Browse Definitions:
  • January 28, 2008 28 Jan'08

    Financial Services Authority (FSA)

    The FSA (Financial Services Authority) is an independent, non-governmental body that regulates the financial services industry in the UK, including most financial services markets, exchanges and firms... (Continued)  Continue Reading

  • January 28, 2008 28 Jan'08

    Basel II

    Basel II is an international business standard that requires financial institutions to have enough cash reserves to cover risks incurred by operations. (Continued...)  Continue Reading

  • January 18, 2008 18 Jan'08

    UK Identity Cards Act

    The UK Identity Cards Act is a framework of enabling legislation for a British National Identity card passed in 2006. The Act has not yet gone into full-scale development or deployment... (Continued)  Continue Reading

  • January 18, 2008 18 Jan'08

    NO2ID (NO to a national ID)

    NO2ID is a grass-roots campaign in the UK that developed in opposition to the government's proposed National Identity Scheme. In the proposed scheme, national identification cards would be issued to individuals over the age of 16. (Continued)  Continue Reading

  • January 17, 2008 17 Jan'08

    power

    Electrical power is the rate at which electrical energy is converted to another form, such as motion, heat, or an electromagnetic field  Continue Reading

  • January 10, 2008 10 Jan'08

    BS 25999

    BS 25999 is the British Standards Institution (or BSI) standards for business continuity management.  Continue Reading

  • January 10, 2008 10 Jan'08

    MiFID (Markets in Financial Instruments Directive)

    MiFID (the Markets in Financial Instruments Directive) is legislation for the regulation of investment services within the European Economic Area.  Continue Reading

  • January 10, 2008 10 Jan'08

    Information Commissioner's Office (ICO)

    The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information... (Continued)  Continue Reading

  • January 10, 2008 10 Jan'08

    IISP (Institute of Information Security Professionals)

    The IISP (Institute of Information Security Professionals) is a London-based professional membership association who describes its purpose as: "to set the standard for professionalism in information security, and to speak with an independent and ...  Continue Reading

  • January 10, 2008 10 Jan'08

    EU Data Protection Directive (Directive 95/46/EC)

    EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to ...  Continue Reading

  • January 10, 2008 10 Jan'08

    Freedom of Information Act 2000

    The Freedom of Information Act 2000 is an act of the United Kingdom (UK) Parliament defining the ways in which the public may obtain access to government-held information... (Continued)  Continue Reading

  • January 10, 2008 10 Jan'08

    U.K. Data Protection Act 1998 (DPA 1998)

    The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled... (Continued)  Continue Reading

  • January 06, 2008 06 Jan'08

    Web year

    A Web year is the length of time it takes for Internet technology to evolve as much as technology in another environment might evolve in a calendar year. The term was coined at a time when the Internet and Web technology and culture were ...  Continue Reading

  • January 05, 2008 05 Jan'08

    bar graph

    A bar graph is a pictorial rendition of statistical data in which the independent variable can attain only certain discrete values.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close