- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
Glossary words and their definitions
802.11 is essentially the technical term for wi-fi. It is a set of standards that govern wireless networking transmission methods used to provide wireless connectivity in the home, office and some commercial establishments.
AAT stands for Association of Accounting Technicians. Membership entitles those who have completed the examinations and obtained relevant supervised work experience to call themselves associate accounting technicians.
The definition of an individual's relationship to the University, such as student, faculty, or staff
A term used by telecommunications professionals to describe two directory numbers going to a single voicemail box.
Short for Access Request Form, the paperwork required to be completed if you need to have access to PeopleSoft databases.
The Google Apps blog creation program. Users are required to take the ATI survey before using.
The official, public HSU website at www.humboldt.edu.
CFR stands for Common Financial Reporting (CFR), sometimes referred to as the Finance Data Warehouse. The CFR environment provides campuses with a set of interactive dashboards that contain the common, core reporting capabilities required by campuses and the Chancellor’s Office.
PeopleSoft CFS is the financial application element of the Common Management System implemented by the CSU to manage University financial systems.
ClassClimate is the software used at HSU to create course evaluations and analyze student responses concerning instructors’ teaching. The results of the evaluations are stored in faculty Personnel Action Files.
Common Management Systems
A software program used by HSU to scan official University websites (those hosted on the Central Web server) to ensure those sites meet accessibility requirements.
The term used by GMail to describe a series of emails with the same subject line between two or more individuals.
The Degree Audit Report for Students (DARS) is a comprehensive academic audit that matches a student’s academic history with his/her degree requirements. It can be accessed through Faculty Center and Student Center.
A set of predefined, interactive reports in OBI
A centralized store of information about data such as its meaning, relationships to other data, origin, usage, and format
A data mart is a subset of a data warehouse that is intended for use by a specific team or line-of-business unit. HSU data marts contain subject areas, dashboards, and reports pertaining to a specific subset of data.
The Domain Name System (DNS) is the naming system for computers, services, and other resources connected to the Internet or a private network. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
An application published by Adobe Systems that can be used to generate web pages.
The primary software platform used at HSU to collaboratively create, design, and post official web pages.
Encryption is the process of encoding information in such a way that it cannot be read or understood without a matching "unlock" code to decrypt it. Encryption is the standard approach to protecting confidential information from unauthorized viewing by humans or computers.
The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student education records. The law applies to all schools receiving public funds under an applicable program of the US Department of Education.
A firewall is a hardware or software network security device that sits between two networks - one of which is usually the Internet - to control what information is allowed to pass between those networks.
Your free/busy time shows people if you are available when they invite you to a meeting. They can't see what you are doing, only whether you are free or busy.
A list of all HSU email addresses on the mail system.
Google's web-based email system, adopted campus-wide at HSU.
HSU uses and supports a number of Google applications, or Apps: GMail, Google Calendar, Google Groups, and Google Docs are available to all, while Blogger, Sites, Picasa, and Google+ (and Hangouts) require users to take the ATI survey. All apps are accessible through the GMail interface.
A plug-in for Microsoft Outlook that allows you to access your Google Apps mail, calendar, and contacts from within Outlook.
Where Google Docs are stored and from where sharing and collaboration on those documents take place.
The Google Apps implementation of a mailing list. Enables users to establish lists of recipients for different types of communications with different access/privacy levels.
A Google Apps program that can be used to generate small personal websites. May not be used to generate HSU instructional sites.
Human Capital Management is the PeopleSoft application used by HSU as part of the Common Management System to manage personnel and other human resources-related functions.
Your HSU User Name is what you use to login to email, computers, Moodle, etc. It is typically made up of your initials and a number (e.g. abc123), and is generally used in conjunction with your HSU Password.
Short for Independent Computing Architecture, ICA is a protocol designed specifically for transmitting Windows graphical display data as well as keyboard and mouse input over a network. It's used by Citrix in the program you download to your local PC in order to access VLab.
The system that reconciles and maintains information about people and their relationship to the University and makes this information available to other systems.
Identity and access management - the management of individual identifiers, their authentication, authorization, and privileges with or across system and enterprise boundaries. The goal is to increase security and productivity while decreasing cost, downtime, and repetitive tasks.
Instance management is the term used by PeopleSoft applications to describe the different databases available to the system and their use, enabling users to choose the most appropriate database for their requirements.
The Internet Protocol (IP) is the principal communications protocol used for relaying information across the Internet. To enable information to reach its destination, every computer connected to the Internet has a unique IP address.
An ITC, or Information Technology Consultant, is a member of the IT Services department with responsibility for a specific department.
KBOX is the ticketing system used by the HSU Help Desk to record, assign, and track requests submitted via the Help Desk web site.
Each department has a Key Advisor, who is the department's primary point of contact for Telecommunication & Network Service needs (phone and network). This person is authorized to make additions, changes, and deletions to these services for your department. If your Key Advisor is unavailable and you have an urgent need, please obtain authorization from your Department Dean, Chair or Director.
Level 1 data, sometimes also referred to as Level 1 protected data, is confidential information that is in most cases protected by statutes, regulations, or other legal mandates. Level 1 data includes PII (social security numbers, credit card numbers, driver’s license numbers, etc) as well as medical records, passwords, and sealed bids.
