- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
Glossary words and their definitions
Formerly known as R25/WebViewer, 25Live is a web application maintained by ITS and the Office of the Registrar that enables you to search and request a reservation for classrooms for events on campus. This is done in conjunction with University Center Room Reservations and Contracts & Risk Management.
802.11 is essentially the technical term for wi-fi. It is a set of standards that govern wireless networking transmission methods used to provide wireless connectivity in the home, office and some commercial establishments.
AAT stands for Association of Accounting Technicians. Membership entitles those who have completed the examinations and obtained relevant supervised work experience to call themselves associate accounting technicians.
Actors are participants who perform work in a process
Affiliation is the term used to describe an individual's relationship to the University, such as student, faculty, or staff
The term Alias is used by telecommunications professionals to describe two directory numbers going to a single voicemail box.
ARF is short for Access Request Form, the paperwork required to be completed if you need to have access to PeopleSoft databases.
CFR stands for Common Financial Reporting (CFR), sometimes referred to as the Finance Data Warehouse. The CFR environment provides campuses with a set of interactive dashboards that contain the common, core reporting capabilities required by campuses and the Chancellor’s Office.
PeopleSoft CFS is the financial application element of the Common Management System implemented by the CSU to manage University financial systems.
ClassClimate is the software used at HSU to create course evaluations and analyze student responses concerning instructors’ teaching. The results of the evaluations are stored in faculty Personnel Action Files.
CMS is the Common Management System, the umbrella description for HSU's PeopleSoft implementation.
The Degree Audit Report for Students (DARS) is a comprehensive academic audit that matches a student’s academic history with his/her degree requirements. It can be accessed through Faculty Center and Student Center.
A data dictionary is a centralized store of information about data such as its meaning, relationships to other data, origin, usage, and format
A data mart is a subset of a data warehouse that is intended for use by a specific team or line-of-business unit. HSU data marts contain subject areas, dashboards, and reports pertaining to a specific subset of data.
The Domain Name System (DNS) is the naming system for computers, services, and other resources connected to the Internet or a private network. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
Dreamweaver is an application published by Adobe Systems that can be used to generate web pages.
The driver handles the overall coordination of a project, meeting, or business area. This individual, usually the project manager, generally has responsibility for communicating with other team members and ensuring that roles and responsibilities are clear.
Drupal is the primary software platform used at HSU to collaboratively create, design, and post official web pages.
Encryption is the process of encoding information in such a way that it cannot be read or understood without a matching "unlock" code to decrypt it. Encryption is the standard approach to protecting confidential information from unauthorized viewing by humans or computers.
Enterprise software is intended to satisfy the needs of an organization rather than an individual user.
Environmental Resources Engineering
The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student education records. The law applies to all schools receiving public funds under an applicable program of the US Department of Education.
A firewall is a hardware or software network security device that sits between two networks - one of which is usually the Internet - to control what information is allowed to pass between those networks.
Your free/busy time shows people if you are available when they invite you to a meeting. They can't see what you are doing, only whether you are available.
The Global Address List contains all email addresses registered in the HSU email system.
Gmail is Google's web-based email system, adopted campus-wide at HSU.
HSU uses and supports a number of Google Apps (applications): Gmail, Google Calendar, Google Groups, Google Docs, and Google Drive are available to all, while Blogger, Sites, Picasa, and Google+ (and Hangouts) require users to take the ATI survey. All apps are accessible through the Gmail interface.
Human Capital Management (HCM) is the PeopleSoft application used by HSU as part of the Common Management System to manage personnel and other human resources-related functions.
Your HSU User Name is the name you use to login to email, computers, Moodle, etc. It is typically made up of your initials and a number (e.g. abc123), and is generally used in conjunction with your HSU Password.
Short for Independent Computing Architecture, ICA is a protocol designed specifically for transmitting Windows graphical display data as well as keyboard and mouse input over a network. It's used by Citrix in the program you download to your local PC in order to access VLab.
The Identity Registry is the system that reconciles and maintains information about people and their relationship to the University and makes this information available to other systems.
IdM is shorthand for identity and access management, the management of individual identifiers, their authentication, authorization, and privileges with or across system and enterprise boundaries. The goal is to increase security and productivity while decreasing cost, downtime, and repetitive tasks.
Instance management is the term used by PeopleSoft applications to describe the different databases available to the system and their use, enabling users to choose the most appropriate database for their requirements.
Internet Protocol (IP) is the principal communications protocol used for relaying information across the Internet. To enable information to reach its destination, every computer connected to the Internet has a unique IP address.
An ITC, or Information Technology Consultant, is a member of the IT Services department with responsibility for a specific department.
KBOX is the ticketing system used by the HSU Technology Help Desk to record, assign, and track requests submitted via the Help Desk web site.
Each department has a Key Advisor, who is the department's primary point of contact for Telecommunication & Network Service needs (phone and network). This person is authorized to make additions, changes, and deletions to these services for your department.
Level 1 data, sometimes referred to as Level 1 protected data, is confidential information that is in most cases protected by statutes, regulations, or other legal mandates. Level 1 data includes PII (social security numbers, credit card numbers, driver’s license numbers, etc) as well as medical records, passwords, and sealed bids.
Level 2 data is information that could raise ethical or other privacy concerns if shared with individuals or entities that do not have the legal right to require sight of such information. Examples include FERPA, protected student grade data, and disciplinary action records, as well as employee personal information such as home address and telephone number.
