This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See binary digit.
B2B direct business model
A business model that supports commerce transactions involving products, services, or information between two businesses or parties. Typical B2B direct transactions occur between buyers, suppliers, manufacturers, resellers, distributors, and trading partners. See also consumer direct, direct sales business model.
See bi-polar with 8-zero substitution.
backbone average distance
See NETID backbone average distance.
See NETID backbone diameter.
A central network to which smaller networks, normally of lower speed, connect. The backbone network usually has a much higher capacity than the networks it helps interconnect or is a wide-area network (WAN) such as a public packet-switched datagram network.
In GL, in double buffer mode, the non-visible plane of the main frame buffer bit planes. Typically, an application draws into the back buffer and views the front buffer for dynamic graphics.
A system in a multisystem environment that accepts transactions from the front-end system, calls application programs for transaction processing, and routes replies back to the front-end system for response to the terminal. See also front-end system.
In synchronous transaction-to-transaction communication, a transaction that is started by a front-end transaction. See also front-end transaction.
- In CDE, the underlying area of a window on which elements, such as buttons and lists, are displayed.
- The conditions under which low-priority, noninteractive programs are run. See also foreground.
See background process.
- In the GDDM function, the first color of the display medium; for example, black on a display or white on a printer. See also neutral color.
- In AIXwindows and Enhanced X-Windows, the single electronic color assigned to the graphic field that appears behind the foreground elements inside the border of a displayed widget or gadget. See also foreground color.
Any connection defined in a HATS application other than the default connection. HATS does not transform screens from background connections. See also connection, default connection.
The Tivoli NetView submap layer that provides the background for the application plane. The background plane can display a picture that provides context for viewing the icons of the application plane. See also application plane, user plane.
- In the AIX operating system, a mode of program execution in which the shell does not wait for program completion before prompting the user for another command.
- A process that does not require operator intervention but can be run by the computer while the workstation is used to do other work. See also foreground process.
A task that is running even though the user is not currently interacting with it. See also foreground task.
An additional pickup and delivery in the reverse direction made while a vehicle is returning to the starting site after it has made a delivery. See also deadhead distance.
The double reversal of direction in a tape resulting from a tape unavoidably moving past the desired stopping point. The tape controller moves the tape in the reverse direction to prepare it for acceleration to normal reading or writing speed in the original direction.
back-office business logic
The implementation of business logic, using commands and customized code, allowing a customer to complete an action in the store front. See also storefront asset.
- The process of undoing uncommitted changes that an application process has made. A backout might be necessary in the event of a failure on the part of an application process or as a result of a deadlock situation. See also roll back.
- See rollback.
- The process of removing all the database updates performed by an application program that has terminated abnormally. See also dynamic backout.
- An operation that reverses all changes to resources made during the current unit of work. See also commit, nonrecoverable data set, recoverable data set.
- The process of returning a file to a particular point by removing journaled changes to the file.
- The process of removing changes that are possibly inconsistent. For example, backout recovery will delete an update that has been requested if the program fails before requesting a related update. Backout recovery requires a log to hold images of records before they were updated. See also forward recovery.
The character \. The backslash enables a user to escape the special meaning of a character. That is, typing a backslash before a character tells the system to ignore any special meaning the character might have.
In constraint programming, the activity of abandoning one line of search (usually after a failure), returning to a given state in the system, and restoring variables to their previous values in that state so that another alternative can be explored in the search for a solution.
- A copy of a data set or object to be used in case of accidental loss.
- A copy of a database or table space that can be stored on a different medium and used to restore the database or table space in the event of failure or damage to the original.
- Pertaining to a system, device, file, or facility that can be used in the event of a malfunction or loss of data.
- The process of making a copy of a data file that can be used if the original file is destroyed.
- The process of copying a file, directory, file system, or other data onto a tape, disk, or other media as insurance against data loss or corruption.
- A tape, diskette, or save file containing saved objects.
- To create a copy of computer data that can be used to restore data that has been lost, mislaid, corrupted or erased. See also restore.
- To save information or objects on a system, usually to tape or diskette, for safekeeping.
A program that runs on a workstation or file server and provides a means for users to back up, archive, restore, and retrieve files. See also administrative client.
backup control data set (BCDS)
One of the control data sets (CDSs) in DFSMShsm. The BCDS is a Virtual Storage Access Method (VSAM) key-sequenced data set (KSDS) that contains information about backup versions of data sets, backup volumes, dump volumes, and volumes under control of the backup and dump functions of DFSMShsm. See also control data set.
backup control group
In Backup, Recovery, and Media Services, a group of libraries, system keywords, and lists that share common backup characteristics. The default values for a backup control group are defined in the backup policy and can be used or overridden by each backup control group.
backup copy group
A policy object containing attributes that control the generation, destination, and expiration of backup versions of files. A backup copy group belongs to a management class. See also copy group.
backup Copy Services server
One of two Copy Services servers in a Copy Services domain. The other Copy Services server is the primary Copy Services server. The backup Copy Services server is available to become the active Copy Services server if the primary Copy Services server fails. See also Copy Services client, Copy Services server, Copy Services server group, primary Copy Services server.
- A data set in the backup RACF database. For each data set in the primary RACF database, an installation should define a corresponding backup data set.
- A copy that can be used to replace or reconstruct a damaged data set.
backup designated router
In a multiaccess OSPF network that has at least two attached routers, a router that needs to establish adjacencies with all the routers in the network (including the designated router) and is promoted to the designated router when the current designated router fails. A backup designated router is elected by other routers using the Hello Protocol. See also designated router.
backup domain manager
An agent in a distributed Tivoli Workload Scheduler network that can assume the responsibilities of its domain manager. It is installed as a full status, fault-tolerant agent. See also domain manager, fault-tolerant agent, full status.
backup focal point
A focal point that provides management services support for a particular category for a node in the event of a communications failure with the primary focal point. Both assigned focal points (explicit and implicit) and default focal points can have backup counterparts.
In Backup, Recovery, and Media Services, a report of what has been backed up with a BRMS backup policy. A backup history contains information about each item such as what type of object it is, the date and time it was saved, and when the saved item expires. Synonymous with media information report.
A host that is designated as a backup in the event that the distributing host should malfunction. The backup host takes over the IP address of the distributing host when required. See also distributing host.
- In the Operational Assistant function, a list of libraries or folders to be saved on a regular basis, such as daily or weekly.
- In Backup, Recovery, and Media Services, a group of objects or folders that are grouped together for processing in a backup control group. Each list is assigned a unique list name.
backup master domain manager
An agent in a distributed Tivoli Workload Scheduler network that can assume the responsibilities of the master domain manager. It is installed as a full status, fault-tolerant agent. See also fault-tolerant agent, full status, master domain manager.
In Backup, Recovery, and Media Services, a set of controls that are used to track information about the items that are being backed up, when they are being backed up, and where they are being backed up. Backup policy is a combination of the concepts of control group and media policy.
In DFSMShsm, a Resource Access Control Facility (RACF), discrete, data-set profile associated with the backup version of a cataloged data set that is protected by a RACF, discrete, data-set profile.
backup RACF database
A RACF database that reflects the contents of the primary RACF database. See also primary RACF database.
A plan that identifies the approach, procedures, and actions to be executed in the event of unsuccessful operation or execution. It does not imply the intent to revert back to the original environment, but, instead, the Backup/Recovery Plan identifies the alternate plan to proceed. It builds the information (dumps, backup datasets, logs, etc.) needed to recover from a serious error or processing exception and continue forward.
backup set collection
A group of backup sets that are created at the same time and which have the same backup set name, volume names, description, and device classes. The server identifies each backup set in the collection by its node name, backup set name, and file type.
See secondary site.
A file or directory that a client node backed up to server storage. More than one backup version can exist in server storage, but only one backup version is the active version. See also active version, copy group, inactive version.
backup VTOC copy data set
In DFSMShsm, a copy of the volume table of contents (VTOC) of a volume that was backed up by DFSMShsm. The backup VTOC copy data set contains only part of the data-set VTOC entry for each data set from the original data set. This data set is written on a migration-level-1 volume.
Backus-Naur Form (BNF)
A metalanguage that is used to describe the syntax of a given language and its notation. In speech recognition, a special adaptation of grammar representation specified by Speech Recognition Control Language (SRCL) (pronounced "circle").
See data bag.
See Business Action Language.
balanced data link
In data communication, a data link between two participating combined stations. For transmissions it originates, each station can transmit both command frames and response frames, organize its data flow, and perform error recovery operations at the data link level.
balanced scorecard (BSC)
A performance management tool that evaluates a set of predictive indicators from four different perspectives. The four perspectives are financial, customer, internal process, and innovation and learning.
See business activity monitoring.
See boundary access node.
The connection from an SNA peripheral node through a boundary access node (BAN) over a frame-relay link to a subarea boundary node. The two portions of the BAN connection (one between the peripheral node and the BAN, and the other between the BAN and the boundary node) use different MAC addresses to identify the boundary node. See also BAN DLCI MAC address, boundary node identifier.
- An entity that groups several columns in a tree view to be treated as a whole.
- A group of values that have been organized into categories, based on their numeric variables.
BAN DLCI MAC address
The MAC address that identifies a subarea boundary node as the source or destination of frames carried over the portion of a BAN connection between an SNA peripheral node on a LAN and a boundary access node (BAN). The BAN DLCI MAC address appears as the source MAC address in frames sent from the BAN to the peripheral node and as the destination MAC address in frames sent from the peripheral node to the BAN. The portion of the BAN connection between the BAN and the boundary node uses the boundary node identifier (BNI) rather than the BAN DLCI MAC address. See also BAN connection.
- The amount of information that a system can transfer in a given time.
- The capacity of a communication line, normally expressed in bits per second (bps).
- In asynchronous transfer mode (ATM), the capacity of a virtual channel, expressed in terms of peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS).
- The difference, expressed in hertz, between the highest and the lowest frequencies of a range of frequencies.
See Business Analytics and Optimization.
A z/OS memory limit, which in 64-bit systems is set at 2 GB. The bar separates storage below the 2-gigabyte address from storage above the 2 GB address. The area above the bar is intended for data; no programs run above the bar.
bar code aspect ratio
The ratio of bar code height to overall symbol length. The aspect ratio determines the maximum label SKUs allowed for fixed linear scanners and is important for omni-directional scanners.
bar code label
A label that has a special imprinted bar code, generally both human and machine readable, which is detected by an automatic scanning device. It is used to identify package, carton or pallet contents.
See broker archive file.
