ETH Homepage

IT Glossary

 

TermDescription
1st Level1st level support is the first and central point of contact for individuals experiencing IT system incidents. Only when this party finds no solution to the incident is the case passed to 2nd level support. At each level, greater expertise and expert skill are present, and more time and other resources are available.
2nd Level2nd level support solves complicated and rare incidents that require further investigation. Incidents that cannot be resolved will be forwarded as a problem to 3rd level support.
3rd Level3rd level support solves complex problems which cannot be solved by 2nd level. If problems cannot be solved, alternative solutions will be suggested.
Active DirectoryActive Directory, AD for short, is a central directory service from Microsoft that was first introduced with Windows 2000. The Microsoft Active Directory is the central information source of a network. The directory service bundles all information about users, passwords, access shares and restrictions, and objects connected to the network.
Best EffortSupport based on the greatest possible efforts. Incidents, problems and service requests are processed as quickly as possible. However, response times and resolution times cannot be guaranteed.
BOTBenutzungsordnung für Telematik (work rules for telematics) at ETH
Commodity ITStandard IT components of the ITS. They form the basis for operations and research, but are not specific to mechanical and process engineering and the research thereof. The aim is to ensure the highest possible standardisation in order to keep costs low. Examples: IT workstation, printing, email, network.
ComplianceIn corporate management, (IT) compliance describes the observance of legal, internal and contractual regulations in the area of the IT landscape.
DomainA domain is a local security area with central management of resources. It represents an administrative border.
Domain ControllerThe domain controller is a server for centralised authentication and authorisation of computers and users within a computer network.
FTEFull time equivalent
Group PolicyGroup Policy is a feature of the Microsoft Windows that controls the working environment of user accounts and computer accounts. Group Policy provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment.
IncidentsAn unplanned interruption to an IT service or a reduction in the quality of an IT service
ISGIT Services Group
ISLHead of IT Support / Head of ITS S4D D-MAVT
ISOInformation Security Officer
ITEKIT Expert Commission at ETH
ITS (ID)Information and technology services at ETH
ITS S4D D-MAVTServices for the Department of Mechanical and Process Engineering, part of the ITS Services for Departments division
LifecycleThe various phases during the life of an IT service, PC workstation system, hardware or software. The lifecycle defines the status categories and the permitted state transitions.
Mobile DeviceMobile devices such as smartphones, sub-notebooks, PDAs (personal digital assistants) or tablet computers
NASNetwork-attached storage; providing shared drives
ProblemThe cause of one or more incidents. At the time of the creation of a problem ticket, the cause is usually unknown. The problem management process is responsible for further investigations.
Requests
(Service Request)
A formal request from a user for something they wish to be provided – for example, a request for information or advice, a password reset or installing a workstation for a new user.
SLAService level agreement
SPOCSingle Point of Contact: A person or a department serving as the coordinator or focal point of information concerning an activity or program.
Strategic IT AssetsSpecific IT components for research which have been adapted to the D-MAVT requirements and research. Examples: Laboratory systems, scientific data collection, laboratory information management systems, application programming for bioinformatics and other special applications
UCCUnified communications and collaboration (UCC) is the collection of technology and software that combines enterprise communication with real-time, asynchronous cooperation capabilities. UCC takes the various methods used in individual unified communications (UC) and collaboration solutions and makes them available through a single interface to improve connectivity and productivity. Components of UCC could include email, voicemail, calendars, scheduling tools, video conferencing, instant messaging (IM), desktop sharing and VoIP.
VPZVirtual private network zone
IT Services for D-MAVT