Menu

You are here

Home » Washington State Enterprise Technology Dictionary

Washington State Enterprise Technology Dictionary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W

Access

Definition:

The ability to use, modify, or affect an IT system or to gain entry to a physical area or location.

Theme(s):
Information Security, Enterprise Architecture, Accessibility

Accounts Payable

Definition:
Amounts owed to private persons or organizations for goods and/or services received by the state. Accounts Payable does not include amounts due to other agencies, funds, or other governments
Theme(s):
Administrative and Financial Systems, Enterprise Architecture
Context:
Business Functions

Accounts Receivable

Definition:
Amounts due from private persons or organizations for goods, and/or services furnished by the state. Accounts Receivable does not include amounts due from other agencies, funds, or other governments
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Administrative Revisions

Definition:

General content changes like an organization, name, phone number, mailbox or URL in a policy or standard or a clarification or other revision that does not change the effect of the policy or standard.

Theme(s):
Governance
Context:
IT Governance

Antenna Support Structure

Definition:
Antenna support structure is any structure that can be safely use to support an antenna.

Application

Definition:

A computer program or set of programs that meet a defined set of business needs.  A program or group of programs designed for end users. These programs are divided into two classes: system software and application software. While system software consists of low-level programs that interact with computers at a basic level, application software resides above system software and includes applications such as database programs, word processors and spreadsheets. Application software may be grouped along with system software or published alone. For the purposes of integration applications consume an integration service such as a web service or API.

Theme(s):
General IT, Technology Business Management, Enterprise Architecture, Integration and Interoperability, Information Security

Application Integration

Definition:
Enterprise application integration EAI use of software and computer systems architectural principles to integrate a set of enterprise computer applications, furthermore, the process of keeping redundant copies of data (in independently designed applications) consistent, or enabling end-users to access data and functionality from independently designed applications on a single user interface.
Theme(s):
Enterprise Architecture, Integration and Interoperability
Context:
Integration

Application Programming Interface

Definition:
A set of protocols, routines, functions and/or commands that programmers use to develop software or facilitate interaction between distinct systems. APIs are available for both desktop and mobile use, and are typically useful for programming graphic user interface components, as well as allowing a software program to request and accommodate services from another program. This definition explicitly excludes any "API" that relies on local binding (e.g. via loading a DLL) to function.
Theme(s):
Enterprise Architecture, Integration and Interoperability
Context:
Integration

Application System

Definition:

An interconnected set of IT resources under the same direct management control that meets a defined set of business needs.

Theme(s):
General IT, Information Security, Enterprise Architecture

Appointment Change

Definition:
An action that indicates a change to an employee's appointment within the agency or movement of an employee between different agencies without a break in service - may include but not limited to movement to another position, adjustment of hours worked, changes from salaried to hourly, or reallocation of a position
Theme(s):
Administrative and Financial Systems, Enterprise Architecture
Context:
Business Functions

Assistive Technology Services

Definition:
Assistive Technology Services is composed of hardware and software that help people who are physically or visually impaired, as well as ensuring electronic and information technology is accessible to people with disabilities, including employees and members of the public (i.e. 508 Compliant). This includes developing standards for all electronic and information technology.
Theme(s):
Technology Business Management, Enterprise Architecture, Accessibility
Topic(s):
Context:
IT Business Function

Attack

Definition:

An attempt to bypass security controls on an IT system in order to compromise the data.

Theme(s):
Information Security, Enterprise Architecture

Audio / Video Conferencing

Definition:
Audio / Video Conferencing entails communication across long distances with audio and / or video contact that may also include graphics and data exchange and includes all equipment, software, hardware, networks, etc. necessary to perform these functions.
Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

Audit Trail Capture and Analysis

Definition:
Defines the set of capabilities to support the identification and monitoring of activities within an application, system, or network
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Authentication

Definition:

The process of ensuring the identity of a connected user or participants exchanging electronic data.

Theme(s):
Information Security, Enterprise Architecture

Benefits Management

Definition:
Advantage, privilege, right, or financial reimbursement (such as that made under an insurance policy, medical plan, or pension plan)
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Budgetary Control

Definition:
The control or management of a governmental unit in accordance with an approved budget for the purpose of keeping expenditures within the limitations of available appropriations and available revenues.
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Budgeting

Definition:
A plan of financial operation embodying an estimate of proposed expenditures for a given period of time or purpose and the proposed means of financing them.
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Business Analytics

Definition:
Business analytics includes all forms of data analysis of extremely large, complex data sets (big data) that are manipulated for business (mission) consumption
Theme(s):
Technology Business Management, Enterprise Architecture, Business Intelligence
Context:
IT Business Function

Business Application / System

Definition:

An application or system which has a direct impact on the delivery of services to department/agency employees, clients or consumers.

Theme(s):
General IT, Enterprise Architecture, Portfolio Management, Technology Business Management

Business Continuity

Definition:

The activities performed by the agency to ensure critical functions are available to entities needing access to those functions.  Business continuity is related to restoring normal day-to-day functions in the event of service disruptions. Business continuity planning is different than disaster recovery planning.

Theme(s):
Enterprise Architecture, Disaster Recovery
Context:
Disaster Recovery

Capital Asset Management / Fixed Asset Management

Definition:
The Management of tangible or intangible assets held and used in state operations, which have a service life of more than one year and meet the state's capitalization policy. Capital assets of the state include land, infrastructure, and improvements to land, buildings, leasehold improvements, vehicles, furnishings, equipment, collections, and all other tangible and intangible assets that are used in state operations
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Topic(s):
Context:
Business Functions

Cash Flows

Definition:
The cash receipts and cash payments of a government during a period. It categorizes cash activity as resulting from operating, noncapital financing, capital financing and investing activities
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Categorization

Definition:

Within the TBM Program, agencies are responsible for categorizing and documenting their costs to the program taxonomies. The TBM Program provides templates that agencies use to capture and submit categorization to the program.

Theme(s):
Technology Business Management, Portfolio Management
Context:
Technology Business Management

Certification and Accreditation

Definition:
Defines the set of capabilities to support the certification and accreditation (C&A) of federal information systems, as described in NIST SP800-37.
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Collaboration Tools

Definition:
The Tools or systems that allow multiple parties to interact and share documents or data through a shared work space or environment. Multiple parties contribute or update the shared environment and view, update, edit, & share files. This includes systems such as SharePoint, MAX, Web Conferencing, Cisco TelePresence, etc.)
Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

Community Management

Definition:
Defines the set of capabilities to support the administration of online groups that share common interests
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Consumer

Continuity of Operations

Definition:
Continuity of Operations involves the activities associated with the identification of critical systems and processes, and the planning and preparation required to ensure that these systems and processes will be available in the event of a catastrophic event and involves the internal actions necessary to develop a plan for resuming operations after a catastrophic event occurs. This can include Contingency Planning, Continuity of Operations and Service Recovery work.
Theme(s):
Technology Business Management, Enterprise Architecture, Disaster Recovery
Context:
IT Business Function

Continuity of Operations Planning

Definition:

The effort to ensure that mission-essential functions continue to be performed during a wide range of emergencies which could be localized or widespread.

