COV ITRM Glossary)

Total Page:16

File Type:pdf, Size:1020Kb

COV ITRM Glossary) Commonwealth of Virginia Information Technology Resource Management Glossary (COV ITRM Glossary) Version 1.0, January 15, 2010 Virginia Information Technologies Agency COV ITRM Glossary January 15, 2010 v 1.0 ii COV ITRM Glossary January 15, 2010 v 1.0 Table of Contents COV ITRM Glossary Updating..................................................................................................... iv Introduction..................................................................................................................................... 1 Non-alpha........................................................................................................................................ 2 A...................................................................................................................................................... 3 B.................................................................................................................................................... 10 C.................................................................................................................................................... 15 D.................................................................................................................................................... 25 E.................................................................................................................................................... 30 F .................................................................................................................................................... 35 G.................................................................................................................................................... 39 H.................................................................................................................................................... 41 I ..................................................................................................................................................... 44 J..................................................................................................................................................... 53 K.................................................................................................................................................... 54 L.................................................................................................................................................... 55 M................................................................................................................................................... 58 N.................................................................................................................................................... 62 O.................................................................................................................................................... 64 P .................................................................................................................................................... 67 Q.................................................................................................................................................... 77 R.................................................................................................................................................... 78 S .................................................................................................................................................... 83 T.................................................................................................................................................... 93 U.................................................................................................................................................... 97 V.................................................................................................................................................... 99 W................................................................................................................................................. 102 X.................................................................................................................................................. 105 Y.................................................................................................................................................. 106 Z.................................................................................................................................................. 107 iii COV ITRM Glossary January 15, 2010 v 1.0 COV ITRM Glossary Updating Publication Version Control Questions related to this publication should be directed to the Director of the VITA Policy, Practice, and Architecture (PPA) Division. PPA will issue a change notice for new versions of this document, post releases on the VITA Web site, and provide an email announcement to the Agency Information Technology Resources (AITRs) at all state agencies and institutions of higher education and to other interested parties. Document Version History Enterprise Information Architecture Report: Version History Version Date Description 1.0 1-15-2010 COV ITRM Enterprise Architecture, Security and Technology Management document glossaries where combined and updated to create the initial version of this document iv COV ITRM Glossary January 15, 2010 v 1.0 Introduction This