A B C D E F G H I J K L M N O P Q R S T U V W X Y and Z Special characters and Numerics

This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.


A hierarchical dimension which typically reflects the structure of the organization (for example, cost centers and profit centers). The e.List is the basis for the structure of a Contributor application.

A digital trunking facility standard used in Europe and elsewhere, capable of transmitting and receiving 30 digitized voice or data channels. Two additional channels are used for synchronization, framing, and signaling. The transmission rate is 2048 kilobits per second. See also T1.

See error detect timeout value.

See expansion port.

See extended attribute.

See Enterprise Address Book.

EA-enabled table space
A table space or index space that is enabled for extended addressability and that contains individual partitions (or pieces, for LOB table spaces) that are greater than 4 GB.

eager zero
The process of filling an entire new disk block with zeroes prior to writing any data. The "eager zero" approach requires a longer set-up time but improves runtime performance. See also lazy zero.

See enterprise application integration.

EAI application
See External Authentication Interface application.

See enterprise asset management.

See European Article Numbering.

E and M
A channel associated signaling protocol in which signaling is done using two leads: an M-lead that transmits battery or ground and an E-lead that receives open or ground.

EAO exception
See effective address overflow exception.

See enterprise archive.

EAR file
See enterprise archive.

earliest start time
The time after which a job or job stream can start, provided that all other time restrictions and dependencies are satisfied. Earliest start time is set using the at Dynamic Workload Console option or in the command-line scheduling language using the at keyword. See also actual start time, latest start time, planned start time, scheduled time.

early bind
To connect one process to another process so that a specific version of the called process is used. The calling process always uses the specified version of the invoked process even if updated versions are available.

early binding
The connection between two processes that uses a specified version of the invoked process. As a result, the calling process uses the specified version of the process that it is invoking, even when updated versions are available.

early resource release
The release of resources (such as devices, volumes, and data sets) after they are no longer needed.

early support program (ESP)
A program that provides customers with a prerelease level of a product to help IBM evaluate the fitness of the product and the readiness of IBM support.

early token release
A function, supported by token-ring adapter types 2 and 3, that allows a transmitting station to release the token after transmitting the ending delimiter.

earned value
A measure of the value of work performed so far. Earned value uses original estimates and progress-to-date to show whether the actual costs incurred are on budget and whether the tasks are ahead or behind the baseline plan.

Earned Value Management (EVM)
A means of determining the financial health of a project by measuring whether the work completed to date is in line with the budget and schedule planning.

EAR project
See enterprise application project.

ease of use leader (EOU leader)
See user experience leader.

See extended address volume.

A breach of communication security in which the information remains intact, but its privacy is compromised. See also impersonation, tampering.

See exabyte.

See enterprise bundle archive.

See Extended Binary Coded Decimal Interchange Code.

EBCDIC character
Any one of the symbols included in the EBCDIC set.

EBCDIC double-byte encoding scheme
A structure that has separate, allocated coding space for control characters and graphic characters. Control characters do not have 16-bit codes in the EBCDIC structure definition. Graphic characters have a range from 4141 to FEFE. The space character is at 4040.

EBCDIC single-byte encoding scheme
An 8-bit-per-byte structure. The EBCDIC single-byte structure has a valid code-point range for 00 to FF. Control characters have a range from 00 to 3F. Graphic characters have a range from 41 to FE. The space character is 40.

See extended border node.

eBusiness Framework
The infrastructure and platform software for building eBusiness business-to-business, business-to-customer, and business-to-employee applications.

See effective Boolean value.

See electronic business Extensible Markup Language.


  1. See external center.
  2. See engineering change.

An online catalog of IBM's offerings and solutions for digital sales.


  1. See event control block.
  2. See entry control block.
  3. See event control bit.

ECB mode
See electronic code book mode.


  1. See error-correction code.
  2. See error correction code.

See export commodity control number.

See enterprise category definition file.

See extended CICS dynamic storage area.

See enrollment certificate.

See Enhanced Connectivity Facility.


  1. In data communication, a reflected signal on a communication channel. An echo verifies the accuracy of the signal.
  2. In word processing, to print or display each character or line as it is typed.
  3. A command, native to the bash and C shells, that writes arguments to standard output.
  4. In computer graphics, the immediate notification of the current values provided by an input device to the operator at the display console.

echo cancellation
A filter algorithm that is used to compare a copy of the voice data being sent to a caller with the voice data being received from the caller. Any echo of the sent data is removed before the received data is sent on, for example, to a speech recognizer.

echo check
A method of checking the accuracy of the transmission of data in which the received data is returned to the sending end for comparison with the original data. (A)

EchOS agent
A program that is installed on all systems on which Emptoris products will be installed. During the installation process, the EchOS agent is the medium through which communication occurs between the system from which the Emptoris Strategic Supply Management Installer is run and the target systems on which Emptoris applications will be installed.

A directory that is automatically created on the Emptoris Strategic Supply Management Installer system when the installer is run. The directory contains the installation artifacts.

See external call interface.

See extended count key data.

ECKD device
See extended count key data device.

See execution control list.

An open-source initiative that provides independent software vendors (ISVs) and other tool developers with a standard platform for developing plug-compatible application development tools.

Pertaining to an object in a versioned object base (VOB) that is not visible because another object with the same name is currently selected by the view.

Eclipse instance
An installed version of Eclipse, which can be extended or modified by other applications and plug-ins.

Eclipse Modeling Framework
The Eclipse components that define and implement structured data models, which are a set of related classes that are used to handle data in applications.

See Enterprise Content Management.

See Ecma International.

Ecma International (ECMA)
An international association that is dedicated to the standardization of information and communication systems. The ECMA is based in Europe and was founded in 1961.

The concept of reducing the waste and resources that go into producing goods and services. Businesses that adapt eco-efficiency decrease their impact on the environment and typically lower their costs.

Business that involves the exchange of money for goods or services purchased over an electronic medium such as the Internet.

economic order quantity (EOQ)
The optimum reorder quantity of an item, in the specified units of order, to be used as the default or standard reorder amount. The economic order quantity is a calculation of the optimum reorder amount that balances the costs of keeping inventory in stock and the costs of reordering inventory items.

economic shipping parameter (ESP)
A parameter that defines when a warehouse holds a shipment for a customer in anticipation of more shipments that can be shipped together, in order to optimize shipping costs.

See electronic customer support.

See extended common service area.


  1. See Environment Division.
  2. See enciphered data.

See execution diagnostic facility.

See Expandable Display Gadget.


  1. A return value or possible result from a state table action.
  2. In transaction monitoring, the point at which a transaction first comes in contact with the monitoring instrumentation.

edge device
A functional unit such as a router or gateway that is deployed at the border of an administrative domain. An edge device controls traffic through one point only.

Edge Side Include (ESI)
A technology supporting cacheable and noncacheable web page components that can be gathered and assembled at the edge of a network.

See electronic data interchange.

See Electronic Data Interchange Association.

EDI data element
A basic unit of identifiable and definable data for the purpose of recording and interchange.

See Electronic Data Interchange For Administration, Commerce and Transport.

See Electronic Data Interchange-Internet Integration.

EDI Interchange
The exchange of structured electronic data between computer systems according to predefined message standards.

EDI loop
A group of consecutive EDI segments that repeat together in an EDI document definition. There is no object type in Data Interchange Services that defines an EDI loop on its own. EDI loops are logically defined within an EDI document definition.

EDI message
See EDI transaction.

EDI root element
A representation of the EDI document that Sterling B2B Integrator is mapping. At the EDI root element, delimiters and syntax records can be defined. It is a group and can contain groups and segments.

See electronic discovery.

EDI service
A service that is related to the transaction processing requirements for EDI transactions, including deenveloping, enveloping, and functional acknowledgement generation.

EDI standard
The industry-supplied, national or international formats to which information is converted, allowing different computer systems and applications to exchange information.


  1. To add, change, delete, rearrange, or modify the form or format of data.
  2. To change a numeric field for output by suppressing zeros and inserting commas, periods, currency symbols, the sign status, or other constant information.

editable field
On a form, a field whose value is determined by a formula that application designers write to supply a default value, edit the user's entry, and validate the entry to make sure it meets specific requirements.

editable section
A section of objects in a module that does not inherit access from the parent and can be locked and edited independently of other objects when the module is opened in shareable edit mode.

edit buffer
A temporary storage area used by an editor.

edit code
A letter or number indicating that editing should be done according to a defined pattern before a field is displayed or printed. See also edit word.

edit conflict
The result of a user applying changes and the system detecting that another user has made intervening and potentially conflicting changes.

edit description
A description of a user-defined edit code. The system-recognized identifier is *EDTD.

editing character
In COBOL, a single character or a fixed 2-character combination that punctuates output.

A successive deployment generation of a particular set of versioned artifacts.

edit line
In CoOperative Development Environment/400, a string of characters ended either by an end-of-line character sequence or by the end of the file.

edit mask

  1. A predefined format that users can apply to data in a viewer. For example, a custom edit mask of #,###.00;#,###.00- may default to 0.00.
  2. A byte string that tells the edit machine instruction or the Edit (QECEDT) API how to format a numeric value into a readable character string. An edit mask can format a numeric value so that languages that cannot use machine instructions directly can take advantage of this function.

edit mode
The state in which users can create or modify a document.

An application that enables a user to modify existing data.

editor access

  1. An access level that allows users to create, read, and edit any documents. Servers can replicate new documents, change existing documents, and, if they have delete access, make deletions.
  2. In Connections Files, an access level that allows a user to read, edit, comment on, download, recommend, upload a new version of, and set properties on the file. A user with this access can be notified of changes to the file, share it, add the file to a folder of theirs or to a folder they have Contributor access to. Editors can lock files, but can unlock a file only if they locked it.

editor area
In Eclipse and Eclipse-based products, the area in the workbench window where files are opened for editing.

editor program
A computer program designed to perform such functions as rearrangement, modification, and deletion of data in accordance with prescribed rules.

EDI transaction
In X12 EDI Standards, a group of logically related data that makes up an electronic business document, such as an invoice. The layout of an EDI transaction is described by an EDI Document Definition in Data Interchange Services.

edit word
A user-defined word with a specific format that indicates how editing should be done. See also edit code.

See exchange data link.

See everyday low pricing.

See engine dispatchable unit.

See Enterprise Extender.

See end-to-end credit.

See extended error queue element.

See event forwarding discriminator.

effective address overflow exception (EAO exception)
In Performance Tools, a condition in which the Licensed Internal Code must make address adjustments not made above the machine interface.

effective base
A base that can optionally be used in statistical tests on weighted tables. The base is designed to reduce the likelihood of the statistical tests producing significant results because the weighting has made adjustments to the data. The base is calculated by dividing the squared sum of weights for all of the respondents in the table by the sum of the squared weights.

effective Boolean value (EBV)
The result of converting a sequence of items into a logical value of true or false.

effective change date
The date on which an approved change to an item in the pending catalog becomes valid.

effective configuration
The particular zone configuration that is currently in effect. Only one configuration can be in effect at once. The effective configuration is built each time a zone configuration is enabled.

effective date range
The period between 12:01 AM on an effective start date and 11:59:59 PM on an effective end date associated with an object.

effective GID
See effective group identifier.

effective group ID

  1. An attribute of a process that is used in determining various permissions, including file access permissions. This value is subject to change during the process lifetime.
  2. The current group ID, but not necessarily the user's own ID. For example, a user logged in under a particular group ID might be able to change to another group ID. The ID to which the user changes then becomes the effective group ID.

effective group identifier (effective GID)
The identifier of a user’s current group when a user becomes a z/OS UNIX user. See also group identifier, real group ID.

effective root directory
The point where a system starts when searching for a file. Its path name begins with a / (slash).

effective UID
See effective user identifier.

effective user
In Notes, the user under whose authority an agent runs. The effective user name will be used for database ACL access rights; rights to create databases, replicas, and templates on the server; and as the mail sender or document author. Effective user rights are not used to determine the operations an agent is permitted to perform; these are based on the agent signer (the agent owner).

effective user ID
The current user ID, although not necessarily the user's login ID. For example, if a user logged in under a login ID changes to another user's ID, that ID becomes the effective user ID until the user returns to the original login ID. All discretionary access decisions are based on the effective user ID.

effective user identifier (effective UID)
The identifier from the RACF user profile when a user becomes a z/OS UNIX user. See also real user ID, user identifier.

An indication that a specified record applies to an aircraft component, for example, the effectivity of a service bulletin might be for all A320 aircraft.

effectivity date
The range of time that indicates the start date and the end date of a report.

An interface that enables an external agent (such as an autonomic manager) to perform operations or change the state of a managed resource. An effector is used to alter data in a managed resource, whereas a sensor is used to retrieve data from a managed resource. See also execute component, manageability interface, managed resource, sensor, touchpoint.

The estimated hours of work required for an activity. Effort is calculated based on the specified duration (in days) of the activity, and the number of working hours per day specified in the project calendar. See also work.

Abbreviation used in AIX for emergency fix.

An intelligent form document that can be added to the system.

A character data in scientific notation, where a numeric value part is followed by an exponent indicator, usually the letter 'E', and a possibly signed integer that indicates a power of ten by which the numeric value should be multiplied.

See Encrypted File System.

See electronic general availability.

See Enterprise Generation Language.

See EGL archive file.

EGL archive file (EGLAR)
A compressed file that contains the compiled version of one or more EGL parts.

EGL build file
An XML file with an .eglbld extension, used to store definitions of EGL build parts.

EGL file
An Enterprise Generation Language program file (extension .eglpgm), definitions file (extension .egldef), or build file (extension .eglbld).

EGL keyword
A term that begins an EGL statement that is neither a function invocation nor an assignment statement. Keywords include add and delete.

A technology for writing client-side web applications in EGL. Rich UI lets traditional business developers create code that provides advanced web function such as instantaneous changes to a web page and dynamic use of Ajax, as well as calls to the following kinds of web services: REST and SOAP.

EGL source file
A text file with an .egl extension, used to store definitions of EGL data, logic, and UI parts.

EGL statement
A directive that is coded into an EGL function part to cause an action when the generated program runs. Examples include an EGL assignment statement and an EGL add statement.

The use of digitized services by the government to interact with citizens, businesses, and other agencies.

See Exterior Gateway Protocol.

See Enhanced Data Rates for GSM Evolution.

The height of a crossbar in a character, often approximately equal to the height of the crossbar in the lower case letter "e" from the baseline.

See emulator high-level language application programming interface.

See electronic health record.


  1. See Electronic Industries Association.
  2. See Electronic Industries Alliance.

In data communications, a specification of the Electronic Industries Association (EIA) that defines the interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) using serial binary data interchange.

An EIA interface standard that defines the physical, electronic, and functional characteristics of an interface line that connects a communication device and associated workstation. It uses a 25-pin connector and an unbalanced line voltage.

An EIA interface standard that defines the physical, electronic, and functional characteristics of an interface line connecting a computer to communications equipment. It uses a balanced line voltage for noise reduction and longer distance capability. The system unit uses the send and receive pins from the set of 40 pins defined by the EIA-422A interface.

EIA communication adapter
A communication adapter that conforms to EIA standards that can combine and send information on two lines at speeds up to 19.2 kbps.

EIA rack
A storage rack that meets the standards set by the Electronics Industry Association (EIA).

EIA unit
A unit of measure, established by the Electronic Industries Association, equal to 44.45 millimeters (1.75 inches).

See EXEC interface block.


  1. See event identifier.
  2. See enterprise identifier.

A measure of how well-connected an entity is, based on its inbound and outbound links. Eigenvector is one of the centrality measures used in social network analysis. See also authority, centrality, hub.

See Enterprise Identity Mapping.

EIM domain
A directory within a Lightweight Directory Access Protocol server that contains Enterprise Identity Mapping data for an enterprise.

An electronic bill for services or products provided to a customer.

See enterprise information system.

See Extended Industry Standard Architecture.

See Enterprise JavaBeans.

EJB bean
See enterprise bean.

EJB container
A container that implements the EJB component contract of the Java EE architecture. This contract specifies a runtime environment for enterprise beans that includes security, concurrency, lifecycle management, transaction, deployment, and other services. (Sun) See also EJB server.

EJB context
In enterprise beans, an object that allows an enterprise bean to invoke services provided by the container and to obtain information about the caller of a client-invoked method. (Sun)

EJB factory
An access bean that simplifies the creating or finding of an enterprise bean instance.