An algorithm for solving linear programming problems. It exploits both the primal and dual forms of a problem to find a sequence of primal and dual solutions. It measures the feasibility of solutions as it works, and it stops when it finds complementary primal and dual feasible solutions.
See Business Application Services.
- The core product, for which features can be separately ordered and installed.
- The numbering system in which an arithmetic value is represented.
- A predefined contribution version which contains no automatic journals.
A 65-character subset of US-ASCII, enabling 6 bits to be represented per printable character, and the extra 65th character (=) is used to signify a special processing function. The encoding process represents 24-bit groups of input bits as output strings of 4 encoded characters. Proceeding from left to right, a 24-bit input group is formed by concatenating 3 8-bit input groups and these 24 bits are then treated as 4 concatenated 6-bit groups, each of which is translated into a single digit in the base 64 alphabet. Each 6-bit group is used as an index into an array of 64 printable characters. The character referenced by the index is placed in the output string.
base address register
See base register.
base aggregate table
In SQL replication, a type of replication target table that contains data that is aggregated from a replication source table. See also change aggregate table.
baseboard management controller (BMC)
A controller that monitors system platform management events such as fan failure and temperature or voltage increases, and logs their occurrence. The BMC is also used for hardware control, such as powering the node on and off.
A calendar that includes the holidays and schedule for a country or work site. See also project calendar.
One of the set of two cards that comprise the VPACK or SPACK, both of which are needed to process voice signals. See also trunk interface card.
- See parent class.
- A class from which other classes or beans are derived. A base class may itself be derived from another base class. See also abstract class, class template definition.
See adapter foundation classes.
The part of a storage management subsystem (SMS) configuration that contains general storage management attributes, such as the default management class, default unit, and default device geometry. It also identifies the systems, system groups, or both the systems and system groups that an SMS configuration manages. See also SMS configuration.
The original authored or filed contract that is used as the base for a new contract. It can also be the executed contract that provides the header information for a cotermination quote contract or other renewal quote contract. For quote generation, the base contract is also the contract where renewal terms are specified within the renewals tab.
Base Control Program (BCP)
A program that provides essential services for the MVS and z/OS operating systems. The program includes functions that manage system resources. These functions include input/output, dispatch units of work, and the z/OS UNIX System Services kernel. See also Multiple Virtual Storage, z/OS.
A form of addressing in which a data description is associated with a storage area by a variable address held in a separate pointer area. This is implemented in COBOL by BLL cells and in VS COBOL II by the ADDRESS special register.
base data component
In the Virtual Storage Access Method (VSAM), a component of the base cluster containing data from a data set. See also base cluster.
- The Virtual Storage Access Method (VSAM) entry-sequenced data set (ESDS) or key-sequenced data set (KSDS) upon which an alternate index is built.
- A data set or file stored on MVS, in contrast to the view of the file as seen by the workstation.
In the VM operating system, the virtual disk that contains the text decks and macroinstructions for VTAM, NetView, and VM/SNA console support (VSCS). It also contains control files and sample files used when running VTAM on the VM operating system. See also DELTA disk.
- See snapshot.
- An object that represents a stable configuration for one or more components. A baseline identifies activities and one version of every element that is visible in one or more components.
- A reviewed and approved release of artifacts that constitutes an agreed basis for further evolution or development and that can be changed only through a formal procedure, such as change management and configuration control. See also release.
- A read-only copy of a module, which contains the history of the module up to the time the baseline was created.
- A snapshot of the approved project plan that is used for comparison over the course of a project.
- A permanent copy of a component in a particular repository workspace or stream. A component baseline represents a configuration of a component at a particular point in time.
- A snapshot of a configuration item (CI) or a set of configuration items (CIs) frozen at a point in time for a particular purpose. A baseline can be recorded to ensure that the infrastructure can be restored to a trusted state should a change fail or the CI need to be built again. A baseline will also be established for the roll out of new CIs and for use in a disaster recovery situation.
- A conceptual line with respect to which successive characters are aligned.
Savings that are generated by the bid based on the historical cost of the item. Savings are calculated by deducting the price per unit from the historical cost multiplied by the total bid quantity.
A map that depicts background reference information such as landforms, roads, landmarks, and political boundaries, onto which other thematic information is placed. A base map is used for locational reference and often includes a geodetic control network as part of its structure.
- The last element to the right of a full path name.
- In Ada language, a compilation unit name specified without its type qualifier of lib/ or sec/.
- In CDE, the file name of an icon file minus the file name suffixes for size (.l, .m, .s, .t) and type (.bm, .pm). For example, the base name of an icon file named myicon.m.pm is myicon.
See base cost.
Base Primitive Environment (BPE)
A common system service base on which many other IMS components are built. BPE provides a common set of system services such as storage management, tracing, and dispatching to various components such as the IMS Common Queue Server (CQS), Base Primitive Environment-based Database Recovery Control (DBRC), IMS Connect, Open Database Manager (ODBM), Operations Manager (OM), Resource Manager (RM), and Structured Call Interface (SCI).
base search space
An implementation of the Product Advisor. This style of implementation uses WebSphere Commerce base database tables to facilitate searching a particular category of products. See also separate search space.
- See RACF segment.
- The portion of a RACF profile that contains the fundamental information about a user, group, or resource. The base segment contains information that is common to all applications that use the profile.
The set of functions, including verbs, parameters, return codes, and what-received indications, that is supported by all products that implement a particular architecture. See also option set.
The state of a terminal as set by CICS before sending data to it, in the absence of any instructions either from a user application program or from its terminal resource definition. In this state, the terminal behaves as an ordinary (unpartitionable) display device.
The set of one or more z/OS systems that is given a cross-system coupling facility (XCF) name and in which the authorized programs can then use XCF coupling services. A base sysplex does not include a coupling facility. See also sysplex.
- A table that is created by the SQL CREATE TABLE statement and that holds persistent data. See also auxiliary table, clone table, created temporary table, declared temporary table, result table, table, temporary table, view.
- Within a table hierarchy, a parent table that can be used to create child tables based on the parent's schemas.
- See opaque data type.
- A data type that controls the type of data that can be entered into an attribute. For example, an attribute definition that is created using the Date base type can only store date values.
A high-level programming language with a small number of statements and a simple syntax. BASIC is designed to be easily learned and used and is widely used for interactive applications on microcomputers.
basic catalog structure (BCS)
The name of the catalog structure in the integrated catalog facility (ICF) environment. An ICF catalog consists of a BCS and its related VSAM volume data sets (VVDSs). See also VSAM volume data set.
Frequently used double-byte character that is stored in the hardware of a DBCS-capable work station. The number of double-byte characters that are stored in the work station varies with the language supported and the storage size of the work station. A DBCS-capable work station can display or print basic characters without using the extended character processing function of the operating system. See also extended character, extended character processing.
In APPC, a conversation between two programs in which the sending program must construct generalized data stream (GDS) records for the receiving program. See also mapped conversation.
basic disk pool
One or more storage units that are defined from the disk units or disk-unit subsystems that make up addressable disk storage. Disk pools (which are also known as auxiliary storage pools ) provide a means of placing certain objects on specific disk units to limit the impact of disk-media failures and to reduce recovery time. A basic disk pool contains both objects and the libraries or directories that contain the objects. Attributes such as authorization, ownership, and spooled file attributes are stored in the system disk pool (also known as the system ASP).
A facility that performs general editing functions for terminal input and output messages. See also message editing.
Basic Encoding Rules (BER)
A set of rules used to encode Abstract Syntax Notation One (ASN.1) values as strings of octets. See also abstract syntax, Abstract Syntax Notation One, Distinguished Encoding Rules.
The format of a sequential data set that is neither large format nor extended format. A basic format data set has no minimum size requirement and a maximum size per volume of 65 535 tracks. See also extended format, large format.
The level of national language support whereby character data can be entered and presented to the user via appropriate keyboard, coded character set, and character set support. It accommodates basic cultural needs in using the supported language, such as calendar, time, numbers, and currency formats. The next level of support is advanced implementation. See also advanced implementation, linguistic function.
basic information unit (BIU)
In SNA, the unit of data and control information passed between the transmission and control layers. It consists of a request or response header followed by a request or response unit.
basic input/output system (BIOS)
The code that controls basic hardware operations, such as interactions with diskette drives, hard disk drives, and the keyboard. See also NetBIOS.
basic mapping support (BMS)
An interface between CICS and application programs that formats input and output display data and routes multiple-page output messages without regard for control characters used by various terminals.
A central processor mode that does not use logical partitioning. See also logically partitioned mode.
Basic Networking Utilities (BNU)
See UNIX-to-UNIX Copy Program.
basic rate interface
The means of ISDN access normally used by private subscribers, providing two B-channels of 64kbits per second and one D-channel of 16kbits per second for signaling. This is often known as 2B+D. See also primary rate interface.
basic row format
A row format in which values for columns are stored in the row in the order in which the columns are defined by the CREATE TABLE statement. See also reordered row format.
basic source character set
In the C++ language, a set of 96 characters that can be used in a source file. The set consists of control characters, plus 91 graphical characters. Other characters can be added to source files through the use of universal character names.
See multicultural support.
basic transmission unit (BTU)
In SNA, the unit of data and control information passed between path control components. A BTU can consist of one or more path information units (PIUs). See also blocking of PIUs.
- A collection of variables that is determined during an iteration of the simplex algorithm and that represents a feasible solution. The basis of a problem may change with each iteration as preferred decision variables enter the basis or variables that are less valuable leave the basis.
- In GL, a 4x4 matrix that controls the relationship between control points and the approximating spline. B-splines, Bezier curves, and Cardinal splines have different bases.
See basic assurance test.
- A group of events that occur within a time interval such that a response can process the events together.
- To group warehouse tasks into a batch of activities based on the resources and equipment used to complete the task.
- A list of tasks that can be performed together. Only specific task types can be combined into a batch and each batch consists of only one type of task.
- Pertaining to a group of jobs to be run on a computer sequentially with the same program with little or no operator action. See also interactive.
- A group of records or data processing jobs brought together for processing or transmission.
In DFU, an accumulator in which subtotals for a field are stored. See also total accumulator.
Any device that can read serial input or write serial output, or both, but cannot be used to communicate interactively with the system. Examples of batch devices are printers, magnetic tape units, or diskette units.
- A file containing data that is to be processed unattended.
- A file that contains instructions that are processed sequentially, as a unit.
batch image copy
A copy of a database or area that reflects the state of the data at a point when no updates were being made. The Database Image Copy utility (DFSUDMP0) creates batch image copies, which IMS utilities can use to recover from failures.
See batch processing program.
