- (Valid Time Event Code) - The Valid Time Event Code (VTEC) always is used in conjunction with, and provides supplementary information to, the Universal Geographic Code (UGC), to further aid in the automated delivery of National Weather Service text products to users. The VTEC is included in many event driven or non-routine products and in some routine Marine forecasts. The VTEC provides information on the event, while the UGC describes the affected geographic area.
NOAA National Weather Service - Cite This Source - This Definition
- Browse Related Terms: FTPMAIL, NESDIS, UGC, Universal Geographic Code, Valid Time Event Code
- the data set on a DASD volume that specifies the location of all non-SMS data sets on that volume. See VVDS.
Sysprog.Net - Cite This Source - This Definition
- Browse Related Terms: ACDS (Active Control Data Set), baseline transfer, dump path, Mirror, PAV (Parallel Access Volume), qtree, root volume, SCDS (Source Control Data Set), volume copy, volume group, VVDS (VSAM Volume Data Set), WAFL check
- Intel's version of virtualization assist, included in some 64-bit Intel processors. See also Virtualization Assist.
VMware - Cite This Source - This Definition
- Browse Related Terms: AMD-V (AMD Virtualization), Hardware Virtualization Assist, Pacifica, Pacifica, AMD, SVM (Secure Virtual Machine), Vanderpool, Virtualization Assist, virtualization hardware assist, VT, Intel
- Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
NIST - Cite This Source - This Definition
- Browse Related Terms: Graduated Security, IT-Related Risk, Residual Risk, Sensitivity Levels, Threat, Threat Agent/Source, Threat Analysis, Threat Assessment, Threat Source, Total Risk
- In communications security, see susceptibility. 2. The extent to which a system will degrade when subjected to a specified set of environmental conditions. 3. In communications interference, see susceptibility threshold. 4. In cryptology, the point of weakness within the encrypted system where threats can occur, such as equipment, facilities, hardware, software, operating systems and personnel. [After X9.49] 5. [A] weakness in an information system (IS), [in] system security procedures, [in] internal controls, or [in] implementation that could be exploited. [INFOSEC-99]
ATIS - Cite This Source - This Definition
- Browse Related Terms: Certification Agent, dangling threat, dangling vulnerability, Residual Risk, risk analysis, risk assessment, Threat Analysis, Threat Assessment