Advice (noun) or advise (verb) may refer to:
Advice, in constitutional law, is formal, usually binding, instruction given by one constitutional officer of state to another. Especially in parliamentary systems of government, heads of state often act on the basis of advice issued by prime ministers or other government ministers. For example, in constitutional monarchies, the monarch usually appoints Ministers of the Crown on the advice of his or her prime minister.
Among the most prominent forms of advice offered are:
In some states, the duty to accept advice is legally enforceable, having been created by a constitution or statute. For example, the Basic Law of Germany requires the President to appoint federal ministers on the advice of the Chancellor. In others, especially under the Westminster system, advice may legally be rejected; for example, in several Commonwealth realms, the Queen is not legally obliged to accept the advice of her ministers. This lack of obligation forms part of the basis for the Queen's reserve powers. Nevertheless, the convention that the head of state accept ministerial advice is so strong that in ordinary circumstances, refusal to do so would almost certainly provoke a constitutional crisis.
In aspect and functional programming, advice describes a class of functions which modify other functions when the latter are run; it is a certain function, method or procedure that is to be applied at a given join point of a program.
The following is taken from a discussion at the mailing list aosd-discuss. Pascal Costanza contributed the following:
The term advice goes back to the term advising as introduced by Warren Teitelman in his PhD thesis in 1966. Here is a quote from Chapter 3 of his thesis:
"Advising" found its way into BBN Lisp and later into Xerox PARC's Interlisp.
It also found its way to Flavors, the first object-oriented extension to Lisp developed at MIT. They were subsumed under the notion of method combination. See, for example, AIM-602 at http://www.ai.mit.edu/research/publications/browse/0600browse.shtml 1
Since method combination and macros are closely related, it's also interesting to note that the first macro system was described in 1963, three years before Warren Teitelman's PhD thesis. See AIM-57 at http://www.ai.mit.edu/research/publications/browse/0000browse.shtml 2
In financial accounting, an asset is an economic resource. Anything tangible or intangible that can be owned or controlled to produce value and that is held to have positive economic value is considered an asset. Simply stated, assets represent value of ownership that can be converted into cash (although cash itself is also considered an asset).
The balance sheet of a firm records the monetary value of the assets owned by the firm. It is money and other valuables belonging to an individual or business. Two major asset classes are tangible assets and intangible assets. Tangible assets contain various subclasses, including current assets and fixed assets. Current assets include inventory, while fixed assets include such items as buildings and equipment.
Intangible assets are nonphysical resources and rights that have a value to the firm because they give the firm some kind of advantage in the market place. Examples of intangible assets are goodwill, copyrights, trademarks, patents and computer programs, and financial assets, including such items as accounts receivable, bonds and stocks.
An asset is an economic resource, or something of value.
ASSET or Asset may also refer to:
Business
Economics
Intelligence
Military
Space
Computing
Entertainment
In information security, computer security and network security an Asset is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and confidential information. Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.
The goal of Information Security is to ensure the Confidentiality, Integrity and Availability of assets from various threats. For example, a hacker might attack a system in order to steal credit card numbers by exploiting a vulnerability. Information Security experts must assess the likely impact of an attack and employ appropriate countermeasures. In this case they might put up a firewall and encrypt their credit card numbers.
When performing risk analysis it is important to weigh how much to spend protecting each asset against the cost of losing the asset. It is also important to take into account the chance of each loss occurring. Intangible costs must also be factored in. If a hacker makes a copy of all a company's credit card numbers it does not cost them anything directly but the loss in fines and reputation can be enormous.