A predefined group of processing actions submitted to the system to be performed with little or no interaction between the user and the system. See also interactive job.
batch message processing program (BMP program)
An IMS batch processing program that has access to online databases and message queues. BMP programs run online, but like programs in a batch environment, they are started with job control language (JCL). See also batch processing program.
- The condition established so that batch processing can be performed.
- In query management, the query mode associated with a query instance that does not allow users to interact with the query commands while a procedure is running.
- The facility to run a program from a command line interface.
- A command line option that allows Rational DOORS to start up without the graphical user interface (GUI), run a specified DXL program, then stop. The product starts up by surpassing the login screen and the database explorer.
- A non-interactive way of processing data transactions that have been collected in advance and combined into a single batch file.
batch-oriented BMP program
A BMP program that has access to online databases and message queues while performing batch-type processing. A batch-oriented BMP program does not access the IMS message queues for input or output. It can access online databases, GSAM databases, and z/OS files for both input and output. See also transaction-oriented BMP program.
The method of grouping a set of tasks that a picker can complete in one pass of the warehouse. The tasks that can be put together in a batch are based on the batch rule setup for the task.
A method of running a program or a series of programs in which one or more records (a batch) are processed with little or no action from the user or operator. See also interactive processing.
batch processing program
An application program that has access to databases and z/OS data management facilities but does not have access to the IMS control region or its message queues. See also batch message processing program, message processing program.
The number of changes in signal levels, frequency, or phase per second on a communication channel. If each baud represents 1 bit of data, baud is the same as bits per second. However, it is possible for one signal change (1 baud) to equal more than 1 bit of data.
- A physical space into which a device can be physically mounted and connected to power and data. For example, a power supply or a disk drive might be inserted into a bay.
- In a warehouse, a stack of locations that represent the width of one shelf (or one pallet rack) and the height of the entire shelving or pallet rack.
See begin bracket.
See buffer-to-buffer credit.
See BlackBerry Messenger.
A closed source, proprietary mobile operating system based on the QNX platform. BBX replaced BlackBerry OS as Research in Motion's primary mobile operating system. See also mobile operating system, QNX.
See block control byte.
See block-check character.
See backup control data set.
See bearer channel.
See Bar Code Object Content Architecture.
See Base Control Program.
See Business Continuity and Resiliency.
See basic catalog structure.
See bilateral closed user group.
See business design assurance.
See basic direct access method.
See business development fund.
See bundle definition table.
See Big Design Up Front.
Pertaining to an adapter in a token-ring network that repeatedly sends a frame (beacon message) when it is not receiving a normal signal because of serious error, such as a line break or power failure. The message frame repeats until the error is corrected or bypassed. See also beacon message.
A message frame sent repeatedly by an adapter indicating a serious network problem, such as a broken cable. See also beaconing.
bean-managed persistence (BMP)
The mechanism whereby data transfer between an entity bean's variables and a resource manager is managed by the entity bean. (Sun) See also container-managed persistence.
- A transaction where the bean itself is responsible for administering transaction tasks such as committal or rollback.
- The capability of the session bean, servlet, or application client component to manage its own transactions directly, instead of through a container.
bearer channel (B-channel)
In ISDN, a duplex channel for transmitting data or digital voice between the terminal and the network. The B-channel operates at 64 kilobits per second. See also delta channel.
A Security Assertion Markup Language (SAML) token that uses the bearer subject confirmation method. In a bearer subject confirmation method, a sender of SOAP messages is not required to establish correspondence that binds a SAML token with contents of the containing SOAP message.
See bus extension card.
Because It's Time Network (BITNET)
A low-cost, low-speed network of hosts interconnected by nonswitched SDLC and BSC lines that was started at the City University of New York. The network is primarily composed of universities, nonprofit organizations, and research centers. BITNET has merged with the Computer Science Network (CSNET) to form the Consortium for Research and Education Network (CREN).
See bus extension driver card.
- See before-value.
- The contents of a record in a physical file before the data is changed by a write, an update, or a delete operation.
- A record of the contents of a data element before it is changed. Before images are used to backout incomplete or incorrect changes in the event of a failure.
A trigger that is specified to be activated before a defined trigger event (an insert, an update, or a delete operation on the table that is specified in a trigger definition). See also after trigger, instead of trigger, trigger, trigger activation, trigger activation time.
In data replication, the value of a source-table column before an SQL insert or update has been applied to the table. See also after-value.
begin bracket (BB)
In SNA, an indicator defining the start of a conversation. The value of the indicator (binary 1) in the request header of the first request in the first chain of a bracket denotes the start of a bracket. See also conditional end bracket, end bracket.
In a system period or an application period, the column that indicates the beginning of the period. See also period.
- The observable effects of an operation or event, including its results.
- In object-oriented programming, the functionality embodied within a method.
- The way in which managed objects, name bindings, attributes, notifications, and operations interact with the actual resources that they model and with each other.
- A collection of assertions that describe the allowed states that a managed object can assume. An assertion can be a precondition, a postcondition, or an invariant. In practice, the behavior is often an informal description of the semantics of attributes, operations, and notifications.
See Business Events Language.
A heap controlled by a runtime option that contains library data, such as Language Environment control block and data structures that are not normally accessible from user code. Below heap always resides below 16M.
- A program designed to test the relative performance of computers of different architectures, or of different implementations of an architecture.
- A quantitative quality standard that defines the minimum level of acceptability for the data or the tolerance for some level of exceptions in a data analysis.
See bus extension receiver card.
best effort mode
A mode of synchronous remote mirroring in which input/output operations are not suspended when communication between a primary and secondary volume is broken. See also mandatory mode.
See linguistic conversion.
best plan date
See most accurate date.
See boundary function.
See binary floating point.
See Border Gateway Protocol.
See Business Graphics Utility.
See business intelligence.
See business intelligence asset.
See Business Intelligence Bus.
See bank identifier code.
BIC Database Plus Tape
A tape of financial institutions and currency codes, supplied by S.W.I.F.T. The information is compiled from various sources and includes national, international, and cross-border identifiers.
- An attempt by the computer or by a station to gain control of a line in order to transmit data.
- An offer from a carrier that specifies the proposed charge for delivering a shipment. A shipper issues a broadcast for capacity tender and the carriers submit their bids to take the shipment. The shipper reviews the bids and selects a carrier.
- The price that a buyer is willing to pay for a financial instrument. See also ask.
See block identifier.
An SNA LU-LU half-session that is defined as requesting and receiving permission from another LU-LU half-session to begin a bracket at the start of a session. See also first speaker.
See contention-loser session.
A bid in which suppliers can increase or decrease the bid value of individual items in a forced lot as long as the overall bid value of the lot is decreased (in English reverse auctions), or increased (in English forward auctions).
A language that uses a script, such as Arabic and Hebrew, whose general flow of text proceeds horizontally from right to left, but numbers, English, and other left-to-right language text are written from left to right.
In Q replication, a replication configuration in which changes that are made to one copy of a table are replicated to a second copy of that table. Changes that are made to the second copy are replicated back to the first copy.
A script such as Arabic and Hebrew whose general flow of text proceeds horizontally from right to left, but numbers, English, and other left-to-right language text are written from left to right.
See business information executive.
See built-in function.
- In X.25 communications, an optional facility that allows calls to be made only between two designated DTEs.
- In data communication, two users who have bilaterally agreed to communicate with each other, but not with other users. Each user can belong to more than one bilateral closed user group and to more than one closed user group by means of outgoing access. See also closed user group.
In DECnet architecture, a circuit that accepts, translates, and routes DECnet Phase IV and DECnet Phase IV-Prime frames. The circuit must be configured with the DECnet MAC address specific to the attached LAN segment.
bill of lading (BOL)
A carrier's contract and receipt for goods that it agrees to transport from one place to another according to specified terms and conditions. It normally includes specific identification of the cargo contents and is often used as a receiving document at the point of destination.
- A list of the items, and quantities of each item, needed to manufacture an end product for sale to customers.
- A list of data about a job that has been completed. It contains information about steps in a job and changes to files that resulted from the job. For example, it can be used with source code adapters in software builds for auditing changes to source files.
- A single storage location.
- A disk folder that contains executables or script files.
- In ODM, a terminal descriptor type used to define a variable as a bit string that is not null-terminated.
- Pertaining to a system of numbers with a base of two. The binary digits are 0 and 1.
- In DB2 for i5/OS, pertaining to a data type indicating that the data is a binary number with a precision of 15 (halfword) or 31 (fullword) bits.
- Property of a selection, choice, or condition that has two possible values.
An association between two classes. A special case of an n-ary association. See also n-ary association.
- Data that is represented by a string of binary digits. The interpretation of this data is typically the responsibility of the application program.
- A type of data consisting of numeric values stored in bit patterns of 0s and 1s.
A file format that does not consist of a sequence of printable characters (text). See also text file.
binary floating point (BFP)
A numeric mode that consists of a sign, a signed exponent, and a significand. Its numeric value is the signed product of its significand and two raised to the power of its exponent.
binary floating-point number
The conceptual form of a numeric value that contains a significand and a signed exponent. The number's numeric value is the signed product of the number's significand and 2 raised to the power of the number's exponent.
Representation of a decimal value in which each field must be 2 or 4 bytes long. The sign (+ or -) is in the far left bit of the field, and the number value is in the remaining bits of the field. Positive numbers have a 0 in the sign bit and are in true form. Negative numbers have a 1 in the sign bit and are in twos complement form.
See bit block transfer.
- A data type whose value is a sequence of bytes that can range in size from 0 bytes to 2 gigabytes less 1 byte. This sequence does not have an associated code page and character set. BLOBs can contain, for example, image, audio, or video data. See also large object.
- A block of bytes of data (for example, the body of a message) that has no discernible meaning, but is treated as one entity that cannot be interpreted.
A symbol representing an operation to be performed on two data items, arrays, or expressions. See also unary operator.
- In REXX, a literal string expressed using a binary (base 2) representation of a value. The binary representation is a sequence of zero or more binary digits (the characters 0 or 1) enclosed in quotation marks and followed by the character b.
- A sequence of bytes that is not associated with a CCSID. For example, the BLOB data type is a binary string. See also coded character set identifier.
binary synchronous communication (BSC)
A data-communication line protocol that uses a set of transmission control characters and control character sequences to send binary-coded data over a communication line. See also Synchronous Data Link Control.
binary synchronous communication equivalence link support (BSCEL support)
The intersystem communications function (ICF) support on the System i platform that provides binary synchronous communications with other computers using BSC protocols.
binary tree server topology
A topology that connects servers in a pyramid fashion: the top server connects to two servers below it, each of which connects to two servers below it, and so on. Information travels down the pyramid and then back up.
