GDPR, or the General Data Protection Regulation, is a set of rules designed to protect the privacy and personal data of European Union residents. The implications of GDPR are far reaching, as it impacts all organizations worldwide that collect personal information about EU residents. Non-compliance with GDPR can carry serious financial consequences, with some proposals calling for damages of up to 4% of a company's annual revenue or 20 million Euros — whichever is higher . The regulation was approved in 2016 and is set to become effective on May 25, 2018.
In a nutshell, the regulations affect how companies must handle personal user data commonly tracked online. This includes IP addresses, geographic locations, names, home or work addresses, gender, and a wide range of more sensitive information such as health status, political affiliation, religion, and ethnicity, among other things.
The internet of things (IoT) is a term that describes the phenomenon of an increasing number of electronic devices gaining connectivity, which allows these devices to talk to each other, interface with PCs and smartphones, and/or connect to the internet.
Cyberloafing is the act of employees wasting time on the internet reading news, browsing social media, or engaging in other personal activities. Cyberloafing is problematic because it can distract employees from doing actual work that benefits their employers.
In computing, compressing a file is the act of reducing its size so the same amount of information occupies less disk space or memory. Compression is accomplished using techniques such as representing repeating data patterns in a way that takes up less space.
In IT, a legacy system is one that's old and outdated, but still in use. A legacy system might be an antique piece of computer hardware, an application that's past its prime, or some old-fashioned process... or all of the above.
Net neutrality, also known as "open internet", is a belief that internet service providers and governments who control access to the Internet should treat all data the same, regardless of what it is or where it came from.
In computing, a cache is a temporary store of duplicate, frequently-accessed data that's kept in a special location, so it may be accessed quickly, which reduces latency. There are many different types of cache including CPU, disk, browser, and more.
In information technology, bandwidth is the maximum amount of data that can be sent through a network channel over a given period of time. For example, a fiber-based internet connection might be capable of transmitting 1 gigabit of data per second, or a particular Wi-Fi connection might be capable of moving 11 megabits per second.
In information technology, redundancy means simultaneously running duplicate or backup computer components that perform the same function. When you have redundant servers, if one dies, the backup server can quickly take it's place with minimal interruption to services (this is called failover).
A proxy is an intermediate person or thing that represents someone else, or does a task on someone else's behalf. For example, voting by proxy is the practice of passing your voting rights to a stand-in person, who then casts that vote on your behalf. There's even a tradition called a proxy wedding, where "one or both of the individuals being united are not physically present, usually being represented instead by other persons."
VPN stands for virtual private network, a computer networking technology that enables users to securely connect to each over the Internet (or a similar public network) as if they were on the same private network/intranet.
In general terms, binary means involving two things. You can have a binary decision with only two answers or a binary compound made up of only two elements. In mathematics and computing, binary numbers are expressed using binary digits (also known as bits), which can have one of two values, either a one or a zero.