From A to Z, here's a glossary of common IT terms and IT definitions from UT and LAITS LAITS
For additional University terminology please refer to Enterprise Technology (ET)
ACO
Short for Amp Communication Outlet. The cable outlet provides the connection back to a network closet that in turn connects to the rest of the UT network. This will be a combination of letters and numbers located on the wall outlet faceplate. Example: 1A3D21
Asset Tag
Each piece of UT-owned hardware is assigned a unique six-character identifier, such as A22119, D04571, or 876234. All computers purchased through LAITS are tagged - either by Dell at the time of order or by LAITS during the imaging process. Typically, identifiers starting with ‘D’ (DXXXXX) are Dells, ‘A’ (AXXXXX) are Apples; hardware asset tags starting with ‘7’ or ‘8’ signify older devices that could be either brandThis identifier is typically found on a silver sticker located on the bottom of laptops and the side or top of desktops.
BACS
Building Access and Security Systems are designed to control access to buildings and specific rooms at designated times. This can include coded locks, like those used in some of our spaces, or UT’s proprietary ID card access system. When referring specifically, it denotes the latter. Typically, building managers have the authority to modify access permissions for buildings or rooms.
BQ
BQ (Border Quarantine) is a security measure that effectively blocks a device from connecting to the network. These quarantines are implemented by the Information Security Office (ISO) in response to identified vulnerabilities. Specific LAITS staff have the authority to clear these quarantines
Crashplan
Crashplan is the backup software designed to regularly scan for changes on users’ disks and to back up data on end-user machines. UT backup software was formerly known as Code42 and UTBackup.Crashplan Troubleshooting Guide
DE
Short for Desktop Engineering; this team of systems managers are also referred to as Fleet Management. LAITS fleet management ensures end user computers and printers are configured and maintained to meet Information Security Office (ISO) requirements. This includes regular patching, malware protection, data backups, and security.
Defender for Endpoint
Microsoft Defender for Endpoint is the enterprise anti-malware program the University uses for all Windows and macOS computers.
Deployment
When a machine is delivered to a user, it must be Deployed. This is the process of initially setting up a user's account, software, and access to services.DEPNotify
A piece of software used by LAITS to improve the imaging process on mac computers. When we talk about DEPNotify, we're usually referring to the popups/notifications it generates. See this page for additional context. DEPT CodesHow we refer to departments in technical or space-limited contexts. College of Liberal Arts becomes COLA, Social Work becomes SSW1, etc. We use this in Active Directory, and in how we name computers. You can find a complete list of our supported department codes here.
DOC
Desktop Operations Center. A LAITS-specific term for our walkup service desks. These are located in PAR, NURS, RLP, etc.
DSS
Short for Desktop Support Specialist. LAITS's team of deskside support agents. FTE
Full-Time Employees are faculty and staff working traditional 40-hour work weeks. FTEs, PTEs (Part-Time Employees), and STAs have different degrees of benefits, responsibilities, and privileges.
Generations / Lifecycle
Also referred to as "GENS," a program where tenure-track COLA faculty receive a new machine through LAITS at regular intervals, with the goal that no faculty enrolled in the program has a computer more than four years old.
IID
The Institutional Identifier (IID) (format: <eid>@eid.utexas.edu) is designed for use with cloud-based services whose usernames are e-mail addresses. When used as an email address, will forward to the user’s email address on record. Guest-class EIDs do NOT have IIDs unless they have been granted a special entitlement.
Imaging
Sometimes referred to as provisioning, reimaging, or reformating. The process of Provisioning, imaging, or formattingrefers to the process of completely wiping a computer and configuring it 's operating system and all existing data. The computer is then configured according to LAITS standards. This , which includes installing certain pieces of specific software and configuring adjusting settings to our needs. This is largely automated. meet University Information Security Office (ISO) requirements.
ISO
Refers to the Information Security Office. From their website:
The mission of the Information Security Office
...
(ISO), as required by state law, is to assure the security of the university's Information Technology (IT) resources and the existence of a safe computing environment in which the university community can teach, learn, and conduct research.
ITS
The University Information Technology ServicesService (ISO), is the largest IT support group on campus which handles . It manages campus-wide services like including DUO, Box, and more.
JAMF
A JAMF is a comprehensive suite of computer management software . Serves as our MacOS replacement for LANrev. LAITS migrated to JAMF in designed to replace LANrev for managing macOS systems. LAITS successfully transitioned to JAMF during the 2019/2020 period.
Loaner
A temporarily assigned machine with a generic login, meant for use when a user's primary machine is being serviced. Most loaners are directly owned and managed by LAITS and are not intended for prolonged use. Loaners should receive bare-minimum setup, and should not be tied into a user's backups or departmental software suite.Mainframe
A specialized computer used for processing large volumes of sensitive data. UT's mainframe is located in the University Data Center. The university maintains a number of applications that depend upon the mainframe, the most popular of which are DEFINE, DPUser, and TID Printing. Confusingly, administrative employees will frequently refer to these applications AS the mainframe. Mainframe issues should be forwarded to the UT Service Desk.
Remediation
Any extended support session, usually a planned one addressing the primary issue on a ticket, is referred to as a Remediation.
SCCM
SCCM, sometimes referred to as MEMCM, or MECM, is a suite of computer management software developed and maintained by Microsoft. LAITS began migrating to SCCM in late 2020/early 2021. It serves as our Windows-based replacement to LANrev, a deprecated computer management suite.
...
Service Desk
LAITS customer walk-up service desks, conveniently located in PAR, NURS, and RLP.
Software Center
LAITS preinstalled tool on Windows machines that allows the install and uninstall, patching and updating of various applications and software.
Splunk
Splunk is a SIEM (security information and event management) tool run by the ISO that ingests data streams from many sources, then processes and displays relevant information in reports and dashboards.
STA
Student Technology Assistants are student employees assigned to various tasks and roles within the LAITS Computer Support and AV teams.VPP
Short for Volume Purchasing Program. A licensing structure that Apple has that allows schools and enterprises to license apps and some content
UT EID
The University of Texas Electronic Identifier (UT EID) is the primary identifier at The University of Texas at Austin. It is most visible to customers as the username used for campus-wide Single Sign On (SSO). Several other prominent identifiers are based on the UT EID.