Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For


Glossary words and their definitions

802.11search for term

802.11 is essentially the technical term for wi-fi. It is a set of standards that govern wireless networking transmission methods used to provide wireless connectivity in the home, office and some commercial establishments.

AATsearch for term

AAT stands for Association of Accounting Technicians. Membership entitles those who have completed the examinations and obtained relevant supervised work experience to call themselves associate accounting technicians.

affiliationsearch for term

The definition of an individual's relationship to the University, such as student, faculty, or staff

Aliassearch for term

A term used by telecommunications professionals to describe two directory numbers going to a single voicemail box.

ARFsearch for term

Short for Access Request Form, the paperwork required to be completed if you need to have access to PeopleSoft databases.

Bloggersearch for term

The Google Apps blog creation program. Users are required to take the ATI survey before using.

Central Websearch for term

The official, public HSU website at

CFRsearch for term

CFR stands for Common Financial Reporting (CFR), sometimes referred to as the Finance Data Warehouse. The CFR environment provides campuses with a set of interactive dashboards that contain the common, core reporting capabilities required by campuses and the Chancellor’s Office.

CFSsearch for term

PeopleSoft CFS is the financial application element of the Common Management System implemented by the CSU to manage University financial systems.

ClassClimatesearch for term

ClassClimate is the software used at HSU to create course evaluations and analyze student responses concerning instructors’ teaching. The results of the evaluations are stored in faculty Personnel Action Files.

CMSsearch for term

Common Management Systems

Compliance Sheriffsearch for term

A software program used by HSU to scan official University websites (those hosted on the Central Web server) to ensure those sites meet accessibility requirements.

Conversationsearch for term

The term used by GMail to describe a series of emails with the same subject line between two or more individuals.

DARSsearch for term

The Degree Audit Report for Students (DARS) is a comprehensive academic audit that matches a student’s academic history with his/her degree requirements. It can be accessed through Faculty Center and Student Center.

dashboardsearch for term

A set of predefined, interactive reports in OBI

Data Dictionarysearch for term

A centralized store of information about data such as its meaning, relationships to other data, origin, usage, and format

Data Martssearch for term

A data mart is a subset of a data warehouse that is intended for use by a specific team or line-of-business unit. HSU data marts contain subject areas, dashboards, and reports pertaining to a specific subset of data.

DNSsearch for term

The Domain Name System (DNS) is the naming system for computers, services, and other resources connected to the Internet or a private network. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.

Dreamweaversearch for term

An application published by Adobe Systems that can be used to generate web pages.

Drupalsearch for term

The primary software platform used at HSU to collaboratively create, design, and post official web pages.

encryptionsearch for term

Encryption is the process of encoding information in such a way that it cannot be read or understood without a matching "unlock" code to decrypt it. Encryption is the standard approach to protecting confidential information from unauthorized viewing by humans or computers.

FERPAsearch for term

The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student education records. The law applies to all schools receiving public funds under an applicable program of the US Department of Education.

Firewallsearch for term

A firewall is a hardware or software network security device that sits between two networks - one of which is usually the Internet - to control what information is allowed to pass between those networks.

free/busy timesearch for term

Your free/busy time shows people if you are available when they invite you to a meeting. They can't see what you are doing, only whether you are free or busy.

Global Address Listsearch for term

A list of all HSU email addresses on the mail system.

GMailsearch for term

Google's web-based email system, adopted campus-wide at HSU.

Google Appssearch for term

HSU uses and supports a number of Google applications, or Apps: GMail, Google Calendar, Google Groups, and Google Docs are available to all, while Blogger, Sites, Picasa, and Google+ (and Hangouts) require users to take the ATI survey. All apps are accessible through the GMail interface.

Google Apps Syncsearch for term

A plug-in for Microsoft Outlook that allows you to access your Google Apps mail, calendar, and contacts from within Outlook.

Google Docssearch for term

The umbrella term for documents produced using Google word processing, spreadsheet, presentation, forms, and drawing apps. Accessed via Google Drive from the Gmail interface.

Google Drivesearch for term

Where Google Docs are stored and from where sharing and collaboration on those documents take place.

Google Groupssearch for term

The Google Apps implementation of a mailing list. Enables users to establish lists of recipients for different types of communications with different access/privacy levels.

Google Sitessearch for term

A Google Apps program that can be used to generate small personal websites. May not be used to generate HSU instructional sites.

