"ID No",Parent,Name,URL,Description,Employee,Public,Approved,Distribute,Created,Modified,"Created by",Session,"Temp Session",Deleted 1:id_number,"0:table=wB_word,show=Parent:from_table",Objective:text,:url,"An objective is something to be achieved. The O in BOSCARD (project description) stands for objectives. If you can measure the success of an activity by whether it achieved its objectives. A strategic objective is a long term goal of an organisation. An example may be: reduce costs. Strategic objectives can be measured through KPIs and Metrics.:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 15:59:42:created","2013-12-26 09:01:42:modified",1:created_by,:session,59140989821743910594:session,:checkbox
2:id_number,"0:table=wB_word,show=Parent:from_table",Cell:text,:url,"A worksheet in a spreadsheet workbook consists of cells (data buckets) arranged in rows and columns. A cell can contain data (e.g. a field of a record, some test, etc), a formula, etc.:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 16:03:38:created","2013-12-26 09:03:38:modified",1:created_by,98431861183173602774:session,59140989821743910594:session,:checkbox
3:id_number,"0:table=wB_word,show=Parent:from_table",SEO:text,:url,"See: Search engine optimization.:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 16:04:09:created","2013-12-26 09:04:09:modified",1:created_by,98431861183173602774:session,59140989821743910594:session,:checkbox
4:id_number,"0:table=wB_word,show=Parent:from_table","Search Engine Optimization (SEO):text",:url,"Search engine optimization (SEO) is a process of making a website more suitable for search engines crawlers. Its main objective is to improve the position of the website in results returned from searches using various key words and key phrases.:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 16:06:59:created","2013-12-26 09:06:59:modified",1:created_by,98431861183173602774:session,59140989821743910594:session,:checkbox
5:id_number,"0:table=wB_word,show=Parent:from_table",Impact:text,:url,"Business impact of an issue / change often needs to be specified in order to appropriately review, prioritize and approve. Specification of the impact may include defining which geographies, groups and roles are affected, or perhaps a cost estimate, etc.:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 16:13:02:created","2013-12-26 09:13:02:modified",1:created_by,98431861183173602774:session,59140989821743910594:session,:checkbox
6:id_number,"0:table=wB_word,show=Parent:from_table",KPI:text,:url,"See: Key Performance Indicator:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 16:29:06:created","2013-12-26 09:29:06:modified",1:created_by,98431861183173602774:session,89451552613879357082:session,:checkbox
7:id_number,"0:table=wB_word,show=Parent:from_table","Key Performance Indicator (KPI):text",:url,"A KPI measures the performance of a process, business group (e.g. department) etc.:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 16:35:54:created","2013-12-26 09:35:54:modified",1:created_by,98431861183173602774:session,89451552613879357082:session,:checkbox
8:id_number,"0:table=wB_word,show=Parent:from_table",ITIL:text,:url,"See: IT Infrastructure Library:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 16:52:20:created","2013-12-26 09:52:20:modified",1:created_by,98431861183173602774:session,89451552613879357082:session,:checkbox
9:id_number,"0:table=wB_word,show=Parent:from_table","IT Infrastructure Library (ITIL):text",:url,"ITIL is an industry standard best practice service management framework. ITIL defines how to deal with service incidents, problems, change, availability, etc.:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 16:54:30:created","2013-12-26 09:54:30:modified",1:created_by,98431861183173602774:session,89451552613879357082:session,:checkbox
10:id_number,"0:table=wB_word,show=Parent:from_table",SMS:text,:url,"SMS = Short Messaging Service and is a standard protocol for sending and receiving text messages on mobile phones.:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 16:55:39:created","2013-12-26 09:55:39:modified",1:created_by,98431861183173602774:session,89451552613879357082:session,:checkbox
11:id_number,"0:table=wB_word,show=Parent:from_table",Normalization:text,:url,"A process of organizing the fields and tables of a relational database to minimize redundancy and dependency.:textarea",y:permission,y:permission,y:approved,:approved,"2013-12-26 23:06:30:created","2013-12-26 16:06:30:modified",1:created_by,98431861183173602774:session,89451552613879357082:session,:checkbox
12:id_number,"0:table=wB_word,show=Parent:from_table","Order of Magnitude (OOM):text",:url,"An OOM estimate is a very rough (hopefully educated) guess which gives the requester a guide for their expectations. For example, an OOM estimate for building an extension on a house may be 3-4 months. With this OOM estimate, the homeowner can manage their own expectations about how long the build will affect the household. OOM estimates can be provided for effort, duration, financial cost, materials, etc. OOM estimates should be validated and become standard estimates or better still quotes. See also: High level estimate (HLE):textarea",y:permission,y:permission,y:approved,:approved,"2014-01-02 14:00:42:created","2014-01-02 07:01:12:modified",1:created_by,:session,00856111832234674821:session,:checkbox
13:id_number,"0:table=wB_word,show=Parent:from_table","High Level Estimate (HLE):text",:url,"A high level estimate (may also be referred to as: order of magnitude (OOM)) is a very rough (hopefully educated) guess which gives the requester a guide for their expectations. For example, a HLE for building an extension on a house may be 3-4 months. With this estimate, the homeowner can manage their own expectations about how long the build will affect the household.  HLE can be provided for effort, duration, financial cost, materials, etc. HLEs should be validated and become standard estimates or better still quotes. See also: Order of magnitude (OOM).:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-02 14:03:06:created","2014-01-02 07:03:06:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
14:id_number,"0:table=wB_word,show=Parent:from_table",BOSCARD:text,:url,"A BOSCARD is a way of describing a large activity - e.g. project, sufficient for a reader to quickly determine that goals, scope and scale of the activity. BOSCARD is an acronym for background (description), objectives, scope, constraints, assumptions, resources and deliverables.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-04 16:59:56:created","2014-01-04 09:59:56:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
15:id_number,"0:table=wB_word,show=Parent:from_table","ROI = Return on Investment:text",:url,"See: Return on Investment:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-06 11:16:14:created","2014-01-06 04:16:14:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
16:id_number,"0:table=wB_word,show=Parent:from_table","Return on Investment (ROI):text",:url,"A key measure of the feasibility of an activity (e.g. project) is the return on investment. For the money invested in the activity (not forgetting wages) - how much income will be expected? If the ROI is negative or too low, consider other benefits.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-06 11:17:59:created","2014-01-06 04:17:59:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
17:id_number,"0:table=wB_word,show=Parent:from_table","PoC = Proof of concept:text",:url,"See: Proof of concept:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-06 11:39:26:created","2014-01-06 04:39:26:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
18:id_number,"0:table=wB_word,show=Parent:from_table","Proof of Concept (PoC):text",:url,"An activity which may be justified simply because it will prove a concept to be true or false. The PoC may be a scaled down version of a larger activity (e.g. project) to implement a full solution.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-06 11:40:40:created","2014-01-06 04:40:40:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
24:id_number,"0:table=wB_word,show=Parent:from_table","SAC = Service Acceptance Criteria:text",:url,"See: Service Acceptance Criteria:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 10:55:31:created","2014-01-15 02:20:50:modified",1:created_by,:session,00856111832234674821:session,:checkbox
25:id_number,"0:table=wB_word,show=Parent:from_table",BAU:text,:url,"See: Business as Usual:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 10:56:05:created","2014-01-26 17:32:27:modified",1:created_by,:session,00856111832234674821:session,:checkbox
36:id_number,"0:table=wB_word,show=Parent:from_table","Zero Defect:text",:url,"A zero defect solution is one which is designed not to fail. Zero defect solutions, depending on their complexity can be very costly to implement since they require careful design, development and particularly, rigorous quality assurance testing.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 11:06:12:created","2014-01-14 13:55:46:modified",1:created_by,:session,00856111832234674821:session,:checkbox
38:id_number,"0:table=wB_word,show=Parent:from_table",Firewall:text,:url,"A firewall protects a network or computer system from hackers.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 11:06:27:created","2014-01-14 18:46:52:modified",1:created_by,:session,00856111832234674821:session,:checkbox
42:id_number,"0:table=wB_word,show=Parent:from_table","X Windows:text",:url,"X Windows is a graphical user interface (GUI) for Unix / Linux systems. It is a platform upon which other GUI's can be built including: Gnome and KDE.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 11:07:31:created","2014-01-15 02:04:09:modified",1:created_by,:session,00856111832234674821:session,:checkbox
43:id_number,"0:table=wB_word,show=Parent:from_table",W3C:text,:url,"The World Wide Web Consortium (W3C) is an international community that develops open standards to ensure the long-term growth of the Web. Visit:  www.w3.org. :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 11:09:07:created","2014-01-15 02:15:00:modified",1:created_by,:session,00856111832234674821:session,:checkbox
53:id_number,"0:table=wB_word,show=Parent:from_table",iCalendar:text,:url,"From Wikipedia: iCalendar is a computer file format which allows Internet users to send meeting requests and tasks to other Internet users, via email, or sharing files with an extension of .ics. Recipients of the iCalendar data file (with supporting software, such as an email client or calendar application) can respond to the sender easily or counter-propose another meeting date/time. iCalendar is used and supported by a large number of products, including Google Calendar, Apple Calendar (formerly iCal),GoDaddy Online Group Calendar, IBM Lotus Notes, Yahoo! Calendar, Evolution (software), eM Client, Lightning extension for Mozilla Thunderbird and SeaMonkey, and partially by Microsoft Outlook and Novell GroupWise.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 11:11:14:created","2014-01-15 03:14:16:modified",1:created_by,:session,00856111832234674821:session,:checkbox
55:id_number,"0:table=wB_word,show=Parent:from_table",Website:text,:url,"Need a website? Contact support@webBRIEFCASE.com today to discuss your requirements. webBRIEFCASE websites are powered by the webBRIEFCASE Toolkit - a powerful content management system (CMS), master data manager and web application framework.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 11:11:42:created","2014-01-26 17:06:46:modified",1:created_by,:session,00856111832234674821:session,:checkbox
80:id_number,"0:table=wB_word,show=Parent:from_table",Bandwidth:text,:url,"Bandwidth indicates the quantity of network traffic which can flow through a network connection. Bandwidth can also indicate an individual or groups capacity to accept more work.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 12:29:24:created","2014-01-26 17:31:44:modified",1:created_by,:session,00856111832234674821:session,:checkbox
81:id_number,"0:table=wB_word,show=Parent:from_table",Table:text,:url,"A HTML table is a layout method for tabular information. A database table stores records with a particular topic theme, e.g. People.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 13:00:49:created","2014-01-14 14:09:29:modified",1:created_by,:session,00856111832234674821:session,:checkbox
92:id_number,"804:table=wB_word,show=Parent:from_table",Approval:text,:url,"Approval is often sought for decisions which carry some element of risk. Approval can be provided by word of mouth, written, or electronically.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-07 14:19:37:created","2014-01-23 06:53:17:modified",1:created_by,:session,00856111832234674821:session,:checkbox
99:id_number,"0:table=wB_word,show=Parent:from_table","Bad Practice:text",:url,"Bad practice involves using processes which are incorrect. Perhaps they are inefficient and result in incorrect outputs. See also: good practice and best practice.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 14:21:33:created","2014-01-26 17:30:32:modified",1:created_by,:session,00856111832234674821:session,:checkbox
106:id_number,"0:table=wB_word,show=Parent:from_table",SDM:text,:url,"See: Service Delivery Manager:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-07 14:23:56:created","2014-01-25 01:41:14:modified",1:created_by,:session,00856111832234674821:session,:checkbox
107:id_number,"0:table=wB_word,show=Parent:from_table","SDA = Service Delivery Analyst:text",:url,"A Service Delivery Analyst will usually report to a Service Delivery Management (SDM) and will be responsible for the delivery (smooth running) of service, ensuring it is delivered within agreed SLA's. This may include reviewing incidents and facilitating their speedy resolution. Also, using problem management to ensure incidents don't recur. Using continual service improvement to initiate improvement activities.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-07 14:24:05:created","2014-01-25 01:39:34:modified",1:created_by,:session,00856111832234674821:session,:checkbox
138:id_number,"0:table=wB_word,show=Parent:from_table",Risk:text,:url,"

