Browse Definitions:
  • January 28, 2008 28 Jan'08

    Financial Services Authority (FSA)

    The FSA (Financial Services Authority) is an independent, non-governmental body that regulates the financial services industry in the UK, including most financial services markets, exchanges and firms... (Continued)  Continue Reading

  • January 28, 2008 28 Jan'08

    Basel II

    Basel II is an international business standard that requires financial institutions to have enough cash reserves to cover risks incurred by operations. (Continued...)  Continue Reading

  • January 18, 2008 18 Jan'08

    UK Identity Cards Act

    The UK Identity Cards Act is a framework of enabling legislation for a British National Identity card passed in 2006. The Act has not yet gone into full-scale development or deployment... (Continued)  Continue Reading

  • January 18, 2008 18 Jan'08

    NO2ID (NO to a national ID)

    NO2ID is a grass-roots campaign in the UK that developed in opposition to the government's proposed National Identity Scheme. In the proposed scheme, national identification cards would be issued to individuals over the age of 16. (Continued)  Continue Reading

  • January 17, 2008 17 Jan'08

    power

    Electrical power is the rate at which electrical energy is converted to another form, such as motion, heat, or an electromagnetic field  Continue Reading

  • January 10, 2008 10 Jan'08

    BS 25999

    BS 25999 is the British Standards Institution (or BSI) standards for business continuity management.  Continue Reading

  • January 10, 2008 10 Jan'08

    MiFID (Markets in Financial Instruments Directive)

    MiFID (the Markets in Financial Instruments Directive) is legislation for the regulation of investment services within the European Economic Area.  Continue Reading

  • January 10, 2008 10 Jan'08

    Information Commissioner's Office (ICO)

    The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information... (Continued)  Continue Reading

  • January 10, 2008 10 Jan'08

    IISP (Institute of Information Security Professionals)

    The IISP (Institute of Information Security Professionals) is a London-based professional membership association who describes its purpose as: "to set the standard for professionalism in information security, and to speak with an independent and ...  Continue Reading

  • January 10, 2008 10 Jan'08

    EU Data Protection Directive (Directive 95/46/EC)

    EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to ...  Continue Reading

  • January 10, 2008 10 Jan'08

    Freedom of Information Act 2000

    The Freedom of Information Act 2000 is an act of the United Kingdom (UK) Parliament defining the ways in which the public may obtain access to government-held information... (Continued)  Continue Reading

  • January 10, 2008 10 Jan'08

    U.K. Data Protection Act 1998 (DPA 1998)

    The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled... (Continued)  Continue Reading

  • January 06, 2008 06 Jan'08

    Web year

    A Web year is the length of time it takes for Internet technology to evolve as much as technology in another environment might evolve in a calendar year. The term was coined at a time when the Internet and Web technology and culture were ...  Continue Reading

  • January 05, 2008 05 Jan'08

    bar graph

    A bar graph is a pictorial rendition of statistical data in which the independent variable can attain only certain discrete values.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close