EJB home
An object that implements the home interface of an enterprise bean. The EJB home provides life-cycle operations for the bean. The EJB home class is defined by the enterprise bean container's deployment tool. The instantiation of the class into an EJB home object is performed by the enterprise bean's container at run time.

EJB home object
In Enterprise JavaBeans (EJB) programming, an object that provides the lifecycle operations (create, remove, find) for an enterprise bean. (Sun)

EJB inheritance
A form of inheritance in which an enterprise bean inherits properties, methods, and method-level control descriptor attributes from another enterprise bean that resides in the same group.

EJB JAR file
A Java archive that contains an EJB module. (Sun)

EJB module
A software unit that consists of one or more enterprise beans and an EJB deployment descriptor. (Sun)

EJB object
In enterprise beans, an object whose class implements the enterprise bean remote interface (Sun).

EJB project
A project that contains the resources needed for EJB applications, including enterprise beans; home, local, and remote interfaces; JSP files; servlets; and deployment descriptors.

EJB query
In EJB query language, a string that contains an optional SELECT clause specifying the EJB objects to return, a FROM clause that names the bean collections, an optional WHERE clause that contains search predicates over the collections, an optional ORDER BY clause that specifies the ordering of the result collection, and input parameters that correspond to the arguments of the finder method.

EJB query language
A query language that defines finder methods for entity beans with container managed persistence. The definition uses a language based on SQL that allows searches on the persistent attributes of an enterprise bean and associated bean attributes.

EJB reference
A logical name used by an application to locate the home interface of an enterprise bean in the target operational environment.

EJB remote interface
In EJB, an interface that defines the business methods that can be called by a client.

EJB server
Software that provides services to an EJB container. An EJB server may host one or more EJB containers. (Sun) See also EJB container.


  1. In text formatting, a skip to the next column or page.
  2. The process by which a volume is removed from a system-managed library.

eject to front facing (ETFF)
A flag used in a resource exit to tell PSF to bypass the eject-to-front-facing function.

See Enterprise License Agreement.

elaborated type specifier
Typically used in C++ in an incomplete class declaration or to qualify types that are otherwise hidden.

In Ada language, the elaboration of a declaration is the process by which the declaration achieves its effect (such as creating an object); this process occurs during program execution.

elapsed time
For a thread or an agent, the total time spent within a monitored time interval. See also processing time.

A measure of consumer responsiveness in terms of quantity of a product purchased in relation to the increase or decrease of the product's price.

elasticity mode
A mode that is used to dynamically grow or shrink a cell by adding or removing nodes. Nodes are added when a particular dynamic cluster is not meeting service policies and all possible servers are started. Nodes are removed if they are unused and service policies can be met without them.

elasticity of demand
The rate at which demand changes for a change in price. Change in demand divided by change in price.

elasticity operation
An operation that adds or removes the resources of the application placement controller depending on the defined runtime behavior.

Education or training that is delivered over the Internet. See also blended learning.

electromagnetic compatibility (EMC)
The design and test of products to meet legal and corporate specifications dealing with the emissions and susceptibility to frequencies in the radio spectrum. Electromagnetic compatibility is the ability of various electronic equipment to operate properly in the intended electromagnetic environment.

electromagnetic interference (EMI)
Waves of electromagnetic radiation, including but not limited to radio frequencies, generated by the flow of electric current.

electronic business Extensible Markup Language (ebXML)
A set of specifications that enables enterprises to conduct business through the exchange of XML-based messages. ebXML is a joint initiative ofUN/CEFACT and OASIS.

electronic code book mode (ECB mode)
A method of enciphering and deciphering data in address spaces or data spaces. Each 64-bit block of plaintext is separately enciphered and each block of the ciphertext is separately deciphered.

electronic customer support (ECS)
A part of the operating system that allows a customer to access the question-and-answer (Q & A) function; problem analysis, reporting, and management; IBM product information; and technical information exchange.

electronic data interchange (EDI)
The exchange of structured electronic data between computer systems according to predefined message standards.

Electronic Data Interchange Association (EDIA)
An organization that sets standards for the motor, rail, ocean, and air industries administered by EDIA. This is the original EDI organization for the United States, and through it, the original EDI Standards were developed, published, and maintained. It has now changed its name to EDIA, and has become the national EDI user group for the United States.

Electronic Data Interchange For Administration, Commerce and Transport (EDIFACT)
An international set of electronic data interchange (EDI) standards published by the United Nations that is built upon X12 and TDI (Trade Data Interchange) standards.

Electronic Data Interchange-Internet Integration (EDIINT)
A set of protocols for exchanging EDI and other business documents over the Internet. EDIINT was developed by the Internet Engineering Task Force (IETF).

electronic discovery (eDiscovery)
See e-discovery.

electronic document
A document that is stored on the computer, instead of printed on paper.

electronic form
A collection of constant data that is electronically composed in the host processor and may be merged with variable data on a page during printing.

electronic general availability (eGA)
See also physical general availability.

electronic health record (EHR)
An individual’s medical record in digital format that includes a patient’s medical history and personal information, which can be accessed from many locations and sources. Doctors and hospitals own and manage the information that is in the EHR. See also personal health record.

Electronic Industries Alliance (EIA)
An organization of electronics manufacturers that advances the technological growth of the industry, represents the views of its members, and develops industry standards.

Electronic Industries Association (EIA)
See Electronic Industries Alliance.

electronic keystick
A device that slides into a slot on some System i product control panels. When the keystick is in place, it electronically unlocks functions at the key pad on the control panel. This allows a system operator to select an operating mode. When the keystick is removed, those functions are electronically locked, which prevents those without authority from placing the machine in some other mode.

electronic media object
A set of assets that can be associated with items, categories, attributes, and attribute values. Asset types include images, video, audio, and text files.

electronic medical record (EMR)
An electronic record consisting of many forms of data such as patient demographics, medical history, medicine and allergy lists, laboratory test results, radiology images, billing records, and advanced directives.

electronic overlay
An AFP resource object that is a collection of predefined data, such as lines, shading, text, boxes, or logos, that can be merged with variable data on a page while printing.

electronic request for service (eRFS)
An administrative business process in which online requests for funds and time are seeking management approval on a new project.

Electronic Service Agent (ESA)
A function that provides automatic hardware problem-reporting to help predict and prevent hardware errors by early detection of potential problems. With this function, users can also download fixes and automatically submit problems to IBM when appropriate.

electronic signature (ESIG, eSignature)
A stamp that is added to mail messages, fields, or sections that verifies that the person who originated the message is the author and that no one has tampered with the data.

Electronics Industries Association
An organization of electronics manufacturers that advances the technological growth of the industry, represents the view of its members, and develops industry standards.

electronic software delivery (ESD)
The delivery of software, publications and licensing to customers electronically rather than on media.

electrophotographic process
The creation of an image on a form by uniformly charging the photoconductor, creating an electrostatic image on the photoconductor, attracting negatively charged toner to the discharged areas of the photoconductor, and transferring and fusing the toner to the form.

electrostatic discharge

  1. An undesirable discharge of static electricity that can damage equipment and degrade electrical circuitry.
  2. The flow of current that results when objects having a static charge come into close enough proximity to discharge.

electrostatic image
In certain printers, the invisible image consisting of discharged areas of the photoconductor as a result of exposure by laser raster scans of digital data, forms flash, or forms overlay.


  1. A value in a security label component. See also security label component.
  2. A graphical entity of one of three types: line, arc, or circle. Elements form the drawing component of the drawing file.
  3. In Java development tools, a generic term that can refer to packages, classes, types, interfaces, methods, or fields.
  4. A named piece of information, or a field, within a message, that has a business meaning agreed by the applications that create and process the message. See also complex element.
  5. A constituent of a model.
  6. An entity that satisfies all of the conditions of belonging to a given set. For example, an element within an array can be accessed by using the array index. See also array, ordinary array.
  7. A part of a section. Each element represents a separate class of data and is identified by a section name and class name. See also subarea.
  8. A component of a variable. In a categorical variable, there is one element for each category and there may be other elements as well, such as an element that displays a subtotal during analysis.
  9. An interactive component, such as a portlet, online video, or Web 2.0 interaction, of a traditional page view . Element tags are used to collect element data.
  10. In markup languages, a basic unit consisting of a start tag, end tag, associated attributes and their values, and any text that is contained between the two. See also attribute, attribute type.
  11. The smallest unit in a table, array, list, set, or other structure. Examples of an element are a value in a list of values and a data field in an array.
  12. In Informix, a member of a collection, such as a LIST, MULTISET, or SET data type. An element can be a value of any built-in data type, opaque data type, distinct data type, named row type, unnamed row type, or collection data type.
  13. A member of a dimension.
  14. A collection of attribute values describing a specific entity, such as a product, project or portfolio.
  15. In AIXwindows, an object or similar data structure having the properties that define a class. See also associative array.
  16. A component of a document, such as an EDI, XML, or ROD record. An element can be a simple element or a compound element.
  17. An object that encompasses a set of versions, organized into a version tree.

element address
In SNA, a value in the element field of the network address that identifies a specific resource within a subarea. See also subarea address.

elementary item
In COBOL, a data item that cannot be further logically subdivided.

element equality
A relation that determines if two elements are equal.

element mark
In AFP Utilities, a mark that is used to show the position of an element on a display; for example, '*B005' where B means bar code and 005 is the fifth element. See also element name.

element name
In AFP Utilities, a name that appears in the image area instead of an element mark. See also element mark.

element occurrence
A single instance of an element in a collection. In a unique collection, element occurrence is synonymous with element value.

element type
A property of an element that specifies how versions of that element are constructed.

element value
All the instances of an element with a particular value in a collection. In a non-unique collection, an element value may have more than one occurrence. In a unique collection, element value is synonymous with element occurrence.

elevated mode
An access level that allows a user to remained logged on in a secure environment and perform administrator activities.

ELF message
See external line format message.

eligibility age
The number of days since a data set met its criteria to be migrated.

eligible machine
A machine that runs an eligible operating system and can be partitioned.

eligible operating system
An operating system using a partitioning technology as specified by Passport Advantage.

eligible program
A programs that meets the conditions described by Passport Advantage.

A 2x-generated email that includes a link to a candidate’s talent record, candidate form or req in 2x.

eLink history
A candidate record's tracking section, which illustrates the eLinks that have been sent and viewed.

See enhanced logical link control.

See extended link pack area.

See expected license plate number.

else clause
The part of an if statement that contains the keyword 'else' followed by a statement. The else clause provides an action that is started when the if condition evaluates to a value of 0 (false).

See extract, load, and transform.

A unit of measure equal to the width or the height of the character "m" in a particular font. In a uniformly spaced font, an em is equivalent to a character. See also en.

Documents and messages that are transmitted between users over SMTP or ESMTP in a communication network. See also Extended Simple Mail Transfer Protocol, Simple Mail Transfer Protocol.

email activity
A method of delivering merchandising and marketing content to customers. Email activities deliver customized email messages, based on JSP templates, which can include advertisements, suggestive selling initiatives, and promotions, among other merchandising and marketing content.

email listener
An application that receives and processes incoming email messages.

email mapping tool
A stand-alone utility that creates and modifies a mapping between the properties that are associated with an email and properties that are associated with an email record.

email presentation
A contract presentation method whereby the contract language is sent to the external party as an email attachment with additional behaviors according to negotiability.

email reader
A service that polls a Post Office Protocol (POP) mail server at intervals for incoming email and then triggers policies based on the incoming email data.

email sender
A service that sends email through an Simple Mail Transfer Protocol (SMTP) mail server.

email template
An email outline that serves as the basis for email content issued via an email activity. The email template is a model by which the business user defines email message content and optional placeholders for personalized content.

e-Marketing Spot
In WebSphere Commerce, space that is reserved on a store page for displaying marketing information to customers.

e-Marketing Spot remote widget
A Flash-based, portable version of an e-Marketing Spot. Remote widgets can be used to syndicate marketing information on websites outside of WebSphere Commerce.

Pertains to a version of prerequisite middleware, for example an application server, that is included with and installed by another software product. Embedded middleware usually represents a functional subset of a licensed middleware product.

embedded assistance
The type of user assistance that is integrated into product user interfaces. It is transparent to the user in that it does not require any user interaction to display it or interact with it. For example, embedded assistance includes inline text, user interface labels, and command-line syntax statements.

embedded blank
A space between characters within a unit of data.

embedded browser
A web browser that is embedded in another software program.

embedded command
A command enclosed as a value within another command.

embedded common component
A common component that is embedded in multiple serviceable units and is serviced as part of the serviceable unit that it is embedded in.

embedded content
Content such as web pages or videos that can be added to an iFrame in the rich text editor by referencing a URL to the content.

embedded experience
An information delivery model that provides users with a way of interacting with events, notifications, and business processes dynamically in context directly from an inbox, social home page, or other container without having to log in to and switch to another application or service. For example, the ability to approve a business process could be embedded into either a stream in IBM Connections or an email message.

embedded experience gadget
A type of widget, registered in the widget catalog, that enables a seamless integration between IBM Connections and IBM Note or iNotes. For example, the Connections EE Gadget allows for emails from Connections to display as an Embedded Experience such that users can interact with Connections directly within their email.

embedded server
A catalog service or container server that resides in an existing process and is started and stopped within the process.

embedded SQL
An SQL statement that is coded within an application program. See also call level interface, static SQL.

embedded text control
One or more bytes of control information, preceded by an escape character, contained within a set of text. The text control controls certain operations on following text, but it is not itself printed.

To press and raise the surface of paper into a design. Embossed paper appears thicker than nonembossed paper, can increase printer wear, and can degrade print quality.

See electromagnetic compatibility.

See Extended Multiple Console Support.

See Europe, Middle East, and Africa.

emergency power off (EPO)
A means of turning off power during an emergency, referring usually to a switch.

emergency power-off warning (EPOW)
A signal that alerts the operating system to power failures.

emergency restart
A restart of IMS following an IMS or z/OS failure. See also cold start, normal restart.

emergency thread
A server thread that becomes available when either the work queue (the number of pending operations) or the time limit threshold since the last item was removed from the work queue is exceeded. This thread provides a method for the administrator to access the server during a denial of service attack.

emerging market
A country that has not traditionally held a prominent market position but that is undergoing rapid commercialization and development.

See expedited message handling.

See expedited message handler queue.

See electromagnetic interference.

See ESCON multiple image facility.

emissions intensity
A calculation of the average carbon emission rate relative to the intensity of a specific activity such as GSF or occupancy.

To send a formatted event to a consumer from an event processing adapter.

emitted business information
As used in a CICS event specification, the collection of information to be emitted for the event, defined in business terms.

A program that takes the output from one system and converts the information into a different form.

emitter factory
A type of factory that handles the details of event transmission such as the event server location, the filter settings, or the underlying transmission mechanism.

An ASCII graphic used to indicate an emotion in email or instant message communication.

See event monitoring point.

Highlighting, color change, or other visible indication of conditions relative to an object or choice that affects a user's ability to interact with that object or choice. Emphasis can also give a user additional information about the state of a choice or an object.

The property of double-strike printing in which characters are printed in multiple passes (usually two) with a slight offset, creating an artificial bold type. Emphasized printing is used to fill gaps and rough appearance in dot-matrix character forms. It also prints a bold font without changing the mounted character set.

employee lifecycle
The entire interaction of an employee and an organization from recruitment to the day the employee leaves.

employee referral
A designation given to candidate referred by employee.

Employee Referral Bonus Program (ERBP)
A program that rewards employees for recruiting qualified hiring candidates.

Employee Retention Portal
A portal from which users can view reports that provide information about the retention schedules that apply to them.

employee turnover
The number of employees (usually per year) who leave an organization.

empowered customer
A connected, socially-engaged, and self-informed customer who drives businesses to adopt omni-channel and customer-centric solutions.

Emptoris HTTP Proxy Server
A common web server that is used by all Emptoris products. It is installed by default during the installation of the Emptoris products.

empty activity
An activity with no defined implementation that can be used as a place holder in the design stage.

empty data set
A data set in which the pointer to the last-used block is 0.

empty line
A line consisting of only a newline character. X/Open.

empty range
The part of a VSAM file that is available for insertion of new records.

empty string
A character array whose first element is a null character.

See electronic medical record.

See event management services.

em space
The character increment of an em. For all-points-addressable fonts, the em space is not always equal to the size of an em.

em square
In architecture, a square layout space used for designing each of the characters of a font.

