A B C D E F G H I J K L M N O P Q R S T U V W X Y and Z Special characters and Numerics

This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.


A digital trunking facility standard used in the United States and elsewhere, capable of transmitting and receiving 24 digitized voice or data channels. Signaling can be imbedded in the voice channel transmission when robbed-bit signaling is used. The transmission rate is 1544 kilobits per second. See also E1.

A framing format used in T1 transmission.

A framing format used in T1 transmission.

See train the trainer.

See predictive text.

See tools as a service.


  1. A preset point in the typing or output line at which typing or printing stops.
  2. A control in a graphical user interface (GUI) that is used to switch between pages. See also page.
  3. To move a cursor on a display or the print head of a printer to a preset location.

tabbable element
In web page creation, a page element that can be reached using the tab key.

tabbed page
A logical page or section in a window that has a tab at the top. Users can click the tabs to move between tabbed pages.

tab character
A character that indicates that printing or displaying should start at the next horizontal position on the current line. The tab is designated by '\t' in the C language and is named in the portable character set.

tab index
In web page creation, an attribute that allows the directed use of tab stops to change the default navigation through a page.


  1. An orderly arrangement of data in rows and columns that can contain numbers, text, or a combination of both.
  2. In a relational database, a database object that consists of a specific number of columns and is used to store an unordered set of rows. See also base table, temporary table, view.
  3. In COBOL, a set of logically consecutive data items that are defined in the Data Division with the OCCURS clause.
  4. In RPG, a series of elements with like characteristics. A table can be searched for a uniquely identified element, but elements in a table cannot be accessed by their position relative to other elements.

table analysis
A data analysis process that consists of primary key analysis and the assessment of multicolumn primary keys and potential duplicate values.

table check constraint
See check constraint.

table collocation
In a partitioned database environment, a state that occurs when two tables that have the same number of compatible partitioning keys are stored in the same database partition group. In this situation, the DB2 database management system can perform the join or subquery processing at the database partition where the data is stored.

table-controlled partitioning
A type of partitioning in which partition boundaries for a partitioned table are controlled by values that are defined in the CREATE TABLE statement.

table designator
An exposed name that is used to qualify a column name. See also exposed name.

table element
In COBOL, a data item that can be referred to in a table.

table expression
An expression that creates a temporary result table from a query. For example, a table expression might be a query that selects all of the managers from several departments and further specifies that they have over 15 years of working experience and are located at the main branch.

table file
In RPG, an input file that contains a table.

table fragment
Zero or more rows that are grouped and stored in a dbspace that are specified when you create the fragment. A virtual table fragment might reside in an sbspace or an extspace.

table function
A function that receives a set of arguments and that returns a table to the SQL statement that references the function. A table function can be referenced only in the FROM clause of a subselect. See also function, routine, user-defined function.

table hierarchy
A structure representing the relationship between typed tables in which subtables inherit the behavior (constraints, triggers, storage options) from supertables. Subtables can have additional constraint definitions, storage options, and triggers.

table locator
A mechanism that allows access to trigger tables in SQL or from within user-defined functions. A table locator is a fullword integer value that represents a transition table. See also transition table.

table lock
A lock on a table of data. See also row identifier, row lock.

table map
A map that defines specifications for correlating source and destination tables of compatible data.

table-mode processing
In SQL replication, a type of replication subscription-set processing in which the Apply program retrieves all of the data from the source CD table, applies the data (one member at a time) to each target table, and finally commits its work. See also transaction-mode processing.

table object ID
Internal logical identifier for a table. In DB2 for Linux, UNIX, and Windows, table object IDs for each table in a database are stored in the TABLEID column of the SYSCAT.TABLES catalog view.

table object model
A set of component objects that are used for creating market research tables.

table pair
A set of tables used for processing specifications: the JES2 table provides the default processing specifications and the user table provides updates or deletions to the default processing specifications. See also dynamic table, JES2 table, user table.

table partitioning
A data organization scheme in which table data is divided across multiple data partitions according to values in one or more partitioning columns of the table. Data from a given table is partitioned into multiple storage objects, which can be in different table spaces, based on the specifications that are provided in the PARTITION BY clause of the CREATE TABLE statement. See also data partition, database partitioning.

table-partitioning key
An ordered set of one or more columns whose values are used to determine in which data partition each table row belongs. See also data partition, database partition, distribution key.

table queue
A mechanism for transferring rows between database partitions. Table queues are distributed row streams with simplified rules for the insertion and removal of rows. Table queues can also be used to deliver rows between different processes in a single-partition database.

table reference character (TRC)
A numeric character corresponding to the order in which font character sets have been specified. The TRC is used to select a font character set during printing.

table schema
A definition of a table that includes its columns and the data types for each column.

table space

  1. A logical unit of storage in a database. In DB2 for z/OS, a table space is a page set and can contain one or more tables. In DB2 for Linux, UNIX, and Windows, a table space is a collection of containers, and the data, index, long field, and LOB portions of a table can be stored in the same table space or in separate table spaces. See also container, page set.
  2. A logical collection of extents that are assigned to a table. A table space contains all the disk space that is allocated to a given table or table fragment and includes pages allocated to data and to indexes, pages that store TEXT or BYTE data in the dbspace, and bitmap pages that track page use within the extents.

table space container
An allocation of space to a table space. Depending on the table space type, the container can be a directory, device, or file.

table space ID
Internal logical identifier for the primary table space for an object. In DB2 for Linux, UNIX, and Windows, table space IDs for each table space in a database are stored in the TBSPACEID column of the SYSCAT.TABLES catalog view.

table space set
A set of table spaces and partitions that should be recovered together because the tables contained in the table spaces have dependencies on one another. The dependencies can, for example, be between parent table and descendent table or between base table and auxiliary table.


  1. A mobile touchscreen computer that is typically controlled by gestures using the user's fingers, a soft keyboard, or a stylus. See also mobile device, smart device.
  2. In computer graphics, a locator device with a mechanism for indicating coordinate data.

tablet origin
A point on a tablet to which all other locations on the tablet correspond. The origin is either the lower-left corner or the center of the tablet.

table view
A graphical view in the Job Scheduling Console used to display database and plan object data in tabular format. See also job scheduling console.

table window
A section of an application page or dialog box that displays multiple records from a database table simultaneously.

tab stop
In VisualAge RPG, a control setting that determines if a control can be selected by using the tab key.

tabulating window
In Performance Toolbox, a special form of window that tabulates the values of an instrument as data is received and can also calculate a line with a weighted average for each value.

A tabular or graphical report of the Spend data of an organization.The Spend dimensions can be arranged in rows and columns to get an intersection Spend.

A part that determines speed of rotation.

See terminal abnormal condition line entry.

See text analysis engine.


  1. One or more characters attached to a set of data (for example, a field or document element) that contain information about the set, including its identification.
  2. In FD:OCA, a special attribute triplet that can be attached to attribute triplets to provide them with additional information.
  3. A word or phrase that is assigned to application environments. Users create tags to configure which application environments are included in automated tasks. See also automated task.
  4. To scan a 2D or 3D barcode using a mobile device. See also matrix code, Quick Response code, tagging.
  5. A link between an XBRL fact and its source data, such as a report object or the result of a query.
  6. An identifier that groups related artifacts.
  7. A physical label that is applied to an asset to indicate the device, its position, and the controlling authority.
  8. In GL, a marker in the display list used as a location for display list editing.
  9. A word or phrase that users create and assign to an asset. Users create tags to develop search criteria that is meaningful to themselves. See also Dogear.
  10. A structure that contains all of the required JAR files and resources for a web project. For example, the supporting classes extend the base Struts tags to let them nest inside each other, so they keep the fundamental logic of the original tags, except that all references to beans and bean properties are managed in a nested context.
  11. A short key word that is a means of classifying and retrieving content in a way that is meaningful. Tags are single words, or multiple words that are connected with hyphens or underscores. For example, "social-bookmarking", "status_reports", and "payroll" are all valid tags.
  12. A text string attached to any instance of a word in a grammar. A tag can be used to distinguish two occurrences of the same word in a grammar, or to identify more than one word in a grammar as having the same meaning.
  13. An item that contains identifying information about a person or device. Tags enable tracking and monitoring of assets within locations, areas, and zones.
  14. The statements of the user interface manager (UIM) tag language. Tags describe the actions, format, and data of the panel. Tags are used to define the formatting of help information.
  15. A mechanism used to identify certain attributes having some bearing on handling of character data. Some examples are character set identifier, code page identifier, language identifier, country identifier, and encoding scheme identifier.
  16. A property that is associated with a host.
  17. In markup languages such as SGML, XML, and HTML, a token that represents the start or end of an element.
  18. To indicate that content is relevant to a specific subject on a social media site or application.
  19. A type of structured field used for indexing in an AFP document. Tags associate an index attribute-value pair with a specific page or group of pages in a document.

tag-based notification
A notification that is targeted to devices that are subscribed for a specific tag. Tags are used to represent topics that are of interest to a user. See also broadcast notification.

tag cloud
A visual representation of tags, where frequently used tags are displayed with more emphasis. For example: tags can be represented by text, with varying degrees of bolding, or images with varying sizes.

tag content
The text associated with a tag.

tag control
A method of tracking inventory in the warehouse by the issuance of tag numbers.

tag field
In Pascal, the field of a record that defines the structure of the variant part.

Tagged/Delimited String Format (TDS Format)
The physical representation of a message in the MRM domain that has a number of data elements separated by tags and delimiters.

Tagged Image File Format (TIFF)
A file format for storing high-quality graphics.

In mobile computing, the act of conveying data to users by having them scan a 2D or 3D barcode. See also matrix code, Quick Response code, tag.

tag group
A key-value pair that associates a service in a process. See also key-value pair.

tag handler
An explanation of how to process a tag when it is encountered in the processing of the JSP web template.

Tag Image File Format-Fax (TIFF-F)
A graphic file format used to store and exchange scanned fax images.

tag label
A user-defined tag that can be selected to map specific data elements from specific events to specific user-defined fields.

taglib directive
In a JSP page, a declaration stating that the page uses custom tags, defines the tag library, and specifies its tag prefixes. (Sun)

tag library
In JSP technology, a collection of tags identifying custom actions described using a taglib descriptor and Java classes. A JSP tag library can be imported into any JSP file and used with various scripting languages. (Sun)

tag library descriptor
An XML file that describes a tag library and contains the tags in the library. Each functional area has a .tld file.

tag list
A list that is similar to a tag cloud, but displays the ten most popular tags only.

tag mapping
The specific data element from a series of events that should be extracted and used to populate one of the tags for a process or file transfer summary record.

tag number
A inventory attribute used to identify items sharing the same lot attributes.

tag out procedure
The procedure for taking work assets out of service or placing them back in service to ensure a safe work environment.

See trust association interceptor.

In REXX, the part of a compound symbol that follows the stem. A tail can consist of constant symbols, simple symbols, and periods.

tail plan
A plan created during the daily planning process that includes only work started during or before the current planning period and that extends beyond its end.

Insecure data that is allowed to flow through the code.


  1. In an XRF environment, the process by which the failing active IMS is released from its XRF sessions with terminal users and replaced by an alternate IMS. See also giveback.
  2. See fallover.
  3. An automatic operation that switches from a redundant or standby system or node when the primary system or node becomes available after a software, hardware, or network interruption.

takeover condition
An event in the active that causes IMS in the alternate to request a takeover.

takeover phase
The replacement of the failing active IMS by the alternate IMS.

takeover priority
A value assigned to each configured cluster resource on a per-node basis. In the event of a takeover, the active node with the highest priority acquires the resource. A node with a higher priority is listed before the node with a lower priority. See also node priority policy, resource group, resource group policies.

A learning management system for IBM that provides detailed descriptions, offering schedules, and enrollment for learning activities.

talent acquisition
The process of finding the right people, with the right skills, abilities, and fit, who may be hired or already working for the company (organization) or may be working for competing companies.

talent data center
XML integration that allows an organization to contract with a third party vendor to process resumes and transfer the resume and optional ranking or candidate form information into 2x.

talent gateway
A website where candidates job search and apply for jobs.

talent management system
A software application that enables the electronic handling of recruitment needs. The system can be implemented on an enterprise or small business level, depending on the needs of the company. These systems are very similar to customer relationship management systems, but are designed for recruitment tracking purposes. Talent management systems typically are comprised of one or more candidate portal(s), a recruiter portal for candidate data mining and candidate processing, and a hiring manager portal. They generally also include candidate correspondence and interview scheduling functionality, plus ad hoc reporting and a metrics dashboard. See also applicant tracking system.

talent management system report (TRM report)
A specialized report and graphical panel that can be configured and added into a user’s Welcome Screen.

A breach of communication security in which information in transit is changed or replaced and then sent on to the recipient. See also eavesdropping, impersonation.

The single point at which a straight line meets a curve or surface.


  1. See Telocator Alphanumeric Protocol.
  2. See Trace Analysis Program.
  3. See network tap.

To briefly touch a touchscreen. Typically, apps use tap gestures to select items (similar to a left mouse button click). See also gesture.

tape archive (tar)
A UNIX archive utility for storing data on tape media.

tape backup
A magnetic-tape copy of hard-disk and optical-disk files made for disaster recovery.

tape cartridge
A case containing a reel of magnetic tape that can be put into a tape unit without stringing the tape between reels.

tape configuration database (TCDB)
The set of tape library records and tape volume records that reside in integrated catalog facility (ICF) volume catalogs and describe the current tape library configuration.

tape controller
A logic card located in some tape units that controls input/output tape devices and synchronizes their operation with the operation of the system as a whole.

tape device
A collection of tape units that share a model type and serial number, such as all the logical unit numbers (LUNs) of a tape library. See also tape unit.

tape drive
A device used to move magnetic tapes, as well as to read and write information onto those tapes.

tape file
A device file to support a tape device.

tape label
A tape record that identifies a magnetic tape volume and the data sets on that volume.

tape librarian
The person who manages the tape library. This person is a specialized storage administrator.

tape library

  1. A device that includes a selection of cartridges in a common (secure) area within access of one or more automated removable media (ARM).
  2. A set of equipment and facilities that support an installation's tape environment. The tape library can include tape storage racks, mechanisms for automatic tape mounting, a set of tape drives, and a set of related tape volumes mounted on those drives. See also Automated Tape Library Dataserver, manual tape library, system-managed tape library.

tape library data server
An IBM hardware device that maintains the tape inventory that is associated with a set of tape drives. A tape library data server also manages the mounting, removal, and storage of tapes.

tape mark
A unique mark written on the tape to distinguish file boundaries.

tape mount management
The methodology used to optimize tape usage in order to decrease the number of tape mounts and increase the amount of data on each tape. This optimization is accomplished by redirecting appropriate tape requests to disk and collecting the data in larger amounts on tape soon after the applications are completed. This methodology also reduces the time required to run the application.

tape reel
A round device on which magnetic tape is wound.

tape storage group
A collection of tape volumes that contain private user data. A volume becomes part of the tape storage group when it is mounted to satisfy a scratch volume request for the storage group, or when it is entered into one of the tape libraries and assigned to the tape storage group by the cartridge entry process. The volume is removed from the tape storage group when it is returned to scratch after the data sets on it have expired. See also storage group.

tape subsystem
A magnetic tape subsystem consisting of a controller and magnetic tape devices, which allows for the storage of user data on tape cartridges. See also storage subsystem.

tape table of contents (TTOC)
In DFSMShsm, the record that describes a tape volume and the data sets (migrated or backup versions) that reside on that tape.

tape unit

  1. The physical enclosure containing the tape drive.
  2. A tape device or a robotics controller that is visible over a storage network. A tape unit is a member of a single storage network (of 1 - n fabrics), but can have 1 - n equivalent paths. See also tape device.

tape volume
The recording space on a single tape cartridge or reel. See also shelf-resident tape volume.

tape volume prefix
The high-level-qualifier of the file name or the data set name in the standard tape label.

tape volume set
The collection of tape volumes on which a multivolume data set resides.

tape volume table of contents (TVTOC)
Information about a tape data set that RACF stores in the TAPEVOL profile for the volume on which the data set resides. The TVTOC includes the data set name, data set sequence number, creation date, and an indicator as to whether a discrete tape data set profile exists.

See title, affix, and qualifier.

See tape archive.


  1. A computer that is known to an OS deployment server.
  2. The field for which a user wants to predict the value, which is assumed to depend on the values of other fields (the predictors). See also binomial logistic regression, multinomial logistic regression.
  3. A collection of logical units (LUs) that are directly addressable on the network. The target corresponds to the server in a client-server model.
  4. A value that a Key Performance Indicator (KPI) should achieve, such as "300" or "5 days."
  5. One of the threshold values that is displayed on the scorecard and is used to determine which status icon to display.
  6. The program or system to which a request for files or processing is sent.
  7. The destination for an action or operation.
  8. In distributed data management (DDM), the platform that fulfills a request for remote data. A target is also known as a server. See also Distributed FileManager, source.
  9. A technical view of an IT application (for example, active directory). A target can refer to several applications.
  10. To match content with devices in a deployment, either by selecting the content for deployment, or selecting the devices to receive content.
  11. The node at which a password is to be installed. If the password specifies a nodelocked license, the target is the node where the licensed product is run. If the password specifies multiple nodelocked license (that is, a compound password for nodelocked licenses) or network licenses, the target is a node at which the network license server is running.
  12. In VisualAge RPG, a part that receives a target event from a source part whenever the state of the source part changes.
  13. A storage device on a fibre-channel network.
  14. In SEU, a line command, such as B (Before) or A (After), that specifies the destination for other line commands such as C (Copy) or M (Move).
  15. A person or data source that owns or contains information that might be pertinent to a legal matter.

targetable command
A command that can be executed on a different target container. A targetable command invocation incurs some overhead; making the task command not targetable can improve the performance of the overall command framework.

target aging
A feature that allows the user to perform date aging based on a specific date. For example, the base date of the production run and a target date for a particular test can be specified. Dates are automatically aged to maintain the relationship between the base and target. See also age, incremental aging, semantic aging.

target catalog entry
A promotional product or SKU that is defined as a merchandising association. See also source catalog entry.

target CDD
A customization definition document (CDD) to which placeholders have been added, and for which placeholder values have been specified. A target CDD describes a particular target customization definition.

target cell
A cell that has an offer assigned to it. A target cell is a group of individuals at a specific audience level, such as individual customers or households.

target CI
A configuration item (CI) that is expected to be affected by a proposed change. A target CI can be defined when a request for change (RFC) is created, when an implementation task is defined, or at other points in the change process, especially during impact analysis.

target component
A component that is the final target of a client service request.

target customization definition
A customization definition that describes a changed version of a current customization definition. Each target customization definition has a target CDD that describes it.

target database
A database that receives transformed data from a source. See also integration adapter, mapping.

target data queue program
In System i Access, a series of programs that receive requests for data manipulation from the source data queue program. Target data queue programs also send data and replies (to previous requests) to the source data queue program.

target definition file
A Java archive file that defines managed resource types.

target directory
In VisualAge RPG, the directory in which the compiled VRPG application is stored.

target distributed data manager (TDDM)
In a distributed data management network, programming support that translates the DDM requests received from a source system into data management or SQL requests on the target (or remote) system. See also source distributed data manager.

targeted email
A means of communicating a campaign through email to specific recipients based on customer profiling.

target event
In VisualAge RPG, an event that a target part receives whenever the state of a source part changes.

target folder
In VisualAge RPG, the folder where the application (composite project) will be created.

target ID
A unique identifier of a node. A vendor can generate a password that can be installed only on a node that has a specific target ID.

The method used to specify the endpoints in a deployment.

target item
A specific item. For example, a coupon can have one target item or many.

target library (TLIB)
A data set that contains all or part of a product after it is installed from a distribution library.

target library high-level qualifier (thlqual)
A high-level qualifier for z/OS target data set names.

target member (tmember)
The name of a client that connects to an OTMA group.

target namespace
A unique logical location for information about the service that associates a namespace with a WSDL location.

target node

  1. An RRSF node that a given RRSF node is logically connected to.
  2. A client node for which other client nodes (called agent nodes) have been granted proxy authority. The proxy authority allows the agent nodes to perform operations such as backup and restore on behalf of the target node, which owns the data.

target organization
In Enterprise Service Tools, a business running existing applications on enterprise information systems.

target profile
See target type.

target program

  1. In VisualAge RPG, the object to be built by the project, such as a Dynamic Link Library (DLL).
  2. In communications, the program that is started on the remote system at the request of the source system. See also source program.
  3. In display station pass-through, a program that runs on the remote system.

target queue manager
See remote queue manager.

target recovery time
The amount of time estimated by the system that it will need to recover access paths during an initial program load (IPL) after an abnormal system end. Actual performance may range around the target.

target region
In BTS, the CICS region on which a routed process or activity executes. See also requesting region, routing region.

target release

  1. In upgrades, the version, release, and modification level of software that is to be installed.
  2. The release of the operating system on which a user intends to use an object being created, or intends to restore or use an existing object. See also source release.

target result
A result that is derived when the assessment value lies within the defined target threshold.

target segment
In secondary indexing, the segment to be retrieved.

target server

  1. In upgrades, the planned hardware configuration and software level that exists when the upgrade is completed.
  2. In Q replication and SQL replication, a database or subsystem that contains replication target tables or procedures.
  3. A database that contains replication target tables.

target service
A service that exists outside of the gateway.

target system

  1. A system where supported middleware products are installed and maintained. A target system can be a physical system, a virtual system, or a system instance in the cloud. It can play a role as a source, a destination, or both source and destination for configuration data.
  2. In upgrades or migrations, the planned hardware configuration and software level which will exist when the upgrade is completed.
  3. The system that receives a request from another system. See also source system.
  4. A managed system on which an IBM Director task is performed.

target table

  1. In Q replication, a table that is the destination for replicated changes from a source that is part of a Q subscription.
  2. The underlying base table that a violations table and diagnostics table are associated with.
  3. In SQL replication, a table that is the destination for changes from a registered replication source. A target table can be a user copy table, a point-in-time table, a base aggregate table, a change aggregate table, a CCD table, or a replica table. See also Apply program, replication target, source table.

target threshold
The accepted target values for the risk assessment that comprises of a maximum and minimum value.

target type
A category of related targets that share schemas.

target user ID
The recipient of actions that were directed by RRSF. See also source user ID.

target volume
A volume that receives data from a host volume or another intermediate volume.

target workstation
A system identified for a Common Inventory Technology (CIT) installation.

target zone
In the System Modification Program/Extended (SMP/E), a collection of VSAM records describing the target system macros, modules, assemblies, load modules, source modules, and libraries copied from distribution libraries (DLIBs) during system generation, and the system modifications (SYSMODs) applied to the target system.


  1. A matrix of shipping charges that the shipper and carrier agree to use for LTL shipments. The charges are based on the origin and destination of a shipping lane, the freight class of a shipment, and the weight of a shipment.
  2. The fee the packet-switching data network charges a user for sending data. The tariff is usually based on the number of packets sent over the network.


