- abstract schema
- Part of the deployment descriptor for an entity bean that is used to define
the bean relationships, persistent fields, or query statements.
- access bean
- An enterprise bean wrapper that is typically used by client programs,
such as JavaServer Pages (JSP) files and servlets. Access beans hide the complexity
of using enterprise beans and improve the performance of reading and writing
multiple enterprise bean properties.
- access control
- In computer security, the process of ensuring that only authorized users
can access the resources of a computer system in authorized ways.
- access control list (ACL)
- In computer security, a list that is associated with an object that identifies
all the subjects that can access the object and their specific access rights.
- access ID
- The unique identification of a user that is used during authorization
to determine if access is permitted to the resource.
- access intent
- Metadata that optimizes the runtime behavior of an entity bean with respect
to concurrency control, resource management, and database access strategies.
- access intent policy
- A grouping of access intents that governs a type of data access pattern
for enterprise bean persistence.
- access point group
- A collection of core groups that defines the set of core groups in the
same cell or in different cells that communicates with each other.
- accessibility
- An attribute of a software or hardware product that is usable by individuals
who have disabilities.
- ACL
- See access control list.
- activation
- In EJB, the process of transferring an enterprise bean from secondary
storage to memory. (Sun)
- adapter
- A mechanism for connecting two unlike parts or machines, or for electrically
or physically connecting a device to a computer or to another device.
- add rule
- A conditional expression that states the conditions necessary for a given
action to occur.
- administrative agent
- A program that provides administrative support without requiring a direct
connection to a database.
- agent
- A function that represents a requester to a server.
- alarm listener
- A type of asynchronous bean that is called when a high-speed transient
alarm expires.
- algorithm
- A set of well-defined rules for the solution of a problem in a finite
number of steps. For example, a full statement of an arithmetic procedure
for evaluating "sin x" to a stated precision.
- algorithm mapping
- A process by which service providers can define the mapping of Uniform
Resource Identifier (URI) algorithms to cryptographic algorithms that are
used for Extensible Markup Language (XML) digital signature and XML encryption.
- Apache
- An open-source Web server. IBM offers a Web server, called the IBM HTTP
Server, which is based on Apache.
- API
- See application programming interface.
- applet
- A small application program that performs a specific task and is usually
portable between operating systems. Often written in Java, applets can be
downloaded from the Internet and run in a Web browser.
- application
- One or more computer programs or software components that provide functionality
in direct support of a specific business process or processes.
- application assembly
- The process of creating an enterprise archive (EAR) file containing all
the files related to an application as well as an Extensible Markup Language
(XML) deployment descriptor for the application.
- application edition
- A unique deployment of a particular application. Multiple editions of
the same application have the same application name, while edition names are
unique.
- application edition manager
- An autonomic manager that manages interruption-free production application
deployments.
- applet client
- A client that runs within a browser-based Java runtime environment, and
is capable of interacting with enterprise beans directly instead of indirectly
through a servlet.
- application client
- In J2EE, a first-tier client component that executes in its own Java virtual
machine. Application clients have access to some J2EE platform APIs, for example
JNDI, JDBC, RMI-IIOP, and JMS. (Sun)
- application client module
- A Java archive (JAR) file that contains a client that accesses a Java
application. The Java application runs inside a client container and can connect
to remote or client-side Java 2 Platform, Enterprise Edition (J2EE) resources.
- application placement controller
- An autonomic manager that can start and stop application instances to
meet the fluctuating demand of work requests and varying service policy definitions.
- application programming interface (API)
- An interface that allows an application program that is written in a high-level
language to use specific data or functions of the operating system or another
program.
- Application Response Measurement (ARM)
- An application programming interface that is developed by a group of leading
technology vendors that can be used to monitor the availability and performance
of business transactions within and across diverse applications and systems.
- Application Response Measurement (ARM) agent
- The implementation of the ARM standard by an implementation provider.
- application rollout
- The deployment and activation of an application update across a server
cluster.
- application server
- A server program in a distributed network that provides the startup environment
for an application program.
- application server root
- The top directory for a WebSphere Application Server node.
- ARFM
- See autonomic request flow manager.
- ARM
- See Application Response Measurement.
- artifact
- A physical piece of information that is used or produced by a software
development process. Examples of artifacts include models, source files, scripts,
and binary executable files.
- assisted life cycle server
- Servers that you can create outside of an extended deployment administrative
domain but manage in an extended deployment environment. Typically, assisted
life cycle servers are specific to the associated middleware software.
- association
- 1. For Extensible Markup Language (XML) documents, the linkage of the
document itself to the rules that govern its structure, which can be defined
by a document type definition (DTD) or an XML schema.
2. In enterprise
beans, a relationship that exists between two container-managed persistence
(CMP) entity beans. Two types of associations exist: one-to-one and one-to-many.
- asymmetric algorithm
- See public-key algorithm.
- asymmetric cryptography
- In computer security, pertaining to the use of different keys for encryption
and decryption; a synonym for public key cryptography.
- asynchronous bean
- A Java object or an enterprise bean that a Java 2 Platform, Enterprise
Edition (J2EE) application can run asynchronously.
- asynchronous messaging
- A method of communication between programs in which a program places a
message on a message queue, then proceeds with its own processing without
waiting for a reply to its message. See also synchronous messaging.
- atomic
- Pertaining to transaction changes to the state of resources: either all
occur or none occur. The atomic characteristic maintains data integrity by
making sure that some updates are not made while others fail.
- authentication
- In computer security, a process that ensures that the identities of both
the sender and the receiver of a network transaction are true.
- authenticity
- The validation of client and server identities during a Secure Sockets
Layer (SSL) connection by both communicating parties using public key cryptography
and asymmetric cryptography.
- authorization
- The process of granting a user either complete or restricted access to
an object, resource, or function.
- authorization table
- A table that contains the role to user or group mapping information that
identifies the permitted access of a client to a particular resource.
- automatic restart management
- The facilities that detect failures and manage server restarts.
- autonomic manager
- A set of software or hardware components, which are configured by policies
that manage the behavior of other software or hardware components as a human
might manage them. An autonomic manager includes a control loop that consists
of monitor, analyze, plan, and run components.
- autonomic request flow manager (ARFM)
- An autonomic manager that controls request prioritization in the on demand
router (ODR).
- AXIS
- An implementation of the Simple Object Access Protocol (SOAP) on which
Java Web services can be implemented.
- base edition
- A deployed application that has no associated or specific edition information.
- basic authentication
- An authentication method that uses a user name and a password.
- bean
- A definition or instance of a JavaBeans component. See also JavaBeans.
- Bean Scripting Framework
- An architecture for incorporating scripting language functions to Java
applications.
- bean-managed messaging
- A function of asynchronous messaging that gives an enterprise bean complete
control over the messaging infrastructure.
- bean-managed persistence (BMP)
- Pertaining to an entity bean that manages its own persistence. See also
container-managed persistence.
- bean-managed transaction (BMT)
- The capability of the session bean, servlet, or application client component
to manage its own transactions directly, instead of through a container.
- bind
- To establish a connection between software components on a network using
an agreed-to protocol. In Web services, the bind operation occurs when the
service requestor invokes or initiates an interaction with the service at
run time using the binding details in the service description to locate, contact,
and invoke the service.
- binding
- A temporary association between a client and both an object and a server
that exports an interface to the object. A binding is meaningful only to the
program that sets it and is represented by a bound handle.
- block decryption
- Symmetric algorithms that decrypt a block of data at one time.
- block encryption
- Symmetric algorithms that encrypt a block of data at one time.
- BMP
- See bean-managed persistence.
- BMT
- See bean-managed transaction.
- BOM
- See byte order mark.
- bootstrap server
- An application server that runs the SIB service.
- bootstrapping
- The process by which an initial reference of the naming service is obtained.
The bootstrap setting and the host name form the initial context for Java
Naming and Directory Interface (JNDI) references.
- bottleneck
- A place in the system where contention for a resource is affecting performance.
- bridge interface
- A node and a server that run a core group bridge service.
- broker archive
- A file that is the unit of deployment to the broker that can contain any
number of compiled message flow and message set files and a single deployment
descriptor. You need a separate broker archive file for each configuration
that you want to deploy.
- brute force collision
- A programming style that relies on computing power to try all the possibilities
with a known hash until the solution is found.
- bucket
- One or more fields that accumulate the result of an operation.
- bulk decryption
- See block decryption.
- bulk encryption
- See block encryption.
- bus
- Interconnecting messaging engines that manage bus resources
- bus member
- The application servers within which the messaging engines run to support
the bus.
- business activity
- A collection of tasks that are linked so that they have an agreed outcome.
- business activity scope
- An attribute of an existing core unit of work that provides the compensation
ability in the event of an error in a business activity, when that activity
cannot be atomically rolled back.
- business logic tier
- The set of components that reside between the presentation and database
tiers. This logic tier hosts the enterprise bean containers, which run the
business logic.
- business process container
- A process engine that contains process modules.
- byte order mark (BOM)
- A character code at the beginning of a data stream that can be used as
a signature that defines the byte order and encoding form.
- CA
- See certificate authority.
- cache instance resource
- A location where any Java 2 Platform, Enterprise Edition (J2EE) application
can store, distribute, and share data.
- cache replication
- The sharing of cache IDs, cache entries, and cache invalidations with
other servers in the same replication domain.
- callback handler
- A mechanism that uses a Java Authentication and Authorization Service
(JAAS) interface to pass a security token to the Web service security runtime
for propagation in the Web service security header.
- capability list
- A list of associated resources and their corresponding privileges per
user.
- CBR
- See content based routing.
- cell
- 1. One or more processes that each host runtime components. Each cell
has one or more named core groups.
2. An arbitrary grouping of one or more
nodes in a WebSphere Application Server distributed network.
- cell-scoped binding
- A binding scope where the binding is not specific to, and not associated
with any node or server. This type of name binding is created under the persistent
root context of a cell.
- certificate authority (CA)
- An organization that issues certificates. The CA authenticates the certificate
owner's identity and the services that the owner is authorized to use, issues
new certificates, renews existing certificates, and revokes certificates.
- certificate revocation list (CRL)
- A list of certificates issued by a certificate authority (CA). The certificates
on this list might not be expired, but are no longer trusted by the CA.
- chain
- The name of a channel framework connection that contains an endpoint definition.
- channel
- An entry point to the Web services gateway that carries requests and responses
between Web services and the gateway.
- channel framework
- A common model for connection management, thread usage, channel management,
and message access within WebSphere Application Server.
- Channel Information Control System (CICS)
- An IBM licensed program that provides online transaction-processing services
and management for business applications.
- cheat sheet
- An interface that guides users through the wizards and steps required
to perform a complex task, and that links to relevant sections of the online
help.
- CICS
- See Channel Information Control System.
- cipher
- A cryptographic algorithm used to encrypt data that is unreadable until
converted into plain data with a predefined key.
- cipher suite
- A set of ciphers.
- class
- In object-oriented design or programming, a model or template that can
be used to create objects with a common definition and common properties,
operations, and behavior. An object is an instance of a class.
- class file
- A compiled Java source file.
- class hierarchy
- The relationships between classes that share a single inheritance. In
Java programming, all classes inherit from the Object class.
- class loader
- Part of the Java virtual machine code that is responsible for finding
and loading class files. A class loader affects the packaging of applications
and the run-time behavior of packaged applications deployed on application
servers.
- class path
- A list of directories and JAR files that contain resource files or Java
classes that a program can load dynamically at run time. See also CLASSPATH.
- client proxy
- An object on the client side of a network connection that provides a remote
procedure call interface to a service on the server side.
- client type detection
- A process in which a servlet determines the markup language type required
by a client and calls the appropriate JavaServer Pages file.
- client/server
- Pertaining to the model of interaction in distributed data processing
in which a program on one computer sends a request to a program on another
computer and awaits a response. The requesting program is called a client;
the answering program is called a server. See also distributed application.
- Cloudscape
- An embeddable, all Java, object-relational database management system
(ORDBMS).
- cluster
- A group of application servers that collaborates for the purposes of workload
balancing and failover.
- CMP
- See container-managed persistence.
- coexistence
- The ability of multiple installations of the WebSphere Application Server
to run in the same machine at the same time.
- collection certificate store
- A collection of intermediate certificates or certificate revocation lists
(CRL) that are used by a certificate path to build up a certificate chain
for validation.
- Collector Tool
- A tool that gathers information about a WebSphere Application Server installation
and packages this data in a Java archive (JAR) file to assist in problem determination
and analysis. This information includes logs, property files, configuration
files, operating system data, Java data, and prerequisite software presence
and levels.