A method of collecting auditing data that writes audit records to a temporary bin file. After the data is processed by the auditbin daemon, records are written to an audit trail file for storage.
See Berkeley Internet Name Domain.
- A process by which a usable control structure with SQL statements is generated; the structure is often called an access plan, an application plan, or a package. During this bind process, access paths to the data are selected, and some authorization checking is performed.
- To relate an identifier to another object in a program. Examples of binding are relating an identifier to a value, an address, or another identifier, or associating formal parameters and actual parameters.
- To combine object code from one or more sources into an executable load module or program object.
- To create a program, which can be run, by combining one or more modules created by an Integrated Language Environment (ILE) compiler.
- To convert the output from the DBMS precompiler to a usable control structure, such as an access plan, an application plan, or a package.
- To associate a variable with an absolute address, identifier, or virtual address, or with a symbolic address or label in a program.
- To associate a file with a management class name. See also archive-retention grace period, management class, rebind.
- To establish a connection between software components on a network using an agreed-to protocol. In web services, the bind operation occurs when the service requester invokes or initiates an interaction with the service at run time using the binding details in the service description to locate, contact, and invoke the service.
- To logically associate a program with data or another program.
In SNA, a command used to start a session between two logical units, and to define the characteristics of that session. See also UNBIND command.
bind control part
In EGL, a build part that describes how to access a DB2 database from one or more programs. The information in this part is used at generation time and preparation time, but only when the target system is CICS for MVS.
- The z/OS program that processes the output of language translators and compilers into an executable program (a load module or program object). The binder replaces the linkage editor and batch loader. See also prelinker.
- See linkage editor.
- A feature that is used to group related events together. For example, an RFI and a related RFQ can be grouped together.
- The system component that creates a bound program by packaging Integrated Language Environment (ILE) modules and resolving symbols passed between those modules.
See binder application programming interface.
A small set of commands (STRPGMEXP, EXPORT, and ENDPGMEXP) that defines the external interface (signature) for a service program. These commands cannot be run alone and are of the source type BND.
- An association between a client, object, and network that shares information about the transport protocol.
- In information analysis, a direct relationship between a logical element in a data rule and an actual column in a table in a data source.
- The creation of a model element or source code from a template by supplying arguments for the parameters of the template.
- In a multiprocessor context, the act of constraining a thread to a specific physical processor to gain the benefit of processor affinity.
- The process of creating a program by packaging Integrated Language Environment (ILE) modules and resolving symbols passed between those modules.
- The process of attaching a collaboration object to a port, which is a variable that represents a business object. See also business object, collaboration object, port.
- A temporary association between a client and both an object and a server that exports an interface to the object. A binding is meaningful only to the program that sets it and is represented by a bound handle.
A list of names of modules and service programs that may be needed when creating an ILE program or service program. A binding directory is not a repository of the modules and service programs. Instead, it allows them to be referred to by name and type.
In UML modeling, a dependency relationship that connects template arguments to template parameters to create model elements from templates. See also dependency relationship.
A technique by which the address space manager (ASM) at one node controls the rate of transmission of BIND requests of a sending ASM at another node. BIND pacing can be used to prevent BIND standoff, in which each of two nodes has reserved most of its resources for sessions it is attempting to initiate through the other and thus rejects any BINDs received from the other.
One of the two communication security passwords. In an LU-LU session, it is the password that the system checks against the remote system to verify that the program to which the user is connected is the correct one.
See session security.
In DFSMSrmm, the specific shelf location where a volume resides in a storage location; bin number is equivalent to a rack number in the removable media library. See also shelf location.
See block input/output daemon.
See basic input/output system.
See binary synchronous transmission.
See binary digit.
See bit block transfer.
bit error rate (BER)
The probability that a transmitted bit will be erroneously received. The BER is measured by counting the number of bits in error at the output of a receiver and dividing by the total number of bits in the transmission. BER is typically expressed as a negative power of 10.
In Enhanced X-Windows, the attraction of window contents for a location in a window. When a window is resized, its contents can be relocated. The server can be requested to relocate the previous contents to a region of the window.
- In zFS, a file listing the blocks that are free on disk. The file size is dependent on the size of the aggregate.
- In temporary storage, a control block used by intrapartition transient data to show the VSAM control intervals (or BSAM tracks) that have been used and are available. It is updated whenever a control interval or track is assigned to or released from a destination.
- A coded representation in which each bit, or group of bits, represents or corresponds to an item; for example, a configuration of bits in main storage in which each bit indicates whether a peripheral device or a storage block is available or in which each group of bits corresponds to one pixel of a display image.
- A pixmap with a depth of one bit plane.
- A representation of an image by an array of bits.
A display with a display adapter that has a hardware representation of each separately addressable point on the display. The hardware representation can be processor memory or adapter memory.
A pattern of bits designed to be logically compared to an existing bit value. The mask pattern allows only certain desired parts of the existing bit value to appear in the result of the comparison.
See Because It's Time Network.
In computer graphics, a set of bits that supplies one bit of color information per pixel on the display. Thus, an eight bit plane system allows 2 to the eighth power different colors to be displayed at each pixel.
See basic information unit.
In SNA, the portion of a basic information unit (BIU) that is contained within a path information unit (PIU). It consists of either (a) a request/response header (RH) followed by all or a part of a request/response unit (RU) or (b) a part of an RU.
BlackBerry Messenger (BBM)
Research in Motion's proprietary text messaging service, only for BlackBerry mobile devices. See also instant message.
- A pool in which no content can be seen.
- An abstraction of a device or system in which only its externally visible behaviour is considered and not its implementation or inner workings.
- See blade server.
- A component that provides application-specific services and components.
A BladeCenter unit that acts as an enclosure. This 7-U modular chassis can contain up to 14 blade servers. It enables the individual blade servers to share resources, such as the management, switch, power, and blower modules.
In RPG, an output specification option that changes the contents of a field so that it contains either zeros (if it is a numeric field) or blanks (if it is a character field) after that field is written to the output record.
- One of the characters that belong to the blank character class as defined via the LC_CTYPE category in the current locale. In the POSIX locale, a blank character is either a tab or a space character.
- A graphic representation of the space character.
A type of call transfer in which the call is routed to another extension and the original call is terminated. No check is made to determine if the transferred call is answered or if the number is busy. See also screened transfer.
See block update command.
See binary large object.
The message domain that includes all messages that have content that cannot be interpreted and subdivided into smaller sections of information. Messages in this domain are processed by the BLOB parser. See also DataObject domain, IDoc domain, JMS domain, MIME domain, MRM domain, SOAP domain, XML domain, XMLNS domain, XMLNSC domain.
- A set of rows retrieved from a database server that are transmitted as a single result set to satisfy a cursor FETCH request.
- A unit of data storage on a device.
- A group of one or more questions.
- A string of data elements recorded, processed, or transmitted as a unit. The elements can be characters, words, or physical records.
- A multidimensional array that represents the cells of all dense dimensions.
- In programming languages, a compound statement that coincides with the scope of at least one of the declarations contained within it. A block may also specify storage allocation or segment programs for other purposes.
- To suspend a program process.
A database manager method of reading contiguous data pages from disk into contiguous portions of memory. See also scattered read.
- In longitudinal redundancy checking and cyclic redundancy checking, a character that is transmitted by the sender after each message block and is compared with a block-check character computed by the receiver to determine if the transmission was successful.
- The BSC transmission control character that is used to determine if all of the bits that were sent were also received.
block definition diagram
A representation of the components of a system and the flow of information between components. Block definition diagrams include blocks, actors, standard ports, dependencies, and flows. See also block diagram.
- A device that is accessed by means of an AIX device driver.
- One of the types of files in the AIX file system, described by an inode.
A representation that defines the structure of a system and identifies the large-scale organizational parts of the system. Block diagrams show the flow of information between system components and the interface definition through ports. See also block definition diagram, internal block diagram.
In POSIX, a condition that prevents a signal-handling action associated with a signal from being performed. See also unblocked signal.
A function of the DB2 database that retrieves (or fetches) a set of rows together. Using a block fetch can significantly reduce the number of messages that are sent across the network. Block fetch applies only to cursors that do not update data. See also blocking.
- The process of combining two or more records into one block.
- A performance improvement technique that ships multiple rows of data to a database client from a server in response to a single FETCH request. See also block fetch.
- A process that partitions records into subsets that share common characteristics with the goal to limit the number of record pairs being examined during matching. By limiting matching to records pairs within a subset, successful matching becomes computationally feasible for large data sets.
- An optimization that involves changing the access order of loops that access large arrays, so that each array element is accessed as infrequently as possible.
- The number of iterations of an inner loop that are executed for each pass of a corresponding blocking loop.
- The number of records in a block. A blocking factor is calculated by dividing the size of the block by the size of the record.
A way of requesting a service over an interface so that if the request cannot be completed immediately, the requesting process is suspended until the request is completed. See also nonblocking mode.
blocking of PIUs
In SNA, an optional function of path control that combines multiple path information units (PIU) in a single basic transmission unit (BTU). See also basic transmission unit.
An operation that is not completed until the operation either succeeds or fails. For example, a blocking receive will not return until a message is received or until the channel is closed and no further messages can be received.
See block size.
A method of sharing data among IMS systems so that multiple application programs can access and update data concurrently between multiple IMS subsystems. See also database-level sharing.
A bitmap that contains an array of block states, one for each block in the multidimensional clustering table. Each entry in the array has 8 bits, four of which are used: In use, Load, Constraint pending, and Refresh pending.
- The number of pages in a block. It is equal to the extent size.
- A measure of the size of a block, usually specified in units such as records, words, computer words, or characters. Block size is sometimes referred to as block length and physical record size.
block special file
A file that provides a low-level block access to an input or output device. See also character special file.
In the C or C++ languages, a group of data definitions, declarations, and statements that are located between a left brace and a right brace that are processed as a unit. The block statement is considered to be a single, C-language statement.
See bit block transfer.
See basic link unit.
A collection of diagrams that include information technology elements, which represent the architecture of an information project, and method elements, which represent standard information technology practices.
See baseboard management controller.
See bean-managed persistence.
See batch message processing program.
See basic mapping support.
See bean-managed transaction.
See boundary node.
See Bayonet Neill-Concelman.
See Backus-Naur Form.
See boundary node identifier.
See boundary network node.
See Basic Networking Utilities.
See business object.
See Basic Object Adapter.
See Business Object Document.
- In Ada language, the definition of the execution of a subprogram, package, or task.