Theme(s):
Disaster Recovery, Enterprise Architecture
Context:
Disaster Recovery

Continuous Monitoring

Definition:
Continuous Monitoring includes all activities related to the real-time monitoring of security controls employed within or inherited by a system. (see Appendix G of NIST Special Publication 800-37)
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Contracting

Definition:
Activities related to obtaining goods or services from sources, including the decision to contract, description of goods/services, solicitation of sources, contractor screening and selection, contract preparation, contract monitoring, auditing and post-contract follow-up
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Contractor

Definition:

The firm, its employees and affiliated agents. Contractor also includes any firm, provider, organization, individual, or other entity performing the business activities of the agency. It will also include any subcontractor retained by Contractor as permitted under the terms of the Contract.

Theme(s):
General IT, Information Security
Topic(s):

Correspondence Management

Definition:
Correspondence Management is the set of capabilities used to manage externally initiated and internally initiated communication between an organization and its stakeholders.
Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

Cost Accounting/ Activity Based Costing (ABC)

Definition:
A method of accounting which provides for accumulating and recording of all the elements of cost incurred to accomplish a purpose, to carry on an activity or operation, or to complete a unit of work or a specific job. Cost accounting approach concerned with matching costs with activities (called cost drivers) that cause those costs. It is a more sophisticated kind of absorption-costing and replaces labor based costing system. ABC states that (1) products consume activities, (2) it is the activities (and not the products) that consume resources, (3) activities are the cost drivers, and (4) that activities are not necessarily based on the volume of production. Instead of allocating costs to cost centers (such as service delivery, marketing, finance), ABC allocates direct and indirect costs to activities such as processing an order, attending to a customer complaint, or delivering a service
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Cost Center

Definition:

The cost center used in the TBM program is agency defined. Agencies can select up to three fields coded in the statewide Agency Financial Reporting System (AFRS) for their TBM Cost Center.

Theme(s):
Technology Business Management, Portfolio Management
Context:
Technology Business Management

Cost Estimate

Definition:
The sum established by the agency/institution as available for the entire project, including the construction budget, acquisition costs, furnishings and equipment, compensation for professional services and all contingencies. The cost estimate is used to develop capital project budgets
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Cost Management and Control

Definition:
Management of cost related activities achieved by collecting, analyzing, evaluating, and reporting cost information used for budgeting, estimating, forecasting, and monitoring costs. Cost control typically includes (1) investigative procedures to detect variance of actual costs from budgeted costs, (2) diagnostic procedures to ascertain the cause(s) of variance, and (3) corrective procedures to effect realignment between actual and budgeted costs
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Cost Pools

Definition:

The basic financial groupings of cost data. The smaller list simplifies reporting and provides a finance view of IT spend and represents the logical accounting buckets for IT charges.  Cost Pools are mapped on the Chart of Accounts. For the State of Washington, Cost Pool mapping is generally done by mapping Objects, Sub-Objects, and/or Sub-Sub-Objects to a Cost Pool.

Theme(s):
Technology Business Management, Portfolio Management

Covered Technology

Definition:

Websites, web applications, software systems, electronic documents, E-learning, multimedia and programmable user interfaces. This includes interacting with the technology, access and content. It does not include content that a user may encounter after leaving the covered technology (example: links to other web content).

Theme(s):
General IT, Governance, Technology Business Management, Disaster Recovery, Enterprise Architecture

Credential Issuance and Management

Definition:
Credential Issuance and Management: the researching, tracking and providing of user access credentials (logical and physicals) and associated security features for the protection of federal information and information systems from unauthorized access, use, disclosure, disruptions, modification, or destruction, as well as the creation and implementation of related security policies, procedures and controls. This includes background checks and related personnel security management services.
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Critical Issue

Definition:

A known system defect or enhancement request that if left unresolved could significantly impact business operations, compliance with statute or policy, the integrity of the system or data or otherwise create a public health, safety or other significant risk areas.

Theme(s):
General IT, Enterprise Architecture, Information Management, Information Security, Infrastructure Management, Disaster Recovery

Cryptography

Definition:
Defines the set of capabilities to support the use and management of ciphers, including encryption and decryption processes, to ensure confidentiality and integrity of data
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Customer Services

Definition:
Customer Services supports activities associated with providing an agency's customers with information regarding the agency's service offerings and managing the interactions and relationships with those customers.
Theme(s):
Technology Business Management, Enterprise Architecture, Customer Support
Context:
IT Business Function

Data Center

Definition:

Data Centers are facilities that house and protect critical IT equipment supporting delivery of government services including the space, power, environment controls, racks, cabling and external labor. 

We distinguish between Agency Data Centers, and the State Data Centers because by statute we are directed to migrate TO the State Data Center and away from Agency Data Centers.

State Data Centers include:

  • The Olympia-based State Data Center (SDC) operated by Consolidated Technology Services (CTS)
  • The Quincy-based Disaster Recovery Services Data Center leased by CTS.
  • Other Facilities such as Computer rooms and MDF/IDF/telco closets that house IT equipment primarily supporting local building operations in corporate headquarters, call centers or other general purpose office buildings.

NOTE: This definition is used in the TBM program and also reside in Standard 113.30: TBM Taxonomy.

Theme(s):
General IT, Enterprise Architecture, Technology Business Management
Context:
Technology Business Management, Policies and Standards

Data Exchange

Definition:
Supports the interchange of information between multiple systems and applications; includes verification that transmitted data was received unaltered.
Theme(s):
Technology Business Management, Enterprise Architecture, Information Management
Context:
IT Business Function

Data Integration

Definition:
The practices, architectural techniques and tools for achieving the consistent access and delivery of data across the spectrum of data subject areas and data structure types in the enterprise to meet the data consumption requirements of all applications and business processes.
Theme(s):
Information Management, Integration and Interoperability, Enterprise Architecture
Context:
Integration

Data Integrity and Privacy Management

Definition:
Data Integrity and Privacy Management involves the coordination of data collection, storage, dissemination, and destruction as well as managing the policies, guidelines, and standards regarding data management, so that data quality is maintained and information is shared or available in accordance with the law and best practices
Theme(s):
Technology Business Management, Enterprise Architecture, Information Management
Context:
IT Business Function

Data Mining

Definition:
Defines the set of capabilities to provide for the efficient discovery of non-obvious, valuable patterns and relationships within a large collection of data
Theme(s):
Technology Business Management, Enterprise Architecture, Information Management
Context:
IT Business Function

Data Recovery

Definition:
Defines the set of capabilities to support the restoration and stabilization of data sets to a consistent, desired state
Theme(s):
Technology Business Management, Enterprise Architecture, Information Management, Disaster Recovery
Context:
IT Business Function

Data Set

Definition:
A named collection of related records maintained on a storage device, with the collection containing data organized or formatted in a specific or prescribed way, often in tabular form.

Data Warehouse

Definition:
Defines the set of capabilities to support the archiving and storage of large volumes of data
Theme(s):
Technology Business Management, Enterprise Architecture, Information Management
Context:
IT Business Function

Deprecation

Definition:
Act of including Formal notification of the intent to retire some or all components of an Integration service such as API or web service, made some period ahead of time in order to allow consumers the opportunity to update consuming applications.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Developer Portal

Definition:
A user-facing web interface that provides a list of available APIs and is a repository for: Documentation, Example requests and output, Specifications Interactive tools (test client) Terms of use Contact information
Synonyms:
Integration Service Catalog, Interface Library
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Disaster Recovery

Definition:

Restarting technology operations after an outage using processes, policies and procedures prepared for recovery or continuation of mission-essential technology infrastructure after a disaster. 