  1. An action performed by an agent if the event status meets the task execution rules. For example, an agent can send an email, publish a news item, or run a report.
  2. A type of Fixlet designed for re-use, for example, to perform an ongoing maintenance task.
  3. An activity that has business value, is initiated by a user, and is performed by software.
  4. See operation.
  5. An atomic activity that is included within a process. A task is used when the work in the process is not broken down to a finer level of process model detail. Generally, an end-user, an application, or both perform the task.
  6. A unit of work representing one of the steps in a process.
  7. A process and the procedures that run the process.
  8. A set of actions designed to achieve a particular result. A task is performed on a set of targets on a specific schedule.
  9. In agile development, a work item that defines a specific piece of work.
  10. In Tivoli Intelligent Orchestrator, an action that runs a deployment job on one or more target devices. A deployment job can include one or more job items that correspond to workflows.
  11. An action assigned to an operator by a supervisor or a system in a warehouse, such as a move, putaway, or pick task.
  12. A unit of work to be accomplished by a user, device, or process.
  13. In CICS, a single instance of the execution of a transaction.
  14. A sub-division or portion of an activity. See also activity.
  15. An action item that is created and assigned as part of a project schedule.
  16. In Ada language, a routine that operates in parallel with other parts of the program. A task is written as a task specification (which specifies the name of the task, and the names and formal parameters of its entries), and a task body which defines its execution.
  17. A set of jobs (TP module) that are linked together to form a complex function to be run.
  18. An operation in the console that is launched from a node in the console navigation and completed on a page in the work area.
  19. A parameters-defined request to receive specific updated information in real time within the available databases.
  20. One or more actions associated with a case. A task has one or more steps that must be completed to finalize the task. For example, a task might be to review new hire applications. A case is not complete until all required tasks are completed or manually disabled. Each task has roles that are associated with it.
  21. An activity that can be performed by a single user.
  22. A work item that an administrator performs, for example: granting permissions and adding users to a community.
  23. A unit of work to be accomplished by a device or process.
  24. The smallest unit of work in a workspace that can be assigned to one Content Contributor. See also task group, workspace, workspace content contributor.
  25. A unit of computation. In a parallel job, two or more concurrent tasks work together through message passing. Although it is common to allocate one task per physical or logical processor, the terms "task" and "processor" are not interchangeable.
  26. In the Dynamic Workload Console, a filter, by scheduling object type, which returns a list of objects with attributes matching those specified in the task definition.
  27. In a Tivoli environment, the definition of an action that must be routinely performed on various managed resources throughout the network. A task defines the executables to be run; the authorization role required to execute the task; and the user or group name under which the task will execute.
  28. An activity that a user is required to perform on a contract.
  29. A scheduled project activity to which a resource can be assigned to perform work.
  30. An action performed by the provisioning server on a host. Examples of tasks are deployment, creating cloning profiles, and detecting the currently installed operating system.
  31. The basic unit of organization in a rule flow.

task-based assistance
The type of user assistance that is readily accessible from the product and that includes both task topics that provide step-by-step instructions for how to use one product interface or a set of product interfaces and the concept and reference topics that are closely related to those task topics. Task-based assistance is often included in help systems and information centers.

task card
A record that specifies maintenance tasks and generates work orders when the alert point of the task card is met.

task code
A code that facilitates the tracking of the tasks performed by a contractor.

task command
A command that implements a specific application logic. In general, a controller command and a set of task commands together implement the application logic for a URL request. See also controller command.

task control
In CICS, a program that synchronizes CICS task activity. Under task control, the highest priority task that is ready for processing is started next.

task control area (TCA)
An area of main storage acquired by CICS when a task is first dispatched. It is used to control the processing of the task. Once acquired, the TCA exists until the task is terminated. It contains the current status of the task, its relative dispatching priority, and parameters and information being passed between CICS and the application program.

task control block (TCB)
A z/OS control block that is used to communicate information about tasks within an address space that is connected to a subsystem. See also address space connection.

task execution rule
A user-specified option within an agent that determines which statuses and values cause a task to be run. It determines which tasks to execute for each event instance.

task filter
A component of a reconciliation task that specifies a subset of objects to evaluate when a reconciliation task is executed. See also comparison rule, link rule, reconciliation task.

task global table (TGT)
table containing information about addresses, the length of working storage, and the program start address.

task group
The smallest unit of work in a workspace that can be committed to production-ready data. See also commit, production-ready data, quick publish, task, workspace, workspace manager, workspace task group approver.

task ID
In Ada language, an alphabetic label or identification for a task. This label is determined by the debugger TASKS option. A task ID is assigned to each task that has not terminated.

task initiator
See trigger monitor.

task library
A class library that provides the facilities to write programs that consist of tasks.

task list
A list of procedures that can be executed by a single flow of control.

In System i Navigator, a view of system tasks that lets a user interact with i5/OS operating system functions. A taskpad contains a set of interrelated tasks that either perform a function or launch help that explains how to perform a function.

task planner
A module that is used to manage asynchronous processes that can be completed at a future time (for example, processes involved in the production of reports or for some type of batch processing).

task queue
An area where a pending task is picked up by an agent that runs in the background and processes entries from the task queue.

task-related user exit (TRUE)
A user exit program that is associated with specified events in a particular task, rather than with every occurrence of a particular event in CICS processing (as is the case with global user exits). See also global user exit, resource manager interface.

task status
Indication of the state of completion of a task and whether any errors occurred when the task was running.

Tasks tool
A Management Center feature that is used to select tasks, manage content within a task, add comments, and approve or reject tasks.

task switching
The overlapping of I/O operations and processing between several tasks.

task template
A group of elements which can be customized on a host computer. They are either deployment parameters or graphical user interface elements which condition the appearance of the target computer screen when Tivoli Provisioning Manager for OS Deployment is managing the computer. See also deployment scheme.

task type
A grouping of warehouse activities that complete a set of related tasks.

The traditional Japanese format of top-to-bottom, right-to-left printing for kanji text. Pronounced tah-tay.

tax category
Indicates the different categories of tax a store may be required to collect, such as federal, state or provincial, and municipal tax. Each tax category must be assigned one of the tax types; either sales or shipping.


  1. A dictionary that enables users to search for synonyms of their query terms when they search a collection. See also category tree.
  2. The hierarchical classification of information according to a known system that is used to easily discuss, analyze, or retrieve that information. See also ontology.
  3. A description of a multidimensional data store expressed in XML.

taxonomy schema
A core document that, in conjunction with other artifacts, defines an XBRL taxonomy.

tax type
In WebSphere Commerce, the type of tax applied to an order. Tax types include sales tax or shipping tax. Each tax type has its own unique set of tax categories.

See terabit.

See terabyte.

The part of the table that is located in a single data file. Each tblspace can hold one table fragment.


  1. See test control.
  2. See test case.


  1. See trusted communications agent.
  2. See task control area.

See Telecommunications Access Method.

See transaction capabilities application part.


  1. See Trusted Computing Base.
  2. See task control block.
  3. See transmission control block.

See tape configuration database.

A group of one or more systems or sysplexes, or both, that share the same tape configuration database (TCDB). The individual systems in the TCDBplex share access to one or more tape library data servers and to a common pool of scratch volumes in each tape library. They can also share access to the set of private volumes in each tape library.

tc driver
See automation package.

See transaction certificate.

See transport connection identifier.

See total cost of ownership.

See Transmission Control Protocol.

SNA logical unit type 62 (LU62) protocol encapsulated in TCP/IP. This allows APPC applications to communicate over a TCP/IP Network without changes to the applications.

TCP ACK storm
A denial-of-service attack on a server in which a hacker or cracker secretly inserts data into a client/server session in an attempt to disrupt the session. The resulting acknowledgements (ACKs) bounce back and forth and a TCP ACK storm ensues after the hacker has hijacked multiple client/server sessions.

TCP channel
A type of channel within a transport chain that provides client applications with persistent connections within a local area network (LAN).

TCP header
Data that precedes a Transport Control Protocol packet that contains information including the source port and destination port.

See to complete performance index.

See Transmission Control Protocol/Internet Protocol.

In PSF, pertaining to a device that is linked to the OS/390 system through a TCP/IP network and receives data from the OS/390 system using the application-layer IBM protocol for IPDS printers. Some TCP/IP-attached printers require the i-data 7913 IPDS Printer LAN Attachment. See also SNA-attached.

TCP/IP Connectivity Utilities
The IBM licensed program that provides a collective set of industrial communications protocols to support connectivity functions for both local and wide area networks.

TCP/IP load balancing
The ability to distribute TCP/IP connections across target servers.

TCP/IP monitoring server
A runtime environment that monitors all requests and responses between a web browser and an application server, as well as TCP/IP activity.

TCP/IP port
A 2-byte value that identifies a TCP/IP network application within a TCP/IP host.

TCP/IP stack
The layered suite of protocols that comprise TCP/IP.

TCP tunnel
A way to provide TCP connectivity to target computers.

See transmission control queue.

See terminal control system.

See Tenex C shell.

See Telephony Control Service Provider Interface.

See terminal control table.

See terminal control table terminal entry.

See terminal control table line entry.

See terminal control table system entry.

See terminal control table terminal entry.

See terminal control table user area.

See transmission control unit.


  1. See transient data.
  2. See intrapartition transient data.

See trivial database.


  1. See Telecommunications Device for the Deaf.
  2. See test-driven development.

See target distributed data manager.

See Triple Data Encryption Algorithm.


  1. See transaction data file.
  2. See time differential factor.

TDI configuration editor
An application that provides an interface for designing ETL transformation scripts. This application creates TDI assembly lines, which can be used by the ETL custom workflow task.

TDI server
A transformation engine that can read, manipulate, and write data to and from various data sources.

See twinaxial data link control.

See transient data queue.

TDS Format
See Tagged/Delimited String Format.

See transaction dump table.

See topology database update.

See terminal equipment.

See terminal equipment 1.

See terminal equipment 2.

See time variance at completion.

A categorization that associates users with roles. When one assigns a user to a team, one also assigns that user to a role because roles are assigned to teams. See also user.

team area
A place within a project area for managing team membership, roles, assignments, and team artifacts.

team assignment
The act of assigning a team to a customer so that individual members of that team can access the details about the customer and the customer's orders.

team-based editing
The process of editing a file with a group of people.

team development
The practice of several members of a team contributing to a single project, with the potential for multiple team members to work in parallel on the same files.

The grouping of two to four ports or adapters to increase transmission and reception throughput. Teaming creates a single, high-speed, fault-tolerant link that provides load balancing for both outbound and inbound traffic. See also adapter load balancing.

team release plan
An artifact showing plan items and additional unstructured information for a team or project area and a development iteration and the associated child iteration plans.

team space
A place in a community where team members can manage different types of content.

team support
The component that interacts with a repository to share and version projects and project data. See also version control.

See terminal error block.

tebibyte (TiB)
A base-2 unit of measurement that is equal to 1,099,511,627,776 bytes (2 to the 40th power).

An abstract about the document, such as a newsletter, guide, or release note, that includes a pointer to that document. See also technote.

technical drawing
A drawing that depicts a real world physical entity, such as a computer workstation or a printer, in a highly representational manner.

technical information exchange (TIE)
A part of the electronic customer support function that allows a user to send files to and receive files from a remote support system, and to search for information on a remote support system. The files are sent and received through a remote support network.

technical publication
A record that maintains information that is related to an externally published directive or bulletin, such as an airworthiness directive or a customer service notification. Technical records are used in highly regulated industries to ensure that all regulations are properly implemented.

technical record
A record that maintains information that is related to an externally published directive or bulletin, such as an airworthiness directive or a customer service notification. Technical records are used in highly regulated industries to ensure that all regulations are properly implemented.

technical rule
A rule written in a technical rule language, such as ILOG Rule Language (IRL).

technical subcontractor (TSC)

Technical Support Services (TSS)
A GTS line of business responsible for hardware and software maintenance of both IBM logo and non-IBM products.

technology adapter
An adapter that is designed for interactions that conform to a specific technology. For example, the WebSphere Adapter for FTP, is an intermediary through which an integration broker sends data to a file system that resides on a local or remote FTP server.

technology connector
An API that passes data between the event processing server (runtime server) and external systems using a standard protocol such as SMTP, HTTP, FTP, or SOAP.

technology-independent machine interface (TIMI)
The lowest visible architectural layer of the server. TIMI defines the high-level machine instruction set and application programming interface that is independent of the underlying implementation. This allows the underlying hardware and Licensed Internal Code to evolve over time to take advantage of technology advances without affecting the user-level interface.

technology preview
A demonstration of a feature that is currently in development but is not complete and therefore is not yet supported.

A short document about a single topic. See also techdoc.

A proxy mechanism that receives traffic from database clients to a database server, forwarding copies to the database and to a Guardium system.

See terminal endpoint identifier.

Telco representative
A service provider representative who handles the orders placed for circuits, services, or equipment.

telecom atlas
A graphical representation of the circuit or equipment that is mapped between two locations.

The transmission of data between computer systems over telecommunication lines and between a computer system and remote devices.

telecommunication line

  1. The part of a data circuit external to the equipment that connects to a data-switching exchange.
  2. Any physical medium, such as a wire or microwave beam, that is used to transmit data.

telecommunication program PCB (TP PCB)
The program communication block (PCB) that supports communication between an application program and a terminal or other application program. There are two types of TP PCBs: I/O PCB and alternate PCB.

Telecommunications Access Method (TCAM)
An access method used to transfer data between main storage and remote or local storage.

Telecommunications Device for the Deaf (TDD)
A telephony device with a QWERTY keyboard and a small display and, optionally, a printer.

Telecommunication Standardization Sector
See International Telecommunication Union Telecommunication Standardization Sector.

See fax.

See fax.

The sending, receiving, and storing of information by way of telecommunication devices. In particular, the use of data collection devices in vehicles to gather and transmit diagnostic and tracking data.

The communication of medical information through interactive media for the purpose of consulting, teaching, and connecting with people in remote places.

telemetry channel
A communication link between a queue manager on IBM MQ, and MQTT clients. Each channel might have one or more telemetry devices connected to it.

telemetry service
An IBM MQ service that handles the server side of the MQTT protocol. The telemetry service hosts telemetry channels.

telephone call state
In telephony, the condition of a telephone call that reflects what the past action on that call has been and what the next set of actions may be.

telephone input field
A field type that contains information entered by a caller using pushbutton signals.


  1. The hardware and software technology that supports computer-based phone calls.
  2. The use or operation of systems for the transmission of voice or data communications between separate points.

Telephony Control Service Provider Interface (TCSPI)
A public interface for integrating telephony services from multiple vendors.

Processing data that is received from or transmitted to a remote location by way of communication channels.

Teleprocessing Network Simulator (TPNS)
A program used to test new functions before they encounter production volumes.

teletypewriter (TTY)
Originally an electromagnetic device consisting of a combined keyboard and printer used to communicate over telephone lines or other wired serial connections. The abbreviation TTY is now used to describe any serial teletypewriter-like connection.

teletypewriter exchange service (TWX)
Teletypewriter service in which suitably arranged teletypewriter stations are provided with lines to a central office for access to other such stations throughout the U.S. and Canada. Both baudot- and ASCII-coded machines are used. Business machines may also be used, with certain restrictions.

Telex Correspondents File
A file that stores data about correspondents. When the user enters the corresponding nickname in a Telex message, the corresponding information in this file is automatically retrieved and entered into the Telex header area.

telex header area
The first part of the telex message. It contains control information for the telex network.

telex interface program (TXIP)
A program that runs on a Telex front-end computer and provides a communication facility to connect MERVA ESA with the Telex network.

Telex Link
The MERVA ESA component used to link to the public telex network via a Telex substation.

Telex substation
A unit comprised of the following: Telex Interface Program, a Telex front-end computer, and a Telex box.

In TCP/IP, a protocol that provides remote-terminal connection service. Telnet enables users of one host to log on to a remote host and interact as if they were directly attached terminal users of that host.

Telnet server
A program, residing on a host, that can be used by a client to log into the host using the Telnet protocol.

Telocator Alphanumeric Protocol (TAP)
An industry-standard protocol for the input of paging requests.


  1. A family of C++ classes or functions with variable types.
  2. A HATS resource that describes the relatively static portion of the web pages presented by the HATS application, including a banner and navigation area.
  3. An object used to create new objects of the same type. The created object has the same characteristics as the template. See also application security template, entry template, property template, publish template, publishing style template, search template, security template, versioning security template.
  4. The metadata that defines the format of data in the RACF database.
  5. An XML representation of the instructions that call the promotions engine.
  6. In UML modeling, a model element with unbound formal parameters that you can use to define families of classifiers, packages, and operations. A parameterized model element that describes or identifies the pattern for a group of model elements of a particular type.
  7. In enhanced edit mode, a character buffer that is associated with the terminal.
  8. A group of elements that share common properties. These properties can be defined only once, at the template level, and are inherited by all elements that use the template.
  9. A component that can be used to define reference structure attributes or dimension table columns together with their semantics.
  10. A generalized project or deliverable plan without populated data for use by project managers for planning a project.
  11. In report authoring, a reusable report layout or style that can be used to set the presentation of a query or report.
  12. A predefined process of activity roadmap that can be applied to specific process workflows and modified to meet the needs of a specific workflow. Templates can be created, edited, cloned, or deleted.
  13. In Informix, a mechanism that is used to set up and deploy Enterprise Replication for a group of tables on one or more servers.
  14. In digital marketing, a document that is used to prepare emails to send to contacts. A template is used as a pattern and can include dynamic information, personalization, and external information.
  15. A DB2 utilities output data set descriptor that is used for dynamic allocation. A template is defined by the TEMPLATE utility control statement.
  16. In REXX, a guide that allows strings to be parsed by words (delimited by blanks), by explicit matching of strings, or by specifying numeric positions.
  17. An object that represents the framework of future objects. Each future instance of an object is created by copying the template’s components. See also clause template, contract template, format template, line clause template, notification template, term definition.
  18. A model of a new Notes database. If it is a design template, it will update database design elements created from the template.
  19. In WebSphere Commerce, a predefined skeleton or pattern that determines how information displays on a web page. The template defines characteristics such as the location and type of text and images, and background color.
  20. A pattern to help the user identify the location of keys on a keyboard, functions assigned to keys on a keyboard, or switches and lights on a control panel.
  21. A predefined format that is designed to retrieve particular data on a regular basis and in a consistent format.
  22. A predefined structure for an artifact.

template ACE
A non-editable access control entry (ACE) whose source type is template.

template class
A C++ class instance generated by a class template.

template file
In Notes, a file with the extension NTF that contains the structure for the database -- that is, forms, folders, and views -- but does not contain documents. Domino Designer comes with a collection of templates that can be used to create system and application databases.

template function
A C++ function generated by a function template.

template instantiation
The act of creating a new definition of a function, class, or member of a class from a template declaration and one or more template arguments.

template library
The database, known as the Portal Template Catalog, that stores place template specifications and portlets forms, subforms, and profiles.

Template Organization
A Template Organization is a role associated with an organization that defines point-of-sale rules, business processes, and configurations for a store or a group of stores. When a config organization is defined only for the purpose of managing business rules, the config organization must be designated as a Template Organization. Template Organizations are not logical organizations. Template organizations can be configured in the inheritance structure so that one Template inherits rules from another Template.

temporal table
A table that records the period of time when a row is valid.

temporary baseline
In architecture, the shifted baseline used for subscript and superscript.

temporary baseline coordinate
In architecture, the B-value of the I,B coordinate pair of an addressable position on the temporary baseline.

temporary baseline increment
In architecture, a positive or negative value that is added to the current baseline presentation coordinate to specify the position of a temporary baseline in a presentation space or on a physical medium. Several increments might have been used to place a temporary baseline at the current baseline presentation coordinate.

temporary data set
An uncataloged data set with a name that begins with an ampersand (&) or two ampersands (&&) and that is normally used only for the duration of a job or interactive session. See also permanent data set.

temporary dynamic queue
A dynamic queue that is deleted when it is closed. Temporary dynamic queues are not recovered if the queue manager fails, so they can contain nonpersistent messages only. See also permanent dynamic queue.

temporary error

  1. An error that requires an operation to be retried a number of times before it is successfully completed.
  2. A resource failure that can be resolved by error recovery programs. See also permanent error.

temporary field
A field that is used during calculations. The variable that is used in the temporary field is not stored.

temporary file system (TFS)
A temporary, in-memory physical file system that supports in-storage mountable file systems. Normally, a TFS runs in the kernel address space, but it can be run in a logical file system (LFS) colony address space.

temporary group
A list of existing calendars used to schedule items for a group of users in one step. The list can be used in the current session only, after which the list is deleted.

temporary library
A library that is automatically created for each job to contain temporary objects that are created by the system for that job. The objects in the temporary library are deleted when the job ends. The system name for temporary library is QTEMP.

temporary object
An object, such as a data path or compiler work area, that is automatically deleted by the system when the operating system is loaded.

temporary operator instructions
Operator instructions that are valid during a specific time limit. They are displayed to the workstation operator only during that time period.

temporary page
A page that closes and cannot be reopened after a user navigates away from it.

temporary price reduction (TPR)
A temporary reduction in the consumer price of a product.

temporary storage

  1. The section of computer storage in which data is stored temporarily while a program is running.
  2. The CICS facility that allows application programs to store data in a temporary storage queue for later retrieval.

temporary storage queue
A queue of data items which can be read and reread, in any sequence. The queue is created by a task, and persists until the same task, or a another task deletes it.

temporary storage table (TST)
A table describing temporary storage queues and queue prefixes for which CICS is to provide recovery or security or that are located on a remote CICS system.

temporary table

  1. A table that holds temporary data. Temporary tables are useful for holding or sorting intermediate results from queries that contain many rows. The two kinds of temporary tables, which are created by different SQL statements, are the created temporary table and the declared temporary table. See also base table, created temporary table, declared temporary table, result table, table.
  2. A table that the DBMS destroys automatically at the end of a session or transaction.

temporary table space
A table space that can store only temporary data. See also system temporary table space, user temporary table space.

temporary-text-delay character (TTD character)
The BSC transmission control character that tells the receiving station that there is a temporary delay in sending the data.

The period of time between a port's winning arbitration in a loop and the return of that port to the monitoring state.

A client organization that has a share in the use of a system that is logically partitioned.

The process of offering a load to a carrier.

tender status
The status of a tender, such as pending, active, or complete.

tender time fence
A calculation that is used to determine when a shipment must be tendered.

tender void
The ability to cancel charges on payments before payments are processed.

Tenex C shell (tcsh)
An enhancement of the UNIX C shell (csh) that is compatible with csh.

tensile strength
A measure of the tension (force) that a material (such as paper forms) can withstand without tearing.

In the IBM 3800 Printing Subsystem, stretching or causing extension of continuous forms while they are threaded in the printer. (T)

See terminal error program.

terabit (Tb)
For processor storage, real and virtual storage, and channel volume, 2 to the power of 40 or 1 099 511 627 776 bits. For disk storage capacity and communications volume, 1 000 000 000 000 bits.

terabyte (TB)
For processor storage, real and virtual storage, and channel volume, 2 to the 40th power or 1 099 511 627 776 bytes. For disk storage capacity and communications volume, 1 000 000 000 000 bytes.

A one terabyte temporary storage area that provides storage that is private to a process.


  1. In a business glossary, a word or phrase that describes a characteristic of the enterprise. By assigning assets to terms in the business glossary, information assets can be organized based on business meaning. See also business glossary.
  2. A string, symbol, or function call contained within a REXX expression.
  3. The smallest part of an expression that can be assigned a value.

term definition
A placeholder with a set of properties that determine the behavior and possible values of a term. See also template.

See Term Extraction tool.

Term Extraction tool (TermExt)
A tool that extracts terms from computer files.


