1. To access a digital account or network, typically by entering personal credentials; to sign in. I'm having trouble logging in to my computer, so I haven't had a chance to check my email yet.
2. To allow someone to digital account or network; to sign someone in. In this usage, a noun or pronoun can be used between "log" and "in." I've having trouble accessing my account from home—any chance IT can log me in remotely?
3. To spend and record certain amount of time doing something. In this usage, a noun or pronoun can be used between "log" and "in." I've logged nearly 60 hours in this game so far.Please be aware that we are unable to pay overtime at the moment, so please be sure not to log in more than 40 hours of work each week.
Also, log on. Enter into a computer the information needed to begin a session, as in I logged in at two o'clock, or There's no record of your logging on today. These expressions refer especially to large systems shared by numerous individuals, who need to enter a username or password before executing a program. The antonyms are log off and log out, meaning "to end a computer session." All these expressions derive from the use of log in the nautical sense of entering information about a ship in a journal called a log book. [c. 1960]
1. To provide the necessary information to a computer for someone to be allowed to access computer resources; log on: I'll log you in so that you can access the library's resources. I sat at the terminal and logged in using my student account.
2. To spend some amount of time working: We've logged in 100 hours working on this project.
Because of the ease of logging in through apps, we expect to see continued growth in people banking via mobile devices - particularly smartphones - with a further move away from desktop as adoption increases amongst older generations."
Customers simply point their mobile device to go.akusa.org, and after logging in, they can check account balances, monitor transactions, transfer money between accounts and pay bills.
Using Expert Observer, Mills and his group identified log-in peak times, executed a packet capture on the log-in sequence with the audit running and determined that the odds of more than 20 people logging in at the same time over the one- to three-minute audit run were remote.
Before time-sharing, logging in wasn't a problem, given that there was nothing to log in to -- security could be handled simply by controlling access to the tape or punch-card reader.
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.