These processes are found in a DR Plan.  DR is a subset of business continuity and COOP.

The three principal goals of DR are to:

  • Save data,
  • Save hardware, software and facilities
  • Resume critical processes/restore data.
Theme(s):
Disaster Recovery, General IT, Infrastructure Management
Context:
Disaster Recovery

Diversity Management

Definition:
Understanding the relationship between individual attitudes, behaviors, and employment practices - includes equal employment opportunity to ensure equal access and opportunity to anyone who qualifies and affirmative action reporting and practices to create an inclusive work environment
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Document Management and workflow

Definition:
Defines the set of capabilities to support the creation, use, archiving and deletion of unstructured data. This includes the set of capabilities to support the design, generation and maintenance of electronic or physical forms and templates
Theme(s):
Technology Business Management, Enterprise Architecture, Information Management
Context:
IT Business Function

Email

Definition:
Defines the set of capabilities to support the transmission of communications over a network. Includes instant messaging
Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

End of Support

Definition:

The latest date a manufacturer will provide security patches.  Some manufacturers have an end of mainstream support date and an extended end-of support date.  In these cases, after the end of mainstream support, no additional software feature/function enhancements or fixes are issued but security patches are until the end of extended support.  The recommended best practice is to migrate before end of mainstream support.

Theme(s):
General IT, Enterprise Architecture, Governance
Context:
Policies and Standards

Enterprise Architecture

Definition:
Enterprise Architecture is an established process for describing the current state and defining the target state and transition strategy for an organization's people, processes, and technology.
Theme(s):
Technology Business Management, Enterprise Architecture, Portfolio Management, General IT
Context:
IT Business Function

Enterprise Licenses and Software

Definition:
Enterprise Licenses and Software includes License Management and Software Distribution; it supports the purchase, upgrade and tracking of legal usage contracts for system software and applications and supports the propagation, installation and upgrade of written computer programs, applications and components.
Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

Enterprise Risk Management

Definition:
Enterprise Risk Management (ERM) is the discipline of managing risk throughout an agency. Processes include conducting a risk assessment, identifying root causes of identified risks, prioritizing the risks on an enterprise level, determining which risk treatments best address the root causes, and then monitoring the success of the risk treatments. Treatments can include: Transferring the risk, minimizing the likelihood and/or impact of a negative outcome, and eliminating the activity associated with the risk
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Enterprise Search

Definition:
Enterprise Search includes Query capabilities, Precision / Recall Ranking, Classification and Pattern Matching
Theme(s):
Technology Business Management, Enterprise Architecture, Business Intelligence, Integration and Interoperability
Context:
IT Business Function

Environmental Security

Definition:

Physical protection against damage from fire, flood, wind, earthquake, explosion, civil unrest and other forms of natural and man-made risk.

Theme(s):
Information Security, Enterprise Architecture

Equivalent Access

Definition:

Providing users with disabilities with content and interaction that is similar or identical to that provided to users without disabilities, in a form that produces a similar user experience.  Users should be provided direct access to the same content unless providing direct access to that content is not possible due to technical or legal limitations.

Theme(s):
Accessibility
Topic(s):
Context:
Accessibility

Executive Sponsor

Definition:

The senior executive responsible to the agency and the State CIO/OCIO for the project.

Theme(s):
Portfolio Management, General IT, Program and Project Management
Context:
Project Management, Oversight

Extensible Markup Language

Definition:
A simple, very flexible text format derived from SGML. Originally designed to meet the challenges of large-scale electronic publishing, XML is also playing an increasingly important role in the exchange of a wide variety of data on the Web and elsewhere.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Extranet / VPN Connection

Definition:

Network-level access originating from outside the network. Examples include SSL, IPSec, “terminal service” or Citrix-like connections.

Theme(s):
Information Security, Enterprise Architecture

File Transfer

Definition:
Is the process of copying or moving a file from one computer to another over a network or Internet connection. It enables sharing, transferring or transmitting a file or a logical data object between different users and/or computers both locally and remotely.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

File Transfer Protocol with SSL Security

Definition:
An extension to the FTP protocol that adds Secure Socket Layer (SSL)/Transport Layer Security (TLS)-based mechanisms/capabilities on a standard FTP connection. It mainly enables performing or delivering standard FTP communication on top of an SSL-based security connection. FTPS is also known as FTP Secure.
Theme(s):
Information Security, Enterprise Architecture

Finding

Definition:

A Quality Assurance (QA) provider's assessment of the project's use of project management best practices, as well as their assessment of deficiencies or gaps in the application of those best practices that may have an adverse impact on the project.  Findings are assumed to require corrective actions.

Theme(s):
Portfolio Management, Governance, Program and Project Management
Context:
Project Management, Oversight

Firewall

Definition:

A combination of hardware and software designed to control the types of network connections allowed to a system or combination of systems or that enforces a boundary between 2 or more networks.

Theme(s):
Information Security, Enterprise Architecture

Flexible Work

Definition:
Flexible work is an alternative schedule that allows full-time employees to eliminate at least one work day every two weeks by working longer hours during the remaining days, resulting in less commute trips (compressed workweek), or allows the employees some flexibility in starting and ending times outside the agency's normal work hours (flextime) consistent with WAC 357-28-225
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

General Ledger

Definition:
A ledger containing the accounts in which are recorded, in detail or in summary, all transactions of the state
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

General Ledger Reconciliation

Definition:
The process of correlating one set of records with another set of records and/or a physical inventory count that involves identifying, explaining, and correcting differences
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Governance

Definition:

The processes, groups and activities associated with decision making and the exercising of authority.

Theme(s):
General IT, Governance

Government Accounting

Definition:
The composite activity of analyzing, recording, summarizing, reporting, and interpreting the financial transactions of a governmental entity
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Grant Management

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Graph QL

Definition:
A query language for APIs and a runtime for fulfilling those queries with your existing data. Graph QL provides a complete and understandable description of the data in your API, gives clients the power to ask for exactly what they need and nothing more, makes it easier to evolve APIs over time, and enables powerful developer tools.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Grievance

Definition:
A formal complaint filed by a union on behalf of an employee or group of employees alleging a violation, misapplication or misinterpretation of one or more terms of the parties' collective bargaining agreement.  Note: Collective bargaining agreements vary and a particular agreement may define this term differently
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Guideline

Definition:

A guideline is a compilation of best practice offered in support of a policy or standard.

Theme(s):
Governance, General IT

Help Desk Services

Definition:
Help Desk Services involves the management of a service center to respond to government and contract employees' technical and administrative questions.
Theme(s):
Technology Business Management, Enterprise Architecture, Customer Support
Context:
IT Business Function

Hiring

Definition:
The process of onboarding a new employee into Washington state service
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Human Resources

Definition:
The division of an agency or institution focused on activities relating to employees. Activities include recruiting and hiring new employees, growth and development of current employees, employee benefits, workforce planning, and employee retention
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Identification and Authentication

Definition:
Defines the set of capabilities to support the management of permissions for logging onto a computer, application, service, or network; includes user management and role/privilege management. This includes Identification and Authentication for digital signatures
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Incident Response

Definition:
Defines the set of capabilities to provide active response and remediation to a security incident that has allowed unauthorized access to a government information system
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Independent Project Quality Assurance

Definition:

The work of one or more professionals responsible for monitoring and assessing the health and effectiveness of project management plans and processes as well as an overall assessment of a projects's short and longer term risks.  To preserve independence, the QA provider(s) report outside the project management organizational structure, generally to the project's Executive Sponsor and the State CIO.  In Washington state government, independent Project QA is considered different than product or technical quality assurance which might include testing and other independent verification and validation activities.