  1. In curses and extended curses, a screen that represents what the workstation's display screen currently looks like. The terminal screen is identified by a window named curscr, which the user does not access directly.
  2. In a system or communications network, a point at which data can either enter or leave.
  3. See display station.
  4. In data communication, a device, usually equipped with a keyboard and display device, capable of sending and receiving information.
  5. A physical or emulated device, associated with a keyboard and display device, capable of sending and receiving information.

terminal abnormal condition line entry (TACLE)
An area containing CICS error information and a copy of the data event control block (DECB) at the time an error occurred on a non-SNA LU or line. When an abnormal condition occurs on a non-SNA LU or line, terminal control places the terminal out of service and dynamically creates a TACLE, which is chained off the terminal control table line entry (TCTLE) for the terminal or line on which the error occurred.

terminal adapter
A device that connects a computer to an external digital communications line such as an integrated services digital network (ISDN) line.

terminal control
In CICS, a facility that handles addressing, and transmission error detection and correction for terminals (displays and printers) associated with the local CICS system. It also handles the intercommunication data queue used by CICS.

terminal control interface
An interface that allows an application program to send or receive a device-dependent terminal data stream.

terminal control system (TCS)
A table defining the connections between CICS systems.

terminal control table (TCT)

  1. CICS control table retained to define non-SNA LU networks.
  2. A table describing the terminals and logical units within a CICS network.

terminal control table line entry (TCTLE)
A control block in the TCT for all non-SNA LUs on the same line. The TCTLE contains all parameters necessary for processing requests for terminals on the line.

terminal control table system entry (TCTSE)
In the TCT, an entry that is generated for each system known to the local CICS system.

terminal control table terminal entry (TCTE, TCTTE)
In the TCT, an entry for each terminal known to CICS. TCTTEs are generated either during system initialization (for terminals predefined by resource definition) or when a terminal is autoinstalled. The TCTTE describes the terminal and addresses the corresponding TCTLE, the active TCA, and TIOAs; it also contains control information relating to terminal control requests issued by the CICS application program.

terminal control table user area (TCTUA)
An area used to pass information between application programs, but only if the same terminal is associated with the application programs involved.

terminal descriptor
In Object Data Manager (ODM), a named variable (short, long, binary, char, or vchar) that is used to define the basic data types in an ODM object class definition.

terminal device file
See character special file.

terminal emulation
The capability of a microcomputer or personal computer to operate as if it were a particular type of terminal linked to a processing unit and to access data.

terminal emulator
A program that allows a device such as a microcomputer or personal computer to enter and receive data from a computer system as if it were a particular type of attached terminal.

terminal endpoint identifier (TEI)
A number to identify the endpoint to the ISDN. Normally, assignment of the TEI can be done automatically by the ISDN.

terminal equipment (TE)
In an ISDN, data terminal equipment (DTE) that provides the function necessary for the operation of the access protocols by the user.

terminal equipment 1 (TE1)
Data terminal equipment (DTE) with integrated ISDN support. In an ISDN, the System i system is a TE1. See also terminal equipment 2.

terminal equipment 2 (TE2)
Data terminal equipment (DTE) without an ISDN interface. To communicate with other equipment through an ISDN, this equipment must have the protocol converted to one that can be recognized by the network. For example, a 7820 ISDN terminal adapter may be used. See also terminal equipment 1.

terminal error block (TEB)
Control block that maintains error information associated with terminals, for use by the CICS terminal error program.

terminal error program (TEP)
A user-replaceable CICS program used to handle error conditions that can occur when sequential devices are used. Node error programs must be used for z/OS Communications Server-supported devices. The terminal error program analyzes the cause of the terminal or line error that has been detected by the terminal control program.

terminal file
The resource in a 3270 service project that contains the information necessary for connecting to the host system during build time. Terminal files are automatically generated when the 3270 terminal service project is created. In the Navigator view, if a terminal file is selected, the 3270 terminal service recorder opens in the editor area.

terminal identification (TID)
The first 9 characters of a bank identifier code (BIC).

terminal-initiated transaction routing
Transaction routing that is initiated by a request to start a remote transaction arriving from a terminal. On the basis of an installed resource definition for the transaction and possibly on decisions made in a user-written dynamic transaction routing program, the request is routed to the appropriate remote system. The transaction runs as if the terminal were attached to the transaction-owning system.

terminal input/output area (TIOA)
Area that is set up by storage control and chained to the terminal control table terminal entry (TCTTE) as needed for terminal input/output operations.

terminal list table (TLT)
CICS control table that allows terminal, or operator identifications, or both, to be grouped logically.

terminal map
To translate between a standard character set and a terminal-specific character set.

Terminal Monitor Program (TMP)
The program that manages a Time Sharing Option (TSO) session.

terminal operating system (TOS)
A system that is used to manage assets, labor, and workload planning in supply chain management.

terminal operator
The user of an Emulator High-Level Language Application Programming Interface (EHLLAPI) application program.

terminal-owning region (TOR)
A CICS region which owns most or all of the terminals defined locally. See also application-owning region, data-owning region.

terminal paging
A set of commands for retrieving pages of an oversize output message in any order.

terminal rank function
A rank function that has only scalar arguments.

terminal-related MSDB
A type of main storage database (MSDB) in which each segment is assigned to and owned by one logical terminal (LTERM), the owner with terminal security may alter or update that segment, and a segment may be referenced by someone other than the owner. Terminal-related MSDBs are either fixed ((permitting changes) or dynamic (permitting segment insertion and deletion).

terminal response mode
The type of response mode that suspends all input operations from the terminal until the application program has generated the output message. See also line response mode, response mode.

terminal screen
See screen.

terminal security
The use of system definition macros and security maintenance utility control statements to authorize a particular logical or physical terminal to issue some or all of the operator commands and to send or receive some or all of the currently defined transactions.

Terminal Servlet
A Java program that allows a web browser to act as an emulator for a 3270 CICS application running on any CICS server.

terminal set function
A set function that has only scalar arguments.

terminal type (tty)
A generic device driver for a text display. A tty typically performs input and output on a character-by-character basis.

Terminal User Control Block (TUCB)
A control block containing terminal-specific and user-specific information used for processing messages for display devices such as screen and printers.

To permanently suspend transactions associated with a contract.

terminate-and-stay-resident program (TSR program)
A program that installs part of itself as an extension of DOS when it is executed.

terminate end event
An end event that will stop all parallel activities within its process level and all lower process levels. See also end event.

terminate node
A node that marks the end of a process. When a flow reaches a terminate node while the process is running, the process immediately terminates, even if there are other currently executing flows within the process.

terminate request
In SNA, a request unit that is sent by a logical unit (LU) to its system services control point (SSCP) to cause the SSCP to start a procedure for ending one or more designated LU-LU sessions.

terminating plug
A part that ends the cable path on a computer system. The terminating plug is attached to the last disk, diskette, or tape unit in a series.

termination character
A character that defines the end of a telephone data entry.

termination imminent step
The final step of the three-step condition-handling model. In the termination imminent step, a final chance is provided to handle conditions or to perform cleanup before the thread is terminated. See also condition step, enablement step.

termination notification
A pending event that is activated when a CICS subsystem successfully connects to IBM MQ for z/OS.

termination phase
The extended recovery facility (XRF) phase in which the XRF complex returns to two separate and independent environments and all XRF activity in the alternate system stops.


  1. The part of a program that performs the action necessary to end a job or program.
  2. A syntax object that signifies the end of a data object. For example, a carriage return or line feed at the end of a record might be the record's terminator.

term license
See license.

term placeholder
The representation of a term that serves as a variable within a contract or clause and is populated with a term value. It may have a defined default value or it can be changed by a user. It may be used as a criterion for a search, condition, or event. See also variable.

term value
A specific value that populates a term placeholder. It may be selected from a list of possible values, typed directly as defined in the term placeholder, or provided by the system in the case of a system term.


  1. The designated account set or physical geography where a sales or service employee sells or provides products or services.
  2. A portion of the POSIX locale that is mapped to the territory code for internal processing by the database manager.

territory code
A code that is used by the DB2 database manager to preset the default collation order for an SBCS database and to establish monetary, date, time, and numeric formatting that is specific to a country, region, or territory.

Territory Optimization Program (TOP)
An IBM-wide initiative for designing high-quality sales territories based on market opportunity (identified through the Market Alignment Program (MAP) and augmented by revenue commitment interlocks. See also Market Alignment Program.

The division of a surface into a mesh or network.


  1. A series of actions to run an operation and validate its correctness.
  2. In communications, a data link command or response used to perform a basic test of the station-to-station link connection.

test asset
The information that is used to create, run, and evaluate tests. Test assets include plans, designs, test cases, test logs, and test reports.

test calculation
A feature that calculates the test results for the selected hardfact.

test case

  1. The inputs, execution conditions, and expected results that are used to evaluate an aspect of a system under test.
  2. A set of tasks, scripts, or routines that automate the task of testing software.
  3. A set of input values, execution preconditions, expected results and execution postconditions, developed for a particular objective or test condition, such as to exercise a particular program path or to verify compliance with a specific requirement. (ISTQB)

test case execution record
A record of the execution environments for a specific instance of a test case. One can use this record to run a test case instance and to track the status of each test run.

test condition
A statement that, when taken as a whole, may be either true or false, depending on the circumstances existing at the time the expression is evaluated.

test configuration

  1. A property of the integration test client that is used to specify modules for testing and to control the tests.
  2. A set of characteristics of the system that hosts the system under test. These characteristics affect the conditions for test execution and the evaluation of test results.

test control (TC)
A signal sent by the data terminal equipment (DTE) to the attached data-circuit terminating equipment (DCE) to signal a testing mode.

test data
Data that exists (for example, in a database) before a test is executed, and that affects or is affected by the component or system under test. (ISTQB)

test design specification
A document specifying the test conditions (coverage items) for a test item, the detailed test approach and identifying the associated high level test cases. (ISTQB)

test-driven development (TDD)
In iterative development, the practice of writing test cases before the code and testing frequently during development.

test driver
A software module or application used to invoke a test and, often, provide test data, control and monitor execution, and report test outcomes. A test driver sequences and controls the automated execution of one or more tests.

test environment

  1. An environment containing hardware, instrumentation, simulators, software tools, and other support elements needed to conduct a test. (ISTQB)
  2. A specific instance of a configuration of hardware and software established for the purpose of conducting tests under known and controlled conditions.

test estimation
The calculated approximation of a result related to various aspects of testing (e.g. effort spent, completion date, costs involved, number of test cases, etc.) which is usable even if input data may be incomplete, uncertain, or noisy. (ISTQB)

test fix
A temporary fix that is supplied to specific customers for testing in response to a reported problem. See also fix pack, interim fix, manufacturing refresh, refresh pack.

test harness

  1. A series of script files used to enable a DB2 database for use by the DB2 XML Extender. A test harness is optionally created when a DAD file is generated from a relational database to XML mapping. Once enabled, it tests composing XML from data as well as decomposing XML files into relational data.
  2. For a Netezza user-defined function or aggregate, a test environment that allows you to debug your user-defined objects outside of the Netezza runtime engine.

The stage of model building in which the model produced by the training stage is tested against a data subset for which the outcome is already known. See also model building, training, validation.

testing data
A set of questions and answers that is used to evaluate system metrics after ingestion and training. See also training data.

test key
A key added to a telex message to ensure message integrity and authorized delivery. The test key is an integer value of up to 16 digits, calculated manually or by a test-key processing program using the significant information in the message, such as amounts, currency codes, and the message date.

test-key processing program
A program that automatically calculates and verifies a test key. The Telex Link supports panels for input of test-key-related data and an interface for a test-key processing program.

test library
A user-defined library used for debugging operations that does not contain objects needed for normal processing. See also production library.

test list
A list of email addresses used for testing visual elements, wording, and the links of a mailing before it is sent to the contacts in a database. See also regular database.

test mode

  1. The mode that causes any input message entered into a terminal under test to be returned to the test terminal, with error analysis procedures bypassed.
  2. In printers, the operational mode in which the printer can produce print samples, accept configuration changes, and control traces. For example, when the IBM 3900 Advanced Function Duplex Printing System is in test mode, it is not accepting information from the attached controlling computer system. See also diagnostic mode, print mode.
  3. The mode employed in testing a new user interface, in which the compiled application is used to drive the interface. Allows building, modifying, testing, and refining operations without having to compile, link, and debug.

test pattern
A template used for the automatic generation of component tests. There are several test patterns available for testing both Java and EJB components. See also component test.

test plan
A set of test cases that defines an area of testing.

test policy
A policy that limits the scan to certain categories and types of tests.

test readiness review (TRR)
Review performed by the system engineer (SE) at the end of the develop phase.

Test request
A request sent to the application during the Test stage of the scan. Test requests are designed to reveal security vulnerabilities.

test script

  1. Commonly used to refer to a test procedure specification, especially an automated one. (ISTQB)
  2. A collection of step-by-step instructions that realize a test, enabling its execution. Test scripts may take the form of either documented textual instructions that are executed manually or computer readable instructions that enable automated test execution.

Test stage
The stage of the scan during which the objects and logic of the scanned application are submitted to a comprehensive barrage of typical, erroneous, and simulated-malicious usage techniques, resulting in a complete inventory of security vulnerabilities.

test suite

  1. A collection of test cases that are grouped for execution purposes.
  2. A set of usage scenarios with which the user can verify that business rules are correctly designed and written. Running test suites produces a report comparing the expected results and the actual results obtained when applying rules to the scenarios.
  3. A collection of test cases that define test behavior and control test execution and deployment.

test suite execution record
A record of the execution environments for a specific instance of a test suite. One can use this record to run a test suite instance and to track the status of each test run.

test value
A value used to compare for a specified condition.

test workbench
The user interface and integrated testing environment in tools such as Rational Test Workbench.

To share a network connection by way of a mobile device that shares its connection with other devices over a WiFi connection.

The act of sharing an internet connection with a mobile device.


  1. A Data Collection question that is used for the entry of open-ended data. See also response.
  2. To send a text message.
  3. A finishing item that consists of any alphanumeric or special characters.
  4. A sequence of characters that can be read by a person and encoded into formats such as ASCII that can be interpreted by a computer.

text analysis
The process of extracting semantics and other information from text to enhance the retrievability of data in a collection. See also semantic search.

text analysis engine (TAE)
A software component that is responsible for discovering and representing context and semantic content in text. See also common analysis structure.

text analytics
The process of extracting structured information from unstructured and semi-structured text.

text annotation
An artifact that provides additional textual information about a BPMN diagram.

text attribute
In the GDDM function, characteristics of chart information, such as the color or type style.

text-based scoring
The process of assigning an integer value to a document that signifies the relevance of the document with respect to the terms in a query. A higher integer value signifies a closer match to the query. See also dynamic ranking, static ranking.

text block
An assembly of one or more sections of text, which might include escaped HTML, that is drawn from one or more reporting objects in XBRL.

text box
A box within a dialog box into which a user can type information. The text box may be empty or may contain default information when the dialog box first appears.

text command set
In IPDS architecture, a collection of commands used to present PTOCA text data in a page, page segment, or overlay.

text control
Structured field data that control the format, placement, and appearance of text.

text control chaining
Two or more text controls that use the chain control codes and are started with a single set of control characters. See also control sequence chaining.

text control sequence
A text control and its associated data.

text-coordinate origin
The origin of a composed-text block.

text correction
A substitution method that uses lexical analysis and dictionary support to propose candidates for corrected text, for example: spelling suggestion, search query resolution, and thesaurus lookup.

text cursor
A cursor that indicates where to type a character. The text cursor is controlled by the keyboard.

text data type
A data type for a simple large object that stores text and can be as large as 2^31 bytes.

text direction
A description of the appearance of text as a combination of print direction and character rotation.

text editor
A program used to create, modify, and print or display text files.

text entry
Entry of characters in a free format. Entry of text is generally done to provide information for human comprehension, with or without further machine processing. See also data entry, free format.

text field
A rectangular area in a window where information is typed. Text fields with keyboard focus have a blinking text insertion cursor.

text file
A file that contains only printable characters. See also binary file.

text formatting program
A program that determines the manner in which data will be placed on a page.

text index
In DB2 Net Search Extender, a collection of significant terms extracted from text documents. Each term is associated with the document from which it was extracted.

text index entry
An entry for a document in the text search index database. The text index entry is used by the system to locate documents when doing a text search.

text input mode
The mode in which typed characters are interpreted by an editor as text entered into a file.

text item
In DCF, explicitly marked elements that occur within text, such as within a paragraph unit. In a general document, for example, quotations and phrases are text items.

text line
A line that contains only text.

text lock
A capability that allows the calling process to lock or unlock its text segments into memory.

text message
A message that is sent by a mobile phone to another mobile phone.

text orientation

  1. A description of the appearance of text as a combination of print direction and character rotation.
  2. See global orientation.

text presentation
The transformation of document content and font information into visible form as character shapes on a presentation surface.

text presentation space
In architecture, a two-dimensional conceptual space in which text is generated for presentation on an output medium.

text processing

  1. See word processing.
  2. Pertaining to computer systems, stand-alone devices, and application software products that allow a user to enter, modify, rearrange, format, display, and print out text.

text processing system
In the context of FOCA, the total collection of hardware devices, software, or microcode required to generate, modify, display, and print text.

text programmer

  1. In SCRIPT/VS, the person who writes SCRIPT/VS macros and organizes macro libraries and profile files so that the appropriate composition will be done for each tag.
  2. The person who implements APFs that provide the processing specified by the document administrator.

text search index
In DB2 Text Search, a collection of significant terms extracted from text documents. Each term is associated with the document from which it was extracted.

text search index collection
The smallest unit of a text search index that is managed by the text search server.

text search index database
The database files used by text search services for storing the significant words of documents. These database files are used when a user requests a search of the document library for one or more phrases.

text search index partition
The collection that contains the text search index data from a specific database partition. A text search index is mapped to one or more collections to match the distribution of the data table that hosts the text index.

text search service
The system support that lets office users add, delete, and search for documents in the text search index database.

text segmentation

text shaping
A characteristic of the Arabic script in which characters assume different shapes according to their position in a word and how they connect to surrounding characters.

text stream
In the C language, an ordered sequence of characters where each sequence or line is ended with a new line control sequence and consists of zero or more characters.

text string

  1. A sequence of characters (alphanumeric or special) defined by the user.
  2. A string of graphic characters.

text suppression
The intentional omission of portions of text in copy groups specified in the form definition. See also suppressible text.

text-to-speech (TTS)
The process by which ASCII text data is converted into synthesized speech.

text transparency
In binary synchronous communication (BSC), a method of sending and receiving data containing any or all of the 256 character combinations in EBCDIC in specific bit patterns, including transmission control characters.

text type
See ordering scheme.

textual data
The collective term for menus, displays, lists, prompts, options, online help information, and messages.

textual XML format
A representation of XML data that uses character values, an approach that allows for direct reading by people.

textUI program
A type of EGL program part that interacts with the user by way of a character-based display. The display appears in a 3270 screen or a command window, not in a web browser.

text variable

  1. A variable that contains data that is text, such as names and addresses or responses to open-ended questions.
  2. A symbol whose final value is to be treated only as text.

text widget
A text editor for customizing user interfaces and programmatic interfaces.

See transfer form data.

See time-to-fill.

See temporary file system.

See Trivial File Transfer Protocol.

See transmission group.

See ticket-granting service.


  1. See task global table.
  2. See ticket-granting ticket.

See transmission header.

An operation in which a storage system releases the block of the I/O from the host system to the affected volumes on the primary site. A thaw operation can occur after a freeze operation ends and consistency is formed on the secondary site. See also freeze.


  1. The style element that gives a place a particular look. The portal provides several themes, similar to virtual wallpaper, which can be chosen when creating a place.
  2. A collective set of style sheets that supports the look and feel of the Rational Asset Manager Web client.
  3. The style element that gives a place a particular look. IBM Intelligent Operations Center provides several themes, similar to virtual wallpaper, which can be chosen when creating a place.

theme extraction
A type of concept extraction that automatically recognizes significant vocabulary items in text documents to extract the theme or topic of a document. See also concept extraction.

theme line
An entity representation that shows the interactions of an entity over time. A theme line can be used with event frames. See also diverted theme line, representation.

theme line extent
The distance between the beginning and end of a theme line

theme line wiring
The manner in which a theme line diverts from a horizontal trajectory in order to pass through and travel between event frames.

thick disk
A provisioning format that requires an application to reserve a finite amount of data-storage space before attempting to save any information.

thin application client
A lightweight, downloadable Java application run time capable of interacting with enterprise beans.

thin client
A client that has little or no installed software but has access to software that is managed and delivered by network servers that are attached to it. A thin client is an alternative to a full-function client such as a workstation. See also rich client.

Thin Console
An appliance that provides a 5250-based operating system console for the IBM i operating system. This appliance connects directly to the server using one of the HMC Ethernet ports (labeled HMC 1 and HMC 2) on the back of the server.

thin disk
A provisioning format that allows an application to dynamically request data-storage space only when it is attempting to save information.

think time
The time that a human takes to initiate a request after a response to a previous request has been displayed.

thin-provisioned volume
A volume that allocates storage when data is written to it.

thin provisioning

  1. A mechanism that provides the ability to define logical volume sizes that are larger than the physical capacity installed on the system.
  2. The ability to define a storage unit (full system, storage pool, volume) with a logical capacity size that is larger than the physical capacity assigned to that storage unit. See also volume.

third-generation language (3GL)
A high-level programming language that was designed to run on the third generation of computer processors, built on integrated circuit technology roughly from 1965 to 1970. C, FORTRAN, Basic and Pascal are examples of third-generation languages still in use today.

Pertaining to a product or service that is provided by a company other than IBM.

third party
A company that manufactures and sells applications for use with a major manufacturer's computer or peripherals, usually without any involvement from the major manufacturer.

third-party certificate
A digital certificate that identifies an organization other than those preconfigured for the system.

third-party data source
Data, information, and services that are not owned by IBM and that are accessed using feeds, web services, or another remote access method. Examples of third party data sources are Google Maps service, Google gadgets, AccuWeather, and Yahoo News.

third-party logistics (3PL)
A company that provides a range of out-sourced services such as warehousing, transportation, and contract manufacturing.

third-party logistics provider (3PL)
An organization that manages shipping and other logistics services for customers.

third party maintenance (TPM)

third-party network
See value-added network.

third-party plug-in
In System i Navigator, the support that allows users to install software from different vendors.

See target library high-level qualifier.

thousands of power-on hours (KPOH)
A unit of time used to measure the mean time between failures (MTBF).

thousands separator

  1. The local symbol used to separate every third digit in large numbers or lengthy decimal fractions.
  2. The character (comma in the United States) placed every third number starting left of the decimal point. For example, three thousands separators are used in the number: 641,322,974,821.

A condition, caused by a high level of memory over-commitment, in which the system is spending all of its time writing out virtual-memory pages and reading them back in. The application programs make no progress because their pages don't stay in memory long enough to be used. Memory load control is intended to avoid or stop thrashing.


  1. The DB2 structure that describes the connection of an application, traces its progress, processes resource functions, and delimits its accessibility to DB2 resources and services. Most DB2 functions execute under a thread structure.
  2. A stream of computer instructions that is in control of a process. In some operating systems, a thread is the smallest unit of operation in a process. Several threads can run concurrently, performing different jobs. See also user thread.
  3. See message thread.

Pertaining to the ability to create threads.

thread contention
A condition in which a thread is waiting for a lock or object that another thread holds.

threaded application
An application that performs its function by simultaneously using multiple execution paths (threads of control) within a single address space.

thread handle
In DCE Remote Procedure Call (RPC), a data item that enables threads to share a storage management environment.

thread ID
The unique integral number that can be used to identify a thread. Thread ID is sometimes used to describe the pthread_t data type that represents the abstraction to a thread.


