This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
A hierarchical dimension which typically reflects the structure of the organization (for example, cost centers and profit centers). The e.List is the basis for the structure of a Contributor application.
A digital trunking facility standard used in Europe and elsewhere, capable of transmitting and receiving 30 digitized voice or data channels. Two additional channels are used for synchronization, framing, and signaling. The transmission rate is 2048 kilobits per second. See also T1.
See error detect timeout value.
See expansion port.
See extended attribute.
See Enterprise Address Book.
The process of filling an entire new disk block with zeroes prior to writing any data. The "eager zero" approach requires a longer set-up time but improves runtime performance. See also lazy zero.
See enterprise application integration.
See External Authentication Interface application.
See enterprise asset management.
See European Article Numbering.
See effective address overflow exception.
See enterprise archive.
See enterprise archive.
earliest start time
The time after which a job or job stream can start, provided that all other time restrictions and dependencies are satisfied. Earliest start time is set using the at Dynamic Workload Console option or in the command-line scheduling language using the at keyword. See also actual start time, latest start time, planned start time, scheduled time.
To connect one process to another process so that a specific version of the called process is used. The calling process always uses the specified version of the invoked process even if updated versions are available.
The connection between two processes that uses a specified version of the invoked process. As a result, the calling process uses the specified version of the process that it is invoking, even when updated versions are available.
A measure of the value of work performed so far. Earned value uses original estimates and progress-to-date to show whether the actual costs incurred are on budget and whether the tasks are ahead or behind the baseline plan.
See enterprise application project.
ease of use leader (EOU leader)
See user experience leader.
See extended address volume.
See enterprise bundle archive.
See Extended Binary Coded Decimal Interchange Code.
EBCDIC double-byte encoding scheme
A structure that has separate, allocated coding space for control characters and graphic characters. Control characters do not have 16-bit codes in the EBCDIC structure definition. Graphic characters have a range from 4141 to FEFE. The space character is at 4040.
EBCDIC single-byte encoding scheme
An 8-bit-per-byte structure. The EBCDIC single-byte structure has a valid code-point range for 00 to FF. Control characters have a range from 00 to 3F. Graphic characters have a range from 41 to FE. The space character is 40.
See extended border node.
See effective Boolean value.
See electronic code book mode.
See export commodity control number.
See enterprise category definition file.
See extended CICS dynamic storage area.
See enrollment certificate.
See Enhanced Connectivity Facility.
- In data communication, a reflected signal on a communication channel. An echo verifies the accuracy of the signal.
- In word processing, to print or display each character or line as it is typed.
- A command, native to the bash and C shells, that writes arguments to standard output.
- In computer graphics, the immediate notification of the current values provided by an input device to the operator at the display console.
A filter algorithm that is used to compare a copy of the voice data being sent to a caller with the voice data being received from the caller. Any echo of the sent data is removed before the received data is sent on, for example, to a speech recognizer.
A program that is installed on all systems on which Emptoris products will be installed. During the installation process, the EchOS agent is the medium through which communication occurs between the system from which the Emptoris Strategic Supply Management Installer is run and the target systems on which Emptoris applications will be installed.
See external call interface.
See extended count key data.
See extended count key data device.
See execution control list.
See Enterprise Content Management.
See Ecma International.
The concept of reducing the waste and resources that go into producing goods and services. Businesses that adapt eco-efficiency decrease their impact on the environment and typically lower their costs.
economic order quantity (EOQ)
The optimum reorder quantity of an item, in the specified units of order, to be used as the default or standard reorder amount. The economic order quantity is a calculation of the optimum reorder amount that balances the costs of keeping inventory in stock and the costs of reordering inventory items.
economic shipping parameter (ESP)
A parameter that defines when a warehouse holds a shipment for a customer in anticipation of more shipments that can be shipped together, in order to optimize shipping costs.
See electronic customer support.
See extended common service area.
See execution diagnostic facility.
See Expandable Display Gadget.
- A return value or possible result from a state table action.
- In transaction monitoring, the point at which a transaction first comes in contact with the monitoring instrumentation.
See electronic data interchange.
See Electronic Data Interchange Association.
See Electronic Data Interchange-Internet Integration.
A group of consecutive EDI segments that repeat together in an EDI document definition. There is no object type in Data Interchange Services that defines an EDI loop on its own. EDI loops are logically defined within an EDI document definition.
See EDI transaction.
EDI root element
A representation of the EDI document that Sterling B2B Integrator is mapping. At the EDI root element, delimiters and syntax records can be defined. It is a group and can contain groups and segments.
See electronic discovery.
- To add, change, delete, rearrange, or modify the form or format of data.
- To change a numeric field for output by suppressing zeros and inserting commas, periods, currency symbols, the sign status, or other constant information.
On a form, a field whose value is determined by a formula that application designers write to supply a default value, edit the user's entry, and validate the entry to make sure it meets specific requirements.
A section of objects in a module that does not inherit access from the parent and can be locked and edited independently of other objects when the module is opened in shareable edit mode.
A letter or number indicating that editing should be done according to a defined pattern before a field is displayed or printed. See also edit word.
- A predefined format that users can apply to data in a viewer. For example, a custom edit mask of #,###.00;#,###.00- may default to 0.00.
- A byte string that tells the edit machine instruction or the Edit (QECEDT) API how to format a numeric value into a readable character string. An edit mask can format a numeric value so that languages that cannot use machine instructions directly can take advantage of this function.
- An access level that allows users to create, read, and edit any documents. Servers can replicate new documents, change existing documents, and, if they have delete access, make deletions.
- In Connections Files, an access level that allows a user to read, edit, comment on, download, recommend, upload a new version of, and set properties on the file. A user with this access can be notified of changes to the file, share it, add the file to a folder of theirs or to a folder they have Contributor access to. Editors can lock files, but can unlock a file only if they locked it.
In X12 EDI Standards, a group of logically related data that makes up an electronic business document, such as an invoice. The layout of an EDI transaction is described by an EDI Document Definition in Data Interchange Services.
A user-defined word with a specific format that indicates how editing should be done. See also edit code.
See exchange data link.
See everyday low pricing.
See engine dispatchable unit.
See Enterprise Extender.
See end-to-end credit.
See extended error queue element.
See event forwarding discriminator.
A base that can optionally be used in statistical tests on weighted tables. The base is designed to reduce the likelihood of the statistical tests producing significant results because the weighting has made adjustments to the data. The base is calculated by dividing the squared sum of weights for all of the respondents in the table by the sum of the squared weights.
The particular zone configuration that is currently in effect. Only one configuration can be in effect at once. The effective configuration is built each time a zone configuration is enabled.
See effective group identifier.
- An attribute of a process that is used in determining various permissions, including file access permissions. This value is subject to change during the process lifetime.
- The current group ID, but not necessarily the user's own ID. For example, a user logged in under a particular group ID might be able to change to another group ID. The ID to which the user changes then becomes the effective group ID.
See effective user identifier.
In Notes, the user under whose authority an agent runs. The effective user name will be used for database ACL access rights; rights to create databases, replicas, and templates on the server; and as the mail sender or document author. Effective user rights are not used to determine the operations an agent is permitted to perform; these are based on the agent signer (the agent owner).
effective user ID
The current user ID, although not necessarily the user's login ID. For example, if a user logged in under a login ID changes to another user's ID, that ID becomes the effective user ID until the user returns to the original login ID. All discretionary access decisions are based on the effective user ID.
An interface that enables an external agent (such as an autonomic manager) to perform operations or change the state of a managed resource. An effector is used to alter data in a managed resource, whereas a sensor is used to retrieve data from a managed resource. See also execute component, manageability interface, managed resource, sensor, touchpoint.
The estimated hours of work required for an activity. Effort is calculated based on the specified duration (in days) of the activity, and the number of working hours per day specified in the project calendar. See also work.
A character data in scientific notation, where a numeric value part is followed by an exponent indicator, usually the letter 'E', and a possibly signed integer that indicates a power of ten by which the numeric value should be multiplied.
See Encrypted File System.
See electronic general availability.
See Enterprise Generation Language.
See EGL archive file.
EGL Rich UI
A technology for writing client-side web applications in EGL. Rich UI lets traditional business developers create code that provides advanced web function such as instantaneous changes to a web page and dynamic use of Ajax, as well as calls to the following kinds of web services: REST and SOAP.
See Exterior Gateway Protocol.
See Enhanced Data Rates for GSM Evolution.
See electronic health record.
In data communications, a specification of the Electronic Industries Association (EIA) that defines the interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) using serial binary data interchange.
An EIA interface standard that defines the physical, electronic, and functional characteristics of an interface line that connects a communication device and associated workstation. It uses a 25-pin connector and an unbalanced line voltage.
An EIA interface standard that defines the physical, electronic, and functional characteristics of an interface line connecting a computer to communications equipment. It uses a balanced line voltage for noise reduction and longer distance capability. The system unit uses the send and receive pins from the set of 40 pins defined by the EIA-422A interface.
See EXEC interface block.
A measure of how well-connected an entity is, based on its inbound and outbound links. Eigenvector is one of the centrality measures used in social network analysis. See also authority, centrality, hub.
See Enterprise Identity Mapping.
See enterprise information system.
See Extended Industry Standard Architecture.
See Enterprise JavaBeans.
See enterprise bean.
A container that implements the EJB component contract of the Java EE architecture. This contract specifies a runtime environment for enterprise beans that includes security, concurrency, lifecycle management, transaction, deployment, and other services. (Sun) See also EJB server.
An object that implements the home interface of an enterprise bean. The EJB home provides life-cycle operations for the bean. The EJB home class is defined by the enterprise bean container's deployment tool. The instantiation of the class into an EJB home object is performed by the enterprise bean's container at run time.
A form of inheritance in which an enterprise bean inherits properties, methods, and method-level control descriptor attributes from another enterprise bean that resides in the same group.
In EJB query language, a string that contains an optional SELECT clause specifying the EJB objects to return, a FROM clause that names the bean collections, an optional WHERE clause that contains search predicates over the collections, an optional ORDER BY clause that specifies the ordering of the result collection, and input parameters that correspond to the arguments of the finder method.
EJB query language
A query language that defines finder methods for entity beans with container managed persistence. The definition uses a language based on SQL that allows searches on the persistent attributes of an enterprise bean and associated bean attributes.
Software that provides services to an EJB container. An EJB server may host one or more EJB containers. (Sun) See also EJB container.
- In text formatting, a skip to the next column or page.
- The process by which a volume is removed from a system-managed library.
See Enterprise License Agreement.
For a thread or an agent, the total time spent within a monitored time interval. See also processing time.
A mode that is used to dynamically grow or shrink a cell by adding or removing nodes. Nodes are added when a particular dynamic cluster is not meeting service policies and all possible servers are started. Nodes are removed if they are unused and service policies can be met without them.
Education or training that is delivered over the Internet. See also blended learning.
electromagnetic compatibility (EMC)
The design and test of products to meet legal and corporate specifications dealing with the emissions and susceptibility to frequencies in the radio spectrum. Electromagnetic compatibility is the ability of various electronic equipment to operate properly in the intended electromagnetic environment.
electronic business Extensible Markup Language (ebXML)
A set of specifications that enables enterprises to conduct business through the exchange of XML-based messages. ebXML is a joint initiative ofUN/CEFACT and OASIS.
electronic code book mode (ECB mode)
A method of enciphering and deciphering data in address spaces or data spaces. Each 64-bit block of plaintext is separately enciphered and each block of the ciphertext is separately deciphered.
electronic customer support (ECS)
A part of the operating system that allows a customer to access the question-and-answer (Q & A) function; problem analysis, reporting, and management; IBM product information; and technical information exchange.
Electronic Data Interchange Association (EDIA)
An organization that sets standards for the motor, rail, ocean, and air industries administered by EDIA. This is the original EDI organization for the United States, and through it, the original EDI Standards were developed, published, and maintained. It has now changed its name to EDIA, and has become the national EDI user group for the United States.
Electronic Data Interchange For Administration, Commerce and Transport (EDIFACT)
An international set of electronic data interchange (EDI) standards published by the United Nations that is built upon X12 and TDI (Trade Data Interchange) standards.
Electronic Data Interchange-Internet Integration (EDIINT)
A set of protocols for exchanging EDI and other business documents over the Internet. EDIINT was developed by the Internet Engineering Task Force (IETF).
electronic discovery (eDiscovery)
electronic general availability (eGA)
See also physical general availability.
electronic health record (EHR)
An individual’s medical record in digital format that includes a patient’s medical history and personal information, which can be accessed from many locations and sources. Doctors and hospitals own and manage the information that is in the EHR. See also personal health record.
Electronic Industries Alliance (EIA)
An organization of electronics manufacturers that advances the technological growth of the industry, represents the views of its members, and develops industry standards.
Electronic Industries Association (EIA)
See Electronic Industries Alliance.
A device that slides into a slot on some System i product control panels. When the keystick is in place, it electronically unlocks functions at the key pad on the control panel. This allows a system operator to select an operating mode. When the keystick is removed, those functions are electronically locked, which prevents those without authority from placing the machine in some other mode.
electronic medical record (EMR)
An electronic record consisting of many forms of data such as patient demographics, medical history, medicine and allergy lists, laboratory test results, radiology images, billing records, and advanced directives.
Electronic Service Agent (ESA)
A function that provides automatic hardware problem-reporting to help predict and prevent hardware errors by early detection of potential problems. With this function, users can also download fixes and automatically submit problems to IBM when appropriate.
electronic signature (ESIG, eSignature)
A stamp that is added to mail messages, fields, or sections that verifies that the person who originated the message is the author and that no one has tampered with the data.
Electronics Industries Association
An organization of electronics manufacturers that advances the technological growth of the industry, represents the view of its members, and develops industry standards.
The creation of an image on a form by uniformly charging the photoconductor, creating an electrostatic image on the photoconductor, attracting negatively charged toner to the discharged areas of the photoconductor, and transferring and fusing the toner to the form.
- An undesirable discharge of static electricity that can damage equipment and degrade electrical circuitry.
- The flow of current that results when objects having a static charge come into close enough proximity to discharge.
In certain printers, the invisible image consisting of discharged areas of the photoconductor as a result of exposure by laser raster scans of digital data, forms flash, or forms overlay.
- A value in a security label component. See also security label component.
- A graphical entity of one of three types: line, arc, or circle. Elements form the drawing component of the drawing file.
- In Java development tools, a generic term that can refer to packages, classes, types, interfaces, methods, or fields.
- A named piece of information, or a field, within a message, that has a business meaning agreed by the applications that create and process the message. See also complex element.
- A constituent of a model.
- An entity that satisfies all of the conditions of belonging to a given set. For example, an element within an array can be accessed by using the array index. See also array, ordinary array.
- A part of a section. Each element represents a separate class of data and is identified by a section name and class name. See also subarea.
- A component of a variable. In a categorical variable, there is one element for each category and there may be other elements as well, such as an element that displays a subtotal during analysis.