HCMsearch for term

Human Capital Management is the PeopleSoft application used by HSU as part of the Common Management System to manage personnel and other human resources-related functions.

HSU User Namesearch for term

Your HSU User Name is what you use to login to email, computers, Moodle, etc. It is typically made up of your initials and a number (e.g. abc123), and is generally used in conjunction with your HSU Password.

ICAsearch for term

Short for Independent Computing Architecture, ICA is a protocol designed specifically for transmitting Windows graphical display data as well as keyboard and mouse input over a network. It's used by Citrix in the program you download to your local PC in order to access VLab.

identity registrysearch for term

The system that reconciles and maintains information about people and their relationship to the University and makes this information available to other systems.

IdMsearch for term

Identity and access management - the management of individual identifiers, their authentication, authorization, and privileges with or across system and enterprise boundaries. The goal is to increase security and productivity while decreasing cost, downtime, and repetitive tasks.

Instance Managementsearch for term

Instance management is the term used by PeopleSoft applications to describe the different databases available to the system and their use, enabling users to choose the most appropriate database for their requirements.

IPsearch for term

The Internet Protocol (IP) is the principal communications protocol used for relaying information across the Internet. To enable information to reach its destination, every computer connected to the Internet has a unique IP address.

ITCsearch for term

An ITC, or Information Technology Consultant, is a member of the IT Services department with responsibility for a specific department.

KBOXsearch for term

KBOX is the ticketing system used by the HSU Help Desk to record, assign, and track requests submitted via the Help Desk web site.

Key Advisorsearch for term

Each department has a Key Advisor, who is the department's primary point of contact for Telecommunication & Network Service needs (phone and network). This person is authorized to make additions, changes, and deletions to these services for your department. If your Key Advisor is unavailable and you have an urgent need, please obtain authorization from your Department Dean, Chair or Director.

Labelsearch for term

Similar to tagging in social networks, a label is the function you use in GMail to categorize a message. Unlike folder storage, messages can have multiple tags.

Level 1search for term

Level 1 data, sometimes also referred to as Level 1 protected data, is confidential information that is in most cases protected by statutes, regulations, or other legal mandates. Level 1 data includes PII (social security numbers, credit card numbers, driver’s license numbers, etc) as well as medical records, passwords, and sealed bids.

Level 2search for term

Level 2 data is information which could raise ethical or other privacy concerns if shared with individuals or entities that do not have the legal right to require sight of such information. Examples include FERPA protected student grade data and disciplinary action records, as well as employee personal information such as home address and telephone number.

Malwaresearch for term

Short for malicious software, malware is a generic term for any type of software designed to do damage to or otherwise adversely affect the integrity of a computer system and/or the data stored on that system.

Moodlesearch for term

Moodle is the computer-based learning system used by faculty at HSU to deliver lectures and interactive instructional sessions over the web.

MySQLsearch for term

MySQL is a commonly-used database system that's often combined for web use with the widely-used PHP scripting language.

Network Address Translation (NAT)search for term

Network Address Translation (NAT) is usually implemented to enable multiple hosts on a private network to access the Internet using a single public IP address. It can pose significant security risks and so systems running NAT are not permitted to connect to the HSU wireless network.

Nolijsearch for term

Nolij is a data management system that enables PeopleSoft users to save time and improve efficiency by automating manual business processes.

OBIsearch for term

OBI, or Oracle Business Intelligence, is the reporting and analysis tool used to extract information from the PeopleSoft databases.

P2Psearch for term

The P2P (peer-to-peer) application structure was popularized by file sharing systems like Napster. In P2P networks, peers are both suppliers and consumers of resources, unlike the traditional client–server model where only servers supply (send) and clients consume (receive).

Pageletsearch for term

An individual defined area on myHumboldt used to publish targeted communications. Information published in a pagelet is determined by the steward for that pagelet.

Peer-to-Peer search for term

The peer-to-peer (P2P) application structure was popularized by file sharing systems like Napster. In P2P networks, peers are both suppliers and consumers of resources, unlike the traditional client–server model where only servers supply (send), and clients consume (receive).

Pharossearch for term

Pharos is the company that manufactures the Pay-for-Print systems used at HSU. See also

Phishingsearch for term

Sometimes referred to as social engineering, phishing is an attempt to get computer users to provide valuable information, particularly user names and passwords, by providing a convincing-looking but false context such as a recreation of a bank's login page or email.