  1. In printers, passing paper by hand through the paper path.
  2. The process whereby various transactions undergo concurrent execution.

thread local storage

  1. A mechanism that allows each thread in a multithread process to allocate storage for its corresponding data.
  2. See thread-specific storage.

thread pool
The threads that are being used by or are available to a computer program.

thread private storage
See thread-specific storage.


  1. Pertaining to user-written code or CICS functions that use appropriate serialization techniques to maintain the integrity of resources that are being used by other tasks at the same time.
  2. Pertaining to a function, macro, or operating system service that can be called from multiple threads in a process at the same time. See also multithreaded application, reentrant code, thread unsafe.

thread-specific storage
Storage that is not shared among threads, but can be accessed by all functions within that thread.

thread synchronization
The ability to synchronize the activities of various threads. A thread synchronizes itself with another thread by putting itself to sleep. Before doing so, the thread notifies the operating system as to what event has to occur in order for the thread to resume execution.

thread unsafe
Pertaining to a function, macro, or operating system service that cannot be called from multiple threads in a process at the same time. See also threadsafe.

A security issue, or a harmful act, such as the deployment of a virus or illegal network penetration.

threat class
A group of security issues, classed together by WASC-TC categories. For each threat class, there are numerous specific tests; and for each test, numerous variants.

three-bit byte
See triplet.

three-dimensional concurrent engineering (3DCE)
A way of improving the design of a product, process, and supply chain through outcomes such as reduced time to market, lower costs, and improved customer acceptance.

three-part name
The full name of a table, view, or alias that consists of a location name, an authorization identifier, and an object name, separated by periods.


  1. A setting that applies to an interrupt in a simulation that defines when a process simulation should be halted based on a condition existing for a specified proportion of occurrences of some event.
  2. A specified percentage of licenses; if more than this percentage of licenses for a product are in use, messages about the level of use are logged.
  3. A user-defined entity that establishes a condition or boundary that, if exceeded, causes the data server to take a prescribed set of actions. See also workload definition.
  4. In OSI, a user-specified value that determines the frequency with which events will be reported. For example, if a certain error threshold is set at 10, the error will not be reported until the tenth occurrence of the error.
  5. A specified limit that defines when a maintenance task must be performed. See also interval.
  6. A customizable value for defining acceptable tolerance limits (maximum, minimum, or reference limit).
  7. A customizable value for defining the acceptable tolerance limits (maximum, minimum, or reference limit) for an application resource or system resource. When the measured value of the resource is greater than the maximum value, less than the minimum value, or equal to the reference value, an exception or event is raised. See also performance threshold.
  8. A storage group attribute that controls the space usage on direct access storage device (DASD) volumes, which is defined as a percentage of occupied tracks versus total tracks.
  9. A predefined value per metric that is used to compare data points.
  10. A level that is set on the Director server to define the configuration status of the monitored systems.
  11. A level set in the system at which a message is sent or an error-handling program is called. For example, in a user auxiliary storage pool, the user can set the threshold level in the system values, and the system notifies the system operator when that level is reached.

threshold analysis
In Backup, Recovery, and Media Services, the comparison of actual media statistics to standard industry statistics for that media.

threshold definition domain
The object that a threshold is associated with and whose activities are monitored to ensure that the threshold condition is not exceeded. A threshold affects only activities within its domain.

threshold enforcement scope
The area for which a threshold is both monitored and enforced for activities to which the threshold has been applied. Examples of this area include a workload occurrence, a database partition, or a database.

threshold event
In OSI, an event that occurs when a counter has reached its user-specified threshold. OSI Communications Subsystem logs threshold events and generates messages to the operator about these events.

threshold migration
The process of moving files from a local file system to server storage based on the high and low thresholds that are defined for the file system. See also automatic migration, demand migration, migration job, selective migration.

threshold record
A record that contains the definitions of the targets and provides a basis for evaluating the operational performance against objectives.

threshold value
In the capacity planning tool, a value used as a general guide for optimal resource utilization. If resource utilization is above the threshold value, the resource performance may be unacceptable. Threshold values are also available for the rate of synchronous reads in the machine pool and for the sum of all pools. See also guideline value.

The act of cutting off or reducing input or output.

throttled utility
A utility that has a limit placed on the resources that would otherwise be consumed. The degree to which the resources are limited is based on the current workload of the system. Supported utilities include backup, restore, and table space reorganization.

throttle threshold
A threshold where the system stops accepting new connections. See also kill threshold.


  1. A method of managing system performance by scheduling or preventing certain processes or groups of processes from running to avoid too high a demand on system resources at any time. See also throttling group.
  2. A method of regulating the amount of mailings that are sent per hour.

throttling group
A collection of processes, such as flowchart runs or mailings, that are grouped so that the run times can be controlled together to prevent the processes from placing too high a demand on the system. See also throttling.


  1. In data communications, the total traffic between stations over a period of time.
  2. A measure of the amount of information transmitted over a network in a given period of time. Throughput is generally measured in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps). See also aggregate bandwidth.
  3. In storage management, the total bytes in the workload, excluding overhead, that are backed up or restored, divided by elapsed time.
  4. The measure of the amount of work performed by a device, such as a computer or printer, over a period of time, for example, number of jobs per day.

throughput class negotiation

  1. In OSI, a network layer facility that selects the speed with which data transmission requests are to be handled.
  2. In X.25, a packet-switching data network optional facility that allows the data terminal equipment (DTE) to negotiate the speed at which its packets travel through the packet-switching data network.

throughput rate
The data processing work successfully completed per unit of time.

In architecture, a line parallel to the baseline and placed through the character.

In programming languages, to pass an error or exception to a handling routine.

throwing message intermediate event
An intermediate event that sends a message. See also intermediate event.

An icon-sized rendering of a larger graphic image that permits a user to preview the image without opening a view or graphical editor.

In System i Access, the process that occurs when a 32-bit application calls a 32-bit application programming interface that is implemented by a 16-bit component of the system.

See tebibyte.


  1. See token-ring interface coupler.
  2. See trunk interface card.

In Business Graphics Utility, a reference point on either the vertical or horizontal axis of some chart types that represents the location of specified data values.


  1. A formal record of identified issues or requests that are created against an item and assigned to appropriate users to resolve those issues or complete the requests.
  2. A record, such as a service request, incident, or problem report, that can be routed and assigned a status.
  3. A mechanism for securely transmitting the identity of a client to a server.

ticket-granting server
A part of the key distribution center (KDC) that generates service tickets. A principal presents a ticket-granting ticket to the ticket-granting server when the principal requests a service ticket. The ticket-granting server uses the ticket-granting ticket to verify that the principal has authenticated to the authentication server before it grants the request for a service ticket.

ticket-granting service (TGS)
A service provided by the key distribution center (KDC) that issues service tickets.

ticket-granting ticket (TGT)

  1. A ticket that allows access to the ticket granting service on the key distribution center (KDC). Ticket granting tickets are passed to the principal by the KDC after the principal has completed a successful request. In a Windows 2000 environment, a user logs on to the network and the KDC will verify the principal's name and encrypted password and then send a ticket granting ticket to the user.
  2. A ticket that a principal passes to the ticket-granting server when a service ticket is requested. The ticket-granting service uses the ticket-granting ticket to verify that the principal has authenticated to the authentication server before it grants the request for the service ticket.

Applying special customer tickets or labels to cartons prior to shipping to comply with customer requirements. See also value-added service.

tick time
The interval of time that defines the basic system tick.

tick timer
A timer used by the operating system factory for real-time modeling.


  1. See transaction identifier.
  2. See terminal identification.


  1. A situation where a domain or group has exactly half of the defined quorum members. If a quorum is not explicitly defined, all members are considered to be quorum members. See also quorum, tiebreaker.
  2. The interval between cuts of a perforation.

See technical information exchange.

A monitoring resource that determines how tie situations are resolved. See also tie.


  1. A group of servers that share a function in an application.
  2. A group of layers that define the tasks and execution order to provision a specific group of nodes. Layers can consist of pre-provision script templates, post-provision script templates, and server templates.
  3. A group of appliances that perform a specific function; for example, Gateway tier. A tier is made up of one of more nodes; for example, the Gateway tier consists of one or more IBM WebSphere DataPower nodes.
  4. The logical group of components and the computers on which those components are installed.

tiered entry workload license charge (TWLC)

tiered order
An order that is created from or is the result of another order's line.

tiered pricing
A pricing scheme whereby the price of a product is determined by the order quantity. Specified quantity ranges each have set prices, which are per-unit.

tiered SLA
A service level agreement (SLA) that includes an offering containing at least one previously deployed SLA. They can be used to include the results of operational level agreements, internal SLAs or outsourced SLAs, in an external SLA that are supplied to a customer.

The process of placing candidates in categories to help a recruiter organize their candidates.

tie-up record (TUR)
In the CICS backup while open (BWO) facility, a record in the forward recovery journal that associates a file name with a data set name.

See Tagged Image File Format.

See Tag Image File Format-Fax.

tight loop
A loop in a single program that never returns control to the program or operating system.

tightly coupled analysis engine
An aggregate analysis engine whose component analysis engines run in the same address space. See also analysis engine.

tightly coupled multiprocessing
A type of processing in which two computing systems operate simultaneously under one control program while sharing resources.

One of the accent marks in Latin script (~). See also ogonek.


  1. See pixel map.
  2. A visual representation of a running application that provides status on a dashboard.
  3. To replicate a pixmap in two dimensions.
  4. To fill a region with a pixmap.

A three-part value that designates a time of day in hours, minutes, and seconds. See also timestamp.

time-based partitioned cube
A cube that combines multiple time-segmented PowerCubes based on the structural information in a control cube.

time-based retention
Maintenance of a document in the archive for a period that starts on the date of ingest.

time-based schedule
A schedule that triggers job execution at a specified time or date. For example, a time-based schedule may run a job at 5:00 pm every Thursday.

time-based update detection
A means of determining when rows were last updated, using the ROW CHANGE TIMESTAMP expression.

A time management technique in which a project is divided into a number of separate time periods, or time boxes.

time cannibalization
See pantry loading.

time code
A code that is used by resources in the timesheet module to classify reported time.

time-delayed rule
The delay before an event rule or event rule group is evaluated.

time dependent
Pertaining to a system that attempts to start operations as soon as possible, when all dependencies have been resolved and processing resources are available.

time differential factor (TDF)
In the DCE Distributed Time Service (DTS), the difference between coordinated universal time (UTC) and the time in a particular time zone.

time dimension
Data analysis that is based on dimensions and measures of spend.

time-division multiplex bus
A method of transmitting many channels of data over a smaller number of physical connections by multiplexing the data into timeslots, and demultiplexing at the receiving end. In this document one such channel can be considered to be a half-duplex unidirectional stream of 64 kilobits per second.

time duration

  1. A time span marked by a start date and an end date that is used to identify an activity over a specific time.
  2. A DECIMAL (6,0) value that represents a number of hours, minutes, and seconds.

time horizon
The duration of a product promotion or product scenario.

time-independent messaging
See asynchronous messaging.


  1. In social networking, a sequential collection of activities, photos, and bookmarklets that make up a profile
  2. An area of activity in a project that typically has its own schedule, deliverables, teams, and process.
  3. A list display that is used to textually show events in the map landscape. Events are sortable by description, crime type, start date, and end date.

timeline chart
A chart or a portion of a chart that shows a chronology of events. For example, a series of meetings that occur over several days, or a set of transactions that occur over a period of time.

timeline view
A graphical view in the job scheduling console used to modify and maintain job stream instance time restrictions. See also job scheduling console, time restriction.

A specific period of time that is allowed by the Telnet server to verify that a connection is still active.

time-of-day clock (TOD clock)
A timing device that counts units of time based on the starting point of 00 hours, 00 minutes, and 00 seconds on January 1, 1900. Time-of-day (TOD) information is used to monitor computer operations and events. See also time tolerance.


  1. A time interval that is allotted for an event to occur or complete before operation is interrupted.
  2. An event that occurs at the end of a predetermined period of time that began at the occurrence of another specified event.
  3. Abnormal termination of either an application or the DB2 for z/OS subsystem because of the unavailability of resources.
  4. A specified time interval during which a primary participant must approve a document.

time provider (TP)
In the DCE Distributed Time Service (DTS), a process that queries coordinated universal time (UTC) from a hardware device and provides it to the server.

time provider interface (TPI)
In the DCE Distributed Time Service (DTS), an interface between the DTS server and external time provider process.


  1. A task that produces output at certain points in time.
  2. A BTS object that expires when the system time becomes greater than a specified time, or after a specified period has elapsed. When a timer is defined, a timer event is automatically associated with it. When the timer expires, its associated event fires.
  3. An event that is triggered by an occurrence at a specific time.

timer domain
Major component of CICS that provides interval timing and alarm clock services for CICS domains. These are processes that cause an action to occur at some predetermined future time. This service can be performed after a specific interval, at periodic intervals, at a specified time of day, or at a specific time of day every day. It also provides date and time provision and conversion facilities.

time restriction
A restriction that determines the times before which, after which, or both, that a job or job stream cannot be run. Specifying both defines a time frame within which a job or job stream runs. Jobs can also have a repetition rate. For example, IBM Workload Scheduler can launch the same job every 30 minutes between the hours of 8:30 a.m. and 1:30 p.m. See also duration, timeline view.

timer event

  1. An atomic event that fires when its associated timer expires. See also user-defined event.
  2. An event that is triggered when a time condition is satisfied. See also intermediate event.

timer intermediate event
An intermediate event that is triggered when a time condition is satisfied. A timer intermediate event can delay the flow of the process or can generate a timeout for activities that exceed the time condition.

A unit of measurement used to give a rough relative estimate of the resources required, or the cost, for the database server to execute two plans for the same query. The resources calculated in the estimate include weighted processor and I/O costs.

timer queue
A logical queue in the transmission control queue that contains processes waiting for a start time before they move to the wait queue for scheduling.

timer-related event
A CICS interval control function that is used to support events that are delayed, suspended, or restarted after a time interval.

timer start event
A start event that is triggered when a time condition is satisfied. A timer start event is used only for event subprocesses. See also start event.

timer task
A background program that does one of various functions, such as indexing uploaded documents, sending notices to collection and hold targets, or generating and publishing reports.

timer task framework
A mechanism that starts the individual timer tasks.

timer task log
A file where timer task events are recorded.

timer task watchdog
A timer task that ensures the timer task framework is running.

time series

  1. A set of time-stamped data that consists of measurements taken at different times. Examples of time series data time include electricity usage that is collected from smart meters and stock trading activity. See also irregular time series, regular time series. See also irregular time series, regular time series.
  2. A set of values of a variable at periodic points in time.

time series analysis
A set of data analysis techniques that involve taking measurements on the same unit at regular time intervals in order to predict future measurements or events. See also AutoRegressive Integrated Moving Average, exponential smoothing, seasonality.

time series chart
A graphical representation of network connections over time.

TimeSeries solution
Technology built in to the Informix database server for managing time series data efficiently.

time sharing
Sharing computer time and resources.

Time Sharing Option (TSO)
A base element of the z/OS operating system with which users can interactively work with the system. See also Interactive System Productivity Facility.

Time Sharing Option Extensions (TSO/E)
A licensed program that is based on Time Sharing Option (TSO). With TSO/E, z/OS users can interactively share computer time and resources.

Time Sharing Option single point of control (TSO SPOC)
An IBM-supplied application from which a user can manage operations of all IMS systems within an IMSplex.

Record of time employed by resources on project and non-project related activities.

time slice

  1. The interval between scheduled checks by the CPU scheduler to see if a different thread should be dispatched. Unscheduled checks may occur as a result of interrupts or system calls.
  2. The amount of processor time (specified in milliseconds) allowed for a job before other waiting jobs of equal priority are allowed to process data.

time slicing
A mechanism that preempts running threads at fixed intervals. This ensures that every thread is allowed time to execute.

time slot
The smallest switchable data unit on a data bus, consisting of eight consecutive bits of data. One time slot is equivalent to a data path with a bandwidth of 64 kilobits per second.

A seven-part value that consists of date and time. The timestamp is expressed in years, months, days, hours, minutes, seconds, and fractional seconds. See also date, time.

time stamp
The value of an object that indicates the system time at some critical point in the object's history.

timestamp duration
A DECIMAL (20,6) value that represents a number of years, months, days, hours, minutes, seconds, and microseconds.

timestamp with time zone
A two-part value that consists of a timestamp and time zone. The timestamp with time zone is expressed in years, months, days, hours, minutes, seconds, microseconds, time zone hours, and time zone minutes.

time-state measure
A measure that represents the state of a system at a specific point in time. For example, a time-state measure might show the number of employees in a company at the start of each month, or the product inventory on a given day for each week. A time-state measure can be aggregated by operations, such as totaling across other dimensions, but not across time.

A schedule of times. In business process modeling, timetables are typically associated with resources or costs. For resources, timetables indicate availability (such as Monday to Friday). For costs, timetables are useful if the cost varies with time of day (such as electricity) or time of year (such as seasonal foods).

time-to-fill (TFF)
A standard recruitment metric that measures the time taken to identify a hire against an open requisition. The parameters for time-to-fill varies by customer. For example, customers may stop the time-to-fill “clock” once an offer is accepted, once pre-employment screening has been cleared, or once a new hire starts in the role.

time tolerance
The difference between the TOD clocks on two adjacent nodes, beyond which the path manager will not allow a session to be established. See also time-of-day clock.

time to live (TTL)

  1. A technique used by best-effort delivery protocols to inhibit endlessly looping packets. The packet is discarded if the TTL counter reaches 0.
  2. The time interval in seconds that an entry can exist in the cache before that entry is discarded.

time-to-market (TTM)
The period of time, from conception to release, that it takes for a product to be sold.

time-triggered transaction
A transaction that is executed at scheduled intervals.

time variance (TV)
The difference between budgeted cost of work performed (BCWP) and budgeted cost of work scheduled (BCWS) in weeks.

time variance at completion (TEAC)
Schedule at completion divided by schedule performance index.

time window
A time-related filter that is used to control how long dispatches persist in the Dashboard map landscape.

time zone support
A feature of Tivoli Workload Scheduler for z/OS that lets applications be planned and run with respect to the local time of the processor running the application. The controlling processor makes allowances for differences in time zones during planning activities to ensure that interacting activities are correctly coordinated.

See technology-independent machine interface.

timing constraint
A specialized validation action used to measure the duration of a method call or a sequence of method calls. See also validation action.

In architecture, a variation of a color produced by mixing it with white.

tiny project
A small coding project that typically takes less than one person year and is intended to deliver new function.

See terminal input/output area.

The current working version of a process application or toolkit.


  1. In OSI, a permanent identifier for an object.
  2. The part of a personal name that represents a social, religious, or academic status, such as "Dr.," "Ms.," or "Colonel." A title is an optional part of a personal name that typically precedes given names. For name-matching purposes, a title is considered to be a peripheral or minor part of a personal name. See also honorific, title, affix, and qualifier.

title, affix, and qualifier (TAQ)
A name token that often helps identify that a string of text represents a name. While these tokens usually indicate something about the name, only affixes are part of the actual name. See also affix, qualifier, title.

title bar
The area at the top of each window that can contain the system-menu symbol, the name of the window, and the maximize, minimize, and restore buttons.

title-oriented document (TOD)
A document which contains content that supports its title, such as a Wikipedia article.

Tivoli common directory
A common directory where Tivoli programs store message logs, event logs, or trace logs in XML format, for subsequent filtering by the Tivoli XML Log Viewer utility. See also log viewer, Tivoli XML log format.

Tivoli desktop
In the Tivoli environment, the desktop that system administrators use to manage their network computing environments.

Tivoli GUID
A globally unique identifier (GUID) that identifies a managed object in a Tivoli environment. The Tivoli GUID is a type 1 GUID.

Tivoli management region (TMR)
See Tivoli region.

Tivoli Performance Viewer
A Java client that retrieves the Performance Monitoring Infrastructure (PMI) data from an application server and displays it in various formats.

Tivoli Presentation Services Web Component Library (WCL)
An Integrated Solutions Console technology that includes a foundation layer and a set of reusable web components that enable developers to create scalable and extendable user-interface components for web applications.

Tivoli region
The Tivoli server and the set of managed node gateways and endpoints that it serves. An organization can have more than one region. A Tivoli region addresses the physical connectivity of resources, whereas a policy region addresses the logical organization of resources.

Tivoli Space Manager
A feature of the Tivoli Storage Manager product that handles the moving of files in and out of a secondary storage medium based upon actual file accesses in the primary native file system. This feature can be used with DB2 Data Links Manager to enable DATALINK files to be stored in a virtually infinitely sized file system.

Tivoli Storage Manager
A client/server product that provides storage management and data access services in a heterogeneous environment. Tivoli Storage Manager supports various communication methods, provides administrative facilities to manage the backup and storage of files, and provides facilities for scheduling backups.

Tivoli Storage Manager command script
A sequence of Tivoli Storage Manager administrative commands that are stored in the database of the Tivoli Storage Manager server. The script can run from any interface to the server. The script can include substitution for command parameters and conditional logic. See also macro file, script.

Tivoli XML log format
A common format for storing message logs, event logs, or trace logs for subsequent filtering by the Tivoli XML Log Viewer utility. See also log viewer, Tivoli common directory.

An open source mobile Linux operating system. Tizen is the replacement for MeeGo and completely backwards compatible. See also MeeGo, mobile operating system.

See Trusted Key Entry.

See top level aggregate analysis engine.

TLA file
A file of a recorded session that can be exported and replayed with Tealeaf replay tools. The TLA file includes data in json format that communicates to IBM Tealeaf clients a visitor's journey through the business's website.

See translation lookaside buffer.

TLB miss
A memory delay that occurs when a memory location is referenced and the page that contains that memory location does not have an entry in the appropriate transition lookaside buffer (instruction or data).

See Transport Layer Interface.

See target library.


  1. See Transport Layer Security.
  2. See thread local storage.

See terminal list table.

See traffic management center.

TM database
See Transaction Manager database.

See target member.

See Transaction Manager Facility.

See trigger monitor interface.

See Terminal Monitor Program.

See Tivoli management region.

See Transport Manager Subsystem.

A standard protocol for transmitting 3270 data streams over Telnet.

TN3270E Server
A component of Communications Server that enables a TCP/IP client workstation to communicate with an SNA-based host application by transmitting 3270 datastream information over a TCP/IP connection.

to complete performance index (TCPI)
The difference between budget at completion and budgeted cost of work performed divided by the difference between budgeted at completion and actual cost of work performed.

See title-oriented document.

TOD clock
See time-of-day clock.

to-do list
A collection of outstanding activities.

See tokenized form.


  1. To switch between two modes on a computer or network; for example, to switch between data entry and command entry modes or between stand-alone operation and device emulation.
  2. In printers, to switch between options by selecting and reselecting the same button, key, or field. Often toggling turns a selection on or off.
  3. Pertaining to any device having two stable states.
  4. Pertaining to a switching device, such as a toggle key on a keyboard, that allows a user to switch between two types of operations.

toggle button
A button that represents a setting with two states.

toggle key
A keyboard key that is activated when it is pressed once, and deactivated when it is pressed a second time.