Level 2 data is information which could raise ethical or other privacy concerns if shared with individuals or entities that do not have the legal right to require sight of such information. Examples include FERPA protected student grade data and disciplinary action records, as well as employee personal information such as home address and telephone number.
Short for malicious software, malware is a generic term for any type of software designed to do damage to or otherwise adversely affect the integrity of a computer system and/or the data stored on that system.
Moodle is the computer-based learning system used by faculty at HSU to deliver lectures and interactive instructional sessions over the web.
MySQL is a commonly-used database system that's often combined for web use with the widely-used PHP scripting language.
Network Address Translation (NAT) is usually implemented to enable multiple hosts on a private network to access the Internet using a single public IP address. It can pose significant security risks and so systems running NAT are not permitted to connect to the HSU wireless network.
Nolij is a data management system that enables PeopleSoft users to save time and improve efficiency by automating manual business processes.
OBI, or Oracle Business Intelligence, is the reporting and analysis tool used to extract information from the PeopleSoft databases.
The P2P (peer-to-peer) application structure was popularized by file sharing systems like Napster. In P2P networks, peers are both suppliers and consumers of resources, unlike the traditional client–server model where only servers supply (send) and clients consume (receive).
The peer-to-peer (P2P) application structure was popularized by file sharing systems like Napster. In P2P networks, peers are both suppliers and consumers of resources, unlike the traditional client–server model where only servers supply (send), and clients consume (receive).
Sometimes referred to as social engineering, phishing is an attempt to get computer users to provide valuable information, particularly user names and passwords, by providing a convincing-looking but false context such as a recreation of a bank's login page or email.
PII, or Personally Identifiable Information, is information about an individual that can be used to facilitate identity theft. It includes social security numbers, driver’s license numbers, and credit card numbers. The CSU has classified PII as Level 1 Data.
The Policy Key is a small piece of software installed on end user computers as part of our Network Access Control system. Its role is to ensure that those computers meet HSU security requirements whenever they connect to the Internet using the HSU wireless network or ResNet.
The Project Sponsor defines the project objectives, has the authority to commit financial and human resources, and evaluates the results.
Proxy systems were developed in the early days of distributed systems as a way to simplify and control complexity. Today, most proxies are are used to filter and manage access to content on the World Wide Web.
The R25 WebViewer is an online service offered by Training & Professional Development that lets you search and request a reservation for classrooms for events on campus, in conjunction with Room Reservations in University Center.
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to another computer. Clients exist for most versions of Microsoft Windows (including Windows Mobile), Linux, Unix, Mac OS X, and Android.
Deleting the partition and creating a new partition or using “Ghost” or another sector-based imaging program.
The network in the halls of residence, which is separate from the campus business network.There is also a ResNet wireless network. More details on the ResNet website at http://www.humboldt.edu/resnet.
RFB (remote frame buffer) is a simple protocol for remote access to graphical user interfaces. It can be used with any windowing system or application, including Windows and Macintosh.
Removing drive media from enclosures and utilizing the campus-approved secure destruction contract.
A room or other enclosed space with controlled access or a locked cabinet.
Secure File Transfer Protocol is a way to transfer a file over an Internet connection directly from one computer to another that's safer and more secure than attaching it to an email message. It's particularly appropriate for large files and for executable program files that HSU does not permit to be sent via email.
Smart Classrooms are classrooms equipped with a wide range of instructional technologies to enhance students' learning experience. HSU has 69 Smart Classrooms; their locations are listed on the web at https://www.humboldt.edu/its/smartclassrooms-roomlist.
In the context of the voicemail system, a privilege level that permits the recording of call processor messages. In the context of an ITS project, the name of the individual authorizing the submission of the project proposal.
Person responsible for the content and functionality of pagelets and other content and communications within myHumboldt
Short for System Status, Systat is a reporting system that provides up-to-the-minute information about system outages on campus and expected outage times.
A page within the myHumboldt site that displays multiple pagelets containing related categories of information and communications. Home tab contents are partially customizable by users.
Turning Point is the system, distributed by Turning Technology, that's used in Smart Classrooms to incorporate interactivity into instructional sessions. Each installation comprises a receiver and hand-held devices ('clickers').
The User Web Server hosts unofficial websites for students, staff, and faculty; it should not be used to post instructional or other official HSU content.
USS (User Support Services) is the umbrella name for the Desktop Management, Help Desk, and Training teams within the Information Technology Services department.
Often used interchangeably with malware, a virus is a piece of software designed to do damage to or otherwise adversely affect the integrity of a computer system and/or the data stored on that system. Strictly-speaking a virus, unlike other types of malware, can spread of its own accord without requiring human intervention.
The HSU VLab (Virtual Lab) is an online service that enables students, staff, and faculty to access on-campus software when they're away from campus or can't get access to a physical lab when they need it.
Virtual Network Computing (VNC) is a graphical desktop sharing system that uses the RFB (remote frame buffer) protocol to remotely control another computer. It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network.
A virtual private network (VPN) enables users to privately and securely share information between remote locations, or between a remote location and an organization's internal network.
Use of a NIST or DoD 53330.22M approved method such as three-pass wipes, DBAN, degaussing to NIST standards, or firmware-based purge.
WPA2 is the primary encryption standard used for wireless communications; it requires testing and certification by the Wi-Fi Alliance. Since March 13, 2006, WPA2 certification has been mandatory for any new device to bear the Wi-Fi trademark.