See European Money Transfer Form.

The use of software, hardware, or both by one system to imitate another system. The imitating system accepts the same data, runs the same programs, and achieves the same results as the imitated system.

emulation mode
The function of a network control program that enables it to emulate a transmission control unit. See also network control mode.

emulation program

  1. A program that allows a host system to communicate with a workstation in the same way as it would with the emulated terminal. See also Network Control Program.
  2. A control program that permits functions written for one system or device to be run on another system or device.


  1. A facility of the integration test client that enables the emulation of components and references during module testing. Emulators are either manual or programmatic. See also manual emulator, programmatic emulator.
  2. An application that can be used to run an application meant for a platform other than the current platform.
  3. A program that causes a computer to act as a workstation attached to another system.

emulator high-level language application programming interface (EHLLAPI)
An application programming interface that provides programming access to the area in computer memory that corresponds to the user's screen image (this area in memory is known as the "presentation space").

A unit of measure equal to one-half the width of an em. For many typefaces, the average width of lowercase characters tends to be equal to the width of an en. See also em.

See end node.


  1. Pertaining to a state of the processing unit that allows the occurrence of certain types of interruptions. See also disabled.
  2. Pertaining to the state in which a communication device can accept incoming calls on a line.
  3. Pertaining to a condition that results in the execution of condition handlers or in the performance of a standard system action to handle the condition.
  4. In VTAM, pertaining to a logical unit (LU) that has indicated to its system services control point (SSCP) that it is ready to establish LU-LU sessions. The LU can separately indicate whether this prevents it from acting as a primary logical unit (PLU) or a secondary logical unit (SLU). See also disabled, inhibited.
  5. A condition of the printer (physically selected) in which the printer is available to the host processor for normal work. The enabled condition is also called online.
  6. Pertaining to an object that is accepting new data and is processing them. When an object is created, it is enabled.

enabled CP
The view of a control point of a partner control point (CP) when both parallel CP-CP sessions between the pair are active and ready for exchange of network services requests and replies.

enabled mode
The default object mode in which database objects are enabled. When a constraint, index, or trigger is in this mode, the database server recognizes the existence of the object and takes the object into consideration while executing data manipulation statements.

enabled zone configuration
The currently enabled configuration of zones. Only one configuration can be enabled at a time. See also defined zone configuration, zone configuration.

The determination by a language at run time that an exception should be processed as a condition. The exception is intercepted and a determination is made whether to ignore the exception.

enablement step
The first step of the condition handling model during which it is determined whether an exception is to be enabled and processed as a condition. See also condition step, termination imminent step.

enabling-new-function mode (ENFM)
A transitional mode of operation in the version-to-version migration process, during which the DB2 subsystem or data sharing group prepares to use the new functions of the new version. When operating in enabling-new-function mode, a DB2 data sharing group cannot coexist with members that operate at the prior version level. In enabling-new-function mode, fallback to a prior version is not supported, and new functions of the new version are not available for use. See also conversion mode, conversion mode*, enabling-new-function mode*, new function mode.

enabling-new-function mode* (ENFM*)
A transitional mode of operation in the version-to-version migration process that applies to a DB2 subsystem or data sharing group that was in new-function mode (NFM) at one time. When operating in enabling-new-function mode*, a DB2 subsystem or data sharing group is preparing to use the new functions of the new version but cannot yet use them. A data sharing group that operates in enabling-new-function mode* cannot coexist with members that operate at the prior version level. Fallback to a prior version is not supported. See also conversion mode, conversion mode*, enabling-new-function mode, new function mode.

Encapsulated PostScript (EPS)
A PostScript graphics file format that follows conventions defined by Adobe Systems to allow the file to be included by other applications.

Encapsulated Security Payload (ESP)
In a virtual private network (VPN), a security protocol that provides data confidentiality and integrity.


  1. In object-oriented programming, the technique that is used to hide the inherent details of an object, function, or class from client programs.
  2. In communication, a technique used by layered protocols by which a layer adds control information to the protocol data unit (PDU) from the layer it supports. In this respect, the layer encapsulates the data from the supported layer. In the Internet suite of protocols, for example, a packet would contain control information from the physical layer, followed by control information from the network layer, followed by the application protocol data. See also data link switching.

To reduce the size of a dictionary file. The process converts a series of single entry linear search nodes into a single chain node for the entire string, thus reducing the size of the finite state transducer (FST). Typically, enchaining is less efficient at reducing the size of a dictionary than contraction.


  1. See encrypt.
  2. To scramble data or to convert data to a secret code that masks the meaning of the data to any unauthorized recipient. See also cryptographic, decipher.

enciphered data (ED)
The encryption of data so that its meaning is concealed from unauthorized users or observers.


  1. A transaction that can span multiple dispatchable units (service request blocks and tasks) in one or more address spaces and is reported on and managed as a unit.
  2. In Language Environment, an independent collection of routines, one of which is designated as the main routine. An enclave is similar to a program or run unit.

enclosing software
Any software product to which one or more components are assigned. The product is licensed as a whole and determines the licensing relationship of the components that are defined as its parts.


  1. The metal structure in which various electronic components are mounted.
  2. A unit that houses the components of a storage subsystem, such as a control unit, disk drives, and power source.

enclosure services manager (ESM)
A redundant and hot-swappable SAS communication FRU that provides SAS expander and SES functions.


  1. In computer security, to convert plaintext into an unintelligible form by means of a code system.
  2. To convert data by the use of a code in such a manner that reconversion to the original form is possible.
  3. In PSS, to magnetically record information on a merchandise ticket, credit card, or employee badge. This information can be read by the point of sale terminal wand reader or the ticket unit reader.

A way of representing an image pattern so that toned and untoned pels are grouped together, rather than each pel being represented in the overlay definition by a 1 or 0.

encoded format
In query management, the format of the data in an externalized form file.

encoded image
See coded image.

encoded-vector index
A DB2 for i5/OS index that is specialized for quick row selection in query processing. This type of index also provides accurate database statistics, which can improve the optimization of queries. See also radix-tree index.

A representation of data in a specific character set recognized by computer hardware and software.

encoding attack
An exploitation technique that aids an attack by changing the format of user-supplied data to bypass sanity checking filters.

encoding scheme

  1. A set of specific definitions that describe the philosophy used to represent character data. The number of bits, the number of bytes, the allowable ranges of bytes, the maximum number of characters, and the meanings assigned to some generic and specific bit patterns, are some examples of specifications to be found in such a definition. See also invariant character set.
  2. The set of rules that specifies the values for control characters and graphic characters. Examples of encoding schemes include ASCII, ISO/IEC 10646, Unicode and IBM's EBCDIC.
  3. A set of rules to represent character data.
  4. The underlying part of a code page that defines: a) the coding space (the number and allowable value of code points in a code page); b) the rules for sharing the coding space between control and graphic characters; and c) the rules related to the specific options permitted in that scheme, such as the number of bits in a byte, single-byte, or double-byte.

encoding scheme identifier (ESID)
A number assigned to uniquely identify a particular encoding scheme specification.

See end-node control point.

To systematically scramble information so that it cannot be read without the coding key. See also decrypt.

Encrypted File System (EFS)
A file system that uses file system-level encryption.

An engine that encodes sensitive data so that it cannot be easily read by others.

In computer security, the process of transforming data into an unintelligible form in such a way that the original data either cannot be obtained or can be obtained only by using a decryption process. See also data deduplication.

encryption algorithm
An algorithm that scrambles the data so that it becomes unreadable to someone who intercepts it.

encryption deadlock
The inability to access encryption keys to decrypt data. See also encryption recovery key.

encryption key

  1. See key.
  2. A mathematical value that allows components to verify that they are in communication with the expected server. Encryption keys are based on a public or private key pair that is created during the installation process. See also file encryption key, master encryption key.

encryption key manager
See encryption key server.

encryption key server
An internal or external system that receives and then serves existing encryption keys or certificates to a storage system.

encryption recovery key
An encryption key that allows a method to recover from an encryption deadlock situation where the normal encryption key servers are not available. See also encryption deadlock.

An activity or event that can impact query performance on a system.

An entity that is attached to a link. See also end constraint.

end bracket
In SNA, the value (binary 1) of the end bracket indicator in the request header (RH) of the first request of the last chain of a bracket; the value denotes the end of the bracket. See also begin bracket, bracket, conditional end bracket.

end cap

  1. A removable hardware piece that fits over the end of each side of a drive assembly.
  2. A display at the end of an aisle.

end code
Code at the end of an activity that indicates that the result of the current activity will trigger the following activity.

end column
In a system period or an application period, the column that indicates the end of the period. See also period.

end constraint
A constraint on the types of entities that can be the end of a particular link. See also end, valid end type.

end event
An event that ends a process flow and, therefore, does not have outgoing sequence flow paths. Types of end events are message, terminate, and error. See also error end event, message end event, terminate end event.

An attribute of data that describes whether it is stored in computer memory or transmitted with the most significant byte first or last. See also big endian, little endian.

ending attribute character
For a display file, the character following the last position in a field.

end node

  1. A visual marker within a process that identifies where a particular flow ends. Other concurrent flows within the same process will still continue executing.
  2. In SNA, a node in an APPN network that can be a source or target node, but does not provide any routing or session services to any other node.
  3. A node that identifies where a rule flow stops. A rule flow has at least one end node.

end-node control point (ENCP)
A control point that provides its own configuration, session, and management services with assistance from the control point in its serving network node. An ENCP is capable of engaging in CP-CP sessions with other nodes.

end of block (EOB)
A code that marks the end of a block of data.

end-of-chain (EOC)
In SNA, an exception condition that occurs when the end-of-chain indicator is set in the request/response unit (RU) returned from VTAM.

end-of-day statistics
In CICS Transaction Server, CICS statistics written to an SMF data set at the quiesce or termination of a CICS run, or at a user-specified time. See also interval statistics, unsolicited statistics.

end-of-file (EOF)

  1. A code that signals that the last record of a file has been read.
  2. On a data medium, a coded character indicating the end of the medium.

end-of-file delay
An interval during which the system holds a file open after the normal end of the file is reached until one or more records are updated or added to the end of the file. The length of the interval can be specified on the EOFDLY parameter.

end-of-forms sensor
A sensor that detects when the last sheet of a form enters the printer.

end of life (EOL)
Refers to the end of the useful life of an application. The operations management team coordinates the activities to discontinue an application at the end of life.

end-of-life date
The date in which the normal demand for a product falls to a value very close to zero.

end of memory (EOM)
The outer boundary of an address space.

End of Procedure Division
In COBOL, the physical position of a COBOL source program after which no further procedures appear.

end of service (EOS)
The discontinuation of support and maintenance for an application.

end-of-tape marker (EOT marker)
A reflective material placed on a magnetic tape to indicate the end of the recording area.

end-of-text character (ETX character)
The BSC transmission control character used to end a logical set of records that began with the start-of-text character. See also end-of-transmission-block character.

end-of-transmission-block character (ETB character)
The BSC transmission control character used to end a block of records. See also end-of-text character.

end-of-transmission character (EOC character, EOT character)
A transmission control character used to indicate the conclusion of a transmission that may have included one or more texts and any associated message headings.

end-of-transmission code (EOT code)
The character or sequence of characters that indicates termination of sending.

A collection of digital signatures from endorsing peers that establish that a transaction satisfies an endorsement policy.

endorsement policy
A condition on a transaction.

See endorsing peer.

endorsing peer
A node that endorses a transaction before it is committed.


  1. A networked device running the BigFix agent.
  2. One of two points that defines a line or arc. Objects are located by their endpoints.
  3. In Enterprise Service Tools, an association between a binding and a network address, specified by a Uniform Resource Identifier, which can be used to communicate with an instance of a service. An endpoint indicates a specific location for accessing a service using a specific protocol and data.
  4. The address of an API or service in an environment. An API exposes an endpoint and at the same time invokes the endpoints of other services. See also operation.
  5. A representation of a business solution that provides or receives data through UBX.
  6. A JCA application or other client consumer of an event from the enterprise information system.
  7. The system that is the final destination of an operation.
  8. The origin or destination of a file transfer within Sterling B2B Integrator.
  9. The system that is the origin or destination of a session.
  10. A host or gateway that comprises part of a virtual private network (VPN) connection.
  11. An entry point to a service, process, application, or topic destination. See also provider registry endpoint.
  12. A server, computer, machine or device that is monitored.
  13. The logical name of a physical location in the system. The location can be a queue, mailbox, or file system.

endpoint listener
The point or address at which incoming messages for a web service are received by a service integration bus.

endpoint management
The management of groups of computers that are running various standard and mobile operating systems. Endpoint management includes patch management, software distribution, operating system deployment, network access protection and security, and hardware and software inventory.

endpoint map
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a database local to a node where local RPC servers register binding information associated with their interface identifiers and object identifiers.

endpoint map service
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a service provided by the RPC daemon that maintains a system's endpoint map for local RPC servers. See also partially bound binding handle.

endpoint node
See peripheral node.

endpoint reference (EPR)
An XML structure containing addressing information that is used to route a message to a web service. The addressing information includes the destination address of the message, optional reference parameters for use by the application, and optional metadata. See also managed resource ID.

endpoint system
Any system that is running i5/OS and is connected to the central system. An endpoint system is defined from the central system for the purpose of performing System i Navigator functions.

endpoint TG vector
A pair of control vectors representing a transmission group (TG) available at an end node for use by sessions that terminate in the node.

end program header
In COBOL, a combination of words, followed by a separator period, that indicates the end of a COBOL source program. The end program header is: END PROGRAM program-name.

end session handler
A user-provided part of a FEPI application that handles end of conversation and end of session processing.

end system

  1. The last system in a chain of systems that are linked by any combination of TELNET and pass-through requests.
  2. See destination node.

A business transformation design principle based on a closed loop approach for defining processes, policies/rules, data structures, IT systems, and management systems.

end-to-end connection type
In OSI, the type of network service connection used between the local and destination node, that is connection mode, connectionless mode, or both.

end-to-end credit (EE_credit)
In Fibre Channel technology, a credit scheme used to manage end-to-end flow control during the exchange of frames between two communicating devices. See also buffer-to-buffer credit, end-to-end flow control.

end-to-end flow control
The regulation of data transfers over an interface between a source and target. See also end-to-end credit.

end-to-end latency
In SQL replication, an approximate measurement of the difference between the time that a change takes place in a source table and the time that the change is applied to a target table. See also Apply latency, Capture latency, latency, Q Apply latency, Q Capture latency, queue latency.

end-to-end network
A network obtained by connecting one or more fault-tolerant agents in a distributed network to a node in a z/OS network using TCP/IP, to perform workload scheduling. In an end-to-end network, the Tivoli Workload Scheduler for z/OS node becomes the master domain manager of the fault-tolerant agents to schedule and manage jobs in the distributed network. See also engine, workstation.

end-to-end transit delay
In X.25 communications, an optional CCITT-specified facility.

end-user format
The format in which data appears within a client application as literal strings or character variables. End-user formats are useful for data types whose database format is different from the format to which users are accustomed.

end-user routine
A user-defined routine (UDR) that performs a task within an SQL statement that the existing built-in routines do not perform. Examples of tasks include encapsulating multiple SQL statements, creating trigger actions, and restricting who can access database objects.

end-user significant status
A type of significant status that relates to the work associated with a resource. IMS defines conversations, set-and-test-sequence numbers terminals, and Fast Path as end-user significant status for nodes and users. See also command significant status.

end-user terminal
A terminal where an IMS user can issue transactions, some commands (based upon security authorization), and message switches.

end-user verification
For logical unit (LU) 6.2, checking the identification of users by means of identifiers and passwords on attach function-management headers (FMHs). See also LU 6.2 conversation level security.

See enabling-new-function mode.

See enabling-new-function mode*.

enforced lock
A type of lock that a process holds on a region of a file preventing any other process from accessing that region with read or write system calls. In addition, the create command is prevented from truncating the files. See also advisory lock.

enforced subset match conversion/substitution
A conversion where the characters that exist in both the source coded character set identifier (CCSID) and the target CCSID have their integrity maintained. Characters that are not included in the target CCSID are presented to the user as substitution characters. This substitution is permanent. Any loss of character integrity is permanent. An EBCDIC-encoded character that is in the source CCSID but not in the target CCSID is replaced with 3F.