The PRINCE2 project management methodology defines a risk as follows:

A risk is an uncertain event or set of events that, should it occur, will have an effect on the achievement of objectives. It consists of a combination of the probability of a perceived threat (negative impact) or opportunity (favourable impact) occuring, and the magnitude of its impact on objectives.

Add a risk to the Risks Table here.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 14:38:12:created","2014-07-22 05:04:21:modified",1:created_by,:session,00856111832234674821:session,:checkbox
149:id_number,"0:table=wB_word,show=Parent:from_table","QA = Quality Assurance:text",:url,"See: Quality Assurance:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 14:40:24:created","2014-01-15 02:21:51:modified",1:created_by,:session,00856111832234674821:session,:checkbox
157:id_number,"0:table=wB_word,show=Parent:from_table",Scrum:text,:url,"Scrum is an agile project management / software development method. It features sprints, sprint backlog, product backlog, burndown chart, etc. See: Agile, Waterfall.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-07 14:41:31:created","2014-01-25 01:37:07:modified",1:created_by,:session,00856111832234674821:session,:checkbox
162:id_number,"0:table=wB_word,show=Parent:from_table","Screen sharing:text",:url,"Screen sharing allows one person to see what is on another person's computer screen. Sometimes, a computer can also be remotely controlled. If screen sharing is not available (it can after all, be expensive) then a simple screenshot may be an alternative.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-07 14:43:14:created","2014-01-25 01:34:52:modified",1:created_by,:session,00856111832234674821:session,:checkbox
177:id_number,"0:table=wB_word,show=Parent:from_table","Real Time:text",:url,"

A real time activity takes place at the time rather than later.

e-Mail is not usually real time because there's normally a delay between messages, however, a telephone conversation is real time. Instant messaging is often somewhere in between depending on how responsive each party is.

Real-time reporting needs immediate access to up-to-the minute data. Near real-time may take snapshots of the data, e.g. each hour, so as not to overload the data source. Real-time reporting will often need extra controls to be in place and may therefore cost more and take longer to implement, but this is often outweighted by the benefit of the information not being out of date.

With strategy games, real-time games allow both (or all) players to make moves at the same time. As opposed to turn-based games where players need to wait for their turn.

The webBRIEFCASE Toolkit is real-time. When you request a page, the data from that page is what data was available at the time. There is no snaphot. If one person adds an organisation, and within a second, another person shows the organisations table - they will see the newly added organisation.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 14:49:16:created","2014-04-25 06:35:56:modified",1:created_by,:session,00856111832234674821:session,:checkbox
185:id_number,"0:table=wB_word,show=Parent:from_table",Timesheet:text,:url,"

A timesheet can be used to record time spent on various business activities. It is often essential when working on projects which require cross-charging, or charge back to a client. A timesheet can also be a way of improving productivity by ensuring all time is attributed to an activity. Entries can then be challenged if they appear to be excessive or not required. 

webBRIEFCASE can provide off-the-shelf and custom timesheet solutions. Please contact us for details.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 14:51:42:created","2014-04-25 08:59:56:modified",1:created_by,:session,00856111832234674821:session,:checkbox
188:id_number,"804:table=wB_word,show=Parent:from_table",Agile:text,:url,"The purpose of agile processes is to ensure quick completion / turnaround. Agile methodologies will often use techniques such as continuous involvement of a customer to ensure the end result (product) meets with requirements and that any changes can be identified sooner (less costly) rather than later (more costly). Examples of agile include: Scrum, Extreme Programming and DSDM.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 14:52:21:created","2014-01-23 06:31:55:modified",1:created_by,:session,00856111832234674821:session,:checkbox
192:id_number,"0:table=wB_word,show=Parent:from_table",Rack:text,:url,"Computer systems (servers) in a computer room will usually be bolted into a rack (cabinet). A computer system in a rack is referred to as rack mounted. Racks will usually include cable management features.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 14:53:21:created","2014-01-14 14:11:58:modified",1:created_by,:session,00856111832234674821:session,:checkbox
197:id_number,"0:table=wB_word,show=Parent:from_table","Rack Mountable:text",:url,"Rack mountable servers can be purchased which include a mounting plate at the front for installing the server into a rack (computer cabinet).:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 14:54:03:created","2014-01-15 02:21:38:modified",1:created_by,:session,00856111832234674821:session,:checkbox
201:id_number,"0:table=wB_word,show=Parent:from_table","Quad Core:text",:url,"A quad core processor is one with 4 cores - effectively 4 micro-processors. It is usually better at multi-tasking that single core processors, since applications can be shared among the cores. See also: dual core and single core.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 14:55:19:created","2014-01-14 14:15:40:modified",1:created_by,:session,00856111832234674821:session,:checkbox
215:id_number,"0:table=wB_word,show=Parent:from_table","Sales Order Processing:text",:url,"Sales Order Processing is the act of converting an order into a delivered product / service and transitioning into support. This includes issuing an invoice, customization, packaging, delivery, etc.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-07 15:35:02:created","2014-01-25 01:32:23:modified",1:created_by,:session,00856111832234674821:session,:checkbox
235:id_number,"0:table=wB_word,show=Parent:from_table","NAS = Network Attached Storage:text",:url,"See: Network Attached Storage:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 15:41:04:created","2014-01-15 03:05:48:modified",1:created_by,:session,00856111832234674821:session,:checkbox
244:id_number,"0:table=wB_word,show=Parent:from_table","LIFO = Last In, First Out:text",:url,"