- An interactive component, such as a portlet, online video, or Web 2.0 interaction, of a traditional page view . Element tags are used to collect element data.
- In markup languages, a basic unit consisting of a start tag, end tag, associated attributes and their values, and any text that is contained between the two. See also attribute, attribute type.
- The smallest unit in a table, array, list, set, or other structure. Examples of an element are a value in a list of values and a data field in an array.
- In Informix, a member of a collection, such as a LIST, MULTISET, or SET data type. An element can be a value of any built-in data type, opaque data type, distinct data type, named row type, unnamed row type, or collection data type.
- A member of a dimension.
- A collection of attribute values describing a specific entity, such as a product, project or portfolio.
- In AIXwindows, an object or similar data structure having the properties that define a class. See also associative array.
- A component of a document, such as an EDI, XML, or ROD record. An element can be a simple element or a compound element.
- An object that encompasses a set of versions, organized into a version tree.
In SNA, a value in the element field of the network address that identifies a specific resource within a subarea. See also subarea address.
In AFP Utilities, a mark that is used to show the position of an element on a display; for example, '*B005' where B means bar code and 005 is the fifth element. See also element name.
In AFP Utilities, a name that appears in the image area instead of an element mark. See also element mark.
All the instances of an element with a particular value in a collection. In a non-unique collection, an element value may have more than one occurrence. In a unique collection, element value is synonymous with element occurrence.
See external line format message.
See enhanced logical link control.
See extended link pack area.
See expected license plate number.
The part of an if statement that contains the keyword 'else' followed by a statement. The else clause provides an action that is started when the if condition evaluates to a value of 0 (false).
See extract, load, and transform.
A unit of measure equal to the width or the height of the character "m" in a particular font. In a uniformly spaced font, an em is equivalent to a character. See also en.
A method of delivering merchandising and marketing content to customers. Email activities deliver customized email messages, based on JSP templates, which can include advertisements, suggestive selling initiatives, and promotions, among other merchandising and marketing content.
An email outline that serves as the basis for email content issued via an email activity. The email template is a model by which the business user defines email message content and optional placeholders for personalized content.
Pertains to a version of prerequisite middleware, for example an application server, that is included with and installed by another software product. Embedded middleware usually represents a functional subset of a licensed middleware product.
The type of user assistance that is integrated into product user interfaces. It is transparent to the user in that it does not require any user interaction to display it or interact with it. For example, embedded assistance includes inline text, user interface labels, and command-line syntax statements.
An information delivery model that provides users with a way of interacting with events, notifications, and business processes dynamically in context directly from an inbox, social home page, or other container without having to log in to and switch to another application or service. For example, the ability to approve a business process could be embedded into either a stream in IBM Connections or an email message.
embedded experience gadget
A type of widget, registered in the widget catalog, that enables a seamless integration between IBM Connections and IBM Note or iNotes. For example, the Connections EE Gadget allows for emails from Connections to display as an Embedded Experience such that users can interact with Connections directly within their email.
embedded text control
One or more bytes of control information, preceded by an escape character, contained within a set of text. The text control controls certain operations on following text, but it is not itself printed.
See electromagnetic compatibility.
See Extended Multiple Console Support.
See Europe, Middle East, and Africa.
A server thread that becomes available when either the work queue (the number of pending operations) or the time limit threshold since the last item was removed from the work queue is exceeded. This thread provides a method for the administrator to access the server during a denial of service attack.
See expedited message handling.
See expedited message handler queue.
See electromagnetic interference.
See ESCON multiple image facility.
See event monitoring point.
Highlighting, color change, or other visible indication of conditions relative to an object or choice that affects a user's ability to interact with that object or choice. Emphasis can also give a user additional information about the state of a choice or an object.
The property of double-strike printing in which characters are printed in multiple passes (usually two) with a slight offset, creating an artificial bold type. Emphasized printing is used to fill gaps and rough appearance in dot-matrix character forms. It also prints a bold font without changing the mounted character set.
See electronic medical record.
See event management services.
See European Money Transfer Form.
The use of software, hardware, or both by one system to imitate another system. The imitating system accepts the same data, runs the same programs, and achieves the same results as the imitated system.
The function of a network control program that enables it to emulate a transmission control unit. See also network control mode.
- A program that allows a host system to communicate with a workstation in the same way as it would with the emulated terminal. See also Network Control Program.
- A control program that permits functions written for one system or device to be run on another system or device.
- A facility of the integration test client that enables the emulation of components and references during module testing. Emulators are either manual or programmatic. See also manual emulator, programmatic emulator.
- An application that can be used to run an application meant for a platform other than the current platform.
- A program that causes a computer to act as a workstation attached to another system.
emulator high-level language application programming interface (EHLLAPI)
An application programming interface that provides programming access to the area in computer memory that corresponds to the user's screen image (this area in memory is known as the "presentation space").
A unit of measure equal to one-half the width of an em. For many typefaces, the average width of lowercase characters tends to be equal to the width of an en. See also em.
See end node.
- Pertaining to a state of the processing unit that allows the occurrence of certain types of interruptions. See also disabled.
- Pertaining to the state in which a communication device can accept incoming calls on a line.
- Pertaining to a condition that results in the execution of condition handlers or in the performance of a standard system action to handle the condition.
- In VTAM, pertaining to a logical unit (LU) that has indicated to its system services control point (SSCP) that it is ready to establish LU-LU sessions. The LU can separately indicate whether this prevents it from acting as a primary logical unit (PLU) or a secondary logical unit (SLU). See also disabled, inhibited.
- A condition of the printer (physically selected) in which the printer is available to the host processor for normal work. The enabled condition is also called online.
- Pertaining to an object that is accepting new data and is processing them. When an object is created, it is enabled.
The default object mode in which database objects are enabled. When a constraint, index, or trigger is in this mode, the database server recognizes the existence of the object and takes the object into consideration while executing data manipulation statements.
The first step of the condition handling model during which it is determined whether an exception is to be enabled and processed as a condition. See also condition step, termination imminent step.
enabling-new-function mode (ENFM)
A transitional mode of operation in the version-to-version migration process, during which the DB2 subsystem or data sharing group prepares to use the new functions of the new version. When operating in enabling-new-function mode, a DB2 data sharing group cannot coexist with members that operate at the prior version level. In enabling-new-function mode, fallback to a prior version is not supported, and new functions of the new version are not available for use. See also conversion mode, conversion mode*, enabling-new-function mode*, new function mode.
enabling-new-function mode* (ENFM*)
A transitional mode of operation in the version-to-version migration process that applies to a DB2 subsystem or data sharing group that was in new-function mode (NFM) at one time. When operating in enabling-new-function mode*, a DB2 subsystem or data sharing group is preparing to use the new functions of the new version but cannot yet use them. A data sharing group that operates in enabling-new-function mode* cannot coexist with members that operate at the prior version level. Fallback to a prior version is not supported. See also conversion mode, conversion mode*, enabling-new-function mode, new function mode.
- In object-oriented programming, the technique that is used to hide the inherent details of an object, function, or class from client programs.
- In communication, a technique used by layered protocols by which a layer adds control information to the protocol data unit (PDU) from the layer it supports. In this respect, the layer encapsulates the data from the supported layer. In the Internet suite of protocols, for example, a packet would contain control information from the physical layer, followed by control information from the network layer, followed by the application protocol data. See also data link switching.
To reduce the size of a dictionary file. The process converts a series of single entry linear search nodes into a single chain node for the entire string, thus reducing the size of the finite state transducer (FST). Typically, enchaining is less efficient at reducing the size of a dictionary than contraction.
- See encrypt.
- To scramble data or to convert data to a secret code that masks the meaning of the data to any unauthorized recipient. See also cryptographic, decipher.
- A transaction that can span multiple dispatchable units (service request blocks and tasks) in one or more address spaces and is reported on and managed as a unit.
- In Language Environment, an independent collection of routines, one of which is designated as the main routine. An enclave is similar to a program or run unit.
Any software product to which one or more components are assigned. The product is licensed as a whole and determines the licensing relationship of the components that are defined as its parts.
- The metal structure in which various electronic components are mounted.
- A unit that houses the components of a storage subsystem, such as a control unit, disk drives, and power source.
- In computer security, to convert plaintext into an unintelligible form by means of a code system.
- To convert data by the use of a code in such a manner that reconversion to the original form is possible.
- In PSS, to magnetically record information on a merchandise ticket, credit card, or employee badge. This information can be read by the point of sale terminal wand reader or the ticket unit reader.
See coded image.
A DB2 for i5/OS index that is specialized for quick row selection in query processing. This type of index also provides accurate database statistics, which can improve the optimization of queries. See also radix-tree index.
- A set of specific definitions that describe the philosophy used to represent character data. The number of bits, the number of bytes, the allowable ranges of bytes, the maximum number of characters, and the meanings assigned to some generic and specific bit patterns, are some examples of specifications to be found in such a definition. See also invariant character set.
- The set of rules that specifies the values for control characters and graphic characters. Examples of encoding schemes include ASCII, ISO/IEC 10646, Unicode and IBM's EBCDIC.
- A set of rules to represent character data.
- The underlying part of a code page that defines: a) the coding space (the number and allowable value of code points in a code page); b) the rules for sharing the coding space between control and graphic characters; and c) the rules related to the specific options permitted in that scheme, such as the number of bits in a byte, single-byte, or double-byte.
See end-node control point.
To systematically scramble information so that it cannot be read without the coding key. See also decrypt.
In computer security, the process of transforming data into an unintelligible form in such a way that the original data either cannot be obtained or can be obtained only by using a decryption process. See also data deduplication.
The inability to access encryption keys to decrypt data. See also encryption recovery key.
- See key.
- A mathematical value that allows components to verify that they are in communication with the expected server. Encryption keys are based on a public or private key pair that is created during the installation process. See also file encryption key, master encryption key.
encryption key manager
See encryption key server.
encryption recovery key
An encryption key that allows a method to recover from an encryption deadlock situation where the normal encryption key servers are not available. See also encryption deadlock.
An entity that is attached to a link. See also end constraint.
In SNA, the value (binary 1) of the end bracket indicator in the request header (RH) of the first request of the last chain of a bracket; the value denotes the end of the bracket. See also begin bracket, bracket, conditional end bracket.
- A removable hardware piece that fits over the end of each side of a drive assembly.
- A display at the end of an aisle.
In a system period or an application period, the column that indicates the end of the period. See also period.
An event that ends a process flow and, therefore, does not have outgoing sequence flow paths. Types of end events are message, terminate, and error. See also error end event, message end event, terminate end event.
- A visual marker within a process that identifies where a particular flow ends. Other concurrent flows within the same process will still continue executing.
- In SNA, a node in an APPN network that can be a source or target node, but does not provide any routing or session services to any other node.
- A node that identifies where a rule flow stops. A rule flow has at least one end node.
end-node control point (ENCP)
A control point that provides its own configuration, session, and management services with assistance from the control point in its serving network node. An ENCP is capable of engaging in CP-CP sessions with other nodes.
In CICS Transaction Server, CICS statistics written to an SMF data set at the quiesce or termination of a CICS run, or at a user-specified time. See also interval statistics, unsolicited statistics.
- A code that signals that the last record of a file has been read.
- On a data medium, a coded character indicating the end of the medium.
An interval during which the system holds a file open after the normal end of the file is reached until one or more records are updated or added to the end of the file. The length of the interval can be specified on the EOFDLY parameter.
end-of-text character (ETX character)
The BSC transmission control character used to end a logical set of records that began with the start-of-text character. See also end-of-transmission-block character.
end-of-transmission-block character (ETB character)
The BSC transmission control character used to end a block of records. See also end-of-text character.
end-of-transmission character (EOC character, EOT character)
A transmission control character used to indicate the conclusion of a transmission that may have included one or more texts and any associated message headings.
See endorsing peer.
- A networked device running the BigFix agent.
- One of two points that defines a line or arc. Objects are located by their endpoints.
- In Enterprise Service Tools, an association between a binding and a network address, specified by a Uniform Resource Identifier, which can be used to communicate with an instance of a service. An endpoint indicates a specific location for accessing a service using a specific protocol and data.
- The address of an API or service in an environment. An API exposes an endpoint and at the same time invokes the endpoints of other services. See also operation.
- A representation of a business solution that provides or receives data through UBX.
- A JCA application or other client consumer of an event from the enterprise information system.
- The system that is the final destination of an operation.
- The origin or destination of a file transfer within Sterling B2B Integrator.
- The system that is the origin or destination of a session.
- A host or gateway that comprises part of a virtual private network (VPN) connection.
- An entry point to a service, process, application, or topic destination. See also provider registry endpoint.
- A server, computer, machine or device that is monitored.
- The logical name of a physical location in the system. The location can be a queue, mailbox, or file system.
The management of groups of computers that are running various standard and mobile operating systems. Endpoint management includes patch management, software distribution, operating system deployment, network access protection and security, and hardware and software inventory.
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a database local to a node where local RPC servers register binding information associated with their interface identifiers and object identifiers.
endpoint map service
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a service provided by the RPC daemon that maintains a system's endpoint map for local RPC servers. See also partially bound binding handle.
See peripheral node.
endpoint reference (EPR)
An XML structure containing addressing information that is used to route a message to a web service. The addressing information includes the destination address of the message, optional reference parameters for use by the application, and optional metadata. See also managed resource ID.
Any system that is running i5/OS and is connected to the central system. An endpoint system is defined from the central system for the purpose of performing System i Navigator functions.
- The last system in a chain of systems that are linked by any combination of TELNET and pass-through requests.
- See destination node.
end-to-end credit (EE_credit)
In Fibre Channel technology, a credit scheme used to manage end-to-end flow control during the exchange of frames between two communicating devices. See also buffer-to-buffer credit, end-to-end flow control.
end-to-end flow control
The regulation of data transfers over an interface between a source and target. See also end-to-end credit.
In SQL replication, an approximate measurement of the difference between the time that a change takes place in a source table and the time that the change is applied to a target table. See also Apply latency, Capture latency, latency, Q Apply latency, Q Capture latency, queue latency.
A network obtained by connecting one or more fault-tolerant agents in a distributed network to a node in a z/OS network using TCP/IP, to perform workload scheduling. In an end-to-end network, the Tivoli Workload Scheduler for z/OS node becomes the master domain manager of the fault-tolerant agents to schedule and manage jobs in the distributed network. See also engine, workstation.
The format in which data appears within a client application as literal strings or character variables. End-user formats are useful for data types whose database format is different from the format to which users are accustomed.
A user-defined routine (UDR) that performs a task within an SQL statement that the existing built-in routines do not perform. Examples of tasks include encapsulating multiple SQL statements, creating trigger actions, and restricting who can access database objects.
end-user significant status
A type of significant status that relates to the work associated with a resource. IMS defines conversations, set-and-test-sequence numbers terminals, and Fast Path as end-user significant status for nodes and users. See also command significant status.
For logical unit (LU) 6.2, checking the identification of users by means of identifiers and passwords on attach function-management headers (FMHs). See also LU 6.2 conversation level security.
See enabling-new-function mode.
