific languages (DSLs).
  • language-oriented programming (LOP) - Language-oriented programming (LOP) is an approach to software development that focuses on the use of domain specific languages (DSLs) to solve problems within various domains in a system or application.
  • laptop computer - A laptop computer, usually called a notebook computer by manufacturers, is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings.
  • Large Account Reseller (LAR) - A large account reseller (LAR) is a label used by Microsoft to identify its largest value-added resellers (VARs).
  • LARP (Live Action Role Playing) - LARP (Live Action Role Playing), also called LARPing, is a character-driven type of gameplay that is conducted in the physical world.
  • laser - A laser is a coherent and focused beam of photons; coherent, in this context, means that it is all one wavelength, unlike ordinary light which showers on us in many wavelengths.
  • laser diode (injection laser or diode laser) - A laser diode, also known as an injection laser or diode laser, is a semiconductor device that produces coherent radiation (in which the waves are all at the same frequency and phase) in the visible or infrared (IR) spectrum when current passes through it.
  • laser printer - A laser printer is a popular type of personal computer printer that uses a non-impact (keys don't strike the paper), photocopier technology.
  • last mile delivery - Last mile delivery is a term used for transportation of merchandise from the nearest distribution hub to the final destination, such as a home or business.
  • last mile of finance (LMOF) - The last mile of finance is composed of the management processes that finance executives perform after the monthly, quarterly or annual close to prepare for financial reporting and disclosure.
  • latency - Latency is the delay from the input into a system to a desired outcome.
  • latent data (ambient data) - Latent data, also known as ambient data, is the information in computer storage that is not referenced in file allocation tables and is generally not viewable through the operating system (OS) or standard applications.
  • latitude and longitude - Latitude and longitude are angles that uniquely define points on a sphere.
  • law of averages - The law of averages is an erroneous generalization of the law of large numbers, which states that the frequencies of events with the same likelihood of occurrence even out, given enough trials or instances.
  • law of diminishing returns - The law of diminishing returns is an economic principle that states that as investment in a single goal increases, while all other variables remain constant, the return on investment will eventually decline.
  • law of large numbers - The law of large numbers is a principle of probability according to which the frequencies of events with the same likelihood of occurrence even out, given enough trials or instances.
  • law of unintended consequences - The law of unintended consequences is a frequently-observed phenomenon in which any action has results that are not part of the actor's purpose.
  • layer - In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
  • Layer Two Tunneling Protocol (L2TP) - Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the internet.
  • layering - In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
  • lazy loading (dynamic function loading) - Lazy loading, also known as dynamic function loading, is a mode that allows a developer to specify what components of a program should not be loaded into storage by default when a program is started.
  • LCD (Liquid Crystal Display) - LCD (Liquid Crystal Display) is a type of flat panel display which uses liquid crystals in its primary form of operation.
  • LCD TV - LCD TV is a television display technology based on a liquid crystal display.
  • LDAP (Lightweight Directory Access Protocol) - LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate data such as organizations, individuals and other resources such as files and devices in a network -- whether on the public internet or on a corporate intranet.
  • LDAP injection - LDAP (Lightweight Directory Access Protocol) injection is a type of security exploit that is used to compromise the authentication process used by some websites.
  • LDIF (Lightweight Directory Interchange Format) - LDIF (Lightweight Directory Interchange Format) is an ASCII file format used to exchange data and enable the synchronization of that data between Lightweight Directory Access Protocol (LDAP) servers called Directory System Agents (DSAs).
  • lead generator - A lead generator is any marketing-related activity intended to publicize the availability of a vendor's product or service.
  • lead nurturing - Lead nurturing is a set of integrated marketing strategies designed to turn a potential customer into a buyer.
  • lead scoring - In the B2B industry, lead scoring is a methodology used by sales and marketing departments to determine the worthiness of leads, or potential customers, by attaching values to them based on their behavior relating to their interest in products or services.
  • lead time (in purchasing/procurement) - In procurement, lead time includes the first effort to initiate procurement of goods or services up to the time of their arrival.
  • lead trajectory - A lead trajectory is a projected path of a lead or potential customer as it applies to a goal, such as signing the customer up for a service or making a sale.
  • lead-to-revenue management (L2RM) - Lead-to-revenue management (L2RM) is a collection of sales and marketing processes that aims to maximize the income gained from each stage of the customer journey.
  • leadership - Leadership is the ability of an individual or a group of individuals to influence and guide followers or other members of an organization.
  • leadership skills - Leadership skills are the strengths and abilities individuals demonstrate that help the oversee processes, guide initiatives and steer their employees toward the achievement of goals.
  • leadership traits - Leadership traits are the personal qualities that shape effective leaders.
  • leaf-spine (leaf-spine architecture) - Leaf-spine is a two-layer network topology composed of leaf switches and spine switches.
  • leaky bucket - The leaky bucket is an analogy for describing how inputs and outputs work in a wide variety of business and technology contexts.
  • leaky bucket algorithm - The leaky bucket algorithm is used to implement traffic policing and traffic shaping in Ethernet and cellular data networks.
  • leaky feeder - A leaky feeder is a coaxial cable that has small sections of its copper shielding stripped away to allow radio frequency (RF) signals to escape.
  • leaky pipeline - A leaky pipeline is a system designed to channel something from one place to another that is flawed in such a way that it loses some quantity of what it carries before it reaches the destination.
  • lean management - Lean management is an approach to managing an organization that supports the concept of continuous improvement, a long-term approach to work that systematically seeks to achieve small, incremental changes in processes in order to improve efficiency and quality.
