Glossary

This glossary includes terms and definitions for WebSphere Business Modeler, WebSphere Integration Developer, WebSphere Business Monitor, WebSphere Process Server for Multiplatforms, WebSphere Process Server for z/OS, WebSphere Enterprise Service Bus, WebSphere Enterprise Service Bus for z/OS, WebSphere Application Server, WebSphere Business Services Fabric, WebSphere Adapters, WebSphere Portal, WebSphere B2B, WebSphere Service Registry and Repository, WebSphere Business Integration for Financial Networks, WebSphere Business Events, WebSphere DataPower, WebSphere Extended Deployment, WebSphere Virtual Enterprise, WebSphere eXtreme Scale, WebSphere Extended Deployment Compute Grid, and WebSphere Business Compass.

The following cross-references are used in this glossary:
  1. See refers the reader from a term to a preferred synonym, or from an acronym or abbreviation to the defined full form.
  2. See also refers the reader to a related or contrasting term.

To view glossaries for other IBM products, go to www.ibm.com/software/globalization/terminology.

# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

#

2 B-channel transfer feature
See Integrated Services Digital Network two B-channel transfer.
3270 host application
An application on the IBM System/370, System/390, or iSeries that interacts with terminals supporting the 3270 data stream.
3270 server
A function of WebSphere Voice Response that provides a software interface between DirectTalk and IBM System/370, System/390, or iSeries architecture business applications that interact with terminals supporting the 3270 data stream. See also custom server.
5ESS

1. A Lucent Technologies switch.

2. The ISDN protocol implemented on the 5ESS switch, providing 23 B-channels and a D-channel over a T1 trunk.

A

A-law
The compressing and expanding algorithm used in Europe, Latin America, and other countries when converting from analog to digital speech data. See also mu-law.
abstract schema
Part of the deployment descriptor for an entity bean that is used to define the bean relationships, persistent fields, or query statements.
abstract test
A component or unit test that is used to test Java interfaces, abstract classes, and superclasses; that cannot be run on its own; and that does not include a test suite. See also component test.
abstract type
A type that can never be instantiated and whose members are exposed only in instances of concrete types that are derived from it.
Abstract Window Toolkit (AWT)
In Java programming, a collection of GUI components that were implemented using native-platform versions of the components. These components provide that subset of functionality which is common to all operating system environments. (Sun) See also Swing Set, Standard Widget Toolkit.
access bean
An enterprise bean wrapper that is typically used by client programs, such as JSP files and servlets. Access beans hide the complexity of using enterprise beans and improve the performance of reading and writing multiple EJB properties.
access control
In computer security, the process of ensuring that users can access only those resources of a computer system for which they are authorized.
access control list (ACL)
In computer security, a list associated with an object that identifies all the subjects that can access the object and their access rights.
access ID
The unique identification of a user used during authorization to determine if access is permitted to the resource.
access intent
Metadata that optimizes and controls the runtime behavior of an entity bean with respect to concurrency control, resource management, and database access strategies.
access intent policy
A grouping of access intents that governs a type of data access pattern for enterprise bean persistence.
access point group
A collection of core groups that defines the set of core groups in the same cell or in different cells that communicate with each other.
access protocol
A protocol used between an external subscriber and a switch within a telephone network.
accessor
In computer security, an object that uses a resource. Users and groups are accessors.
ACD
See automatic call distributor.
ACID transaction
A transaction involving multiple resource managers using the two-phase commit process to ensure atomic, consistent, isolated, and durable (ACID) properties.
ACL

1. See application connectivity link.

2. See access control list.

action

1. A business process that is generated in response to the processing of an event.

2. A series of processing steps, such as document validation and transformation.

3. An activity that is run on a transition.

4. In a business rule, the event that results from the evaluation of the condition.

Action class
In Struts, the superclass of all action classes.
action mapping
A Struts configuration file entry that associates an action name with an Action class, a form bean, and a local forward.
action object
An abstraction of the fields in the action definition.
action packet
The set of data that is passed in an action from the event processing server (runtime server) to an external system using the technology connectors. See also connector packet, event packet.
Action Palette
An area containing folders and icons that can be selected to create state table actions.
action rule
A rule in which the action is always performed. See also rule set, if-then rule.
action service
A service that triggers a process or notification to inform users about a situation.
action service handler
An entity that is responsible for the invocation mechanism of one or more action services.
action set
In Eclipse, a group of commands that a perspective contributes to the main toolbar and menu bar.
activation
In Java, the process of transferring an enterprise bean from secondary storage to memory. (Sun) See also passivation.
activation condition
A Boolean expression in a node within a business process that specifies when processing is to begin.
active change set
A change that is in the Draft, Pending, or Approved state.
activity

1. A unit of work or a building block that performs a specific, discrete programmatic task. See also task.

2. An element of a process, such as a task, a subprocess, a loop, or a decision. Activities are represented as nodes in process diagrams.

Activity Decision Flow (ADF)
The format in which models are exported from WebSphere Business Integration Workbench into WebSphere Business Modeler.
adapter
An intermediary software component that allows two other software components to communicate with one another.
Address Resolution Protocol (ARP)
A protocol that dynamically maps an IP address to a network adapter address in a local area network.
ADF
See Activity Decision Flow.
administrative agent
A program that provides administrative support without requiring a direct connection to a database.
administrator
A person responsible for administrative tasks such as access authorization and content management. Administrators can also grant levels of authority to users.
administrator profile
Data that describes a DirectTalk user. Information in an administrator profile includes ID, password, language preference, and access privileges.
ADSI
See Analog Display Services Interface.
ADSI telephone
A 'smart' telephone capable of interpreting and returning ADSI data.
advanced intelligent network (AIN)
A telephone network that expands the idea of the intelligent network to provide special services more efficiently: for example, by giving users the ability to program many of the services themselves. See also intelligent network.
Advanced Program-to-Program Communication (APPC)
An implementation of the SNA LU 6.2 protocol that allows interconnected systems to communicate and share the processing of programs.
after-image
A business object that contains all of the entity data after changes have been made to it during an update operation. An after-image contains the complete business object rather than only the primary key and those elements that were changed. See also delta business object.
agent
A program that performs an action on behalf of a user or other program without user intervention or on a regular schedule, and reports the results back to the user or program.
aggregate metric
A metric that is calculated by finding the average, maximum, minimum, sum, or number of occurrences of an instance metric across multiple runs of a process. Examples of aggregate metrics are an average order amount, a maximum order amount, a minimum order amount, the total order amount, or the number of occurrences of $500 for an order amount. See also metric, measure.
aggregation
The structured collection of data objects for subsequent presentation within a portal.
AIN
See advanced intelligent network.
alarm
Any condition that DirectTalk considers worthy of documenting with an error message. Strictly speaking, the term alarm should include only red (immediate attention) and yellow (problem situation) conditions, but it is also used to refer to green (a red or yellow message has been cleared) and white (information) conditions.
alarm listener
A type of asynchronous bean that is called when a high-speed transient alarm expires.
alert
A message or other indication that signals an event or an impending event.
algorithm mapping
A process by which service providers can define the mapping of Uniform Resource Identifier (URI) algorithms to cryptographic algorithms that are used for XML digital signature and XML encryption.
alias
An assumed or actual association between two data entities, or between a data entity and a pointer.
alternate mark inversion (AMI)
A T1 line coding scheme in which binary 1 bits are represented by alternate positive and negative pulses and binary 0 bits by spaces (no pulse). The purpose is to make the average dc level on the line equal to zero.
AMI
See alternate mark inversion.
analog
Pertaining to data that consists of continuously variable physical quantities.
Analog Display Services Interface (ADSI)
A Bellcore signaling protocol used with existing voice networks. ADSI supports analog transmission of voice and text-based information between a host or switch, voice mail system, service bureau, or similar, and a subscriber's ADSI-compatible screen telephone. A single voice-grade telephony channel is shared between voice and data, using a technique by which the channel is taken over for the transmission of modem-encoded data.
ANI
See automatic number identification.
annotate
To add metadata to an object to describe services and data.
annotation

1. An added descriptive comment or explanatory note.

2. In speech recognition, an alphanumeric string used to mark a grammar when it is defined. When the grammar is used in an application, both the word and the alphanumeric string are returned to the application.

announcement-only greeting
In voice mail, a greeting that does not give the caller an opportunity to leave a voice message. See also greeting.
anonymous user
A user who does not use a valid user ID and password to log into a site. See also authenticated user, registered user.
AP
See application program.
APAR
See authorized program analysis report.
API
See application programming interface.
API content model
A model that describes how XML documents, and their extended metadata, are represented.
APPC
See Advanced Program-to-Program Communication.
applet
A program that performs a specific task and is typically portable between operating systems. Often written in Java, applets can be downloaded from the Internet and run in a Web browser.
applet client
A client that runs within a browser-based Java runtime environment, and is capable of interacting with enterprise beans directly instead of indirectly through a servlet.
application
One or more computer programs or software components that provide a function in direct support of a specific business process or processes.
application assembly
The process of creating an enterprise archive (EAR) file containing all the files related to an application as well as an Extensible Markup Language (XML) deployment descriptor for the application.
application client
In Java EE, a first-tier client component that runs in its own Java virtual machine. Application clients have access to some Java EE platform APIs, for example JNDI, JDBC, RMI-IIOP, and JMS. (Sun)
application client module
A Java archive (JAR) file that contains a client that accesses a Java application. The Java application runs inside a client container and can connect to remote or client-side Java EE resources.
Application Client project
A structure and hierarchy of folders and files that contain a first-tier client component that runs in its own Java virtual machine.
application connectivity link (ACL)
A service that transmits out-of-band information between DirectTalk and the Siemens Hicom 300 switch.
application delivery notification
A delivery notification that is passed to an application. Typically, an application delivery notification is based on a network delivery notification, for example a FileAct delivery notification, but has been modified in some way by the service that exchanges data directly with the application. See also FileAct delivery notification.
application edition
A unique deployment of a particular application. Multiple editions of the same application have the same application name, while edition names are unique.
application edition manager
An autonomic manager that manages interruption-free production application deployments.
application infrastructure virtualization
The pool of application server resources that separates applications from the physical infrastructure on which they run. As a result, workload can be dynamically placed and migrated across the application server pool.
application LT
A logical terminal (LT) that is used by one or more applications, but that is not used for LT sessions.
application placement controller
An autonomic manager that can start and stop application instances on servers to meet the fluctuating demand of work requests and varying service policy definitions.
application profile
Data that describes initial actions to be performed when the telephone is answered. Information in an application profile indicates to the channel process what state table to load.
application program (AP)
A complete, self-contained program, such as a text editor or a Web browser, that performs a specific task for the user, in contrast to system software, such as the operating system kernel, server processes, and program libraries.
application programming interface (API)
An interface that allows an application program that is written in a high-level language to use specific data or functions of the operating system or another program.
Application Response Measurement (ARM)
An application programming interface (API), developed by a group of technology vendors, that can be used to monitor the availability and performance of business transactions within and across diverse applications and systems.
Application Response Measurement agent (ARM agent)
An agent that monitors software that is implemented using the Application Response Measurement standard.
application server
A server program in a distributed network that provides the execution environment for an application program.
application server interface (ASI)
The principal software component of WebSphere Voice Response that manages the real-time channel processing.
application server platform
A platform used for web and voice applications for e-business.
application virtualization
The separation of an application from the underlying operating environment, which improves portability, compatability, and managability of the application.
application-specific component
The component of a connector that contains code tailored to a particular application or technology. The application-specific component can respond to requests and implement an event-notification mechanism that detects and responds to events initiated by an application or external programmatic entity.
ARFM
See autonomic request flow manager.
ARM

1. See automatic restart manager.

2. See Application Response Measurement.

ARM agent
See Application Response Measurement agent.
ARP
See Address Resolution Protocol.
artifact
An entity that is used or produced by a software development process. Examples of artifacts are models, source files, scripts, and binary executable files.
ASI
See application server interface.
aspect-oriented connectivity
A form of connectivity that implements or enforces cross-cutting aspects in service-oriented architecture (SOA), such as security, management, logging, and auditing, by removing such aspects from the concern of the service requesters and providers.
assertion

1. A concept in the meta-model that is used to specify a policy requirement and evaluating endpoints at run time. An assertion is also used to describe the capabilities of an endpoint.

2. A logical expression specifying a program state that must exist or a set of conditions that program variables must satisfy at a particular point during program execution.

asset
A collection of artifacts that provide a solution to a specific business problem. Assets can have relationships and variability or extension points to other assets.
asset tree
The hierarchical list of assets that can be viewed and configured.
assisted life-cycle server
A representation of a server that is created outside of the administrative domain but can be managed in the administrative console.
assistive technology
Hardware or software that is used to increase, maintain, or assist the functional capabilities of people with disabilities.
associated type
An object that refers to a source object. See also referenced type.
association

1. For XML documents, the linkage of the document itself to the rules that govern its structure, which might be defined by a Document Type Definition (DTD) or an XML schema.

2. In enterprise beans, a relationship that exists between two container-managed persistence (CMP) entity beans. There are two types of association: one-to-one and one-to-many.

asymmetric algorithm
See public key algorithm.
asymmetric cryptography
See public key cryptography.
asynchronous
Pertaining to events that are not synchronized in time or do not occur in regular or predictable time intervals.
asynchronous bean
A Java object or an enterprise bean that a Java Platform, Enterprise Edition (Java EE) application can run asynchronously.
asynchronous messaging
A method of communication between programs in which a program places a message on a message queue, then proceeds with its own processing without waiting for a reply to its message.
asynchronous replica
A shard that receives updates after the transaction commits. This method is faster than a synchronous replica, but introduces the possibility of data loss because the asynchronous replica can be several transactions behind the primary shard. See also synchronous replica.
attribute

1. A characteristic or trait of an entity that describes the entity; for example, the telephone number of an employee is one of the employee attributes. See also entity, identity.

2. A property, quality, or characteristic whose value contributes to the specification of an element or program function. For example, "cost" or "location" are attributes that can be assigned to a resource.

3. In markup languages such as SGML, XML, and HTML, a name-value pair within a tagged element that modifies features of the element.

attribute list
A linked list that contains extended information that is used to make authorization decisions. Attribute lists consist of a set of name = value pairs.
audio name
The audible name that corresponds to a specific application profile ID and mailbox.
augment
To convert a profile to another kind of profile. For example, you can modify a server profile to become a bus profile.
auth
See authorization.
authenticated user
A portal user who has logged in to the portal with a valid account (user ID and password). Authenticated users have access to all public places. See also anonymous user, registered user.
authentication
A security service that provides proof that a user of a computer system is genuinely who that person claims to be. Common mechanisms for implementing this service are passwords and digital signatures.
authentication alias
An alias that authorizes access to resource adapters and data sources. An authentication alias contains authentication data, including a user ID and password.
authenticator key
A set of alphanumeric characters used for the authentication of a message sent via the SWIFT network.
authorisation
A document that authorizes one destination to send FIN messages to or receive FIN messages from another destination.
authorization (auth)

1. In computer security, the right granted to a user to communicate with or make use of a computer system.

2. The process of granting a user, system, or process either complete or restricted access to an object, resource, or function.

authorization policy
A policy whose policy target is a business service and whose contract contains one or more assertions that grant permission to run a channel action.
authorization table
A table that contains the role to user or group mapping information that identifies the permitted access of a client to a particular resource.
authorized program analysis report (APAR)
A request for correction of a defect in a supported release of an IBM-supplied program.
auto-attendant
Automated attendant. A voice application that answers incoming calls and asks callers which number or other service they would like.
autodiscovery
The discovery of service artifacts in a file system, external registry, or another source.
automatic application installation project
A monitored directory to which the addition of a fully composed EAR, WAR, EJB JAR, or stand-alone RAR file triggers automatic deployment and publication to a target server. Deletion of an EAR or Java EE module file from this directory triggers automatic uninstalling. See also monitored directory.
automatic call distributor (ACD)
A telephone system feature that automatically queues and processes inbound calls according to predefined criteria. For example, a call might be routed to the agent whose line has been idle longest.
automatic number identification (ANI)
In telephony, a service available in the United States that is provided by enhanced switch networks and that passes the calling party's telephone number through the network to the called party's telephone number.
automatic restart management
The facilities that detect failures and manage server restarts.
automatic restart manager (ARM)
A z/OS recovery function that can automatically restart batch jobs and started tasks after they or the system on which they are running end unexpectedly.
automatic transition
A transition that occurs on completion of the activity within the originating state.
autonomic manager
A set of software or hardware components, configured by policies, which manage the behavior of other software or hardware components as a human might manage them. An autonomic manager includes a control loop that consists of monitor, analyze, plan, and execute components. See also manageability interface.
autonomic request flow manager (ARFM)
An autonomic manager that controls request prioritization in the on-demand router.
autostubbing
A state table icon view utility that automatically converts lines into stubs when they cross a specified number of columns.
availability

1. The condition allowing users to access and use their applications and data.

2. The time periods during which a resource is accessible. For example, a contractor might have an availability of 9 AM to 5 PM every weekday, and 9 AM to 3 PM on Saturdays.

AWT
See Abstract Window Toolkit.
Axis
An implementation of SOAP on which Java Web services can be implemented.

B

B-channel
See bearer channel.
B2B
See business-to-business.
B2C
See business-to-consumer.
B2E
See business-to-employee.
B8ZS
See bi-polar with 8-zero substitution.
BA
See basic authentication.
background music
Any audio data that is played on a music channel.
Backus-Naur Form (BNF)
A metalanguage that is used to describe the syntax of a given language and its notation. In speech recognition, a special adaptation of grammar representation specified by Speech Recognition Control Language (SRCL) (pronounced "circle").
BAM
See business activity monitoring.
bank identifier code (BIC)
A code used to uniquely identify a bank, logical terminal, or branch within a SWIFT network.
base card
One of the set of two cards that comprise the VPACK or SPACK, both of which are needed to process voice signals. See also trunk interface card.
base configuration
The part of a storage management subsystem (SMS) configuration that contains general storage management attributes, such as the default management class, default unit, and default device geometry. It also identifies the systems, system groups, or both the systems and system groups that an SMS configuration manages.
Base Operating System (BOS)
The collection of programs that controls the resources and the operations of the computer system.
baseform
Part of the set of phonetic pronunciations associated with a grammar. In WebSphere Voice Server, the IBM dictionary of pronunciations is used.
basic analysis
A type of analysis that displays a report for the values of one or more business measures during a specific period of time.
basic authentication (BA)
An authentication method that uses a user name and a password.
basic rate interface
The means of ISDN access normally used by private subscribers, providing two B-channels of 64kbits per second and one D-channel of 16kbits per second for signaling. This is often known as 2B+D. See also primary rate interface.
basic type
A type whose values have no identity (that is, they are pure values). Basic types include Integer, Boolean, and Text.
bean
A definition or instance of a JavaBeans component. See also enterprise bean, JavaBeans.
bean class
In Enterprise JavaBeans (EJB) programming, a Java class that implements a javax.ejb.EntityBean class or javax.ejb.SessionBean class.
Bean Scripting Framework
An architecture for incorporating scripting language functions to Java applications.
bean-managed messaging
A function of asynchronous messaging that gives an enterprise bean complete control over the messaging infrastructure.
bean-managed persistence (BMP)
The mechanism whereby data transfer between an entity bean's variables and a resource manager is managed by the entity bean. (Sun) See also container-managed persistence.
bean-managed transaction (BMT)
The capability of the session bean, servlet, or application client component to manage its own transactions directly, instead of through a container.
bearer channel (B-channel)
In ISDN, a duplex channel for transmitting data or digital voice between the terminal and the network. The B-channel operates at 64 kilobits per second. See also delta channel.
bearer service
The type of service that defines how an ISDN connection will be used. Typical bearer services are speech telephony, 64 kilobit per second data, and high quality speech.
bi-polar with 8-zero substitution (B8ZS)
A T1 line code required for 64-kilobit channels such as ISDN.
BIC
See bank identifier code.
bidi
See bidirectional.
bidirectional (bidi)
Pertaining to scripts such as Arabic and Hebrew that generally run from right to left, except for numbers, which run from left to right.
binary format
Representation of a decimal value in which each field must be 2 or 4 bytes long. The sign (+ or -) is in the far left bit of the field, and the number value is in the remaining bits of the field. Positive numbers have a 0 in the sign bit and are in true form. Negative numbers have a 1 in the sign bit and are in twos complement form.
binary large object (BLOB)
A block of bytes of data (for example, the body of a message) that has no discernible meaning, but is treated as one entity that cannot be interpreted.
bind
To establish a connection between software components on a network using an agreed-to protocol. In Web services, the bind operation occurs when the service requestor invokes or initiates an interaction with the service at run time using the binding details in the service description to locate, contact, and invoke the service.
binding
A temporary association between a client and both an object and a server that exports an interface to the object. A binding is meaningful only to the program that sets it and is represented by a bound handle.
bits per second (bps)
In serial transmission, the instantaneous bit speed with which a device or channel transmits a character.
blind transfer
A type of call transfer in which the call is routed to another extension and the original call is terminated. No check is made to determine if the transferred call is answered or if the number is busy. See also screened transfer.
BLOB
See binary large object.
block decryption
Symmetric algorithms that decrypt a block of data at one time.
block encryption
Symmetric algorithms that encrypt a block of data at one time.
BMP
See bean-managed persistence.
BMT
See bean-managed transaction.
BNF
See Backus-Naur Form.
bookmark
A customizable, graphical link to databases, views, documents, Web pages, and newsgroups.
bootstrap
A small program that loads larger programs during system initialization.
bootstrap authorisation
An authorization that has been recorded but not yet processed by an relationship management application (RMA).
bootstrap member
An application server or cluster that is configured to accept application initialization requests into the service integration bus. The bootstrap member authenticates the request and directs the connection request to a bus member.
bootstrap period
The period during which relationship management (RM) data is recorded and converted into authorization records.
bootstrap process
A process for recording data when sending and receiving FIN messages and using this data to create authorization records. This helps SWIFTNet users to prepare for the time when the BK records used by FIN protocol versions 01 and 02 are replaced by the authorizations used by FIN protocol version 03.
bootstrapping
The process by which an initial reference of the naming service is obtained. The bootstrap setting and the host name form the initial context for Java Naming and Directory Interface (JNDI) references.
BOS
See Base Operating System.
bottleneck
A place in the system where contention for a resource is affecting performance.
bottom-up development
In Web services, the process of developing a service from an existing artifact such as a Java bean or enterprise bean rather than a Web Services Description Language (WSDL) file. See also top-down development.
bottom-up mapping
In Enterprise JavaBeans (EJB) programming, an approach for mapping enterprise beans to database tables, in which the schema is first imported from an existing database and then enterprise beans and mappings are generated.
BPEL
See Business Process Execution Language.
BPM
See business process management.
BPMN
See Business Process Modeling Notation.
bps
See bits per second.
branch

1. In process modeling, a distinct path leading to or originating from an element in a process model.

2. In the CVS team development environment, a separate line of development where changes can be isolated. When a programmer changes files on a branch, those changes do not appear on the main trunk or other branches.

breadcrumb trail
A navigation technique used in a user interface to give users a way to keep track of their location within the program or documents.
breakpoint
A marked point in a process or programmatic flow that causes that flow to pause when the point is reached, typically to allow debugging or monitoring.
bridge interface
A node and a server that run a core group bridge service.
British Approvals Board for Telecommunications
The British standards organization responsible for approval of equipment to be attached to the public-switched telephone network (PSTN).
broker archive
A file that is the unit of deployment to the broker that can contain any number of compiled message flow and message set files and a single deployment descriptor. A separate broker archive file is required for each configuration that is deployed.
brute force collision
A programming style that relies on computing power to try all the possibilities with a known hash until the solution is found.
bucket
One or more fields that accumulate the result of an operation.
build
To create or modify resources, typically based on the state of other resources. A Java builder converts Java source files into executable class files, for example, and a Web link builder updates links to files whose name or location has changed.
build definition file
An XML file that identifies components and characteristics for a customized installation package (CIP).
build path
The path that is used during compilation of Java source code, in order to find referenced classes that reside in other projects.
build plan
An XML file that defines the processing necessary to build generation outputs and that specifies the machine where processing takes place.
build time data
Objects that are not used by the translator, such as EDI standards, record oriented data document types, and maps.
bulk decryption
See block decryption.
bulk encryption
See block encryption.
bulk resource
A resource that is taken in quantity from a pool of generic resources. For example, a task might require 10 landscapers or 10 liters of water.
bundle
A set of tokens that are transferred between nodes in a simulation as a complete group.
bus
Interconnecting messaging engines that manage bus resources.
bus member
An application server or server cluster that hosts one or more messaging engines in a service integration bus.
bus topology
A physical arrangement of application servers, messaging engines and queue managers and the pattern of bus connections and links between them.
business activity monitoring (BAM)
The collection and presentation of real-time information that describes a business process or a series of activities spanning multiple systems and applications.
business analyst
A specialist who analyzes business needs and problems, consults with users and stakeholders to identify opportunities for improving business return through information technology, and transforms requirements into a technical form.
business calendar
A calendar that is used to model noncontiguous time intervals (intervals that do not proceed in a sequential manner). For example, a business calendar that defines regular working hours might refer to the non-overtime regular working hours of Monday to Friday, 9:00 a.m. to 5:00 p.m.
business component
A component that defines the structure, behavior, and information displayed by a particular subject, such as a product, contact, or account, in Siebel Business Applications.
business ecosystem
A business community supported by a foundation of interacting organizations and individuals. This community produces goods and services of value to customers, who are themselves members of the ecosystem. A business ecosystem contains business services networks, which contain business process, relevant to the transactions in that network.
business event

1. A significant occurrence in a business process, generally identified by a business analyst, that warrants monitoring over time to reveal a key performance indicator (KPI).

2. An event that occurs during a business process.

business graph
A wrapper that is added around a simple business object or a hierarchy of business objects to provide additional capabilities, such as carrying change summary and event summary information related to the business objects in the business graph. See also business object.
business group
A place to collect any elements to group together. Different business groups can be created for companies, processes, parts of processes, or any other grouping.
business integration system
An integration broker and a set of integration adapters that allow heterogeneous business applications to exchange data through the coordinated transfer of information in the form of business objects.
business item
A business document, work product, or commodity that is used in business operations. Examples of business items are a manufacturing order, motherboard, power supply, and memory chip (in a PC assembly process), itinerary and customer information record (in a trip reservation process), and passenger (in a transportation process). See also business object.
business item instance
A particular occurrence or example of a business item. If there is a business item called Invoice, then an example of a business item instance would be "Invoice #1473.
business item template
A category used to model a group of business items that share common properties. After these properties are defined in the template, they are inherited by all business items using the template. For example, an organization may define a number of forms to be used in human resource processes, all of which have fields for date, employee number, HR form number, and HR administrator.
business logic tier
The set of components that reside between the presentation and database tiers. This logic tier hosts the enterprise bean containers, which run the business logic.
business measure
A description of a performance management characteristic that you want to monitor. Business measures include instance metrics, aggregate metrics (also called measures), and key performance indicators (KPI).
business method
A method of an enterprise bean that implements the business logic or rules of an application. (Sun)
business object
In a development or production environment, a set of XML schema attributes that represents a business entity (such as an invoice) and the definition of actions that can be performed on those attributes (such as the create and update operations). See also data object, binding, business item, Service Data Objects, business graph, private business object.
business object map
An artifact that assigns values to the target business objects based on the values in the source business objects.
business object model
A model that defines the how a system organizes its processes when interacting with business objects. An example of a business object model is the Enterprise JavaBeans (EJB) component model.
business objective
A high-level business goal. Because business objectives are typically abstract, they are difficult to measure and are therefore translated into more measurable lower-level business goals.
business operations
The ways in which an organization operates, including its processes and organizational structure. For example, an organization might have a management structure and processes defined for everything from taking vacation days to submitting travel expenses.
business policy
A policy that is attached to an object in the ontology known as the business policy target. It optionally specifies a set of conditions that must be met for the business policy to apply. The policies declare a set of assertions that must be satisfied when the conditions are met.
business policy target
An object in the ontology suitable for attaching business policies.
business process
A defined set of business activities that represent the steps required to achieve a business objective. It includes the flow and use of information and resources.
business process container
A process engine that contains process modules.
Business Process Execution Language (BPEL)
An XML-based language for the formal specification of business processes and business interaction protocols. BPEL extends the Web Services interaction model and enables it to support business transactions.
business process management (BPM)
The services and tools that support process management (for example, process analysis, definition, execution, monitoring and administration), including support for human and application-level interaction. BPM tools can eliminate manual processes and automate the routing of requests between departments and applications.
Business Process Modeling Notation (BPMN)
A standardized graphical notation for creating diagrams of business processes.
business protocol
A set of rules and instructions (protocol) used to format and transmit information across a computer network. Examples include RosettaNet, cXML, and EDI-X12.
business rule
A representation of how business policies or practices apply to a business activity.
business rule group
A set of scheduled business rules that are available as a service that can be invoked. The business rule group also provides the organizational structure for managing the set of business rules.
business service
An abstract representation of a business function, hiding the specifics of the function interfaces.
business service definition
A representation of the WSDL PortTypes in a business service. A business service definition describes a specific set of business service operations that are used to perform related business functionality.
business service object
A representation of an XML schema file (.xsd). There are inline XML schemas and schema types within WSDL files. A business service object is a collection of business service object definitions and business service object templates.
business service object definition
A representation of the WSDL ComplexType in an inline schema, or the XML schema type (SimpleType, ComplexType, Anonymous ComplexType, or Anonymous SimpleType) in an XML schema file. There are inline XML schemas and schema types within WSDL files. A business service object definition is similar to a business item and is used to define the business data that is required when a business service operation is invoked.
business service operation
A representation of the WSDL Operation in a business service definition. A business service operation describes a business function and includes the business service object definitions that are required when the operation is invoked. A business service operation also describes the business service object definitions that result from completing the business service operation. For example, a Product Search business service operation requires a Product name (a business service object definition) and returns a Product business service object definition. Business service operations can be added to process diagrams as non-editable services.
business services network
A collection of business processes, services, subscribers, and policies that enable, control, or consume a portfolio of business services. The business services network can span enterprise boundaries and geographies or be confined to a single physical network or entity.
business situation
A condition that might require business action. Examples of business situations are a declining sales volume or an unacceptable amount of time to respond to a customer.
business space
A collection of related Web content that conveys insight into the business and gives users the ability to react to changes in the business.
business state machine
An application that models business processes as a sequence of discrete states. Conditional events move the business state machine from one state to another and actions run during these state transitions.
business-to-business (B2B)
Refers to Internet applications that exchange information or run transactions between businesses. See also business-to-consumer.
business-to-consumer (B2C)
Refers to the subset of Internet applications that exchange information or run transactions between businesses and consumers. See also business-to-business.
business-to-employee (B2E)
A business model that supports electronic communications between a business and its employees.
bytecode
Machine-independent code generated by the Java compiler and executed by the Java interpreter. (Sun)

C

C2A
See Click-to-Action.
CA
See certificate authority.
cache instance resource
A location where any Java Platform, Enterprise Edition (Java EE) application can store, distribute, and share data.
cache replication
The sharing of cache IDs, cache entries, and cache invalidations with other servers in the same replication domain.
cadence
The modulated and rhythmic recurrence of an audio signal. For example, a series of beeps or a series of rings.
call
A single runtime instance of a voice application.
call center
A central point at which all inbound calls are handled by a group of individuals on a controlled sequential basis. Call centers are usually a front end to a business such as airline ticketing or mail order.
call forwarding
The process of sending incoming calls to a different number.
call session
The sequence of events that occurs from the time a call is initiated to the time all activities related to answering and processing the call are completed.
call stack
A list of data elements that is constructed and maintained by the Java virtual machine (JVM) for a program to successfully call and return from a method.
call transfer
A series of actions that directs a call to another telephone number. See also dual-line call transfer.
callback handler
A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the Web service security run time for propagation in the Web service security header.
called party
Any person, device, or system that receives a telephone call. See also caller.
caller
Any person, device, or system that makes a telephone call. See also called party.
calling line identification presentation (CLIP)
An ISDN supplementary service that advises the called party of the caller's number: for example, by displaying it on a telephone display panel.
callout
The action of bringing a computer program, a routine, or a subroutine into effect.
callout node
The connection point in a mediation request flow from which a service message is sent to a target. There must be one callout node for each target operation.
callout response node
The starting point for a mediation response flow. There must be one callout response node for each target.
CallPath
Software that provides basic computer-telephony integration (CTI) enablement and comprehensive CTI functionality. This includes access to, and management of, inbound and outbound telecommunications.
candidate endpoint
A known service endpoint that implements an interface for a particular request. The set of candidates is then filtered by the dynamic assembler to select the best endpoint out of all the candidates.
capability
A group of functions and features that can be hidden or revealed to simplify the user interface. Capabilities can be enabled or disabled by changing preference settings, or they can be controlled through an administration interface.
capability list
A list of associated resources and their corresponding privileges per user.
card
WML document that provides user-interface and navigational settings to display content on mobile devices. See also deck.
cardinality
The number of elements in a set.
CAS
See channel associated signaling.
CAS tone
See Customer Premise Equipment Alerting Signal tone.
cascading resource
A resource that can be taken over by more than one node. A takeover priority is assigned to each configured cluster resource group on a per-node basis. In the event of a takeover, the node with the highest priority acquires the resource group. If that node is unavailable, the node with the next-highest priority acquires the resource group, and so on.
cascading style sheet (CSS)
A file that defines a hierarchical set of style rules for controlling the rendering of HTML or XML files in browsers, viewers, or in print.
catalog
A container that, depending on the container type, holds processes, data, resources, organizations, or reports in the project tree. See also data catalog.
catalog service
A service that controls placement of shards and discovers and monitors the health of containers.
category
A container used in a structure diagram to group elements based on a shared attribute or quality.
CBPDO
See Custom-built Product Delivery Option.
CBR
See content based routing.
CBS
See composite business service.
CBX
See computerized branch exchange.
CCD table
See consistent-change-data table.
CCITT
See Comité consultatif international télégraphique et téléphonique.
CCS
See common channel signaling.
CCSID
See coded character set identifier.
CD table
See change-data table.
CDD
See customization definition document.
CDP
See Customization Definition Program.
CEI
See Common Event Infrastructure.
CEI event
An event generated over the Common Event Infrastructure (CEI) and logged in a CEI data store.
CEI target
An application server or server cluster where the Common Event Infrastructure (CEI) server is enabled.
cell

1. A group of managed processes that are federated to the same deployment manager and can include high-availability core groups.

2. One or more processes that each host runtime components. Each has one or more named core groups.

cell-scoped binding
A binding scope where the binding is not specific to, and not associated with any node or server. This type of name binding is created under the persistent root context of a cell.
central office (CO)
A telephone switching system that connects customer-premise business and subscriber lines to other customer lines or trunks, both locally or remotely. A central office is located on the edge of the telephone service provider's network, rather than on a customer's premises.
central registry
A server's database that logs requests for licenses, upgrades for licenses, and journals all license activity in a tamper-proof auditable file. The central registry is a component of the License Use Management network topology.
centralized installation manager
A component that remotely installs and uninstalls product and maintenance packages in server environments.
CEPT
See Conference Europeenne des Administrations des Postes et Telecommunications.
certificate authority (CA)
A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also Secure Sockets Layer, Globus certificate service.
certificate revocation list (CRL)
A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.
certificate set
A set of primary and secondary certificates that can be associated to a participant connection.
certificate signing request (CSR)
An electronic message that an organization sends to a certificate authority (CA) in order to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key. See also keystore.
CGI
See Common Gateway Interface.
chain
The name of a channel framework connection that contains an endpoint definition.
chameleon schema
A schema that inherits a target namespace from a schema that includes the chameleon schema.
change basis version
The version of the server partition that changes were made against.
change management
The process of planning for and executing changes to configuration items in the information technology environment.
change record
A recorded instance that is created with each write action to the repository. The change record contains metadata about all repository changes (such as who was responsible for a commit action) and can be used as a version history view of the repository.
change-data table (CD table)
In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. See also consistent-change-data table.
channel

1. A communication path through a chain to an endpoint.

2. A link along which signals can be sent, such as the channel that handles the transfer of data between processor storage and local peripheral equipment. See also trunk.

3. A mode by which a business service is consumed by a subscriber.

4. An entry point to the Web services gateway that carries requests and responses between Web services and the gateway.

channel action
A business function that can be issued on a channel. Channel actions are role specific and an authorization policy makes it possible to control which role can perform which action in a channel.
channel associated signaling (CAS)
A method of communicating telephony supervisory or line signaling (on-hook and off-hook) and address signaling on T1 and E1 digital links. See also common channel signaling.
channel bank
A device that converts an analog line signal to a digital trunk signal.
channel framework
A common model for connection management, thread usage, channel management, and message access within an application server.
channel number
The identifying number assigned to a licensed channel on the T1 or E1 trunk that connects DirectTalk to the switch, channel bank, or channel service unit.
channel process

1. In WebSphere Voice Server, the system process that manages call flow.

2. The AIX process that executes the logic of the state table; each active caller session has one active channel process.

channel service unit (CSU)

1. A device used to connect a digital phone line to a multiplexer, a channel bank, or directly to another device producing a digital signal. A CSU performs certain line-conditioning and equalization functions, and responds to loopback commands sent from the central office (CO).

