This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
A digital trunking facility standard used in the United States and elsewhere, capable of transmitting and receiving 24 digitized voice or data channels. Signaling can be imbedded in the voice channel transmission when robbed-bit signaling is used. The transmission rate is 1544 kilobits per second. See also E1.
See predictive text.
See tools as a service.
- A preset point in the typing or output line at which typing or printing stops.
- To move a cursor on a display or the print head of a printer to a preset location.
A character that indicates that printing or displaying should start at the next horizontal position on the current line. The tab is designated by '\t' in the C language and is named in the portable character set.
- In COBOL, a set of logically consecutive data items that are defined in the Data Division with the OCCURS clause.
- In a relational database, a database object that consists of a specific number of columns and is used to store an unordered set of rows. See also base table, temporary table, view.
- In RPG, a series of elements with like characteristics. A table can be searched for a uniquely identified element, but elements in a table cannot be accessed by their position relative to other elements.
- An orderly arrangement of data in rows and columns that can contain numbers, text, or a combination of both.
table check constraint
See check constraint.
In a partitioned database environment, a state that occurs when two tables that have the same number of compatible partitioning keys are stored in the same database partition group. In this situation, the DB2 database management system can perform the join or subquery processing at the database partition where the data is stored.
An exposed name that is used to qualify a column name. See also exposed name.
An expression that creates a temporary result table from a query. For example, a table expression might be a query that selects all of the managers from several departments and further specifies that they have over 15 years of working experience and are located at the main branch.
A function that receives a set of arguments and that returns a table to the SQL statement that references the function. A table function can be referenced only in the FROM clause of a subselect. See also function, routine, user-defined function.
A structure representing the relationship between typed tables in which subtables inherit the behavior (constraints, triggers, storage options) from supertables. Subtables can have additional constraint definitions, storage options, and triggers.
A mechanism that allows access to trigger tables in SQL or from within user-defined functions. A table locator is a fullword integer value that represents a transition table. See also transition table.
In SQL replication, a type of replication subscription-set processing in which the Apply program retrieves all of the data from the source CD table, applies the data (one member at a time) to each target table, and finally commits its work. See also transaction-mode processing.
table object ID
Internal logical identifier for a table. In DB2 for Linux, UNIX, and Windows, table object IDs for each table in a database are stored in the TABLEID column of the SYSCAT.TABLES catalog view.
A set of tables used for processing specifications: the JES2 table provides the default processing specifications and the user table provides updates or deletions to the default processing specifications. See also dynamic table, JES2 table, user table.
A data organization scheme in which table data is divided across multiple data partitions according to values in one or more partitioning columns of the table. Data from a given table is partitioned into multiple storage objects, which can be in different table spaces, based on the specifications that are provided in the PARTITION BY clause of the CREATE TABLE statement. See also data partition, database partitioning.
An ordered set of one or more columns whose values are used to determine in which data partition each table row belongs. See also data partition, database partition, distribution key.
A mechanism for transferring rows between database partitions. Table queues are distributed row streams with simplified rules for the insertion and removal of rows. Table queues can also be used to deliver rows between different processes in a single-partition database.
- A logical collection of extents that are assigned to a table. A table space contains all the disk space that is allocated to a given table or table fragment and includes pages allocated to data and to indexes, pages that store TEXT or BYTE data in the dbspace, and bitmap pages that track page use within the extents.
- A logical unit of storage in a database. In DB2 for z/OS, a table space is a page set and can contain one or more tables. In DB2 for Linux, UNIX, and Windows, a table space is a collection of containers, and the data, index, long field, and LOB portions of a table can be stored in the same table space or in separate table spaces. See also container, page set.
table space ID
Internal logical identifier for the primary table space for an object. In DB2 for Linux, UNIX, and Windows, table space IDs for each table space in a database are stored in the TBSPACEID column of the SYSCAT.TABLES catalog view.
table space set
A set of table spaces and partitions that should be recovered together because the tables contained in the table spaces have dependencies on one another. The dependencies can, for example, be between parent table and descendent table or between base table and auxiliary table.
- In computer graphics, a locator device with a mechanism for indicating coordinate data.
- A mobile touchscreen computer that is typically controlled by gestures using the user's fingers, a soft keyboard, or a stylus. See also mobile device, smart device.
A graphical view in the Job Scheduling Console used to display database and plan object data in tabular format. See also job scheduling console.
See terminal abnormal condition line entry.
See Total Access Communication System.
See text analysis engine.
- In FD:OCA, a special attribute triplet that can be attached to attribute triplets to provide them with additional information.
- A short key word that is a means of classifying and retrieving content in a way that is meaningful. Tags are single words, or multiple words that are connected with hyphens or underscores. For example, "social-bookmarking", "status_reports", and "payroll" are all valid tags.
- A property that is associated with a host.
- One or more characters attached to a set of data (for example, a field or document element) that contain information about the set, including its identification.
- To scan a 2D or 3D barcode using a mobile device. See also matrix code, Quick Response code, tagging.
- In GL, a marker in the display list used as a location for display list editing.
- A link between an XBRL fact and its source data, such as a report object or the result of a query.
- A type of structured field used for indexing in an AFP document. Tags associate an index attribute-value pair with a specific page or group of pages in a document.
- An item that contains identifying information about a person or device. Tags enable tracking and monitoring of assets within locations, areas, and zones.
- A physical label that is applied to an asset to indicate the device, its position, and the controlling authority.
- A structure that contains all of the required JAR files and resources for a web project. For example, the supporting classes extend the base Struts tags to let them nest inside each other, so they keep the fundamental logic of the original tags, except that all references to beans and bean properties are managed in a nested context.
- In markup languages such as SGML, XML, and HTML, a token that represents the start or end of an element.
- The statements of the user interface manager (UIM) tag language. Tags describe the actions, format, and data of the panel. Tags are used to define the formatting of help information.
- To indicate that content is relevant to a specific subject on a social media site or application.
- In UN/EDIFACT EDI Standards, the segment identifier. In export and import, a code that is assigned to each field in the database and used to identify the field in the export file.
- An identifer that groups related artifacts.
- A word or phrase that users create and assign to an asset. Users create tags to develop search criteria that is meaningful to themselves.
- A mechanism used to identify certain attributes having some bearing on handling of character data. Some examples are character set identifier, code page identifier, language identifier, country identifier, and encoding scheme identifier.
- A text string attached to any instance of a word in a grammar. A tag can be used to distinguish two occurrences of the same word in a grammar, or to identify more than one word in a grammar as having the same meaning.
A notification that is targeted to devices that are subscribed for a specific tag. Tags are used to represent topics that are of interest to a user. See also broadcast notification.
A visual representation of tags, where frequently used tags are displayed with more emphasis. For example: tags can be represented by text, with varying degrees of bolding, or images with varying sizes.
Tagged Image File Format (TIFF)
A file format for storing high-quality graphics. See also GeoTIFF format.
A key-value pair that associates a service in a process. See also key-value pair.
In JSP technology, a collection of tags identifying custom actions described using a taglib descriptor and Java classes. A JSP tag library can be imported into any JSP file and used with various scripting languages. (Sun)
See trust association interceptor.
- See fallover.
- In an XRF environment, the process by which the failing active IMS is released from its XRF sessions with terminal users and replaced by an alternate IMS. See also giveback.
- An automatic operation that switches from a redundant or standby system or node when the primary system or node becomes available after a software, hardware, or network interruption.
A value assigned to each configured cluster resource on a per-node basis. In the event of a takeover, the active node with the highest priority acquires the resource. A node with a higher priority is listed before the node with a lower priority. See also node priority policy, resource group, resource group policies.
To briefly touch a touchscreen. Typically, apps use tap gestures to select items (similar to a left mouse button click). See also gesture.
tape configuration database (TCDB)
The set of tape library records and tape volume records that reside in integrated catalog facility (ICF) volume catalogs and describe the current tape library configuration.
A collection of tape units that share a model type and serial number, such as all the logical unit numbers (LUNs) of a tape library. See also tape unit.
- A device that includes a selection of cartridges in a common (secure) area within access of one or more automated removable media (ARM).
- A set of equipment and facilities that support an installation's tape environment. The tape library can include tape storage racks, mechanisms for automatic tape mounting, a set of tape drives, and a set of related tape volumes mounted on those drives. See also Automated Tape Library Dataserver, manual tape library, system-managed tape library.
tape library data server
An IBM hardware device that maintains the tape inventory that is associated with a set of tape drives. A tape library data server also manages the mounting, removal, and storage of tapes.
tape mount management
The methodology used to optimize tape usage in order to decrease the number of tape mounts and increase the amount of data on each tape. This optimization is accomplished by redirecting appropriate tape requests to disk and collecting the data in larger amounts on tape soon after the applications are completed. This methodology also reduces the time required to run the application.
tape storage group
A collection of tape volumes that contain private user data. A volume becomes part of the tape storage group when it is mounted to satisfy a scratch volume request for the storage group, or when it is entered into one of the tape libraries and assigned to the tape storage group by the cartridge entry process. The volume is removed from the tape storage group when it is returned to scratch after the data sets on it have expired. See also storage group.
A magnetic tape subsystem consisting of a controller and magnetic tape devices, which allows for the storage of user data on tape cartridges. See also storage subsystem.
- A tape device or a robotics controller that is visible over a storage network. A tape unit is a member of a single storage network (of 1 - n fabrics), but can have 1 - n equivalent paths. See also tape device.
- The physical enclosure containing the tape drive.
The recording space on a single tape cartridge or reel. See also shelf-resident tape volume.
tape volume table of contents (TVTOC)
Information about a tape data set that RACF stores in the TAPEVOL profile for the volume on which the data set resides. The TVTOC includes the data set name, data set sequence number, creation date, and an indicator as to whether a discrete tape data set profile exists.
See title, affix, and qualifier.
See tape archive.
- A Small Computer System Interface (SCSI) device that acts as a subordinate to an initiator and consists of a set of one or more logical units (LUs), each with an assigned logical unit number (LUN). The LUs on the target are typically I/O devices. A SCSI target is analogous to an S/390 control unit; a SCSI initiator is analogous to an S/390 channel; and a SCSI LU is analogous to an S/390 device. See also initiator, Small Computer System Interface.
- See receiver.
- In VisualAge RPG, a part that receives a target event from a source part whenever the state of the source part changes.
- A value that a Key Performance Indicator (KPI) should achieve, such as "300" or "5 days."
- In distributed data management (DDM), the platform that fulfills a request for remote data. A target is also known as a server. See also Distributed FileManager, source.
- In SEU, a line command, such as B (Before) or A (After), that specifies the destination for other line commands such as C (Copy) or M (Move).
- The program or system to which a request for files or processing is sent.
- A collection of logical units (LUs) that are directly addressable on the network. The target corresponds to the server in a client-server model.
- The destination for an action or operation.
- A storage device on a fibre-channel network.
- The field for which a user wants to predict the value, which is assumed to depend on the values of other fields (the predictors). See also binomial logistic regression, multinomial logistic regression.
- One of the threshold values that is displayed on the scorecard and is used to determine which status icon to display.
- The node at which a password is to be installed. If the password specifies a nodelocked license, the target is the node where the licensed product is run. If the password specifies multiple nodelocked license (that is, a compound password for nodelocked licenses) or network licenses, the target is a node at which the network license server is running.
- A computer that is known to an OS deployment server.
A command that can be executed on a different target container. A targetable command invocation incurs some overhead; making the task command not targetable can improve the performance of the overall command framework.
A feature that allows the user to perform date aging based on a specific date. For example, the base date of the production run and a target date for a particular test can be specified. Dates are automatically aged to maintain the relationship between the base and target. See also age, incremental aging, semantic aging.
target catalog entry
A promotional product or SKU that is defined as a merchandising association. See also source catalog entry.
A customization definition document (CDD) to which placeholders have been added, and for which placeholder values have been specified. A target CDD describes a particular target customization definition.
A configuration item (CI) that is expected to be affected by a proposed change. A target CI can be defined when a request for change (RFC) is created, when an implementation task is defined, or at other points in the change process, especially during impact analysis.
target customization definition
A customization definition that describes a changed version of a current customization definition. Each target customization definition has a target CDD that describes it.
target data queue program
In System i Access, a series of programs that receive requests for data manipulation from the source data queue program. Target data queue programs also send data and replies (to previous requests) to the source data queue program.
target distributed data manager (TDDM)
In a distributed data management network, programming support that translates the DDM requests received from a source system into data management or SQL requests on the target (or remote) system. See also source distributed data manager.
- An RRSF node that a given RRSF node is logically connected to.
- A client node for which other client nodes (called agent nodes) have been granted proxy authority. The proxy authority allows the agent nodes to perform operations such as backup and restore on behalf of the target node, which owns the data.
- In VisualAge RPG, the object to be built by the project, such as a Dynamic Link Library (DLL).
- In display station pass-through, a program that runs on the remote system.
- In communications, the program that is started on the remote system at the request of the source system. See also source program.
target queue manager
See remote queue manager.
target recovery time
The amount of time estimated by the system that it will need to recover access paths during an initial program load (IPL) after an abnormal system end. Actual performance may range around the target.
- In upgrades, the version, release, and modification level of software that is to be installed.
- The release of the operating system on which a user intends to use an object being created, or intends to restore or use an existing object. See also source release.
- In Q replication and SQL replication, a database or subsystem that contains replication target tables or procedures.
- In upgrades, the planned hardware configuration and software level that exists when the upgrade is completed.
- A database that contains replication target tables.
- The system that receives a request from another system. See also source system.
- A system where supported middleware products are installed and maintained. A target system can be a physical system, a virtual system, or a system instance in the cloud. It can play a role as a source, a destination, or both source and destination for configuration data.
- In upgrades or migrations, the planned hardware configuration and software level which will exist when the upgrade is completed.
- A managed system on which an IBM Director task is performed.
- In SQL replication, a table that is the destination for changes from a registered replication source. A target table can be a user copy table, a point-in-time table, a base aggregate table, a change aggregate table, a CCD table, or a replica table. See also Apply program, replication target, source table.
- In Q replication, a table that is the destination for replicated changes from a source that is part of a Q subscription.
- The underlying base table that a violations table and diagnostics table are associated with.
target user ID
The recipient of actions that were directed by RRSF. See also source user ID.
In the System Modification Program/Extended (SMP/E), a collection of VSAM records describing the target system macros, modules, assemblies, load modules, source modules, and libraries copied from distribution libraries (DLIBs) during system generation, and the system modifications (SYSMODs) applied to the target system.
- A matrix of shipping charges that the shipper and carrier agree to use for LTL shipments. The charges are based on the origin and destination of a shipping lane, the freight class of a shipment, and the weight of a shipment.