  1. A real or virtual device that stores cryptographic data objects such as keys and digital certificates.
  2. A value passed as a parameter for the purpose of uniquely identifying objects.
  3. A particular message or bit pattern that signifies permission or temporary control to transmit over a network. See also assertion.
  4. A marker that progresses through a process instance and indicates which element is currently running. A process instance can generate several tokens. A token can take only one path.
  5. In OSI, an attribute of a connection. The token is dynamically assigned to one session-service user at a time to permit certain services to be called. Tokens are a session layer concept.
  6. The basic syntactic unit of a computing language. A token consists of one or more characters, excluding the blank character and excluding characters within a string constant or delimited identifier.
  7. In checkpoint processing, an identifier that is used to determine checkpoint I/O status.
  8. The basic textual units that are indexed by enterprise search. Tokens can be the words in a language or other units of text that are appropriate for indexing. See also lexical parsing item.
  9. A syntactic element, such as a phrase, a word, or a set of one or more characters, that is used for analyzing and processing text. See also parsing, separation character, strip character, tokenization, value.

A mechanism that controls data flow. As an application requests permission into a network, the token bucket adds characters (or tokens) into a buffer (or bucket). If enough room is available for all the tokens in the bucket, the application is allowed to enter the network.

token endpoint
In the OAuth protocol, the HTTP resource that the client uses to exchange an authorization grant for an access token.

token highlighting
A function of CoOperative Development Environment/400 that allows a user to view different programming language tokens in different colors or type styles.


  1. The process that segments data into tokens. See also parsing, token.
  2. The process of replacing sensitive data, such as a credit card number, with a unique token. The sensitive data is stored securely in an external vault. The only way to return the token to its original value is to contact the external vault system.

tokenized form (TOF)
A storage area where messages are stored so that their fields can be accessed directly by their field names and other index information.

A text segmentation program that scans text and determines if and when a series of characters can be recognized as a token.

token license
A licensing model in which each product requires a predefined number of tokens for each active user or license feature. See also floating license.

token management
A system for controlling file access in which each application performing a read or write operation is granted some form of access to a specific block of file data. Token management provides data consistency and controls conflicts. Token management has two components: the token management server and the token management function.

token management function
A component of token management that requests tokens from the token management server. The token management function is located on each cluster node.

token management server
A component of token management that controls tokens relating to the operation of the file system. The token management server is located at the file-system manager node.

token name
An 8-byte name that can be given to all internal objects and resource objects.

token number
A nonnegative integer that represents the name of a token.

token ring
According to IEEE 802.5, network technology that controls media access by passing a token (special packet or frame) between media-attached stations. See also local area network.

token-ring interface coupler (TIC)
An adapter that can connect IBM Communication Controller to an IBM Token-Ring Network.

token-ring network
A local area network that connects devices in a ring topology and allows unidirectional data transmission between devices by a token-passing procedure. A device must receive a token before it can transmit data. See also local area network.

token type
In CoOperative Development Environment/400, a token or set of tokens having a similar characteristic or function, and assigned the same display attributes by the CoOperative Development Environment/400 program.


  1. An acceptable value or value range for a specified output value.
  2. A specified time period before or after a deadline during which tasks must be completed.
  3. See benchmark.
  4. The extent to which a supplier is risk averse. It is a value that is tolerable but one that poses a potential risk at the time of assessment.

tolerance limit
A configured value that specifies the variance that is allowed on a specified performance requirement. For example, the number of days that are allowed to lapse after the expected ship date or the requested ship date; if the days exceed the tolerance limit, an event is raised.

tolerance result
A result that is derived when an assessment value lies outside the target threshold and within the defined tolerance threshold.

toleration maintenance
A form of maintenance that is needed to ensure an upgraded system can be restored to its older version. Toleration maintenance should be researched, installed on a test platform, and tested thoroughly before being installed on any production system.

tombstone object
A small subset of attributes of a deleted object. The tombstone object is retained for a specified period, and at the end of the specified period, the tombstone object is permanently deleted.

An audible signal sent across a telephone network. There are single (one-frequency) tones, tritones (three sequential tones at different frequencies), dual tones (two simultaneous tones at different frequencies), and dual sequential tones. Each has a different meaning.

In architecture, containing marking agents such as toner or ink. See also untoned.

In a printer, the material that forms the image on the paper or other media during electrostatic processes.

A vehicle or instrument that is required to perform a specific type of utility job.

In a graphical user interface, a horizontal row or a vertical column of buttons used to select desktop or application functions.

In a graphical user interface, a container that provides a graphical way of grouping tasks.

Toolbox for Java
See IBM Toolbox for Java.

toolbox talk
A presentation that is given to inform employees about safety procedures. Toolbox talks are important for communicating safety procedures as well as for sharing information between the members of the team who are charged with carrying out the tasks that are associated with permits to work.

A collection of programs or tools used to develop a product.


  1. A collection of artifacts that are organized into a package. A toolkit includes one or more namespaces, which contain the functions, operators, and types that are packaged as part of the toolkit, all of which can then be reused in other applications.
  2. A container where artifacts can be stored for reuse by process applications or other toolkits.
  3. A set of development tools used to write and test software applications.

tool qualification
A required license or skill that is needed to operate the tool.

tools as a service (TaaS)
The delivery of software development tools through the cloud as units of service.

A form of user assistance that is displayed when a cursor is moved over a graphical image, such as an icon, that does not otherwise have a label. A tooltip provides a brief, plain text description of function. See also hover help.

See Territory Optimization Program.

top category
In an online catalog, a category of items that has no parent.

Describing a problem solving approach that starts at the highest level of abstraction and proceeds toward the lowest level.

top-down development
In web services, the process of developing a service from a Web Services Description Language (WSDL) file. See also bottom-up development.

top-down mapping
An approach for mapping enterprise beans to database tables, in which existing enterprise beans and their design determines the database design.


  1. Logical channel of communication between one or more transmitters and one or more receivers.
  2. A single web page at any level within an information center hierarchy.
  3. A character string that describes the nature of the data that is being published in a publish/subscribe system.
  4. An item for discussion within a forum.
  5. In dynamic data exchange (DDE), the data that is to be exchanged within a DDE conversation.
  6. A type of message destination for which all active subscribers receive the message.
  7. An independent unit of information that follows the rules for a specific information type and that is meaningful when it is displayed alone.

topic collection

  1. A functional group of web pages. A topic collection can be a grouping at any level within an information center hierarchy.
  2. A set of closely related topics that is presented in a standard hierarchy within an information unit.

topic connection factory
An interface used by a Java application to create topic connection objects. These objects allow messages to be placed on that topic. It is used by the JMS Listener to retrieve messages from the topic.

topic host routing
An option for routing publications in a publish/subscribe cluster. With topic host routing, only selected cluster queue managers host the topic definitions. Publications from non-hosting queue managers are routed through the hosting queue managers to any queue manager in the cluster with a matching subscription.

topic pane

top level aggregate analysis engine (TLA)
An analysis engine made up of multiple subcomponent analysis engines arranged in a flow. The flow can be one of the built-in UIMA flows, or a custom flow provided by the user.

top-level widget
In AIXwindows and Enhanced X-Windows, widget classes that are at or near the top level of the object class hierarchy, which is known as the Core class.

top-level window
In AIXwindows and Enhanced X-Windows, the main window that contains all other windows associated with a client application.

top margin
On a page, the space between the body or running heading and the top edge of the page.

top N analytics
Data analysis of the top or bottom N records in a dimension for the specified measure or count, where N is a number or percentage.

top off
To add orders to a shipment to build a larger load.

top-off replenishment
A strategy of replenishment which complements min-max replenishment. Top-off replenishment is also driven by inventory in reserved locations. However, instead of creating replenishment tasks if the inventory falls below a minimum (trigger) level, the system creates replenishment tasks if the inventory falls below the maximum (cap) level. See also min-max.

top-of-rack switch (TOR switch)
A network switch that is located in the first rack of an IBM System z BladeCenter Extension (zBX). See also intraensemble data network TOR switch, management TOR switch.

topological sort
A sorting file that sorts an unordered list of ordered pairs.


  1. A graphical breakdown of a transaction displayed in an hierarchical arrangement of software components and transactions.
  2. The physical or logical mapping of the location of networking components or nodes within a network. Common network topologies include bus, ring, star, and tree.
  3. The cluster layout and connections, as well as cluster, node, network, and network interface information.
  4. An inventory of CICS and CICSPlex SM resources, and a map of their relationships. CICSPlex SM supports the definition of resource and system topology.
  5. The physical or logical mapping of the location of networking components or nodes within a network.
  6. The mapping of slices of a database to individual disks, mirroring assignments between disks, spare disks, and to SPU ownership for the active data slices.
  7. In fibre-channel technology, the configuration of the fibre-channel network and the resulting communication paths allowed. Possible topologies are point-to-point, switched fabric, and arbitrated loop.
  8. A graphical view of a configured item and its relationships.

topology and routing services (TRS)
An APPN control point component that manages the topology database and computes routes.

topology database update (TDU)
A message about a new or changed link or node that is broadcast among APPN network nodes to maintain the network topology database, which is fully replicated in each network node. TDU messages contain identifying information, node and link characteristics, and resource sequence numbers to identify the most recent updates for each of the resources described in the TDU.

topology definition
A named subset of CICS and CICSPlex SM resources. Topology definitions are user-created and can include CICSplexes, CICS systems, and CICS system groups.

topology graph
A graph that describes subnets, devices, and firewalls.

topology manager
A function of the Managed System Services program that is responsible for collecting topology information from nodes and clients in the network. The topology manager can reside on any system in the network; however, this system is most likely to be the central site system.

topology model
A virtual representation of the arrangement of network assets that is used to simulate an attack.

Topology Services
A component of CICSPlex SM that is responsible for maintaining topology information about CICSplexes and resources, and making it available to other CICSPlex SM components.

topology subnetwork
A group of APPN nodes that share a common topology database.

top report
A favorite tabulation, bookmark, dashboard, or analytics report that is marked by the user for recurring usage, and can be stored under different categories.

top shadow
In AIXwindows, a narrow band of lighter color that is located across the top of a rectangular graphical object (a widget or gadget). The top shadow creates a three-dimensional appearance when the object is manipulated.

See terminal-owning region.

TOR switch
See top-of-rack switch.

See terminal operating system.

total accumulator
In DFU, a storage area where final totals for a field are kept. See also batch accumulator.

total analyzed cost
The sum of weighted analyzed costs of all items and of all suppliers.

total awareness variable
A variable that combines the responses to two or more questions about brands that share a brand list. A total awareness variable typically combines the responses to questions that ask respondents to select their favorite brand, and which brands they can remember, first unprompted and then prompted.

total charge
In an advanced order, the cost of all order items, along with additional fees and taxes. See also current charge.

total cost of ownership (TCO)
A methodology for calculating the actual cost of owning a product over the period of ownership and use based on combining costs of acquisition or leasing, training, deployment, support, residual equipment values, return on investment, time to market, and so forth.

total expenditure
Total program costs, including the one time AD expenditure and the "move forward" or recurring costs that cover maintenance and runtime expenses for the expected life of the program.

total performance cost
The sum of performance and other costs of all items and of all suppliers.

total record
In RPG, an output record written after a group of detail records. Total records generally contain data that is the result of calculations performed on the information in a group of detail records. See also detail record.

total time
The part of the RPG program cycle in which calculation and output operations specified for a group of records are done. See also detail time.

To set a flag in a window that indicates that the information in the window could differ from the that displayed on the terminal device.

touch event
From the perspective of an app developer, the act of a user contacting the screen with either fingers or a stylus and completing a gesture on the interface.

See trackpad.


  1. An application or place where a marketer can interact with a customer. A touchpoint can be a channel where the customer initiates the contact (an "inbound" interaction) or where the marketer contacts the customer (an "outbound" interaction). Common examples are websites and call center applications. See also inbound interaction, outbound interaction.
  2. The interface to an instance of a managed resource, such as an operating system or a server. A touchpoint implements a sensor and an effector for the managed resource, and maps the sensor and effector to existing interfaces. See also effector, manageability interface, sensor.

touchpoint system
An external business system that generates events or receives actions.

In mobile computing, a touch-sensitive screen that accepts gestures as input.

touch-sensitive bezel
A bezel that responds to gestures that take place directly on the bezel, start on the bezel, or end on the bezel. For example, swiping from the right side of the bezel on to the screen of a BlackBerry PlayBook switches between apps.

An arrangement between a dedicated carrier and one or more shippers, which seeks to use dedicated capacity by linking shipments together.

In the DCE Cell Directory Service (CDS), a set of physical address and protocol information for a particular server.


  1. See transaction program.
  2. See time provider.
  3. See transmission priority.

See Transaction Processing Council.

See transport-layer protocol data unit.

See Transaction Processing Facility.

See time provider interface.

See transaction pipe.

See third party maintenance.

See Translation Plan Management System.

TPMS information
See Translation Plan Management System information.

See transaction program name.

See Teleprocessing Network Simulator.

See telecommunication program PCB.

See temporary price reduction.


  1. To record data that provides a history of events occurring in the system.
  2. A record of the processing of a computer program or transaction. The information collected from a trace can be used to assess problems and performance.
  3. A DB2 for z/OS facility that provides the ability to collect monitoring, auditing, performance, accounting, statistics, and serviceability (global) data.
  4. In DB2 replication, a facility that is used to collect monitoring, auditing, and performance data for the Capture program, the Q Capture program, the Apply program, the Q Apply program, or the Replication Alert Monitor.


  1. The ability to identify the measuring and test equipment that was used to calibrate an asset.
  2. The ability to trace a project element to other related project elements, especially those related to requirements.

traceability matrix
A view that illustrates the relationships between requirements of the same or different types. This matrix is used to create, modify, and delete traceability relationships and view indirect relationships and traceability relationships with a suspect state. See also suspect relationship state, view.

traceability relationship
See trace to/trace from relationship.

traceability tree
A view of requirements of a single type that displays other requirements traced to or from them. See also view.

Trace Analysis Program (TAP)
See Advanced Communications Function/Trace Analysis Program.


  1. A section of a dump that provides information about the stack frame, the program unit address, the entry point of the routine, the statement number, and status of the routines on the call-chain at the time the traceback was produced.
  2. For the Ada debugger, a listing of the routines that are in the call chain above the code that is being debugged. For example, if a breakpoint is set within an Ada procedure and a call traceback is requested, a list appears that includes all of the procedures that called the Ada procedure, in the order that they called it. All the calling procedures in the call chain are listed up to, but not including, the operating system calling the original highest level routine.

trace daemon
A program that reads from the trace device driver and writes to the trace log file.

trace domain
Major component of CICS used by CICS system code and user applications to record and manage trace information on CICS internal, auxiliary, and GTF trace services.

trace entry
The data recorded from a trace event.

trace file
A file that contains a record of the events that occur in the system.

trace ID
A unique identifier for a traced event.

trace level
A level associated with each trace point. The level of a trace point depends on where the trace point is and on what sort of detail it can provide on a trace call. Most trace points are trace level 1 or 2.

trace link
A hyperlink that conveys relationships between the artifacts it links, such as dependency, origin, derivation, implementation, or validation. Trace links have link types, which are defined by an Open Services for Lifecycle Collaboration specification or by a project. See also content link.

trace log
A log that maintains of history of trace activity.

trace logger
Software that logs system actions and information for developers and support personnel to review and evaluate.

trace point
A defined place in the CICS code from which trace entries can be written to any currently selected trace destination.

An alert that can be attached to a single order or shipment. A tracer is sent automatically when the plan status, shipment status, or voucher status of the shipment changes. See also manual alert.

A utility that traces a packet from a computer to a remote destination, showing how many hops the packet required to reach the destination and how long each hop took.

trace services
A menu-driven utility that is used to trace application programming interfaces (APIs) and data transmitted on communication links.

trace table
A storage area that contains a record of the performance of computer program instructions.

trace template
A guide that is used by a trace formatter to determine the formatting of data contained in trace entries.

trace to/trace from relationship
A relationship between two requirements that implies the source, derivation, or dependencies between the requirements. The trace to/trace from state appears in a Traceability Matrix or Traceability Tree when a relationship is created between two requirements.

trace utility program (TUP)
An offline utility program that formats and prints trace entries from the CICS auxiliary trace data set.

A method of logging program operations in order to facilitate debugging procedures.

tracing routine
A routine that provides a historical record of specified events in the execution of a program.


  1. A unit of storage on a count-key-data (CKD) device that can be formatted to contain a number of data records. See also data record, home address, track-descriptor record.
  2. An optional subdivision in a process application that is based on team tasks, process application versions, or both. When enabled, tracks allow parallel development to occur with isolation from changes in other tracks. For example, using tracks one team can fix the current version of a process, while another team builds a completely new version based on new external systems and a new corporate identity.
  3. A circular path on the surface of a disk or diskette on which information is magnetically recorded and from which recorded information is read.

track and trace service
A service that uses an RFID infrastructure to trace a food product from its point of origin; manufacturers and food retailers can view the complete history of a food product, and speed their response to potential contamination. See also RFID tag, smarter food system.

A method for a blog author to request notification when a reader links to one of their posts.

track build item
A development work item that tracks required fixes after a failed build.

track-descriptor record
A special record on a track that follows the home address. The control program uses the track-descriptor record to maintain certain information about the track. The record has a count field with a key length of zero, a data length of 8, and a record number of 0. This record is sometimes referred to as R0. See also track.

tracked log
In an RSR environment, the system log data set on the tracking IMS to which the log records received from the active IMS are written.

tracked resource set (TRS)
The set of resources in a finite collection of artifacts, expressed as a set of members (a base) and a change log.


  1. In Tivoli Workload Scheduler for z/OS, a component that runs on every system in a complex. It acts as the communication link between the z/OS system that it runs on and the controller.
  2. See tracking IMS.
  3. A user who is authorized to monitor, manage, and modify workflows.

tracker's log
In an RSR environment, the online log data set for the log of the tracking IMS.

track event
An event that tracks certain data as it passes through the event run time.

tracking code
A code appended to destination URLs to track marketing program, real estate, site promotion, and marketing impression parameters.

tracking data
Information that is emitted by composite applications when a transaction instance occurs.

tracking event log
A log of job-tracking events and updates to the current schedule.

tracking group
A group of tracked process variables and data, such as KPIs, from one or more BPDs or process applications. Tracking groups are used to monitor performance and report analyses of information.

tracking IMS
In an RSR environment, an IMS that tracks the activities of active IMSs to provide disaster recovery support. A tracking IMS is usually geographically remote from the active IMSs. See also active IMS, Remote Site Recovery.

tracking intermediate event
An intermediate event that indicates a point in a process when runtime data is captured for reporting. See also intermediate event.

tracking logic
The ordered workflow (steps) used during the hiring process. Tracking logic uses a candidate's HR status to view a candidate's progression through the hiring process.

tracking number
An identifying number assigned by a common carrier that is used to track the transportation of a shipment (usually parcels) through the carrier's transportation process. See also PRO number.

tracking phase
The XRF phase during which the active processes the IMS workload and the alternate maintains IMS control blocks to duplicate those in the active and uses surveillance to check the active for signs of failure.

tracking subsystem
See tracking IMS.

tracking term
A term in a contract that is not part of the language but is used for tracking purposes.

track packing
A technique used by DFSMSdss to build target tracks for any direct access storage device (DASD) using physical record information as input.

A gridded sensor that interprets motions or actions as a mouse event.

track record address (TTR)
A representation of a relative track address (track-track-record). The TTR is a 2-byte unsigned number of tracks and a 1-byte block (record number).

track recovery
An option for recovery from permanent read/write errors on VSAM data sets. Track recovery permits database reconstruction at the track level rather than the data set level.

track space-efficient volume (TSE volume)
A volume in which storage space is allocated on an as-needed basis by using space on the target volume only when tracks are copied from the source volume to the target volume.


  1. A truck that is used to haul freight. See also asset.
  2. The mechanism that controls movement of continuous forms by means of the carrier holes.

tractor hole
See carrier hole.

The U.K. standards for EDI that are published by GS1 UK.

trade fund
Monies offered to a retailer by a manufacturer for the promotion of a set of products. This fund is usually allocated to pay for promotional activities on the part of the retailer, including ads, displays, and temporary price reductions.

trade spend
See trade fund.

trading mechanism
In WebSphere Commerce, a method by which buyers and sellers carry out business transactions. Depending on the edition of WebSphere Commerce, these methods may include: fixed price, contract, and RFQ.

trading partner
A company, such as a manufacturer or a supplier, that agrees to exchange information using electronic data interchange, or an entity in an organization that sends and receives documents that are translated. See also external partner.

trading partner agreement
Information exchanged between trading partners that describes certain mutually agreed upon execution parameters and service level expectations that will be used when conducting business.

trading partner certificate
The digital certificate provided by a trading partner that is used by a system to verify the signature of incoming messages from that trading partner.

trading position
See offer.

trading position container
A price list that contains offers, also known as trading positions. The trading positions in a trading position container are made available to customers by associating the trading position container with the terms and conditions of one or more contracts.

trading profile
A profile that describes the technology and business capabilities of the trading partner that enable the partner to engage in electronic business with other trading partners. The profile links the trading partner with business processes to exchange documents with other partners.

trading up
A sales technique that involves getting a customer interested in a better grade of goods than the customer had originally intended on buying.

Traditional Chinese (CHT)

  1. Characters used mainly in Taiwan and historic Chinese documents. Japanese Kanji and Korean Hanja characters are originally derived from traditional Chinese characters. See also Hanyu, Simplified Chinese.
  2. The Chinese character set expressed in traditional form. Traditional Chinese characters are used in Taiwan, China (Hong Kong S.A.R. of the PRC), and some other parts of the world.

Traditional Chinese double-byte character set
An IBM-defined DBCS for Traditional Chinese, consisting of Traditional Chinese non-Chinese set, primary set, secondary set, and up to 2,632 user-definable characters.

Traditional Chinese non-Chinese character set
A subset of the Traditional Chinese DBCS, consisting of non-Chinese characters, such as Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana, Hiragana, special symbols and Chinese phonetic symbols. There are 675 characters in this set.

Traditional Chinese primary character set
A subset of the Traditional Chinese DBCS, consisting of commonly used Chinese characters. There are 5,401 characters in this set.

Traditional Chinese secondary character set
A subset of the Traditional Chinese DBCS, consisting of less commonly used Chinese characters. There are 7,652 characters in this set.

traditional file management
The part of the operating system that controls the storing and accessing of traditional file objects (*FILE objects in the QSYS.LIB library) on a System i system. The data may be on internal storage (for example, database objects), on external media (diskette, tape, or printer objects), or on another system.

traditional line data
A form of line data that is prepared for printing on a line printer, such as 6262 or 3211. See also line data.

In data communication, the quantity of data transmitted past a particular point in a path.

traffic conditioning
In QoS, control functions that are performed to enforce rules specified in a traffic conditioning agreement. Types of traffic conditioning include metering, marking, shaping, and policing.

traffic definition
A message-matching template that identifies which traffic streams are subject to administrative monitoring and control.

traffic event
A significant occurrence that happens at a given place and time involving a vehicle, road network, or traffic device. See also traffic incident.

traffic incident
A traffic event that has an adverse effect. See also traffic event.

traffic layer
An overlay of traffic-related information that can be placed on the map to provide additional geospatial information about the transportation network.

traffic light
An icon that represents the assessment result to foresee potential risks and plan corrective measures.

traffic lighting
A reporting mechanism that typically highlights good data as green, marginal data as yellow, and problem data as red. In most software packages that support traffic lighting, the user is able to define the numeric ranges that determine the color of a given value.

traffic management center (TMC)
The hub of a transportation management system. Information about the transportation network is collected and combined with other operational and control data to manage the transportation network and produce traveler information. It includes the combination of the hardware and software located in the center, including operators and maintenance personnel, policies and procedures and other entities.

traffic profile
In QoS, a description of the temporal properties of a traffic stream such as rate and burst size.

traffic regulation anomaly
A deviation from normal network traffic patterns that is detected by an intrusion detection system. A traffic regulation anomaly could indicate a denial-of-service attack or a hacker who is monitoring connections to a web server.

traffic relationship matrix
A user-defined matrix that defines the relationships between road links in a map.

traffic shaping
In QoS, a group of techniques that attempt to regulate or meter the flow of packets through the network.

Digital impressions that connect individuals involved in a case to individuals outside of the case.

A control structure that indicates the end of an electronic transmission.

trailer banner
An optional report delimiter that separates the last report of a bundle from the manifest.

trailer label
A file or data set label that follows the data records on a unit of recording media.

trailer page
A separator page that follows a printed file or a print job. See also job trailer.

trailer segment
The last EDI segment in an envelope that consists of a unique control number and the number of segments in the envelope, and matches the control number in the header segment.

trailing character
A character that holds the last position in a word.

trailing edge
The edge of the paper that proceeds into the printer last as it is fed from one of the paper supplies. For example, from the front of the IBM 3935 Advanced Function Printer, the trailing edge of the paper is the left-hand edge.

To set up a Watson instance with components that enable the system to function in a particular domain (for example: corpus content, training data that generates machine learning models, programmatic algorithms, annotators, or other ground truth components) and then making improvements and updates to these components based on accuracy analysis.


  1. The act of a collecting the signal pattern of a device to broadcast its known position at a site.
  2. The initial stage of model building, involving a subset of the source data. The model can then be tested against a further, different subset for which the outcome is already known. See also model building, testing, validation.

training data
A set of questions and answers that is used to train machine learning models. See also question set, testing data.

train the trainer (T3)
An education module that prepares an instructor or facilitator to lead a subsequent education session on the same content.

One part of a larger financial transaction, such as one of a series of one-year loans.

A property of the system where the security classification of a resource is kept constant while the resource is in use.


  1. A request by a transactor to the blockchain to execute a function on the ledger.
  2. A request and the response it generated.
  3. A group of data segments that have related data elements or fields. The group makes up a business document, such as a claim for services. The type of transaction is identified by a transaction code, such as B1 for Billing and N3 for Information Reporting Rebill.
  4. An atomic series of SQL statements that make up a logical unit of work. All of the data modifications made during a transaction are either committed together as a unit or rolled back as a unit.
  5. A specific set of input data that triggers a specific process or job. A transaction also can refer to a message destined for an application program.
  6. A logical unit of work that performs an activity such as order creation, inventory changes, payment authorizations, and other system events.
  7. A unit of processing consisting of one or more application programs, affecting one or more objects, that is initiated by a single request.
  8. An exchange between two programs that carries out an action or produces a result. An example is the entry of a customer's deposit and the update of the customer's balance. See also availability, conversation, session.
  9. A subprocess that represents a set of coordinated activities that are carried out by independent, loosely coupled systems in accordance with a contractually defined business relationship. This coordination leads to an agreed, consistent, and verifiable outcome across all participants.
  10. A process in which all of the data modifications that are made during a unit of processing are either committed together as a unit or rolled back as a unit.
  11. The processing of an integration message through the integration framework. A successful transaction is a message that processes with no errors. A transaction that encounters an error does not process the integration message to completion.
  12. An exchange between the user and the system. Each activity the system performs for the user is considered a transaction.

transaction abend code
A four-character code, defined by CICS or the user, that is used when abnormally terminating a transaction. CICS-defined transaction abend codes begin with the letter 'A'. A transaction abend code is used to indicate the cause of an error that may have occurred in CICS code or in a user program. See also transaction dump code.

Pertaining to an application program that is divided into segments, where each segment typically requests an I/O operation with a terminal user, giving up control to other application program segments for the duration of the I/O operation.

transactional data
Data that describes an event and is frequently subject to change, such as demands, procurements, production orders, and firm information.

transactional data source
A data source that contains records and provides the measure values for cubes. In combination with one or more structural data sources, transactional data sources populate the model in Transformer. See also structural data source.

transactional email
A single email message sent in response to a specific, predetermined transaction detected in a business system.

transactional mode
A mode of operation in which install and remove operations occur in two phases: the preparation phase and the commit phase. See also commit operation.

transactional VSAM
A DFSMS function that provides record-level sharing and transactional recovery for VSAM data sets. Transactional VSAM provides a data set access mode that is used by DBRC to provide parallel RECON data set access.

transaction backout
The cancellation, as a result of a transaction failure, of all updates performed by a task.

transaction backout program
A program (part of the emergency restart function) that is invoked during emergency restart, and that reads backout information (written to the restart data set by the recovery utility program) for task, message, DL/I, and file tables.

transaction-based replication
In SQL replication, a type of processing in which every transaction is replicated to the target table when it is committed in the source table. See also transaction-consistent replication.

transaction block
A series of SQL commands that are executed in a single transaction. The transaction block starts with the BEGIN command and ends with either the COMMIT or ROLLBACK command.

transaction capabilities application part (TCAP)
Part of the SS7 protocol that provides transactions within the signaling network. A typical use of TCAP is to verify a card number, for the credit card calling service.

transaction certificate (tcert)
A digital certificate issued by Hyperledger Fabric Membership Service for deploying chaincode and for invoking and tracking chaincode transactions on the blockchain.

transaction channel
A channel that is available for the lifetime of a transaction. Containers in this channel are available to any program throughout the transaction, including any exit points that are API-enabled.

transaction class
A subcontainer of a service policy that is used for finer-grained monitoring. See also message class.

transaction code
A 1- to 8-character alphanumeric code that calls an IMS message processing program.

transaction command security
The use of system definition macros and security maintenance utility control statements to permit specific application programs to issue some of the IMS operator commands.

transaction-consistent replication
In SQL replication, a type of processing in which the net result of all transaction updates is replicated to the target table. See also transaction-based replication.

transaction data
Data about customer interactions captured by an external system.

transaction data file (TDF)
A file that serves as a filter between document files and the Gentran Server for Windows translator. For outbound processing, data is imported from a TDF file and translated to EDI format using a TDF Import translation object. The data is then ready to be posted and sent to a trading partner. For inbound processing, EDI documents that are received by Gentran Server for Windows can be exported to a TDF-formatted file using a TDF Export translation object. This data file is then ready to be processed or converted to internal application files.

transaction deadlock
A condition in which two or more transactions cannot continue processing because each is waiting on a resource held by the other.

transaction definition
A set of filters and maintenance schedules that are created in the Application Management Con-figuration Editor which are applied to the collected data and determine how that data is processed and displayed.

transaction dependency
A defined rule on an order line that specifies how item classifications, such as item IDs and service types, should be handled until conditions on related order lines are met.

transaction dump
In CICS, a formatted dump for the program active at the time the dump was requested. A transaction dump indicates where the error occurred within the program.

transaction dump code
A name of up to four characters by which a transaction dump will be known. When a transaction abend causes CICS to create a transaction dump, the associated transaction abend code is used as the transaction dump code. See also dump code, transaction abend code.

transaction dump table (TDT)
A CICS table which may contain an entry for each transaction dump code. See also dump code.

transaction file

  1. A file containing data, such as customer orders, that is usually used only with a master file.
  2. In COBOL, an input-output file used to communicate with display stations and ICF sessions.

transaction flow
The common path that similar transaction instances take through a composite application.

transaction ID
See transaction identifier.

transaction identifier (TID, transaction ID, XID)

  1. A unique name that is assigned to a transaction and is used to identify the actions associated with that transaction.
  2. A number associated with each of several request-parameter lists that define requests belonging to the same data transaction.

transaction interaction
See transaction.

transaction isolation
A CICS facility that offers storage protection between transactions, ensuring that a program of one transaction does not accidentally overwrite the storage of another transaction. See also storage protection.

transaction list table (XLT)
CICS control table containing a list of transaction identifications. Depending on a system initialization specification that can be changed during system termination, the transactions in a particular XLT can be initiated from terminals during the first quiesce stage of system termination. During CICS execution the suffix of an XLT can be entered at the master terminal - the transactions in that XLT can then be enabled or disabled as a group.

transaction load balancing
An optional facility that enables a transaction to be scheduled into more than one message or batch message region at the same time. See also load balancing.

transaction lock
A lock that is used to control concurrent execution of SQL statements.

transaction manager

  1. A software unit that coordinates the activities of resource managers by managing global transactions and coordinating the decision to commit them or roll them back.
  2. See sync point manager.
  3. A function that assigns identifiers to transactions, monitors their progress, and takes responsibility for transaction completion and failure recovery.

Transaction Manager database (TM database)
A database that is used to log transactions when a two-phase commit (SYNCPOINT TWOPHASE) is used with DB2 databases. If a transaction fails, the TM database information can be accessed to resynchronize databases that were involved in the failed transaction.

transaction manager domain
A CICS domain that provides transaction-related services to create, terminate, purge, and inquire on tasks; and manage transaction definitions and transaction classes. The transaction manager domain is designed to provide greater reliability and improved function; it has minimal impact on end users.

Transaction Manager Facility (TMF)
In IBM MQ for HP NonStop Server, a subsystem to protect business transactions and the integrity of databases.

transaction messaging
The ability to associate an item of data, such as a transaction identifier, with a voice message. The voice message can subsequently be retrieved by referencing the data value.

transaction mode
The method by which constraints are checked during transactions.

transaction-mode processing
In SQL replication, a type of replication subscription-set processing in which the Apply program retrieves data from the source CD table, then applies the data to the target table in the same commit sequence that is used at the source. The Apply program processes transactions for all subscription-set members together, rather than sequentially. See also table-mode processing.

transaction node
See base node.

transaction-oriented BMP program
A batch message processing program (BMP program) that performs transaction-type processing in a batch environment. A transaction-oriented BMP program obtains its input from the IMS message queues and can also use the message queues for output See also batch-oriented BMP program.

transaction pattern
The pattern for specifying the name of specific transactions to monitor. Patterns define groupings of transactions that map to business applications and business transactions.

transaction pipe (tpipe)
A named IMS process management resource. An OTMA client must specify this resource when submitting a transaction to IMS. A tpipe is analogous to an LTERM.

transaction processing
A style of computing that supports interactive applications in which requests submitted by users are processed as soon as they are received. Results are returned to the requester in a relatively short period of time. A transaction processing system supervises the sharing of resources for processing multiple transactions at the same time

Transaction Processing Council (TPC)
A worldwide consortium that institute e-commerce and database transaction standards in terms if transactions per second and reliability.

Transaction Processing Facility (TPF)
An IBM platform for high volume, online transaction processing. It is used by industries demanding large transaction volumes such as airlines and banks. See also program update tape.

transaction processing system
An IMS in a multisystem environment that accepts transactions from the front-end system, calls application programs for transaction processing, and routes all replies back to the front-end system for response to the terminal. See also front-end system, pseudo-front-end system.

transaction program (TP)

  1. A program that uses the Advanced Program-to-Program Communications (APPC) application programming interface (API) to communicate with a partner application program on a remote system.
  2. A program that processes transactions in an SNA network.
  3. A user-supplied application program for processing data received by the system from a finance device.

transaction program name (TPN)

  1. The name by which each program participating in an LU 6.2 conversation is known. Normally, the initiator of a connection identifies the name of the program it connects to at the other LU. When used in conjunction with an LU name, a TPN identifies a specific transaction program in the network.
  2. In SNA LU 6.2 conversations, the name of the program at the remote logical unit that is to be the other half of the conversation.

transaction program network
The hierarchical structure of user or system transaction programs communicating at a synchronization level of none, confirm, or commit. When the synchronization level is commit, the transaction programs communicate over protected conversations using the two-phase commit protocol. In this case, the hierarchy consists of an initiator, optionally one or more cascaded initiators, and agents.

transaction rate
The number of units of processing successfully completed per unit of time.

transaction restart program
A user-replaceable program (DFHREST) that enables you to participate in the decision as to whether a transaction should be restarted or not.

transaction routing

  1. An intercommunication facility that allows terminals or logical units connected to one CICS region to initiate and to communicate with transactions in another CICS region within the same processor system or in another CICS system connected by an APPC link.
  2. A CICS facility that provides support for inbound and outbound terminal requests from another CICS system connected by an advanced program-to-program communications (APPC) link.

transaction rule
A business rule that governs the way transactions can occur.

transaction schema
In a multischema deployment, a schema that contains transaction data and is dedicated to a colony.

transaction security
A call to RACF each time a transaction identifier is entered at a terminal to verify that the terminal user or user ID associated with that terminal is permitted to run the transaction.

transaction set
The basic business document in EDI data. Transaction sets are enclosed in an envelope that separates one transaction set from another. Groups of transaction sets that are functionally related are enclosed in a functional group envelope.

transaction set envelope
The section in an EDI transmission that surrounds a transaction set and is made up of transaction set header and trailer segments.

transaction shard
In a sharded deployment, a shard that contains transaction data and is dedicated to a colony.

transaction-start-ID column
A generated column that is defined with the AS TRANSACTION START ID clause. The value is assigned whenever a row is inserted into the table or any column in the row is updated. A transaction-start-ID column is intended for use in a system-period temporal table. See also generated column, row-begin column, row-end column.

transaction-system affinity
An affinity between a transaction and a particular CICS region, where the transaction interrogates or changes the properties of that CICS region. Transactions with affinity to a particular system, rather than another transaction, are not eligible for dynamic transaction routing. In general, they are transactions that use INQUIRE and SET commands, or have some dependency on global user exit programs, which also have an affinity with a particular CICS region.

transaction work area (TWA)
An optional extension of the TCA, used as a work area for a given task. The TWA can be used for the accumulation of data and intermediate results during the execution of the task. When the amount of working storage for a task is relatively static, the TWA may be used if data is accessed by different programs during task processing. This approach cannot be used for multiple transactions; the TWA is released automatically at task termination. See also common work area.


  1. A device capable of both transmitting and receiving signals. In mobile computing, transceivers are used extensively in geolocation. See also radio.
  2. In LANs, a physical device that connects a host interface to a local area network, such as Ethernet. Ethernet transceivers contain electronics that apply signals to the cable and that sense collisions.
  3. In communications, the device that connects the transceiver cable to the Ethernet coaxial cable. The transceiver is used to transmit and receive data.

transceiver cable
In communications, the cable along with its connectors that connects the input/output adapter to the transceiver.

To convert data from one format to another.

A utility that converts data from one format to another.

transcoding technology
Content adaptation to meet the specific capabilities of a client device.


  1. To copy an application EAR file to the server, usually by FTP. See also deploy.
  2. To send data from one location to another.

transfer account
An equity account that is included in an opening or closing balance account structure.

transfer corona
The unit that electrically charges paper to attract photoconductor toner and onto the paper. It has a thin, electrically charged wire inside a metal tube with a narrow opening.

transfer counter
See committed page counter.

transfer form data (TFD)
A block of data in CII data format that consists of a tag, a length indicator, and data.

transfer manager
Someone whom a customer pays to assist with transferring Notes mail files to the SmartCloud Notes service.

transfer mapping
The mapping of IBM Enterprise Records property names to XML property names.

transfer mapping file
A file that maps one product’s property names to XML property names that a transfer tool includes in an XML file when importing or exporting to another product’s entities.

transfer mode
Aspects covering transmission, multiplexing, and switching in a communications network.

transfer order
A document that is used to move inventory between facilities in a multi-plant environment. See also procurement transfer order.

transfer order invoice
An itemized list of goods stating quantities, prices, shipping charges, and so forth, for a transfer order.

transfer price
See franchise pricing.

transferred scope element
A scope element that has been integrated into the project work breakdown structure for execution and time tracking

transfer request
In System i Access, a description of the file that is to be transferred to a personal computer from i5/OS or from a personal computer to i5/OS.

Transfer Scorecard widget
A widget that displays the percentage of failed file transfers for the servers a user has permission to view.

transfer station

  1. Printing process at which the data set becomes visible to the operator, and is therefore the point at which all operator commands are directed.
  2. In nonimpact printers, the assembly where the toned image on the photoconductor is transferred to the paper.

transfer syntax

  1. In OSI, a set of rules for the representation of user information while it is in transit between presentation layer entities. The transfer syntax is usually derived from the abstract syntax by use of encoding rules.
  2. In DCE Remote Procedure Call (RPC), a set of encoding rules used for transmitting data over a network and for converting application data to and from different local data representations. See also abstract syntax.

transfer tool
A stand-alone IBM Enterprise Records utility that transfer active records and record folders to a separate system for permanent archiving.


  1. A modification of one or more characteristics of a picture. Examples of picture characteristics that can be transformed are position, orientation, and size.
  2. A collection of installation-related changes that are applied to a Windows Installer database.
  3. An output from Spoon. When the transform is passed to the Kettle API, the data is migrated from one or more sources to a destination. The file is stored with a ktr extension.
  4. To translate a Java class file to an IBM i Java program.
  5. Programming logic that converts data from one format into another format.
  6. To change the composition of a data stream (AFP) to perform the same functions in a different data stream (ASCII).
  7. To change the form of data according to specified rules without significantly changing the meaning of the data.
  8. To convert a document from one form to another, such as using a purchase order formatted as an XML document to create the same purchase order formatted as an EDI document.
  9. In a virtual private network (VPN), a collection of authentication algorithms, Diffie-Hellman groups, and encryption algorithms that are used during both phases of negotiation.

transform algorithm
A procedure that is used to transform the message for web services security message processing, such as the C14N (canonicalization) transform that is used for XML digital signatures.


  1. The conversion of data from one format to another. For example, converting flat Ffle data in a CSV format to XML data. Transformations can also suppress data, add data, alter data types, and perform calculations.
  2. A formula that is applied to the values of a field to alter the distribution of values. Some statistical methods require that fields have a particular distribution. When a field's distribution differs from what is required, a transformation (such as taking logarithms of values) can often remedy the problem.
  3. A HATS resource that specifies how to convert components of a host screen into widgets on a web page.
  4. The process of changing data from one format or structure to another format or structure.
  5. In GL, a four-by-four matrix that helps determine the location of a three-dimensional drawing, the position of the viewpoint (the viewer's "eye"), and the amount of the scene that will be encompassed and visible. Transformations occur at four points within the graphics pipeline: modeling transformation, viewing transformation, projection transformation, and viewport transformation.

Transformation API for XML (TrAX)
A programming interface that can transform XML and related tree-shaped data structures.

transformation model
A model within a fact build that is used to manipulate the acquired source data. For example, the transformation model can merge data from different sources or aggregate data.

transformation model element
An element of the transformation model in a fact build. A transformation model element can be a dimension, a derived dimension element, a measure, an attribute, or a derivation.

transformation plug-in
The Content Platform Engine software that translates a source document to a format, such as HTML, as specified by a style template.

transformation set
A sequence of transformations that are applied consecutively.

transform connectivity
For Enterprise Service Tools, an application transformation style that changes the way in which enterprise applications are accessed and transforms the way in which the enterprise application is used. Instead of having to run a CICS application by connecting to a particular server, customers can invoke the CICS application across the company intranet or across the internet.


  1. A kernel services that converts the application model from a logical description into a topology document that is used to deploy the virtual application.
  2. A device that converts power from one circuit to another at the same frequency, but at a changed voltage and current.

transform function
A function that is used to exchange structured data type values in one direction between a DB2 server and host language programs.

transform group
A set of transform functions that is used to exchange structured data type values between a DB2 server and host language programs.

transform matrix
In architecture, a matrix that is applied to a set of coordinates to produce a transform.

transform service
A function of the i5/OS operating system that converts PostScript Level 1 spooled files to output. This output can be printed on either IBM Advanced Function printers (i5/OS system printers) or Hewlett Packard Printer Control Language printers (commonly used PC printers).

See transaction identifier.

Pertaining to a program or subroutine that does not reside in main storage.

transient data (TD)
A CICS facility that provides the ability to read and write data in sequential queues.

transient data control program
The CICS program that controls sequential data files and intrapartition transient data.

transient data queue (TDQ)

  1. In Sterling Connect:Direct for z/OS, a CICS temporary storage queue in which event data is stored so that a client application can retrieve the information.
  2. A file to which runtime messages are written under CICS. A transient data queue also is a sequential data set used by the Folder Application Facility in CICS to log system messages.

transient error
In OSI, an error that occurs once or at unpredictable intervals--for example, network congestion. See also permanent error.

transient event
In OSI, an event that indicates the occurrence of an intermittent error or an error that can be recovered through retry. Transient events are logged but do not result in messages to the operator. See also permanent event.

transient page
An instance of a page definition created at run time.

transient portlet
An instance of a portlet definition created at run time.

transient routine
A library routine that is loaded at run time. See also resident routine.

transient token
A session token, such as a cookie or a parameter. See also session token.

transient type
An unnamed complex data type that is used to hold query results or is part of a temporary table.

transit days
The calculated number of days between the pickup and delivery of a shipment.

transit delay
In X.25 communications, the time it takes a packet to travel from one DTE to the other.

transit delay processing
In OSI, an X.25 quality-of-service function that keeps track of delays that data encounters on the way to its destination. Any node that receives a call packet can reject it if the transit delay exceeds the maximum specified by the sender.


  1. A relationship between two states indicating that an object in the first state performs certain specified actions and then enters the second state when a specified event occurs and specified conditions are satisfied. On such a change of state, the transition is said to fire.
  2. A connection between two tasks in a rule flow. Transitions are unidirectional, and they can have conditions attached to them.

transition condition

  1. A Boolean expression that determines when processing control should be passed to the targeted node.
  2. In a rule flow, a specification of a transition that dictates when the target task can be executed.

transition table
A temporary table that contains all of the affected rows of a subject table in their state before or after a triggering event occurs. Triggered SQL statements in the trigger definition can reference the table of changed rows in the old state or the new state. See also table locator.

transition variable
A variable that is valid only in FOR EACH ROW triggers. It allows access to the transition values for the current row. An old transition variable is the value of the row before the modification is applied, and the new transition variable is the value of the row after the modification is applied.

transit time
The estimated time to deliver shipments from an origin to a destination.


  1. To check source code of an automatic class selection (ACS) routine for syntactic and semantic errors. If no errors exist, the translation process generates an object table from the source code and places the object table into a specified source control data set (SCDS).
  2. In computer graphics, to move all or part of a display image on a display space from one location to another without rotating the image.

translate table
In compatibility mode, the 256-byte part of the character arrangement table that translates a coded character into the format needed by the character generator.


  1. The movement of an object by a specific distance.
  2. In computer graphics, the movement of a display image along a straight line from one location to another.

translation lookaside buffer (TLB)
A table in the CPU that contains cross-references between the virtual and real addresses of recently referenced pages of memory.

translation memory
A translation productivity tool comprising a database containing segments of source and target language texts that have been aligned to match each other. Translation memories are used to retrieve previously translated material as in the case of new versions of existing documents.

translation object

  1. A source map that has been compiled to provide instructions for translating from one format to another in a way that can be interpreted by the translator.
  2. A set of rules that instruct the translator how to convert a file from one format to another. Every function performed during translation requires a translation object. Translation objects are used to control all the functions of Gentran Server for Windows EDI translation.

Translation Plan Management System (TPMS)
An internal tool used by IBM translation planners and TSCs to track financial, workflow, and administration information about translation projects.

Translation Plan Management System information (TPMS information)
Data about the translation project such as the project name, the information unit name, the shipment name, and so on.

translation service
A service that transforms data from one format to another using maps created with the Sterling B2B Integrator Map Editor.