See enabling-new-function mode*.
A type of lock that a process holds on a region of a file preventing any other process from accessing that region with read or write system calls. In addition, the create command is prevented from truncating the files. See also advisory lock.
enforced subset match conversion/substitution
A conversion where the characters that exist in both the source coded character set identifier (CCSID) and the target CCSID have their integrity maintained. Characters that are not included in the target CCSID are presented to the user as substitution characters. This substitution is permanent. Any loss of character integrity is permanent. An EBCDIC-encoded character that is in the source CCSID but not in the target CCSID is replaced with 3F.
- A speech recognition process that accepts voice data as input and returns the text form of what was said as output. It is the process which performs the recognition.
- A customized OpenStack Heat orchestration engine that interprets blueprints. Engines use blueprints as patterns for virtual environments. See also blueprint.
- The unit that hosts the software for the metadata server.
- The core software for the scheduling environment. See also connector, distributed network, distributed workstation, end-to-end network, z/OS network.
- A component of the system that uses information entered through the management console and stored in the database to control project execution, send notification emails, and communicate with agents (running on servers).
- The unit that contains the processors that respond to requests for data from clients. See also storage port.
- A program that provides essential functions for other programs.
- An EDI processor that contains client profile information and is used to split, parse, and route EDI data.
- See InfoSphere Information Server engine.
- An algorithmic component that is used to solve optimization problems.
engine dispatchable unit (EDU)
A DB2 structure that coordinates application requests to a DB2 database by using a process (on UNIX operating systems) or a thread (on Windows operating systems) to carry out instructions on behalf of the DB2 database system. See also agent, scheduling policy.
engineering assessment order
A type of record that is used to request and complete an assessment of a technical publication to determine whether it is applicable to an aircraft or piece of equipment and, if the technical publication is applicable, to also determine how the aircraft or piece of equipment can comply with the technical publication.
The logical group of engine components for the InfoSphere Information Server suite and product modules (the InfoSphere Information Server engine components, service agents, and so on) and the computer or computers where those components are installed.
English forward auction
An RFx that is usually used by buyers to sell excess items in their inventory. Supplier organizations place their bids on these items in a live auction held over a limited duration of time, such as an hour.
English reverse auction
An RFx that contains a list of items that buyers want to procure. Suppliers place their bids on these items in a live auction held over a limited duration of time, such as an hour. The auction is normally awarded to suppliers with the lowest bid, but buyers could consider factors such as the quality level of suppliers, delivery time records, and research and development resources, before awarding the auction.
English Slot Grammar (ESG)
A parser that provides core linguistic analyses of both the questions and the text content used by IBM Watson to find and hypothesize answers. ESG is a fundamental component of question analysis, candidate generation, and analysis of passage evidence.
Enhanced 5250 Emulation
A program that allows a personal computer and a printer to be attached to a System i product and perform the functions of one or two 5250 workstations on one twinaxial cable. The workstations can be one display station, two display stations, or one display station and one printer.
enhanced concurrent mode
A mode in which instances of concurrent LVMs coordinate changes between nodes through the group services component of the Reliable Scalable Cluster Technology (RSCT) facility. Any disk supported for attachment to multiple nodes can be used in enhanced concurrent mode. See also fast disk takeover, forced varyon.
enhanced conflict detection
In SQL replication, conflict detection that guarantees data integrity among all replicas and the source table. The Apply program locks all replicas or user tables in the subscription set against further transactions. It begins detection after all changes made before locking have been captured.
enhanced logical link control (ELLC)
An X.25 protocol that allows the transfer of data link control information between two adjoining SNA nodes that are connected through an X.25 packet-switching data network. ELLC enhances error detection and recovery. See also physical services header, Qualified Logical Link Control.
A collection of basic functions for developing a variety of application environments. Toolkit functions manage Toolkit initialization, widgets, memory, events, geometry, input focus, selections, resources, translation of events, graphics contexts, pixmaps, and errors.
A change request for a new feature or functionality. See also change request.
See enquiry character.
- To put a message or item in a queue. See also dequeue.
- To queue up URLs to be crawled and prepared to be indexed.
- In an AIX PowerSC environment, the process of providing an initial set of measurements to the verifier. This information forms the basis for subsequent attestation requests.
- An entitlement for an organization to subscribe to a business service.
- The process of entering and saving user or user group information in a portal.
- Long-term identity credentials that are issued by Hyperledger Fabric Membership Service to entities in a permissioned blockchain.
- A digital document that enables licenses to be distributed to users. The document contains all the information that is related to the licenses acquired for a license-enabled product.
A collection of one or more System z nodes (including any attached zBX) that are managed as a single logical virtualized system by the zManager, through the use of a Hardware Management Console.
- An organization that brokers business. Each enterprise can consist of multiple organizations that are assigned various roles.
- Pertaining to a type of data storage device that has higher error recovery limits, vibration tolerance, and end-to-end error detection than standard desktop hard drives.
- The composite of all operational entities, functions, and resources that form the total business concern and that require an information system.
Enterprise Address Book (EAB)
A collection of information about people, departments, and locations in an enterprise. Information about people may include telephone numbers, mailing addresses, and the department in which a person works. Department information may include the department name, the manager, and the department name the department reports to. Location information may contain a mailing address. On a System i product, the EAB is the system distribution directory.
enterprise application project (EAR project)
A structure and hierarchy of folders and files that contain a deployment descriptor and IBM extension document as well as files that are common to all Java EE modules that are defined in the deployment descriptor.
enterprise archive (EAR)
A specialized type of JAR file, defined by the Java EE standard, used to deploy Java EE applications to Java EE application servers. An EAR file contains EJB components, a deployment descriptor, and web archive (WAR) files for individual web applications. See also Java archive, web archive.
A component that implements a business task or business entity and resides in an EJB container. Entity beans, session beans, and message-driven beans are all enterprise beans. (Sun) See also bean.
enterprise bundle archive (EBA)
A compressed file, with a .eba extension, that contains or refers to one or more OSGi bundles that are deployed as one OSGi application. See also bundle.
enterprise business design
The mission of enterprise business design is to create and make operational IBM's e-business process blueprint, drive IBM's business process community to world class leadership, link IBM performance to process objectives, and align with and support CIO top priorities.
A method of setting up servers so that the administrator can distribute the configuration of one of the servers to the other servers, using server-to-server communication. See also configuration manager, managed server, profile, subscription.
Enterprise Content Management (ECM)
The strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to organizational processes. ECM tools and strategies allow the management of an organization's unstructured information, wherever that information exists.
enterprise control point
A measurable and auditable control on processes, data, applications and infrastructure between enterprise and value chain to support enterprise objectives; for example, customer and financial data standards.
A database that is designed to support a large, networked organization. An enterprise database offers scalability, security, and administrative features for large, complex projects.
A directory of user accounts that define IBM Security Access Manager for Enterprise Single Sign-On users. It validates user credentials during sign-up and logon, if the password is synchronized with the enterprise directory password. An example of an enterprise directory is Active Directory.
Enterprise Generation Language (EGL)
A high-level language that allows developers to focus on business logic as they create complex business applications for deployment in any of several environments, including the web. The language simplifies database and message-queue access and the use of Java EE.
enterprise identifier (EID)
A work identifier for a distributed transaction that is both a local and a global identifier. The format of the EID is a concatenation of the transaction identifier (TID) and global transaction identifier (GTID).
Enterprise Identity Mapping (EIM)
A mechanism for associating a person or entity to the appropriate user identities in various user registries throughout an enterprise. EIM provides application programming interfaces (APIs) for creating and managing these identity mapping relationships, as well as APIs that applications use to query this information.
- In System Manager, all the resources that the applications manage and the functions for managing them.
- The applications that compose an enterprise's existing system for handling company-wide information. An enterprise information system offers a well-defined set of services that are exposed as local or remote interfaces or both. (Sun) See also resource adapter.
A combination of hardware and software that is designed to manage complex heterogeneous environments in a way that is open and secure, dynamic and industrial strength, and both global and personal. Enterprise IT combines clients' systems of record (or legacy systems) with systems of engagement (the current and securely managed cloud, analytics, and mobile solutions).
The process of sending events from a server to a designated event server. The event server routes the events to designated receivers, such as to a user exit. See also event.
enterprise model innovation
Innovating the role we play in the value chain by changing our extended enterprise and networks with employees, suppliers, customers, and others, including capability/asset configuration. See also industry model innovation, revenue model innovation.
Pertaining to the quality of the software architecture such that the software is stable and scalable in a manner that large organizations can rely on the software after it is deployed.
A component of the data server that records and stores all information about the monitored computers' storage assets and their usage over time. The repository is organized into relational database tables and is accessed by the data server using Java Database Connectivity (JDBC).
Enterprise Repository Environment (ERE)
A graphical data repository for IBM plant and lab locations around the world that provides a pull mechanism for customers to access data they are interested in today, and the building block for a distributed computing environment tomorrow.
enterprise search base annotator
A set of standard text analysis engines used in enterprise search for default document analysis processing. See also custom text analysis engine.
enterprise service bus (ESB)
A flexible connectivity infrastructure for integrating applications and services; it offers a flexible and manageable approach to service-oriented architecture implementation.
enterprise social networking
Social networking in a business context. Unlike social networking, enterprise social networking seeks to build business relationships between peers as opposed to social relationships.
An integrated set of applications that is used to control the business processes in a large organization. The scope of an enterprise system can be extended through integration with other systems.
Enterprise System Management (ESM)
An integrated collection of software tools that are used to monitor all hardware and software in a network, including the telephone system, all subsystems, routers, switches, and other components of the communication network.
Enterprise Systems Architecture/390 (ESA/390)
An IBM architecture for mainframe computers and peripherals. Processor systems that follow the ESA/390 architecture include the ES/9000 family. See also z/Architecture.
- A set of IBM products and services that provide a dynamically connected environment within an enterprise.
- A peripheral interface for an Enterprise Systems Architecture/390 and zSeries computer. The I/O interface uses ESA/390 logical protocols over a serial interface that configures attached units to a communication fabric.
Enterprise Tagging Service (ETS)
A central warehouse for tags entered by IBMers, regardless of where these tags were applied, whether to a blog, a ThinkPlace idea, a bookmark, a person, etc. At its core, then, ETS essentially acts as a tag management system to store, normalize and analyze tags.
An abstracted dictionary of enterprise data. The enterprise view provides a simplified business-oriented picture of the data in different data sources across the enterprise for data mining and reporting. Enterprise view is populated with data items defined as logical tables and columns. Enterprise view data items are mapped to analytical applications through the application views and to physical data sources through Data Provider Definitions.
- A data structure that contains externalized security policy information. Entitlements contain policy data or capabilities that are formatted in a way that is understandable to a specific application.
- The identification of a structured set of rights that are assigned to a generic user for access to the resources of a company or organization. There are four types of entitlement: business role, IT role, permission, and external role.
- In software licensing, the maximum allowed allocation of capacity as determined by a license agreement.
- A permission that controls access to market data.
- A set of details that are held about a real-world object such as a person, location, or bank account. An entity is a kind of item.
- A person, object, or concept about which information is stored. See also entity type.
- In object-oriented design, an item that can be treated as a unit and, often, as a member of a particular category or type. An entity can be a concrete thing or an abstract idea.
- The business that an XBRL report relates to.
- An object that has a unique identifier that permits other objects to refer to it logically. See also entity type.
- A collection of one or more identities that represent the same person, organization, place, or item. See also attribute, entity model, entity resume, identity, relationship.
- An element in an XML schema.
- A simple Java class that represents a row in a database table or entry in a map.
- In markup languages such as XML, a collection of characters that can be referenced as a unit, for example to incorporate often-repeated text or special characters within a document.
- A database object such as a table or column in a relational database.
- In OSI, the representation of a layer on a given open system.
- Any object included in a domain, whose attributes are used in queries and reports about that domain.
- A user, group, or resource that is defined to a security service.
- A device that holds personal or software attributes. It is the target object to collect data about the IBM Presence Zones system. An example of an entity is a customer's mobile device, such as an iPad or cellular phone.
- A user, group, or resource that is defined to a security service, such as RACF.
In EJB programming, an enterprise bean that represents persistent data maintained in a database. Each entity bean carries its own identity. (Sun) See also session bean.
- The set of user-defined attributes that define an entity in the system. See also attribute, entity.
- A representation of the data in data repositories and the relationships among the data fields in those data repositories.
In XML programming, a construct that refers to an entity. References to parsed general entities use an ampersand (&) and a semicolon (;) as delimiters. Entity references are used to make literal characters that are not valid in XML.
A process that compares the incoming identity and determines whether they represent an existing entity or a new entity. If an incoming identity is determined to represent an existing entity, person, organization, place, or item, they are resolved into a single entity. See also pipeline, precision, resolve.
A complete collection of information about an entity, including references, characteristics, disclosures, related entities, alert histories, and so on. See also entity.
entity semantic type
A semantic type that can be assigned only to an entity or an entity type. See also semantic type.
- A set that identifies entities that share common attributes. For example, Joe Bloggs might be an entity that has an entity type "customer". See also entity.
- A specific classification of an entity that includes user-defined properties that identify the exact nature of the entity.
- A descriptor of the characteristics of an entity, including the properties it can contain and its appearance in visualizations.
- A category of managed objects. See also entity.
- In Ada language, an entry is used for communication between tasks. Externally, an entry is called just as a subprogram is called; its internal behavior is specified by one or more accept statements specifying the actions to be performed when the entry is called.
- A single input operation on a workstation.
- An element of information in a table, list, queue, or other organized structure of data or control information.
- A collection of information about a cataloged object in a master or user catalog. See also entry name.
- In FORTRAN, a language construct within a procedure, designating the start of the execution sequences of the procedure.
- An item in an index. An entry consists of a main entry plus a locator, and can also have subentries or cross-references.
The set of generic and specific conditions for permitting a process to go forward with a defined task, e.g. test phase. The purpose of entry criteria is to prevent a task from starting which would entail more (wasted) effort compared to the effort needed to remove the failed entry criteria. (ISTQB)
The description of a personal directory entry. Each personal directory entry has an identical structure. The entry structure determines the type and size of each field in a personal directory entry.
A mobile device that features basic functions. Often, entry-level devices are mass produced. For example, a Nokia 6760 or a BlackBerry Curve. See also high-end device.
- A unique name for an entry, which is the same as the data set name in a data definition (DD) statement that describes the object. See also entry.
- In assembler language, a programmer-specified name within a control section that identifies an entry point and can be referred to by any control section.
See attribute instance.
An attribute that can be a user or a group, similar to what is allowed within the aclEntry. Each object has an associated entryOwner attribute. However, the entryOwner subject has certain privileges over the object.
- The address or label of the first instruction processed or entered in a program, routine, or subroutine. There might be a number of different entry points, each corresponding to a different function or purpose.
- In a routine, any place to which control can be passed. See also operation.
A physical ordering of data records in auxiliary storage according to ascending relative byte address (RBA) without respect to their contents. See also key sequence.