Theme(s):
Governance, Portfolio Management, Program and Project Management
Context:
Oversight, Project Management

Information Discovery

Definition:
Information Discovery consists of all activities used to obtain information that is not readily obtainable
Theme(s):
Technology Business Management, Enterprise Architecture, Business Intelligence, Integration and Interoperability
Context:
IT Business Function

Information Exchange and Transformation

Definition:
Information Exchange and Transformation - The tools and systems used to search, link, analyze, share and transport information such as reports or critical mission data. Transformation includes the set of capabilities to support the removal of incorrect or unnecessary characters and data from a data source
Theme(s):
Technology Business Management, Enterprise Architecture, Business Intelligence, Integration and Interoperability
Context:
IT Business Function

Information Mapping / Taxonomy / Categorization

Definition:
Information Mapping/ Taxonomy/ Categorization defines the set of capabilities to support the creation and maintenance of relationships between data entities, naming standards and categorization and allow classification of data and information into specific layers or types to support an organization.
Theme(s):
Technology Business Management, Enterprise Architecture, Information Management, Business Intelligence
Context:
IT Business Function

Information Technology

Definition:

Per RCW 43.105.020, "Information technology" includes, but is not limited to, all electronic technology systems and services, automated information handling, system design and analysis, conversion of data, computer programming, information storage and retrieval, telecommunications, requisite system controls, simulation, electronic commerce, radio technologies, and all related interactions between people and machines.

Theme(s):
Technology Business Management, Governance, Enterprise Architecture, General IT, Information Security

Information Technology (IT) Assets

Definition:

The processes, procedures, systems, IT infrastructure, data, and communication capabilities that allow each agency to manage, store, and share information in pursuit of its business mission, including but not limited to:

  • Applications.
  • All data typically associated with IT systems regardless of source (agency, partner, customer, citizen, etc.). 
  • All data typically associated with IT systems regardless of the medium on which it resides (disc, tape, flash drive, cell phone, personal digital assistant, etc.).
  • End-user authentication systems.
  • Hardware (voice, video, radio transmitters and receivers, mainframes, servers, workstations, personal computers, laptops, and all end point equipment).
  • Software (operating systems, application software, middleware, microcode).
  • IT infrastructure (networks, connections, pathways, servers, wireless endpoints).
  • Services (data processing, telecommunications, office automation, and computerized information systems).
  • Telecommunications hardware, software, and networks.
  • Radio frequencies.
  • Data computing and telecommunications facilities.
  • Intelligent control systems such as video surveillance, HVAC, and physical security.
Theme(s):
General IT, Enterprise Architecture, Information Security, Portfolio Management, Infrastructure Management, Information Management, Technology Business Management, Disaster Recovery

Information Technology (IT) Infrastructure

Definition:

IT infrastructure consists of the equipment, systems, software, and services used in common across an organization, regardless of mission/program/project.  IT Infrastructure also serves as the foundation upon which mission/program/project-specific systems and capabilities are built.  Approaches to provisioning of IT infrastructure vary across organizations, but commonly include capabilities such as Domain Name Server (DNS), Wide Area Network (WAN), and employee locator systems. Additional common capabilities examples include IT security systems, servers, routers, workstations, networked Supervisory Control and Data Acquisition (SCADA) systems, and networked printers (multifunction devices).

Theme(s):
Infrastructure Management, Information Security, Enterprise Architecture, General IT

Information Technology (IT) Risk Assessment

Definition:

Risk assessment is a process by which to determine what IT Assets exist that require protection, and to understand and document potential risks from IT security failures that may cause loss of information confidentiality, integrity, or availability. The purpose of a risk assessment is to help management create appropriate strategies and controls for stewardship of information assets.

Theme(s):
Enterprise Architecture, Information Security
Context:
Information Security

Information Technology System

Definition:
A computer system or set of components for collecting, creating, storing, processing, and distributing/transmitting information, typically including hardware, infrastructure and software, system users, and the information and/or data itself. 
Theme(s):
General IT, Enterprise Architecture, Technology Business Management
Context:
Integration

Integration

Definition:
Technology-centric term primarily concerned with connecting IT systems.
Theme(s):
General IT, Integration and Interoperability
Context:
Integration

Integration Hub

Definition:
A flexible architectural pattern that allows for a reuse and reduction in the number of interfaces, reducing and/or eliminating point-to-point integration.  A hub also allows for centralization of data and functionality.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Integration Layer

Definition:
Provides a level of indirection between the consumer of functionality and its provider. A service consumer interacts with the service provider via the Integration Layer. Hence, each service interface is only exposed via the Integration Layer (e.g., ESB), never directly and point-to-point integration is done at the Integration Layer instead of consumers/requestors doing it themselves. Consumers and providers are decoupled; this decoupling allows integration of disparate systems into new solutions.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Integration Service Catalog

Definition:
A user-facing web interface that provides a list of available APIs and is a repository for: Documentation, Example requests and output, Specifications Interactive tools (test client) Terms of use Contact information
Synonyms:
Developer Portal, Interface Library
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Interface

Definition:
Shared boundary between two functional units, defined by various characteristics pertaining to the functions, physical interconnections, signal exchanges, and other characteristics, as appropriate.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Interface Library

Definition:
A user-facing web interface that provides a list of available APIs and is a repository for: Documentation, Example requests and output, Specifications Interactive tools (test client) Terms of use Contact information
Synonyms:
Integration Service Catalog, Developer Portal
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Internal System or Network

Definition:

An IT system or network designed and intended for use only by state of Washington employees, contractors, and business partners.

Theme(s):
Enterprise Architecture, Information Security, Infrastructure Management, General IT

Interoperability

Definition:
A business-centric term regarding the interconnection of business processes. Imply exchanges between a range of products, or similar products from several different vendors, or even between past and future revisions of the same product. Interoperability may be developed post-facto, as a special measure between two products, while excluding the rest, by using Open standards.
Theme(s):
General IT, Integration and Interoperability, Enterprise Architecture
Context:
Integration

Intrusion Detection Systems

Definition:

Software and/or hardware designed to detect an attack on a network or computer system. A Network IDS (NIDS) is designed to support multiple hosts, whereas a Host IDS (HIDS) is set up to detect illegal actions within the host. Most IDS programs typically use signatures of known cracker attempts to signal an alert. Others look for deviations of the normal routine as indications of an attack.

Theme(s):
Information Security, Enterprise Architecture

Intrusion Prevention Systems

Definition:

Software and/or hardware designed to prevent an attack on a network or computer system. An IPS is a significant step beyond an IDS because it stops the attack from damaging or retrieving data. Whereas an IDS passively monitors traffic by sniffing packets off of a switch port, an IPS resides inline like a firewall, intercepting and forwarding packets. It can thus block attacks in real time.