- Common Criteria
- The title of a set of documents that describe a particular set of IT security
evaluation criteria.
- Common Object Request Broker Architecture (CORBA)
- An architecture and a specification for distributed object-oriented computing
that separates client and server programs with a formal interface definition.
See also Internet Inter-ORB Protocol.
- Common Secure Interoperability Version 2 (CSIv2)
- An authentication protocol developed by the Object Management Group (OMG)
that supports interoperability, authentication delegation, and privileges.
- compilation unit
- A portion of a computer program sufficiently complete to be compiled correctly.
- complete life cycle server
- Servers that you can create and manage in an extended deployment environment.
- complex type
- In Extensible Markup Language (XML), a type that supports elements in
its content and may carry attributes. See also simple type.
- concurrency control
- The management of contention for data resources.
- configuration repository
- A storage area of configuration data that is typically located in a subdirectory
of the product installation root directory.
- configuration root
- The mount point for the configuration file system.
- configured name binding
- Persistent storage of an object in the name space that is created using
either the administrative console or the wsadmin program.
- connection factory
- A set of configuration values that produces connections that enable a
J2EE component to access a resource. Connection factories provide on-demand
connections from an application to an enterprise information system (EIS).
- connection handle
- A representation of a physical connection.
- connection pooling
- A technique used for establishing a pool of resource connections that
applications can share on an application server.
- connector
- In J2EE, a standard extension mechanism for containers to provide connectivity
to enterprise information systems (EISs). A connector consists of a resource
adapter and application development tools (Sun). See also container.
- constructor
- In object-oriented programming, a special method used to initialize an
object.
- consumer
- 1. An application that attaches to a bus destination and receives messages
from the service integration bus.
2. In java Message Service (JMS), an object
that is used for receiving messages from a destination.
- container
- In J2EE, an entity that provides life-cycle management, security, deployment,
and run-time services to components. (Sun)
Each type of container (EJB,
Web, JSP, servlet, applet, and application client) also provides component-specific
services. See also resource adapter, connector.
- container transaction
- See container-managed transaction.
- container-managed persistence (CMP)
- In Java 2 Platform, Enterprise Edition (J2EE) technology, data transfer
between the variables of an entity bean and a resource manager administered
by the entity bean container. See also bean-managed persistence.
- container-managed transaction
- A transaction whose boundaries are defined by an EJB container. An entity
bean must use container-managed transactions. (Sun)
- content based routing (CBR)
- An optional feature of the caching proxy that provides intelligent routing
to back-end application servers. This routing is based on HTTP session affinity
and a weighted round-robin algorithm.
- context parameter
- A definition of the server view of the Web application within which the
servlet is running and supports servlet access to available resources.
- control region
- A virtual storage area that provides the control, scheduling, and work
management mechanisms necessary to coordinate shared resources.
- controller
- A regulating mechanism that controls the scheduling and work management
coordination for shared resources.
- CORBA
- See Common Object Request Broker Architecture.
- core group
- A group of processes that is directly accessible to each other and is
connected using a local area network (LAN).
- core group access point
- A definition of a set of servers that provides access to the core group.
- core group bridge
- The means by which core groups communicate.
- core group member
- A server included in the cluster of a core group.
- create method
- In enterprise beans, a method defined in the home interface and invoked
by a client to create an enterprise bean. (Sun)
- credential
- In the Java Authentication and Authorization Service (JAAS) framework,
a subject class that owns security-related attributes. These attributes can
contain information used to authenticate the subject to new services.
- CRL
- See certificate revocation list.
- cross-cell communication
- The ability of one cell to share information and route requests to another
cell.
- cryptographic token
- A logical view of a hardware device that performs cryptographic functions
and stores cryptographic keys, certificates, and user data.
- CSIv2
- See Common Secure Interoperability Version 2.
- custom action
- A Java or non-Java process definition that you can define as a part of
a health policy action plan.
- custom service
- A configurable service that plugs in to a WebSphere Application Server
and defines a hook point that runs when the server starts and shuts down when
the server stops.
- custom user registry
- A customer-implemented user registry that implements the UserRegistry
Java interface. This registry type can support virtually any kind of accounts
repository from a relational database and can provide flexibility in adapting
product security to various environments.
- daemon
- A program that runs unattended to perform continuous or periodic functions,
such as network control.
- data access bean
- A class library that provides a rich set of features and functions, while
hiding the complexity associated with accessing relational databases.
- data definition language (DDL)
- A language for describing data and its relationships in a database. See
also data manipulation language.
- data graph
- A collection of tree-structured or graph-structured data objects.
- data replication service (DRS)
- A service that transfers data, objects, or events among application servers.
- data source
- 1. In Java Database Connectivity (JDBC), an interface that provides a
logical representation of a pool of connections to a physical data source.
Data source objects provide application portability by making it unnecessary
to supply information specific to a particular database driver.
2. A repository
of data to which a federated server can connect and then retrieve data by
using wrappers. A data source can contain relational databases, Extensible
Markup Language (XML) files, search algorithms, table-structured files, or
other objects. In a federated system, data sources display as a single collective
database.
- data store
- 1. A place (such as a database system, file, or directory) where data
is stored.
2. In Java Message Service (JMS), an administered object that
encapsulates the identity of a message destination. See bus destination.
- datagram
- A form of asynchronous messaging in which an application sends a message,
but does not require a response.
- DB2
- A family of IBM licensed programs for relational database management.
- DDL
- See data definition language.
- debugger
- A tool used to detect and trace errors in computer programs.
- declarative security
- The security configuration of an application during assembly stage that
is defined in the deployment descriptors and enforced by the security run
time.
- delegation
- The process of propagating a security identity from a caller to a called
object. According to the Java 2 Platform, Enterprise Edition (J2EE) specification,
a servlet and an enterprise bean can propagate either the client identity
when invoking enterprise beans, or can use another specified identity as indicated
in the corresponding deployment descriptor.
- demarshal
- The conversion of a data stream into an object.
- demilitarized zone (DMZ)
- A configuration including multiple firewalls to add layers of protection
between a corporate intranet and a public network, like the Internet.
- deploy
- To place files or install software into an operational environment. In
J2EE, this involves creating a deployment descriptor suitable to the type
of application that is being deployed.
- deployer
- A person who installs modules and Java 2 Platform, Enterprise Edition
(J2EE) applications into an operational environment.
- deployment descriptor
- An XML file that describes how to deploy a module or application by specifying
configuration and container options. For example, an EJB deployment descriptor
passes information to an EJB container about how to manage and control an
enterprise bean.
- deployment manager
- A special type of server that manages operations for a cell.
- deprecated
- Pertaining to an entity, such as a programming element or feature, that
is supported but no longer recommended, and that might become obsolete.
- deserializer
- A method for converting a serialized variable into object data.
- destination
- In Java Message Service, an administered object that encapsulates the
identity of a message destination. See bus destination.
- destination routing path
- A sequence of intermediary bus destinations that messages must pass through
to reach a target bus destination.
- digest code
- A number that is the result of a message digest function or a secure hash
algorithm distilling a document.
- digital certificate
- An electronic document used to identify an individual, server, company,
or some other entity, and to associate a public key with the entity. A digital
certificate is issued by a certification authority and is digitally signed
by that authority.
- digital signature
- The encrypted digest code that is appended to a document. In an authentication
system that uses public-key encryption, digital signatures are used to sign
certificates.
- directive
- A first-failure data capture (FFDC) construct that may be contained in
a WebSphere Application Server symptom database in order to provide information
and suggested actions to assist a diagnostic module in customizing the data
that is logged.
- discover
- In UDDI, to browse the business registry to locate existing Web services
for integration.
- discovered server
- Servers that runs the middleware agent and are created outside of an extended
deployment environment, but have server representations automatically created
within the extended deployment environment.
- discovery protocol
- Pertaining to the protocol that is followed to retrieve information from
a network.
- distinguished name (DN)
- A set of name-value pairs (such as CN=person's name and C=country or region)
that uniquely identify an entity in a digital certificate.
- distributed application
- An application made up of distinct components that are physically located
on different computer systems, connected by a network. See also client/server.
- DMZ
- See demilitarized zone.
- Document Object Model (DOM)
- A system in which a structured document, for example an Extensible Markup
Language (XML) file, is viewed as a tree of objects that can be programmatically
accessed and updated.
- document type definition (DTD)
- The rules that specify the structure for a particular class of Standard
Generalized Markup Language (SGML) or Extensible Markup Language (XML) documents.
- DOM
- See Document Object Model.
- domain
- An object, icon, or container that contains other objects representing
the resources of a domain. The domain object can be used to manage those resources.
- drop-down
- Pertaining to a list or menu that opens when clicked and stays open until
the user selects a menu or list item or clicks elsewhere in the user interface.
- DRS
- See data replication service.
- DTD
- See document type definition.
- durable subscription
- A subscription that can accumulate messages, even when no consumers are
attached.
- dynamic cache
- A consolidation of several caching activities, including servlets, Web
services, and WebSphere commands into one service where these activities work
together to improve performance and share configuration parameters.
- dynamic cluster
- A server cluster that uses weights to balance the workloads of its cluster
members dynamically, based on performance information collected from cluster
members.
- dynamic cluster isolation
- The ability to specify whether the dynamic cluster runs on the same nodes
as other instances of dynamic clusters, or if the dynamic cluster is the only
dynamic cluster that runs on a single node.
- dynamic operations
- Operations that monitor the server environment and make recommendations
that are based on data observation.
- dynamic policy
- A template of permissions for a particular type of resource.
- dynamic reloading
- The ability to change an existing component without restarting the server
for the changes to become effective.
- dynamic workload manager (DWLM)
- A feature of the on demand router (ODR) that applies the same principles
as the workload manager, such as routing based on a weight system, which establishes
a prioritized routing system. Through DWLM, the system can dynamically modify
the weights to stay current with the business goals.
- EAR
- See enterprise archive.
- ECSA
- See extended common system area.
- Edge Side Include (ESI)
- A technology supporting cacheable and noncacheable Web page components
that can be gathered and assembled at the edge of a network.
- edition
- A successive deployment generation of a particular set of versioned artifacts.
- EIS
- See enterprise information system.
- EJB
- See Enterprise JavaBeans.
- EJB container
- A container that implements the EJB component contract of the J2EE architecture.
This contract specifies a run-time environment for enterprise beans that includes
security, concurrency, life-cycle management, transactions, deployment, and
other services. An EJB container is provided by an EJB or J2EE server. (Sun)
- EJB context
- In enterprise beans, an object that allows an enterprise bean to invoke
services provided by the container and to obtain information about the caller
of a client-invoked method. (Sun)
- EJB inheritance
- A form of inheritance in which an enterprise bean inherits properties,
methods, and method-level control descriptor attributes from another enterprise
bean that resides in the same group.
- EJB module
- A software unit that consists of one or more enterprise beans and an EJB
deployment descriptor. (Sun)
- EJB object
- In enterprise beans, an object whose class implements the enterprise bean
remote interface (Sun).
- EJB query
- A string that contains an optional SELECT clause that specifies the Enterprise
JavaBeans (EJB) objects to return, a FROM clause that names the bean collections,
an optional WHERE clause that contains search predicates over the collections,
an optional ORDER BY clause that specifies the ordering of the result collection;
and input parameters that correspond to the argument of the finder method.
- EJB reference
- A logical name that is used by an application to locate the home interface
of an enterprise bean in the target operational environment.
- EJB server
- Software that provides services to an EJB container. An EJB server may
host one or more EJB containers (Sun).
- element
- In markup languages such as Standard Generalized Markup Language (SGML),
Extensible Markup Language (XML), and Hypertext Markup Language (HTML), a
basic unit consisting of a start tag, end tag, associated attributes and their
values, and any text that is contained between the two.
- enclave
- A construct that represents a business transaction or unit of work on
the OS/390 workload manager.
- endian
- A data type that is longer than a byte and that is stored in computer
memory with the most significant byte first or last.
- endpoint
- The system that is the origin or destination of a session.
- endpoint listener
- The point or address at which incoming messages for a Web service are
received by a service integration bus.
- endpoint reference
- The combination of the address of a Web service that implements the manageability
interface for a managed resource type and the properties that allow that Web
service to identify the managed resource.
- enterprise application
- An application that conforms to the Java 2 Platform Enterprise Edition
specification.
- enterprise archive (EAR)
- A specialized type of Java archive (JAR) file, defined by the Java 2 Platform,
Enterprise Edition (J2EE) standard, used to deploy J2EE applications to J2EE
application servers. An EAR file contains enterprise bean components, a deployment
descriptor, and Web archive (WAR) files for individual Web applications. See
also Web archive.