Translation Services Center (TSC)
One of the IBM departments that provide in-country translation services, for example, the IBM Germany TSC, and the IBM Japan TSC.

translation table
A table used to convert between one form of data and another. For example, translation tables are used for language translation, compression, encoding, and address mapping.

translation unit
A source file together with all headers and source files included via the preprocessing directive #include, less any source files skipped by any of the conditional inclusion preprocessing directives.

translation verification test (TVT)
All testing necessary to review and correct the translated software or hardware user interface, run-time messages, and on-line help, after build or integration and compilation, in order to verify that the translation has not been altered or corrupted by these processes. This testing includes a review for screen layout, truncation, localized links, mixing of languages, and for consistency and accuracy of the translation in context. See also globalization verification test.

translation volume
A calculation of the word count for the information unit.

translative mode
A mode in which private devices can communicate with public devices across the fabric.


  1. An engine that processes data for Gentran Server for Windows, the Application Integration subsystem, and the Forms Integration subsystem.
  2. A Jazz model object that describes a single build step in which a translator executable program is invoked with the required inputs and outputs. Inputs and outputs are the same as z/OS data sets or IBM i libraries, so a translator must reference multiple data set or library definitions.
  3. An engine that translates data.
  4. An i5/OS component that performs the final step in a program or module compilation. In the Integrated Language Environment (ILE) model, this is called the optimizing translator.

To map correspondences from one writing system to another. For example, non-ASCII characters are often transliterated to equivalent ASCII characters. See also Romanization, transliterator, writing system.

A tool that maps from one writing system to another. See also transliterate, writing system.

An entire file that is submitted electronically, unless it is a batch. A transmission includes telecommunication routing information, identification, and other information that applies to the entire collection of data.

transmission chain
A path an EDI communication could follow, including one company, one trading partner, and one or more network services.

transmission character
A 10-bit character encoded according to the rules of the 8B/10B algorithm.

transmission control block (TCB)
An internal control block within the Transmission Control Protocol/Internet Protocol (TCP/IP) address space.

transmission control character

  1. A control character used to control or facilitate transmission of data between data terminal equipments.
  2. In data communications, a special character that can be included in a message to control communications over a data link. For example, the sending station and the receiving station use transmission control characters to exchange information; the receiving station uses transmission control characters to indicate errors in data it receives.

Transmission Control Index
In Sterling Connect:Direct for z/OS, a VSAM relative record data set file that contains a record with bitmaps to indicate the availability of space in the transmission control queue.

transmission control layer
In SNA, the layer within a half-session that synchronizes and controls the speed of session-level data traffic, checks sequence numbers of requests, and enciphers and deciphers end-user data.

Transmission Control Protocol (TCP)
A communication protocol used in the Internet and in any network that follows the Internet Engineering Task Force (IETF) standards for internetwork protocol. TCP provides a reliable host-to-host protocol in packet-switched communication networks and in interconnected systems of such networks. See also Internet Protocol.

Transmission Control Protocol/Internet Protocol (TCP/IP)
An industry-standard, nonproprietary set of communication protocols that provides reliable end-to-end connections between applications over interconnected networks of different types. See also communication method.

transmission control queue (TCQ)
A queue that holds all processes submitted to Sterling Connect:Direct that are currently executing or scheduled to execute.

transmission control unit (TCU)
A communication control unit whose operations are controlled solely by programmed instructions from the computing system to which the unit is attached. No program is stored or executed in the unit. Examples are the IBM 2702 and 2703 Transmission Controls. See also communication controller.

transmission executive
A part of the DSNX/PC licensed program that runs on the personal computer to control and handle requests and to create responses for DSNX.

transmission group (TG)
In SNA, a group of links between directly attached nodes appearing as a single logical link for routing messages. A transmission group may consist of one or more SDLC links (parallel links) or of a single System/370 channel. For type 2.1 nodes in System i networks, a transmission group can only be a single-link connection.

transmission group profile
In VTAM, a named set of characteristics (such as cost per byte, cost per unit of time, and capacity) that is used for APPN links.

transmission group vector
A representation of an endpoint TG in a T2.1 network that consists of two control vectors: the TG Descriptor (X'46') control vector and the TG Characteristics (X'47') control vector.

transmission header (TH)
In SNA, control information, optionally followed by a basic information unit or a basic information unit segment, that is created and used by path control to route messages within the network.

transmission-level segment
A segment that occurs once in a transmitted batch file.

transmission line
See telecommunication line.

transmission medium
In communications, the physical path between transmitters and receivers in a communications network, such as an Ethernet bus or a token ring.

transmission number
In a printer, a number designating the number of transmissions of a particular print data set or file. PSF uses the transmission number to select the appropriate form environment group.

transmission priority (TP)
A rank assigned to a message unit that determines its precedence for being selected by the path control component in each node along a route for forwarding to the next node in the route. The four possible values are low, medium, high, and network.

transmission program
See message channel agent.

transmission queue
A local queue on which prepared messages destined for a remote queue manager are temporarily stored.

transmission services (TS)
A switched, nonswitched, or packet-switched communications line provided by a vendor.

transmission services profile (TS profile)
In SNA, specified in a request to start a session. Each defined transmission services profile is identified by a number.

transmission subsystem component (TSC)
The component of VTAM that comprises the transmission control, path control, and data link control layers of SNA.

transmission type
The largest object in an EDI type tree. A transmission might include many interchanges from or to many trading partners.

transmission word
A group of four transmission characters. See also data word.

transmit burst
A group of transmit packets that are sent without an intervening receive or time-out operation.


  1. A picture or text on an acetate sheet designed to be viewed by light shining through it.
  2. Terminal attribute whereby data is not translated between terminal and main storage representation on read or write requests. This allows the transmission of all 256 possible byte values.
  3. See transparent text mode.
  4. In asynchronous communications, a method of hiding certain ASCII control characters from modems or asynchronous devices.

In data transmission, pertaining to information that the receiving program or device does not recognize as transmission control characters.

transparent data

  1. Data that can contain any hexadecimal value.
  2. A set of code points that is interpreted as presentable data, not as control data. In the AFP architecture, transparent data is identified with a control byte and a count of the number of bytes that follow.

transparent DDL
DDL that provides the ability to create and modify remote tables in a federated database without using pass-through sessions.

transparent decision service
A web service for rulesets that are deployed to a Rule Execution Server instance.

transparent mixing
See underpaint.

transparent mode
A mode of binary synchronous transmission in which transmission control characters are treated as text unless they are preceded by the data link escape character (DLE). See also nontransparent mode.

transparent recall
The process that is used to automatically recall a migrated file to a workstation or file server when the file is accessed. See also selective recall.

transparent screen lock
A feature that, when enabled, permits users to lock their desktop screens but still see the contents of their desktop.

transparent text mode
In binary synchronous communications, a method of transmission in which only transmission control characters preceded by the DLE control character are processed as transmission control characters.


  1. A protocol that provides the information needed by the product to communicate with other messaging software systems.
  2. A physical connection to a database. A transport can be reused by multiple logical connections.
  3. The request queue between a web servers plug-in and a web container in which the web modules of an application reside. When a user requests an application from a web browser, the request is passed to the web server, then along the transport to the web container.
  4. To restore a transportable set from a backup image into a database other than the one from which the backup image was taken.
  5. A communication layer that allows the product to send and receive data between the user data source and a pipeline. Examples of transports include the HTTP transport, the queue transport, the database transport, and the file transport.
  6. A service plug-in for WebSphere Developer that manages the connection between a CARMA hierarchy and its CARMA host. The CARMA transport packages and sends commands from the CARMA hierarchy and returns responses from the CARMA host.
  7. The process or protocol mechanism of transferring an XML message or document between parties as part of a meaningful, reliable exchange. The most common transports for web services are SOAP/HTTP, SOAP/HTTPs, and SOAP/JMS.

transportable program
A program object that has been converted into a nonexecutable form for transfer to other systems.

transportable set
A set of table spaces and schemas that can be transported by a restore operation, such as by the RESTORE DATABASE command.

transport adapter
An adapter (such as an HTTP Adapter) that is used with an encoding/decoding adapter to support various protocols (for example, SOAP) in a transport-independent way. The transport adapter is used to transport the data either from the source or to the destination.

transport assembly
In printers, the unit that contains the transfer station, fuser station, continuous forms input station, and continuous forms stacker.

transportation prediction feature
A feature that anticipates traffic conditions within an hour from the current time, provides customized reports, and configures data collection, enablement, and calculation in the administration portlets.

transport chain
A network protocol stack that is used for I/O operations in an application server environment. Transport chains are part of the channel framework function that provides a common networking service for all components.

transport channel chain
A specification of the transport channels that are used by a server for receiving information. Transport channel chains contain end points

transport class 0 (class 0)
In OSI, the simplest of five classes of service (0-4) or protocols defined in the transport layer. (I)

transport class 2
In OSI, the transport layer class that provides an intermediate level of service.

transport class 4 (class 4)
In OSI, the most complex of five classes of service (0-4) or protocols defined in the transport layer. (I)

transport class negotiation
In OSI, the process by which the peer application entities decide the Transport Layer class to use on an association.

transport connection identifier (TCID)
An 8-byte hexadecimal value that is used to uniquely identify a High-Performance Routing (HPR) pipe to VTAM.

A method of conveying data using a specified adapter following either an encode or decode command.

transport layer

  1. In OSI architecture, the layer that provides services for flow control and recovery between open systems with a predictable quality of service.
  2. A network service that provides end-to-end communication between two parties, while hiding the details of the communication network. The Transmission Control Protocol (TCP) and ISO TP4 transport protocols provide full-duplex virtual circuits on which delivery is reliable, error free, sequenced, and duplicate free.

Transport Layer Interface (TLI)
In the Distributed Computing Environment (DCE), an interface to the transport layer of the OSI model, designed on the ISO transport service definition.

transport-layer protocol data unit (TPDU)
In OSI, a protocol data unit in the transport layer. (I)

Transport Layer Security (TLS)
A set of encryption rules that uses verified certificates and encryption keys to secure communications over the Internet. TLS is an update to the SSL protocol.

transport-layer service access point (TSAP)
In OSI, a service access point in the transport layer. (I)

transport-layer service data unit (TSDU)
In OSI, a unit of data transferred between the session layer and the transport layer.

Transport Manager Subsystem (TMS)
In an RSR environment, the subsystem that provides communication services to IMS components.

transport mode
In the OSI Communications Subsystem licensed program, a set of values that determine the transport layer functions to be used on an association.

transport mode name
In OSI, the name of a transport mode to be used for an association. The network administrator specifies the transport mode name on an application mode.

transport network
The part of the SNA network that includes the data link control and path control layers.

transport protocol
A specification of the rules that govern the exchange of information between components of a transport network; for example, the User Datagram Protocol (UDP).

transport provider
In MPTN architecture, a component that provides the transport functions associated with a particular transport protocol stack.

transport record
A record that describes the document delivery protocol. It identifies the protocol, such as HTTP, FTP, or SMTP. It also details the use of the protocol, such as HTTP configured with SSL for secure data exchange.

transport service
A service that implements interoperable Internet business sequencing protocols such as EDIINT, SOAP, RosettaNet RNIF, and ebXML.

transport staging database
A temporary database that is created as a part of a transport operation. The transport staging database is used to extract data and logical objects from a backup image and, if necessary, bring them to a point of transactional consistency before they are re-created in the target database.

transport time
The time allotted for transporting materials from the workstation where the preceding operation took place to the workstation where the current operation is to occur. The transport time is used only for planning purposes. Operations will be started irrespective of the transport time specified.

transpromotional marketing
A marketing effort that targets a company's existing customers by combining promotional material with a transactional document, such as an invoice.

A type of monitor that simulates the actions of a real Internet user by executing a series of activities, which the monitor performs using other Internet service monitors.


  1. An unprogrammed, hardware-initiated, conditional jump to a specific address. A trap occurs as a result of an error or certain other conditions. A record is made of the location from which the jump occurred.
  2. In the Simple Network Management Protocol (SNMP), a message sent by a managed node (agent function) to a management station to report an exception condition.
  3. A special statement used to catch signals within the z/OS shell.
  4. In REXX, to recognize that a currently enabled condition occurred and to perform the CALL or SIGNAL instruction specified when the condition trap was enabled.
  5. An unsolicited event generated by an agent and forwarded to a manager. Traps inform the manager of changes that occur in the network.

trap handler
A user-defined trap routine that is used when a trap occurs.

trash conveyor
A separate conveyor used to transport empty cartons and packing materials to a trash collection area. Generally used in operations which break vendor cartons to repack items.

trash folder
A folder in the mail file in which mail documents are stored temporarily before being deleted.

Traveler Companion
An application that allows for the reading and sending of encrypted messages on IBM Notes Traveler for iOS devices.

traversal path
A path that directs an extract or archive process through related tables specified in an access definition. It begins at the start table and proceeds through the data model and all relationships from parent to child.

Traversal Using Relay around NAT (TURN)
A protocol that allows a computer that resides behind a network address translator or a firewall to receive incoming data over TCP or UDP connections.

To systematically crawl through a tree structure, examining each node once.

See Transformation API for XML.

See bin.

See table reference character.

The unique combination of a cell and an offer used at a particular point in time. Separate treatments are generated each time a flowchart runs.

treatment code
A code that represents a unique combination of offer version, cell, and date/time. The treatment code uniquely identifies a row in the contact history table.

treatment rule
A rule that assigns an offer to a smart segment. The assignments are further constrained by the custom-defined zone associated with the offer in the treatment rule. Each treatment rule also has a marketing score. If a customer is assigned to more than one segment, and therefore more than one offer is applicable, the marketing scores help define which offer Interact suggests.

TREC format
An XML format that is used for Text REtrieval Conference information retrieval competitions sponsored by NIST. TREC format is supported as an intermediate file format that can be used during ingestion.


  1. A data structure whose elements are linked in a hierarchical fashion.
  2. A hierarchical collection of nodes that can have an arbitrary number of references to other nodes. A unique path connects every two nodes.

A visualization of hierarchical data. Each object in the hierarchy is represented as a rectangle. The child objects of a parent object rectangle are represented by nonoverlapping rectangles inside the parent object rectangle. The area of a rectangle is typically proportional to a property of the object that can be viewed as distributed across its child objects.

tree pane
A pane in which objects of a catalog are arranged in a tree-like hierarchical fashion.

tree structure
A data structure that represents entities in nodes, with at most one parent node for each node, and with only one root node.

tree view

  1. See traceability tree.
  2. A view that provides a hierarchical view of an object and the objects that it contains.

T reference point
In Performance Tools, the interface between network termination 2 (NT2) and network termination 1 (NT1).


  1. A subject that is algorithmically determined to be more popular than other current subjects. See also aggregator, leaderboard.
  2. A series of related measurements that indicates a defined direction or a predictable future result.

trend analysis
The analysis of the changes in a given item of information over a period of time.

trend analytics
Data analysis that is bound by two points in time, such as the comparison of supplier spend data between two time periods.

trend direction
The direction in which a data set is trending, either upwards, downwards, or remaining constant.

trended value
The approximate value of monitored data for a given forecast period.

The process of evaluating findings and determining how to resolve them.

trial license

  1. A license key that provides clients access to an application for a specified time for product evaluation purposes. See also permanent license key.
  2. A temporary entitlement to use a licensed function.

trial plan
A projection of the current production plan for a different period, using the same start date. It is used to determine the effect of different plan decisions.

triangular shipment
A shipment of goods that is ordered from one intercompany or supplier location, delivered directly to a second location, and billed to a third location. For example, if IBM Dublin orders goods from Hungary and has the Hungarian supplier ship those goods to IBM France and bill the Dublin site, that is a triangular shipment.

A collection of collocated squads that are thematically linked to a larger project (like backend infrastructure or an entire component). Tribes are analogous to a small organization within the company. Tribes are meant to be smaller than 100 people to reduce the amount of wasted time caused by bureaucracy and politics. See also chapter, gathering, guild, squad.

tributary station
In data communications, a secondary device on a multipoint line.

trickle feed
An incremental update process that continuously loads data into tables.


  1. An event or condition that causes the software to execute a program or script. Users can predefine triggers.
  2. A representation of dependencies between workflow tasks that joins activities in a sequence job. Activities typically have one input trigger, but multiple output triggers.
  3. A monitor that specifies one or more standard programs or built-in actions to be executed whenever a certain ClearCase operation is performed.
  4. In profiling, an event that causes transitions between states in a states engine, such as, the loading of a web page or the appearance of a window on the desktop.
  5. A mechanism that detects an occurrence, and can cause additional processing in response. Triggers can be activated when changes occur in the device context. See also device context.
  6. A condition that signals that a risk factor should be monitored.
  7. An action that precipitates other actions.
  8. A mechanism that detects an occurrence and can cause additional processing in response.
  9. A user-defined point or set of points during a session at which an event is activated.
  10. To initiate or reinitiate copying between a pair of volumes that have a copy relationship.
  11. A database object that is associated with a single base table or view and that defines a rule. The rule consists of a set of SQL statements that runs when an insert, update, or delete database operation occurs on the associated base table or view. See also after trigger, before trigger, delete trigger, insert trigger, instead of trigger, trigger activation, trigger activation time, trigger granularity, update trigger.
  12. In the Application Lab, a condition that, when satisfied, starts a process.
  13. In database technology, a program that is automatically called whenever a specified action is performed on a specific table or view. See also read trigger.
  14. A specific event or start date that activates an automated message.
  15. A mechanism that initiates actions. Triggers can be explicitly fired by a user or fired on behalf of a user by an external event source.
  16. Data values for which AFP Conversion and Indexing Facility (ACIF) searches, to delineate the beginning of a new group of pages. The first trigger is then the anchor point from which ACIF locates the defined index values.

trigger action
A set of actions (high-level language statements, SQL statements, or i5/OS utilities) that are performed automatically when a specified change operation (trigger event) occurs on a specified table or file.

trigger activation
The process that occurs when the trigger event that is defined in a trigger definition is executed. Trigger activation consists of the evaluation of the triggered action condition and conditional execution of the triggered SQL statements. See also after trigger, before trigger, trigger, trigger activation time, trigger event.

trigger activation time
An indication in a trigger definition of whether the trigger should be activated before or after a trigger event. See also after trigger, before trigger, trigger, trigger activation, trigger event.

trigger body
The set of triggered SQL statements that is run when a trigger is activated and its triggered action condition evaluates to true. See also triggered action, triggered action condition, triggered SQL statement.

trigger cascading
The process that occurs when the triggered action of a trigger causes the activation of another trigger.

triggered action
The SQL logic that is performed when a trigger is activated. The triggered action consists of an optional triggered action condition and a set of triggered SQL statements that is run only if the triggered action is true. See also trigger body, trigger event, triggered action condition, triggered SQL statement.

triggered action condition
An optional part of a triggered action. This Boolean condition is defined by a WHEN clause and specifies a condition that is evaluated to determine whether the triggered SQL statements should be run. See also trigger body, triggered action, triggered SQL statement.

triggered queue
A local queue, usually an application queue, that has triggering enabled so that a message is written when a trigger event occurs. The trigger message is often written to an initiation queue.

triggered SQL statement
One of a set of SQL statements that is run when a trigger is activated and its triggered action condition evaluates to true. The set of triggered SQL statements is also called the trigger body. See also trigger body, triggered action, triggered action condition.

trigger event

  1. In a CREATE TRIGGER statement, the specification of an insert, update, or delete operation on a specified table that activates the trigger. See also trigger activation, trigger activation time, trigger granularity, triggered action.
  2. An event, such as a message arriving on a queue, that causes a queue manager to create a trigger message on an initiation queue.
  3. A change operation that calls the trigger action to be run. The trigger event can be an insert, update, or delete operation in any high-level language and in SQL.

trigger field
In BMS, a field that is transmitted to the host processor as soon as the terminal operator has modified the field and then tries to move the cursor out of it. You can use display trigger fields to initiate input to an application program. The trigger attribute is ignored if the operator has not modified the trigger field.

trigger granularity
In SQL, the characteristic of a trigger that determines whether the trigger is activated only once for the triggering SQL statement or once for each row that the SQL statement modifies. See also trigger, trigger event.

In IBM MQ, a facility that allows a queue manager to start an application automatically when predetermined conditions on a queue are satisfied.

triggering event
The specified operation in a trigger definition that causes the activation of that trigger. The triggering event is comprised of a triggering operation (insert, update, or delete) and a subject table or view on which the operation is performed.

triggering SQL operation
The SQL operation that causes a trigger to be activated when the operation is performed on the subject table.

trigger level
The number of records written to an intrapartition transient data destination or queue that will cause CICS to automatically initiate a task to process that queue. See also automatic transaction initiation.

trigger message
A message that contains information about the program that a trigger monitor is to start.

trigger monitor

  1. A program that responds to trigger conditions on a message queue by starting a transaction. A trigger monitor is usually a continuously-running program.
  2. A continuously running application that serves one or more initiation queues. When a trigger message arrives on an initiation queue, the trigger monitor retrieves the message. It uses the information in the trigger message to start a process that serves the queue on which a trigger event occurred.

trigger monitor interface (TMI)
The IBM MQ interface to which customer-written or vendor-written trigger monitor programs must conform.

trigger package
In DB2 for z/OS, a package that is created when a CREATE TRIGGER statement is executed. The package is executed when the trigger is activated.

trigger point
In REXX, a threshold or boundary limit used in the REXX FORMAT function.

trigger program
A program that contains a set of trigger actions.

trigger script
A script that is stored in the docstore that is called from another script.

trigger system
A set of configurable components that defines a time-sensitive detection algorithm to identify patterns of customer behavior.

trigger time
The time the trigger action runs before or after the trigger event operates.

A sequence of three graphic characters that represent another graphic character. For example, in the C programming language, the trigraph ??= is used to denote the # character.

To remove a list entry from the end of a list opposite from the end where the new entry was added.

trimmer assembly
In printers, in a burster-trimmer-stacker, a device that removes margin carrier strips.


  1. Eliminating those parts of a picture that are outside of a clipping boundary such as a viewing window or presentation space. See also viewing window.
  2. Removal of records or bytes that are no longer required.

trimming loops
In GL, a group of oriented closed curves that is used to set the boundaries of a NURBS surface.

Triple Data Encryption Algorithm (TDEA, Triple DEA)
An encryption method that applies the Data Encryption Standard (DES) algorithm three times to the data. See also Data Encryption Standard.

Triple Data Encryption Standard (3DES, Triple DES)
A block cipher algorithm that can be used to encrypt data transmitted between managed systems and the management server. Triple DES is a security enhancement of DES that employs three successive DES block operations.

Triple DEA
See Triple Data Encryption Algorithm.

Triple DES
See Triple Data Encryption Standard.


  1. In architecture, a three-part self-defining variable-length parameter consisting of a length byte, an identifier byte, and one or more parameter-value bytes.
  2. A length byte, a type byte, and one or more parameter-value bytes in a Formatted Data Object Content Architecture (FD:OCA) descriptor.
  3. A byte composed of three binary elements. (I) (A)

triplet identifier
In architecture, a one-byte type identifier for a triplet.

TRIRIGA Anywhere project
A Worklight project that includes the content for building and deploying the TRIRIGA Anywhere applications. The project is generated from the TRIRIGA Anywhere directory.

trivial database (TDB)
An extremely small database that allows multiple simultaneous writers and uses internal locking to keep writers from overwriting each other.

Trivial File Transfer Protocol (TFTP)
In Internet communications, a set of conventions that transfers files between hosts using minimal protocol.

TRM report
See talent management system report.

A phototypesetting utility that was originally designed to support a Graphics Systems phototypesetting machine, but is now capable of supporting a variety of phototypesetters.