Theme(s):
Information Security, Enterprise Architecture

Inventory Control

Definition:
Supervision and management of the supply, storage, and accessibility of items held in inventory to ensure an adequate supply of available material without excessive oversupply, back orders or stock outages
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Inventory Management

Definition:

Inventory costs represent a substantial portion of the total cost of ownership for many organizations. Proper inventory management requires an investment of time and resources. Carrying insufficient inventory may have adverse mission impacts or consequences. Carrying too much inventory ties up capital, is usually inefficient, requires extra storage space, and for items with a limited shelf life may lead to costly disposal actions

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Issue Tracking

Definition:

Defines the set of capabilities to receive and track user-reported issues and problems in using IT systems, including help desk calls

Theme(s):
Technology Business Management, Enterprise Architecture, Customer Support
Context:
IT Business Function

IT Expenditures

Definition:

Within the TBM Program, the source financial information used for identifying IT expenditures is from the statewide Agency Financial Reporting System (AFRS) and based on these components:

New IT acquisitions (coded in AFRS as Project Type X)
IT maintenance and operations (coded in AFRS as Project Type Y)
Data processing services (AFRS Sub-Object EL)

NOTE: AFRS Sub-Object EL is defined in the OFM State Administrative and Accounting Manual (SAAM) 75.70.20 as “Charges by state agencies for information technology services. Examples include computing services, hosting services, network services, web services, statewide systems (AFRS, HRMS, etc.), and planning and policy assessment by agencies such as the Department Enterprise Services, the Office of Financial Management, Office of the Chief Information Officer and Consolidated Technology Services.”

Theme(s):
Technology Business Management, Portfolio Management

IT Infrastructure Maintenance

Definition:

IT Infrastructure Maintenance involves the planning, design, and maintenance of an IT Infrastructure to effectively support automated needs (i.e. platforms, networks, servers, printers, etc.).

Theme(s):
Technology Business Management, Enterprise Architecture, Infrastructure Management
Context:
IT Business Function

IT Resource Tower

Definition:

IT Resource Towers (ITRT) are functional IT groupings that can be used to benchmark to industry. They can be split into more granular ITRT Sub-Towers to gain visibility into specific functions within a tower.  They also map up to utilization data in Accelerators, as well as to Applications and Services. The translation of financial information into functional IT towers (ITRTs) involves mapping from Cost Centers, and combining GL, Labor and Asset allocations.

Theme(s):
Technology Business Management

IT Strategy and Innovation

Definition:

IT Strategy and Innovation includes all activities outside of normal Strategic Planning that focus on trying new approaches, new systems and thinking about/ planning IT investments in different ways.

Theme(s):
Technology Business Management, Enterprise Architecture, Portfolio Management
Context:
IT Business Function

IT System Development / Integration Support

Definition:

IT System Development / Integration Support includes the software services enabling elements of distributed business applications to interoperate and the software development necessary to facilitate such integration. These elements can share function, content, and communications across heterogeneous computing environments

Theme(s):
Technology Business Management, Enterprise Architecture, Integration and Interoperability

JavaScript Object Notation

Definition:

A lightweight data-interchange format. It is a language independent text format that is easy for humans to read and write. It is easy for machines to parse and generate.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Job Application

Definition:

A form submitted to a potential employer by a potential employee to collect basic information about the applicant such as employment history, education, training, and contact information

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Job Classification

Definition:

A method of identifying and defining job duties and responsibilities

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Knowledge Capture

Definition:

Defines the set of capabilities to facilitate collection of data and information

Theme(s):
Technology Business Management, Enterprise Architecture, Business Intelligence
Context:
IT Business Function

Knowledge Distribution and Delivery

Definition:

Defines the set of capabilities to support the transfer of knowledge to the end customer.

Theme(s):
Technology Business Management, Enterprise Architecture, Business Intelligence
Context:
IT Business Function

Leveraging

Definition:
Leveraging – to take advantage of existing RF infrastructure, systems, services or equipment, provided there is no impact.

Life Cycle Replacement

Definition:
Life Cycle Replacement is the replacement of a product that is at the end of it service life, or is no longer supported, or no longer meets the business need of the agency.

Major IT Project

Definition:

A project subject to State CIO/OCIO oversight based on risk/severity assessment, a statute or some other factor as determined by the State CIO.

Theme(s):
General IT, Portfolio Management, Program and Project Management
Context:
Oversight, Project Management

Malicious Code

Definition:

Software (such as a Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.

Theme(s):
Information Security, Enterprise Architecture

Malware

Definition:

A general term coined for all forms malicious software including but limited to computer viruses, worms, Trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software.

Theme(s):
Information Security, Enterprise Architecture

Management Accounting

Definition:

The process of preparing management reports and accounts that provide accurate and timely financial and statistical information required by managers to make day-to-day and short-term decisions. Unlike financial accounting, which produces annual reports mainly for external stakeholders, management accounting generates monthly or weekly reports for an organization's internal audiences such as department managers and the chief executive officer. These reports typically show the amount of available cash, sales revenue generated, amount of orders in hand, state of accounts payable and accounts receivable, outstanding debts, raw material and inventory, and may also include trend charts, variance analysis, and other statistics

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Mapping / Geospatial

Definition:

Provide for the representation of mapping and geospatial information through the use of attributes such as zip code, country code, elevation, natural features and other spatial measures

Theme(s):
Technology Business Management, Enterprise Architecture, General IT
Context:
IT Business Function

Meta Data Management

Definition:

Support the maintenance and administration of data that describes data

Theme(s):
Technology Business Management, Enterprise Architecture, Information Management
Context:
IT Business Function

Mobile

Definition:
Mobile is a subscriber that is typically installed in a motor vehicle.

Mobile Device

Definition:

Any hand-portable device capable of text, voice, email, instant messaging (“IM”), photo messaging or other types of data communication. This policy is not meant to apply to: cars, boats, airplanes, laptop computers, desktop computers, unpiloted aerial vehicles (drones), gps receivers, radios

Theme(s):
General IT, Information Security, Infrastructure Management, Enterprise Architecture

Modernization Efforts

Definition:
Modernization Efforts is the upgrading of communications equipment that is obsolete or can no longer meet the business needs.

Modularity

Definition:

Modularity refers to the extent to which a software/Web application may be divided into smaller modules. Software modularity indicates that the number of application modules are capable of serving a specified business domain. Allows typical applications to be divided into modules, as well as integration with similar modules, which helps developers use prewritten code. Modules are divided based on functionality, and programmers are not involved with the functionalities of other modules. Thus, new functionalities may be easily programmed in separate modules. It is a practical application of the principle of "Separation of Concerns" by dividing a complex system into simpler and more manageable modules that will work together Modularization can take place in two ways: The Composition or bottom-up approach takes modules and puts them together to form a larger system The alternative approach is to take a complete system and decompose it into its modules. This approach is known as the decomposition or top-down approach. Modules are technically connected to one another. The measure of inter-module relation is known as coupling. Design goals require modules to have low-coupling and high cohesion. Cohesion is a measure of the inter-relatedness of elements (statements, procedures, declarations) within a module. A module is said to have high cohesion if all the elements in the module are strongly connected with one another. Tight coupling of modules makes analysis, understanding, modification and testing of modules difficult. Reuse of modules is also hindered. Modularity enhances the understandability of software systems and change process. Developers need not have to understand the entire system for changes to be made as details are localized into components; modularity separates concerns down to the modules and is thus a direct realization of the principle of "Separation of Concerns"

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Multi-factor Authentication

Definition:

A security system or mechanism in which more than one form of authentication is implemented to verify the legitimacy of a transaction. In contrast, single factor authentication involves only a UserID/password. 