- In a book, the portion between the front matter and the back matter.
- On a printed page, the area between the top and bottom margins that contains text.
See bill of lading.
- In SQL, data that has one of three values: true, false, or null.
- In COBOL, a category of data items that are limited to a value of 1 or 0.
An expression that evaluates to a Boolean value. See also Boolean value.
- In REXX, an operator each of whose operands and whose result take one of two values (0 or 1).
- A built-in function that specifies a logical operation of AND, OR or NOT when sets of operations are evaluated. The Boolean operators are &&, || and !. See also operator.
A value that can be either true or false, sometimes coded as 1 or 0, respectively. See also Boolean expression.
An object that contains specifications that can influence the relative rank of a document in the search results. See also boost word.
A modeling technique that creates a sequence of models, rather than a single model, to obtain more accurate predictions. Cases are classified by applying the whole set of models to them, and then combining the separate predictions into one overall prediction. See also bagging.
A word that can influence the relevant rank of a document in the search results. During query processing, the importance of a document that contains a boost word might be raised or lowered, depending on the score that is predefined for the word. See also boost class.
See Bootstrap Protocol.
The processing that occurs when a boot image is loaded. Depending on the configuration file, boot processing over the network brings a machine to the running state, the Base Operating System (BOS) installing state, or the diagnostic state.
- A VSAM data set that contains name and status information for DB2 for z/OS and relative-byte address-range specifications for all active and archive log data sets. It also contains passwords for the DB2 for z/OS directory and catalog and lists of conditional restart and checkpoint records.
- A VSAM data set that contains an inventory of all active and archived log data sets known to WebSphere MQ for z/OS, and a wrap-around inventory of all recent WebSphere MQ for z/OS activity. The BSDS is required to restart the WebSphere MQ for z/OS subsystem.
An application server or cluster that is configured to accept application initialization requests into the service integration bus. The bootstrap member authenticates the request and directs the connection request to a bus member.
The process by which an initial reference of the naming service is obtained. The bootstrap setting and the host name form the initial context for Java Naming and Directory Interface (JNDI) references.
Border Gateway Protocol (BGP)
An Internet Protocol (IP) routing protocol used between domains and autonomous systems. See also Exterior Gateway Protocol.
See Base Operating System.
See Base Operating System installation.
See beginning-of-tape marker.
In AIXwindows, a narrow band of a dark color across the bottom of a rectangular graphical object (a widget or gadget) that creates a three-dimensional appearance when the object is manipulated.
In web services, the process of developing a service from an existing artifact such as JavaBeans or an enterprise bean rather than a Web Services Description Language (WSDL) file. See also top-down development.
In Enterprise JavaBeans (EJB) programming, an approach for mapping enterprise beans to database tables, in which the schema is first imported from an existing database and then enterprise beans and mappings are generated.
boundary access node (BAN)
A router (such as the IBM 6611) that provides its attached LAN-based SNA peripheral nodes direct frame-relay access to a subarea boundary node (such as an IBM 3745 or an IBM 3746 Model 900).
The position in main storage of a fixed-length field, such as halfword or doubleword, which is aligned on an integral boundary for that unit of information. For example, a word boundary alignment stores the object in a storage address evenly divisible by four.
- In performance profiling, a class that is normally excluded in the filtering criteria, but which is directly invoked by the classes that are included as filters.
- A class used to model communication between the system's environments and its inner workings.
An intermediate event that is attached to the boundary of an activity. A boundary event can be triggered only while the activity is running, either leaving the activity running or interrupting the activity.
- In SNA, the component that provides the capabilities to provide protocol support for attached peripheral nodes, such as interconnecting subarea path control and peripheral path control elements; performing session sequence numbering for low-function peripheral nodes; and providing session-level pacing support.
- In SNA, a capability of a subarea node to provide protocol support for attached peripheral nodes, such as: interconnecting subarea path control and peripheral path control elements; performing session sequence numbering for low-function peripheral nodes; and providing session-level pacing support.
boundary network node (BNN)
In SNA, a subarea node that provides protocol support for adjacent peripheral nodes, for example, transforming network addresses to local addresses and vice versa, and providing session-level support for these peripheral nodes.
boundary node identifier (BNI)
The MAC address that identifies a subarea boundary node as the source or destination of frames carried over the portion of a BAN connection between the boundary node and the boundary access node (BAN). All frames sent by a BAN to the boundary node have their destination MAC address set to the BNI, and all frames sent by a boundary node to a BAN have their source MAC address set to the BNI. See also BAN connection.
boundary white space
In an XQuery direct element constructor, white space characters that occur by themselves in the boundaries between tags, enclosed expressions, or both tags and enclosed expressions.
A font in bounded box format. See also unbounded-box font.
bounded-box relative metric
A unit of measure that is expressed in 1000 units per Em-square. See also relative metrics.
bounded character box
A character box that does not contain blank space on any sides of the character. See also unbounded character box.
In the Gantt sheet, an operation mode of the time scale whereby the scroll bar is limited to the specified time interval. See also unbounded mode.
A file that is defined in the installable unit deployment descriptor (IUDD) and is fully defined in the media descriptor. See also media descriptor.
- In computer graphics, the smallest rectangle that encloses a character at the x, y origin.
- In GL, a two-dimensional rectangle that bounds a primitive. A bounding box can be used to determine whether the primitive lies inside a clipping region.
- The smallest possible horizontal rectangle surrounding one or more objects.
A role that has a concrete element attached. A bound role can be a class, an operation, any classifier, model element, primitive type or other concrete element. Roles are in the scope and context of a collaboration.
The tightening of bounds on a variable in one of two ways: range, by changing one of the bounds; value, by reducing the domain of the variable to only one possible value. See also lower bound, upper bound.
- A software object that provides a mechanism to model physical entities that contain other physical entities.
- A line enclosure that forms a rectangle around text or a table.
Placing a primitive type within an object so that the primitive can be used as an object, in a language where there is a distinction between a primitive type and an object type. See also autobox, object type, primitive type, unbox.
See Business Partner.
See Business Partner Agreement.
See basic partitioned access method.
See Business Partner Application Showcase.
See Business Partner Customer Support Operations.
See business process definition.
See Business Process Execution Language.
See bits per inch.
See Business Partner Innovation Center.
See Business Partner Installation Change Request.
See Business Partner Led Model.
See Business Partner Locator Tool.
See Business Partner Mark Generator tool.
See Business Process Modeling Language.
See Business Process Modeling Notation.
See business partner organization.
See Business Partner Order change.
See Europe Business Partner Order change.
See Latin America Business Partner Order change.
See Business Partner Profitability Tool.
See Business Partner Quick Shipment.
See bits per second.
See Business Partner Support Operations.
See Business Partner Support OnLine.
See Business Process Specification Schema.
See Business Partner Trial and Loaner.
See Business Partner Technical Vitality.
- In SNA, one or more chains of request units and their responses, representing a complete transaction, exchanged between two session partners. See also end bracket.
- Either of the characters left bracket ([) and right bracket (]).
In SNA, a data flow control protocol in which exchanges between two session partners are achieved through the use of brackets, with one partner designated at session activation as the first speaker and the other as the bidder. The bracket protocol involves bracket initiation and termination rules. See also protocol.
- A set of parallel steps in a workflow. A workflow step is a node in a branch.
- A subpart of a tree that is itself a tree.
- A distinct path leading to or originating from an element in a process model or UML diagram.
- In a computer program, an instruction that selects one of a number of alternative sets of instructions.
- In the CVS team development environment, a separate line of development where changes can be isolated. When a programmer changes files on a branch, those changes are not displayed on the main trunk or other branches.
- An object that specifies a linear sequence of versions of an element. Each branch is an instance of a branch type object.
- In a rule flow, a node that organizes conditional transitions. Several transitions can go to and from a branch node. All transitions created from a branch must have a condition, except the Else transition.
branch and cut
An algorithm that searches the tree of all possible solutions, branching on decision variables and cutting off those branches that do not lead toward a better solution than the one currently known.
branch network node
An APPN network node that implements the Branch Extender architecture. A branch network node appears to be an end node to the backbone network but acts as a network node to the branch network. There may be multiple branch network nodes in a branch, and an end node may receive network node services from any of these branch network nodes.
An index page that contains pointers to a leaf node or other branch nodes. The database server creates a branch node when the root node and subsequent leaf nodes become full. See also node.
A location on a tree structure that has at least one page below and one page above it. In an R-tree index, branch pages are located in the intermediate levels, between the root page and leaf pages.
- The source of a relevant, distinctive and enduring "promise of value" to a specific set of customers. The promise should be relevant to those customers and be differentiated from those of competitors. A powerful brand influences a marketplace, demonstrates leadership and quality, and is familiar and trusted.
- In WebSphere Commerce Payments, the Cassette object for all of the WebSphere Commerce Payments cassettes (for example, Cassette for VisaNet and Cassette for Paymentech). Each financial transaction for a WebSphere Commerce Payments cassette is associated with a particular brand (for example, MasterCard or VISA).
A characteristic that audiences associate with the brand. Core brand attributes and brand attributes align with core values. For example, "commitment to the customer" is a core value, "expertise" is a core brand attribute, and "know-how and expertise" is a brand attribute.
brand business plan
See Business Unit Business Plan.
The aggregation of all accumulated attitudes (positive and negative) of consumers, distribution channels and influencing agents, linked to a brand's name or symbol that will enhance or reduce profits and long-term cash flow for the brand organization.
See brand unit.
A group responsible for worldwide management of a related family of offerings/solutions best promoted as a group. The units are responsible for all aspects of the brand strategy, planning and ensuring execution. The units focus on the definition, development and delivery of competitive offerings/solutions that meet customer requirements.
See brand equity.
The value at which a service level objective (SLO) is considered as not being met. A service level agreement (SLA) violation occurs if a breach value for one or more of its SLOs is exceeded. See also service level objective.
break bulk node
A node within a distribution network that is used during zone skipping. For example, a user might transport a full container load economically by a single carrier to a break bulk node, where the contents of the container are then split into a few small loads for local dispatch to individual customers, or to other subsidiary distribution depots. See also zone skipping.
- A point where some property of a function changes, such as its slope, for example.
- A location in a program, specified by a command or a condition, where the system halts execution and gives control to the workstation user or to a specified program.
- A marked point in a process or programmatic flow that causes that flow to pause when the point is reached, typically to allow debugging or monitoring.
break quantity high
The upper quantity range for a given price. For example, the break quantity high is 10 for an item that for quantities of 1 to 10 the price is $20 per unit; the break quantity high is 50 when for quantities of 11 to 50 the price is $15.
break quantity low
The lower quantity range for a given price. For example, the break quantity low is 1 for an item that for quantities of 1 to 10 the price is $20 per unit; the break quantity low is 11 when for quantities of 11 to 50 the price is $15.