2. An American Telephone and Telegraph (AT&T) unit that is part of the AT&T nonswitched digital data system.

character conversion
The process of changing data from one character coding representation to another.
character encoding
The mapping from a character (a letter of the alphabet) to a numeric value in a character code set. For example, the ASCII character code set encodes the letter "A" as 65, while the EBCIDIC character set encodes this letter as 43. The character code set contains encodings for all characters in one or more language alphabets.
chart series
A selection of a category of data that will be represented by a chart in a report. A chart can have multiple chart series to represent multiple types of data.
chassis
The metal frame in which various electronic components are mounted.
cheat sheet
An interface that guides users through the wizards and steps required to perform a complex task, and that links to relevant sections of the online help.
check in
In certain software configuration management (SCM) systems, to copy files back into the repository after changing them.
check out
In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified.
child node
A node within the scope of another node.
CHP
See channel process.
CIC
See circuit identification code.
CICS
An IBM licensed program that provides online transaction-processing services and management for business applications.
CIP
See customized installation package.
cipher
A cryptographic algorithm used to encrypt data that is unreadable until converted into plain data with a predefined key.
circuit identification code (CIC)
A 12-bit number that identifies a trunk and channel on which a call is carried.
circular reference
A series of objects where the last object refers to the first object, which can cause the series of references to be unusable.
class
In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class. See also subclass, key class, Java class.
class file
A compiled Java source file.
class hierarchy
The relationships between classes that share a single inheritance.
class loader
Part of the Java virtual machine (JVM) that is responsible for finding and loading class files. A class loader affects the packaging of applications and the runtime behavior of packaged applications deployed on application servers.
class path
A list of directories and JAR files that contain resource files or Java classes that a program can load dynamically at run time.
classifier
A specialized attribute used for grouping and color-coding process elements.
cleanup period
The time period during which a database record that has reached its final state or condition is to remain in the database. After the cleanup period expires for such a record, database cleanup causes the record to be deleted from the database.
clear message
A message displayed by DirectTalk to tell the operator that a red or yellow error message has been cleared.
CLI
See command-line interface.
Click-to-Action (C2A)
A method for implementing cooperative portlets, whereby users can click an icon on a source portlet to transfer data to one or more target portlets. See also cooperative portlets, wire.
client
A software program or computer that requests services from a server. See also server, host.
client application
An application, running on a workstation and linked to a client, that gives the application access to queuing services on a server.
client message
A message from a client application that is to be sent by means of a network to its destination, or a message that is routed to a client application to acknowledge the receipt of a client message by a network.
client node
In a single system image (SSI), a WebSphere Voice Response system that handles interactions with callers. A client node must have a telephony connection. It does not store application or voice data; it gets data from the server node of the SSI.
client proxy
An object on the client side of a network connection that provides a remote procedure call interface to a service on the server side.
client type detection
A process in which a servlet determines the markup language type required by a client and calls the appropriate JavaServer Pages file.
client/server
Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server. See also distributed application.
CLIP
See calling line identification presentation.
cluster

1. A group of application servers that collaborate for the purposes of workload balancing and failover.

2. In high-availability cluster multiprocessing (HACMP), a set of independent systems (called nodes) that are organized into a network for the purpose of sharing resources and communicating with each other.

cluster configuration
User definition of all cluster components. Component information is stored in the ODM. Components include cluster name and ID, and information about member nodes, adapters, and network modules.
CMP
See container-managed persistence.
CO

1. See central office.

2. See configuration object.

COA report
See confirm-on-arrival report.
coarse-grained
Pertaining to viewing a group of objects from an abstract or high level. See also fine-grained.
cobrowsing
The interaction of multiple users sharing information about their individual Web interactions. With this interaction users can share a view of the same Web page simultaneously and share further interactions with the Web page they are jointly viewing.
COD report
See confirm-on-delivery report.
code assist
See content assist.
code list
A table, supplied by Data Interchange Services or defined by the user, that contains all acceptable values for a single data field.
codec
A technology that compresses and decompresses data for the purpose of reducing the bandwidth required to send streaming data.
coded character set identifier (CCSID)
A 16-bit number that includes a specific set of encoding scheme identifiers, character set identifiers, code page identifiers, and other information that uniquely identifies the coded graphic-character representation.
coexistence
The ability of two or more entities to function in the same system or network.
coherent cache
Cache that maintains integrity so that all clients see the same data.
cold start
The process of starting an existing data replication configuration without regard for prior replication activity, causing reinitialization of all subscriptions.
collaboration
The ability to connect customers, employees, or business partners to the people and processes in a business or organization, in order to facilitate improved decision-making. Collaboration involves two or more individuals with complementary skills interacting together to resolve a business problem.
collaborative components
UI-neutral API methods and tag libraries that allow developers to add IBM Lotus collaborative functionality to their portlets.
collaborative filtering
Personalization technology that calculates the similarity between users based on the behaviors of a number of other people and uses that information to make recommendations for the current user.
collaborative portal
A highly personalized desktop-to-Web tool designed for specific audiences and communities of users that organizes information, applications, and services for effective community building at the corporate level and for personal use by individuals.
collaborative unit
The configuration of the part of a deployment environment that delivers required behavior to an application module. For example, a messaging collaborative unit includes the host of the messaging engine and deployment targets of the application module, and provides messaging support to the application module.
collection certificate store
A collection of intermediate certificates or certificate revocation lists (CRL) that are used by a certificate path to build up a certificate chain for validation.
collection page
A type of page in the administrative console that displays a collection list of administrative objects. From this type of page, you can typically select objects to act on or to display other pages for.
Comitato Elettrotechnico Italiano
The Italian standards organization responsible for signaling protocols.
Comité consultatif international télégraphique et téléphonique (CCITT)
See International Telecommunication Union Telecommunication Standardization Sector.
comma delimited file
A file whose records contain fields that are separated by a comma.
command bean
A proxy that can invoke a single operation using an execute() method.
command line
The blank line on a display where commands, option numbers, or selections can be entered.
command-line interface (CLI)
A type of computer interface in which the input command is a string of text characters.
commit
To apply all the changes made during the current unit of recovery (UR) or unit of work (UOW). After the operation is complete, a new UR or UOW can begin.
common area
In a Web page that is based on a page template, the fixed region of the page.
Common Base Event
A specification based on XML that defines a mechanism for managing events, such as logging, tracing, management, and business events, in business enterprise applications. See also situation.
common channel signaling (CCS)
A method of communicating telephony information and line signaling events (for example, call setup and call clearing) on a dedicated signaling channel. See also channel associated signaling.
Common Criteria
A framework for independent assessment, analysis, and testing of IT products to a set of security requirements.
Common Event Infrastructure (CEI)
The implementation of a set of APIs and infrastructure for the creation, transmission, persistence, and distribution of business, system, and network Common Base Events. See also event emitter.
Common Gateway Interface (CGI)
An Internet standard for defining scripts that pass information from a Web server to an application program, through an HTTP request, and vice versa.
Common Object Request Broker Architecture (CORBA)
An architecture and a specification for distributed object-oriented computing that separates client and server programs with a formal interface definition. See also Internet Inter-ORB Protocol.
Common Secure Interoperability Version 2
An authentication protocol developed by the Object Management Group (OMG) that supports interoperability, authentication delegation and privileges.
communications enabled application
A software application that uses an IP network and communications technology to accomplish business objectives. Enterprise applications can be communications enabled with Web telephony components and collaborative Web services that allow users to dynamically interact through shared browser sessions over a secure network.
community manager
See internal partner.
community operator
The service provider who has a restricted set of typical day-to-day administrative responsibilities for the hub.
compensation
The means by which operations in a process that have successfully completed can be undone if an error occurs, to return the system to a consistent state.
compensation service
The operation that is performed to compensate for a successful operation when a process generates a fault (which is not handled within the process).
compilation unit
A portion of a computer program sufficiently complete to be compiled correctly.
compile time
The time period during which a computer program is being compiled into an executable program.
compiled grammar file
A grammar in binary format, built by the WebSphere Voice Server grammar development tools.
complete life-cycle server
A server that the user can create and manage within the administrative console.
complex change
A single operation that impacts one or more ontologies and spans multiple repository versions. Examples of a complex change are ontology content pack (OCP) imports and ontology deletions.
complex type
A type that contains elements and can include attributes. See also simple type.
component

1. A reusable object or program that performs a specific function and works with other components and applications.

2. In Eclipse, one or more plug-ins that work together to deliver a discrete set of functions.

component element
An entity in a component where a breakpoint can be set, such as an activity or Java snippet in a business process, or a mediation primitive or node in a mediation flow.
component instance
A running component that can be running in parallel with other instances of the same component.
component test
An automated test of one or more components of an enterprise application, which may include Java classes, EJB beans, or Web services. See also abstract test, test pattern.
composer
In Java, a class used to map a single complex bean field to multiple database columns. Composition is needed for complex fields that are themselves objects with fields and behavior.
composite
A Service Component Architecture (SCA) element that contains components, services, references, and wires that connect them.
composite business policy
A runtime aggregation of business policies based on context, content and contract of a service request.
composite business service (CBS)
A collection of business services that work together, along with the existing applications of a client, to provide a specific business solution.
composite service
In service-oriented architecture, a unit of work accomplished by an interaction between computing devices.
composite state
In a business state machine, an aggregate of one or more states that is used to decompose a complex state machine diagram into a simple hierarchy of state machines.
composition unit
A unit that represents a configured asset and enables the asset contents to interact with other assets in the application.
compound element
An item in the source or target document that contains child items, such as EDI Segments and EDI composite data elements, ROD records and ROD structures in record oriented data, and XML elements.
compound license
In License Use Management, a type of license that allows a system administrator to generate license passwords for a given number of licenses. Such a license is valuable when an administrator needs a certain number of licenses, but does not yet know what machines or who will use them.
computer-telephony integration (CTI)
The use of a general-purpose computer to issue commands to a telephone switch to transfer calls and provide other services. Typically, CTI is used in call centers.
computerized branch exchange (CBX)
A computer-driven, digital communications controller providing telephone communication between internal stations and external networks.
concept
A class of entities that are represented by general metadata definitions rather than physical document standards.
concrete portlet
A logical representation of a portlet object distinguished by a unique configuration parameter (PortletSettings).
concrete type
A type that can be instantiated and is derived from an abstract type.
concurrency control
The management of contention for data resources.
Concurrent Versions System (CVS)
An open-source, network-transparent version control system.
condition

1. A test of a situation or state that must be in place in order for a specific action to occur.

2. In a business state machine, an expression that guards the transition and only allows the transition to the next state when and if the incoming operation evaluates to 'True'. Otherwise, the current state is maintained.

Conference Europeenne des Administrations des Postes et Telecommunications (CEPT)
European Conference of Postal and Telecommunications Administration.
configuration administration
The administration of the configuration object types (CTs), configuration objects (COs), and configuration object sets (COSs) that comprise the configuration data of organizational units (OUs). This is carried out after the product has been installed and customized.
configuration database
The Data Interchange Services client database that stores parameters necessary for running Data Interchange Services client, including database definitions, messages, queries, and preferences.
configuration entity
Entities used to model an organization and to specify how messages are processed. These entities include configuration object types (CTs), organizational units (OUs), configuration object sets (COSs), configuration objects (COs).
configuration file
See parameter file.
configuration object (CO)
An instance of a configuration object type (CT) that represents an object in an organizational unit (OU). Which attributes can be added to a CO is determined by the definition of the CT on which the CO is based.
configuration object set (COS)
A set of configuration objects, used to limit the scope of configuration data provided to message flows.
configuration object type (CT)
A description of the class of configuration objects, including the attributes that each member of this class can have.
configuration parameter
A variable that controls the behavior of the system or the behavior of all applications running on the system. See also parameter file.
configuration repository
A storage area of configuration data that is typically located in a subdirectory of the product installation root directory.
configured name binding
Persistent storage of an object in the name space that is created using either the administrative console or the wsadmin program.
confirm-on-arrival report (COA report)
A WebSphere MQ report message type created when a message is placed on that queue. It is created by the queue manager that owns the destination queue.
confirm-on-delivery report (COD report)
A WebSphere MQ report message type created when an application retrieves a message from the queue in a way that causes the message to be deleted from the queue. It is created by the queue manager.
conflict
A result that occurs when two simultaneous edit submissions are processed for the same object and where the intended outcome of the edit is unclear.
connection
A link between two process elements. Connections can be used to specify the chronological sequence of activities in a process.
connection factory
A set of configuration values that produces connections that enable a Java EE component to access a resource. Connection factories provide on-demand connections from an application to an enterprise information system (EIS) and allow an application server to enroll the EIS in a distributed transaction.
connection handle
A representation of a connection to a server resource.
connection pool
A group of host connections that are maintained in an initialized state, ready to be used without having to create and initialize them.
connection pooling
A technique used for establishing a pool of resource connections that applications can share on an application server.
connectivity
The capability of a system or device to be attached to other systems or devices without modification.
connector

1. A servlet that provides a portlet access to external sources of content, for example, a news feed from a Web site of a local television station.

2. In Java EE, a standard extension mechanism for containers to provide connectivity to enterprise information systems (EISs). A connector consists of a resource adapter and application development tools (Sun). See also container.

connector packet
The set of data that is passed between the event processing server (runtime server) and external systems using the technology connectors. See also event packet, action packet.
consistent-change-data table (CCD table)
In data replication, a type of replication target table that is used for storing history, auditing data, or staging data. A CCD table can also be a replication source. See also change-data table.
constraint
A rule that limits the values that can be inserted, deleted, or updated in a table. See also primary key, foreign key.
container
An entity that provides life-cycle management, security, deployment, and runtime services to components. (Sun) See also resource adapter, connector.
container server
A server instance that can host multiple shards. One Java virtual machine (JVM) can host multiple container servers.
container transaction
See container-managed transaction.
container window
A window that lists the names of all existing objects of the same type.
container-managed persistence (CMP)
The mechanism whereby data transfer between an entity bean's variables and a resource manager is managed by the entity bean's container. (Sun) See also bean-managed persistence.
container-managed transaction
A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions. (Sun)
containment hierarchy
A namespace hierarchy consisting of model elements, and the containment relationships that exist between them. A containment hierarchy forms an acyclic graph.
containment relationship
A relationship between two objects where one object is contained within the other. The destination is nested within the source.
content
The data semantics of a message that is received by the dynamic assembler.
content area
In a Web page that is based on a page template, the editable region of the page.
content assist
A feature of some source editors that prompts the user with a list of valid alternatives for completing the current line of code or input field.
content based routing (CBR)
An optional feature of the caching proxy that provides intelligent routing to back-end application servers. This routing is based on HTTP session affinity and a weighted round-robin algorithm.
content management
Software designed to help businesses manage and distribute content from diverse sources.
content model
The representation of any data that may be contained inside an XML element. There are four kinds of content models: element content, mixed content, EMPTY content and ANY content.
content partner
See IBM content partner.
content provider
A source for content that can be incorporated into a portal page as a portlet.
content spot
A class file that is added to a JSP file to designate display of personalized data or content. Each content spot has a name and will accept a specific type of data from a rule.
contention
A situation in which a transaction attempts to lock a row or table that is already locked.
context

1. A set of one or more grammars that are enabled and used during a recognition action.

2. An object created for a service request in the business service model. The object contains one or more of the following details of information captured from the metadata: a business process, organization, role, channel, and domain specific information. See also context propagation.

context name
The name given to a context in a context profile used for WebSphere Voice Server.
context parameter
A definition of the server view of the Web application within which the servlet is running and supports servlet access to available resources.
context profile
Describes to the WebSphere Voice Server process which contexts should be loaded into an engine. A DirectTalk for Windows application specifies which context profiles to load into the engine it has reserved.
context propagation
In a multiple service transaction, the information about the details of a service request that passes from one invocation to another via the message header. See also context.
context root
The Web application root, which is the top-level directory of an application when it is deployed to a Web server.
context type
Indicates to the recognition engine how to interpret the grammar file. Possible types are: VOCAB_FILE, GRAMMAR_FILE, TEXT, MNR_FILE, MNR, PERSONAL_FILE, PERSONAL_WDS, BASEFORM_FILE.
continuous speech recognition
Recognition of words spoken in a continuous stream. Unlike isolated or discrete word recognition, users do not have to pause between words. See also discrete word recognition, speech recognition.
contract
The set of business policy assertions that have to be met by service provider at run time based on the context and content.
contribution
The primary asset that can contain Service Component Definition Language (SCDL) with composite definitions, as well as artifacts such as Java classes and Web Services Description Language (WSDL) and XML Schema Definitions (XSD).
control
See widget.
control analysis
A type of analysis that displays variations in values of the business measures over a specific period of time. This type of analysis reduces data variation, and is often used for quality control. Allowable variation is three times the standard deviation of the data.
control link
An object in a process that links nodes and determines the order in which they run.
control number
A number that is used to identify an interchange, group, or EDI document.
control region adjunct
A servant that interfaces with service integration busses to provide messaging services.
control string
One of several compiled objects, which consist primarily of map control strings and document definition control strings.
control structure
The beginning and ending segments (header and trailer) of EDI-enveloped documents.
controller
A component or a set of virtual storage processes that schedules or manages shared resources.
conversation
See speech recognition session.
conversational processing
An optional IMS facility with which an application program can accumulate information acquired through multiple interchanges with a terminal, even if the program stops between interchanges. See also IMS conversation, conversation.
converter
In Enterprise JavaBeans (EJB) programming, a class that translates a database representation to an object type and back.
cooperative portlets
Two or more portlets on the same Web page that interact by sharing information. See also Click-to-Action, wire.
Coordinated Universal Time (UTC)
The international standard of time that is kept by atomic clocks around the world.
copy helper
An access bean that contains a local copy of attributes from a remote entity bean. Unlike bean wrappers, copy helpers are optimized for use with a single instance of an entity bean.
CORBA
See Common Object Request Broker Architecture.
core group
A group of processes that is directly accessible to each other and is connected using a local area network (LAN).
core group access point
A definition of a set of servers that provides access to the core group.
core group bridge
The means by which core groups communicate.
core group member
A server included in the cluster of a core group.
correlation

1. A mechanism that bridges a point in a process flow between two or more process instances.

2. A record used with business processes and state machines to allow two partners to initialize a transaction, temporarily suspend an activity, and then recognize each other again when that activity resumes.

3. The relationship, captured in a correlation expression, that describes how an incoming event is matched with one or more monitoring context instances to which it will be delivered.

correlation property
Data in an event that the runtime server uses to determine which instance of a task, process, or business state machine should receive the input at run time.
correspondent
An institution to which your institution sends and from which it receives messages.
COS
See configuration object set.
cost
A number that is used as a weighting mechanism to differentiate one resource from another where a smaller value is always preferred.
counter
A specialized metric used to keep track of the number of occurrences of a specific situation or event. For example, you can use a counter to track the number of times that a task is started within a process, where that task is contained in a loop.
coupling
The dependency that components have on one another.
CPE
See customer premises equipment.
create method
In enterprise beans, a method defined in the home interface and invoked by a client to create an enterprise bean. (Sun) See also home interface.
credential
In the Java Authentication and Authorization Service (JAAS) framework, a subject class that owns security-related attributes. These attributes can contain information used to authenticate the subject to new services.
critical path
The processing path that takes the longest time to complete of all parallel paths in a process instance, where each path considered begins at a start node or an input to the process and ends at a terminate node.
CRL
See certificate revocation list.
cross-cell communication
The process of information sharing and request routing between cells.
cross-cell environment
A production environment in which one or more servers in one cell can receive events from another server or set of servers in another cell.
cross-cutting concern
A software concern (synchronization, logging, memory allocation, and so forth) that is external and orthogonal to the problem that a software component is designed to address.
cryptographic token
A logical view of a hardware device that performs cryptographic functions and stores cryptographic keys, certificates, and user data.
CSR
See certificate signing request.
CSS
See cascading style sheet.
CSU
See channel service unit.
CSV file
A comma-separated value text file, commonly used to exchange files between database systems that use different formats.
CT
See configuration object type.
CTI
See computer-telephony integration.
cube
A multidimensional representation of data needed for online analytical processing, multidimensional reporting, or multidimensional planning applications.
current customization definition
A customization definition that describes an instance for which the corresponding resources have already been deployed and are running.
custom action

1. A Java or non-Java process definition that you can define as a part of a health policy action plan.

2. In JSP programming, an action described in a portable manner by a tag library descriptor and a collection of Java classes and imported into a JSP page by a taglib directive. (Sun)

custom finder
See finder method.
custom profile
A profile that describes an empty node, which becomes operational, as a managed node, when federated into a network deployment cell.
custom relationship
An association between two or more data entities as provided by the user.
custom screen record
A run-time view of the screen that allows access to available screen fields.
custom server
A C language or C++ language program that provides data manipulation and local or remote data stream, database, or other services beyond those provided by the state table interface. Custom servers provide an interface between DirectTalk and business applications, functions, or other processes to give callers access to business information and voice processing functions such as speech recognition. See also 3270 server.
custom service
A configurable service that defines a hook that runs when the server starts and shuts down when the server stops.
custom tag
An extension to the JavaServer Pages (JSP) language that performs a specialized task. Custom tags are typically distributed in the form of a tag library, which also contains the Java classes that implement the tags.
custom user registry
A customer-implemented user registry that implements the UserRegistry Java interface. This registry type can support virtually any kind of accounts repository from a relational database and can provide flexibility in adapting product security to various environments.
Custom-built Product Delivery Option (CBPDO)
A software delivery package consisting of uninstalled products and unintegrated service. Installation requires the use of SMP/E. CBPDO is one of the two entitled methods for installing z/OS; the other method is ServerPac.
Customer Premise Equipment Alerting Signal tone (CAS tone)
In ADSI, this tone is sent to the ADSI telephone to switch the phone to data mode.
customer premises equipment (CPE)
Telephony equipment which is on the premises of a business or domestic customer of the telephone company. An example is a private branch exchange (PBX).
customization definition document (CDD)
An XML document that describes the layout of an instance (that is, its organizational units (OUs) and servers, and which service bundles are assigned to each server-OU combination). The Customization Definition Program (CDP) uses a CDD to determine which deployment data to produce for an instance.
Customization Definition Program (CDP)
A program used to generate deployment data based on information contained in a customization definition document (CDD). It also generates reports that describe the resulting instance.
customization definition report
A report that describes the servers, organizational units (OUs), and services of an instance, and how they are distributed within the instance.
customization time data
See build time data.
customized installation package (CIP)
A customized installation image that can include one or more maintenance packages, a configuration archive file from a stand-alone server profile, one or more enterprise archive files, scripts, and other files that help customize the resulting installation.
customizer
A Java class (implementing the java.beans.Customizer interface) that is associated with a bean to provide a richer user interface for the properties of that bean.
cut-through channel
A channel of voice data which has been passed through echo cancellation algorithms. The channel provides echo-cancelled voice data which can then be used by the engine in a recognition attempt.
CVS
See Concurrent Versions System.
cycle time
The time required for a process instance in a process simulation run to finish processing its inputs. Cycle time includes idle time when an activity in the process is waiting for a resource to become available.

D

D-channel
See delta channel.
D-channel backup (DCBU)
An ISDN NFAS configuration where two of the T1 facilities have a D-channel, one of which is used for signaling, and the other as a backup in case the other fails. See also non-facility-associated signaling.
DAD
See document access definition.
DAD script
A file that is used by the DB2 XML Extender, either to compose XML documents from existing DB2 data or to decompose XML documents into DB2 data.
DADX
See document access definition extension.
DADX group
A folder that contains database connection (JDBC and JNDI) and other information that is shared between DADX files within the group.
DADX runtime environment
The DADX runtime environment provides information to the DADX Web service, including the HTTP GET and POST bindings, the test page, WSDL generation, and the translation of DTD data into XML schema data.
daemon
A program that runs unattended to perform continuous or periodic functions, such as network control.
dashboard
A Web page that can contain one or more viewers that graphically represent business data.
data access bean
A class library that provides a rich set of features and functions, while hiding the complexity associated with accessing relational databases.
data binding
A component that converts protocol-specific local data to and from a business object.
data catalog
A collection of models representing objects, such as business items and notifications, to be used as inputs and outputs in process modeling. See also catalog.
data class
An access bean that provides data storage and access methods for caching enterprise bean properties. Unlike copy helpers, data class access beans work with enterprise beans that have local client views as well as remote client views.
data definition
A data object that defines a database or table.
Data Definition Language (DDL)
A language for describing data and its relationships in a database.
data dictionary
A grouping of logically related components of a particular syntax type, such as ROD dictionaries, EDI dictionaries, and XML dictionaries.
data element delimiter
A character, such as an asterisk (*), that follows the EDI segment identifier and separates each EDI data element in an EDI segment. See also segment ID separator.
Data Encryption Standard (DES)
A cryptographic algorithm designed to encrypt and decrypt data using a private key.
Data Exchange SPI architecture (DESPI)
The interface that resource adapters and runtime components use to exchange business object data. The Data Exchange SPI architecture, which is based on the concept of cursors and accessors, abstracts the data type so that an adapter can be written only once and then work on runtime environments that support different data types, such as data objects and JavaBeans.
data graph
A set of Service Data Objects (SDO) interconnected with relationships.
data grid
A system for accessing terabytes or petrabytes of data.
data handler
A Java class or library of classes that a process uses to transform data into and from specific formats. In the WebSphere business integration environment, data handlers transform text data of specified formats into business objects, and transform business objects into text data of specified formats.
Data Interchange Services client (DIS client)
The Data Interchange Services tool used to document metadata and map documents to one another.
Data Interchange Services database
The database that contains all Data Interchange Services objects.
Data Interchange Services translator
The Data Interchange Services component responsible for transforming a document from one format to another.
data model
A model defining the structure of business artifacts that are operated upon by business operations.
data object
Any object (such as tables, views, indexes, functions, triggers, and packages) that can be created or manipulated using SQL statements. See also business object.
data object filter
A control that allows the exclusion of data objects (such as tables and schemas) from the tree view of the database.
data source

1. A repository of data (for example, a DB2 database) to which the runtime server can connect and retrieve data in order to enhance the event being processed.

2. In JDBC, an interface that provides a logical representation of a pool of connections to a physical data source. Data source objects provide application portability by making it unnecessary to supply information specific to a particular database driver.

3. The means by which an application accesses data from a database.

data store
A place (such as a database system, file, or directory) where data is stored.
data store profile
An object that defines properties used by the default data store plug-in, which is used to persistently store events received by the event server.
Data Transformation Framework (DTF)
An infrastructure that includes data bindings and function selectors, which enables an adapter to convert native data formats to business objects and to convert business objects back to native data formats, such as XML.
data transformation map
A set of mapping instructions that describes how to translate data from a source document into a target document. Both the source and target documents can be one of several supported document types. A data transformation map is one of three supported map types.
Data Universal Numbering System (DUNS)
A system in which internationally recognized nine-digit numbers are assigned and maintained by Dun & Bradstreet to uniquely identify worldwide businesses. See also partner profile.
database cleanup
The act of deleting from a database those records for which the cleanup period has expired.
database definition
A Data Interchange Services definition that contains information used by Data Interchange Services Client to connect to a database.
database management system (DBMS)
See database manager.
database manager
A program that manages data by providing centralized control, data independence, and complex physical structures for efficient access, integrity, recovery, concurrency control, privacy, and security.
database request module (DBRM)
A data set member that is created by the DB2 for z/OS precompiler and that contains information about SQL statements. DBRMs are used in the bind process.
database server node
In a single system image (SSI), a DirectTalk system that contains the DirectTalk DB2 database. This is usually the same node as the voice server node.
datagram
A form of asynchronous messaging in which an application sends a message, but does not require a response. See also request/reply, datagram.
DB2
A family of IBM licensed programs for relational database management.
DB2 XML Extender
A program that is used to store and manage XML documents in DB2 tables. Well-formed and validated XML documents can be generated from existing relational data, stored as column data, and the content of XML elements and attributes can be stored in DB2 tables.
DBMS
See database management system.
DBRM
See database request module.
DCBU
See D-channel backup.
DDI
See direct dial in.
DDL
See Data Definition Language.
DDS1
See Digital Subscriber signaling System Number 1.
de-envelope
To extract a document from an EDI envelope.
dead-letter queue
A queue to which a queue manager or application sends messages that cannot be delivered to their correct destination.
deadlock
A condition in which two independent threads of control are blocked, each waiting for the other to take some action. Deadlock often arises from adding synchronization mechanisms to avoid race conditions.
debug engine
The server component of the debugger, whose client/server design enables both local and remote debugging. The debug engine runs on the same system as the program being debugged.
debugger
A tool used to detect and trace errors in computer programs.
debugging session
The debugging activities that occur between the time that a developer starts a debugger and the time that the developer exits from it.
decimal notation
In an EDI Standard, the character that represents a decimal point.
decision
A process element that routes an input to one of several alternative outgoing paths, depending on its condition. A decision is like a question that determines the exact set of activities during the execution of a process. Questions might include: What type of order? Or How will the order be shipped?
decision table
A form of business rule that captures multi-conditional decision-making business logic in a table where the rows and columns intersect to determine the appropriate action. See also rule set.
deck
An XML document that contains a collection of WML cards. See also card.
declaration
In Java programming, a statement that establishes an identifier and associates attributes with it, without necessarily reserving its storage or providing the implementation. (Sun)
declarative security
The security configuration of an application during assembly stage that is defined in the deployment descriptors and enforced by the security run time.
decoration
In graphical user interfaces (GUIs), a glyph that annotates a resource with status information, for example to indicate that a file has changed since it was last saved or checked out of a repository.
default portal page
The page that displays to a user at initial portal deployment and before the user completes enrollment. Sometimes used as a synonym for home page.
default public place
A place whose membership automatically includes all portal users and which appears in the Places selector for every user. A user is always a member of this place.
definition file
Defines the content that is displayed within the navigation and workarea frames.
delay start
A procedure used with some channel associated signaling protocols to indicate when a switch or PABX is ready to accept address signaling. After seizure, the switch sends off-hook until it's ready to accept address signaling, at which time it sends on-hook. See also immediate start, wink start.
delegation
The process of propagating a security identity from a caller to a called object. According to the Java Platform, Enterprise Edition (Java EE) specification, a servlet and an enterprise bean can propagate either the client identity when invoking enterprise beans, or can use another specified identity as indicated in the corresponding deployment descriptor.
delimited text
A simple file format that consists of text separated into meaningful chunks by specific characters. The chunks of text are typically individual fields. The specific character is called a delimiter, and can be any character that is not found in the text. Comma and tab are common delimiters. If the delimiter is used as a character in the text, it must be enclosed by a pair of text qualifiers, usually double quotation marks.
delimiter
A character, such as comma or tab, used to group or separate units of text by marking the boundary between them.
delta business object
A business object used in an update operation. Such a business object contains only key values and the values to be changed. See also after-image.
delta channel (D-channel)
In ISDN, a common channel used for signaling and management of the network. In a basic rate interface, the D-channel operates at 16 kilobits per second. In a primary rate interface, the D-channel operates at 64 kilobits per second. See also bearer channel.
delta deployment
Deployment of only that data that is required to transform a current runtime environment into a target runtime environment. See also full deployment.
demilitarized zone (DMZ)
A configuration that includes multiple firewalls to add layers of protection between a corporate intranet and a public network, such as the Internet.
denial-of-service attack (DoS)
In computer security, an assault on a network that brings down one or more hosts on a network such that the host is unable to perform its functions properly. Network service is interrupted for some period.
dependency
A requirement that one managed resource has on another managed resource in order to operate correctly.
dependency relationship
In UML modeling, a relationship in which changes to one model element (the supplier) impact another model element (the client).
deploy

1. To place files or install software into an operational environment. In Java Platform, Enterprise Edition (Java EE), this involves creating a deployment descriptor suitable to the type of application that is being deployed.

2. To transfer assets from a local development environment into an operational, or runtime, environment.

deploy phase
See deployment phase.
deployment code
Additional code that enables bean implementation code written by an application developer to work in a particular EJB runtime environment. Deployment code can be generated by tools that the application server vendor supplies.
deployment data
The resource files, generated during customization, that are used to create the resources for an instance.
deployment data set
A data set containing the resource files generated during customization.
deployment descriptor
An XML file that describes how to deploy a module or application by specifying configuration and container options. For example, an EJB deployment descriptor passes information to an EJB container about how to manage and control an enterprise bean.
deployment directory

1. The directory containing the subdirectories and resource files created during customization.

2. The directory where the published server configuration and Web application are located on the machine where the application server is installed.

deployment environment
A collection of configured clusters, servers, and middleware that collaborate to provide an environment to host software modules. For example, a deployment environment might include a host for message destinations, a processor or sorter of business events, and administrative programs.
deployment instruction
A set of instructions that describe how to execute the resource files, and deploy, on the runtime systems, the resources required by the instance.
deployment manager
A server that manages operations for a logical group or cell of other servers.
deployment phase
A phase that includes a combination of creating the hosting environment for your applications and the deployment of those applications. This includes resolving the application's resource dependencies, operational conditions, capacity requirements, and integrity and access constraints.
deployment policy
An optional way to configure an eXtreme Scale environment based on various items, including: number of systems, servers, partitions, replicas (including type of replica), and heap sizes for each server.
deployment topology
The configuration of servers and clusters in a deployment environment and the physical and logical relationships among them.
deployment vehicle
A job or other executable file that is used to deploy resources. Each vehicle corresponds to a particular resource file.
deprecated
Pertaining to an entity, such as a programming element or feature, that is supported but no longer recommended and that might become obsolete.
DER
See distinguished encoding rules.
Derby
An embeddable, all Java, object-relational database management system (ORDBMS).
derivation
In object-oriented programming, the refinement or extension of one class from another.
derived event
See synthetic event.
DES
See Data Encryption Standard.
deserialization
A method for converting a serialized variable into object data. See also serializer.
DESPI
See Data Exchange SPI architecture.
destination
An exit point that is used to deliver documents to a back-end system or a trading partner.
destination point code (DPC)
A code that identifies the signaling point to which an MTP signal unit is destined. Unique within a particular network.
development system
A DirectTalk system that is not used to respond to or make 'live' calls; it is used only to develop and test applications. See also production system.
device input format (DIF)
The Message Format Service (MFS) control block that describes the format of the data that is entered on the device and presented to MFS. See also Message Format Service control block.
device output format (DOF)
The Message Format Service (MFS) control block that describes the format of the output data that is presented to the device. See also Message Format Service control block.
dial
To initiate a telephone call. In telecommunication, this action is performed to establish a connection between a terminal and a telecommunication device over a switched line.
dial by name
To press the keys that correspond to subscribers' names rather than their telephone numbers or extensions.
dial tone
An audible signal (call progress tone) that indicates that a device such as a PABX or central office switch is ready to accept address information (DTMF or dial pulses).
dialed number identification service (DNIS)
In telephony, a number supplied by the public telephone network to identify a logical called party. For example, two 800 numbers might both be translated to a single real telephone number. The DNIS is sent when the real telephone number is called to allow end users to distinguish which service is being called when a call arrives to the real number.
dialog
The recorded interaction between a user and the 3270 application that the user accesses. Users can record a dialog using the Record Dialog function in the 3270 terminal service recorder. A recorded dialog includes the keystrokes, inputs and outputs that move the user from one screen to another in the 3270 application.
dialog box
A secondary window that solicits user input for a specific task or subtask. Common examples are the Print and Save As dialog boxes. Dialog boxes are modal; that is, they must be closed before the user can continue working in the window that launched the dialog box.
dialog editor
A 3270 terminal service development tool that enables a developer to modify the dialog that was recorded with the 3270 terminal service recorder.
dialog file
The result of recording a dialog from the 3270 terminal service recorder. The dialog file is saved to a WSDL file in the workbench.
dictionary
A grouping of logically related components of a particular syntax type, such as ROD dictionaries, EDI dictionaries, and XML dictionaries.
DID
See direct inward dialing.
DIF
See device input format.
digest code
A number that is the result of a message digest function or a secure hash algorithm distilling a document.
digital certificate
An electronic document used to identify an individual, a system, a server, a company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certification authority and is digitally signed by that authority.
digital signal processing (DSP)
A set of algorithms and procedures used to process electronic signals after their conversion to digital format. Due to the specific mathematical models required to perform this processing, specialized processors are generally used.
digital signature
Information that is encrypted with a private key and is appended to a message or object to assure the recipient of the authenticity and integrity of the message or object. The digital signature proves that the message or object was signed by the entity that owns, or has access to, the private key or shared-secret symmetric key.
digital signature algorithm (DSA)
A security protocol that uses a pair of keys (one public and one private) and a one-way encryption algorithm to provide a robust way of authenticating users and systems. If a public key can successfully decrypt a digital signature, a user can be sure that the signature was encrypted using the private key.
Digital Subscriber signaling System Number 1 (DDS1)
A signaling protocol used between ISDN subscriber equipment and the network. Carried on the ISDN D-channel. ITU-T recommendations Q.920 to Q.940 describe this protocol.
Digital Trunk Quad Adapter (DTQA)
An adapter to complete the connection to four packs in a Multiple Digital Trunk Processor.
dimension
A data category that is used to organize and select monitoring context instances for reporting and analysis. Examples of dimensions are time, accounts, products, and markets.
dimension level
An element or subelement of a dimension that is arranged hierarchically. For example, the time dimension can have years, months, and days as its levels.
dimensional model
The part of the monitor model that defines the cubes and cube content that are used for storing, retrieving, and analyzing the data that is gathered over time.
diphone
A transitional phase from one sound to the next, used as a building block for speech synthesis. There are typically between one thousand and two thousand diphones in any national language.
direct dial in (DDI)
See direct inward dialing.
direct inward dialing (DID)
A service that allows outside parties to call directly to an extension of a PABX. Known in Europe as direct dial in (DDI).
direct speech recognition
Identification of words from spoken input read directly from the telephony channel. See also indirect speech recognition.
directive
A first-failure data capture (FFDC) construct that provides information and suggested actions to assist a diagnostic module in customizing the logged data.
DirectTalk
A voice processing system, bringing together telephone and data communications networks to use information stored in databases directly from a telephone.
DirectTalk bean
One of the DirectTalk Beans that provides access from a voice application to simple call control functions: waiting for a call, making an outgoing call, handing a call over to another application, and returning a call when finished.
DirectTalkMail
See Message Center.
dirty read
A read request that does not involve any locking mechanism. This means that data can be read that might later be rolled back resulting in an inconsistency between what was read and what is in the database.
DIS client
See Data Interchange Services client.
discover
In UDDI, to browse the business registry to locate existing Web services for integration.
discovered server
A server that runs the middleware agent and is found outside of the administrative environment but has a server representation automatically created within the administrative environment. The representation that is created is an assisted life-cycle server.
discrete word recognition
Identification of spoken words separated by periods of silence, or input one at a time. See also continuous speech recognition, speech recognition.
display station
A device, usually equipped with a keyboard and a display device, capable of sending and receiving information over a communications line.
distinguished encoding rules (DER)
The Basic Encoding Rules that are designed to ensure a unique encoding of each ASN.1 value, defined in the X.500 Directory Standards (CCITT X.509).
distinguished name

1. A set of name-value pairs (such as CN=person name and C=country or region) that uniquely identifies an entity in a digital certificate.

