IT Glossary of Terms
Term | Definition | Category |
---|---|---|
UMAMH | Amherst Campus |
Common Acronyms |
UMBOS | Boston Campus |
Common Acronyms |
UMCEN | Central Campus |
Common Acronyms |
UMDAR | Dartmouth Campus |
Common Acronyms |
UMLOW | Lowell Campus |
Common Acronyms |
UMWOR | Worcester Campus |
Common Acronyms |
UNICAS | An application (by Liaison) used by Lowell GPS |
Student Administration |
UPST | Unified Procurement Services Team |
Common Acronyms |
Urgency | The degree of business impact that an incident or service request can cause and the timeframe in which it needs to be resolved |
Case Management |
User profile | define individual PeopleSoft users. |
Finance System |
UX | User experience (UX) focuses on having a deep understanding of users, what they need, what they value, their abilities, and also their limitations. There are seven key principles that user experience covers - a product should be: |
Common Acronyms |
Value | perceived benefit or worth that a product, service, or experience provides to an individual or organization |
Service Delivery |
Value statement | The 1st step in any project is to identify the Value Statement, a simple statement explaining the justification for the project visible to all project stakeholders. |
Project Management Office |
VB | Visual Basic, originally called Visual Basic .NET, is a multi-paradigm, object-oriented programming language, implemented on .NET, Mono, and the .NET Framework. Microsoft launched VB.NET in 2002 as the successor to its original Visual Basic language, the last version of which was Visual Basic 6.0 |
Development |
Vendor solved | The issue was resolved by the vendor or supplier of the product or service in question. |
Finance System |
Vendor unresolved | The issue has been identified as a feature request or bug by the vendor. |
Case Management |
Virus | A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting - i.e., inserting a copy of itself into and becoming part of - another program. A virus cannot run by itself; it requires that its host program be run to make the virus active. |
Identity Management & Security |
Vulnerability | A weakness in system security procedures, system design, implementation, internal controls, etc., that could be exploited to violate the system security policy. |
Identity Management & Security |
Waterfall Model | Waterfall project management is a linear form of project management in which each step of the project is dependent on the previous step. The waterfall model often involves a large amount of planning before the execution begins to ensure that all dependencies are accounted for. The waterfall model is often visualized in a Gantt chart. |
Project Management Office |
WBS | Work breakdown structure |
Common Acronyms |
Web server | web server receives application requests from the web environment (internet and intranet) and forwards the requests to the Oracle Jolt port on the application server. A collection of PeopleSoft servlets running on the web server handle incoming requests. |
PeopleSoft |
Web Services | A technology that enables communication and interaction between different software applications over the internet using standard protocols and formats such as XML or JSON. |
Integration |
Web Services | A Web service is a method of communication between two electronic devices over a network. It is a software function provided at a network address over the Web with the service always-on as in the concept of utility computing. Many organizations use multiple software systems for management. |
Development |
What is Changing | Describe the hardware, software, system architeture or combination that will be subjected to change. |
Change Management |
Where Are You From Page (WAYF) | A page that may be displayed when accessing a multi-campus application such as HR-Direct. By selecting the campus, the user is transferred to their affiliated campus for subsequent authentication. |
Identity Management & Security |
WISER | UMBOS refers to Campus Solutions as WISER |
Student Administration |
Workflow | processes that involve multiple users and the routing of data between the users. |
Development |
Worklists | A worklist is a standard PeopleTools grid. Therefore, the user can use grid personalization features to order and sort columns. When work is routed to a PeopleSoft user, it is put in the user's worklist. To work on an item, the user selects it from the worklist and is presented with the appropriate page to begin work. |
PeopleSoft |
Worm | A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively. |
Identity Management & Security |
WSA | Worcester Student Application - PeopleSoft Student system for Medical School |
Release Management & QA |