Short for malicious software, malware is a generic term for any type of software designed to do damage to or otherwise adversely affect the integrity of a computer system and/or the data stored on that system.
Moodle is the computer-based learning system used by faculty at HSU to deliver lectures and interactive instructional sessions over the web.
MySQL is a commonly-used database system that's often combined for web use with the widely-used PHP scripting language.
Network Address Translation (NAT) is a protocol implemented to enable multiple hosts on a private network to access the Internet using a single public IP address. It can pose significant security risks and so systems running NAT are not permitted to connect to the HSU wireless network.
Nolij is a data management system that enables PeopleSoft users to save time and improve efficiency by automating manual business processes.
OBI, or Oracle Business Intelligence, is the reporting and analysis tool used to extract information from PeopleSoft databases.
The P2P (peer-to-peer) application structure was popularized by file sharing systems like Napster in the early days of the web. In P2P networks, peers are both suppliers and consumers of resources, unlike the traditional client–server model where only servers supply (send) and clients consume (receive). Participating in a P2P network can open up significant security vulnerabilities, so systems running P2P software may not connect to HSU networks.
A pagelet is an individual defined area on the myHumboldt portal that's used to publish targeted communications to a particular college or department. Information published in a pagelet is authorized by the steward for that pagelet.
Sometimes referred to as social engineering, phishing is an attempt to get computer users to provide valuable information, particularly user names and passwords, by providing a convincing-looking but false context such as a recreation of a bank's login page or email communication.
PII, or Personally Identifiable Information, is information about an individual that can be used to facilitate identity theft. It includes social security numbers, driver’s license numbers, and credit card numbers. The CSU has classified PII as Level 1 Data.
The Policy Key is a small piece of software installed on end user computers as part of the HSU Network Access Control system. Its role is to ensure that those computers meet HSU security requirements whenever they connect to the Internet using the HSU wireless network or ResNet.
The Project Sponsor defines the objectives for a project, has the authority to commit financial and human resources to that project, and evaluates the project results at completion.
Proxy systems were developed in the early days of distributed networks as a way to simplify and control infrastructure complexity. Today, most proxies are used to filter and manage access to content on the web.
RDP (Remote Desktop Protocol) is a Microsoft protocol that provides users with a graphical interface to another computer. RDP clients exist for most versions of Windows (including Windows Mobile), Linux, Unix, Mac OS X, and Android.
To reformat a drive means to delete the partition and create a new one or to use Ghost or another sector-based imaging program.
RFB (Remote Frame Buffer) is a simple protocol used for remote access to graphical user interfaces. It can be used with any windowing system or application, including Windows and Macintosh.
Secure destruction of data involves removing drive media from enclosures and using the campus-approved secure destruction contract.
A secure location is a room or other enclosed space with controlled access or a locked cabinet for the storage of confidential materials.
SFTP (Secure File Transfer Protocol) is a way to transfer a file over an Internet connection directly from one computer to another that's safer and more secure than attaching it to an email message. It's particularly appropriate for large files and for executable program files that HSU does not permit to be sent via email.
Smart Classrooms are classrooms equipped with a wide range of instructional technologies to enhance students' learning experience. HSU has 69 Smart Classrooms; their locations are listed at http://www.humboldt.edu/its/smartclassrooms-roomlist.
In the context of the voicemail system, a privilege level that permits the recording of call processor messages.
Sponsorship is the term used to describe a senior leader who can clear project roadblocks and approve recommendations. These individuals have the authority to make decisions affecting the project team's or work group's progress.
The name of the person completing an ITS project request form
Short for System Status, Systat is a reporting system that provides up-to-the-minute information about system outages on campus and expected outage times.
A tab is equivalent to a page within myHumboldt that displays multiple pagelets containing related categories of information and communications. The selection of pagelets displayed on the Home tab is partially customizable by users.
Turning Point is the system, distributed by Turning Technology, that's used in Smart Classrooms to incorporate interactivity into instructional sessions. Each installation comprises a receiver and a number of hand-held devices ('clickers').
The User Web Server hosts unofficial websites for students, staff, and faculty; it should not be used to post instructional or other official HSU content.
USS (User Support Services) is the umbrella name for the Desktop Management, Technology Help Desk, and Training teams within the Information Technology Services department.
Often used interchangeably with malware, a virus is a piece of software designed to do damage to or otherwise adversely affect the integrity of a computer system and/or the data stored on that system. Strictly speaking, a virus, unlike other types of malware, can spread of its own accord without requiring human intervention.
The HSU VLab (Virtual Lab) is an online service that enables students, staff, and faculty to access on-campus software when they're away from campus or can't get access to a physical lab when they need it.
Virtual Network Computing (VNC) is a graphical desktop sharing system that uses the RFB (remote frame buffer) protocol to remotely control another computer. It transmits keyboard and mouse commands from one computer to another over a network, relaying the graphical screen updates back in the other direction.
A virtual private network (VPN) enables users to privately and securely share information between remote locations, or between a remote location and an organization's internal network.
Wiping a drive involves the use of a NIST or DoD 53330.22M approved method such as three-pass wipes, DBAN, degaussing to NIST standards, or a firmware-based purge.
A work session is a meeting designed to deliver a specific outcome and requiring input and interaction from all participants to achieve that outcome.
WPA2 is the primary encryption standard used for wireless communications; it requires testing and certification by the Wi-Fi Alliance. Since March 13, 2006, WPA2 certification has been mandatory for any new device to bear the Wi-Fi trademark.