2. The name that uniquely identifies an entry in a directory. A distinguished name is made up of attribute:value pairs, separated by commas.

distributed application
An application made up of distinct components that are located on different computer systems, connected by a network. See also client/server.
distributed eXtreme Scale
A usage pattern for interacting with eXtreme Scale when servers and clients exist on multiple processes.
Distributed Voice Technologies (DVT)
A component of DirectTalk that provides an interface to allow you to integrate your own voice technology (such as a speech recognizer) with your DirectTalk system.
distribution list
In voice mail, a list of subscribers to whom the same message can be sent.
DLL
See dynamic link library.
DMS100

1. A Northern Telecom switch.

2. The custom ISDN protocol implemented on the DMS100 switch, providing 23 B-channels and a D-channel over a T1 trunk.

DMZ
See demilitarized zone.
DN
See distinguished name.
DNIS
See dialed number identification service.
DNS
See Domain Name System.
do-while loop
A loop that repeats the same sequence of activities as long as some condition is satisfied. Unlike a while loop, a do-while loop tests its condition at the end of the loop. This means that its sequence of activities always runs at least once.
document
A business document, such as a purchase order or invoice, that can be represented in any supported format. For example, an XML purchase order and an EDI purchase order are both documents, but each uses a different format.
document access definition (DAD)
An XML document format used by DB2 XML Extender to define the mapping between XML and relational data.
document access definition extension (DADX)
An XML document format that specifies how to create a Web service using a set of operations that are defined by DAD documents and SQL statements.
document definition
A description of a document layout that is used to identify the format of a document. Examples include record oriented data document definitions, EDI document definitions, XML schema document definitions, and XML DTD document definitions.
document flow definition
A collection of information specified for each type of document that tells the hub how to process that particular type of document. Each document to be exchanged between the internal partner and a participant must have a document flow definition.
document ID
A unique identifier for a document.
document literal wrapped
A convention or style that is used to structure a Web service definition to generate a SOAP message that is WS-I compliant and can be easily validated.
Document Object Model (DOM)
A system in which a structured document, for example an XML file, is viewed as a tree of objects that can be programmatically accessed and updated. See also Simple API for XML.
document type definition (DTD)
The rules that specify the structure for a particular class of SGML or XML documents. The DTD defines the structure with elements, attributes, and notations, and it establishes constraints for how each element, attribute, and notation can be used within the particular class of documents.
DOF
See device output format.
DOM
See Document Object Model.
DOM element
One member of a tree of elements that is created when an XML file is parsed with a DOM parser. DOM elements make it easy to quickly identify all elements in the source XML file.
domain
An object, icon, or container that contains other objects representing the resources of a domain. The domain object can be used to manage those resources.
Domain Name System (DNS)
The distributed database system that maps domain names to IP addresses.
DoS
See denial-of-service attack.
double-trunking
See trombone.
down
The condition in which a device is unusable as a result of an internal fault or an external condition, such as loss of power.
downstream
Pertaining to the direction of the flow, which is from the first node in the process (upstream) toward the last node in the process (downstream).
downstream physical unit (DSPU)
Any remote physical unit (data link, storage, or input/output device) attached to a single network host system.
DPC
See destination point code.
drop-down
See pull-down.
drop-in grammar
A set of precompiled grammar rules that can be used by an application-specific grammar to improve the recognition performance.
DSA
See digital signature algorithm.
DSP
See digital signal processing.
DSPU
See downstream physical unit.
DTD
See document type definition.
DTD document definition
A description or layout of an XML document based on an XML DTD.
DTF
See Data Transformation Framework.
DTMF
See dual-tone multifrequency.
DTQA
See Digital Trunk Quad Adapter.
dual authorization
A setting requiring that an action carried out by one person be confirmed by a second person. This prevents a single person from being able to carry out actions requiring a high level of security, for example the distribution of funds or the granting of access rights. See also single authorization.
dual-line call transfer

1. A call transfer method in which the primary and secondary lines remain bridged until a call is completed. See also call transfer.

2. See trombone.

dual-tone multifrequency (DTMF)
The signals sent by pressing one of the telephone keys. Each signal is composed of two different tones.
DUNS
See Data Universal Numbering System.
durable subscription
A Java Message Service (JMS) subscription that persists and stores subscribed messages even when the client is not connected.
DVT
See Distributed Voice Technologies.
DVT bridge
The interface between a voice technology component (such as a speech recognizer) and the DVT server. A bridge must exist for each technology you want to integrate with DVT.
DVT interface
A DirectTalk programming interface used by a DVT bridge that enables integration of voice applications with Distributed Voice Technologies to provide functions such as speech recognition.
DVT service
The combination of a voice application, a DVT bridge, and a voice technology that allow a caller to interact with your business.
DVT_Server
A component of DVT that allocates and manages system resources in response to requests from DVT_Client2.
dynaform
An instance of a DynaActionForm class or subclass that stores HTML form data from a submitted client request or that stores input data from a link that a user clicked.
dynamic analysis
The process of extracting targeted types of information based on the results of process simulations. This differs from static analysis, which extracts information from model elements in their static form.
dynamic assembly
A process that selects specific endpoints to meet the conditions of a service request at run time.
dynamic cache
A consolidation of several caching activities, including servlets, Web services, and WebSphere commands into one service where these activities share configuration parameters and work together to improve performance.
dynamic cluster
A server cluster that uses weights to balance the workloads of its cluster members dynamically, based on performance information collected from cluster members.
dynamic cluster isolation
The ability to specify whether the dynamic cluster runs on the same nodes as other instances of dynamic clusters, or if the dynamic cluster is the only dynamic cluster that runs on a single node.
dynamic link library (DLL)
A file containing executable code and data bound to a program at load time or run time, rather than during linking. The code and data in a DLL can be shared by several applications simultaneously. See also library.
dynamic operations
Operations that monitor the server environment and make recommendations that are based on the observed data.
dynamic policy
A template of permissions for a particular type of resource.
dynamic property
A property that can be overridden at run time by inserting information into the service message object (SMO).
dynamic reloading
The ability to change an existing component without restarting the server for the changes to become effective. See also hot deployment.
dynamic routing
The automatic routing of a service request, a message, or an event that is based on conditions at the time of the routing.
dynamic vocabulary
A vocabulary that is defined while an application is running.
dynamic Web content
Programming elements such as JavaServer Pages (JSP) files, servlets, and scripts that require client or server-side processing for accurate run time rendering in a Web browser.
dynamic Web project
A project that contains resources for a Web application with dynamic content such as servlets or JavaServer Pages (JSP) files. The structure of a dynamic Web project reflects the Java EE standard for Web content, classes, class paths, the deployment descriptor, and so on.
dynamic workload manager
A feature of the on demand router that routes workload based on a weight system, which establishes a prioritized routing system. The dynamic workload manager dynamically modifies the weights to stay current with the business goals.

E

E and M
A channel associated signaling protocol in which signaling is done using two leads: an M-lead that transmits battery or ground and an E-lead that receives open or ground.
e-business
The transaction of business over an electronic medium such as the Internet.
E1
A digital trunking facility standard used in Europe and elsewhere, capable of transmitting and receiving 30 digitized voice or data channels. Two additional channels are used for synchronization, framing, and signaling. The transmission rate is 2048 kilobits per second. See also T1.
EAR
See enterprise archive.
EAR file
See enterprise archive.
EAR project
See enterprise application project.
early bind
To connect one process to another process so that a specific version of the called process is used. The calling process always uses the specified version of the invoked process even if updated versions are available.
early binding
The connection between two processes that uses a specified version of the invoked process. As a result, the calling process uses the specified version of the process that it is invoking, even when updated versions are available.
echo cancellation
A filter algorithm that is used to compare a copy of the voice data being sent to a caller with the voice data being received from the caller. Any echo of the sent data is removed before the received data is sent on, for example, to a speech recognizer.
Eclipse
An open-source initiative that provides ISVs and other tool developers with a standard platform for developing plug-compatible application development tools.
ECSA
See extended common service area.
edge
A return value or possible result from a state table action.
Edge Side Include (ESI)
A technology supporting cacheable and noncacheable Web page components that can be gathered and assembled at the edge of a network.
EDI
See electronic data interchange.
EDI administrator
The person responsible for setting up and maintaining Data Interchange Services.
EDI composite data element
A group of related EDI data elements, such as the elements that make up a name and address.
EDI data element
A single item of data in an EDI document, such as a purchase order number, that corresponds to a ROD field in a ROD document definition. An EDI data element is equivalent to a simple element. It is also used to maintain EDI composite data elements.
EDI document definition
A description or layout of an EDI document, which comprises loops, EDI segments, EDI data elements, and EDI composite data elements. It is equivalent to the layout of an EDI transaction or an EDI message.
EDI envelope
The EDI segments and EDI data elements that make up the headers and trailers that enclose EDI transaction sets, functional groups, and interchanges.
EDI loop
A group of consecutive EDI segments that repeat together in an EDI document definition. There is no object type in Data Interchange Services that defines an EDI loop on its own. EDI loops are logically defined within an EDI document definition.
EDI message
In UN/EDIFACT EDI Standards, a group of logically related data that makes up an electronic business document, such as an invoice. It is equivalent to an EDI transaction. Called an EDI document definition in Data Interchange Services.
EDI message set
A group of logically related data that make up an electronic business document, such as an invoice or a purchase order. A single EDI document. The layout of an EDI transaction is described by an EDI document definition in Data Interchange Services.
EDI segment
A group of related EDI data elements. An EDI segment is a single line in an EDI document definition, beginning with a segment identifier and ending with a segment terminator delimiter. The EDI data elements in the EDI segment are separated by data element delimiters.
EDI standard
The industry-supplied, national or international formats to which information is converted, allowing different computer systems and applications to exchange information.
EDI transaction
In X12 EDI Standards, a group of logically related data that makes up an electronic business document, such as an invoice. It is equivalent to an EDI message. The layout of an EDI transaction is described by an EDI Document Definition in Data Interchange Services.
EDI transaction set
A group of logically related data that make up an electronic business document, such as an invoice or a purchase order. A single EDI document.
edit conflict
The result of a user applying changes and the system detecting that another user has made intervening and potentially conflicting changes.
edition
A successive deployment generation of a particular set of versioned artifacts.
editor area
In Eclipse and Eclipse-based products, the area in the workbench window where files are opened for editing.
EDL
See exchange data link.
EIS
See enterprise information system.
EJB
See Enterprise JavaBeans.
EJB container
A container that implements the EJB component contract of the Java EE architecture. This contract specifies a runtime environment for enterprise beans that includes security, concurrency, life cycle management, transaction, deployment, and other services. (Sun) See also EJB server.
EJB context
In enterprise beans, an object that allows an enterprise bean to invoke services provided by the container and to obtain information about the caller of a client-invoked method. (Sun)
EJB factory
An access bean that simplifies the creating or finding of an enterprise bean instance.
EJB home object
In Enterprise JavaBeans (EJB) programming, an object that provides the life cycle operations (create, remove, find) for an enterprise bean. (Sun)
EJB inheritance
A form of inheritance in which an enterprise bean inherits properties, methods, and method-level control descriptor attributes from another enterprise bean that resides in the same group.
EJB JAR file
A Java archive that contains an EJB module. (Sun)
EJB module
A software unit that consists of one or more enterprise beans and an EJB deployment descriptor. (Sun)
EJB object
In enterprise beans, an object whose class implements the enterprise bean remote interface (Sun).
EJB project
A project that contains the resources needed for EJB applications, including enterprise beans; home, local, and remote interfaces; JSP files; servlets; and deployment descriptors.
EJB query
In EJB query language, a string that contains an optional SELECT clause specifying the EJB objects to return, a FROM clause that names the bean collections, an optional WHERE clause that contains search predicates over the collections, an optional ORDER BY clause that specifies the ordering of the result collection, and input parameters that correspond to the arguments of the finder method.
EJB reference
A logical name used by an application to locate the home interface of an enterprise bean in the target operational environment.
EJB server
Software that provides services to an EJB container. An EJB server may host one or more EJB containers. (Sun) See also EJB container.
electronic data interchange (EDI)
The exchange of structured electronic data between computer systems according to predefined message standards.
element

1. A component of a document, such as an EDI, XML, or ROD record. An element can be a simple element or a compound element.

2. In Java development tools, a generic term that can refer to packages, classes, types, interfaces, methods, or fields.

3. In markup languages, a basic unit consisting of a start tag, end tag, associated attributes and their values, and any text that is contained between the two.

element separator
See data element delimiter.
embedded server
A catalog service or container server that resides in an existing process and is started and stopped within the process.
emitter factory
A type of factory that handles the details of event transmission such as the event server location, the filter settings, or the underlying transmission mechanism. See also factory.
empty activity
An activity with no defined implementation that can be used as a place holder in the design stage.
emulation
The use of software, hardware, or both by one system to imitate another system. The imitating system accepts the same data, runs the same programs, and achieves the same results as the imitated system.
emulator
A facility of the integration test client that enables the emulation of components and references during module testing. Emulators are either manual or programmatic. See also manual emulator, programmatic emulator.
end node
A visual marker within a process that identifies where a particular flow ends. Other concurrent flows within the same process will still continue executing.
endian
An attribute of data that describes whether it is stored in computer memory or transmitted with the most significant byte first or last.
endpoint

1. A JCA application or other client consumer of an event from the enterprise information system.

2. The system that is the origin or destination of a session.

endpoint listener
The point or address at which incoming messages for a Web service are received by a service integration bus.
engine
A speech recognition process that accepts voice data as input and returns the text form of what was said as output. It is the process which performs the recognition.
engine type
Each engine must be configured with a specific type. The type is simply a textual tag associated with a specific engine and does not change the operation or functionality of the engine.
enrollment

1. An entitlement for an organization to subscribe to a business service.

2. The process of entering and saving user or user group information in a portal.

enterprise application
See Java EE application.
enterprise application project (EAR project)
A structure and hierarchy of folders and files that contain a deployment descriptor and IBM extension document as well as files that are common to all Java EE modules that are defined in the deployment descriptor.
enterprise archive (EAR)
A specialized type of JAR file, defined by the Java EE standard, used to deploy Java EE applications to Java EE application servers. An EAR file contains EJB components, a deployment descriptor, and Web archive (WAR) files for individual Web applications. See also Web archive, Java archive.
enterprise bean
A component that implements a business task or business entity and resides in an EJB container. Entity beans, session beans, and message-driven beans are all enterprise beans. (Sun) See also entity bean, session bean, bean.
Enterprise Information Portal
Software developed by IBM that provides tools for advanced searching, and content customization and summarization.
enterprise information system (EIS)
The applications that comprise an enterprise's existing system for handling company-wide information. An enterprise information system offers a well-defined set of services that are exposed as local or remote interfaces or both. (Sun) See also resource adapter.
Enterprise JavaBeans (EJB)
A component architecture defined by Sun Microsystems for the development and deployment of object-oriented, distributed, enterprise-level applications (Java EE).
enterprise service
A service that typically accesses one or more enterprise information systems (EIS).
enterprise service bus (ESB)
A flexible connectivity infrastructure for integrating applications and services; it offers a flexible and manageable approach to service-oriented architecture implementation.
entity

1. A simple Java class that represents a row in a database table or entry in a map.

2. In markup languages such as XML, a collection of characters that can be referenced as a unit, for example to incorporate often-repeated text or special characters within a document.

entity bean
In EJB programming, an enterprise bean that represents persistent data maintained in a database. Each entity bean carries its own identity. (Sun) See also enterprise bean, key class, session bean.
entry breakpoint
A breakpoint set on a component element that is hit before the component element is invoked.
envelope
A control structure containing documents.
environment
A named collection of logical and physical resources used to support the performance of a function.
environment variable
A variable that specifies how an operating system or another program runs, or the devices that the operating system recognizes.
error
A discrepancy between a computed, observed, or measured value or condition and the true, specified, or theoretically correct value or condition.
error log stream
A continuous flow of error information that is transmitted using a predefined format.
error message
Any message displayed by DirectTalk in the System Monitor as an alarm and optionally written to the DirectTalk error log, or to the AIX error log (as an alert). Strictly speaking, the term error message should include only red (immediate attention) and yellow (problem situation) messages but it is also used to refer to green (a red or yellow message has been cleared) and white (informational) messages.
ESB
See enterprise service bus.
ESB server
An application server that provides the execution environment for mediation modules in addition to application programs.
escalation
A course of action that runs when a task is not completed satisfactorily within a specific period of time.
ESI
See Edge Side Include.
ESI processor
A processor that supports fragment caching and fragment assembly into full pages.
ESM
See external security manager.
Ethernet
A packet-based networking technology for local area networks (LANs) that supports multiple access and handles contention by using Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the access method. Ethernet is standardized in the IEEE 802.3 specification.
ETL
See extract, transform, and load.
ETS
See European Telecommunications Standard.
ETSI
See European Telecommunications Standards Institute.
Euro-ISDN
The common European ISDN standard, agreed in 1993, providing a basic range of services and supplementary services using 30 B-channels plus a D-channel over an E1 trunk.
European Telecommunications Standard (ETS)
A standard produced by the European Telecommunications Standards Institute.
European Telecommunications Standards Institute (ETSI)
A European organization founded in 1988 and responsible for the establishment of technical telecommunications standards. It produces European Telecoms Standards (ETS) for its membership, which consists of network operators, PTT manufacturers, users, and research institutes. Some of these functions used to be performed by the Commission of European Post and Telegraph. ETSI is similar in function to the International Telecommunication Union.
event

1. A change to a state, such as the completion or failure of an operation, business process, or human task, that can trigger a subsequent action, such as persisting the event data to a data repository or invoking another business process.

2. A change to data in an enterprise information system (EIS) that is processed by the adapter and used to deliver business objects from the EIS to the endpoints (applications) that need to be notified of the change.

3. An occurrence of significance to a task or system. Events can include completion or failure of an operation, a user action, or the change in state of a process. See also resource model, receiver.

event catalog
A repository of event metadata used by applications to retrieve information about classes of events and their permitted content.
event correlation sphere
The scope of an ECSEmitter method that allows an event consumer to correlate events. Each event includes the identifier of the correlation sphere to which it belongs and the identifier of its parent correlation sphere from the event hierarchy.
event database
A database in which events that can be monitored are stored, and which is required to support the persistence of those events.
event emitter
A component of the Common Event Infrastructure that receives events from event sources, completes and validates the events, and then sends events to the event server based on filter criteria. See also Common Event Infrastructure, event source.
event flow
A visual representation of the event processing that will take place when the application is run.
event group

1. A container for inbound events that enables the user to group events without the overhead of creating a new monitoring context. Event groups are purely a visual construct and are not represented in the monitor model.

2. A set of criteria that is applied to events to identify a subset of those events. The criteria include constraints expressions that define the filter conditions.

event listener
A type of asynchronous bean that serves as a notification mechanism and through which Java Platform, Enterprise Edition (Java EE) components within a single application can notify each other about various asynchronous events.
event model
The part of the monitor model that contains references to all of the elements of the event definitions used in the monitor model.
event object
An abstraction of the fields in the event definition.
event packet
The set of data that is passed in an event from an external system to the event processing server (runtime server) using the technology connectors. See also connector packet, action packet.
event part
An XML Schema Definition (XSD) type that provides information about the structure of part of an event. A single event definition can have different event parts that are defined by different XML schemas.
event queue
An ordered list of events.
event source
An object that supports an asynchronous notification server within a single Java virtual machine. Using an event source, the event listener object can be registered and used to implement any interface.
event store
A persistent cache where event records are saved until a polling adapter can process them.
event-driven translation
A translation automatically triggered by the receipt of a document.
evictor
A component that controls the membership of entries in each BackingMap instance. Sparse caches can use evictors to automatically remove data from the cache without affecting the database.
exception
A condition or event that cannot be handled by a normal process.
exception handler
A set of routines that responds to an abnormal condition. An exception handler is able to interrupt and to resume the normal running of processes.
exception queue
A queue to which messages associated with certain exceptional conditions, such as errors, are routed.
exception report
A WebSphere MQ report message type that is created by a message channel agent when a message is sent to another queue manager, but that message cannot be delivered to the specified destination queue.
exchange data link (EDL)
A serial connection that carries messaging information between DirectTalk and the Lucent Technologies 1AESS, Northern Telecom DMS100, Ericsson MD110 switch, or Siemens Hicom 300.
exclusive lock
A lock that prevents concurrently executing application processes from accessing database data. See also shared lock, lock.
execution trace
A chain of events that is recorded and displayed in a hierarchal format on the Events page of the integration test client.
exit breakpoint
A breakpoint set on a component element that is hit after the component element is invoked.
exit condition
A Boolean expression that controls when processing at a process node is completed.
export
An exposed interface from a Service Component Architecture (SCA) module that offers a business service to the outside world. An export has a binding that defines how the service can be accessed by service requesters, for example, as a Web service.
export file

1. A file created during the development process for inbound operations that contains the configuration settings for inbound processing.

2. The file containing data that has been exported.

expression
An SQL or XQuery operand or a collection of SQL or XQuery operators and operands that yields a single value.
extended common service area (ECSA)
A major element of z/OS virtual storage above the 16MB line. This area contains pageable system data areas that are addressable by all active virtual storage address spaces. It duplicates the common system area (CSA) which exists below the 16MB line.
extended data element
An application-specific element that contains information relevant to an event.
extended deployment
The software that monitors network efficiency and distributes unexpected workloads.
extended messaging
A function of asynchronous messaging where the application server manages the messaging infrastructure and extra standard types of messaging beans are provided to add functionality to that provided by message-driven beans.
Extensible Access Control Markup Language (XACML)
A language used to express policies and rules for controlling access to information.
Extensible Hypertext Markup Language (XHTML)
A reformulation of HTML 4.0 as an application of XML. XHTML is a family of current and future DTDs and modules that reproduce, subset, and extend HTML.
Extensible Markup Language (XML)
A standard metalanguage for defining markup languages that is based on Standard Generalized Markup Language (SGML).
Extensible Stylesheet Language (XSL)
A language for specifying style sheets for XML documents. Extensible Stylesheet Language Transformation (XSLT) is used with XSL to describe how an XML document is transformed into another document. See also Extensible Stylesheet Language Transformation.
Extensible Stylesheet Language Transformation (XSLT)
An XML processing language that is used to convert an XML document into another document in XML, PDF, HTML, or other format. See also Extensible Stylesheet Language.
extension

1. A class of objects designated by a specific term or concept; denotation.

2. An element or function not included in the standard language.

3. In Eclipse, the mechanism that a plug-in uses to extend the platform. See also extension point.

extension point
In Eclipse, the specification that defines what attributes and values must be declared by an extension. See also extension.
external command
A command that causes the command-line interface (CLI) to generate a message and send it to a service to be processed.
external partner
A trading community participant that sends business documents to and receives business documents from the internal partner. See also trading partner.
external security manager (ESM)
A security product that performs security checking on users and resources. RACF is an example of an ESM.
extract, transform, and load (ETL)
The process of collecting data from one or more sources, cleansing and transforming it, and then loading it into a database.
eXtreme Scale grid
A pattern that is used to interact with eXtreme Scale when all of the data and clients are in one process.

F

Faces component
One of a collection of user interface components (such as input fields) and data components (representing data such as records in a database) that can be dragged to a Faces JSP file and then bound to each other to build a dynamic Web project. See also JavaServer Faces.
Faces JSP file
A file that represents a page in a dynamic Web project and contains JavaServer Faces UI and data components. See also JavaServer Faces.
factory
In object-oriented programming, a class that is used to create instances of another class. A factory is used to isolate the creation of objects of a particular class into one place so that new functions can be provided without widespread code changes. See also emitter factory.
fade in
To gradually increase the volume of sounds, such as background music.
fade out
To gradually decrease the volume of sounds, such as background music.
failed event
An object that records the source, destination, description, and time of failure between two service connector components.
failover
An automatic operation that switches to a redundant or standby system in the event of a software, hardware, or network interruption.
fast response cache accelerator (FRCA)
A cache that resides in the kernel on AIX and Windows platforms that provides support for caching on multiple Web servers and on servers with multiple IP addresses.
fast view
In Eclipse, a view that is opened and closed by clicking a button on the shortcut bar.
fault message
An object that contains status information and details about a problem with a message.
FCC
See Federal Communications Commission.
FDM
See Feature Download Management.
feature
In Eclipse, a JAR file that is packaged in a form that the update manager accepts and uses to update the platform. Features have a manifest that provides basic information about the content of the feature, which can include plug-ins, fragments and other files.
Feature Download Management (FDM)
An ADSI protocol that enables a number of alternative key and screen overlays to be stored in an ADSI telephone and to be selected by predetermined events at the telephone.
Federal Communications Commission (FCC)
The standard body in the United States that is responsible for communications.
Federal Information Processing Standard (FIPS)
A standard produced by the National Institute of Standards and Technology when national and international standards are nonexistent or inadequate to satisfy the U.S. government requirements.
federated search
A search capability that enables searches across multiple search services and returns a consolidated list of search results.
federation
The process of combining naming systems so that the aggregate system can process composite names that span the naming systems.
feed
A data format that contains periodically updated content that is available to multiple users, applications, or both. See also Rich Site Summary.
FFDC
See first-failure data capture.
field

1. An area into which a particular category of data or control information is entered.

2. In object-oriented programming, an attribute or data member of a class.

file serving
A function that supports the serving of static files by Web applications.
file splitting
The division of an event file, based on a delimiter or based on size, to separate individual business objects within the file and send them as if they are each an event file to reduce memory requirements.
File Transfer Adapter (FTA)
A SWIFTAlliance Gateway (SAG) component that transfers files to or from the FileAct directory used by an SAG.
File Transfer Agent
See File Transfer Adapter.
File Transfer Protocol (FTP)
In TCP/IP, an application layer protocol that uses TCP and Telnet services to transfer bulk-data files between machines or hosts.
FileAct delivery notification
A delivery notification that conforms to the FileAct Protocol. See also application delivery notification.
FileAct directory
A directory used exclusively to store files involved in FileAct transfers.
filter

1. A device or program that separates data, signals, or material in accordance with specified criteria. See also servlet filtering.

2. Business logic that is applied to the content of an event to determine whether the event matches certain criteria.

filter expression
An optional expression, used by a notification receiver to filter the notification instances that it will accept. The receiver is listening for a particular type of notification, and in addition it will only accept notification instances that meet the criteria specified by the filter expression.
FIN
The SWIFT store-and-forward message-processing service defining message standards and protocols. See also Society for Worldwide Interbank Financial Telecommunication, SWIFTNet FIN.
find
See discover.
finder method
In enterprise beans, a method defined in the home interface and invoked by a client to locate an entity bean. (Sun) See also home interface.
fine-grained
Pertaining to viewing an individual object in detail. See also coarse-grained.
fingerprint
See digest code.
finite state grammar (FSG)
In WebSphere Voice Server, the extension of a file that contains grammar specifications in compiled, binary form. It is generated from a .bnf file and is called a .fsg file.
finite state machine (FSM)
The theoretical base describing the rules of a service request state and the conditions to state transitions.
FIPS
See Federal Information Processing Standard.
fire
In object-oriented programming, to cause a state transition.
firewall
A network configuration, typically both hardware and software, that prevents unauthorized traffic into and out of a secure network.
first-failure data capture (FFDC)
A problem diagnosis aid that identifies errors, gathers and logs information about these errors, and returns control to the affected runtime software.
fix pack
A cumulative collection of fixes that is made available between scheduled refresh packs, manufacturing refreshes, or releases. It is intended to allow customers to move to a specific maintenance level. See also program temporary fix, interim fix, refresh pack.
flat file
A file stored on a local file system, as opposed to a more complex set of files, such as those in a structured database.
floating segment
An EDI segment of an EDI document definition that can exist in many positions relative to other EDI segments.
flow object
An object of the business process model that helps connect components in the workflow.
folder
A container used to organize objects.
for loop
A loop that repeats the same sequence of activities a specified number of times.
foreign bus
A service integration bus with which a particular service integration bus can exchange messages.
Foreign Exchange Subscriber
A signaling protocol that links a user's location to a remote exchange that would not normally be serving that user, to provide, for instance, calls to outside the local area at the local rate.
foreign key
In a relational database, a key in one table that references the primary key in another table. See also constraint, primary key.
forest
A collection of one or more Windows 2000 Active Directory trees, organized as peers and connected by two-way transitive trust relationships between the root domains of each tree. All trees in a forest share a common schema, configuration, and Global Catalog. When a forest contains multiple trees, the trees do not form a contiguous namespace.
fork
A process element that makes copies of its input and forwards them by several processing paths in parallel.
form
A display screen, printed document, or file with defined spaces for information to be inserted.
form bean
In Struts, a class that stores HTML or JSP form data from a submitted client request or that stores input data from a link that a user clicked. The superclass for all form beans is the ActionForm class.
form logout
A mechanism to log out without having to close all Web browser sessions.
form-based login
An authentication process where a user ID and a password are retrieved using an HTML form, and sent to the server over the HTTP or HTTPS protocol.
forward
In Struts, an object that is returned by an action and that has two fields: a name and a path (typically the URL of a JSP). The path indicates where a request is to be sent. A forward can be local (pertaining to a specific action) or global (available to any action).
forwardable credential
A mechanism-specific security credential that is issued to access a resource, which is used to obtain another credential for access to a different resource.
four-way breakout cable
The cable used to connect the Digital Trunk Quad Adapter with up to four digital trunk processors.
FQDN
See fully qualified domain name.
frame

1. A group of data bits, surrounded by a beginning sequence and an ending sequence or other control information.

2. In hypertext markup language (HTML) coding, a subset of the Web browser window.

frameset
An HTML file that defines the layout of a Web page that is composed of other, separate HTML files.
FRCA
See fast response cache accelerator.
free float
A period of time in a process flow after a task runs and before the subsequent task can start. Free floats may result from parallel paths in a process that take varying lengths of time to complete.
free-form project
A monitored directory where Java EE artifacts or module files can be created or dropped. As artifacts are introduced or modified in the free-form project, the artifacts are placed in the appropriate Java EE project structures that are dynamically generated in the workspace. The rapid deployment tools generates deployment artifacts required to construct a Java EE-compliant application and deploy that application to a target server. See also monitored directory.
free-form surface
The open area in a visual editor where developers can add and manipulate objects. For example, the Struts application diagram editor provides a free-form surface for representing JSP pages, HTML pages, action mappings, other Struts application diagrams, links from JSP pages, and forwards from action mappings.
FSG
See finite state grammar.
FSM
See finite state machine.
FSM instance directory
A directory used by the finite state machine (FSM) to store temporary files, such as shared memory handles and trace files.
FTA
See File Transfer Adapter.
FTP
See File Transfer Protocol.
full build
In Eclipse, a build in which all resources within the scope of the build are considered. See also incremental build.
full deployment
Deployment of all the data required to set up the resources for an entire instance. See also delta deployment.
fully qualified domain name (FQDN)
In Internet communications, the name of a host system that includes all of the subnames of the domain name. An example of a fully qualified domain name is rchland.vnet.ibm.com.
function
In ADSI, an ADSI instruction, or group of instructions.
function key
A keyboard key that can be programmed to perform certain actions.
functional acknowledgment
An electronic acknowledgment returned to the sender to indicate acceptance or rejection of EDI documents.
functional acknowledgment map
A set of mapping instructions that describe how to create an EDI Standard functional acknowledgment. One of three supported map types.
functional group
One or more documents of a similar type transmitted from the same location and enclosed by functional group header and trailer segments.

G

G.711
Specification for uncompressed voice for PSTN and Voice over Internet Protocol access.
G.723.1
Compressed audio codecs used on Voice over Internet Protocol connection for voice.
G.729A
Compressed audio codecs used on Voice over Internet Protocol connection for voice.
garbage collection
A routine that searches memory to reclaim space from program segments or inactive data.
gate condition
A condition on a message being processed that must be fulfilled for a mediation policy to apply.
gatekeeper
A component of a Voice over Internet Protocol that provides services such as admission to the network and address translation. See also Voice over Internet Protocol.
gateway

1. A component of a Voice over Internet Protocol that provides a bridge between VoIP and circuit-switched environments. See also Voice over Internet Protocol.

2. A middleware component that bridges Internet and intranet environments during Web service invocations.

3. An element that controls the splitting and recombining of paths in a process flow.

4. An integration pattern that provides format-independent boundary functions that apply to all incoming messages.

5. See destination.

gateway destination
A type of service destination that receives messages for gateway services. Gateway destinations are divided into those that are used for request processing and those that are used for reply processing.
gateway service
A Web service that is made available through the Web services gateway.
General Inter-ORB Protocol (GIOP)
A protocol that Common Object Request Broker Architecture (CORBA) uses to define the format of messages.
generic object
An object that is used in API calls and XPATH expressions to refer to concepts, custom entities, or collections. For example, the XPATH expression /WSRR/GenericObject will retrieve all concepts from WebSphere Service Registry and Repository.
generic server
A server or process, such as a Java server, a C or C++ server or process, a CORBA server, or a Remote Method Invocation (RMI) server, that is managed in the product administrative domain and supports the product environment.
generic server cluster
A group of remote servers that need routing by the proxy server.
getter method
A method whose purpose is to get the value of an instance or class variable. This allows another object to find out the value of one of its variables. See also setter method.
GIOP
See General Inter-ORB Protocol.
glare
A condition that occurs when both ends of a telephone line or trunk are seized at the same time.
global

1. Pertaining to an element that is available to any process in the workspace. A global element appears in the project tree and can be used in multiple processes. Tasks, processes, repositories, and services can be either global (referenced by any process in the project) or local (specific to a single process). See also local.

