list of letters
This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
A digital trunking facility standard used in the United States and elsewhere, capable of transmitting and receiving 24 digitized voice or data channels. Signaling can be imbedded in the voice channel transmission when robbed-bit signaling is used. The transmission rate is 1544 kilobits per second. See also E1.
See tools as a service.
- A control in a graphical user interface (GUI) that is used to switch between pages. See also page.
- To move a cursor on a display or the print head of a printer to a preset location.
A character that indicates that printing or displaying should start at the next horizontal position on the current line. The tab is designated by '\t' in the C language and is named in the portable character set.
- An orderly arrangement of data in rows and columns that can contain numbers, text, or a combination of both.
- In COBOL, a set of logically consecutive data items that are defined in the Data Division with the OCCURS clause.
- In RPG, a series of elements with like characteristics. A table can be searched for a uniquely identified element, but elements in a table cannot be accessed by their position relative to other elements.
- In a relational database, a database object that consists of a specific number of columns and is used to store an unordered set of rows. See also base table, temporary table, view.
table check constraint
See check constraint.
In a partitioned database environment, a state that occurs when two tables that have the same number of compatible partitioning keys are stored in the same database partition group. In this situation, the DB2 database management system can perform the join or subquery processing at the database partition where the data is stored.
An exposed name used to qualify a column name. See also exposed name.
An expression that creates a temporary result table from a query. For example, a table expression might be a query that selects all of the managers from several departments and further specifies that they have over 15 years of working experience and are located at the main branch.
A function that receives a set of arguments and that returns a table to the SQL statement that references the function. A table function can be referenced only in the FROM clause of a subselect. See also function, routine, user-defined function.
A structure representing the relationship between typed tables in which subtables inherit the behavior (constraints, triggers, storage options) from supertables. Subtables can have additional constraint definitions, storage options, and triggers.
A mechanism that allows access to trigger tables in SQL or from within user-defined functions. A table locator is a fullword integer value that represents a transition table. See also transition table.
In SQL replication, a type of replication subscription-set processing in which the Apply program retrieves all of the data from the source CD table, applies the data (one member at a time) to each target table, and finally commits its work. See also transaction-mode processing.
table object ID
Internal logical identifier for a table. In DB2 for Linux, UNIX, and Windows, table object IDs for each table in a database are stored in the TABLEID column of the SYSCAT.TABLES catalog view.
A set of tables used for processing specifications: the JES2 table provides the default processing specifications and the user table provides updates or deletions to the default processing specifications. See also dynamic table, JES2 table, user table.
A data organization scheme in which table data is divided across multiple data partitions according to values in one or more partitioning columns of the table. Data from a given table is partitioned into multiple storage objects, which can be in different table spaces, based on the specifications that are provided in the PARTITION BY clause of the CREATE TABLE statement. See also data partition, database partitioning.
An ordered set of one or more columns whose values are used to determine in which data partition each table row belongs. See also data partition, database partition, distribution key.
A mechanism for transferring rows between database partitions. Table queues are distributed row streams with simplified rules for the insertion and removal of rows. Table queues can also be used to deliver rows between different processes in a single-partition database.
- A logical collection of extents that are assigned to a table. A table space contains all the disk space that is allocated to a given table or table fragment and includes pages allocated to data and to indexes, pages that store TEXT or BYTE data in the dbspace, and bitmap pages that track page use within the extents.
- A logical unit of storage in a database. In DB2 for z/OS, a table space is a page set and can contain one or more tables. In DB2 for Linux, UNIX, and Windows, a table space is a collection of containers, and the data, index, long field, and LOB portions of a table can be stored in the same table space or in separate table spaces. See also container, page set.
table space ID
Internal logical identifier for the primary table space for an object. In DB2 for Linux, UNIX, and Windows, table space IDs for each table space in a database are stored in the TBSPACEID column of the SYSCAT.TABLES catalog view.
table space set
A set of table spaces and partitions that should be recovered together because the tables contained in the table spaces have dependencies on one another. The dependencies can, for example, be between parent table and descendent table or between base table and auxiliary table.
- A mobile touchscreen computer that is typically controlled by gestures using the user's fingers, or using a stylus.
- In computer graphics, a locator device with a mechanism for indicating coordinate data.
A graphical view in the Job Scheduling Console used to display database and plan object data in tabular format. See also job scheduling console.
See terminal abnormal condition line entry.
See Total Access Communication System.
See text analysis engine.
- In markup languages such as SGML, XML, and HTML, a token representing the start or end of an element.
- A word or phrase that users create and assign to an asset. Users create tags to develop search criteria that is meaningful to themselves. See also Dogear.
- In UN/EDIFACT EDI Standards, the segment identifier. In export and import, a code that is assigned to each field in the database and used to identify the field in the export file. Such export files are known as tagged files.
- In GL, a marker in the display list used as a location for display list editing.
- An item that contains identifying information about a person or device. Tags enable tracking and monitoring of assets within locations, areas, and zones.
- The statements of the user interface manager (UIM) tag language. Tags describe the actions, format, and data of the panel. Tags are used to define the formatting of help information.
- A text string attached to any instance of a word in a grammar. A tag can be used to distinguish two occurrences of the same word in a grammar, or to identify more than one word in a grammar as having the same meaning.
- A structure that contains all of the required JAR files and resources for a web project. For example, the supporting classes extend the base Struts tags to let them nest inside each other, so they keep the fundamental logic of the original tags, except that all references to beans and bean properties are managed in a nested context.
- An identifer that groups related artifacts.
- A type of structured field used for indexing in an AFP document. Tags associate an index attribute-value pair with a specific page or group of pages in a document.
- A mechanism used to identify certain attributes having some bearing on handling of character data. Some examples are character set identifier, code page identifier, language identifier, country identifier, and encoding scheme identifier.
- A physical label that is applied to an asset to indicate the device, its position, and the controlling authority.
- One or more characters attached to a set of data (for example, a field or document element) that contain information about the set, including its identification.
A visual representation of tags, where frequently used tags are displayed with more emphasis. For example: tags can be represented by text, with varying degrees of bolding, or images with varying sizes.
Tagged Image File Format (TIFF)
A file format for storing high-quality graphics. See also GeoTIFF format.
The explicit definition of a property as a name-value pair. In a tagged value, the name is referred as the tag. Certain tags are predefined in the UML; others may be user defined. Tagged values are one of three extensibility mechanisms in UML. See also constraint.
In JSP technology, a collection of tags identifying custom actions described using a taglib descriptor and Java classes. A JSP tag library can be imported into any JSP file and used with various scripting languages. (Sun)
See trust association interceptor.
- See fallover.
- In an XRF environment, the process by which the failing active IMS is released from its XRF sessions with terminal users and replaced by an alternate IMS. See also giveback.
A value assigned to each configured cluster resource on a per-node basis. In the event of a takeover, the active node with the highest priority acquires the resource. A node with a higher priority is listed before the node with a lower priority. See also node priority policy, resource group, resource group policies.
tape configuration database (TCDB)
The set of tape library records and tape volume records that reside in integrated catalog facility (ICF) volume catalogs and describe the current tape library configuration.
A collection of tape units that share a model type and serial number, such as all the logical unit numbers (LUNs) of a tape library. See also tape unit.
- A device that includes a selection of cartridges in a common (secure) area within access of one or more automated removable media (ARM).
- A set of equipment and facilities that support an installation's tape environment. The tape library can include tape storage racks, mechanisms for automatic tape mounting, a set of tape drives, and a set of related tape volumes mounted on those drives. See also Automated Tape Library Dataserver, manual tape library, system-managed tape library.
tape library data server
An IBM hardware device that maintains the tape inventory that is associated with a set of tape drives. A tape library data server also manages the mounting, removal, and storage of tapes.
tape mount management
The methodology used to optimize tape usage in order to decrease the number of tape mounts and increase the amount of data on each tape. This optimization is accomplished by redirecting appropriate tape requests to disk and collecting the data in larger amounts on tape soon after the applications are completed. This methodology also reduces the time required to run the application.
tape storage group
A collection of tape volumes that contain private user data. A volume becomes part of the tape storage group when it is mounted to satisfy a scratch volume request for the storage group, or when it is entered into one of the tape libraries and assigned to the tape storage group by the cartridge entry process. The volume is removed from the tape storage group when it is returned to scratch after the data sets on it have expired. See also storage group.
A magnetic tape subsystem consisting of a controller and magnetic tape devices, which allows for the storage of user data on tape cartridges. See also storage subsystem.
- A tape device or a robotics controller that is visible over a storage network. A tape unit is a member of a single storage network (of 1 - n fabrics), but can have 1 - n equivalent paths. See also tape device.
- The physical enclosure containing the tape drive.
The recording space on a single tape cartridge or reel. See also shelf-resident tape volume.
tape volume table of contents (TVTOC)
Information about a tape data set that RACF stores in the TAPEVOL profile for the volume on which the data set resides. The TVTOC includes the data set name, data set sequence number, creation date, and an indicator as to whether a discrete tape data set profile exists.
See title, affix, and qualifier.
See tape archive.
- A computer that is known to an OS deployment server.
- The destination for an action or operation.
- See receiver.
- In SEU, a line command, such as B (Before) or A (After), that specifies the destination for other line commands such as C (Copy) or M (Move).
- A Small Computer System Interface (SCSI) device that acts as a subordinate to an initiator and consists of a set of one or more logical units (LUs), each with an assigned logical unit number (LUN). The LUs on the target are typically I/O devices. A SCSI target is analogous to an S/390 control unit; a SCSI initiator is analogous to an S/390 channel; and a SCSI LU is analogous to an S/390 device. See also initiator, Small Computer System Interface.
- A collection of logical units (LUs) that are directly addressable on the network. The target corresponds to the server in a client-server model.
- The node at which a password is to be installed. If the password specifies a nodelocked license, the target is the node where the licensed product is run. If the password specifies multiple nodelocked license (that is, a compound password for nodelocked licenses) or network licenses, the target is a node at which the network license server is running.
- In distributed data management (DDM), the platform that fulfills a request for remote data. A target is also known as a server. See also Distributed FileManager, source.
- In VisualAge RPG, a part that receives a target event from a source part whenever the state of the source part changes.
- A value that a Key Performance Indicator (KPI) should achieve, such as "300" or "5 days."
- A storage device on a fibre-channel network.
- The program or system to which a request for files or processing is sent.
A command that can be executed on a different target container. A targetable command invocation incurs some overhead; making the task command not targetable can improve the performance of the overall command framework.
A feature that allows the user to perform date aging based on a specific date. For example, the base date of the production run and a target date for a particular test can be specified. Dates are automatically aged to maintain the relationship between the base and target. See also age, incremental aging, semantic aging.
target catalog entry
A promotional product or SKU that is defined as a merchandising association. See also source catalog entry.
A customization definition document (CDD) to which placeholders have been added, and for which placeholder values have been specified. A target CDD describes a particular target customization definition.
A configuration item (CI) that is expected to be affected by a proposed change. A target CI can be defined when a request for change (RFC) is created, when an implementation task is defined, or at other points in the change process, especially during impact analysis.
target customization definition
A customization definition that describes a changed version of a current customization definition. Each target customization definition has a target CDD that describes it.
target data queue program
In System i Access, a series of programs that receive requests for data manipulation from the source data queue program. Target data queue programs also send data and replies (to previous requests) to the source data queue program.
target distributed data manager (TDDM)
In a distributed data management network, programming support that translates the DDM requests received from a source system into data management or SQL requests on the target (or remote) system. See also source distributed data manager.
- An RRSF node that a given RRSF node is logically connected to.
- A client node for which other client nodes (called agent nodes) have been granted proxy authority. The proxy authority allows the agent nodes to perform operations such as backup and restore on behalf of the target node, which owns the data.
- In VisualAge RPG, the object to be built by the project, such as a Dynamic Link Library (DLL).
- In communications, the program that is started on the remote system at the request of the source system. See also source program.
- In display station pass-through, a program that runs on the remote system.
target queue manager
See remote queue manager.
target recovery time
The amount of time estimated by the system that it will need to recover access paths during an initial program load (IPL) after an abnormal system end. Actual performance may range around the target.
- In upgrades, the version, release, and modification level of software that is to be installed.
- The release of the operating system on which a user intends to use an object being created, or intends to restore or use an existing object. See also source release.
- A database that contains replication target tables.
- In Q replication and SQL replication, a database or subsystem that contains replication target tables or procedures.
- In upgrades, the planned hardware configuration and software level that exists when the upgrade is completed.
- The system that receives a request from another system. See also source system.
- A system where supported middleware products are installed and maintained.
- In upgrades, the planned hardware configuration and software level which will exist when the upgrade is completed.
- A managed system on which an IBM Director task is performed.
- In Q replication, a table that is the destination for replicated changes from a source that is part of a Q subscription.
- The underlying base table that a violations table and diagnostics table are associated with.
- In SQL replication, a table that is the destination for changes from a registered replication source. A target table can be a user copy table, a point-in-time table, a base aggregate table, a change aggregate table, a CCD table, or a replica table. See also Apply program, replication target, source table.
target user ID
The recipient of actions that were directed by RRSF. See also source user ID.
In the System Modification Program/Extended (SMP/E), a collection of VSAM records describing the target system macros, modules, assemblies, load modules, source modules, and libraries copied from distribution libraries (DLIBs) during system generation, and the system modifications (SYSMODs) applied to the target system.
- An atomic activity that is included within a process. A task is used when the work in the process is not broken down to a finer level of process model detail. Generally, an end-user, an application, or both perform the task. A task object is the same shape as the subprocess, which is a rectangle that has rounded corners. See also case property.
- An action performed by an agent if the event status meets the task execution rules. For example, an agent can send an email, publish a news item, or run a report.
- One or more actions associated with a case. A task has one or more steps that must be completed to finalize the task. For example, a task might be to review new hire applications. A case is not complete until all required tasks are completed or manually disabled. Each task has roles that are associated with it.
- In the Tivoli Dynamic Workload Console, a filter, by scheduling object type, which returns a list of objects with attributes matching those specified in the task definition.
- An action performed by the provisioning server on a host. Examples of tasks are deployment, creating cloning profiles, and detecting the currently installed operating system.
- A unit of computation. In a parallel job, two or more concurrent tasks work together through message passing. Although it is common to allocate one task per physical or logical processor, the terms "task" and "processor" are not interchangeable.
- The basic building blocks in a model. Each task performs a function. Visually, a task represents the lowest level of work that can be portrayed in a process. See also activity.
- A process and the procedures that run the process.
- In Tivoli Intelligent Orchestrator, an action that runs a deployment job on one or more target devices. A deployment job can include one or more job items that correspond to workflows.
- In a Tivoli environment, the definition of an action that must be routinely performed on various managed resources throughout the network. A task defines the executables to be run; the authorization role required to execute the task; and the user or group name under which the task will execute.
- The basic unit of organization in a rule flow.
- A scheduled project activity to which a resource can be assigned to perform work.
- An activity that has business value, is initiated by a user, and is performed by software.
- The smallest unit of work in a workspace that can be assigned to one Content Contributor. See also task group, workspace, workspace content contributor.
- A unit of work representing one of the steps in a process.
- In CICS, a single instance of the execution of a transaction.
- A unit of work to be accomplished by a device or process.
- In Ada language, a routine that operates in parallel with other parts of the program. A task is written as a task specification (which specifies the name of the task, and the names and formal parameters of its entries), and a task body which defines its execution.
- An operation in the console that is launched from a node in the console navigation and completed on a page in the work area.
- A set of actions designed to achieve a particular result. A task is performed on a set of targets on a specific schedule.
- A work item that an administrator performs, for example: granting permissions and adding users to a community.
The type of user assistance that is readily accessible from the product and that includes both task topics that provide step-by-step instructions for how to use one product interface or a set of product interfaces and the concept and reference topics that are closely related to those task topics. Task-based assistance is often included in help systems and information centers.
A command that implements a specific application logic. In general, a controller command and a set of task commands together implement the application logic for a URL request. See also controller command.
task control area (TCA)
An area of main storage acquired by CICS when a task is first dispatched. It is used to control the processing of the task. Once acquired, the TCA exists until the task is terminated. It contains the current status of the task, its relative dispatching priority, and parameters and information being passed between CICS and the application program. During execution of the task, the user can change the priority through task control services; further processing of the task is scheduled accordingly.
task control block (TCB)
A z/OS control block that is used to communicate information about tasks within an address space that is connected to a subsystem. See also address space connection.
The smallest unit of work in a workspace that can be committed to production-ready data. See also commit, production-ready data, quick publish, task, workspace, workspace manager, workspace task group approver.
See trigger monitor.
- A view in the details pane of Enterprise Manager that provides a set of icons that represent tasks. Clicking a taskpad icon initiates an action or starts a wizard that walks the user through an administrative function.
- In System i Navigator, a view of system tasks that lets a user interact with i5/OS operating system functions. A taskpad contains a set of interrelated tasks that either perform a function or launch help that explains how to perform a function.
Task-Related User Exit (TRUE)
A user exit program that is associated with specified events in a particular task, rather than with every occurrence of a particular event in CICS processing (as is the case with global user exits).
task-related user exit (TRUE)
A user exit program that is associated with specified events in a particular task, rather than with every occurrence of a particular event in CICS processing (as is the case with global user exits). See also global user exit, resource manager interface.
A function, introduced with DOS 5.00, that allows the user to switch from one application to another without ending either application. With the task swapper function, only one application is active at any time. The active program is the application that is currently running; all other applications are suspended until the user switches to that application.
A group of elements which can be customized on a host computer. They are either deployment parameters or graphical user interface elements which condition the appearance of the target computer screen when Tivoli Provisioning Manager for OS Deployment is managing the computer. See also deployment scheme.
Indicates the different categories of tax a store may be required to collect, such as federal, state or provincial, and municipal tax. Each tax category must be assigned one of the tax types; either sales or shipping.
- The hierarchical classification of information according to a known system that is used to easily discuss, analyze, or retrieve that information.
- A dictionary that enables users to search for synonyms of their query terms when they search a collection. See also category tree.
See table builder services message.
See Telecommunications Access Method.
See tape configuration database.
A group of one or more systems or sysplexes, or both, that share the same tape configuration database (TCDB). The individual systems in the TCDBplex share access to one or more tape library data servers and to a common pool of scratch volumes in each tape library. They can also share access to the set of private volumes in each tape library.
See automation package.
See transport connection identifier.
See total cost of ownership.
See Transmission Control Protocol.
TCP ACK storm
A denial-of-service attack on a server in which a hacker or cracker secretly inserts data into a client/server session in an attempt to disrupt the session. The resulting acknowledgements (ACKs) bounce back and forth and a TCP ACK storm ensues after the hacker has hijacked multiple client/server sessions.
See to complete performance index.
See Transmission Control Protocol/Internet Protocol.
In PSF, pertaining to a device that is linked to the OS/390 system through a TCP/IP network and receives data from the OS/390 system using the application-layer IBM protocol for IPDS printers. Some TCP/IP-attached printers require the i-data 7913 IPDS Printer LAN Attachment. See also SNA-attached.
See terminal control system.
See Tenex C shell.
See terminal control table.
See terminal control table terminal entry.
See terminal control table line entry.
See terminal control table system entry.
See terminal control table terminal entry.
See terminal control table user area.
See transmission control unit.
See trivial database.
See target distributed data manager.
See time differential factor.
See twinaxial data link control.
See Time Division Multiple Access.
See Tagged/Delimited String Format.
See transaction dump table.
See topology database update.
See terminal equipment.
See terminal equipment 1.
See terminal equipment 2.
See time variance at completion.
The grouping of two to four ports or adapters to increase transmission and reception throughput. Teaming creates a single, high-speed, fault-tolerant link that provides load balancing for both outbound and inbound traffic. See also adapter load balancing.
The component that interacts with a repository to share and version projects and project data. See also version control.
See terminal error block.
An abstract about the document, such as a newsletter, guide, or release note, that includes a pointer to that document. See also technote.
The member of a project team who is authorized to decide whether and how to implement a change request. The technical authority defines change tasks, and estimates the effort of engineering the work tasks, corresponding to a change request.
technical information exchange (TIE)
A part of the electronic customer support function that allows a user to send files to and receive files from a remote support system, and to search for information on a remote support system. The files are sent and received through a remote support network.
A record that maintains information that is related to an externally published directive or bulletin, such as an airworthiness directive or a customer service notification. Technical records are used in highly regulated industries to ensure that all regulations are properly implemented.
An adapter that is designed for interactions that conform to a specific technology. For example, the WebSphere Adapter for FTP, is an intermediary through which an integration broker sends data to a file system that resides on a local or remote FTP server.
technology-independent machine interface (TIMI)
The lowest visible architectural layer of the server. TIMI defines the high-level machine instruction set and application programming interface that is independent of the underlying implementation. This allows the underlying hardware and Licensed Internal Code to evolve over time to take advantage of technology advances without affecting the user-level interface.
A short document about a single topic. See also techdoc.
See terminal endpoint identifier.
telecommunication program PCB (TP PCB)
The program communication block (PCB) that supports communication between an application program and a terminal or other application program. There are two types of TP PCBs: I/O PCB and alternate PCB.
Telecommunication Standardization Sector (ITU-T)
Formerly known as the International Telegraph and Telephone Consultative Committee (CCITT). As of March 1, 1993, recommendations from this group will be known as ITU-T Recommendations. Recommendations made before March 1, 1993, will continue to be known as CCITT Recommendations.
The sending, receiving, and storing of information by way of telecommunication devices. In particular, the use of data collection devices in vehicles to gather and transmit diagnostic and tracking data.
Originally an electromagnetic device consisting of a combined keyboard and printer used to communicate over telephone lines or other wired serial connections. The abbreviation TTY is now used to describe any serial teletypewriter-like connection.
teletypewriter exchange service (TWX)
Teletypewriter service in which suitably arranged teletypewriter stations are provided with lines to a central office for access to other such stations throughout the U.S. and Canada. Both baudot- and ASCII-coded machines are used. Business machines may also be used, with certain restrictions.
Telex Correspondents File
A file that stores data about correspondents. When the user enters the corresponding nickname in a Telex message, the corresponding information in this file is automatically retrieved and entered into the Telex header area.
In TCP/IP, a protocol that provides remote-terminal connection service. Telnet enables users of one host to log on to a remote host and interact as if they were directly attached terminal users of that host.
- An XML representation of the instructions that call the promotions engine.
- A pattern to help the user identify the location of keys on a keyboard, functions assigned to keys on a keyboard, or switches and lights on a control panel.
- In enhanced edit mode, a character buffer that is associated with the terminal.
- In report authoring, a reusable report layout or style that can be used to set the presentation of a query or report.
- In WebSphere Commerce, a predefined skeleton or pattern that determines how information displays on a web page. The template defines characteristics such as the location and type of text and images, and background color.
- A component that can be used to define reference structure attributes or dimension table columns together with their semantics.
- A HATS resource that describes the relatively static portion of the web pages presented by the HATS application, including a banner and navigation area.
- A predefined process of activity roadmap that can be applied to specific process workflows and modified to meet the needs of a specific workflow. Templates can be created, edited, cloned, or deleted.
- In REXX, a guide that allows strings to be parsed by words (delimited by blanks), by explicit matching of strings, or by specifying numeric positions.
- An object used to create new objects of the same type. The newly created object has the same characteristics as the template. See also application security template, entry template, property template, publish template, publishing style template, search template, security template, versioning security template.
- A DB2 utilities output data set descriptor that is used for dynamic allocation. A template is defined by the TEMPLATE utility control statement.
- In UML modeling, a model element with unbound formal parameters that you can use to define families of classifiers, packages, and operations. A parameterized model element that describes or identifies the pattern for a group of model elements of a particular type.
- In the Reusable Asset Specification (RAS), a special kind of pattern, providing a common solution to a common problem in a given context. A template is the most flexible in terms of manipulating its participants, as compared to mechanisms, frameworks, and component systems.
- A grouping of elements that share common properties. These properties may be defined only once, at the template level, and are inherited by all elements using the template. In Java terms, this is an abstract class.
- A family of C++ classes or functions with variable types.
- The metadata that defines the format of data in the RACF database.
- A file that contains an AIX Profile Manager profile and the options that can be applied for deployment of a template on the target system.
- A predefined structure for an artifact.
- In Informix, a mechanism that is used to set up and deploy Enterprise Replication for a group of tables on one or more servers.
- A generalized project or deliverable plan without populated data for use by project managers for planning a project.
- A standard layout used in such system communications as email, approval requests, and error messages.
In UML modeling, the actual value that is assigned to a template parameter to make the template a usable model element. See also template parameter.
In UML modeling, a formal parameter that, after it is bound to an actual value, makes a template a usable model element. See also template argument.
temporary data set
An uncataloged data set with a name that begins with an ampersand (&) or two ampersands (&&) and that is normally used only for the duration of a job or interactive session. See also permanent data set.
temporary dynamic queue
A dynamic queue that is deleted when it is closed. Temporary dynamic queues are not recovered if the queue manager fails, so they can contain nonpersistent messages only. See also permanent dynamic queue.
- A resource failure that can be resolved by error recovery programs. See also permanent error.
- An error that requires an operation to be retried a number of times before it is successfully completed.
temporary file system (TFS)
A temporary, in-memory physical file system that supports in-storage mountable file systems. Normally, a TFS runs in the kernel address space, but it can be run in a logical file system (LFS) colony address space.
A library that is automatically created for each job to contain temporary objects that are created by the system for that job. The objects in the temporary library are deleted when the job ends. The system name for temporary library is QTEMP.
- The CICS facility that allows application programs to store data in a temporary storage queue for later retrieval.
- The section of computer storage in which data is stored temporarily while a program is running.
temporary storage group identification (TSGID)
A control block containing entries addressing each element of a temporary storage queue. Each temporary storage queue has at least one TSGID. Extra TSGID entries are allocated as required.
temporary storage unit table (TSUT)
A table that contains an entry for each temporary storage identifier. Each entry addresses either a temporary storage record in main or in auxiliary storage, or, in the case of a temporary storage queue, the TSGID.
A table that holds temporary data. Temporary tables are useful for holding or sorting intermediate results from queries that contain many rows. The two kinds of temporary tables, which are created by different SQL statements, are the created temporary table and the declared temporary table. See also base table, created temporary table, declared temporary table, result table, table.
See terminal error program.
For processor storage, real and virtual storage, and channel volume, 2 to the power of 40 or 1 099 511 627 776 bits. For disk storage capacity and communications volume, 1 000 000 000 000 bits.
For processor storage, real and virtual storage, and channel volume, 2 to the 40th power or 1 099 511 627 776 bytes. For disk storage capacity and communications volume, 1 000 000 000 000 bytes.
- The smallest part of an expression that can be assigned a value.
- A word or phrase that describes a characteristic of the enterprise. By assigning assets to terms in the business glossary, you can organize your metadata based on business meaning.
- A string, symbol, or function call contained within a REXX expression.
- The point at which one node in a message flow is connected to another node. Terminals can be connected to control the route that a message takes, dependent on the outcome of the operation that is performed on that message by the node.
- See display station.
- In data communication, a device, usually equipped with a keyboard and display device, capable of sending and receiving information.
- In curses and extended curses, a screen that represents what the workstation's display screen currently looks like. The terminal screen is identified by a window named curscr, which the user does not access directly.
- In a system or communications network, a point at which data can either enter or leave.
terminal abnormal condition line entry (TACLE)
An area containing CICS error information and a copy of the data event control block (DECB) at the time an error occurred on a non-SNA LU or line. When an abnormal condition occurs on a non-SNA LU or line, terminal control places the terminal out of service and dynamically creates a TACLE, which is chained off the terminal control table line entry (TCTLE) for the terminal or line on which the error occurred.
In CICS, a facility that handles addressing, and transmission error detection and correction for terminals (displays and printers) associated with the local CICS system. It also handles the intercommunication data queue used by CICS.
- A table describing the terminals and logical units within a CICS network.
- CICS control table retained to define non-SNA LU networks.
terminal control table line entry (TCTLE)
A control block in the TCT for all non-SNA LUs on the same line. The TCTLE contains all parameters necessary for processing requests for terminals on the line.
terminal control table system entry (TCTSE)
In the TCT, an entry that is generated for each system known to the local CICS system. Using resource definition macro (RDM), the DFHTCT TYPE=SYSTEM macro defining a TCTSE must specify the applid of the remote system in the NETNAME or the SYSIDNT option. Using resource definition online (RDO), the CEDA DEFINE CONNECTION transaction defining a remote system generates a TCTSE, and must specify the applid of the remote system in the NETNAME option.
terminal control table terminal entry (TCTE, TCTTE)
In the TCT, an entry for each terminal known to CICS. TCTTEs are generated either during system initialization (for terminals predefined by resource definition) or when a terminal is autoinstalled. The TCTTE describes the terminal and addresses the corresponding TCTLE, the active TCA, and TIOAs; it also contains control information relating to terminal control requests issued by the CICS application program.
terminal device file
See character special file.
terminal equipment 1 (TE1)
Data terminal equipment (DTE) with integrated ISDN support. In an ISDN, the System i system is a TE1. See also terminal equipment 2.
terminal equipment 2 (TE2)
Data terminal equipment (DTE) without an ISDN interface. To communicate with other equipment through an ISDN, this equipment must have the protocol converted to one that can be recognized by the network. For example, a 7820 ISDN terminal adapter may be used. See also terminal equipment 1.
terminal error program (TEP)
A user-replaceable CICS program used to handle error conditions that can occur when sequential devices are used. Node error programs must be used for z/OS Communications Server-supported devices. The terminal error program analyzes the cause of the terminal or line error that has been detected by the terminal control program.
The resource in a 3270 service project that contains the information necessary for connecting to the host system during build time. Terminal files are automatically generated when the 3270 terminal service project is created. In the Navigator view, if a terminal file is selected, the 3270 terminal service recorder opens in the editor area.
terminal-initiated transaction routing
Transaction routing that is initiated by a request to start a remote transaction arriving from a terminal. On the basis of an installed resource definition for the transaction and possibly on decisions made in a user-written dynamic transaction routing program, the request is routed to the appropriate remote system. The transaction runs as if the terminal were attached to the transaction-owning system.
terminal list table (TLT)
CICS control table that allows terminal, or operator identifications, or both, to be grouped logically. See also supervisory terminal functions.
A type of main storage database (MSDB) in which each segment is assigned to and owned by one logical terminal (LTERM), the owner with terminal security may alter or update that segment, and a segment may be referenced by someone other than the owner. Terminal-related MSDBs are either fixed ((permitting changes) or dynamic (permitting segment insertion and deletion).
terminal response mode
The type of response mode that suspends all input operations from the terminal until the application program has generated the output message. See also line response mode, response mode.
The use of system definition macros and security maintenance utility control statements to authorize a particular logical or physical terminal to issue some or all of the operator commands and to send or receive some or all of the currently defined transactions.
terminate end event
An end event that will stop all parallel activities within its process level and all lower process levels. See also end event.
A node that marks the end of a process. When a flow reaches a terminate node while the process is running, the process immediately terminates, even if there are other currently executing flows within the process.
In SNA, a request unit that is sent by a logical unit (LU) to its system services control point (SSCP) to cause the SSCP to start a procedure for ending one or more designated LU-LU sessions.
termination imminent step
The final step of the three-step condition-handling model. In the termination imminent step, a final chance is provided to handle conditions or to perform cleanup before the thread is terminated. See also condition step, enablement step.
- A syntax object that signifies the end of a data object. For example, a carriage return/linefeed at the end of a record might be the record's terminator.
- The part of a program that performs the action necessary to end a job or program.
A code that is used by the DB2 database manager to preset the default collation order for an SBCS database and to establish monetary, date, time, and numeric formatting that is specific to a country, region, or territory.
Territory Optimization Program (TOP)
An IBM-wide initiative for designing high-quality sales territories based on market opportunity (identified through the Market Alignment Program (MAP) and augmented by revenue commitment interlocks. See also Market Alignment Program.
- A discipline in the software-engineering process whose purpose is to integrate and test the system.
- In communications, a data link command or response used to perform a basic test of the station-to-station link connection.
- A set of tasks, scripts, or routines that automate the task of testing software.
- The inputs, execution conditions, and expected results that are used to evaluate an aspect of a system under test. See also test idea.
- A set of input values, execution preconditions, expected results and execution postconditions, developed for a particular objective or test condition, such as to exercise a particular program path or to verify compliance with a specific requirement. (ISTQB)
- A set of characteristics of the system that hosts the system under test. These characteristics affect the conditions for test execution and the evaluation of test results.
- A property of the integration test client that is used to specify modules for testing and to control the tests.
A measurement of the extent of testing for a product. This measurement is often a percentage that represents the degree to which a set of tests address the formal specifications specified test cases for a system or component.
A software module or application used to invoke a test and, often, provide test data, control and monitor execution, and report test outcomes. A test driver sequences and controls the automated execution of one or more tests.
- A specific instance of a configuration of hardware and software established for the purpose of conducting tests under known and controlled conditions. See also deployment environment.
- An environment containing hardware, instrumentation, simulators, software tools, and other support elements needed to conduct a test. (ISTQB)
The calculated approximation of a result related to various aspects of testing (e.g. effort spent, completion date, costs involved, number of test cases, etc.) which is usable even if input data may be incomplete, uncertain, or noisy. (ISTQB)
A series of script files used to enable a DB2 database for use by the DB2 XML Extender. A test harness is optionally created when a DAD file is generated from a relational database to XML mapping. Once enabled, it tests composing XML from data as well as decomposing XML files into relational data.
The definition of one aspect of a possible software test that is used to evaluate the benefit of creating that test. Examples of test ideas include inputs, execution conditions, and expected results. See also test case.
A key added to a telex message to ensure message integrity and authorized delivery. The test key is an integer value of up to 16 digits, calculated manually or by a test-key processing program using the significant information in the message, such as amounts, currency codes, and the message date.
test-key processing program
A program that automatically calculates and verifies a test key. The Telex Link supports panels for input of test-key-related data and an interface for a test-key processing program.
A user-defined library used for debugging operations that does not contain objects needed for normal processing. See also production library.
See evaluation mission.
- The mode employed in testing a new user interface, in which the compiled application is used to drive the interface. Allows building, modifying, testing, and refining operations without having to compile, link, and debug.
- The mode that causes any input message entered into a terminal under test to be returned to the test terminal, with error analysis procedures bypassed.
A template used for the automatic generation of component tests. There are several test patterns available for testing both Java and EJB components. See also component test.
See test idea.
A collection of step-by-step instructions that realize a test, enabling its execution. Test scripts may take the form of either documented textual instructions that are executed manually or computer readable instructions that enable automated test execution.
The stage of the scan during which the objects and logic of the scanned application are submitted to a comprehensive barrage of typical, erroneous, and simulated-malicious usage techniques, resulting in a complete inventory of security vulnerabilities.
- A set of usage scenarios with which the user can verify that business rules are correctly designed and written. Running test suites produces a report comparing the expected results and the actual results obtained when applying rules to the scenarios.
- A collection of test cases that define test behavior and control test execution and deployment.
- A sequence of characters that can be read by a person and encoded into formats such as ASCII that can be interpreted by a computer.
- A finishing item that consists of any alphanumeric or special characters.
The process of extracting semantics and other information from text to enhance the retrievability of data in a collection. See also semantic search.
text analysis engine (TAE)
A software component that is responsible for discovering and representing context and semantic content in text. See also Common Analysis Structure.
The process of assigning an integer value to a document that signifies the relevance of the document with respect to the terms in a query. A higher integer value signifies a closer match to the query. See also dynamic ranking, static ranking.
A substitution method that uses lexical analysis and dictionary support to propose candidates for corrected text, for example: spelling suggestion, search query resolution, and thesaurus lookup.
Entry of characters in a free format. Entry of text is generally done to provide information for human comprehension, with or without further machine processing. See also data entry, free format.
A file that contains only printable characters. See also binary file.
text search index database
The database files used by text search services for storing the significant words of documents. These database files are used when a user requests a search of the document library for one or more phrases.
text search index partition
The collection that contains the text search index data from a specific database partition. A text search index is mapped to one or more collections to match the distribution of the data table that hosts the text index.
In binary synchronous communication (BSC), a method of sending and receiving data containing any or all of the 256 character combinations in EBCDIC in specific bit patterns, including transmission control characters.
See temporary file system.
See Trivial File Transfer Protocol.
See transmission group.
See ticket-granting service.
See transmission header.
- A collection of all layer styles, zoom levels, and how zooming affects each map configuration. It is a collection of all the style sets that are defined for the layers of a map application.
- The style element that gives a place a particular look. The portal provides several themes, similar to virtual wallpaper, which can be chosen when creating a place.
- A style that can be applied to a chart to configure its global appearance, such as plotting area background, scale font, and legend location.
- A collective set of style sheets that supports the look and feel of the Rational Asset Manager Web client.
A type of concept extraction that automatically recognizes significant vocabulary items in text documents to extract the theme or topic of a document. See also concept extraction.
A client that has little or no installed software but has access to software that is managed and delivered by network servers that are attached to it. A thin client is an alternative to a full-function client such as a workstation. See also rich client.
An appliance that provides a 5250-based operating system console for the IBM i operating system. This appliance connects directly to the server using one of the HMC Ethernet ports (labeled HMC 1 and HMC 2) on the back of the server.
- The ability to define a storage unit (full system, storage pool, volume) with a logical capacity size that is larger than the physical capacity assigned to that storage unit. See also volume.
- A mechanism that provides the ability to define logical volume sizes that are larger than the physical capacity installed on the system.
third-generation language (3GL)
A high-level programming language that was designed to run on the third generation of computer processors, built on integrated circuit technology roughly from 1965 to 1970. C, FORTRAN, Basic and Pascal are examples of third-generation languages still in use today.
third party data source
Data, information, and services that are not owned by IBM and that are accessed using feeds, web services, or another remote access method. Examples of third party data sources are Google Maps service, Google gadgets, AccuWeather, and Yahoo News.
See target library high-level qualifier.
- The local symbol used to separate every third digit in large numbers or lengthy decimal fractions.
- The character (comma in the United States) placed every third number starting left of the decimal point. For example, three thousands separators are used in the number: 641,322,974,821.
A condition, caused by a high level of memory over-commitment, in which the system is spending all of its time writing out virtual-memory pages and reading them back in. The application programs make no progress because their pages don't stay in memory long enough to be used. Memory load control is intended to avoid or stop thrashing.
- The DB2 structure that describes the connection of an application, traces its progress, processes resource functions, and delimits its accessibility to DB2 resources and services. Most DB2 functions execute under a thread structure.
- A stream of computer instructions that is in control of a process. In some operating systems, a thread is the smallest unit of operation in a process. Several threads can run concurrently, performing different jobs. See also user thread.
- See thread-specific storage.
- A mechanism that allows each thread in a multithread process to allocate storage for its corresponding data.
thread private storage
See thread-specific storage.
Pertaining to a function, macro, or operating system service that can be called from multiple threads in a process at the same time. See also multithreaded application, reentrant code, thread unsafe.
The ability to synchronize the activities of various threads. A thread synchronizes itself with another thread by putting itself to sleep. Before doing so, the thread notifies the operating system as to what event has to occur in order for the thread to resume execution.
Pertaining to a function, macro, or operating system service that cannot be called from multiple threads in a process at the same time. See also threadsafe.
three-tier client/server architecture model
A client/server system that is similar to a two-tier client/server system, but has an additional layer of application servers. The additional layer allows for splitting the application logic between client processes. This way, a specialized application server process can handle resources management, other I/O, or calculation intensive tasks in order to minimize network load. See also client/server architecture, two-tier client/server architecture model.
- A setting that applies to an interrupt in a simulation that defines when a process simulation should be halted based on a condition existing for a specified proportion of occurrences of some event.
- In OSI, a user-specified value that determines the frequency with which events will be reported. For example, if a certain error threshold is set at 10, the error will not be reported until the tenth occurrence of the error.
- A level set in the system at which a message is sent or an error-handling program is called. For example, in a user auxiliary storage pool, the user can set the threshold level in the system values, and the system notifies the system operator when that level is reached.
- A storage group attribute that controls the space usage on direct access storage device (DASD) volumes, which is defined as a percentage of occupied tracks versus total tracks.
- A level that is set on the Director server to define the configuration status of the monitored systems.
- A customizable value for defining the acceptable tolerance limits (maximum, minimum, or reference limit) for an application resource or system resource. When the measured value of the resource is greater than the maximum value, less than the minimum value, or equal to the reference value, an exception or event is raised. See also performance threshold.
- A specified percentage of licenses; if more than this percentage of licenses for a product are in use, messages about the level of use are logged.
- A user-defined entity that establishes a condition or boundary that, if exceeded, causes the data server to take a prescribed set of actions. See also workload definition.
threshold definition domain
The object that a threshold is associated with and whose activities are monitored to ensure that the threshold condition is not exceeded. A threshold affects only activities within its domain.
threshold enforcement scope
The area for which a threshold is both monitored and enforced for activities to which the threshold has been applied. Examples of this area include a workload occurrence, a database partition, or a database.
In OSI, an event that occurs when a counter has reached its user-specified threshold. OSI Communications Subsystem logs threshold events and generates messages to the operator about these events.
The process of moving files from a local file system to storage based on the high and low thresholds that are defined for the file system. See also automatic migration, demand migration, migration job, selective migration.
In the capacity planning tool, a value used as a general guide for optimal resource utilization. If resource utilization is above the threshold value, the resource performance may be unacceptable. Threshold values are also available for the rate of synchronous reads in the machine pool and for the sum of all pools. See also guideline value.
A utility that has a limit placed on the resources that would otherwise be consumed. The degree to which the resources are limited is based on the current workload of the system. Supported utilities include backup, restore, and table space reorganization.
- In storage management, the total bytes in the workload, excluding overhead, that are backed up or restored, divided by elapsed time.
- The measure of the amount of work performed by a device, such as a computer or printer, over a period of time, for example, number of jobs per day.
- A measure of the amount of information transmitted over a network in a given period of time. Throughput is generally measured in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps). See also aggregate bandwidth.
- In data communications, the total traffic between stations over a period of time.
- In OSI, a network layer facility that selects the speed with which data transmission requests are to be handled.
- In X.25, a packet-switching data network optional facility that allows the data terminal equipment (DTE) to negotiate the speed at which its packets travel through the packet-switching data network.
throwing message intermediate event
An intermediate event that sends a message. See also intermediate event.
See USB flash drive.
See trunk interface card.
- A record, such as a service request, incident, or problem report, that can be routed and assigned a status.
- A mechanism for securely transmitting the identity of a client to a server.
A part of the key distribution center (KDC) that generates service tickets. A principal presents a ticket-granting ticket to the ticket-granting server when the principal requests a service ticket. The ticket-granting server uses the ticket-granting ticket to verify that the principal has authenticated to the authentication server before it grants the request for a service ticket.
ticket granting ticket
A ticket that allows access to the ticket granting service on the key distribution center (KDC). Ticket granting tickets are passed to the principal by the KDC after the principal has completed a successful request. In a Windows 2000 environment, a user logs on to the network and the KDC will verify the principal's name and encrypted password and then send a ticket granting ticket to the user.
- A ticket that a principal passes to the ticket-granting server when a service ticket is requested. The ticket-granting service uses the ticket-granting ticket to verify that the principal has authenticated to the authentication server before it grants the request for the service ticket.
- A ticket that allows access to the ticket granting service on the key distribution center (KDC). Ticket granting tickets are passed to the principal by the KDC after the principal has completed a successful request. In a Windows 2000 environment, a user logs on to the network and the KDC will verify the principal's name and encrypted password and then send a ticket granting ticket to the user.
See technical information exchange.
- A group of servers that share a function in an application.
- The logical group of components and the computers on which those components are installed.
A service level agreement (SLA) that includes an offering containing at least one previously deployed SLA. They can be used to include the results of operational level agreements, internal SLAs or outsourced SLAs, in an external SLA that are supplied to a customer.
See Tagged Image File Format.
See Tag Image File Format-Fax.
tightly coupled analysis engine
An aggregate analysis engine whose componenet analysis engines run in the same address space. See also analysis engine.
One of the accent marks in Latin script (~). See also ogonek.
- To fill a region with a pixmap.
- To replicate a pixmap in two dimensions.
- A rectangular area that constitutes the basic element of a tiled layer.
- See pixel map.
A particular type of manager layer that is specifically designed to support load-on-demand mechanisms. A tiled layer is divided into a set of rectangular tiles of identical size that form a tiling grid.
A three-part value that designates a time of day in hours, minutes, and seconds. See also timestamp.
Time Division Multiple Access (TDMA)
A digital communication technology used by some carriers to provide PCS service. TDMA is a multiplexing technology used with satellites and cell phones, in which multiple channels of data are interleaved (each signal is assigned to a different time interval, and the signals are transmitted by taking turns). See also extended time division multiple access.
time-division multiplex bus
A method of transmitting many channels of data over a smaller number of physical connections by multiplexing the data into timeslots, and demultiplexing at the receiving end. In this document one such channel can be considered to be a half-duplex unidirectional stream of 64 kilobits per second.
A payment that is to be scheduled before its schedule time. This capability is used by Continuous Linked Settlement (CLS). In MERVA Liquidity Manager, timed payments are scheduled even if the corresponding currency, channel, or partner banks are stopped.
See asynchronous messaging.
Time-Modulated Ultra-Wide Band (TM-UWB)
New wireless technology that greatly broadens bandwidth. Developed by Time Domain, TM-UWB uses short, coded pulses transmitted over a wide range of frequencies, making it useful for a broad range of applications from networking to through-the-wall radar and secure communications.
time-of-day clock (TOD clock)
A timing device that counts units of time based on the starting point of 00 hours, 00 minutes, and 00 seconds on January 1, 1900. Time-of-day (TOD) information is used to monitor computer operations and events. See also time tolerance.
- An event that occurs at the end of a predetermined period of time that began at the occurrence of another specified event.
- Abnormal termination of either an application or the DB2 for z/OS subsystem because of the unavailability of resources.
- A time interval that is allotted for an event to occur or complete before operation is interrupted.
- An event that is triggered by an occurrence at a specific time.
- A BTS object that expires when the system time becomes greater than a specified time, or after a specified period has elapsed. When a timer is defined, a timer event is automatically associated with it. When the timer expires, its associated event fires.
- A task that produces output at certain points in time.
Major component of CICS that provides interval timing and alarm clock services for CICS domains. These are processes that cause an action to occur at some predetermined future time. This service can be performed after a specific interval, at periodic intervals, at a specified time of day, or at a specific time of day every day. It also provides date and time provision and conversion facilities.
A condition that determines the times before or after which a job or job stream cannot run. Specifying both before and after defines a time frame within which a job or job stream runs. Jobs can also have a repetition rate. For example, Tivoli Workload Scheduler can launch the same job every 30 minutes between the hours of 8:30 a.m. and 1:30 p.m. See also timeline view.
- An atomic event that fires when its associated timer expires. See also user-defined event.
- An event that is triggered when a time condition is satisfied. See also intermediate event.
timer intermediate event
An intermediate event that is triggered?when a time condition is satisfied. A timer intermediate event can delay the flow of the process or can generate a timeout for activities that exceed the time condition.
A unit of measurement used to give a rough relative estimate of the resources required, or the cost, for the database server to execute two plans for the same query. The resources calculated in the estimate include weighted processor and I/O costs.
timer start event
A start event that is triggered when a time condition is satisfied.?A timer start event is used only for event subprocesses. See also start event.
Time Sharing Option (TSO)
A base element of the z/OS operating system with which users can interactively work with the system. See also Interactive System Productivity Facility.
- The amount of processor time (specified in milliseconds) allowed for a job before other waiting jobs of equal priority are allowed to process data.
- The interval between scheduled checks by the CPU scheduler to see if a different thread should be dispatched. Unscheduled checks may occur as a result of interrupts or system calls.
timestamp with time zone
A two-part value that consists of a timestamp and time zone. The timestamp with time zone is expressed in years, months, days, hours, minutes, seconds, microseconds, time zone hours, and time zone minutes.
A measure that represents the state of a system at a specific point in time. For example, a time-state measure might show the number of employees in a company at the start of each month, or the product inventory on a given day for each week. A time-state measure can be aggregated by operations, such as totalling across other dimensions, but not across time.
A schedule of times. In business process modeling, timetables are typically associated with resources or costs. For resources, timetables indicate availability (such as Monday to Friday). For costs, timetables are useful if the cost varies with time of day (such as electricity) or time of year (such as seasonal foods).
The difference between the TOD clocks on two adjacent nodes, beyond which the path manager will not allow a session to be established. See also time-of-day clock.
- A technique used by best-effort delivery protocols to inhibit endlessly looping packets. The packet is discarded if the TTL counter reaches 0.
- The time interval in seconds that an entry can exist in the cache before that entry is discarded.
time zone support
A feature of Tivoli Workload Scheduler for z/OS that lets applications be planned and run with respect to the local time of the processor running the application. The controlling processor makes allowances for differences in time zones during planning activities to ensure that interacting activities are correctly coordinated.
See technology-independent machine interface.
A specialized validation action used to measure the duration of a method call or a sequence of method calls. See also validation action.
See terminal input/output area.
- In OSI, a permanent identifier for an object.
- The part of a personal name that represents a social, religious, or academic status, such as "Dr.," "Ms.," or "Colonel." A title is an optional part of a personal name that typically precedes given names. For name-matching purposes, a title is considered to be a peripheral or minor part of a personal name. See also honorific.
title, affix, and qualifier (TAQ)
A name token that often helps identify that a string of text represents a name. While these tokens usually indicate something about the name, only affixes are part of the actual name.
Tivoli common directory
A common directory where Tivoli programs store message logs, event logs, or trace logs in XML format, for subsequent filtering by the Tivoli XML Log Viewer utility. See also log viewer, Tivoli XML log format.
Tivoli management region (TMR)
See Tivoli region.
Tivoli Presentation Services Web Component Library (WCL)
An Integrated Solutions Console technology that includes a foundation layer and a set of reusable web components that enable developers to create scalable and extendable user-interface components for web applications.
The Tivoli server and the set of managed node gateways and endpoints that it serves. An organization can have more than one region. A Tivoli region addresses the physical connectivity of resources, whereas a policy region addresses the logical organization of resources.
Tivoli Space Manager
A feature of the Tivoli Storage Manager product that handles the moving of files in and out of a secondary storage medium based upon actual file accesses in the primary native file system. This feature can be used with DB2 Data Links Manager to enable DATALINK files to be stored in a virtually infinitely sized file system.
Tivoli Storage Manager
A client/server product that provides storage management and data access services in a heterogeneous environment. Tivoli Storage Manager supports various communication methods, provides administrative facilities to manage the backup and storage of files, and provides facilities for scheduling backups.
Tivoli Storage Manager command script
A sequence of Tivoli Storage Manager administrative commands that are stored in the database of the Tivoli Storage Manager server. The script can run from any interface to the server. The script can include substitution for command parameters and conditional logic.
See translation lookaside buffer.
A memory delay that occurs when a memory location is referenced and the page that contains that memory location does not have an entry in the appropriate transition lookaside buffer (instruction or data).
See Transport Layer Interface.
See target library.
See terminal list table.
See Transaction Manager database.
See target member.
See Transaction Manager Facility.
See trigger monitor interface.
See Terminal Monitor Program.
See Tivoli management region.
See Transport Manager Subsystem.
See Time-Modulated Ultra-Wide Band.
The target activity of a constraint, in which the activity whose start or end depends on the start or end of another activity as the result of the constraint. See also From activity.
to complete performance index (TCPI)
The difference between budget at completion and budgeted cost of work performed divided by the difference between budgeted at completion and actual cost of work performed.
See time-of-day clock.
See tokenized form.
- To switch between two modes on a computer or network; for example, to switch between data entry and command entry modes or between stand-alone operation and device emulation.
- Pertaining to a switching device, such as a toggle key on a keyboard, that allows a user to switch between two types of operations.
- Pertaining to any device having two stable states.
- The basic textual units that are indexed by enterprise search. Tokens can be the words in a language or other units of text that are appropriate for indexing. See also lexical parsing item.
- A marker that progresses through a process instance and indicates which element is currently running. A process instance can generate several tokens. A token can take only one path.
- See assertion.
- A particular message or bit pattern that signifies permission or temporary control to transmit over a network.
- A value passed as a parameter for the purpose of uniquely identifying objects.
- In checkpoint processing, an identifier that is used to determine checkpoint I/O status.
- A real or virtual device that stores cryptographic data objects such as keys and digital certificates.
- In OSI, an attribute of a connection. The token is dynamically assigned to one session-service user at a time to permit certain services to be called. Tokens are a session layer concept.
- The basic syntactic unit of a computing language. A token consists of one or more characters, excluding the blank character and excluding characters within a string constant or delimited identifier.
A mechanism that controls data flow. As an application requests permission into a network, the token bucket adds characters (or tokens) into a buffer (or bucket). If enough room is available for all the tokens in the bucket, the application is allowed to enter the network.
A system for controlling file access in which each application performing a read or write operation is granted some form of access to a specific block of file data. Token management provides data consistency and controls conflicts. Token management has two components: the token management server and the token management function.
According to IEEE 802.5, network technology that controls media access by passing a token (special packet or frame) between media-attached stations. See also local area network.
A local area network that connects devices in a ring topology and allows unidirectional data transmission between devices by a token-passing procedure. A device must receive a token before it can transmit data. See also local area network.
In CoOperative Development Environment/400, a token or set of tokens having a similar characteristic or function, and assigned the same display attributes by the CoOperative Development Environment/400 program.
A small subset of attributes of a deleted object. The tombstone object is retained for a specified period, and at the end of the specified period, the tombstone object is permanently deleted.
- A pitch associated with words to distinguish meanings. The Mandarin Chinese dialect, for example, has four tones: ma (first tone) means mother, ma (second tone) means hemp, ma (third tone) means horse, and ma (fourth tone) means to scold. In Romanized Chinese, tones are indicated by diacritics called "tone marks," but computerized lists of names generally do not contain these important marks. Yoruba, Vietnamese, and Thai are also tonal languages.
- An audible signal sent across a telephone network. There are single (one-frequency) tones, tritones (three sequential tones at different frequencies), dual tones (two simultaneous tones at different frequencies), and dual sequential tones. Each has a different meaning.
Toolbox for Java
See IBM Toolbox for Java.
- A container where artifacts can be stored for reuse by process applications or other toolkits.
- A set of development tools used to write and test software applications.
A form of user assistance that is displayed when a cursor is moved over a graphical image, such as an icon, that does not otherwise have a label. A tooltip provides a brief, plain text description of function.
See Territory Optimization Program.
In web services, the process of developing a service from a Web Services Description Language (WSDL) file. See also bottom-up development.
- A character string that describes the nature of the data that is being published in a publish/subscribe system.
- A single web page at any level within an information center hierarchy.
- Logical channel of communication between one or more transmitters and one or more receivers.
- An independent unit of information that follows the rules for a specific information type and that is meaningful when it is displayed alone.
- In dynamic data exchange (DDE), the data that is to be exchanged within a DDE conversation.
- A set of closely related topics that is presented in a standard hierarchy within an information unit.
- A functional group of web pages. A topic collection can be a grouping at any level within an information center hierarchy.
topic connection factory
An interface used by a Java application to create topic connection objects. These objects allow messages to be placed on that topic. It is used by the JMS Listener to retrieve messages from the topic.
top-level business object
The individual business object at the top of a hierarchical business object. It is a parent business object but does not itself have a parent business object. See also hierarchical business object.
top-of-rack switch (TOR switch)
A network switch that is located in the first rack of an IBM System z BladeCenter Extension (zBX). See also intraensemble data network TOR switch, management TOR switch.
- The cluster layout and connections, as well as cluster, node, network, and network interface information.
- The structure of a graph. Two drawn graphs have the same topology if one drawing can be obtained from the other by moving the nodes and reshaping the links.
- In the broker domain, the brokers, collectives, and connections between them.
- A graphical view of a configured item and its relationships.
- In fibre-channel technology, the configuration of the fibre-channel network and the resulting communication paths allowed. Possible topologies are point-to-point, switched fabric, and arbitrated loop.
- The physical or logical mapping of the location of networking components or nodes within a network. Common network topologies include bus, ring, star, and tree.
- A graphical breakdown of a transaction displayed in an hierarchical arrangement of software components and transactions.
- An inventory of CICS and CICSPlex SM resources, and a map of their relationships. CICSPlex SM supports the definition of resource and system topology.
topology database update (TDU)
A message about a new or changed link or node that is broadcast among APPN network nodes to maintain the network topology database, which is fully replicated in each network node. TDU messages contain identifying information, node and link characteristics, and resource sequence numbers to identify the most recent updates for each of the resources described in the TDU.
A function of the Managed System Services program that is responsible for collecting topology information from nodes and clients in the network. The topology manager can reside on any system in the network; however, this system is most likely to be the central site system.
In AIXwindows, a narrow band of lighter color that is located across the top of a rectangular graphical object (a widget or gadget). The top shadow creates a three-dimensional appearance when the object is manipulated.
See terminal-owning region.
See top-of-rack switch.
In DFU, a storage area where final totals for a field are kept. See also batch accumulator.
In an advanced order, the cost of all order items, along with additional fees and taxes. See also current charge.
total cost of ownership (TCO)
A methodology for calculating the actual cost of owning a product over the period of ownership and use based on combining costs of acquisition or leasing, training, deployment, support, residual equipment values, return on investment, time to market, and so forth.
In RPG, an output record written after a group of detail records. Total records generally contain data that is the result of calculations performed on the information in a group of detail records. See also detail record.
The part of the RPG program cycle in which calculation and output operations specified for a group of records are done. See also detail time.
The interface to an instance of a managed resource, such as an operating system or a server. A touchpoint implements a sensor and an effector for the managed resource, and maps the sensor and effector to existing interfaces. See also effector, manageability interface, sensor.
See transport-layer protocol data unit.
See Transaction Processing Facility.
See time provider interface.
See transaction pipe.
See transaction program name.
See Teleprocessing Network Simulator.
See telecommunication program PCB.
See transaction program record.
See Touchpoint web service.
- To record data that provides a history of events occurring in the system.
- In DB2 replication, a facility that is used to collect monitoring, auditing, and performance data for the Capture program, the Q Capture program, the Apply program, the Q Apply program, or the Replication Alert Monitor.
- In the Unified Modeling Language (UML), a dependency that indicates a historical or process relationship between two elements that represent the same concept without specific rules for deriving one from the other.
- A record of the processing of a computer program or transaction. The information collected from a trace can be used to assess problems and performance.
- A DB2 for z/OS facility that provides the ability to collect monitoring, auditing, performance, accounting, statistics, and serviceability (global) data.
- The ability to trace a project element to other related project elements, especially those related to requirements.
- The ability to identify the measuring and test equipment that was used to calibrate an asset.
A view that illustrates the relationships between requirements of the same or different types. This matrix is used to create, modify, and delete traceability relationships and view indirect relationships and traceability relationships with a suspect state. See also suspect relationship state, view.
See trace to/trace from relationship.
A view of requirements of a single type that displays other requirements traced to or from them. See also view.
Trace Analysis Program (TAP)
See Advanced Communications Function/Trace Analysis Program.
- A section of a dump that provides information about the stack frame, the program unit address, the entry point of the routine, the statement number, and status of the routines on the call-chain at the time the traceback was produced.
- For the Ada debugger, a listing of the routines that are in the call chain above the code that is being debugged. For example, if a breakpoint is set within an Ada procedure and a call traceback is requested, a list appears that includes all of the procedures that called the Ada procedure, in the order that they called it. All the calling procedures in the call chain are listed up to, but not including, the operating system calling the original highest level routine.
A level associated with each trace point. The level of a trace point depends on where the trace point is and on what sort of detail it can provide on a trace call. Most trace points are trace level 1 or 2.
A hyperlink that conveys relationships between the artifacts it links, such as dependency, origin, derivation, implementation, or validation. Trace links have link types, which are defined by an Open Services for Lifecycle Collaboration specification or by a project. See also content link.
trace sequence diagram
A graphical representation of an application's dynamic behavior, represented in a sequence diagram format. A trace sequence diagram provides the application's flow of control over time and is annotated with timing, code coverage, memory usage, and threading information.
trace to/trace from relationship
A relationship between two requirements that implies the source, derivation, or dependencies between the requirements. The trace to/trace from state appears in a Traceability Matrix or Traceability Tree when a relationship is created between two requirements.
- A unit of storage on a count-key-data (CKD) device that can be formatted to contain a number of data records. See also data record, home address, track-descriptor record.
- An optional subdivision in a process application that is based on team tasks, process application versions, or both. When enabled, tracks allow parallel development to occur with isolation from changes in other tracks. For example, using tracks one team can fix the current version of a process, while another team builds a completely new version based on new external systems and a new corporate identity.
- A circular path on the surface of a disk or diskette on which information is magnetically recorded and from which recorded information is read.
track and trace service
A service that uses an RFID infrastructure to trace a food product from its point of origin; manufacturers and food retailers can view the complete history of a food product, and speed their response to potential contamination. See also RFID tag, smarter food system.
A special record on a track that follows the home address. The control program uses the track-descriptor record to maintain certain information about the track. The record has a count field with a key length of zero, a data length of 8, and a record number of 0. This record is sometimes referred to as R0. See also track.
- A user who is authorized to monitor, manage, and modify the workflows.
- In Tivoli Workload Scheduler for z/OS, a component that runs on every system in a complex. It acts as the communication link between the z/OS system that it runs on and the controller.
- See tracking IMS.
In an RSR environment, an IMS that tracks the activities of active IMSs to provide disaster recovery support. A tracking IMS is usually geographically remote from the active IMSs. See also active IMS, Remote Site Recovery.
tracking intermediate event
An intermediate event that indicates a point in a process when runtime data is captured for reporting. See also intermediate event.
The XRF phase during which the active processes the IMS workload and the alternate maintains IMS control blocks to duplicate those in the active and uses surveillance to check the active for signs of failure.
See tracking IMS.
In WebSphere Commerce, a method by which buyers and sellers carry out business transactions. Depending on the edition of WebSphere Commerce, these methods may include: fixed price, contract, RFQ, and auction.
A company, such as a manufacturer or a supplier, that agrees to exchange information using electronic data interchange, or an entity in an organization that sends and receives documents that are translated. See also external partner.
trading position container
A price list that contains offers, also known as trading positions. The trading positions in a trading position container are made available to customers by associating the trading position container with the terms and conditions of one or more contracts.
- The Chinese character set expressed in traditional form. Traditional Chinese characters are used in Taiwan, China (Hong Kong S.A.R. of the PRC), and some other parts of the world.
- Characters used mainly in Taiwan and historic Chinese documents. Japanese Kanji and Korean Hanja characters are originally derived from traditional Chinese characters. See also Hanyu, Simplified Chinese.
Traditional Chinese double-byte character set
An IBM-defined DBCS for Traditional Chinese, consisting of Traditional Chinese non-Chinese set, primary set, secondary set, and up to 2,632 user-definable characters.
Traditional Chinese non-Chinese character set
A subset of the Traditional Chinese DBCS, consisting of non-Chinese characters, such as Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana, Hiragana, special symbols and Chinese phonetic symbols. There are 675 characters in this set.
traditional file management
The part of the operating system that controls the storing and accessing of traditional file objects (*FILE objects in the QSYS.LIB library) on a System i system. The data may be on internal storage (for example, database objects), on external media (diskette, tape, or printer objects), or on another system.
traditional line data
A form of line data that is prepared for printing on a line printer, such as 6262 or 3211. See also line data.
In QoS, control functions that are performed to enforce rules specified in a traffic conditioning agreement. Types of traffic conditioning include metering, marking, shaping, and policing.
traffic regulation anomaly
A deviation from normal network traffic patterns that is detected by an intrusion detection system. A traffic regulation anomaly could indicate a denial-of-service attack or a hacker who is monitoring connections to a web server.
A separator page that follows a printed file or a print job. See also job trailer.
- An exchange between two programs that carries out an action or produces a result. An example is the entry of a customer's deposit and the update of the customer's balance. See also availability, conversation, session.
- An atomic series of SQL statements that make up a logical unit of work. All of the data modifications made during a transaction are either committed together as a unit or rolled back as a unit.
- A specific set of input data that triggers a specific process or job. A transaction also can refer to a message destined for an application program.
- A unit of processing consisting of one or more application programs, affecting one or more objects, that is initiated by a single request.
- An exchange between the user and the system. Each activity the system performs for the user is considered a transaction.
- A process in which all of the data modifications that are made during a transaction are either committed together as a unit or rolled back as a unit.
- A subprocess that represents a set of coordinated activities that are carried out by independent, loosely coupled systems in accordance with a contractually defined business relationship. This coordination leads to an agreed, consistent, and verifiable outcome across all participants.
- A request and the response it generated.
transaction abend code
A four-character code, defined by CICS or the user, that is used when abnormally terminating a transaction. CICS-defined transaction abend codes begin with the letter 'A'. A transaction abend code is used to indicate the cause of an error that may have occurred in CICS code or in a user program. See also transaction dump code.
Pertaining to an application program that is divided into segments, where each segment typically requests an I/O operation with a terminal user, giving up control to other application program segments for the duration of the I/O operation.
A collaboration that provides compensation for its service calls and executes under the control of InterChange Server transaction services. Such a collaboration can roll back when a runtime error causes the collaboration to fail. See also compensation, minimum transaction level.
transactional data source
A data source that contains records and provides the measure values for cubes. In combination with one or more structural data sources, transactional data sources populate the model in Transformer. See also structural data source.
A mode of operation in which install and remove operations occur in two phases: the preparation phase and the commit phase. See also commit operation.
A DFSMS function that provides record-level sharing and transactional recovery for VSAM data sets. Transactional VSAM provides a data set access mode that is used by DBRC to provide parallel RECON data set access.
transaction backout program
A program (part of the emergency restart function) that is invoked during emergency restart, and that reads backout information (written to the restart data set by the recovery utility program) for task, message, DL/I, and file tables.
transaction backout table
In the restart data set, a summary table that contains an entry for each task for which system log records have been copied to the restart data set. Each entry indicates whether the task is in-flight, active, or completed. Data in this table is available to user-written exit programs.
In SQL replication, a type of processing in which every transaction is replicated to the target table when it is committed in the source table. See also transaction-consistent replication.
transaction capabilities application part (TCAP)
Part of the SS7 protocol that provides transactions within the signaling network. A typical use of TCAP is to verify a card number, for the credit card calling service.
A subcontainer of a service policy that is used for finer-grained monitoring. See also message class.
transaction command security
The use of system definition macros and security maintenance utility control statements to permit specific application programs to issue some of the IMS operator commands.
In SQL replication, a type of processing in which the net result of all transaction updates is replicated to the target table. See also transaction-based replication.
A set of filters and maintenance schedules that are created in the Application Management Con-figuration Editor which are applied to the collected data and determine how that data is processed and displayed.
transaction dump code
A name of up to four characters by which a transaction dump will be known. When a transaction abend causes CICS to create a transaction dump, the associated transaction abend code is used as the transaction dump code. See also dump code, transaction abend code.
transaction dump table (TDT)
A CICS table which may contain an entry for each transaction dump code. See also dump code.
- A file containing data, such as customer orders, that is usually used only with a master file.
- In COBOL, an input-output file used to communicate with display stations and ICF sessions.
See transaction identifier.
- A unique name that is assigned to a transaction and is used to identify the actions associated with that transaction.
- A number associated with each of several request-parameter lists that define requests belonging to the same data transaction.
A CICS facility that offers storage protection between transactions, ensuring that a program of one transaction does not accidentally overwrite the storage of another transaction. See also storage protection.
The degree of transactional isolation that a transactional collaboration provides. Transactional isolation involves keeping the data that the transaction affects from being affected by other processes (such as other collaborations). See also minimum transaction level.
transaction list table (XLT)
CICS control table containing a list of transaction identifications. Depending on a system initialization specification that can be changed during system termination, the transactions in a particular XLT can be initiated from terminals during the first quiesce stage of system termination. During CICS execution the suffix of an XLT can be entered at the master terminal - the transactions in that XLT can then be enabled or disabled as a group.
transaction load balancing
An optional facility that enables a transaction to be scheduled into more than one message or batch message region at the same time. See also load balancing.
- See sync point manager.
- A software unit that coordinates the activities of resource managers by managing global transactions and coordinating the decision to commit them or roll them back.
- A function that assigns identifiers to transactions, monitors their progress, and takes responsibility for transaction completion and failure recovery.
Transaction Manager database (TM database)
A database that is used to log transactions when a two-phase commit (SYNCPOINT TWOPHASE) is used with DB2 databases. If a transaction fails, the TM database information can be accessed to resynchronize databases that were involved in the failed transaction.
transaction manager domain
A CICS domain that provides transaction-related services to create, terminate, purge, and inquire on tasks; and manage transaction definitions and transaction classes. The transaction manager domain is designed to provide greater reliability and improved function; it has minimal impact on end users.
Transaction Manager Facility (TMF)
In MQSeries for HP NonStop Server, a subsystem to protect your business transactions and the integrity of your databases. Often used synonymously with NonStop Transaction Manager/MP.
In SQL replication, a type of replication subscription-set processing in which the Apply program retrieves data from the source CD table, then applies the data to the target table in the same commit sequence that is used at the source. The Apply program processes transactions for all subscription-set members together, rather than sequentially. See also table-mode processing.
See base node.
transaction-oriented BMP program
A batch message processing program (BMP program) that performs transaction-type processing in a batch environment. A transaction-oriented BMP program obtains its input from the IMS message queues and can also use the message queues for output See also batch-oriented BMP program.
A style of computing that supports interactive applications in which requests submitted by users are processed as soon as they are received. Results are returned to the requester in a relatively short period of time. A transaction processing system supervises the sharing of resources for processing multiple transactions at the same time
Transaction Processing Facility (TPF)
An IBM platform for high volume, online transaction processing. It is used by industries demanding large transaction volumes such as airlines and banks. See also program update tape.
transaction processing system
An IMS in a multisystem environment that accepts transactions from the front-end system, calls application programs for transaction processing, and routes all replies back to the front-end system for response to the terminal. See also front-end system, pseudo-front-end system.
- A program that processes transactions in an SNA network.
- A program that uses the Advanced Program-to-Program Communications (APPC) application programming interface (API) to communicate with a partner application program on a remote system.
- A user-supplied application program for processing data received by the system from a finance device.
- The name by which each program participating in an LU 6.2 conversation is known. Normally, the initiator of a connection identifies the name of the program it connects to at the other LU. When used in conjunction with an LU name, a TPN identifies a specific transaction program in the network.
- In SNA LU 6.2 conversations, the name of the program at the remote logical unit that is to be the other half of the conversation.
transaction program network
The hierarchical structure of user or system transaction programs communicating at a synchronization level of none, confirm, or commit. When the synchronization level is commit, the transaction programs communicate over protected conversations using the two-phase commit protocol. In this case, the hierarchy consists of an initiator, optionally one or more cascaded initiators, and agents.
transaction program record (TP record)
TP records are part of the user data that follows the attach FMH header in an APPC basic conversation. These records indicate the function the sign-on transaction program is to perform; for example, signon or signon and change password.
A mechanism that enables transactions to be transferred and re-executed on the master database after executing them on a replica database. See also synchronization message.
- A CICS facility that provides support for inbound and outbound terminal requests from another CICS system connected by an advanced program-to-program communications (APPC) link.
- An intercommunication facility that allows terminals or logical units connected to one CICS region to initiate and to communicate with transactions in another CICS region within the same processor system or in another CICS system connected by an APPC link.
A call to RACF each time a transaction identifier is entered at a terminal to verify that the terminal user or user ID associated with that terminal is permitted to run the transaction.
The basic business document in ANSI X12 data. Transaction sets are enclosed in an envelope that separates one transaction set from another (ST-SE envelope). Groups of transaction sets that are functionally related are enclosed in a functional group envelope (GS-GE envelope). Transaction sets are made up of segments and loops.
A generated column that is defined with the AS TRANSACTION START ID clause. The value is assigned whenever a row is inserted into the table or any column in the row is updated. A transaction-start-ID column is intended for use in a system-period temporal table. See also generated column, row-begin column, row-end column.
An affinity between a transaction and a particular CICS region, where the transaction interrogates or changes the properties of that CICS region. Transactions with affinity to a particular system, rather than another transaction, are not eligible for dynamic transaction routing. In general, they are transactions that use INQUIRE and SET commands, or have some dependency on global user exit programs, which also have an affinity with a particular CICS region.
One of three types of database tables in the InterChange Server repository, the transaction tables store the status of each transaction being processed, which may include the action and business objects, depending on the transaction level. The two other types of database tables in the repository are the event management tables and the repository tables.
transaction work area (TWA)
An optional extension of the TCA, used as a work area for a given task. The TWA can be used for the accumulation of data and intermediate results during the execution of the task. When the amount of working storage for a task is relatively static, the TWA may be used if data is accessed by different programs during task processing. This approach cannot be used for multiple transactions; the TWA is released automatically at task termination. See also common work area.
- In communications, the device that connects the transceiver cable to the Ethernet coaxial cable. The transceiver is used to transmit and receive data.
- In LANs, a physical device that connects a host interface to a local area network, such as Ethernet. Ethernet transceivers contain electronics that apply signals to the cable and that sense collisions.
Trans-European Automated Real-Time Gross Settlement Express Transfer (TARGET)
A real-time gross settlement (RTGS) payment system composed of one RTGS system in each European Member States, plus the European Central Bank payment mechanism. Payments are made across TARGET to or from other countries and not directly to other members of CHAPS-Euro.
- To copy an application EAR file to the server, usually by FTP. See also deploy.
- To send data from one location to another.
See committed page counter.
- In OSI, a set of rules for the representation of user information while it is in transit between presentation layer entities. The transfer syntax is usually derived from the abstract syntax by use of encoding rules.
- In DCE Remote Procedure Call (RPC), a set of encoding rules used for transmitting data over a network and for converting application data to and from different local data representations. See also abstract syntax.
- To change the composition of a data stream (AFP) to perform the same functions in a different data stream (ASCII).
- To convert a document from one form to another, such as using a purchase order formatted as an XML document to create the same purchase order formatted as an EDI document. See also translate.
- A program that converts a data stream from one format to another, for example, from PCL to AFP or PDF to AFP. Transforms provided by IBM are implemented as dynamic link library (DLL) filters.
- To translate a Java class file to an IBM i Java program.
- A collection of installation-related changes that are applied to a Windows Installer database.
- Programming logic that converts data from one format into another format.
- In a virtual private network (VPN), a collection of authentication algorithms, Diffie-Hellman groups, and encryption algorithms that are used during both phases of negotiation.
- To change the form of data according to specified rules without significantly changing the meaning of the data.
A procedure that is used to transform the message for web services security message processing, such as the C14N (canonicalization) transform that is used for XML digital signatures.
- The process of changing data from one format or structure to another format or structure.
- In GL, a four-by-four matrix that helps determine the location of a three-dimensional drawing, the position of the viewpoint (the viewer's "eye"), and the amount of the scene that will be encompassed and visible. Transformations occur at four points within the graphics pipeline: modeling transformation, viewing transformation, projection transformation, and viewport transformation.
- A mapping from a vector space to a vector space. In the context of JViews Charts, one-dimensional transformations can be applied to axes, two-dimensional transformations are applied to points for 2-D charts, and 3-D to 2-D transformations are used for 3-D charts.
- A HATS resource that specifies how to convert components of a host screen into widgets on a web page.
transformation model element
An element of the transformation model in a fact build. A transformation model element can be a dimension, a derived dimension element, a measure, an attribute, or a derivation.
- A 2D affine transformation that performs a linear mapping from 2D coordinates to other 2D coordinates. A transformer can be a scale, a translation, or a rotation.
- A device that converts power from one circuit to another at the same frequency, but at a changed voltage and current.
A function of the i5/OS operating system that converts PostScript Level 1 spooled files to output. This output can be printed on either IBM Advanced Function printers (i5/OS system printers) or Hewlett Packard Printer Control Language printers (commonly used PC printers).
See transaction identifier.
transient data queue
A file to which runtime messages are written under CICS. A transient data queue also is a sequential data set used by the Folder Application Facility in CICS to log system messages.
In OSI, an error that occurs once or at unpredictable intervals--for example, network congestion. See also permanent error.
In OSI, an event that indicates the occurrence of an intermittent error or an error that can be recovered through retry. Transient events are logged but do not result in messages to the operator. See also permanent event.
A library routine that is loaded at run time. See also resident routine.
A session token, such as a cookie or a parameter. See also session token.
transit delay processing
In OSI, an X.25 quality-of-service function that keeps track of delays that data encounters on the way to its destination. Any node that receives a call packet can reject it if the transit delay exceeds the maximum specified by the sender.
- The phase of the software development life cycle in which the final product is completed and made available to users.
- A connection between two tasks in a rule flow. Transitions are unidirectional, and they can have conditions attached to them.
- A relationship between two states indicating that an object in the first state performs certain specified actions and then enters the second state when a specified event occurs and specified conditions are satisfied. On such a change of state, the transition is said to fire.
- In a rule flow, a specification of a transition that dictates when the target task can be executed.
- A Boolean expression that determines when processing control should be passed to the targeted node.
In a collaboration template activity diagram, the line that indicates control flow between two nodes. If more than one outcome is possible between the nodes, each outcome is represented by a different transition link that leads to a different execution path. Each transition link may have an associated condition that is evaluated at runtime. Flow passes along the transition link whose expression evaluates to true. If the nodes have a single transition link, its condition is assumed to be true. See also control flow, exception transition link, normal transition link.
In UML modeling, a relationship that represents a workflow between activities. See also self-transition relationship.
A temporary table that contains all of the affected rows of a subject table in their state before or after a triggering event occurs. Triggered SQL statements in the trigger definition can reference the table of changed rows in the old state or the new state. See also table locator.
A variable that is valid only in FOR EACH ROW triggers. It allows access to the transition values for the current row. An old transition variable is the value of the row before the modification is applied, and the new transition variable is the value of the row after the modification is applied.
- In early versions of WebSphere Data Interchange, to convert a document from one form to another. See also transform.
- To check source code of an automatic class selection (ACS) routine for syntactic and semantic errors. If no errors exist, the translation process generates an object table from the source code and places the object table into a specified source control data set (SCDS).
- The movement of an object by a specific distance.
- In computer graphics, the movement of a display image along a straight line from one location to another.
- A user-defined table that is used to translate data values that differ between the source and target documents. For example, a manufacturer and supplier with different part numbers for the same item can use a translation table to convert their part numbers to the other company part numbers during translation.
- A table used to convert between one form of data and another. For example, translation tables are used for language translation, compression, encoding, and address mapping.
A source file together with all headers and source files included via the preprocessing directive #include, less any source files skipped by any of the conditional inclusion preprocessing directives.
translation verification test (TVT)
All testing necessary to review and correct the translated software or hardware user interface, run-time messages, and on-line help, after build or integration and compilation, in order to verify that the translation has not been altered or corrupted by these processes. This testing includes a review for screen layout, truncation, localized links, mixing of languages, and for consistency and accuracy of the translation in context. See also globalization verification test.
- A Jazz model object that describes a single build step in which a translator executable program is invoked with the required inputs and outputs. Inputs and outputs are the same as z/OS data sets, so a translator must reference multiple data set definitions.
- An i5/OS component that performs the final step in a program or module compilation. In the Integrated Language Environment (ILE) model, this is called the optimizing translator.
- A component, typically the Data Interchange Services translator component, responsible for translating a document from one format to another.
- A control character used to control or facilitate transmission of data between data terminal equipments.
- In data communications, a special character that can be included in a message to control communications over a data link. For example, the sending station and the receiving station use transmission control characters to exchange information; the receiving station uses transmission control characters to indicate errors in data it receives.
transmission control layer
In SNA, the layer within a half-session that synchronizes and controls the speed of session-level data traffic, checks sequence numbers of requests, and enciphers and deciphers end-user data.
Transmission Control Protocol (TCP)
A communication protocol used in the Internet and in any network that follows the Internet Engineering Task Force (IETF) standards for internetwork protocol. TCP provides a reliable host-to-host protocol in packet-switched communication networks and in interconnected systems of such networks. See also Internet Protocol.
Transmission Control Protocol/Internet Protocol (TCP/IP)
An industry-standard, nonproprietary set of communication protocols that provides reliable end-to-end connections between applications over interconnected networks of different types. See also communication method.
transmission control unit (TCU)
A communication control unit whose operations are controlled solely by programmed instructions from the computing system to which the unit is attached. No program is stored or executed in the unit. Examples are the IBM 2702 and 2703 Transmission Controls. See also communication controller.
transmission group (TG)
In SNA, a group of links between directly attached nodes appearing as a single logical link for routing messages. A transmission group may consist of one or more SDLC links (parallel links) or of a single System/370 channel. For type 2.1 nodes in System i networks, a transmission group can only be a single-link connection.
transmission header (TH)
In SNA, control information, optionally followed by a basic information unit or a basic information unit segment, that is created and used by path control to route messages within the network.
See telecommunication line.
transmission priority (TP)
A rank assigned to a message unit that determines its precedence for being selected by the path control component in each node along a route for forwarding to the next node in the route. The four possible values are low, medium, high, and network.
See message channel agent.
transmission-queue data set
In IP PrintWay, a data set containing an entry for each data set that IP PrintWay is to transmit to the remote system or that IP PrintWay is retaining on the Job Entry Subsystem (JES) spool.
A group of four transmission characters. See also data word.
- Terminal attribute whereby data is not translated between terminal and main storage representation on read or write requests. This allows the transmission of all 256 possible byte values.
- A picture or text on an acetate sheet designed to be viewed by light shining through it.
- See transparent text mode.
- In asynchronous communications, a method of hiding certain ASCII control characters from modems or asynchronous devices.
- A set of code points that is interpreted as presentable data, not as control data. In the AFP architecture, transparent data is identified with a control byte and a count of the number of bytes that follow.
- Data that can contain any hexadecimal value.
transparent decision service
A reusable decision service that is easily accessible to all participants of its life cycle: developers, business analysts, and policy managers. It is easy to adapt and contributes to an enterprise compliance strategy.
A mode of binary synchronous transmission in which transmission control characters are treated as text unless they are preceded by the data link escape character (DLE). See also nontransparent mode.
transparent text mode
In binary synchronous communications, a method of transmission in which only transmission control characters preceded by the DLE control character are processed as transmission control characters.
- The process or protocol mechanism of transferring an XML message or document between parties as part of a meaningful, reliable exchange. The most common transports for web services are SOAP/HTTP, SOAP/HTTPs, and SOAP/JMS.
- A communication layer that allows the product to send and receive data between the user data source and a pipeline. Examples of transports include the HTTP transport, the queue transport, the database transport, and the file transport.
- A physical connection to a database. A transport can be reused by multiple logical connections.
- The request queue between a web servers plug-in and a web container in which the web modules of an application reside. When a user requests an application from a web browser, the request is passed to the web server, then along the transport to the web container.
- To restore a transportable set from a backup image into a database other than the one from which the backup image was taken.
An adapter (such as an HTTP Adapter) that is used with an encoding/decoding adapter to support various protocols (for example, SOAP) in a transport-independent way. The transport adapter is used to transport the data either from the source or to the destination.
Transportation Data Coordinating Committee (TDCC)
An organization that sets standards for the motor, rail, ocean, and air industries administered by EDIA. This is the original EDI organization for the United States, and through it, the original EDI Standards were developed, published, and maintained. It has now changed its name to EDIA, and has become the national EDI user group for the United States.
- In OSI architecture, the layer that provides services for flow control and recovery between open systems with a predictable quality of service.
- A network service that provides end-to-end communication between two parties, while hiding the details of the communication network. The Transmission Control Protocol (TCP) and ISO TP4 transport protocols provide full-duplex virtual circuits on which delivery is reliable, error free, sequenced, and duplicate free.
transport staging database
A temporary database that is created as a part of a transport operation. The transport staging database is used to extract data and logical objects from a backup image and, if necessary, bring them to a point of transactional consistency before they are re-created in the target database.
The time allotted for transporting materials from the workstation where the preceding operation took place to the workstation where the current operation is to occur. The transport time is used only for planning purposes. Operations will be started irrespective of the transport time specified.
- A special statement used to catch signals within the z/OS shell.[OSF]
- An unsolicited event generated by an agent and forwarded to a manager. Traps inform the manager of changes that occur in the network.
- In the Simple Network Management Protocol (SNMP), a message sent by a managed node (agent function) to a management station to report an exception condition.
- In REXX, to recognize that a currently enabled condition occurred and to perform the CALL or SIGNAL instruction specified when the condition trap was enabled.
- An unprogrammed, hardware-initiated, conditional jump to a specific address. A trap occurs as a result of an error or certain other conditions. A record is made of the location from which the jump occurred.
- A message that reports a problem or a significant event.
A path that directs an extract or archive process through related tables specified in an access definition. It begins at the start table and proceeds through the data model and all relationships from parent to child.
See Transformation API for XML.
See table reference character.
- A hierarchical collection of nodes that can have an arbitrary number of references to other nodes. A unique path connects every two nodes. See also directed tree, undirected tree.
- A data structure whose elements are linked in a hierarchical fashion.
A visualization of hierarchical data. Each object in the hierarchy is represented as a rectangle. The child objects of a parent object rectangle are represented by nonoverlapping rectangles inside the parent object rectangle. The area of a rectangle is typically proportional to a property of the object that can be viewed as distributed across its child objects.
- A view that provides a hierarchical view of an object and the objects that it contains.
- See traceability tree.
A license key that provides clients access to an application for a specified time for product evaluation purposes. See also permanent license key.
A shipment of goods that is ordered from one intercompany or supplier location, delivered directly to a second location, and billed to a third location. For example, if IBM Dublin orders goods from Hungary and has the Hungarian supplier ship those goods to IBM France and bill the Dublin site, that is a triangular shipment.
The part of a personal name that is associated with or shared by members of a tribe. In the name "Saddam Hussein Al-Tikriti," the name phrase "Al-Tikriti" refers to the place-based tribe of which Saddam Hussein was a member.
- A mechanism that detects an occurrence and can cause additional processing in response.
- Data values for which AFP Conversion and Indexing Facility (ACIF) searches, to delineate the beginning of a new group of pages. The first trigger is then the anchor point from which ACIF locates the defined index values.
- A monitor that specifies one or more standard programs or built-in actions to be executed whenever a certain ClearCase operation is performed.
- A representation of dependencies between workflow tasks that joins activities in a sequence job. Activities typically have one input trigger, but multiple output triggers.
- A condition that signals that a risk factor should be monitored.
- A database object that is associated with a single base table or view and that defines a rule. The rule consists of a set of SQL statements that runs when an insert, update, or delete database operation occurs on the associated base table or view. See also after trigger, before trigger, delete trigger, insert trigger, instead of trigger, trigger activation, trigger activation time, trigger granularity, update trigger.
- In database technology, a program that is automatically called whenever a specified action is performed on a specific table or view. See also read trigger.
- To initiate or reinitiate copying between a pair of volumes that have a copy relationship.
A set of actions (high-level language statements, SQL statements, or i5/OS utilities) that are performed automatically when a specified change operation (trigger event) occurs on a specified table or file.
The process that occurs when the trigger event that is defined in a trigger definition is executed. Trigger activation consists of the evaluation of the triggered action condition and conditional execution of the triggered SQL statements. See also after trigger, before trigger, trigger, trigger activation time, trigger event.
trigger activation time
An indication in a trigger definition of whether the trigger should be activated before or after a trigger event. See also after trigger, before trigger, trigger, trigger activation, trigger event.
The set of triggered SQL statements that is run when a trigger is activated and its triggered action condition evaluates to true. See also triggered action, triggered action condition, triggered SQL statement.
The SQL logic that is performed when a trigger is activated. The triggered action consists of an optional triggered action condition and a set of triggered SQL statements that is run only if the triggered action is true. See also trigger body, trigger event, triggered action condition, triggered SQL statement.
triggered action condition
An optional part of a triggered action. This Boolean condition is defined by a WHEN clause and specifies a condition that is evaluated to determine whether the triggered SQL statements should be run. See also trigger body, triggered action, triggered SQL statement.
triggered SQL statement
One of a set of SQL statements that is run when a trigger is activated and its triggered action condition evaluates to true. The set of triggered SQL statements is also called the trigger body. See also trigger body, triggered action, triggered action condition.
- An event, such as a message arriving on a queue, that causes a queue manager to create a trigger message on an initiation queue.
- In a CREATE TRIGGER statement, the specification of an insert, update, or delete operation on a specified table that activates the trigger. See also trigger activation, trigger activation time, trigger granularity, triggered action.
- A change operation that calls the trigger action to be run. The trigger event can be an insert, update, or delete operation in any high-level language and in SQL.
In BMS, a field that is transmitted to the host processor as soon as the terminal operator has modified the field and then tries to move the cursor out of it. You can use display trigger fields to initiate input to an application program. The trigger attribute is ignored if the operator has not modified the trigger field.
In SQL, the characteristic of a trigger that determines whether the trigger is activated only once for the triggering SQL statement or once for each row that the SQL statement modifies. See also trigger, trigger event.
- The business object that a connector sends to subscribing collaborations when an application event occurs.
- The specified operation in a trigger definition that causes the activation of that trigger. The triggering event is comprised of a triggering operation (insert, update, or delete) and a subject table or view on which the operation is performed.
The number of records written to an intrapartition transient data destination or queue that will cause CICS to automatically initiate a task to process that queue. See also automatic transaction initiation.
- A continuously running application that serves one or more initiation queues. When a trigger message arrives on an initiation queue, the trigger monitor retrieves the message. It uses the information in the trigger message to start a process that serves the queue on which a trigger event occurred.
- A program that responds to trigger conditions on a message queue by starting a transaction. A trigger monitor is usually a continuously-running program.
A rendering technique that uses three frame buffers instead of two. With three buffers, there is no waiting time. Triple buffering results in smoother animation, especially if the screen has a slow refresh rate. See also double buffering.
Triple Data Encryption Algorithm (3DES, Triple DES)
An encryption method that applies the Data Encryption Standard (DES) algorithm three times to the data. See also Data Encryption Standard.
triple Data Encryption Standard (triple DES)
A block cipher algorithm that can be used to encrypt data transmitted between managed systems and the management server. Triple DES is a security enhancement of DES that employs three successive DES block operations.
See Triple Data Encryption Algorithm.
See triple Data Encryption Standard.
A computer program that appears to perform a useful and innocent function but contains hidden functions that use approved authorizations assigned to users when they start the program. For example, it may copy internal authorization information from a computer and send it back to the originator of the Trojan horse.
A connected voice path which enters an IVR from a switch on one circuit, then returns to the same switch on a parallel circuit. Two IVR ports and two circuits are consumed, but in some circumstances this might be the only way to make a connection between two callers if the attached switch does not support a Call Transfer function.
See topology and routing services.
True Image data view
A data view that allows a file to be restored in the event of accidental deletion. It consists of point-in-time images that provide a near-instant virtual copy of an entire storage volume.
- To cut off data that cannot be printed or displayed in the line width specified or available. See also fold.
- To shorten a field, value, statement, or string.
- To end a computational process in accordance with a rule; for example, to end the evaluation of a power series at a specified term.
- In telephony, circuits that connect two switching systems, as opposed to connecting a customer line to a switching system.
- A telephone connection between two central offices or switching devices. In DirectTalk, a trunk refers to 24 or 30 channels carried on the same T1 or E1 digital interface. See also channel.
- In the CVS team development environment, the main stream of development, also referred to as the HEAD stream.
A set of trunked inter-switch links (ISLs). See also ISL Trunking.
A port that is employed in a trunking group. See also ISL Trunking.
trunk interface card (TIC)
The component of the VPACK that manages the trunk connection to the switch. See also base card.
An integrated configuration between the security server of the product and third-party security servers. A reverse proxy server acts as a front-end authentication server, while the product applies its own authorization policy onto the resulting credentials passed by the proxy server.
trust association interceptor (TAI)
The mechanism by which trust is validated in the product environment for every request received by the proxy server. The method of validation is agreed upon by the proxy server and the interceptor.
- Pertaining to a federated wrapper that is defined to run in the database manager process. See also fenced.
- Pertaining to the control of a security policy.
A database connection whose attributes match the attributes of a unique trusted context that is defined at the database server. See also explicit trusted connection, implicit trusted connection.
trusted context default role
The role that is inherited by all users of a trusted context unless it is overridden by a user-specific role in the trusted context definition. See also trusted context user-specific role.
trusted context user-specific role
A role that is associated with a specific trusted context user. It overrides the trusted context default role if the current user ID on the trusted connection matches the ID of the specific trusted context user. See also trusted context default role.
A privileged relationship between two entities such as a middleware server and a database server. This relationship allows for a unique set of interactions between the two entities that would be impossible otherwise.
- A certificate signed by a trusted certificate authority (CA).
- In the Secure Sockets Layer (SSL), the public key and associated distinguished name of a certificate authority (CA).
A trusted list of certificates that are used to control the trust and validity period of certificates. It enables the trust of certificates issued by a certificate authority to be limited.
An established and trusted communication path through which a computer in one domain can communicate with a computer in the other domain. Users in a trusted domain can access resources in the trusting domain.
- A key database that holds signer certificates for only the target servers that the user trusts. See also signer certificate.
- In security, a storage object, either a file or a hardware cryptographic card, where public keys are stored in the form of trusted certificates, for authentication purposes in web transactions. In some applications, these trusted certificates are moved into the application keystore to be stored with the private keys. See also keystore.
A nodelocked license that has a fixed duration and a start date equal to the date when the license is enrolled. A try-and-buy license is made available for purposes of evaluating the application, and can be replaced by a production license after evaluation.
A C++ block in which a known exception is passed to an exception handler. See also catch block.
See transport-layer service access point.
See transmission subsystem component.
See transport-layer service data unit.
See temporary storage group identification.
In WebSphere Voice Server, a process that controls which engine processes are being used at any time. Requests for an engine by a WebSphere Voice Server Client are accepted or rejected depending on whether an engine meeting the Tsm Client's criteria is available.
See Time Sharing Option.
See Time Sharing Option single point of control.
See transmission services profile.
See temporary storage table.
See temporary storage unit table.
See temporary-text-delay character.
See time to live.
See tape table of contents.
See track record address.
See terminal type.
See Terminal User Control Block.
Pertaining to printing on both sides of a sheet of paper such that the bottom of the printed image on one side of the paper is juxtaposed against the top of the printed image on the other side of the paper. See also simplex.
tumbling set function
A function that performs calculations on a windowed set of the rows in a view. The set of rows to include is determined when a new data stream arrives, and the set empties when full.
- See IP tunnel.
- An L2TP access concentrator (LAC)-L2TP network server (LNS) pair. A tunnel carries Point-to-Point Protocol (PPP) datagrams between the LAC and the LNS. There may be many sessions in a single tunnel. A control connection that operates in the tunnel controls the establishment, release, and maintenance of sessions and the tunnel itself.
See trace utility program.
- See row.
- An ordered collection of two or more members from different dimensions. For example, the tuple (2007, Camping Equipment, Japan) returns the value for the intersection of the three members: 2007, Camping Equipment, and Japan. Tuples can be used to filter and sort data, and to create calculations.
See tie-up record.
- In communications, the time required to reverse the direction from sending to receiving or from receiving to sending on a communications line.
- The elapsed time between entry of the first character of the first input into the input interface and the passage of the last character of the last output through the output interface.
- The total time consumed from the start to the completion of a specific unit of work measured at specific interfaces. When multiple inputs and/or multiple outputs are parts of one unit of work, intermediate turnaround time specifications may be needed.
Tutorial System Support
An education course, supplied with the operating system licensed program, that provides introductory education for a variety of computer users, including system operators and business and data processing professionals. Tutorial System Support is part of the total IBM curriculum for the System i platform, which consists of classroom training and other methods of self-study.
See time variance.
See translation verification test.
See tape volume table of contents.
See transaction work area.
A 5250-based workstation using a twinaxial cable to connect to the system. The twinaxial console and the Operations Console can be a backup console for each other. See also alternate console, backup console, Operations Console.
twinaxial data link control (TDLC)
A communications function that allows personal computers, which are attached to the work station controller by twinaxial cable, to use advanced program-to-program communications (APPC) or Advanced Peer-to-Peer Networking (APPN) support.
In a database, all child segments of the same segment type that have a particular instance of the same parent segment type. Root segments are also considered twins to each other. See also physical twins, sibling segments.
Pertaining to a transmission medium that consists of two insulated conductors twisted together to reduce interference. For example, twisted-pair wiring can be used as an alternative to twinaxial cable.
See tiered entry workload license charge.
A hardware feature with which an I/O device can be attached to two channels. A dynamic switch can be added, which makes it possible for both interfaces to be enabled at the same time with channel selection determined by programming.
A two-step process by which recoverable resources and an external subsystem are committed. During the first step, the database manager subsystems are polled to ensure that they are ready to commit. If all subsystems respond positively, the database manager instructs them to commit. See also distributed transaction.
A radix complement in the pure binary numeration system. The twos complement is derived by taking the ones complement and then adding one to the resulting number. In a twos complement system, the twos complement of a number n is -n.
two-tier client/server architecture model
A client/server system, where a client application containing all of the business logic runs on a workstation, while the data management is run on a database server. See also client/server architecture, three-tier client/server architecture model.
In X.25 communications, a logical channel that allows both incoming and outgoing calls. See also one-way channel.
See teletypewriter exchange service.
See telex interface program.
- In Java programming, a class or interface.
- An object that defines a data structure.
- A characteristic of an element that describes its data content.
- A characteristic that specifies the internal format of data and determines how the data can be used.
- In a WSDL document, an element that contains data type definitions using some type system (such as XSD).
- In Ada language, a set of values and the set of operations that apply to those values.
- A description of data characteristics. The descriptions include the operations that can be performed on or by the data. See also data type.
- In Enhanced X-Windows, an arbitrary atom used to identify the data.
- A class of objects. All objects of a specific type can be accessed through one or more of the same interfaces.
- In DCE X/Open Object Management (XOM), a category into which attribute values are placed on the basis of their purpose.
- The definition of a data object or set of data objects that is graphically represented in a type tree in the Type Designer.
A command, generally preceded by a leading slash character, that can be entered from any valid IMS command source. See also type-2 command.
type 1 GUID
A globally unique identifier (GUID) that is generated using a combination of the generating system's MAC address, a time stamp, and a large random number. There is a very high probability that a type 1 GUID will be unique. See also Globally Unique Identifier.
A command that is entered only through the OM API. Type-2 commands are more flexible and can have a broader scope than type-1 commands. See also type-1 command.
type 3 GUID
A globally unique identifier (GUID) that is generated by a uni-directional hash of textual or binary data. The same data always produces the same GUID, however there is a very low probability that other data will produce the same GUID. See also Globally Unique Identifier.
- See boundary alignment.
- A routine or set of routines that enables an application to change a specified string of data from one declared type to another. In AIXwindows programming, type conversion is performed on strings using conversion information contained in the MRM database.
typed collection variable
An ESQL/C collection variable or SPL variable that has a defined collection data type associated with it and can only hold a collection of its defined type. See also untyped collection variable.
All characters of a single type family or style, weight class, width class, and posture, regardless of size. An example is Helvetica bold condensed italic, in any point size. See also font.
- A complete character set of a font.
- All the type sizes and styles of one typeface. The group shares a common design but can differ in attributes such as character width and weight (examples are roman and italic, condensed and ultra bold). A typical font family contains four typestyles: Roman, Italic, Bold, and Bold Italic.
- A relationship that you define among named row data types in which subtypes inherit representation (data fields) and behavior (routines) from supertypes and can add more fields and routines.
- The complete context for a Java class or interface including its superclasses and subclasses.
The process of converting an atomic value from an earlier data type to a later data type in an ordered sequence. One example of an ordered sequence is INTEGER, DECIMAL, FLOAT, DOUBLE; another example is anyURI, string. Type promotion can be used, for example, in function calls and in the processing of operators that accept numeric or string operands.
A method for ensuring strict typing in C++ by resolving references to functions only when argument types and return values match or have defined conversions, as well as matching function names.
The type system defines the types of objects (feature structures) that may be discovered by a text analysis engine in a document. The type system defines all possible feature structures in terms of types and features. Any number of different types can be defined in a type system. A type system is domain and application specific.
- A parameter indicating a relative change from the font's normal width-to-height ratio. Examples are normal, condensed, and expanded.
- The horizontal size (set size) of a given typeface. The width may be given in units of measurement, such as set 9 point, or it may be descriptive, such as ultra-condensed, condensed, and expanded.