In 2-factor authentication, the user provides dual means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. 

Additional authentication methods that can be used in MFA include biometric verification such as keyboard cadence, finger scanning, iris recognition, facial recognition and voice ID. In addition to these methods, device identification software, smart cards, and other electronic devices can be used along with the traditional UserID and password.

Theme(s):
Information Security, Enterprise Architecture

Network Device

Definition:

A device available to other computers on a network. Examples include servers, firewalls, routers, switches, workstations, networked Supervisory Control and Data Acquisition (SCADA) systems, and networked printers (multifunction devices).

Theme(s):
Infrastructure Management, Information Security, Enterprise Architecture

Open API

Definition:

An open source specification to define a standard, language-agnostic interface to REST APIs which allows both humans and computers to discover and understand the capabilities of the service without access to source code, documentation, or through network traffic inspection. When properly defined, a consumer can understand and interact with the remote service with a minimal amount of implementation logic.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Payroll

Definition:

The administration of employee compensation and benefits on a scheduled basis through a centralized payment system

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Penetration Test

Definition:

A deliberate probe of a network or system to discover security weaknesses. The test attempts to leverage identified weaknesses to penetrate into the organization. The test exploits the vulnerabilities uncovered during a vulnerability assessment to avoid false positives often reported by automated assessment tools.

Theme(s):
Enterprise Architecture, Information Security

Performance Audit

Definition:

A systematic process of objectively obtaining and evaluating evidence regarding the performance of an organization, program, function, or activity. Evaluation is made in terms of its economy and efficiency of operations and effectiveness in achieving desired goals. The performance audit function provides an independent review of management's performance and the degree to which actual performance meets pre-stated goals

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Performance Budgeting

Definition:

The act of considering and making funding choices based on desired outcomes. Performance budgeting focuses on the results to be gained through investment decisions.

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Physical Security

Definition:

Physical security describes measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media in an IT facility.

Theme(s):
Information Security, Enterprise Architecture

Planning

Definition:

Analysis and evaluation of the ways in which material requirements can be met using a life cycle management approach

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Policy

Definition:

A technology policy outlines what needs to be accomplished or achieved and the roles and responsibilities of the various entities.

Theme(s):
General IT, Governance

Portable

Definition:
Portable is a subscriber that is typically used as a handheld device.

Portfolio Management

Definition:

Defines the set of capabilities to support the administration of a group of investments held by an organization

Theme(s):
Technology Business Management, Enterprise Architecture, Portfolio Management, General IT
Context:
IT Business Function

Practicable

Definition:
Practicable - to be done successfully without complications.

Process Tracking

Definition:

Defines the set of capabilities to manage business processes, including business process mapping, remapping, reengineering, and business process improvement efforts

Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

Procurement

Definition:

The process of obtaining or buying goods and services consistent with RCW 39.26 with the intent to Purchase. Purchasing, renting, leasing, or otherwise acquiring any supplies or services; includes all functions that pertain to the acquisition, including description of requirements, selection, and solicitation of sources, preparation and award of contract, and all phases of contract administration. The combined functions of purchasing, inventory control, traffic and transportation, receiving, inspection, storekeeping, salvage, and disposal operations

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Procurement Activities

Definition:
Procurement Activities are the processes to purchase/acquire RF System components to include infrastructure, subscribers, accessories, hardware and or services to support operations.

Program / Project Management

Definition:

Defines the set of capabilities to manage and control a particular effort of an organization. This includes intra-agency work.

Theme(s):
Technology Business Management, Enterprise Architecture, Portfolio Management
Context:
IT Business Function

Project 25

Definition:
Project 25 (P25) is a suite of standards for digital mobile radio communications designed for use by public safety organizations in North America. P25 radios are a direct replacement for analog UHF (example FM) radios but add the ability to transfer data as well as voice.

Purchasing

Definition:

The acquisition of goods or services, including the leasing or renting of goods

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Quality Assurance Plan

Definition:

A document that describes how the QA Practitioner will deliver its service.

Theme(s):
Portfolio Management, Program and Project Management
Context:
Oversight, Project Management

Quality Assurance Solicitation

Definition:

A Request for Proposal, a Request for Quote and Qualification, an interagency agreement proposal or an agency recruitment or any other effort that is intended to result in the acquisition or hire of a QA resource.

Theme(s):
Portfolio Management, Program and Project Management
Context:
Oversight, Project Management

Radio Frequency [RF]

Definition:
A frequency or band of frequencies in the range suitable for use in telecommunications.

Recommendation

Definition:

The QA Practitioners suggested course of action to address a negative finding.

Theme(s):
Portfolio Management
Context:
Oversight, Project Management

Recovery Point Objective

Definition:

The point in time, prior to a disruption or outage, to which essential data can be recovered after an outage.  This defines the maximum level of data loss that is acceptable in the event of an outage or incident.

Theme(s):
Disaster Recovery
Topic(s):
Context:
Disaster Recovery

Recovery Time Objective

Definition:

The period of time following an event within which a service or activity must be resumed or a technology resource recovered.

Theme(s):
Disaster Recovery
Topic(s):
Context:
Disaster Recovery

Recruitment

Definition:

The process of finding and hiring the best-qualified candidate (from within or outside of an organization) for a job opening in a timely and cost effective manner. The recruitment process includes analyzing the requirements of a job, attracting employees to that job, screening and selecting applicants, hiring, and integrating the new employee to the organization - recruitment measures include tracking time to hire/fill, candidate quality, and applicant satisfaction

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Repeater

Definition:
Repeater is the RF communications equipment rebroadcasts a received signal to extend line of site communications.

Representational State Transfer API

Definition:

A distributed system framework that uses Web protocols and technology. The REST architecture involves client and server interactions build around the transfer of resources. Systems that conform to REST principles are referred to as RESTful.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Resilient

Definition:

The capability of remaining or returning to a normal situation after an event by having multiple ways of performing a function.  This may include people, processes or technology.  Generally speaking, this means there would be no single point of failure that could stop a process.

Theme(s):
Disaster Recovery, Enterprise Architecture, Infrastructure Management
Context:
Disaster Recovery

Retirement

Definition:

Separation of an employee who meets the age and service requirements to receive retirement benefits and has filed an application for retirement with the Department of Retirement Systems - includes tracking and/or managing an employee's retirement eligibility status throughout the life cycle of an employee's career

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

RF Communications

Definition:
Radio Frequency (RF) Communications is the use of electromagnetic radiation spectrum or radio waves, with the use of transmitter, receivers, and antennas for voice communications.

RF Communications Assets

Definition:
Radio Frequency (RF) Communications Assets are the support equipment that can be shared without impacting the business need or security of an agency.

RF Communications Building

Definition:
Radio Frequency (RF) Communications Building is the building or location used for the RF communications, RF Equipment, Infrastructure or other RF Communications assets that support RF Communications.