When dealing with queues, items can be processed in LIFO or FIFO order. LIFO is last in first out. For example, if data is entered: A, B, C (i.e. A is first), with LIFO, C will be returned first. 

LIFO is sometimes used with company redundancies. The last person hired can be the first person who is made redundant. The rationale for this can be that the last person to enter the company has less knowledge of the company, its processes, people, and is likely to have less loyalty.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 16:27:06:created","2014-03-15 08:50:09:modified",1:created_by,:session,00856111832234674821:session,:checkbox
247:id_number,"140:table=wB_word,show=Parent:from_table","Application Programmer Interface (API):text",:url,"A document providing information was programmers wishing to use the features of an application, and / or integrate another application with the application.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-07 16:28:08:created","2014-01-30 02:21:13:modified",1:created_by,:session,00856111832234674821:session,:checkbox
261:id_number,"0:table=wB_word,show=Parent:from_table","IM = Instant Messaging:text",:url,"See: Instant Messaging:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 16:47:17:created","2014-01-14 18:42:43:modified",1:created_by,:session,00856111832234674821:session,:checkbox
265:id_number,"0:table=wB_word,show=Parent:from_table",Information:text,:url,"

Information is data which has been given a contextual meaning. See also: knowledge.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 16:48:00:created","2014-03-15 08:40:04:modified",1:created_by,:session,00856111832234674821:session,:checkbox
266:id_number,"0:table=wB_word,show=Parent:from_table",Data:text,:url,"

Data is raw bits, bytes, characters stored by and retrieved from a computer system. See also: information and knowledge.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 16:48:08:created","2014-03-15 08:38:23:modified",1:created_by,:session,00856111832234674821:session,:checkbox
267:id_number,"0:table=wB_word,show=Parent:from_table",Knowledge:text,:url,"

Knowledge is information to which one or more rules have been applied. See also: knowledgebase.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 16:48:19:created","2014-03-15 08:41:45:modified",1:created_by,:session,00856111832234674821:session,:checkbox
272:id_number,"0:table=wB_word,show=Parent:from_table",Mashup:text,:url,"Assembly of existing services / code into a new solution / service.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 16:51:08:created","2014-01-07 09:51:08:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
287:id_number,"0:table=wB_word,show=Parent:from_table","GB = Gigabytes:text",:url,"See: Gigabytes:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-07 17:12:49:created","2014-01-14 18:45:18:modified",1:created_by,:session,00856111832234674821:session,:checkbox
306:id_number,"0:table=wB_word,show=Parent:from_table","LAN = Local Area Network:text",:url,:textarea,y:permission,y:permission,y:approved,:approved,"2014-01-07 21:03:45:created","2014-01-07 14:03:45:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
312:id_number,"0:table=wB_word,show=Parent:from_table",JavaScript:text,:url,"JavaScript is a powerful client-side programming language. JavaScript code is run in the web browser, rather than on the web server. JavaScript is often used to implement enhanced forms (e.g with validation), menus, etc. It can even be used for games. Ajax uses JavaScript. See also: Java (a separate language).:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 07:35:19:created","2014-01-14 18:42:15:modified",1:created_by,:session,00856111832234674821:session,:checkbox
313:id_number,"0:table=wB_word,show=Parent:from_table",Java:text,:url,"Java is one of the most widely used programming languages / environments. It can be found on personal computers and other devices, e.g. personal video recorders (PVR).:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 07:35:32:created","2014-01-15 03:52:51:modified",1:created_by,:session,00856111832234674821:session,:checkbox
321:id_number,"804:table=wB_word,show=Parent:from_table","Asset Management:text",:url,:textarea,y:permission,y:permission,y:approved,y:approved,"2014-01-08 07:37:46:created","2014-01-23 06:57:39:modified",1:created_by,:session,00856111832234674821:session,:checkbox
322:id_number,"0:table=wB_word,show=Parent:from_table","Asset Register:text",:url,"An asset register is a list of assets owned by an organisation. It can be used to record purchase, present and future values of assets.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 07:37:54:created","2014-01-26 17:14:33:modified",1:created_by,:session,00856111832234674821:session,:checkbox
338:id_number,"0:table=wB_word,show=Parent:from_table",Authority:text,:url,"An authority can be a group or person with a particular responsibility / set of responsibilities. Authorities can often be referred to as governing bodies, standards bodies, etc.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:04:26:created","2014-01-26 17:22:26:modified",1:created_by,:session,00856111832234674821:session,:checkbox
340:id_number,"27:table=wB_word,show=Parent:from_table",Autonomous:text,:url,"An autonomous system is one which works with minimal or no human intervention. Autonomous systems are usually tireless, and do not tend to suffer from mistakes (although when they are faulty, they *can* cause more damage).:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:04:52:created","2014-01-30 02:21:28:modified",1:created_by,:session,00856111832234674821:session,:checkbox
360:id_number,"0:table=wB_word,show=Parent:from_table",Asset:text,:url,"An asset is something which a person or business owns. Assets can be recorded in an asset register. Assets have a purchase, present and future values, and the value will usually appreciate (be more valuable) or depreciate (be less valuable) with time.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 09:11:37:created","2014-01-23 06:57:21:modified",1:created_by,:session,00856111832234674821:session,:checkbox
364:id_number,"0:table=wB_word,show=Parent:from_table",Hacker:text,:url,"A hacker is a person who attempts to gain unauthorized access to a system. Hackers exploit holes in security defenses such as old software, open network ports, weak passwords, etc. A hacker can also be a person who integrates software written by other people.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:12:29:created","2014-01-15 03:54:50:modified",1:created_by,:session,00856111832234674821:session,:checkbox
375:id_number,"804:table=wB_word,show=Parent:from_table","1-2-1 / One to one:text",:url,"A regular 1-2-1 with an individual is a great way of ensuring alignment of objectives, sharing information and providing steer / coaching. If you are a manager, set-up a weekly 1-2-1 with each of your staff individually. Also set-up a 1-2-1 with managers from other areas that you interact with, and a 1-2-1 with your manager. You could also have 1-2-1's with customers and suppliers as required.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:15:15:created","2014-01-23 04:30:31:modified",1:created_by,:session,00856111832234674821:session,:checkbox
404:id_number,"0:table=wB_word,show=Parent:from_table",Assumption:text,:url,"