- enterprise bean
- A component that implements a business task or business entity and resides
in an EJB container. Entity beans, session beans, and message-driven beans
are all enterprise beans. (Sun)
- enterprise information system (EIS)
- The applications that comprise the existing system of an enterprise for
handling company-wide information. Examples of enterprise information systems
include: an enterprise resource planning (ERP) system, a mainframe transaction
processing system, and a legacy database system. (Sun) See also resource adapter.
- Enterprise JavaBeans (EJB)
- A component architecture defined by Sun Microsystems for the development
and deployment of object-oriented, distributed, enterprise-level applications.
- enterprise workload manager
- Part of the dynamic operations environment that manages subgoals and resources
for the larger enterprise environment.
- entity
- In markup languages such as Extensible Markup Language (XML), a collection
of characters that can be referenced as a unit, for example to incorporate
often repeated text or special characters within a document.
- entity bean
- In EJB programming, an enterprise bean that represents persistent data
maintained in a database. Each entity bean carries its own identity. (Sun)
There are two types of entity beans: container-managed persistence (CMP)
entity beans and bean-managed persistence (BMP) entity beans. See also session
bean.
- environment variable
- A variable that specifies how an operating system or another program runs,
or the devices that the operating system recognizes.
- error
- A discrepancy between a computed, observed, or measured value or condition
and the true, specified, or theoretically correct value or condition.
- error log stream
- A continuous flow of error information that is transmitted using a predefined
format.
- ESI
- See Edge Side Include.
- ESI processor
- A feature in the WebSphere Web server plug-in that supports fragment caching
and fragment assembly into full pages.
- event
- The encapsulated data that is sent as a result of an occurrence, or situation
in the system.
- event factory
- An object that returns new instances of either the CommonBaseEvent element
or of the specialized classes representing complex property data types.
- event listener
- A type of asynchronous bean that serves as a notification mechanism and
through which Java 2 Platform, Enterprise Edition (J2EE) components within
a single application can notify each other about various asynchronous events.
- event source
- An object that supports an asynchronous notification server within a single
Java virtual machine. Using an event source, the event listener object can
be registered and used to implement any interface.
- exception
- An event during program execution that prevents the program from continuing
normally.
- exception handler
- A block of code that reacts to a specific type of exception.
- express nonpersistent
- A delivery option that specifies that messages are discarded when a messaging
engine stops or fails. Messages can also be discarded if a connection that
is used to send them becomes unavailable. See also best effort nonpersistent,
reliable nonpersistent, reliable persistent, and assured persistent.
- expression
- An SQL operand or a collection of operators and operands that yields a
single value.
- extended common system area (ECSA)
- A major element of MVS/ESA virtual storage above the 16 MB line. This
area contains pageable system data areas that are addressable by all active
virtual storage address spaces. It duplicates the common system area (CSA),
which exists below the 16 MB line.
- extended deployment
- The software that monitors network efficiency and distributes unexpected
workloads.
- extended manageability
- Offers simpler and improved management of complex system operations with
real-time advanced, meaningful visualization tools and gradual, controlled
implementation of autonomic capabilities, helping reduce the cost of managing
IT resources.
- extended messaging
- A function of asynchronous messaging where the application server manages
the messaging infrastructure and extra standard types of messaging beans are
provided to add functionality to that provided by message-driven beans.
- Extensible Markup Language (XML)
- A standard metalanguage for defining markup languages that is based on
Standard Generalized Markup Language (SGML).
- extension
- A class of objects designated by a specific term or concept; denotation.
- factory
- In object-oriented programming, a class that is used to create instances
of another class. A factory is used to isolate the creation of objects of
a particular class into one place so that new functions can be provided without
widespread code changes.
- failover
- A cluster event where the primary database server or application server
switches over to a backup system due to the failure of the primary server.
- FAP
- See Formats and Protocols.
- fast response cache accelerator (FRCA)
- A cache that resides in the kernel on AIX and Windows platforms that provides
support for caching on multiple Web servers and on servers with multiple IP
addresses.
- fault message
- An object that contains status information and details about a problem
with a message.
- Federal Information Processing Standard (FIPS)
- A standard produced by the National Institute of Standards and Technology
when national and international standards are nonexistent or inadequate to
satisfy the U.S. government requirements.
- federation
- The process of combining naming systems so that the aggregate system can
process composite names that span the naming systems.
- FFDC
- See first-failure data capture.
- file serving
- A function that supports the serving of static files by Web applications.
- file store
- A type of message store that directly uses files in a file system through
the operating system.
- filter
- A device or program that separates data, signals, or material in accordance
with specified criteria.
- finder method
- In enterprise beans, a method defined in the home interface and invoked
by a client to locate an entity bean. (Sun)
- fingerprint
- See digest code.
- FIPS
- See Federal Information Processing Standard.
- firewall
- A network configuration, usually both hardware and software, that prevents
unauthorized traffic into and out of a secure network.
- first-failure data capture
- A problem diagnosis aid that identifies errors, gathers and logs information
about these errors, and returns control to the affected run-time software.
- fix pack
- A cumulative collection of fixes that does not contain new functions.
A fix pack can contain fixes that have not been shipped previously. Full regression
testing is performed on fix packs. See also program temporary fix, test fix,
interim fix, refresh pack.
- folder
- A container used to organize objects.
- foreign bus
- One of the other service integration buses with which a particular service
integration bus can exchange messages.
- foreign destination
- A destination that identifies a destination on a foreign bus.
- Formats and Protocols (FAP)
- In message queuing, a definition of how queue managers communicate with
each other, and of how clients communicate with server queue managers.
- form logout
- A mechanism to log out without having to close all Web browser sessions.
- form-based login
- An authentication process where a user ID and a password are retrieved
using an Hypertext Markup Language (HTML) form, and sent to the server over
the Hypertext Transfer Protocol (HTTP) or hypertext Transfer Protocol Secure
(HTTPS) protocol.
- forward routing path
- A set of bus destinations to which a message is routed and held as a stack
property within the message. When a message is created, the forward routing
path is added to the message. When the message reaches a destination, that
destination is removed from the forward routing path in the message.
- forwardable credentials
- A mechanism-specific security credential ( that is issued to access a
resource, which is used to obtain another credential for access to a different
resource.
- FRCA
- See fast response cache accelerator.
- garbage collection
- A routine that searches memory to reclaim space from program segments
or inactive data.
- gateway
- A middleware component that bridges Internet and intranet environments
during Web service invocations.
- gateway destination
- A type of service destination that receives messages for gateway services.
Gateway destinations are divided into those that are used for request processing
and those that are used for reply processing.
- gateway queue manager
- The queue manager to which the connection is made in a WebSphere MQ link.
- gateway service
- A Web service that is made available through the Web services gateway.
- General Inter-ORB Protocol (GIOP)
- A protocol that Common Object Request Broker Architecture (CORBA) uses
to define the format of messages.
- generic server
- A server that is managed in, but not supplied by WebSphere Application
Server. Any server or process that is necessary to support the Application
Server environment, including a Java server, a C or C++ server or process,
a CORBA server, or a Remote Method Invocation (RMI) server.
- generic server cluster
- A group of remote servers that need routing by the proxy server.
- getter method
- A method whose purpose is to get the value of an instance or class variable.
This allows another object to find out the value of one of its variables.
See also setter method.
- GIOP
- See General Inter-ORB Protocol.
- global security
- Pertains to all applications running in the environment and determines
whether security is used, the type of registry used for authentication, and
other values, many of which act as defaults.
- grammar
- A document type definition (DTD) or schema providing a structured format
used for successful processing by the trace service.
- group
- A collection of users who can share access authorities for protected resources.
- HA
- See high availability.
- HA group
- A collection of one or more members. A common group name relates the members
together
- HA policy
- A set of rules that is defined for a high availability (HA) group that
dictate whether zero (0), or more members are activated. The policy is associated
with a specific HA group by matching the policy match criteria with the group
name.
- handle
- In the J2EE specification, an object that identifies an enterprise bean.
A client may serialize the handle, and then later deserialize it to obtain
a reference to the enterprise bean. (Sun)
- handler
- In Web services, a mechanism for processing service content and extending
the function of a Java API for XML-based RPC (JAX-RPC) run-time system.
- handshake
- The exchange of messages at the start of a Secure Sockets Layer session
that allows the client to authenticate the server using public key techniques
(and, optionally, for the server to authenticate the client), then allows
the client and server to cooperate in creating symmetric keys for encryption,
decryption, and detection of tampering.
- hash
- In computer security, a number generated from a string of text that is
used to ensure that transmitted messages arrived intact.
- hash map
- A data structure that associates keys with values.
- health controller
- An autonomic manager that constantly monitors defined health policies.
When a specified health policy condition does not exist in the environment,
the health controller verifies that configured actions correct the error.
- health policy
- A set of rules that an administrator can define and use to monitor defined
conditions, and take actions when the conditions occur.
- hierarchical
- Pertaining to data that is organized on computer systems using a hierarchy
of containers, often called folders (directories) and files. In this scheme,
folders can contain other folders and files. The successive containment of
folders within folders creates the levels of organization, which is the hierarchy.
- high availability
- Pertaining to a clustered system that is reconfigured when node or daemon
failures occur, so that workloads can be redistributed to the remaining nodes
in the cluster.
- high availability file system
- A cluster file system that can be used for component redundancy to provide
continued operations during failures.
- high availability manager
- A framework within which core group membership is determined and status
is communicated between core group members.
- high performance computing
- The ability to support quality of service initiatives for business-critical
applications to provide near-linear scalability of high-end transaction processing.
- HMAC
- See Keyed-Hashing Message Authentication Code.
- home interface
- In enterprise beans, an interface that defines zero or more create and
remove methods for a session bean or zero or more create, finder, and remove
methods for an entity bean. See also remote interface.
- home method
- A method in the home interface that is used by a client to create, locate,
and remove instances of enterprise beans.
- horizontal scaling
- A topology in which more than one application server running on multiple
computing nodes is used to run a single application.
- host
- 1. A computer that is connected to a network and provides an access point
to that network. The host can be a client, a server, or both a client and
server simultaneously.
2. In performance profiling, a machine or a machine
starting partition on which an application under test resides. The host owns
the processes that are profiled.
- host name
- The network name for a network adaptor on a physical machine in which
the node is installed.
- hot deployment
- The process of adding new components to a running server without stopping
and restarting the application server or application.
- hot servant region
- A servant region that had a request dispatched to it previously and now
has available threads.
- hover help
- A form of online help that can be viewed by moving a mouse or other pointing
device over a GUI item such as an icon or field.
- HTTP
- See Hypertext Transfer Protocol.
- HTTP channel
- A type of channel within a transport chain that provides client applications
with persistent HTTP connections to remote hosts that are either blocked by
firewalls or require an HTTP proxy server. An HTTP channel is used to exchange
application data in the body of an HTTP request and an HTTP response that
are sent to and received from a remote server.
- HTTPS
- See Hypertext Transfer Protocol Secure.
- Hypertext Transfer Protocol (HTTP)
- In the Internet suite of protocols, the protocol that is used to transfer
and display hypertext and Extensible Markup Language (XML) documents on the
Web.
- Hypertext Transfer Protocol Secure (HTTPS)
- An Internet protocol that is used by Web servers and Web browsers to transfer
and display hypermedia documents securely across the Internet.
- IDE
- See integrated development environment.
- identifier
- The name of an item in a program written in the Java language.
- identity
- The data that represents a person and that is stored in one or more repositories.
- identity assertion
- The invocation credential that is asserted to the downstream server. This
credential can be set as the originating client identity, the server identity,
or another specified identity, depending on the RunAs mode for the enterprise
bean.
- identity token
- A token that contains the invocation credential identity, which with the
client authentication token are required by the receiving server to accept
the asserted identity.
- IDL
- See Interface Definition Language.
- IETF
- See Internet Engineering Task Force.
- IIOP
- See Internet Inter-ORB Protocol.
- inbound authentication
- The configuration that determines the type of accepted authentication
for inbound requests.
- inbound port
- A type of port that takes a message that is received at an endpoint listener
and passes it to the service integration bus for forwarding to the appropriate
inbound service.
- inbound service
- The external interface for a service that is provided by your own organization
and hosted in a location that is directly available through the service destination.
- inbound transport
- Network ports in which a server listens for incoming requests.
- indirect link
- A link from a service integration bus to a foreign bus that is made through
one or more intermediate foreign buses. The intermediate foreign buses can
be service integration buses or WebSphere MQ systems.