RF Communications Site

Definition:
Radio Frequency (RF) Communications Site is the location of RF communications towers, buildings, RF infrastructure and equipment use to provide RF Communications.

RF Communications Technology

Definition:
Radio Frequency (RF) Communications Technology is the devices and or systems designed to operate in the radio frequency (RF) spectrum, transmits and/or receives a radio wave, which includes but is not limited to, mobile/wireless phones, broadcast radio/television, Wi-Fi, microwave, blue-tooth and two-way radios systems and equipment.

RF Communications Tower

Definition:
Radio Frequency (RF) Communications Tower is the antenna support structure to support RF equipment or infrastructure.

RF Equipment

Definition:
Radio Frequency (RF) Equipment includes transmitters, receivers, base stations, and repeaters used for RF Communications.

RF Infrastructure

Definition:
Radio Frequency (RF) Infrastructure is the support equipment needed to provide RF Communications.

RF Services

Definition:
Radio Frequency (RF) Services are the activities provided or performed by owner/operator, vendor, consultant to support RF systems, involving installation, removal, maintenance, repair, tuning, programming, licensing, administration, and operations supporting the task, activities, and or mission of the owner/operator, and other approved users.

RF Systems

Definition:
Radio Frequency (RF) Systems is the system that emits and or receives radio waves of varying wavelengths between approximately one meter and one millimeter used for radio, radar, and microwave communications to convey/transport/interpret audio, video, and data information.

Routine Maintenance

Definition:
Routine Maintenance is the normal maintenance of RF Equipment, Infrastructure, Assets, Buildings, Towers, Systems, Trunked Radio Systems, or Subscribers that has been established by the equipment manufacture or agency to ensure availability of RF communications during day-to-day operations as well as an emergency.

Scheduling

Definition:

The days and hours an employee is scheduled to work

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Secure File Transfer Protocol (SFTP) (FTP over SSH)

Definition:

A secure version of File Transfer Protocol (FTP), which facilitates data access and data transfer over a Secure Shell (SSH) data stream. It is part of the SSH Protocol. This term is also known as SSH File Transfer Protocol.

Theme(s):
Information Security, Integration and Interoperability, Enterprise Architecture
Context:
Integration

Secure Segmentation

Definition:

Secure segmentation is defined as implementing methods that allow for secure communication between various levels of segmented environments. These environments typically involve 4 basic segment groups:

  1. Outside (Trust no one)
  2. Services (Trust limited to defined segmentation lines)
  3. Internal (Trust limited to defined group)
  4. External users (Trust limited to defined group)

The methods for securing these segments may include but are not limited to firewall and switch/router configurations and router/switch ACLs.

Theme(s):
Information Security, Enterprise Architecture

Security Controls

Definition:

The security requirements and methods applied by agencies to manage IT security risk including but not limited those defined in the OCIO IT security standards.

Theme(s):
Information Security, Enterprise Architecture

Security Domain

Definition:

An environment or context that is defined by security policy, a security model, or security architecture to include a set of system resources and the set of system entities that have the right to access the resources.

Theme(s):
Information Security, Enterprise Architecture

Security Requirements

Definition:
Security Requirements at a minimum: technical, electronic, physical, and administrative processes to prevent cyber, physical, and or unauthorized access to RF systems infrastructure, frequency, and operations.

Separation / Termination

Definition:

The voluntary or involuntary act of leaving Washington State service

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Service Consumer (Consumer)

Definition:

A requestor that consumes or uses an automated IT Service provided by a Service Provider. Entities (systems, people, and organizations) that needs to make use of services offered by providers.

Synonyms:
Consumer
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Service Disruption

Definition:

An unplanned event that causes an information system to be inoperable for a period of time.

Theme(s):
Customer Support, Disaster Recovery
Context:
Disaster Recovery

Service Metadata

Definition:

Computer application readable description of capabilities, requirements, general characteristics, abstract message operations, concrete network protocols, endpoint addresses, and structure and content of messages received by and sent by the service.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Service Orchestration

Definition:

The coordination and arrangement of multiple services exposed as a single aggregate service. Developers utilize service orchestration to support the automation of business processes by loosely coupling services across different applications and enterprises and creating "second-generation," composite applications. In other words, service orchestration is the combination of service interactions to create higher-level business services.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Service Oriented Architecture

Definition:

Style of software design where services are provided to the other components by application components, through a communication protocol over a network. The basic principles of service-oriented architecture are independent of vendors, products and technologies. A service is a discrete unit of functionality that can be accessed remotely and acted upon and updated independently, such as retrieving a credit card statement online. According to TOGAF, under the terms of an SOA, a service has four properties: It logically represents a business activity with a specified outcome. It is self-contained. It is a black box for its consumers. It may consist of other underlying services.

Theme(s):
Enterprise Architecture, Integration and Interoperability
Context:
Integration

Service Providers (Provider)

Definition:

Entities (systems, people, and organizations) that offer capabilities and act as service providers. An authoritative/trusted organization that offers an automated IT Service to a Service Consumer by means of one of its Provided Service Interfaces.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Service Reusability

Definition:

A service-oriented architecture design principle for creating services that can be used for business purposes beyond those initially specified in requirements. Reusable services are designed so their solution logic is independent of any particular business process or technology.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Significant

Definition:
Significant – Any RF Communication purchase that requires an appropriation request, or will impact interoperability, or impact an outside agency, or is not considered routine maintenance, or purchases exceed policy defined limits.

Simple Object Access Protocol API

Definition:

A protocol for implementing Web Services. SOAP features guidelines that allow communication via the Internet between two programs, even if they run on different platforms, use different technologies and are written in different programming languages.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

SMART Objectives

Definition:

SMART is a mnemonic for Specific, Measurable, Achievable, Relevant and Time bound.  These characteristics are helpful to remember when identifying project objectives.

Theme(s):
Governance, Portfolio Management
Context:
Oversight, Project Management

SOA Backplane

Definition:

Shared, common infrastructure for lifecycle management such as a services registry, policies, business analytics; routing/addressing, quality of service, communication; Development Tools for security, management, and adapters.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

SOA-based Services

Definition:

Modular, swappable functions, separate from, yet connected to an application via well-defined interfaces to provide agility. Often referred to as 'services' they: Perform granular business functions such as "get customer address" or larger ones such as 'process payment.' Are loosely coupled to a new or existing application. Have capability to perform the steps, tasks and activities of one or more business processes. Can be combined to perform a set of functions - referred to as 'orchestration.'

Theme(s):
Enterprise Architecture, Integration and Interoperability
Context:
Integration

Standard

Definition:

A standard provides more details about how a policy or portions of policy will be implemented.

Theme(s):
General IT, Governance

Start of a Project

Definition:

For the purposes of project investment, approval, oversight and quality assurance, the start of the project is at the beginning of planning.

Theme(s):
Portfolio Management, Program and Project Management
Context:
Oversight, Project Management

Strategic Workforce Planning

Definition:

Strategic workforce planning looks at system-wide issues and strategies to: Support the organization's strategic plan (e.g., reorganization and redeployment) Address external workforce factors that affect the entire business (e.g., succession planning for retirement bubbles, or staff reduction planning for budget cuts). Maintain organizational capacity (e.g., in-service training) Mitigate risk exposure (e.g., safety planning and Equal Employment Opportunity training)

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Subscriber

Definition:
Subscriber is the RF communications equipment that is utilized by the end user to access a Two-way Radio or Trunked Radio System.