An assumption is an expectation that a condition is correct. For example, one could assume that the sun will shine brightly tomorrow, providing sufficient sunlight for a solar panel to provide electricity. It is valid for assumptions to be made, but they should be documented / communicated effectively if they affect others (e.g. in a project). Furthermore, assumptions should be validated. If they are found not to be correct, the parent (e.g. project) should be adjusted accordingly.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:24:19:created","2014-03-15 08:59:20:modified",1:created_by,:session,00856111832234674821:session,:checkbox
412:id_number,"0:table=wB_word,show=Parent:from_table",Audit:text,:url,"An audit is a formal review of something. Audits are often dreaded in business, especially where any negative findings can result in penalties. It is possible to run pre-audit audits to pre-emptively fix any issues the true audit may find.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:26:29:created","2014-01-26 17:20:00:modified",1:created_by,:session,00856111832234674821:session,:checkbox
418:id_number,"0:table=wB_word,show=Parent:from_table","On a Plate:text",:url,"When delivering a product / service (including doing a job for your line manager) you should hand over the results to the recipient 'on a plate' - i.e. present it in a professional manner. For example, if you are provided raw data, accompany it with your own analysis. When providing a service, be courteous.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:28:32:created","2014-01-15 02:36:25:modified",1:created_by,:session,00856111832234674821:session,:checkbox
442:id_number,"0:table=wB_word,show=Parent:from_table","Hand Over:text",:url,"A hand over is when a person describes their role to another people. It is often used when one person leaves and another will take their place.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:40:13:created","2014-01-14 18:44:52:modified",1:created_by,:session,00856111832234674821:session,:checkbox
444:id_number,"0:table=wB_word,show=Parent:from_table",Router:text,:url,"

A router is a networking device which transports data from one network (LAN) to another. Most routers will also include a dial-up mechanism, e.g. an ADSL router will dial-up the Internet through a telephone line. Routers often include features such as firewall, network switch, DHCP (IP address allocation), local DNS resolution features (change a web address into an IP address) and WiFi base station. ADSL routers are usually supplied by Internet Service Providers (ISP) when you subscribe to the Internet connectivity service. You can sometimes replace a router if you need a more powerful one.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:40:59:created","2014-04-25 08:56:12:modified",1:created_by,:session,00856111832234674821:session,:checkbox
448:id_number,"0:table=wB_word,show=Parent:from_table",Fail:text,:url,"A test (e.g. QA test) can be passed, passed provisionally or failed. If it fails, it is likely that the cause of the fault (the defect) needs to be fixed before further testing.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:41:32:created","2014-01-15 04:13:21:modified",1:created_by,:session,00856111832234674821:session,:checkbox
449:id_number,"804:table=wB_word,show=Parent:from_table",Agenda:text,:url,"When issuing an invite for a meeting, it is important that you include the agenda. A list of topics to be discussed. You should also provide the opportunity for meeting attendees to comment on the agenda, and (if appropriate) add to the agenda. During the meeting, the agenda should be followed. Ideally, each agenda item will have been allocated a time limit to allow all items to be adequately discussed. Notes should be added to each agenda item in the meeting minutes.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:51:09:created","2014-01-23 04:32:16:modified",1:created_by,:session,00856111832234674821:session,:checkbox
455:id_number,"0:table=wB_word,show=Parent:from_table","Laid Back:text",:url,"A person is said to be 'laid back' if they are calm, quiet and reactive. Their stress levels appear to be constantly low.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 09:51:58:created","2014-01-15 03:09:26:modified",1:created_by,:session,00856111832234674821:session,:checkbox
461:id_number,"0:table=wB_word,show=Parent:from_table",Safety:text,:url,"Safety should always be high on anyone's agenda. Look around now and spot (and fix) any potential safety hazards such as overloaded sockets, bad wiring, trip hazards, fire hazards, etc.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 09:52:59:created","2014-01-25 01:30:49:modified",1:created_by,:session,00856111832234674821:session,:checkbox
473:id_number,"0:table=wB_word,show=Parent:from_table",Scratch:text,:url,"Scratch is a tool designed to teach children how to develop software. See http://scratch.mit.edu/. It is particularly suited to the development of educational software and games. When a program has been developed, it can be embedded in a website using JavaScript code.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 11:24:30:created","2014-01-14 14:22:19:modified",1:created_by,:session,00856111832234674821:session,:checkbox
485:id_number,"0:table=wB_word,show=Parent:from_table",Scalable:text,:url,"Whenever designing a solution, whether the solution is scalable should be borne in mind. Can the solution grow to accommodate more users?:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 11:48:27:created","2014-01-25 01:33:14:modified",1:created_by,:session,00856111832234674821:session,:checkbox
487:id_number,"0:table=wB_word,show=Parent:from_table","Electronic Signature:text",:url,"An electronic signature can be used to electronically sign a document. It is often used with PDF documents.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 11:48:52:created","2014-01-14 18:47:32:modified",1:created_by,:session,00856111832234674821:session,:checkbox
494:id_number,"0:table=wB_word,show=Parent:from_table",e-Book:text,:url,"An e-book is a book in electronic form to allow it to be read on a computing device. Kindle is a popular e-book platform.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 11:50:37:created","2014-01-15 04:14:28:modified",1:created_by,:session,00856111832234674821:session,:checkbox
518:id_number,"0:table=wB_word,show=Parent:from_table",Daemon:text,:url,"A daemon is a software process which, when starts, continues to run in the background. Daemons are often used on Linux / Unix systems for monitoring and for server applications - e.g. web server, database server, etc.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:25:02:created","2014-01-15 04:15:32:modified",1:created_by,:session,00856111832234674821:session,:checkbox
525:id_number,"0:table=wB_word,show=Parent:from_table","Data Dump:text",:url,"A data dump is an export / extract of records from a database into a file.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:36:11:created","2014-01-14 18:48:03:modified",1:created_by,:session,00856111832234674821:session,:checkbox
542:id_number,"0:table=wB_word,show=Parent:from_table",Assume:text,:url,"

In business, please say: if you assume - you make an ASS out of U and ME (i.e. ASSUME). See: Assumptions.

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:46:54:created","2014-03-15 08:57:28:modified",1:created_by,:session,00856111832234674821:session,:checkbox
548:id_number,"803:table=wB_word,show=Parent:from_table",App:text,:url,"See: Application:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 12:49:24:created","2014-01-23 06:50:35:modified",1:created_by,:session,00856111832234674821:session,:checkbox
554:id_number,"0:table=wB_word,show=Parent:from_table",Upgrade:text,:url,"Upgrading software means installing a later version of the software. Upgrading can involve the installation of patches which change part of the installed software. See also: update.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:50:49:created","2014-01-14 14:08:42:modified",1:created_by,:session,00856111832234674821:session,:checkbox
561:id_number,"0:table=wB_word,show=Parent:from_table","KBD = Keyboard:text",:url,"See: Keyboard:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:52:32:created","2014-01-14 18:38:16:modified",1:created_by,:session,00856111832234674821:session,:checkbox
567:id_number,"0:table=wB_word,show=Parent:from_table",CPC:text,:url,"

CPC = Cost per click. It is a method of charging for web advertising services. You supply the advert materials, and these are published by a publisher: a website or advertising network. You are then charged each click someone clicks on your advert, not when the advert is published for you.

Google Adwords is an example of a CPC advertising platform.

CPC platforms should have measures in place to stop people from sabotaging your campaign by clicking on the banners multiple times resulting in you being charged for invalid clicks.

Some CPC platforms (e.g. Adwords) require that you bid for your position against your competitors. If you bid too low, your advert may not be shown.

CPC is often considered as cost effective because your offering (e.g. brand / service) gains from advertising exposure anyway at a relatively low cost, depending on the number of click-throughs.

 

:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:53:59:created","2014-04-25 08:50:22:modified",1:created_by,:session,00856111832234674821:session,:checkbox
570:id_number,"0:table=wB_word,show=Parent:from_table","Page Impressions:text",:url,"When a real user visits a web page, a page impression is counted. Only one page impression is counted regardless of how many times the users visits that page in a session. Page impressions is a better measure that hits.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:54:23:created","2014-01-14 14:25:27:modified",1:created_by,:session,00856111832234674821:session,:checkbox
574:id_number,"0:table=wB_word,show=Parent:from_table","Page fold:text",:url,"The page fold is an imaginary horizontal line across a web page where a user has to scroll up to see past. Web developers will often try to ensure key items are shown above the page fold. The page fold is in different positions on different screens, depending on the screen size.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:54:58:created","2014-01-15 02:25:23:modified",1:created_by,:session,00856111832234674821:session,:checkbox
581:id_number,"0:table=wB_word,show=Parent:from_table",BASIC:text,:url,"BASIC is a commonly used programming language. VBA (VisualBASIC for Applications) is an example of an implemented of BASIC.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:56:35:created","2014-01-26 17:32:08:modified",1:created_by,:session,00856111832234674821:session,:checkbox
588:id_number,"803:table=wB_word,show=Parent:from_table",Access:text,:url,"
  1. Microsoft Access database management system (DBMS)
  2. Access to a site
  3. Access to software
  4. User access account
  5. :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:58:33:created","2014-01-23 04:31:07:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    591:id_number,"0:table=wB_word,show=Parent:from_table",Mac:text,:url,"Apple Mac is a personal computer produced by Apple and designed for each of use. It is particular popular among graphic designers due to its excellent graphical capabilities. Macs are an alternative to PC compatibles (standard PCs) - but tend to be more expensive when compared like-for-like (hardware). Macs run OS X - which is based on Linux.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 12:59:18:created","2014-01-15 03:07:19:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    621:id_number,"0:table=wB_word,show=Parent:from_table","Umbrella Company:text",:url,"According to WikiPedia: An umbrella company is a company that acts as an employer to agency contractors who work under a fixed term contract assignment, usually through a recruitment employment agency in the United Kingdom. Recruitment agencies issue contracts to a limited company as the agency liability would be reduced. It issues invoices to the recruitment agency (or client) and, when payment of the invoice is made, will typically pay the contractor through PAYE with the added benefit of offsetting some of the income through claiming expenses such as travel, meals, and accommodation. Umbrella companies have become more prevalent in the UK since the British government introduced so-called IR35 legislation that creates tests to determine employment status and ability to make use of small company tax reliefs.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:05:38:created","2014-01-15 02:18:45:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    630:id_number,"0:table=wB_word,show=Parent:from_table",C:text,:url,"C is a widely used, structured programming language. Java is similar to C. C++ is C, but with the addition of object oriented programming - e.g. classes.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:07:19:created","2014-01-15 04:16:20:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    635:id_number,"0:table=wB_word,show=Parent:from_table",Validate:text,:url,"To validate something is to check that it is acceptable. To do this, what is acceptable should be clearly defined. The result of a validation would be a pass, conditional pass or fail.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:08:15:created","2014-01-15 02:16:55:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    642:id_number,"804:table=wB_word,show=Parent:from_table",Agreement:text,:url,"An agreement is not as legally binding as a contract. A gentleman's agreement is one which is not supported by documentation. This type of agreement is based on trust and may be used for low risk topics. If an agreement cannot be reached, mediation may be needed.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:09:14:created","2014-01-23 06:32:06:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    651:id_number,"0:table=wB_word,show=Parent:from_table",Benchmark:text,:url,"A benchmark is a standard measure to be achieved.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:10:39:created","2014-01-26 17:32:52:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    653:id_number,"0:table=wB_word,show=Parent:from_table",Beta:text,:url,"Beta is a version indicator referring to software or a process which has been tested, but still must undergo further testing in order to be considered as production quality.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:11:13:created","2014-01-26 17:35:56:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    660:id_number,"27:table=wB_word,show=Parent:from_table","BIOS = Basic Input / Output System:text",:url,"BIOS is a part of a computer system which handles low level communications with hardware / peripherals. It provides the most basic requirements for getting the operating system kick-started.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 13:12:32:created","2014-01-30 02:25:31:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    661:id_number,"0:table=wB_word,show=Parent:from_table",Bug:text,:url,"See: Defect:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 13:12:43:created","2014-01-26 16:04:51:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    666:id_number,"803:table=wB_word,show=Parent:from_table",Array:text,:url,"An array is a way of storage multiple items of information, often as a list or list of lists. Arrays are found in most programming languages, including PHP and VBA and are used very commonly - including use for caching information from a database.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 13:13:23:created","2014-01-23 06:54:58:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    667:id_number,"0:table=wB_word,show=Parent:from_table",BYOD:text,http://en.wikipedia.org/wiki/Bring_your_own_device:url,"

    Bring your own device (BYOD) is a concept whereby people (staff, students, etc) can bring their own PC / phone to the workplace / university and use them to connect to the network and the available (sometimes sensitive) information. This can increase morale, and be seen as a sweetener when people are selecting a workplace. BYOD does however, pose security risks which should be carefully managed. As BYOD becomes the standard for many organisations, other will (sometimes begrudgingly) have to follow suit.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:13:51:created","2014-04-01 02:25:14:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    669:id_number,"0:table=wB_word,show=Parent:from_table",Bookmark:text,:url,"

    When you see a website / web page you like, you can add a bookmark / favorite to your browser.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:14:22:created","2014-03-15 08:57:02:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    671:id_number,"0:table=wB_word,show=Parent:from_table",Screenshot:text,:url,"On most computer keyboards, press the PrtScn key to copy an image of what is on the computer screen to the clibpoard. This can then be pasted into another application, e.g. e-mail / Word, etc. Use Alt+PrtScn to grab just the application window you are using.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 13:14:39:created","2014-01-25 01:36:01:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    675:id_number,"136:table=wB_word,show=Parent:from_table","Backbone Network:text",:url,"A backbone network is the core part of a network. It will often have a larger bandwidth (more traffic) to other (e.g. local) networks, and will be managed by more powerful network switches.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:15:15:created","2014-01-30 02:21:54:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    678:id_number,"0:table=wB_word,show=Parent:from_table",Gate:text,:url,"A project gate is a formal review of the properties of a project to determine whether it is ready to progress from one stage (e.g. design) to another (e.g. build). The gate review can take place by e-mail or in a meeting. The result of the review should be::textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:15:39:created","2014-01-15 04:08:03:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    681:id_number,"0:table=wB_word,show=Parent:from_table","Back End:text",:url,"Systems tend to have a user facing aspect - the front end, and a system mechanism - the back end. An example of a front end is an application presented in a web page. The corresponding back end would be the application server, web server and database server powering the application. Programmers make sometimes refers to themselves as a front end or back end developer.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:16:11:created","2014-01-26 17:28:24:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    687:id_number,"0:table=wB_word,show=Parent:from_table","Business to Business:text",:url,"

    B2B products and services are those which are supplied by a business, to another business, rather than business to consumer (B2C) - where consumer is a private individual.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:17:05:created","2014-03-15 08:57:36:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    688:id_number,"0:table=wB_word,show=Parent:from_table","Business to Consumer:text",:url,"Business to Consumer (B2C) is a business activity (e.g. sale of products / services) to a consumer (individual / person) rather than to a business. See also: business to business (B2B).:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:17:15:created","2014-01-26 17:26:40:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    697:id_number,"0:table=wB_word,show=Parent:from_table",Tablet:text,:url,"A tablet is a hand-held mobile computing device, usually with a relative large screen (in comparison to a smartphone) which may / may not have a keyboard. An iPad is an example of a tablet. Tablets are becoming a popular replacement for laptops.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:22:47:created","2014-01-15 02:20:31:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    710:id_number,"803:table=wB_word,show=Parent:from_table",Apple:text,:url,"Apple is a manufacturer of hardware and software. Hardware includes iOS devices such as iPod, iPhone and iPad. Software includes Safari.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:25:04:created","2014-01-23 06:51:22:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    713:id_number,"803:table=wB_word,show=Parent:from_table","AD = Application Development:text",:url,"webBRIEFCASE can provide application development services for custom requirements with PHP, Excel VBA, HTML, Javascript, CSS and more.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:25:52:created","2014-01-23 04:31:38:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    715:id_number,"0:table=wB_word,show=Parent:from_table",SDLC:text,:url,"See: Software Development Lifecyle:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 13:26:24:created","2014-01-25 01:39:50:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    718:id_number,"0:table=wB_word,show=Parent:from_table",Deploy:text,:url,"