- A data set whose records are loaded without respect to their contents, and whose relative byte addresses cannot change. Records are retrieved and stored by addressed access, and new records are added at the end of the data set.
- A VSAM data set whose records are physically in the same order in which they were put in the data set. A VSAM data set is processed by using addressed direct access or addressed sequential access and has no index. New records are added at the end of the data set.
A template that allows the user to create a document, folder, or custom object. The template provides default values for the destination folder, properties, and security. See also form data entry template, template.
A thread which is used by the CICS DB2 attachment facility for transactions with special requirements, such as high priority transactions, or transactions with special accounting needs. See also command thread, pool thread.
Any value that a user enters for a project. An entry-type attribute can be configured with a default value, which users can accept or replace as they create or modify requirements. See also attribute type, attribute value, list-type attribute.
See enumeration constant.
enumeration constant (enum constant)
In the C or C++ language, an identifier, with an associated integer value, defined in an enumerator. An enumeration constant may be used anywhere an integer constant is allowed.
- A data type that represents integers and a set of enumeration constants with associated integer values.
- In the Fortran, C, and C++ language, a data type that represents a set of values that a user defines.
- A data type that defines a set of enumeration constants. In the C++ language, an enumeration type is a distinct data type that is not an integral type.
- In Ada language, a discrete type whose values are represented by enumeration literals which are given explicitly in the type declaration. These enumeration literals are either identifiers or character literals.
See enumeration type.
- A container stored in a user's profile that contains the user's encrypted password or password phrase so that it can be retrieved and decrypted by authorized users as part of a password synchronization solution.
- A string of data representing information about a message aside from the attachments and its recipients.
- A pair of segments that define or enclose an electronic transaction.
- A combination of header, trailer, and control segments that define the start and end of an individual EDI message. Each envelope contains a header segment and a trailer segment, which separate the envelope from other envelopes and provide information about the contents of the envelope.
A value used to define the format and contents of an envelope, so that the programs that work with specific types of envelopes are supported. The envelope types supported on a system are defined when the mail server framework is configured. The value associated with an envelope type must be a unique type value.
- A user-defined collection of resources that hosts an application.
- A group of variables or tags that is used both in tests and in transport definitions.
- A container for a list of variables. An environment can be assigned explicitly to servers, projects, and steps.
- A named collection of logical and physical resources used to support the performance of a function.
- A specific instance of a configuration of hardware and software.
- The settings for shell variables and paths that are set when the user logs in. These variables can be modified later by the user.
- A deployment target that behaves as a logical partition of the gateway capability.
- In AIX Common Desktop Environment, the set of rule files, resources, and message files that define the appearance and behavior of a specific desktop configuration.
Data that the storage control must report to the host. The data can be service information message (SIM) sense data; logging-mode sense data; an error condition that prevents completion of an asynchronous operation; a statistical counter overflow; or physical information, such as power supply voltages, air flow and temperature sensors.
Environmental Health widget
A widget that provides an aggregated health status of the servers in an environment. It shows a node, adapter (for Sterling B2B Integrator), or daemon (for Sterling Connect:Enterprise) chart for each server type in the environment.
Environmental Protection Agency NET (EPANET)
A program for analyzing the hydraulic and water quality behavior of pressurized pipe networks. It was developed by the U.S. Environmental Protection Agency's National Risk Management Research Laboratory.
Environment Division (ED)
One of the four main parts of a COBOL program. The Environment Division describes the computers on which the source program is compiled and those on which the object program is run; it also provides a connection between the logical concept of files and their records, and the physical characteristics of the devices on which files are stored.
The process that extracts from the system the objects, part of an environment (a selective export), or the entire environment (environment export) and then places the data in a separate file.
A handle that identifies the global context for database access. All data that is pertinent to all objects in the environment is associated with this handle. See also handle.
The process that adds the objects, part of an environment (a selective import), or the entire environment (environment import) from a file into the system. Before importing the data, the data is validated and standardized.
A list of all of the component versions that are deployed to an environment. See also component inventory.
A mechanism that ensures the availability of an application environment for deployment at a specific time. See also environment schedule.
A list of all scheduled activities for the environments that are associated with releases. See also environment reservation.
environment service module canister
See expansion canister.
Environment Services System Services (ESSS)
A component of CICSPlex SM that implements the formal MVS subsystem functions required by the product. ESSS provides cross-memory services, data space management, connection services, and lock management. An ESSS system address space is created at CICSPlex SM initialization and remains in the MVS image for the life of the IPL.
- A variable that is included in the current software environment and is therefore available to any called program that requests it.
- A variable that specifies how an operating system or another program runs, or the devices that the operating system recognizes.
- A variable that provides values for each type of environment in which a process will run (for example, development, test, and production environments). A user can set environment variables for each process application.
- A variable that defines an aspect of the operating environment for a process. For example, environment variables can define the home directory, the command search path, the terminal in use, or the current time zone.
A transportable form of the accessor environment element (ACEE) that can be used within a single system to create the original ACEE without accessing the RACF database. It can be used, with limits, elsewhere in a single sysplex to recreate the original ACEE without accessing the RACF database. See also accessor environment element.
See end of block.
See end-of-transmission character.
See Exceed on Demand.
See end of life.
See end of memory.
See economic order quantity.
See end of service.
See end-of-transmission character.
See end-of-transmission code.
See end-of-tape marker.
See ease of use leader.
See event processing adapter.
See Environmental Protection Agency NET.
See enterprise product content mapping file.
ephemeral port number
In some TCP/IP implementations, a temporary port number that is assigned to a process for the duration of a call. Ephemeral port numbers are typically assigned to client processes that must provide servers with a client port number so that the server can respond to the correct process.
See external presentation interface.
See extended pageable link pack area.
See Executive Program Manager.
See emergency power off.
- One iteration through a training set. During one epoch, all the training patterns are presented to the model so that predictions are generated to compare to the actual data.
- The time and date corresponding to 0 in an operating system's clock and time-stamp values. For most versions of the UNIX operating system, the epoch is 00:00:00 GMT, 01 January 1970. System time is measured as the number of seconds past the epoch.
- A timestamp that identifies directory replicas as being part of the same set.
See ePurchasing Opportunity Pipeline.
See emergency power-off warning.
See erasable programmable read-only memory.
See extended partition specification table.
See error queue element.
A join whose join condition uses only the equals predicate. See also join.
A calculation that reflects economic interest, which is the extent of the rights that a company has to the risks and rewards flowing from an operation. Typically, the share of economic risks and rewards in an operation aligns with the company’s percentage ownership of that operation, and the equity share is the same as the ownership percentage.
- A grouping of characters or character strings that are considered equal for purposes of collation. For example, many languages place an uppercase character in the same equivalence class as its lowercase form, but some languages distinguish between accented and unaccented character forms for the purpose of collation.
- A classification of values for which an object is expected to behave similarly.
Pertaining to a security label relationship in which two security labels contain the same security level and the same set of categories. In an equivalent relationship, each label is both dominated by, and dominates the other. See also disjoint, dominant.
A standardized measure of volume based on a process of equivalization. See also equivalization.
The relative number of equivalent units sold. For example, if two 12-packs of Coke are equal to one equivalent case, and two equivalent cases are sold, then the equivalent volume is two.
The assignment of a standardized unit of measure to a product based on the product’s description and the spread of sizes or counts that apply to that description. For example, both one case of Coke and two 12-packs of Coke are equal to one equivalent case. See also equivalent unit.
erasable programmable read-only memory (EPROM)
A type of memory chip that can retain its contents without electricity. Unlike the programmable read-only memory (PROM), which can be programmed only once, the EPROM can be erased by ultraviolet light and then reprogrammed.
A Resource Access Control Facility (RACF) and DFSMSdfp function that overwrites the space occupied by a data set when the data set is deleted (scratched) from a direct access storage device (DASD) or part of the space is released.
See Employee Referral Bonus Program.
See enterprise connector.
See entity relationship diagram.
See error-recording data set.
See extended read-only dynamic storage area.
See Enterprise Repository Environment.
See electronic request for service.
- See event.
- A discrepancy between a computed, observed, or measured value or condition and the true, specified, or theoretically correct value or condition. See also failure.
- A value that identifies an error condition.
- A code that describes how the processing of an operation ended at a computer workstation. See also completion code.
A type of error entry generated by device driver components. Certain device drivers can generate retry operations if an operation is not successful on the first attempt. They use counters to monitor the number and cause of retry operations, and they contain algorithms that decide when these counters should be sent to the error log.
error detect timeout value (E_D_TOV)
The time that a switch waits for an expected response before declaring an error condition. This value is adjustable in 1 microsecond increments from 2 - 10 seconds. See also resource recovery timeout value.
error device driver
A special file (pseudo device) driver used by the error logging facilities. Error entries are written to the error device driver by the errlog() subroutine and the errsave() kernel service. Error entries are read from the error device driver by the error daemon process and saved in the system error log file.
error end event
An end event that also throws an error. See also end event.
See error identifier.
- A value used to identify a unique error condition detected by the hardware or device.
- An 8-character code used to identify a particular failure. There is a unique error identifier for each error record template.
- An indication that an error has been detected.
- Any message displayed by DirectTalk in the System Monitor as an alarm and optionally written to the DirectTalk error log, or to the AIX error log (as an alert). Strictly speaking, the term error message should include only red (immediate attention) and yellow (problem situation) messages but it is also used to refer to green (a red or yellow message has been cleared) and white (informational) messages.
See diagnostic output.
Error Protocol (EP)
A protocol that provides a means for an Internetwork Packet Exchange (IPX) system to report that is has detected an error, and as a result of that error, the IPX system has discarded an IPX packet.
error-recording data set (ERDS)
On S/390 and zSeries hosts, a data set that records data-storage and data-retrieval errors. A service information message (SIM) provides the error information for the ERDS.
error record template
In the AIX operating system, a template that describes the error class, error type, error description, probable causes, recommended actions, and failure data for an error log entry.
error recovery procedure (ERP)
A procedure designed to help isolate and, where possible, to recover from errors in equipment. The procedure is often used in conjunction with programs that record information on machine malfunctions.
error start event
A start event that is triggered by a thrown error. An error start event is used only for event subprocesses as an error handling mechanism. See also start event.
See exception handling.
A classification of errors that identifies whether an error log entry is for a permanent failure, temporary failure, performance degradation, impending loss of availability, or undetermined failure.
See Enterprise Systems Architecture/390.
See External Subsystem Attach Facility.
See enterprise service bus.
- A course of action that runs when a task is not completed satisfactorily within a specific period of time. See also escalation limit.
- A process in which event notifications are sent to a wider list of event destinations as a result of unclearing an event within a certain time frame.
The amount of time, for example hours or days, that a participant has to respond to a request, before an escalation occurs. See also escalation.
- In markup languages, a series of characters that are used to replace markup-sensitive characters in specific contexts, such as & replaced with &.
- In markup languages, to replace markup-sensitive characters in specific contexts with a series of characters such as & replaced with &.
- To return to the original level of a user interface.
- A symbol that is used to modify the interpretation of the character or characters that follow it. Examples of uses of escape characters in SQL are delimiting identifiers, delimiting character constants, and modifying the special meaning of the underscore (_) and percent (%) characters in the LIKE predicate.
- The control character in a text-control sequence that indicates the beginning of a sequence and the end of any preceding text.
- A character that suppresses or selects a special meaning for one or more characters that follow.
- The units of vertical movement and horizontal movement that are used to represent the smallest movement of the cursor or of the current print position of a presentation device.
- Movement of one character space between the paper carrier and typing or printing position, parallel with the typing or printing line.
The direction in which successive character shapes are formed by a presentation device. See also character direction.
See ESCON Manager.
See Enterprise Systems Connection.
- An S/390 or zSeries channel that supports ESCON protocols. See also ESCON channel, parallel channel.
- A channel that has an Enterprise Systems Connection channel-to-control-unit I/O interface that uses optical cables as a transmission medium. See also ESCON channel.
ESCON Director (ESCD)
A class of devices that connect channels and control units only for the duration of an input/output (I/O) operation. See also ESCON Manager.
ESCON host system
An S/390 or zSeries host that attaches to the ESS with an ESCON adapter. ESCON host systems run on operating systems that include MVS, Virtual Storage Extended (VSE), transaction processing facility (TPF), or versions of VM.
ESCON Manager (ESCM)
A licensed program that provides host control and intersystem communication capability for ESCON Director connectivity operations. See also ESCON Director.
ESCON multiple image facility (EMIF)
In mainframe computing, a function that enables logical partitions (LPARs) to share an ESCON channel path by providing each LPAR with its own channel-subsystem image.
In ESS Specialist, the label on a pseudo-host icon representing a host connection that uses the ESCON protocol and that is not completely defined on the ESS. See also access-any mode, pseudohost.
See ESCON processor.
See entry-sequenced data set.
See extended shared dynamic storage area.
See Extended Submit Facility.
See English Slot Grammar.
See encoding scheme identifier.
See electronic signature.
An execution method for an authored/received contract or authored/received amendment contract that attaches an electronic signature for each of the signing parties to the contract, interactively online. See also execution.
See electronic signature.
See Extended Simple Mail Transfer Protocol.
esoteric unit name
An installation-assigned name for a group of devices having similar hardware characteristics; this name is used when requesting a device. For example, an esoteric unit name of TAPE might represent all tape devices in an installation. See also generic unit name.
Software that is used to streamline the sourcing process by generating requisitions, proposals, and information. eSourcing software automates the process of choosing a supplier for recurring purchases of a product or service by generating RFxs, distributing those requests to suppliers, and scoring the responses to reduce the time to select a supplier.
See extended system queue area.
See extended support release.
See enterprise single sign-on.
See Environment Services System Services.
established baseline coordinate
In architecture, the current baseline presentation coordinate when no temporary baseline exists or the last current baseline presentation coordinate that existed before the first active temporary baseline was created. If temporary baselines are created, the current baseline presentation coordinate coincides with the presentation coordinate of the most recently created temporary baseline.
See extended specify task abnormal exit.
The estimated length of time that an operation will use a workstation. This is initially based on a value that is provided when the operation is defined, but can be adjusted automatically by the feedback mechanism to reflect actual durations.
A scenario that is used to calculate the cost of the labor, material, and other resources that are required to perform construction work. An estimate request is typically aligned with an individual construction project.
A version of the estimate request that compares the costs of different project scenarios. Multiple versions for an estimate request can be created with different filter settings to represent scenarios for the project.
See expected time of arrival.
See end-of-transmission-block character.
See eject to front facing.
A packet-based networking technology for local area networks (LANs) that supports multiple access and handles contention by using Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the access method. Ethernet is standardized in the IEEE 802.3 specification. See also local area network.
A baseband local area network (LAN) with a bus topology in which messages are broadcast on a coaxial cable using a carrier sense multiple access/collision detection (CSMA/CD) transmission method.
See extract, transform, and load.
ETL development environment
The application that is used to develop the ETLs that will run in a specific environment. For the TDI environment, the development environment is Configuration Editor. For the Kettle environment, the development environment is Spoon.