- information center
- A collection of information that provides support for users of one or
more products, can be launched separately from the product, and includes a
list of topics for navigation and a search engine.
- inheritance
- An object-oriented programming technique that allows the use of existing
classes as a basis for creating other classes.
- initial context
- Starting point in a namespace.
- initial reference
- A well-known reference that is associated with an identifier.
- INS
- See Interoperable Naming Service.
- instance
- In object-oriented programming, an object of a particular class.
- integrated development environment (IDE)
- A set of software development tools such as source editors, compilers,
and debuggers, that are accessible from a single user interface. In Eclipse,
the IDE is called the workbench.
- Interactive System Productivity Facility (ISPF)
- An IBM licensed program that serves as a full-screen editor and dialog
manager. Used for writing application programs, it provides a means of generating
standard screen panels and interactive dialogs between the application programmer
and terminal user.
- Interface Definition Language (IDL)
- In Common Object Request Broker Architecture (CORBA), a declarative language
that is used to describe object interfaces, without regard to object implementation.
- internationalized
- An application that is coded such that it can present information to users
in different locales or languages, and accept input data from users in multiple
locales.
- Internet Engineering Task Force (IETF)
- The task force of the Internet Architecture Board (IAB) that is responsible
for solving the short-term engineering needs of the Internet. The IETF consists
of numerous working groups, each focused on a particular problem. Internet
standards are typically developed or reviewed by individual working groups
before they can become standards.
- Internet Inter-ORB Protocol (IIOP)
- A protocol used for communication between Common Object Request Broker
Architecture (CORBA) Object Request Brokers.
- interoperability
- The capability to communicate, run programs, or transfer data among various
functional units in a way that requires the user to have little or no knowledge
of the unique characteristics of those units.
- Interoperable Naming Service (INS)
- A program that supports the configuration of the Object Request Broker
(ORB) administratively to return object references.
- interoperable object reference (IOR)
- An object reference with which an application can make a remote method
call on a CORBA object. This reference contains all the information needed
to route a message directly to the appropriate server.
- invocation
- The activation of a program or procedure.
- invocation credential
- An identity with which to invoke a downstream method. The receiving server
requires this identity with the sending server identity to accept the asserted
identity.
- invoker attribute
- An assembly property for a Web module that is used by the servlet that
implements the invocation behavior.
- IOR
- See interoperable object reference.
- IP sprayer
- A device that is located between inbound requests from the users and the
application server nodes that reroutes requests across nodes.
- ISPF
- See Interactive System Productivity Facility.
- J2EE
- See Java 2 Platform, Enterprise Edition.
- J2EE application
- Any deployable unit of J2EE functionality. This unit can be a single module
or a group of modules packaged into an enterprise archive (EAR) file with
a J2EE application deployment descriptor. (Sun)
- J2EE Connector architecture (JCA)
- A standard architecture for connecting the Java 2 Platform, Enterprise
Edition (J2EE) platform to heterogeneous enterprise information systems (EIS).
- J2EE server
- A run-time environment that provides EJB or Web containers.
- JAAS
- See Java Authentication and Authorization Service.
- Jacl
- See Java Command Language.
- JAF
- See JavaBeans Activation Framework.
- Java
- An object-oriented programming language for portable interpretive code
that supports interaction among remote objects. Java was developed and specified
by Sun Microsystems, Incorporated.
- Java 2 Connector security
- An architecture designed to extend the end-to-end security model for J2EE-based
applications to include enterprise information systems (EIS)
- Java 2 Platform, Enterprise Edition (J2EE)
- An environment for developing and deploying enterprise applications, defined
by Sun Microsystems Inc. The J2EE platform consists of a set of services,
application programming interfaces (APIs), and protocols that provide the
functionality for developing multitiered, Web-based applications. (Sun) See
also Java 2 Platform Standard Edition.
- Java API for XML (JAX)
- A set of Java-based APIs for handling various operations involving data
defined through Extensible Markup Language (XML).
- Java API for XML-based RPC (JAX-RPC)
- A specification that describes application programming interfaces (APIs)
and conventions for building Web services and Web service clients that use
remote procedure calls (RPC) and Extensible Markup Language (XML). JAX-RPC
is also known as JSR 101.
- Java Authentication and Authorization Service (JAAS)
- In Java 2 Platform, Enterprise Edition (J2EE) technology, a standard API
for performing security-based operations. Through JAAS, services can authenticate
and authorize users while enabling the applications to remain independent
from underlying technologies.
- Java Command Language (Jacl)
- A scripting language for the Java 2 environment that is used to create
Web content and to control Java applications.
- Java Database Connectivity (JDBC)
- An industry standard for database-independent connectivity between the
Java platform and a wide range of databases. The JDBC interface provides a
call-level API for SQL-based database access.
- Java Generic Security Services (JGSS)
- A specification that provides Java programs access to the services that
include the signing and sealing of messages and a generic authentication mechanism.
- Java Management Extensions (JMX)
- A means of doing management of and through Java technology. JMX was developed
through the Java Community ProcessSM program, by Sun Microsystems, Inc. and
some leading companies in the management field. JMX is a universal, open extension
of the Java programming language for management that can be deployed across
all industries, wherever management is needed.
- Java Message Service (JMS)
- An application programming interface (API) that provides Java language
functions for handling messages. See also Application Messaging Interface,
Message Queue Interface.
- Java Naming and Directory Interface (JNDI)
- An extension to the Java platform that provides a standard interface for
heterogeneous naming and directory services.
- Java platform
- A collective term for the Java language for writing programs; a set of
APIs, class libraries, and other programs used in developing, compiling, and
error-checking programs; and a Java virtual machine which loads and executes
the class files. (Sun)
- Java Runtime Environment (JRE)
- A subset of the Sun Microsystems Java Development Kit (JDK) that contains
the core executable programs and files that constitute the standard Java platform.
The JRE includes the Java virtual machine (JVM), core classes, and supporting
files.
- Java Secure Socket Extension (JSSE)
- A Java package that enables secure Internet communications. It implements
a Java version of the Secure Sockets Layer (SSL) and Transport Layer Security
(TSL) protocols and supports data encryption, server authentication, message
integrity, and optionally client authentication.
- Java virtual machine (JVM)
- A software implementation of a central processing unit that runs compiled
Java code (applets and applications).
- Java Virtual Machine Profiler Interface (JVMPI)
- A profiling tool that supports the collection of information, such as
data about garbage collection and the Java virtual machine (JVM) application
programming interface (API) that runs the application server.
- Java Widget Library (JWL)
- An extended widget set that is usable by portal and portlet programmers
that adds JavaScript client-side processing to JavaServer Faces.
- JavaBeans
- As defined for Java by Sun Microsystems, a portable, platform-independent,
reusable component model. See also bean.
- JavaBeans Activation Framework (JAF)
- A standard extension to the Java platform that determines arbitrary data
types and available operations and can instantiate a bean to run pertinent
services.
- JavaMail API
- A platform and protocol-independent framework for building Java-based
mail client applications.
- JavaServer Faces (JCF)
- A Java framework that is used for developing Web applications.
- JavaServer Pages (JSP)
- A server-side scripting technology that enables Java code to be dynamically
embedded within Web pages (HTML files) and executed when the page is served,
in order to return dynamic content to a client. See also JSP file, JSP page.
- JavaServer Pages (JSP) file
- Application building blocks coded to the Sun Microsystems JavaServer Pages
(JSP) specification. JSP files enable the separation of the Hypertext Markup
Language (HTML) code from the business logic in Web pages so that HTML programmers
and Java programmers can collaborate when creating and maintaining pages.
- JAX
- See Java API for XML.
- JAX-RPC
- See Java API for XML-based RPC.
- JAX-RPC handler
- A Java class that performs a range of handling tasks, including logging
messages, transforming message content, or terminating an incoming request.
- JCA
- See J2EE Connector architecture.
- JCF
- See JavaServer Faces.
- JDBC
- See Java Database Connectivity.
- JGSS
- See Java Generic Security Services.
- JMS
- See Java Message Service.
- JMS provider
- The software that implements the Java Message Service (JMS) specification
for a messaging product.
- JMS Topic
- In Java Message Service (JMS), a JMS-managed object that manages the message
flow from publishers to subscribers.
- JMX
- See Java Management Extensions.
- JNDI
- See Java Naming and Directory Interface.
- JRas
- A toolkit that consists of a set of Java packages that enable developers
to incorporate message logging and trace facilities into Java applications.
- JRE
- See Java Runtime Environment.
- JSP
- See JavaServer Pages.
- JSP file
- A scripted HTML file that has a .jsp extension and allows for the inclusion
of dynamic content in Web pages. A JSP file can be directly requested as a
URL, called by a servlet, or called from within an HTML page. See also JavaServer
Pages, JSP page.
- JSP page
- A text-based document using fixed template data and JSP elements that
describes how to process a request to create a response. (Sun) See also JavaServer
Pages, JSP file.
- JSSE
- See Java Secure Socket Extension.
- junction
- A logical connection created to establish a path from one server to another.
- JVM
- See Java virtual machine.
- JVMPI
- See Java Virtual Machine Profiler Interface.
- JWL
- See Java Widget Library.
- kernel
- The part of an operating system that performs basic functions such as
allocating hardware resources.
- key
- A cryptographic mathematical value that is used to digitally sign, verify,
encrypt, or decrypt a message.
- key database file
- A synonym for a key ring.
- key file
- A synonym for key ring. The file that stores the keys used during the
authentication of a message.
- key locator
- A mechanism that retrieves the key for Extensible Markup Language (XML)
signing, XML digital signature verification, XML encryption, and XML decryption.
- key ring
- In computer security, a file that contains public keys, private keys,
trusted roots, and certificates.
- Keyed-Hashing Message Authentication Code (HMAC)
- A mechanism for message authentication that uses cryptographic hash functions.
- keystore file
- A key database file that contains both public keys stored as signer certificates
and private keys stored in personal certificates.
- keystring
- Additional specification of the entry within a naming service.
- launchpad
- A graphical interface for launching the product installation.
- lazy authentication
- The process whereby the security run time obtains the required authentication
data when the Java client accesses a protected enterprise bean for the first
time.
- LDAP
- See Lightweight Directory Access Protocol.
- Lightweight Directory Access Protocol (LDAP)
- An open protocol that uses TCP/IP to provide access to information directories
that support an X.500 model and that does not incur the resource requirements
of the more complex X.500 Directory Access Protocol (DAP). For example, LDAP
can be used to locate people, organizations, and other resources in an Internet
or intranet directory.
- Lightweight Third Party Authentication (LTPA)
- A protocol that uses cryptography to support security in a distributed
environment.
- link name
- A name defined in the deployment descriptor of the encompassing application.
- link pack area (LPA)
- A major element of MVS/ESA virtual storage below the 16MB line. The storage
areas that make up the LPA contain all the common reentrant modules shared
by the system. The LPA provides economy of real storage by sharing one copy
of the modules, protection because LPA code cannot be overwritten even by
key 0 programs, and reduced pathlength because the modules can be branched
to. See the CICS Transaction Server Performance Guide for more information.
- listener
- A program that detects incoming requests and starts the associated channel.
- listener port
- An object that defines the association between a connection factory, a
destination, and a deployed message-driven bean. Listener ports simplify the
administration of the associations between these resources.
- load balancing
- The monitoring of application servers and management of the workload on
servers. If one server exceeds its workload, requests are forwarded to another
server with more capacity.
- local
- Pertaining to a device, file, or system that is accessed directly from
a user's system, without the use of a communication line. See also remote.
- local transaction containment (LTC)
- A bounded scope that is managed by the container to define the application
server behavior in an unspecified transaction context.
- location service daemon
- A component of the Remote Method Invocation and Internet Inter-ORB Protocol
(RMI/IIOP) communication function that works with workload management to distribute
RMI requests among application servers in a cell.
- log handler
- A class that uses loggers, levels, and filters to direct whether events
are processed or suppressed.
- logger
- A named and stateful object with which the user code interacts and that
logs messages for a specific system or application component.
- logging
- The recording of data about specific events on the system, such as errors.
- logging level
- A value that controls which events are processed by Java logging.
- login binding
- A definition of the implementation to provide login information per authentication
methods.
- login mapping
- A Java Authentication and Authorization Service (JAAS) login configuration
that is used to authenticate a security token in a Web service security header.
- long name
- The property that specifies the logical name for the server on the z/OS
platform in WebSphere Application Server.
- LPA
- See link pack area.
- LTC
- See local transaction containment.
- LTPA
- See Lightweight Third Party Authentication.
- mail session
- A resource collection of protocol providers that authenticate users and
control user access to messaging systems.
