A risk response to a threat where a conscious and deliberate action to retain (live with) the it. The threat should be monitored to make sure it is still tolerable.
APT
Advanced Persistent Threat. A pervasive, insidious computer hack that gains a foothold in an organisation's technology and stays there, resisting removal while extracting industrial, financial and military information and sending it to the hackers.
ADSL
Asymmetric Digital Subscriber Line, a line where the upload speed is different from the download speed. Usually the download speed is much greater.
authorization
The point at which the project is mandated.
Blog
A weB LOG, a personal journal posted to the internet. The entries are in chronological orders and require miminal technical understanding to maintain.
Business case
The justification for a project that typically contains costs, benefits, risks and timescales. The continuing viability of a project is tested against it.
computermabob
General purpose machinery with teeny tiny people running about inside doing clever things with numbers and pictures and stuff. Generally considered to be "magic" and "beyond ma ken!"
DSL
Digital Subscriber Line
Extranet
An intranet accessible from without a protected private network but not available to the great unwashed internet community.
FAQ
Frequently Asked Questions; they are documents that list and answer the most common questions on a particular subject.