See extract, transform, and load.
See Extended Terminal Option.
A template that contains information about the physical characteristics of terminals, user options and message queue names, and remote LTERMs associated with MSC links. See also logon descriptor, MFS device descriptor, MSC descriptor, user descriptor.
See external time reference.
See event-triggered tracking.
See end-of-text character.
See Extended UNIX Code.
EUC encoding scheme
See Extended UNIX Code encoding scheme.
See Extended UNIX code Japanese.
See Extended UNIX code Korean.
See extended user dynamic storage area.
See extended unique identifier.
European Telecommunications Standards Institute (ETSI)
A European organization founded in 1988 and responsible for the establishment of technical telecommunications standards. It produces European Telecoms Standards (ETS) for its membership, which consists of network operators, PTT manufacturers, users, and research institutes. Some of these functions used to be performed by the Commission of European Post and Telegraph. ETSI is similar in function to the International Telecommunication Union. See also Commission of European Post and Telegraph, International Telecommunication Union.
A product that is capable of correctly processing monetary data in the euro denomination. For a product to be considered EuroReady, all products with which it is used must also be EuroReady. IBM hardware products that are EuroReady might or might not have an engraved euro sign key on their keyboard.
In Sterling Order Management, a date, other than the current date, either in the past or the future, that is used for rule evaluation. For example, one could use the date of sale as the evaluation date to determine the amount a purchaser should be refunded.
even parity bit
A check bit that is usually generated or included in a parity-checking algorithm to make the total number of bits in a bit pattern an even number. See also odd parity bit.
- A system-level action that occurs during the processing of a workflow. For example, an event occurs when a workflow is created or when a step processor begins processing a work item.
- A mechanism by which devices publish data to the Internet of Things Foundation. The device controls the content of the event and assigns a name for each event it sends.
- Information about something that happened in the business domain, such as "a customer opens an account" or "a customer wires money".
- An activity of interest that takes place within the field of view of a camera channel.
- In the Notes Calendar, an entry with a duration of at least one day. For example, an all-day meeting or a vacation is an event.
- A condition identified in captured data that, when triggered, results in an action. For example, an event can be the appearance or absence of a specific data element or value in the request or the response, and resulting actions can include setting values and generating alerts.
- A meeting or web conference that is scheduled in advance. It includes added features such as the capability to assign multiple presenters, or send automated email announcements.
- A specific occurrence in the business process, often a status change or generated exception. Releasing an order and cancelling an order are both examples of events. When an event occurs in a transaction, an action is triggered.
- A group of promotions arranged in a particular theme.
- An object that has a timestamp that captures when it occurs, and possibly the time zone in which it occurs. See also event type.
- An occurrence of significance that involves procurement activity starting from requesting quotes, to inviting suppliers, bidding, analyzing, and awarding.
- An action taken by a visitor that triggers an action in the runtime environment. Examples of an event can be: placing a visitor into a segment, presenting an offer, or logging data.
- A significant occurrence that happens at a given place and time. See also incident.
- An element that is used to represent a change in state.
- A row or a series of rows of data.
- An action taken by a customer that triggers an action in the runtime environment. These can be a call to a call center, a bank deposit, any cell phone use, or a credit card purchase.
- A user or system activity that is logged with an appropriate message.
- A situation that may impede movement across the transportation network.
- A change to a state, such as the completion or failure of an operation, business process, or human task, that can trigger a subsequent action, such as persisting the event data to a data repository or invoking another business process. See also content event, message event.
- An action defined or tracked within Emptoris Contract Management, for which individuals are notified by means of a standard or custom notification template.
- A transition in database activity caused by users, applications, or the database manager. Events include connections, deadlocks, and transactions. See also event monitor.
- In computer graphics, information generated either asynchronously from a device or as the side-effect of a client request. Events are grouped into types and are not sent to a client by the server unless the client has issued a specific request for information of that type. Events are usually reported relative to a window.
- An occurrence of significance to a task or system. Events can include completion or failure of an operation, a user action, or the change in state of a process. See also alert, enterprise logging, event report, journal receiver, message, receiver, situation.
- The action that IBM Director takes in response to a specific event or events.
- A script, object, or workflow that is run as defined in a subscription.
An agent that monitors shipments, continuous moves, optimization runs, invoices, and contract changes. Users can subscribe to alerts, which the EventAgent sends when an event or exception occurs.
An alert that occurs when a collection of complex events meets specified criteria over a specified life span. Event alerts are based on business rules that are defined in a complex event processor, and can indicate situations of interest, such as two or more purchase transactions of more than 10,000 US dollars occurred in the last hour at locations 240 kilometers from each other. See also alert.
- A binding that describes the connection of a set of event types to an endpoint. See also inbound endpoint, outbound endpoint.
- An XML definition that can be deployed to CICS in a CICS bundle. This bundle can be enabled, disabled, installed, inquired on, and uninstalled. The event binding contains event specifications, capture specifications, and adapter information.
- In the Tivoli Enterprise Console product, a graphical user interface that enables system administrators to view and respond to dispatched events from the event server.
- A number assigned to a group of trace points that relate to a specific subject or system component. The defined event classes are listed in the trace profile.
The process of analyzing event data to identify patterns, common causes, and root causes. Event correlation analyzes the incoming events for predefined states, using predefined rules, and against predefined relationships.
event correlation sphere
The scope of an ECSEmitter method that allows an event consumer to correlate events. Each event includes the identifier of the correlation sphere to which it belongs and the identifier of its parent correlation sphere from the event hierarchy.
In an event message, the part of the message data that contains information about the event (such as the queue manager name, and the application that gave rise to the event). See also event header.
In DFSMShsm, a space management function similar to primary space management, except it is event-driven instead of scheduled. Low activity data sets are moved from the volume and occupied space is reduced until the volume low threshold is reached. There are two methods of event-driven migration: hourly (interval migration) and immediate (on-demand migration). See also interval migration, on-demand migration.
A component of the Common Event Infrastructure that receives events from event sources, completes and validates the events, and then sends events to the event server based on filter criteria. See also Common Event Infrastructure.
event forwarding discriminator (EFD)
A managed object that describes the criteria used to select which event reports are sent and to whom they are sent. See also discriminator.
A gateway that represents a branching point in the process where the alternative paths that follow the gateway are based on events that occur rather than the evaluation of expressions using process data (as with an exclusive or inclusive gateway).
- A set of criteria that is applied to events to identify a subset of those events. The criteria include constraints expressions that define the filter conditions.
- A container for inbound events that enables the user to group events without having to create a new monitoring context. Event groups are purely a visual construct and are not represented in the monitor model.
- A set of events that meet certain criteria defined by event group filters, which include constraints that are expressions that define the filter conditions. Event console operators can monitor event groups that are relevant to their specific areas of responsibility.
Software that initiates an event response that is configured by the administrator. See also message consumer.
In an event message, the part of the message data that identifies the event type of the reason code for the event. See also event data.
A type of asynchronous bean that serves as a notification mechanism and through which Java Platform, Enterprise Edition (Java EE) components within a single application can notify each other about various asynchronous events.
- A log that contains information about events for a particular system or group, for a particular metric, or for all the events that are associated with a specific monitor.
- A database table that contains information about certain system-level events related to work item processing.
- A log that maintains a history of event messages issued by all metadata servers in a cluster.
An optional feature used to log the occurrence of certain system-level events related to work item processing. For example, the event logging feature logs a message when a work item is created or when a step processor begins processing a work item.
- In Tivoli NetView for OS/390, the component that receives alert and resolution major vectors, translates these major vectors into generic event records, and applies the event status to the resource defined in the Resource Data Manager cache.
- A function that processes all tracking events and determines which are related to Tivoli Workload Scheduler for z/OS.
A message that contains information (such as the category of event, the name of the application that caused the event, and queue manager statistics) relating to the origin of an instrumentation event in a network of IBM MQ systems.
A database object for monitoring and collecting data on database activities over time. For example, starting the database might be an event that causes an event monitor to track the number of users on the system by taking an hourly snapshot of authorization IDs using the database. See also event, unformatted event table.
- An object that captures information about an event that has occurred in a system application and then passes the event object to the event infrastructure, where it is published to event subscribers or stored in a database for later retrieval. The event object describes an event type, indicates when the application generated the event, and identifies properties relevant to the event.
- A subset of the fields in the definition of an event.
A predicate in the capture specification used for filtering on the value of one of the options on a CICS command for application events or on one of the predefined options for system events.
An XML Schema Definition (XSD) type that provides information about the structure of part of an event. A single event definition can have different event parts that are defined by different XML schemas.
The set of events recognized by an activity (system events and user events that have been defined to it). Each activity has an event pool associated with it. An activity's event pool is initialized when the activity is created, and deleted when the activity is deleted. Event-related commands such as DEFINE INPUT EVENT and DEFINE COMPOSITE EVENT operate on the event pool associated with the current activity.
- A Java virtual machine (JVM) service that dispatches events among all modules.
- The service responsible for managing events through event reader, event listener and email reader services. The event processor manages the incoming event queue and is responsible for sending queued events to the policy engine for processing.
- A processor that manages and monitors multiple servers and processes events from the monitored servers. See also Sterling Control Center engine.
- The queue onto which the queue manager puts an event message after it detects an event. Each category of event (queue manager, performance, configuration, instrumentation, or channel event) has its own event queue.
- An ordered list of events.
- In computer graphics, a queue that records changes in input devices--buttons, valuators, and the keyboard. The event queue provides a time-ordered list of input events.
- A task that reads event records from an event data set.
- A service that monitors an event source for new, updated, and deleted events, and triggers policies based on the event data. See also database event reader, standard event reader.
- The unsolicited report that an event has occurred. In an Open Systems Interconnection (OSI) context, when a managed object emits a notification, the agent uses one or more event forwarding discriminators (EFDs) to find the destinations to which the report is sent. See also event.
- In OSI, the unsolicited notification of a significant occurrence by an agent to a manager .
- A business rule that determines how events are processed and what type of response, such as an event alert, is returned. In the complex event processing (CEP) tools, an event rule is called a situation.
- A piece of business logic that is evaluated by the runtime server when an event is received.
In CoOperative Development Environment/400, a machine-readable file, created by a compiler or when the Verify program choice is selected, that contains information about locations of errors in a source file.
- A data source that stores and manages events.
- An object that supports an asynchronous notification server within a single Java virtual machine. Using an event source, the event listener object can be registered and used to implement any interface.
Part of the event binding that represents a business event. The event specification contains the event name and the emitted business information. One or more capture specifications can refer to an event specification.
- A set of conditions required to initiate an event action. These include the target object, the event that must occur, and the action that is triggered.
- A subscription that obtains information about document or folder events that occur on an Enterprise Content Management (ECM) server.
event-triggered tracking (ETT)
A component that waits for specific events to occur and then adds a predefined application to the current plan. ETT recognizes two types of events: the reader event, which occurs when a job enters the JES reader, and the resource event, which occurs when the availability status of a special resource is set to yes.
- A set that identifies events that share common attributes. For example, a "purchase" event might have an amount, an item and a time. See also event.
- A category of events that defines the unit of measure for the value associated with events in Event Manager. Examples of event types include wire transfer, account opening, or credit card transaction.
- Any information that is captured for a client and used to determine eligibility and entitlement to a program or benefit.
- A set of details from supporting passages that are returned after searching the IBM Watson corpora that is used to form the answer to the question. The evidence provides text from passages within the corpora that support the answer.
A methodology for applying the best available evidence gained from the scientific method to clinical decision making. Evidence-based medicine attempts to assess the strength of evidence of the risks and benefits of treatments (including lack of treatment) and diagnostic tests.
See Earned Value Management.
An iterative development strategy that acknowledges that user needs are not fully understood and therefore requirements are refined in each succeeding iteration (elaboration phase). See also incremental development, iterative development.
For processor, real and virtual storage capacities and channel volume, 2 to the power of 60 or 1 152 921 504 606 846 976 bytes. For disk storage capacity and communications volume, 1 000 000 000 000 000 000 bytes. See also zettabyte.
exact end position
In RPG, an entry on the output specifications that indicates where the end position of a field or constant is to be placed in the output record. See also relative end position.
Exceed on Demand (EOD)
An X windows application to allow a user with either a Windows or Linux client and with EOD client code installed, to establish a working session with an AIX or Linux server or workstation.
- A condition or event that cannot be handled by a normal process.
- An indication of a suspicious and potentially vulnerable condition that requires additional information or investigation.
- An SQL operation that involves the EXCEPT set operator, which combines two result tables. The result of an exception operation consists of all of the rows that are in only one of the result tables.
- An event that occurs during the performance of the process that causes a diversion from the normal flow of the process. Exceptions can be generated by intermediate events, such as time, error, or message.
In Performance Tools, that portion of internal response time that cannot be attributed to the use of the processor and disk. An exceptional wait is caused by contention for internal resources of the system, for example, waiting for a lock on a database record.
exception class data
CICS monitoring information on exception conditions raised by a transaction, such as queuing for VSAM strings or waiting for temporary storage. This data highlights possible problems in system operations. See also monitoring record.
- An expression that compares a data point value to a user-specified value. The user-specified value can be a static value, a calculated value (for example, variance between actual and plan), or one of the two thresholds defined for the fact. An exception condition is evaluated at the time a data point is captured.
- An abnormal condition that may arise during execution of a program.
A set of sequence flow paths that originates from an intermediate event that is attached to the boundary of an activity. The process does not traverse this path unless the activity is interrupted by the triggering of a boundary intermediate event. See also normal flow.
- In C++, the catch block that catches exceptions when they are thrown from a function enclosed in a try block.
- A set of routines that responds to an abnormal condition. An exception handler is able to interrupt and to resume the normal running of processes.
A WebSphere MQ report message type that is created by a message channel agent when a message is sent to another queue manager, but that message cannot be delivered to the specified destination queue.
exception response (ER)
In SNA, a value in the form-of-response-requested field of the request header that directs the receiver of the request to return a response only if the request is unacceptable as received or if the request cannot be processed; that is, only a negative response can be returned. See also definite response, no response.
- A table that contains copies of rows that violate unique index or primary key rules. It includes a timestamp and a description of the violation.
- A user-created table that reflects the definition of the table being loaded.
- A table that holds rows that violate referential constraints or check constraints that the CHECK DATA utility finds.
exception trace entry
An entry made to the internal trace table and any other active trace destinations when CICS detects an exception condition. It gives information about what was happening at the time the failure occurred and what was being used.
- The transfer of a document from one organization to another that follows the security, protocol, and other configurations specified in an exchange profile.
- A set of one or more non-concurrent related sequences passing between a pair of Fibre Channel ports. An exchange encapsulates a "conversation" such as a small computer system interface (SCSI) task or an Internet Protocol (IP) exchange. Exchanges can be bidirectional and can be short--lived or long-lived.
- A process that provides value-added services for distribution, access, and use of master data.
- In architecture, the predictable interpretation of shared information by a family of system processes in an environment where the characteristics of each process must be known to all other processes. See also interchange.