glossary supports the content of COV ITRM documents. The intent is to replace individual glossaries in existing COV ITRM documents with a single comprehensive ITRM glossary that shall be referenced by those documents. Much of the information within this document was liberally borrowed from a number of highly recommended Internet sources including: • FOLDOC, the Free On-line Dictionary of Computing at http://foldoc.doc.ic.ac.uk/foldoc/ • The Internet Engineering Taskforce at http://www.ietf.org/home.html • Loosely Coupled Glossary at http://looselycoupled.com/glossary/azindex.html • Matisse Enzer’s Internet Terms Glossary at http://www.matisse.net/files/glossary.html • Network Computing, CMP Media LLC at http://www.networkcomputing.com/ • North Carolina Statewide Technical Architecture Lexicon at Whatis.com at http://whatis.techtarget.com • The Open Group at http://www.opengroup.org/ • O’Reilly’s at http://www.oreilly.com/reference/dictionary/tsearch.cgi • Wikipedia, the free encyclopedia at http://en.wikipedia.org/wiki/Main_Page • http://www.ncsta.gov/docs/Lexicon/Lexicon%20-%20Terms%20and%20Phrases.pdf • The World Wide Web Consortium at http://www.w3.org/ Context: Several glossary entries have more than one meaning. “Authorization” means something from a Security perspective that is very different from what it means from a Project Management/Technology Management perspective. This document identifies the context of the entry when there are different meanings depending on ITRM perspective. The different ITRM perspectives are documented as follows: “Context: ITRM perspective).” Example: Authorization Context: Security). The process of granting access to data or information system by designated authority after proper identification and authentication. Context: Technology Management). The power granted by management to specified individuals allowing them to approve transactions, procedures, or total systems. Page 1 of 111 COV ITRM Glossary January 15, 2010 v 1.0 Non-alpha 10GigE 10 Gigabit Ethernet Service 3GPP LTE (Long Term Evolution) The name given to a project within the Third Generation Partnership Project to improve the UMTS mobile phone standard to cope with future technology evolutions. Goals include improving spectral efficiency, lowering costs, improving services, making use of new spectrum and reframed spectrum opportunities, and improving integration with other open standards. The LTE project is not a standard, but it will result in the new evolved Release 8 of the 3GPP specifications, including mostly or wholly extensions and modifications of the UMTS system. The architecture that will result from this work is called EPS (Evolved Packet System) and comprises E-UTRAN (Evolved UTRAN) on the access side and EPC (Evolved Packet Core) on the core side. 8-, 16-, 32-, and 64-Bit Architectures A CPU is designed to carry out instructions on data that is in memory. The way it does this is significantly different for 8 bit and 64 bit architectures. The greater the number of bits, the more options there are that must be considered for how instructions are handled. Options include the complexity of the instruction set, the width of the data path, the number of registers, and the number of instructions that may execute per clock cycle. A program written for a 64-bit architecture may not be as fast as one written for a 32-bit architecture, but it may provide other advantages. 802.11a card Wireless interface that provides up to 54 Mbps service using an Orthogonal Frequency Division Multiplexing (OFDM) modulation technique for signal transmission in the 5.5 GHz spectrum. 802.11b card Wireless interface that provides up to 11 Mbps service using Frequency Hopping Spread Spectrum (FHSS) modulation technique for signal transmission in the 2.4 GHz spectrum; also called Wi-Fi. Interference from cordless phones and microwave ovens may be a problem. 802.11g card Wireless interface that provides up to 54 Mbps service using an Orthogonal Frequency Division Multiplexing (OFDM) modulation technique
Recommended publications
  • Access to Locked Functions
    (19) TZZ 45__¥9AT (11) EP 2 451 139 A9 (12) CORRECTED EUROPEAN PATENT APPLICATION (15) Correction information: (51) Int Cl.: Corrected version no 1 (W1 A1) H04M 1/67 (2006.01) Corrections, see Description Paragraph(s) 16, 20, 22, 31 (48) Corrigendum issued on: 13.02.2013 Bulletin 2013/07 (43) Date of publication: 09.05.2012 Bulletin 2012/19 (21) Application number: 10189894.8 (22) Date of filing: 03.11.2010 (84) Designated Contracting States: (72) Inventor: Hymel, James Allen AL AT BE BG CH CY CZ DE DK EE ES FI FR GB Waterloo Ontario N2L 5Z5 (CA) GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR (74) Representative: Roberts, Gwilym Vaughan et al Designated Extension States: Kilburn & Strode LLP BA ME 20 Red Lion Street London WC1R 4PJ (GB) (71) Applicant: Research In Motion Limited Waterloo, ON N2L 3W8 (CA) Remarks: Amended claims in accordance with Rule 137(2) EPC. (54) Access to locked functions (57) A mobile communications device can have a locked mode in which the mobile communications device is protected against unauthorized use. A mobile commu- nications device includes device applications implement- ed by a software program or firmware program that en- ables an application to be temporarily operable or oper- able under certain conditions when the mobile commu- nications device is locked. Device applications can in- clude a camera enabled for image data acquisition and a microphone or an audio recorder or a microphone and an audio recorder enabled for audio data acquisition.
