A risk response to a threat where a conscious and deliberate action to retain (live with) the it. The threat should be monitored to make sure it is still tolerable.
Advanced Persistent Threat. A pervasive, insidious computer hack that gains a foothold in an organisation's technology and stays there, resisting removal while extracting industrial, financial and military information and sending it to the hackers.
Asymmetric Digital Subscriber Line, a line where the upload speed is different from the download speed. Usually the download speed is much greater.
The point at which the project is mandated.
A weB LOG, a personal journal posted to the internet. The entries are in chronological orders and require miminal technical understanding to maintain.
The justification for a project that typically contains costs, benefits, risks and timescales. The continuing viability of a project is tested against it.
General purpose machinery with teeny tiny people running about inside doing clever things with numbers and pictures and stuff. Generally considered to be "magic" and "beyond ma ken!"
Digital Subscriber Line
An intranet accessible from without a protected private network but not available to the great unwashed internet community.
Frequently Asked Questions; they are documents that list and answer the most common questions on a particular subject.