An integrated set of customer interactions that allows marketers to design an integrated set of customer interactions that are sequenced based on the time to deliver in market.

engagement model
A model for a complex set of activities that use a generalized set of methodologies and logical relationships.


  1. A speech recognition process that accepts voice data as input and returns the text form of what was said as output. It is the process which performs the recognition.
  2. A customized OpenStack Heat orchestration engine that interprets blueprints. Engines use blueprints as patterns for virtual environments. See also blueprint.
  3. The unit that hosts the software for the metadata server.
  4. The core software for the scheduling environment. See also connector, distributed network, distributed workstation, end-to-end network, z/OS network.
  5. A component of the system that uses information entered through the management console and stored in the database to control project execution, send notification emails, and communicate with agents (running on servers).
  6. The unit that contains the processors that respond to requests for data from clients. See also storage port.
  7. A program that provides essential functions for other programs.
  8. An EDI processor that contains client profile information and is used to split, parse, and route EDI data.
  9. See InfoSphere Information Server engine.
  10. An algorithmic component that is used to solve optimization problems.

engine dispatchable unit (EDU)
A DB2 structure that coordinates application requests to a DB2 database by using a process (on UNIX operating systems) or a thread (on Windows operating systems) to carry out instructions on behalf of the DB2 database system. See also agent, scheduling policy.

engineering assessment order
A type of record that is used to request and complete an assessment of a technical publication to determine whether it is applicable to an aircraft or piece of equipment and, if the technical publication is applicable, to also determine how the aircraft or piece of equipment can comply with the technical publication.

engineering change (EC)
An update to a machine, part, or program. Each EC for a given unit is assigned a unique number referred to as an EC level or EC number.

engineering order
A meter-based, date-based, or maintenance-event-based record that is used to plan and manage maintenance on an aircraft or piece of equipment.

engine status monitor
An entity that shows information about the engines on the selected Sterling Secure Proxy server.

engine tier
The logical group of engine components for the InfoSphere Information Server suite and product modules (the InfoSphere Information Server engine components, service agents, and so on) and the computer or computers where those components are installed.

engine type
Each engine must be configured with a specific type. The type is simply a textual tag associated with a specific engine and does not change the operation or functionality of the engine.

English forward auction
An RFx that is usually used by buyers to sell excess items in their inventory. Supplier organizations place their bids on these items in a live auction held over a limited duration of time, such as an hour.

English reverse auction
An RFx that contains a list of items that buyers want to procure. Suppliers place their bids on these items in a live auction held over a limited duration of time, such as an hour. The auction is normally awarded to suppliers with the lowest bid, but buyers could consider factors such as the quality level of suppliers, delivery time records, and research and development resources, before awarding the auction.

English Slot Grammar (ESG)
A parser that provides core linguistic analyses of both the questions and the text content used by IBM Watson to find and hypothesize answers. ESG is a fundamental component of question analysis, candidate generation, and analysis of passage evidence.

Enhanced 5250 Emulation
A program that allows a personal computer and a printer to be attached to a System i product and perform the functions of one or two 5250 workstations on one twinaxial cable. The workstations can be one display station, two display stations, or one display station and one printer.

enhanced concurrent mode
A mode in which instances of concurrent LVMs coordinate changes between nodes through the group services component of the Reliable Scalable Cluster Technology (RSCT) facility. Any disk supported for attachment to multiple nodes can be used in enhanced concurrent mode. See also fast disk takeover, forced varyon.

enhanced conflict detection
In SQL replication, conflict detection that guarantees data integrity among all replicas and the source table. The Apply program locks all replicas or user tables in the subscription set against further transactions. It begins detection after all changes made before locking have been captured.

Enhanced Connectivity Facility (ECF)
A set of programs that allows a user to access IBM-supplied servers or to create servers.

Enhanced Data Rates for GSM Evolution (E-GPRS)
An upgrade to the 2G GSM standard that increases data throughput. See also 3G, Global System for Mobile Communications.

enhanced for loop
In Java SE, a new for loop construct.

enhanced logical link control (ELLC)
An X.25 protocol that allows the transfer of data link control information between two adjoining SNA nodes that are connected through an X.25 packet-switching data network. ELLC enhances error detection and recovery. See also physical services header, Qualified Logical Link Control.

enhanced NWS
A character-based 5250 workstation with an enhanced character set that allows the presentation of characters that look like graphical symbols.

enhanced tamper protection
A setting that prevents root access to the servers in an appliance to increase the security of archived documents.

Enhanced X-Windows
A collection of basic functions for developing a variety of application environments. Toolkit functions manage Toolkit initialization, widgets, memory, events, geometry, input focus, selections, resources, translation of events, graphics contexts, pixmaps, and errors.

Enhanced X-Windows Toolkit
In the AIX operating system, a collection of basic functions for developing a variety of application environments. See also AIXwindows Toolkit, X Window System.

enhancement request
A change request for a new feature or functionality. See also change request.

ENQ character
See enquiry character.


  1. To put a message or item in a queue. See also dequeue.
  2. To queue up URLs to be crawled and prepared to be indexed.

enquiry character (ENQ character)
The BSC transmission control character usually used to request a response from the remote system or device.

enriched attribute
An attribute for which the value of an object is accessed from an external data service.

In Backup, Recovery, and Media Services, to identify media to Backup, Recovery, and Media Services. Media initialized in Backup, Recovery, and Media Services does not need to be enrolled.


  1. In an AIX PowerSC environment, the process of providing an initial set of measurements to the verifier. This information forms the basis for subsequent attestation requests.
  2. An entitlement for an organization to subscribe to a business service.
  3. The process of entering and saving user or user group information in a portal.

enrollment certificate (ecert)

  1. Long-term identity credentials that are issued by Hyperledger Fabric Membership Service to entities in a permissioned blockchain.
  2. A digital document that enables licenses to be distributed to users. The document contains all the information that is related to the licenses acquired for a license-enabled product.

A collection of one or more System z nodes (including any attached zBX) that are managed as a single logical virtualized system by the zManager, through the use of a Hardware Management Console.

ensemble member
A node that has been added to an ensemble.


  1. An organization that brokers business. Each enterprise can consist of multiple organizations that are assigned various roles.
  2. Pertaining to a type of data storage device that has higher error recovery limits, vibration tolerance, and end-to-end error detection than standard desktop hard drives.
  3. The composite of all operational entities, functions, and resources that form the total business concern and that require an information system.

Enterprise Address Book (EAB)
A collection of information about people, departments, and locations in an enterprise. Information about people may include telephone numbers, mailing addresses, and the department in which a person works. Department information may include the department name, the manager, and the department name the department reports to. Location information may contain a mailing address. On a System i product, the EAB is the system distribution directory.

enterprise application

  1. See Java EE application.
  2. See company application.

enterprise application integration (EAI)
A technology that serves as the common interface between dissimilar applications using the same data and processes.

enterprise application project (EAR project)
A structure and hierarchy of folders and files that contain a deployment descriptor and IBM extension document as well as files that are common to all Java EE modules that are defined in the deployment descriptor.

enterprise archive (EAR)
A specialized type of JAR file, defined by the Java EE standard, used to deploy Java EE applications to Java EE application servers. An EAR file contains EJB components, a deployment descriptor, and web archive (WAR) files for individual web applications. See also Java archive, web archive.

enterprise asset management (EAM)
The process of managing an organization’s assets throughout their life cycle, from requisition to retirement.

enterprise bean
A component that implements a business task or business entity and resides in an EJB container. Entity beans, session beans, and message-driven beans are all enterprise beans. (Sun) See also bean.

enterprise bundle archive (EBA)
A compressed file, with a .eba extension, that contains or refers to one or more OSGi bundles that are deployed as one OSGi application. See also bundle.

enterprise business design
The mission of enterprise business design is to create and make operational IBM's e-business process blueprint, drive IBM's business process community to world class leadership, link IBM performance to process objectives, and align with and support CIO top priorities.

enterprise category definition file (ECDF)
A data file that defines the category hierarchy and associates the category ID with the category name.

enterprise configuration
A method of setting up servers so that the administrator can distribute the configuration of one of the servers to the other servers, using server-to-server communication. See also configuration manager, managed server, profile, subscription.

enterprise connector (ERC)
A module that aligns the Access Governance Core module with the peripheral target systems and vice versa.

Enterprise Content Management (ECM)
The strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to organizational processes. ECM tools and strategies allow the management of an organization's unstructured information, wherever that information exists.

enterprise control point
A measurable and auditable control on processes, data, applications and infrastructure between enterprise and value chain to support enterprise objectives; for example, customer and financial data standards.

enterprise database
A database that is designed to support a large, networked organization. An enterprise database offers scalability, security, and administrative features for large, complex projects.

enterprise data grid
A data grid from which data can be accessed from different applications, such as Java or .NET.

enterprise directory
A directory of user accounts that define IBM Security Access Manager for Enterprise Single Sign-On users. It validates user credentials during sign-up and logon, if the password is synchronized with the enterprise directory password. An example of an enterprise directory is Active Directory.

Enterprise Extender (EE)
An extension of SNA High Performance Routing that provides encapsulation of SNA application traffic within UDP frames.

Enterprise Generation Language (EGL)
A high-level language that allows developers to focus on business logic as they create complex business applications for deployment in any of several environments, including the web. The language simplifies database and message-queue access and the use of Java EE.

enterprise identifier (EID)
A work identifier for a distributed transaction that is both a local and a global identifier. The format of the EID is a concatenation of the transaction identifier (TID) and global transaction identifier (GTID).

Enterprise Identity Mapping (EIM)
A mechanism for associating a person or entity to the appropriate user identities in various user registries throughout an enterprise. EIM provides application programming interfaces (APIs) for creating and managing these identity mapping relationships, as well as APIs that applications use to query this information.

Enterprise Information Portal
Software developed by IBM that provides tools for advanced searching, and content customization and summarization.

enterprise information system

  1. In System Manager, all the resources that the applications manage and the functions for managing them.
  2. The applications that compose an enterprise's existing system for handling company-wide information. An enterprise information system offers a well-defined set of services that are exposed as local or remote interfaces or both. (Sun) See also resource adapter.

enterprise IT
A combination of hardware and software that is designed to manage complex heterogeneous environments in a way that is open and secure, dynamic and industrial strength, and both global and personal. Enterprise IT combines clients' systems of record (or legacy systems) with systems of engagement (the current and securely managed cloud, analytics, and mobile solutions).

Enterprise JavaBeans (EJB)
A component architecture defined by Sun Microsystems for the development and deployment of object-oriented, distributed, enterprise-level applications (Java EE).

Enterprise License Agreement (ELA)
An agreement to provide software or service licenses to all employees and contractors within an organization.

enterprise logging
The process of sending events from a server to a designated event server. The event server routes the events to designated receivers, such as to a user exit. See also event.

enterprise model innovation
Innovating the role we play in the value chain by changing our extended enterprise and networks with employees, suppliers, customers, and others, including capability/asset configuration. See also industry model innovation, revenue model innovation.

enterprise product content mapping file (EPCMF)
A data file that defines the category for each product as well as product attributes such as price, inventory, and color.

enterprise product report (EPR)
A report that includes a process for importing product and category data.

Pertaining to the quality of the software architecture such that the software is stable and scalable in a manner that large organizations can rely on the software after it is deployed.

enterprise repository
A component of the data server that records and stores all information about the monitored computers' storage assets and their usage over time. The repository is organized into relational database tables and is accessed by the data server using Java Database Connectivity (JDBC).

Enterprise Repository Environment (ERE)
A graphical data repository for IBM plant and lab locations around the world that provides a pull mechanism for customers to access data they are interested in today, and the building block for a distributed computing environment tomorrow.

enterprise resource planning (ERP)
The planning and management of all the resources in an enterprise.

enterprise search administrator
An administrative role that enables a user to administer the entire enterprise search system.

enterprise search base annotator
A set of standard text analysis engines used in enterprise search for default document analysis processing. See also custom text analysis engine.

enterprise service
A service that typically accesses one or more enterprise information systems.

enterprise service bus (ESB)
A flexible connectivity infrastructure for integrating applications and services; it offers a flexible and manageable approach to service-oriented architecture implementation.

enterprise single sign-on (ESSO)
A mechanism that allows users to log on to all applications deployed in the enterprise by entering a user ID and other credentials, such as a password.

enterprise social networking
Social networking in a business context. Unlike social networking, enterprise social networking seeks to build business relationships between peers as opposed to social relationships.

enterprise social software
Social software that is used in a business context. Unlike enterprise software, enterprise social software de-emphasizes structure in exchange for increased collaboration.

enterprise system
An integrated set of applications that is used to control the business processes in a large organization. The scope of an enterprise system can be extended through integration with other systems.

Enterprise System Management (ESM)
An integrated collection of software tools that are used to monitor all hardware and software in a network, including the telephone system, all subsystems, routers, switches, and other components of the communication network.

Enterprise Systems Architecture (ESA)
A hardware architecture that reduces the effort required for managing data sets and extends addressability for system, subsystem, and application functions.

Enterprise Systems Architecture/390 (ESA/390)
An IBM architecture for mainframe computers and peripherals. Processor systems that follow the ESA/390 architecture include the ES/9000 family. See also z/Architecture.

Enterprise Systems Connection (ESCON)

  1. A set of IBM products and services that provide a dynamically connected environment within an enterprise.
  2. A peripheral interface for an Enterprise Systems Architecture/390 and zSeries computer. The I/O interface uses ESA/390 logical protocols over a serial interface that configures attached units to a communication fabric.

Enterprise Tagging Service (ETS)
A central warehouse for tags entered by IBMers, regardless of where these tags were applied, whether to a blog, a ThinkPlace idea, a bookmark, a person, etc. At its core, then, ETS essentially acts as a tag management system to store, normalize and analyze tags.

enterprise view
An abstracted dictionary of enterprise data. The enterprise view provides a simplified business-oriented picture of the data in different data sources across the enterprise for data mining and reporting. Enterprise view is populated with data items defined as logical tables and columns. Enterprise view data items are mapped to analytical applications through the application views and to physical data sources through Data Provider Definitions.

entitled memory
The maximum amount of physical memory that is guaranteed to be available for I/O mapping by a logical partition at any given time.


  1. A data structure that contains externalized security policy information. Entitlements contain policy data or capabilities that are formatted in a way that is understandable to a specific application.
  2. The identification of a structured set of rights that are assigned to a generic user for access to the resources of a company or organization. There are four types of entitlement: business role, IT role, permission, and external role.
  3. In software licensing, the maximum allowed allocation of capacity as determined by a license agreement.
  4. A permission that controls access to market data.

entitlement file
A file that is used to determine which feature set to enable or disable based on the edition of the product.

entitlement ID
A unique identifier for an entitlement that allows for the managing of rules.


  1. A set of details that are held about a real-world object such as a person, location, or bank account. An entity is a kind of item.
  2. A person, object, or concept about which information is stored. See also entity type.
  3. In object-oriented design, an item that can be treated as a unit and, often, as a member of a particular category or type. An entity can be a concrete thing or an abstract idea.
  4. The business that an XBRL report relates to.
  5. An object that has a unique identifier that permits other objects to refer to it logically. See also entity type.
  6. A collection of one or more identities that represent the same person, organization, place, or item. See also attribute, entity model, entity resume, identity, relationship.
  7. An element in an XML schema.
  8. A simple Java class that represents a row in a database table or entry in a map.
  9. In markup languages such as XML, a collection of characters that can be referenced as a unit, for example to incorporate often-repeated text or special characters within a document.
  10. A database object such as a table or column in a relational database.
  11. In OSI, the representation of a layer on a given open system.
  12. Any object included in a domain, whose attributes are used in queries and reports about that domain.
  13. A user, group, or resource that is defined to a security service.
  14. A device that holds personal or software attributes. It is the target object to collect data about the IBM Presence Zones system. An example of an entity is a customer's mobile device, such as an iPad or cellular phone.
  15. A user, group, or resource that is defined to a security service, such as RACF.

entity aggregate
A value that is computed from a collection of entities.

entity bean
In EJB programming, an enterprise bean that represents persistent data maintained in a database. Each entity bean carries its own identity. (Sun) See also session bean.

entity expansion attack
A type of XML-level denial-of-service attack that causes application servers to echo back user data.

entity identifier
A string that uniquely identifies a reporting entity according to an entity scheme.

entity model

  1. The set of user-defined attributes that define an entity in the system. See also attribute, entity.
  2. A representation of the data in data repositories and the relationships among the data fields in those data repositories.

entity reference
In XML programming, a construct that refers to an entity. References to parsed general entities use an ampersand (&) and a semicolon (;) as delimiters. Entity references are used to make literal characters that are not valid in XML.

entity reference node
Information on a named reference that is kept at a single memory location.

entity relationship
A unidirectional association between entity types.

entity relationship diagram (ERD)
Graphic representation of the data flow and relationships between data tables in a relational database.

entity resolution
A process that compares the incoming identity and determines whether they represent an existing entity or a new entity. If an incoming identity is determined to represent an existing entity, person, organization, place, or item, they are resolved into a single entity. See also pipeline, precision, resolve.

entity resolver
In XML programming, a construct that resolves an external entity reference.

entity resume
A complete collection of information about an entity, including references, characteristics, disclosures, related entities, alert histories, and so on. See also entity.

entity scheme
A framework for referencing naming authorities for business entities, in the form of a namespace URI.

entity semantic type
A semantic type that can be assigned only to an entity or an entity type. See also semantic type.

entity type

  1. A set that identifies entities that share common attributes. For example, Joe Bloggs might be an entity that has an entity type "customer". See also entity.
  2. A specific classification of an entity that includes user-defined properties that identify the exact nature of the entity.
  3. A descriptor of the characteristics of an entity, including the properties it can contain and its appearance in visualizations.
  4. A category of managed objects. See also entity.