2. Pertaining to information available to more than one program or subroutine. See also local.

global attribute
In XML, an attribute that is declared as a child of the schema element rather than as part of a complex type definition. Global attributes can be referenced in one or more content models using the ref attribute.
global element
In XML, an element that is declared as a child of the schema element rather than as part of a complex type definition. Global elements can be referenced in one or more content models using the ref attribute.
global instance identifier
A globally unique identifier that is generated either by the application or by the emitter and is used as a primary key for event identification.
global security
Pertains to all applications running in the environment and determines whether security is used, the type of registry used for authentication, and other values, many of which act as defaults.
global transaction
A recoverable unit of work performed by one or more resource managers in a distributed transaction environment and coordinated by an external transaction manager.
global variable
A variable that is used to hold and manipulate values assigned to it during translation and that is shared across maps and across document translations. One of the three types of variables supported by the Data Interchange Services mapping command language.
Globus certificate service
An online service that issues low-quality GSI certificates for people who want to experiment with Grid (or distributed) computing components that require certificates but have no other means to acquire certificates. The Globus certificate service is not a true CA. Certificates from the Globus certificate service are intended solely for experimentation. Use caution when using these certificates, for they are not intended for use in production systems. See also certificate authority.
GMT
See Greenwich mean time.
governance life cycle
A life cycle that represents the states and transitions that can exist in SOA deployment.
governance policy validator
A sample validator that enables the user to control the operations that can be performed on specific entities based on the metadata that is attached to those entities.
governance processes
A process that ensures that compliance and operational polices are enforced, and that change occurs in a controlled fashion and with appropriate authority as envisioned by the business design.
governance state
A state defined within the governance life cycle, for example, "created", "planned", or "specified".
governance Web service
A service that retrieves information and runs actions, relating to the governance of objects, from a Web service client.
governed collection
Group of objects on which an operation may be performed automatically, as a result of an initial operation.
governed entity
Controls visibility of artifacts as well as controlling who can perform which actions on specific governed entities.
grammar

1. A document type definition (DTD) or schema providing a structured format used for successful processing by the trace service.

2. A structured collection of words and phrases bound together by rules. A grammar defines the set of all words, phrases and sentences that might be spoken by a caller and are recognized by the engine. A grammar differs from a vocabulary in that it provides rules that govern the order in which words and phrases can be joined together. See also voice model.

Greenwich mean time (GMT)
The mean solar time at the meridian of Greenwich, England.
greeting
In voice mail, the recording heard by a caller on reaching subscriber's mailbox. See also announcement-only greeting, voice message.
greeting header
In voice mail, a recording made by a subscriber and played to callers either before or instead of a personal greeting.
grid job
A set of managed background activities. See also native start endpoint.
group

1. A collection of users who can share access authorities for protected resources.

2. A set of related documents within an interchange. An interchange can contain zero to many groups.

3. In places, two or more people who are grouped for membership in a place.

Groupe Special Mobile (GSM)
A CEPT/CCH standard for mobile telephony.
GSM
See Groupe Special Mobile.

H

HA
See high availability.
HA group
A collection of one or more members used to provide high availability for a process.
HA policy
A set of rules that is defined for an HA group that dictate whether zero (0), or more members are activated. The policy is associated with a specific HA group by matching the policy match criteria with the group name.
handle
In the Java EE specification, an object that identifies an enterprise bean. A client may serialize the handle, and then later deserialize it to obtain a reference to the enterprise bean. (Sun)
handler
In Web services, a mechanism for processing service content and extending the function of a JAX-RPC runtime system.
handshake
The exchange of messages at the start of a Secure Sockets Layer session that allows the client to authenticate the server using public key techniques (and, optionally, for the server to authenticate the client) and then allows the client and server to cooperate in creating symmetric keys for encryption, decryption, and detection of tampering.
hang up
To terminate a call.
hash
In computer security, a number generated from a string of text that is used to ensure that transmitted messages arrived intact.
hashed method authentication code (HMAC)
A mechanism for message authentication that uses cryptographic hash functions.
HDB3
See high-density bipolar of order 3.
HDLC
See High-level Data Link Control.
header
The portion of a message that contains control information.
headless
Pertains to a program or application that can run without a graphical user interface or, in some cases, without any user interface at all. Headless operation is often used for network servers or embedded systems.
health
The general condition or state of the database environment.
health controller
An autonomic manager that constantly monitors defined health policies. When a specified health policy condition does not exist in the environment, the health controller verifies that configured actions correct the error.
Health Insurance Portability and Accountability Act
A legislative act in the U.S. that requires health plans and providers to use a common format when electronically communicating health information.
health policy
A set of rules that an administrator can define and use to monitor conditions and take actions when the conditions occur.
heap
In Java programming, a block of memory that the Java virtual machine (JVM) uses at run time to store Java objects. Java heap memory is managed by a garbage collector, which automatically de-allocates Java objects that are no longer in use.
heartbeat
A signal that one entity sends to another to convey that it is still active.
HFS
See hierarchical file system.
hierarchical
Pertaining to data that is organized on computer systems using a hierarchy of containers, often called folders (directories) and files. In this scheme, folders can contain other folders and files. The successive containment of folders within folders creates the levels of organization, which is the hierarchy.
hierarchical file system (HFS)
A system for organizing files in a hierarchy, as in a UNIX system.
hierarchical loop (HL)
A technique for describing the relationship of data entities which are related in a parent to child manner, like a corporate organization chart.
high availability (HA)

1. Pertaining to a clustered system that is reconfigured when node or daemon failures occur, so that workloads can be redistributed to the remaining nodes in the cluster.

2. The ability of IT services to withstand all outages and continue providing processing capability according to some predefined service level. Covered outages include both planned events, such as maintenance and backups, and unplanned events, such as software failures, hardware failures, power failures, and disasters.

high availability file system
A cluster file system that can be used for component redundancy to provide continued operations during failures.
high availability manager
A framework within which core group membership is determined and status is communicated between core group members.
high-density bipolar of order 3 (HDB3 )
An E1 line coding method in which each block of four successive zeros is replaced by 000V or B00V, so that the number of B pulses between consecutive V pulses is odd. Therefore, successive V pulses are of alternate polarity so that no dc component is introduced. Note: B represents an inserted pulse conforming to the alternate mark inversion rule and V represents an AMI violation. HDB3 is similar to B8ZS used with T1.
High-level Data Link Control (HDLC)
A form of communications line control that uses a specified series of bits rather than control characters to control data transmission over a communications line.
high-level qualifier (HLQ)
A qualifier that groups tables together with other tables that have different names, but the same qualifier.
HL
See hierarchical loop.
HLQ
See high-level qualifier.
HMAC
See hashed method authentication code.
home interface
In enterprise beans, an interface that defines zero or more create and remove methods for a session bean or zero or more create, finder, and remove methods for an entity bean. See also create method, finder method, remote interface, remove method.
home method
A method in the home interface that is used by a client to create, locate, and remove instances of enterprise beans.
home page
The top-level Web page of a portal.
homologation
The process of getting a telephony product approved and certified by a country's telecommunications authority.
hook
A location in a compiled program where the compiler has inserted an instruction that allows programmers to interrupt the program (by setting breakpoints) for debugging purposes.
hook flash
A signal sent to a switch to request a switch feature (such as call transfer).
horizontal scaling
A topology in which more than one application server running on multiple computing nodes is used to run a single application.
host

1. A computer that is connected to a network and that provides an access point to that network. The host can be a client, a server, or both a client and server simultaneously. See also server, client.

2. In performance profiling, a machine that owns processes that are being profiled. See also server.

host application
An application residing on the host computer.
host name

1. In Internet communication, the name given to a computer. The host name might be a fully qualified domain name such as mycomputer.city.company.com, or it might be a specific subname such as mycomputer.

2. The network name for a network adapter on a physical machine in which the node is installed.

host system
An enterprise mainframe computer system that hosts 3270 applications. In the 3270 terminal service development tools, the developer uses the 3270 terminal service recorder to connect to the host system.
hot deployment
The process of adding new components to a running server without stopping and restarting the application server or application. See also dynamic reloading.
hot directory
See monitored directory.
hot servant region
A servant region that had a request dispatched to it previously and now has available threads.
hover help
A form of online help that can be viewed by moving a cursor over a graphical user interface (GUI) item such as an icon or field.
HTTP channel
A type of channel within a transport chain that provides client applications with persistent HTTP connections to remote hosts that are either blocked by firewalls or require an HTTP proxy server. An HTTP channel is used to exchange application data in the body of an HTTP request and an HTTP response that are sent to and received from a remote server.
HTTP over SSL (HTTPS)
A Web protocol for secure transactions that encrypts and decrypts user page requests and pages returned by the Web server.
HTTPS

1. See HTTP over SSL.

2. See Hypertext Transfer Protocol Secure.

hub administrator
The superuser who configures the hub and who has the ability to perform all the tasks associated with setting up and administering the hub.
human task
An interaction between people and business processes or services. See also inline task, stand-alone task.
hunt group
A set of telephone lines from which a non-busy line is hunted to handle, for example, an incoming call.
Hypertext Transfer Protocol Secure (HTTPS)
An Internet protocol that is used by Web servers and Web browsers to transfer and display hypermedia documents securely across the Internet.

I

i-mode
An Internet service for wireless devices.
IAMS
See Incoming Application Message Store.
IBM content partner (content partner)
IBM partner that provides syndicated content for portals.
ICAP
See Internet Content Adaptation Protocol.
ICMP
See Internet Control Message Protocol.
IDE
See integrated development environment.
identifier

1. In the 3270 terminal services development tool, a field on a screen definition that uniquely identifies the state of the screen. Users can choose which fields will be identifiers when creating recognition profiles.

2. The name of an item in a program written in the Java language.

identity
The data that represents a person and that is stored in one or more repositories.
identity assertion
The invocation credential that is asserted to the downstream server. This credential can be set as the originating client identity, the server identity, or another specified identity, depending on the RunAs mode for the enterprise bean.
identity token
A token that contains the invocation credential identity, which with the client authentication token are required by the receiving server to accept the asserted identity.
IDL
See Interface Definition Language.
IETF
See Internet Engineering Task Force.
if-then rule
A rule in which the action (then part) is performed only when the condition (if part) is true. See also rule set, action rule.
IIOP
See Internet Inter-ORB Protocol.
immediate start
A procedure that is used with some channel-associated signaling protocols, when the address signaling is sent within 65 milliseconds of going off-hook See also delay start, wink start.
import

1. A development artifact that imports a service that is external to a module. See also import file.

2. The point at which an SCA module accesses an external service, (a service outside the SCA module) as if it was local. An import defines interactions between the SCA module and the service provider. An import has a binding and one or more interfaces.

import file
A file created during the development process for outbound operations that contains the configuration settings for outbound processing. See also import.
IMS
See Information Management System.
IMS command
A request from a terminal or AO (automated operator) to perform a specific IMS service, such as altering system resource status or displaying specific system information.
IMS connect
The product that runs on an MVS, OS/390, or z/OS platform and through which IMS Connector for Java communicates with IMS. IMS Connect uses OTMA to communicate with IMS. See also Open Transaction Manager Access.
IMS conversation

1. A dialog between a terminal and a message processing program using IMS conversational processing facilities. See also conversational processing.

2. In IMS Connector for Java, the dialog between a Java client program and a message processing program.

IMS transaction
A specific set of input data that triggers the execution of a specific process or job. A transaction is a message destined for an IMS application program.
IMS transaction code
A 1- to 8-character alphanumeric code that invokes an IMS message processing program.
IN
See intelligent network.
in-band
Pertaining to signals that are carried within the telephony voice channel. See also out-of-band.
inbound authentication
The configuration that determines the type of accepted authentication for inbound requests.
inbound document
See source document.
inbound event
A declaration that a monitoring context or KPI context will accept a specific event at run time.
inbound port
A type of port that takes a message that is received at an endpoint listener and passes it to the service integration bus for forwarding to the appropriate inbound service.
inbound processing
The process by which changes to business information in an enterprise information system (EIS) are detected, processed, and delivered to a run time by a JCA Adapter. An adapter may detect EIS changes by polling an event table or by using an event listener.
inbound service
The external interface for a service that is provided by your own organization and hosted in a location that is directly available through the service destination.
inbound transport
Network ports in which a server listens for incoming requests.
Incoming Application Message Store (IAMS)
A message store, implemented as the database table DNF_IAMS, in which messages received from remote applications (OSN messages) are stored.
incremental build
In Eclipse, a build in which only resources that have changed since the last build are considered. See also full build.
index
A set of pointers that are logically ordered by the values of a key. Indexes provide quick access to data and can enforce uniqueness of the key values for the rows in the table.
indirect speech recognition
Identification of words from spoken input read from a file. See also direct speech recognition.
individual resource
A single resource that can be uniquely identified, such as a person or computer. Individual resources are used when a specific resource must be allocated to a task. For example, the Mary Smith resource must perform the Approve Payment task.
information center
A collection of information that provides support for users of one or more products, can be launched separately from the product, and includes a list of topics for navigation and a search engine.
Information Management System (IMS)
Any of several system environments available with a database manager and transaction processing that are capable of managing complex databases and terminal networks.
inheritance
An object-oriented programming technique in which existing classes are used as a basis for creating other classes. Through inheritance, more specific elements incorporate the structure and behavior of more general elements.
initial CDD
A customization definition document (CDD) to which placeholders have not yet been added.
initial context
Starting point in a namespace.
initial reference
A well-known reference associated with an identifier.
initialization point
A user-defined constant or variable used to initialize the attributes of an object.
initialize
To prepare a system, device, or program for operation; for example, to initialize a diskette.
inline schema
An XML schema in a Web Service Definition Language file (.wsdl).
inline task
In the human task editor, a unit of work that is defined within an implementation of a business process. See also human task, stand-alone task.
input
An entry point through which an element is notified that it can start, typically because an upstream element, on which it depends, has completed. If the element has all of its required input, then it will start.
input activity
The origin of the process that is the source of the invocation data of the entire process.
input branch
The area of a decision, fork, join, or merge that contains the inputs.
input criteria
Number and types of inputs required to start a task or process.
input node

1. A message flow node that represents a source of messages for a message flow or subflow.

2. The point where a service message from a source enters the request flow.

input parameter
Data received by a program such as a prompt, 3270 script, custom server, or state table from the program that invoked it. See also system variable.
input response node
The end point for a mediation response flow from which the service message object is sent to the source.
input terminal node
A primitive through which a message is received by a subflow. Each input terminal node is represented as an input terminal of the corresponding subflow node.
INS
See Interoperable Naming Service.
installation package
An installable unit of a software product. Software product packages are separately installable units that can operate independently from other packages of that software product.
installation target
The system on which selected installation packages are installed.
instance

1. A set of servers that share a common runtime database, plus their corresponding brokers and queue managers.

2. A specific occurrence of an object that belongs to a class. See also object.

instance document
An XML document that conforms to a particular schema.
instance metric
A metric that returns the result, such as the amount of an order, from one run of the process. See also metric.
instantiate
To represent an abstraction with a concrete instance.
integrated development environment (IDE)
A set of software development tools, such as source editors, compilers, and debuggers, that are accessible from a single user interface.
integrated messaging
A messaging system in which more than one copy of a single message is stored, the copies being kept synchronized by the applications used to access them. See also unified messaging.
Integrated Services Digital Network (ISDN)
An international communications standard for sending voice, video, and data over digital telephone lines.
Integrated Services Digital Network call transfer
In DirectTalk, an application that allows you to transfer calls on Nortel DMS-100 switches using Integrated Services Digital Network two B-channel transfer, and on Nortel DMS-100 and DMS-250 switches using Nortel's proprietary Release Link Trunk (RLT) call transfer protocol.
Integrated Services Digital Network two B-channel transfer (ISDN two B-channel transfer)
A call transfer feature defined by Bellcore GR-2865-CORE specification used on Nortel and Lucent switches.
Integrated Services Digital Network user part (ISDN-UP, ISUP)
Part of the SS7 protocol supporting telephony signaling applications. The ISDN user part is defined to carry signaling information relating to digital telephones, terminals, and PABXs in customer premises.
integration broker
A component that integrates data among heterogeneous applications. An integration broker typically provides various services that can route data, as well as a repository of rules that govern the integration process, connectivity to various applications, and administrative capabilities that facilitate integration.
intelligent network (IN)
A telephone network that includes programmable software not resident on the switch. It allows the service provider to provide special services, such as special call-handling, that are not dependent on the capabilities of the switch. See also advanced intelligent network.
intelligent peripheral (IP)
A voice processing system (such as DirectTalk) that provides enhanced services such as voice response, speech recognition, text-to-speech, voice messaging, and database access in an advanced intelligent network.
interaction
A definition that explains what the target document should be. An interaction consists of the source document, target document, action, and a transformation map.
interaction block
A piece of business logic that is evaluated by the runtime server when an event is received.
interaction endpoint
A service requester or provider.
interaction pattern
A communication method for sending or receiving messages in a service interaction. Examples of interaction patterns include request/reply, one-way interaction, and publish/subscribe.
interaction set
A group of interaction blocks that provide complex business logic against which events are evaluated by the runtime server.
interactive process design
The development of deployable processes through modeling, testing, and revision by business users.
interactive session
A work session in which there is an exchange of communication between a 3270 application and the 3270 terminal service recorder.
Interactive System Productivity Facility (ISPF)
An IBM licensed program that serves as a full-screen editor and dialog manager. Used for writing application programs, it provides a means of generating standard screen panels and interactive dialogs between the application programmer and terminal user. See also Time Sharing Option.
interactive view
In 3270 terminal services, real-time access to a host application in the 3270 terminal service recorder editor.
interactive voice response (IVR)
A computer application that communicates information and interacts with the caller via the telephone voice channel.
interchange
The exchange of information between trading partners. Also a set of documents grouped together, such as EDI documents enclosed within an EDI envelope.
interface
A collection of operations that are used to specify a service of a class or a component. See also class, port type.
Interface Definition Language (IDL)
In CORBA, a declarative language that is used to describe object interfaces, without regard to object implementation.
interface map
A map that resolves and reconciles the differences between the interfaces of interacting components. There are two levels of interface maps: operation mappings and parameter mappings.
interim fix
A certified fix that is generally available to all customers between regularly scheduled fix packs, refresh packs, or releases. See also fix pack, refresh pack.
intermediate CDD
A customization definition document (CDD) to which placeholders have been added, but for which placeholder values have not yet been specified.
intermediate object
An abstract representation of the fields that belong to the event and action definitions.
internal command
A command that is processed directly by and that controls the command-line interface (CLI).
internal partner
A company that acts as the hub community for its partners. The internal partner has one administrative user and the manager administrator who is responsible for the health and maintenance of the internal partner's portion of the community.
internal rate of return (IRR)
The interest rate received for an investment, based on anticipated expenses and income that will occur at regular periods
International Telecommunication Union Telecommunication Standardization Sector (ITU-T)
The part of the International Telecommunication Union (ITU) that is responsible for developing recommendations for telecommunications.
Internet Content Adaptation Protocol (ICAP)
A high-level protocol for requesting services from an Internet-based server.
Internet Control Message Protocol (ICMP)
An Internet protocol that is used by a gateway to communicate with a source host, for example, to report an error in a datagram.
Internet Engineering Task Force (IETF)
The task force of the Internet Architecture Board (IAB) that is responsible for solving the short-term engineering needs of the Internet. The IETF consists of numerous working groups, each focused on a particular problem. Specifications proposed as standards typically undergo a period of development and review before they are adopted as standards.
Internet Inter-ORB Protocol (IIOP)
A protocol used for communication between Common Object Request Broker Architecture (CORBA) object request brokers. See also Common Object Request Broker Architecture.
Internet Protocol (IP)
A protocol that routes data through a network or interconnected networks. This protocol acts as an intermediary between the higher protocol layers and the physical network. See also Transmission Control Protocol.
interoperability
The ability of a computer or program to work with other computers or programs.
Interoperable Naming Service (INS)
A program that supports the configuration of the Object Request Broker (ORB) administratively to return object references.
interoperable object reference (IOR)
An object reference with which an application can make a remote method call on a CORBA object. This reference contains all the information needed to route a message directly to the appropriate server.
interrupt
A condition that applies to a simulation that causes the simulation execution to be halted if the condition is met.
introspector
In Java, a class (java.beans.Introspector) that provides a standard way for tools to learn about the properties, events, and methods supported by a target bean. Introspectors follow the JavaBeans specification.
invocation
The activation of a program or procedure.
invocation credential
An identity with which to invoke a downstream method. The receiving server requires this identity with the sending server identity to accept the asserted identity.
invoker attribute
An assembly property for a Web module that is used by the servlet that implements the invocation behavior.
IOR
See interoperable object reference.
IP

1. See Internet Protocol.

2. See intelligent peripheral.

IP sprayer
A device that is located between inbound requests from the users and the application server nodes that reroutes requests across nodes.
IRR
See internal rate of return.
ISDN
See Integrated Services Digital Network.
ISDN two B-channel transfer
See Integrated Services Digital Network two B-channel transfer.
ISDN-UP
See Integrated Services Digital Network user part.
ISPF
See Interactive System Productivity Facility.
ISUP
See Integrated Services Digital Network user part.
iteration
See loop.
iterator
A class or construct that is used to step through a collection of objects one at a time.
ITU-T
See International Telecommunication Union Telecommunication Standardization Sector.
IVR
See interactive voice response.
iWidget
A browser-oriented component, potentially extending a server-side component, that provides either a logical service to the page or a visualization for the user (typically related to a server-side component or a configured data source).

J

J2C
See J2EE Connector architecture.
J2EE
See Java 2 Platform, Enterprise Edition.
J2EE application
See Java EE application.
J2EE Connector architecture (J2C)
See Java EE Connector Architecture.
J2EE server
See Java EE server.
J2SE
See Java 2 Platform, Standard Edition.
JAAS
See Java Authentication and Authorization Service.
JAF
See JavaBeans Activation Framework.
JAR file
A Java archive file. See also enterprise archive, Web archive.
Java
An object-oriented programming language for portable interpretive code that supports interaction among remote objects. Java was developed and specified by Sun Microsystems, Incorporated.
Java 2 Connector security
See Java Connector security.
Java 2 Platform, Enterprise Edition (J2EE)
See Java Platform, Enterprise Edition.
Java 2 Platform, Standard Edition (J2SE)
See Java Platform, Standard Edition.
Java API for XML (JAX)
A set of Java-based APIs for handling various operations involving data defined through Extensible Markup Language (XML).
Java API for XML Web Services (JAX-WS)
The next-generation Web services programming model that is based on dynamic proxies and Java annotations.
Java API for XML-based RPC (JAX-RPC, JSR 101)
A specification that describes application programming interfaces (APIs) and conventions for building Web services and Web service clients that use remote procedure calls (RPC) and XML.
Java Architecture for XML Binding (JAXB)
A Java binding technology that supports transformation between schema and Java objects, as well as between XML instance documents and Java object instances.
Java archive
A compressed file format for storing all of the resources that are required to install and run a Java program in a single file. See also enterprise archive, Web archive.
Java Authentication and Authorization Service (JAAS)
In Java EE technology, a standard API for performing security-based operations. Through JAAS, services can authenticate and authorize users while enabling the applications to remain independent from underlying technologies.
Java bean
See bean.
Java class
A class that is written in the Java language. See also class.
Java Command Language
A scripting language for the Java environment that is used to create Web content and to control Java applications.
Java Connector security
An architecture designed to extend the end-to-end security model for Java EE-based applications to include enterprise information systems (EIS).
Java Database Connectivity (JDBC)
An industry standard for database-independent connectivity between the Java platform and a wide range of databases. The JDBC interface provides a call level interface for SQL-based and XQuery-based database access. See also Open Database Connectivity.
Java Development Kit (JDK)
See Java SE Development Kit.
Java development tools (JDT)
Java EE
See Java Platform, Enterprise Edition.
Java EE application
Any deployable unit of Java EE functionality. This unit can be a single module or a group of modules packaged into an enterprise archive (EAR) file with a Java EE application deployment descriptor. (Sun)
Java EE Connector Architecture (JCA)
A standard architecture for connecting the Java EE platform to heterogeneous enterprise information systems (EIS).
Java EE server
A runtime environment that provides EJB or Web containers.
Java file
An editable source file (with .java extension) that can be compiled into bytecode (a .class file).
Java Management Extensions (JMX)
A means of doing management of and through Java technology. JMX is a universal, open extension of the Java programming language for management that can be deployed across all industries, wherever management is needed.
Java Message Service (JMS)
An application programming interface that provides Java language functions for handling messages.
Java Naming and Directory Interface (JNDI)
An extension to the Java platform that provides a standard interface for heterogeneous naming and directory services.
Java platform
A collective term for the Java language for writing programs; a set of APIs, class libraries, and other programs used in developing, compiling, and error-checking programs; and a Java virtual machine which loads and runs the class files. (Sun)
Java Platform, Enterprise Edition (Java EE)
An environment for developing and deploying enterprise applications, defined by Sun Microsystems Inc. The Java EE platform consists of a set of services, application programming interfaces (APIs), and protocols that provide the functionality for developing multitiered, Web-based applications. (Sun)
Java Platform, Standard Edition (Java SE)
The core Java technology platform. (Sun)
Java project
In Eclipse, a project that contains compilable Java source code and is a container for source folders or packages.
Java runtime environment
A subset of a Java developer kit that contains the core executable programs and files that constitute the standard Java platform. The JRE includes the Java virtual machine (JVM), core classes, and supporting files.
Java SE
See Java Platform, Standard Edition.
Java SE Development Kit (JDK)
The name of the software development kit that Sun Microsystems provides for the Java platform.
Java Secure Socket Extension (JSSE)
A Java package that enables secure Internet communications. It implements a Java version of the Secure Sockets Layer (SSL) and Transport Layer Security (TSL) protocols and supports data encryption, server authentication, message integrity, and optionally client authentication.
Java Specification Request (JSR)
A formally proposed specification for the Java platform.
Java virtual machine (JVM)
A software implementation of a processor that runs compiled Java code (applets and applications).
Java virtual machine Profiler Interface (JVMPI)
A profiling tool that supports the collection of information, such as data about garbage collection and the Java virtual machine (JVM) API that runs the application server.
JavaBeans
As defined for Java by Sun Microsystems, a portable, platform-independent, reusable component model. See also bean.
JavaBeans Activation Framework (JAF)
A standard extension to the Java platform that determines arbitrary data types and available operations and can instantiate a bean to run pertinent services.
Javadoc

1. A tool that parses the declarations and documentation comments in a set of source files and produces a set of HTML pages describing the classes, inner classes, interfaces, constructors, methods, and fields. (Sun)

2. Pertaining to the tool that parses the declarations and documentation comments in a set of source files and produces a set of HTML pages describing the classes, inner classes, interfaces, constructors, methods, and fields.

JavaMail API
A platform and protocol-independent framework for building Java-based mail client applications.
JavaScript
A Web scripting language that is used in both browsers and Web servers. (Sun)
JavaScript Object Notation (JSON)
A lightweight data-interchange format that is based on the object-literal notation of JavaScript. JSON is programming-language neutral but uses conventions from languages that include C, C++, C#, Java, JavaScript, Perl, Python.
JavaServer Faces (JSF)
A framework for building Web-based user interfaces in Java. Web developers can build applications by placing reusable UI components on a page, connecting the components to an application data source, and wiring client events to server event handlers. See also JavaServer Pages, Faces component, Faces JSP file.
JavaServer Pages (JSP)
A server-side scripting technology that enables Java code to be dynamically embedded within Web pages (HTML files) and run when the page is served, in order to return dynamic content to a client. See also JSP file, JSP page, JavaServer Faces.
JAX
See Java API for XML.
JAX-RPC
See Java API for XML-based RPC.
JAX-WS
See Java API for XML Web Services.
JAXB
See Java Architecture for XML Binding.
JCA
See Java EE Connector Architecture.
JDBC
See Java Database Connectivity.
JDBC connection filter
A control that limits the amount of data that is transferred during the JDBC metadata load. The filter enhances performance.
JDK

1. See Java SE Development Kit.

2. See Java Development Kit.

JDT
See Java development tools.
Jetspeed
The open-source portal that is part of the Jakarta project by Apache.
JMS
See Java Message Service.
JMS data binding
A data binding that provides a mapping between the format used by an external JMS message and the Service Data Object (SDO) representation used by a Service Component Architecture (SCA) module.
JMS provider
A messaging engine that implements the JMS messaging specification, for example WebSphere MQ or SIBus.
JMS queue
An object in which message queuing applications use the Java Message Service specification to put messages, and from which they can get messages.
JMS topic
An object in which message queuing applications use the Java Message Service specification to put messages, and from which they can get messages using the publish/subscribe style of messaging.
JMX
See Java Management Extensions.
JNDI
See Java Naming and Directory Interface.
job class
A type of class that establishes a policy for resource consumption using a set of jobs. Each job is assigned to a job class.
job log
A record of requests submitted to the system by a job, the messages related to the requests, and the actions performed by the system on the job. The job log is maintained by the system program.
job management console
A stand-alone Web interface that Compute Grid users use to perform job operations. Through the console, jobs can be submitted, monitored, viewed, and managed.
job manager
An administrative process that manages multiple base application servers or network deployment cells.
job scheduler
A component that provides all job-management functions. A job scheduler maintains a history of all jobs and usage data for jobs that have run.
join

1. A process element that recombines and synchronizes parallel processing paths after a decision or fork. A join waits for input to arrive at each of its incoming branches before permitting the process to continue.

2. An SQL relational operation in which data can be retrieved from two tables, typically based on a join condition specifying join columns.

3. The configuration on an incoming link that determines the behavior of the link.

join condition
A condition that determines whether to run the next activity.
join failure
A fault that is thrown if a join condition cannot be evaluated.
JRas
A toolkit that consists of a set of Java packages that enable developers to incorporate message logging and trace facilities into Java applications.
JSF
See JavaServer Faces.
JSON
See JavaScript Object Notation.
JSP
See JavaServer Pages.
JSP file
A scripted HTML file that has a .jsp extension and allows for the inclusion of dynamic content in Web pages. A JSP file can be directly requested as a URL, called by a servlet, or called from within an HTML page. See also JavaServer Pages, JSP page.
JSP page
A text-based document using fixed template data and JSP elements that describes how to process a request to create a response. (Sun) See also JavaServer Pages, JSP file.
JSR
See Java Specification Request.
JSR 101
See Java API for XML-based RPC.
JSSE
See Java Secure Socket Extension.
jump out
See call transfer.
junction
A logical connection created to establish a path from one server to another.
JUnit
An open-source regression testing framework for unit-testing Java programs.
JVM
See Java virtual machine.
JVMPI
See Java virtual machine Profiler Interface.
Jython
An implementation of the Python programming language that is integrated with the Java platform.

K

kernel
The part of an operating system that contains programs for such tasks as input/output, management and control of hardware, and the scheduling of user tasks.
key

1. A button on a keyboard or key pad.

2. A cryptographic mathematical value that is used to digitally sign, verify, encrypt, or decrypt a message. See also private key, public key.

3. Information that characterizes and uniquely identifies the real-world entity that is being tracked by a monitoring context.

key class
In EJB query language, a class that is used to create or find an entity bean. It represents the identity of the entity bean, corresponding to the primary-key columns of a row in a relational database. See also class, entity bean.
key database file
See key ring.
key field
In EJB query language, a container-managed field in an entity bean that corresponds to one of the primary-key columns of a row in a relational database. Each key field is a member of the entity bean key class.
key file
See key ring.
key locator
A mechanism that retrieves the key for XML signing, XML digital signature verification, XML encryption, and XML decryption.
key performance indicator (KPI)
A quantifiable measure designed to track one of the critical success factors of a business process.
key ring
In computer security, a file that contains public keys, private keys, trusted roots, and certificates. See also keystore file.
key value pair
Information that is expressed as a paired set of parameters. For example, if you want to express that the specific sport is football, this data can be expressed as key=sport and value=football.
Keyed-Hashing Message Authentication Code
A mechanism for message authentication that uses cryptographic hash functions.
keypad
A physical grouping of keys such as the numeric key pad and the cursor key pad on a keyboard or the buttons on a telephone.
keypad mapping
The process of assigning special alphanumeric characters to the keys on a telephone keypad so that the telephone can be used as a computer terminal keyboard.
keystore
In security, a file or a hardware cryptographic card where identities and private keys are stored, for authentication and encryption purposes. Some keystores also contain trusted, or public, keys. See also truststore, certificate signing request.
keystore file
A key ring that contains both public keys that are stored as signer certificates and private keys that are stored in personal certificates. See also key ring.
keystring
Additional specification of the entry within a naming service.
keyword
One of the predefined words of a programming language, artificial language, application, or command. See also token.
keyword parameter
A parameter that consists of a keyword followed by one or more values.
knowledge asset
A document external to the scope of the product that contains information associated to existing metadata.
KPI
See key performance indicator.
KPI context
A container for key performance indicators (KPIs) and their associated triggers and events.
KPI model
The part of the monitor model that contains the KPI contexts, which in turn contain key performance indicators and their associated triggers and events.

L

label
A node in a portal that cannot contain any content, but can contain other nodes. Labels are used primarily to group nodes in the navigation tree.
LAN
See local area network.
language code
A two character (ISO 639-1) or three letter (ISO 639-2) abbreviation for a language. For example: en or eng for English. Country codes and language codes together form the basis for locale names.
language model
For speech recognition, a set of acoustic shapes (in binary format) for a given set of words, in which word-to-word differences are maximized but speaker-to-speaker differences are minimized. See also vocabulary.
LAPD
See link access protocol for the D-channel.
large object (LOB)
A data object whose data type supports the storage and manipulation of more data than most other data types.
late bind
To connect one process to another process so that the connection is resolved dynamically in the runtime environment and the calling process uses the currently valid version of the process that it is invoking.
late binding
The connection between two processes that is resolved dynamically in the runtime environment. As a result, the calling process uses up the currently valid version of the process that it is invoking.
LAU
See local authentication.
launch configuration
A mechanism for defining and saving different workbench configurations that can be launched separately. Configurable options include run and debug settings.
launchpad
A graphical interface for launching the product installation wizard.
layout box
In Page Designer, a control that allows Web designers to position text and images within the page. Layout boxes can be stacked or aligned using a grid.
layout manager
In programming graphical user interfaces, an object that controls the size and position of Java components within a container. The Java platform supplies several commonly used layout managers for AWT and Swing containers.
lazy authentication
The process whereby the security run time environment obtains the required authentication data when the Java client accesses a protected enterprise bean for the first time.
LDAP
See Lightweight Directory Access Protocol.
LDAP directory
A type of repository that stores information on people, organizations, and other resources and that is accessed using the LDAP protocol. The entries in the repository are organized into a hierarchical structure, and in some cases the hierarchical structure reflects the structure or geography of an organization.
library

1. A collection of model elements, including business items, processes, tasks, resources, and organizations.

2. A project that is used for the development, version management, and organization of shared resources. Only a subset of the artifact types can be created and stored in a library, such as business objects and interfaces. See also project.

license server
A program that provides license services and administers licenses for software products.
licensed program (LP)
A separately priced program and its associated materials that have a copyright and are offered to customers under the terms and conditions of a licensing agreement.
licensed program product (LPP)
See licensed program.
life cycle
One complete pass through the four phases of software development: inception, elaboration, construction and transition.
Lightweight Directory Access Protocol (LDAP)
An open protocol that uses TCP/IP to provide access to directories that support an X.500 model and that does not incur the resource requirements of the more complex X.500 Directory Access Protocol (DAP). For example, LDAP can be used to locate people, organizations, and other resources in an Internet or intranet directory.
Lightweight Third Party Authentication (LTPA)

1. A protocol that uses cryptography to support security in a distributed environment.

2. An authentication framework that allows single sign-on across a set of Web servers that fall within an Internet domain.

line error
An error on the telephone line that causes the signal to be impaired.
link
A line or arrow that connects activities in a process. A link passes information between activities and determines the order in which they run.
link access protocol for the D-channel (LAPD)
An HDLC protocol used in ISDN that ensures a reliable connection between the network and the user. Often used synonymously with Q.921.
link name
A name defined in the deployment descriptor of the encompassing application.
link pack area (LPA)
The portion of virtual storage below 16MB that contains frequently used modules.
listener
A program that detects incoming requests and starts the associated channel.
listener port
An object that defines the association between a connection factory, a destination, and a deployed message-driven bean. Listener ports simplify the administration of the associations between these resources.
literal
A symbol or a quantity in a source program that is itself data, rather than a reference to data.
Literal XML
An encoding style for serializing data over SOAP protocol. Literal XML is based on an XML schema instance.
load balancing
The monitoring of application servers and management of the workload on servers. If one server exceeds its workload, requests are forwarded to another server with more capacity.
loader
A component that reads data from and writes data to a persistent store.
LOB
See large object.
local

1. Pertaining to a device, file, or system that is accessed directly from a user system, without the use of a communication line. See also remote.