PIIsearch for term

PII, or Personally Identifiable Information, is information about an individual that can be used to facilitate identity theft. It includes social security numbers, driver’s license numbers, and credit card numbers. The CSU has classified PII as Level 1 Data.

PolicyKeysearch for term

The Policy Key is a small piece of software installed on end user computers as part of our Network Access Control system. Its role is to ensure that those computers meet HSU security requirements whenever they connect to the Internet using the HSU wireless network or ResNet.

primary calendarsearch for term

In Google Apps, your primary calendar is the one created by default. By default, it's your HSU email address.

Project Sponsorsearch for term

The Project Sponsor defines the project objectives, has the authority to commit financial and human resources, and evaluates the results.

Proxysearch for term

Proxy systems were developed in the early days of distributed systems as a way to simplify and control complexity. Today, most proxies are are used to filter and manage access to content on the World Wide Web.

R25search for term

The R25 WebViewer is an online service offered by Training & Professional Development that lets you search and request a reservation for classrooms for events on campus, in conjunction with Room Reservations in University Center.

RDPsearch for term

Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to another computer. Clients exist for most versions of Microsoft Windows (including Windows Mobile), Linux, Unix, Mac OS X, and Android.

reformatsearch for term

Deleting the partition and creating a new partition or using “Ghost” or another sector-based imaging program.

ResNetsearch for term

The network in the halls of residence, which is separate from the campus business network.There is also a ResNet wireless network. More details on the ResNet website at

RFBsearch for term

RFB (remote frame buffer) is a simple protocol for remote access to graphical user interfaces. It can be used with any windowing system or application, including Windows and Macintosh.

secure destructionsearch for term

Removing drive media from enclosures and utilizing the campus-approved secure destruction contract.

secure locationsearch for term

A room or other enclosed space with controlled access or a locked cabinet.

SFTPsearch for term

Secure File Transfer Protocol is a way to transfer a file over an Internet connection directly from one computer to another that's safer and more secure than attaching it to an email message. It's particularly appropriate for large files and for executable program files that HSU does not permit to be sent via email.

Smart Classroomssearch for term

Smart Classrooms are classrooms equipped with a wide range of instructional technologies to enhance students' learning experience. HSU has 69 Smart Classrooms; their locations are listed on the web at

Sponsorsearch for term

In the context of the voicemail system, a privilege level that permits the recording of call processor messages. In the context of an ITS project, the name of the individual authorizing the submission of the project proposal.

Stewardsearch for term

Person responsible for the content and functionality of pagelets and other content and communications within myHumboldt

systatsearch for term

Short for System Status, Systat is a reporting system that provides up-to-the-minute information about system outages on campus and expected outage times.

Tabsearch for term

A page within the myHumboldt site that displays multiple pagelets containing related categories of information and communications. Home tab contents are partially customizable by users.

Turning Pointsearch for term

Turning Point is the system, distributed by Turning Technology, that's used in Smart Classrooms to incorporate interactivity into instructional sessions. Each installation comprises a receiver and hand-held devices ('clickers').

User Web Serversearch for term

The User Web Server hosts unofficial websites for students, staff, and faculty; it should not be used to post instructional or other official HSU content.

USSsearch for term

USS (User Support Services) is the umbrella name for the Desktop Management, Help Desk, and Training teams within the Information Technology Services department.

Virussearch for term

Often used interchangeably with malware, a virus is a piece of software designed to do damage to or otherwise adversely affect the integrity of a computer system and/or the data stored on that system. Strictly-speaking a virus, unlike other types of malware, can spread of its own accord without requiring human intervention.

VLabsearch for term

The HSU VLab (Virtual Lab) is an online service that enables students, staff, and faculty to access on-campus software when they're away from campus or can't get access to a physical lab when they need it.

VNCsearch for term

Virtual Network Computing (VNC) is a graphical desktop sharing system that uses the RFB (remote frame buffer) protocol to remotely control another computer. It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network.

VPNsearch for term

A virtual private network (VPN) enables users to privately and securely share information between remote locations, or between a remote location and an organization's internal network.

wipingsearch for term

Use of a NIST or DoD 53330.22M approved method such as three-pass wipes, DBAN, degaussing to NIST standards, or firmware-based purge.

WPA2 search for term

WPA2 is the primary encryption standard used for wireless communications; it requires testing and certification by the Wi-Fi Alliance. Since March 13, 2006, WPA2 certification has been mandatory for any new device to bear the Wi-Fi trademark.