The minimum number of bits needed to represent the information that is contained in a message.


  1. In Ada language, an entry is used for communication between tasks. Externally, an entry is called just as a subprogram is called; its internal behavior is specified by one or more accept statements specifying the actions to be performed when the entry is called.
  2. A single input operation on a workstation.
  3. An element of information in a table, list, queue, or other organized structure of data or control information.
  4. A collection of information about a cataloged object in a master or user catalog. See also entry name.
  5. In FORTRAN, a language construct within a procedure, designating the start of the execution sequences of the procedure.
  6. An item in an index. An entry consists of a main entry plus a locator, and can also have subentries or cross-references.

entry breakpoint
A breakpoint set on a component element that is hit before the component element is invoked.

entry control block (ECB)
A z/TPF control block that is used to communicate information between the z/TPF system, the application, and application segments in the application package.

entry criteria
The set of generic and specific conditions for permitting a process to go forward with a defined task, e.g. test phase. The purpose of entry criteria is to prevent a task from starting which would entail more (wasted) effort compared to the effort needed to remove the failed entry criteria. (ISTQB)

entry field
An area on a display where a user can enter information, unless the field is read-only. The boundaries of an entry field are usually indicated.

entry format
The description of a personal directory entry. Each personal directory entry has an identical structure. The entry structure determines the type and size of each field in a personal directory entry.

entry-level device
A mobile device that features basic functions. Often, entry-level devices are mass produced. For example, a Nokia 6760 or a BlackBerry Curve. See also high-end device.

entry mode
A specific phase that a project or case is in that indicates the type of entry that has been done or is currently in progress.

entry name

  1. A unique name for an entry, which is the same as the data set name in a data definition (DD) statement that describes the object. See also entry.
  2. In assembler language, a programmer-specified name within a control section that identifies an entry point and can be referred to by any control section.

entry node
See attribute instance.

An attribute that can be a user or a group, similar to what is allowed within the aclEntry. Each object has an associated entryOwner attribute. However, the entryOwner subject has certain privileges over the object.

entry point

  1. The address or label of the first instruction processed or entered in a program, routine, or subroutine. There might be a number of different entry points, each corresponding to a different function or purpose.
  2. In a routine, any place to which control can be passed. See also operation.

entry point vector (EPV)
A record in which fields are pointers to procedures that implement the operations defined by an interface.

entry sequence
A physical ordering of data records in auxiliary storage according to ascending relative byte address (RBA) without respect to their contents. See also key sequence.

entry-sequenced data set (ESDS)

  1. A data set whose records are loaded without respect to their contents, and whose relative byte addresses cannot change. Records are retrieved and stored by addressed access, and new records are added at the end of the data set.
  2. A VSAM data set whose records are physically in the same order in which they were put in the data set. A VSAM data set is processed by using addressed direct access or addressed sequential access and has no index. New records are added at the end of the data set.

entry template
A template that allows the user to create a document, folder, or custom object. The template provides default values for the destination folder, properties, and security. See also form data entry template, template.

entry thread
A thread which is used by the CICS DB2 attachment facility for transactions with special requirements, such as high priority transactions, or transactions with special accounting needs. See also command thread, pool thread.

entry type
The method by which a value is entered. It may be typed directly, selected from a previously defined list of values, or populated by referencing another value.

entry-type attribute
Any value that a user enters for a project. An entry-type attribute can be configured with a default value, which users can accept or replace as they create or modify requirements. See also attribute type, attribute value, list-type attribute.

enum constant
See enumeration constant.

enumerated list
A set of DB2 objects that are defined with a LISTDEF utility control statement in which pattern-matching characters (*, %;, _, or ?) are not used.

An ordered set of names and values.

enumeration constant (enum constant)
In the C or C++ language, an identifier, with an associated integer value, defined in an enumerator. An enumeration constant may be used anywhere an integer constant is allowed.

enumeration data type

  1. A data type that represents integers and a set of enumeration constants with associated integer values.
  2. In the Fortran, C, and C++ language, a data type that represents a set of values that a user defines.

enumeration tag
The identifier that names an enumeration data type.

enumeration type

  1. A data type that defines a set of enumeration constants. In the C++ language, an enumeration type is a distinct data type that is not an integral type.
  2. In Ada language, a discrete type whose values are represented by enumeration literals which are given explicitly in the type declaration. These enumeration literals are either identifiers or character literals.

An enumeration constant and its associated value.

enum type
See enumeration type.


  1. A container stored in a user's profile that contains the user's encrypted password or password phrase so that it can be retrieved and decrypted by authorized users as part of a password synchronization solution.
  2. A string of data representing information about a message aside from the attachments and its recipients.
  3. A pair of segments that define or enclose an electronic transaction.
  4. A combination of header, trailer, and control segments that define the start and end of an individual EDI message. Each envelope contains a header segment and a trailer segment, which separate the envelope from other envelopes and provide information about the contents of the envelope.

envelope type
A value used to define the format and contents of an envelope, so that the programs that work with specific types of envelopes are supported. The envelope types supported on a system are defined when the mail server framework is configured. The value associated with an envelope type must be a unique type value.


  1. A user-defined collection of resources that hosts an application.
  2. A group of variables or tags that is used both in tests and in transport definitions.
  3. A container for a list of variables. An environment can be assigned explicitly to servers, projects, and steps.
  4. A named collection of logical and physical resources used to support the performance of a function.
  5. A specific instance of a configuration of hardware and software.
  6. The settings for shell variables and paths that are set when the user logs in. These variables can be modified later by the user.
  7. A deployment target that behaves as a logical partition of the gateway capability.
  8. In AIX Common Desktop Environment, the set of rule files, resources, and message files that define the appearance and behavior of a specific desktop configuration.

environmental data
Data that the storage control must report to the host. The data can be service information message (SIM) sense data; logging-mode sense data; an error condition that prevents completion of an asynchronous operation; a statistical counter overflow; or physical information, such as power supply voltages, air flow and temperature sensors.

Environmental Health widget
A widget that provides an aggregated health status of the servers in an environment. It shows a node, adapter (for Sterling B2B Integrator), or daemon (for Sterling Connect:Enterprise) chart for each server type in the environment.

Environmental Protection Agency NET (EPANET)
A program for analyzing the hydraulic and water quality behavior of pressurized pipe networks. It was developed by the U.S. Environmental Protection Agency's National Risk Management Research Laboratory.

Environmental Record Editing and Printing (EREP)
The program that formats and prepares reports from the data contained in the error recording data set.

environment clause
In COBOL, a clause that appears as part of an Environment Division entry.

Environment Division (ED)
One of the four main parts of a COBOL program. The Environment Division describes the computers on which the source program is compiled and those on which the object program is run; it also provides a connection between the logical concept of files and their records, and the physical characteristics of the devices on which files are stored.

environment export
The process that extracts from the system the objects, part of an environment (a selective export), or the entire environment (environment export) and then places the data in a separate file.

environment handle
A handle that identifies the global context for database access. All data that is pertinent to all objects in the environment is associated with this handle. See also handle.

environment import
The process that adds the objects, part of an environment (a selective import), or the entire environment (environment import) from a file into the system. Before importing the data, the data is validated and standardized.

environment interface
In architecture, the part of the graphics processor that interprets commands and instructions from the controlling environment.

environment inventory
A list of all of the component versions that are deployed to an environment. See also component inventory.

environment reservation
A mechanism that ensures the availability of an application environment for deployment at a specific time. See also environment schedule.

environment schedule
A list of all scheduled activities for the environments that are associated with releases. See also environment reservation.

environment service module canister
See expansion canister.

Environment Services System Services (ESSS)
A component of CICSPlex SM that implements the formal MVS subsystem functions required by the product. ESSS provides cross-memory services, data space management, connection services, and lock management. An ESSS system address space is created at CICSPlex SM initialization and remains in the MVS image for the life of the IPL.

environment variable

  1. A variable that is included in the current software environment and is therefore available to any called program that requests it.
  2. A variable that specifies how an operating system or another program runs, or the devices that the operating system recognizes.
  3. A variable that provides values for each type of environment in which a process will run (for example, development, test, and production environments). A user can set environment variables for each process application.
  4. A variable that defines an aspect of the operating environment for a process. For example, environment variables can define the home directory, the command search path, the terminal in use, or the current time zone.

ENVR object
A transportable form of the accessor environment element (ACEE) that can be used within a single system to create the original ACEE without accessing the RACF database. It can be used, with limits, elsewhere in a single sysplex to recreate the original ACEE without accessing the RACF database. See also accessor environment element.

See end of block.

See end-of-chain.

EOC character
See end-of-transmission character.

See Exceed on Demand.

See end-of-file.

See end of life.

See end of memory.

See economic order quantity.

See end of service.

EOT character
See end-of-transmission character.

EOT code
See end-of-transmission code.

EOT marker
See end-of-tape marker.

EOU leader
See ease of use leader.


  1. See emulation program.
  2. See Error Protocol.

EP adapter
See event processing adapter.

EP adapter configuration
An XML definition that defines one EP adapter to CICS, and can be deployed to CICS in a CICS bundle.

See Environmental Protection Agency NET.

See enterprise product content mapping file.

ephemeral port
A temporary port assigned by a server's IP stack from a designated range of ports.

ephemeral port number
In some TCP/IP implementations, a temporary port number that is assigned to a process for the duration of a call. Ephemeral port numbers are typically assigned to client processes that must provide servers with a client port number so that the server can respond to the correct process.

See external presentation interface.

In agile development, a work item that defines a big use case with a large or unknown amount of work, which is often completed over several sprints. Epics can be divided into stories.

In DCF, the second portion of a profile (after a .EF control word) that is processed after a main document has been processed.

Code generated at the end of a routine, normally causing a return to the caller of the routine.

See extended pageable link pack area.

See Executive Program Manager.

See emergency power off.


  1. One iteration through a training set. During one epoch, all the training patterns are presented to the model so that predictions are generated to compare to the actual data.
  2. The time and date corresponding to 0 in an operating system's clock and time-stamp values. For most versions of the UNIX operating system, the epoch is 00:00:00 GMT, 01 January 1970. System time is measured as the number of seconds past the epoch.
  3. A timestamp that identifies directory replicas as being part of the same set.

See ePurchasing Opportunity Pipeline.

See emergency power-off warning.


  1. See endpoint reference.
  2. See enterprise product report.

The entire process or function associated with the online purchase of goods and services to support business operations.

See erasable programmable read-only memory.


  1. See Encapsulated PostScript.
  2. See extended pointer set.

See extended partition specification table.

ePurchasing Opportunity Pipeline (ePOP)
A database that can be used to record Inside Sales/Private Digital Commerce customer boarding and pipeline information.


  1. See exposed process value.
  2. See entry point vector.

See error queue element.

equate name
In Interactive Source Debugger, a shorter name assigned to a command that is used often. The equate name, when called, performs the same function as the command.

A join whose join condition uses only the equals predicate. See also join.

equipment accessorial
An accessorial that is used to apply a special charge if a shipment uses a certain type of equipment.

equipment check
An asynchronous indication of a printer malfunction.

equity share
A calculation that reflects economic interest, which is the extent of the rights that a company has to the risks and rewards flowing from an operation. Typically, the share of economic risks and rewards in an operation aligns with the company’s percentage ownership of that operation, and the equity share is the same as the ownership percentage.

equivalence class

  1. A grouping of characters or character strings that are considered equal for purposes of collation. For example, many languages place an uppercase character in the same equivalence class as its lowercase form, but some languages distinguish between accented and unaccented character forms for the purpose of collation.
  2. A classification of values for which an object is expected to behave similarly.

Pertaining to a security label relationship in which two security labels contain the same security level and the same set of categories. In an equivalent relationship, each label is both dominated by, and dominates the other. See also disjoint, dominant.

equivalent paths
A collection of paths to a storage device. The paths have no switchover time penalty when changing from one path group to another while accessing the storage device.

equivalent price difference
A measure of the difference between the initial equivalent price and the optimal equivalent price.

equivalent price percentage change
A measure of the difference between the initial equivalent price and the optimal equivalent price in terms of percentage change.

equivalent retail price
The shelf price of a product divided by the standardized unit of measure.

equivalent unit
A standardized measure of volume based on a process of equivalization. See also equivalization.

equivalent volume
The relative number of equivalent units sold. For example, if two 12-packs of Coke are equal to one equivalent case, and two equivalent cases are sold, then the equivalent volume is two.

equivalent volume difference
The difference between the initial equivalent volume and the optimal equivalent volume in absolute terms.

equivalent volume percent change
The difference between the initial equivalent volume and the optimal equivalent volume in terms of percentage.

The assignment of a standardized unit of measure to a product based on the product’s description and the spread of sizes or counts that apply to that description. For example, both one case of Coke and two 12-packs of Coke are equal to one equivalent case. See also equivalent unit.


  1. See exception response.
  2. See explicit route.

erasable programmable read-only memory (EPROM)
A type of memory chip that can retain its contents without electricity. Unlike the programmable read-only memory (PROM), which can be programmed only once, the EPROM can be erased by ultraviolet light and then reprogrammed.

To remove text from a data medium, leaving the medium available for recording new text.

erase character
A character that indicates that the previous character on the command line has been erased.

A Resource Access Control Facility (RACF) and DFSMSdfp function that overwrites the space occupied by a data set when the data set is deleted (scratched) from a direct access storage device (DASD) or part of the space is released.

See Employee Referral Bonus Program.

See enterprise connector.

See entity relationship diagram.

See error-recording data set.

See extended read-only dynamic storage area.

See Enterprise Repository Environment.

See Environmental Record Editing and Printing.

See electronic request for service.


  1. See enterprise resource planning.
  2. See error recovery procedure.


  1. See event.
  2. A discrepancy between a computed, observed, or measured value or condition and the true, specified, or theoretically correct value or condition. See also failure.

error buffer
A portion of storage used to hold error output information temporarily.

error class
A class that identifies whether an error log entry is for a hardware or software failure.

error code

  1. A value that identifies an error condition.
  2. A code that describes how the processing of an operation ended at a computer workstation. See also completion code.

error condition
The state that results from an attempt to run instructions in a computer program that are not valid or that operate on data that is not valid.

error-correction code (ECC)
A code appended to a data block that has the capability to detect and correct multiple bit errors within the block.

error correction code (ECC)
A code appended to a data block that has the capability to detect and correct multiple bit errors within the block.

error counter
A type of error entry generated by device driver components. Certain device drivers can generate retry operations if an operation is not successful on the first attempt. They use counters to monitor the number and cause of retry operations, and they contain algorithms that decide when these counters should be sent to the error log.

error detect timeout value (E_D_TOV)
The time that a switch waits for an expected response before declaring an error condition. This value is adjustable in 1 microsecond increments from 2 - 10 seconds. See also resource recovery timeout value.

error device driver
A special file (pseudo device) driver used by the error logging facilities. Error entries are written to the error device driver by the errlog() subroutine and the errsave() kernel service. Error entries are read from the error device driver by the error daemon process and saved in the system error log file.

error end event
An end event that also throws an error. See also end event.

error event
An event that indicates that an error has been caught or thrown.

error feedback
A mechanism for capturing and displaying error messages.

error handle
A handle that is used to return errors and diagnostic information.

error ID
See error identifier.

error identifier (error ID)

  1. A value used to identify a unique error condition detected by the hardware or device.
  2. An 8-character code used to identify a particular failure. There is a unique error identifier for each error record template.

error intermediate event
An intermediate event that is triggered by a thrown error.

error listener
A listener that handles all error events in a particular graphical user interface component.

error log
A data set or file that is used to record error information about a product or system.

error log entry
A record in the system error log describing a hardware or software failure and containing failure data captured at the time of the failure.

error log stream
A continuous flow of error information that is transmitted using a predefined format.

error message

  1. An indication that an error has been detected.
  2. Any message displayed by DirectTalk in the System Monitor as an alarm and optionally written to the DirectTalk error log, or to the AIX error log (as an alert). Strictly speaking, the term error message should include only red (immediate attention) and yellow (problem situation) messages but it is also used to refer to green (a red or yellow message has been cleared) and white (informational) messages.

error notification
An AIX facility that detects an event not specifically monitored by the software, such as a disk adapter failure, and programs a response to the event.

error output
See diagnostic output.

error page range
A range of pages that are considered to be physically damaged.

Error Protocol (EP)
A protocol that provides a means for an Internetwork Packet Exchange (IPX) system to report that is has detected an error, and as a result of that error, the IPX system has discarded an IPX packet.

error queue element (EQE)
A piece of data that is maintained for a Fast Path area data set block that cannot be accessed. Each data set can have up to ten damaged blocks (control intervals).

error-recording data set (ERDS)
On S/390 and zSeries hosts, a data set that records data-storage and data-retrieval errors. A service information message (SIM) provides the error information for the ERDS.

error record template
In the AIX operating system, a template that describes the error class, error type, error description, probable causes, recommended actions, and failure data for an error log entry.

error recovery
The process of correcting or bypassing the effects of a fault to restore a computer system to a prescribed condition. (T)

error recovery procedure (ERP)
A procedure designed to help isolate and, where possible, to recover from errors in equipment. The procedure is often used in conjunction with programs that record information on machine malfunctions.

error start event
A start event that is triggered by a thrown error. An error start event is used only for event subprocesses as an error handling mechanism. See also start event.

error-to-traffic (E/T)
The number of temporary errors compared to the traffic that is associated with a resource.

error trapping
See exception handling.

error type
A classification of errors that identifies whether an error log entry is for a permanent failure, temporary failure, performance degradation, impending loss of availability, or undetermined failure.


  1. See Electronic Service Agent.
  2. See Enterprise Systems Architecture.

See Enterprise Systems Architecture/390.

See External Subsystem Attach Facility.

See enterprise service bus.

ESB server
An application server that provides the execution environment for mediation modules in addition to application programs.


  1. See escape character.
  2. See exception symptom code.

To create an incident in the Reslient platform based upon one or more conditions.


  1. A course of action that runs when a task is not completed satisfactorily within a specific period of time. See also escalation limit.
  2. A process in which event notifications are sent to a wider list of event destinations as a result of unclearing an event within a certain time frame.

escalation limit
The amount of time, for example hours or days, that a participant has to respond to a request, before an escalation occurs. See also escalation.

escalation point
A condition or threshold that must be met in order to trigger an escalation.


  1. In markup languages, a series of characters that are used to replace markup-sensitive characters in specific contexts, such as & replaced with &.
  2. In markup languages, to replace markup-sensitive characters in specific contexts with a series of characters such as & replaced with &.
  3. To return to the original level of a user interface.

escape character (ESC)

  1. A symbol that is used to modify the interpretation of the character or characters that follow it. Examples of uses of escape characters in SQL are delimiting identifiers, delimiting character constants, and modifying the special meaning of the underscore (_) and percent (%) characters in the LIKE predicate.
  2. The control character in a text-control sequence that indicates the beginning of a sequence and the end of any preceding text.
  3. A character that suppresses or selects a special meaning for one or more characters that follow.

escape function
One type of multibyte control function.


  1. The units of vertical movement and horizontal movement that are used to represent the smallest movement of the cursor or of the current print position of a presentation device.
  2. Movement of one character space between the paper carrier and typing or printing position, parallel with the typing or printing line.

escapement direction
The direction in which successive character shapes are formed by a presentation device. See also character direction.

escape message
A message that reports a condition that caused the program to end before the requested function was complete.

escape sequence
A string of bit combinations that is used to escape from normal data, such as text code points, into control information.


  1. See extended system contents directory.
  2. See ESCON Director.

See ESCON Manager.

See Enterprise Systems Connection.

ESCON channel

  1. An S/390 or zSeries channel that supports ESCON protocols. See also ESCON channel, parallel channel.
  2. A channel that has an Enterprise Systems Connection channel-to-control-unit I/O interface that uses optical cables as a transmission medium. See also ESCON channel.

ESCON Director (ESCD)
A class of devices that connect channels and control units only for the duration of an input/output (I/O) operation. See also ESCON Manager.

ESCON environment
The data processing environment having an Enterprise Systems Connection channel-to-control-unit I/O interface that uses optical cables as a transmission medium.

ESCON host system
An S/390 or zSeries host that attaches to the ESS with an ESCON adapter. ESCON host systems run on operating systems that include MVS, Virtual Storage Extended (VSE), transaction processing facility (TPF), or versions of VM.

ESCON Manager (ESCM)
A licensed program that provides host control and intersystem communication capability for ESCON Director connectivity operations. See also ESCON Director.

ESCON multiple image facility (EMIF)
In mainframe computing, a function that enables logical partitions (LPARs) to share an ESCON channel path by providing each LPAR with its own channel-subsystem image.

In ESS Specialist, the label on a pseudo-host icon representing a host connection that uses the ESCON protocol and that is not completely defined on the ESS. See also access-any mode, pseudohost.

ESCON processor (ESCP)
A processor within a connectivity subsystem (CSS) that performs ESCON functions.

See ESCON processor.


  1. See electrostatic discharge.
  2. See electronic software delivery.

See entry-sequenced data set.

See extended shared dynamic storage area.

See Extended Submit Facility.

See English Slot Grammar.


  1. See Edge Side Include.
  2. See external security interface.

See encoding scheme identifier.

See electronic signature.

An execution method for an authored/received contract or authored/received amendment contract that attaches an electronic signature for each of the signing parties to the contract, interactively online. See also execution.

See electronic signature.

ESI processor
A processor that supports fragment caching and fragment assembly into full pages.


  1. See enclosure services manager.
  2. See Enterprise System Management.
  3. See external security manager.

See Extended Simple Mail Transfer Protocol.

esoteric unit name
An installation-assigned name for a group of devices having similar hardware characteristics; this name is used when requesting a device. For example, an esoteric unit name of TAPE might represent all tape devices in an installation. See also generic unit name.

eSourcing software
Software that is used to streamline the sourcing process by generating requisitions, proposals, and information. eSourcing software automates the process of choosing a supplier for recurring purchases of a product or service by generating RFxs, distributing those requests to suppliers, and scoring the responses to reduce the time to select a supplier.


  1. See economic shipping parameter.
  2. See Encapsulated Security Payload.
  3. See early support program.

See extended system queue area.

See extended support release.

ESRI control
A control that can be used to navigate within a map, for example, zoom, pan.

ESS Copy Services
A collection of optional software features, with a web-browser interface, used for configuring, managing, and monitoring data-copy functions.

essential character
An article within a product package that provides the most important function or predominate feature.

See enterprise single sign-on.

See Environment Services System Services.

established baseline coordinate
In architecture, the current baseline presentation coordinate when no temporary baseline exists or the last current baseline presentation coordinate that existed before the first active temporary baseline was created. If temporary baselines are created, the current baseline presentation coordinate coincides with the presentation coordinate of the most recently created temporary baseline.

See extended specify task abnormal exit.

estimated capacity
The available space, in megabytes, of a storage pool.

estimated duration
The estimated length of time that an operation will use a workstation. This is initially based on a value that is provided when the operation is defined, but can be adjusted automatically by the feedback mechanism to reflect actual durations.

estimate request
A scenario that is used to calculate the cost of the labor, material, and other resources that are required to perform construction work. An estimate request is typically aligned with an individual construction project.

estimate version
A version of the estimate request that compares the costs of different project scenarios. Multiple versions for an estimate request can be created with different filter settings to represent scenarios for the project.

See error-to-traffic.

See expected time of arrival.

ETB character
See end-of-transmission-block character.

An open source database designed by CoreOS. Using the RAFT consensus algorithm, etcd attempts to provide a single source of truth to client applications such as configuration management systems.

See eject to front facing.

A packet-based networking technology for local area networks (LANs) that supports multiple access and handles contention by using Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the access method. Ethernet is standardized in the IEEE 802.3 specification. See also local area network.

Ethernet network
A baseband local area network (LAN) with a bus topology in which messages are broadcast on a coaxial cable using a carrier sense multiple access/collision detection (CSMA/CD) transmission method.

Ethernet-type LAN
A local area network that uses either the Ethernet Version 2 or IEEE 802.3 protocol.

A networking protocol used by Apple equipment connected directly to Ethernet.

See extract, transform, and load.

ETL custom workflow task
An IBM TRIRIGA Application Platform component that provides functionality for running a Kettle Transformation Script.

ETL development environment
The application that is used to develop the ETLs that will run in a specific environment. For the TDI environment, the development environment is Configuration Editor. For the Kettle environment, the development environment is Spoon.

ETL engine
An engine that runs the ETL. For the TDI environment, the ETL engine is TDI server. For the Kettle environment, the ETL engine is Kettle API.

ETL job item
A job that extracts data from source tables and loads it into fact tables.

ETL map
A map that converts or moves data from source tables to different tables.

ETL process
A process that is used to populate fact tables with data from source tables. This process is driven based on a schedule controlled by the IBM TRIRIGA Job Scheduler.

ETL transform
See extract, transform, and load.

See Extended Terminal Option.

ETO descriptor
A template that contains information about the physical characteristics of terminals, user options and message queue names, and remote LTERMs associated with MSC links. See also logon descriptor, MFS device descriptor, MSC descriptor, user descriptor.

See external time reference.


  1. See Enterprise Tagging Service.
  2. See European Telecommunications Standard.

See European Telecommunications Standards Institute.

See event-triggered tracking.

ETX character
See end-of-text character.

See Extended UNIX Code.

EUC encoding scheme
See Extended UNIX Code encoding scheme.

See Extended UNIX code Japanese.

See Extended UNIX code Korean.

See extended user dynamic storage area.

See extended unique identifier.

The monetary unit of the European Monetary Union (EMU) that was introduced alongside national currencies on 01 January 1999.

The common European ISDN standard, agreed in 1993, providing a basic range of services and supplementary services using 30 B-channels plus a D-channel over an E1 trunk.

Europe, Middle East, and Africa (EMEA)
The geographical region comprising Europe, the Middle East, and Africa. See also Northeast Europe, Southwest Europe.

European Article Numbering (EAN)
In architecture, the bar code symbology used to code grocery items in Europe.

European Money Transfer Form (EMTF)
A form used for financial transactions that is 210 mm x 317 mm (8.3 in. x 12.5 in.).

European Telecommunications Standard (ETS)
A standard produced by the European Telecommunications Standards Institute.

European Telecommunications Standards Institute (ETSI)
A European organization founded in 1988 and responsible for the establishment of technical telecommunications standards. It produces European Telecoms Standards (ETS) for its membership, which consists of network operators, PTT manufacturers, users, and research institutes. Some of these functions used to be performed by the Commission of European Post and Telegraph. ETSI is similar in function to the International Telecommunication Union. See also Commission of European Post and Telegraph, International Telecommunication Union.

EuroReady product
A product that is capable of correctly processing monetary data in the euro denomination. For a product to be considered EuroReady, all products with which it is used must also be EuroReady. IBM hardware products that are EuroReady might or might not have an engraved euro sign key on their keyboard.

A rigorous analysis of completed or ongoing activities.

evaluation date
In Sterling Order Management, a date, other than the current date, either in the past or the future, that is used for rule evaluation. For example, one could use the date of sale as the evaluation date to determine the amount a purchaser should be refunded.

evaluation type
A set of configurations that is the building block for supplier evaluation business objects, including workflow, notification, and scorecard.

A user role that is responsible for analyzing assigned criteria in relation to the knowledge and experience gained by working with the supplier.

even parity bit
A check bit that is usually generated or included in a parity-checking algorithm to make the total number of bits in a bit pattern an even number. See also odd parity bit.

even positive acknowledgment (ACK0)
In BSC, the even-numbered, positive acknowledgment character, which indicates that text was received without transmission errors.


  1. A system-level action that occurs during the processing of a workflow. For example, an event occurs when a workflow is created or when a step processor begins processing a work item.
  2. A mechanism by which devices publish data to the Internet of Things Foundation. The device controls the content of the event and assigns a name for each event it sends.
  3. Information about something that happened in the business domain, such as "a customer opens an account" or "a customer wires money".
  4. An activity of interest that takes place within the field of view of a camera channel.
  5. In the Notes Calendar, an entry with a duration of at least one day. For example, an all-day meeting or a vacation is an event.
  6. A condition identified in captured data that, when triggered, results in an action. For example, an event can be the appearance or absence of a specific data element or value in the request or the response, and resulting actions can include setting values and generating alerts.
  7. A meeting or web conference that is scheduled in advance. It includes added features such as the capability to assign multiple presenters, or send automated email announcements.
  8. A specific occurrence in the business process, often a status change or generated exception. Releasing an order and cancelling an order are both examples of events. When an event occurs in a transaction, an action is triggered.
  9. A group of promotions arranged in a particular theme.
  10. An object that has a timestamp that captures when it occurs, and possibly the time zone in which it occurs. See also event type.
  11. An occurrence of significance that involves procurement activity starting from requesting quotes, to inviting suppliers, bidding, analyzing, and awarding.
  12. An action taken by a visitor that triggers an action in the runtime environment. Examples of an event can be: placing a visitor into a segment, presenting an offer, or logging data.
  13. A significant occurrence that happens at a given place and time. See also incident.
  14. An element that is used to represent a change in state.
  15. A row or a series of rows of data.
  16. An action taken by a customer that triggers an action in the runtime environment. These can be a call to a call center, a bank deposit, any cell phone use, or a credit card purchase.
  17. A user or system activity that is logged with an appropriate message.
  18. A situation that may impede movement across the transportation network.
  19. A change to a state, such as the completion or failure of an operation, business process, or human task, that can trigger a subsequent action, such as persisting the event data to a data repository or invoking another business process. See also content event, message event.
  20. An action defined or tracked within Emptoris Contract Management, for which individuals are notified by means of a standard or custom notification template.
  21. A transition in database activity caused by users, applications, or the database manager. Events include connections, deadlocks, and transactions. See also event monitor.
  22. In computer graphics, information generated either asynchronously from a device or as the side-effect of a client request. Events are grouped into types and are not sent to a client by the server unless the client has issued a specific request for information of that type. Events are usually reported relative to a window.
  23. An occurrence of significance to a task or system. Events can include completion or failure of an operation, a user action, or the change in state of a process. See also alert, enterprise logging, event report, journal receiver, message, receiver, situation.

event access interface
A Java EE stateless session bean that provides methods for querying historical events from the event server.

event action

  1. The action that IBM Director takes in response to a specific event or events.
  2. A script, object, or workflow that is run as defined in a subscription.

event action list
In VisualAge RPG, a list of controls that indicates the action subroutine to be called by the event of each control.

event action plan
A user-defined plan that determines how IBM Director will manage certain events. An event action plan comprises one or more event filters and one or more customized event actions.

event adapter
Software that converts events into a format that the Tivoli Enterprise Console product can use and forwards the events to the event server.

