- lock token
- The value that is returned on successful execution of the WebDAV LOCK method. This value is used to transact subsequent requests.lock token
English-Arabic terms dictionary. 2015.
English-Arabic terms dictionary. 2015.
Token (railway signalling) — A token being offered by a signalman on the Keighley and Worth Valley Railway … Wikipedia
Token coin — In the study of numismatics, token coins or tokens are coin like objects used instead of coins. The field of tokens is part of exonumia. Tokens are used in place of coins and either have a denomination shown or implied by size, color or shape.… … Wikipedia
lock — 1. noun /lɒk,lɑːk/ a) Something used for fastening, which can only be opened with a key or combination. Give me the key, said my mother; and though the lock was very stiff, she had turned it and thrown back the lid in a twinkling. b) A mutex or… … Wiktionary
Lock-Sport-Krock — Infobox Album | Name = Lock Sport Krock Type = Album Artist = Nikola Sarcevic Released = July 13, 2004 Recorded = July 2003 Genre = Folk rock Length = 35:13 Label = Burning Heart Records Producer = Reviews = *Allmusic Rating|3.5|5… … Wikipedia
Electronic lock — A quick demonstration of an electronic door lock An electronic lock (more precisely an electric lock) is a locking device which operates by means of electric current. Electric locks are sometimes stand alone with an electronic control assembly… … Wikipedia
Pub token — Pub tokens (as they are known in the United Kingdom) or bar tokens or chits (United States usage) are a form of exonumia used in drinking establishments. Contents 1 Usage 2 See also 3 Further reading 4 … Wikipedia
Scalp lock — Scalp Scalp, n. [Perhaps akin to D. schelp shell. Cf. {Scallop}.] 1. That part of the integument of the head which is usually covered with hair. [1913 Webster] By the bare scalp of Robin Hodd s fat friar, This fellow were a king for our wild… … The Collaborative International Dictionary of English
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Serializing tokens — In computer science, serializing tokens are a concept in concurrency control arising from the ongoing development of DragonFly BSD. According to Matthew Dillon, they are most akin to SPLs, except a token works across multiple CPUs while SPLs only … Wikipedia
Virtual synchrony — is an interprocess messaging passing (sometimes called event queue management) technology. Virtual synchrony systems allow programs running in a network to organize themselves into process groups , and to send messages to groups (as opposed to… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia