list of letters
This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
A hierarchical dimension which typically reflects the structure of the organization (for example, cost centers and profit centers). The e.List is the basis for the structure of a Contributor application.
A digital trunking facility standard used in Europe and elsewhere, capable of transmitting and receiving 30 digitized voice or data channels. Two additional channels are used for synchronization, framing, and signaling. The transmission rate is 2048 kilobits per second. See also T1.
See error detect timeout value.
See expansion port.
See extended attribute.
See Enterprise Address Book.
See Enterprise Application Integration.
See enterprise asset management.
See effective address overflow exception.
See enterprise archive.
See enterprise archive.
earliest start time
The time after which a job or job stream can start, provided that all other time restrictions and dependencies are satisfied. Earliest start time is set using the at Job Scheduling Console option or in the command-line scheduling language using the at keyword. See also latest start time, planned start time, scheduled time.
To connect one process to another process so that a specific version of the called process is used. The calling process always uses the specified version of the invoked process even if updated versions are available.
The connection between two processes that uses a specified version of the invoked process. As a result, the calling process uses the specified version of the process that it is invoking, even when updated versions are available.
A measure of the value of work performed so far. Earned value uses original estimates and progress-to-date to show whether the actual costs incurred are on budget and whether the tasks are ahead or behind the baseline plan.
See enterprise application project.
See enterprise access security.
ease of use leader (EOU leader)
See user experience leader.
See extended address volume.
See Euro Banking Association.
- See Extended Binary-Coded Decimal Interchange Code.
- See Extended Binary Coded Decimal Interchange Code.
EBCDIC double-byte encoding scheme
A structure that has separate, allocated coding space for control characters and graphic characters. Control characters do not have 16-bit codes in the EBCDIC structure definition. Graphic characters have a range from 4141 to FEFE. The space character is at 4040.
EBCDIC single-byte encoding scheme
An 8-bit-per-byte structure. The EBCDIC single-byte structure has a valid code-point range for 00 to FF. Control characters have a range from 00 to 3F. Graphic characters have a range from 41 to FE. The space character is 40.
See extended border node.
See effective Boolean value.
See engineering change.
See electronic code book mode.
See error correction code.
See extended CICS dynamic storage area.
See Enhanced Connectivity Facility.
- A command, native to the bash and C shells, that writes arguments to standard output.
- In computer graphics, the immediate notification of the current values provided by an input device to the operator at the display console.
- In data communication, a reflected signal on a communication channel. An echo verifies the accuracy of the signal
- In word processing, to print or display each character or line as it is typed.
A filter algorithm that is used to compare a copy of the voice data being sent to a caller with the voice data being received from the caller. Any echo of the sent data is removed before the received data is sent on, for example, to a speech recognizer.
See external call interface.
See extended count key data.
See extended count key data device.
An open-source, standard platform for building integrated development environments (IDEs) that can be used to create applications, such as websites, embedded Java programs, or Enterprise JavaBeans. The platform discovers, integrates, and runs the integrated modules called plug-ins that exist within its environment.
See Ecma International.
See Electronic Commerce Modeling Language.
The concept of reducing the waste and resources that go into producing goods and services. Businesses that adapt eco-efficiency decrease their impact on the environment and typically lower their costs.
economic order quantity (EOQ)
The optimum reorder quantity of an item, in the specified units of order, to be used as the default or standard reorder amount. The economic order quantity is a calculation of the optimum reorder amount that balances the costs of keeping inventory in stock and the costs of reordering inventory items.
See electronic customer support.
See extended common service area.
See execution diagnostic facility.
- See link.
- In transaction monitoring, the point at which a transaction first comes in contact with the monitoring instrumentation.
- A return value or possible result from a state table action.
See link crossing.
See electronic data interchange.
EDI data element
A single item of data in an EDI document, such as a purchase order number, that corresponds to a ROD field in a ROD document definition. An EDI data element is equivalent to a simple element. It is also used to maintain EDI composite data elements.
EDI document definition
A description or layout of an EDI document, which comprises loops, EDI segments, EDI data elements, and EDI composite data elements. It is equivalent to the layout of an EDI transaction or an EDI message.
A group of consecutive EDI segments that repeat together in an EDI document definition. There is no object type in Data Interchange Services that defines an EDI loop on its own. EDI loops are logically defined within an EDI document definition.
In UN/EDIFACT EDI Standards, a group of logically related data that makes up an electronic business document, such as an invoice. It is equivalent to an EDI transaction. Called an EDI document definition in Data Interchange Services.
EDI message set
A group of logically related data that make up an electronic business document, such as an invoice or a purchase order. A single EDI document. The layout of an EDI transaction is described by an EDI document definition in Data Interchange Services.
A group of related EDI data elements. An EDI segment is a single line in an EDI document definition, beginning with a segment identifier and ending with a segment terminator delimiter. The EDI data elements in the EDI segment are separated by data element delimiters.
- To add, change, delete, rearrange, or modify the form or format of data.
- To change a numeric field for output by suppressing zeros and inserting commas, periods, currency symbols, the sign status, or other constant information.
A section of objects in a module that does not inherit access from the parent and can be locked and edited independently of other objects when the module is opened in shareable edit mode.
A letter or number indicating that editing should be done according to a defined pattern before a field is displayed or printed. See also edit word.
A byte string that tells the edit machine instruction or the Edit (QECEDT) API how to format a numeric value into a readable character string. An edit mask can format a numeric value so that languages that cannot use machine instructions directly can take advantage of this function.
In X12 EDI Standards, a group of logically related data that makes up an electronic business document, such as an invoice. It is equivalent to an EDI message. The layout of an EDI transaction is described by an EDI Document Definition in Data Interchange Services.
A user-defined word with a specific format that indicates how editing should be done. See also edit code.
See exchange data link.
See engine dispatchable unit.
See end-to-end credit.
See extended error queue element.
See event forwarding discriminator.
The particular zone configuration that is currently in effect. Only one configuration can be in effect at once. The effective configuration is built each time a zone configuration is enabled.
See effective group identifier.
- An attribute of a process that is used in determining various permissions, including file access permissions. This value is subject to change during the process lifetime.
- The current group ID, but not necessarily the user's own ID. For example, a user logged in under a particular group ID might be able to change to another group ID. The ID to which the user changes then becomes the effective group ID.
See effective user identifier.
effective user ID
The current user ID, although not necessarily the user's login ID. For example, if a user logged in under a login ID changes to another user's ID, that ID becomes the effective user ID until the user returns to the original login ID. All discretionary access decisions are based on the effective user ID.
An interface that enables an external agent (such as an autonomic manager) to perform operations or change the state of a managed resource. An effector is used to alter data in a managed resource, whereas a sensor is used to retrieve data from a managed resource. See also execute component, manageability interface, managed resource, sensor, touchpoint.
The estimated hours of work required for an activity. Effort is calculated based on the specified duration (in days) of the activity, and the number of working hours per day specified in the project calendar. See also work.
A character data in scientific notation, where a numeric value part is followed by an exponent indicator, usually the letter 'E', and a possibly signed integer that indicates a power of ten by which the numeric value should be multiplied.
See Encrypted File System.
See electronic general availability.
See Enterprise Generation Language.
See EGL archive file.
EGL Rich UI
A technology for writing client-side web applications in EGL. Rich UI lets traditional business developers create code that provides advanced web function such as instantaneous changes to a web page and dynamic use of Ajax, as well as calls to the following kinds of web services: REST and SOAP.
See Exterior Gateway Protocol.
See electronic health record.
In data communications, a specification of the Electronic Industries Association (EIA) that defines the interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) using serial binary data interchange.
An EIA interface standard that defines the physical, electronic, and functional characteristics of an interface line that connects a communication device and associated workstation. It uses a 25-pin connector and an unbalanced line voltage.
In data communication, a specification of the Electronic Industries Association (EIA) that defines the electrical characteristics for balanced voltage digital interface circuits for the interchange of serial binary data between data terminal equipment (DTE) and data circuit-terminating equipment (DCE), or any point-to-point interconnection of serial binary signals between digital equipment.
An EIA interface standard that defines the physical, electronic, and functional characteristics of an interface line connecting a computer to communications equipment. It uses a balanced line voltage for noise reduction and longer distance capability. The system unit uses the send and receive pins from the set of 40 pins defined by the EIA-422A interface.
In data communication, a specification of the Electronic Industries Association (EIA) that defines the electrical characteristics for unbalanced voltage digital interface circuits for the interchange of serial binary data between data terminal equipment (DTE) and data circuit-terminating equipment (DCE), or any point-to-point interconnection of serial binary signals between digital equipment. The international equivalent is CCITT Recommendation V.10.
In data communication, a specification of the Electronic Industries Association (EIA) that defines the interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) employing serial binary data interchange. EIA-449, together with EIA-422 and EIA-423, is intended to gradually replace EIA-232 and is used for high speed data transmission (up to 10 Mbps). There is no international equivalent, although ISO 4902 is partly covered in 449.
See EXEC interface block.
See Enterprise Identity Mapping.
See execution interface program.
See enterprise information system.
See Extended Industry Standard Architecture.
See Enterprise JavaBeans.
See enterprise bean.
A container that implements the EJB component contract of the Java EE architecture. This contract specifies a runtime environment for enterprise beans that includes security, concurrency, life cycle management, transaction, deployment, and other services. (Sun) See also EJB server.
A form of inheritance in which an enterprise bean inherits properties, methods, and method-level control descriptor attributes from another enterprise bean that resides in the same group.
In EJB query language, a string that contains an optional SELECT clause specifying the EJB objects to return, a FROM clause that names the bean collections, an optional WHERE clause that contains search predicates over the collections, an optional ORDER BY clause that specifies the ordering of the result collection, and input parameters that correspond to the arguments of the finder method.
EJB query language
A query language that defines finder methods for entity beans with container managed persistence. The definition uses a language based on SQL that allows searches on the persistent attributes of an enterprise bean and associated bean attributes.
Software that provides services to an EJB container. An EJB server may host one or more EJB containers. (Sun) See also EJB container.
- The phase of the software development life cycle in which the functions and the architecture of a product are defined.
- In Ada language, the elaboration of a declaration is the process by which the declaration achieves its effect (such as creating an object); this process occurs during program execution.
For a thread or an agent, the total time spent within a monitored time interval. See also processing time.
electromagnetic compatibility (EMC)
The design and test of products to meet legal and corporate specifications dealing with the emissions and susceptibility to frequencies in the radio spectrum. Electromagnetic compatibility is the ability of various electronic equipment to operate properly in the intended electromagnetic environment.
electronic code book mode (ECB mode)
A method of enciphering and deciphering data in address spaces or data spaces. Each 64-bit block of plaintext is separately enciphered and each block of the ciphertext is separately deciphered.
Electronic Commerce Modeling Language (ECML)
In e-commerce, a universal format for wallets that streamlines the collection of electronic data for shipping, billing, and payment on a merchant's website and thereby enhances the online shopping experience for consumers and merchants. IBM is one of many companies that are collaborating to develop ECML.
electronic customer support (ECS)
A part of the operating system that allows a customer to access the question-and-answer (Q & A) function; problem analysis, reporting, and management; IBM product information; and technical information exchange.
electronic general availability (eGA)
See also physical general availability.
electronic health record (EHR)
An individual's medical record in digital format. An EHR is usually accessed on a computer, often over a network. It can be made up of electronic medical records (EMRs) from many locations, sources, or both. Doctors and hospitals own and manage their information in the PHR. See also personal health record.
Electronic Industries Alliance (EIA)
An organization of electronics manufacturers that advances the technological growth of the industry, represents the views of its members, and develops industry standards.
Electronic Industries Association (EIA)
See Electronic Industries Alliance.
A device that slides into a slot on some System i product control panels. When the keystick is in place, it electronically unlocks functions at the key pad on the control panel. This allows a system operator to select an operating mode. When the keystick is removed, those functions are electronically locked, which prevents those without authority from placing the machine in some other mode.
electronic medical record (EMR)
An electronic record consisting of many forms of data such as patient demographics, medical history, medicine and allergy lists, laboratory test results, radiology images, billing records, and advanced directives.
electronic serial number (ESN)
Unique identification number embedded in a wireless phone by the manufacturer to prevent fraud. ESN differs from the mobile identification number, which is the wireless carrier's identifier for a phone in the network.
Electronic Service Agent (ESA)
A function that provides automatic hardware problem-reporting to help predict and prevent hardware errors by early detection of potential problems. With this function, users can also download fixes and automatically submit problems to IBM when appropriate.
electronic signature (ESIG)
A stamp that is added to mail messages, fields, or sections that verifies that the person who originated the message is the author and that no one has tampered with the data.
- An undesirable discharge of static electricity that can damage equipment and degrade electrical circuitry.
- The flow of current that results when objects having a static charge come into close enough proximity to discharge.
- In Java development tools, a generic term that can refer to packages, classes, types, interfaces, methods, or fields.
- In AIXwindows, an object or similar data structure having the properties that define a class.
- An object that encompasses a set of versions, organized into a version tree.
- An entity that satisfies all of the conditions of belonging to a given set. For example, an element within an array can be accessed by using the array index. See also array, associative array, ordinary array.
- The smallest unit in a table, array, list, set, or other structure. Examples of an element are a value in a list of values and a data field in an array.
- In Informix, a member of a collection, such as a LIST, MULTISET, or SET data type. An element can be a value of any built-in data type, opaque data type, distinct data type, named row type, unnamed row type, or collection data type.
- A graphical entity of one of three types: line, arc, or circle. Elements form the drawing component of the drawing file.
- A value in a security label component. See also security label component.
- A part of a section. Each element represents a separate class of data and is identified by a section name and class name. See also subarea.
- A collection of attribute values describing a specific entity, such as a product, project or portfolio.
- A constituent of a model.
- A member of a dimension.
- A component of a document, such as an EDI, XML, or ROD record. An element can be a simple element or a compound element.
- A named piece of information, or a field, within a message, that has a business meaning agreed by the applications that create and process the message. See also complex element, simple element.
- In markup languages, a basic unit consisting of a start tag, end tag, associated attributes and their values, and any text that is contained between the two.
In SNA, a value in the element field of the network address that identifies a specific resource within a subarea. See also subarea address.
In AFP Utilities, a mark that is used to show the position of an element on a display; for example, '*B005' where B means bar code and 005 is the fifth element. See also element name.
In AFP Utilities, a name that appears in the image area instead of an element mark. See also element mark.
See data element delimiter.
All the instances of an element with a particular value in a collection. In a non-unique collection, an element value may have more than one occurrence. In a unique collection, element value is synonymous with element occurrence.
See external line format message.
See enhanced logical link control.
See extended link pack area.
The part of an if statement that contains the keyword 'else' followed by a statement. The else clause provides an action that is started when the if condition evaluates to a value of 0 (false).
See extract, load, and transform.
A unit of measure equal to the width or the height of the character "m" in a particular font. In a uniformly spaced font, an em is equivalent to a character. See also en.
A method of delivering merchandising and marketing content to customers. Email activities deliver customized email messages, based on JSP templates, which can include advertisements, suggestive selling initiatives, and promotions, among other merchandising and marketing content.
An email outline that serves as the basis for email content issued via an email activity. The email template is a model by which the business user defines email message content and optional placeholders for personalized content.
Pertains to a version of prerequisite middleware, for example an application server, that is included with and installed by another software product. Embedded middleware usually represents a functional subset of a licensed middleware product.
The type of user assistance that is integrated into product user interfaces. It is transparent to the user in that it does not require any user interaction to display it or interact with it. For example, embedded assistance includes inline text, user interface labels, and command-line syntax statements.
A computer system that is a component of a larger machine or system. Embedded systems can respond to events in real time. Hosts of embedded systems include watches, household appliances, cars, and cellular phones.
embedded text control
One or more bytes of control information, preceded by an escape character, contained within a set of text. The text control controls certain operations on following text, but it is not itself printed.
See electromagnetic compatibility.
See Enterprise Metadata Discovery.
See Europe, Middle East, and Africa.
- A restart of IMS following an IMS or z/OS failure. See also cold start, normal restart.
- The CICS backout facility for an automatic restart following a system failure. It restores the recoverable resources updated by each interrupted transaction to the condition they were in when the transaction started.
A server thread that becomes available when either the work queue (the number of pending operations) or the time limit threshold since the last item was removed from the work queue is exceeded. This thread provides a method for the administrator to access the server during a denial of service attack.
See expedited message handling.
See expedited message handler queue.
See electromagnetic interference.
See ESCON multiple image facility.
See event monitoring point.
Highlighting, color change, or other visible indication of conditions relative to an object or choice that affects a user's ability to interact with that object or choice. Emphasis can also give a user additional information about the state of a choice or an object.
The property of double-strike printing in which characters are printed in multiple passes (usually two) with a slight offset, creating an artificial bold type. Emphasized printing is used to fill gaps and rough appearance in dot-matrix character forms. It also prints a bold font without changing the mounted character set.
See electronic medical record.
See event management services.
The use of software, hardware, or both by one system to imitate another system. The imitating system accepts the same data, runs the same programs, and achieves the same results as the imitated system.
The function of a network control program that enables it to emulate a transmission control unit. See also network control mode.
- A program that allows a host system to communicate with a workstation in the same way as it would with the emulated terminal.
- A control program that permits functions written for one system or device to be run on another system or device. See also network control program.
- A program that causes a computer to act as a workstation attached to another system.
- A facility of the integration test client that enables the emulation of components and references during module testing. Emulators are either manual or programmatic. See also manual emulator, programmatic emulator.
emulator high-level language application programming interface (EHLLAPI)
An application programming interface that provides programming access to the area in computer memory that corresponds to the user's screen image (this area in memory is known as the "presentation space").
A unit of measure equal to one-half the width of an em. For many typefaces, the average width of lowercase characters tends to be equal to the width of an en. See also em.
- Pertaining to an object that is accepting new data and is processing them. When an object is created, it is enabled.
- In VTAM, pertaining to a logical unit (LU) that has indicated to its system services control point (SSCP) that it is ready to establish LU-LU sessions. The LU can separately indicate whether this prevents it from acting as a primary logical unit (PLU) or a secondary logical unit (SLU). See also disabled, inhibited.
- Pertaining to a state of the processing unit that allows the occurrence of certain types of interruptions. See also disabled.
- Pertaining to the state in which a communication device can accept incoming calls on a line.
- A condition of the printer (physically selected) in which the printer is available to the host processor for normal work. The enabled condition is also called online.
- Pertaining to a condition that results in the execution of condition handlers or in the performance of a standard system action to handle the condition.
The default object mode in which database objects are enabled. When a constraint, index, or trigger is in this mode, the database server recognizes the existence of the object and takes the object into consideration while executing data manipulation statements.
The first step of the condition handling model during which it is determined whether an exception is to be enabled and processed as a condition. See also condition step, termination imminent step.
enabling-new-function mode (ENFM)
A transitional mode of operation in the version-to-version migration process, during which the DB2 subsystem or data sharing group prepares to use the new functions of the new version. When operating in enabling-new-function mode, a DB2 data sharing group cannot coexist with members that operate at the prior version level. In enabling-new-function mode, fallback to a prior version is not supported, and new functions of the new version are not available for use. See also conversion mode, conversion mode*, enabling-new-function mode*, new function mode.
enabling-new-function mode* (ENFM*)
A transitional mode of operation in the version-to-version migration process that applies to a DB2 subsystem or data sharing group that was in new-function mode (NFM) at one time. When operating in enabling-new-function mode*, a DB2 subsystem or data sharing group is preparing to use the new functions of the new version but cannot yet use them. A data sharing group that operates in enabling-new-function mode* cannot coexist with members that operate at the prior version level. Fallback to a prior version is not supported. See also conversion mode, conversion mode*, enabling-new-function mode, new function mode.
- In object-oriented programming, the technique that is used to hide the inherent details of an object, function, or class from client programs.
- In communication, a technique used by layered protocols by which a layer adds control information to the protocol data unit (PDU) from the layer it supports. In this respect, the layer encapsulates the data from the supported layer. In the Internet suite of protocols, for example, a packet would contain control information from the physical layer, followed by control information from the network layer, followed by the application protocol data. See also data link switching.
To reduce the size of a dictionary file. The process converts a series of single entry linear search nodes into a single chain node for the entire string, thus reducing the size of the finite state transducer (FST). Typically, enchaining is less efficient at reducing the size of a dictionary than contraction.
- See encrypt.
- To scramble data or to convert data to a secret code that masks the meaning of the data to any unauthorized recipient. See also cryptographic, decipher.
- A transaction that can span multiple dispatchable units (service request blocks and tasks) in one or more address spaces and is reported on and managed as a unit.
- In Language Environment, an independent collection of routines, one of which is designated as the main routine. An enclave is similar to a program or run unit.
Any software product to which one or more components are assigned. The product is licensed as a whole and determines the licensing relationship of the components that are defined as its parts.
- To convert data by the use of a code in such a manner that reconversion to the original form is possible.
- In computer security, to convert plaintext into an unintelligible form by means of a code system.
A DB2 for i5/OS index that is specialized for quick row selection in query processing. This type of index also provides accurate database statistics, which can improve the optimization of queries. See also radix-tree index.
- A set of rules to represent character data.
- The underlying part of a code page that defines: a) the coding space (the number and allowable value of code points in a code page); b) the rules for sharing the coding space between control and graphic characters; and c) the rules related to the specific options permitted in that scheme, such as the number of bits in a byte, single-byte, or double-byte.
- A set of specific definitions that describe the philosophy used to represent character data. The number of bits, the number of bytes, the allowable ranges of bytes, the maximum number of characters, and the meanings assigned to some generic and specific bit patterns, are some examples of specifications to be found in such a definition. See also invariant character set.
- The set of rules that specifies the values for control characters and graphic characters. Examples of encoding schemes include ASCII, ISO/IEC 10646, Unicode and IBM's EBCDIC.
See end-node control point.
To systematically scramble information so that it cannot be read without the coding key. See also decrypt.
In computer security, the process of transforming data into an unintelligible form in such a way that the original data either cannot be obtained or can be obtained only by using a decryption process. See also data deduplication.
- See key.
- A mathematical value that allows components to verify that they are in communication with the expected server. Encryption keys are based on a public or private key pair that is created during the installation process.
In SNA, the value (binary 1) of the end bracket indicator in the request header (RH) of the first request of the last chain of a bracket; the value denotes the end of the bracket. See also begin bracket, bracket, conditional end bracket.
In a system period or an application period, the column that indicates the end of the period. See also period.
An event that ends a process flow and, therefore, does not have outgoing sequence flow paths. Types of end events are message, terminate, and error. See also error end event, message end event, terminate end event.
- A node that identifies where a rule flow stops. A rule flow has at least one end node.
- In SNA, a node in an APPN network that can be a source or target node, but does not provide any routing or session services to any other node.
- A visual marker within a process that identifies where a particular flow ends. Other concurrent flows within the same process will still continue executing.
end-node control point (ENCP)
A control point that provides its own configuration, session, and management services with assistance from the control point in its serving network node. An ENCP is capable of engaging in CP-CP sessions with other nodes.
In CICS Transaction Server, CICS statistics written to an SMF data set at the quiesce or termination of a CICS run, or at a user-specified time. See also interval statistics, unsolicited statistics.
- A code that signals that the last record of a file has been read.
- On a data medium, a coded character indicating the end of the medium.
An interval during which the system holds a file open after the normal end of the file is reached until one or more records are updated or added to the end of the file. The length of the interval can be specified on the EOFDLY parameter.
In a DBCTL multisegment command, the ENTER key, which is the indicator that defines the end of the last or only segment. See also end-of-segment.
In a DBCTL multisegment command, the command recognition character followed by the ENTER key, which indicates the end of each segment preceding the last segment. See also end-of-message.
end-of-text character (ETX character)
The BSC transmission control character used to end a logical set of records that began with the start-of-text character. See also end-of-transmission-block character.
end-of-transmission-block character (ETB character)
The BSC transmission control character used to end a block of records. See also end-of-text character.
end-of-transmission character (EOC character, EOT character)
A transmission control character used to indicate the conclusion of a transmission that may have included one or more texts and any associated message headings.
- A JCA application or other client consumer of an event from the enterprise information system.
- A host or gateway that comprises part of a virtual private network (VPN) connection.
- The system that is the final destination of an operation.
- One of two points that defines a line or arc. Objects are located by their endpoints.
- The system that is the origin or destination of a session.
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a database local to a node where local RPC servers register binding information associated with their interface identifiers and object identifiers.
endpoint map service
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a service provided by the RPC daemon that maintains a system's endpoint map for local RPC servers. See also partially bound binding handle.
See peripheral node.
endpoint reference (EPR)
An XML structure containing addressing information that is used to route a message to a web service. The addressing information includes the destination address of the message, optional reference parameters for use by the application, and optional metadata. See also managed resource ID.
Any system that is running i5/OS and is connected to the central system. An endpoint system is defined from the central system for the purpose of performing System i Navigator functions.
- The last system in a chain of systems that are linked by any combination of TELNET and pass-through requests.
- See destination node.
end-to-end credit (EE_credit)
In Fibre Channel technology, a credit scheme used to manage end-to-end flow control during the exchange of frames between two communicating devices. See also buffer-to-buffer credit, end-to-end flow control.
end-to-end flow control
The regulation of data transfers over an interface between a source and target. See also end-to-end credit.
In SQL replication, an approximate measurement of the difference between the time that a change takes place in a source table and the time that the change is applied to a target table. See also Apply latency, Capture latency, latency, Q Apply latency, Q Capture latency, queue latency.
A network obtained by connecting one or more fault-tolerant agents in a distributed network to a node in a z/OS network using TCP/IP, to perform workload scheduling. In an end-to-end network, the Tivoli Workload Scheduler for z/OS node becomes the master domain manager of the fault-tolerant agents to schedule and manage jobs in the distributed network. See also engine, workstation.
The process of securing data from a source adapter process, through the WebSphere InterChange Server, to the destination adapter process, ensuring authentication, integrity, and privacy.
The format in which data appears within a client application as literal strings or character variables. End-user formats are useful for data types whose database format is different from the format to which users are accustomed.
A user-defined routine (UDR) that performs a task within an SQL statement that the existing built-in routines do not perform. Examples of tasks include encapsulating multiple SQL statements, creating trigger actions, and restricting who can access database objects.
end-user significant status
A type of significant status that relates to the work associated with a resource. IMS defines conversations, set-and-test-sequence numbers terminals, and Fast Path as end-user significant status for nodes and users. See also command significant status.
For logical unit (LU) 6.2, checking the identification of users by means of identifiers and passwords on attach function-management headers (FMHs). See also LU 6.2 conversation level security.
See enabling-new-function mode.
See enabling-new-function mode*.
A type of lock that a process holds on a region of a file preventing any other process from accessing that region with read or write system calls. In addition, the create command is prevented from truncating the files. See also advisory lock.
enforced subset match conversion/substitution
A conversion where the characters that exist in both the source coded character set identifier (CCSID) and the target CCSID have their integrity maintained. Characters that are not included in the target CCSID are presented to the user as substitution characters. This substitution is permanent. Any loss of character integrity is permanent. An EBCDIC-encoded character that is in the source CCSID but not in the target CCSID is replaced with 3F.
- See InfoSphere Information Server engine.
- The unit that hosts the software for the metadata server.
- A speech recognition process that accepts voice data as input and returns the text form of what was said as output. It is the process which performs the recognition.
- The unit that contains the processors that respond to requests for data from clients. The operating software for the IBM TotalStorage appliance resides in the engine. See also storage port.
- A component of the system that uses information entered through the management console and stored in the database to control project execution, send notification emails, and communicate with agents (running on servers).
- The core software for the scheduling environment. The engine can be either a z/OS engine or a distributed engine. See also connector, distributed network, distributed workstation, end-to-end network, z/OS network.
engine dispatchable unit (EDU)
A DB2 structure that coordinates application requests to a DB2 database by using a process (on UNIX operating systems) or a thread (on Windows operating systems) to carry out instructions on behalf of the DB2 database system. See also agent.
The logical group of engine components for the InfoSphere Information Server suite and product modules (the InfoSphere Information Server engine components, service agents, and so on) and the computer or computers where those components are installed.
Enhanced 5250 Emulation
A program that allows a personal computer and a printer to be attached to a System i product and perform the functions of one or two 5250 workstations on one twinaxial cable. The workstations can be one display station, two display stations, or one display station and one printer.
enhanced concurrent mode
A mode in which instances of concurrent LVMs coordinate changes between nodes through the group services component of the Reliable Scalable Cluster Technology (RSCT) facility. Any disk supported for attachment to multiple nodes can be used in enhanced concurrent mode. See also fast disk takeover, forced vary on.
enhanced conflict detection
In SQL replication, conflict detection that guarantees data integrity among all replicas and the source table. The Apply program locks all replicas or user tables in the subscription set against further transactions. It begins detection after all changes made before locking have been captured.
Enhanced Data GSM Environment (EDGE)
A faster version of the GSM wireless service that is designed to deliver data at rates up to 384 Kbps and enable the delivery of multimedia and other broadband applications to mobile phone and computer users. The EDGE standard is built on the existing GSM standard, using the same time-division multiple access (TDMA) frame structure and existing cell arrangements.
enhanced logical link control (ELLC)
An X.25 protocol that allows the transfer of data link control information between two adjoining SNA nodes that are connected through an X.25 packet-switching data network. ELLC enhances error detection and recovery. See also physical services header, Qualified Logical Link Control.
A collection of basic functions for developing a variety of application environments. Toolkit functions manage Toolkit initialization, widgets, memory, events, geometry, input focus, selections, resources, translation of events, graphics contexts, pixmaps, and errors.
A change request for a new feature or functionality. See also change request.
See enquiry character.
To put a message or item in a queue. See also dequeue.
- The process of entering and saving user or user group information in a portal.
- An entitlement for an organization to subscribe to a business service.
A digital document that enables licenses to be distributed to users. The document contains all the information that is related to the licenses acquired for a license-enabled product.
A collection of one or more System z nodes (including any attached zBX) that are managed as a single logical virtualized system by the zManager, through the use of a Hardware Management Console.
Enterprise Address Book (EAB)
A collection of information about people, departments, and locations in an enterprise. Information about people may include telephone numbers, mailing addresses, and the department in which a person works. Department information may include the department name, the manager, and the department name the department reports to. Location information may contain a mailing address. On a System i product, the EAB is the system distribution directory.
See Java EE application.
enterprise application project (EAR project)
A structure and hierarchy of folders and files that contain a deployment descriptor and IBM extension document as well as files that are common to all Java EE modules that are defined in the deployment descriptor.
enterprise archive (EAR)
A specialized type of JAR file, defined by the Java EE standard, used to deploy Java EE applications to Java EE application servers. An EAR file contains EJB components, a deployment descriptor, and web archive (WAR) files for individual web applications. See also Java archive, web archive.
A component that implements a business task or business entity and resides in an EJB container. Entity beans, session beans, and message-driven beans are all enterprise beans. (Sun) See also bean.
A method of setting up servers so that the administrator can distribute the configuration of one of the servers to the other servers, using server-to-server communication. See also configuration manager, managed server, profile, subscription.
A database that is designed to support a large, networked organization. An enterprise database offers scalability, security, and administrative features for large, complex projects.
Enterprise Generation Language (EGL)
A high-level language that allows developers to focus on business logic as they create complex business applications for deployment in any of several environments, including the web. The language simplifies database and message-queue access, as well as the use of Java EE.
enterprise identifier (EID)
A work identifier for a distributed transaction that is both a local and a global identifier. The format of the EID is a concatenation of the transaction identifier (TID) and global transaction identifier (GTID).
Enterprise Identity Mapping (EIM)
A mechanism for associating a person or entity to the appropriate user identities in various user registries throughout an enterprise. EIM provides application programming interfaces (APIs) for creating and managing these identity mapping relationships, as well as APIs that applications use to query this information.
- In System Manager, all the resources that the applications manage and the functions for managing them.
- The applications that comprise an enterprise's existing system for handling company-wide information. An enterprise information system offers a well-defined set of services that are exposed as local or remote interfaces or both. (Sun) See also resource adapter.
The process of sending events from a server to a designated event server. The event server routes the events to designated receivers, such as to a user exit. See also event.
Enterprise Metadata Discovery (EMD)
A specification that allows a user to examine an Enterprise Information System (EIS) and get details of business object data structures and APIs. An EMD stores the definitions as XML Schemas by default, and builds components that can access the EIS.
enterprise model innovation
Innovating the role we play in the value chain by changing our extended enterprise and networks with employees, suppliers, customers, and others, including capability/asset configuration. See also industry model innovation, revenue model innovation.
A component of the data server that records and stores all information about the monitored computers' storage assets and their usage over time. The repository is organized into relational database tables and is accessed by the data server using Java Database Connectivity (JDBC).
enterprise search base annotator
A set of standard text analysis engines used in enterprise search for default document analysis processing. See also custom text analysis engine.
A robust, powerful server with extensive capabilities and resources that can provide the necessary reliability, availability, and scalability for network computing. Other computers can connect to the enterprise server and share the facilities that it provides. Examples of enterprise servers include the IBM S/390 family of servers.
enterprise service bus (ESB)
A flexible connectivity infrastructure for integrating applications and services; it offers a flexible and manageable approach to service-oriented architecture implementation.
Enterprise Systems Architecture/390 (ESA/390)
An IBM architecture for mainframe computers and peripherals. Processor systems that follow the ESA/390 architecture include the ES/9000 family. See also z/Architecture.
Enterprise Systems Connection (ESCON)
A peripheral interface for an Enterprise Systems Architecture/390 and zSeries computer. The I/O interface uses ESA/390 logical protocols over a serial interface that configures attached units to a communication fabric.
Enterprise Tagging Service (ETS)
A central warehouse for tags entered by IBMers, regardless of where these tags were applied, whether to a blog, a ThinkPlace idea, a bookmark, a person, etc. At its core, then, ETS essentially acts as a tag management system to store, normalize and analyze tags.
- A database object such as a table or column in a relational database.
- A simple Java class that represents a row in a database table or entry in a map.
- In OSI, the representation of a layer on a given open system.
- A user, group, or resource that is defined to a security service, such as RACF.
- In markup languages such as XML, a collection of characters that can be referenced as a unit, for example to incorporate often-repeated text or special characters within a document.
- An element in an XML schema.
- A person, object, or concept about which information is stored.
- In object-oriented design, an item that can be treated as a unit and, often, as a member of a particular category or type. An entity can be a concrete thing or an abstract idea.
- A collection of one or more identities that represent the same person, organization, place, or item. See also attribute, entity model, identity, relationship.
In EJB programming, an enterprise bean that represents persistent data maintained in a database. Each entity bean carries its own identity. (Sun) See also session bean.
A class used to model information that has been stored by the system, and the associated behavior. A generic class, reused in many use cases, often with persistent characteristics. An entity class defines a set of entity objects, which participate in several use cases and typically survive those use cases.
The database that stores identities, entities, and data that is used for relationships, resolutions, and alerts. The entity database might also store configuration, routing, and monitoring settings, if users did not choose to create a separate application monitor database and Configuration Console database. See also application monitor database, Configuration Console database.
In XML programming, a construct that refers to an entity. References to parsed general entities use an ampersand (&) and a semicolon (;) as delimiters. Entity references are used to make literal characters that are not valid in XML.
The process that compares one or more identities and determines if they represent the same entity or two different entities. If two identities are determined to represent the same person, organization, place, or item, they are resolved into a single entity; otherwise, they are unresolved into two separate entities. See also pipeline.
- A collection of information about a cataloged object in a master or user catalog. See also entry name.
- In Ada language, an entry is used for communication between tasks. Externally, an entry is called just as a subprogram is called; its internal behavior is specified by one or more accept statements specifying the actions to be performed when the entry is called.
- A single input operation on a workstation.
- An element of information in a table, list, queue, or other organized structure of data or control information.
- In FORTRAN, a language construct within a procedure, designating the start of the execution sequences of the procedure.
The set of generic and specific conditions for permitting a process to go forward with a defined task, e.g. test phase. The purpose of entry criteria is to prevent a task from starting which would entail more (wasted) effort compared to the effort needed to remove the failed entry criteria. (ISTQB)
The description of a personal directory entry. Each personal directory entry has an identical structure. The entry structure determines the type and size of each field in a personal directory entry.
- In assembler language, a programmer-specified name within a control section that identifies an entry point and can be referred to by any control section.
- A unique name for an entry, which is the same as the data set name in a data definition (DD) statement that describes the object. See also entry.
See attribute instance.
An attribute that can be a user or a group, similar to what is allowed within the aclEntry. Each object has an associated entryOwner attribute. However, the entryOwner subject has certain privileges over the object.
- In a routine, any place to which control can be passed.
- The address or label of the first instruction processed or entered in a program, routine, or subroutine.There might be a number of different entry points, each corresponding to a different function or purpose.
A physical ordering of data records in auxiliary storage according to ascending relative byte address (RBA) without respect to their contents. See also key sequence.
- A data set whose records are loaded without respect to their contents, and whose relative byte addresses cannot change. Records are retrieved and stored by addressed access, and new records are added at the end of the data set.
- A VSAM data set whose records are physically in the same order in which they were put in the data set. A VSAM data set is processed by using addressed direct access or addressed sequential access and has no index. New records are added at the end of the data set.
A template that allows the user to create a document, folder, or custom object. The template provides default values for the destination folder, properties, and security. See also form data entry template, template.
A thread which is used by the CICS DB2 attachment facility for transactions with special requirements, such as high priority transactions, or transactions with special accounting needs. See also command thread, pool thread.
Any value that a user enters for a project. An entry-type attribute can be configured with a default value, which users can accept or replace as they create or modify requirements. See also attribute type, attribute value, list-type attribute.
See enumeration constant.
A model element in class diagrams that represents user-defined data types. See also enumeration literal.
enumeration constant (enum constant)
In the C or C++ language, an identifier, with an associated integer value, defined in an enumerator. An enumeration constant may be used anywhere an integer constant is allowed.
- In the Fortran, C, and C++ language, a data type that represents a set of values that a user defines.
- A data type that represents integers and a set of enumeration constants with associated integer values.
A model element in a class diagram that represents a named value in an enumeration. See also enumeration.
- A data type that defines a set of enumeration constants. In the C++ language, an enumeration type is a distinct data type that is not an integral type.
- In Ada language, a discrete type whose values are represented by enumeration literals which are given explicitly in the type declaration. These enumeration literals are either identifiers or character literals.
See enumeration type.
- A string of data representing information about a message aside from the attachments and its recipients.
- A control structure containing documents.
- A combination of header, trailer, and control segments that define the start and end of an individual EDI message. Each envelope in EDI data begins with a particular segment and ends with a particular segment.
- A container stored in a user's profile that contains the user's encrypted password or password phrase so that it can be retrieved and decrypted by authorized users as part of a password synchronization solution.
A value used to define the format and contents of an envelope, so that the programs that work with specific types of envelopes are supported. The envelope types supported on a system are defined when the mail server framework is configured. The value associated with an envelope type must be a unique type value.
- In AIX Common Desktop Environment, the set of rule files, resources, and message files that define the appearance and behavior of a specific desktop configuration.
- A structure within the message tree that is user-defined, and that can contain variable information that is associated with a message while it is being processed by a message flow.
- A named collection of logical and physical resources used to support the performance of a function.
- A specific instance of a configuration of hardware and software.
- A container for a list of variables. An environment can be assigned explicitly to servers, projects, and steps.
- The settings for shell variables and paths that are set when the user logs in. These variables can be modified later by the user.
Data that the storage control must report to the host. The data can be service information message (SIM) sense data; logging-mode sense data; an error condition that prevents completion of an asynchronous operation; a statistical counter overflow; or physical information, such as power supply voltages, air flow and temperature sensors.
Environment Division (ED)
One of the four main parts of a COBOL program. The Environment Division describes the computers on which the source program is compiled and those on which the object program is run; it also provides a connection between the logical concept of files and their records, and the physical characteristics of the devices on which files are stored.
The process that extracts from the system the objects, part of an environment (a selective export), or the entire environment (environment export) and then places the data in a separate file.
The process that adds the objects, part of an environment (a selective import), or the entire environment (environment import) from a file into the system. Before importing the data, the data is validated and standardized.
Environment Services System Services (ESSS)
A component of CICSPlex SM that implements the formal MVS subsystem functions required by the product. ESSS provides cross-memory services, data space management, connection services, and lock management. An ESSS system address space is created at CICSPlex SM initialization and remains in the MVS image for the life of the IPL.
- A variable that specifies how an operating system or another program runs, or the devices that the operating system recognizes.
- A variable that is included in the current software environment and is therefore available to any called program that requests it.
- A variable that provides values for each type of environment in which a process will run (for example, development, test, and production environments). A user can set environment variables for each process application in IBM Process Designer.
- A variable that defines an aspect of the operating environment for a process. For example, environment variables can define the home directory, the command search path, the terminal in use, or the current time zone.
A transportable form of the accessor environment element (ACEE) that can be used within a single system to create the original ACEE without accessing the RACF database. It can be used, with limits, elsewhere in a single sysplex to recreate the original ACEE without accessing the RACF database. See also accessor environment element.
See end of block.
See end-of-transmission character.
See end-of-transmission code.
See Exceed on Demand.
See economic order quantity.
See end-of-transmission character.
See end-of-transmission code.
See end-of-tape marker.
See ease of use leader.
See Error Protocol.
See event processing adapter.
ephemeral port number
In some TCP/IP implementations, a temporary port number that is assigned to a process for the duration of a call. Ephemeral port numbers are typically assigned to client processes that must provide servers with a client port number so that the server can respond to the correct process.
See external presentation interface.
See extended pageable link pack area.
See Executive Program Manager.
See emergency power off.
- The time and date corresponding to 0 in an operating system's clock and time-stamp values. For most versions of the UNIX operating system, the epoch is 00:00:00 GMT, 01 January 1970. System time is measured as the number of seconds past the epoch.
- A timestamp that identifies directory replicas as being part of the same set.
See emergency power-off warning.
See end-to-end probe platform.
See endpoint reference.
See erasable programmable read-only memory.
See extended pointer set.
See extended partition specification table.
See error processor vector table.
See error queue element.
A join whose join condition uses only the equals predicate. See also join.
See data terminal equipment.
The graphic component that is designed to display and interact over telecommunication equipment such as shelves, cards, ports, links, and LEDs. See also handler.
- A grouping of characters or character strings that are considered equal for purposes of collation. For example, many languages place an uppercase character in the same equivalence class as its lowercase form, but some languages distinguish between accented and unaccented character forms for the purpose of collation.
- A classification of values for which an object is expected to behave similarly.
See equivalence class.
Pertaining to a security label relationship in which two security labels contain the same security level and the same set of categories. In an equivalent relationship, each label is both dominated by, and dominates the other. See also disjoint, dominant.
erasable programmable read-only memory (EPROM)
A type of memory chip that can retain its contents without electricity. Unlike the programmable read-only memory (PROM), which can be programmed only once, the EPROM can be erased by ultraviolet light and then reprogrammed.
A Resource Access Control Facility (RACF) and DFSMSdfp function that overwrites the space occupied by a data set when the data set is deleted (scratched) from a direct access storage device (DASD) or part of the space is released.
See Employee Referral Bonus Program.
See error-recording data set.
See extended read-only dynamic storage area.
- A discrepancy between a computed, observed, or measured value or condition and the true, specified, or theoretically correct value or condition. See also failure.
- See event.
- A code that describes how the processing of an operation ended at a computer workstation. See also completion code.
- A value that identifies an error condition.
A type of error entry generated by device driver components. Certain device drivers can generate retry operations if an operation is not successful on the first attempt. They use counters to monitor the number and cause of retry operations, and they contain algorithms that decide when these counters should be sent to the error log.
error detect timeout value (E_D_TOV)
The time that a switch waits for an expected response before declaring an error condition. This value is adjustable in 1 microsecond increments from 2 - 10 seconds. See also resource recovery timeout value.
error device driver
A special file (pseudo device) driver used by the error logging facilities. Error entries are written to the error device driver by the errlog() subroutine and the errsave() kernel service. Error entries are read from the error device driver by the error daemon process and saved in the system error log file.
error end event
An end event that also throws an error. See also end event.
See error identifier.
- A value used to identify a unique error condition detected by the hardware or device.
- An 8-character code used to identify a particular failure. There is a unique error identifier for each error record template.
- Any message displayed by DirectTalk in the System Monitor as an alarm and optionally written to the DirectTalk error log, or to the AIX error log (as an alert). Strictly speaking, the term error message should include only red (immediate attention) and yellow (problem situation) messages but it is also used to refer to green (a red or yellow message has been cleared) and white (informational) messages.
- An indication that an error has been detected.
See diagnostic output.
Error Protocol (EP)
A protocol that provides a means for an Internetwork Packet Exchange (IPX) system to report that is has detected an error, and as a result of that error, the IPX system has discarded an IPX packet.
error-recording data set (ERDS)
On S/390 and zSeries hosts, a data set that records data-storage and data-retrieval errors. A service information message (SIM) provides the error information for the ERDS.
error record template
In the AIX operating system, a template that describes the error class, error type, error description, probable causes, recommended actions, and failure data for an error log entry.
error recovery procedure (ERP)
A procedure designed to help isolate and, where possible, to recover from errors in equipment. The procedure is often used in conjunction with programs that record information on machine malfunctions.
error start event
A start event that is triggered by a thrown error. An error start event is used only for event subprocesses as an error handling mechanism. See also start event.
See exception handling.
A classification of errors that identifies whether an error log entry is for a permanent failure, temporary failure, performance degradation, impending loss of availability, or undetermined failure.
See Enterprise Systems Architecture/390.
See External Subsystem Attach Facility.
- A process in which event notifications are sent to a wider list of event destinations as a result of unclearing an event within a certain time frame.
- A course of action that runs when a task is not completed satisfactorily within a specific period of time. See also escalation limit.
The amount of time, for example hours or days, that a participant has to respond to a request, before an escalation occurs. See also escalation.
- To return to the original level of a user interface.
- In markup languages, a series of characters that are used to replace markup-sensitive characters in specific contexts, such as & replaced with &.
- A character that suppresses or selects a special meaning for one or more characters that follow.
- A symbol that is used to modify the interpretation of the character or characters that follow it. Examples of uses of escape characters in SQL are delimiting identifiers, delimiting character constants, and modifying the special meaning of the underscore (_) and percent (%) characters in the LIKE predicate.
- The control character in a text-control sequence that indicates the beginning of a sequence and the end of any preceding text.
See ESCON Manager.
See Enterprise Systems Connection.
- A channel that has an Enterprise Systems Connection channel-to-control-unit I/O interface that uses optical cables as a transmission medium. See also ESCON channel.
- An S/390 or zSeries channel that supports ESCON protocols. See also ESCON channel, parallel channel.
ESCON Director (ESCD)
A class of devices that connect channels and control units only for the duration of an input/output (I/O) operation. See also ESCON Manager.
ESCON host system
An S/390 or zSeries host that attaches to the ESS with an ESCON adapter. ESCON host systems run on operating systems that include MVS, Virtual Storage Extended (VSE), transaction processing facility (TPF), or versions of VM.
ESCON Manager (ESCM)
A licensed program that provides host control and intersystem communication capability for ESCON Director connectivity operations. See also ESCON Director.
ESCON multiple image facility (EMIF)
In mainframe computing, a function that enables logical partitions (LPARs) to share an ESCON channel path by providing each LPAR with its own channel-subsystem image.
In ESS Specialist, the label on a pseudo-host icon representing a host connection that uses the ESCON protocol and that is not completely defined on the ESS. See also access-any mode, pseudohost.
See entry-sequenced data set.
See extended shared dynamic storage area.
See error status element.
See encoding scheme identifier.
See electronic signature.
See Extended Simple Mail Transfer Protocol.
See electronic serial number.
esoteric unit name
An installation-assigned name for a group of devices having similar hardware characteristics; this name is used when requesting a device. For example, an esoteric unit name of TAPE might represent all tape devices in an installation. See also generic unit name.
See extended system queue area.
See extended SQL.
ESQL data type
A characteristic of an item of data that determines how that data is processed. ESQL supports six data types (Boolean, datetime, null, numeric, reference, and string). Data that is retrieved from a database or is defined in a message model is mapped to one of these basic ESQL types when it is processed in ESQL expressions.
ESQL field reference
A sequence of values, separated by periods, that identify a specific field (which might be a structure) within a message tree or a database table. An example of a field reference is Body.Invoice.InvoiceNo.
A single ESQL expression that calculates a resultant value from a number of given input values. The function can take input parameters but has no output parameters; it returns to the caller the value that results from the implementation of the expression. The ESQL expression can be a compound expression, such as BEGIN END.
A sequence of declarations that define MODULE-scope variables and their initialization, and a sequence of subroutine (function and procedure) declarations that define a specific behavior for a message flow node. A module must begin with the CREATE node_type MODULE statement and end with an END MODULE statement. The node_type must be one of COMPUTE, DATABASE, or FILTER. The entry point of the ESQL code is the MODULE scope procedure named MAIN.
See enterprise single sign-on.
See Environment Services System Services.
See extended specify task abnormal exit.
The estimated length of time that an operation will use a workstation. This is initially based on a value that is provided when the operation is defined, but can be adjusted automatically by the feedback mechanism to reflect actual durations.
A scenario that is used to calculate the cost of the labor, material, and other resources that are required to perform construction work. An estimate request is typically aligned with an individual construction project.
A version of the estimate request that compares the costs of different project scenarios. Multiple versions for an estimate request can be created with different filter settings to represent scenarios for the project.
See end-of-transmission-block character.
See extended time division multiple access.
See extended trusted dynamic storage area.
See eject to front facing.
A packet-based networking technology for local area networks (LANs) that supports multiple access and handles contention by using Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the access method. Ethernet is standardized in the IEEE 802.3 specification. See also local area network.
A baseband local area network (LAN) with a bus topology in which messages are broadcast on a coaxial cable using a carrier sense multiple access/collision detection (CSMA/CD) transmission method.
See extract, transform, and load.
See Extended Terminal Option.
A template that contains information about the physical characteristics of terminals, user options and message queue names, and remote LTERMs associated with MSC links. See also logon descriptor, MFS device descriptor, MSC descriptor, user descriptor.
See event-triggered tracking.
See end-of-text character.
See Extended UNIX Code.
EUC encoding scheme
See Extended UNIX Code encoding scheme.
See extended user dynamic storage area.
See extended unique identifier.
- An association of banks that manages the EBA clearing system through ABE Clearing SAS. The EBA is connected to the S.W.I.F.T. network in a manner similar to other S.W.I.F.T. users. The EBA monitors the operations of the EBA Clearing Service (a netting payment system), in particular the positions of all the clearing banks, through a direct connection to the clearing computer.
- The netting payment system maintained by the Euro Banking Association.
European Telecommunications Standards Institute (ETSI)
A European organization founded in 1988 and responsible for the establishment of technical telecommunications standards. It produces European Telecoms Standards (ETS) for its membership, which consists of network operators, PTT manufacturers, users, and research institutes. Some of these functions used to be performed by the Commission of European Post and Telegraph. ETSI is similar in function to the International Telecommunication Union. See also Commission of European Post and Telegraph, International Telecommunication Union.
A product that is capable of correctly processing monetary data in the euro denomination. For a product to be considered EuroReady, all products with which it is used must also be EuroReady. IBM hardware products that are EuroReady might or might not have an engraved euro sign key on their keyboard.
- A change to data in an enterprise information system (EIS) that is processed by the adapter and used to deliver business objects from the EIS to the endpoints (applications) that need to be notified of the change.
- A row or a series of rows of data.
- An occurrence of significance to a task or system. Events can include completion or failure of an operation, a user action, or the change in state of a process. See also alert, enterprise logging, event report, indication, journal receiver, message, receiver, resource model, situation.
- A meeting or web conference that is scheduled in advance. It includes added features such as the capability to assign multiple presenters, or send automated email announcements.
- A change to an application entity that triggers a business object. This business object, which contains data and a verb, becomes an event in the WebSphere business integration system. See also application event.
- A transition in database activity caused by users, applications, or the database manager. Events include connections, deadlocks, and transactions. See also event monitor.
- An element that triggers an action based on a timer, a message arriving from an external system, or some other occurrence such as a runtime exception. Events can be used to control or alter process flow during execution.
- A user or system activity that is logged with an appropriate message.
- A change to a state, such as the completion or failure of an operation, business process, or human task, that can trigger a subsequent action, such as persisting the event data to a data repository or invoking another business process.
- A system-level action that occurs during the processing of a workflow. For example, an event occurs when a workflow is created or when a step processor begins processing a work item.
- In computer graphics, information generated either asynchronously from a device or as the side-effect of a client request. Events are grouped into types and are not sent to a client by the server unless the client has issued a specific request for information of that type. Events are usually reported relative to a window.
- The action that IBM Director takes in response to a specific event or events.
- A script, object, or workflow that Content Engine runs, as defined in a subscription.
An XML definition that can be deployed to CICS in a CICS bundle. This bundle can be enabled, disabled, installed, inquired on, and uninstalled. The event binding contains event specifications, capture specifications, and adapter information.
- In the Tivoli Enterprise Console product, a graphical user interface that enables system administrators to view and respond to dispatched events from the event server.?
- A number assigned to a group of trace points that relate to a specific subject or system component. The defined event classes are listed in the trace profile.
The process of analyzing event data to identify patterns, common causes, and root causes. Event correlation analyzes the incoming events for predefined states, using predefined rules, and against predefined relationships.
event correlation sphere
The scope of an ECSEmitter method that allows an event consumer to correlate events. Each event includes the identifier of the correlation sphere to which it belongs and the identifier of its parent correlation sphere from the event hierarchy.
In an event message, the part of the message data that contains information about the event (such as the queue manager name, and the application that gave rise to the event). See also event header.
The process by which the WebSphere business integration system identifies that an application event has been generated. Event detection is part of the overall process of event notification. See also application event, event detection mechanism, event notification, event notification mechanism, event trigger.
event detection mechanism
The mechanism or processes that identify that an application event was generated. For example, some application connectors use database triggers to detect events. See also event detection, event notification.
In DFSMShsm, a space management function similar to primary space management, except it is event-driven instead of scheduled. Low activity data sets are moved from the volume and occupied space is reduced until the volume low threshold is reached. There are two methods of event-driven migration: hourly (interval migration) and immediate (on-demand migration). See also interval migration, on-demand migration.
A component of the Common Event Infrastructure that receives events from event sources, completes and validates the events, and then sends events to the event server based on filter criteria. See also Common Event Infrastructure, event server, event source.
- A filter that specifies the event criteria for an event action plan. Events must meet the criteria specified in the event filter in order to be processed by the event action plan to which the filter is assigned.
- In OSI, a method for excluding certain types of events so that they are not reported.
- A logical expression of criteria that determines which events are forwarded to the application program that registers the event filter with the event sieve agent.
event forwarding discriminator (EFD)
A managed object that describes the criteria used to select which event reports are sent and to whom they are sent. See also discriminator.
A gateway that?represents a branching point in the process where the alternative paths that follow the?gateway are based on events that occur rather than the evaluation of expressions using process data (as with an?exclusive or inclusive gateway).
- A container for inbound events that enables the user to group events without having to create a new monitoring context. Event groups are purely a visual construct and are not represented in the monitor model.
- A set of criteria that is applied to events to identify a subset of those events. The criteria include constraints expressions that define the filter conditions.
- A set of events that meet certain criteria defined by event group filters, which include constraints that are expressions that define the filter conditions. Event console operators can monitor event groups that are relevant to their specific areas of responsibility.
Software that initiates an event response configured by the administrator. See also message consumer.
In an event message, the part of the message data that identifies the event type of the reason code for the event. See also event data.
A feature of InterChange Server that ensures that when multiple collaborations process events containing the same business object instance, the events are processed sequentially in the order received. InterChange Server does not automatically perform event isolation. The collaboration developer must design templates to take advantage of this feature. See also collaboration-object group, port matching.
A type of asynchronous bean that serves as a notification mechanism and through which Java Platform, Enterprise Edition (Java EE) components within a single application can notify each other about various asynchronous events.
- A log that maintains a history of event messages issued by all metadata servers in a cluster.
- A log that contains information about events for a particular system or group, for a particular metric, or for all the events that are associated with a specific monitor.
- A database table that contains information about certain system-level events related to work item processing.
An optional feature used to log the occurrence of certain system-level events related to work item processing. For example, the event logging feature logs a message when a work item is created or when a step processor begins processing a work item.
event management service
A service of InterChange Server that persistently stores events until collaborations are finished using them. This service ensures that InterChange Server and collaborations can recover from crashes without losing events.
- A function that processes all tracking events and determines which are related to Tivoli Workload Scheduler for z/OS.
- In Tivoli NetView for OS/390, the component that receives alert and resolution major vectors, translates these major vectors into generic event records, and applies the event status to the resource defined in the Resource Data Manager cache.
A message that contains information (such as the category of event, the name of the application that caused the event, and queue manager statistics) relating to the origin of an instrumentation event in a network of WebSphere MQ systems.
A database object for monitoring and collecting data on database activities over time. For example, starting the database might be an event that causes an event monitor to track the number of users on the system by taking an hourly snapshot of authorization IDs using the database. See also event, unformatted event table.
event monitoring point (EMP)
Point in the CICS code at which CICS monitoring data is collected. See also monitoring control table.
- The process of notifying a user about an event.
- The mechanism by which events are polled for and detected by a connector. See also event detection, event detection mechanism, event notification mechanism, event trigger.
event notification mechanism
The mechanism or processes that notify the connector that an application event was generated. The event notification mechanism includes all of the subprocesses of event polling. See also event detection, event notification.
A predicate in the capture specification used for filtering on the value of one of the options on a CICS command for application events or on one of the predefined options for system events.
An XML Schema Definition (XSD) type that provides information about the structure of part of an event. A single event definition can have different event parts that are defined by different XML schemas.
The process by which a connector retrieves application events. Event polling consists of requesting and retrieving events from the event table and passing them to the connector for further processing. In most cases, the processed event or the status of the event is returned to the application. You can customize how the connector polls for event, including setting specific times and frequency. See also event retrieval.
The set of events recognized by an activity (system events and user events that have been defined to it). Each activity has an event pool associated with it. An activity's event pool is initialized when the activity is created, and deleted when the activity is deleted. Event-related commands such as DEFINE INPUT EVENT and DEFINE COMPOSITE EVENT operate on the event pool associated with the current activity.
- The service responsible for managing events through event reader, event listener and email reader services. The event processor manages the incoming event queue and is responsible for sending queued events to the policy engine for processing.
- A Java virtual machine (JVM) service that dispatches events among all modules.
- The queue onto which the queue manager puts an event message after it detects an event. Each category of event (queue manager, performance, configuration, instrumentation, or channel event) has its own event queue.
- In computer graphics, a queue that records changes in input devices--buttons, valuators, and the keyboard. The event queue provides a time-ordered list of input events.
- An ordered list of events.
- A service that monitors an event source for new, updated, and deleted events, and triggers policies based on the event data. See also database event reader, standard event reader.
- A task that reads event records from an event data set.
- A temporary record of an application, which is stored in cache until the connector picks it up for processing. See also event store.
- A database record that describes actual status and results for events.
- The unsolicited report that an event has occurred. In an Open Systems Interconnection (OSI) context, when a managed object emits a notification, the agent uses one or more event forwarding discriminators (EFDs) to find the destinations to which the report is sent. See also event.
- In OSI, the unsolicited notification of a significant occurrence by an agent to a manager .
See event retrieval.
The process of polling and retrieving events from the repository event store. When a connector initially receives an event from the event store, it sends a request business object with only key data back to the application to retrieve the full-valued business object. The data is then passed back to the polling mechanism for further processing. See also event polling.
A feature of InterChange Server that ensures that when multiple threads of the same collaboration process events contain the same business object instance, the events are processed sequentially in the order received. InterChange Server automatically performs event sequencing. The collaboration developer does not have to design steps to take advantage of this feature.
- A component of the Common Event Infrastructure that receives events from the event emitters. See also Common Event Infrastructure, event emitter, event source.
- A server to which other servers can send events for logging. The event server routes the events to any receivers that are enabled for the sending server's events.
In CoOperative Development Environment/400, a machine-readable file, created by a compiler or when the Verify program choice is selected, that contains information about locations of errors in a source file.
In Tivoli NetView, an object that is managed by the ovesmd daemon, which is the event sieve agent. The event sieve agent stores information about the event sieve object in a database and reads that information when the agent is started.
- A data source that stores and manages events.
- An application that uses an event emitter to send events to the event server. See also event emitter, event server.
- An object that supports an asynchronous notification server within a single Java virtual machine. Using an event source, the event listener object can be registered and used to implement any interface.
Part of the event binding that represents a business event. The event specification contains the event name and the emitted business information. One or more capture specifications can refer to an event specification.
In the Tivoli Enterprise Console, a primitive that is used in searching for events in the event cache. For example, the event specifier can search for duplicate events, an event that matches a user-specified attribute, or an event that occurs within a certain time period.
A table that is created in an application and that stores an event record. This table is created as part of the installation and configuration of a connector. Not all connectors use an event table. See also event store.
- An event that triggers a cutoff in a disposition schedule. There are internal, external, recurring, and predefined date events.
- The mechanism or process that detects an application event and generates an event from it. Typically, an event trigger adds an entry to an event table for delivery to the connector. The event trigger is part of the event notification process. See also event detection, event notification.
event-triggered tracking (ETT)
A component that waits for specific events to occur and then adds a predefined application to the current plan. ETT recognizes two types of events: the reader event, which occurs when a job enters the JES reader, and the resource event, which occurs when the availability status of a special resource is set to yes.
See Earned Value Management.
An iterative development strategy that acknowledges that user needs are not fully understood and therefore requirements are refined in each succeeding iteration (elaboration phase). See also incremental development, iterative development.
For processor, real and virtual storage capacities and channel volume: 1 152 921 504 606 846 976 bytes, or 2 to the power of 60. For disk storage capacity and communications volume: 1 000 000 000 000 000 000 bytes.
exact end position
In RPG, an entry on the output specifications that indicates where the end position of a field or constant is to be placed in the output record. See also relative end position.
Exceed on Demand (EOD)
An X windows application to allow a user with either a Windows or Linux client and with EOD client code installed, to establish a working session with an AIX or Linux server or workstation.
- An event that occurs during the performance of the process that causes a diversion from the normal flow of the process. Exceptions can be generated by intermediate events, such as time, error, or message.
- An SQL operation that involves the EXCEPT set operator, which combines two result tables. The result of an exception operation consists of all of the rows that are in only one of the result tables.
- An indication of a suspicious and potentially vulnerable condition that requires additional information or investigation.
- A condition or event that cannot be handled by a normal process.
In Performance Tools, that portion of internal response time that cannot be attributed to the use of the processor and disk. An exceptional wait is caused by contention for internal resources of the system, for example, waiting for a lock on a database record.
exception class data
CICS monitoring information on exception conditions raised by a transaction, such as queuing for VSAM strings or waiting for temporary storage. This data highlights possible problems in system operations. See also monitoring record.
A set of sequence flow paths that originates from an intermediate event that is attached to the boundary of an activity. The process does not traverse this path unless the activity is interrupted by the triggering of a boundary intermediate event. See also normal flow.
- In C++, the catch block that catches exceptions when they are thrown from a function enclosed in a try block.
- A set of routines that responds to an abnormal condition. An exception handler is able to interrupt and to resume the normal running of processes.
A WebSphere MQ report message type that is created by a message channel agent when a message is sent to another queue manager, but that message cannot be delivered to the specified destination queue.
exception request (EXR)
In SNA, a request that replaces another request in which an error was detected. Note: The exception request contains a 4-byte sense field that identifies the error in the original request and, except if there were some path errors, is sent to the destination of the original request; if possible, the sense data is returned in a negative response to the sender of the original request.
exception response (ER)
In SNA, a value in the form-of-response-requested field of the request header that directs the receiver of the request to return a response only if the request is unacceptable as received or if the request cannot be processed; that is, only a negative response can be returned. See also definite response, no response.
- A user-created table that reflects the definition of the table being loaded.
- A table that holds rows that violate referential constraints or check constraints that the CHECK DATA utility finds.
- A table that contains copies of rows that violate unique index or primary key rules. It includes a timestamp and a description of the violation.
exception trace entry
An entry made to the internal trace table and any other active trace destinations when CICS detects an exception condition. It gives information about what was happening at the time the failure occurred and what was being used.
exception transition link
In a collaboration template activity diagram, the line that represents the path between a node for an action, subactivity, or iterator that encountered an exception and the next node. See also normal transition link, transition link.
A set of one or more non-concurrent related sequences passing between a pair of Fibre Channel ports. An exchange encapsulates a "conversation" such as a small computer system interface (SCSI) task or an Internet Protocol (IP) exchange. Exchanges can be bidirectional and can be short--lived or long-lived.
exchange data link (EDL)
A serial connection that carries messaging information between DirectTalk and the Lucent Technologies 1AESS, Northern Telecom DMS100, Ericsson MD110 switch, or Siemens Hicom 300.
- A specific type of basic link unit that is used to convey node and link characteristics between adjacent nodes. XIDs are exchanged between link stations before and during link activation to establish and negotiate link and node characteristics, and after link activation to communicate changes in these characteristics.
- The ID that is exchanged with the remote physical unit when an attachment is first established.
- The process by which, when an APPC connection is established between two CICS systems (or reestablished after failure), the name of the system log currently in use on each system is passed to the partner. The exchange log name process affects only sync level 2 conversations. It is used to detect the situation where a failed CICS has been communicating with a partner that is waiting to perform session recovery, and is restarted using a different system log. See also logname.
- A process used when sessions are first established to determine which log is being used by the remote system.
See external CICS interface.
- To prevent the use of a managed disk (MDisk) by a clustered system because of certain error conditions.
- The process of identifying files in an include-exclude list. This process prevents the files from being backed up or migrated whenever a user or schedule enters an incremental or selective backup operation. A file can be excluded from backup and space management, backup only, or space management only.
An object authority that prevents the user from using the object or its contents. See also all authority.
See include-exclude list.
A customization option that restricts access to selected information in the cube. The exclude option omits a category and all data associated with the category and its descendants from a dimension view or custom view.
- A finding that a user can mark and ignore.
- A parameter or process whose values are excepted during tests.
- An access intent that establishes the intent of an application to reserve the exclusive use of the database. If a subsystem requests and DBRC grants exclusive access to a subsystem, then no other subsystem may access the database concurrently, regardless of the share level of the database.
- A condition that permits write access to a single user only.
A connection that gives one user sole access to a particular database so that database operations are restricted to that user. The user with the exclusive connection can establish additional connections in shared mode.
- A type of access control in which VSAM keeps control of the control interval (CI) containing a specific record until a REWRITE, UNLOCK, or DELETE command is issued for that record. The purpose of exclusive control is to protect against simultaneous update.
- A method for preventing multiple, write-add, basic direct access method (BDAM) requests from updating the same dummy record or writing over the same available space on a track. When specified by the user, the exclusive-control lock requests that the system prevent the data block that is about to be read from being modified by other requests; it is specified in a read macro and released in a write or read macro. When a write-add request is about to be processed, the system automatically obtains exclusive control of either the data set or the track.
In IMS, the scheduling intent type that prevents an application program from being scheduled concurrently with another application program. See also scheduling intent.
exclusive level sharing
See level zero data sharing.
An optional mode of terminal operation in which a terminal may receive no output other than a response to an input. Any output excluded from being sent is held for transmission until the terminal is removed from exclusive mode.
A call from a section in one overlay path to one in a different path. Because an exclusive reference causes the calling section to be overlaid, return to the calling section is not possible.
exclusive run cycle
A run cycle that specifies the days and times that a job stream cannot be run. Exclusive run cycles take precedence over inclusive run cycles. See also calendar.
A type of segment that is in the same region but not in the same path. Exclusive segments cannot be in virtual storage simultaneously. See also inclusive segment.
In Remote Operations Service (ROPS), an option that indicates whether only the commands in the command list can be processed by ROPS or none of the commands in the command list can be processed by ROPS.
exclusive SQL statement
An SQL statement that must be followed by a commit or rollback operation before any other SQL statement can be executed in the same SQL session. Exclusive SQL statements are grouped into sets; the database manager can execute only one SQL statement from the set at one time. Examples of exclusive SQL statements include the CREATE SERVICE CLASS SQL statement and the AUDIT SQL statement.
A means by which CICS and data managers, such as SQL/DS, combine to prevent concurrent updates of resources. A transaction updating a recoverable resource gets control of that resource until it terminates or indicates that it wants to commit those changes with a syncpoint command. Other transactions requesting the same resource must wait until the first transaction has finished with it.
- To overlay the current process with another executable program. See also fork.
- In a VM operating system, a user-written command file that contains CMS commands, other user-written commands, and execution control statements, such as branches.
See application programming interface.
EXEC interface block (EIB)
A control block associated with each task in a CICS command-level environment. The EIB contains information that is useful during the execution of an application program (such as the transaction identifiers) and information that is helpful when a dump is being used to debug a program.
See executable identifier.
- A program in a form suitable for execution by a computer. The program can be an application or a shell script.
- A program that can be run as a self-contained procedure. It consists of a main program and, optionally, one or more subprograms.
In Tivoli NetView, a symbol defined such that double-clicking on it causes an application program to perform an action on a set of target objects. See also explodable symbol.
The autonomic manager component that changes the behavior of the managed resource using an effector, based on the actions recommended by the plan component. See also autonomic manager, effector.
A file or folder (directory) access permission that, for files, enables the user to run a program or shell script file, or for folders, enables the user to access the folder (directory) contents.
A class that acts as a table that plots the relationship between promotions and promotion policies. The execution agenda contains a list of promotions which are potentially applicable to an order, and all of the policies that are applicable to each individual promotion in the list.
execution diagnostic facility (EDF)
A CICS facility used for testing application programs interactively online, without making any modifications to the source program or to the program preparation procedure. The facility intercepts execution of the program at various points and displays information about the program at these points. Also displayed are any screens sent by the user program, so that the programmer can converse with the application program during testing just as a user would do on the production system.
- See runtime environment.
- In UML modeling, a type of node that represents a particular execution platform, such as an operating system or a database management system.
A named process or set of processes within a broker in which message flows are executed. The broker is guaranteed to enforce some degree of isolation between message flows in distinct execution groups by ensuring that they execute in separate address spaces, or as unique processes.
In a cross-compilation environment, the machine on which compiled code is executed. See also compilation host.
The behavior or response that is produced or observed when a component or system is tested. This behavior and information regarding the test run such as the weight distribution and result details are also recorded. See also expected result.
Settings that influence how a component behaves at execution time. These settings are compiled into the map file or system file. Many of these settings compiled into the map can be overridden (or partially overridden) using execution commands and options.
A client on which a job or other activity is performed. For example, if an application is being installed on a particular server, that server is the execution target for the installation activity.
The period when a request that is specified by an SQL statement is acted on by a database. See also system time.
Executive Program Manager (EPM)
A manager responsible for providing leadership and strategic guidance for import compliance and supply chain security activities at a number of manufacturing/development sites or countries within a geography.
In label-based access control, a privilege that causes one LBAC rule of one security policy to be bypassed for a user or a set of users to whom that privilege is granted. See also LBAC credentials.
- An instruction in an application, routine, or subroutine that causes control to pass to another application, routine, or subroutine.
- To execute an instruction within a section of a computer program (for example, within a loop, subroutine, or module) in order to terminate the execution of that section.
The set of generic and specific conditions, agreed upon with the stakeholders, for permitting a process to be officially completed. The purpose of exit criteria is to prevent a task from being considered completed when there are still outstanding parts of the task which have not been finished. Exit criteria are used to report against and to plan when to stop testing. (ISTQB)
A specific point in a system function or program where control may be passed to one or more specified exit programs. See also exit program.
- A program to which control is passed from an exit point. See also exit point.
- A user-written program that is given control during operation of a system function.
- See exit routine.
exit programming interface (XPI)
Provides global user exit programs with access to some CICS services. It consists of a set of function calls that can be used in user exit programs to extend CICS functions.
A program that receives control from another program to perform specific functions. See also standard exit.
- A numeric value that a command returns to indicate whether it completed successfully. Some commands return exit values that give other information such as whether a file exists. Shell programs can test exit values to control branching and looping.
- A code sent to either standard output or standard error on completion of the command.
- The value that is assigned to an entry in a collaboration area to determine the next step to which it will be moved. The available exit values are defined for each workflow step in a workflow. See also workflow step.
A component that displays the sources and targets that are associated with it in the Integration Flow Designer. See also contracted component.
On most computers, additional memory accessed through an adapter or feature card along with a device driver program. See also conventional memory.
A QName where the prefix from the lexical form is resolved into the namespace URI. If the lexical form of the QName does not have a prefix, the namespace URI is the default namespace, which can be empty. See also qualified name.
A subprocess that exposes its flow detail within the context of its parent process. An expanded subprocess is displayed as a rounded rectangle that is enlarged to display the flow objects within.
A process that occurs when the length of a converted string is greater than that of a source string. See also contracting conversion.
expansion I/O unit
Additional hardware units used to provide additional disk and I/O capacity. Expansion I/O units are located in SP frames, attached to specific SP Nodes, and controlled by a frame supervisor. Expansion I/O units are not CSM nodes.
expansion port (E_port)
In the building of a larger switch fabric, a port used as an inter-switch expansion port to connect to the E_port of another switch. See also isolated E_port.
A strategy that is used at the adapter level to identify whether objects should be loaded or not in the representation model. The expansion strategy defines how an object is going to behave when it is expanded. It also indicates whether load-on-demand is implemented.
A machine type or feature that can be connected to a system unit to provide additional storage and processing capacity. This expansion unit may contain I/O hardware such as cards, tapes, and disk drives.
A list of software items that are expected to be installed on the computers in a network. The list can be verified against the results of software scans. See also raw data set, software item.
Inventory that has been ordered from a vendor and that is expected to be received by the Seller. This information is contained in an expected inventory record. See also expected inventory record, seller.
expected inventory record
Lists the inventory that has been ordered from a vendor and that is expected to be received by the Seller. An expected inventory record may contain information for multiple items, fulfillment centers, and dates. See also expected inventory, inventory receipt, seller.
The behavior predicted by the specification, or another source, of the component or system under specified conditions. (ISTQB) See also execution result.
The average value for a given attribute for a population dataset. This value is ultimately used to determine reason code assignment, it is typically used for linear and logistic models where the interaction of variables is controlled.
In remote communications, a list of characters or signals a program or modem should expect to receive from a remote system, followed by the characters or signals the program or modem should send to the remote system after it receives the expected input. The sequence can also include a subsequence that tells the program or modem what to send if it does not receive the expected input.
In OSI, a data transfer service provided by the session layer to transfer a small amount of data that is not subject to permission-to-send and flow-control restrictions. The OSI layers attempt to expedite the transfer of such data.
In SNA, a data flow designated in the transmission header (TH) that is used to carry network control, session control, and various data flow control request/response units (RUs); the expedited flow is separate from the normal flow (which carries primarily end-user data) and can be used for commands that affect the normal flow. See also normal flow.
expedited message handling (EMH)
An IMS Fast Path facility that processes single-segment input and output messages. Fast Path messages that use the EMH bypass the normal message queuing and application scheduling and therefore these messages are processed faster than non-Fast Path messages.
An extension of the storage management function of the i5/OS operating system that allows the single-level storage architecture to take better advantage of the main storage (cache) capacities.
- The date at which a file is no longer protected against automatic deletion by the system.
- The date after which a database file member should not be used.
In DFSMSrmm, the process of inventory management that ensures that expired volumes are released and that carries out required release actions on those volumes. See also inventory management.
In Backup, Recovery, and Media Services, pertaining to media that is available for a rewrite operation. Media is automatically expired when both the retention period (expiration date) and storage duration have been satisfied.
A migrated or premigrated file that has been marked for expiration and removal from storage. If a stub file or an original copy of a premigrated file is deleted from a local file system, or if the original copy of a premigrated file is updated, the corresponding migrated or premigrated file is marked for expiration the next time reconciliation is run.
To capture detailed information about the access plan that was chosen by the SQL and XQuery compiler to resolve an SQL or XQuery statement. The information describes the decision criteria that are used to choose the access plan.
A specifically invoked cast using either the CAST AS keywords or the cast operator ( :: ). The database server does not automatically invoke an explicit cast to resolve data type conversions. See also cast, implicit cast.
A connection to a database in which both a user ID and password are specified. See also implicit connection.
explicit focal point
An assigned focal point for which the set of nodes to be included in its sphere of control is defined locally. An explicit focal point initiates the management services capabilities exchange that brings a node into its sphere of control. See also implicit focal point.
A format that relies upon syntax to separate data objects. Each data object can be identified by its position or by a delimiter in the data. Delimiters will also appear for missing data objects. See also implicit format.
explicit hierarchical locking
Locking that is used to make the parent-child relationship between resources known to the internal resource lock manager. This type of locking avoids global locking use when no inter-DB2 interest exists on a resource.
A privilege that has a name and is held as the result of SQL GRANT and REVOKE statements: for example, the SELECT privilege. See also implicit privilege.
A process by which SQL statements are bound by a user issuing the REBIND or db2rbind command. See also rebind.
explicit route (ER)
In SNA, a series of one or more transmission groups that connect two subarea nodes. An explicit route is identified by an origin subarea address, a destination subarea address, an explicit route number, and a reverse explicit route number. See also path, route extension, virtual route.
A transaction that is initiated by the BEGIN WORK statement. This type of transaction is available only in non-ANSI compliant databases that support logging. See also implicit transaction, singleton implicit transaction.
explicit trusted connection
A trusted connection that allows both switching the current user ID of the connection to a different user ID and acquiring a trusted context role (a default or user-specific role). See also trusted connection.
In Tivoli NetView, a symbol defined such that double-clicking on it or dragging and dropping it displays the child submap of the parent object that the symbol represents. See also executable symbol.
See expanded application directory.
A technique for testing software that entails minimal planning and often includes limited software documentation. The test results, which rely on the tester's skill and knowledge, guide ongoing and subsequent tests. Exploratory testing is often conducted in short sessions.
See explorer packet.
A graphical view in the Job Scheduling Console used to modify and maintain job streams in the database and the plan. See also plan.
A setting that configures the parameters governing how an application will be explored by AppScan. See also Explore stage.
The stage of an AppScan scan during which the logic and objects of an application are identified, prior to testing. See also Explore setting.
- In floating-point format, an integer constant specifying the power of ten by which the base of the decimal floating-point number is to be multiplied.
- A number, indicating to which power another number (the base) is to be raised.
The program interruption that results when an overflow occurs during execution of a floating point instruction. The overflow is triggered when the resulting value from the instruction has a characteristic that is larger than the floating-point data format can handle. See also overflow.
The program interruption that occurs when the result of a floating-point instruction has a nonzero fraction and a characteristic is smaller than the floating-point data format can handle. An exponent-underflow exception can be disabled by using the bit setting on a program mask.
- The process of making file systems accessible to authorized remote clients using supported services. See also shared file system.
- To copy data from database manager tables to a file using formats such as PC/IXF, DEL, and ASC. See also import.
- An exposed interface from a Service Component Architecture (SCA) module that offers a business service to the outside world. An export has a binding that defines how the service can be accessed by service requesters, for example, as a web service.
- The operation to remove one or more logical volumes (LVOLs) from a virtual tape server (VTS) library. The list of LVOLs to export is written on an export list volume and then the export operation itself is initiated.
- A process that prepares data, especially items and categories, such that it can be sent to downstream systems using various transport mechanisms, such as message queues or FTP. See also staging area.
- In NCS, to provide the operations defined by an interface. A server exports an interface to a client. See also import.
- An external file that is used to export data from a catalog or a hierarchy.
- A function or process that converts an internal file to some standard file format for use outside of an application.
- To move information from one system or program to another.
- In Network File System (NFS), to make file systems on a server available to remote clients.
- An access method services (AMS) operation to create a backup or portable copy of a Virtual Storage Access Method (VSAM) cluster, alternate index, or integrated catalog facility (ICF) user catalog.
- An external symbol defined in a module or service program that is available for use by other modules or programs. See also import.
- To save a copy of the current document, database or image into the file format required by a different application.
- See share.
- The file containing data that has been exported.
- A file created during the development process for inbound operations that contains the configuration settings for inbound processing.
In Tivoli Software Distribution, a feature that enables a Tivoli administrator to save (export) a file package definition as a text file, to edit the keywords and lists in the definition, and to retrieve (import) the definition from the text file to set the properties for the file package.
exports data set
In z/OS, an MVS file on the server containing entries for directories that can be exported to Network File System (NFS) clients. It is used by the server to determine which MVS files and prefixes can be mounted by a client, and to write-protect MVS files on the server.
See environment export.
A transactioned utility that extracts data from a table. See also import utility.
A system or data field in a roster, queue, or event log that has been made available for searches and sorting. Exposed fields can be used in a search filter, when defining an index, and when logging information to the event log.
A name specified in a FROM clause such that it can be referenced elsewhere in the query. Exposed names include correlation names and, if correlation names are not specified for them, table names, view names, nicknames, and alias names. See also table designator.
exposed process value (EPV)
A variable that enables process participants to set or change a value while an instance of a process is running. Process participants use EPVs to adjust specific variable values as constants, thereby affecting the flow of a process or task assignment.
In Enhanced X-Windows, an event sent to clients to inform them when contents have been lost, as when windows are obscured or reconfigured. Servers do not guarantee the preservation of window contents when they are obscured or reconfigured.
express alternate PCB
An alternate PCB to which output messages are sent before termination of the application program. See also alternate program communication block.
- A simple statement used to perform calculations or otherwise manipulate the value of attributes. An example of using an expression is entering "=PI" instead of "3.1415". See also business rule.
- A statement about data objects. Expressions are a combination of literals, object names, operators, functions, and map names. Component rules are expressions that evaluate to either TRUE or FALSE. Map rules are expressions that evaluate to data to produce the desired output.
- An SQL or XQuery operand or a collection of SQL or XQuery operators and operands that yields a single value.
- In Event Management, the relational expression between a resource variable and other elements (such as constants or the previous value of an instance of the variable) that, when true, generates an event.
- In programming languages, a combination of terms and operators that can be evaluated to a single value by using the rules of precedence for the given language.
All of the information that can affect the result of a specific XQuery expression. This information is organized into two categories called the static context and the dynamic context. See also dynamic context, static context.
A payment that has been assigned to the RTGS-Express (RTGS-E) channel. Non-timed express payments are treated as if they have immediate priority, except that, unlike other immediate payments, they are not sent if either they or the RTGS-E channel is stopped.
See exception request.
A component or service that must not be present. In other words, the components, resources, or services listed as exrequisites of a component must not be installed in conjunction with the component. See also requisite.
- To increase the portion of available space that can be used to store database or recovery log information.
- To install more than one package in the same version of Eclipse in order for their application functions to work together in the workbench environment.
Extended Adaptive Cache Simulator
A performance tool that allows system users to assess the benefits of an Extended Adaptive Cache before purchasing one. When the Extended Adaptive Cache simulator is active on a specified storage controller, performance information is generated for a system's actual workload over time.
See address extension.
The use of 31-bit addresses (above the 16 MB line) which multiplies by 2 to the power of 7 the range of virtual storage that can be addressed. See also extended link pack area.
An agent that integrates Tivoli Workload Scheduler job control features with other operating systems (for example, z/OS) and applications (for example, Oracle Applications, PeopleSoft, and SAP R/3). Extended agents must be hosted by a master domain manager, domain manager, or an agent (not another extended agent) and use access methods to communicate with external systems. See also access method.
- Information attached to an object that describes the object to an application system or user.
- A characteristic of a shared folder file. Each extended attribute consists of a name, a value, and a set of flags.
- In change management, a request for change (RFC) type attribute that provides information that is needed to fulfill the RFC. A required RFC type attribute must be specified when an RFC of that type is created.
- In configuration management, a configuration item (CI) attribute that is not part of the original CI definition, but is added by the customer.
- Names or value pairs that are associated with files or directories. There are three classes of extended attributes: user attributes, system attributes, and trusted attributes.
- A group of coded character sets that consists of eight-bit coded characters. EBCDIC coded character sets map specified graphic and control characters onto code points, each consisting of 8 bits. EBCDIC is an extension of BCD (Binary-Coded Decimal), which uses only 7 bits for each character.
- A coded character set of 256 8-bit characters developed for the representation of textual data. See also American Standard Code for Information Interchange.
extended border node (EBN)
A border node that interconnects (a) APPN networks having different network identifiers or (b) separate partitions of the same APPN network, where the partitioning is to allow isolated topology subnetworks (or clusters). An extended border node supports intermediate network routing, allowing it to support LU-LU sessions that do not terminate in its native network. See also peripheral border node.
- A character other than a 7-bit ASCII character. An extended character can be a 1-byte code point with the eighth bit set (ordinal 128 through 255).
- Double-byte characters that are stored in a DBCS font file, not in the hardware of a DBCS-capable work station. When displaying or printing extended characters, the work station receives them from the DBCS font table under control of the extended character processing function of the operating system. See also basic character.
extended character processing
A function of the operating system that is required to make characters stored in a DBCS font file available to a DBCS-capable work station. Basic characters, which are stored in the work station, do not require extended character processing. Extended characters, which are stored in a DBCS font table, require extended character processing before they can be displayed or printed. See also basic character.
extended CICS dynamic storage area (ECDSA)
Storage area allocated above 16 MB but below 2 GB for CICS code and control blocks that are eligible to reside above 16 MB but below 2 GB, but that are not eligible for the ERDSA (that is, they are not reentrant).
extended common object file format (XCOFF)
The object file format for Version 3 of the operating system. XCOFF combines the standard common object file format (COFF) with the TOC module format concept, which provides for dynamic linking and replacement of units within an object file.
extended common service area (ECSA)
A major element of z/OS virtual storage above the 16 MB line. This area contains pageable system data areas that are addressable by all active virtual storage address spaces. It duplicates the common system area (CSA) which exists below the 16 MB line.
extended count key data device (ECKD device)
A disk storage device that has a data transfer rate faster than some processors can utilize. A specialized channel program is needed to convert ordinary CKD channel programs for use with an ECKD device. See also fixed-block architecture disk device.
A system library (the libcurses.c library) that contains the control functions for writing data to and getting data from the terminal screen. It supports color, multiple windows, and an enhanced character set.
extended data object (XDO)
In an application program, a generic representation of a stored complex multimedia object that is used to move that object in to, and out of, storage. XDOs are most often contained within DDOs.
A heterogeneous computing environment that often includes both centralized hosts and distributed workstations connected in a network. Gateways within the extended enterprise provide connections to local area networks (LANs). These LANs can serve any computing system architecture. See also Distributed FileManager.
extended error queue element (EEQE)
Data that describes an I/O error on a local DL/I database. EEQEs are recorded by CICS in the global catalog. CICS uses EEQEs to provide I/O error handling during CICS restarts, including cold starts.
The format of a data set that is not basic format or large format and might be striped or compressed. The logical structure of the data set is the same as a data set that is not in extended format, but the physical format is different. See also basic format, compressed format, large format, striped data set.
Online documentation that explains the purpose of the display. Extended help appears if the user presses the Help key when the cursor is outside the areas for which contextual help is available. See also context-sensitive help.
extended indicator variable
A variable that is used with a host variable to represent the SQL null value, the default value, or the unassigned value in an application program. See also indicator variable.
Extended Industry Standard Architecture (EISA)
The PC bus standard that extends the AT bus (ISA bus) to 32 bits and provides support for bus master. It was announced in 1988 as a 32-bit alternative to the Micro Channel that would preserve investment in existing boards. PC and AT adapters (ISA adapters) can plug into an EISA bus.
extended link pack area (ELPA)
The portion of virtual storage above 16 MB that contains frequently used modules. See also extended addressing.
A function of asynchronous messaging where the application server manages the messaging infrastructure and extra standard types of messaging beans are provided to add functionality to that provided by message-driven beans.
extended network addressing
The network addressing system that splits the address into an 8-bit subarea and a 15-bit element portion. The subarea portion of the address is used to address host processors or communication controllers. The element portion is used to permit processors or controllers to address resources.
extended pageable link pack area (EPLPA)
The extension of the pageable link pack area (LPA) that resides above 16 MB in virtual storage. See also pageable link pack area.
extended pointer set (EPS)
In a HALDB, an expanded segment prefix that includes information that allows the use of indirect pointers. An EPS is created for logical child segments and secondary index segments.
Pertains to the use of more than two computer words to represent a floating point number in accordance with the required precision. For example, in z/OS, four computer words are used for an extended-precision number.
extended read-only dynamic storage area (ERDSA)
An area of storage allocated above 16 MB but below 2 GB and used for eligible, reentrant CICS and user application programs, which must be link-edited with the RENT and RMODE(ANY) attributes. The storage is obtained in key 0, non-fetch-protected storage, if the system initialization parameters include RENTPGM=PROTECT. If RENTPGM=NOPROTECT is specified, the ERDSA is in CICS-key storage.
extended recovery facility (XRF)
A facility that minimizes the effect of failures in z/OS, VTAM, the host processor, or high-availability applications during sessions between high-availability applications and designated terminals. This facility provides an alternative subsystem to take over sessions from the failing subsystem.
extended remote copy (XRC)
See Global Mirror.
extended restart (XRST)
A restart, initiated by a DL/I call, that reestablishes database positioning and user-specified areas. See also symbolic checkpoint.
extended shared dynamic storage area (ESDSA)
The user-key storage area for any non-reentrant user-key RMODE(ANY) programs, and also for any storage obtained by programs issuing CICS GETMAIN commands for storage above 16 MB but below 2 GB with the SHARED option.
Extended Simple Mail Transfer Protocol (ESMTP)
An extension to the Simple Mail Transfer Protocol (SMTP) that supports graphics, audio and video files, and text in various languages. See also Simple Mail Transfer Protocol.
extended site store
A customer-facing store that is created by the site operator for the owner of the store. See also direct sales store.
extended specify task abnormal exit (ESTAE)
A z/OS macro that provides recovery capability and gives control to the user-specified exit routine for processing, diagnosing an abend, or specifying a retry address.
Syntax that is used for certain commands and function calls. Extended syntax defines parameters used by callable interface applications written in Assembler, C, COBOL, Fortran, or PL/I.
extended system queue area (ESQA)
A major element of z/OS virtual storage above the 16 MB line. This storage area contains tables and queues relating to the entire system. It duplicates above the 16 MB line the system queue area (SQA).
extended time division multiple access (E-TDMA)
See also Time Division Multiple Access.
extended trusted dynamic storage area (ETDSA)
The storage area for any security-related CICS control blocks that reside in 31-bit storage (above 16 MB but below 2 GB). The ETDSA is always allocated from CICS-key storage.