    For project management and software development, deply means to release the product.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:26:49:created","2014-03-15 07:41:34:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    722:id_number,"803:table=wB_word,show=Parent:from_table","3-Tier Architecture:text",:url,"A 3-tier architecture is one of the n-tier architectures. A layered approach to servers with a presentation tier (e.g. web server) at the front, logic (e.g. application server) tier in the middle and data (e.g. database server) tier at the back. This approach is modular and readily allows each tier to be upgraded, replaced, (etc.) in isolation.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:27:34:created","2014-01-23 04:30:43:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    725:id_number,"804:table=wB_word,show=Parent:from_table","Assemble to Order:text",:url,"Assemble to order is a concept whereby a product is only assembled (built, prepared...) when an order is received. This is generally suitable only for simple (not complex) items.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-08 13:28:19:created","2014-01-23 06:56:16:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    727:id_number,"0:table=wB_word,show=Parent:from_table",Authentication:text,:url,"Authentication is the act of confirming that a person of system is who they say they are. For people, this may be the provision of login credentials, e.g. login name and password. Authentication should be used for access to restricted information and processes.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:28:47:created","2014-01-26 17:21:10:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    728:id_number,"0:table=wB_word,show=Parent:from_table",Authorization:text,:url,"Authorization is the process whereby a person or system is granted access to privileged data or processes.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:28:57:created","2014-01-26 17:22:57:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    729:id_number,"150:table=wB_word,show=Parent:from_table","Automated Testing:text",:url,"Manual testing can often be very time consuming and therefore costly. Automated testing can be much quicker. Automated testing requires establishment of automated test cases.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:29:10:created","2014-01-30 02:21:42:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    737:id_number,"0:table=wB_word,show=Parent:from_table","Acronym :text",:url,"IT is notorious for generating many acronyms. Acronyms should be avoided in natural speech where possible, especially when speaking with non-technical staff. Acronyms used in written text should be accompanied by a brief explanation.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:32:01:created","2014-01-08 06:57:52:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    745:id_number,"0:table=wB_word,show=Parent:from_table","VAT = Value Added Tax:text",:url,"VAT is a tax levied by the UK government on products and services. Organisations who turnover exceeds a pre-defined turnover are required to become VAT registered, to charge VAT, calculate VAT payments and send those payments to the Inland Revenue. Becoming VAT registration can add credibility to your organisation.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:36:02:created","2014-01-14 14:00:23:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    754:id_number,"0:table=wB_word,show=Parent:from_table","TCO = Total Cost of Ownership:text",:url,"

    People will sometimes present the purchase price of an item as the only cost when determining the cost benefit. However, there are often other consts to consider.

    For example, you could pay £680 for a laptop, however, that laptop also needs support, maintenance, updates and later disposal. Each of these cost money. The total cost of ownership (TCO) will include all of these.

    An alternative could be a leased laptop with support, maintenance, updates and later disposal (e.g. return) all inclusive. Over the expected lifetime of the laptop, the total cost of ownership could therefore be less.

    Taking the TCO into account therefore enables you to make a more informed decision, with less risk.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:42:29:created","2014-04-25 06:23:17:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    755:id_number,"0:table=wB_word,show=Parent:from_table",Benefit:text,:url,"Every activity should result in a benefit. Sometimes, starting or progressing an activity may require the description of the benefit of the activity. Without a suitable benefit, the activity should not be started, or should be halted. It is not always easy to describe the benefit of an activity in terms of monetary reward, and sometimes it is therefore necessary to describe intangible benefits, e.g. more website visitors. Benefits which are aligned to an organisations strategic objectives are more likely to receive approval from senior managers.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:42:36:created","2014-01-26 17:35:01:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    756:id_number,"803:table=wB_word,show=Parent:from_table",Application:text,:url,"An application is an item of software. It provides functionality for a particular purpose. Examples of applications include Microsoft Work, Google Chrome, etc.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 13:53:06:created","2014-01-23 06:51:53:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    758:id_number,"0:table=wB_word,show=Parent:from_table","Time Poor:text",:url,"Everyone appears to be time poor these days. They are so overloaded with work that, when they promise to do something, they don't deliver. Or will deliver late, and only after prompting. You may be in this position yourself, despite your best efforts. If you are time poor, you should ensure that you are using effective time management techniques to maximize on the output of your efforts. If you are trying to deal with someone who is time poor - try to remain calm on patient about it. It is rarely caused by an issue that the person has with you.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 14:15:57:created","2014-01-08 07:18:10:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    759:id_number,"0:table=wB_word,show=Parent:from_table","Cherry Picking:text",:url,"When people take their work from a shared list, some people will choose the easiest activities since they can be completed quicker and easier. This will especially be the case, if the individual is subject to measures / KPIs or the individual is not experienced / skill enough to tackle other items. Methods of avoiding cherry picking are: allocating work rather than allowing people to pick, rating the difficulty of items, providing incentives / rewards for picking difficult items, applying measures across a team rather than individuals. Sometimes it is appropriate to cherry pick. If for example, a list is becoming too large, and it's difficult to see the scale of the total amount of work, then dealing quickly with a large number of smaller, easier items brings more clarity. A related term is: low hanging fruit - i.e. those smaller, simpler items.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 14:16:21:created","2014-01-08 07:28:32:modified",1:created_by,:session,00856111832234674821:session,:checkbox
    761:id_number,"0:table=wB_word,show=Parent:from_table","Time Bound:text",:url,"When you ask someone to work on an activity, you should always negotiate a reasonable turnaround time, and document that for future reference. The activity then become time-bound, and the activity owner will be expected to complete on time. You should make it clear that, if the activity is likely to not be delivered on time, that you should be told about this as soon as possible, not at the last minute - since the later your are notified, the more serious the impact is likely to be. When chasing a time-bound activity, it should be made clear the impact of the activity not being delivered on time. For example, activities which depend on the time-bound activity, will start late, and the resources for those activities will further need to confirm their availability at a new time.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 14:36:11:created","2014-01-08 07:36:11:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
    763:id_number,"0:table=wB_word,show=Parent:from_table",webBRIEFCASE:text,:url,"webBRIEFCASE is a brand of Web Briefcase Ltd.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-08 21:43:16:created","2014-01-08 14:43:16:modified",1:created_by,48386739596764499526:session,00856111832234674821:session,:checkbox
    772:id_number,"0:table=wB_word,show=Parent:from_table",Keyboard:text,:url,"A computer keyboard is a standard device for entering text, controlling the cursor and other special functions. It is often used in conjunction with a mouse. Standard keyboards are relatively inexpensive, and will often need a USB connector. Old keyboards use a PS/2 or serial connector.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-15 01:39:57:created","2014-01-14 18:39:57:modified",1:created_by,31506275852836862956:session,14355315111040167575:session,:checkbox
    773:id_number,"0:table=wB_word,show=Parent:from_table","Instant Messaging:text",:url,"An instant messaging application (software), is one which allows the user to instantly communicate by typing, with a friend, relative, colleague, etc. Examples of instant messaging applications include Windows Messenger and Skype.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-15 01:44:04:created","2014-01-14 18:44:04:modified",1:created_by,31506275852836862956:session,14355315111040167575:session,:checkbox
    774:id_number,"0:table=wB_word,show=Parent:from_table",Gigabytes:text,:url,"A gigabyte (GB) is equivalent to 1024 megabytes (MB). Modern memory chips (RAM) and disk storage is usually measured in GB or TB.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-15 01:46:24:created","2014-01-14 18:46:24:modified",1:created_by,31506275852836862956:session,14355315111040167575:session,:checkbox
    776:id_number,"0:table=wB_word,show=Parent:from_table",Zone:text,:url,"Web pages can be divided into zones. Each zone showing certain content, e.g. menu zone, footer zone, etc. Firewalls can have zones. There are virtual LANs (local area networks).:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-15 08:33:48:created","2014-01-15 02:07:53:modified",1:created_by,:session,14355315111040167575:session,:checkbox
    777:id_number,"0:table=wB_word,show=Parent:from_table","Quality Assurance (QA):text",:url,"Quality Assurance is a business process / function which ensures the quality of new and updated products / services. QA includes testing against a pre-defined specification. If the item does not meet with expectations it is considered defective, and may be rejected. Rejected items are either disposed of or fixed.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-15 09:23:47:created","2014-01-15 02:23:47:modified",1:created_by,52544042079972359551:session,14355315111040167575:session,:checkbox
    778:id_number,"0:table=wB_word,show=Parent:from_table","Repeating activities:text",:url,"All activities should be in your activity list and should be allocated time slots accordingly. 1-2-1 with line manager - fortnightly 1-2-1 with innovation manager(s) - weekly or daily 1-2-1 with subordinates - daily or weekly as required (set targets) 1-2-1 with business partners - fortnightly or monthly Activity list - daily Clear down inbox - daily Reports Risks, Assumptions, Issues, Dependencies (RAID) log Release plan / roadmap Project activities Business as usual activities:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-15 10:04:53:created","2014-01-15 03:04:53:modified",1:created_by,52544042079972359551:session,14355315111040167575:session,:checkbox
    781:id_number,"0:table=wB_word,show=Parent:from_table","Zip (Compress):text",:url,"