A form that a shipper uses to define rate breaks. A break schedule does not contain specific prices for each rate break. Shippers define the prices when they assign the break schedule to a contract lane or accessorial. See also rate break.
A C or C++ control statement that contains the keyword break and a semicolon (;). It is used to end an iterative or a switch statement by exiting from it at any point other than the logical end. Control is passed to the first statement after the iteration or switch statement.
See branch extender.
- A functional unit that interconnects multiple LANs (locally or remotely) that use the same Logical Link Control (LLC) protocol but that can use different Media Access Control (MAC) protocols. A bridge forwards a frame to another bridge based on the MAC address. See also router.
- In the connection of local loops, channels, or rings, the equipment and techniques used to match circuits and to facilitate accurate data transmission. See also web application bridge.
- A component that converts metadata from one format to another format by mapping the metadata elements to a standard model. This model translates the semantics of the source tool into the semantics of the target tool. For example, the source tool might be a business intelligence or data modeling tool, and the target tool might be the metadata repository. Or, the source tool might be the metadata repository, and the target tool might be a file that is used by a data modeling tool. See also connector.
In LANs, the forwarding of a frame from one LAN segment to another. The destination is specified by the medium access control (MAC) sublayer address encoded in the destination address field of the frame header.
See Business Rule Language Definition Framework.
- See Backup, Recovery, and Media Services.
- See Business Rules Management System.
- See business rule management system.
A communication channel that uses a wide frequency range divided into narrower bands that can be made available to different users for the simultaneous transmission of different signals (such as voice, video, and data). A broadband channel is capable of higher-speed data transmission than a voice-grade channel.
broadcast for bid tender
See broadcast for capacity tender.
broadcast for capacity tender
A tendering method that allows a shipper to offer a load to a list of carriers as a request for capacity. After carriers submit a bid, the shipper views the available capacity and selects a carrier. See also broadcast for review tender.
broadcast for review tender
A tendering method in which the shipper offers a load to multiple carriers at the same time. The shipper reviews the carriers and selects a carrier to take the load. See also broadcast for capacity tender.
A job that runs on all clones at once. Like any other job, it is handled by the scheduler. See also scheduler.
broadcast Locate search
See broadcast search.
- In Notes, a meeting about which invitees are notified; they do not need to respond to the invitation. This option is useful when individual response will not affect the occurrence of the meeting.
- In Sametime, a broadcast presentation or demo.
A situation where one message that is broadcast across a network results in multiple responses. Each response generates more responses, causing excessive transmission of broadcast messages. Severe broadcast storms can block all other network traffic, but they can usually be prevented by carefully configuring a network to block illegal broadcast messages.
A tendering method that allows a shipper to tender a single shipment to multiple carriers at the same time. The shipment is awarded to the first carrier who accepts the shipment, based on first receipt of a tender acceptance by Sterling TMS.
broken access control
A vulnerability that results from inadequate enforcement of restrictions for authenticated users. Attackers can exploit these flaws to access other users' accounts, view sensitive files, or use unauthorized functions.
broken authentication and session management
An issue that occurs when account credentials and session tokens are not properly protected. Attackers can compromise passwords, keys, session cookies, or other tokens, and can assume other users' identities.
broken data set
A data sets that does not conform to IBM data-set standards. Broken data sets are either missing or have invalid catalog entries, volume table of contents (VTOC) entries, or VSAM volume data set (VVDS) entries.
- In the Network Computing System (NCS), a server that manages information about objects and interfaces to the objects. A program that wants to become the client of an interface can use a broker to obtain information about servers that export the interface.
- A set of execution processes that host one or more message flows. See also execution group, message flow.
A file that is the unit of deployment to the broker that can contain any number of compiled message flow and message set files and a single deployment descriptor. A separate broker archive file is required for each configuration that is deployed.
broker archive file (bar file)
The unit of deployment to the broker. It contains any number of compiled message flows (.cmf), message sets (.dictionary), and a single deployment descriptor. It can also contain any additional files that you might need, provided that the extension does not overlap the .cmf and .dictionary extensions.
A section in a customization definition document (CDD) that describes which BAR files are deployed, which execution group and broker the files are deployed to, and which tuning parameters the files use.
broker topology definition (BTD)
A description of the brokers, execution groups, and broker archive (BAR) files that are used in a runtime environment, and the actions that are required to implement the current broker topology (for example, deploying the BAR files for a new service).
- To look at information without changing it. See also monitor.
- In message queuing, to copy a message without removing it from the queue. See also get, put.
- A program that can be used to look at data but not change it.
- A window that displays a list of items, such as documents (transaction sets), interchanges, and translation objects.
- A client program that initiates requests to a web server and displays the information that the server returns.
A SAML profile that uses a SOAP back channel to exchange an artifact during the establishment and use of a trusted session between an identity provider, a service provider, and a client (browser).
See base station.
See basic sequential access method.
See binary synchronous communication adapter.
See binary synchronous communication equivalence link support.
See Berkeley Software Distribution.
See bootstrap data set.
See Basic Security Manager.
See below-specific protocol boundary.
See business transformation.
See Basic Telecommunications Access Method.
See broker topology definition.
See broker topology definition document.
See Business Transformation Management Tool.
An index that is arranged as a balanced hierarchy of pages and that minimizes access time by realigning data keys as items are inserted or deleted. See also forest of trees index.
See basic transmission unit.
See British thermal unit.
See British thermal unit per hour.
- A reserved segment of memory used to hold data while it is being processed. See also buffer overflow.
- An area of storage that compensates for the different speeds of data flow or timings of events by temporarily holding a block of data to be processed or written to an I/O device.
- To allocate and schedule the use of temporary storage areas.
- A storage area used by MERVA programs to store a message in its internal format. A buffer has an 8-byte prefix that indicates its length.
buffered disk I/O
Disk I/O that is controlled by the operating system instead of by an application. With buffered disk I/O, the operating system stores data in the kernel portion of memory before periodically writing the data to disk. See also disk I/O, unbuffered disk I/O.
In VTAM, a group of buffers associated with one or more contiguous, related entries in a buffer list. The buffers may be located in discontiguous areas of storage, and may be combined into one or more request units.
A technique for preventing the use of invalid data in an IMS Sysplex data sharing environment. The technique involves marking all copies of data in IMS buffers invalid once a sharing IMS subsystem has updated that data.
In VTAM, a contiguous set of control blocks (buffer list entries) that allow an application program to send function management data (FMD) from a number of discontiguous buffers with a single SEND macroinstruction.
An exploitation technique that alters the flow of an application by overwriting parts of memory. Buffer overflows are a common cause of malfunctioning software. See also buffer.
An area of memory into which data pages are read and in which they are modified and held during processing. See also address space.
buffer-to-buffer flow control
Management of the frame transmission rate in either a point-to-point topology or in an arbitrated loop. See also buffer-to-buffer credit.
- To convert a product from source code to a binary or executable software product.
- The process during which a build program produces one or more derived objects. This may involve actual translation of source files and construction of binary files by compilers, linkers, text formatters, and so on.
- A specification for the acquisition, transformation, and delivery of data. See also dimension build, fact build.
- To create or modify resources, typically based on the state of other resources. A Java builder converts Java source files into executable class files, for example, and a web link builder updates links to files whose name or location has changed.
- An operational version of a system or part of a system that demonstrates a subset of the capabilities to be provided in the final product.
build acceptance test
See smoke test.
- A module in CICS that, in conjunction with other builders, makes the autoinstall process possible, allows the terminal control table (TCT) to be changed dynamically on a running CICS system, and reduces the times needed for warm and emergency restart on systems that use autoinstall.
- A reusable component that dynamically generates Java and JSP code based on the context in which it is called. For example, it can add a button to a JSP page, link fields in a form to an XML variable, or create a web service. See also model.
In EGL, an XML file that contains any number of build parts, which determine how a program is generated and prepared. The file may import other build files. The file name extension is .eglbld.
In EGL, a unit of declaration that specifies a variety of processing characteristics. The kinds of build parts are build descriptor parts, linkage options parts, resource associations parts, bind control parts, and link edit parts.
build regression test
See smoke test.
In Enterprise Developer, a file that is used by a build server to transform one set of files into another. A build script may be, for example, a pseudo-JCL script, a Java compiler, or a REXX script.
build validation test
See smoke test.
build verification test
See smoke test.
- A data type that IBM supplies. Among the built-in data types for DB2 for z/OS are string, numeric, XML, ROWID, and datetime. See also distinct type.
- A data type defined by the database server.
- A data type defined by the database server. See also data type.
Application data in a message for which the queue manager defines the meaning. See also application-defined format.
- A predefined, SQL-invoked function that provides some basic arithmetic and other operations, such as cos(), log(), or today().
- A special calculation formula set up specifically for planning. For example, some built-in functions include depreciation, discounted cashflow, forecasting using different drivers, and stock purchase prediction based on future sales.
- A function that is defined by the database manager. See also function, routine, user-defined function.
- A function that is predefined by the compiler and whose code is incorporated directly into the compiled object rather than called at run time. See also function.
built-in shell command
A command that is implemented as part of a shell program. Certain commands are built into the shell in order to improve the performance of shell scripts or to access the shell's internal data structures and variables.
The storage of high volumes of SKUs that represent a specific space on the floor of the warehouse. Typically SKUs stored in this area would be sturdy enough to stack multiple pallets high, permitting better utilization of warehouse space.
See block decryption.
See block encryption.
- The mechanism by which the Tivoli Management Framework and Tivoli applications communicate with Tivoli administrators. The bulletin board collects notices in notice groups. Administrators can access the bulletin board from the Tivoli desktop. The bulletin board is an audit trail for important operations that the administrators perform.
- A graphic object that simulates a real-life bulletin board in that it displays text and graphic information in the form of messages to the user from client applications that are currently running.
- See link bundle.
- A collection of CICS resources, artifacts, references, and a manifest file that can be installed as a unit. See also CICS bundle, management bundle.
- An object that allows a user to package, organize, and optionally provide additional information about the reports that can be sent to the recipients.
- To package a collection of individually orderable components or products into a single offering, often for promotional purposes. Software manufacturers typically offer a single license to cover all components of a bundled offering.
- A kit item that can contain both products and services.
- In the OSGi service platform, a Java archive file that contains Java code, resources, and a manifest that describes the bundle and its dependencies. The bundle is the unit of deployment for an application. See also bundle cache, bundle repository, enterprise bundle archive, subagent.
