IT Glossary of Terms
Term | Definition | Category |
---|---|---|
Iterative Process | An iterative process is a repeatable process with opportunity for continuous improvement. |
Project Management Office |
Jaggaer | Software used in BuyWays |
Finance System |
Java | Java is a high-level, class-based, object-oriented programming language that is designed to have as few implementation dependencies as possible. |
Development |
Javascript | JavaScript, often abbreviated as JS, is a programming language that is one of the core technologies of the World Wide Web, alongside HTML and CSS. As of 2023, 98.7% of websites use JavaScript on the client side for webpage behavior, often incorporating third-party libraries. |
Development |
JSON | JSON is an open standard file format and data interchange format that uses human-readable text to store and transmit data objects consisting of attribute–value pairs and arrays. It is a common data format with diverse uses in electronic data interchange, including that of web applications with servers. |
Development |
Kanban | Kanban is a form of visual project management often represented by Kanban boards. In a Kanban board, work is displayed in a project board that is organized by columns, with each task being a “card” in the appropriate column. Columns often represent a stage of work, and cards are “pulled” from a backlog as they progress through the next stage of the process. |
Project Management Office |
Key Performance Indicators | A key performance indicator (KPI) is a metric that showcases how your team is progressing toward a specific goal or project objectives. KPIs are an easy way to track project performance. An email marketer may have a goal set to increase email open rates, and the KPI they track would be the average open rate percentage of all marketing emails sent that quarter |
Project Management Office |
Kick-off Meeting | A kick-off meeting is an opportunity for you to gather with all of the stakeholders of a specific project to make sure that everyone is aligned on the project plan. It enables team members to ask questions and ensures that everyone who has a stake in the project has an opportunity to voice any opinions. |
Project Management Office |
Lessons learned | When project meets the definition of Done. Template used to capture and review the project wins or Issues, what issue was and who was impacted. The goal of this exercise is to capture any tasks from the learning, assign the task and assure those tasks are completed so that you do not have a repeat on your next project (avoiding any impediments or blockers and a more streamlined process). |
Project Management Office |
Listener | Listener: A component in Boomi that listens for incoming data or events. Listeners can be configured to trigger integration processes when specific conditions are met. |
Integration |
LogRhythm | Security information and event management software to gather and analyze logs from many sources |
Release Management & QA |
Low | Not causing any disruption to business operations It can be resolved at a later date |
Case Management |
Major Incident (MI) | An unplanned interruption or a severe reduction in the quality of a UITS Services* that results in the broad or severe disruption (blockage with or without workaround) of services for all, multiple, or an individual campus(s). |
Case Management |
Major Incident Management | The structured process of effectively identifying, responding to, and resolving critical incidents that severely disrupt IT services, with the primary goal of minimizing downtime, restoring services, and mitigating negative impact on business operations. |
Case Management |
Major Outage | Widespread service disruption. |
Case Management |
Malicious Code | Software (e.g., Trojan horse) that appears to perform a useful or desirable function, |
Identity Management & Security |
Man-in-the-Middle Attack (MitM) | A man-in-the-middle attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other. The attack is a type of eavesdropping in which the attacker intercepts and then controls the entire conversation. |
Identity Management & Security |
Map | Map: A mapping defines how data is transformed from one format to another. Boomi provides a visual mapping interface to configure field-level mappings between source and target structures. |
Integration |
MBL | Worcester "Mass BioLogic Laboratories" related invoices and payments. Invoices to be processed are received in interface files processed in batch. |
Finance System |
Medium | Causing a minor disruption to business operations. It should be resolved within a reasonable period of time |
Case Management |
Menus | an intuitive, nonlinear way to navigate PeopleSoft applications and access your application data. |
PeopleSoft |
MI Bridge | The zoom established and used to coordinate resources and get updates as needed. |
Case Management |
MI Manager | The ITSM person responsible for coordinating the MI. |
Case Management |
Middleware | Software that serves as a bridge between different systems or applications, facilitating data exchange and communication between them. |
Integration |
Molecule | A cluster of atom servers. Molecules provide high availability for integration proceses. |
Integration |
Month End Close | It is a procedure that finalizes and closes out all financial activity for a certain month. |
Finance System |
MoSCoW | This product MoSCoW facilitates discussions with product customers on product features for project deliverables. Complete with the project customer which product features are: Must have, Should have, Could have, Won’t have (right now). This tool facilitates product selection by focusing customer requirements on the features that they can’t do without. |
Project Management Office |
Multi-factor Authentication | Multi-factor authentication strengthens access security by requiring two or more methods (factors) to verify your identity. The goal of MFA is to create a layered defense and make it more difficult for an unauthorized person to gain access. |
Identity Management & Security |
Navigation Collections | Navigation collections provide an easy way to access the pages |
PeopleSoft |
Node/NodeJS | A server-side Javascript runtime environment |
Development |