The days and hours an employee is scheduled to work
A secure version of File Transfer Protocol (FTP), which facilitates data access and data transfer over a Secure Shell (SSH) data stream. It is part of the SSH Protocol. This term is also known as SSH File Transfer Protocol.
Secure segmentation is defined as implementing methods that allow for secure communication between various levels of segmented environments. These environments typically involve 4 basic segment groups:
The methods for securing these segments may include but are not limited to firewall and switch/router configurations and router/switch ACLs.
The security requirements and methods applied by agencies to manage IT security risk including but not limited those defined in the OCIO IT security standards.
An environment or context that is defined by security policy, a security model, or security architecture to include a set of system resources and the set of system entities that have the right to access the resources.
The voluntary or involuntary act of leaving Washington State service
A requestor that consumes or uses an automated IT Service provided by a Service Provider. Entities (systems, people, and organizations) that needs to make use of services offered by providers.
An unplanned event that causes an information system to be inoperable for a period of time.
Computer application readable description of capabilities, requirements, general characteristics, abstract message operations, concrete network protocols, endpoint addresses, and structure and content of messages received by and sent by the service.
The coordination and arrangement of multiple services exposed as a single aggregate service. Developers utilize service orchestration to support the automation of business processes by loosely coupling services across different applications and enterprises and creating "second-generation," composite applications. In other words, service orchestration is the combination of service interactions to create higher-level business services.
Style of software design where services are provided to the other components by application components, through a communication protocol over a network. The basic principles of service-oriented architecture are independent of vendors, products and technologies. A service is a discrete unit of functionality that can be accessed remotely and acted upon and updated independently, such as retrieving a credit card statement online. According to TOGAF, under the terms of an SOA, a service has four properties: It logically represents a business activity with a specified outcome. It is self-contained. It is a black box for its consumers. It may consist of other underlying services.
Entities (systems, people, and organizations) that offer capabilities and act as service providers. An authoritative/trusted organization that offers an automated IT Service to a Service Consumer by means of one of its Provided Service Interfaces.
A service-oriented architecture design principle for creating services that can be used for business purposes beyond those initially specified in requirements. Reusable services are designed so their solution logic is independent of any particular business process or technology.
A protocol for implementing Web Services. SOAP features guidelines that allow communication via the Internet between two programs, even if they run on different platforms, use different technologies and are written in different programming languages.
SMART is a mnemonic for Specific, Measurable, Achievable, Relevant and Time bound. These characteristics are helpful to remember when identifying project objectives.
Shared, common infrastructure for lifecycle management such as a services registry, policies, business analytics; routing/addressing, quality of service, communication; Development Tools for security, management, and adapters.
Modular, swappable functions, separate from, yet connected to an application via well-defined interfaces to provide agility. Often referred to as 'services' they: Perform granular business functions such as "get customer address" or larger ones such as 'process payment.' Are loosely coupled to a new or existing application. Have capability to perform the steps, tasks and activities of one or more business processes. Can be combined to perform a set of functions - referred to as 'orchestration.'
A standard provides more details about how a policy or portions of policy will be implemented.
For the purposes of project investment, approval, oversight and quality assurance, the start of the project is at the beginning of planning.
Strategic workforce planning looks at system-wide issues and strategies to: Support the organization's strategic plan (e.g., reorganization and redeployment) Address external workforce factors that affect the entire business (e.g., succession planning for retirement bubbles, or staff reduction planning for budget cuts). Maintain organizational capacity (e.g., in-service training) Mitigate risk exposure (e.g., safety planning and Equal Employment Opportunity training)
The specific staffing strategies designed to develop an internal pool for anticipated vacancies
A mandatory periodic review of a technical policy and standard that:
Sunset reviews may occur ahead of the published sunset review date if needed. Policies and standards do not expire when a sunset review date is reached.
For the purpose of go live readiness, supporting organizations include the agency(s) and any vendor(s) who are involved in operations and support of the ongoing system/investment. Processes include any unique to the time immediately after go-live as well as those on-going processes required to effectively operate and maintain the system/investment once it is implemented into production.
System and Network Monitoring supports all activities related to the realtime monitoring of systems and networks for optimal performance.
Support the balance and allocation of memory, usage, disk space and performance on computers and their applications.