Extended UNIX Code (EUC)
A protocol that can support sets of characters from 1 to 4 bytes in length. EUC is a means of specifying a collection of code pages rather than actually being a code page encoding scheme itself.
extended UNIX coded character set
A set of characters that contains mixed characters. EUC is the mixture of the ISO 7- or 8-bit code page and up to 3 other code pages that can have characters represented internally in 1 to 3 bytes. Extended UNIX coded character set uses multiple shift-in and shift-out control characters and TCP/IP escape sequences within the data stream to switch between four different character sets.
Extended UNIX Code encoding scheme (EUC encoding scheme)
An encoding scheme that defines a set of encoding rules that can support one to four character sets. The encoding rules are based on the ISO2002 definition for the encoding of 7-bit and 8-bit data. The EUC encoding scheme uses control characters to identify some of the character sets.
extended user dynamic storage area (EUDSA)
Storage area allocated above 16 MB but below 2 GB used for data and for user application programs that execute in user-key and are eligible to reside above 16 MB but below 2 GB, but that are not eligible for the ERDSA (that is, not reentrant.)
- In COBOL, the state of a file after running an OPEN statement, with the EXTEND phrase specified for that file, and before running a CLOSE statement, without the REEL or UNIT phrase specified for that file.
- In COBOL, a method of adding records to the end of a sequential file when the file is opened.
Extensible Stylesheet Language (XSL)
A language for specifying style sheets for XML documents. Extensible Stylesheet Language Transformation (XSLT) is used with XSL to describe how an XML document is transformed into another document.
- An element or function not included in the standard language.
- A class of objects designated by a specific term or concept; denotation.
- In Eclipse, the mechanism that a plug-in uses to extend the platform. See also extension point.
- In Eclipse, the specification that defines what attributes and values must be declared by an extension. See also extension.
- The areas in the implementation that can have customizations added that represent the customer-specific business logic. Extension points can include specifications, validation rules, value rules, pre-processing scripts, post-processing scripts, and workflow step functions.
- In the Reusable Asset Specification (RAS), a location in an asset that may be altered, customized, modified, or supplied by an asset consumer. An extension point can define the assets variability at design time, code time, and run-time.
- An allocation of space, within a container of a table space, to a single database object. This allocation consists of multiple pages.
- A unit of data that manages the mapping of data between managed disks (MDisks) and volumes. See also multiple allegiance.
- A continuous space on a disk, direct-access storage volume, or diskette that is occupied by or reserved for a particular data set, data space, or file.
In Internet communications, a gateway on one autonomous system that communicates with another autonomous system. See also interior gateway.
Exterior Gateway Protocol (EGP)
The mechanism that allows the exterior gateway of an autonomous system to share routing information with exterior gateways on other autonomous systems. See also Border Gateway Protocol.
external call interface (ECI)
An application programming interface that allows a non-CICS program running on a client to call a CICS program located on a CICS server. Data is exchanged in the COMMAREA as for normal CICS interprogram communication. See also CICS client, client API.
external CCD table
In SQL replication, a CCD table that can be subscribed to directly because it is a registered replication source. It has its own row in the register table, where it is referenced as SOURCE_OWNER and SOURCE_TABLE. See also consistent-change-data table, internal CCD table.
external CICS interface (EXCI)
A CICS application programming interface that helps to make CICS applications more easily accessible from non-CICS environments. It enables a non-CICS program (a client program) running in MVS to call a program (a server program) running in a CICS Transaction Server region and to pass and receive data by means of a communications area.
See public cloud.
external communication adapter (XCA)
A communication adapter that is part of a device (such as the IBM 3172 Nways Interconnect Controller) other than the host processor. See also integrated communication adapter.
- In COBOL, the data described in a program as external data items and external file connectors.
- Data that is exported from one procedure and imported into another procedure. See also internal data.
- Data that persists over the lifetime of an enclave and maintains last-used values whenever a routine within the enclave is reentered.
- Data obtained from a channel (for example, external credits pending).
external data definition
A description of a variable appearing outside a function. It causes the system to allocate storage for that variable and makes that variable accessible to all functions that follow the definition and are located in the same file as the definition.
external data item
In COBOL, a data item that is described as part of an external record in one or more programs of a run unit and which itself may be referred to from any program in which it is described.
external data record
In COBOL, a logical record that is described in one or more programs of a run unit and whose constituent data items may be referred to from any program in which they are described.
External Data Representation (XDR)
A standard developed by Sun Microsystems, Incorporated to represent data in machine-independent format. Because XDR is a vendor-independent method for representing the data, new computer architectures can be integrated into the network without requiring the updating of translation routines.
external data source
A data source for federation that is not crawled, parsed, or indexed by WebSphere Information Integrator OmniFind Edition. Searches of external data sources are delegated to the query application programming interface of those data sources.
- A dependency defined in one job or job stream that refers to another job stream or to a job in another job stream.
- A relationship between two occurrences, in which an operation in the first occurrence (the predecessor) must successfully finish before an operation in the second occurrence (the successor) can begin processing.
In XML, an entity such as an XML schema, an Extensible Stylesheet Language (XSL) style sheet, a document type definition (DTD), or other XML instance document that is accessed using a Uniform Resource Identifier (URI) in an XML instance document. This URI is required to validate the instance document.
- See external routine.
- A function that has its functional logic implemented in a programming language application that is outside the database, in the file system of the database server. The association of the function with the external code application is specified by the EXTERNAL clause in the CREATE FUNCTION statement. See also external routine, function, user-defined function.
A unique key that identifies an identity in the data source. An external ID typically consists of a unique ID for the data source and a unique ID for the identity within its original data source. For example, an external ID for an identity in the customer records for a bank might contain the bank name (for the data source) and the account number (for the identity in the data source), such as FirstCapital, 0123456789.
In RPG, an indicator that can be set by another program before a program is run, or changed by another program while the program is running. Valid external indicators are U1 through U8.
externalized data value
See sensor value.
The label attached to the outside of a tape cartridge that can be read by the user and is sometimes machine-readable. The label contains the volume serial number (VOLSER) of the tape volume and sometimes additional information. See also internal label.
A type of library that is provided by that permits LAN-free data movement for StorageTek libraries that are managed by Automated Cartridge System Library Software (ACSLS). To activate this function, the library type must be EXTERNAL.
external library resource
See external object.
external line format message (ELF message)
A message that is not fully tokenized, but is stored in a single field in the TOF. Storing a message in ELF improves performance because no mapping is needed and checking is not performed.
- In a website, a link to a web address that is outside the current website.
- A connection from an object to an entity or resource that is outside the Rational DOORS database.
- A symbolic link that contains the name of an object that is outside the hierarchical file system.
- In the Integration Flow Designer, solid lines displayed in a system definition diagram that visually represent the data flow between two map components.
externally described data
Data contained in a file for which the fields and the records are described outside of the program (such as with files created by DDS, IDDU, or DB2 for i5/OS) that processes the file.
externally described file
A file in which the records and fields are described to the system when the file is created, and used by the program when the file is processed. See also program-described data, program-described file.
external message queue
A message queue used by all programs and procedures running within a job to send and to receive messages outside a job, for example, between an interactive job and the workstation user.
A method that has its method logic implemented in a programming language application that is outside the database, in the file system of the database server. The association of the method with the external code application is specified by the EXTERNAL clause in the CREATE METHOD statement. See also external routine, method.
- A name that can be referred to by any control section or separately assembled or compiled module; a control section name or an entry name in another module.
- In a program, a name whose scope is not necessarily confined to one block and its contained blocks.
- The name of an executable library or class file that is on the database server and contains the logic for an external routine (an external procedure, external function, or external method).
- An object that has a defined object type (such as *FILE or *PGM). In general, external objects can be displayed by a user. See also internal object.
- An object that can be used by other program products while running print jobs. For example, coded fonts, code pages, font character sets, form definitions, page definitions, and page segments.
A trading community participant that sends business documents to and receives business documents from the internal partner. See also trading partner.
See external purchase order.
external presentation interface (EPI)
An application programming interface that allows a non-CICS client program to appear to a CICS server as one or more standard 3270 terminals. This enables the client to access, for example, CICS transactions written for 3270 terminals, without needing to change the CICS code. See also CICS client.
A procedure that has its procedural logic implemented in an external programming language application. The association of the procedure with the external application is specified by a CREATE PROCEDURE statement with a LANGUAGE clause that has a value other than SQL and an EXTERNAL clause that implicitly or explicitly specifies the name of the external application. See also built-in procedure, external routine, external SQL procedure, native SQL procedure, procedure, user-defined procedure.
A project containing requirements used to establish traceability relationships with requirements in a currently open project. See also cross-project traceability.
external purchase order (external PO)
A purchase order or request to an outside vendor. See also internal purchase order.
external PVC segment
In NCP, a permanent virtual circuit (PVC) segment between two frame-relay subports in adjacent NCPs. When the two NCPs are directly attached, the two subports have the same data link connection identifier (DLCI).
- A reference whose definition is obtained from a drawing on disk.
- In a compare or merge session, a pointer to any object outside the item being compared or merged.
- A reference to a symbol, such as an entry point name, defined in another program or module.
- A document with content consisting of a URL or a UNC path linking to another location.
- An additional identifier for an identity in a data source. For example, an employee data source might use the employee serial number as the external ID and the employee's social security number as the external reference. Often, however, the external reference is set to the same value as the external ID, because the additional identifier is not necessary to uniquely identify an identity.
external response time
Elapsed time from pressing the ENTER key or another AID key until the action requested by the terminal user is completed, and the next entry can be started. Elapsed time between the end of an enquiry or demand on a computer system and the beginning of the response.
- A procedure or function called from outside the program in which the routine is defined.
- In REXX, a program external to the user's program, language processor, or both. These routines can be written in any language (including REXX) that supports the system-dependent interfaces used by REXX to start it.
- A function, method, or procedure that has its routine logic implemented in a programming language application that is outside the database, in the file system of the database server. The association of the routine with the external code application is specified by the EXTERNAL clause in the CREATE statement for the routine. See also external function, external method, external procedure, routine.
external security interface (ESI)
A facility that enables client applications to verify and change passwords for user IDs on CICS servers. See also client API.
Storage space that a user-defined access method manages rather than the database server. The IN clause of the CREATE TABLE and CREATE INDEX statements can specify the name of an external space instead of a dbspace.
external SQL procedure
An SQL procedure that is processed using a generated C program that is a representation of the procedure. When an external SQL procedure is called, the C program representation of the procedure is executed in a stored procedures address space. See also external procedure, native SQL procedure.
- Data storage not located in main or auxiliary storage, such as tape or diskette.
- Managed disks (MDisks) that are SCSI logical units presented by storage systems that are attached to and managed by the clustered system.
- An entry-point name or external variable that is defined or referred to in a particular module or program.
- A symbol that is defined in a file other than the file in which the symbol occurs.
- An item defined in a high-level language program that represents such things as procedures or variables. Resolving external symbols is the means by which the binder connects modules to form a bound program or a service program.
external time reference (ETR)
The synchronization of server time-of-day (TOD) clocks to ensure consistent time-stamp data across multiple servers and operating systems. External time reference (ETR) is the MVS generic name for the IBM Sysplex Timer. See also Sysplex Timer.
external token file
A supplemental file to the name data archive that lists specific titles, affixes, qualifiers, and stems that are unique to your environment. The external token list can add on to the name data archive, or override data in the name data archive. The external token file is searched first before the name data archive is searched.
The ability to trace relationships between artifacts in two projects. See also cross-project traceability.
- A variable that is outside the lexical scope of the function, procedure, or program that is calling it.
- A variable accessible to another compilation unit.
A program that performs output processing for data sets that are not eligible for processing by the primary job entry subsystem (JES). For example, an external writer might process a data set that has been directed to a printer and that will be stored on a device that is not supported by JES.
extract, load, and transform (ELT)
The process of extracting data from one or more sources, loading it directly into a relational database, and then using the database engine to run data transformations. See also extract, transform, and load.
extract, transform, and load (ETL)
The process of collecting data from one or more sources, cleansing and transforming it, and then loading it into a database. See also extract, load, and transform, warehouse enablement pack.
The process of moving data from temporary tables on the WebSphere Commerce Analyzer server to the WebSphere Commerce Analyzer data mart. The data in the temporary tables was replicated from the WebSphere Commerce database.
extraction time window
The window of time between the last time the WebSphere Commerce Analyzer extraction was run for this source and the current time. For WebSphere Commerce sources, this time window is indicated by the WebSphere Commerce Analyzer parameters TIME_CUT_OFF and TIME_CUT_OFF_PREV.
In CICS, a type of transient data queue. Extrapartition destinations can be accessed either within the CICS environment or outside of CICS; they can be defined as either input or output.
extrapartition transient data
A CICS facility for temporarily saving data in the form of queues, called destinations. See also intrapartition transient data.
extreme programming (XP)
An agile software development method that relies on a strict plan and focuses on short release cycles, very frequent user participation, refactoring, pair programming, collective code ownership and testing throughout the entire development process, from start to finish. See also iterative development.
- An attack that originates from a system within a network. For example, a trusted insider might use a company machine as the origin of a denial-of service attack.
- A 3D definition that associates a Z height with all the elements in an object so that each element becomes a vertical plane.
In GL, the coordinate system in which the viewer's eye is located at the origin, and thus all distances are measured with respect to the eye. Viewing transformations map from world coordinates into eye coordinates, and projection transformations map from eye coordinates to normalized device coordinates.