Substantially Enhanced

Definition:
Substantially Enhanced is the system whose equipment and or software has been replaced or upgraded with later generation or versions, and whose operations have been changed with advanced features not included in the original system specifications.

Substantially Modified

Definition:
Substantially Modified is the system whose equipment and or software has been replaced or upgraded with later generation or versions, but whose operations has not been changed from its original operating specifications.

Succession Planning

Definition:

The specific staffing strategies designed to develop an internal pool for anticipated vacancies

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Sunset Review

Definition:

A mandatory periodic review of a technical policy and standard that:

  • Determines the continued need for the policy or standard, and
  • Evaluates the full content of the policy or standard for accuracy, clarity and completeness.

Sunset reviews may occur ahead of the published sunset review date if needed.  

Theme(s):
Governance

Supporting Organization(s) Processes

Definition:

For the purpose of go live readiness, supporting organizations include the agency(s) and any vendor(s) who are involved in operations and support of the ongoing system/investment. Processes include any unique to the time immediately after go-live as well as those on-going processes required to effectively operate and maintain the system/investment once it is implemented into production.

Theme(s):
Program and Project Management, Enterprise Architecture, Portfolio Management
Context:
Go Live Readiness

System and Network Monitoring

Definition:

System and Network Monitoring supports all activities related to the realtime monitoring of systems and networks for optimal performance.

Theme(s):
Technology Business Management, Enterprise Architecture, Infrastructure Management
Context:
IT Business Function

System Resource Usage

Definition:

Support the balance and allocation of memory, usage, disk space and performance on computers and their applications.

Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

Tactical Repeater

Definition:
Tactical Repeater is a repeater that is use for tactical and sometime secured communications.

TBM Project

Definition:

This term, as used in TBM policy and accompanying standards is defined per our current TBM product. A ‘project’ is a discrete area within the product in which datasets, models, metrics and reports reside; these are configured according to specific business rules defined by the project administrator. Agency-specific projects allow for greater reporting accuracy than the multi-agency project, which allows less granularity and customization of business rules.

Theme(s):
Technology Business Management
Context:
Technology Business Management

Technology Business Management

Definition:

A set of best practices for running IT like a business - and more importantly for effectively and consistently (using a data-driven agreed upon framework) communicating not just the cost of IT, but also attributing that cost to business services. Key to TBM is the ability of IT and business leaders to have data-driven discussions about cost and value of IT to best support business goals.

Theme(s):
Technology Business Management, Portfolio Management

Telework

Definition:

Telework is the practice of working from home or other alternative locations closer to home through the use of technology which allows the employee to access normal work material (email, telephone, electronic documents, etc.). Telework may be scheduled or done on an ad hoc basis.

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Threat and Vulnerability Management

Definition:

Threat and Vulnerability Management involves all functions pertaining to the protection of federal information and information systems from unauthorized access, use, disclosure, disruptions, modification, or destruction, as well as the creation and implementation of security policies, procedures and controls. It includes all risk and controls tracking for IT systems.

Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Time and Attendance

Definition:

The process of submitting, approving, and adjusting an employee's work hours and planned/unplanned leave hours

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Training/Development

Definition:

Training is activities designed to develop employees' job-related knowledge and skills for present job assignments as well as future career development goals.  The enterprise level administrative function is the maintenance of training records for state employees.

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Travel Management

Definition:

Activities associated with planning, preparing, and monitoring of business related travel for an organization's employees

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Trunked Radio System

Definition:
Trunked Radio System -is the RF system that uses multiple sites or locations with 3 or more radio channels to allow multiple talk groups to communicate over a large area independently.

Trusted Agency, System or Network

Definition:

An IT system or network that is recognized automatically as reliable, truthful, and accurate without continual validation or testing.

Theme(s):
Information Security, Enterprise Architecture

Two-way Radio

Definition:
Two-way Radio is a device that can transmit and receive.

Undue Burden

Definition:

Undue burden means significant and unreasonable difficulty or expense. In determining whether an action would result in an undue burden, an agency shall consider all agency resources available to the program or component for which the covered technology is being developed, procured, maintained, or used.

Theme(s):
Accessibility
Context:
Accessibility

Untrusted

Definition:

Characterized by absence of trusted status. Assumed to be unreliable, untruthful, and inaccurate unless proven otherwise.

Theme(s):
Information Security, Enterprise Architecture

Vendor Management

Definition:

The management of an entity selling a good or service to the State.  Vendors include, but are not limited to, retail businesses, consultants, contractors, manufacturers, credit card companies.  A vendor may be an individual, corporation, non-profit organization, federal government, or federal agency, local government or local agency, another state or another state agency, a Washington state agency, or Indian nation.  For travel reimbursement purposes, a vendor may include an employee, a board member, or volunteer

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Voice Communications

Definition:

Defines the set of capabilities to provide telephony or other voice communications

Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

Vulnerability

Definition:

Relates to risk of attack. In IT terms, vulnerability describes points of risk to penetration of security barriers. Awareness of potential vulnerability is very important to designing ever more effective defenses against attack by unauthorized parties.

Theme(s):
Information Security, Enterprise Architecture

Vulnerability Assessment

Definition:

A comprehensive analysis that attempts to define, identify, and classify the security holes (vulnerabilities) in a system, network, or communications infrastructure within the assessment scope.

Theme(s):
Information Security, Enterprise Architecture

Web Infrastructure

Definition:

Web Infrastructure includes equipment/services to support delivery of services over the Internet or similar networks. These include supporting: Network Services which consists of protocols defining the format and structure of data and information either accessed from a directory or exchanged through communications; Service Transport which consists of protocols defining the format and structure of data and information either accessed from a directory or exchanged through communications.

Theme(s):
Technology Business Management, Enterprise Architecture, Infrastructure Management
Context:
IT Business Function

Web Service

Definition:

A software service used to communication between two devices on a network. More specifically, a Web service is a software application with a standardized way of providing interoperability between disparate applications. It does so over HTTP using technologies such as XML, SOAP, WSDL, and UDDI.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Web Services Description Language

Definition:

An XML format for describing network services as a set of endpoints operating on messages containing either document-oriented or procedure-oriented information. The operations and messages are described abstractly, and then bound to a concrete network protocol and message format to define an endpoint.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Web Services Federation Language

Definition:

An OASIS specification that defines mechanisms to allow different security realms to federate, such that authorized access to resources managed in one realm can be provided to security principles whose identities and attributes are managed in other realms. This includes mechanisms for brokering of identity, attribute, authentication and authorization assertions between realms, and privacy of federated claims.

Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Web Services Security

Definition:

An OASIS specification that proposes a standard set of SOAP extensions that can be used when building secure Web services to implement message content integrity and confidentiality.

Theme(s):
Enterprise Architecture, Information Security, Integration and Interoperability
Context:
Integration

Wellness and Safety Information

Definition:

Ensuring the safety and health of employees within the workplace

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Workgroup

Definition:

An ad hoc or standing group of subject matter experts who support the development and maintenance of policies, standards and/or guidelines.

Theme(s):
Governance