An agent that monitors shipments, continuous moves, optimization runs, invoices, and contract changes. Users can subscribe to alerts, which the EventAgent sends when an event or exception occurs.

event aggregate
A value that is computed from a collection of events.

event aggregation
A numeric value that indicates the number of times that an event has to occur before an action is triggered.

event alert
An alert that occurs when a collection of complex events meets specified criteria over a specified life span. Event alerts are based on business rules that are defined in a complex event processor, and can indicate situations of interest, such as two or more purchase transactions of more than 10,000 US dollars occurred in the last hour at locations 240 kilometers from each other. See also alert.

event-based retention
Maintenance of a document in the archive until a prerequisite event occurs.

event binding

  1. A binding that describes the connection of a set of event types to an endpoint. See also inbound endpoint, outbound endpoint.
  2. An XML definition that can be deployed to CICS in a CICS bundle. This bundle can be enabled, disabled, installed, inquired on, and uninstalled. The event binding contains event specifications, capture specifications, and adapter information.

event bubbling
A characteristic of event handling such that an event handled by an embedded widget is also handled by each level of embedding widget. For example, if a button is within a box (named B) that is within a box (named A), a user's click is an event that is available to all three widgets; first, to the button, then to the immediately embedding box (B), and then to the box (A) that embeds the other widgets. Event bubbling is an option in EGL Rich UI and in JavaScript.

event capture
The process of capturing an event in CICS. After a capture point has been successfully filtered, CICS copies all of the capture data and passes it to the event dispatcher.

event card
In Tivoli NetView, a graphical representation, resembling a card, of the information contained in an event.

event catalog
A repository of event metadata used by applications to retrieve information about classes of events and their permitted content.

event class

  1. In the Tivoli Enterprise Console product, a graphical user interface that enables system administrators to view and respond to dispatched events from the event server. 
  2. A number assigned to a group of trace points that relate to a specific subject or system component. The defined event classes are listed in the trace profile.

event code
A code that represents a specific event that is tracked and logged into the audit log tables.

event collector
A component that manages real-time events from sensors and vulnerability data from scanners.

event console
In the Tivoli Enterprise Console product, a graphical user interface that enables system administrators to view and respond to dispatched events from the event server.

event context
An activity or group of activities in an expanded subprocess that can be interrupted by an exception (such as by an error intermediate event).

event control bit (ECB)
A bit assigned to each queue to signal the arrival or departure of an element.

event control block (ECB)
A control block used to represent the status of an event.

event correlation
The process of analyzing event data to identify patterns, common causes, and root causes. Event correlation analyzes the incoming events for predefined states, using predefined rules, and against predefined relationships.

event correlation sphere
The scope of an ECSEmitter method that allows an event consumer to correlate events. Each event includes the identifier of the correlation sphere to which it belongs and the identifier of its parent correlation sphere from the event hierarchy.

event data
In an event message, the part of the message data that contains information about the event (such as the queue manager name, and the application that gave rise to the event). See also event header.

event database
A database in which events that can be monitored are stored, and which is required to support the persistence of those events.

event-data substitution variable
A variable that can be used to customize event-specific text messages for certain event actions.

Event Designer
An event rule application development tool that is integrated into the Eclipse development environment and dedicated to the creation and management of event rule applications.

event destination
An address for sending event notifications.

event dispatcher
A dispatcher that routes captured events to the correct event processing adapter for processing.

event-driven migration
In DFSMShsm, a space management function similar to primary space management, except it is event-driven instead of scheduled. Low activity data sets are moved from the volume and occupied space is reduced until the volume low threshold is reached. There are two methods of event-driven migration: hourly (interval migration) and immediate (on-demand migration). See also interval migration, on-demand migration.

event emitter
A component of the Common Event Infrastructure that receives events from event sources, completes and validates the events, and then sends events to the event server based on filter criteria. See also Common Event Infrastructure.

event expression
A definition of the specific state when an event is true.

event filter
In OSI, a method for excluding certain types of events so that they are not reported.

event flow
A visual representation of the event processing that will take place when the application is run.

event forwarding discriminator (EFD)
A managed object that describes the criteria used to select which event reports are sent and to whom they are sent. See also discriminator.

event frame
An entity representation that emphasizes date and time information. An event frame is often used in conjunction with theme lines. See also diverted theme line, representation.

event gateway
A gateway that represents a branching point in the process where the alternative paths that follow the gateway are based on events that occur rather than the evaluation of expressions using process data (as with an exclusive or inclusive gateway).

event generating component
A component that defines a flowchart that describes the logic of the detection algorithm.

event group

  1. A set of criteria that is applied to events to identify a subset of those events. The criteria include constraints expressions that define the filter conditions.
  2. A container for inbound events that enables the user to group events without having to create a new monitoring context. Event groups are purely a visual construct and are not represented in the monitor model.
  3. A set of events that meet certain criteria defined by event group filters, which include constraints that are expressions that define the filter conditions. Event console operators can monitor event groups that are relevant to their specific areas of responsibility.

event handler
Software that initiates an event response that is configured by the administrator. See also message consumer.

event header
In an event message, the part of the message data that identifies the event type of the reason code for the event. See also event data.

event identifier (EID)
A 2-byte hexadecimal number that identifies the event producing a trace record.

event key
A combination of data items that uniquely defines an event instance. Identifying an event instance enables the agent to determine if it is new, ongoing or stopped.

event list
The set of detected event instances evaluated by the task execution rules to determine which agent tasks should be performed.

event listener
A type of asynchronous bean that serves as a notification mechanism and through which Java Platform, Enterprise Edition (Java EE) components within a single application can notify each other about various asynchronous events.

event log

  1. A log that contains information about events for a particular system or group, for a particular metric, or for all the events that are associated with a specific monitor.
  2. A database table that contains information about certain system-level events related to work item processing.
  3. A log that maintains a history of event messages issued by all metadata servers in a cluster.

event logging
An optional feature used to log the occurrence of certain system-level events related to work item processing. For example, the event logging feature logs a message when a work item is created or when a step processor begins processing a work item.

event loop
A sequence of steps performed cyclically to accomplish a task. It must contain at least one input (source) and an ending point.

event management services (EMS)
In Tivoli NetView, a centralized method of generating, receiving, routing, and logging network events.

event manager

  1. In Tivoli NetView for OS/390, the component that receives alert and resolution major vectors, translates these major vectors into generic event records, and applies the event status to the resource defined in the Resource Data Manager cache.
  2. A function that processes all tracking events and determines which are related to Tivoli Workload Scheduler for z/OS.

event marker
A marker that represents the target system as the sender or recipient of connected events to or from IBM Security Identity Governance.

event mask
In computer graphics, the set of event types that a client requests relative to a window.

event message
A message that contains information (such as the category of event, the name of the application that caused the event, and queue manager statistics) relating to the origin of an instrumentation event in a network of IBM MQ systems.

event model
The part of the monitor model that contains references to all of the elements of the event definitions used in the monitor model.

event monitor
A database object for monitoring and collecting data on database activities over time. For example, starting the database might be an event that causes an event monitor to track the number of users on the system by taking an hourly snapshot of authorization IDs using the database. See also event, unformatted event table.

event monitoring point (EMP)
Point in the CICS code at which CICS monitoring data is collected.

event notification
The process of notifying a user about an event.

event notification rule
A rule that determines who will be notified for which events and by what means.

event object

  1. An object that captures information about an event that has occurred in a system application and then passes the event object to the event infrastructure, where it is published to event subscribers or stored in a database for later retrieval. The event object describes an event type, indicates when the application generated the event, and identifies properties relevant to the event.
  2. A subset of the fields in the definition of an event.

event option
A predicate in the capture specification used for filtering on the value of one of the options on a CICS command for application events or on one of the predefined options for system events.

event part
An XML Schema Definition (XSD) type that provides information about the structure of part of an event. A single event definition can have different event parts that are defined by different XML schemas.

event pool
The set of events recognized by an activity (system events and user events that have been defined to it). Each activity has an event pool associated with it. An activity's event pool is initialized when the activity is created, and deleted when the activity is deleted. Event-related commands such as DEFINE INPUT EVENT and DEFINE COMPOSITE EVENT operate on the event pool associated with the current activity.

event processing adapter (EP adapter)
A program that formats and routes events emitted by CICS.

event processing adapter configuration
An XML definition that defines an event processing adapter to CICS. An event processing adapter consists of adapter and dispatcher information.

event processing adapter set
A definition that contains the names of one or more EP adapters.

event processor

  1. A Java virtual machine (JVM) service that dispatches events among all modules.
  2. The service responsible for managing events through event reader, event listener and email reader services. The event processor manages the incoming event queue and is responsible for sending queued events to the policy engine for processing.
  3. A processor that manages and monitors multiple servers and processes events from the monitored servers. See also Sterling Control Center engine.

event project
A project in which the user can manage event rules and business objects.

event publishing
A data publishing solution that captures changed data and publishes it to subscribing applications. See also publishing queue map, Q Capture program.

event queue

  1. The queue onto which the queue manager puts an event message after it detects an event. Each category of event (queue manager, performance, configuration, instrumentation, or channel event) has its own event queue.
  2. An ordered list of events.
  3. In computer graphics, a queue that records changes in input devices--buttons, valuators, and the keyboard. The event queue provides a time-ordered list of input events.

event reader

  1. A task that reads event records from an event data set.
  2. A service that monitors an event source for new, updated, and deleted events, and triggers policies based on the event data. See also database event reader, standard event reader.

event record
A database record that describes actual status and results for events.

event report

  1. The unsolicited report that an event has occurred. In an Open Systems Interconnection (OSI) context, when a managed object emits a notification, the agent uses one or more event forwarding discriminators (EFDs) to find the destinations to which the report is sent. See also event.
  2. In OSI, the unsolicited notification of a significant occurrence by an agent to a manager .

event rule

  1. A business rule that determines how events are processed and what type of response, such as an event alert, is returned. In the complex event processing (CEP) tools, an event rule is called a situation.
  2. A piece of business logic that is evaluated by the runtime server when an event is received.

event rule group
A group of event rules that operate together and typically include an otherwise clause.

event run time
A shared, secured component that runs event assets such as business objects, events, and actions.

event script
A script attached to a particular event. Examples in LotusScript are Initialize, Queryopen, and Postopen. When the event occurs, the script runs.

event server
A server to which other servers can send events for logging. The event server routes the events to any receivers that are enabled for the sending server's events.

events file
In CoOperative Development Environment/400, a machine-readable file, created by a compiler or when the Verify program choice is selected, that contains information about locations of errors in a source file.

event sieve
In Tivoli NetView, an object that is managed by the ovesmd daemon, which is the event sieve agent.

event sink
A processing action that forces processing to wait until designated asynchronous actions complete.

event source

  1. A data source that stores and manages events.
  2. An object that supports an asynchronous notification server within a single Java virtual machine. Using an event source, the event listener object can be registered and used to implement any interface.

event specification
Part of the event binding that represents a business event. The event specification contains the event name and the emitted business information. One or more capture specifications can refer to an event specification.

event specifier
In the Tivoli Enterprise Console, a primitive that is used in searching for events in the event cache.

event store
A persistent cache where event records are saved until a polling adapter can process them.

event subscription

  1. A set of conditions required to initiate an event action. These include the target object, the event that must occur, and the action that is triggered.
  2. A subscription that obtains information about document or folder events that occur on an Enterprise Content Management (ECM) server.

event-to-method connection
A connection from an event generated by a bean to a method of a bean. When the connected event occurs, the method is executed.

event tracking
A function that follows events in the operations department in real time and records status changes in the current plan.

event trigger
An event that triggers a cutoff in a disposition schedule. There are internal, external, recurring, and predefined date events.

event-triggered tracking (ETT)
A component that waits for specific events to occur and then adds a predefined application to the current plan. ETT recognizes two types of events: the reader event, which occurs when a job enters the JES reader, and the resource event, which occurs when the availability status of a special resource is set to yes.

event type

  1. A set that identifies events that share common attributes. For example, a "purchase" event might have an amount, an item and a time. See also event.
  2. A category of events that defines the unit of measure for the value associated with events in Event Manager. Examples of event types include wire transfer, account opening, or credit card transaction.

Event Viewer
A tool provided by Windows systems to examine and manage log files.

event writer
A task that writes event records in an event data set.

evergreen contract
A contract that does not have an expiration date.

everyday low pricing (EDLP)
A performance detail type which is used when a price change lasts more than eight weeks or significantly longer than a temporary price change.

A component that controls the membership of entries in each BackingMap instance. Sparse caches can use evictors to automatically remove data from the cache without affecting the database.


  1. Any information that is captured for a client and used to determine eligibility and entitlement to a program or benefit.
  2. A set of details from supporting passages that are returned after searching the IBM Watson corpora that is used to form the answer to the question. The evidence provides text from passages within the corpora that support the answer.

evidence-based medicine
A methodology for applying the best available evidence gained from the scientific method to clinical decision making. Evidence-based medicine attempts to assess the strength of evidence of the risks and benefits of treatments (including lack of treatment) and diagnostic tests.

See Earned Value Management.

evolutionary development
An iterative development strategy that acknowledges that user needs are not fully understood and therefore requirements are refined in each succeeding iteration (elaboration phase). See also incremental development, iterative development.

Evolved High-Speed Packet Access (HSPA+)
An upgrade to the HSPA standard. HSPA-based networks are compatible with 3G networks. See also 4G, High-Speed Packet Access.

exabyte (EB)
For processor, real and virtual storage capacities and channel volume, 2 to the power of 60 or 1 152 921 504 606 846 976 bytes. For disk storage capacity and communications volume, 1 000 000 000 000 000 000 bytes. See also zettabyte.

exact end position
In RPG, an entry on the output specifications that indicates where the end position of a field or constant is to be placed in the output record. See also relative end position.

exact match
A search function that searches for the exact character or numeric string entered into a query box.

exact-name format
In AFP support, a print descriptor naming convention that uses system-specific (actual) group names instead of group alias names.

Exceed on Demand (EOD)
An X windows application to allow a user with either a Windows or Linux client and with EOD client code installed, to establish a working session with an AIX or Linux server or workstation.

EXCEPT group name
In RPG, a name used in the place of indicators to identify a record or group of records written at exception output time.


  1. A condition or event that cannot be handled by a normal process.
  2. An indication of a suspicious and potentially vulnerable condition that requires additional information or investigation.
  3. An SQL operation that involves the EXCEPT set operator, which combines two result tables. The result of an exception operation consists of all of the rows that are in only one of the result tables.
  4. An event that occurs during the performance of the process that causes a diversion from the normal flow of the process. Exceptions can be generated by intermediate events, such as time, error, or message.

exception action
In architecture, action taken when an exception is detected.

exceptional wait
In Performance Tools, that portion of internal response time that cannot be attributed to the use of the processor and disk. An exceptional wait is caused by contention for internal resources of the system, for example, waiting for a lock on a database record.

exception class data
CICS monitoring information on exception conditions raised by a transaction, such as queuing for VSAM strings or waiting for temporary storage. This data highlights possible problems in system operations. See also monitoring record.

exception condition

  1. An expression that compares a data point value to a user-specified value. The user-specified value can be a static value, a calculated value (for example, variance between actual and plan), or one of the two thresholds defined for the fact. An exception condition is evaluated at the time a data point is captured.
  2. An abnormal condition that may arise during execution of a program.

exception file
A file that contains a list of records with identifier names that do not have a matching Parameter IdentifierName attribute value.

exception flow
A set of sequence flow paths that originates from an intermediate event that is attached to the boundary of an activity. The process does not traverse this path unless the activity is interrupted by the triggering of a boundary intermediate event. See also normal flow.

exception handler

  1. In C++, the catch block that catches exceptions when they are thrown from a function enclosed in a try block.
  2. A set of routines that responds to an abnormal condition. An exception handler is able to interrupt and to resume the normal running of processes.

exception handling
The performance of a specified response to an abnormal condition. Exception handling allows control and information to be passed to an exception handler when an exception occurs.

exception highlighting
In PSF, the markings placed on the printed page to indicate the location of a data-stream error.

exception listener
An instance of a class that can be registered by an application and for which the onException() method is called to pass a JMS exception to the application asynchronously.

exception object
A property from which a user can create an infoset, match for entered search term results, and view details.

exception processing
A process in which the system writes all records that to do match an entry in the account code conversion table to an exception file.

exception queue
A queue to which messages associated with certain exceptional conditions, such as errors, are routed.

exception report
A WebSphere MQ report message type that is created by a message channel agent when a message is sent to another queue manager, but that message cannot be delivered to the specified destination queue.

exception request (EXR)
In SNA, a request that replaces another request in which an error was detected.

exception response (ER)
In SNA, a value in the form-of-response-requested field of the request header that directs the receiver of the request to return a response only if the request is unacceptable as received or if the request cannot be processed; that is, only a negative response can be returned. See also definite response, no response.

exception state
A lifecycle property that determines whether a document can be promoted or demoted from one lifecycle state to another. See also lifecycle policy, reset.

exception symptom code (ESC)
A 2-byte error code that describes an exception in terms of class, type, and symptom.

exception table

  1. A table that contains copies of rows that violate unique index or primary key rules. It includes a timestamp and a description of the violation.
  2. A user-created table that reflects the definition of the table being loaded.
  3. A table that holds rows that violate referential constraints or check constraints that the CHECK DATA utility finds.

exception trace entry
An entry made to the internal trace table and any other active trace destinations when CICS detects an exception condition. It gives information about what was happening at the time the failure occurred and what was being used.