    Zip is a commonly used file compression format. Zip / unzip capabilities are embedded into Microsoft Windows.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-15 11:13:48:created","2014-03-15 07:33:06:modified",1:created_by,:session,14355315111040167575:session,:checkbox
    789:id_number,"0:table=wB_word,show=Parent:from_table",Monitor:text,:url,"

    To watch over something, e.g. a process, server, etc. See: automated monitoring.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-18 10:52:57:created","2014-03-19 03:10:48:modified",1:created_by,:session,12650473632978519952:session,:checkbox
    791:id_number,"0:table=wB_word,show=Parent:from_table","Big Data:text",:url,"Big data refers to data which is so large that it is difficult to handle using traditional database technology. See: Wikipedia for more information.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-23 10:39:35:created","2014-01-26 15:46:24:modified",1:created_by,:session,43898328849399664422:session,:checkbox
    794:id_number,"0:table=wB_word,show=Parent:from_table",Screen:text,:url,"Display screen. Office divider screen. Checking of something.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-23 10:42:19:created","2014-01-25 01:33:45:modified",1:created_by,:session,43898328849399664422:session,:checkbox
    797:id_number,"0:table=wB_word,show=Parent:from_table",Monitor:text,:url,"

    A display screen (flat screen, TFT, CRT, etc.) attached to a computer or video camera.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-23 10:42:40:created","2014-03-19 03:18:41:modified",1:created_by,:session,43898328849399664422:session,:checkbox
    800:id_number,"0:table=wB_word,show=Parent:from_table","Easter Egg:text",:url,"An Easter egg is an intentional inside joke, hidden message, or feature in a work such as a computer program, movie, book, or crossword. (Wikipedia) We love all kinds of easter eggs (especially chocolate ones). Please send your suggestions to support@webBRIEFCASE.com.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-23 10:57:00:created","2014-01-23 04:08:26:modified",1:created_by,:session,43898328849399664422:session,:checkbox
    802:id_number,"0:table=wB_word,show=Parent:from_table","Raspberry Pi:text",:url,"Raspberry Pi is a computer on a motherboard designed to get people interested in the electronics of computing, and create a whole new generation of hobbyist. The Pi is relatively inexpensive (but is also slow), and can be used for a variety of purposes. Perhaps its best feature is the inclusion of a HDMI port. The Pi can run Linux making it versatile and can even be used as a media centre. It's not really for the faint hearted and would please people who like to tinker. Not those who want something which works straight away, out of the box. Don't forget that if you buy a Raspberry Pi, you will also likely need a power supply, SIM card and video cables (e.g. SCART or HDMI).:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-23 11:19:10:created","2014-01-23 04:19:10:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    803:id_number,"0:table=wB_word,show=Parent:from_table","Information Communications Technology (ICT):text",:url,:textarea,y:permission,y:permission,y:approved,y:approved,"2014-01-23 11:28:16:created","2014-01-23 04:28:16:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    804:id_number,"0:table=wB_word,show=Parent:from_table",Business:text,:url,:textarea,y:permission,y:permission,y:approved,y:approved,"2014-01-23 11:28:52:created","2014-01-23 04:28:52:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    805:id_number,"803:table=wB_word,show=Parent:from_table","ICT Standards:text",:url,:textarea,y:permission,y:permission,y:approved,y:approved,"2014-01-23 13:42:57:created","2014-01-23 06:42:57:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    806:id_number,"0:table=wB_word,show=Parent:from_table",Survey:text,?wB_tool=wB_survey:url,"

    A survey, is the collection of data from various sources (usually people). The data can be collated and analyzed, with the results used to make informed decisions.

    Surveys can be used fo market research, customer satisfaction, tests & quizzes, competitions and more.

    The webBRIEFCASE Survey Toolkit enables you to create and respond to surveys.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-24 17:41:28:created","2014-06-15 03:18:07:modified",1:created_by,:session,43898328849399664422:session,:checkbox
    807:id_number,"0:table=wB_word,show=Parent:from_table","Service Acceptance Criteria:text",:url,"When transferring a service from a project into business as usual processes, service acceptance criteria (SAC) can be used to define what products (e.g. documentation, processes, assigned roles, etc) are required.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-25 08:28:53:created","2014-01-25 01:28:53:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    808:id_number,"0:table=wB_word,show=Parent:from_table",Waterfall:text,:url,"Waterfall is a hierarchical project management structure where a project is broken down into waves, stages, etc. Stages will tend to have a stage boundary and an approval process to move to the next stage. See also: Agile.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-25 08:48:42:created","2014-01-25 01:48:42:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    809:id_number,"0:table=wB_word,show=Parent:from_table",RAID:text,:url,"Risks, Assumptions, Issues, Dependencies. A RAID log records these and allows someone to track, mitigate and resolve them.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-25 08:53:43:created","2014-01-25 01:53:43:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    810:id_number,"0:table=wB_word,show=Parent:from_table",Database:text,:url,"A database (DB) is a method of storage data. Database management systems (DBMS) are applications which store databases. Structured databases are in common use for most purposes. Cube databases are suited to data mining. Microsoft SQL, MySQL and Oracle are examples of DBMS.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-26 22:49:32:created","2014-01-26 15:50:15:modified",1:created_by,:session,43898328849399664422:session,:checkbox
    811:id_number,"0:table=wB_word,show=Parent:from_table",DB:text,:url,"See: Database:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-26 22:50:33:created","2014-01-26 15:50:33:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    812:id_number,"0:table=wB_word,show=Parent:from_table",webBRIEFCASE.com:text,:url,"See: www.webBRIEFCASE.com:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-27 00:04:10:created","2014-01-26 17:04:10:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    813:id_number,"0:table=wB_word,show=Parent:from_table",Toolkit:text,http://www.webBRIEFCASE.com/?wB_table=wB_toolkit:url,"

    The webBRIEFCASE Toolkit is a powerful content management system (CMS), master data manager (MDM) and web-based application framework, designed to facilitate rapid development of web-based business solutions. A toolkit is a webBRIEFCASE application comprising of database tables and tools.