    [Show full text]
  • Enterprise Architecture
    www.aeajournal.org Journal of Enterprise Architecture November 2011, Volume 7, Number 4 FEATURES Editor’s Corner: John Gøtze Architect in the Spotlight: Robert Weisman ARTICLES Enterprise Architecture – Critical to Large Transformation Programs Suyog Mahendra Shah The Successful Enterprise Architecture Effort Mikkel Stokbro Holst and Tue Westmark Steensen Getting More out of Government Enterprise Architecture Wai Chung A Survey of Approaches to Virtual Enterprise Architecture: Modeling Languages, Reference Models, and Architecture Frameworks Amit Goel, Sumit Kumar Jha, Ivan Garibay, Heinz Schmidt, and David Gilbert Conceptual Outline for Rapid IT Application Information Discovery Michael Linke Rational Systems Design for Health Information Systems in Low-income Countries: An Enterprise Architecture Approach Henry Mwanyika, David Lubinski, Richard Anderson, Kelley Chester, Mohamed Makame, Matt Steele, and Don de Savigny CASE STUDY An Enterprise Architecture for Banking (in English and Spanish) Sonia González Journal of Enterprise Architecture Chief Editor: John Gøtze, PhD, IT University of Copenhagen Associate Editors Andy Blumenthal James Lapalme, PhD CTO, Bureau of Alcohol, Tobacco, Firearms and Explosives Enterprise Architecture Consultant and Researcher Tyson Brooks, PMP Haiping Luo, PhD School of Information Studies, Syracuse University International Trade Administration, US Dept. of Commerce Dick Burk Stephen Marley, PhD Enterprise Architect Harris Corporation Brian Cameron Thomas J. Mowbray, PhD Professor & Executive Director, Center
    [Show full text]
  • Business Reference Model of the Local Self-Government That Uses Process Management
    Business reference model of the local self-government that uses process management Markéta Zimmermannová Department of Information Technologies, Faculty of Informatics and Statistics, University of Economics, Prague, Czech Republic [email protected] Abstract. The objective of this paper is a brief introduction in the doctoral thesis of the author. The content of the thesis is the design of the structure for efficient management of the public administration. The author explores the options, how to combine the Enterprise Architecture elements with the business process management methodology MMABP. The output is the design of the optimal structure of the public administration office at the business level – Business reference model. Keywords: enterprise architecture, business process model, business reference model, public administration. 1 Introduction The subject of the doctoral thesis regards the Business process management and the Enterprise Architecture and the options of their application in the local self-government in the Czech Republic. In comparison with the private sector, the local self-government (and public administration in general) has a much broader set of competences. This also generates much complicated requirements on the process, functional, organizational and technological structure of the local self-government bodies. Implementation of such a structure can however be simplified by a certain form of business process standardization and by using of the Enterprise Architecture elements. The doctoral thesis therefore explores and proposes the options for usage of the process management (represented by MMABP methodology) based on the broader exploration of the very basis that the local self-government stands on and its combination with the Enterprise Architecture.
    [Show full text]
  • A Survey of Mobile Data Networks
    A SURVEY OF MOBILE DATA NETWORKS APOSTOLIS K. SALKINTZIS THE UNIVERSITY OF BRITISH COLUMBIA ABSTRACT The proliferation and development of cellular voice systems over the past several years has exposed the capabilities and the effectiveness of wireless communications and, thus, has paved the way for wide-area wireless data applications as well. The demand for such applications is currently experiencing a significant increase and, therefore, there is a strong call for advanced and efficient mobile data technologies. This article deals with these mobile data technologies and aims to exhibit their potential. It provides a thorough survey of the most important mobile packet data services and technologies, including MOBITEX, CDPD, ARDIS, and the emerging GPRS. For each technology, the article outlines its main technical characteristics, discusses its architectural aspects, and explains the medium access protocol, the services provided, and the mobile routing scheme. istorically, wireless data communications was princi- and have access to external data, wireless data technology pally the domain of large companies with special- plays a significant part because it can offer ubiquitous con- ized needs; for example, large organizations that nectivity, that is, connectivity at any place, any time. For this needed to stay in touch with their mobile sales reason, wireless data technology can be of real value to the Hforce, or delivery services that needed to keep track of their business world since computer users become more productive vehicles and packages. However, this situation is steadily when they exploit the benefits of connectivity. The explosive changing and wireless data communications is becoming as growth of local area network (LAN) installations over the commonplace as its wired counterpart.