- A set of findings that the user creates. Bundles can be exported and shared between people and applications.
- Catalog merchandise that provides single-click function for referring to multiple items. More formally, a bundle is a composite catalog entry consisting of at least one code. See also dynamic kit, kit, package, prebuilt kit.
- A set of tokens that are transferred between nodes in a simulation as a complete group.
- A group of journal entries that are deposited together by the system.
- A packaged collection of software products that is purchased as one item and that has its own product identifier (PID).
A cell-wide store, or server-wide store for single-server systems, of bundles that OSGi applications refer to and that have been downloaded from both internal and external repositories. See also bundle, bundle repository.
- A part of a bundle that is defined within a definition by having the same recipient identifier and distribution description as that distribution, and each bundle component is specific to a report that is defined in the OnDemand database.
- A product that is comprised of multiple products.
A bid that is placed by suppliers for multiple items rather than a separate bid for each item. Bundled bids are available only with RFQs, RFPs and reverse auctions. The buyer can choose to ignore them when performing scenario analysis on the returned bids.
A special file that describes the resources, location of supporting artifacts, application prerequisites, and services that are included in a bundle to deploy part or all of a CICS application.
In agile software development, a tool for measuring progress in which the number of remaining tasks are plotted against the estimated number of total tasks for the day, iteration, or other period.
- In data communication, a sequence of data counted as one unit in accordance with some specific criterion or measure.
- To create several report results by running a single report once. For example, the user can create a report that shows sales for each employee, and run it once, sending different results to regional managers by bursting on region.
- To separate continuous-forms paper into individual sheets.
An optional printer feature that separates continuous forms into separate sheets, trims the carrier strip from both edges of the paper, and stacks the sheets. The BTS also identifies jobs by offsetting the stacking.
- One or more conductors used for transmitting signals or power.
- A computer configuration in which processors are interconnected in series.
- In a processor, a physical facility on which data is transferred to all destinations but from which only addressed destinations can read in accordance with appropriate conventions.
- Interconnecting messaging engines that manage bus resources.
- A facility for transferring data between several devices located between two end points, only one device being able to transmit at a given moment.
bus extension driver card (BED card)
The card, connected by a cable to a bus extension receiver (BER) card, that is used to route data from one card enclosure to another card enclosure. The direction of data can be from the processing unit to an input/output processor in one of the card enclosures, or from an input/output processor in one of the card enclosures to the processing unit. See also bus extension receiver card.
bus extension receiver card (BER card)
The card, connected by a cable to a bus extension driver (BED) card, that is used to route data from one card enclosure to another card enclosure. The direction of data can be from the processing unit to an input/output processor in one of the card enclosures, or from an input/output processor in one of the card enclosures to the processing unit. See also bus extension driver card.
For RosettaNet, a message with content of a business nature such as a Purchase Order Request or a Request For Quote. The exchange of business actions and business signals comprise the message choreography necessary to complete a business activity specified by a PIP.
For RosettaNet, one or more discrete activities encapsulated by PIP and as specified by the business analysts during development of the PIP blueprint. The exchange of business actions and business signals comprise the message choreography necessary to complete a business activity specified by a particular PIP. For example, PIP 3A4 (Manage Purchase Order) specifies three separate business activities: Create Purchase Order, Change Purchase Order, and Cancel Purchase Order.
- A decision management user role that is responsible for modeling rule application projects.
- A specialist who analyzes business needs and problems, consults with users and stakeholders to identify opportunities for improving business return through information technology, and transforms requirements into a technical form.
Business Analytics and Optimization (BAO)
A service offering that helps clients gain greater perspective and predictability for business decisions. Business Analytics and Optimization means that clients can operate at a greater level of intelligence.
Business Application Programming Interface (BAPI)
A programming interface that is used to access SAP databases from with SAP or other development platforms. BAPI is used to achieve integration between the R/3 System and external applications and legacy systems.
Business Application Services (BAS)
The component of CICSPlex SM that provides the ability to define and manage business applications in terms of their CICS resources and associated CICS systems. BAS provides a central definition repository for CICS systems, complete with installation facilities and the ability to restrict a CICSPlex SM request to those resources defined as being part of the business application.
- A calendar that is used to model noncontiguous time intervals (intervals that do not proceed in a sequential manner). For example, a business calendar that defines regular working hours might refer to the non-overtime regular working hours of Monday to Friday, 9:00 a.m. to 5:00 p.m.
- A working calendar, configured by either the buyer or the seller organization, that specifies nonworking days, such as holidays and special events.
A template used in the Business Transformation Management System (BTMS) to provide information on the business case for a program (during BT portfolio management) or project (during BT operations process phases). It includes information on the value areas (cost avoidance, cost reductions, incremental revenue, revenue shift to web base, etc.) and quantification of value over the life of the investment.
A model of a real world constraint on purchasing activities. Business constraints are a mechanism to add limiting conditions within a scenario. The conditions could be based on existing business contracts, procurement policies, or business rules. For example, a favorite supplier rule, award limit rule, supplier count rule, total cost rule etc can be defined in a scenario.
The capability of a business to withstand outages and to operate mission-critical services normally and without interruption in accordance with predefined service-level agreements. See also business continuity solution.
business continuity solution
A combination of hardware, software, and services that ensures business continuity. The business continuity solution must address data, operational environment, applications, the application hosting environment, and the user interface. See also business continuity.
business design assurance (BDA)
Process which provides a structured approach to linking and validating business process designs to business rules, business strategies and objectives and related application architectures.
A business community supported by a foundation of interacting organizations and individuals. This community produces goods and services of value to customers, who are themselves members of the ecosystem. A business ecosystem contains business services networks, which contain business process, relevant to the transactions in that network.
In web services programming, a data structure type that contains information about the business that has published the service. The business entity is specified when the service is registered.
- An event that occurs during a business process. See also application event.
- A significant occurrence in a business process, generally identified by a business analyst, that warrants monitoring over time to reveal a key performance indicator (KPI).
- An occurrence of significance to a business. Application events and system events can be business events.
Business Event Language
A business rule language that expresses event rules. See also business rule language.
The controlled vocabulary and associated information governance policies and rules that define business semantics. Business and IT professionals can use a business glossary to manage enterprise-wide information according to defined regulatory requirements or operational needs of the business. See also category, information governance policy, policy, term.
A requirement that must be satisfied by the business. Business goals describe the desired value of a particular measure at some future point in time and can therefore be used to plan and manage the activities of the business. See also business objective.
A wrapper that is added around a simple business object or a hierarchy of business objects to provide additional capabilities, such as carrying change summary and event summary information related to the business objects in the business graph. See also business object.
- A place to collect any elements to group together. Different business groups can be created for companies, processes, parts of processes, or any other grouping.
- The highest level in the organization hierarchy which has no accounting impact. It can consist of a single company or multiple companies.
The result of a business engineering process that does not affect the entire business. Examples include trimming costs and lead times in the manufacturing division and monitoring quality in the customer service division.
business information exchange
The set of information integration capabilities that helps users understand and govern their information by standardizing on a common business language, by standardizing how to discover relationships within and across data sources, and by creating trusted information that supports information governance efforts that align their business information and information technology goals.
business integration system
An integration broker and a set of integration adapters that allow heterogeneous business applications to exchange data through the coordinated transfer of information in the form of business objects.
business intelligence (BI)
The consolidation and analysis of data collected in the day-to-day operation of a business, which is then used as a basis for better business decisions and competitive advantage.
business intelligence asset (BI asset)
An information asset that is used by business intelligence (BI) tools to organize reports and models that provide a business view of data. These assets include BI reports, BI models, BI collections, and cubes.
Business Intelligence Bus (BI Bus)
An application programming interface (API) that uses SOAP and other standard protocols for message encoding, transport, and security. Using any compliant toolkit, the BI Bus can be integrated with other web portals and software applications.
A business document, work product, or commodity that is used in business operations. Examples of business items are a manufacturing order, system board, power supply, and memory chip (in a PC assembly process), itinerary and customer information record (in a trip reservation process), and passenger (in a transportation process). See also business object.
business item template
A category used to model a group of business items that share common properties. After these properties are defined in the template, they are inherited by all business items using the template. For example, an organization may define a number of forms to be used in human resource processes, all of which have fields for date, employee number, HR form number, and HR administrator.
- The part of a distributed application that is concerned with the application logic rather than the user interface of the application. See also presentation logic.
- The codified procedures in a business software system that implements the day-to-day operations of an organization (such as processing an order, payroll management, and so on). Business logic typically includes industry-standard procedures for business operations and customizations reflecting an organization's unique business policies. In the WebSphere business integration system, business logic can be represented (that is, codified) as a collaboration. See also collaboration.
- The activity of managing a business without an implied or explicit definition of leadership or responsibility.
- In System Manager, the discipline that encompasses inventory management, security management, financial administration, business planning, and management services for all enterprise-wide information systems.
A description of a performance management characteristic that you want to monitor. Business measures include instance metrics, aggregate metrics (also called measures), and key performance indicators (KPI).
- A method added to a type in a business object model. Business methods extend the original type without altering its source.
- A method of an enterprise bean that implements the business logic or rules of an application. (Sun)
- A model that describes the attributes and inheritance of business object classes. The business model serves as a common vocabulary between IBM ILOG JViews TGO and the back-end application, but does not address relationships between these classes.
- A sample commerce solution that includes an organization structure, default user roles and access control policies, one or more starter stores, administration tools, and business processes that demonstrate best practices.
- A pattern or design for running a business.
A type of modeling that encompasses all modeling techniques that can be used to visually model a business. These are a subset of the techniques that are used to perform business engineering.
- A single instance of a class that includes, but is not limited to, an organization, price, and contract.
- A software entity that represents a business entity, such as an invoice. A business object includes persistent and nonpersistent attributes, actions that can be performed on the business object, and rules that the business object is governed by. See also binding, business graph, business item, data object, private business object, Service Data Objects.
- The definition of a data object. For example, the business object triPeople defines a person structure and includes the person's given name, surname, and primary address.
- An instance of a business class. A business object typically corresponds to a real business object somewhere in the back-end application.
- An abstract representation of the fields that belong to the event and action definitions.
business object definition
The name, set of ordered attributes, properties, supported verbs, version number, and application-specific text that specify a type of business object. Components of the WebSphere business integration system use the business object definition to instantiate a business object, which they load with data before processing. See also metadata.
A high-level business goal. Because business objectives are typically abstract, they are difficult to measure and are therefore translated into more measurable lower-level business goals. See also business goal.