- Managed Bean (MBean)
- In the Java Management Extensions (JMX) specification, the Java objects
that implement resources and their instrumentation. MBeans must follow the
design patterns and interfaces defined in the instrumentation level of the
JMX specification. This ensures that all MBeans provide the instrumentation
of managed resources in a standardized way. MBeans are manageable by any JMX
agent, but they can also be managed by non-compliant agents that support the
MBean concept.
- managed node
- A node with an application server and a node agent that belongs to a cell.
- managed resource
- An entity that exists in the run-time environment of an IT system and
that can be managed.
- marooned message
- A message that cannot be delivered due to the unavailability of a component
that is necessary to its processing.
- marshal
- To convert an object into a data stream for transmission over a network.
- MBean
- See Managed Bean.
- MBean provider
- A library containing an implementation of a Java Management Extensions
(JMX) MBean and its MBean Extensible Markup Language (XML) descriptor file.
- MD5
- A type of message algorithm that converts a message of arbitrary length
into a 128-bit message digest. This algorithm is used for digital signature
applications where a large message must be compressed in a secure manner.
- mediation
- 1. The handling of inflight messages between the production of a message
by one application, and the consumption of a message by another application.
Mediation processing includes:
- Message transformation from one representation to another.
- Message routing to one or more targets that were not specified by the
sending application.
- Message augmentation by adding data from a data source.
2. Administered object that defines the information that is needed
by a messaging engine to mediate associated destinations.
- mediation handler
- A unit of mediation function that performs specific message processing
at run time. You can deploy a mediation handler as a simple Java bean or as
a stateless session enterprise bean.
- mediation point
- A location in a messaging engine at which messages are mediated.
- memory leak
- The effect of a program that maintains references to objects that are
no longer required and therefore need to be reclaimed.
- memory-to-memory replication
- The session replication of one instance of WebSphere Application Server
to another.
- message consumer
- See consumer.
- message digest
- A hash value or a string of bits resulting from the conversion of processing
data to a number.
- message point
- A location in a messaging engine at which messages are held before being
processed. See queue point, publication point, and mediation point.
- message producer
- See producer.
- message reliability
- See reliability attribute.
- message selector
- See selector.
- message-driven bean
- An enterprise bean that provides asynchronous message support and clearly
separates message and business processing.
- messaging bus
- The role of a service integration bus when providing the messaging system
for Java Message Service (JMS) applications using the default messaging provider.
- messaging engine
- A component of a service integration bus that provides messaging function
and a connection point to which applications connect to the bus. A messaging
engine runs within a server and uses an instance of a Java Database Connectivity
(JDBC) data source to interact with the database that contains the data store
for that messaging engine.
- metadata
- Data that describes the characteristics of stored data; descriptive data.
For example, the metadata for a database table might include the name of
the table, the name of the database that contains the table, the names of
the columns in the table, and the column descriptions, either in technical
terms or business terms. Database catalogs and information catalogs contain
metadata.
- method
- In object-oriented design or programming, the software that implements
the behavior specified by an operation.
- method extension
- An IBM extension to the standard deployment descriptors for enterprise
beans that define transaction isolation methods and control the delegation
of credentials.
- method permission
- A mapping between one or more security roles and one or more methods that
a member of a role can call.
- MIME
- See Multipurpose Internet Mail Extensions.
- module
- In J2EE, a software unit that consists of one or more components of the
same container type and one deployment descriptor of that type. Examples include
EJB, Web, and application client modules. Modules can be deployed as stand-alone
units or assembled into an application. (Sun).
- monitor
- In performance profiling, to collect data about an application from the
running agents that are associated with that application.
- mount point
- A logical drive through which volumes are accessed in a sequential access
device class. For removable media device types, such as cartridges, a mount
point is a logical drive associated with a physical drive. For the file device
type, a mount point is a logical drive associated with an I/O stream.
- MPMT
- See multiprocess multithread.
- multicast
- Transmission of the same data to a selected group of destinations.
- multiple configuration instance
- More than one instance of a product running in the same machine at the
same time.
- multiprocess multithread (MPMT)
- A process architecture of the IBM HTTP Server that supports multiple processes
as well as multiple threads per process.
- Multipurpose Internet Mail Extensions (MIME)
- An Internet standard that allows different forms of data including video,
audio, or binary data to be attached to e-mail without requiring translation
into ASCII text.
- namespace
- A space that is reserved by a file system to contain the names of its
objects.
- naming
- An operation that is used by clients of WebSphere Application Server applications
to obtain references to objects related to those applications.
- naming context
- A logical namespace that contains name and object bindings.
- naming federation
- The process of binding naming systems so that the aggregate system can
process composite names that span the naming systems.
- naming service
- An implementation of the Java Naming and Directory Interface (JNDI) standard.
- NAT
- See network address translation.
- native
- Pertaining to the relationship between a transport user and a transport
provider that are both based on the same transport protocol.
- network address translation (NAT)
- The conversion of a network address that is assigned to a logical unit
in one network into an address in an adjacent network. See also static network
address translation.
- network file system (NFS)
- A base element of z/OS that allows remote access to z/OS host-processor
data from workstations, personal computers, or any other system on a Transmission
Control Protocol/Internet Protocol (TCP/IP) network that is using client software
for the Network File System (NFS) protocol.
- network protocol stack
- A set of network protocol layers and software that work together to process
the protocols.
- NFS
- See network file system.
- node
- A logical grouping of managed servers.
- node agent
- An administrative agent that manages all application servers on a node
and represents the node in the managed cell.
- node federation
- The process of combining the managed resources of one node into a distributed
network such that the central manager application can access and administer
the resources on the node.
- node group
- Grouping of nodes based on a common characteristic or property to create
a pool of common resources.
- node name
- The machine name or host name; an arbitrary WebSphere Application Server-specific
name that must be unique.
- nonce
- A unique cryptographic number that is embedded in a message to help detect
a replay attack.
- nondurable subscription
- A subscription that only exists for the lifetime of a consumer connection
to a service integration bus.
- nonrepudiation
- In business-to-business communication the ability of the recipient to
prove who sent a message based on the contents of the message. This can derive
from the use of a digital signature on the message, which links the sender
to the message.
- notification
- A message that contains the event descriptions that are sent to managed
resources, autonomic managers, and other resources.
- object
- In object-oriented design or programming, a concrete realization (instance)
of a class that consists of data and the operations associated with that data.
An object contains the instance data that is defined by the class, but the
class owns the operations that are associated with the data.
- In object-oriented design or programming, an instance of a class that
consists of data and the operations associated with that data.
- object adapter
- A Common Object Request Broker Architecture (CORBA) term that denotes
the primary interface that a server implementation uses to access Object Request
Broker (ORB) functions.
- Object Request Broker (ORB)
- In object-oriented programming, software that serves as an intermediary
by transparently enabling objects to exchange requests and responses.
- ObjectGrid
- An extensible object caching framework for Java applications.
- ODC
- See on demand configuration
- ODR
- See on demand router
- on demand configuration (ODC)
- A component that detects and dynamically configures routing rules in
support of the on demand router (ODR).
- on demand router (ODR)
- A proxy server with advanced capabilities that routes work to middleware
servers.
- one-way hash
- An algorithm that converts processing data into a string of bits; known
as a hash value or a message digest.
- Open Servlet Engine (OSE)
- A lightweight communications protocol that was developed by IBM for interprocess
communication.
- operational policy
- An explicit configurable goal that supports guidelines for specific request
types. This policy includes the service and health policies.
- ORB
- See Object Request Broker.
- OSE
- See Open Servlet Engine.
- outbound authentication
- The configuration that determines the type of accepted authentication
for outbound requests.
- outbound port
- The mechanism through which an outbound service communicates with the
externally-hosted Web service. Messages pass between the outbound service
and the external service through the appropriate port.
- outbound service
- The service that provides access through one or more outbound ports to
a Web service that is hosted externally.
- PAA
- See portal application archive.
- package
- 1. In Java programming, a group of types. Packages are declared with the
package keyword. (Sun)
2. In Java 2 Platform, Enterprise Edition (J2EE)
technology, to assemble components into modules and modules into enterprise
applications.
- page list
- An assembly property that specifies the location to forward a request,
but automatically tailors that location, depending on the Multipurpose Internet
Mail Extensions (MIME) type of the servlet.
- parallel garbage collection
- A type of garbage collection that uses several threads simultaneously.
- part reference
- An object that is used by a configuration to reference other related configuration
objects.
- partitioned destination
- A bus destination that is assigned to a cluster bus member. Each messaging
engine in the server cluster has a separate queue point for the destination.
Messages that are sent to a partitioned destination are routed to one of the
queue points based on workload management (WLM) algorithms.
- partitioning facility
- The capability to partition target applications to improve performance
and alleviate server bottlenecks.
- A programming framework and system management infrastructure
that supports the concept of partitioning for enterprise beans, HTTP traffic
and database access.
- passivation
- In enterprise beans, the process of transferring an enterprise bean from
memory to secondary storage. (Sun)
- PassTicket
- In Resource Access Control Facility (RACF) secured signon, a dynamically
generated, random, one-time-use, password substitute that a workstation or
other client can use to sign on to the host rather than sending a RACF password
across the network.
- payload
- The body of the message that holds the content.
- peer access point
- A means by which core groups can communicate with other cells.
- Performance Monitoring Infrastructure (PMI)
- A set of packages and libraries that are assigned to gather, deliver,
process, and display performance data.
- permanent destination
- A bus destination for which a runtime instance is created automatically
when the messaging engine starts. Permanent destinations remain until they
are explicitly deleted by an administrative action. See temporary destination.
- permission
- Authorization to perform activities, such as reading and writing local
files, creating network connections, and loading native code.
- persist
- To be maintained across session boundaries, usually in nonvolatile storage
such as a database system or a directory.
- persistence
- 1. A characteristic of data that is maintained across session boundaries.
An object that continues to exist after the start of the program or process
that created it, usually in nonvolatile storage such as a database system.
2.
In J2EE, the protocol for transferring the state of an entity bean between
its instance variables and an underlying database. (Sun)
- perspective
- A group of views that show various aspects of the resources in the workbench.
The workbench user can switch perspectives, depending on the task, and customize
the layout of views and editors within the perspective.
- plain old Java object (POJO)
- Another name for a simple or regular java object and not an enterprise
bean.
- plug-in
- A software module that is often written by a third party, that adds function
to an existing program or application such as a Web browser.
- PME
- See programming model extension.
- PMI
- See Performance Monitoring Infrastructure.
- point-to-point
- A style of messaging application in which the sending application knows
the destination of the message.
- poisoned message
- A message that is badly formatted and which, when it arrives on a queue,
causes the receiving application to back out the receipt of the message.
- POJO
- See plain old Java object.
- policy
- A set of considerations that influence the behavior of a managed resource
or a user.
- port
- As defined in a WSDL document, a single endpoint defined as a combination
of a binding and a network address.
- port destination
- The specialization of a bus destination that is used to pass messages
to an external Web service. You can configure one or more port destinations
for each type of message protocol and transport mechanism (for example, SOAP
over Hypertext Transfer Protocol (HTTP) or Simple Object Access Protocol (SOAP)
over Java Message Service (JMS)) through which service requests and responses
can pass to the external service.
- port number
- In the Internet suite of protocols, the identifier for a logical connector
between an application entity and the transport service.
- portal
- A single, secure point of access to diverse information, applications,
and people that you can customize and personalize.
- portal application archive (PAA)
- A portlet application that is packaged as a Web or enterprise archive
with two additional Extensible Markup Language (XML) descriptors that define
access control, page layout, and navigation as well as any other resources
in the package (for example, themes, wires, or Java 2 Platform, Enterprise
Edition (J2EE) artifacts).
- portlet
- A reusable Web module that runs on a portal server. Portlets have predefined
roles, such as retrieving news headlines, searching a database, or displaying
a calendar.
- presumed trust
- A type of identity assertion where trust is presumed and additional trust
validation is not performed. Use this mode only in an environment where trust
is established with some other mechanism.
- primary key
- 1. An object that uniquely identifies an entity bean within a home. (Sun)
2.
In Java programming, a category of data type that describes a variable that
contains a single value of the appropriate size and format for its type: a
number, a character, or a Boolean value. Examples of primitive types include
byte, short, int, long, float, double, char, boolean.
- primitive key
- In Java programming, a type of data that describes a variable containing
a single value of the appropriate size and format for its type: a number,
a character, or a Boolean value. Examples of primitive types include byte,
short, int, long, float, double, char, boolean.