Trojan horse
A computer program that appears to perform a useful and innocent function but contains hidden functions that use approved authorizations assigned to users when they start the program. For example, it may copy internal authorization information from a computer and send it back to the originator of the Trojan horse.

A connected voice path which enters an IVR from a switch on one circuit, then returns to the same switch on a parallel circuit. Two IVR ports and two circuits are consumed, but in some circumstances this might be the only way to make a connection between two callers if the attached switch does not support a Call Transfer function.

To diagnose and solve a problem.

An application that assists a user in locating a problem and that provides a possible solution to the problem.

See test readiness review.


  1. See topology and routing services.
  2. See tracked resource set.

A full truck or trailer being transported to one ship-to location.

truckload efficiency
The percentage of weight of a shipment that is on the truck for the duration of the shipment. A highly efficient truckload is one in which most of the load (measured by weight) travels most of the distance from the origin to the final destination.

See task-related user exit.

true alias
A program alias for which the entry point is the same as the primary entry point.

True Image data view
A data view that allows a file to be restored in the event of accidental deletion. It consists of point-in-time images that provide a near-instant virtual copy of an entire storage volume.

true negative
An answer or annotation that is actually incorrect and is predicted to be incorrect.

TruePath Funnel
A custom visitor path scenario that can be defined using the TruePath Builder within the Digital Analytics Tools Browser plug-in. Users can measure the success of visitors navigating through online processes such as check-out, registration, and online applications; or of visitors completing calls-to-action on specific marketing landing pages.

true positive
An answer or annotation that is actually correct and is predicted to be correct.


  1. To end a computational process in accordance with a rule; for example, to end the evaluation of a power series at a specified term.
  2. To cut off data that cannot be printed or displayed in the line width specified or available. See also fold.
  3. To shorten a field, value, statement, or string.

truncated mail message
A shortened version of a mail message, generally used as a preview of a message's text.


  1. The process of discarding part of a result from an operation when it exceeds memory or storage capacity.
  2. In printing, the planned or unplanned end of a print line when there are more characters for the line than can be printed.


  1. In the CVS team development environment, the main stream of development, also referred to as the HEAD stream.
  2. A telephone connection between two central offices or switching devices. In DirectTalk, a trunk refers to 24 or 30 channels carried on the same T1 or E1 digital interface. See also channel.
  3. In telephony, circuits that connect two switching systems, as opposed to connecting a customer line to a switching system.

A function of the z/OS Communications Server class of service facility. Trunking enables explicit routes to use parallel links between specific nodes.

trunking group
A set of trunked inter-switch links (ISLs). See also ISL Trunking.

trunking port
A port that is employed in a trunking group. See also ISL Trunking.

trunk interface card (TIC)
The component of the VPACK that manages the trunk connection to the switch. See also base card.

trunk line
A telecommunications line that links a private telecommunications system to a public switched network.

In directory services, the passing of the rights of one group to another.

trust anchor
A trusted keystore file that contains a trusted certificate or a trusted root certificate that is used to assert the trust of a certificate.

trust association
An integrated configuration between the security server of the product and third-party security servers. A reverse proxy server acts as a front-end authentication server, while the product applies its own authorization policy onto the resulting credentials passed by the proxy server.

trust association interceptor (TAI)
The mechanism by which trust is validated in the product environment for every request received by the proxy server. The method of validation is agreed upon by the proxy server and the interceptor.

trust attribute
An attribute upon which to establish trust. A trusted relationship is established based on one or more trust attributes.

trust chain
One or more certificate authority (CA) certificates that provide a linked path to a CA that is trusted by a remote server. A trust chain enables authentication.


  1. Pertaining to a federated wrapper that is defined to run in the database manager process. See also fenced.
  2. Pertaining to the control of a security policy.

trusted asset
An asset that is known and compliant with a security policy and is not added to the quarantine list.

trusted certificate
A certificate that is purchased from and issued by a Certificate Authority (CA).

trusted communications agent (TCA)
A program that handles the sign-on password protocol when clients use password generation.

Trusted Computing Base (TCB)
The combination of hardware and software in a computer system that enforces a unified security policy.

trusted connection
A database connection whose attributes match the attributes of a unique trusted context that is defined at the database server. See also explicit trusted connection, implicit trusted connection.

trusted connection reuse
The ability to switch the current user ID on a trusted connection to a different user ID.

trusted consumer
A consumer that can share authorization with other trusted consumers and does not require user approval to access data. A consumer must be designated as trusted in an access request to become a trusted consumer.

trusted context
A database security object that enables the establishment of a trusted relationship between a database management system and an external entity.

trusted context default role
The role that is inherited by all users of a trusted context unless it is overridden by a user-specific role in the trusted context definition. See also trusted context user-specific role.

trusted context user
A user ID to which switching the current user ID on a trusted connection is permitted.

trusted context user-specific role
A role that is associated with a specific trusted context user. It overrides the trusted context default role if the current user ID on the trusted connection matches the ID of the specific trusted context user. See also trusted context default role.

trusted environment
A clean environment in which all untrusted processes have been terminated to ensure secure communications between the user and the operating system.

trusted identity evaluator
A mechanism that is used by a server to determine whether to trust a user identity during identity assertion.

Trusted Key Entry (TKE)

trusted node security
In Sterling Connect:Direct for z/OS, a security feature that allows a local node to enforce more restrictive security parameters when dealing with specific trading partner remote nodes. See also data direction restriction.

trusted process
A process in which a particular standard of security has been met.

trusted relationship
A privileged relationship between two entities such as a middleware server and a database server. This relationship allows for a unique set of interactions between the two entities that would be impossible otherwise.

trusted root

  1. In the Secure Sockets Layer (SSL), the public key and associated distinguished name of a certificate authority (CA).
  2. A certificate signed by a trusted certificate authority (CA). See also certificate authority, intermediate certificate.
  3. A certificate authority's certificate merged into the Domino Directory, client's browser, or the server's key ring file, which allows clients and servers to communicate with any client or server that has that certificate authority's certificate marked as trusted.
  4. The foundation upon which chains of trust are built in certificates. Trusting a CA root means that all certificates issued by that CA can be trusted.

trusted root certificate file
A file stored in a local directory on a client system that contains a list of trusted sources. During communications connections, the client compares the server certificate to the trusted root certificate file to determine whether the server certificate was signed by a trusted source. The client can establish a secure communications connection if a trusted source signed the server certificate.

trusted system
A system in a network over which you have control of security. A trusted system can directly communicate only with other systems in the network.

trust file
A file that contains signer certificates.

trust policy
A trusted list of certificates that are used to control the trust and validity period of certificates. It enables the trust of certificates issued by a certificate authority to be limited.

trust relationship
An established and trusted communication path through which a computer in one domain can communicate with a computer in the other domain. Users in a trusted domain can access resources in the trusting domain.

trust service
A component that manages security tokens that are passed between security domains.

trust service chain
A chain of modules that operate in different modes such as validate, map, and issue truststore.


  1. In security, a storage object, either a file or a hardware cryptographic card, where public keys are stored in the form of trusted certificates, for authentication purposes in web transactions. In some applications, these trusted certificates are moved into the application keystore to be stored with the private keys. See also keystore.
  2. A key database that holds signer certificates for only the target servers that the user trusts. See also signer certificate.

truststore file
A key database file that contains the public keys for a trusted entity.

try-and-buy license
A nodelocked license that has a fixed duration and a start date equal to the date when the license is enrolled. A try-and-buy license is made available for purposes of evaluating the application, and can be replaced by a production license after evaluation.

try block
A C++ block in which a known exception is passed to an exception handler. See also catch block.


  1. See transmission services.
  2. See temporary storage.

See transport-layer service access point.

TSAP selector
In OSI, an external identifier for a service access point at the Transport Layer. The TSAP selector is part of a presentation address.


  1. See transmission subsystem component.
  2. See technical subcontractor.
  3. See Translation Services Center.

See transport-layer service data unit.

TSE volume
See track space-efficient volume.

Pertaining to a person or organization that has a deep knowledge in one discipline and broader knowledge in other areas.

Tsm Router
In WebSphere Voice Server, a process that controls which engine processes are being used at any time. Requests for an engine by a WebSphere Voice Server Client are accepted or rejected depending on whether an engine meeting the Tsm Client's criteria is available.

See Time Sharing Option.

TSO attachment facility
A DB2 facility consisting of the DSN command processor and DB2I. Applications that are not written for the CICS or IMS environments can run under the TSO attachment facility.

See Time Sharing Option Extensions.

See Time Sharing Option single point of control.

TS profile
See transmission services profile.

TSR program
See terminate-and-stay-resident program.

See Technical Support Services.

See temporary storage table.

TTD character
See temporary-text-delay character.

See time to live.

See time-to-market.

See tape table of contents.

See track record address.

See text-to-speech.

See terminal type.

See teletypewriter.

See Terminal User Control Block.

Pertaining to printing on both sides of a sheet of paper such that the bottom of the printed image on one side of the paper is juxtaposed against the top of the printed image on the other side of the paper. See also simplex.

tumble duplex
Printing on both sides of the paper such that the top of one side is at the same end as the bottom of the other side. Tumble duplex printing is used for forms that are bound on the short edge of the paper, regardless of whether the printing is portrait or landscape. See also duplex, normal duplex.

tumbling set function
A function that performs calculations on a windowed set of the rows in a view. The set of rows to include is determined when a new data stream arrives, and the set empties when full.

tumbling window
A window that empties its contents when it advances to include the newest event.

See network tunnel.

A piece of music or other audio data intended to be played as background music.

tuned to the task
Pertaining to an optimized system that aligns as closely as possible with workload-specific needs.

tune out
To remove an activity from the My Activities view.

The process of adjusting an application, a system, or system control variables to operate in a more efficient manner.


  1. See IP tunnel.
  2. An L2TP access concentrator (LAC)-L2TP network server (LNS) pair. A tunnel carries Point-to-Point Protocol (PPP) datagrams between the LAC and the LNS. There may be many sessions in a single tunnel. A control connection that operates in the tunnel controls the establishment, release, and maintenance of sessions and the tunnel itself.

Treating a transport network as though it were a single communication link or local area network (LAN).

The process of treating a transport network as though it were a single communication link or local area network (LAN).

See trace utility program.


  1. An ordered collection of two or more members from different dimensions. For example, the tuple (2007, Camping Equipment, Japan) returns the value for the intersection of the three members: 2007, Camping Equipment, and Japan. Tuples can be used to filter and sort data, and to create calculations.
  2. A data structure that contains a given number of elements in a given order. In a relational database, a tuple represents a row or record of a table in the database.
  3. An individual piece of data in a stream that is represented as a set of attributes and data values. Typically, the data values in a tuple represent a single observation of data, such as a stock ticker quote or a temperature reading from an individual sensor. See also operator.
  4. In a multi-version RDBMS, a row that is valid for a specific transaction timeframe.
  5. See row.
  6. An XML structure that is used to group concepts in an XBRL taxonomy that must be understood together.

See tie-up record.

A machine with a rotary engine that is used to extract energy from a medium, such as water, steam, air, or gases.

turbo flow label
An identifying integer or bitmap attached to each message by the transmitter. A turbo flow label facilitates application-defined receiver filtering by range of integers or bit mask.

See Traversal Using Relay around NAT.

In communications, pertaining to changing a communications line from being able to send to being able to receive, or from being able to receive to being able to send.

turnaround document
A document into which data elements from the source document have been automatically transferred using a turnaround map.

turnaround map
A series of instructions that the system uses to create a turnaround document (a logical response document to the source) from an inbound (source) document, by transferring data from the source document to elements in the target document (translation object).

turnaround time

  1. The elapsed time between entry of the first character of the first input into the input interface and the passage of the last character of the last output through the output interface.
  2. In communications, the time required to reverse the direction from sending to receiving or from receiving to sending on a communications line.
  3. The total time consumed from the start to the completion of a specific unit of work measured at specific interfaces. When multiple inputs and/or multiple outputs are parts of one unit of work, intermediate turnaround time specifications may be needed.

A subfunction of Tivoli Workload Scheduler for z/OS that is activated when Tivoli Workload Scheduler for z/OS creates an updated version of the current plan.

Information designed around specified learning objectives and broken into smaller chunks of information, such as lessons. A tutorial allows a user to interact with a product example to learn the requisite base knowledge of a technology, concept, or product. A tutorial teaches fundamental distinctions, skills, and approaches to using a product or technology more effectively.

Tutorial System Support
An education course, supplied with the operating system licensed program, that provides introductory education for a variety of computer users, including system operators and business and data processing professionals. Tutorial System Support is part of the total IBM curriculum for the System i platform, which consists of classroom training and other methods of self-study.

See time variance.

See translation verification test.

See tape volume table of contents.

See transaction work area.


  1. A message that cannot exceed 140 characters and is posted on Twitter. See also hashtag, social network, social networking.
  2. To post a message on Twitter. See also social network, social networking.

A person who tweets. See also follower, social network, social networking.

twinaxial cable
A cable made of two twisted wires inside a shield.

twinaxial console
A 5250-based workstation using a twinaxial cable to connect to the system. The twinaxial console and the Operations Console can be a backup console for each other. See also alternate console, backup console, Operations Console.

twinaxial data link control (TDLC)
A communications function that allows personal computers, which are attached to the work station controller by twinaxial cable, to use advanced program-to-program communications (APPC) or Advanced Peer-to-Peer Networking (APPN) support.

twin segments
In a database, all child segments of the same segment type that have a particular instance of the same parent segment type. Root segments are also considered twins to each other. See also physical twins, sibling segments.

Pertaining to a disk that is connected to two nodes.

In architecture, a unit of measure equal to 1/20th of a point. There are 1440 twips in one inch.

Pertaining to a transmission medium that consists of two insulated conductors twisted together to reduce interference. For example, twisted-pair wiring can be used as an alternative to twinaxial cable.

A triangle that a user clicks to collapse or expand sections in a document or view.

See tiered entry workload license charge.

two-action activity
A business activity comprised of the following message choreography: Partner A sends a business action to Partner B, Partner B sends a Receipt Acknowledgement signal back to Partner A, then later Partner B sends a response business action to Partner A, and Partner A sends a Receipt Acknowledgement back to Partner B. When these messages have been exchanged successfully between these trading partners, the activity is deemed complete. For RosettaNet, PIP 3A4 (Manage Purchase Order) is an example of a PIP that specifies a two-action activity.

two-channel switch
A hardware feature with which an I/O device can be attached to two channels. A dynamic switch can be added, which makes it possible for both interfaces to be enabled at the same time with channel selection determined by programming.

two-dimensional bar code
See stacked bar code.

two-factor authentication
The use of two factors to authenticate a user. For example, the use of password and an RFID card to log on to AccessAgent.

two-pass calculation
An attribute that is used for re-calculating an accounts member after a consolidation takes place.

two-phase commit
A two-step process by which recoverable resources and an external subsystem are committed. During the first step, the database manager subsystems are polled to ensure that they are ready to commit. If all subsystems respond positively, the database manager instructs them to commit. See also distributed transaction.

two-port communications adapter cable
A cable that connects a 50-pin connector on a communications adapter card to two other communications cables that have 25-pin connectors (ports).

two product rule
A constraint imposed on two products.

twos complement
A radix complement in the pure binary numeration system. The twos complement is derived by taking the ones complement and then adding one to the resulting number. In a twos complement system, the twos complement of a number n is -n.

two-sided printing
Sheets of paper that are printed on both sides. In books, a two sided printed sheet contains two pages.

two-source matching
The process of matching records between two sources. See also matched record, matching.

two-step clustering
A clustering method that involves preclustering records into a manageable set of subclusters, and then applying a hierarchical clustering technique to those subclusters to define the final clusters.

two step movement
See two step putaway.

two step putaway
A putaway, or movement, task that requires the use of two separate pieces of material handling equipment and, therefore, two steps to complete the task. For example, a pallet jack may be used to transport a pallet to the end of a rack aisle, but a fork lift truck would be necessary to lift the pallet onto the rack. The system would be set to plan for two steps directing the pallet jack operator to deliver the pallet to a drop-off location, and the fork lift truck operator to pick up the pallet from the drop-off location.

two-way channel
In X.25 communications, a logical channel that allows both incoming and outgoing calls. See also one-way channel.

See teletypewriter exchange service.

See telex interface program.

See transaction.

See type coercion.


  1. A characteristic of a message element that describes its data content.
  2. In Ada language, a set of values and the set of operations that apply to those values.
  3. In a WSDL document, an element that contains data type definitions using some type system (such as XSD).
  4. An object that defines a data structure.
  5. In DCE X/Open Object Management (XOM), a category into which attribute values are placed on the basis of their purpose.
  6. A characteristic that specifies the internal format of data and determines how the data can be used.
  7. A description of data characteristics. The descriptions include the operations that can be performed on or by the data. See also data type.
  8. In Enhanced X-Windows, an arbitrary atom used to identify the data.
  9. In Java programming, a class or interface.
  10. A class of objects. All objects of a specific type can be accessed through one or more of the same interfaces.
  11. The definition of a data object or set of data objects that is graphically represented in a type tree in the Type Designer.

type-1 automated operator application program
An application program that can issue a subset of IMS commands by using the CMD call in DB/DC and DCCTL environments.

type-1 command
A command, generally preceded by a leading slash character, that can be entered from any valid IMS command source. See also type-2 command.

type 1 font
See outline font.

type 1 GUID
A globally unique identifier (GUID) that is generated using a combination of the generating system's MAC address, a time stamp, and a large random number. There is a very high probability that a type 1 GUID will be unique. See also globally unique identifier.

type 2.0 node
A node that attaches to a subarea network as a peripheral node and provides a range of end-user services but no intermediate routing services.

type 2.1 node
An SNA node that can be configured as an endpoint or intermediate routing node in a network, or as a peripheral node attached to a subarea network.

type-2 automated operator application program
An application program that can issue a subset of IMS commands using the ICMD call in DB/DC, DBCTL, and DCCTL environments.

type-2 command
A command that is entered only through the OM API. Type-2 commands are more flexible and can have a broader scope than type-1 commands. See also type-1 command.

type-2 index
An index that supports marking an index entry as pseudo deleted.

type 3 GUID
A globally unique identifier (GUID) that is generated by a uni-directional hash of textual or binary data. The same data always produces the same GUID, however there is a very low probability that other data will produce the same GUID. See also globally unique identifier.

type-ahead addressing
A feature that suggests mail contacts as they are being typed into the address fields of a message.

type annotation
The association of an XML schema type to an XML element node or XML attribute node, usually derived from XML schema validation.

type bar

  1. A pivoted type carrier having a type slug at its free end. (T)
  2. A bar, mounted on an impact printer, that holds type slugs. (I) (A)

type checking
The action of checking the validity of business items against a business item template during process simulation or deployment. Type checking is available only with decision gateways.

type coercion (TyCor)
The step in the process of identifying the correct answer that determines the question type information. One or more lexical answer types (LATs) and a candidate answer are the inputs to type coercion scoring.

type constructor
An SQL keyword that indicates to the database server the type of complex data to create (for example, LIST, MULTISET, ROW, SET).

type conversion

  1. A routine or set of routines that enables an application to change a specified string of data from one declared type to another. In AIXwindows programming, type conversion is performed on strings using conversion information contained in the MRM database.
  2. See boundary alignment.

typed collection variable
An ESQL/C collection variable or SPL variable that has a defined collection data type associated with it and can only hold a collection of its defined type. See also untyped collection variable.

typed data
In OSI, a data transfer service provided by the session layer that enables an application entity to send data whether or not it has permission to send.

typed dimension
A dimension in XBRL that is composed of a variable set of members that must conform to a specific type that is defined by using XML schema.

type declaration
The specification of the type and, optionally, the length of a variable or function in a specification statement.

In EGL, a part definition that can be used as a model of format.

type definition
A definition of a name for a data type.

typed parameter marker
A parameter marker that is specified along with its target data type. It has the general form CAST (? AS data type). See also parameter marker, untyped parameter marker.

typed table
A table in which the data type of each column is defined separately or the types for the columns are based on the attributes of a user-defined structured type.

typed view
A view in which the data type of each column is derived from the result table or the types for the columns are based on the attributes of a user-defined structure type.

All characters of a single type family or style, weight class, width class, and posture, regardless of size. An example is Helvetica bold condensed italic, in any point size. See also font.

type family

  1. All characters of a single design, regardless of attributes, such as width, weight, style, and size; for example, Courier, Gothic, or Helvetica.
  2. A complete character set of a font.
  3. All the type sizes and styles of one typeface. The group shares a common design but can differ in attributes such as character width and weight (examples are roman and italic, condensed and ultra bold). A typical font family contains four typestyles: Roman, Italic, Bold, and Bold Italic.

type font
Type of a given size and style, for example, 10-point: Helvetica Roman Medium.

type hierarchy

  1. The complete context for a Java class or interface including its superclasses and subclasses.
  2. A relationship that you define among named row data types in which subtypes inherit representation (data fields) and behavior (routines) from supertypes and can add more fields and routines.

type identifier
The name given to a declared type.

A measurement level used for data that does not conform to any of the other measurement levels (continuous, categorical, flag, nominal or ordinal). The typeless measurement level can also be used for fields with a single value, or for nominal data where the set has more members than the defined maximum. It is also useful for cases in which the measurement level would otherwise be a set with many members (such as an account number).

type-of-failure keyword
In diagnosing program failures, a RETAIN keyword that identifies the type of program failure that has occurred.

type of service
In QoS, a 3-bit field within a packet's IP header that signals to routers and other network devices the level of QoS to apply to the packet.

type posture
A typeface style variation indicating whether a typeface is upright as in roman or slanted to the right as in italic or cursive.

type promotion
The process of converting an atomic value from an earlier data type to a later data type in an ordered sequence. One example of an ordered sequence is INTEGER, DECIMAL, FLOAT, DOUBLE; another example is anyURI, string. Type promotion can be used, for example, in function calls and in the processing of operators that accept numeric or string operands.

type-safe linkage
A method for ensuring strict typing in C++ by resolving references to functions only when argument types and return values match or have defined conversions, as well as matching function names.


  1. Pertaining to material that has been set in type.
  2. To arrange the type on a page for printing.

type size
A measurement in pitch or points of the height and width of a graphic character in a font. For example, the vertical height (point size) of a given typeface, such as 10 point.

type specifier
In programming languages, a keyword used to indicate the data type of an object or function being declared.

type structure
In architecture, attributes of characters other than type family or typeface; for example, solid shape, hollow shape, and overstruck.

type style
The form of characters of a given size, style, and design within the set of the same font.

type substitutability
The ability to use an instance of a subtype when an instance of its supertype is expected.

type system
The type system defines the types of objects (feature structures) that may be discovered by a text analysis engine in a document. The type system defines all possible feature structures in terms of types and features. Any number of different types can be defined in a type system. A type system is domain and application specific.

type tree
In the Type Designer, the graphical representation of the definition and organization of data objects.

type UUID
In DCE Remote Procedure Call (RPC), the Universally Unique Identifier (UUID) that identifies a particular type of object and an associated manager.

type weight
The degree of boldness of a typeface series, caused by different thicknesses of the strokes that form a graphic character.

type width

  1. The horizontal size (set size) of a given typeface. The width may be given in units of measurement, such as set 9 point, or it may be descriptive, such as ultra-condensed, condensed, and expanded.
  2. A parameter indicating a relative change from the font's normal width-to-height ratio. Examples are normal, condensed, and expanded.

typographic font
See proportionally spaced font.

The style, arrangement, or appearance of printed type.