    See: webBRIEFCASE Toolkits.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-27 00:09:43:created","2015-05-01 06:58:07:modified",1:created_by,:session,43898328849399664422:session,:checkbox
    814:id_number,"0:table=wB_word,show=Parent:from_table",Tool:text,:url,"A tool is an part of the webBRIEFCASE Toolkit which provides a piece of application functionality. Examples of tools are Table (which shows database tables and records), A-Z which shows the A-Z selector above a table, and About which shows the about / contact us page for a website.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-27 00:11:52:created","2014-01-26 17:11:52:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    815:id_number,"0:table=wB_word,show=Parent:from_table","Customer Satisfaction:text",:url,"In business - we all have customers. If someone asks you to do something, they are your customer. Your boss for example. You should always try to ensure customer satisfaction and can achieve this by second-guessing (and confirming if possible) what they will want to see you produce, not just what they ask for (there is usually a difference). You should balance the customers' wants against the resources (e.g. time) that you have available. See also: MoSCoW. :textarea",y:permission,y:permission,y:approved,:approved,"2014-01-30 09:09:21:created","2014-01-30 02:09:21:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    816:id_number,"0:table=wB_word,show=Parent:from_table",Programming:text,:url,"Programming is almost synonymous with software development and is the act of writing or modifying software.:textarea",y:permission,y:permission,y:approved,:approved,"2014-01-30 09:23:01:created","2014-01-30 02:23:01:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    817:id_number,"0:table=wB_word,show=Parent:from_table",Manager:text,:url,"A manager is a person who co-ordinates the activities of others, often in a team / department. Team leaders / supervisors will usually report to a manager. Managers will usually report to directors. See also: Project Manager.:textarea",y:permission,y:permission,y:approved,y:approved,"2014-01-30 11:35:44:created","2014-01-30 04:35:44:modified",1:created_by,09222593678085407953:session,43898328849399664422:session,:checkbox
    818:id_number,"27:table=wB_word,show=Parent:from_table","Root Cause Analysis (RCA):text",:url,"Issues: incidents, defects, problems, etc - all have a root cause. This should be determined (even if only a probable root cause) as soon as possible, to ensure that fix which is applied, is appropriate. A root cause analysis (RCA) will determine the root cause. This will often involve troubleshooting methods. Need help? Contact webBRIEFCASE. We are expert in root cause analysis and troubleshooting.:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-10 12:08:12:created","2014-03-10 05:08:12:modified",1:created_by,51680796737624810409:session,60794696367737383252:session,:checkbox
    819:id_number,"0:table=wB_word,show=Parent:from_table","Business Change Manager (BCM):text",:url,"A Business Change Manager (BCM) establish ad maintain contact with stakeholders in the business for a work stream (e.g. project). This include management of the stakeholder register and map, change impact assessment (CIA), facilitating regular meetings, etc. Different organisations will have different requirements of a BCM.:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-10 12:10:33:created","2014-03-10 05:10:33:modified",1:created_by,51680796737624810409:session,60794696367737383252:session,:checkbox
    820:id_number,"0:table=wB_word,show=Parent:from_table",1-2-1:text,:url,"It is good practice to have one to one meetings with your staff, line manager and other stakeholders. In a 1-2-1 meeting you can speak much more freely to each other than if others were in the conversation. Why not set-up regular 1-2-1's as repeating reminders in your calendar?:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 14:31:49:created","2014-03-15 07:31:49:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    821:id_number,"0:table=wB_word,show=Parent:from_table","Hits, Hits:text",:url,"A hit on a website is when a file is served. Each page can be made up of multiple files. The page itself, cascading style sheets (CSS), images, etc. The number of hits to a website is not a good measure of the popularity of the website.:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 14:46:27:created","2014-03-15 07:46:27:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    822:id_number,"0:table=wB_word,show=Parent:from_table","Page Impressions:text",:url,"A page impression is where a website servers a web page. The number of page impressions delivered over a particular period is a better measure of a website popularity that hits. An even better measure is unique visitors or unique users.:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 14:48:02:created","2014-03-15 07:48:02:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    823:id_number,"0:table=wB_word,show=Parent:from_table",GIGO:text,:url,"See: Garbage in garbage out:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 15:44:42:created","2014-03-15 08:44:42:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    824:id_number,"0:table=wB_word,show=Parent:from_table","Garbage In Garbage Out:text",:url,"If you supply rubbish data as input to a process, you are very likely to receive rubbish data as an output. This can be avoided by validating the input data.:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 15:46:48:created","2014-03-15 08:46:48:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    825:id_number,"0:table=wB_word,show=Parent:from_table","Software Development Life Cycle (SDLC):text",:url,"The software development life cycle is a process through which software development progresses as follows:

    Organisations will use different words to define each step in the SDLC process. They may also break down some of the processes into sub-processes. For example: QA could include system test, integration test, user acceptance test (UAT).:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 15:54:36:created","2014-03-15 08:54:36:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    828:id_number,"0:table=wB_word,show=Parent:from_table",B2B:text,:url,"See: Business to business:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 15:57:58:created","2014-03-15 08:57:58:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    829:id_number,"0:table=wB_word,show=Parent:from_table",CAD:text,:url,"See: Computer Aided Design:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 16:00:55:created","2014-03-15 09:00:55:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    830:id_number,"0:table=wB_word,show=Parent:from_table",CAM:text,:url,"See: Computer Aided Manufacturing:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 16:01:34:created","2014-03-15 09:01:34:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    831:id_number,"0:table=wB_word,show=Parent:from_table","Data Classification:text",http://en.wikipedia.org/wiki/Information_sensitivity:url,"Sensitive information should be protected. Here are some classifications.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-03-15 16:05:34:created","2014-03-15 09:05:34:modified",1:created_by,00940071268155339949:session,94715064735547969188:session,:checkbox
    832:id_number,"0:table=wB_word,show=Parent:from_table","Automated Monitoring:text",:url,"An automated monitoring system automatically and repeatedly checks that something (e.g. a process, system, service, server, etc.) is working at all, or within pre-defined tolerances. It may record a log, and issue alerts (warnings or errors) when it detects scenarios.:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-19 10:12:33:created","2014-03-19 03:12:33:modified",1:created_by,39935589760439164519:session,93379342354290066904:session,:checkbox
    833:id_number,"0:table=wB_word,show=Parent:from_table",Workbook:text,:url,"A workbook is a spreadsheet; a collection of worksheets.:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-30 18:34:57:created","2014-03-30 10:34:57:modified",1:created_by,66155949744542299576:session,53177796587030479121:session,:checkbox
    834:id_number,"0:table=wB_word,show=Parent:from_table",Worksheet:text,:url,"

    A workbook (spreadsheet) consists of one or more worksheets. A worksheet contains rows and columns of cells. The worksheet has a name which is shown in as the worksheet tab label and (sometimes) tab colour. A worksheet can be hidden.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-03-30 18:35:56:created","2014-03-30 10:42:46:modified",1:created_by,:session,53177796587030479121:session,:checkbox
    835:id_number,"0:table=wB_word,show=Parent:from_table",Worksheets:text,:url,"See: Worksheet:textarea",y:permission,y:permission,y:approved,:approved,"2014-03-30 19:08:29:created","2014-03-30 11:08:29:modified",1:created_by,66155949744542299576:session,53177796587030479121:session,:checkbox
    836:id_number,"0:table=wB_word,show=Parent:from_table","Hot desk:text",:url,"A hot desk is a desk which is usually not allocated to a particular individual, and can instead be used temporarily. It will usually have standard features such as: desk, chair, phone, and may / may not have a PC.:textarea",y:permission,y:permission,y:approved,:approved,"2014-04-01 09:43:04:created","2014-04-01 01:43:04:modified",1:created_by,32358774167154784247:session,39484838294692082661:session,:checkbox
    840:id_number,"0:table=wB_word,show=Parent:from_table","Cost per Click:text",:url,"See: CPC:textarea",y:permission,y:permission,y:approved,:approved,"2014-04-25 16:50:49:created","2014-04-25 08:50:49:modified",1:created_by,97253783296616187711:session,52101323594636530106:session,:checkbox
    841:id_number,"0:table=wB_word,show=Parent:from_table",DoS:text,:url,"See: Denial of Service:textarea",y:permission,y:permission,y:approved,:approved,"2014-04-27 23:44:06:created","2014-04-27 15:44:07:modified",1:created_by,97253783296616187711:session,52101323594636530106:session,:checkbox
    842:id_number,"0:table=wB_word,show=Parent:from_table","Denial of Service:text",:url,"Denial of Service (DoS) is a hacking attack which denies people with access to a service. For example, overloading a website, or locking a user out with multiple login attempts.:textarea",y:permission,y:permission,y:approved,:approved,"2014-04-27 23:45:14:created","2014-04-27 15:45:14:modified",1:created_by,97253783296616187711:session,52101323594636530106:session,:checkbox
    843:id_number,"0:table=wB_word,show=Parent:from_table",Spreadsheet:text,:url,"

    A spreadsheet application is a piece of software which allows you to record and report on information (e.g. financial data) in sheets containing rows and columns of cells.

    :textarea",y:permission,y:permission,y:approved,:approved,"2014-07-04 12:58:29:created","2014-07-04 04:58:41:modified",1:created_by,:session,53766382762721312423:session,:checkbox
    844:id_number,"0:table=wB_word,show=Parent:from_table",SaaS:text,:url,"Software as a service. Software running on a (cloud) service, managed by the solution provider.:textarea",y:permission,y:permission,y:approved,:approved,"2017-06-11 15:32:49:created","2017-06-11 15:32:49:modified",1:created_by,00909268220206120183:session,98556363845081951700:session,:checkbox
    845:id_number,"0:table=wB_word,show=Parent:from_table","Single Point of Failure (SPoF):text",:url,"A single point of failure is a person, process, service or product which has no resilience built in. Should that object fail, it is likely to cause a major issue. SPoFs should be avoided.:textarea",y:permission,y:permission,y:approved,:approved,"2017-06-11 15:35:43:created","2017-06-11 15:35:43:modified",1:created_by,00909268220206120183:session,98556363845081951700:session,:checkbox