- principal
- An entity that can communicate securely with another entity. In Kerberos,
principals are represented as entries in the Kerberos registry database and
include users, servers, computers, and others.
- private key
- In secure communication, an algorithmic pattern used to encrypt messages
that only the corresponding public key can decrypt. The private key is also
used to decrypt messages that were encrypted by the corresponding public key.
The private key is kept on the user's system and is protected by a password.
See also key, public key.
- process definition
- A specification of the runtime characteristics for an application server
process.
- process module
- A program unit that contains a set of process templates that support administrative
tasks.
- producer
- 1. An application that attaches to a destination and produces messages
that are put onto the service integration bus.
2. In Java Message Service
(JMS), an object that is used for sending messages to a destination.
- profile
- Data that describes the characteristics of a user, group, program, device,
or remote location.
- profile root
- The home directory for a particular instantiated profile.
- programmatic login
- A type of form login that supports application presentation site-specific
login forms for the purpose of authentication.
- programmatic security
- A collection of methods that are used by applications when declarative
security is not sufficient to express the security model of the application.
- programming model extension (PME)
- The programming model capabilities that ship with WebSphere Application
Server Enterprise Edition. These capabilities are also known as enterprise
services.
- property
- A characteristic or attribute that describes a unit of information.
- proxy cluster
- A group of proxy servers that distributes HTTP requests across the cluster.
- proxy peer access point
- A means of identifying the communication settings for a peer access point
that cannot be accessed directly.
- proxy server
- A server that acts as an intermediary for HTTP Web requests that are hosted
by an application or a Web server. A proxy server acts as a surrogate for
the content servers in the enterprise.
- public
- In the Java programming language, pertains to a method or variable that
can be accessed by elements residing in other classes. (Sun)
- public key
- In secure communication, an algorithmic pattern that is used to decrypt
messages that were encrypted by the corresponding private key. You can use
a public key to encrypt messages that are decrypted by the corresponding private
key only. Users broadcast their public keys to everyone with whom they must
exchange encrypted messages.
- public-key algorithm
- An algorithm that is designed so that the key used for encryption is different
from the key that is used for decryption. The decryption key cannot be derived,
at least not in any reasonable amount of time, from the encryption key.
- publication point
- A message point that is associated with a topic space destination. When
you define a topic space, a publication point is created in each messaging
engine within the bus. Messages are held at the publication point until they
are consumed by all of the local subscribers.
- publish
- 1. To make a Web site public, for example by putting files in a path known
to the HTTP server.
2. In Universal Description, Discovery, and Integration
(UDDI), to advertise a Web service so that other businesses can find it and
bind with it. Service providers publish the availability of their services
through a registry.
- publish/subscribe
- A style of messaging application in which the providers of information
or publishers, are decoupled from the consumers of that information, subscribers,
using a broker.
- publish/subscribe bridge
- The component of a WebSphere MQ link that enables publish/subscribe messaging
between the service integration bus and WebSphere MQ.
- QoS
- See quality of service.
- quality of service (QoS)
- A set of communication characteristics that is required by an application.
QoS defines a specific transmission priority, level of route reliability,
and security level.
- queue
- A WebSphere MQ object to which message queuing applications can put messages,
and from which they can get messages. Local queues can contain a list of
messages that are waiting to be processed. Queues of other types cannot contain
messages: they point to other queues, or can be used as models for dynamic
queues.
- queue destination
- A bus destination that is used for point-to-point messaging.
- queue point
- A messaging point at which messages are held in a queue until they are
consumed. When you define a queue destination and assign it to a bus member,
a queue point is created for each messaging engine in the assigned bus member.
- queuing network
- A group of interconnected components.
- RACF
- See Resource Access Control Facility.
- rapid deployment tools
- Tools to rapidly develop and deploy Java 2 Platform, Enterprise Edition
(J2EE) artifacts on the server and package the J2EE artifacts into the deployed
enterprise archive (EAR) file.
- RAR
- See resource adapter archive.
- RDBMS
- See relational database management system.
- realm
- A collection of resource managers that honor a common set of user credentials
and authorizations.
- realm name
- The machine name of a user registry.
- reentrance
- A situation where a thread of control attempts to enter a bean instance
again.
- reference
- A logical name that is defined in the application deployment descriptor
and used to locate external resources for enterprise applications. At deployment,
the references are bound to the physical location of the resource in the target
operational environment.
- referential integrity
- In Extensible Markup Language (XML) tools, the condition that exists when
all of the references to items in the XML schema editor or DTD editor are
automatically cleaned up when the schema is detected or renamed.
- referral
- In the Lightweight Directory Access Protocol (LDAP), a pointer from one
LDAP directory server to another.
- refresh pack
- A fix pack, which is a cumulative collection of fixes, that also contains
new functions. Full regression testing is performed on refresh packs.
- region
- A contiguous area of virtual storage that have common characteristics
and that can be shared between processes.
- registry
- A repository that contains access and configuration information for users,
systems, and software.
- relational database management system (RDBMS)
- A collection of hardware and software that organizes and provides access
to a relational database.
- reliability attribute
- A quality of service attribute for messages that specifies the reliability
of message delivery options.
- reliable nonpersistent
- A delivery option that specifies that messages are discarded when a messaging
engine stops or fails.
- reliable persistent
- A delivery option that specifies that messages can be discarded when a
messaging engine fails.
- remote
- Pertaining to a system, program, or device that is accessed through a
communications line.
- remote home interface
- In enterprise beans, an interface that specifies the methods that are
used by remote clients for locating, creating, and removing instances of enterprise
bean classes. See also local home interface.
- remote interface
- In enterprise beans, an interface that defines the business methods that
can be called by a client.
- remote mediation point
- The representation of a remote proxy for a mediation point that exists
at a remote messaging engine. The remote mediation poinht manages an outbound
message stream to the mediation point at the remote messaging engine.
- remote message point
- A message point that a messaging engine creates dynamically for the purpose
of sending and receiving messages to and from a message point on another messaging
engine in the service.
- remote method
- A business method in the remote interface that is callable by a client.
- Remote Method Invocation (RMI)
- A protocol that is used to communicate method invocations over a network.
Java Remote Method Invocation is a distributed object model in which the methods
of remote objects that are written in the Java programming language can be
invoked from other Java virtual machines, possibly on different hosts.
- Remote Method Invocation over Internet Inter-ORB Protocol (RMI/IIOP)
- Part of the Java 2 Platform, Standard Edition (J2SE) model that developers
can use to program in the Java language to work with RMI interfaces, but use
IIOP as the underlying transport.
- Remote OSE
- The use of the Open Servlet Engine (OSE) protocol as a transport mechanism
to communicate between two separate machines in the WebSphere Application
Server environment.
- remote
- Pertaining to a system, program, or device that is accessed through a
communications line.
- remote procedure call (RPC)
- A protocol that allows a program on a client computer to run a program
on a server.
- remote publication point
- A representation of a remote proxy for a publication point that exists
at a remote messaging engine. The remote publication point manages an outbound
message stream to the publication point at the remote messaging engine.
- remote queue point
- The representation of a remote proxy for a queue point that exists on
a remote messaging engine. The remote queue point manages an outbound message
stream to the queue point on the remote messaging engine, and an inbound message
retrieval request stream for messages received from the queue point.
- remove method
- In enterprise beans, a method defined in the home interface and invoked
by a client to destroy an enterprise bean.
- repertoire
- Configuration information that contains the necessary details for building
a Secure Sockets Layer (SSL) connection.
- replication
- The process of copying objects from one node in a cluster to one or more
other nodes in the cluster, which makes the objects on all the systems identical.
- replication entry
- A run-time component that handles the transfer of internal WebSphere Application
Server data.
- repository
- A persistent storage area for source code and other application resources.
In a team programming environment, a shared repository enables multi-user
access to application resources.
- request consumer binding
- A definition of the security requests for the request message that is
received by a Web service.
- request generator binding
- A definition of the security requests for the request message that is
sent to a Web service.
- request metrics
- A mechanism to monitor and troubleshoot performance bottlenecks in the
system at an individual request level.
- request receiver binding
- A definition of the security requirements for the request message that
is received from a request to a Web service.
- request sender binding
- A definition of the security requirements for the request message that
is sent to a Web service.
- Resource Access Control Facility (RACF)
- An IBM licensed program that provides access control by identifying users
to the system; verifying users of the system; authorizing access to protected
resources; logging detected, unauthorized attempts to enter the system; and
logging detected accesses to protected resources.
- resource adapter
- A system-level software driver that is used by an EJB container or an
application client to connect to an enterprise information system (EIS). A
resource adapter plugs in to a container; the application components deployed
on the container then use the client API (exposed by adapter) or tool-generated,
high-level abstractions to access the underlying EIS. (Sun) See also container,
enterprise information system.
- resource adapter archive (RAR)
- A Java archive (JAR) file that is used to package a resource adapter for
the Java 2 Connector (J2C) architecture.
- resource environment reference
- A reference that maps a logical name that is used by the client application
to the physical name of an object.
- resource manager local transaction (RMLT)
- A resource manager view of a local transaction that represents a unit
of recovery on a single connection that is managed by the resource manager.
- resource property
- A property for a Java Database Connectivity (JDBC) data source in a server
configuration, for example the server name, user ID, or password.
- Resource Recovery Services (RRS)
- A z/OS facility that provides two-phase synchronization point support
across participating resource managers.
- response consumer binding
- A definition of the security requests for the response message that is
received by a Web service
- response generator binding
- A definition of the security requests for the response message that is
sent to a Web service.
- response receiver binding
- A definition of the security requirements for the response message that
is received from a request to a Web service.
- response sender binding
- A definition of the security requirements for the response message that
is sent to a Web service.
- reverse proxy
- An application proxy for servers using Hypertext Transfer Protocol (HTTP).
- reverse routing path
- A stack of bus destinations within a request message through which a message
is routed back to its origin. When the message is created, the reverse routing
path is empty. As the message passes through each destination, the destination
is pushed onto the stack. When the message reaches the final destination,
the reverse routing path is copied to the forward routing path and the message
is routed back through all the appropriate destinations.
- ripplestart
- An action where the system waits for each member in a cluster to start
before starting the next member of the cluster.
- RMI
- See Remote Method Invocation.
- RMI/IIOP
- See Remote Method Invocation over Internet Inter-ORB Protocol.
- RMLT
- See resource manager local transaction.
- role
- A logical group of principals that provide a set of permissions. Access
to operations is controlled by granting access to a role.
- role mapping
- The process of associating groups and principals that is recognized by
the container to security roles that are specified in the deployment descriptor.
- role-based authorization
- The use of authorization information to determine whether a caller has
the necessary privilege to request a service.
- routing policy
- A set of rules that determine how the server routes incoming requests.
- RPC
- See remote procedure call.
- RRS
- See Resource Recovery Services.
- rule set
- A file that contains one or more rules.
- rule
- An element that represents a statement in non-elemental form.
- runtime task
- A generated administrative action plan that contains recommendations to
improve the health and performance of a runtime environment.
- run time
- The time period during which a computer program runs.
- RunAs role
- A role that is used by a servlet or an enterprise bean component to invoke
and delegate a role to another enterprise bean.
- runtime map
- A method of displaying hierarchical data.
- runtime topology
- A view that is a depiction of the momentary state of an Extended Deployment
environment.
- SAAJ
- See SOAP with attachments API for Java.
- SAF
- See System Authorization Facility.
- SAML
- See Security Assertion Markup Language.
- SAR
- See store archive.
- SAS
- See Secure Association Service.
- SASL
- See Simple Authentication and Security Layer.
- SCA
- See Service Component Architecture.
- scalability
- The ability of hardware, software, or a distributed system to continue
to function well as it is changed in size or volume. For example, the ability
to retain performance levels when you add processors, memory, and storage.
- scheduler
- A service that provides time-dependent services.
- schema
- 1. A collection of database objects such as tables, views, indexes, or
triggers that define a database. A database schema provides a logical classification
of database objects.
2. In Extensible Markup Language (XML), a mechanism
for describing and constraining the content of XML files by indicating which
elements are allowed and in which combinations. XML schemas are an alternative
to the document type definition (DTD) that you can use to extend functionality
in the areas of data typing, inheritance, and presentation.
- scope
- A specification for the boundary within which you can use system resources.
- script
- A series of commands, combined in a file, that carry out a particular
function when the file runs. Scripts are interpreted as they run.
- scripting
- A style of programming that reuses existing components as a base for building
applications.
- SDO
- See Service Data Objects.
- SDO repository
- A database that the service integration bus for Web services enablement
uses for storing and serving Web Services Description Language (WSDL) definitions
- Secure Association Service (SAS)
- An authentication protocol that the client principal uses to communicate,
by establishing a secure association between the client and server.