    [Show full text]
  • Michael Steer
    Michael Steer eyond 3G is the official IEEE desig- classified as shown in Table 1. Few first generation (or nation for the next stage of wireless 1G) systems remain, except in the United States, where technology that some people call 4G AMPS (Advanced Mobile Phone System) remains a or fourth-generation radio. Over the background universal service. Most services are now years, every conceptual shift in wire- second generation (or 2G) dominated by Global System Bless technology has been characterized as a for Mobile Communications (GSM) but also with wide- generational change. With a good dose of spread development of code-division multiple access hindsight, the generations of radio and (CDMA). CDMA is a conceptual advance on the 2G major radio systems in each category are systems typified by GSM and so is commonly classified as 2.5G. Third generation (or 3G) offers a sig- nificant increase in capacity and is the opti- mum system for broadband data access. Third generation includes wideband mobile multimedia networks and broadband mixed wireless systems. The mobile systems support vari- able data rates depending on demand and the level of mobili- ty. Typically 144 kb/s is sup- ported for full vehicular mobil- ity and higher bandwidths for pedestrian levels of mobility. Switched packet radio tech- niques and wideband CDMA- like systems (as the physical channel is) rather than assigned physical channel schemes (referred to as circuit switched) are required to support this band- width-on-demand environment. There are two essential concepts beyond 3G. One of these is the provi- sion of data transmission at rates of 100 Mb/s while mobile and 1 Gb/s while station- ary.
    [Show full text]
  • 030610 IAC EA SIG Information and Data Reference Model Bod…
    Business Integra tion Driven By Business Lines 06/10/2003 Business Integration Driven by Business Lines: A perspective on the Data Reference Model as it relates to Cross Agency Challenges. Standards Based Architecture to Support Federated Data Management. Concept Level WHITE PAPER Developed for the Federal Enterprise Architecture Program Management Office (FEA -PMO), Federal CIO Council, NASCIO, and Public Cross Government Initiatives Industry Advisory Council (IAC) Enterprise Architecture SIG May 28, 2003 Business Integra tion Driven By Business Lines 06/10/2003 DISCLAIMER While the Federation of Government Information Processing Councils/Industry Advisory Council (FGIPC/IAC) has made every effort to present accurate and reliable information in this report, FGIPC/IAC does not endorse, approve or certify such information, nor does it guarantee the accuracy, completeness, efficacy, and timeliness or correct sequencing of such information. Use of such information is voluntary, and reliance on it should only be undertaken after an independent review of its accuracy, completeness, efficacy and timeliness. Reference herein to any specific commercial product, process or service by trade name, trademark, service mark, manufacturer or otherwise does not constitute or imply endorsement, recommendation or favoring by FGIPC/IAC. FGIPC/IAC (including its employees and agents) assumes no responsibility for consequences resulting from the use of the information herein, or from use of the information obtained from any source referenced herein, or in any respect for the content of such information, including (but not limited to) errors or omissions, the accuracy or reasonableness of factual or scientific assumptions, studies or conclusions, the defamatory nature of statements, ownership of copyright or other intellectual property rights, and the violation of property, privacy or personal rights of others.
    [Show full text]
  • Open Issues on Information System Architecture Research Domain: the Vision
    OPEN ISSUES ON INFORMATION SYSTEM ARCHITECTURE RESEARCH DOMAIN: THE VISION André Vasconcelos CEO - Centro de Engenharia Organizacional, INESC, Lisboa, Portugal Email: [email protected] Carla Marques Pereira EST-IPCB, Av. do Empresário, Castelo Branco, Portugal Email: [email protected] Pedro Sousa, José Tribolet CEO - Centro de Engenharia Organizacional, INESC, Lisboa, Portugal Email: [email protected], [email protected] Keywords: Information System Architecture (ISA), ISA Evaluation, Business/System Alignment, Enterprise Information System, CEO Framework. Abstract: Currently organizations, pushed by several business and technological changes, are more concern about Information systems (IS) than ever. Though organizations usually still face each IS as a separately technological issue with slight relations with business domain. This paper discusses the importance of the Information System Architecture (ISA) as the tool for ensuring a global view on IS and for explicitly assessing alignment between technology and business processes and strategies. In this paper, considering the numerous topics, technologies and buzzwords surrounding ISA domain, we identify the major ISA open issues, namely: ISA Modelling, ISA Methodology, ISA Evaluation, IS Architectural Styles and Patterns, and IS/Business Alignment. We also present our advances in addressing some of these issues, by proposing an approach for ISA evaluation and IS/Business Alignment measure. This approach is supported on an ISA modelling framework and provides several indicators and measures for ISA evaluation. This approach is applied to an IS health care project evaluation. 1 INTRODUCTION enterprise knowledge handling. These new business needs have being forcing organizations to redesign their strategies, reengineering their business During the last decade several important processes and positioned efficient information technological progresses have been accomplished in handling in every organization agenda.