- In a retail scenario, shipping a replacement item to a customer who has returned items.
exchange data link (EDL)
A serial connection that carries messaging information between DirectTalk and the Lucent Technologies 1AESS, Northern Telecom DMS100, Ericsson MD110 switch, or Siemens Hicom 300.
- The ID that is exchanged with the remote physical unit when an attachment is first established.
- A specific type of basic link unit that is used to convey node and link characteristics between adjacent nodes. XIDs are exchanged between link stations before and during link activation to establish and negotiate link and node characteristics, and after link activation to communicate changes in these characteristics.
- The process by which, when an APPC connection is established between two CICS systems (or reestablished after failure), the name of the system log currently in use on each system is passed to the partner. The exchange log name process affects only sync level 2 conversations. It is used to detect the situation where a failed CICS has been communicating with a partner that is waiting to perform session recovery, and is restarted using a different system log. See also logname.
- A process used when sessions are first established to determine which log is being used by the remote system.
- A record that tracks the exchange of a piece of equipment.
- An order that is used to ship replacement items to a customer who has returned items.
The configuration information that is required to send messages to a partner or receive messages from a partner. Information includes security, certificates, partner details, direction, triggers, and actions.
See external CICS interface.
- To prevent the use of a managed disk (MDisk) by a clustered system because of certain error conditions.
- The process of identifying files in an include-exclude list. This process prevents the files from being backed up or migrated whenever a user or schedule enters an incremental or selective backup operation. A file can be excluded from backup, from space management, or from both backup and space management.
An object authority that prevents the user from using the object or its contents. See also all authority.
See include-exclude list.
A customization option that restricts access to selected information in the cube. The exclude option omits a category and all data associated with the category and its descendants from a dimension view or custom view.
- A WiFi enabled device that the system indicates should not have data collected from it by IBM Presence Zones. These devices are identified by the system during the exclusion process and can include WiFi access points, or, in a retail example, a store employee's mobile device or the sensors.
- A parameter or process whose values are excepted during tests.
- A finding that a user can mark and ignore.
- An access intent that establishes the intent of an application to reserve the exclusive use of the database. If a subsystem requests and DBRC grants exclusive access to a subsystem, then no other subsystem may access the database concurrently, regardless of the share level of the database.
- A condition that permits write access to a single user only.
A process for converting data that removes white space within tags, uses specified character encoding, sorts namespace references (eliminating redundant ones), removes XML and DOCTYPE declarations, and transforms relative URIs into absolute URIs. The process does not change the logical representation of the data.
A connection that gives one user sole access to a particular database so that database operations are restricted to that user. The user with the exclusive connection can establish additional connections in shared mode.
- A method for preventing multiple, write-add, basic direct access method (BDAM) requests from updating the same dummy record or writing over the same available space on a track. When specified by the user, the exclusive-control lock requests that the system prevent the data block that is about to be read from being modified by other requests; it is specified in a read macro and released in a write or read macro. When a write-add request is about to be processed, the system automatically obtains exclusive control of either the data set or the track.
- A type of access control in which VSAM keeps control of the control interval (CI) containing a specific record until a REWRITE, UNLOCK, or DELETE command is issued for that record. The purpose of exclusive control is to protect against simultaneous update.
In IMS, the scheduling intent type that prevents an application program from being scheduled concurrently with another application program. See also scheduling intent.
exclusive level sharing
See level zero data sharing.
An optional mode of terminal operation in which a terminal may receive no output other than a response to an input. Any output excluded from being sent is held for transmission until the terminal is removed from exclusive mode.
A call from a section in one overlay path to one in a different path. Because an exclusive reference causes the calling section to be overlaid, return to the calling section is not possible.
A type of segment that is in the same region but not in the same path. Exclusive segments cannot be in virtual storage simultaneously. See also inclusive segment.
In Remote Operations Service (ROPS), an option that indicates whether only the commands in the command list can be processed by ROPS or none of the commands in the command list can be processed by ROPS.
exclusive SQL statement
An SQL statement that must be followed by a commit or rollback operation before any other SQL statement can be executed in the same SQL session. Exclusive SQL statements are grouped into sets; the database manager can execute only one SQL statement from the set at one time. Examples of exclusive SQL statements include the CREATE SERVICE CLASS SQL statement and the AUDIT SQL statement.
A means by which CICS and data managers, such as SQL/DS, combine to prevent concurrent updates of resources. A transaction updating a recoverable resource gets control of that resource until it terminates or indicates that it wants to commit those changes with a syncpoint command. Other transactions requesting the same resource must wait until the first transaction has finished with it.
- To overlay the current process with another executable program. See also fork.
- In a VM operating system, a user-written command file that contains CMS commands, other user-written commands, and execution control statements, such as branches.
See application programming interface.
EXEC interface block (EIB)
A control block associated with each task in a CICS command-level environment. The EIB contains information that is useful during the execution of an application program (such as the transaction identifiers) and information that is helpful when a dump is being used to debug a program.
See executable identifier.
- A program that can be run as a self-contained procedure. It consists of a main program and, optionally, one or more subprograms.
- A program in a form suitable for execution by a computer. The program can be an application or a shell script.
In Tivoli NetView, a symbol defined such that double-clicking on it causes an application program to perform an action on a set of target objects. See also explodable symbol.
To indicate the complete acceptance, agreement, and endorsement of a version of the contract. This action creates a revision and results in an executed contract or executed amendment contract.
The autonomic manager component that changes the behavior of the managed resource using an effector, based on the actions recommended by the plan component. See also autonomic manager, effector.
An authored contract, filed contract, quote contract, or amended contract that was executed. This contract cannot be modified. See also contract.
A file or folder (directory) access permission that, for files, enables the user to run a program or shell script file, or for folders, enables the user to access the folder (directory) contents.
- A system event whereby all appropriate parties sign the contract. See also e-sign, ink sign.
- The process of carrying out an instruction or instructions of a computer program by a computer.
- The date that the final signature is placed on a contract. It may be changed by an internal user at the time of execution. It is available as a system term.
- The date on which something such as a work order is executed.
execution diagnostic facility (EDF)
A CICS facility used for testing application programs interactively online, without making any modifications to the source program or to the program preparation procedure. The facility intercepts execution of the program at various points and displays information about the program at these points. Also displayed are any screens sent by the user program, so that the programmer can converse with the application program during testing just as a user would do on the production system.
See runtime environment.
A named process or set of processes within a broker in which message flows are executed. The broker is guaranteed to enforce some degree of isolation between message flows in distinct execution groups by ensuring that they execute in separate address spaces, or as unique processes. See also broker, message flow.
A logical queue in the transmission control queue in which a process can be transferring data to or from a remote Sterling Connect:Direct node or can be waiting for a connection to the remote node before the process can perform its tasks.
The behavior or response that is produced or observed when a component or system is tested. This behavior and information regarding the test run such as the weight distribution and result details are also recorded. See also expected result.
A server that enables analytical processing of resources stored in the repository. For example, to execute an IBM SPSS Statistics syntax in an IBM SPSS Collaboration and Deployment Services job, an IBM SPSS Statistics execution server must be designated.
Settings that influence how a component behaves at execution time. These settings are compiled into the map file or system file. Many of these settings compiled into the map can be overridden (or partially overridden) using execution commands and options.
A client on which a job or other activity is performed. For example, if an application is being installed on a particular server, that server is the execution target for the installation activity.
The period when a request that is specified by an SQL statement is acted on by a database. See also system time.
Executive Program Manager (EPM)
A manager responsible for providing leadership and strategic guidance for import compliance and supply chain security activities at a number of manufacturing/development sites or countries within a geography.
In label-based access control, a privilege that causes one LBAC rule of one security policy to be bypassed for a user or a set of users to whom that privilege is granted. See also LBAC credentials.
A mandatory document that is required by the regulatory body, along with the report itself. See also supporting document.
- To execute an instruction within a section of a computer program (for example, within a loop, subroutine, or module) in order to terminate the execution of that section.
- An instruction in an application, routine, or subroutine that causes control to pass to another application, routine, or subroutine.
- A Boolean expression that controls when processing at a process node is completed.
- A condition that needs to be defined to stop the approval process from continuing up to the reporting hierarchy.
The set of generic and specific conditions, agreed upon with the stakeholders, for permitting a process to be officially completed. The purpose of exit criteria is to prevent a task from being considered completed when there are still outstanding parts of the task which have not been finished. Exit criteria are used to report against and to plan when to stop testing. (ISTQB)
A specific point in a system function or program where control may be passed to one or more specified exit programs. See also exit program.
- See exit routine.
- A user-written program that is given control during operation of a system function.
- A program to which control is passed from an exit point. See also exit point.
exit programming interface (XPI)
Provides global user exit programs with access to some CICS services. It consists of a set of function calls that can be used in user exit programs to extend CICS functions.
A program that receives control from another program to perform specific functions. See also standard exit.
- The value that is assigned to an entry in a collaboration area to determine the next step to which it will be moved. The available exit values are defined for each workflow step in a workflow. See also workflow step.
- A code sent to either standard output or standard error on completion of the command.
- A numeric value that a command returns to indicate whether it completed successfully. Some commands return exit values that give other information such as whether a file exists. Shell programs can test exit values to control branching and looping.
- To display information collapsed under a category name or parent document.
- See pinch out.
A component that displays the sources and targets that are associated with it in the Integration Flow Designer. See also contracted component.
On most computers, additional memory accessed through an adapter or feature card along with a device driver program. See also conventional memory.
A QName where the prefix from the lexical form is resolved into the namespace URI. If the lexical form of the QName does not have a prefix, the namespace URI is the default namespace, which can be empty. See also qualified name.
A typeface in which all characters are widened. See also condensed type.
A process that occurs when the length of a converted string is greater than that of a source string. See also contracting conversion.
expansion I/O unit
Additional hardware units used to provide additional disk and I/O capacity. Expansion I/O units are located in SP frames, attached to specific SP Nodes, and controlled by a frame supervisor. Expansion I/O units are not CSM nodes.
expansion port (E_port)
In the building of a larger switch fabric, a port used as an inter-switch expansion port to connect to the E_port of another switch. See also isolated E_port.
A machine type or feature that can be connected to a system unit to provide additional storage and processing capacity. This expansion unit may contain I/O hardware such as cards, tapes, and disk drives.
A list of software items that are expected to be installed on the computers in a network. The list can be verified against the results of software scans. See also raw data set, software item.
Inventory that has been ordered from a vendor and that is expected to be received by the Seller. This information is contained in an expected inventory record. See also expected inventory record, seller.
expected inventory record
Lists the inventory that has been ordered from a vendor and that is expected to be received by the Seller. An expected inventory record may contain information for multiple items, fulfillment centers, and dates. See also expected inventory, inventory receipt, seller.
The behavior predicted by the specification, or another source, of the component or system under specified conditions. (ISTQB) See also execution result.
The average value for a given attribute for a population data set. This value is ultimately used to determine reason code assignment, it is typically used for linear and logistic models where the interaction of variables is controlled.
In remote communications, a list of characters or signals a program or modem should expect to receive from a remote system, followed by the characters or signals the program or modem should send to the remote system after it receives the expected input. The sequence can also include a subsequence that tells the program or modem what to send if it does not receive the expected input.
In OSI, a data transfer service provided by the session layer to transfer a small amount of data that is not subject to permission-to-send and flow-control restrictions. The OSI layers attempt to expedite the transfer of such data.
In SNA, a data flow designated in the transmission header (TH) that is used to carry network control, session control, and various data flow control request/response units (RUs); the expedited flow is separate from the normal flow (which carries primarily end-user data) and can be used for commands that affect the normal flow. See also normal flow.
expedited message handling (EMH)
An IMS Fast Path facility that processes single-segment input and output messages. Fast Path messages that use the EMH bypass the normal message queuing and application scheduling and therefore these messages are processed faster than non-Fast Path messages.
A question set run through a Watson pipeline based on configuration and training models. The configuration and training models are varied over time in an attempt to improve question answering accuracy. When question sets are modified, new experiments must be created.
A service that is not ready for production and can be removed from production at any time. See also beta service.
- An extension of the storage management function of the i5/OS operating system that allows the single-level storage architecture to take better advantage of the main storage (cache) capacities.
- A set of improved paging algorithms that is used for database files and related objects.
A public community that enables experts, such as developers to grow technical skills on IBM products, download trial versions and build relationships with external and internal experts. An example of an expert community is developerWorks.
- The date at which a file is no longer protected against automatic deletion by the system.
- The date after which a database file member should not be used.
- The date associated with a specific lot of material which designates when the shelf life of the product is terminated. Generally used with products that can spoil, oxidize, or break down over time.
In DFSMSrmm, the process of inventory management that ensures that expired volumes are released and that carries out required release actions on those volumes. See also inventory management.
In Backup, Recovery, and Media Services, pertaining to media that is available for a rewrite operation. Media is automatically expired when both the retention period (expiration date) and storage duration have been satisfied.
A migrated or premigrated file that has been marked for expiration and removal from storage. If a stub file or an original copy of a premigrated file is deleted from a local file system, or if the original copy of a premigrated file is updated, the corresponding migrated or premigrated file is marked for expiration the next time reconciliation is run.
To capture detailed information about the access plan that was chosen by the SQL and XQuery compiler to resolve an SQL or XQuery statement. The information describes the decision criteria that are used to choose the access plan.
A specifically invoked cast using either the CAST AS keywords or the cast operator ( :: ). The database server does not automatically invoke an explicit cast to resolve data type conversions. See also cast, implicit cast.
A connection to a database in which both a user ID and password are specified. See also implicit connection.
explicit focal point
An assigned focal point for which the set of nodes to be included in its sphere of control is defined locally. An explicit focal point initiates the management services capabilities exchange that brings a node into its sphere of control. See also implicit focal point.
A format that relies upon syntax to separate data objects. Each data object can be identified by its position or by a delimiter in the data. Delimiters will also appear for missing data objects. See also implicit format.
- In a DB2 pureScale environment, a locking approach whereby table locks supersede row locks or page locks, resulting in reduced network traffic to the CF.
- Locking that is used to make the parent-child relationship between resources known to the internal resource lock manager. This type of locking avoids global locking use when no inter-DB2 interest exists on a resource.
A pool of workstation or printer LUs that Communications Server uses to satisfy connection requests that specify a particular device name. See also implicit pool.
A privilege that has a name and is held as the result of SQL GRANT and REVOKE statements: for example, the SELECT privilege. See also implicit privilege.
A process by which SQL statements are bound by a user issuing the REBIND or db2rbind command. See also rebind.
explicit route (ER)
In SNA, a series of one or more transmission groups that connect two subarea nodes. An explicit route is identified by an origin subarea address, a destination subarea address, an explicit route number, and a reverse explicit route number. See also path, route extension, virtual route.
A transaction that is initiated by the BEGIN WORK statement. This type of transaction is available only in non-ANSI compliant databases that support logging. See also implicit transaction, singleton implicit transaction.
explicit trusted connection
A trusted connection that allows both switching the current user ID of the connection to a different user ID and acquiring a trusted context role (a default or user-specific role). See also trusted connection.