- Secure Sockets Layer (SSL)
- A security protocol that provides transport layer security, which consists
of authenticity, integrity, and confidentiality, for a secure connection between
a client and a server. The protocol runs above TCP/IP and below application
protocols.
- Security Assertion Markup Language (SAML)
- An XML framework for exchanging authentication and authorization information.
- security attribute propagation
- The transportation of security attributes from one server to another server
in a WebSphere Application Server configuration.
- security constraint
- A declaration of how to protect Web content, and how to protect data that
is communicated between the client and the server.
- security domain
- The set of all the servers that are configured with the same realm name
for the user registry or repository.
- security permission
- Authorization granted to access a system resource.
- security policy
- A written document that defines the security controls that you institute
for your computer systems. A security policy describes the risks that you
intend these controls to minimize and the actions to take if someone breaches
your security controls.
- security role reference
- A role that defines the access levels that users have and the specific
resources that they can modify at those levels.
- security token
- A representation of a set of claims that are made by a client that can
include a name, password, identity, key, certificate, group, privilege, and
so on.
- selector
- A filter that is applied, when a consumer attaches to a bus destination,
to indicate which messages the consumer is prepared to accept.
- sequence grouping
- The specification of the order in which entity beans update relational
database tables.
- serial access
- An option that prevents the concurrent access and modification of a session
in a given server instance.
- servant region
- A contiguous area of virtual storage that is dynamically started as load
increases and automatically stopped as load decreases.
- server
- In a network, hardware or software that provides facilities to other stations.
For example, a file server, a printer server, or a mail server. The station
making the request of the server is usually called the client. See also host,
client.
- server cluster
- A group of servers that are typically on different physical machines and
have the same applications configured within them, but operate as a single
logical server.
- server implementation object
- Enterprise beans that client applications require to access and implement
the services that support those objects.
- server-side include (SSI)
- A facility for including dynamic information in documents that are sent
to clients, such as current date, the last modification date of a file, and
the size or last modification of other files.
- service access point
- A logical address that allows a system to route data between a remote
device and the appropriate communications support.
- service class
- A subset of a workload that has the same service goals or performance
objectives, resource requirements, or availability requirements. For workload
management, you assign a service goal to a service class.
- Service Component Architecture (SCA)
- An architecture in which all elements of a business transaction, such
as access to Web services, enterprise information system (EIS) service assets,
business rules, workflows, databases and so on, are represented in a service-oriented
way.
- service context
- Part of a General InterORB Protocol (GIOP) message that is identified
with an ID and contains data used in specific interactions, such as security
actions, character codeset conversion, and Object Request Broker (ORB) version
information.
- Service Data Object (SDO)
- An open standard for enabling applications to handle data from heterogeneous
data sources in a uniform way. SDO incorporates Java 2 Platform, Enterprise
Edition (J2EE) patterns, but simplifies the J2EE data programming model.
- service description
- The description of a Web service, which can be defined in any format such
as Web Services Description Language (WSDL), Universal Discovery Description
and Integration (UDDI), or Hypertext Markup Language (HTML).
- service destination
- A specialization of a service integration bus destination. Each service
destination can directly represent the Web service implementation or can indirectly
represent the service through a Web Services Description Language (WSDL) document.
- service integration bus
- A managed communication mechanism that supports service integration through
synchronous and asynchronous messaging. A bus consists of interconnecting
messaging engines that manage bus resources.
- service integration bus link
- A link between messaging engines on different service integration buses.
- service integration bus Web services enablement
- A software component that enables Web services to use IBM service integration
technologies. This capability provides a quality of service choice and message
distribution options for Web services, with mediations that support message
rerouting or modification.
- service oriented architecture (SOA)
- A conceptual description of the structure of a software system in terms
of its components and the services they provide, without regard for the underlying
implementation of these components, services, and connections between components.
- service policy
- A performance goal that is assigned to a specific application URI to help
designate the business importance of different request types.
- service principal name (SPN)
- The name that uniquely identifies a service instance to a client.
- service type definition
- In Universal Discovery Description and Integration (UDDI), a description
of specifications for services or taxonomies.
- servlet
- A Java program that runs on a Web server and extends the server's functionality
by generating dynamic content in response to Web client requests. Servlets
are commonly used to connect databases to the Web.
- servlet filtering
- The process of transforming a request or modifying a response without
exposing the resource that is used by the servlet engine.
- servlet mapping
- A correspondence between a client request and a servlet that defines their
association.
- session
- A series of requests to a servlet that originates from the same user at
the same browser.
- session affinity
- A method of configuring applications in which a client is always connected
to the same server. These configurations disable workload management after
an initial connection by forcing a client request to always go to the same
server.
- session bean
- An enterprise bean that is created by a client and that usually exists
only for the duration of a single client/server session. (Sun) See also entity
bean.
- Session Initiation Protocol (SIP)
- A protocol that initiates, modifies, and terminates interactive user sessions
that involve multimedia. it works with other protocols and is involved specifically
in the signaling portion of a communication session.
- setter method
- A method whose purpose is to set the value of an instance or class variable.
This capability allows another object to set the value of one of its variables.
See also getter method.
- setup
- The physical and logical arrangement of hardware and software that make
up a data processing system.
- SGML
- See Standard Generalized Markup Language.
- SHA-1
- A Secure Hash Algorithm for computing a condensed representation of a
message or data file.
- shared library file
- A file that consists of a symbolic name, a Java class path and a native
path for loading Java Native Interface (JNI) libraries. Applications that
are deployed on the same node as this file can access this information.
- short name
- In personal communications, the one-letter name (A through Z) of the presentation
space or emulation session.
- Show Me
- A link that launches an animated demonstration of the task that is being
described in the documentation of the product.
- SIB service
- In an application server, the service that provides service integration
functions.
- signer certificate
- The trusted certificate entry that is usually in a truststore file.
- silent installation
- An installation that does not send messages to the console, but instead
stores messages and errors in log files. A silent installation can use response
files for data input.
- Simple and Protected Negotiation Mechanism (SPNEGO)
- A protocol by which clients and servers determine an authentication mechanism.
- Simple Authentication and Security layer (SASL)
- An Internet protocol that allows Lightweight Directory Access Protocol
(LDAP) server and provides security for the data that is transmitted with
this protocol.
- Simple Object Access Protocol (SOAP)
- A lightweight, Extensible Markup Language (XML)-based protocol for exchanging
information in a decentralized, distributed environment. You can use SOAP
to query and return information and invoke services across the Internet.
- simple type
- In the XML Schema language (XSL), a type that cannot have element content
and cannot carry attributes. Elements that contain numbers, strings, dates,
and so on, but do not contain any sub-elements. See also complex type.
- single signon (SSO)
- An authentication process in a client/server relationship in which the
user can enter one name and password and have access to more than one application.
- SIP
- See Simple Object Access Protocol.
- smart card
- An intelligent token that is embedded with an integrated circuit chip
that provides memory capacity and computational capabilities
- SOAP
- See Simple Object Access Protocol.
- SOAP with attachments API for Java (SAAJ)
- An application programming interface (API) that is used to send XML documents
over the Internet from a Java base.
- socket
- A method of communication between two processes. A socket is an identifier
that the application uses to uniquely identify an end point of communications.
The user associates a protocol address with the socket by associating a socket
address with the socket.
- Sockets Secure (SOCKS)
- A client/server architecture that transports TCP/IP traffic through a
secure gateway. A SOCKS server and a proxy server perform many of the same
services.
- SOCKS
- See Sockets Secure.
- software development kit
- A set of tools, application programming interfaces (APIs), and documentation
to assist with the development of software in a specific computer language
or for a particular operating environment.
- special-subject
- A generalization of a particular class of users; a product-defined entity
that is independent of the user registry.
- SPN
- See service principal name.
- SPNEGO
- See Simple and Protected Negotiation Mechanism.
- SQL
- See Structured Query Language.
- SQLJ
- See Structured Query Language for Java.
- SSI
- See server-side include.
- SSL
- See Secure Sockets Layer.
- SSL channel
- A type of channel within a transport chain that associates a Secure Sockets
Layer (SSL) configuration repertoire with the transport chain.
- SSO
- See single signon.
- stack
- An area in memory that stores temporary register information, parameters,
and return addresses of subroutines.
- stacking number
- The number of application servers that are required for a cluster to use
all the power of a node.
- Standard Generalized Markup Language (SGML)
- A standard metalanguage for defining markup languages that is based on
the ISO 8879 standard. SGML focuses on structuring information rather than
presenting information; it separates the structure and content from the presentation.
It also facilitates the interchange of documents across an electronic medium.
- stateful session bean
- A session enterprise bean that acts on behalf of a single client and maintains
client-specific session information, which is called conversational state,
across multiple method calls and transactions.
- stateless session bean
- A session bean that is a collection of operations. The server can optimize
resources by reusing bean instances on every method call.
- statement
- An instruction in a program or procedure.
- static
- A Java programming language keyword that is used to define a variable
as a class variable.
- static cluster
- A backup cluster that is defined statically to handle requests if the
primary cluster fails.
- A group of application servers that participate in workload
management. Membership for the cluster is manually managed.
- store archive (SAR)
- A platform-independent file format that aggregates many files into one.
- stored procedure
- A block of procedural constructs and embedded Structured Query Language
(SQL) statements that is stored in a database and that you can call by name.
Stored procedures allow an application program to run in two parts, one on
the client and the other on the server, so that one call can produce several
accesses to the database.
- stream decryption
- A symmetric algorithm that decrypts data one bit or byte of data at a
time.
- stream encryption
- A symmetric algorithm that encrypts data one bit or byte of data at a
time.
- string
- In programming languages, the form of data used for storing and manipulating
text.
- Structured Query Language (SQL)
- A standardized language for defining and manipulating data in a relational
database. See also data manipulation language.
- Structured Query Language for Java (SQLJ)
- A standard for embedding SQL in Java programs, defining and calling Java
stored procedures and user-defined functions, and using database structured
types in Java.
- Struts
- An open source framework for building Java Web applications.
- Struts module
- A Struts configuration file and a set of corresponding actions, form beans,
and Web pages. A Struts application comprises at least one Struts module.
- stub
- A small program routine that substitutes for a longer, possibly remote,
program. For example, a stub might be a program module that transfers remote
procedure calls (RPCs) and responses between a client and a server. In Web
services, a stub is an implementation of a Java interface that is generated
from a Web Services Description Language (WSDL) document.
- subscription point
- A message point that represents a durable subscription and is associated
with a publication point.
- symmetric algorithm
- An algorithm where the encryption key can be calculated from the decryption
key and vice versa. In most symmetric algorithms, the encryption key and the
decryption key are the same.
- syntax
- The rules for the construction of a command or statement. See also semantics.
- sysplex
- See system complex.
- System Authorization Facility (SAF)
- An interface defined by MVS that enables programs to use system authorization
services in order to protect access to resources such as data sets and MVS
commands. The IBM Resource Access Control Facility (RACF) is a product that
uses the SAF interface.
- system complex (sysplex)
- A set of MVS or OS/390 systems that communicate and cooperate with each
other through certain multisystem hardware components and software services
to process customer workloads.
- system logger
- A central logging facility that system and subsystem components can use.
- tag library
- In JSP technology, a collection of tags identifying custom actions described
using a taglib descriptor and Java classes. A JSP tag library can be imported
into any JSP file and used with various scripting languages. (Sun)
- TAI
- See trust association interceptor.
- target
- The destination for an action or operation.
- target service
- A service that exists outside of the gateway.
- TCP channel
- A type of channel within a transport chain that provides client applications
with persistent connections within a local area network (LAN).
- temporary destination
- A bus destination that is created by an application from a model destination
that an administrator pre-configured. The application can delete temporary
destinations automatically when the application disconnects.
- temporary file system (TFS)
- A temporary, in-memory physical file system that supports in-storage mountable
file systems. Normally, a TFS runs in the kernel address space, but it can
be run in a logical file system (LFS) colony address space.
- TFS
- See temporary file system.
- thin application client
- A lightweight, downloadable Java application run time that is capable
of interacting with enterprise beans.
- thin client
- A client that has little or no installed software but has access to software
that is managed and delivered by network servers that are attached to it.
A thin client is an alternative to a full-function client such as a workstation.
- thread
- A stream of computer instructions that is in control of a process. A multithread
process begins with one stream of instructions, one thread, and might later
create other instruction streams to perform tasks.
- throughput
- The measure of the amount of work that is performed by a device, such
as a computer or printer, over a period of time, for example, the number of
jobs per day.