    [Show full text]
  • Smart Energy Network
    Smart TheThe FutureFuture ofof….…. Smart Energy Network Alliance presentation from Energy Motorola, OZZ & NERTEC For Union Gas UtilityUtility DataData July 12, 2004 Connectivity Connectivity Network FromFrom OZZOZZ EnergyEnergy SolutionsSolutions Inc.Inc. OZZ Corporation Ontario Energy Board Smart Meter Implementation Initiative September 17, 2004 Open System Platform z Open Infrastructure Standards – ANSI meter communications – IEEE communications – Internet – e.g. W3C – Data Exchange – e.g. SQL, EDI – Application – e.g. Java z Shared Use Networks – Published protocols – Multi-source of connectivity – Multiple application uses z Information Exchange SMI Proposition z Smart Metering Infrastructure is Not Meter Reading – Smart Point-of-Service Device z Cost and Quality – Integral Part of the Distribution Grid – Opportunity to serve the consumer Smart Energy Value Ontario – Responsive Distribution Infrastructure: SmartGrid Integrated networks Unified Infrastructure using intelligent device zSmartMeters Infrastructure automation zSmartControls –SmartPipes –SmartWires –SmartAssets SmartGrid Integrated demand Smart Solutions Solutions response, efficiency & zCustomer participation reliability zPeak response zReliability response Alliance Difference 1. ECONOMIC FLEXIBILITY 2. RISK MITIGATION z Shared Infrastructure z Smart Network Solutions – Mobile asset utilization Solutions – Wireless – Fixed data applications z For the North American grid – Mobile voice & data applications Systems – Wired z For addressable applications z Scalable Solutions
    [Show full text]
  • The Business Reference Model Version 1.O
    THE BUSINESS REFERENCE MODEL VERSION 1.O A Foundation for Government-wide Improvement INTRODUCTION E-Government is one of the five key components of the President’s Management Agenda because of its importance in facilitating a more responsive and effective Government. To achieve the President’s objectives, the federal government must derive more productivity from its IT spending, currently more than $50 billion. A cornerstone to success is the development of a Federal enterprise architecture that enables agencies to derive maximum benefit from applying IT to their missions. In February 2002, I directed the creation of a Federal Enterprise Architecture Program Management Office to begin developing a comprehensive, business-driven blueprint for modernizing the Federal government. The Federal EA will serve to inform executive-level decision-making and allow for increased collaboration and resource sharing across agencies. I am pleased to unveil today the foundational layer of the Federal Enterprise Architecture – the Business Reference Model (version 1.0). The Model provides an integrated view of the Federal Government’s business, detailing activities that agencies perform to achieve each mission and function. With this foundation, government executives can look strategically at Federal business operations and understand the gaps, overlaps, and opportunities. The Business Reference Model provides OMB and the Agencies with an invaluable new tool for improving the business of government – it is a quantum leap forward for the Federal Government. The Federal Enterprise Architecture is being constructed through a series of “reference models” designed to facilitate cross-agency analysis and improvement. The Business Reference Model serves as the foundation for the other reference models that will be published in the future – the Performance Reference Model, Data Reference Model, Application-Capability Reference Model, and the Technical Reference Model.
