-
1 log chain
"A continuous sequence of transaction logs for a database. A new log chain begins with the first backup taken after the database is created, or when the database is switched from the simple to the full or bulk-logged recovery model. A log chain forks after a restore followed by a recovery, creating a new recovery branch." -
2 log shipping
"Copying, at regular intervals, log backup from a read-write database (the primary database) to one or more remote server instances (secondary servers). Each secondary server has a read-only database, called a secondary database, that was created by restoring a full backup of the primary database without recovery. The secondary server restores each copied log backup to the secondary database. The secondary servers are warm standbys for the primary server." -
3 Log Level Manager
A Project Server logging infrastructure that improves efficiency by enabling admins to customize logging levels for project entities. -
4 Office Telemetry Log
A feature that displays an Office event log in Excel format and helps the user to find and resolve known compatibility issues for Office files and solutions. -
5 primary database
"In a log shipping, a read-write database whose transaction log is backed up at regular intervals for restoring onto one or more secondary databases." -
6 user locale
"The user preferences for the formatting of dates, currencies, numbers, and so on. The user locale is a per-user setting, and does not require the user to restart or to log on or log off the computer." -
7 recovery model
"A database property that controls the basic behavior of backup and restore operations for a database. For instance, the recovery model controls how transactions are logged, whether the transaction log requires backing up, and what kinds of restore operations are available." -
8 conflict resolution method
"The method that is used to determine which change is written to the store in the event of a conflict. Typical conflict resolution methods are as follows: last writer wins, source wins, destination wins, custom, or deferred. For custom resolution, the resolving application reads the conflict from the conflict log and selects a resolution. For deferred resolution, the conflict is logged together with the conflicting change data and the made-with knowledge of the change."English-Arabic terms dictionary > conflict resolution method
-
9 common groups
Groups that appear in the program list on the Start menu for all users who log on to the computer. Only administrators can create or change common groups. -
10 distributed password authentication
"An advanced, distributed method of user authentication from Microsoft, allowing for single user log-on."English-Arabic terms dictionary > distributed password authentication
-
11 DPA
"An advanced, distributed method of user authentication from Microsoft, allowing for single user log-on." -
12 hive
"A file in which the system stores a portion of the registry (named for their resemblance to the cellular structure of a beehive). A hive is backed by a single file and a.log file, which are in either the systemroot\System32\Config folder or the systemroot\Profiles\username folder." -
13 note
An Outlook item that can be attached to a record's history log. Typically a note contains information regarding a conversation with a customer or other people in the company they work for. -
14 WPP
A mechanism for user-mode applications and kernel-mode drivers to log real-time binary messages. The logged messages can subsequently be converted to a human-readable trace of the driver's operation. -
15 Windows preprocessor
A mechanism for user-mode applications and kernel-mode drivers to log real-time binary messages. The logged messages can subsequently be converted to a human-readable trace of the driver's operation. -
16 business note
An Outlook item that can be attached to a record's history log. Typically a note contains information regarding a conversation with a customer or other people in the company they work for. -
17 Windows vault
"A type of vault that contains credentials for servers, Web sites, and programs that Windows can try to log you on to automatically." -
18 RFID sensor
"A type of sensor (such as a proximity sensor) that uses radio frequency identification (RFID) for a numerous purposes, such as identification of physical items, automatic log on, location of people, etc." -
19 radio frequency identification sensor
"A type of sensor (such as a proximity sensor) that uses radio frequency identification (RFID) for a numerous purposes, such as identification of physical items, automatic log on, location of people, etc."English-Arabic terms dictionary > radio frequency identification sensor
-
20 Tracing Service
A service responsible for writing diagnostic logging and usage logging information from SharePoint applications to log files on disk.
- 1
- 2
См. также в других словарях:
Log-structured file system — A log structured filesystem is a file system design first proposed by John K. Ousterhout and Fred Douglis. Designed for high write throughput, all updates to data and metadata are written sequentially to a continuous stream, called a log.… … Wikipedia
Log-structured File System (BSD) — The Log Structured File System (or LFS) is an implementation of a log structured file system (a concept originally proposed and implemented by John Ousterhout), originally developed for BSD. It was removed from FreeBSD and OpenBSD; the NetBSD… … Wikipedia
log on — verb enter a computer Have you logged in lately? • Syn: ↑log in, ↑log in • Ant: ↑log out (for: ↑log in) • Hypernyms: ↑ … Useful english dictionary
log off — verb exit a computer Please log off before you go home • Syn: ↑log out • Ant: ↑log in (for: ↑log out) • Hypernyms: ↑exit, ↑ … Useful english dictionary
Log bucking — Bucking is the process of cutting a felled and delimbed tree into logs. This can be a complicated process because logs destined for plywood, lumber, and pulp, each have their own price and specifications for length, diameter, and defects.Bucking… … Wikipedia
log-in — verb enter a computer Have you logged in lately? • Syn: ↑log in, ↑log on • Ant: ↑log out (for: ↑log in) • Hypernyms: ↑ … Useful english dictionary
Log cabin — For other uses, see Log cabin (disambiguation). Log cabins in the open air Norwegian Museum of Cultural History in Bygdøy, Oslo … Wikipedia
Log management and intelligence — Log Management (LM) comprises an approach to dealing with large volumes of computer generated log messages (also known as audit records, audit trails, event logs, etc). LM covers log collection, centralized aggregation, long term retention and… … Wikipedia
Log — Log, n. [Icel. l[=a]g a felled tree, log; akin to E. lie. See {Lie} to lie prostrate.] 1. A bulky piece of wood which has not been shaped by hewing or sawing. [1913 Webster] 2. [Prob. the same word as in sense 1; cf. LG. log, lock, Dan. log, Sw.… … The Collaborative International Dictionary of English
Log board — Log Log, n. [Icel. l[=a]g a felled tree, log; akin to E. lie. See {Lie} to lie prostrate.] 1. A bulky piece of wood which has not been shaped by hewing or sawing. [1913 Webster] 2. [Prob. the same word as in sense 1; cf. LG. log, lock, Dan. log,… … The Collaborative International Dictionary of English
Log book — Log Log, n. [Icel. l[=a]g a felled tree, log; akin to E. lie. See {Lie} to lie prostrate.] 1. A bulky piece of wood which has not been shaped by hewing or sawing. [1913 Webster] 2. [Prob. the same word as in sense 1; cf. LG. log, lock, Dan. log,… … The Collaborative International Dictionary of English