  • lean manufacturing (lean production) - Lean manufacturing is a methodology that focuses on minimizing waste within manufacturing systems while simultaneously maximizing productivity.
  • Lean Six Sigma - Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.
  • Lean software development - Lean software development is a concept that emphasizes optimizing efficiency and minimizing waste in the development of software.
  • lean startup - Lean startup is an approach to building new businesses based on the belief that entrepreneurs must investigate, experiment, test and iterate as they develop products.
  • lean water spider - Lean water spider is a term used in manufacturing that refers to a position in a production environment or warehouse that ensures materials are supplied where and when they are needed.
  • LEAP (Lightweight Extensible Authentication Protocol) - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • Learn IT: Malware - Emerging strains of malware include new evasion and obfuscation techniques that are designed to fool security administrators and anti-malware products, as well as end users.
  • Learn IT: systems management - Systems management is the supervision of the information technology systems in an enterprise.
  • learnability - Learnability is a quality of products and interfaces that allows users to quickly become familiar with them and able to make good use of all their features and capabilities.
  • learning curve - Learning curves are a visualization of the difficulty estimated in learning a subject over a period of time as well as relative progress throughout the process of learning.
  • learning experience platform (LXP) - A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (SaaS).
  • learning management system (LMS) - A learning management system (LMS) is a software application or web-based technology used to plan, implement and assess a specific learning process.
  • leased line - A leased line is a bidirectional telephone line that has been rented for private voice, data exchange or telecommunication use.
  • least cost routing (LCR) - Least cost routing (LCR) is a process that allows telecommunications providers to select the lowest cost carrier for bandwidth provision for their voice communications.
  • LED light bulb - An LED light bulb is a solid-state lighting (SSL) device that fits in standard screw-in connections but uses LEDs (light-emitting diodes) to produce light.
  • LED TV (LED-backlight LCD television) - LED TV is a type of LCD television that uses light-emitting diodes (LEDs) to backlight the display instead of the cold cathode fluorescent lights (CCFLs) used in standard LCD televisions.
  • LEED (Leadership in Energy and Environmental Design) - LEED (Leadership in Energy and Environmental Design) is an ecology-oriented building certification program run under the auspices of the U.
  • leet speak (leet) - Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters.
  • legacy application - A legacy application (legacy app) is a software program that is outdated or obsolete.
  • legacy platform (legacy operating system) - A legacy platform, also called a legacy operating system, is an operating system (OS) no longer in widespread use, or that has been supplanted by an updated version of earlier technology.
  • legacy storage - Legacy storage is traditional storage hardware that is older and sometimes no longer sold by its vendor.
  • legal analytics - Legal analytics is the application of data analysis methods and technologies within the field of law to improve efficiency, gain insight and realize greater value from available data.
  • legal health record - A legal health record is the record of patient health that is created by a health care organization for its own business record.
  • lemmatization - Lemmatization is the grouping together of different forms of the same word.
  • lemniscate - A lemniscate is a plane curve with a characteristic shape, consisting of two loops that meet at a central point as shown below.
  • Lenovo Converged HX series - HX hyper-converged infrastructure appliances are designed for virtual desktop infrastructure (VDI), server virtualization, private and hybrid clouds, enterprise applications and remote/branch office (ROBO) environments.
  • Lenovo IdeaPad Yoga - The Lenovo IdeaPad Yoga is a line of convertible tablet computers that run the Windows operating system.
  • Let's Encrypt - Let's Encrypt is designed to simplify the acquisition of SSL/TLS digital certificates proving a site’s authenticity, while also providing encryption.
  • letter of intent - A letter of intent (LOI) is a document outlining the general plans of an agreement between two or more parties before a legal agreement is finalized.
  • letterpress - Letterpress is the oldest form of printing.
  • level of support (support level) - Level of support indicates a specific extent of technical assistance in the total range of assistance that is provided by an information technology product (such as a software product) to its customers.
  • leverage - In the physical sense, leverage is an assisted advantage.
  • Lex (lexical analyzer generator) - Lex is a program designed to generate scanners, also known as tokenizers, which recognize lexical patterns in text.
  • lexical ambiguity - Lexical ambiguity is the potential for multiple interpretations of spoken or written language that renders it difficult or impossible to understand without some additional information.
  • lexical scoping (static scoping) - Lexical scoping (sometimes known as static scoping) is a convention used with many programming languages that sets the scope (range of functionality) of a variable so that it may only be called (referenced) from within the block of code in which it is defined.
  • liaison officer - A liaison officer is an employee who is responsible for establishing a positive working relationship between two or more people, organizations or agencies, typically with the goal of working through a mutual problem or concern.
  • life-cycle cost analysis (LCCA) - Life-cycle cost analysis (LCCA) is the study of all the costs associated with processes, materials and goods from acquisition to ownership and maintenance, through to and including disposal.
  • Life360 - Life360 is a family communication, location and alert app for smartphones that allows users to share their locations with each other.
  • lifecasting - Lifecasting is 24/7 broadcasting of events in a person’s life through digital media.
  • lifestyle business - A lifestyle business is one that is geared toward supporting the owner’s income and personal requirements rather than maximizing revenue.
  • lifestyle center - A lifestyle center is a shopping center, or mixed-use commercial development that combines retail with other services, such as medical services, home rental units, movie theaters and other leisure or other activities.
  • LiFi - LiFi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data transmission.
  • lift and shift - Lift and shift is a strategy for moving an application or operation from one environment to another – without redesigning the app.
SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

Close