    [Show full text]
  • Comprehensive Measurement Framework for Enterprise Architectures
    International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 4, August 2011 COMPREHENSIVE MEASUREMENT FRAMEWORK FOR ENTERPRISE ARCHITECTURES Mahesh R. Dube 1 and Shantanu K. Dixit 2 1Department of Computer Engineering, VIT, Pune, India [email protected] 2Department of Electronics and Telecommunications, WIT, Solapur, India [email protected] ABSTRACT Enterprise Architecture defines the overall form and function of systems across an enterprise involving the stakeholders and providing a framework, standards and guidelines for project-specific architectures. Project-specific Architecture defines the form and function of the systems in a project or program, within the context of the enterprise as a whole with broad scope and business alignments. Application-specific Architecture defines the form and function of the applications that will be developed to realize functionality of the system with narrow scope and technical alignments. Because of the magnitude and complexity of any enterprise integration project, a major engineering and operations planning effort must be accomplished prior to any actual integration work. As the needs and the requirements vary depending on their volume, the entire enterprise problem can be broken into chunks of manageable pieces. These pieces can be implemented and tested individually with high integration effort. Therefore it becomes essential to analyze the economic and technical feasibility of realizable enterprise solution. It is difficult to migrate from one technological and business aspect to other as the enterprise evolves. The existing process models in system engineering emphasize on life-cycle management and low-level activity coordination with milestone verification. Many organizations are developing enterprise architecture to provide a clear vision of how systems will support and enable their business.
    [Show full text]
  • Boomer-III Mobitex OEM Modem
    Boomer-III Mobitex OEM Modem BM3-900M – Mobitex 900MHz BM3-800M – Mobitex 800MHz BM3-400ME – Mobitex 400MHz BM3-400MU – Mobitex 400MHz Th e Wavenet family of Boomer-III Mobitex modems are high-performance wireless transceivers developed specifi cally for integration by original equipment manufacturers (OEM). Th is wireless module can be incorporated into various vertical solutions ranging from Business Benefi ts handheld terminals (HHT) for public safety, High Reliability Small Compact Design • Capable of operating 24-hours a day, 7-days a week (24/7). transport and logistics, to machine-to-machine • Rugged small form factor suitable for handheld devices or machines. (M2M) applications for meter reading, vending • Unique LED indicator window (TX, RX PWR) for visual diagnostic feedback. machines and point-of-sale. Connectivity Plus • High sensitivity receiver for connectivity in-building and fringe areas. Th e Boomer-III family off er integrators • High effi ciency transmitter. Effi cient Power Management superior performance in critical areas of • Advanced power management for long operating life. reliability, receiver sensitivity, noise immunity, • Compatibility with 3.6V lithium battery technology. power effi ciency and simplicity of integration. Flexible Architecture • On-board Application Software capable to allow product customisation. Th e On-Board Application (OBA) capability • Eliminate external componentry to reduce complexity and system cost. • Comprehensive Developer Support including SDK and test hardware. allows you to run your wireless application Future-Proof Your Design directly on the modem’s internal processor • Network fl exibility through family range of interchangeable modules. eliminating an external processor, memory • Th e BM3 family includes multi-band DataTAC, GPRS, CDMA and 3G networks.
    [Show full text]
  • Mobile Computing: the Enetwork Wireless Solution Juan R
    Mobile Computing: The eNetwork Wireless Solution Juan R. Rodriguez, Werner Schollenberger, Muchsin Anzib, Bhaktianto Widyarso International Technical Support Organization http://www.redbooks.ibm.com SG24-5299-00 International Technical Support Organization SG24-5299-00 Mobile Computing: The eNetwork Wireless Solution March 1999 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix B, “Special Notices” on page 243. First Edition (March 1999) This edition applies to Version 4.1.2 of IBM eNetwork Wireless Gateway for use with the AIX Operating System, Version 4.1.3 of IBM eNetwork Emulator Express for Windows and AIX, and Version 2.1.1 of IBM eNetwork Web Express for Windows and AIX. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. HZ8 Building 678 P.O. Box 12195 Research Triangle Park, NC 27709-2195 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1999. All rights reserved Note to U.S Government Users - Documentation related to restricted rights - Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Tables . xi Preface . xiii The Team That Wrote This Redbook . xiii Comments Welcome . xiv Part 1. Introduction . .1 Chapter 1. Introduction. .3 1.1 eNetwork Wireless Gateway and Client. .4 1.2 eNetwork Emulator Express . .5 1.3 eNetwork Web Express. .6 1.4 Putting It All Together .
    [Show full text]