In Tivoli NetView, a symbol defined such that double-clicking on it or dragging and dropping it displays the child submap of the parent object that the symbol represents. See also executable symbol.
See expanded application directory.
See explorer packet.
A graphical view in the Job Scheduling Console used to modify and maintain job streams in the database and the plan. See also plan.
A setting that configures the parameters governing how an application will be explored by AppScan. See also Explore stage.
The stage of an AppScan scan during which the logic and objects of an application are identified, prior to testing. See also Explore setting.
- In floating-point format, an integer constant specifying the power of ten by which the base of the decimal floating-point number is to be multiplied.
- A number, indicating to which power another number (the base) is to be raised.
In time series analysis, a method of forecasting that uses weighted values of previous series observations to predict future values. The technique is useful for forecasting series that exhibit trend, seasonality, or both. See also time series analysis.
The program interruption that results when an overflow occurs during execution of a floating point instruction. The overflow is triggered when the resulting value from the instruction has a characteristic that is larger than the floating-point data format can handle. See also overflow.
The program interruption that occurs when the result of a floating-point instruction has a nonzero fraction and a characteristic is smaller than the floating-point data format can handle. An exponent-underflow exception can be disabled by using the bit setting on a program mask.
- In NCS, to provide the operations defined by an interface. A server exports an interface to a client. See also import.
- The operation to remove one or more logical volumes (LVOLs) from a virtual tape server (VTS) library. The list of LVOLs to export is written on an export list volume and then the export operation itself is initiated.
- In Network File System (NFS), to make file systems on a server available to remote clients.
- An access method services (AMS) operation to create a backup or portable copy of a Virtual Storage Access Method (VSAM) cluster, alternate index, or integrated catalog facility (ICF) user catalog.
- To save a Notes document or view in a non-Notes format.
- To copy data from database manager tables to a file using formats such as PC/IXF, DEL, and ASC. See also import.
- A function or process that converts an internal file to some standard file format for use outside of an application.
- An external file that is used to export data from a catalog or a hierarchy.
- The process of storing objects and metadata from the content repository to an external file.
- An exposed interface from a Service Component Architecture (SCA) module that offers a business service to the outside world. An export has a binding that defines how the service can be accessed by service requesters, for example, as a web service.
- To move information from one system or program to another.
- A process that prepares data, especially items and categories, such that it can be sent to downstream systems using various transport mechanisms, such as message queues or FTP. See also staging area.
- The process of making file systems accessible to authorized remote clients using supported services. See also shared file system.
- See share.
- To save a copy of the current document, database or image into the file format required by another application.
- An external symbol defined in a module or service program that is available for use by other modules or programs. See also import.
export commodity control number (ECCN)
A classification number given to all goods that are manufactured. The classification number is used by the customs authorities to control or monitor exports of some of these items.
- A file created during the development process for inbound operations that contains the configuration settings for inbound processing.
- The file containing data that has been exported.
In Tivoli Software Distribution, a feature that enables a Tivoli administrator to save (export) a file package definition as a text file, to edit the keywords and lists in the definition, and to retrieve (import) the definition from the text file to set the properties for the file package.
exports data set
In z/OS, an MVS file on the server containing entries for directories that can be exported to Network File System (NFS) clients. It is used by the server to determine which MVS files and prefixes can be mounted by a client, and to write-protect MVS files on the server.
See environment export.
export translation object
See export map.
A transactioned utility that extracts data from a table. See also import utility.
A workflow-related system or data field in a roster, queue, or event log that has been made available for searches and sorting. Exposed fields can be used in a search filter, when defining an index, and when logging information to the event log.
A name specified in a FROM clause such that it can be referenced elsewhere in the query. Exposed names include correlation names and, if correlation names are not specified for them, table names, view names, nicknames, and alias names. See also table designator.
exposed process value (EPV)
A variable that enables the participants of a process to set or change a value while an instance of a process is running, thereby assigning constants and affecting the flow of a process or task assignment.
- In computer security, an instance of vulnerability in which losses may result from the occurrence of one or more attacks.
- The degree to which information can be accessed using authorized or unauthorized methods.
In Enhanced X-Windows, an event sent to clients to inform them when contents have been lost, as when windows are obscured or reconfigured. Servers do not guarantee the preservation of window contents when they are obscured or reconfigured.
express alternate PCB
An alternate PCB to which output messages are sent before termination of the application program. See also alternate program communication block.
express carrier service
A service that delivers products on priority, and within a short interval of time. However, the interval of time that categories a service as express may vary from one service provider to another.
- An operand or a collection of operators and operands that yields a single value.
- A variable in a firewall rule that specifies adapter numbers, network addresses, port numbers, ICMP parameters, or IP datagram protocol numbers.
- A series of operations that is performed on a column value.
- A simple statement used to perform calculations or otherwise manipulate the value of attributes. An example of using an expression is entering "=PI" instead of "3.1415". See also business rule.
- An SQL or XQuery operand or a collection of SQL or XQuery operators and operands that yields a single value.
- In Event Management, the relational expression between a resource variable and other elements (such as constants or the previous value of an instance of the variable) that, when true, generates an event.
- In programming languages, a combination of terms and operators that can be evaluated to a single value by using the rules of precedence for the given language.
- A combination of explicit values, constants, variables, operators, and functions that is used to evaluate variables and user responses and set action targets or otherwise complete the action.
- A statement about data objects. Expressions are a combination of literals, object names, operators, functions, and map names. Component rules are expressions that evaluate to either TRUE or FALSE. Map rules are expressions that evaluate to data to produce the desired output.
All of the information that can affect the result of a specific XQuery expression. This information is organized into two categories called the static context and the dynamic context. See also dynamic context, static context.
See exception request.
- To increase the portion of available space that can be used to store database or recovery log information.
- To install more than one package in the same version of Eclipse in order for their application functions to work together in the workbench environment.
Extended Adaptive Cache Simulator
A performance tool that allows system users to assess the benefits of an Extended Adaptive Cache before purchasing one. When the Extended Adaptive Cache simulator is active on a specified storage controller, performance information is generated for a system's actual workload over time.
See address extension.
The use of 31-bit addresses (above the 16 MB line). See also extended link pack area.
An agent that integrates Tivoli Workload Scheduler job control features with other operating systems (for example, z/OS) and applications (for example, Oracle Applications, PeopleSoft, and SAP R/3). Extended agents must be hosted by a master domain manager, domain manager, or an agent (not another extended agent) and use access methods to communicate with external systems. See also access method.
- A characteristic of a shared folder file. Each extended attribute consists of a name, a value, and a set of flags.
- An attribute that can be added to an object through the Database Information application without having to turn on administration mode to commit the changes to the database.
- An attribute that is relevant to a trading relationship but that is not included in the 1SYNC core attribute set.
- In configuration management, a configuration item (CI) attribute that is not part of the original CI definition, but is added by the customer.
- In change management, a request for change (RFC) type attribute that provides information that is needed to fulfill the RFC. A required RFC type attribute must be specified when an RFC of that type is created.
- Information attached to an object that describes the object to an application system or user.
- Names or value pairs that are associated with files or directories. There are three classes of extended attributes: user attributes, system attributes, and trusted attributes.
- A coded character set of 256 8-bit characters developed for the representation of textual data. See also American Standard Code for Information Interchange.
- A group of coded character sets that consists of eight-bit coded characters. EBCDIC coded character sets map specified graphic and control characters onto code points, each consisting of 8 bits. EBCDIC is an extension of BCD (Binary-Coded Decimal), which uses only 7 bits for each character.
extended border node (EBN)
A border node that interconnects (a) APPN networks having different network identifiers or (b) separate partitions of the same APPN network, where the partitioning is to allow isolated topology subnetworks (or clusters). An extended border node supports intermediate network routing, allowing it to support LU-LU sessions that do not terminate in its native network. See also peripheral border node.
- A character other than a 7-bit ASCII character. An extended character can be a 1-byte code point with the eighth bit set (ordinal 128 through 255).
- Double-byte characters that are stored in a DBCS font file, not in the hardware of a DBCS-capable work station. When displaying or printing extended characters, the work station receives them from the DBCS font table under control of the extended character processing function of the operating system. See also basic character.
extended character processing
A function of the operating system that is required to make characters stored in a DBCS font file available to a DBCS-capable work station. Basic characters, which are stored in the work station, do not require extended character processing. Extended characters, which are stored in a DBCS font table, require extended character processing before they can be displayed or printed. See also basic character.
extended CICS dynamic storage area (ECDSA)
Storage area allocated above 16 MB but below 2 GB for CICS code and control blocks that are eligible to reside above 16 MB but below 2 GB, but that are not eligible for the ERDSA (that is, they are not reentrant).
extended common object file format (XCOFF)
The object file format for Version 3 of the operating system. XCOFF combines the standard common object file format (COFF) with the TOC module format concept, which provides for dynamic linking and replacement of units within an object file.
extended common service area (ECSA)
A major element of z/OS virtual storage above the 16 MB line. This area contains pageable system data areas that are addressable by all active virtual storage address spaces. It duplicates the common system area (CSA) which exists below the 16 MB line.
extended count key data device (ECKD device)
A disk storage device that has a data transfer rate faster than some processors can utilize and that is connected to the processor through use of a speed matching buffer. A specialized channel program is needed to communicate with such a device. See also fixed-block architecture disk device.
A system library (the libcurses.c library) that contains the control functions for writing data to and getting data from the terminal screen. It supports color, multiple windows, and an enhanced character set.
extended data object (XDO)
In an application program, a generic representation of a stored complex multimedia object that is used to move that object in to, and out of, storage. XDOs are most often contained within DDOs.
extended directory catalog
A directory catalog used by Domino servers that, to facilitate quick name lookups, retains the individual documents and the multiple, sorted views available in the Domino Directory.
A heterogeneous computing environment that often includes both centralized hosts and distributed workstations connected in a network. Gateways within the extended enterprise provide connections to local area networks (LANs). These LANs can serve any computing system architecture. See also Distributed FileManager.
extended error queue element (EEQE)
Data that describes an I/O error on a local DL/I database. EEQEs are recorded by CICS in the global catalog. CICS uses EEQEs to provide I/O error handling during CICS restarts, including cold starts.
The format of a data set that is not basic format or large format and might be striped or compressed. The logical structure of the data set is the same as a data set that is not in extended format, but the physical format is different. See also basic format, compressed format, large format, striped data set.
extended graphic font
See double-byte coded font.
Online documentation that explains the purpose of the display. Extended help appears if the user presses the Help key when the cursor is outside the areas for which contextual help is available. See also context-sensitive help.
extended indicator variable
A variable that is used with a host variable to represent the SQL null value, the default value, or the unassigned value in an application program. See also indicator variable.
Extended Industry Standard Architecture (EISA)
The PC bus standard that extends the AT bus (ISA bus) to 32 bits and provides support for bus master. It was announced in 1988 as a 32-bit alternative to the Micro Channel that would preserve investment in existing boards. PC and AT adapters (ISA adapters) can plug into an EISA bus.
extended link pack area (ELPA)
The portion of virtual storage above 16 MB that contains frequently used modules. See also extended addressing.
A function of asynchronous messaging where the application server manages the messaging infrastructure and extra standard types of messaging beans are provided to add functionality to that provided by message-driven beans.
extended network addressing
The network addressing system that splits the address into an 8-bit subarea and a 15-bit element portion. The subarea portion of the address is used to address host processors or communication controllers. The element portion is used to permit processors or controllers to address resources.
extended pageable link pack area (EPLPA)
The extension of the pageable link pack area (LPA) that resides above 16 MB in virtual storage. See also pageable link pack area.
extended pointer set (EPS)
In a HALDB, an expanded segment prefix that includes information that allows the use of indirect pointers. An EPS is created for logical child segments and secondary index segments.
Pertains to the use of more than two computer words to represent a floating point number in accordance with the required precision. For example, in z/OS, four computer words are used for an extended-precision number.
extended read-only dynamic storage area (ERDSA)
An area of storage allocated above 16 MB but below 2 GB and used for eligible, reentrant CICS and user application programs, which must be link-edited with the RENT and RMODE(ANY) attributes. The storage is obtained in key 0, non-fetch-protected storage, if the system initialization parameters include RENTPGM=PROTECT. If RENTPGM=NOPROTECT is specified, the ERDSA is in CICS-key storage.
extended recovery facility (XRF)
A facility that minimizes the effect of failures in z/OS, VTAM, the host processor, or high-availability applications during sessions between high-availability applications and designated terminals. This facility provides an alternative subsystem to take over sessions from the failing subsystem.
extended remote copy (XRC)
See Global Mirror.
extended restart (XRST)
A restart, initiated by a DL/I call, that reestablishes database positioning and user-specified areas. See also symbolic checkpoint.
extended shared dynamic storage area (ESDSA)
The user-key storage area for any non-reentrant user-key RMODE(ANY) programs, and also for any storage obtained by programs issuing CICS GETMAIN commands for storage above 16 MB but below 2 GB with the SHARED option.
Extended Simple Mail Transfer Protocol (ESMTP)
An extension to the Simple Mail Transfer Protocol (SMTP) that supports graphics, audio and video files, and text in various languages. See also email, Simple Mail Transfer Protocol.
extended site store
A customer-facing store that is created by the site operator for the owner of the store. See also direct sales store.
extended specify task abnormal exit (ESTAE)
A z/OS macro that provides recovery capability and gives control to the user-specified exit routine for processing, diagnosing an abend, or specifying a retry address.
Syntax that is used for certain commands and function calls. Extended syntax defines parameters used by callable interface applications written in Assembler, C, COBOL, Fortran, or PL/I.
extended system queue area (ESQA)
A major element of z/OS virtual storage above the 16 MB line. This storage area contains tables and queues relating to the entire system. It duplicates above the 16 MB line the system queue area (SQA).
Extended UNIX Code (EUC)
A protocol that can support sets of characters from 1 to 4 bytes in length. EUC is a means of specifying a collection of code pages rather than actually being a code page encoding scheme itself.
extended UNIX coded character set
A set of characters that contains mixed characters. EUC is the mixture of the ISO 7- or 8-bit code page and up to 3 other code pages that can have characters represented internally in 1 to 3 bytes. Extended UNIX coded character set uses multiple shift-in and shift-out control characters and TCP/IP escape sequences within the data stream to switch between four different character sets.
Extended UNIX Code encoding scheme (EUC encoding scheme)
An encoding scheme that defines a set of encoding rules that can support one to four character sets. The encoding rules are based on the ISO2002 definition for the encoding of 7-bit and 8-bit data. The EUC encoding scheme uses control characters to identify some of the character sets.
extended user dynamic storage area (EUDSA)
Storage area allocated above 16 MB but below 2 GB used for data and for user application programs that execute in user-key and are eligible to reside above 16 MB but below 2 GB, but that are not eligible for the ERDSA (that is, not reentrant.)