2. Pertaining to an element that is available only in its own process. See also global.

local area network (LAN)
A network that connects several devices in a limited area (such as a single building or campus) and that can be connected to a larger network.
local authentication (LAU)
The process of validating a user identity to the system according to the local operating system account to which the user logged in. If the user is authenticated, the user is mapped to a principal.
local database
A database that is located on the workstation in use. See also remote database.
local history
Copies of files that are saved in the workbench in order to compare the current version with previous versions. Subject to configurable preferences, the workbench updates the local history each time an editable file is saved.
local home interface
In EJB programming, an interface that specifies the methods used by local clients for locating, creating, and removing instances of enterprise bean classes. See also remote home interface.
local queue
A queue that belongs to the local queue manager. A local queue can contain a list of messages waiting to be processed. See also remote queue.
local queue manager
The queue manager to which the program is connected and that provides message queuing services to the program. See also queue manager, remote queue manager.
local transaction
A recoverable unit of work managed by a resource manager and not coordinated by an external transaction manager.
local transaction containment (LTC)
A bounded scope that is managed by the container to define the application server behavior in an unspecified transaction context.
locale
A setting that identifies language or geography and determines formatting conventions such as collation, case conversion, character classification, the language of messages, date and time representation, and numeric representation.
location
A particular occurrence or example of a location definition. If there is a location definition called USA Call Center, an example of a location would be Toledo Call Center.
location service daemon
A component of the Remote Method Invocation and Internet Inter-ORB Protocol (RMI/IIOP) communication function that works with workload management to distribute RMI requests among application servers in a cell.
lock
A means of preventing uncommitted changes made by one application process from being perceived by another application process and for preventing one application process from updating data that is being accessed by another process. A lock ensures the integrity of data by preventing concurrent users from accessing inconsistent data. See also exclusive lock, shared lock.
log handler
A class that uses loggers, levels, and filters to direct whether events are processed or suppressed.
logger
A named and stateful object with which the user code interacts and that logs messages for a specific system or application component.
logging
The recording of data about specific events on the system, such as errors.
logging level
A value that controls which events are processed by Java logging.
logical derivation
A derivation from a physical document that can have additional service description metadata allocated to the derivation. See also logical model.
logical model
A set of logical derivations. See also logical derivation.
logical terminal (LT)
In SWIFT, the logical entity through which users send and receive SWIFT messages. A logical terminal is identified by its LT name.
logical terminal table (LTT)
A MERVA table used to define logical terminals, their synonyms, and other attributes.
logical unit of work (LUW)
The work that occurs between the start of a transaction and commit or rollback and between subsequent commit and rollback actions. This work defines the set of operations that must be considered part of an integral set.
login binding
A definition of the implementation to provide login information per authentication methods.
login mapping
A Java Authentication and Authorization Service (JAAS) login configuration that is used to authenticate a security token in a Web service security header.
long name
The property that specifies the logical name for the server on the z/OS platform.
long-running process
A process that can come to a complete stop while waiting for input or instructions. The most common form of this interruption would be a human interaction or decision. See also staff activity.
loop
A sequence of instructions performed repeatedly.
loop ID
A unique code that identifies an EDI loop.
loop repeat
A number indicating the maximum number of times a loop can be used in succession.
loose coupling
A coupling that supports an extensible software architecture.
LP
See licensed program.
LPA
See link pack area.
LPP
See licensed program product.
LT
See logical terminal.
LT code
The ninth character of an LT name. For example, the LT code of the LT name XXXXUSNYA is A.
LT name
A nine-character name of the form BBBBCCLLX, where BBBBCCLL represents the eight-character bank identifier code (BIC8), and X represents the logical terminal (LT) code.
LTC
See local transaction containment.
LTPA
See Lightweight Third Party Authentication.
LTT
See logical terminal table.
LUW
See logical unit of work.

M

MAC
See Media Access Control.
mail session
A resource collection of protocol providers that authenticate users and control user access to messaging systems.
maintenance mode
A state of a node or server that an administrator can use to diagnose, maintain, or tune the node or server without disrupting incoming traffic in a production environment.
manageability
The ability to manage a resource, or the ability of a resource to be managed. (OASIS)
manageability capability
A capability associated with one or more management domains. (OASIS)
manageability capability interface
A Web service interface representing one manageability capability. (OASIS)
manageability consumer
A user of manageability capabilities associated with one or more manageable resources. (OASIS)
manageability endpoint
A Web service endpoint associated with and providing access to a manageable resource. (OASIS)
manageability interface
The composition of one or more manageability capability interfaces. (OASIS)
manageable resource
A resource capable of supporting one or more standard manageability capabilities. (OASIS)
Managed Bean (MBean)
In the Java Management Extensions (JMX) specification, the Java objects that implement resources and their instrumentation.
managed deployment environment
A set of server components that are used to test and deploy applications in a controlled environment.
managed environment
An environment where services, such as transaction demarcation, security, and connections to Enterprise Information Systems (EISs), are managed on behalf of the running application. Examples of managed environments are the Web and Enterprise JavaBeans (EJB) containers.
managed node
A node that is federated to a deployment manager and contains a node agent and can contain managed servers. See also node.
managed resource
An entity that exists in the runtime environment of an IT system and that can be managed. See also sensor.
managed server
A server within a managed node, to which SCA modules and applications can be deployed.
management domain
An area of knowledge relative to providing control over, and information about the behavior, health and life cycle of manageable resources.
Management Information Base (MIB)
In the Simple Network Management Protocol (SNMP), a database of objects that can be queried or set by a network management system. See also Simple Network Management Protocol.
mandatory place
A shared place, either a public place or a restricted place, in which all portal users must be members. Only portal administrators can designate a shared place to be a mandatory place. Because membership is automatic and required, portal users cannot join or leave mandatory places.
manifest
A special file that can contain information about the files packaged in a JAR file. (Sun)
manual emulator
An emulator that requires users to specify response values for an emulated component or reference at run time. See also programmatic emulator, emulator.
MAP
See mobile application part.
map

1. A data structure that maps keys to values.

2. A file that defines the transformation between sources and targets.

3. In the EJB development environment, the specification of how the container-managed persistent fields of an enterprise bean correspond to columns in a relational database table or other persistent storage.

map chaining
The process of producing multiple documents from a single document by executing several maps to translate the single document.
map control string
An object compiled from a map, which contains the instructions used by the translator to translate a document from one format to another.
mapped expression
In WebSphere Business Events, part of an SQL statement that is used to retrieve data from a data source for a field in an intermediate object.
mapping

1. The act of developing and maintaining a map.

2. The process of transforming data from one format to another.

3. The relationship between fields in different abstractions of event and action objects.

mapping specialist
The person responsible for creating data transformation maps, validation maps, and functional acknowledgment maps using the Data Interchange Services client.
marker bar
The gray border at the left of the editor area of the workbench, where bookmarks and breakpoints are shown.
marshal
To convert an object into a data stream for transmission over a network.
mashup
A graphical interface that features two or more reusable Web applications (widgets) presenting seemingly disparate data in an understandable combination for a specific purpose.
master configuration
The configuration data held in a set of files that form the master repository for either a deployment manager profile or a stand-alone profile. For a deployment manager profile, the master configuration stores the configuration data for all the nodes in the network deployment cell.
maximum transmission unit (MTU)
The largest possible unit of data that can be sent on a given physical medium in a single frame. For example, the maximum transmission unit for Ethernet is 1500 bytes.
maximum use
A number indicating the maximum number of times a compound or simple element can repeat.
MB
See megabyte.
MBean
See Managed Bean.
MBean provider
A library containing an implementation of a Java Management Extensions (JMX) MBean and its MBean Extensible Markup Language (XML) descriptor file.
MD5
A type of message algorithm that converts a message of arbitrary length into a 128-bit message digest. This algorithm is used for digital signature applications where a large message must be compressed in a secure manner.
MDB
See message-driven bean.
measure
A metric combined with an aggregation type such as average, count, maximum, minimum, sum, or average. See also aggregate metric.
Media Access Control (MAC)
In networking, the lower of two sublayers of the Open Systems Interconnection model data link layer. The MAC sublayer handles access to shared media, such as whether token passing or contention will be used.
mediation
An application of service interaction logic to messages flowing between service requesters and providers.
mediation flow
A sequence of processing steps, or mediation primitives, that run to produce the mediation when a message is received. See also message flow.
mediation flow component
A component that contains one or more mediation primitives arranged into request and response flows. Rather than performing business functions, mediation flow components are concerned with the flow of messages.
mediation framework
A mechanism that supports creation of mediation flows through the composition of mediation primitives.
mediation module
An SCA module that includes a mediation flow component and primarily enables communication between applications by changing the format, content, or target of service requests.
mediation policy
A policy that is held in a registry and is applied to a Service Component Architecture (SCA) module. The mediation policy enables mediation flows, which are in the module, to be configured at run time by using dynamic properties.
mediation policy attachment
An attachment that is a prerequisite for using the mediation policy and gate conditions on the mediation policy.
mediation primitive
The building blocks of mediation flow components.
mediation service
A service that intercepts and modifies messages that are passed between client services (requesters) and provider services.
mediation subflow
A preconfigured set of mediation primitives that are wired together to create a common pattern or use case. Mediation subflows run in the context of a parent flow, and can be reused in mediation flows or in subflows.
meet-in-the-middle mapping
An approach for mapping enterprise beans to database tables in which enterprise beans and database schema are created simultaneously but independently.
megabyte (MB)
For processor storage, real and virtual storage, and channel volume, 2 to the 20th power or 1 048 576 bytes. For disk storage capacity and communications volume, 1 000 000 bytes.
membership
The state of being a portal user and a place member. Membership in the portal is controlled by the administrator during the installation and set up of portal servers. Membership in places is controlled by a place manager, who determines the level of access for each place member: participant, place designer, or place manager.
membership policy
A subexpression that is evaluated against the nodes in a cell to determine which nodes host dynamic cluster instances.
memory leak
The effect of a program that maintains references to objects that are no longer required and therefore need to be reclaimed.
merge
A process element that recombines multiple processing paths, typically after a decision. A merge brings several alternative paths together.
MERVA for ESA
An IBM licensed program that is a message queuing and routing system that allows a financial institution to process all kinds of financial messages. Access to the SWIFT Transport Network (STN) is included as a standard communication link.
message
A set of data that is passed from one application to another. A message can be modeled by a message definition, which describes the structure and content of the message. Messages must have a structure and format that is agreed by the sending and receiving applications. See also category.
message body
The part of the message that contains the message payload. See also message header.
message category
A group of messages that are logically related within an application.
Message Center
An IBM product that uses DirectTalk's voice processing capabilities to provide a wide range of voice mail, fax, and e-mail functions.
message channel
In distributed message queuing, a mechanism for moving messages from one queue manager to another. A message channel comprises two message channel agents (a sender at one end and a receiver at the other end) and a communication link.
message delivery preference
The subscriber's choice of whether voice mail is stored as voice mail only, as e-mail only, or as both voice mail and e-mail.
message delivery type
The format in which a voice message is delivered.
message digest
A hash value or a string of bits resulting from the conversion of processing data to a number.
message file
A file containing messages sent in bulk through a message bulking service.
message flow
A sequence of processing steps that execute in the broker when an input message is received. Message flows are defined in the workbench by including a number of message flow nodes, each of which represents a set of actions that define a processing step. The connections in the flow determine which processing steps are carried out, in which order, and under which conditions. See also subflow, mediation flow.
Message Format Service (MFS)
An editing facility that allows application programs to deal with simple logical messages instead of device-dependent data, thus simplifying the application development process.
Message Format Service control block (MFS control block)
In MFS, the representation of a message or format that is stored in the IMS.FORMAT library and called into the MFS buffer pool as needed for online execution. See also device input format, device output format, message input descriptor, message output descriptor.
message header
The part of a message that specifies the sender and receiver of the message, the message priority, and the type of message. See also message body.
message input descriptor (MID)
The Message Format Service (MFS) control block that describes the format of the data presented to the application program. See also Message Format Service control block, message output descriptor.
message log
A file in which an application logs messages about errors that occur or metadata about the message.
message output descriptor (MOD)
The Message Format Service (MFS) control block that describes the format of the output data produced by the application program. See also Message Format Service control block, message input descriptor.
message processing node
A node in a message flow that represents a processing step. A message processing node can be either a primitive or a subflow node.
message processing unit (MPU)
A message processing unit is used to correlate information within a message, for example reason or completion information, and a message text.
message queue
A named destination to which messages can be sent until they are retrieved by programs that service the queue.
Message Reception Registry (MRR)
The registry where SWIFT stores the central routing rules. Each receiver defines its own rules and submits them to SWIFT. SWIFT uses these rules to determine the destination of message traffic, that is, to which store and forward queue or to which SWIFTNet Link it is to route each message.
message reference number (MRN)
A unique 16-digit number assigned to each message for identification purposes. The message reference number consists of an 8-digit domain identifier that is followed by an 8-digit sequence number.
message sequence number (MSN)
A sequence number for messages.
message signal unit (MSU)
An MTP packet containing data.
message transfer part (MTP)
Part of the SS7 protocol normally used to provide a connectionless service roughly equivalent to levels one to three of the OSI reference model.
message type
The logical structure of the data within a message. For example, the number and location of character strings.
message waiting indicator (MWI)
A visible or audible indication (such as a light or a stutter tone) that a voice message is waiting to be retrieved.
Message Warehouse table
A table in which the Message Warehouse service stores index and status information about each message processed by services.
message-driven bean (MDB)
An enterprise bean that provides asynchronous message support and clearly separates message and business processing.
messaging engine
The messaging and connection point to which applications connect to the bus.
meta search
A search across one or more search engines. A meta search engine provides a meaningful subset of search functionality through an abstraction layer that is generic enough to support a wide variety of search services.
metadata
Data that describes the characteristics of data; descriptive data.
metadata tree
A list in a tree structure, which is prepared and displayed by the external service wizard, that presents all of the objects discovered from the enterprise information system (EIS).
method
In object-oriented programming, an operation that an object can perform. An object can have many methods. See also operation.
method extension
An IBM extension to the standard deployment descriptors for enterprise beans that define transaction isolation methods and control the delegation of credentials.
method permission
A mapping between one or more security roles and one or more methods that a member of a role can call.
metric
A holder for information, typically a business performance measurement, in a monitoring context. See also aggregate metric, instance metric.
MFR1
An in-band address signaling system using six tone frequencies, two at a time. MFR1 is used principally in North America and is described in ITU-T recommendations Q.310 through Q.332.
MFS
See Message Format Service.
MFS control block
See Message Format Service control block.
MIB
See Management Information Base.
MID
See message input descriptor.
middleware agent
An agent that enables the administrative domain to manage servers that run middleware software.
middleware descriptor
An XML file that contains information about different middleware platform types, including discovery sensor intervals and installation information.
middleware node
A node that is federated to the deployment manager. These nodes must include nodes that run the node agent or middleware agent.
MIME
See Multipurpose Internet Mail Extensions.
mobile application part (MAP)
Optional layer 7 application for SS7 that runs on top of TCAP for use with mobile network applications.
MOD
See message output descriptor.
model
A representation of a process, system, or subject area, typically developed for understanding, analyzing, improving, and replacing the item being represented. A model can include a representation of information, activities, relationships, and constraints.
model view controller (MVC)
A software architecture that separates the components of the application: the model represents the business logic or data; the view represents the user interface; and the controller manages user input or, in some cases, the application flow.
modeled fault
A fault message that is returned from a service that has been modeled on the Web Services Description Language (WSDL) port type.
module

1. A program unit that is discrete and identifiable with respect to compiling, combining with other units, and loading.

2. A software artifact that is used for developing, managing versions, organizing resources, and deploying to the runtime environment.

3. In Java EE programming, a software unit that consists of one or more components of the same container type and one deployment descriptor of that type. Examples include EJB, Web, and application client modules. (Sun) See also project.

monitor

1. A facility of the integration test client that listens for requests and responses that flow over the component wires or exports in the modules of a test configuration.

2. In performance profiling, to collect data about an application from the running agents that are associated with that application.

monitor configuration server
The application server installation that owns the overall application server configuration for a cell.
monitor details model
A container for monitoring contexts and their associated metrics, keys, counters, stopwatches, triggers, and inbound and outbound events. The monitor details model holds most of the monitor model information.
monitor model
A model that describes the business performance management aspects of a business model, including events, business metrics, and key performance indicators (KPIs) that are required for real-time business monitoring.
monitor model CEI configuration owner
The server installation that owns the overall server configuration that contains the monitor model Common Event Infrastructure (CEI) server target.
monitored directory
The directory where the rapid deployment tools detect added or changed parts and produce an application that can run on the application server. See also automatic application installation project, free-form project.
monitoring context
A definition that corresponds to an object to be monitored, such as a process execution, an ATM, a purchase order, or the stock level in a warehouse. At run time, monitoring contexts process the events for a particular object.
mount point
A logical drive through which volumes are accessed in a sequential access device class. For removable media device types, such as cartridges, a mount point is a logical drive associated with a physical drive. For the file device type, a mount point is a logical drive associated with an I/O stream.
MPMT
See multiprocess multithread.
MPU
See message processing unit.
MRN
See message reference number.
MRR
See Message Reception Registry.
MSN
See message sequence number.
MSU
See message signal unit.
MTP
See message transfer part.
MTU
See maximum transmission unit.
mu-law
The compressing and expanding algorithm used primarily in North America and Japan when converting from analog to digital speech data. See also A-law.
multidimensional analysis
The process of assessing and evaluating an enterprise on more than one level.
multiple configuration instances
More than one instance of a product running in the same machine at the same time.
Multiple Digital Trunk Processor
The IBM 9295 Multiple Digital Trunk Processor. The combination of a number of digital signal processing cards and supporting equipment that provides high-level voice compression, high voice quality, and digital telephone signaling functions (transmit and receive) via an external shielded cable to an attached IBM RS/6000 computer. See also Single Digital Trunk Processor.
multiple-occurrence mapping
A form of mapping in which all occurrences of a repeating compound or simple element are mapped to the same repeating compound or simple element in another document.
multiprocess multithread (MPMT)
A process architecture of the IBM HTTP Server that supports multiple processes as well as multiple threads per process.
multiprocessor
A processor complex that has more than one central processor.
Multipurpose Internet Mail Extensions (MIME)
An Internet standard that allows different forms of data, including video, audio, or binary data, to be attached to e-mail without requiring translation into ASCII text.
mumble
Non-speech noise that a user interjects while speaking.
music channel
A channel on which sounds can be broadcast to one or more telephony (voice) channels.
music title
The name by which WebSphere Voice Response knows a tune.
MVC
See model view controller.
MWI
See message waiting indicator.

N

N-Best
The ability to return more than one speech recognition result. Typically, an array of results is available in the application in order of descending probability.
named constant
A descriptive name that is given to a value and can be used in a filter in place of a value.
namespace
A logical container in which all the names are unique. The unique identifier for an artifact is composed of the namespace and the local name of the artifact.
namespace object
A Data Interchange Services object that contains information about an XML namespace and assists the translator in being namespace aware when translating a source document to an XML document.
naming
An operation that is used to obtain references to objects that are related to applications.
naming context
A logical namespace containing name and object bindings.
naming federation
The process of binding naming systems so that the aggregate system can process composite names that span the naming systems.
naming service
An implementation of the Java Naming and Directory Interface (JNDI) standard.
NAS
See network access server.
NAT
See network address translation.
National ISDN
A common ISDN standard developed for use in the U.S.
native
Pertaining to the relationship between a transport user and a transport provider that are both based on the same transport protocol.
native start endpoint
A server platform on which native start jobs can run as part of a grid job. See also grid job, native start job.
native start job
A program that can run as a background command on UNIX or Windows systems. Native start jobs can run across multiple programming and component models. Native applications can be implemented in Java, native-compiled languages, such as C++ and COBOL, and scripts. See also native start endpoint.
NAU
See network addressable unit.
navigation bar
A set of links to other Web pages in a Web site. For example, a navigation bar is typically located across the top or down the side of a page and contain direct links to the major sections within the Web site.
Net 5
The test specification for conformance to the Euro-ISDN standard for primary rate access to ISDN.
net change
The cumulative effect of multiple changes to an object. For example, an add action followed by a remove action cancels out other changes, consequently yielding no net change.
net present value (NPV)
The estimated monetary value of an investment based on expected returns and expected costs, where these expected returns and expenses are discounted by a rate that reflects inflation and opportunity costs.
network access server (NAS)
A device that functions as an access control point for users in remote locations who connect to an internal network or to an ISP. A NAS might include its own authentication services or rely on a separate authentication server. A NAS can be a dedicated server or a software service within a regular server.
network acknowledgment
A response from the network indicating the status of an interchange envelope, such as sent or received.
network address translation (NAT)
The conversion of a network address that is assigned to a logical unit in one network into an address in an adjacent network.
network addressable unit (NAU)
In SNA networking, any device on the network that has a network address, including logical units, physical units, and system service control points.
network control program
A program used for requests and responses exchanged between physical units in a network for data flow control.
network deployment cell
A logical group of servers, on one or more machines, managed by a single deployment manager.
Network File System (NFS)
A protocol, developed by Sun Microsystems, Incorporated, that allows a computer to access files over a network as if they were on its local disks.
network identifier
A single character that is placed before a message type to indicate which network is to be used to send the message; for example, S for SWIFT.
network protocol stack
A set of network protocol layers and software that work together to process the protocols.
Network Time Protocol (NTP)
A protocol that synchronizes the clocks of computers in a network.
News Industry Text Format (NITF)
An XML-based format that defines the structure and content of news articles.
News Markup Language (NewsML)
An XML-based format for publishing news-related information.
NewsML
See News Markup Language.
NFAS
See non-facility-associated signaling.
NFS
See Network File System.
NITF
See News Industry Text Format.
node

1. A logical grouping of managed servers. See also managed node.

2. Any item on a tree control, including a simple element, compound element, mapping command, comment, or group node.

3. In XML, the smallest unit of valid, complete structure in a document.

4. The fundamental shapes that make up a diagram.

node agent
An administrative agent that manages all application servers on a node and represents the node in the management cell.
node federation
The process of combining the managed resources of one node into a distributed network such that the central manager application can access and administer the resources on the node.
node group
A collection of application server nodes that defines a boundary for server cluster formation.
node name
The machine name or host name that must be unique.
non-facility-associated signaling (NFAS)
An ISDN configuration where several T1 facilities can be controlled by a single D-channel, instead of the normal T1 configuration where each T1 facility has 23 B-channels and a D-channel (23B+D). With NFAS, all 24 timeslots of the nonsignaling trunks are available for voice whereas only 23 channels can be used on the trunk that carries signaling traffic (23B+D+n24B). See also D-channel backup.
nonce
A unique cryptographic number that is embedded in a message to help detect a replay attack.
nonrepudiation
In business-to-business communication the ability of the recipient to prove who sent a message based on the contents of the message. This can derive from the use of a digital signature on the message, which links the sender to the message.
nonrepudiation data repository
The repository in which copies of documents (and authentication information for signed documents) are stored in case disputes arise regarding the authenticity of document exchanges.
notation
An XML construct that contains a note, a comment or an explanation about information in an XML file. A notation can be used to associate a binary description with an entity or attribute.
notification

1. A message that contains the event descriptions that are sent to managed resources, Web services and other resources.

2. An occurrence within a process that can trigger an action. Notifications can be used to model conditions of interest to be transmitted from a sender to a (typically unknown) set of interested parties (the receivers).

notification broadcaster
An element that is responsible for publishing notifications. Notification receivers listen for these notifications.
notification receiver
An element that listens for and receives notifications. By default, this element starts listening when its owning process starts.
NPV
See net present value.
NT mode
A mode in which attachment to the ISDN network is asymmetric. The network side of the connection operates in NT mode. User equipment operates in terminal equipment, or TE, mode.
NTP
See Network Time Protocol.
numeric constant
The actual numeric value to be used in processing, instead of the name of a field containing the data. A numeric constant can contain any of the numeric digits 0 through 9, a sign (plus or minus), and a decimal point. See also literal.

O

OAEP
See optimal asymmetric encryption padding.
OAMS
See Outgoing Application Message Store.
object

1. An abstract representation of the fields in an event or action definition.

2. In object-oriented design or programming, a concrete realization (instance) of a class that consists of data and the operations associated with that data. An object contains the instance data that is defined by the class, but the class owns the operations that are associated with the data.

object adapter
In Common Object Request Broker Architecture (CORBA), the primary interface that a server implementation uses to access Object Request Broker (ORB) functions.
Object Data Manager (ODM)
A data manager intended for the storage of system data. The ODM is used for many system management functions. Information used in many commands and System Management Interface Tool (SMIT) functions is stored and maintained in the ODM as objects with associated characteristics.
object reference
In Common Object Request Broker Architecture (CORBA), the information needed to reliably identify a particular object.
Object Request Broker (ORB)
In object-oriented programming, software that serves as an intermediary by transparently enabling objects to exchange requests and responses.
object-oriented programming
A programming approach based on the concepts of data abstraction and inheritance. Unlike procedural programming techniques, object-oriented programming concentrates not on how something is accomplished but instead on what data objects comprise the problem and how they are manipulated.
ObjectGrid
A grid-enabled, memory database for applications that are written in Java. ObjectGrid can be used as an in-memory database or to distribute data across a network.
observer
A task that watches a process and its associated repositories, and produces output when a certain condition becomes true (for example, a threshold value has been reached).
OCS channel
See open content syndication channel.
ODBC
See Open Database Connectivity.
ODBC definition
In WebSphere Business Events, the configuration of WebSphere Business Events:Design Data to connect to data sources.
ODM
See Object Data Manager.
off-hook
A telephone line state, usually induced by lifting a receiver, in which the line is ready to make a call.
offline
Pertaining to the operation of a device that is not under the control of a system.
OLAP
See online analytical processing.
on demand router
A proxy server that is the point of entry into the product environment and is a gateway through which prioritized HTTP requests and Session Initiation Protocol (SIP) messages flow to the middleware servers in the environment.
on-demand configuration
A component that detects and dynamically configures routing rules, which tell the on demand router (ODR) how to route requests.
on-hook
A telephone line state, usually induced by hanging up a receiver, in which the line is ready to receive a call.
one-way hash
An algorithm that converts processing data into a string of bits; known as a hash value or a message digest.
one-way interaction
A type of messaging interaction in which a request message is used to request function without a reply.
online analytical processing (OLAP)
The process of collecting data from one or many sources; transforming and analyzing the consolidated data quickly and interactively; and examining the results across different dimensions of the data by looking for patterns, trends, and exceptions within complex relationships of that data.
ontology
An explicit formal specification of the representation of the objects, concepts, and other entities that can exist in some area of interest and the relationships among them. See also Web Ontology Language.
OPC
See originating point code.
open content syndication channel (OCS channel)
An XML-based format for syndicated content.
Open Database Connectivity (ODBC)
A standard application programming interface (API) for accessing data in both relational and nonrelational database management systems. Using this API, database applications can access data stored in database management systems on a variety of computers even if each database management system uses a different data storage format and programming interface. See also Java Database Connectivity.
Open Mobile Alliance
An industry forum for developing interoperable mobile service enablers.
open relationship
A relationship on an object that no longer points to a second object because the second object has been deleted.
Open Servlet Engine (OSE)
A lightweight communications protocol developed by IBM for interprocess communication.
open source
Pertaining to software whose source code is publicly available for use or modification. Open source software is typically developed as a public collaboration and made freely available, although its use and redistribution might be subject to licensing restrictions. Linux is a well known example of open source software.
open systems interconnection (OSI)
The interconnection of open systems in accordance with standards of the International Organization for Standardization (ISO) for the exchange of information.
open systems interconnection architecture (OSI architecture)
Network architecture that adheres to the particular set of ISO standards relating to Open Systems Interconnection.
open systems interconnection reference model (OSI-RM)
The seven-layer basic reference model that ISO 7498 (CCITT X.200) uses to describe how open systems should act and interact. The three primary kinds of interactions described in that reference model are the interactions: (a) inside layers, (b) between layers, and (c) between open systems.
Open Transaction Manager Access (OTMA)
A component of IMS that implements a transaction-based, connectionless client/server protocol in an MVS sysplex environment. The domain of the protocol is restricted to the domain of the z/OS Cross-System Coupling Facility (XCF). OTMA connects clients to servers so that the client can support a large network (or a large number of sessions) while maintaining high performance. See also IMS connect.
operation
An implementation of functions or queries that an object might be called to perform. See also method.
operation mapping
An interface map in which operations of the source interface are mapped to operations of the target interface.
optimal asymmetric encryption padding (OAEP)
In cryptography, a padding scheme that is often used with RSA encryption.
option
A parameter that determines how a message is to be processed.
option set
A named group of options and their settings that can be specified in a request or in another option set, thereby eliminating the need to specify each option individually.
ORB
See Object Request Broker.
organization
An entity where people cooperate to accomplish specified objectives, such as an enterprise, a company, or a factory.
organization unit
A particular occurrence or example of an organization definition. For an organization definition called Department, an example of an organization unit would be Sales and Marketing.
organizational unit (OU)
A body whose data is to be kept separate from that of other, similar bodies. WebSphere BI for FN uses OUs to control access to resources, and to ensure data segregation. Typically, OUs are used to represent different financial institutions, or different departments within a financial institution.
originating point code (OPC)
A code that identifies the signaling point that originated an MTP signal unit. Unique within a particular network.
OSE
See Open Servlet Engine.
OSI
See open systems interconnection.
OSI architecture
See open systems interconnection architecture.
OSI-RM
See open systems interconnection reference model.
OTMA
See Open Transaction Manager Access.
OU
See organizational unit.
out-of-band
Pertaining to signals that are carried within the telephony signaling channel, as opposed to the voice channel. See also in-band.
outbound authentication
The configuration that determines the type of accepted authentication for outbound requests.
outbound document
See target document.
outbound event
An event emitted from a monitoring context or from a KPI context.
outbound port
The mechanism through which an outbound service communicates with the externally-hosted Web service. Messages pass between the outbound service and the external service through the appropriate port.
outbound processing
The process by which a calling client application uses the adapter to update or retrieve data in an enterprise information system (EIS). The adapter uses operations such as create, update, delete, and retrieve to process the request.
outbound service
The service that provides access through one or more outbound ports to a Web service that is hosted externally.
Outgoing Application Message Store (OAMS)
A message store in which messages sent by local applications (ISN messages) and their acknowledgement messages (ISN ACKs) are stored.
outgoing mail
In voice mail, messages sent by a subscriber to another subscriber on the same system, which have not yet been listened to by the addressee.
output
An exit point through which an element can notify downstream elements that they can now start.
output activity
The end point of the business process.
output branch
The area of a decision, fork, join, or merge that contains the outputs.
output criteria
Number and types of outputs required to be produced by a task or process.
output screen
A screen that a user navigates to based on data entry and keystrokes in a 3270 application. In the 3270 terminal service recorder, the access route from one screen to another can be recorded and saved in a dialog file.
output terminal node
A primitive through which a message is propagated by a subflow. Each output terminal node is represented as an output terminal of the corresponding subflow node.
OWL
See Web Ontology Language.

P

PABX
See private automatic branch exchange.
pack
A component (SPACK or VPACK) that fits in the 9295 Multiple Digital Trunk Processor, or one of four XPACKs on the DTXA. See also VPACK, XPACK, SPACK.
package

1. In Java programming, a group of types. Packages are declared with the package keyword. (Sun)

2. The wrapper around the document content that defines the format used to transmit a document over the Internet, for example, RNIF, AS1, and AS2.

3. To assemble components into modules and modules into enterprise applications.

page
A node in a portal that can contain content in addition to labels and other pages. Pages can contain child nodes, column containers, row containers, and portlets. See also container.
page list
An assembly property that specifies the location to forward a request, but automatically tailors that location, depending on the Multipurpose Internet Mail Extensions(MIME) type of the servlet.
page template
In Page Designer, a page that is used as a starting point to define consistent styles and layout for any new HTML or JavaServer Pages (JSP) page within a Web site.
palette
A range of graphically displayed choices, such as colors or collections of tools, that can be selected in an application.
PAP
See policy administration point.
parallel garbage collection
A type of garbage collection that uses several threads simultaneously.
parameter (parm)
A value or reference passed to a function, command, or program that serves as input or controls actions. The value is supplied by a user or by another program or process. See also configuration file, input parameter.
parameter file
An ASCII file used to set configuration parameters. See also configuration parameter.
parameter mapping
An interface map that is one level deeper than operation mappings because it maps the parameters in the source operation to the parameters in the target operation. There are five types of parameter mappings: move, map, extract, Java, and assign.
parent document
A document whose values are inherited by another document (the child document).
parm
See parameter.
parse
To break down a string of information, such as a command or file, into its constituent parts.
parser
A module used to break down a document into its component parts and to construct a document from its component parts.
part reference
An object that is used by a configuration to reference other related configuration objects.
participant
A member of a portal place who can visit and use the place. By default, all portal users are participants in public places. See also place designer, place manager.
partitioned data set (PDS)
A data set on direct access storage that is divided into partitions, called members, each of which can contain a program, part of a program, or data.
partitioning facility
A programming framework and a system management infrastructure that supports the concept of partitioning for enterprise beans, HTTP traffic, and database access.
partner connection
An interaction that has been associated with specific sending and receiving partners, and also specifies the destinations and other routing information necessary for an exchange.
partner profile
A profile that includes information about the partner such as its name, its business identifier, such as a DUNS number, and a list of user IDs authorized to access the Community Console. See also Data Universal Numbering System.
passivation
In enterprise beans, the process of transferring an enterprise bean from memory to secondary storage. (Sun) See also activation.
PassTicket
In RACF secured sign-on, a dynamically generated, random, one-time-use, password substitute that a workstation or other client can use to sign on to the host rather than sending a RACF password across the network.
password
In computer and network security, a specific string of characters used by a program, computer operator, or user to access the system and the information stored within it. See also authentication.
path

1. A route that the flow can take through the activities in a process. There may be several alternative paths.

2. The route through a file system to a specific file.

path qualified mapping
A form of mapping in which all occurrences of a repeating compound or simple element are mapped to the same repeating compound or simple element in another document.
payload
The body of a message that holds content.
PBX
See private branch exchange.
PCI
See Peripheral Component Interconnect.
PCM fault condition
A fault, such as power supply failure, or loss of incoming signal, in T1 or E1 equipment. (ITU-T G.732 and G.733.)
PCRE
See Perl-compatible regular expression.
PDP
See policy decision point.
PDS
See partitioned data set.
peer access point
A means by which core groups can communicate with other cells.
PEM
See privacy enhanced mail.
people assignment criterion
A property that defines the members of each of the role groups.
people awareness
The collaboration feature that provides access to people from various contexts. People awareness lets you see references to people and contact people by name through the Sametime online status indicator. Throughout the portal, wherever you see the name of a person, you can view the online status of the person, send e-mail, initiate a chat, or share an application via an electronic meeting. See also person link.
PEP
See policy enforcement point.
Performance Monitoring Infrastructure (PMI)
A set of packages and libraries assigned to gather, deliver, process, and display performance data.
Peripheral Component Interconnect (PCI)
A local bus that provides a high-speed data path between the processor and attached devices.
Perl-compatible regular expression (PCRE)
A regular expression C library that is much richer than classic regular expression libraries. See also regular expression.
permission
Authorization to perform activities, such as reading and writing local files, creating network connections, and loading native code.
persist
To be maintained across session boundaries, typically in nonvolatile storage such as a database system or a directory.
persistence

1. A characteristic of data that is maintained across session boundaries, or of an object that continues to exist after the execution of the program or process that created it, typically in nonvolatile storage such as a database system.