- Time Sharing Option (TSO)
- An option of the MVS operating system that provides interactive time sharing
from remote terminals.
- Tivoli Performance Viewer
- A Java client that retrieves the Performance Monitoring Infrastructure
(PMI) data from an application server and displays it in various formats.
- TLS
- See Transport Layer Security.
- token
- A particular message or bit pattern that signifies permission or temporary
control to transmit on a network. See also token-ring network.
- topic
- A character string that describes the nature of the data that is being
published in a publish/subscribe system.
- topic space
- 1. A hierarchical collection of named topics.
2. A bus destination that
is used in publish/subscribe messaging.
- topology
- The physical or logical arrangement of nodes in a network, especially
the relationship among nodes and the links between them.
- transaction
- A specific set of input data that runs a specific process or job; a message
that is destined for an application program.
- transaction class
- An interface class that defines all of the methods that a business object
implements and that an application can use.
- A subcontainer of the service policy for work that is
being classified into the service policy that can be used for finer grained
monitoring. Service policies contain one or more transaction class definitions.
The service policy creates the goal, while the transaction and work classes
are used to connect Universal Resource Identifiers (URIs) to that goal.
- transaction class module
- A transaction class and Web module pair.
- transform algorithm
- A procedure that is used to transform the message for Web services security
message processing, such as the C14N (canonicalization) transform that is
used for Extensible Markup Language (XML) digital signatures.
- transport
- The request queue between a WebSphere Application Server plug-in for Web
servers and a Web container in which the Web modules of an application reside.
When a user at a Web browser requests an application, the request is passed
to the Web server, and then along the transport to the Web container.
- transport chain
- A representation of a network protocol stack that is operating within
an application server.
- transport channel chain
- A specification of the transport channels that are used by a server for
receiving information. Transport channel chains contain endpoints
- Transport Layer Security (TLS)
- An Internet Engineering Task Force (IETF)-defined security protocol that
is based on Secure Sockets Layer (SSL) and is specified in RFC 2246.
- trust anchor
- A trusted keystore file that contains a trusted certificate or a trusted
root certificate that is used to assert the trust of a certificate.
- trust association
- An integrated configuration between the security server of the product
and third-party security servers. A reverse proxy server acts as a front-end
authentication server, while the product applies its own authorization policy
onto the resulting credentials passed by the proxy server.
- trust association interceptor (TAI)
- The mechanism by which trust is validated in the product environment for
every request received by the proxy server. The method of validation is agreed
upon by the proxy server and the interceptor.
- trust file
- A file that contains signer certificates.
- trust relationship
- An established and trusted communication path through which a computer
in one domain can communicate with a computer in the other domain. Users in
a trusted domain can access resources in the trusting domain.
- trusted identity (ID) evaluator
- A mechanism that is used by a server to determine whether to trust a user
identity during identity assertion.
- truststore file
- A key database file that contains the public keys for that target server.
- TSO
- See Time Sharing Option.
- type
- 1. In Java programming, a class or interface.
2. In a Web Services
Description Language (WSDL) document, a container for data type definitions
using some type system, such as W3C XML Schema (XSD).
- type hierarchy
- The complete context for a Java class or interface including its superclasses
and subclasses.
- UDDI
- See Universal Discovery Description and Integration.
- UDDI node
- A set of Web services that supports at least one of the Universal Description,
Discovery, and Integration (UDDI) APIs. A UDDI node consists of one or more
instances of a UDDI application running on an application server or a cluster
of application servers with an instance of the UDDI database.
- UDDI node initialization
- The process by which values are set in the Universal Description, Discovery,
and Integration (UDDI) database and the behavior of the UDDI node is established.
- UDDI node state
- A description of the current status for the Universal Description, Discovery,
and Integration (UDDI) node.
- UDDI policy
- A statement of the required and expected behavior for a Universal Description,
Discovery, and Integration (UDDI) registry that is specified through policy
values that are defined in the UDDI specification.
- UDDI property
- A characteristic or attribute that controls the behavior of a Universal
Description, Discovery, and Integration (UDDI) node.
- UDP
- See User Datagram Protocol.
- UML
- See Unified Modeling Language.
- Unified Modeling Language (UML)
- A standard notation for the modeling of real-world objects as a first
step in developing an object-oriented design methodology. UML is defined
by the Object Management Group (OMG).
- Uniform Resource Identifier (URI)
- A compact string of characters that identifies an abstract or physical
resource.
- Uniform Resource Locator (URL)
- The unique address of a file that is accessible in a network such as the
Internet. The URL includes the abbreviated name of the protocol that is used
to access the information resource and the information used by the protocol
to locate the information resource.
- Universal Discovery Description and Integration (UDDI)
- A distributed registry of businesses and their service descriptions that
adhere to the Universal Description, Discovery, and Integration (UDDI) standard
for managing the discovery of Web services. UDDI registries come in two forms,
public and private, both of which are implemented in a common Extensible Markup
Language (XML) format.
- universally unique identifier (UUID)
- The 128-bit numerical identifier that is used to ensure that two components
do not have the same identifier. The identifier is unique for all space and
time.
- unmanaged node
- A node that is defined in the cell topology. This node does not have a
node agent that manages the process. An unmanaged node is typically used to
manage Web servers.
- UOW
- See unit of work.
- URI
- See Uniform Resource Identifier.
- URL
- See Uniform Resource Locator.
- URL scheme
- A format that contains another object reference.
- User Datagram Protocol (UDP)
- an Internet protocol that provides unreliable, connectionless datagram
service. It enables an application program on one machine or process to send
a datagram to an application program on another machine or process.
- user name token
- A type of token that is represented by a user name and optionally, by
a password.
- user registry
- A database of known users and user-provided information that is used for
authentication purposes.
- UUID
- See universally unique identifier.
- validation
- The checking of data or code for correctness or for compliance with applicable
standards, rules, and conventions.
- variable
- A configuration property that provides a parameter for any value in the
system. It has a name and a value to use in place of that name wherever the
variable name is located within the configuration files.
- version
- A separately licensed program that usually has significant new code or
new function.
- vertical scaling
- Setting up multiple application servers on one machine, usually by creating
cluster members.
- vertical stacking
- The process of starting more than one instance of the dynamic cluster
on a node to manage bottlenecks.
- view
- In Eclipse-based user interfaces, any pane in the workbench that is outside
the editor area and can stack (drag and drop) on top of other views. Views
provide different ways to work with the resources in the workbench.
- view synchronous high-availability manager group
- A special class of high availability (HA) group that you can create for
components to use that require a certain virtual synchrony (VS) quality of
service (QoS) for group communication.
- View Synchrony Protocol
- A multipoint communication protocol that provides synchronous message
delivery and group membership; also known as Virtual Synchrony.
- virtual host
- A configuration that enables a single host machine to resemble multiple
host machines. Resources that are associated with one virtual host cannot
share data with resources that are associated with another virtual host, even
if the virtual hosts share the same physical machine.
- virtual machine
- An abstract specification for a computing device that can be implemented
in different ways in software and hardware.
- virtual private network (VPN)
- An extension of a company's intranet over the existing framework of either
a public or private network. A VPN ensures that the data that is sent between
the two endpoints of its connection remains secure.
- virtual synchrony (VS)
- A property of group communication that guarantees how messages are delivered
when the view changes, for example, when existing members fail or new members
join.
- VPN
- See virtual private network.
- VS
- See virtual synchrony.
- W3C
- See World Wide Web Consortium.
- W3C XML Schema (XSD)
- A library that provides an application programming interface (API) for
manipulating the components of an XML Schema, as described by the W3C XML
Schema specifications.
- waiter
- A thread waiting for a connection.
- WAR
- See Web archive.
- WCCM
- See WebSphere Common Configuration Model.
- Web application
- An application that consists of one or more related servlets, JavaServer
Pages technology, and HyperText Markup Language (HTML) files that are managed
as a unit.
- Web archive (WAR)
- A compressed file format that is defined by the Java 2 Platform, Enterprise
Edition (J2EE) standard, for storing all the resources that are required to
install and run a Web application in a single file. See also enterprise archive.
- Web browser
- A client program that initiates requests to a Web server and displays
the information that the server returns.
- Web component
- A servlet, JavaServer Page (JSP) file, or a HyperText Markup Language
(HTML) file. One or more Web components make up a Web module.
- Web container
- A container that implements the Web component contract of the J2EE architecture.
(Sun)
- Web container channel
- A type of channel within a transport chain that creates a bridge in the
transport chain between an HTTP inbound channel and a servlet or JavaServer
Pages (JSP) engine.
- Web module
- A unit that consists of one or more Web components and a Web deployment
descriptor. (Sun)
- Web property extension (WPX)
- IBM extensions to the standard deployment descriptors for Web applications.
These extensions include Multipurpose Internet Mail Extensions (MIME) filtering
and servlet caching.
- Web resource
- Any one of the resources that are created during the development of a
Web application, for example Web projects, HTML pages, JSP files, servlets,
custom tag libraries, and archive files.
- Web resource collection
- A list of URL patterns and HTTP methods that describe a set of resources
to be protected. (Sun)
- Web server
- A software program that is capable of servicing Hypertext Transfer Protocol
(HTTP) requests.
- Web server plug-in
- A software module that supports the Web server in communicating requests
for dynamic content, such as servlets, to the application server.
- Web server separation
- A topology where the Web server is physically separated from the application
server.
- Web service
- A software system that is designed to support interoperable machine-to-machine
interaction over a network. It has an interface described in a machine-processable
format (specifically Web Services Description Language (WSDL)).
- Web Services Description Language (WSDL)
- An XML-based specification for describing networked services as a set
of endpoints that operate on messages containing either document-oriented
or procedure-oriented information.
- Web Services Invocation Framework (WSIF)
- A Java application programming interface (API) that supports dynamic invoking
of Web services, regardless of the format in which the service is implemented
or the access mechanism.
- WebSphere Common Configuration Model (WCCM)
- A model for programmatic access to configuration data that is used by
the WebSphere Application Server tooling, run time, and administrative console.
- WebSphere
- An IBM brand name that encompasses tools for developing e-business applications
and middleware for running Web applications.
- WebSphere MQ client link
- An optional component of a messaging engine that presents the messaging
engine, and thereby the bus, as a WebSphere MQ queue manager to which WebSphere
MQ clients can attach.
- WebSphere MQ link
- An optional component of a messaging engine that defines the connection
information necessary to establish a connection to a remote WebSphere MQ queue
manager.
- wizard
- An active form of help that guides users through each step of a particular
task.
- work class
- A mechanism for grouping specific work together that must be associated
with a common service policy or routing policy. Work classes group Uniform
Resource Identifiers (URIs) or Web services from an application.
- work manager
- A thread pool for Java 2 Platform, Enterprise Edition (J2EE) applications.
- work object
- A type of asynchronous bean that applications implement to run code blocks
asynchronously
- workflow
- The sequence of activities that is performed in accordance with the business
processes of an enterprise.
- workload management
- The optimization of the distribution of incoming work requests to the
application servers, enterprise beans, servlets and other objects that can
effectively process the request.
- workspace
- A temporary repository of configuration information that administrative
clients use.
- World Wide Web Consortium (W3C)
- An international industry consortium that develops common protocols to
promote evolution and interoperability of the World Wide Web.
- WPX
- See Web property extensions.
- wrapper
- An alternate and supported interface that hides unsupported data types
that are required by a server object behind a thin intermediate server object.
- WSDL
- See Web Services Description Language.
- WSIF
- See Web Services Invocation Framework.
- WS-Security
- A Web services security standard that provides secure transmission of
Simple Object Access Protocol (SOAP) messages.
- X.509 certificate
- A certificate that contains information that is defined by the X.509 standard.
- X/Open XA
- The X/Open Distributed Transaction Processing XA interface. A proposed
standard for distributed transaction communication. The standard specifies
a bidirectional interface between resource managers that provide access to
shared resources within transactions, and between a transaction service that
monitors and resolves transactions.
- XML
- See Extensible Markup Language.
- XML digital signature
- A specification that defines the XML syntax and the processing rules to
sign and verify the digital signatures for the digital content.
- XML encryption
- A specification that defines how to encrypt the content of an XML element.
- XML parser
- A program that interprets the contents of an XML file and determines what
to do with the input.
- XML token
- A security token that is in an XML format, such as a Security Assertion
Markup Language (SAML) token.
- XSD
- See W3C XML Schema.
- zip
- One or more files that are compressed and stored in a single file with
a name ending in .zip.
Various Java definitions reprinted with permission from SUN Microsystems,
Inc.