Welcome to the IT Glossary of Terms. We value clear communication and collaboration, offering support to newcomers and seasoned professionals alike. The comprehensive glossary decodes technical jargon, providing clear definitions and insights. Your input is crucial in enhancing this resource. Have a suggestion? Suggest a new glossary term here.
Term Definition Category
Resource Management

Resource management is the process of planning and scheduling the resources you need to use for any one given project. This is different from resource allocation, because you are actively planning where and when to use the set resources that you have budgeted for a project.
 

Project Management Office
REST

A REST API (also known as RESTful API) is an application programming interface (API or web API) that conforms to the constraints of REST architectural style and allows for interaction with RESTful web services. REST stands for representational state transfer and was created by computer scientist Roy Fielding.

Development
REST (Representational State Transfer)

An architectural style and set of principles for designing networked applications that use web services. RESTful APIs often use HTTP as the underlying protocol and support various data formats, including JSON.
 

Integration
Restoration

This involves changes to the environment that are required to restore service lost due to software or hardware failure. As an example, this would include any un-planned server or other hardware-boots or reconfiguration necessary to stabilize the environment as well as adding additional hardware or software to bring a service back on line.

Change Management
Risk

Risk is the product of the level of threat with the level of vulnerability. It establishes the likelihood of a successful attack.
 

Identity Management & Security
Risk Log

A risk is an uncertain action or outcome that can affect the likelihood of success of a project. Risks can have either a negative or a positive effect on the project outcome. Positive risks are also known as opportunities. A project risk register is a document that outlines potential risks associated with a project, as well as strategies for maintaining information about and managing those risks throughout the project lifecycle.
 

Project Management Office
Role

Roles link together permission lists which are the security objects that define access to components, pages, and other areas of the system.
 

PeopleSoft
Role

Roles link together permission lists which are the security objects that define access to components, pages, and other areas of the system.
 

Finance System
Roll Back Plan

Describe the steps needed to back out this change. Can be a link to dropbox if needed. 

Change Management
Root Cause

A root cause is defined as a factor that caused a nonconformance and should be permanently eliminated through process improvement. The root cause is the core issue—the highest-level cause—that sets in motion the entire cause-and-effect reaction that ultimately leads to the problem(s).

Project Management Office
Root Cause Analysis

the technique used to discover the underlying reason of an incident rather than addressing its symptoms only. 
 

Project Management Office
Rootkit

A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
 

Identity Management & Security
Routine Change Controls

Changes that are implemented often with repeatable steps. They have been completed many times in the past and pose low to no risk. Completed change control documentation for Routine Changes must be submitted 1 business days in advance of the requested change date. Routine changes can either be done during existing maintenance windows or because there is low to no risk these changes can be scheduled during the business day though specific times will be negotiated.

Change Management
Row level security

control access to individual rows within database tables.
 

Finance System
RPA

Robotic process automation (RPA) is a software technology that makes it easy to build, deploy, and manage software robots that emulate humans actions interacting with digital systems and software.
 

Development
RPA

Robotic Process Automation
 

Common Acronyms
RPT

Rational Performance Test - Software used to Performance test applications (i.e. Start of Classes and as part of Tools upgrades for PeopleSoft)
 

Release Management & QA
Run Control

A type of online page that is used to begin a process.
 

Student Administration
Run Control ID

A Run Control ID is a unique name used to identify which inputs on a page are. saved and used to run a report or process.
 

Development
S3 bucket

Static content storage repository hosted on AWS platform
 

Development
SAIG Mailbox

Student Aid Internet Gateway - digital mailbox for the transfer of Federal files
 

Student Administration
Samba 

Samba is an extremely useful networking tool for anyone who has both Windows and Unix systems on his network. Running on a Unix system, it allows Windows to share files and printers on the Unix host, and it also allows Unix users to access resources shared by Windows systems.
 

PeopleSoft
SAML

Security Assertion Markup Language - used to transfer identify data between two parties (sign in 1 time to access multiple service providers) 
 

Release Management & QA
SCI

Vendor Sierra Cedar who we have partnered for full time PeopleSoft administration support
 

Release Management & QA
Scope

The sum of work content of a project.
 

Project Management Office
Scope Creep

Scope creep is what happens when a project's tasks and deliverables begin to exceed the allotted project scope a project manager has set. While scope creep is not inherently bad, it can drastically shift the amount of time it takes to complete a project if not monitored and managed carefully. 
 

Project Management Office
Scrum

Scrum is a subset of Agile methodology in which teams learn about past experiences to influence the next steps of their project. In a Scrum team, there is one individual, known as the Scrum master, who helps guide teams through each of the scrum stages. There are four common stages within the Scrum methodology: Planning, Execution, Review, Retrospective
 

Project Management Office
SDK (Software Development Kit)

A set of tools, libraries, and documentation that enables developers to build software applications for a specific platform or system.
 

Integration
Security Policy

A set of rules and practices that specify or regulate how a system or organization provides security services
to protect sensitive and critical system resources.

Identity Management & Security
SEIM

Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources.
 

Identity Management & Security