2. In Java EE, the protocol for transferring the state of an entity bean between its instance variables and an underlying database. (Sun)

persistent data store
A nonvolatile storage for event data, such as a database system, that is maintained across session boundaries and that continues to exist after the execution of the program or process that created it.
person
An individual authenticated by the portal and having a person record in one or more corporate directories. Persons can be members of places, public groups within the organization corporate directory, or personal groups that a user defines. See also public group.
person link
A reference to a person name or a group name that appears with the Sametime online status indicator. The reference lets you view the online status the person, send an e-mail, start a chat, or share an application using an electronic meeting, among other actions shown on the person link menu. See also people awareness.
personal greeting
In voice mail, a greeting recorded by a subscriber. See also system greeting.
personal group
In Sametime Connect, a group of people designated by the user as a group. A user can choose individuals from the public Directory (public group) and create personal groups, which are then stored locally. Users can add and remove people from a personal group, whereas the membership of the public group is defined by the owner of the public Directory. See also public group.
personalization
The process of enabling information to be targeted to specific users based on business rules and user profile information.
perspective
A group of views that show various aspects of the resources in the workbench.
pervasive computing
The use of a computing infrastructure that supports information appliances from which users can access a broad range of network-based services, including Internet-based e-commerce services.
pessimistic locking
A locking strategy whereby a lock is held between the time that a row is selected and the time that a searched update or delete operation is attempted on that row.
phantom read
A read request in which two identical queries run, and the collection of rows returned by the second query is different from the first query.
phone recognition
Communicating with a computer using voice using a telephone, over a telephone line. The computer application recognizes what is said and takes appropriate action.
PHP Hypertext Preprocessor
A widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.
PIP
See RosettaNet Partner Interface Process.
pivot table
A table characterized by having one metric as a column dimension and all the rest of the metrics represented as row dimensions.
PKCS
See Public Key Cryptography Standards.
PKI
See public key infrastructure.
place designer
A member of a place who can edit place layout and bookmarks. See also participant, place manager.
place manager
A member of a place who can edit place membership, layout, and bookmarks. See also participant, place designer.
place member
A individual or group who has joined or been granted access to a place. Place members have three levels of access to a place: manager, designer, and participant.
place template
A format for use in creating a place. The portal provides a set of default templates for creating various types of places. Portal administrators may allow users to create, modify, and delete new templates.
placeholder
A variable that is replaced with a value.
plug-in
A separately installable software module that adds function to an existing program, application, or interface.
PMI
See Performance Monitoring Infrastructure.
point-to-point
Pertaining to a style of messaging application in which the sending application knows the destination of the message.
policy
A set of considerations that influence the behavior of a managed resource or a user. See also policy expression.
policy administration point (PAP)
A capability that provides enterprise service-oriented architecture (SOA) policy administration capabilities, such as policy creation, modification, storage, and distribution.
policy decision point (PDP)
A capability that decides, based on environmental conditions, which predefined policies in the environment should be enforced. For example, a policy decision point might use a requester identity to determine whether to limit access to a resource.
policy enforcement point (PEP)
A capability that enforces policy decsions maybe by a policy decision point. For example, a policy enforcement point would permit or deny a requester access to a resource depending on what the policy decision point determined is the correct action.
policy expression
A representation of a policy. See also policy.
policy set
A collection of assertions about how services are defined, which can be used to simplify security configurations.
policy-controlled mediation
A mediation that has dynamic properties that are controlled by mediation policies.
pool
A graphical container that represents the different business entities or roles that participate in a process.
port

1. As defined in a Web Services Description Language (WSDL) document, a single endpoint that is defined as a combination of a binding and a network address.

2. In time-slot management, one end of a 64 kbps unidirectional stream which can be attached to the SCBus.

port destination
The specialization of a service integration bus destination. Each port destination represents a particular message format and transport protocol that you can use to pass messages to an externally-hosted service.
port number
In Internet communications, the identifier for a logical connector between an application entity and the transport service.
port set
In time-slot management, a collection of ports that can be connected using a single CA_TDM_Connect() API call to a complementary collection of ports. An example of a port set is the transmit-receive pair corresponding to one telephony channel on a Digital Trunk Quad Adapter (DTQA).
port type
An element in a Web Services Description Language (WSDL) document that comprises a set of abstract operations, each of which refers to input and output messages that are supported by the Web service. See also interface.
portal
A single, secure point of access to diverse information, applications, and people that can be customized and personalized.
Portal Administration
The place where portal administrators set and maintain basic collaboration permissions, place records, place membership records, and server settings for companion products for advanced collaboration.
portal member
An individual or group who has a user record in the portal directory (LDAP or other directory) and can log in to the portal.
portlet
A reusable Web module that runs on a portal server. Portlets have predefined roles such as retrieving news headlines, searching a database, or displaying a calendar.
portlet API
The set of interfaces and methods that are used by Java programs running within the portal server environment to obtain services.
portlet application
A collection of related portlets that can share resources with one another.
portlet container
A column or row that is used to arrange the layout of a portlet or other container on a page.
portlet control
A portlet registry setting that renders the outer frame for a portlet.
portlet framework
The set of classes and interfaces that support Java programs running within the portal server environment.
portlet mode
A form assumed by a portlet to provide a distinctive interface for users to perform different tasks. Portlet modes can include view, edit, and help.
POST
In HTTP, a parameter on the METHOD attribute of the FORM tag that specifies that a browser will send form data to a server in an HTTP transaction separate from that of the associated URL.
postcondition
A constraint that must be true at the completion of an operation.
PPTP
See protocol.
PRA
See primary rate access.
precondition
A definition of what must be true when a task or process starts.
predicate
A Boolean logic term denoting a logical expression that determines the state of a variable.
presumed trust
A type of identity assertion where trust is presumed and additional trust validation is not performed. Use this mode only in an environment where trust is established with some other mechanism.
PRI

1. See primary rate interface.

2. See primary rate ISDN.

primary key

1. An object that uniquely identifies an entity bean of a particular type.

2. In a relational database, a key that uniquely identifies one row of a database table. See also constraint, foreign key.

primary rate access (PRA)
See primary rate interface.
primary rate interface (PRI)
An ISDN interface normally used by large sites, providing 30 (E1) or 23 (T1) B-channels of 64 kbits per second and one D-channel for signaling. This is often known as 30B+D or 23B+D. See also basic rate interface.
primary rate ISDN (PRI)
See primary rate interface.
primary server
The server on which all resources that are to be deployed exactly once per instance or once per organization unit (OU) are deployed.
primitive

1. A message processing node that cannot be further subdivided. See also subflow node.

2. A message sent from one process to another.

primitive type
In Java, a category of data type that describes a variable that contains a single value of the appropriate size and format for its type: a number, a character, or a Boolean value. Examples of primitive types include byte, short, int, long, float, double, char, boolean.
principal
An entity that can communicate securely with another entity. A principal is identified by its associated security context, which defines its access rights.
privacy enhanced mail (PEM)
A standard for secure email on the Internet.
private automatic branch exchange (PABX)
An automatic private switching system that services an organization and is usually located on a customer's premises. Often used synonymously with private branch exchange.
private branch exchange (PBX)
A switching system located on a customer's premises that consolidates the number of inside lines (extensions) into a smaller number of outside lines (trunks). Many PBXs also provide advanced voice and data communications features.
private business object

1. A business object that is contained within other business objects. Private business objects are visible only to the containing business object, thereby making them private. See also business object.

2. In XSD, a business object attribute that defines an anonymous complex type instead of referencing a named complex type.

private key
In secure communication, an algorithmic pattern used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user system and is protected by a password. See also key, public key, public key cryptography.
private service bundle
A service bundle that is not explicitly mentioned in the customization definition document (CDD), but that is included in a service bundle set and provides resources required by another service bundle. In a customization definition report, private service bundles are listed, and their names are followed by the string [private].
probe
A reusable set of Java code fragments and supporting attributes for collecting detailed runtime information about objects, arguments, and exceptions. See also Probekit.
Probekit
A scriptable framework for doing byte-code insertion to probe the workings of a target program. See also probe.
process

1. A progressively continuing procedure consisting of a series of controlled activities that are systematically directed toward a particular result or end.

2. The sequence of documents or messages to be exchanged between the Community Managers and participants to run a business transaction.

process case
A possible path through a process, identified by a unique set of process decision outcomes and possibly determined by attributes and values of incoming data.
process definition
A specification of the runtime characteristics of an application server process.
process diagram
A diagram that represents the flow of work for a process. The objects within a process diagram include tasks, processes, connections, business items, resources, and decisions.
process flow
The representation of interdependencies between activities in a structured format.
process instance
A manifestation of a modeled process that is created in a simulated or real environment.
Process Manager
In WebSphere Voice Server, the process that manages the interaction of all telephony system processes, for example, starting and stopping text-to-speech or speech recognition sessions.
process model
A representation of a real-time business process. A business process model is composed of the individual steps or activities that make up the process, contains the conditions that dictate when the steps or activities occur, and identifies the resources that are required to run the business process.
process module
A program unit that contains a set of process templates that support administrative tasks.
production system
A WebSphere Voice Response system that is used to respond to or make 'live' calls. A production system can also be used to develop new applications. See also development system.
profile
Data that describes the characteristics of a user, group, resource, program, device, or remote location.
program data
Application-specific data that can be associated with a call transfer from Callpath to DirectTalk, or in the opposite direction. This is equivalent to Callpath program data, but DirectTalk imposes the restriction that the data must be a printable ASCII character string, with a maximum length of 512 bytes.
program temporary fix (PTF)
For System i, System p, and System z products, a fix that is tested by IBM and is made available to all customers. See also fix pack.
programmatic emulator
An emulator that uses a Java or visual snippet to automatically specify response values for an emulated component or reference at run time. See also manual emulator, emulator.
programmatic login
A type of form login that supports application presentation site-specific login forms for the purpose of authentication.
programmatic security
A collection of methods used by applications when declarative security is not sufficient to express the security model of the application.
project
An organized collection used to group folders or packages. Projects are used for building, version management, sharing, and organizing resources related to a single work effort. See also module, library.
project versioning
The component that interacts with a CVS or Rational ClearCase server to share and create version projects and project data.
promoted property
A property of a mediation module made visible by the solution integrator to the runtime administrator, so that its value can be changed at run time.
prompt

1. A component of an action that indicates that user input is required for a field before making a transition to an output screen.

2. A message or a displayed symbol that requests information or user action. The user must respond to allow the program to proceed.

3. A program that uses logic to determine dynamically the voice segments to be played as a voice prompt.

prompt directory
A list of all the prompts used in a particular voice application. Used by the state table to play the requested voice prompts.
pronunciation
The possible phonetic representations of a word. A word can have multiple pronunciations; for example, "the" has at least two pronunciations, "thee" and "thuh".
pronunciation dictionary
A file that contains the phonetic representation of all the words, phrases, and sentences for an application's grammars.
pronunciation pool
A WebSphere Voice Server resource that contains the set of all pronunciations.
property
A characteristic of an object that describes the object. A property can be changed or modified. Properties can describe an object name, type, value, or behavior, among other things.
protocol (PPTP)
A set of rules controlling the communication and transfer of data between two or more devices or systems in a communication network.
protocol binding
A binding that enables the enterprise service bus to process messages independently of the communication protocol.
protocol-level RAS granularity
The level of RAS granularity at which RAS attribute values are assigned on a protocol-wide basis. RAS attribute values defined at the protocol-level are assigned to all requests for a particular protocol, such as the HTTP protocol or IIOP protocol. See also RAS granularity.
proxy
An application gateway from one network to another for a specific network application such as Telnet or FTP, for example, where a firewall proxy Telnet server performs authentication of the user and then lets the traffic flow through the proxy as if it were not there. Function is performed in the firewall and not in the client workstation, causing more load in the firewall.
proxy cluster
A group of proxy servers that distributes HTTP requests across the cluster.
proxy peer access point
A means of identifying the communication settings for a peer access point that cannot be accessed directly.
proxy server

1. A server that acts as an intermediary for HTTP Web requests that are hosted by an application or a Web server. A proxy server acts as a surrogate for the content servers in the enterprise.

2. A server that receives requests intended for another server and that acts on behalf of the client (as the client's proxy) to obtain the requested service. A proxy server is often used when the client and the server are incompatible for direct connection. For example, the client is unable to meet the security authentication requirements of the server but should be permitted some services. See also server.

pseudo attribute
An attribute that cannot have a value, and is used to indicate a binary state, such as yes/no or on/off. For example, the attribute local might be present for some resources and absent for others, indicating whether the resource is local. Pseudo attributes are especially useful for implementing access rights, such as read, update, or delete. See also real attribute.
PSTN
See public switched telephone network.
PTF
See program temporary fix.
public

1. In object-oriented programming, pertaining to a class member that is accessible to all classes.

2. In the Java programming language, pertains to a method or variable that can be accessed by elements residing in other classes. (Sun)

public group
A group of individuals, known to all portal users, that the administrator has created or that exists in the organization's corporate directory. Only administrators can modify and manage public groups. See also person.
public key
In secure communication, an algorithmic pattern used to decrypt messages that were encrypted by the corresponding private key. A public key is also used to encrypt messages that can be decrypted only by the corresponding private key. Users broadcast their public keys to everyone with whom they must exchange encrypted messages. See also key, private key.
public key algorithm
An algorithm designed so that the key used for encryption is different from the key used for decryption. The decryption key cannot be derived, at least not in any reasonable amount of time, from the encryption key.
public key cryptography
A cryptography system that uses two keys: a public key known to everyone and a private or secret key known only to the recipient of the message. The public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. See also private key.
Public Key Cryptography Standards (PKCS)
A set of industry-standard protocols used for secure information exchange on the Internet. Domino Certificate Authority and Server Certificate Administration applications can accept certificates in PKCS format.
public key infrastructure (PKI)
A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in a network transaction. See also public key, SWIFTNet public key infrastructure.
public place
A shared place that is open to all portal users. The person who creates the place (and who automatically becomes the place manager) designates it as a public place during place creation. See also restricted place.
public switched telephone network (PSTN)
A communications common carrier network that provides voice and data communications services over switched lines.
publish

1. In UDDI, to advertise a Web service so that other businesses can find it and bind with it. Service providers publish the availability of their services through a registry.

2. To make a Web site public, for example by putting files in a path known to the HTTP server.

publish/subscribe
A type of messaging interaction in which information, provided by publishing applications, is delivered by an infrastructure to all subscribing applications that have expressed interest in that type of information.
pulse code modulation
Variation of a digital signal to represent information.
push button

1. A key on a telephone key pad.

2. In a window or dialog box, a rectangular control that, when clicked, immediately causes an action to be performed. Push buttons can be labeled with text, graphics, or both. The most familiar push buttons are OK and Cancel.

pushbutton telephone
A type of telephone that has pushbuttons. It might or might not send tone signals. If it does, each number and symbol on the key pad has its own specific tone.

Q

Q.921
The ITU-T (formerly CCITT) recommendation that defines the link layer of the DSS1 protocol. Q.921 defines an HDLC protocol that ensures a reliable connection between the network and the user. Often used synonymously with LAPD.
Q.931
An ITU recommendation that defines the network layer protocol for integrated services digital network (ISDN). This layer carries the ISDN messages that control the establishment and clearing of calls.
QoS
See quality of service.
qualifier
A simple element that gives another generic compound or simple element a specific meaning. Qualifiers are used in mapping single or multiple occurrences. A qualifier can also be used to denote the namespace used to interpret the second part of the name, typically referred to as the ID.
quality of service (QoS)
A set of communication characteristics that an application requires. Quality of Service (QoS) defines a specific transmission priority, level of route reliability, and security level.
quartile analysis
A type of analysis that displays the value of the business measures boundaries at the 25th, 50th, or 75th percentiles of a frequency distribution divided into four parts, each containing a quarter of the population.
query

1. A request for information from a database based on specific conditions: for example, a request for a list of all customers in a customer table whose balances are greater than USD1000.

2. A reusable request for information about one or more model elements

queue
An object that holds messages for message-queueing applications. A queue is owned and maintained by a queue manager.
queue destination
A service integration bus destination that is used for point-to-point messaging.
queue manager
A component of a message queuing system that provides queuing services to applications. See also local queue manager, remote queue manager.
queuing network
A group of interconnected components.
quiesce
To end a process or shut down a system after allowing normal completion of active operations.

R

RACF
See Resource Access Control Facility.
RADIUS
See remote authentication dial-in user service.
RAI
See remote alarm indication.
rapid deployment tool
One of a set of tools to rapidly develop and deploy Java EE artifacts on the server and package the Java EE artifacts into the deployed EAR file.
RAR
See resource adapter archive.
RAS
See reliability, availability, and serviceability.
RAS attribute
An attribute that the server applies to a request to control how the server processes that request. RAS attribute values can be defined with server-level, protocol-level, or request-level granularity. See also reliability, availability, and serviceability.
RAS granularity
The extent to which a user can assign different RAS attribute values to different sets of requests within the same application server. The user can define RAS attribute values on a per-server, per-protocol, or per-request basis. See also reliability, availability, and serviceability, protocol-level RAS granularity, request-level RAS granularity, server-level RAS granularity.
Rational Unified Process (RUP)
A configurable software development process platform that is used to assign and manage tasks and responsibilities within a development organization.
RBS
See robbed-bit signaling.
RE
See remote extension.
read-through cache
A sparse cache that loads data entries by key as they are requested. When data cannot be found in the cache, the missing data is retrieved with the loader, which loads the data from the back-end data repository and inserts the data into the cache.
real attribute
An attribute that must have a value. See also pseudo attribute.
realize
In the Web diagram editor, to associate a node with an actual resource by creating that resource or by editing the node path so that it points to an existing resource. See also unrealized.
realm
A collection of resource managers that honor a common set of user credentials and authorizations.
realm name
The machine name of a user registry.
receiver
A component that accepts documents from external partners and from back end applications and stores them in a file system for the Document Manager to process. Specifically, it receives a document over a supported transport protocol, writes the document and metadata relating to the document to the shared file system, records any transport-specific data to the metadata file, and completes any transport-specific technical acknowledgment.
receiver bean
In extended messaging, a message-driven bean or a session bean. A message-driven bean is invoked when a message arrives at a JMS destination for which a listener is active. A session bean polls a JMS destination until a message arrives, gets the parsed message as an object, and can use methods to retrieve the message data.
Recognition Engine server
In WebSphere Voice Server, the software that carries out the speech recognition and forwards the results to the client. This consists of one 'Tsm router' and at least one 'tsmp' and one 'engine'.
recognition profile
In the 3270 Terminal Services tool, a list of the identifiers that uniquely identify the state of a screen, that is, the set of conditions that apply to the screen at the time the screen was imported from the host. Each screen state needs to be uniquely defined in its own recognition profile.
recognition table
In the 3270 terminal services development tool, the table that appears in the screen editor and provides a screen definition view and a recognition profile view of the screen that was imported.
record ID information object
A Data Interchange Services object that contains control information for ROD document definitions. It identifies the type of ROD document definition being used and where the record ID, if any, is located in the records associated with the document definition.
record oriented data (ROD)
The type of document definition used to describe proprietary document formats. One of the supported document syntax types.
record oriented data dictionary (ROD dictionary)
A logical grouping of related ROD document definition components.
record oriented data document definition (ROD document definition)
A description or layout of a proprietary document, comprising loops, records, structures, and fields.
record oriented data field (ROD field)
A single item of data, such as a purchase order number, in a record oriented data (ROD) document definition. A ROD field corresponds to an EDI data element in an EDI document definition.
record oriented data loop (ROD loop)
A group of consecutive records and loops that repeat together in a ROD document definition.
record oriented data record (ROD record)
A group of logically related fields set up as a record in a ROD document definition.
record oriented data structure (ROD structure)
A group of related fields in a ROD document definition, such as the fields making up the line item of an invoice. The record oriented data (ROD) structure corresponds to an EDI composite data element in an EDI document definition.
recurring wait time trigger
A trigger that is evaluated based on a period of time. For example, a recurring wait time trigger can be evaluated every 30 minutes and fire if it detects that a specific business situation has occurred.
recursion
A programming technique in which a program or routine calls itself to perform successive steps in an operation, with each step using the output of the preceding step.
reduced instruction set computer (RISC)
A computer that uses a small, simplified set of frequently used instructions for rapid processing.
reentrance
A situation where a thread of control attempts to enter a bean instance again.
refactor
To make changes across a set of artifacts without changing the behavior of the application or its relationships to other elements.
reference
Logical names defined in the application deployment descriptor that are used to locate external resources for enterprise applications. At deployment, the references are bound to the physical location of the resource in the target operational environment.
reference binding
A binding that maps a logical name (a reference) to a JNDI name.
reference delete conflict
An edit conflict that occurs when one user has deleted an object that another user has referred to or vice versa.
referenced type
An object that is referred to by a source object. See also associated type.
referential integrity

1. In Extensible Markup Language (XML) tools, the condition that exists when all references to items in the XML schema editor or DTD editor are automatically cleaned up when the schema is detected or renamed.

2. The condition that exists when all intended references from data in one column of a table to data in another column of the same or a different table are valid.

referral number
The phone number to which calls are routed, when call forwarding is active.
refresh pack
A cumulative collection of fixes that contains new functions. See also fix pack, interim fix.
region
A contiguous area of virtual storage that has common characteristics and that can be shared between processes.
registered user
A portal user who has a user ID and password for logging in to a portal. See also anonymous user, authenticated user.
registry
A repository that contains access and configuration information for users, systems, and software.
regular expression
A set of characters, meta characters, and operators that define a string or group of strings in a search pattern. See also Perl-compatible regular expression.
rejection
The identification of an utterance as one not allowed by a grammar.
relationship instance
The runtime instantiation of the relationship. The relationship definition is a template for the relationship instance.
relationship management application (RMA)
An application used to manage authorizations. Among other things, it converts bootstrap authorizations created by WebSphere BI for FN into the RMA authorizations required to satisfy FIN PV03.
Relationship Management Data Store (RMDS)
A set of database tables in which WebSphere BI for FN stores data about bootstrap and relationship management application (RMA) authorizations.
relationship manager
A tool for creating and manipulating relationship and role data at run time.
relationship role
In EJB programming, a traversal of the relationship between two entity beans in one direction or the other. Each relationship that is coded in the deployment descriptor defines two roles.
relationship service
A service used to model and maintain relationships across business objects and other data
release
To send changed files from the workbench to the team server so that other developers on the team can catch up (synchronize) with the updated version.
release character
The character that indicates that a separator or delimiter is to be used as text data instead of as a separator or delimiter. The release character must immediately precede the delimiter.
Release Link Trunk (RLT)
A custom specification from Nortel for ISDN call transfer.
reliability, availability, and serviceability (RAS)
A combination of design methodologies, system policies, and intrinsic capabilities that, taken together, balance improved hardware availability with the costs required to achieve it. Reliability is the degree to which the hardware remains free of faults. Availability is the ability of the system to continue operating despite predicted or experienced faults. Serviceability is how efficiently and nondisruptively broken hardware can be fixed. See also RAS attribute, RAS granularity.
remote
Pertaining to a system, program, or device that is accessed through a communication line.
remote alarm indication (RAI)
A remote alarm (also referred to as a yellow alarm) indicates that the far end of a T1 connection has lost frame synchronization. The Send RAI system parameter can be set to prevent DirectTalk from sending an RAI
remote authentication dial-in user service (RADIUS)
An authentication and accounting system that uses access servers to provide centralized management of access to large networks.
remote database
A database to which a connection is made by using a database link, while connected to a local database. See also local database.
remote extension (RE)
An E1 signaling protocol similar to FXS loop start.
remote file system
A file system residing on a separate server or operating system.
remote file transfer instance
A file that contains information about the method used for remotely transferring a file.
remote home interface
In enterprise beans, an interface that specifies the methods used by remote clients for locating, creating, and removing instances of enterprise bean classes. See also local home interface.
remote interface
In EJB programming, an interface that defines the business methods that can be called by a client. See also home interface.
remote method
A business method in the remote interface that is callable by a client. See also Remote Method Invocation.
Remote Method Invocation (RMI)
A protocol that is used to communicate method invocations over a network. Java Remote Method Invocation is a distributed object model in which the methods of remote objects written in the Java programming language can be invoked from other Java virtual machines, possibly on different hosts. See also remote method.
Remote Method Invocation over Internet InterORB Protocol (RMI/IIOP)
Part of the Java Platform, Standard Edition (Java SE) model that developers can use to program in the Java language to work with RMI interfaces, but use IIOP as the underlying transport.
Remote OSE
A transport mechanism that is based on the Open Servlet Engine (OSE) protocol and is used to communicate between two separate machines in the application server environment.
Remote Procedure Call (RPC)
A protocol that allows a program on a client computer to run a program on a server.
remote product installation
A product installation onto a remote workstation that has a pre-installed operating system.
remote queue
A queue that belongs to a remote queue manager. Programs can put messages on remote queues, but they cannot get messages from remote queues. See also local queue.
remote queue manager
A queue manager to which a program is not connected, even if it is running on the same system as the program. See also local queue manager, queue manager.
remove method
In enterprise beans, a method defined in the home interface and invoked by a client to destroy an enterprise bean. See also home interface.
repeating data element
An EDI data element or EDI composite data element that occurs more than once consecutively in an EDI segment.
repertoire
Configuration information that contains the details necessary for building a Secure Sockets Layer (SSL) connection.
replica
A server that contains a copy of the directory or directories of another server. Replicas back up servers in order to enhance performance or response times and to ensure data integrity.
replication

1. The process of copying objects from one node in a cluster to one or more other nodes in the cluster, which makes the objects on all the systems identical.

2. The process of maintaining a defined set of data in more than one location. Replication involves copying designated changes for one location (a source) to another (a target) and synchronizing the data in both locations.

replication domain
A collection of application server components that share data. These components might include HTTP sessions, dynamic cache, stateful session beans, or the session initiation protocol (SIP) component.
replication entry
A runtime component that handles the transfer of internal data.
reply message
A type of message used for replies to request messages. See also report message, request message.
reply-to queue
The name of a queue to which the program that issued an MQPUT call wants a reply message or report message sent.
report
A formatted presentation of information relating to a model or to process simulation results. Reports can be viewed online, printed, or exported to a variety of file formats.
report container
A group of settings that define the overall presentation of a report, including page dimensions and orientation, margin sizes, and options for displaying title, author, and summary information.
report message
A type of message that gives information about another message. A report message can indicate that a message has been delivered, has arrived at its destination, has expired, or could not be processed for some reason. See also reply message, request message.
repository
A persistent storage area for data and other application resources.
repository checkpoint
A function that backs up copies of files from the master configuration repository. The backup files can be used to restore the configuration to a previous state if future configuration changes cause operational problems.
request consumer binding
A definition of the security requests for the request message that is received by a Web service.
request flow
The flow of the message from the service requester.
Request for Comments (RFC)
In Internet communication, one of a series of numbered documents that describe Internet communication protocols.
request generator binding
A definition of the security requests for the request message that is sent to a Web service.
request message
A type of message used to request a reply from another program. See also reply message, report message.
request metrics
A mechanism to monitor and troubleshoot performance bottlenecks in the system at an individual request level.
request receiver binding
A definition of the security requirements for the request message that is received from a request to a Web service.
request sender binding
A definition of the security requirements for the request message that is sent to a Web service.
request-level RAS granularity
The level of RAS granularity at which RAS attributes are assigned on a request-by-request basis to all requests for a particular request classification, such as HTTP requests that end in .jpg, a specific HTTP request for a URI such as /PlantsByWebSphere/index.html, or all IIOP requests for a particular EJB. See also RAS granularity.
request/reply
A type of messaging application in which a request message is used to request a reply from another application. See also datagram.
resource

1. A discrete asset, for example application suites, applications, business services, interfaces, endpoints, and business events.

2. A facility of a computing system or operating system required by a job, task, or running program. Resources include main storage, input/output devices, the processing unit, data sets, files, libraries, folders, application servers, and control or processing programs.

3. A person, piece of equipment, or material that is used to perform a task or a project. Each resource is a particular occurrence or example of a resource definition.

Resource Access Control Facility (RACF)
An IBM licensed program that provides access control by identifying users to the system; verifying users of the system; authorizing access to protected resources; logging unauthorized attempts to enter the system; and logging accesses to protected resources.
resource adapter
A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system (EIS). A resource adapter plugs in to a container; the application components deployed on the container then use the client API (exposed by adapter) or tool-generated, high-level abstractions to access the underlying EIS. (Sun) See also container, enterprise information system.
resource adapter archive (RAR)
A Java archive (JAR) file that is used to package a resource adapter for the Java 2 Connector (J2C) architecture.
resource class
An attribute of a resource that is used to group resources according to the subsystem to which they belong and the purpose for which they are used.
resource distribution report
A report, generated by the Customization Definition Program (CDP), that describes the resources required by an instance.
resource element
A component of an Intelligent Network that contains specialized resources such as speech recognizers or text-to-speech converters.
resource environment reference
A reference that maps a logical name used by the client application to the physical name of an object.
resource manager
An application, program, or transaction that manages and controls access to shared resources such as memory buffers and data sets. WebSphere MQ, CICS, and IMS are resource managers.
resource manager local transaction (RMLT)
A resource manager view of a local transaction that represents a unit of recovery on a single connection that is managed by the resource manager.
resource model
A model that defines the resources used in business operations, including their roles, availability, and cost characteristics.
resource property
A property for a JDBC data source in a server configuration, for example the server name, user ID, or password.
Resource Recovery Services (RRS)
A component of z/OS that uses a sync point manager to coordinate changes among participating resource managers.
response
In speech recognition, the character string returned by the recognizer, through DVT_Client, to the state table. The string represents the outcome of a recognition attempt. This is the word or words that the recognizer considers to be the best match with the speech input.
response file
A file containing predefined values that is used instead of someone having to enter those values one at a time. See also silent installation.
response flow
The flow of the message from the service provider to the service requester.
response generator binding
A definition of the security requests for the response message that is sent to a Web service.
response receiver binding
A definition of the security requirements for the response message that is received from a request to a Web service.
response sender binding
A definition of the security requirements for the response message that is sent to a Web service.
restricted place
A shared place that is open to only those individuals and groups whom the place creator (or place manager) adds to the place membership list. The person who creates the place (and who automatically becomes the place manager) designates the place as a restricted place during place creation. See also public place.
result
See edge.
result event
An action that is generated by the technology connectors and sent back to the runtime server to be processed as a new event.
result set
A set of row values as returned by, for example, a cursor or procedure.
result state
The state following each of the possible results of an action.
result tree
The output document that is created when an XSL file is used to transform an XML file.
resume
To continue execution of an application after an activity has been suspended.
return code
A value returned by a program to indicate the result of its processing. Completion codes and reason codes are examples of return codes.
reverse proxy
An IP-forwarding topology where the proxy is on behalf of the back-end HTTP server. It is an application proxy for servers using HTTP.
RFC
See Request for Comments.
rich media
In a Web page, content that is aural, visual, or interactive, such as audio or video files.
Rich Site Summary (RSS)
An XML-based format for syndicated Web content that is based on the RSS 0.91 specification. The RSS XML file formats are used by Internet users to subscribe to Web sites that have provided RSS feeds. See also feed.
rich text
A field that can contain objects, file attachments, or pictures as well as text with formatting options such as italics or boldface.
ripplestart
An action where the system waits for a member in a cluster to start before starting the next member of the cluster.
RISC
See reduced instruction set computer.
RLT
See Release Link Trunk.
RM distribution file
A file used to exchange relationship data with an relationship management application (RMA). It is the file that is created when you export bootstrap authorizations, and it is the file from which you import authorizations from an RMA.
RM report
A report used to determine whether all the relationships that are required when using PV03 exclusively have already been recorded, and whether corresponding authorisations already exist.
RMA
See relationship management application.
RMA authorisation
An authorisation that has been processed by an RMA.
RMDS
See Relationship Management Data Store.
RMI
See Remote Method Invocation.
RMI/IIOP
See Remote Method Invocation over Internet InterORB Protocol.
RMLT
See resource manager local transaction.
robbed-bit signaling (RBS)
The T1 channel -associated signaling scheme that uses the least significant bit (bit 8) of each information channel byte for signaling every sixth frame. This is known as 7-5/6-bit coding rather than 8-bit coding. The signaling bit in each channel is associated only with the channel in which it is contained.
ROD
See record oriented data.
ROD dictionary
See record oriented data dictionary.
ROD document definition
See record oriented data document definition.
ROD field
See record oriented data field.
ROD loop
See record oriented data loop.
ROD record
See record oriented data record.
ROD structure
See record oriented data structure.
role

1. A collection of access rights that can be assigned to a user, group of users, system, service, or application that enable it to carry out certain tasks.

2. A description of a function to be carried out by an individual or bulk resource, and the qualifications required to fulfill the function. In simulation and analysis, the term role is also used to refer to the qualified resources.

3. A job function that identifies the tasks that a user can perform and the resources to which a user has access. A user can be assigned one or more roles.

4. A logical group of principals that provides a set of permissions. Access to operations is controlled by granting access to a role.

5. In a relationship, a role determines the function and participation of entities. Roles capture structure and constraint requirements on participating entities and their manner of participation. For example, in an employment relationship, the roles are employer and employee.

role mapping
The process of associating groups and principals recognized by the container to security roles specified in the deployment descriptor.
role-based authorization
The use of authorization information to determine whether a caller has the necessary privilege to request a service.
root
The user name for the system user with the most authority.
root element
The implicit highest-level node of a parsed XML document. You may not always be able to predict which element will be the document element of a parsed instance, but it will always have a root node that you can count on being able to use for preliminary or setup processing.
RosettaNet Partner Interface Process (PIP)
A specialized system-to-system XML-based dialog that depicts the activities, decisions, and partner role interactions that fulfill a business transaction between two partners in a given supply chain.
routing policy
A set of rules that determine how the server routes incoming requests.
RPC
See Remote Procedure Call.
RRS
See Resource Recovery Services.
RSA encryption
A system for public-key cryptography used for encryption and authentication. It was invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. The security of the system depends on the difficulty of factoring the product of two large prime numbers.
RSS
See Rich Site Summary.
rule

1. A condition that must be satisfied when a business activity is being performed.

2. See interaction block.

rule logic
The business logic, which is expressed by a business rule, that consists of decisions that affect how a business responds to specific business conditions. For example, a decision that determines how much of a discount to give to a preferred customer is rule logic.
rule schedule
An interface for modifying the values of a business rule in the rule logic selection record.
rule set
An if-then statement that is composed of a set of textual statements, or rules, that are evaluated sequentially. if is the condition and then is the action. Each condition that evaluates to true is acted upon. See also decision table, action rule, if-then rule.
rules-based personalization
Personalization technology that enables you to customize Web content based on user needs and preferences, and business requirements.
run time
The time period during which a computer program is running.
RunAs role
A role used by a servlet or an enterprise bean component to invoke and delegate a role to another enterprise bean.
runtime environment
A set of resources that are used to run a program or process.
runtime object
An object used by the translator, such as a control string, code list, translation table, or user exit profile.
runtime task
A generated administrative action plan that contains recommendations to improve the health and performance of a runtime environment.
runtime topology
A depiction of the momentary state of the environment.
RUP
See Rational Unified Process.

S

SA
See system administrator.
SAAJ
See SOAP with attachments API for Java.
SACL
See State Adaptive Choreography Language.
SAF
See System Authorization Facility.
SAG
See SWIFTAlliance Gateway.
SAG MQ connection
An entity within an SAG that encapsulates a WebSphere MQ connection.
SAML
See Security Assertion Markup Language.
SAS
See Secure Association Service.
SAX
See Simple API for XML.
SCA
See Service Component Architecture.
SCA component
A building block of the Service Component Architecture, used to build SCA modules such as mediation modules.
SCA export binding
A concrete definition that specifies the physical mechanism used by a service requester to access an SCA module; for example, using SOAP/HTTP.
SCA export interface
An abstract definition that describes how service requesters access an SCA module.
SCA import binding
A concrete definition that specifies the physical mechanism used by an SCA module to access an external service; for example, using SOAP/HTTP.
SCA import interface
An abstract definition that describes how an SCA module accesses a service.
SCA module
A module with interfaces that conforms to the Service Component Architecture (SCA).
SCA request
A service request that conforms to the Service Component Architecture (SCA). An SCA module routes the request to a service provider, after having done any additional processing specified by the module.
SCA run time
The server functions that provide support for the Service Component Architecture.
scalability
The ability of a system to expand as resources, such as processors, memory, or storage, are added.
SCbus
See Signal Computing bus.
SCCP
See signaling connection control part.
scenario
A set of actions representing a business process within the context of a collaboration. Scenarios can be used to partition collaboration logic. For example, if a collaboration handles one type of business object with various possible verbs, the user might develop Create, Update, and Delete scenarios. See also activity.
scheduler
A service that provides time-dependent services.
schema
A collection of database objects such as tables, views, indexes, or triggers that define a database. A schema provides a logical classification of database objects.
schema document definition
A description or layout of an XML document based on an XML schema.
scope

1. A specification of the boundary within which system resources can be used.

2. In Web services, a property that identifies the lifetime of the object serving the invocation request.

SCP
See service control point.
scratchpad area (SPA)
A work area used in conversational processing to retain information from an application program across executions of the program.
screen
The display that the user sees when he or she connects to a 3270 application on the host system. A single 3270 application can include many screens, each of which has a purpose within the context of the application.
screen editor
A 3270 terminal service development tool that enables a developer to create and modify recognition profiles for an imported screen and to assign names to the fields on the screen definition.
screen file
The result of importing a screen definition from a 3270 application into the 3270 terminal service development workbench. A screen file represents a screen definition. The screen definition contains identifiers such as the number of fields on the screen and the row and column position of fields on the screen. There are multiple screen files per 3270 terminal service project. Each screen file can have multiple recognition profiles assigned to it.
screen import
The process of importing a screen definition (in its current state) and saving it to a screen file within the 3270 terminal service tools workbench, for the purpose of generating recognition profiles and custom screen records. Use the 3270 terminal service recorder to import screens.
screen recognition
A runtime function that determines the state of a screen and processes the screen in accordance with the identifiers in the recognition profiles. Screen recognition compares the screen as presented by the 3270 application to the defined recognition profiles to determine which screen state applies.
screen state
The set of conditions (at the time the screen was imported from the host) that determine the allowed and required processing on the screen. A screen state operates on input to change the status, cause an action, or result in a particular output screen. A single screen can have multiple states and the allowed user actions for the screen vary depending on which state the screen is in.
screened transfer
A type of call transfer in which the transfer of the held party to the third party is completed only if the third party answers the call. See also blind transfer.
script

1. A series of commands, combined in a file, that carry out a particular function when the file is run. Scripts are interpreted as they are run.