- The fee the packet-switching data network charges a user for sending data. The tariff is usually based on the number of packets sent over the network.
- An activity that can be performed by a single user.
- A unit of computation. In a parallel job, two or more concurrent tasks work together through message passing. Although it is common to allocate one task per physical or logical processor, the terms "task" and "processor" are not interchangeable.
- In Ada language, a routine that operates in parallel with other parts of the program. A task is written as a task specification (which specifies the name of the task, and the names and formal parameters of its entries), and a task body which defines its execution.
- An atomic activity that is included within a process. A task is used when the work in the process is not broken down to a finer level of process model detail. Generally, an end-user, an application, or both perform the task. A task object is the same shape as the subprocess, which is a rectangle that has rounded corners.
- A unit of work to be accomplished by a device or process.
- An action assigned to an operator by a supervisor or a system in a warehouse, such as a move, putaway, or pick task.
- The smallest unit of work in a workspace that can be assigned to one Content Contributor. See also task group, workspace, workspace content contributor.
- A process and the procedures that run the process.
- The smallest unit of work in a workspace that can be assigned to one Content Contributor.
- In CICS, a single instance of the execution of a transaction.
- A set of actions designed to achieve a particular result. A task is performed on a set of targets on a specific schedule.
- An activity that a user is required to perform on a contract.
- A unit of work representing one of the steps in a process.
- An operation in the console that is launched from a node in the console navigation and completed on a page in the work area.
- An action performed by an agent if the event status meets the task execution rules. For example, an agent can send an email, publish a news item, or run a report.
- In the Tivoli Dynamic Workload Console, a filter, by scheduling object type, which returns a list of objects with attributes matching those specified in the task definition.
- One or more actions associated with a case. A task has one or more steps that must be completed to finalize the task. For example, a task might be to review new hire applications. A case is not complete until all required tasks are completed or manually disabled. Each task has roles that are associated with it.
- The basic unit of organization in a rule flow.
- In Tivoli Intelligent Orchestrator, an action that runs a deployment job on one or more target devices. A deployment job can include one or more job items that correspond to workflows.
- In a Tivoli environment, the definition of an action that must be routinely performed on various managed resources throughout the network. A task defines the executables to be run; the authorization role required to execute the task; and the user or group name under which the task will execute.
- An activity that has business value, is initiated by a user, and is performed by software.
- A work item that an administrator performs, for example: granting permissions and adding users to a community.
- An action performed by the provisioning server on a host. Examples of tasks are deployment, creating cloning profiles, and detecting the currently installed operating system.
- A scheduled project activity to which a resource can be assigned to perform work.
The type of user assistance that is readily accessible from the product and that includes both task topics that provide step-by-step instructions for how to use one product interface or a set of product interfaces and the concept and reference topics that are closely related to those task topics. Task-based assistance is often included in help systems and information centers.
A command that implements a specific application logic. In general, a controller command and a set of task commands together implement the application logic for a URL request. See also controller command.
task control area (TCA)
An area of main storage acquired by CICS when a task is first dispatched. It is used to control the processing of the task. Once acquired, the TCA exists until the task is terminated. It contains the current status of the task, its relative dispatching priority, and parameters and information being passed between CICS and the application program.
task control block (TCB)
A z/OS control block that is used to communicate information about tasks within an address space that is connected to a subsystem. See also address space connection.
The smallest unit of work in a workspace that can be committed to production-ready data. See also commit, production-ready data, quick publish, task, workspace, workspace manager, workspace task group approver.
See trigger monitor.
In System i Navigator, a view of system tasks that lets a user interact with i5/OS operating system functions. A taskpad contains a set of interrelated tasks that either perform a function or launch help that explains how to perform a function.
task-related user exit (TRUE)
A user exit program that is associated with specified events in a particular task, rather than with every occurrence of a particular event in CICS processing (as is the case with global user exits). See also global user exit, resource manager interface.
A group of elements which can be customized on a host computer. They are either deployment parameters or graphical user interface elements which condition the appearance of the target computer screen when Tivoli Provisioning Manager for OS Deployment is managing the computer. See also deployment scheme.
Indicates the different categories of tax a store may be required to collect, such as federal, state or provincial, and municipal tax. Each tax category must be assigned one of the tax types; either sales or shipping.
- A description of a multidimensional data store expressed in XML.
- A dictionary that enables users to search for synonyms of their query terms when they search a collection. See also category tree.
- The hierarchical classification of information according to a known system that is used to easily discuss, analyze, or retrieve that information. See also ontology.
See Telecommunications Access Method.
See tape configuration database.
A group of one or more systems or sysplexes, or both, that share the same tape configuration database (TCDB). The individual systems in the TCDBplex share access to one or more tape library data servers and to a common pool of scratch volumes in each tape library. They can also share access to the set of private volumes in each tape library.
See automation package.
See transport connection identifier.
See total cost of ownership.
See Transmission Control Protocol.
TCP ACK storm
A denial-of-service attack on a server in which a hacker or cracker secretly inserts data into a client/server session in an attempt to disrupt the session. The resulting acknowledgements (ACKs) bounce back and forth and a TCP ACK storm ensues after the hacker has hijacked multiple client/server sessions.
See to complete performance index.
See Transmission Control Protocol/Internet Protocol.
In PSF, pertaining to a device that is linked to the OS/390 system through a TCP/IP network and receives data from the OS/390 system using the application-layer IBM protocol for IPDS printers. Some TCP/IP-attached printers require the i-data 7913 IPDS Printer LAN Attachment. See also SNA-attached.
See transmission control queue.
See terminal control system.
See Tenex C shell.
See Telephony Control Service Provider Interface.
See terminal control table.
See terminal control table terminal entry.
See terminal control table line entry.
See terminal control table system entry.
See terminal control table terminal entry.
See terminal control table user area.
See transmission control unit.
See trivial database.
See target distributed data manager.
See twinaxial data link control.
See Time Division Multiple Access.
See transient data queue.
See Tagged/Delimited String Format.
See transaction dump table.
See topology database update.
See terminal equipment.
See terminal equipment 1.
See terminal equipment 2.
See time variance at completion.
The grouping of two to four ports or adapters to increase transmission and reception throughput. Teaming creates a single, high-speed, fault-tolerant link that provides load balancing for both outbound and inbound traffic. See also adapter load balancing.
The component that interacts with a repository to share and version projects and project data. See also version control.
See terminal error block.
technical information exchange (TIE)
A part of the electronic customer support function that allows a user to send files to and receive files from a remote support system, and to search for information on a remote support system. The files are sent and received through a remote support network.
A record that maintains information that is related to an externally published directive or bulletin, such as an airworthiness directive or a customer service notification. Technical records are used in highly regulated industries to ensure that all regulations are properly implemented.
An adapter that is designed for interactions that conform to a specific technology. For example, the WebSphere Adapter for FTP, is an intermediary through which an integration broker sends data to a file system that resides on a local or remote FTP server.
technology-independent machine interface (TIMI)
The lowest visible architectural layer of the server. TIMI defines the high-level machine instruction set and application programming interface that is independent of the underlying implementation. This allows the underlying hardware and Licensed Internal Code to evolve over time to take advantage of technology advances without affecting the user-level interface.
See terminal endpoint identifier.
- The part of a data circuit external to the equipment that connects to a data-switching exchange.
- Any physical medium, such as a wire or microwave beam, that is used to transmit data.
telecommunication program PCB (TP PCB)
The program communication block (PCB) that supports communication between an application program and a terminal or other application program. There are two types of TP PCBs: I/O PCB and alternate PCB.
Telecommunication Standardization Sector
See International Telecommunication Union Telecommunication Standardization Sector.
The sending, receiving, and storing of information by way of telecommunication devices. In particular, the use of data collection devices in vehicles to gather and transmit diagnostic and tracking data.
- The hardware and software technology that supports computer-based phone calls.
- The use or operation of systems for the transmission of voice or data communications between separate points.
Originally an electromagnetic device consisting of a combined keyboard and printer used to communicate over telephone lines or other wired serial connections. The abbreviation TTY is now used to describe any serial teletypewriter-like connection.
teletypewriter exchange service (TWX)
Teletypewriter service in which suitably arranged teletypewriter stations are provided with lines to a central office for access to other such stations throughout the U.S. and Canada. Both baudot- and ASCII-coded machines are used. Business machines may also be used, with certain restrictions.
Telex Correspondents File
A file that stores data about correspondents. When the user enters the corresponding nickname in a Telex message, the corresponding information in this file is automatically retrieved and entered into the Telex header area.
In TCP/IP, a protocol that provides remote-terminal connection service. Telnet enables users of one host to log on to a remote host and interact as if they were directly attached terminal users of that host.
- A DB2 utilities output data set descriptor that is used for dynamic allocation. A template is defined by the TEMPLATE utility control statement.
- A pattern to help the user identify the location of keys on a keyboard, functions assigned to keys on a keyboard, or switches and lights on a control panel.
- A predefined format that is designed to retrieve particular data on a regular basis and in a consistent format.
- In report authoring, a reusable report layout or style that can be used to set the presentation of a query or report.
- A generalized project or deliverable plan without populated data for use by project managers for planning a project.
- An XML representation of the instructions that call the promotions engine.
- A file that contains an AIX Profile Manager profile and the options that can be applied for deployment of a template on the target system.
- A model of a new Notes database. If it is a design template, it will update database design elements created from the template.
- In Informix, a mechanism that is used to set up and deploy Enterprise Replication for a group of tables on one or more servers.
- A predefined process of activity roadmap that can be applied to specific process workflows and modified to meet the needs of a specific workflow. Templates can be created, edited, cloned, or deleted.
- A component that can be used to define reference structure attributes or dimension table columns together with their semantics.
- A family of C++ classes or functions with variable types.
- A group of elements that share common properties. These properties can be defined only once, at the template level, and are inherited by all elements that use the template.
- An object used to create new objects of the same type. The created object has the same characteristics as the template. See also application security template, entry template, property template, publish template, publishing style template, search template, security template, versioning security template.
- The metadata that defines the format of data in the RACF database.
- In enhanced edit mode, a character buffer that is associated with the terminal.
- A HATS resource that describes the relatively static portion of the web pages presented by the HATS application, including a banner and navigation area.
- In UML modeling, a model element with unbound formal parameters that you can use to define families of classifiers, packages, and operations. A parameterized model element that describes or identifies the pattern for a group of model elements of a particular type.
- A standard layout used in such system communications as email, approval requests, and error messages.
- In WebSphere Commerce, a predefined skeleton or pattern that determines how information displays on a web page. The template defines characteristics such as the location and type of text and images, and background color.
- In REXX, a guide that allows strings to be parsed by words (delimited by blanks), by explicit matching of strings, or by specifying numeric positions.
- An object that represents the framework of future objects. Each future instance of an object is created by copying the template’s components. See also clause template, contract template, format template, line clause template, notification template, term definition.
In UML modeling, the actual value that is assigned to a template parameter to make the template a usable model element. See also template parameter.
In Lotus Notes, a file with the extension NTF that contains the structure for the database -- that is, forms, folders, and views -- but does not contain documents. Domino Designer comes with a collection of templates that can be used to create system and application databases.
A Template Organization is a role associated with an organization that defines point-of-sale rules, business processes, and configurations for a store or a group of stores. When a config organization is defined only for the purpose of managing business rules, the config organization must be designated as a Template Organization. Template Organizations are not logical organizations. Template organizations can be configured in the inheritance structure so that one Template inherits rules from another Template.
In UML modeling, a formal parameter that, after it is bound to an actual value, makes a template a usable model element. See also template argument.
temporary baseline increment
In architecture, a positive or negative value that is added to the current baseline presentation coordinate to specify the position of a temporary baseline in a presentation space or on a physical medium. Several increments might have been used to place a temporary baseline at the current baseline presentation coordinate.
temporary data set
An uncataloged data set with a name that begins with an ampersand (&) or two ampersands (&&) and that is normally used only for the duration of a job or interactive session. See also permanent data set.
temporary dynamic queue
A dynamic queue that is deleted when it is closed. Temporary dynamic queues are not recovered if the queue manager fails, so they can contain nonpersistent messages only. See also permanent dynamic queue.
- A resource failure that can be resolved by error recovery programs. See also permanent error.
- An error that requires an operation to be retried a number of times before it is successfully completed.
temporary file system (TFS)
A temporary, in-memory physical file system that supports in-storage mountable file systems. Normally, a TFS runs in the kernel address space, but it can be run in a logical file system (LFS) colony address space.
A library that is automatically created for each job to contain temporary objects that are created by the system for that job. The objects in the temporary library are deleted when the job ends. The system name for temporary library is QTEMP.
- The section of computer storage in which data is stored temporarily while a program is running.
- The CICS facility that allows application programs to store data in a temporary storage queue for later retrieval.
- A table that the DBMS destroys automatically at the end of a session or transaction.
- A table that holds temporary data. Temporary tables are useful for holding or sorting intermediate results from queries that contain many rows. The two kinds of temporary tables, which are created by different SQL statements, are the created temporary table and the declared temporary table. See also base table, created temporary table, declared temporary table, result table, table.
See terminal error program.
For processor storage, real and virtual storage, and channel volume, 2 to the power of 40 or 1 099 511 627 776 bits. For disk storage capacity and communications volume, 1 000 000 000 000 bits.
For processor storage, real and virtual storage, and channel volume, 2 to the 40th power or 1 099 511 627 776 bytes. For disk storage capacity and communications volume, 1 000 000 000 000 bytes.
- A string, symbol, or function call contained within a REXX expression.
- In a business glossary, a word or phrase that describes a characteristic of the enterprise. By assigning assets to terms in the business glossary, information assets can be organized based on business meaning. See also business glossary.
- The smallest part of an expression that can be assigned a value.
A placeholder with a set of properties that determine the behavior and possible values of a term. See also template.
See Term Extraction tool.
- In data communication, a device, usually equipped with a keyboard and display device, capable of sending and receiving information.
- In curses and extended curses, a screen that represents what the workstation's display screen currently looks like. The terminal screen is identified by a window named curscr, which the user does not access directly.
- In a system or communications network, a point at which data can either enter or leave.
- The point at which one node in a message flow is connected to another node. Terminals can be connected to control the route that a message takes, dependent on the outcome of the operation that is performed on that message by the node.
- See display station.
terminal abnormal condition line entry (TACLE)
An area containing CICS error information and a copy of the data event control block (DECB) at the time an error occurred on a non-SNA LU or line. When an abnormal condition occurs on a non-SNA LU or line, terminal control places the terminal out of service and dynamically creates a TACLE, which is chained off the terminal control table line entry (TCTLE) for the terminal or line on which the error occurred.
In CICS, a facility that handles addressing, and transmission error detection and correction for terminals (displays and printers) associated with the local CICS system. It also handles the intercommunication data queue used by CICS.
- A table describing the terminals and logical units within a CICS network.
- CICS control table retained to define non-SNA LU networks.
terminal control table line entry (TCTLE)
A control block in the TCT for all non-SNA LUs on the same line. The TCTLE contains all parameters necessary for processing requests for terminals on the line.
terminal control table terminal entry (TCTE, TCTTE)
In the TCT, an entry for each terminal known to CICS. TCTTEs are generated either during system initialization (for terminals predefined by resource definition) or when a terminal is autoinstalled. The TCTTE describes the terminal and addresses the corresponding TCTLE, the active TCA, and TIOAs; it also contains control information relating to terminal control requests issued by the CICS application program.
terminal device file
See character special file.
terminal equipment 1 (TE1)
Data terminal equipment (DTE) with integrated ISDN support. In an ISDN, the System i system is a TE1. See also terminal equipment 2.
terminal equipment 2 (TE2)
Data terminal equipment (DTE) without an ISDN interface. To communicate with other equipment through an ISDN, this equipment must have the protocol converted to one that can be recognized by the network. For example, a 7820 ISDN terminal adapter may be used. See also terminal equipment 1.
terminal error program (TEP)
A user-replaceable CICS program used to handle error conditions that can occur when sequential devices are used. Node error programs must be used for z/OS Communications Server-supported devices. The terminal error program analyzes the cause of the terminal or line error that has been detected by the terminal control program.
The resource in a 3270 service project that contains the information necessary for connecting to the host system during build time. Terminal files are automatically generated when the 3270 terminal service project is created. In the Navigator view, if a terminal file is selected, the 3270 terminal service recorder opens in the editor area.
terminal-initiated transaction routing
Transaction routing that is initiated by a request to start a remote transaction arriving from a terminal. On the basis of an installed resource definition for the transaction and possibly on decisions made in a user-written dynamic transaction routing program, the request is routed to the appropriate remote system. The transaction runs as if the terminal were attached to the transaction-owning system.
A type of main storage database (MSDB) in which each segment is assigned to and owned by one logical terminal (LTERM), the owner with terminal security may alter or update that segment, and a segment may be referenced by someone other than the owner. Terminal-related MSDBs are either fixed ((permitting changes) or dynamic (permitting segment insertion and deletion).
terminal response mode
The type of response mode that suspends all input operations from the terminal until the application program has generated the output message. See also line response mode, response mode.
The use of system definition macros and security maintenance utility control statements to authorize a particular logical or physical terminal to issue some or all of the operator commands and to send or receive some or all of the currently defined transactions.
terminate end event
An end event that will stop all parallel activities within its process level and all lower process levels. See also end event.
A node that marks the end of a process. When a flow reaches a terminate node while the process is running, the process immediately terminates, even if there are other currently executing flows within the process.
In SNA, a request unit that is sent by a logical unit (LU) to its system services control point (SSCP) to cause the SSCP to start a procedure for ending one or more designated LU-LU sessions.
termination imminent step
The final step of the three-step condition-handling model. In the termination imminent step, a final chance is provided to handle conditions or to perform cleanup before the thread is terminated. See also condition step, enablement step.
- A syntax object that signifies the end of a data object. For example, a carriage return or line feed at the end of a record might be the record's terminator.
- The part of a program that performs the action necessary to end a job or program.
The representation of a term that serves as a variable within a contract or clause and is populated with a term value. It may have a defined default value or it can be changed by a user. It may be used as a criterion for a search, condition, or event. See also variable.
A specific value that populates a term placeholder. It may be selected from a list of possible values, typed directly as defined in the term placeholder, or provided by the system in the case of a system term.
- The designated account set or physical geography where a sales or service employee sells or provides products or services.
- A portion of the POSIX locale that is mapped to the territory code for internal processing by the database manager.
A code that is used by the DB2 database manager to preset the default collation order for an SBCS database and to establish monetary, date, time, and numeric formatting that is specific to a country, region, or territory.
- A set of input values, execution preconditions, expected results and execution postconditions, developed for a particular objective or test condition, such as to exercise a particular program path or to verify compliance with a specific requirement. (ISTQB)
- A set of tasks, scripts, or routines that automate the task of testing software.
- The inputs, execution conditions, and expected results that are used to evaluate an aspect of a system under test.
- A property of the integration test client that is used to specify modules for testing and to control the tests.
- A set of characteristics of the system that hosts the system under test. These characteristics affect the conditions for test execution and the evaluation of test results.
- An environment containing hardware, instrumentation, simulators, software tools, and other support elements needed to conduct a test. (ISTQB)
- A specific instance of a configuration of hardware and software established for the purpose of conducting tests under known and controlled conditions. See also deployment environment.
The calculated approximation of a result related to various aspects of testing (e.g. effort spent, completion date, costs involved, number of test cases, etc.) which is usable even if input data may be incomplete, uncertain, or noisy. (ISTQB)
- A series of script files used to enable a DB2 database for use by the DB2 XML Extender. A test harness is optionally created when a DAD file is generated from a relational database to XML mapping. Once enabled, it tests composing XML from data as well as decomposing XML files into relational data.
- For a Netezza user-defined function or aggregate, a test environment that allows you to debug your user-defined objects outside of the Netezza runtime engine.
The stage of model building in which the model produced by the training stage is tested against a data subset for which the outcome is already known. See also model building, training, validation.
A key added to a telex message to ensure message integrity and authorized delivery. The test key is an integer value of up to 16 digits, calculated manually or by a test-key processing program using the significant information in the message, such as amounts, currency codes, and the message date.
test-key processing program
A program that automatically calculates and verifies a test key. The Telex Link supports panels for input of test-key-related data and an interface for a test-key processing program.
A user-defined library used for debugging operations that does not contain objects needed for normal processing. See also production library.
- The mode that causes any input message entered into a terminal under test to be returned to the test terminal, with error analysis procedures bypassed.
- The mode employed in testing a new user interface, in which the compiled application is used to drive the interface. Allows building, modifying, testing, and refining operations without having to compile, link, and debug.
- In printers, the operational mode in which the printer can produce print samples, accept configuration changes, and control traces. For example, when the IBM 3900 Advanced Function Duplex Printing System is in test mode, it is not accepting information from the attached controlling computer system. See also diagnostic mode, print mode.
A template used for the automatic generation of component tests. There are several test patterns available for testing both Java and EJB components. See also component test.
The stage of the scan during which the objects and logic of the scanned application are submitted to a comprehensive barrage of typical, erroneous, and simulated-malicious usage techniques, resulting in a complete inventory of security vulnerabilities.
- A set of usage scenarios with which the user can verify that business rules are correctly designed and written. Running test suites produces a report comparing the expected results and the actual results obtained when applying rules to the scenarios.
- A collection of test cases that are grouped for execution purposes.
- A collection of test cases that define test behavior and control test execution and deployment.
test suite execution record
A record of the execution environments for a specific instance of a test suite. One can use this record to run a test suite instance and to track the status of each test run.
- A finishing item that consists of any alphanumeric or special characters.
- To send a text message.
- A sequence of characters that can be read by a person and encoded into formats such as ASCII that can be interpreted by a computer.
- A Data Collection question that is used for the entry of open-ended data. See also response.
The process of extracting semantics and other information from text to enhance the retrievability of data in a collection. See also semantic search.
text analysis engine (TAE)
A software component that is responsible for discovering and representing context and semantic content in text. See also Common Analysis Structure.
The process of assigning an integer value to a document that signifies the relevance of the document with respect to the terms in a query. A higher integer value signifies a closer match to the query. See also dynamic ranking, static ranking.
text control chaining
Two or more text controls that use the chain control codes and are started with a single set of control characters. See also control sequence chaining.
A substitution method that uses lexical analysis and dictionary support to propose candidates for corrected text, for example: spelling suggestion, search query resolution, and thesaurus lookup.
Entry of characters in a free format. Entry of text is generally done to provide information for human comprehension, with or without further machine processing. See also data entry, free format.
A file that contains only printable characters. See also binary file.
- A description of the appearance of text as a combination of print direction and character rotation.
- See global orientation.
- Pertaining to computer systems, stand-alone devices, and application software products that allow a user to enter, modify, rearrange, format, display, and print out text.
- See word processing.
- The person who implements APFs that provide the processing specified by the document administrator.
- In SCRIPT/VS, the person who writes SCRIPT/VS macros and organizes macro libraries and profile files so that the appropriate composition will be done for each tag.
text search index database
The database files used by text search services for storing the significant words of documents. These database files are used when a user requests a search of the document library for one or more phrases.
text search index partition
The collection that contains the text search index data from a specific database partition. A text search index is mapped to one or more collections to match the distribution of the data table that hosts the text index.
- A string of graphic characters.
- A sequence of characters (alphanumeric or special) defined by the user.
The intentional omission of portions of text in copy groups specified in the form definition. See also suppressible text.
In binary synchronous communication (BSC), a method of sending and receiving data containing any or all of the 256 character combinations in EBCDIC in specific bit patterns, including transmission control characters.
See ordering scheme.
- A symbol whose final value is to be treated only as text.
- A variable that contains data that is text, such as names and addresses or responses to open-ended questions.
See transfer form data.
See temporary file system.
See Trivial File Transfer Protocol.
See transmission group.
See ticket-granting service.
See transmission header.
An operation in which a storage system releases the block of the I/O from the host system to the affected volumes on the primary site. A thaw operation can occur after a freeze operation ends and consistency is formed on the secondary site. See also freeze.
- A collection of all layer styles, zoom levels, and how zooming affects each map configuration. It is a collection of all the style sets that are defined for the layers of a map application.
- A style that can be applied to a chart to configure its global appearance, such as plotting area background, scale font, and legend location.
- A collective set of style sheets that supports the look and feel of the Rational Asset Manager Web client.
- The style element that gives a place a particular look. The portal provides several themes, similar to virtual wallpaper, which can be chosen when creating a place.
A type of concept extraction that automatically recognizes significant vocabulary items in text documents to extract the theme or topic of a document. See also concept extraction.
A client that has little or no installed software but has access to software that is managed and delivered by network servers that are attached to it. A thin client is an alternative to a full-function client such as a workstation. See also rich client.
An appliance that provides a 5250-based operating system console for the IBM i operating system. This appliance connects directly to the server using one of the HMC Ethernet ports (labeled HMC 1 and HMC 2) on the back of the server.
- A mechanism that provides the ability to define logical volume sizes that are larger than the physical capacity installed on the system.
- The ability to define a storage unit (full system, storage pool, volume) with a logical capacity size that is larger than the physical capacity assigned to that storage unit. See also volume.
third-generation language (3GL)
A high-level programming language that was designed to run on the third generation of computer processors, built on integrated circuit technology roughly from 1965 to 1970. C, FORTRAN, Basic and Pascal are examples of third-generation languages still in use today.
See value-added network.
See target library high-level qualifier.
- The local symbol used to separate every third digit in large numbers or lengthy decimal fractions.
- The character (comma in the United States) placed every third number starting left of the decimal point. For example, three thousands separators are used in the number: 641,322,974,821.
A condition, caused by a high level of memory over-commitment, in which the system is spending all of its time writing out virtual-memory pages and reading them back in. The application programs make no progress because their pages don't stay in memory long enough to be used. Memory load control is intended to avoid or stop thrashing.
- The DB2 structure that describes the connection of an application, traces its progress, processes resource functions, and delimits its accessibility to DB2 resources and services. Most DB2 functions execute under a thread structure.
- A stream of computer instructions that is in control of a process. In some operating systems, a thread is the smallest unit of operation in a process. Several threads can run concurrently, performing different jobs. See also user thread.
- The messages or documents that capture a written conversation about a topic. In Notes, a thread consists of an initial mail message or document and all its replies, contained in a view or displayed as a history in a document.
- The process whereby various transactions undergo concurrent execution.
- In printers, passing paper by hand through the paper path.
- A mechanism that allows each thread in a multithread process to allocate storage for its corresponding data.
- See thread-specific storage.
thread private storage
See thread-specific storage.
- Pertaining to a function, macro, or operating system service that can be called from multiple threads in a process at the same time. See also multithreaded application, reentrant code, thread unsafe.
- Pertaining to user-written code or CICS functions that use appropriate serialization techniques to maintain the integrity of resources that are being used by other tasks at the same time.
The ability to synchronize the activities of various threads. A thread synchronizes itself with another thread by putting itself to sleep. Before doing so, the thread notifies the operating system as to what event has to occur in order for the thread to resume execution.
Pertaining to a function, macro, or operating system service that cannot be called from multiple threads in a process at the same time. See also threadsafe.
three-tier client/server architecture model
A client/server system that is similar to a two-tier client/server system, but has an additional layer of application servers. The additional layer allows for splitting the application logic between client processes. This way, a specialized application server process can handle resources management, other I/O, or calculation intensive tasks in order to minimize network load. See also client/server architecture, two-tier client/server architecture model.
- A level set in the system at which a message is sent or an error-handling program is called. For example, in a user auxiliary storage pool, the user can set the threshold level in the system values, and the system notifies the system operator when that level is reached.
- A predefined value per metric that is used to compare data points.
- A storage group attribute that controls the space usage on direct access storage device (DASD) volumes, which is defined as a percentage of occupied tracks versus total tracks.
- A customizable value for defining acceptable tolerance limits (maximum, minimum, or reference limit).
- A level that is set on the Director server to define the configuration status of the monitored systems.
- A specified percentage of licenses; if more than this percentage of licenses for a product are in use, messages about the level of use are logged.
- In OSI, a user-specified value that determines the frequency with which events will be reported. For example, if a certain error threshold is set at 10, the error will not be reported until the tenth occurrence of the error.
- A setting that applies to an interrupt in a simulation that defines when a process simulation should be halted based on a condition existing for a specified proportion of occurrences of some event.
- A customizable value for defining the acceptable tolerance limits (maximum, minimum, or reference limit) for an application resource or system resource. When the measured value of the resource is greater than the maximum value, less than the minimum value, or equal to the reference value, an exception or event is raised. See also performance threshold.
- A user-defined entity that establishes a condition or boundary that, if exceeded, causes the data server to take a prescribed set of actions. See also workload definition.
threshold definition domain
The object that a threshold is associated with and whose activities are monitored to ensure that the threshold condition is not exceeded. A threshold affects only activities within its domain.
threshold enforcement scope
The area for which a threshold is both monitored and enforced for activities to which the threshold has been applied. Examples of this area include a workload occurrence, a database partition, or a database.
In OSI, an event that occurs when a counter has reached its user-specified threshold. OSI Communications Subsystem logs threshold events and generates messages to the operator about these events.
The process of moving files from a local file system to server storage based on the high and low thresholds that are defined for the file system. See also automatic migration, demand migration, migration job, selective migration.
In the capacity planning tool, a value used as a general guide for optimal resource utilization. If resource utilization is above the threshold value, the resource performance may be unacceptable. Threshold values are also available for the rate of synchronous reads in the machine pool and for the sum of all pools. See also guideline value.
A utility that has a limit placed on the resources that would otherwise be consumed. The degree to which the resources are limited is based on the current workload of the system. Supported utilities include backup, restore, and table space reorganization.
A threshold where the system stops accepting new connections. See also kill threshold.
A method of managing system performance by scheduling or preventing certain processes or groups of processes from running to avoid too high a demand on system resources at any time. See also throttling group.
A collection of processes, such as flowchart runs or mailings, that are grouped so that the run times can be controlled together to prevent the processes from placing too high a demand on the system. See also throttling.
- In storage management, the total bytes in the workload, excluding overhead, that are backed up or restored, divided by elapsed time.
- The measure of the amount of work performed by a device, such as a computer or printer, over a period of time, for example, number of jobs per day.
- A measure of the amount of information transmitted over a network in a given period of time. Throughput is generally measured in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps). See also aggregate bandwidth.
- In data communications, the total traffic between stations over a period of time.
- In X.25, a packet-switching data network optional facility that allows the data terminal equipment (DTE) to negotiate the speed at which its packets travel through the packet-switching data network.
- In OSI, a network layer facility that selects the speed with which data transmission requests are to be handled.
throwing message intermediate event
An intermediate event that sends a message. See also intermediate event.
- A formal record of identified issues or requests that are created against an item and assigned to appropriate users to resolve those issues or complete the requests.
- A mechanism for securely transmitting the identity of a client to a server.
- A record, such as a service request, incident, or problem report, that can be routed and assigned a status.
A part of the key distribution center (KDC) that generates service tickets. A principal presents a ticket-granting ticket to the ticket-granting server when the principal requests a service ticket. The ticket-granting server uses the ticket-granting ticket to verify that the principal has authenticated to the authentication server before it grants the request for a service ticket.
- A ticket that a principal passes to the ticket-granting server when a service ticket is requested. The ticket-granting service uses the ticket-granting ticket to verify that the principal has authenticated to the authentication server before it grants the request for the service ticket.
- A ticket that allows access to the ticket granting service on the key distribution center (KDC). Ticket granting tickets are passed to the principal by the KDC after the principal has completed a successful request. In a Windows 2000 environment, a user logs on to the network and the KDC will verify the principal's name and encrypted password and then send a ticket granting ticket to the user.
Applying special customer tickets or labels to cartons prior to shipping to comply with customer requirements. See also value-added service.
- The interval between cuts of a perforation.
- A situation where a domain or group has exactly half of the defined quorum members. If a quorum is not explicitly defined, all members are considered to be quorum members. See also quorum, tiebreaker.
See technical information exchange.
A monitoring resource that determines how tie situations are resolved. See also tie.
- A group of servers that share a function in an application.
- The logical group of components and the computers on which those components are installed.
- A group of appliances that perform a specific function; for example, Gateway tier. A tier is made up of one of more nodes; for example, the Gateway tier consists of one or more IBM WebSphere DataPower nodes.
A service level agreement (SLA) that includes an offering containing at least one previously deployed SLA. They can be used to include the results of operational level agreements, internal SLAs or outsourced SLAs, in an external SLA that are supplied to a customer.
See Tagged Image File Format.
See Tag Image File Format-Fax.
tightly coupled analysis engine
An aggregate analysis engine whose componenet analysis engines run in the same address space. See also analysis engine.
One of the accent marks in Latin script (~). See also ogonek.
- See pixel map.
- To fill a region with a pixmap.
- To replicate a pixmap in two dimensions.
- A rectangular area that constitutes the basic element of a tiled layer.
A particular type of manager layer that is specifically designed to support load-on-demand mechanisms. A tiled layer is divided into a set of rectangular tiles of identical size that form a tiling grid.
A three-part value that designates a time of day in hours, minutes, and seconds. See also timestamp.
Time Division Multiple Access (TDMA)
A digital communication technology used by some carriers to provide PCS service. TDMA is a multiplexing technology used with satellites and cell phones, in which multiple channels of data are interleaved (each signal is assigned to a different time interval, and the signals are transmitted by taking turns). See also extended time division multiple access.
time-division multiplex bus
A method of transmitting many channels of data over a smaller number of physical connections by multiplexing the data into timeslots, and demultiplexing at the receiving end. In this document one such channel can be considered to be a half-duplex unidirectional stream of 64 kilobits per second.
A payment that is to be scheduled before its schedule time. This capability is used by Continuous Linked Settlement (CLS). In MERVA Liquidity Manager, timed payments are scheduled even if the corresponding currency, channel, or partner banks are stopped.
See asynchronous messaging.
A chart or a portion of a chart that shows a chronology of events. For example, a series of meetings that occur over several days, or a set of transactions that occur over a period of time.
Time-Modulated Ultra-Wide Band (TM-UWB)
New wireless technology that greatly broadens bandwidth. Developed by Time Domain, TM-UWB uses short, coded pulses transmitted over a wide range of frequencies, making it useful for a broad range of applications from networking to through-the-wall radar and secure communications.
time-of-day clock (TOD clock)
A timing device that counts units of time based on the starting point of 00 hours, 00 minutes, and 00 seconds on January 1, 1900. Time-of-day (TOD) information is used to monitor computer operations and events. See also time tolerance.
- A specified time interval during which a primary participant must approve a document.
- A time interval that is allotted for an event to occur or complete before operation is interrupted.
- Abnormal termination of either an application or the DB2 for z/OS subsystem because of the unavailability of resources.
- An event that is triggered by an occurrence at a specific time.
- A BTS object that expires when the system time becomes greater than a specified time, or after a specified period has elapsed. When a timer is defined, a timer event is automatically associated with it. When the timer expires, its associated event fires.
- A task that produces output at certain points in time.
Major component of CICS that provides interval timing and alarm clock services for CICS domains. These are processes that cause an action to occur at some predetermined future time. This service can be performed after a specific interval, at periodic intervals, at a specified time of day, or at a specific time of day every day. It also provides date and time provision and conversion facilities.
A condition that determines the times before or after which a job or job stream cannot run. Specifying both before and after defines a time frame within which a job or job stream runs. Jobs can also have a repetition rate. For example, Tivoli Workload Scheduler can launch the same job every 30 minutes between the hours of 8:30 a.m. and 1:30 p.m. See also timeline view.
- An atomic event that fires when its associated timer expires. See also user-defined event.
- An event that is triggered when a time condition is satisfied. See also intermediate event.
timer intermediate event
An intermediate event that is triggered when a time condition is satisfied. A timer intermediate event can delay the flow of the process or can generate a timeout for activities that exceed the time condition.
A unit of measurement used to give a rough relative estimate of the resources required, or the cost, for the database server to execute two plans for the same query. The resources calculated in the estimate include weighted processor and I/O costs.
timer start event
A start event that is triggered when a time condition is satisfied. A timer start event is used only for event subprocesses. See also start event.
A set of time-stamped data that consists of measurements taken at different times. Examples of time series data time include electricity usage that is collected from smart meters and stock trading activity. See also irregular time series, regular time series. See also irregular time series, regular time series.
time series analysis
A set of data analysis techniques that involve taking measurements on the same unit at regular time intervals in order to predict future measurements or events. See also AutoRegressive Integrated Moving Average, exponential smoothing, seasonality.
Time Sharing Option (TSO)
A base element of the z/OS operating system with which users can interactively work with the system. See also Interactive System Productivity Facility.
- The amount of processor time (specified in milliseconds) allowed for a job before other waiting jobs of equal priority are allowed to process data.
- The interval between scheduled checks by the CPU scheduler to see if a different thread should be dispatched. Unscheduled checks may occur as a result of interrupts or system calls.
timestamp with time zone
A two-part value that consists of a timestamp and time zone. The timestamp with time zone is expressed in years, months, days, hours, minutes, seconds, microseconds, time zone hours, and time zone minutes.
A measure that represents the state of a system at a specific point in time. For example, a time-state measure might show the number of employees in a company at the start of each month, or the product inventory on a given day for each week. A time-state measure can be aggregated by operations, such as totalling across other dimensions, but not across time.
A schedule of times. In business process modeling, timetables are typically associated with resources or costs. For resources, timetables indicate availability (such as Monday to Friday). For costs, timetables are useful if the cost varies with time of day (such as electricity) or time of year (such as seasonal foods).
The difference between the TOD clocks on two adjacent nodes, beyond which the path manager will not allow a session to be established. See also time-of-day clock.
- The time interval in seconds that an entry can exist in the cache before that entry is discarded.
- A technique used by best-effort delivery protocols to inhibit endlessly looping packets. The packet is discarded if the TTL counter reaches 0.
time zone support
A feature of Tivoli Workload Scheduler for z/OS that lets applications be planned and run with respect to the local time of the processor running the application. The controlling processor makes allowances for differences in time zones during planning activities to ensure that interacting activities are correctly coordinated.
See technology-independent machine interface.
A specialized validation action used to measure the duration of a method call or a sequence of method calls. See also validation action.
See terminal input/output area.
- In OSI, a permanent identifier for an object.
- The part of a personal name that represents a social, religious, or academic status, such as "Dr.," "Ms.," or "Colonel." A title is an optional part of a personal name that typically precedes given names. For name-matching purposes, a title is considered to be a peripheral or minor part of a personal name. See also honorific, title, affix, and qualifier.
title, affix, and qualifier (TAQ)
A name token that often helps identify that a string of text represents a name. While these tokens usually indicate something about the name, only affixes are part of the actual name. See also affix, qualifier, title.
Tivoli common directory
A common directory where Tivoli programs store message logs, event logs, or trace logs in XML format, for subsequent filtering by the Tivoli XML Log Viewer utility. See also log viewer, Tivoli XML log format.
Tivoli management region (TMR)
See Tivoli region.
The Tivoli server and the set of managed node gateways and endpoints that it serves. An organization can have more than one region. A Tivoli region addresses the physical connectivity of resources, whereas a policy region addresses the logical organization of resources.
Tivoli Space Manager
A feature of the Tivoli Storage Manager product that handles the moving of files in and out of a secondary storage medium based upon actual file accesses in the primary native file system. This feature can be used with DB2 Data Links Manager to enable DATALINK files to be stored in a virtually infinitely sized file system.
Tivoli Storage Manager
A client/server product that provides storage management and data access services in a heterogeneous environment. Tivoli Storage Manager supports various communication methods, provides administrative facilities to manage the backup and storage of files, and provides facilities for scheduling backups.
Tivoli Storage Manager command script
A sequence of Tivoli Storage Manager administrative commands that are stored in the database of the Tivoli Storage Manager server. The script can run from any interface to the server. The script can include substitution for command parameters and conditional logic. See also macro file, script.
See translation lookaside buffer.
A memory delay that occurs when a memory location is referenced and the page that contains that memory location does not have an entry in the appropriate transition lookaside buffer (instruction or data).
See Transport Layer Interface.
See target library.
See terminal list table.
See traffic management center.
See Transaction Manager database.
See target member.
See Transaction Manager Facility.
See trigger monitor interface.
See Terminal Monitor Program.
See Tivoli management region.
See Transport Manager Subsystem.
See Time-Modulated Ultra-Wide Band.
A component of Communications Server that enables a TCP/IP client workstation to communicate with with an SNA-based host application by transmitting 3270 datastream information over a TCP/IP connection.
The target activity of a constraint, in which the activity whose start or end depends on the start or end of another activity as the result of the constraint. See also From activity.
to complete performance index (TCPI)
The difference between budget at completion and budgeted cost of work performed divided by the difference between budgeted at completion and actual cost of work performed.
See time-of-day clock.
See tokenized form.
- Pertaining to a switching device, such as a toggle key on a keyboard, that allows a user to switch between two types of operations.
- In printers, to switch between options by selecting and reselecting the same button, key, or field. Often toggling turns a selection on or off.
- To switch between two modes on a computer or network; for example, to switch between data entry and command entry modes or between stand-alone operation and device emulation.
- Pertaining to any device having two stable states.
- See assertion.
- A syntactic element, such as a phrase, a word, or a set of one or more characters, that is used for analyzing and processing text. See also parsing, separation character, strip character, tokenization, value.
- A real or virtual device that stores cryptographic data objects such as keys and digital certificates.
- A value passed as a parameter for the purpose of uniquely identifying objects.
- The basic syntactic unit of a computing language. A token consists of one or more characters, excluding the blank character and excluding characters within a string constant or delimited identifier.
- A marker that progresses through a process instance and indicates which element is currently running. A process instance can generate several tokens. A token can take only one path.
- A particular message or bit pattern that signifies permission or temporary control to transmit over a network.
- The basic textual units that are indexed by enterprise search. Tokens can be the words in a language or other units of text that are appropriate for indexing. See also lexical parsing item.
- In OSI, an attribute of a connection. The token is dynamically assigned to one session-service user at a time to permit certain services to be called. Tokens are a session layer concept.
- In checkpoint processing, an identifier that is used to determine checkpoint I/O status.
A mechanism that controls data flow. As an application requests permission into a network, the token bucket adds characters (or tokens) into a buffer (or bucket). If enough room is available for all the tokens in the bucket, the application is allowed to enter the network.
- The process of replacing sensitive data, such as a credit card number, with a unique token. The sensitive data is stored securely in an external vault. The only way to return the token to its original value is to contact the external vault system.
- The process that segments data into tokens. See also parsing, token.
A system for controlling file access in which each application performing a read or write operation is granted some form of access to a specific block of file data. Token management provides data consistency and controls conflicts. Token management has two components: the token management server and the token management function.
According to IEEE 802.5, network technology that controls media access by passing a token (special packet or frame) between media-attached stations. See also local area network.
A local area network that connects devices in a ring topology and allows unidirectional data transmission between devices by a token-passing procedure. A device must receive a token before it can transmit data. See also local area network.
In CoOperative Development Environment/400, a token or set of tokens having a similar characteristic or function, and assigned the same display attributes by the CoOperative Development Environment/400 program.
- The extent to which a supplier is risk averse. It is a value that is tolerable but one that poses a potential risk at the time of assessment.
- See benchmark.
- An acceptable value or value range for a specified output value.
A configured value that specifies the variance that is allowed on a specified performance requirement. For example, the number of days that are allowed to lapse after the expected ship date or the requested ship date; if the days exceed the tolerance limit, an event is raised.
A small subset of attributes of a deleted object. The tombstone object is retained for a specified period, and at the end of the specified period, the tombstone object is permanently deleted.
An audible signal sent across a telephone network. There are single (one-frequency) tones, tritones (three sequential tones at different frequencies), dual tones (two simultaneous tones at different frequencies), and dual sequential tones. Each has a different meaning.
In architecture, containing marking agents such as toner or ink. See also untoned.
Toolbox for Java
See IBM Toolbox for Java.
A presentation that is given to inform employees about safety procedures. Toolbox talks are important for communicating safety procedures as well as for sharing information between the members of the team who are charged with carrying out the tasks that are associated with permits to work.
- A set of development tools used to write and test software applications.
- A container where artifacts can be stored for reuse by process applications or other toolkits.
- A collection of artifacts that are organized into a package. A toolkit includes one or more namespaces, which contain the functions, operators, and types that are packaged as part of the toolkit, all of which can then be reused in other applications.
A form of user assistance that is displayed when a cursor is moved over a graphical image, such as an icon, that does not otherwise have a label. A tooltip provides a brief, plain text description of function. See also hover help.
In web services, the process of developing a service from a Web Services Description Language (WSDL) file. See also bottom-up development.
- Logical channel of communication between one or more transmitters and one or more receivers.
- A single web page at any level within an information center hierarchy.
- In dynamic data exchange (DDE), the data that is to be exchanged within a DDE conversation.
- A character string that describes the nature of the data that is being published in a publish/subscribe system.
- An independent unit of information that follows the rules for a specific information type and that is meaningful when it is displayed alone.
- An item for discussion within a forum.
- A set of closely related topics that is presented in a standard hierarchy within an information unit.
- A functional group of web pages. A topic collection can be a grouping at any level within an information center hierarchy.
topic connection factory
An interface used by a Java application to create topic connection objects. These objects allow messages to be placed on that topic. It is used by the JMS Listener to retrieve messages from the topic.
topic host routing
An option for routing publications in a publish/subscribe cluster. With topic host routing, only selected cluster queue managers host the topic definitions. Publications from non-hosting queue managers are routed through the hosting queue managers to any queue manager in the cluster with a matching subscription.
top-level business object
The individual business object at the top of a hierarchical business object. It is a parent business object but does not itself have a parent business object. See also hierarchical business object.
A strategy of replenishment which complements min-max replenishment. Top-off replenishment is also driven by inventory in reserved locations. However, instead of creating replenishment tasks if the inventory falls below a minimum (trigger) level, the system creates replenishment tasks if the inventory falls below the maximum (cap) level. See also min-max.
top-of-rack switch (TOR switch)
A network switch that is located in the first rack of an IBM System z BladeCenter Extension (zBX). See also intraensemble data network TOR switch, management TOR switch.
- The physical or logical mapping of the location of networking components or nodes within a network. Common network topologies include bus, ring, star, and tree.
- The mapping of slices of a database to individual disks, mirroring assignments between disks, spare disks, and to SPU ownership for the active data slices.
- An inventory of CICS and CICSPlex SM resources, and a map of their relationships. CICSPlex SM supports the definition of resource and system topology.
- A graphical view of a configured item and its relationships.
- A graphical breakdown of a transaction displayed in an hierarchical arrangement of software components and transactions.
- The structure of a graph. Two drawn graphs have the same topology if one drawing can be obtained from the other by moving the nodes and reshaping the links.
- In fibre-channel technology, the configuration of the fibre-channel network and the resulting communication paths allowed. Possible topologies are point-to-point, switched fabric, and arbitrated loop.
- The cluster layout and connections, as well as cluster, node, network, and network interface information.
- The physical or logical mapping of the location of networking components or nodes within a network.
topology database update (TDU)
A message about a new or changed link or node that is broadcast among APPN network nodes to maintain the network topology database, which is fully replicated in each network node. TDU messages contain identifying information, node and link characteristics, and resource sequence numbers to identify the most recent updates for each of the resources described in the TDU.
A function of the Managed System Services program that is responsible for collecting topology information from nodes and clients in the network. The topology manager can reside on any system in the network; however, this system is most likely to be the central site system.
In AIXwindows, a narrow band of lighter color that is located across the top of a rectangular graphical object (a widget or gadget). The top shadow creates a three-dimensional appearance when the object is manipulated.
See terminal-owning region.
See top-of-rack switch.
In DFU, a storage area where final totals for a field are kept. See also batch accumulator.
total awareness variable
A variable that combines the responses to two or more questions about brands that share a brand list. A total awareness variable typically combines the responses to questions that ask respondents to select their favorite brand, and which brands they can remember, first unprompted and then prompted.
In an advanced order, the cost of all order items, along with additional fees and taxes. See also current charge.
total cost of ownership (TCO)
A methodology for calculating the actual cost of owning a product over the period of ownership and use based on combining costs of acquisition or leasing, training, deployment, support, residual equipment values, return on investment, time to market, and so forth.
In RPG, an output record written after a group of detail records. Total records generally contain data that is the result of calculations performed on the information in a group of detail records. See also detail record.
The part of the RPG program cycle in which calculation and output operations specified for a group of records are done. See also detail time.
From the perspective of an app developer, the act of a user contacting the screen with either fingers or a stylus and completing a gesture on the interface. See also gesture.
- The interface to an instance of a managed resource, such as an operating system or a server. A touchpoint implements a sensor and an effector for the managed resource, and maps the sensor and effector to existing interfaces. See also effector, manageability interface, sensor.
- An application or place where a marketer interacts with customers, such as a website or call center. A touchpoint can be a channel where the customer initiates contact or a channel that is used to contact the customer. See also inbound interaction, outbound interaction.
In mobile computing, a touch-sensitive screen that accepts gestures as input. See also gesture.
A bezel that responds to gestures that take place directly on the bezel, start on the bezel, or end on the bezel. For example, swiping from the right side of the bezel on to the screen of a BlackBerry PlayBook switches between apps. See also gesture.
See Transaction Processing Council.
See transport-layer protocol data unit.
See Transaction Processing Facility.
See time provider interface.
See transaction pipe.
See Translation Plan Management System.
See Translation Plan Management System information.
See transaction program name.
See Teleprocessing Network Simulator.
See telecommunication program PCB.
See Touchpoint web service.
- In DB2 replication, a facility that is used to collect monitoring, auditing, and performance data for the Capture program, the Q Capture program, the Apply program, the Q Apply program, or the Replication Alert Monitor.
- A record of the processing of a computer program or transaction. The information collected from a trace can be used to assess problems and performance.
- A DB2 for z/OS facility that provides the ability to collect monitoring, auditing, performance, accounting, statistics, and serviceability (global) data.
- To record data that provides a history of events occurring in the system.
- The ability to trace a project element to other related project elements, especially those related to requirements.
- The ability to identify the measuring and test equipment that was used to calibrate an asset.
A view that illustrates the relationships between requirements of the same or different types. This matrix is used to create, modify, and delete traceability relationships and view indirect relationships and traceability relationships with a suspect state. See also suspect relationship state, view.
See trace to/trace from relationship.
A view of requirements of a single type that displays other requirements traced to or from them. See also view.
Trace Analysis Program (TAP)
See Advanced Communications Function/Trace Analysis Program.
- For the Ada debugger, a listing of the routines that are in the call chain above the code that is being debugged. For example, if a breakpoint is set within an Ada procedure and a call traceback is requested, a list appears that includes all of the procedures that called the Ada procedure, in the order that they called it. All the calling procedures in the call chain are listed up to, but not including, the operating system calling the original highest level routine.
- A section of a dump that provides information about the stack frame, the program unit address, the entry point of the routine, the statement number, and status of the routines on the call-chain at the time the traceback was produced.
A level associated with each trace point. The level of a trace point depends on where the trace point is and on what sort of detail it can provide on a trace call. Most trace points are trace level 1 or 2.
A hyperlink that conveys relationships between the artifacts it links, such as dependency, origin, derivation, implementation, or validation. Trace links have link types, which are defined by an Open Services for Lifecycle Collaboration specification or by a project. See also content link.
An alert that can be attached to a single order or shipment. A tracer is sent automatically when the plan status, shipment status, or voucher status of the shipment changes. See also manual alert.
trace to/trace from relationship
A relationship between two requirements that implies the source, derivation, or dependencies between the requirements. The trace to/trace from state appears in a Traceability Matrix or Traceability Tree when a relationship is created between two requirements.
- A circular path on the surface of a disk or diskette on which information is magnetically recorded and from which recorded information is read.
- A unit of storage on a count-key-data (CKD) device that can be formatted to contain a number of data records. See also data record, home address, track-descriptor record.
- An optional subdivision in a process application that is based on team tasks, process application versions, or both. When enabled, tracks allow parallel development to occur with isolation from changes in other tracks. For example, using tracks one team can fix the current version of a process, while another team builds a completely new version based on new external systems and a new corporate identity.
track and trace service
A service that uses an RFID infrastructure to trace a food product from its point of origin; manufacturers and food retailers can view the complete history of a food product, and speed their response to potential contamination. See also RFID tag, smarter food system.
A special record on a track that follows the home address. The control program uses the track-descriptor record to maintain certain information about the track. The record has a count field with a key length of zero, a data length of 8, and a record number of 0. This record is sometimes referred to as R0. See also track.
- In Tivoli Workload Scheduler for z/OS, a component that runs on every system in a complex. It acts as the communication link between the z/OS system that it runs on and the controller.
- See tracking IMS.
- A user who is authorized to monitor, manage, and modify workflows.
A group of tracked process variables and data, such as KPIs, from one or more BPDs or process applications. Tracking groups are used to monitor performance and report analyses of information.
In an RSR environment, an IMS that tracks the activities of active IMSs to provide disaster recovery support. A tracking IMS is usually geographically remote from the active IMSs. See also active IMS, Remote Site Recovery.
tracking intermediate event
An intermediate event that indicates a point in a process when runtime data is captured for reporting. See also intermediate event.
An identifying number assigned by a common carrier that is used to track the transportation of a shipment (usually parcels) through the carrier's transportation process. See also PRO number.
The XRF phase during which the active processes the IMS workload and the alternate maintains IMS control blocks to duplicate those in the active and uses surveillance to check the active for signs of failure.
See tracking IMS.
track space-efficient volume (TSE volume)
A volume in which storage space is allocated on an as-needed basis by using space on the target volume only when tracks are copied from the source volume to the target volume.
- The mechanism that controls movement of continuous forms by means of the carrier holes.
- A truck that is used to haul freight. See also asset.
See carrier hole.
In WebSphere Commerce, a method by which buyers and sellers carry out business transactions. Depending on the edition of WebSphere Commerce, these methods may include: fixed price, contract, RFQ, and auction.
A company, such as a manufacturer or a supplier, that agrees to exchange information using electronic data interchange, or an entity in an organization that sends and receives documents that are translated. See also external partner.
trading partner agreement
Information exchanged between trading partners that describes certain mutually agreed upon execution parameters and service level expectations that will be used when conducting business.
trading position container
A price list that contains offers, also known as trading positions. The trading positions in a trading position container are made available to customers by associating the trading position container with the terms and conditions of one or more contracts.
A profile that describes the technology and business capabilities of the trading partner that enable the partner to engage in electronic business with other trading partners. The profile links the trading partner with business processes to exchange documents with other partners.
- Characters used mainly in Taiwan and historic Chinese documents. Japanese Kanji and Korean Hanja characters are originally derived from traditional Chinese characters. See also Hanyu, Simplified Chinese.
- The Chinese character set expressed in traditional form. Traditional Chinese characters are used in Taiwan, China (Hong Kong S.A.R. of the PRC), and some other parts of the world.
Traditional Chinese double-byte character set
An IBM-defined DBCS for Traditional Chinese, consisting of Traditional Chinese non-Chinese set, primary set, secondary set, and up to 2,632 user-definable characters.
Traditional Chinese non-Chinese character set
A subset of the Traditional Chinese DBCS, consisting of non-Chinese characters, such as Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana, Hiragana, special symbols and Chinese phonetic symbols. There are 675 characters in this set.
traditional file management
The part of the operating system that controls the storing and accessing of traditional file objects (*FILE objects in the QSYS.LIB library) on a System i system. The data may be on internal storage (for example, database objects), on external media (diskette, tape, or printer objects), or on another system.
traditional line data
A form of line data that is prepared for printing on a line printer, such as 6262 or 3211. See also line data.
In QoS, control functions that are performed to enforce rules specified in a traffic conditioning agreement. Types of traffic conditioning include metering, marking, shaping, and policing.
A significant occurrence that happens at a given place and time involving a vehicle, road network, or traffic device. See also traffic incident.
A traffic event that has an adverse effect. See also traffic event.
- An icon that represents the assessment result to foresee potential risks and plan corrective measures.
- A feature that allows a user to apply a color to cells or shapes based on their value.
A reporting mechanism that typically highlights good data as green, marginal data as yellow, and problem data as red. In most software packages that support traffic lighting, the user is able to define the numeric ranges that determine the color of a given value.
traffic management center (TMC)
The hub of a transportation management system. Information about the transportation network is collected and combined with other operational and control data to manage the transportation network and produce traveler information. It includes the combination of the hardware and software located in the center, including operators and maintenance personnel, policies and procedures and other entities.
traffic regulation anomaly
A deviation from normal network traffic patterns that is detected by an intrusion detection system. A traffic regulation anomaly could indicate a denial-of-service attack or a hacker who is monitoring connections to a web server.
A separator page that follows a printed file or a print job. See also job trailer.
The edge of the paper that proceeds into the printer last as it is fed from one of the paper supplies. For example, from the front of the IBM 3935 Advanced Function Printer, the trailing edge of the paper is the left-hand edge.
- The initial stage of model building, involving a subset of the source data. The model can then be tested against a further, different subset for which the outcome is already known. See also model building, testing, validation.
- The act of a physical sensor accessing a site's WiFi access points so the system can effectively gather data.
- A process in which all of the data modifications that are made during a unit of processing are either committed together as a unit or rolled back as a unit.
- An exchange between two programs that carries out an action or produces a result. An example is the entry of a customer's deposit and the update of the customer's balance. See also availability, conversation, session.
- A specific set of input data that triggers a specific process or job. A transaction also can refer to a message destined for an application program.
- A subprocess that represents a set of coordinated activities that are carried out by independent, loosely coupled systems in accordance with a contractually defined business relationship. This coordination leads to an agreed, consistent, and verifiable outcome across all participants.
- An exchange between the user and the system. Each activity the system performs for the user is considered a transaction.
- A group of data segments that have related data elements or fields. The group makes up a business document, such as a claim for services. The type of transaction is identified by a transaction code, such as B1 for Billing and N3 for Information Reporting Rebill.
- A unit of processing consisting of one or more application programs, affecting one or more objects, that is initiated by a single request.
- A request and the response it generated.
- A logical unit of work that performs an activity such as order creation, inventory changes, payment authorizations, and other system events.
- An atomic series of SQL statements that make up a logical unit of work. All of the data modifications made during a transaction are either committed together as a unit or rolled back as a unit.
transaction abend code
A four-character code, defined by CICS or the user, that is used when abnormally terminating a transaction. CICS-defined transaction abend codes begin with the letter 'A'. A transaction abend code is used to indicate the cause of an error that may have occurred in CICS code or in a user program. See also transaction dump code.
Pertaining to an application program that is divided into segments, where each segment typically requests an I/O operation with a terminal user, giving up control to other application program segments for the duration of the I/O operation.
A collaboration that provides compensation for its service calls and executes under the control of InterChange Server transaction services. Such a collaboration can roll back when a runtime error causes the collaboration to fail. See also compensation, minimum transaction level.
transactional data source
A data source that contains records and provides the measure values for cubes. In combination with one or more structural data sources, transactional data sources populate the model in Transformer. See also structural data source.
A mode of operation in which install and remove operations occur in two phases: the preparation phase and the commit phase. See also commit operation.
A DFSMS function that provides record-level sharing and transactional recovery for VSAM data sets. Transactional VSAM provides a data set access mode that is used by DBRC to provide parallel RECON data set access.
transaction backout program
A program (part of the emergency restart function) that is invoked during emergency restart, and that reads backout information (written to the restart data set by the recovery utility program) for task, message, DL/I, and file tables.
In SQL replication, a type of processing in which every transaction is replicated to the target table when it is committed in the source table. See also transaction-consistent replication.
transaction capabilities application part (TCAP)
Part of the SS7 protocol that provides transactions within the signaling network. A typical use of TCAP is to verify a card number, for the credit card calling service.
A channel that is available for the lifetime of a transaction. Containers in this channel are available to any program throughout the transaction, including any exit points that are API-enabled.
A subcontainer of a service policy that is used for finer-grained monitoring. See also message class.
transaction command security
The use of system definition macros and security maintenance utility control statements to permit specific application programs to issue some of the IMS operator commands.
In SQL replication, a type of processing in which the net result of all transaction updates is replicated to the target table. See also transaction-based replication.
transaction data file (TDF)
A file that serves as a filter between document files and the Gentran Server for Windows translator. For outbound processing, data is imported from a TDF file and translated to EDI format using a TDF Import translation object. The data is then ready to be posted and sent to a trading partner. For inbound processing, EDI documents that are received by Gentran Server for Windows can be exported to a TDF-formatted file using a TDF Export translation object. This data file is then ready to be processed or converted to internal application files.
A set of filters and maintenance schedules that are created in the Application Management Con-figuration Editor which are applied to the collected data and determine how that data is processed and displayed.
transaction dump code
A name of up to four characters by which a transaction dump will be known. When a transaction abend causes CICS to create a transaction dump, the associated transaction abend code is used as the transaction dump code. See also dump code, transaction abend code.
transaction dump table (TDT)
A CICS table which may contain an entry for each transaction dump code. See also dump code.
- In COBOL, an input-output file used to communicate with display stations and ICF sessions.
- A file containing data, such as customer orders, that is usually used only with a master file.
See transaction identifier.
- A number associated with each of several request-parameter lists that define requests belonging to the same data transaction.
- A unique name that is assigned to a transaction and is used to identify the actions associated with that transaction.
A CICS facility that offers storage protection between transactions, ensuring that a program of one transaction does not accidentally overwrite the storage of another transaction. See also storage protection.
The degree of transactional isolation that a transactional collaboration provides. Transactional isolation involves keeping the data that the transaction affects from being affected by other processes (such as other collaborations). See also minimum transaction level.
transaction list table (XLT)
CICS control table containing a list of transaction identifications. Depending on a system initialization specification that can be changed during system termination, the transactions in a particular XLT can be initiated from terminals during the first quiesce stage of system termination. During CICS execution the suffix of an XLT can be entered at the master terminal - the transactions in that XLT can then be enabled or disabled as a group.
transaction load balancing
An optional facility that enables a transaction to be scheduled into more than one message or batch message region at the same time. See also load balancing.
- A function that assigns identifiers to transactions, monitors their progress, and takes responsibility for transaction completion and failure recovery.
- A software unit that coordinates the activities of resource managers by managing global transactions and coordinating the decision to commit them or roll them back.
- See sync point manager.
Transaction Manager database (TM database)
A database that is used to log transactions when a two-phase commit (SYNCPOINT TWOPHASE) is used with DB2 databases. If a transaction fails, the TM database information can be accessed to resynchronize databases that were involved in the failed transaction.
transaction manager domain
A CICS domain that provides transaction-related services to create, terminate, purge, and inquire on tasks; and manage transaction definitions and transaction classes. The transaction manager domain is designed to provide greater reliability and improved function; it has minimal impact on end users.
In SQL replication, a type of replication subscription-set processing in which the Apply program retrieves data from the source CD table, then applies the data to the target table in the same commit sequence that is used at the source. The Apply program processes transactions for all subscription-set members together, rather than sequentially. See also table-mode processing.
See base node.
transaction-oriented BMP program
A batch message processing program (BMP program) that performs transaction-type processing in a batch environment. A transaction-oriented BMP program obtains its input from the IMS message queues and can also use the message queues for output See also batch-oriented BMP program.
A style of computing that supports interactive applications in which requests submitted by users are processed as soon as they are received. Results are returned to the requester in a relatively short period of time. A transaction processing system supervises the sharing of resources for processing multiple transactions at the same time
Transaction Processing Facility (TPF)
An IBM platform for high volume, online transaction processing. It is used by industries demanding large transaction volumes such as airlines and banks. See also program update tape.
transaction processing system
An IMS in a multisystem environment that accepts transactions from the front-end system, calls application programs for transaction processing, and routes all replies back to the front-end system for response to the terminal. See also front-end system, pseudo-front-end system.
- A program that processes transactions in an SNA network.
- A user-supplied application program for processing data received by the system from a finance device.
- A program that uses the Advanced Program-to-Program Communications (APPC) application programming interface (API) to communicate with a partner application program on a remote system.
- The name by which each program participating in an LU 6.2 conversation is known. Normally, the initiator of a connection identifies the name of the program it connects to at the other LU. When used in conjunction with an LU name, a TPN identifies a specific transaction program in the network.
- In SNA LU 6.2 conversations, the name of the program at the remote logical unit that is to be the other half of the conversation.
transaction program network
The hierarchical structure of user or system transaction programs communicating at a synchronization level of none, confirm, or commit. When the synchronization level is commit, the transaction programs communicate over protected conversations using the two-phase commit protocol. In this case, the hierarchy consists of an initiator, optionally one or more cascaded initiators, and agents.
A mechanism that enables transactions to be transferred and re-executed on the master database after executing them on a replica database. See also synchronization message.
- A CICS facility that provides support for inbound and outbound terminal requests from another CICS system connected by an advanced program-to-program communications (APPC) link.
- An intercommunication facility that allows terminals or logical units connected to one CICS region to initiate and to communicate with transactions in another CICS region within the same processor system or in another CICS system connected by an APPC link.
A call to RACF each time a transaction identifier is entered at a terminal to verify that the terminal user or user ID associated with that terminal is permitted to run the transaction.
The basic business document in EDI data. Transaction sets are enclosed in an envelope that separates one transaction set from another. Groups of transaction sets that are functionally related are enclosed in a functional group envelope.
A generated column that is defined with the AS TRANSACTION START ID clause. The value is assigned whenever a row is inserted into the table or any column in the row is updated. A transaction-start-ID column is intended for use in a system-period temporal table. See also generated column, row-begin column, row-end column.
An affinity between a transaction and a particular CICS region, where the transaction interrogates or changes the properties of that CICS region. Transactions with affinity to a particular system, rather than another transaction, are not eligible for dynamic transaction routing. In general, they are transactions that use INQUIRE and SET commands, or have some dependency on global user exit programs, which also have an affinity with a particular CICS region.
One of three types of database tables in the InterChange Server repository, the transaction tables store the status of each transaction being processed, which may include the action and business objects, depending on the transaction level. The two other types of database tables in the repository are the event management tables and the repository tables.
transaction work area (TWA)
An optional extension of the TCA, used as a work area for a given task. The TWA can be used for the accumulation of data and intermediate results during the execution of the task. When the amount of working storage for a task is relatively static, the TWA may be used if data is accessed by different programs during task processing. This approach cannot be used for multiple transactions; the TWA is released automatically at task termination. See also common work area.
- In LANs, a physical device that connects a host interface to a local area network, such as Ethernet. Ethernet transceivers contain electronics that apply signals to the cable and that sense collisions.
- In communications, the device that connects the transceiver cable to the Ethernet coaxial cable. The transceiver is used to transmit and receive data.
- A device capable of both transmitting and receiving signals. In mobile computing, transceivers are used extensively in geolocation. See also radio.
Trans-European Automated Real-Time Gross Settlement Express Transfer (TARGET)
A real-time gross settlement (RTGS) payment system composed of one RTGS system in each European Member States, plus the European Central Bank payment mechanism. Payments are made across TARGET to or from other countries and not directly to other members of CHAPS-Euro.
- To send data from one location to another.
- To copy an application EAR file to the server, usually by FTP. See also deploy.
See committed page counter.
A document that is used to move inventory between facilities in a multi-plant environment. See also procurement transfer order.
- Printing process at which the data set becomes visible to the operator, and is therefore the point at which all operator commands are directed.
- In nonimpact printers, the assembly where the toned image on the photoconductor is transferred to the paper.
- In DCE Remote Procedure Call (RPC), a set of encoding rules used for transmitting data over a network and for converting application data to and from different local data representations. See also abstract syntax.
- In OSI, a set of rules for the representation of user information while it is in transit between presentation layer entities. The transfer syntax is usually derived from the abstract syntax by use of encoding rules.
- Programming logic that converts data from one format into another format.
- A program that converts a data stream from one format to another, for example, from PCL to AFP or PDF to AFP. Transforms provided by IBM are implemented as dynamic link library (DLL) filters.
- A modification of one or more characteristics of a picture. Examples of picture characteristics that can be transformed are position, orientation, and size.
- A collection of installation-related changes that are applied to a Windows Installer database.
- To change the form of data according to specified rules without significantly changing the meaning of the data.
- To convert a document from one form to another, such as using a purchase order formatted as an XML document to create the same purchase order formatted as an EDI document.
- To change the composition of a data stream (AFP) to perform the same functions in a different data stream (ASCII).
- In a virtual private network (VPN), a collection of authentication algorithms, Diffie-Hellman groups, and encryption algorithms that are used during both phases of negotiation.
- To translate a Java class file to an IBM i Java program.
- An output from Spoon. When the transform is passed to the Kettle API, the data is migrated from one or more sources to a destination. The file is stored with a ktr extension.
A procedure that is used to transform the message for web services security message processing, such as the C14N (canonicalization) transform that is used for XML digital signatures.
- In GL, a four-by-four matrix that helps determine the location of a three-dimensional drawing, the position of the viewpoint (the viewer's "eye"), and the amount of the scene that will be encompassed and visible. Transformations occur at four points within the graphics pipeline: modeling transformation, viewing transformation, projection transformation, and viewport transformation.
- The process of changing data from one format or structure to another format or structure.
- A mapping from a vector space to a vector space. In the context of JViews Charts, one-dimensional transformations can be applied to axes, two-dimensional transformations are applied to points for 2-D charts, and 3-D to 2-D transformations are used for 3-D charts.
- The conversion of data from one format to another. For example, converting flat Ffle data in a CSV format to XML data. Transformations can also suppress data, add data, alter data types, and perform calculations.
- A HATS resource that specifies how to convert components of a host screen into widgets on a web page.
- A formula that is applied to the values of a field to alter the distribution of values. Some statistical methods require that fields have a particular distribution. When a field's distribution differs from what is required, a transformation (such as taking logarithms of values) can often remedy the problem.
transformation model element
An element of the transformation model in a fact build. A transformation model element can be a dimension, a derived dimension element, a measure, an attribute, or a derivation.
For Enterprise Service Tools, an application transformation style that changes the way in which enterprise applications are accessed and transforms the way in which the enterprise application is used. Instead of having to run a CICS application by connecting to a particular server, customers can invoke the CICS application across the company intranet or across the internet.
- A 2D affine transformation that performs a linear mapping from 2D coordinates to other 2D coordinates. A transformer can be a scale, a translation, or a rotation.
- A device that converts power from one circuit to another at the same frequency, but at a changed voltage and current.
- A kernel services that converts the application model from a logical description into a topology document that is used to deploy the virtual application.
A function of the i5/OS operating system that converts PostScript Level 1 spooled files to output. This output can be printed on either IBM Advanced Function printers (i5/OS system printers) or Hewlett Packard Printer Control Language printers (commonly used PC printers).
See transaction identifier.
- A file to which runtime messages are written under CICS. A transient data queue also is a sequential data set used by the Folder Application Facility in CICS to log system messages.
- In Sterling Connect:Direct for z/OS, a CICS temporary storage queue in which event data is stored so that a client application can retrieve the information.
In OSI, an error that occurs once or at unpredictable intervals--for example, network congestion. See also permanent error.
In OSI, an event that indicates the occurrence of an intermittent error or an error that can be recovered through retry. Transient events are logged but do not result in messages to the operator. See also permanent event.
A library routine that is loaded at run time. See also resident routine.
A session token, such as a cookie or a parameter. See also session token.
transit delay processing
In OSI, an X.25 quality-of-service function that keeps track of delays that data encounters on the way to its destination. Any node that receives a call packet can reject it if the transit delay exceeds the maximum specified by the sender.
- In a rule flow, a specification of a transition that dictates when the target task can be executed.
- A Boolean expression that determines when processing control should be passed to the targeted node.
In a collaboration template activity diagram, the line that indicates control flow between two nodes. If more than one outcome is possible between the nodes, each outcome is represented by a different transition link that leads to a different execution path. Each transition link may have an associated condition that is evaluated at runtime. Flow passes along the transition link whose expression evaluates to true. If the nodes have a single transition link, its condition is assumed to be true. See also control flow, exception transition link, normal transition link.
In UML modeling, a relationship that represents a workflow between activities. See also self-transition relationship.
A temporary table that contains all of the affected rows of a subject table in their state before or after a triggering event occurs. Triggered SQL statements in the trigger definition can reference the table of changed rows in the old state or the new state. See also table locator.
A variable that is valid only in FOR EACH ROW triggers. It allows access to the transition values for the current row. An old transition variable is the value of the row before the modification is applied, and the new transition variable is the value of the row after the modification is applied.
- To check source code of an automatic class selection (ACS) routine for syntactic and semantic errors. If no errors exist, the translation process generates an object table from the source code and places the object table into a specified source control data set (SCDS).
- In computer graphics, to move all or part of a display image on a display space from one location to another without rotating the image.
- In computer graphics, the movement of a display image along a straight line from one location to another.
- The movement of an object by a specific distance.
A translation productivity tool comprising a database containing segments of source and target language texts that have been aligned to match each other. Translation memories are used to retrieve previously translated material as in the case of new versions of existing documents.
- A set of rules that instruct the translator how to convert a file from one format to another. Every function performed during translation requires a translation object. Translation objects are used to control all the functions of Gentran Server for Windows EDI translation.
- A source map that has been compiled to provide instructions for translating from one format to another in a way that can be interpreted by the translator.
- A table used to convert between one form of data and another. For example, translation tables are used for language translation, compression, encoding, and address mapping.
- A user-defined table that is used to translate data values that differ between the source and target documents. For example, a manufacturer and supplier with different part numbers for the same item can use a translation table to convert their part numbers to the other company part numbers during translation.
A source file together with all headers and source files included via the preprocessing directive #include, less any source files skipped by any of the conditional inclusion preprocessing directives.
translation verification test (TVT)
All testing necessary to review and correct the translated software or hardware user interface, run-time messages, and on-line help, after build or integration and compilation, in order to verify that the translation has not been altered or corrupted by these processes. This testing includes a review for screen layout, truncation, localized links, mixing of languages, and for consistency and accuracy of the translation in context. See also globalization verification test.
- An i5/OS component that performs the final step in a program or module compilation. In the Integrated Language Environment (ILE) model, this is called the optimizing translator.
- An engine that processes data for Gentran Server for Windows, the Application Integration subsystem, and the Forms Integration subsystem.
- A component, typically the Data Interchange Services translator component, responsible for translating a document from one format to another.
- A Jazz model object that describes a single build step in which a translator executable program is invoked with the required inputs and outputs. Inputs and outputs are the same as z/OS data sets, so a translator must reference multiple data set definitions.
- An engine that translates data.
To map correspondences from one writing system to another. For example, non-ASCII characters are often transliterated to equivalent ASCII characters. See also Romanization.
An entire file that is submitted electronically, unless it is a batch. A transmission includes telecommunication routing information, identification, and other information that applies to the entire collection of data.
- In data communications, a special character that can be included in a message to control communications over a data link. For example, the sending station and the receiving station use transmission control characters to exchange information; the receiving station uses transmission control characters to indicate errors in data it receives.
- A control character used to control or facilitate transmission of data between data terminal equipments.
Transmission Control Index
In Sterling Connect:Direct for z/OS, a VSAM relative record data set file that contains a record with bitmaps to indicate the availability of space in the transmission control queue.
transmission control layer
In SNA, the layer within a half-session that synchronizes and controls the speed of session-level data traffic, checks sequence numbers of requests, and enciphers and deciphers end-user data.
Transmission Control Protocol (TCP)
A communication protocol used in the Internet and in any network that follows the Internet Engineering Task Force (IETF) standards for internetwork protocol. TCP provides a reliable host-to-host protocol in packet-switched communication networks and in interconnected systems of such networks. See also Internet Protocol.
Transmission Control Protocol/Internet Protocol (TCP/IP)
An industry-standard, nonproprietary set of communication protocols that provides reliable end-to-end connections between applications over interconnected networks of different types. See also communication method.
transmission control unit (TCU)
A communication control unit whose operations are controlled solely by programmed instructions from the computing system to which the unit is attached. No program is stored or executed in the unit. Examples are the IBM 2702 and 2703 Transmission Controls. See also communication controller.
transmission group (TG)
In SNA, a group of links between directly attached nodes appearing as a single logical link for routing messages. A transmission group may consist of one or more SDLC links (parallel links) or of a single System/370 channel. For type 2.1 nodes in System i networks, a transmission group can only be a single-link connection.
transmission group vector
A representation of an endpoint TG in a T2.1 network that consists of two control vectors: the TG Descriptor (X'46') control vector and the TG Characteristics (X'47') control vector.
transmission header (TH)
In SNA, control information, optionally followed by a basic information unit or a basic information unit segment, that is created and used by path control to route messages within the network.
See telecommunication line.
In a printer, a number designating the number of transmissions of a particular print data set or file. PSF uses the transmission number to select the appropriate form environment group.
transmission priority (TP)
A rank assigned to a message unit that determines its precedence for being selected by the path control component in each node along a route for forwarding to the next node in the route. The four possible values are low, medium, high, and network.
See message channel agent.
transmission-queue data set
In IP PrintWay, a data set containing an entry for each data set that IP PrintWay is to transmit to the remote system or that IP PrintWay is retaining on the Job Entry Subsystem (JES) spool.
A group of four transmission characters. See also data word.
- Terminal attribute whereby data is not translated between terminal and main storage representation on read or write requests. This allows the transmission of all 256 possible byte values.
- See transparent text mode.
- A picture or text on an acetate sheet designed to be viewed by light shining through it.
- In asynchronous communications, a method of hiding certain ASCII control characters from modems or asynchronous devices.
- A set of code points that is interpreted as presentable data, not as control data. In the AFP architecture, transparent data is identified with a control byte and a count of the number of bytes that follow.
- Data that can contain any hexadecimal value.
A mode of binary synchronous transmission in which transmission control characters are treated as text unless they are preceded by the data link escape character (DLE). See also nontransparent mode.
The process that is used to automatically recall a migrated file to a workstation or file server when the file is accessed. See also selective recall.
transparent text mode
In binary synchronous communications, a method of transmission in which only transmission control characters preceded by the DLE control character are processed as transmission control characters.
- The request queue between a web servers plug-in and a web container in which the web modules of an application reside. When a user requests an application from a web browser, the request is passed to the web server, then along the transport to the web container.
- A physical connection to a database. A transport can be reused by multiple logical connections.
- A service plug-in for WebSphere Developer that manages the connection between a CARMA hierarchy and its CARMA host. The CARMA transport packages and sends commands from the CARMA hierarchy and returns responses from the CARMA host.
- To restore a transportable set from a backup image into a database other than the one from which the backup image was taken.
- A communication layer that allows the product to send and receive data between the user data source and a pipeline. Examples of transports include the HTTP transport, the queue transport, the database transport, and the file transport.
- The process or protocol mechanism of transferring an XML message or document between parties as part of a meaningful, reliable exchange. The most common transports for web services are SOAP/HTTP, SOAP/HTTPs, and SOAP/JMS.
An adapter (such as an HTTP Adapter) that is used with an encoding/decoding adapter to support various protocols (for example, SOAP) in a transport-independent way. The transport adapter is used to transport the data either from the source or to the destination.
Transportation Data Coordinating Committee (TDCC)
An organization that sets standards for the motor, rail, ocean, and air industries administered by EDIA. This is the original EDI organization for the United States, and through it, the original EDI Standards were developed, published, and maintained. It has now changed its name to EDIA, and has become the national EDI user group for the United States.
transportation prediction feature
A feature that anticipates traffic conditions within an hour from the current time, provides customized reports, and configures data collection, enablement, and calculation in the administration portlets.
A network protocol stack that is used for I/O operations in an application server environment. Transport chains are part of the channel framework function that provides a common networking service for all components.
- A network service that provides end-to-end communication between two parties, while hiding the details of the communication network. The Transmission Control Protocol (TCP) and ISO TP4 transport protocols provide full-duplex virtual circuits on which delivery is reliable, error free, sequenced, and duplicate free.
- In OSI architecture, the layer that provides services for flow control and recovery between open systems with a predictable quality of service.
A record that describes the document delivery protocol. It identifies the protocol, such as HTTP, FTP, or SMTP. It also details the use of the protocol, such as HTTP configured with SSL for secure data exchange.
transport staging database
A temporary database that is created as a part of a transport operation. The transport staging database is used to extract data and logical objects from a backup image and, if necessary, bring them to a point of transactional consistency before they are re-created in the target database.
The time allotted for transporting materials from the workstation where the preceding operation took place to the workstation where the current operation is to occur. The transport time is used only for planning purposes. Operations will be started irrespective of the transport time specified.
- An unprogrammed, hardware-initiated, conditional jump to a specific address. A trap occurs as a result of an error or certain other conditions. A record is made of the location from which the jump occurred.
- In REXX, to recognize that a currently enabled condition occurred and to perform the CALL or SIGNAL instruction specified when the condition trap was enabled.
- A message that reports a problem or a significant event.
- In the Simple Network Management Protocol (SNMP), a message sent by a managed node (agent function) to a management station to report an exception condition.
- An unsolicited event generated by an agent and forwarded to a manager. Traps inform the manager of changes that occur in the network.
- A special statement used to catch signals within the z/OS shell.
A path that directs an extract or archive process through related tables specified in an access definition. It begins at the start table and proceeds through the data model and all relationships from parent to child.
See Transformation API for XML.
See table reference character.
- A hierarchical collection of nodes that can have an arbitrary number of references to other nodes. A unique path connects every two nodes. See also directed tree, undirected tree.
- A data structure whose elements are linked in a hierarchical fashion.
A visualization of hierarchical data. Each object in the hierarchy is represented as a rectangle. The child objects of a parent object rectangle are represented by nonoverlapping rectangles inside the parent object rectangle. The area of a rectangle is typically proportional to a property of the object that can be viewed as distributed across its child objects.
- See traceability tree.
- A view that provides a hierarchical view of an object and the objects that it contains.
- A series of related measurements that indicates a defined direction or a predictable future result.
- A subject that is algorithmically determined to be more popular than other current subjects. See also aggregator, leaderboard.
A license key that provides clients access to an application for a specified time for product evaluation purposes. See also permanent license key.
- A mechanism that detects an occurrence and can cause additional processing in response.
- To initiate or reinitiate copying between a pair of volumes that have a copy relationship.
- A monitor that specifies one or more standard programs or built-in actions to be executed whenever a certain ClearCase operation is performed.
- An action that precipitates other actions.
- In profiling, an event that causes transitions between states in a states engine, such as, the loading of a web page or the appearance of a window on the desktop.
- In database technology, a program that is automatically called whenever a specified action is performed on a specific table or view. See also read trigger.
- A windowing mechanism that detects an occurrence and can cause processing in response.
- Data values for which AFP Conversion and Indexing Facility (ACIF) searches, to delineate the beginning of a new group of pages. The first trigger is then the anchor point from which ACIF locates the defined index values.
- A condition that signals that a risk factor should be monitored.
- A representation of dependencies between workflow tasks that joins activities in a sequence job. Activities typically have one input trigger, but multiple output triggers.
- A mechanism that detects an occurrence, and can cause additional processing in response. Triggers can be activated when changes occur in the device context. See also device context.
- A database object that is associated with a single base table or view and that defines a rule. The rule consists of a set of SQL statements that runs when an insert, update, or delete database operation occurs on the associated base table or view. See also after trigger, before trigger, delete trigger, insert trigger, instead of trigger, trigger activation, trigger activation time, trigger granularity, update trigger.
A set of actions (high-level language statements, SQL statements, or i5/OS utilities) that are performed automatically when a specified change operation (trigger event) occurs on a specified table or file.
The process that occurs when the trigger event that is defined in a trigger definition is executed. Trigger activation consists of the evaluation of the triggered action condition and conditional execution of the triggered SQL statements. See also after trigger, before trigger, trigger, trigger activation time, trigger event.
trigger activation time
An indication in a trigger definition of whether the trigger should be activated before or after a trigger event. See also after trigger, before trigger, trigger, trigger activation, trigger event.
The set of triggered SQL statements that is run when a trigger is activated and its triggered action condition evaluates to true. See also triggered action, triggered action condition, triggered SQL statement.
The SQL logic that is performed when a trigger is activated. The triggered action consists of an optional triggered action condition and a set of triggered SQL statements that is run only if the triggered action is true. See also trigger body, trigger event, triggered action condition, triggered SQL statement.
triggered action condition
An optional part of a triggered action. This Boolean condition is defined by a WHEN clause and specifies a condition that is evaluated to determine whether the triggered SQL statements should be run. See also trigger body, triggered action, triggered SQL statement.
A local queue, usually an application queue, that has triggering enabled so that a message is written when a trigger event occurs. The trigger message is often written to an initiation queue.
triggered SQL statement
One of a set of SQL statements that is run when a trigger is activated and its triggered action condition evaluates to true. The set of triggered SQL statements is also called the trigger body. See also trigger body, triggered action, triggered action condition.
- An event, such as a message arriving on a queue, that causes a queue manager to create a trigger message on an initiation queue.
- In a CREATE TRIGGER statement, the specification of an insert, update, or delete operation on a specified table that activates the trigger. See also trigger activation, trigger activation time, trigger granularity, triggered action.
- A change operation that calls the trigger action to be run. The trigger event can be an insert, update, or delete operation in any high-level language and in SQL.
In BMS, a field that is transmitted to the host processor as soon as the terminal operator has modified the field and then tries to move the cursor out of it. You can use display trigger fields to initiate input to an application program. The trigger attribute is ignored if the operator has not modified the trigger field.
In SQL, the characteristic of a trigger that determines whether the trigger is activated only once for the triggering SQL statement or once for each row that the SQL statement modifies. See also trigger, trigger event.
- The specified operation in a trigger definition that causes the activation of that trigger. The triggering event is comprised of a triggering operation (insert, update, or delete) and a subject table or view on which the operation is performed.
- The business object that a connector sends to subscribing collaborations when an application event occurs.
The number of records written to an intrapartition transient data destination or queue that will cause CICS to automatically initiate a task to process that queue. See also automatic transaction initiation.
- A continuously running application that serves one or more initiation queues. When a trigger message arrives on an initiation queue, the trigger monitor retrieves the message. It uses the information in the trigger message to start a process that serves the queue on which a trigger event occurred.
- A program that responds to trigger conditions on a message queue by starting a transaction. A trigger monitor is usually a continuously-running program.
- Removal of records or bytes that are no longer required.
- Eliminating those parts of a picture that are outside of a clipping boundary such as a viewing window or presentation space. See also viewing window.
A rendering technique that uses three frame buffers instead of two. With three buffers, there is no waiting time. Triple buffering results in smoother animation, especially if the screen has a slow refresh rate. See also double buffering.
Triple Data Encryption Algorithm (3DES, Triple DES)
An encryption method that applies the Data Encryption Standard (DES) algorithm three times to the data. See also Data Encryption Standard.
triple Data Encryption Standard (triple DES)
A block cipher algorithm that can be used to encrypt data transmitted between managed systems and the management server. Triple DES is a security enhancement of DES that employs three successive DES block operations.
See Triple Data Encryption Algorithm.
See triple Data Encryption Standard.
- A length byte, a type byte, and one or more parameter-value bytes in a Formatted Data Object Content Architecture (FD:OCA) descriptor.
- In architecture, a three-part self-defining variable-length parameter consisting of a length byte, an identifier byte, and one or more parameter-value bytes.
- A byte composed of three binary elements. (I) (A)
A computer program that appears to perform a useful and innocent function but contains hidden functions that use approved authorizations assigned to users when they start the program. For example, it may copy internal authorization information from a computer and send it back to the originator of the Trojan horse.
A connected voice path which enters an IVR from a switch on one circuit, then returns to the same switch on a parallel circuit. Two IVR ports and two circuits are consumed, but in some circumstances this might be the only way to make a connection between two callers if the attached switch does not support a Call Transfer function.
The percentage of weight of a shipment that is on the truck for the duration of the shipment. A highly efficient truckload is one in which most of the load (measured by weight) travels most of the distance from the origin to the final destination.
See task-related user exit.
True Image data view
A data view that allows a file to be restored in the event of accidental deletion. It consists of point-in-time images that provide a near-instant virtual copy of an entire storage volume.
- To end a computational process in accordance with a rule; for example, to end the evaluation of a power series at a specified term.
- To cut off data that cannot be printed or displayed in the line width specified or available. See also fold.
- To shorten a field, value, statement, or string.
- In printing, the planned or unplanned end of a print line when there are more characters for the line than can be printed.
- The process of discarding part of a result from an operation when it exceeds memory or storage capacity.
- In telephony, circuits that connect two switching systems, as opposed to connecting a customer line to a switching system.
- A telephone connection between two central offices or switching devices. In DirectTalk, a trunk refers to 24 or 30 channels carried on the same T1 or E1 digital interface. See also channel.
- In the CVS team development environment, the main stream of development, also referred to as the HEAD stream.
A set of trunked inter-switch links (ISLs). See also ISL Trunking.
A port that is employed in a trunking group. See also ISL Trunking.
trunk interface card (TIC)
The component of the VPACK that manages the trunk connection to the switch. See also base card.
An integrated configuration between the security server of the product and third-party security servers. A reverse proxy server acts as a front-end authentication server, while the product applies its own authorization policy onto the resulting credentials passed by the proxy server.
trust association interceptor (TAI)
The mechanism by which trust is validated in the product environment for every request received by the proxy server. The method of validation is agreed upon by the proxy server and the interceptor.
- Pertaining to the control of a security policy.
- Pertaining to a federated wrapper that is defined to run in the database manager process. See also fenced.
A database connection whose attributes match the attributes of a unique trusted context that is defined at the database server. See also explicit trusted connection, implicit trusted connection.
A consumer that can share authorization with other trusted consumers and does not require user approval to access data. A consumer must be designated as trusted in an access request to become a trusted consumer.
trusted context default role
The role that is inherited by all users of a trusted context unless it is overridden by a user-specific role in the trusted context definition. See also trusted context user-specific role.
trusted context user-specific role
A role that is associated with a specific trusted context user. It overrides the trusted context default role if the current user ID on the trusted connection matches the ID of the specific trusted context user. See also trusted context default role.
trusted node security
In Sterling Connect:Direct for z/OS, a security feature that allows a local node to enforce more restrictive security parameters when dealing with specific trading partner remote nodes. See also data direction restriction.
A privileged relationship between two entities such as a middleware server and a database server. This relationship allows for a unique set of interactions between the two entities that would be impossible otherwise.
- A certificate authority's certificate merged into the Domino Directory, client's browser, or the server's key ring file, which allows clients and servers to communicate with any client or server that has that certificate authority's certificate marked as trusted.
- The foundation upon which chains of trust are built in certificates. Trusting a CA root means that all certificates issued by that CA can be trusted.
- In the Secure Sockets Layer (SSL), the public key and associated distinguished name of a certificate authority (CA).
- A certificate signed by a trusted certificate authority (CA).
A trusted list of certificates that are used to control the trust and validity period of certificates. It enables the trust of certificates issued by a certificate authority to be limited.
An established and trusted communication path through which a computer in one domain can communicate with a computer in the other domain. Users in a trusted domain can access resources in the trusting domain.
- In security, a storage object, either a file or a hardware cryptographic card, where public keys are stored in the form of trusted certificates, for authentication purposes in web transactions. In some applications, these trusted certificates are moved into the application keystore to be stored with the private keys. See also keystore.
- A key database that holds signer certificates for only the target servers that the user trusts. See also signer certificate.
A nodelocked license that has a fixed duration and a start date equal to the date when the license is enrolled. A try-and-buy license is made available for purposes of evaluating the application, and can be replaced by a production license after evaluation.
A C++ block in which a known exception is passed to an exception handler. See also catch block.
See transport-layer service access point.
See transport-layer service data unit.
See track space-efficient volume.
In WebSphere Voice Server, a process that controls which engine processes are being used at any time. Requests for an engine by a WebSphere Voice Server Client are accepted or rejected depending on whether an engine meeting the Tsm Client's criteria is available.
See Time Sharing Option.
See Time Sharing Option Extensions.
See Time Sharing Option single point of control.
See transmission services profile.
See terminate-and-stay-resident program.
See temporary storage table.
See temporary-text-delay character.
See time to live.
See tape table of contents.
See track record address.
See terminal type.
See Terminal User Control Block.
Pertaining to printing on both sides of a sheet of paper such that the bottom of the printed image on one side of the paper is juxtaposed against the top of the printed image on the other side of the paper. See also simplex.
Printing on both sides of the paper such that the top of one side is at the same end as the bottom of the other side. Tumble duplex printing is used for forms that are bound on the short edge of the paper, regardless of whether the printing is portrait or landscape. See also duplex, normal duplex.
tumbling set function
A function that performs calculations on a windowed set of the rows in a view. The set of rows to include is determined when a new data stream arrives, and the set empties when full.
See network tunnel.
- See IP tunnel.
- An L2TP access concentrator (LAC)-L2TP network server (LNS) pair. A tunnel carries Point-to-Point Protocol (PPP) datagrams between the LAC and the LNS. There may be many sessions in a single tunnel. A control connection that operates in the tunnel controls the establishment, release, and maintenance of sessions and the tunnel itself.
See trace utility program.
- An individual piece of data in a stream that is represented as a set of attributes and data values. Typically, the data values in a tuple represent a single observation of data, such as a stock ticker quote or a temperature reading from an individual sensor. See also operator.
- An XML structure that is used to group concepts in an XBRL taxonomy that must be understood together.
- See row.
- An ordered collection of two or more members from different dimensions. For example, the tuple (2007, Camping Equipment, Japan) returns the value for the intersection of the three members: 2007, Camping Equipment, and Japan. Tuples can be used to filter and sort data, and to create calculations.
- A data structure that contains a given number of elements in a given order. In a relational database, a tuple represents a row or record of a table in the database.
- In a multi-version RDBMS, a row that is valid for a specific transaction timeframe.
See tie-up record.
See Traversal Using Relay around NAT.
A series of instructions that the system uses to create a turnaround document (a logical response document to the source) from an inbound (source) document, by transferring data from the source document to elements in the target document (translation object).
- In communications, the time required to reverse the direction from sending to receiving or from receiving to sending on a communications line.
- The total time consumed from the start to the completion of a specific unit of work measured at specific interfaces. When multiple inputs and/or multiple outputs are parts of one unit of work, intermediate turnaround time specifications may be needed.
- The elapsed time between entry of the first character of the first input into the input interface and the passage of the last character of the last output through the output interface.
Information designed around specified learning objectives and broken into smaller chunks of information, such as lessons. A tutorial allows a user to interact with a product example to learn the requisite base knowledge of a technology, concept, or product. A tutorial teaches fundamental distinctions, skills, and approaches to using a product or technology more effectively.
Tutorial System Support
An education course, supplied with the operating system licensed program, that provides introductory education for a variety of computer users, including system operators and business and data processing professionals. Tutorial System Support is part of the total IBM curriculum for the System i platform, which consists of classroom training and other methods of self-study.
See time variance.
See translation verification test.
See tape volume table of contents.
See transaction work area.
- To post a message on Twitter. See also social network, social networking.
- A message that cannot exceed 140 characters and is posted on Twitter. See also hashtag, social network, social networking.
A 5250-based workstation using a twinaxial cable to connect to the system. The twinaxial console and the Operations Console can be a backup console for each other. See also alternate console, backup console, Operations Console.
twinaxial data link control (TDLC)
A communications function that allows personal computers, which are attached to the work station controller by twinaxial cable, to use advanced program-to-program communications (APPC) or Advanced Peer-to-Peer Networking (APPN) support.
In a database, all child segments of the same segment type that have a particular instance of the same parent segment type. Root segments are also considered twins to each other. See also physical twins, sibling segments.
Pertaining to a transmission medium that consists of two insulated conductors twisted together to reduce interference. For example, twisted-pair wiring can be used as an alternative to twinaxial cable.
See tiered entry workload license charge.
A business activity comprised of the following message choreography: Partner A sends a business action to Partner B, Partner B sends a Receipt Acknowledgement signal back to Partner A, then later Partner B sends a response business action to Partner A, and Partner A sends a Receipt Acknowledgement back to Partner B. When these messages have been exchanged successfully between these trading partners, the activity is deemed complete. For RosettaNet, PIP 3A4 (Manage Purchase Order) is an example of a PIP that specifies a two-action activity.
A hardware feature with which an I/O device can be attached to two channels. A dynamic switch can be added, which makes it possible for both interfaces to be enabled at the same time with channel selection determined by programming.
two-dimensional bar code
See stacked bar code.
A two-step process by which recoverable resources and an external subsystem are committed. During the first step, the database manager subsystems are polled to ensure that they are ready to commit. If all subsystems respond positively, the database manager instructs them to commit. See also distributed transaction.
A radix complement in the pure binary numeration system. The twos complement is derived by taking the ones complement and then adding one to the resulting number. In a twos complement system, the twos complement of a number n is -n.
A clustering method that involves preclustering records into a manageable set of subclusters, and then applying a hierarchical clustering technique to those subclusters to define the final clusters.
two step movement
See two step putaway.
two step putaway
A putaway, or movement, task that requires the use of two separate pieces of material handling equipment and, therefore, two steps to complete the task. For example, a pallet jack may be used to transport a pallet to the end of a rack aisle, but a fork lift truck would be necessary to lift the pallet onto the rack. The system would be set to plan for two steps directing the pallet jack operator to deliver the pallet to a drop-off location, and the fork lift truck operator to pick up the pallet from the drop-off location.
two-tier client/server architecture model
A client/server system, where a client application containing all of the business logic runs on a workstation, while the data management is run on a database server. See also client/server architecture, three-tier client/server architecture model.
In X.25 communications, a logical channel that allows both incoming and outgoing calls. See also one-way channel.
See teletypewriter exchange service.
See telex interface program.
- In a WSDL document, an element that contains data type definitions using some type system (such as XSD).
- In Enhanced X-Windows, an arbitrary atom used to identify the data.
- The definition of a data object or set of data objects that is graphically represented in a type tree in the Type Designer.
- A characteristic of a message element that describes its data content.
- In Java programming, a class or interface.
- A description of data characteristics. The descriptions include the operations that can be performed on or by the data. See also data type.
- In Ada language, a set of values and the set of operations that apply to those values.
- An object that defines a data structure.
- In DCE X/Open Object Management (XOM), a category into which attribute values are placed on the basis of their purpose.
- A class of objects. All objects of a specific type can be accessed through one or more of the same interfaces.
- A characteristic that specifies the internal format of data and determines how the data can be used.
A command, generally preceded by a leading slash character, that can be entered from any valid IMS command source. See also type-2 command.
type 1 font
See outline font.
type 1 GUID
A globally unique identifier (GUID) that is generated using a combination of the generating system's MAC address, a time stamp, and a large random number. There is a very high probability that a type 1 GUID will be unique. See also Globally Unique Identifier.
A command that is entered only through the OM API. Type-2 commands are more flexible and can have a broader scope than type-1 commands. See also type-1 command.
type 3 GUID
A globally unique identifier (GUID) that is generated by a uni-directional hash of textual or binary data. The same data always produces the same GUID, however there is a very low probability that other data will produce the same GUID. See also Globally Unique Identifier.
- A pivoted type carrier having a type slug at its free end. (T)
- A bar, mounted on an impact printer, that holds type slugs. (I) (A)
- See boundary alignment.
- A routine or set of routines that enables an application to change a specified string of data from one declared type to another. In AIXwindows programming, type conversion is performed on strings using conversion information contained in the MRM database.
typed collection variable
An ESQL/C collection variable or SPL variable that has a defined collection data type associated with it and can only hold a collection of its defined type. See also untyped collection variable.
All characters of a single type family or style, weight class, width class, and posture, regardless of size. An example is Helvetica bold condensed italic, in any point size. See also font.
- All the type sizes and styles of one typeface. The group shares a common design but can differ in attributes such as character width and weight (examples are roman and italic, condensed and ultra bold). A typical font family contains four typestyles: Roman, Italic, Bold, and Bold Italic.
- All characters of a single design, regardless of attributes, such as width, weight, style, and size; for example, Courier, Gothic, or Helvetica.
- A complete character set of a font.
- The complete context for a Java class or interface including its superclasses and subclasses.
- A relationship that you define among named row data types in which subtypes inherit representation (data fields) and behavior (routines) from supertypes and can add more fields and routines.
A measurement level used for data that does not conform to any of the other measurement levels (continuous, categorical, flag, nominal or ordinal). The typeless measurement level can also be used for fields with a single value, or for nominal data where the set has more members than the defined maximum. It is also useful for cases in which the measurement level would otherwise be a set with many members (such as an account number).
The process of converting an atomic value from an earlier data type to a later data type in an ordered sequence. One example of an ordered sequence is INTEGER, DECIMAL, FLOAT, DOUBLE; another example is anyURI, string. Type promotion can be used, for example, in function calls and in the processing of operators that accept numeric or string operands.
A method for ensuring strict typing in C++ by resolving references to functions only when argument types and return values match or have defined conversions, as well as matching function names.
- Pertaining to material that has been set in type.
- To arrange the type on a page for printing.
The type system defines the types of objects (feature structures) that may be discovered by a text analysis engine in a document. The type system defines all possible feature structures in terms of types and features. Any number of different types can be defined in a type system. A type system is domain and application specific.
- A parameter indicating a relative change from the font's normal width-to-height ratio. Examples are normal, condensed, and expanded.
- The horizontal size (set size) of a given typeface. The width may be given in units of measurement, such as set 9 point, or it may be descriptive, such as ultra-condensed, condensed, and expanded.
See proportionally spaced font.