Welcome to the IT Glossary of Terms. We value clear communication and collaboration, offering support to newcomers and seasoned professionals alike. The comprehensive glossary decodes technical jargon, providing clear definitions and insights. Your input is crucial in enhancing this resource. Have a suggestion? Suggest a new glossary term here.
Term Definition Category
Iterative Process

An iterative process is a repeatable process with opportunity for continuous improvement.
 

Project Management Office
Jaggaer

Software used in BuyWays 
 

Finance System
Java

Java is a high-level, class-based, object-oriented programming language that is designed to have as few implementation dependencies as possible.
 

Development
Javascript

JavaScript, often abbreviated as JS, is a programming language that is one of the core technologies of the World Wide Web, alongside HTML and CSS. As of 2023, 98.7% of websites use JavaScript on the client side for webpage behavior, often incorporating third-party libraries.
 

Development
JSON

JSON is an open standard file format and data interchange format that uses human-readable text to store and transmit data objects consisting of attribute–value pairs and arrays. It is a common data format with diverse uses in electronic data interchange, including that of web applications with servers.
 

Development
Kanban

Kanban is a form of visual project management often represented by Kanban boards. In a Kanban board, work is displayed in a project board that is organized by columns, with each task being a “card” in the appropriate column. Columns often represent a stage of work, and cards are “pulled” from a backlog as they progress through the next stage of the process. 
 

Project Management Office
Key Performance Indicators

A key performance indicator (KPI) is a metric that showcases how your team is progressing toward a specific goal or project objectives. KPIs are an easy way to track project performance. An email marketer may have a goal set to increase email open rates, and the KPI they track would be the average open rate percentage of all marketing emails sent that quarter
 

Project Management Office
Kick-off Meeting

A kick-off meeting is an opportunity for you to gather with all of the stakeholders of a specific project to make sure that everyone is aligned on the project plan. It enables team members to ask questions and ensures that everyone who has a stake in the project has an opportunity to voice any opinions. 
 

Project Management Office
Lessons learned

When project meets the definition of Done.  Template used to capture and review the project wins or Issues, what issue was and who was impacted.  The goal of this exercise is to capture any tasks from the learning, assign the task and assure those tasks are completed so that you do not have a repeat on your next project (avoiding any impediments or blockers and a more streamlined process).
 

Project Management Office
Listener

Listener: A component in Boomi that listens for incoming data or events. Listeners can be configured to trigger integration processes when specific conditions are met.
 

Integration
LogRhythm

Security information and event management software to gather and analyze logs from many sources
 

Release Management & QA
Low

Not causing any disruption to business operations It can be resolved at a later date

Case Management
Major Incident (MI)

An unplanned interruption or a severe reduction in the quality of a UITS Services* that results in the broad or severe disruption (blockage with or without workaround) of services for all, multiple, or an individual campus(s).

Case Management
Major Incident Management

The structured process of effectively identifying, responding to, and resolving critical incidents that severely disrupt IT services, with the primary goal of minimizing downtime, restoring services, and mitigating negative impact on business operations.

Case Management
Major Outage

Widespread service disruption.

Case Management
Malicious Code

Software (e.g., Trojan horse) that appears to perform a useful or desirable function,
but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.

Identity Management & Security
Man-in-the-Middle Attack (MitM)

A man-in-the-middle attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other. The attack is a type of eavesdropping in which the attacker intercepts and then controls the entire conversation.
 

Identity Management & Security
Map

Map: A mapping defines how data is transformed from one format to another. Boomi provides a visual mapping interface to configure field-level mappings between source and target structures.
 

Integration
MBL

Worcester "Mass BioLogic Laboratories" related invoices and payments.  Invoices to be processed are received in interface files processed in batch.
 

Finance System
Medium

Causing a minor disruption to business operations. It should be resolved within a reasonable period of time

Case Management
Menus

an intuitive, nonlinear way to navigate PeopleSoft applications and access your application data. 
 

PeopleSoft
MI Bridge

The zoom established and used to coordinate resources and get updates as needed.

Case Management
MI Manager

The ITSM person responsible for coordinating the MI.

Case Management
Middleware

Software that serves as a bridge between different systems or applications, facilitating data exchange and communication between them.
 

Integration
Molecule

A cluster of atom servers.  Molecules provide high availability for integration proceses.
 

Integration
Month End Close

It is a procedure that finalizes and closes out all financial activity for a certain month.
 

Finance System
MoSCoW

This product MoSCoW facilitates discussions with product customers on product features for project deliverables. Complete with the project customer which product features are: Must have, Should have, Could have, Won’t have (right now).  This tool facilitates product selection by focusing customer requirements on the features that they can’t do without. 
 

Project Management Office
Multi-factor Authentication

Multi-factor authentication strengthens access security by requiring two or more methods (factors) to verify your identity.  The goal of MFA is to create a layered defense and make it more difficult for an unauthorized person to gain access.
 

Identity Management & Security
Navigation Collections

Navigation collections provide an easy way to access the pages
 

PeopleSoft
Node/NodeJS

A server-side Javascript runtime environment
 

Development