2. The logical flow of actions for a 3270 server program.

script language
A high-level, application-specific scripting language that consists of statements used to develop 3270 scripts. These scripts are part of the interface between a state table and a 3270-based host business application.
scripting
A style of programming that reuses existing components as a base for building applications.
scriptlet
A mechanism for adding scripting language fragments to a source file.
SCSA
See Signal Computing System Architecture.
SDC
See Server Display Control.
SDK
See software development kit.
SDLC
See Synchronous Data Link Control.
SDO
See Service Data Objects.
SDO repository
A database that the service integration bus for Web services enablement uses for storing and serving Web Services Description Language (WSDL) definitions.
Secure Association Service (SAS)
An authentication protocol used to communicate securely for the client principal by establishing a secure association between the client and server.
Secure Hash Algorithm (SHA)
An encryption method in which data is encrypted in a way that is mathematically impossible to reverse. Different data can possibly produce the same hash value, but there is no way to use the hash value to determine the original data.
Secure Internet Protocol Network
A SWIFT network based on the Internet Protocol (IP) and related technologies.
Secure Shell (SSH)
A UNIX-based command interface and protocol for securely getting access to a remote computer.
Secure Sockets Layer (SSL)
A security protocol that provides communication privacy. With SSL, client/server applications can communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. See also certificate authority.
SecureWay Directory
An LDAP directory that can store user-related data, such as the user ID, the user name, and passwords.
security administrator
The person who controls access to business data and program functions.
Security Assertion Markup Language (SAML)
An XML framework for exchanging authentication and authorization information.
security attribute propagation
The transportation of security attributes from one server to another server in an application server configuration.
security constraint
A declaration of how to protect Web content, and how to protect data that is communicated between the client and the server.
security domain
The set of all the servers that are configured with the same user registry realm name.
security entity
Entities used to specify what a user is authorized to do. Security entities include roles and users.
security permission
Authorization granted to access a system resource.
security policy
A written document that defines the security controls that you institute for your computer systems. A security policy describes the risks that you intend these controls to minimize and the actions that should be taken if someone breaches your security controls.
security role
In Java EE, an abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment. (Sun)
security role reference
A role that defines the access levels that users have and the specific resources that they can modify at those levels.
security token
A representation of a set of claims that are made by a client that can include a name, password, identity, key, certificate, group, privilege, and so on.
segment directory
A file containing the format of all EDI segments in an EDI standard.
segment ID number
One or more numbers used to identify a voice or prompt segment.
segment ID separator
The character that separates the segment identifier from the EDI data elements in the EDI segment. See also data element delimiter.
segment identifier
A unique three-character identifier at the beginning of each EDI segment.
segment terminator
The character that marks the end of an EDI segment.
selector component
A component that provides a means of interposing a dynamic selection mechanism between the client application and a set of target implementations.
sender bean
In extended messaging, an enterprise bean (stateless session bean) that can be built to send asynchronous messages. A sender bean translates its method invocation into a JMS message, then passes that message to JMS. It can also retrieve a response message, translate that message into a result value, and return it to the caller.
sensor
A program that reads information from a managed software system to create configuration information.
sequence grouping
The specification of the order in which entity beans update relational database tables.
sequence number
A number assigned to each message exchanged between two nodes. The number is increased by one for each successive message. It starts from zero each time a new session is established.
serialization
In object-oriented programming, the writing of data in sequential fashion to a communications medium from program memory.
serializer
A method for converting object data to another form such as binary or XML. See also deserialization.
servant region
A contiguous area of virtual storage that is dynamically started as load increases and automatically stopped as load eases.
server
A software program or a computer that provides services to other software programs or other computers. See also application server, host, proxy server, client.
server and bus environment
The environment in which servers, service integration buses, and their resources are configured and managed.
server cluster
A group of servers that are typically on different physical machines and have the same applications configured within them, but operate as a single logical server.
server configuration
A resource that contains information required to set up and deploy to an application server.
Server Display Control (SDC)
An ADSI control mode in which the ADSI telephone is controlled through a dialog with a voice response system.
server implementation object
Enterprise beans that client applications require to access and implement the services that support those objects.
server message
A message that is routed to a server application for processing, or a delivery notification that is routed to a client application to acknowledge the receipt of a client message by its destination.
server node
In a single system image (SSI), a DirectTalk system that contains either the DirectTalk DB2 database, or the voice data, or both.
server operation
A collection of Java or non-Java process definitions that you can define to run on middleware servers. You can create server operations to enable or disable tracing, start or stop applications, query the running state of a server, and so on.
server project
A project that contains information about test and deployment servers and their configurations.
server-level RAS granularity
The level of RAS granularity at which RAS attribute values are assigned on a server-wide basis. RAS attribute values defined at the server-level are assigned to all requests that the server processes. See also RAS granularity.
server-side
Pertaining to an application or component of an application that runs on a server rather than on the client. JSP and servlets are two examples of technologies that enable server-side programming.
server-side include (SSI)
A facility for including dynamic information in documents sent to clients, such as current date, the last modification date of a file, and the size or last modification of other files.
service

1. A component that accepts as input a message, and processes the message. For example, a service translates its payload into a different format, or routes it to one of several output queues. Most services are implemented as message flows or primitives.

2. In service-oriented architecture, a unit of work accomplished by an interaction between computing devices.

service access point
In Open Systems Interconnection (OSI) architecture, the point at which the services of a layer are provided by an entity of that layer to an entity of the next higher layer.
service application
An application used to deploy mediation modules.
service bundle (SVB)
A set of services that logically belong together, for example, because they share resources such as a status table or error processing queue. A service bundle contains the definition files for all resources required to provide the services, for example definition files for message flows, queues, and database tables. A service bundle has a unique name in the scope of an instance. A service bundle must be assigned to an organizational unit and loaded into a server before it is operational.
service class
A group of work that has the same service goals or performance objectives, resource requirements, or availability requirements. For workload management, a service goal and, optionally, a resource group is assigned to a service class.
service client
A requester that invokes functions in a service provider.
service component
A collection of processes that represents a business service that publishes or operates on business data.
Service Component Architecture (SCA)
An architecture in which all elements of a business transaction, such as access to Web services, Enterprise Information System (EIS) service assets, business rules, workflows, databases and so on, are represented in a service-oriented way.
service context
Part of a General InterORB Protocol (GIOP) message that is identified with an ID and contains data used in specific interactions, such as security actions, character code set conversion, and Object Request Broker (ORB) version information.
service control point (SCP)
A component of the intelligent network that provides transactional services, such as translation of toll-free numbers to subscriber numbers.
Service Data Objects (SDO)
An open standard for enabling applications to handle data from heterogeneous data sources in a uniform way, based on the concept of a disconnected data graph. See also business object.
service definition
One or more WSDL files that describe a service. Service definitions are produced by the Definition, Deployment, Adaptor, Skeleton, and Proxy wizards.
service description
The description of a Web service, which can be defined in any format such as WSDL, UDDI, or HTML.
service destination
A specialization of a service integration bus destination. Each service destination can directly represent the Web service implementation or can indirectly represent the service through a Web Services Description Language (WSDL) document.
service document
A document that describes a Web service, for example a Web Services Description Language (WSDL) document.
service endpoint
The physical address of a service which implements one or more interfaces.
service information octet (SIO)
A field within an MTP message signal unit that identifies a higher layer user of MTP, and whether the message relates to a national or international network.
service input queue
The queue from which a service retrieves the messages it is to process. In WebSphere BI for FN, this queue is implemented as a WebSphere MQ local queue.
service integration bus (SIBus)
A managed communication mechanism that supports service integration through synchronous and asynchronous messaging. A bus consists of interconnecting messaging engines that manage bus resources.
service integration bus link
A link between messaging engines on different service integration buses. This enables requests and messages to pass between the buses.
service integration bus Web services enablement
A software component that enables Web services to use IBM service integration technologies. This capability provides a quality of service choice and message distribution options for Web services, with mediations that support message rerouting or modification.
service integration logic
Integration logic on an enterprise service bus to mediate between requesters and providers. The logic performs a number of functions such as to transform and augment requests, convert transport protocols, and route requests and replies automatically
service integration technology
Technology that provides a highly-flexible messaging system for a service-oriented architecture (SOA). This supports a wide spectrum of quality of service options, protocols, and messaging patterns. The technology supports both message-oriented and service-oriented applications.
service interface queue
The queue into which applications place messages that are to be processed by a service. In WebSphere BI for FN, each OU that uses a particular service has its own service interface queue, and this queue is implemented as a WebSphere MQ alias queue.
service level
A class of service that can be used in business policies to aggregate a set of desired and implied service qualities.
service level agreement (SLA)
A contract between a customer and a service provider that specifies the expectations for the level of service with respect to availability, performance, and other measurable objectives.
service message object (SMO)
A service data object that can exist only in a mediation flow component. The service message object is composed of a body and headers. The body contains the parameters of the invoked interface operation, and the headers may contain information such as service invocation, transport protocol, mediation exception, JMS properties, or correlation information.
service node
An element of an Intelligent Network that contains the service logic that controls an intelligent network application and resources.
service policy
A performance goal that is assigned to a specific application URI to help designate the business importance of different request types.
service portfolio
The collection of business services that a subscriber is entitled to use.
service project
A collection of related items used to build a service.
service provider

1. A company or program that provides a business function as a service.

2. Any company that provides services for a fee to its customers, such as telecommunication companies, application service providers, enterprise IT, and Internet service providers.

service provider equipment (SPE)
The switching equipment owned by a telephone company.
service registry
A repository that contains all of the information that is required to access a Web service.
service requester
The application that initiates an interaction with a Web service. The service requestor binds to the service using the published information and calls the service.
service segment
The EDI segment used when an EDI document is enveloped (such as ISA, GS, ST, UNB, UNH, UNT, and so on).
service type definition
In Universal Discovery Description and Integration (UDDI), a description of specifications for services or taxonomies.
service virtualization
A virtualization that compensates for the differences in the syntactic details of the service interactions so that the service requestor and provider do not have to use the same interaction protocol and pattern or the same interface, nor do they have to know the identities of the other participants.
service-oriented architecture (SOA)
A conceptual description of the structure of a software system in terms of its components and the services they provide, without regard for the underlying implementation of these components, services and connections between components.
services
Collections of network endpoints or ports that are used to aggregate a set of related ports.
servlet
A Java program that runs on a Web server and extends the server functions by generating dynamic content in response to Web client requests. Servlets are commonly used to connect databases to the Web.
servlet container
A Web application server component that invokes the action servlet and that interacts with the action servlet to process requests.
servlet filtering
The process of transforming a request or modifying a response without exposing the resource used by the servlet engine. See also filter.
servlet mapping
A correspondence between a client request and a servlet that defines their association.
session

1. A logical or virtual connection between two stations, software programs, or devices on a network that allows the two elements to communicate and exchange data for the duration of the session. See also transaction.

2. A series of requests to a servlet originating from the same user at the same browser.

3. In Java EE, an object used by a servlet to track user interaction with a Web application across multiple HTTP requests.

session affinity
A method of configuring applications in which a client is always connected to the same server. These configurations disable workload management after an initial connection by forcing a client request to always go to the same server.
session bean
An enterprise bean that is created by a client and that typically exists only for the duration of a single client/server session. (Sun) See also stateless session bean, enterprise bean, entity bean, stateful session bean.
session facade
A mechanism for separating the business and client tiers of an enterprise application by abstracting the data and business methods so that clients are not tightly coupled with the business logic and not responsible for data integrity. Implemented as session enterprise beans, session facades also decouple lower-level business components from one another.
Session Initiation Protocol (SIP)
A protocol for initiating interactive multi-media sessions. See also siplet.
session sequence number
A sequentially incremented 10 byte identifier that is assigned to each request unit in an LT session. It is formed by concatenating the 4 byte session number with a 6 byte sequence number.
setter method
A method whose purpose is to set the value of an instance or class variable. This capability allows another object to set the value of one of its variables.
severity code
A number that indicates the seriousness of an error condition.
SHA
See Secure Hash Algorithm.
shard
An instance of a partition. A shard can be a primary or replica.
shared library file
A file that consists of a symbolic name, a Java class path and a native path for loading Java Native Interface (JNI) libraries. Applications that are deployed on the same node as this file can access this information.
shared lock
A lock that limits concurrently running application processes to read-only operations on database data. See also exclusive lock, lock.
shared place
A place created for a community of people with a common purpose. Shared places can be public or restricted. The place creator (who automatically becomes the place manager) specifies whether a place is public or restricted during place creation.
shell script
A program, or script, that is interpreted by the shell of an operating system.
Short Message Service (SMS)
A service that is used to transmit text to and from a mobile phone.
short message service center (SMSC)
A component of the mobile telephony network, specified by the GSM group of standards, that provides for exchange of alphanumeric messages of less than 160 bytes. Messages can be exchanged between different types of system such as mobile telephone, alphanumeric pager, terminal, e-mail, telex, or DTMF telephone.
short name
In personal communications, the one-letter name (A through Z) of the presentation space or emulation session.
shortcut bar
In Eclipse, the vertical toolbar at the left side of the workbench window that contains buttons for open perspectives and for fast views.
shortest path
The processing path that takes the shortest time to complete of all parallel paths in a process instance, where each path considered begins at a start node or an input to the process and ends at a terminate node.
shredding
The process of breaking up an XML document for storage in database tables.
SIBus
See service integration bus.
side effect
An undesirable result caused by altering the values of nonlocal variables by a procedure or function.
SIF
See signaling information field.
Signal Computing bus (SCbus)
A time division multiplexed (TDM) hardware bus originated by Dialogic to interconnect different vendors' computer telephony adapters. Specified as part of Signal Computing System Architecture (SCSA).
Signal Computing System Architecture (SCSA)
An architecture defined by Dialogic to support interoperability of software and hardware components developed by different vendors in the computer telephony industry.
signaling
The exchange of control information between functional parts of the system in a telecommunications network.
signaling connection control part (SCCP)
A layer 3 protocol conforming to OSI.
signaling information field (SIF)
The user data portion of an MTP message signal unit.
signaling link code (SLC)
A code that identifies a particular signaling link connecting the destination and originating signaling points. This is used in MTP signaling network management messages to indicate the signaling link to which the message relates.
signaling link selection (SLS)
A field used to distribute MTP signal units across multiple signaling links.
signaling mode
The type of signaling protocol, either channel-associated signaling or common-channel signaling.
signaling point
A node in a signaling network that either originates and receives signaling messages, or transfers signaling messages from one signaling link to another, or both.
signaling process
A DirectTalk component that controls signaling for an exchange data link or common-channel signaling protocol. Some signaling processes are supplied with DirectTalk, and others can be custom-written.
Signaling System 7 (SS7)
The international high-speed signaling backbone used for the public-switched telephone network.
signer certificate
The trusted certificate entry that is typically in a truststore file.
silence
A brief pause between utterances.
silent installation
An installation that does not send messages to the console but instead stores messages and errors in log files. A silent installation can use response files for data input. See also response file.
silent mode
A method for installing or uninstalling a product component from the command line with no GUI display. When using silent mode, you specify the data required by the installation or uninstallation program directly on the command line or in a file (called an option file or response file).
Simple API for XML (SAX)
An event-driven, serial-access protocol for accessing XML documents, used. A Java-only API, SAX is used by most servlets and network programs to transmit and receive XML documents. See also Document Object Model.
simple element
An item in the source or target document that does not contain child items, only data. For example: EDI data elements, ROD fields, XML attributes, and XML PCData values. See also element.
Simple Mail Transfer Protocol (SMTP)
An Internet application protocol for transferring mail among users of the Internet.
Simple Network Management Protocol (SNMP)
A set of protocols for monitoring systems and devices in complex networks. Information about managed devices is defined and stored in a Management Information Base (MIB). See also Management Information Base.
simple type
A characteristic of a simple element that defines the type of data in a message (for example, string, integer, or float). In XML, a simple type cannot have element content and cannot carry attributes. See also complex type.
Simplified Message Desk Interface (SMDI)
A Northern Telecom service that transmits out-of-band information between DirectTalk and certain switches.
Simplified Message Service Interface (SMSI)
A Lucent Technologies service that transmits out-of-band information between DirectTalk and certain switches.
simulation
A faster-than-real-time performance of a process. Simulation enables organizations to observe how a process will perform in response to variations of inputs to the process, just as in a real-life work environment.
simulation profile
A copy of a process model and the elements on which it depends, augmented with simulation attributes, that you use to run a simulation. Each simulation profile in a snapshot is based on the process as it existed at the time that the snapshot was taken.
simulation snapshot
A record of the complete process model in a state that you want to preserve for simulation purposes. This record contains a copy of all the project elements the process uses, as well as any additional project elements.
single authorization
A setting allowing an action to be carried out by a single person. See also dual authorization.
Single Digital Trunk Processor
The combination of a single digital signal processing card and supporting equipment that provides high-level voice compression, high voice quality, and digital telephone signaling functions (transmit and receive) using an external shielded cable to an attached IBM RS/6000 computer. The Single Digital Trunk Processor supports one T1 or E1 trunk. See also Multiple Digital Trunk Processor.
single sign-on (SSO)
An authentication process in which a user can access more than one system or application by entering a single user ID and password.
single system image (SSI)
A cluster of DirectTalk systems that are connected together using a local area network. Each system (known as a node) in the cluster is configured as either a client or a server.
single-occurrence mapping
A form of mapping in which a specific occurrence of a repeating compound or simple element is mapped to a compound or simple element.
singleton
A class that can be instantiated only once. A singleton class cannot be an interface.
sink
A port that takes voice data from the SCBus. See also source.
SIO
See service information octet.
SIP
See Session Initiation Protocol.
siplet
A Session Initiation Protocol (SIP) servlet that performs SIP signaling to back-end applications of the SIP server, such as the presence server or instant messaging server. See also Session Initiation Protocol.
situation
A significant occurrence that is detected when a set of conditions are met. For example, exceeding the limits of a Key Performance Indicator (KPI).
situation event
A Common Base Event that is emitted when a defined situation occurs.
skeleton
Scaffolding for an implementation class.
skin
An element of a graphical user interface that can be changed to alter the appearance of the interface without affecting its functionality.
SLA
See service level agreement.
SLC
See signaling link code.
SLS
See signaling link selection.
smart card
An intelligent token that is embedded with an integrated circuit chip that provides memory capacity and computational capabilities.
SMDI
See Simplified Message Desk Interface.
SMIT
See System Management Interface Tool.
SMO
See service message object.
SMP
See symmetric multiprocessor.
SMP/E
See SMP/E for z/OS.
SMP/E for z/OS (SMP/E)
An IBM licensed program that is used to install software and software changes on z/OS systems.
SMS
See Short Message Service.
SMSC
See short message service center.
SMSI
See Simplified Message Service Interface.
SMTP
See Simple Mail Transfer Protocol.
SNA
See Systems Network Architecture.
snippet
An excerpt of source code.
SNL
See SWIFTNet Link.
SNMP
See Simple Network Management Protocol.
SOA
See service-oriented architecture.
SOAP
A lightweight, XML-based protocol for exchanging information in a decentralized, distributed environment. SOAP can be used to query and return information and invoke services across the Internet. See also Web service.
SOAP encoding
Rules for serializing data over the SOAP protocol. SOAP encoding is based on a simple type system that is a generalization of the common features found in type systems in programming languages, databases, and semi-structured data.
SOAP with attachments API for Java (SAAJ)
An application programming interface (API) that is used to send XML documents over the Internet from a Java base.
Society for Worldwide Interbank Financial Telecommunication (SWIFT)
An industry-owned cooperative that supplies standardized messaging services and software to financial institutions. See also FIN, SWIFTNet FIN.
socket
An identifier that an application uses to uniquely identify an end point of communication. The user associates a protocol address with the socket by associating a socket address with the socket.
Sockets Secure
A client/server architecture that transports TCP/IP traffic through a secure gateway. A SOCKS server performs many of the same services that a proxy server does.
softcopy
One or more files that can be electronically distributed, manipulated, and printed by a user.
software development kit (SDK)
A set of tools, APIs, and documentation to assist with the development of software in a specific computer language or for a particular operating environment.
source
A port that places voice data on the SCBus. See also sink.
source based map
A map based on the order elements that are defined in the source document definition.
source code
A computer program in a format that is readable by people. Source code is converted into binary code that can be used by a computer.
source document
A document that is going to be translated.
source document definition
A description of a document layout that is used to identify the format of the source document for a translation.
source interface
In a mediation flow component, the interface that allows the service requester to access the mediation flow through an export.
source tree
The XML input document that is transformed by an XSL stylesheet.
SPA
See scratchpad area.
SPACK
A logical component consisting of a base card, which connects to the digital trunk adapter in the RS/6000, and a trunk interface card (TIC), which manages the trunk connection to the switch. See also pack, VPACK, XPACK.
SPE
See service provider equipment.
speaker-dependent speech recognition
Identification of spoken words based on knowledge of the speech characteristics of one speaker. See also speaker-independent speech recognition, speech recognition.
speaker-independent speech recognition
Identification of spoken words based on aggregated knowledge of the speech characteristics of a population of speakers. See also speaker-dependent speech recognition, speech recognition.
spec
See specification.
special character

1. A character other than a digit, a letter, or one of these characters: $, #, @, ., or _. For example, the following characters are special characters: *, +, and %.

2. A character that is not alphabetic, numeric, or blank. For example, a comma (,) or an asterisk (*).

special variable
A variable that is similar to a local or global variable, except that it is predefined in Data Interchange Services. Special variables are created during translation at the start of a document and cannot be created or maintained by the user.
special-subject
Generalization of a particular class of users; a product-defined entity independent of the user registry.
specification (spec)
A declarative description of what something is or does.
speech recognition
The process of identifying spoken words. See also continuous speech recognition, discrete word recognition, speaker-dependent speech recognition, speaker-independent speech recognition.
Speech Recognition Control Language (SRCL)
In WebSphere Voice Server, a structured syntax and notation used to define speech grammars. SRCL defines annotations, repetitions, words, phrases, and associated rules.
speech recognition session
In WebSphere Voice Server, a sequence of recognition commands that allocate a recognition engine and return a unique identifier to identify the engine.
speech synthesis
The production of speech by a computer, by putting together sounds that are created either algorithmically or from recordings of human speech. See also text-to-speech.
SPUFI
See SQL Processor Using File Input.
SQL
See Structured Query Language.
SQL Processor Using File Input (SPUFI)
A facility of the TSO attachment subcomponent that enables the DB2I user to run SQL statements without embedding them in an application program.
SQL query
A component of certain SQL statements that specifies a result table.
SQLJ
See Structured Query Language for Java.
SRCL
See Speech Recognition Control Language.
SS7
See Signaling System 7.
SSH
See Secure Shell.
SSH File Transfer Protocol
A network protocol that provides the ability to transfer files securely over any reliable data stream.
SSI

1. See single system image.

2. See server-side include.

SSI-compliant custom server
A custom server that runs correctly in a single system image. The custom server complies with all the guidelines for the operation of custom servers in an SSI environment.
SSI-tolerant custom server
A custom server that runs in a single system image, but only with some restrictions.
SSL
See Secure Sockets Layer.
SSL channel
A type of channel within a transport chain that associates a Secure Sockets Layer (SSL) configuration repertoire with the transport chain.
SSO
See single sign-on.
stack
An area in memory that typically stores information such as temporary register information, values of parameters, and return addresses of subroutines and is based on the principle of last in, first out (LIFO).
stack frame
A section of the stack that contains the local variables, arguments, and register contents for an individual routine, as well as a pointer to the previous stack frame.
stacking number
The number of application servers that are required for a dynamic cluster to use all the power of a node.
staff activity
An activity in a process that queries human interaction for decisions on how to proceed. A staff activity is used in a long-running process where the process will halt to await the outcome of the human interaction. See also long-running process.
staging
The process of returning return data or an object from an offline or low-priority device to an online or higher priority device, typically on demand of the system or on request of the user.
stand-alone
Independent of any other device, program, or system. In a network environment, a stand-alone machine accesses all required resources locally.
stand-alone server

1. A catalog service or container server that is managed from the operating system that starts and stops the server process.

2. A fully operational server that is managed independently of all other servers, using its own administrative console.

stand-alone system
A DirectTalk system that is not part of a single system image (SSI). A stand-alone system is not connected to other DirectTalk systems, so it contains its own application and voice data.
stand-alone task
A unit of work that exists independently of a business process, and implements human interaction as a service. See also human task, inline task.
standard envelope
See EDI envelope.
Standard Widget Toolkit (SWT)
An Eclipse toolkit for Java developers that defines a common, portable, user interface API that uses the native widgets of the underlying operating system. See also Abstract Window Toolkit, Swing Set.
star schema
A type of relational database schema that is composed of a set of tables comprising a single, central fact table surrounded by dimension tables.
start node
A node that identifies where a process begins.
state

1. In a business state machine, one of several discrete individual stages that are organized in sequence to compose a business transaction.

2. One step in the logical sequence of actions that comprises a voice application. See also state table action.

State Adaptive Choreography Language (SACL)
An XML notation that is used to define state machines.
state machine
A behavior that specifies the sequences of states that an object or an interaction goes through during its life in response to events, together with its responses and actions.
state table
A list of all the actions used in a particular voice application. A component of DirectTalk.
state table action
One instruction in a set of instructions contained in a DirectTalk state table that controls how DirectTalk processes various operations such as playing voice prompts or recording voice messages. See also state.
stateful session bean
A session bean that acts on behalf of a single client and maintains client-specific session information (called conversational state) across multiple method calls and transactions. See also stateless session bean, session bean.
stateless session bean

1. A session bean that is a collection of operations. The server can optimize resources by reusing bean instances on every method call.

2. A session bean with no conversational state. All instances of a stateless bean are identical. (Sun) See also session bean, stateful session bean.

statement
An instruction in a program or procedure.
static
A Java programming language keyword that is used to define a variable as a class variable.
static analysis
The process of extracting targeted types of information on the models in their static form. This differs from dynamic analysis, which extracts information based on the results of process simulations.
static cluster
A group of application servers that participates in workload management. Membership for the static cluster is manually managed.
static Web page
A Web page that can be displayed without the additional client- or server-side processing that would be required for JavaServer Pages, servlets, or scripts.
static Web project
A project that contains resources for a Web application with no dynamic content such as servlets or JavaServer Pages (JSP) files, or Java code. A static Web project can be deployed to a static HTTP server and does not require additional application server support.
stored procedure
A block of procedural constructs and embedded SQL statements that is stored in a database and that can be called by name. Stored procedures allow an application program to be run in two parts, one on the client and the other on the server, so that one call can produce several accesses to the database.
stream
In the CVS team programming environment, a shared copy of application resources that is updated by development team members as they make changes. The stream represents the current state of the project.
stream decryption
A symmetric algorithm that decrypts data one bit or byte of data at a time.
stream encryption
A symmetric algorithm that encrypts data one bit or byte of data at a time.
string
In programming languages, the form of data used for storing and manipulating text.
structure
A series of elements that have been graded or ranked in some useful manner. In Business Integration Modeler, a graphical representation of the relationships between different real entities in an organization.
Structured Query Language (SQL)
A standardized language for defining and manipulating data in a relational database.
Structured Query Language for Java (SQLJ)
A standard for embedding SQL in Java programs, defining and calling Java procedures and user-defined functions, and using database structured types in Java.
structured viewing
The tabular aspect of the Design view of the XML editor that separates the structural constituents of an XML document, such as elements and attribute types, from values, such as attribute values and textual content.
Struts
An open source framework designed to help developers create Web applications that keep database code, page design code, and control flow code separated from each other.
Struts action
A class that implements a portion of a Web application and returns a forward. The superclass for a Struts action is called the Action class.
Struts module
A Struts configuration file and a set of corresponding actions, form beans, and Web pages. A Struts application comprises at least one Struts module.
Struts project
A dynamic Web project with Struts support added.
stub

1. A line in a state table that is only partially displayed.

2. A small program routine that substitutes for a longer, possibly remote, program. For example, a stub might be a program module that transfers procedure calls (RPCs) and responses between a client and a server. In Web services, a stub is an implementation of a Java interface generated from a Web Services Description Language (WSDL) document.

style sheet
A specification of formatting instructions that, when applied to structured information, provides a particular rendering of that information (for example, online or printed). Different style sheets can be applied to the same piece of structured information to produce different presentations of the information.
subclass
In Java, a class that is derived from a particular class, through inheritance. See also supertype, class.
subelement
In UN/EDIFACT EDI standards, an EDI data element that is part of an EDI composite data element. For example, an EDI data element and its qualifier are subelements of an EDI composite data element.
subelement separator
A character that separates the subelements in an EDI composite data element.
subflow
A sequence of processing steps, implemented using message flow nodes, that is designed to be embedded in a message flow or in another subflow. A subflow must include at least one Input or Output node. A subflow can be executed by a broker only as part of the message flow in which it is embedded, and therefore cannot be deployed. See also message flow.
subflow node
A message flow node that represents a subflow. See also primitive.
subprocess
A local process that is also a part of another process.
subquery
In SQL, a subselect used within a predicate, for example, a select-statement within the WHERE or HAVING clause of another SQL statement.
subscriber

1. In voice mail, any person who owns a mailbox.

2. The consumer of a business service.

subscriber class
A named set of variables used to define a specific level of service available to telephone subscribers, such as maximum number of messages per mailbox and maximum number of members per mailbox distribution list.
subscription
A record that contains the information that a subscriber passes to its local broker to describe the publications that it wants to receive.
substate
A state that is part of a composite state.
subvocabulary
A vocabulary that is called by another vocabulary.
superclass
In Java, a class from which a particular class is inherited, perhaps with one or more classes in between.
superset
Given two sets A and B, A is a superset of B if and only if all elements of B are also elements of A. That is, A is a superset of B if B is a subset of A.
supertype
In a type hierarchy, a type that subtypes inherit attributes from.
supplementary service
In Euro-ISDN, a service outside the minimum service offering that each signatory is obliged to provide. For example, calling line identification presentation (CLIP) and call session.
suspend
To pause a process instance.
SVB
See service bundle.
SWIFT
See Society for Worldwide Interbank Financial Telecommunication.
SWIFT address
See bank identifier code.
SWIFT transport network
A SWIFT network providing FIN and IFT service based on X.25 technology.
SWIFTAlliance Gateway (SAG)
A SWIFT interface product extending SWIFTNet Link by additional services such as profile-based processing, and offering a WebSphere MQ interface.
SWIFTNet FileAct
A SWIFT interactive communication service supporting exchange of files between two applications.
SWIFTNet FIN
A SWIFT service providing FIN access using the Secure IP Network (SIPN) instead of the SWIFT Transport Network (STN). See also Society for Worldwide Interbank Financial Telecommunication, FIN.
SWIFTNet FIN batching
The transporting of more than one FIN message within a single InterAct message.
SWIFTNet InterAct
A SWIFT interactive communication service supporting exchange of request and response messages between two applications.
SWIFTNet Link (SNL)
A SWIFT mandatory software product to access all SWIFTNet services.
SWIFTNet PKI
See SWIFTNet public key infrastructure.
SWIFTNet public key infrastructure (SWIFTNet PKI)
SWIFT's mandatory security software and hardware installed with SWIFTNet Link. See also public key infrastructure.
SWIFTNet service
A SWIFT IP-based communication service that runs on the SIPN.
SWIFTNet service application
An application that uses SWIFTNet services. Financial organizations such as Continuous Linked Settlement (CLS) or the Global Straight Through Processing Association (GSTPA) offer such applications to financial institutions.
swimlane
A visually separated row within a process flow diagram that groups all the activities in the process that are performed by a particular combination of roles, resources, organization units, or locations.
Swing Set
A collection of GUI components that runs consistently on any operating system that supports the Java virtual machine (JVM). Because they are written entirely in the Java programming language, these components provide functionality above and beyond that provided by native-platform equivalents. See also Abstract Window Toolkit, Standard Widget Toolkit.
switch
A device that provides connections between telephone lines and trunks.
SWT
See Standard Widget Toolkit.
symbolic link
A type of file that contains a pointer to another file or directory.
symmetric algorithm
An algorithm where the encryption key can be calculated from the decryption key and vice versa. In most symmetric algorithms, the encryption key and the decryption key are the same.
symmetric multiprocessor (SMP)
A system in which functionally identical multiple processors are used in parallel, providing simple and efficient load balancing.
sync point
A point during the processing of a transaction at which protected resources are consistent.
sync point manager
A function that coordinates the two-phase commit process for protected resources, so that all changes to data are either committed or backed out.
synchronize
To add, subtract, or change one feature or artifact to match another.
Synchronous Data Link Control (SDLC)
A protocol for managing synchronous information transfer over a data link connection.
synchronous process
A process that starts by invoking a request-response operation. The result of the process is returned by the same operation.
synchronous replica
A shard that receives updates as part of the transaction on the primary shard to guarantee data consistency, which can increase the response time compared with an asynchronous replica. See also asynchronous replica.
syntax
The rules for the construction of a command or statement.
syntax highlighting
In source editors, the ability to differentiate text and structural elements, such as tags, attributes, and attribute values, using text highlighting differences, such as font face, emphasis, and color.
syntax type
A category used to classify different formats of documents. Data Interchange Services supports three syntax types: XML, EDI, and record oriented data. The user can map and translate between any of these syntax types.
synthesized event
See synthetic event.
synthetic event
An event that is fired in response to a condition that was detected while processing the current event. Unlike an action, which is also fired in response to a condition that was detected during the processing of the current event, a synthetic event is not sent to a touchpoint through a connector. A synthetic event is processed by WebSphere Business Events in the same way as other events.
sysplex
A set of z/OS systems that communicate with each other through certain multisystem hardware components and software services.
system administrator (SA)
The person who controls and manages a computer system.
System Authorization Facility (SAF)
A z/OS interface with which programs can communicate with an external security manager, such as RACF.
system configuration administration
The administration of configuration object types, organizational units, and roles. This is carried out after the product has been installed and is running.
system greeting
In voice mail, a default greeting heard by callers to the mailboxes of subscribers who have not recorded a personal greeting or who have selected the system greeting. See also personal greeting.
system logger
A central logging facility provided by MVS/ESA SP 5.2. The MVS system logger provides an integrated MVS logging facility that can be used by system and subsystem components. For example, it is used by the CICS log manager.
System Management Interface Tool (SMIT)
An interface tool of the AIX operating system for installing, maintaining, configuring, and diagnosing tasks.
system menu
A drop-down menu that is activated by clicking the icon at the left of a window title bar and that allows users to restore, move, size, minimize, or maximize the window.
system variable
A permanent global variable defined by WebSphere Voice Response for use by state tables. Many system variables are loaded with values when the state table is initialized. Some values are taken from system parameters. See also input parameter.
systems analyst
A specialist who is responsible for translating business requirements into system definitions and solutions.
Systems Network Architecture (SNA)
The description of the logical structure, formats, protocols, and operational sequences for transmitting information through and controlling the configuration and operation of networks.

T

T1
A digital trunking facility standard used in the United States and elsewhere, capable of transmitting and receiving 24 digitized voice or data channels. Signaling can be imbedded in the voice channel transmission when robbed-bit signaling is used. The transmission rate is 1544 kilobits per second. See also E1.
T1/D3
A framing format used in T1 transmission.
T1/D4
A framing format used in T1 transmission.
tag

1. A text string attached to any instance of a word in a grammar. A tag can be used to distinguish two occurrences of the same word in a grammar, or to identify more than one word in a grammar as having the same meaning.

2. In UN/EDIFACT EDI Standards, the segment identifier. In export and import, a code that is assigned to each field in the database and used to identify the field in the export file. Such export files are known as tagged files.