- A representation of the core concepts of a business and their logical connections. The business object model is the basis for the vocabulary used in business rules. The elements of a business object model (BOM) map to those of a corresponding execution object model.
- See business analysis model.
- A model that defines how a system organizes its processes when interacting with business objects. An example of a business object model is the Enterprise JavaBeans (EJB) component model.
business object property
An element of a business object attribute that defines one quality of the attribute. The set of properties provides information such as the attribute name, type, maximum length, or default value, whether the attribute is required or whether it is a primary or foreign key. See also property.
business operational view
For RosettaNet, the first section of every PIP specification, which describes the business-related aspects of the PIP. This is information captured from business analysts during development of the PIP. The BOV is the PIP Blueprint as approved by the RosettaNet members.
The ways in which an organization operates, including its processes and organizational structure. For example, an organization might have a management structure and processes defined for everything from taking vacation days to submitting travel expenses.
business partner organization (BPO)
One of the types of subsidiary entities that can be added to an organization. Typically, a business partner organization is used to identify a contractor, supplier, or other groups of individuals who are not direct employees but may need access to a company's resources.
business plan element
One of the core elements of a business plan. The core elements are (a) offering, (b) pricing/terms, (c) distribution and (d) integrated marketing communications. Operational elements of the business plan are (a) support/skills, and (b) fulfillment.
Business Plan Framework
A guide or framework used in the creation of all business plans that includes: (1) marketplace understanding/Insight, (2) portfolio analysis and overall strategy, (3) business plan elements, (4) performance assessment, and (5) risk assessment.
A series of processes that analyze the IBM portfolio, compare it to the competitive landscape, use strategy to derive direction, and finally decide upon the best transformation opportunities to ensure that IBM remains competitive in the marketplace.
- A set of rules that define business processes, industry practices, or the scope and characteristics of business offerings.
- A policy that is attached to an object in the ontology known as the business policy target. It optionally specifies a set of conditions that must be met for the business policy to apply. The policies declare a set of assertions that must be satisfied when the conditions are met.
business process engineering
See business engineering.
Business Process Execution Language (BPEL)
An XML-based language for the formal specification of business processes and business interaction protocols. BPEL extends the web services interaction model and enables it to support business transactions.
business process management (BPM)
The services and tools that support process management (for example, process analysis, definition, processing, monitoring and administration), including support for human and application-level interaction. BPM tools can eliminate manual processes and automate the routing of requests between departments and applications.
- A paradigm that controls the business workflow of transactions.
- An automated business process that uses drag-and-drop technologies to link activities in a digital, graphical representation of the related task.
business process sketch
A diagram that illustrates a directed flow of activities that are specified by using a subset of Business Process Modeling Notation (BPMN). Two types of processes are supported: simple and business-to-business.
- A representation of how business policies or practices apply to a business activity.
- An advanced expression used to perform calculations or otherwise manipulate the value of attributes. For example, a business rule could be a formula that can check the quality of requirements, implement a complete workflow, or aggregate sales figures for a large corporation. See also expression.
- A configurable rule that specifies in detail how an order management system handles installation, inventory, pricing, promotions, services, and organizations.
- A policy, constraint, or required operation that applies to a specific set of business conditions or dependencies. An example of a business rule for a bank is that a credit check is not required when opening an account for an existing customer.
- A conditional statement that defines how events are processed and which activities trigger an event alert.
business rule group
A set of scheduled business rules that are available as a service that can be invoked. The business rule group also provides the organizational structure for managing the set of business rules.
business rule language
A language for expressing rules with natural language terms and syntax. See also Business Event Language.
An account or synopsis of a projected course of action or events. The scenario defines and documents a major end-to-end business transaction, speaks to how people and organizations interact to execute the defined process, the business transaction, and how they will ultimately utilize systems and applications that support the end-to-end process design. Used in the business design assurance process to define the interactions of the users with the systems.
A series of periods that indicate how a business divides a time line into different operational states. The level of service that is guaranteed during each schedule state can be varied.
- An abstract representation of a business function, hiding the specifics of the function interfaces.
- In web services programming, a data structure type that contains information about groups of web services. The business service structure is specified when a service is registered.
business service definition
A representation of the WSDL PortTypes in a business service. A business service definition describes a specific set of business service operations that are used to perform related business functionality.
business service object
A representation of an XML schema file (.xsd). There are inline XML schemas and schema types within WSDL files. A business service object is a collection of business service object definitions and business service object templates.
business service object definition
A representation of the WSDL ComplexType in an inline schema, or the XML schema type (SimpleType, ComplexType, Anonymous ComplexType, or Anonymous SimpleType) in an XML schema file. There are inline XML schemas and schema types within WSDL files. A business service object definition is similar to a business item and is used to define the business data that is required when a business service operation is invoked.
business service operation
A representation of the WSDL Operation in a business service definition. A business service operation describes a business function and includes the business service object definitions that are required when the operation is invoked. A business service operation also describes the business service object definitions that result from completing the business service operation. For example, a Product Search business service operation requires a Product name (a business service object definition) and returns a Product business service object definition. Business service operations can be added to process diagrams as non-editable services.
business services network
A collection of business processes, services, subscribers, and policies that enable, control, or consume a portfolio of business services. The business services network can span enterprise boundaries and geographies or be confined to a single physical network or entity.
A message exchanged between two RosettaNet network applications to communicate certain events within the execution of a PIP instance. Examples of signals include "receipt and successful validation of a message" (Receipt Acknowledgement) and "receipt of a message out of sequence" (General Exception). A signal is used to communicate an exception condition within the normal message choreography of a PIP.
- A collection of long-term business objectives that defines the principles and goals for realizing a business idea.
- A top-down view of business goals including market opportunity, competitive position, growth potential, etc, characterized in terms of investment levels and priorities, market participation, revenue and profit goals.
- A group of diverse but interdependent applications and other system resources that interact to accomplish specific business functions.
- A set of roles and resources that together fulfill a specific purpose and define the responsibilities of the individuals who perform the work. See also organization unit.
Refers to Internet applications that exchange information or run transactions between businesses. See also business-to-consumer.
Refers to the subset of Internet applications that exchange information or run transactions between businesses and consumers. See also business-to-business.
A self-contained business function, for example, the booking of an airline ticket. A business transaction might be implemented as multiple user transactions or activities. See also business transaction services.
business transaction services (BTS, CICS BTS)
An application programming interface and set of services for implementing complex business transactions in CICS. See also business transaction.
Business Transformation Management System (BTMS)
An integrated management system framework to manage the IBM portfolio to meet the needs of IBM and the marketplace. The IBM portfolio consists of planned solutions, in-flight solutions, deployed solutions, and solutions that have been sunset.
Business Transformation Management Tool (BTMT)
A workflow tool developed by the BT-CIO to manage development of solutions, projects, and assets through the Solution Development processes of BTMS. BTMT is used to accomplish the following: initiate web marketing activity, request a new web site, begin new development of any type of asset (application, tool, team room, data repository, form, or infrastructure system service), deploy any type of asset, manage an asset once deployed, or request an IT Funding Request (IPP#).
- An organizational unit within IBM that has a financial objective (revenue, cost, expense). Each business unit files a budget containing its financial objectives for the fiscal year.
- A group within a buyer organization.
- A unit in the CIO representing a major business area. Business units lead end-to-end transformation in their business area and are accountable for results tied to performance. Units execute their strategy and implement process changes necessary to drive performance and simplification. Examples include: Server and Storage Systems Group, Sales and Distribution, Software Group, IBM Research, Technology Group, Global Services, IBM Global Financing, Corporate Functions, and Personal Computer Division.
Business Unit Business Plan
A comprehensive description of the business unit's worldwide strategy and positioning as well as the key activities planned to support them. Includes coverage (outcomes, objectives, key activities) of each business plan element - offering, pricing/terms, distribution, integrated marketing communications, support/skilled resources, fulfillment and performance assessment.
Business Unit Business Plan Summary
A fifteen to twenty page summary or "white paper" version of the Business Unit Business Plan that is used in the strategy and financial processes. Its purpose is to point out specific issues, concerns and risks related to the commitments in those plans, that senior corporate executives should be aware of. The summary may also highlight specific topical issues that need to be addressed.
The component of a policy expression that indicates the relative economic value of the decision of a policy. Business value is used to determine which policy is selected among conflicting policies. See also decision.
The dedicated allocation of an entire bus and all accompanying resources (input/output processors and input/output devices) to a particular logical partition. See also IOP-level partitioning.
A device or subsystem that controls data transfers between itself and a subordinate. See also DMA slave.
- A network topology where a set of nodes is connected to a bus object.
- A physical arrangement of application servers, messaging engines and queue managers and the pattern of bus connections and links between them.
- A graphic that executes an action when clicked.
- A mechanism on a pointing device, such as a mouse, used to request or start an action.
- On the buy-side, a defined role in WebSphere Commerce that makes purchases from the seller's website on behalf of a customer account. Typically, purchases are made under one or more agreements negotiated with the Seller.
- On the sell-side, a defined role in WebSphere Commerce that handles negotiations and ordering, keeps track of inventory, makes purchase order decisions, tracks reasons for returns, and tracks expected inventory records and receipts.
- An organization that purchases products from an enterprise or other seller organizations.
- A buyer user with administrative privileges. See also buyer user.
- A defined role in WebSphere Commerce that manages the information for the buying organization. The buyer administrator creates and administers the suborganizations within the buying organization and manages the various users, including approving users as buyers (buy-side).
- An organization that places purchase orders (PO) to vendors.
- See purchasing organization.
An internal survey that is sent to members of the buyer organization. A buyer organization typically uses a buyer survey to gather information prior to creating an RFI, RFQ, RFP or auction.
A user who belongs to a buyer organization, and purchases products from a storefront on behalf of that buyer organization. See also buyer administrator.
The phases (cognitive, affective, behavioral response) through which a buyer moves to make a purchase decision. One such response hierarchy model is A.I.D.A. (Awareness, Interest, Desire, Action). The buying cycle can be divided into five stages: (1) problem recognition, (2) information search, (3) evaluation of alternatives, (4) purchase decision, and (5) post purchase behavior.
The process of comparing the software package to be installed and the base software package. See also delta install.
byte order mark (BOM)
A marker that consists of a Unicode character code that is placed at the beginning of a data stream, typically in a text file. The marker can be used to indicate the byte order and encoding of the data stream. An example of a byte order mark is the UTF-16BE (big endian) BOM 0xFEFF.
- A sequence of bytes without any organizing structure.
- A simple sequence of bytes stored in a stream file. See also record data.