Browse Definitions :

Browse Definitions by Alphabet

LOG - NIC

  • logistic regression - Logistic regression is a statistical analysis method to predict a binary outcome, such as yes or no, based on prior observations of a data set.
  • logistics - Logistics is the process of planning and executing the efficient transportation and storage of goods from the point of origin to the point of consumption.
  • logistics management - Logistics management is the governance of supply chain management functions that helps organizations plan, manage and implement processes to move and store goods.
  • logo - A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.
  • logon (or login) - In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.
  • LOINC (Logical Observation Identifiers Names and Codes) - LOINC, the Logical Observation Identifiers Names and Codes, is a standard for identifying medical laboratory observations.
  • longitudinal study - A longitudinal study is an observational research method in which data is gathered for the same subjects repeatedly over a period of time.
  • longitudinal time code (LTC) - Longitidinal time code (LTC) is a timing signal that is part of an audio tape recording.
  • look-to-book ratio - The look-to-book ratio is a figure used in the travel industry that shows the percentage of people who visit a travel Web site compared to those who actually make a purchase.
  • Lookout Mobile Security - Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets.
  • loop - In computer programming, a loop is a sequence of instructions that is continually repeated until a certain condition is reached.
  • loopback test - A loopback test is a test in which a signal in sent from a communications device and returned (looped back) to it as a way to determine whether the device is working right or as a way to pin down a failing node in a network.
  • loose coupling - Loose coupling is a method of interconnecting the components in a system or network so that those components, also called elements, depend on each other to the least extent practicable.
  • loot box - In video games, a loot box is an in-game purchase consisting of a virtual container that awards players with items and modifications based on chance.
  • LoRa Alliance - The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).
  • lossless and lossy compression - Lossless and lossy file compression describe whether all original data can be recovered when the file is uncompressed.
  • low earth orbit (LEO) satellite - A low earth orbit (LEO) satellite is an object, generally an electronic piece of equipment, that circles around the earth at lower altitudes than geosynchronous satellites.
  • low-code and no-code development platforms - Low-code/no-code development platforms are types of visual software development environments that allow enterprise developers and citizen developers to drag and drop application components, connect them together and create mobile or web apps.
  • lowerCamelCase - lowerCamelCase (part of CamelCase) is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words (except the first one) capitalized within the new word that forms the name.
  • loyalty card program - A loyalty card program is an incentive plan that allows a retail business to gather data about its customers.
  • LPT (line print terminal) - LPT (line print terminal) is the usual designation for a parallel port connection to a printer or other device on a personal computer.
  • LPWAN (low-power wide area network) - Low-power WAN (LPWAN) is a wireless wide area network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges.
  • LTE (Long-Term Evolution) - LTE (Long-Term Evolution) is a standard for 4G wireless technology that offers increased network capacity and speed for cellphones and other cellular devices compared with 3G.
  • LTE-Advanced (Long Term Evolution-Advanced) - Long Term Evolution-Advanced (LTE-Advanced) is a cellular networking standard that offers higher throughput than its predecessor, the Long Term Evolution (LTE) standard.
  • LTFS (Linear Tape File System) - LTFS (Linear Tape File System) is a file system specification that allows Linear Tape-Open (LTO) storage technology to be indexed.
  • LTO (Linear Tape-Open) tape - LTO (Linear Tape-Open) tape is an open-format tape storage technology created by Hewlett-Packard (HP), International Business Machines (IBM) and Seagate Technology.
  • LTO-10 (Linear Tape-Open 10) - LTO-10 is an unreleased tape format from the Linear Tape-Open Consortium.
  • LTO-3 (Linear Tape-Open 3) - LTO-3 is a tape format from the Linear Tape-Open Consortium first released in 2005 that has since been followed by LTO-4, LTO-5 and LTO-6.
  • LTO-4 (Linear Tape-Open 4) - LTO-4 is a tape format from the Linear Tape-Open Consortium that has been succeeded by LTO-5 and the current LTO-6 version.
  • LTO-5 - LTO-5 is a tape format released in 2010 by the Linear Tape-Open Consortium.
  • LTO-6 (Linear Tape-Open 6) - LTO-6 is the current tape format from the Linear Tape-Open Consortium first released in 2012 that will eventually be succeeded by LTO-7, LTO-8, LTO-9 and LTO-10.
  • LTO-7 (Linear Tape-Open 7) - LTO-7 is a tape format from the Linear Tape-Open (LTO) Consortium released in late 2015.
  • LTO-8 (Linear Tape-Open 8) - LTO-8 is a tape format from the Linear Tape-Open Consortium released in late 2017.
  • LTO-9 (Linear Tape-Open 9) - LTO-9 (Linear Tape-Open 9) is a future tape format from the Linear Tape-Open Consortium.
  • Luddite - A Luddite is a person who dislikes technology, especially technological devices that threaten existing jobs or interfere with personal privacy.
  • Luhn algorithm (modulus 10) - The Luhn algorithm, also called modulus 10 or modulus 10 algorithm, is a simple mathematical formula used to validate a user's identification numbers.
  • lumen - The lumen (symbolized lm) is the International Unit of luminous flux.
  • LUN management - LUN management is the process of assigning, provisioning and overseeing logical unit numbers (LUNs) across a storage environment.
  • LUN masking - LUN masking is an authorization mechanism used in storage area networks (SANs) to make LUNs available to some hosts but unavailable to other hosts.
  • LUN zoning - LUN zoning is a method of configuring SAN fabric to match logical unit numbers (LUNs) to the proper servers.
  • Lustre - Lustre is an open source parallel distributed file system (DFS) specialized for large-scale cluster computing.
  • lux (lx) - The lux (symbolized lx) is the unit of illuminance in the International System of Units (SI).
  • LXD (Linux container hypervisor) - LXD is an open source container management extension for Linux Containers (LXC).
  • LZW compression - LZW compression is the compression of a file into a smaller file using a table-based lookup algorithm invented by Abraham Lempel, Jacob Ziv, and Terry Welch.
  • NICE Framework - The National Initiative for Cybersecurity Education Cybersecurity Workforce Framework (NICE Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close