Tag Image File Format-Fax (TIFF-F)
A graphic file format used to store and exchange scanned fax images.
tag library
In JSP technology, a collection of tags identifying custom actions described using a taglib descriptor and Java classes. A JSP tag library can be imported into any JSP file and used with various scripting languages. (Sun)
taglib directive
In a JSP page, a declaration stating that the page uses custom tags, defines the tag library, and specifies its tag prefixes. (Sun)
TAI
See trust association interceptor.
target

1. A value that a Key Performance Indicator (KPI) should achieve, such as "300" or "5 days."

2. The destination for an action or operation.

3. See receiver.

target based map
A map based on the order elements that are defined in the target document definition.
target CDD
A customization definition document (CDD) to which placeholders have been added, and for which placeholder values have been specified. A target CDD describes a particular target customization definition.
target component
A component that is the final target of a client service request.
target customization definition
A customization definition that describes a changed version of a current customization definition. Each target customization definition has a target CDD that describes it.
target document
A translated version of a document.
target document definition
A description of the document layout used to create an output document from a translation.
target document definition window
One of the pages on the Details tab of the Data Transformation Map Editor and the Functional Acknowledgement Map Editor. It displays the target document definition.
target namespace
A unique logical location for information about the service that associates a namespace with a WSDL location.
target service
A service that exists outside of the gateway.
task
The basic building blocks in a model. Each task performs a function. Visually, a task represents the lowest level of work that can be portrayed in a process. See also activity.
taxonomy
The hierarchical classification of information according to a known system that is used to easily discuss, analyze, or retrieve that information.
TCAM
See Telecommunications Access Method.
TCAP
See transaction capabilities application part.
TCP
See Transmission Control Protocol.
TCP channel
A type of channel within a transport chain that provides client applications with persistent connections within a local area network (LAN).
TCP/IP
See Transmission Control Protocol/Internet Protocol.
TCP/IP monitoring server
A runtime environment that monitors all requests and responses between a Web browser and an application server, as well as TCP/IP activity.
TDCC
See Transportation Data Coordinating Committee.
TDD
See Telecommunications Device for the Deaf.
team development
The practice of several members of a team contributing to a single project, with the potential for multiple team members to work in parallel on the same files.
team support
The component that interacts with a repository to share and version projects and project data. See also version control.
technology adapter
An adapter that is designed for interactions that conform to a specific technology. For example, the WebSphere Adapter for FTP, is an intermediary through which an integration broker sends data to a file system that resides on a local or remote FTP server.
technology connector
An API that passes data between the event processing server (runtime server) and external systems using a standard protocol such as SMTP, HTTP, FTP, or SOAP.
telecommunication
The transmission of data between computer systems over telecommunication lines and between a computer system and remote devices.
Telecommunications Access Method (TCAM)
An access method used to transfer data between main storage and remote or local storage.
Telecommunications Device for the Deaf (TDD)
A telephony device with a QWERTY keyboard and a small display and, optionally, a printer.
telephone input field
A field type that contains information entered by a caller using pushbutton signals.
template
A grouping of elements that share common properties. These properties may be defined only once, at the template level, and are inherited by all elements using the template. In Java terms, this is an abstract class.
template library
The database, known as the Portal Template Catalog, that stores place template specifications and portlets forms, subforms, and profiles.
temporary file system (TFS)
A temporary, in-memory physical file system that supports in-storage mountable file systems. Normally, a TFS runs in the kernel address space, but it can be run in a logical file system (LFS) colony address space.
temporary page
A page that closes and cannot be reopened after a user navigates away from it.
terminal
In a system or communications network, a point at which data can either enter or leave.
terminal file
The resource in a 3270 service project that contains the information necessary for connecting to the host system during build time. Terminal files are automatically generated when the 3270 terminal service project is created. In the Navigator view, if a terminal file is selected, the 3270 terminal service recorder opens in the editor area.
terminate node
A node that marks the end of a process. When a flow reaches a terminate node while the process is running, the process immediately terminates, even if there are other currently executing flows within the process.
termination character
A character that defines the end of a telephone data entry.
test case
A set of tasks, scripts, or routines that automate the task of testing software.
test configuration
A property of the integration test client that is used to specify modules for testing and to control the tests.
test harness
A series of script files used to enable a DB2 database for use by the DB2 XML Extender. A test harness is optionally created when a DAD file is generated from a relational database to XML mapping. Once enabled, it tests composing XML from data as well as decomposing XML files into relational data.
test pattern
A template used for the automatic generation of component tests. There are several test patterns available for testing both Java and EJB components. See also component test.
test suite
A collection of test cases that define test behavior and control test execution and deployment.
text-to-speech (TTS)
The process by which ASCII text data is converted into synthesized speech. See also speech synthesis.
TFS
See temporary file system.
theme
The style element that gives a place a particular look. The portal provides several themes, similar to virtual wallpaper, from which you can choose when creating a place.
thin application client
A lightweight, downloadable Java application run time capable of interacting with enterprise beans.
thin client
A client that has little or no installed software but has access to software that is managed and delivered by network servers that are attached to it. A thin client is an alternative to a full-function client such as a workstation.
thread
A stream of computer instructions that is in control of a process. In some operating systems, a thread is the smallest unit of operation in a process. Several threads can run concurrently, performing different jobs.
thread contention
A condition in which a thread is waiting for a lock or object that another thread holds.
threshold
A setting that applies to an interrupt in a simulation that defines when a process simulation should be halted based on a condition existing for a specified proportion of occurrences of some event.
throughput
The measure of the amount of work performed by a device, such as a computer or printer, over a period of time, for example, number of jobs per day.
thumbnail
An icon-sized rendering of a larger graphic image that permits a user to preview the image without opening a view or graphical editor.
TIC
See trunk interface card.
TID
See transaction identifier.
TIFF-F
See Tag Image File Format-Fax.
Time Sharing Option (TSO)
A base element of the z/OS operating system with which users can interactively work with the system. See also Interactive System Productivity Facility.
time slot
The smallest switchable data unit on a data bus, consisting of eight consecutive bits of data. One time slot is equivalent to a data path with a bandwidth of 64 kilobits per second.
time to live (TTL)
The time interval in seconds that an entry can exist in the cache before that entry is discarded.
time-division multiplex bus
A method of transmitting many channels of data over a smaller number of physical connections by multiplexing the data into timeslots, and demultiplexing at the receiving end. In this document one such channel can be considered to be a half-duplex unidirectional stream of 64 kilobits per second.
timeout
A time interval that is allotted for an event to occur or complete before operation is interrupted.
timer
A task that produces output at certain points in time.
timetable
A schedule of times. In business process modeling, timetables are typically associated with resources or costs. For resources, timetables indicate availability (such as Monday to Friday). For costs, timetables are useful if the cost varies with time of day (such as electricity) or time of year (such as seasonal foods).
timing constraint
A specialized validation action used to measure the duration of a method call or a sequence of method calls. See also validation action.
Tivoli Performance Viewer
A Java client that retrieves the Performance Monitoring Infrastructure (PMI) data from an application server and displays it in various formats.
TLS
See Transport Layer Security.
token

1. A marker used to track the current state of a process instance during a simulation run.

2. A particular message or bit pattern that signifies permission or temporary control to transmit over a network.

token bucket
A mechanism that controls data flow. As an application requests permission into a network, the token bucket adds characters (or tokens) into a buffer (or bucket). If enough room is available for all the tokens in the bucket, the application is allowed to enter the network.
token-ring network (TRLAN)
A local area network that connects devices in a ring topology and allows unidirectional data transmission between devices by a token-passing procedure. A device must receive a token before it can transmit data.
tone
An audible signal sent across a telephone network. There are single (one-frequency) tones, tritones (three sequential tones at different frequencies), dual tones (two simultaneous tones at different frequencies), and dual sequential tones. Each has a different meaning.
top-down development
In Web services, the process of developing a service from a Web Services Description Language (WSDL) file. See also bottom-up development.
top-down mapping
An approach for mapping enterprise beans to database tables, in which existing enterprise beans and their design determines the database design.
topology
The physical or logical mapping of the location of networking components or nodes within a network. Common network topologies include bus, ring, star, and tree.
touchpoint
A representation of an external system or application that can generate events or receive actions.
trading partner
A company, such as a manufacturer or a supplier, that agrees to exchange information using electronic data interchange, or an entity in an organization that sends and receives documents that are translated. See also external partner.
trailer
A control structure that indicates the end of an electronic transmission.
transaction

1. A process in which all of the data modifications that are made during a transaction are either committed together as a unit or rolled back as a unit.

2. An exchange between two programs that carries out an action or produces a result. An example is the entry of a customer's deposit and the update of the customer's balance. See also conversation, session.

transaction capabilities application part (TCAP)
Part of the SS7 protocol that provides transactions within the signaling network. A typical use of TCAP is to verify a card number, for the credit card calling service.
transaction class
A subcontainer of a service policy that is used for finer-grained monitoring.
transaction ID
See transaction identifier.
transaction identifier (TID, transaction ID, XID)
A unique name that is assigned to a transaction and is used to identify the actions associated with that transaction.
transaction messaging
The ability to associate an item of data, such as a transaction identifier, with a voice message. The voice message can subsequently be retrieved by referencing the data value.
transcoding technology
Content adaptation to meet the specific capabilities of a client device.
transform
To convert a document from one form to another, such as using a purchase order formatted as an XML document to create the same purchase order formatted as an EDI document. See also translate.
transform algorithm
A procedure that is used to transform the message for Web services security message processing, such as the C14N (canonicalization) transform that is used for XML digital signatures.
Transformation API for XML (TrAX)
A programming interface that can transform XML and related tree-shaped data structures.
transition condition
A Boolean expression that determines when processing control should be passed to the targeted node.
translate
In early versions of WebSphere Data Interchange, to convert a document from one form to another. See also transform.
translation table
A user-defined table that is used to translate data values that differ between the source and target documents. For example, a manufacturer and supplier with different part numbers for the same item can use a translation table to convert their part numbers to the other company part numbers during translation.
translator
A component, typically the Data Interchange Services translator component, responsible for translating a document from one format to another.
Transmission Control Protocol (TCP)
A communication protocol used in the Internet and in any network that follows the Internet Engineering Task Force (IETF) standards for internetwork protocol. TCP provides a reliable host-to-host protocol in packet-switched communication networks and in interconnected systems of such networks. See also Internet Protocol.
Transmission Control Protocol/Internet Protocol (TCP/IP)
An industry-standard, nonproprietary set of communication protocols that provides reliable end-to-end connections between applications over interconnected networks of different types.
transport
The request queue between a Web servers plug-in and a Web container in which the Web modules of an application reside. When a user requests an application from a Web browser, the request is passed to the Web server, then along the transport to the Web container.
transport chain
A representation of a network protocol stack that is operating within an application server.
transport channel chain
A specification of the transport channels that are used by a server for receiving information. Transport channel chains contain end points
Transport Layer Security (TLS)
An Internet Engineering Task Force (IETF)-defined security protocol that is based on Secure Sockets Layer (SSL) and is specified in RFC 2246.
Transportation Data Coordinating Committee (TDCC)
An organization that sets standards for the motor, rail, ocean, and air industries administered by EDIA. This is the original EDI organization for the United States, and through it, the original EDI Standards were developed, published, and maintained. It has now changed its name to EDIA, and has become the national EDI user group for the United States.
TrAX
See Transformation API for XML.
tree
A data structure whose elements are linked in a hierarchical fashion.
trend analysis
A type of analysis that displays the analysis of the changes in a given item of information over a period of time.
trigger

1. A mechanism that detects an occurrence and can cause additional processing in response.

2. In database technology, a program that is automatically called whenever a specified action is performed on a specific table or view.

triple Data Encryption Standard (triple DES)
A block cipher algorithm that can be used to encrypt data transmitted between managed systems and the management server. Triple DES is a security enhancement of DES that employs three successive DES block operations.
triple DES
See triple Data Encryption Standard.
TRLAN
See token-ring network.
trombone
A connected voice path which enters an IVR from a switch on one circuit, then returns to the same switch on a parallel circuit. Two IVR ports and two circuits are consumed, but in some circumstances this might be the only way to make a connection between two callers if the attached switch does not support a Call Transfer function.
trunk

1. A telephone connection between two central offices or switching devices. In DirectTalk, a trunk refers to 24 or 30 channels carried on the same T1 or E1 digital interface. See also channel.

2. In the CVS team development environment, the main stream of development, also referred to as the HEAD stream.

trunk interface card (TIC)
The component of the VPACK that manages the trunk connection to the switch. See also base card.
trust anchor
A trusted keystore file that contains a trusted certificate or a trusted root certificate that is used to assert the trust of a certificate.
trust association
An integrated configuration between the security server of the product and third-party security servers. A reverse proxy server acts as a front-end authentication server, while the product applies its own authorization policy onto the resulting credentials passed by the proxy server.
trust association interceptor (TAI)
The mechanism by which trust is validated in the product environment for every request received by the proxy server. The method of validation is agreed upon by the proxy server and the interceptor.
trust file
A file that contains signer certificates.
trust relationship
An established and trusted communication path through which a computer in one domain can communicate with a computer in the other domain. Users in a trusted domain can access resources in the trusting domain.
trusted identity evaluator
A mechanism that is used by a server to determine whether to trust a user identity during identity assertion.
truststore
In security, a storage object, either a file or a hardware cryptographic card, where public keys are stored in the form of trusted certificates, for authentication purposes in Web transactions. In some applications, these trusted certificates are moved into the application keystore to be stored with the private keys. See also keystore.
truststore file
A key database file that contains the public keys for a trusted entity.
Tsm Router
In WebSphere Voice Server, a process that controls which engine processes are being used at any time. Requests for an engine by a WebSphere Voice Server Client are accepted or rejected depending on whether an engine meeting the Tsm Client's criteria is available.
TSO
See Time Sharing Option.
TTL
See time to live.
TTS
See text-to-speech.
tune
A piece of music or other audio data intended to be played as background music.
type

1. In Java programming, a class or interface.

2. In a WSDL document, an element that contains data type definitions using some type system (such as XSD).

type checking
The action of checking the validity of business items against a business item template during process simulation or deployment. Type checking is available only with decision gateways.
type hierarchy
The complete context for a Java class or interface including its superclasses and subclasses.

U

UCS

1. See Uniform Communication Standard.

2. See universal character set.

UDDI
See Universal Description, Discovery, and Integration.
UDDI Business Registry
A collection of peer directories that contain information about businesses and services.
UDDI node
A set of Web services that supports at least one of the Universal Description, Discovery, and Integration (UDDI) APIs. A UDDI node consists of one or more instances of a UDDI application running in an application server or a cluster of application servers with an instance of the UDDI database.
UDDI node initialization
The process by which values are set in the Universal Description, Discovery, and Integration (UDDI) database and the behavior of the UDDI node is established.
UDDI node state
A description of the current status of the Universal Description, Discovery, and Integration (UDDI) node.
UDDI policy
A statement of the required and expected behavior of a Universal Description, Discovery, and Integration (UDDI) registry that is specified through policy values that are defined in the UDDI specification.
UDDI property
A characteristic or attribute that controls the behavior of a Universal Description, Discovery, and Integration (UDDI) node.
UDDI registry
A distributed registry of businesses and their service descriptions that adheres to the Universal Description, Discovery, and Integration (UDDI) standard for managing the discovery of Web services. UDDI registries come in two forms, public and private, both of which are implemented in a common XML format.
UDF
See user-defined function.
UN/EDIFACT
See United Nations Electronic Data Interchange for Administration, Commerce and Transport.
unary operator
An operator that changes the sign of a numeric value.
undelivered message queue
See dead-letter queue.
underrun
To run out of audio data to play, resulting in voice or music being audibly broken up or cut off.
unified messaging
A messaging system in which a single copy of a message is stored and accessed by multiple applications (for example, voice mail and e-mail). See also integrated messaging.
Unified Modeling Language
A standard notation for the modeling of real-world objects as a first step in developing an object-oriented design methodology.
Uniform Communication Standard (UCS)
The EDI standard used in the grocery industry.
Uniform Resource Identifier (URI)

1. A compact string of characters for identifying an abstract or physical resource.

2. A unique address that is used to identify content on the Web, such as a page of text, a video or sound clip, a still or animated image, or a program. The most common form of URI is the Web page address, which is a particular form or subset of URI called a Uniform Resource Locator (URL). A URI typically describes how to access the resource, the computer that contains the resource, and the name of the resource (a file name) on the computer. See also Uniform Resource Name.

Uniform Resource Locator (URL)
The unique address of an information resource that is accessible in a network such as the Internet. The URL includes the abbreviated name of the protocol used to access the information resource and the information used by the protocol to locate the information resource.
Uniform Resource Name (URN)
A name that uniquely identifies a Web service to a client. See also Uniform Resource Identifier.
United Nations Electronic Data Interchange for Administration, Commerce and Transport (UN/EDIFACT)
An international set of electronic data interchange (EDI) standards published by the United Nations that is built upon X12 and TDI (Trade Data Interchange) standards.
United Nations Standard Products and Services Classification (UNSPSC)
An open global standard for classifying products and services based on common function, purpose, and task.
United Nations Trade Data Interchange (UNTDI)
A standard that preceded the UN/EDIFACT EDI standard.
universal character set (UCS)
The ISO standard that allows all data to be represented as 2 bytes (UCS-2) or 4 bytes (UCS-4). Encoding in the UCS-2 form can accommodate the necessary characters for most of the written languages in the world.
Universal Description, Discovery, and Integration (UDDI)
A set of standards-based specifications that enables companies and applications to quickly and easily find and use Web services over the Internet. See also Web service.
Universally Unique Identifier (UUID)
The 128-bit numerical identifier that is used to ensure that two components do not have the same identifier.
UNIX System Services
An element of z/OS that creates a UNIX environment that conforms to XPG4 UNIX 1995 specifications and that provides two open-system interfaces on the z/OS operating system: an application programming interface (API) and an interactive shell interface.
unmanaged node
A node that is defined in the cell topology that does not have a node agent that manages the process. An unmanaged node is typically used to manage Web servers.
unmanaged Web application
A Web application with a life cycle that is managed outside of the WebSphere Extended Deployment administrative domain. By creating a representation of these applications that are deployed through external tooling, the on-demand router can prioritize and route HTTP requests to the application.
unmodeled fault
A fault message that is returned from a service that has not been modeled on the Web Services Description Language (WSDL) port type.
unrealized
Pertains to a Web diagram node that is not yet associated with an actual resource. See also realize.
unrecognized screen
In the 3270 terminal service development tools, a screen that cannot be identified by any of the recognition profiles currently defined.
UNSPSC
See United Nations Standard Products and Services Classification.
UNTDI
See United Nations Trade Data Interchange.
upgradeable lock
A lock that identifies the intent to update a cache entry when using a pessimistic lock.
upstream
Pertaining to the direction of the flow, which is from the start of the process (upstream) toward the end of the process (downstream).
URI
See Uniform Resource Identifier.
URL
See Uniform Resource Locator.
URL scheme
A format that contains another object reference.
URN
See Uniform Resource Name.
user exit profile
A profile that defines a user-provided program or exit routine to Data Interchange Services.
user group
A group consisting of one or more defined individual users, identified by a single group name.
user name token
A type of token that is represented by a user name and optionally, by a password.
user registry
A database of known users and user-provided information that is used for authentication purposes.
user-defined function (UDF)
A function that is defined to the DB2 database system by using the CREATE FUNCTION statement and that can be referenced thereafter in SQL statements. A UDF can be an external function or an SQL function. See also function.
UTC
See Coordinated Universal Time.
UTOKEN
The RACF security token that encapsulates or represents the security characteristics of a user. RACF assigns a UTOKEN to each user in the system.
utterance
A spoken word, phrase, or sentence that can be preceded and followed by silence.
UUID
See Universally Unique Identifier.

V

validation
The checking of data or code for correctness or for compliance with applicable standards, rules, and conventions.
validation action
A mechanism for verifying whether the actual value of a variable at run time corresponds to the expected value of that variable. See also timing constraint.
validation map
A set of mapping instructions that describe additional validation for an EDI document. One of five supported map types.
validator
A program that checks data or code for correctness or for compliance with applicable standards, rules, and conventions.
variable
A representation of a changeable value. See also global variable.
variant action
An action that is derived from another action so that the content of the action can vary. A field in the variant action object can derive its value in a different way from the way that the same field derives its value in the base action object.
verb
See people assignment criterion.
version
A separately licensed program that typically has significant new code or new function.
version control
The coordination and integration of the history of work submitted by a team. See also team support.
vertical scaling
Setting up multiple application servers on one machine, typically by creating cluster members.
vertical stacking
The process of starting more than one instance of the dynamic cluster on a node to manage bottlenecks.
view
In Eclipse-based user interfaces, a pane that is outside the editor area, which can be used to look at or work with the resources in the workbench.
view synchronous high-availability manager group
A special class of high availability (HA) group that can be created and used by components that require a certain virtual synchrony (VS) quality of service (QoS) for group communication.
virtual host
A configuration enabling a single host machine to resemble multiple host machines. Resources associated with one virtual host cannot share data with resources associated with another virtual host, even if the virtual hosts share the same physical machine.
virtual IP address
An IP address that is shared among multiple domain names or multiple servers. Virtual IP addressing enables one IP address to be used either when insufficient IP addresses are available or as a means to balance traffic to multiple servers.
virtual local area network (VLAN)
A logical association of switch ports based upon a set of rules or criteria, such as Medium Access Control (MAC) addresses, protocols, network address, or multicast address. This concept permits the LAN to be segmented again without requiring physical rearrangement.
virtual machine
An abstract specification for a computing device that can be implemented in different ways in software and hardware.
virtual private network (VPN)
An extension of a company intranet over the existing framework of either a public or private network. A VPN ensures that the data that is sent between the two endpoints of its connection remains secure. See also endpoint.
virtual synchrony (VS)
A property of group communication that guarantees how messages are delivered when the view changes, for example, when existing members fail or new members join.
virtualization
A technique that encapsulates the characteristics of resources from the way in which other systems interact with those resources.
visibility service
A type of business service that monitors and displays the performance, behavior, or metrics of a business process.
visual snippet
A diagrammatic representation of a fragment of Java programming language that can be manipulated with the visual snippet editor.
visualization
An association between a Scalable Vector Graphics (SVG) diagram and the set of actions that describe how the diagram should be updated based on the values of metrics or key performance indicators (KPIs).
VLAN
See virtual local area network.
VMS
See Voice Message Service.
vocabulary
A list of words with which DirectTalk matches input spoken by a caller. See also language model.
voice application
A DirectTalk application that answers or makes calls, plays recorded voice segments to callers, and responds to the caller's input.
voice directory
A list of voice segments identified by a group ID. Voice directories can be referenced by prompts and state tables. See also voice table.
voice mail
The capability to record, play back, distribute, and route voice messages.
voice mailbox
The notional hard disk space where the incoming messages for a voice mail subscriber are stored.
voice message
In voice mail, a recording made by a caller for later retrieval by a subscriber. See also greeting.
Voice Message Service (VMS)
An Ericsson service that transmits information between DirectTalk and certain switches.
voice messaging
The capability to record, play back, distribute, route, and manage voice recordings of telephone calls through the use of a processor, without the intervention of agents other than the callers and the message recipients.
voice model
A file containing parametric information about the sounds of the language that are to be recognized on behalf of an application. In WebSphere Voice Server this is a bnf file. See also grammar.
Voice over Internet Protocol (VoIP)
Sending telephony voice over Internet Protocol (IP) data connections rather than existing dedicated voice networks, switching and transmission equipment. See also gatekeeper, gateway.
voice port library
A library that manages a socket connection from the client to the voice technology. The library uses entry points provided by DVT.
Voice Protocol for Internet Messaging (VPIM)
Standard for digital exchange of voice messages between different voice mail systems, as defined in Internet Request For Comments (RFC) 1911.
voice response unit (VRU)
A telephony device that uses prerecorded voice responses to provide information in response to dual-tone multifrequency (DTMF) or voice input from a telephone caller.
voice segment
The spoken words or sounds that comprise recorded voice prompts. Each segment in an application is identified by a group ID and a segment ID and usually includes accompanying text.
voice server node
In a single system image (SSI), a server node that contains the voice data. This is usually the same node as the database server node.
voice table
A grouping of voice segments used for organizational purposes. Voice tables can be referenced by prompts, but not by state tables. See also voice directory.
VoiceXML
VoiceXtensible Markup Language. An XML-based markup language for creating distributed voice applications. Refer to the VoiceXML forum web site at www.voicexml.org
VoIP
See Voice over Internet Protocol.
VPACK
A component consisting of a base card, which connects to the digital trunk adapter in the RS/6000, and a trunk interface card (TIC), which manages the trunk connection to the switch. The single digital trunk processor contains one VPACK, and the multiple digital trunk processor contains slots for up to five VPACKs. See also pack, XPACK, SPACK.
VPIM
See Voice Protocol for Internet Messaging.
VPN
See virtual private network.
VRU
See voice response unit.
VS
See virtual synchrony.

W

W3C
See World Wide Web Consortium.
waiter
A thread waiting for a connection.
WAP
See Wireless Application Protocol.
WAR
See Web archive.
WAR file
See Web archive.
watchpoint
A breakpoint that suspends execution when a specified field or expression is modified.
WBMP
See wireless bitmap.
WCCM
See WebSphere Common Configuration Model.
Web application
An application that is accessible by a Web browser and that provides some function beyond static display of information, for instance by allowing the user to query a database. Common components of a Web application include HTML pages, JSP pages, and servlets.
Web archive (WAR)
A compressed file format, defined by the Java EE standard, for storing all the resources required to install and run a Web application in a single file. See also enterprise archive, Java archive.
Web browser
A client program that initiates requests to a Web server and displays the information that the server returns.
Web component
A servlet, JavaServer Pages (JSP) file, or a HyperText Markup Language (HTML) file. One or more Web components make up a Web module.
Web container
A container that implements the Web component contract of the Java EE architecture. (Sun)
Web container channel
A type of channel within a transport chain that creates a bridge in the transport chain between an HTTP inbound channel and a servlet or JavaServer Pages (JSP) engine.
Web crawler
A type of crawler that explores the Web by retrieving a Web document and following the links within that document.
Web diagram
A Struts file that uses icons and other images on a free-form surface to help application developers visualize the flow structure of a Struts-based Web application.
Web module
A unit that consists of one or more Web components and a Web deployment descriptor. (Sun)
Web Ontology Language (OWL)
A language that is used to explicitly represent the meaning of terms in vocabularies and the relationships between those terms. OWL is intended to be used when the information contained in documents needs to be processed by applications, as opposed to situations where the content only needs to be presented to humans. See also ontology.
Web portal
A single point of access to information that is from logically linked business services, presenting information from diverse sources uniformly.
Web project
A container for other resources such as source files and metadata that corresponds to the Java EE-defined container structure and hierarchy of files necessary for Web applications to be deployed.
Web property extension (WPX)
IBM extension to the standard deployment descriptors for Web applications. These extensions include Multipurpose Internet Mail Extensions (MIME) filtering and servlet caching.
Web resource
Any one of the resources that are created during the development of a Web application for example Web projects, HTML pages, JavaServer Pages (JSP) files, servlets, custom tag libraries, and archive files.
Web resource collection
A list of URL patterns and HTTP methods that describe a set of resources to be protected. (Sun)
Web server
A software program that is capable of servicing Hypertext Transfer Protocol (HTTP) requests.
Web server plug-in
A software module that supports the Web server in communicating requests for dynamic content, such as servlets, to the application server.
Web server separation
A topology where the Web server is physically separated from the application server.
Web service

1. A self-contained, self-describing modular application that can be published, discovered, and invoked over a network using standard network protocols. Typically, XML is used to tag the data, SOAP is used to transfer the data, WSDL is used for describing the services available, and UDDI is used for listing what services are available. See also SOAP, Universal Description, Discovery, and Integration, Web Services Description Language.

2. An application that performs specific tasks and is accessible through open protocols such as HTTP and SOAP.

Web service endpoint
An entity that is the destination for Web service messages. A Web service endpoint has a Uniform Resource Identifier (URI) address and is described by a Web Service Definition Language (WSDL) port element.
Web service interface
A group of operations described by the content of a Web Service Definition Language (WSDL) 1.1 port element. These operations can provide access to resource properties and metadata. (OASIS)
Web Services Business Process Execution Language (WS-BPEL)
See Business Process Execution Language.
Web Services Description Language (WSDL)
An XML-based specification for describing networked services as a set of endpoints operating on messages containing either document-oriented or procedure-oriented information. See also Web service.
Web Services Interoperability (WS-I)
An open industry organization that is chartered to promote Web services interoperability across platforms, operating systems, and programming languages.
Web Services Interoperability Organization (WSI)
An open industry organization that promotes Web services interoperability across platforms, operating systems, and programming languages.
Web Services Invocation Framework (WSIF)
A Java API that supports dynamic invoking of Web services, regardless of the format in which the service is implemented or the access mechanism.
Web Services Invocation Language (WSIL)
An XML document format that facilitates the discovery of existing Web services and provides a set of rules for how inspection-related information should be made available for consumption.
Web Services Policy Framework (WS-Policy)
A model and framework for describing the capabilities, requirements, and general characteristics of a Web service as a policy assertion or a collection of policy assertions.
Web site
A related collection of files available on the Web that is managed by a single entity (an organization or an individual) and contains information in hypertext for its users. A Web site often includes hypertext links to other Web sites.
WebSphere
An IBM brand name that encompasses tools for developing e-business applications and middleware for running Web applications.
WebSphere BI for FN Extension for SWIFTNet
The extension supporting the SWIFTNet services InterAct and FIN. It also provides the integration of SWIFT Alliance Gateway (SAG).
WebSphere BI for FN message
A WebSphere MQ message that has a folder labeled ComIbmDni in the MQRFH2 header. This folder provides the data that is required by WebSphere BI for FN to process the message.
WebSphere Common Configuration Model (WCCM)
A model that provides for programmatic access to configuration data.
WebSphere MQ
A family of IBM licensed programs that provides message queuing services.
what you see is what you get (WYSIWYG)
A capability of an editor to continually display pages exactly as they will be printed or otherwise rendered.
while loop
A loop that repeats the same sequence of activities as long as some condition is satisfied. The while loop tests its condition at the beginning of every loop. If the condition is false from the start, the sequence of activities contained in the loop never runs.
widget
A portable, reusable application or piece of dynamic content that can be placed into a Web page, receive input, and communicate with an application or with another widget.
wink start
A procedure used with some channel associated signaling protocols to indicate when a switch or PABX is ready to accept address signaling. After seizure, the switch sends a short off-hook signal (wink) when it is ready to accept address information. See also delay start, immediate start.
wire

1. A connector used to pass control and data from a component or an export to a target.

2. To connect two or more components or cooperative portlets so that they work together. In an application, wiring identifies target services; for portlets changes in the source portlet automatically update the target portlets.

Wireless Application Protocol (WAP)
An open industry standard for mobile Internet access that allows mobile users with wireless devices to easily and instantly access and interact with information and services.
wireless bitmap (WBMP)
A graphic format that is optimized for mobile computing devices. WBMP is part of the Wireless Application Protocol, Wireless Application Environment Specification.
Wireless Markup Language (WML)
A markup language based on XML that is used to present content and user interfaces for wireless devices such as cellular phones, pagers, and personal digital assistants.
wizard
An active form of help that guides users through each step of a particular task.
WLM
See Workload Manager.
WML
See Wireless Markup Language.
word spotting
In speech recognition, the ability to recognize a single word in a stream of words.
work class
A mechanism for grouping specific work together that must be associated with a common service policy or routing policy. Work classes group Uniform Resource Identifiers (URIs) or Web services from an application.
work item
In the human task editor, the representation of a task. Staff members can browse all work items that they have the authority to claim.
work manager
A thread pool for Java Platform, Enterprise Edition (Java EE) applications.
work object
A type of asynchronous bean that applications implement to run code blocks asynchronously.
workbench
The user interface and integrated development environment (IDE) in Eclipse and Eclipse-based tools such as IBM Rational Application Developer.
workflow
The sequence of activities performed in accordance with the business processes of an enterprise.
workload management
The optimization of the distribution of incoming work requests to the application servers, enterprise beans, servlets and other objects that can effectively process the request.
Workload Manager (WLM)
A component of z/OS that provides the ability to run multiple workloads at the same time within one z/OS image or across multiple images.
workspace

1. A directory on disk that contains all project files, as well as information such as preferences.

2. A temporary repository of configuration information that administrative clients use.

3. In Eclipse, the collection of projects and other resources that the user is currently developing in the workbench. Metadata about these resources resides in a directory on the file system; the resources might reside in the same directory.

World Wide Web Consortium (W3C)
An international industry consortium set up to develop common protocols to promote evolution and interoperability of the World Wide Web.
WPX
See Web property extension.
wrap
In ADSI, the concatenation of two columns of display data to form a single column.
wrapper

1. An alternate and supported interface that hides unsupported data types required by a server object behind a thin intermediate server object.

2. An object that encapsulates and delegates to another object to alter its interface or behavior in some way. (Sun)

wrapper business object
A top-level business object that groups child business objects for a component to use in a single operation or contains processing information about its child business object.
write-behind cache
A cache that asynchronously writes each write operation to the database using a loader.
write-through cache
A cache that synchronously writes each write operation to the database using a loader.
WS-BPEL
See Web Services Business Process Execution Language.
WS-I
See Web Services Interoperability.
WS-Policy
See Web Services Policy Framework.
WSDL
See Web Services Description Language.
WSDL document
A file that provides a set of definitions that describe a Web service in Web Services Description Language (WSDL) format.
WSDL file
See WSDL document.
WSI
See Web Services Interoperability Organization.
WSIF
See Web Services Invocation Framework.
WSIL
See Web Services Invocation Language.
WYSIWYG
See what you see is what you get.

X

X field
The primary data field in a chart. In a line chart, typically the X field appears along the horizontal axis. For example, an X field can represent cost data for the elements that appear along the horizontal axis of the chart.
X.25
A CCITT standard that defines an interface to packet switched communications services.
X.509 certificate
A certificate that contains information that is defined by the X.509 standard.
X/Open XA
The X/Open Distributed Transaction Processing XA interface. A proposed standard for distributed transaction communication. The standard specifies a bidirectional interface between resource managers that provide access to shared resources within transactions, and between a transaction service that monitors and resolves transactions.
X12
A protocol from the American National Standards Institute (ANSI) for electronic data interchange (EDI).
XA
A bidirectional interface between one or more resource managers that provide access to shared resources and a transaction manager that monitors and resolves transactions.
XACML
See Extensible Access Control Markup Language.
Xalan processor
An XSLT processor that is part of the Apache project. See also XSL Transformation.
XDoclet
An open, source code generation engine that uses special JavaDoc tags to parse Java source files and generate output such as XML descriptors or source code, based on templates.
XHTML
See Extensible Hypertext Markup Language.
XID
See transaction identifier.
XML
See Extensible Markup Language.
XML catalog
A catalog that contains rules specifying how an XML processor should resolve references to entities. Use of a catalog eliminates the need to change URIs within XML documents as resources are moved during development.
XML digital signature
A specification that defines the XML syntax and the processing rules to sign and verify the digital signatures for the digital content.
XML document definition
A reference to either an XML DTD document definition or an XML schema document definition.
XML encryption
A specification that defines how to encrypt the content of an XML element.
XML parser
A program that reads XML documents and provides an application with access to their content and structure.
XML Path Language (XPath)
A language that is designed to uniquely identify or address parts of source XML data, for use with XML-related technologies, such as XSLT, XQuery, and XML parsers. XPath is a World Wide Web Consortium standard.
XML schema
A mechanism for describing and constraining the content of XML files by indicating which elements are allowed and in which combinations. XML schemas are an alternative to document type definitions (DTDs) and can be used to extend functionality in the areas of data typing, inheritance, and presentation.
XML Schema Definition Language (XSD, XSDL)
A language for describing XML files that contain XML schema.
XML Schema Infoset Model (XSD)
A library that provides an API for manipulating the components of an XML Schema, as described by the W3C XML Schema specifications.
XML token
A security token that is in an XML format, such as a Security Assertion Markup Language (SAML) token.
XPACK
A digital trunk processor implemented using DSP technology on the DTXA without the need for external hardware. One XPACK is directly equivalent to one SPACK. One DTXA provides up to four XPACKs on a PCI card. See also pack, VPACK, SPACK.
XPath
See XML Path Language.
XPath expression
An expression that searches through an XML document and extracts information from the nodes (any part of the document, such as an element or attribute) in that document.
XSD

1. See XML Schema Definition Language.

2. See XML Schema Infoset Model.

XSDL
See XML Schema Definition Language.
XSL
See Extensible Stylesheet Language.
XSL style sheet
Code that describes how an XML document should be rendered (displayed or printed).
XSL Transformation (XSLT)
A standard that uses XSL style sheets to transform XML documents into other XML documents, fragments, or HTML documents. See also Xalan processor.
XSLT

1. See XSL Transformation.

2. See Extensible Stylesheet Language Transformation.

XSLT function
Function that is defined by the XSL Transform (XSLT) specification for the manipulation of numbers, strings, Boolean values, and node-sets.

Y

Y field
A secondary data field in a chart. In a line chart, typically the Y fields appear along the vertical axis. For example, an Y field can represent resources whose costs are represented along the vertical axis of the chart.
yellow alarm
See remote alarm indication.

Z

z/OS
An IBM mainframe operating system that uses 64-bit real storage.
ZCS
See zero code suppression.
zero code suppression (ZCS)
A coding method used with alternate mark inversion to prevent sending eight successive zeros. If eight successive zeros occur, the second-least significant bit (bit 7, with the bits labeled 1 through 8 from the most significant to the least significant) is changed from a 0 to a 1. AMI with ZCS does not support clear channel operation.
zone-based support
A function that enables rules-based shard placement to improve grid availability by placing shards across different data centers, whether on different floors or even in different buildings or geographies.



Feedback

This information center is powered by Eclipse technology. (http://www.eclipse.org)