- In COBOL, the state of a file after running an OPEN statement, with the EXTEND phrase specified for that file, and before running a CLOSE statement, without the REEL or UNIT phrase specified for that file.
- In COBOL, a method of adding records to the end of a sequential file when the file is opened.
Class X extends class Y to add functionality, either by adding fields or methods to class Y, or by overriding methods of class Y. An interface extends another interface by adding methods. Class X is said to be a subclass of class Y. (Sun)
Extensible Stylesheet Language (XSL)
A language for specifying style sheets for XML documents. Extensible Stylesheet Language Transformation (XSLT) is used with XSL to describe how an XML document is transformed into another document.
- A client-side element or function that is not installed with a system, but instead is authored by a system user.
- A class of objects designated by a specific term or concept; denotation.
- An additional field that the shipper can use to track the items in a shipment manifest, such as the height, length, or width of an order. Shippers can also add qualifiers, such as the product family, commodity code, or bar code identifier.
- In digital certificates, an element that allows other data to be encoded into a certificate to expand the function of the certificate. Additionally, extensions allow organizations to customize the use of certificates within their environments.
- An element or function not included in the standard language.
- In Eclipse, the mechanism that a plug-in uses to extend the platform. See also extension point.
- In Eclipse, the specification that defines what attributes and values must be declared by an extension. See also extension.
- The areas in the implementation that can have customizations added that represent the customer-specific business logic. Extension points can include specifications, validation rules, value rules, pre-processing scripts, post-processing scripts, and workflow step functions.
- The part of a file that is created during the data-deduplication process. Extents are compared with other file extents to identify duplicates.
- In FD:OCA, one of the characteristics of a dimension. If all partitions of a dimension have the same number of subpartitions, then this number is called the extent of the next lower dimension.
- A continuous space on a disk, direct-access storage volume, or diskette that is occupied by or reserved for a particular data set, data space, or file.
- A unit of data that manages the mapping of data between managed disks (MDisks) and volumes. See also multiple allegiance.
- An allocation of storage on each data slice that holds rows of user tables. Each extent is divided into 24 128 KB pages.
- An allocation of space, within a container of a table space, to a single database object. This allocation consists of multiple pages.
See storage architecture type.
In Internet communications, a gateway on one autonomous system that communicates with another autonomous system. See also interior gateway.
Exterior Gateway Protocol (EGP)
The mechanism that allows the exterior gateway of an autonomous system to share routing information with exterior gateways on other autonomous systems. See also Border Gateway Protocol.
External Authentication Server
A server that can be used to implement extended authentication and validation services for IBM products, called client applications. Sterling External Authentication Server includes a server that client applications connect to and a GUI to configure Sterling External Authentication Server requirements.
external call interface (ECI)
An application programming interface that allows a non-CICS program running on a client to call a CICS program located on a CICS server. Data is exchanged in the COMMAREA as for normal CICS interprogram communication. See also client API.
external CCD table
In SQL replication, a CCD table that can be subscribed to directly because it is a registered replication source. It has its own row in the register table, where it is referenced as SOURCE_OWNER and SOURCE_TABLE. See also consistent-change-data table, internal CCD table.
external center (EC)
A traffic data center, such as a TMC, that receives TMDD information developed or stored within it from another center. The owner center can also have direct control of field devices. In the context of the most common dialogs used by this standard, the external center requests and receives information from an owner center.
external CICS interface (EXCI)
A CICS application programming interface that helps to make CICS applications more easily accessible from non-CICS environments. It enables a non-CICS program (a client program) running in MVS to call a program (a server program) running in a CICS Transaction Server region and to pass and receive data by means of a communications area.
See public cloud.
external communication adapter (XCA)
A communication adapter that is part of a device other than the host processor. See also integrated communication adapter.
Content that goes into an email that is hosted at some other location, such as an IBM Silverpop FTP directory or a company website. External content can be changed, contained in multiple mailings, or put in a standard format for all mailings.
external content retrieval
A process used to transfer HTML or text from a specified URL or a file path, typically using FTP. External content can be used to create mailings to send to multiple contacts.
- Data that is exported from one procedure and imported into another procedure. See also internal data.
- In COBOL, the data described in a program as external data items and external file connectors.
- Data that is initialized outside of the model file, in a separate.dat file. See also internal data.
- Data that persists over the lifetime of an enclave and maintains last-used values whenever a routine within the enclave is reentered.
external data definition
A description of a variable appearing outside a function. It causes the system to allocate storage for that variable and makes that variable accessible to all functions that follow the definition and are located in the same file as the definition.
external data item
In COBOL, a data item that is described as part of an external record in one or more programs of a run unit and which itself may be referred to from any program in which it is described.
external data record
In COBOL, a logical record that is described in one or more programs of a run unit and whose constituent data items may be referred to from any program in which they are described.
External Data Representation (XDR)
A representation of data in machine-independent format. Because XDR is a vendor-independent method for representing the data, new computer architectures can be integrated into the network without requiring the updating of translation routines.
external data source
A data source for federation that is not crawled, parsed, or indexed by WebSphere Information Integrator OmniFind Edition. Searches of external data sources are delegated to the query application programming interface of those data sources.
- A relationship between two occurrences, in which an operation in the first occurrence (the predecessor) must successfully finish before an operation in the second occurrence (the successor) can begin processing.
- A dependency defined in one job or job stream that refers to another job stream or to a job in another job stream. See also dependency, external job.
In XML, an entity such as an XML schema, an Extensible Stylesheet Language (XSL) style sheet, a document type definition (DTD), or other XML instance document that is accessed using a Uniform Resource Identifier (URI) in an XML instance document. This URI is required to validate the instance document.
external exit class
A Java class that is the main processing class that is used by the integration framework for publish channel, enterprise service, and invocation channel processing. See also user exit class.
- See external routine.
- A function that has its functional logic implemented in a programming language application that is outside the database, in the file system of the database server. The association of the function with the external code application is specified by the EXTERNAL clause in the CREATE FUNCTION statement. See also external routine, function, user-defined function.
- A unique key that identifies an identity from a given data source. An external ID typically consists of a unique ID for the data source and a unique ID for the identity within its original data source. For example, an external ID for an identity in the customer records for a bank might contain the bank name (for the data source) and the account number (for the identity in the data source), such as FirstCapital, 0123456789.
- An identifier of an organization that is defined in an outside system.
In RPG, an indicator that can be set by another program before a program is run, or changed by another program while the program is running. Valid external indicators are U1 through U8.
externalized customization API extension
An API extension that is created by an IBM Client, System Integrator, or SaaS extension support provider for a WebSphere Commerce service. An externalized customization API extension must follow the Externalized Customization programming model.
externalized customization programming model
In IBM Commerce on Cloud, a programming model for a WebSphere Commerce service. This model separates custom API extension code and customization logic from any IBM provided platform logic and code. The externalized customization programming model supports the most common WebSphere Commerce customization scenarios such as creating custom API extensions for common business logic components, customizing the store front-end and configuring the search index and search runtime behavior.
externalized customization workspace
A workspace within a WebSphere Commerce programming environment that is used for creating customizations that follow the Externalized Customization programming model. An Externalized Customization workspace can include one or more separate servers for customizing different WebSphere Commerce components.
externalized data value
See sensor value.
A job referred to in an external dependency. See also external dependency.
The label attached to the outside of a tape cartridge that can be read by the user and is sometimes machine-readable. The label contains the volume serial number (VOLSER) of the tape volume and sometimes additional information. See also internal label.
The amount of white space, in addition to the internal leading, that can be added to the interline spacing without degrading the aesthetic appearance of a font. This value is usually specified by a font designer. See also internal leading.
- Output of Print Management Facility that can be used by other program products while running print jobs; for example, coded fonts, code pages, font character sets, form definitions, page definitions, and page segments.
- See resource object.
external library resource
See external object.
external line format message (ELF message)
A message that is not fully tokenized, but is stored in a single field in the TOF. Storing a message in ELF improves performance because no mapping is needed and checking is not performed.
- A connection from an object to an entity or resource that is outside the Rational DOORS database.
- A symbolic link that contains the name of an object that is outside the hierarchical file system.
- In the Integration Flow Designer, solid lines displayed in a system definition diagram that visually represent the data flow between two map components.
externally authenticated user
A user who is authenticated by a service running outside of the database server (such as a UNIX password file, PAM, or Kerberos). See also internally authenticated user.
externally described data
Data contained in a file for which the fields and the records are described outside of the program (such as with files created by DDS, IDDU, or DB2 for i5/OS) that processes the file.
externally described file
A file in which the records and fields are described to the system when the file is created, and used by the program when the file is processed. See also program-described data, program-described file.
externally triggered transaction
A transaction that is external to the Sterling Selling and Fulfillment Foundation. This transaction calls a corresponding API within the Sterling Selling and Fulfillment Foundation for execution.
external message queue
A message queue used by all programs and procedures running within a job to send and to receive messages outside a job, for example, between an interactive job and the workstation user.
A method that has its method logic implemented in a programming language application that is outside the database, in the file system of the database server. The association of the method with the external code application is specified by the EXTERNAL clause in the CREATE METHOD statement. See also external routine, method.
- In a program, a name whose scope is not necessarily confined to one block and its contained blocks.
- The name of an executable library or class file that is on the database server and contains the logic for an external routine (an external procedure, external function, or external method).
- A name that can be referred to by any control section or separately assembled or compiled module; a control section name or an entry name in another module.
- An object that has a defined object type (such as *FILE or *PGM). In general, external objects can be displayed by a user. See also internal object.
- An object that can be used by other program products while running print jobs. For example, coded fonts, code pages, font character sets, form definitions, page definitions, and page segments.
- See resource object.
In architecture, a parameter for which the current value can be provided by the controlling environment, for example, the data stream, or by the application itself. See also internal parameter.
A trading community participant that sends business documents to and receives business documents from the internal partner. See also trading partner.
See external purchase order.
external presentation interface (EPI)
An application programming interface that allows a non-CICS client program to appear to a CICS server as one or more standard 3270 terminals. This enables the client to access, for example, CICS transactions written for 3270 terminals, without needing to change the CICS code.
A procedure that has its procedural logic implemented in an external programming language application. The association of the procedure with the external application is specified by a CREATE PROCEDURE statement with a LANGUAGE clause that has a value other than SQL and an EXTERNAL clause that implicitly or explicitly specifies the name of the external application. See also built-in procedure, external routine, external SQL procedure, native SQL procedure, procedure, user-defined procedure.
A project containing requirements used to establish traceability relationships with requirements in a currently open project. See also cross-project traceability.
external purchase order (external PO)
A purchase order or request to an outside vendor. See also internal purchase order.
external PVC segment
In NCP, a permanent virtual circuit (PVC) segment between two frame-relay subports in adjacent NCPs. When the two NCPs are directly attached, the two subports have the same data link connection identifier (DLCI).
- An additional identifier for an identity in a data source for the purpose of full-attribution. The external reference is used to uniquely identify the source of each data record sent to the pipeline for ingestion. For example, an employee data source might use the employee serial number as the external ID and the employee's social security number as the external reference.
- A reference to a symbol, such as an entry point name, defined in another program or module.
- A document with content consisting of a URL or a UNC path linking to another location.
- A reference whose definition is obtained from a drawing on disk.
A particular type of entitlement, which is built on a set of permissions and roles that are received from an external application (or target). It is conceptually like a business role, but is received directly from a connected target.
- A procedure or function called from outside the program in which the routine is defined.
- A function, method, or procedure that has its routine logic implemented in a programming language application that is outside the database, in the file system of the database server. The association of the routine with the external code application is specified by the EXTERNAL clause in the CREATE statement for the routine. See also external function, external method, external procedure, routine.
- In REXX, a program external to the user's program, language processor, or both. These routines can be written in any language (including REXX) that supports the system-dependent interfaces used by REXX to start it.
external security interface (ESI)
A facility that enables client applications to verify and change passwords for user IDs on CICS servers. See also client API.
Storage space that a user-defined access method manages rather than the database server. The IN clause of the CREATE TABLE and CREATE INDEX statements can specify the name of an external space instead of a dbspace.
external SQL procedure
An SQL procedure that is processed using a generated C program that is a representation of the procedure. When an external SQL procedure is called, the C program representation of the procedure is executed in a stored procedures address space. See also external procedure, native SQL procedure.
- Managed disks (MDisks) that are SCSI logical units presented by storage systems that are attached to and managed by the clustered system.
- Data storage not located in main or auxiliary storage, such as tape or diskette.
- An item defined in a high-level language program that represents such things as procedures or variables. Resolving external symbols is the means by which the binder connects modules to form a bound program or a service program.
- A symbol that is defined in a file other than the file in which the symbol occurs.
- An entry-point name or external variable that is defined or referred to in a particular module or program.
external time reference (ETR)
The synchronization of server time-of-day (TOD) clocks to ensure consistent time-stamp data across multiple servers and operating systems. External time reference (ETR) is the MVS generic name for the IBM Sysplex Timer. See also Sysplex Timer.
The ability to trace relationships between artifacts in two projects. See also cross-project traceability.
- A variable accessible to another compilation unit.
- A variable that is outside the lexical scope of the function, procedure, or program that is calling it.
A program that performs output processing for data sets that are not eligible for processing by the primary job entry subsystem (JES). For example, an external writer might process a data set that has been directed to a printer and that will be stored on a device that is not supported by JES.
extract, load, and transform (ELT)
The process of extracting data from one or more sources, loading it directly into a relational database, and then using the database engine to run data transformations. See also extract, transform, and load.
- The process of collecting data from one or more sources, cleansing and transforming it, and then loading it into a database. See also extract, load, and transform, warehouse enablement pack.
- See data collection.
A Sterling B2B Integrator Mailbox concept that determines whether a message that resides in a mailbox can be extracted from the mailbox by a business process or the Mailbox Browser interface (MBI).
A set of compressed files that contain executable .jar files, properties files, and directories that are used to migrate data from pre-10.0 versions of the Emptoris applications to the latest version.
- A module that is used to download documents from the Sterling Commerce Network, which are then routed to the Central Message Store.
- An application that extracts structured information from unstructured or semi-structured text by using AQL constructs.
In CICS, a type of transient data queue. Extrapartition destinations can be accessed either within the CICS environment or outside of CICS; they can be defined as either input or output.
extrapartition transient data
A CICS facility for temporarily saving data in the form of queues, called destinations. See also intrapartition transient data.
extreme programming (XP)
An agile software development method that relies on a strict plan and focuses on short release cycles, very frequent user participation, refactoring, pair programming, collective code ownership and testing throughout the entire development process, from start to finish. See also iterative development.
- An attack that originates from a system within a network. For example, a trusted insider might use a company machine as the origin of a denial-of service attack.
- A 3D definition that associates a Z height with all the elements in an object so that each element becomes a vertical plane.
In GL, the coordinate system in which the viewer's eye is located at the origin, and thus all distances are measured with respect to the eye. Viewing transformations map from world coordinates into eye coordinates, and projection transformations map from eye coordinates to normalized device coordinates.