  1. The transfer of a document from one organization to another that follows the security, protocol, and other configurations specified in an exchange profile.
  2. A set of one or more non-concurrent related sequences passing between a pair of Fibre Channel ports. An exchange encapsulates a "conversation" such as a small computer system interface (SCSI) task or an Internet Protocol (IP) exchange. Exchanges can be bidirectional and can be short--lived or long-lived.
  3. A process that provides value-added services for distribution, access, and use of master data.
  4. In architecture, the predictable interpretation of shared information by a family of system processes in an environment where the characteristics of each process must be known to all other processes. See also interchange.
  5. In a retail scenario, shipping a replacement item to a customer who has returned items.

exchange data link (EDL)
A serial connection that carries messaging information between DirectTalk and the Lucent Technologies 1AESS, Northern Telecom DMS100, Ericsson MD110 switch, or Siemens Hicom 300.

exchange identification (XID)

  1. The ID that is exchanged with the remote physical unit when an attachment is first established.
  2. A specific type of basic link unit that is used to convey node and link characteristics between adjacent nodes. XIDs are exchanged between link stations before and during link activation to establish and negotiate link and node characteristics, and after link activation to communicate changes in these characteristics.

exchange log name

  1. The process by which, when an APPC connection is established between two CICS systems (or reestablished after failure), the name of the system log currently in use on each system is passed to the partner. The exchange log name process affects only sync level 2 conversations. It is used to detect the situation where a failed CICS has been communicating with a partner that is waiting to perform session recovery, and is restarted using a different system log. See also logname.
  2. A process used when sessions are first established to determine which log is being used by the remote system.

exchange media
The diskette or the tape that the user uses when exchanging data with other systems.

exchange order

  1. A record that tracks the exchange of a piece of equipment.
  2. An order that is used to ship replacement items to a customer who has returned items.

exchange profile
The configuration information that is required to send messages to a partner or receive messages from a partner. Information includes security, certificates, partner details, direction, triggers, and actions.

exchange rate
The rate at which one currency can be converted into another. Factors such as interest rates, inflation, the state of politics and economy in a country affect the exchange rate.

exchange service
A service that allows users to exchange business documents electronically and to communicate securely, regardless of protocol, application format, or preferred communication method.

exchange station ID (XID)
In communications, a data link command or response for recognizing the primary station and a secondary station.

See external CICS interface.


  1. To prevent the use of a managed disk (MDisk) by a clustered system because of certain error conditions.
  2. The process of identifying files in an include-exclude list. This process prevents the files from being backed up or migrated whenever a user or schedule enters an incremental or selective backup operation. A file can be excluded from backup, from space management, or from both backup and space management.

exclude authority
An object authority that prevents the user from using the object or its contents. See also all authority.

exclude data set
In aggregate backup and recovery processing, a data set in the selection-data-set exclude list. This data set is excluded from being processed by aggregate backup.

excluded word list
A list of words that are ignored when they are entered as search terms.

exclude-include list
See include-exclude list.

exclude list
An optional list in the selection data set that identifies those data sets that are to be excluded from aggregate backup processing.

exclude option
A customization option that restricts access to selected information in the cube. The exclude option omits a category and all data associated with the category and its descendants from a dimension view or custom view.


  1. A WiFi enabled device that the system indicates should not have data collected from it by IBM Presence Zones. These devices are identified by the system during the exclusion process and can include WiFi access points, or, in a retail example, a store employee's mobile device or the sensors.
  2. A parameter or process whose values are excepted during tests.
  3. A finding that a user can mark and ignore.

exclusion code
A code that is assigned to an item to exclude it from being shipped to certain countries. For example, an exclusion code can be assigned to a hazardous item.

exclusion mask
A mask that is used to exclude a type of data from a data collection algorithm.

exclusive access

  1. An access intent that establishes the intent of an application to reserve the exclusive use of the database. If a subsystem requests and DBRC grants exclusive access to a subsystem, then no other subsystem may access the database concurrently, regardless of the share level of the database.
  2. A condition that permits write access to a single user only.

exclusive allow-read lock state
The lock on an object that allows only one job to use the object, but allows other jobs to read the object. The predefined value for this lock state is *EXCLRD.

exclusive canonicalization
A process for converting data that removes white space within tags, uses specified character encoding, sorts namespace references (eliminating redundant ones), removes XML and DOCTYPE declarations, and transforms relative URIs into absolute URIs. The process does not change the logical representation of the data.

exclusive connection
A connection that gives one user sole access to a particular database so that database operations are restricted to that user. The user with the exclusive connection can establish additional connections in shared mode.

exclusive control

  1. A method for preventing multiple, write-add, basic direct access method (BDAM) requests from updating the same dummy record or writing over the same available space on a track. When specified by the user, the exclusive-control lock requests that the system prevent the data block that is about to be read from being modified by other requests; it is specified in a read macro and released in a write or read macro. When a write-add request is about to be processed, the system automatically obtains exclusive control of either the data set or the track.
  2. A type of access control in which VSAM keeps control of the control interval (CI) containing a specific record until a REWRITE, UNLOCK, or DELETE command is issued for that record. The purpose of exclusive control is to protect against simultaneous update.

exclusive gateway
A gateway that creates alternative paths in a process flow. The exclusive gateway indicates the diversion point in the flow of a process.

exclusive intent
In IMS, the scheduling intent type that prevents an application program from being scheduled concurrently with another application program. See also scheduling intent.

exclusive level sharing
See level zero data sharing.

exclusive lock
A lock that prevents concurrently executing application processes from accessing database data. See also gross lock, share lock, shared lock.

exclusive lock state
The lock on an object that allows only one job to use the object; no other job can use the object. The predefined value for this lock state is *EXCL.

exclusive method
In object-oriented programming, a method that is not intended to exhibit polymorphism; one with specific effect.

exclusive mode
An optional mode of terminal operation in which a terminal may receive no output other than a response to an input. Any output excluded from being sent is held for transmission until the terminal is removed from exclusive mode.

A logic operator having the property that if P is a binary digit and Q is a binary digit and either P or Q is 1, but not both, then P exclusive-OR Q is 1.

exclusive reference
A call from a section in one overlay path to one in a different path. Because an exclusive reference causes the calling section to be overlaid, return to the calling section is not possible.

exclusive resource
A resource that can be used by only one operation at a time.

exclusive run cycle
A run cycle that specifies the days and times that a job stream cannot be run. Exclusive run cycles take precedence over inclusive run cycles. See also calendar, run cycle.

exclusive segment
A type of segment that is in the same region but not in the same path. Exclusive segments cannot be in virtual storage simultaneously. See also inclusive segment.

exclusive set
In Remote Operations Service (ROPS), an option that indicates whether only the commands in the command list can be processed by ROPS or none of the commands in the command list can be processed by ROPS.

exclusive SQL statement
An SQL statement that must be followed by a commit or rollback operation before any other SQL statement can be executed in the same SQL session. Exclusive SQL statements are grouped into sets; the database manager can execute only one SQL statement from the set at one time. Examples of exclusive SQL statements include the CREATE SERVICE CLASS SQL statement and the AUDIT SQL statement.

exclusive submap
In Tivoli NetView, a submap that is created by an application program that wants the exclusive right to control what happens in the application plane of the submap.

exclusive use
A means by which CICS and data managers, such as SQL/DS, combine to prevent concurrent updates of resources. A transaction updating a recoverable resource gets control of that resource until it terminates or indicates that it wants to commit those changes with a syncpoint command. Other transactions requesting the same resource must wait until the first transaction has finished with it.

exclusive write lock
Permission given to a thread that prevents any other thread from modifying the lock.


  1. To overlay the current process with another executable program. See also fork.
  2. In a VM operating system, a user-written command file that contains CMS commands, other user-written commands, and execution control statements, such as branches.

EXEC interface
See application programming interface.

EXEC interface block (EIB)
A control block associated with each task in a CICS command-level environment. The EIB contains information that is useful during the execution of an application program (such as the transaction identifiers) and information that is helpful when a dump is being used to debug a program.

EXEC interface stub
The stub link-edited with every command-level program. It is part of the CALL interface between EXEC CICS commands and the CICS EXEC interface program (EIP).

executable file
A file that contains programs or commands that perform operations on actions to be taken.

executable ID
See executable identifier.

executable identifier (executable ID)
A binary token that uniquely identifies a section.

executable map
A compiled map.

executable program

  1. A program that can be run as a self-contained procedure. It consists of a main program and, optionally, one or more subprograms.
  2. A program in a form suitable for execution by a computer. The program can be an application or a shell script.

executable statement
An SQL statement or XQuery expression that can be embedded in an application program, dynamically prepared and executed, or issued interactively.

executable symbol
In Tivoli NetView, a symbol defined such that double-clicking on it causes an application program to perform an action on a set of target objects. See also explodable symbol.

To indicate the complete acceptance, agreement, and endorsement of a version of the contract. This action creates a revision and results in an executed contract or executed amendment contract.

execute authority
An object authority that allows the user to run a program or procedure or to search a library or directory.

execute component
The autonomic manager component that changes the behavior of the managed resource using an effector, based on the actions recommended by the plan component. See also autonomic manager, effector.

executed contract
An authored contract, filed contract, quote contract, or amended contract that was executed. This contract cannot be modified. See also contract.

execute permission
A file or folder (directory) access permission that, for files, enables the user to run a program or shell script file, or for folders, enables the user to access the folder (directory) contents.


  1. A system event whereby all appropriate parties sign the contract. See also e-sign, ink sign.
  2. The process of carrying out an instruction or instructions of a computer program by a computer.

execution component
A component that authorizes the execution of a ruleset by the execution unit (XU).

execution context
In SQLJ, a Java object that can be used to control the execution of SQL statements.

execution control keyword
A keyword that controls the flow of execution of the defined rule. These keywords evaluate conditions and perform looping operations.

execution control list (ECL)
A security feature that controls which formulas and scripts created by other users can run on a workstation.

execution date

  1. The date that the final signature is placed on a contract. It may be changed by an internal user at the time of execution. It is available as a system term.
  2. The date on which something such as a work order is executed.

execution diagnostic facility (EDF)
A CICS facility used for testing application programs interactively online, without making any modifications to the source program or to the program preparation procedure. The facility intercepts execution of the program at various points and displays information about the program at these points. Also displayed are any screens sent by the user program, so that the programmer can converse with the application program during testing just as a user would do on the production system.

execution environment
See runtime environment.

execution group
A named process or set of processes within a broker in which message flows are executed. The broker is guaranteed to enforce some degree of isolation between message flows in distinct execution groups by ensuring that they execute in separate address spaces, or as unique processes. See also broker, message flow.

execution log
A log that maintains a history of all the events that occurred while a running a workflow.

execution name
The name for a particular run of the application.

execution node
The network job entry (NJE) node upon which a job is to be executed.

execution object model (XOM)
A model that references implementation objects used in rules.

execution plan
A linear structure that defines the DBOS operations to be performed for a SQL statement.

execution queue
A logical queue in the transmission control queue in which a process can be transferring data to or from a remote Sterling Connect:Direct node or can be waiting for a connection to the remote node before the process can perform its tasks.

execution result
The behavior or response that is produced or observed when a component or system is tested. This behavior and information regarding the test run such as the weight distribution and result details are also recorded. See also expected result.

execution server
A server that enables analytical processing of resources stored in the repository. For example, to execute an IBM SPSS Statistics syntax in an IBM SPSS Collaboration and Deployment Services job, an IBM SPSS Statistics execution server must be designated.

execution settings
Settings that influence how a component behaves at execution time. These settings are compiled into the map file or system file. Many of these settings compiled into the map can be overridden (or partially overridden) using execution commands and options.

execution target
A client on which a job or other activity is performed. For example, if an application is being installed on a particular server, that server is the execution target for the installation activity.

execution time
The period when a request that is specified by an SQL statement is acted on by a database. See also system time.

execution trace
A chain of events that is recorded and displayed in a hierarchal format on the Events page of the integration test client.

execution unit (XU)
A Java EE connector or resource adapter that handles the low-level details of ruleset execution for a rule execution server.

executive dashboard
An interface where reports can be generated, viewed, and exported in several different formats.

Executive Program Manager (EPM)
A manager responsible for providing leadership and strategic guidance for import compliance and supply chain security activities at a number of manufacturing/development sites or countries within a geography.

executive-size paper
Paper that is 184.2 mm by 266.7 mm (7.25 in. by 10.5 in.).

In label-based access control, a privilege that causes one LBAC rule of one security policy to be bypassed for a user or a set of users to whom that privilege is granted. See also LBAC credentials.

The apparent height of the lowercase characters in a font, equivalent to the height of the lowercase "x".

A mandatory document that is required by the regulatory body, along with the report itself. See also supporting document.


  1. To execute an instruction within a section of a computer program (for example, within a loop, subroutine, or module) in order to terminate the execution of that section.
  2. An instruction in an application, routine, or subroutine that causes control to pass to another application, routine, or subroutine.

exit action
In an interview, the action to be taken after a step or after the interview.

exit breakpoint
A breakpoint set on a component element that is hit after the component element is invoked.

exit condition

  1. A Boolean expression that controls when processing at a process node is completed.
  2. A condition that needs to be defined to stop the approval process from continuing up to the reporting hierarchy.

exit criteria
The set of generic and specific conditions, agreed upon with the stakeholders, for permitting a process to be officially completed. The purpose of exit criteria is to prevent a task from being considered completed when there are still outstanding parts of the task which have not been finished. Exit criteria are used to report against and to plan when to stop testing. (ISTQB)

exit list
A list of subroutines that receive control from the base operating system when a particular process ends, either normally or abnormally.

exit manager
A program residing in an authorized program facility (APF) library that controls the flow of a predefined set of events.

exit point
A specific point in a system function or program where control may be passed to one or more specified exit programs. See also exit program.

exit point provider
The person responsible for defining the exit point information, defining the format of the data the exit program receives, and calling the exit programs.

exit program

  1. See exit routine.
  2. A user-written program that is given control during operation of a system function.
  3. A program to which control is passed from an exit point. See also exit point.

exit programming interface (XPI)
Provides global user exit programs with access to some CICS services. It consists of a set of function calls that can be used in user exit programs to extend CICS functions.

exit routine
A program that receives control from another program to perform specific functions. See also standard exit.

exit status
The return value from a thread. A variable of type void * typically contains a pointer to a control block pointer or a return value that shows under what conditions the thread ended.

exit value

  1. The value that is assigned to an entry in a collaboration area to determine the next step to which it will be moved. The available exit values are defined for each workflow step in a workflow. See also workflow step.
  2. A code sent to either standard output or standard error on completion of the command.
  3. A numeric value that a command returns to indicate whether it completed successfully. Some commands return exit values that give other information such as whether a file exists. Shell programs can test exit values to control branching and looping.

exit zone
A zone that defines where a tag exits the area. If a tag can no longer be detected within the zone, the item has left the area.


  1. To display information collapsed under a category name or parent document.
  2. See pinch out.

Expandable Display Gadget (EDGE)
A platform for creating web widgets which can display a large amount of information in a compact space.

expanded application directory
An enterprise archive (EAR) file or web archive (WAR) file that has been returned to its original form.

expanded communications buffer
A feature of the 3741 device that allows multiple records to be transmitted or received in one block of data.

expanded component
A component that displays the sources and targets that are associated with it in the Integration Flow Designer. See also contracted component.

expanded loop
A loop that can be viewed in a flattened format.

expanded memory
On most computers, additional memory accessed through an adapter or feature card along with a device driver program. See also conventional memory.

expanded output
An option for subcommands that lets an application program receive more variable data than for standard output.

expanded QName
A QName where the prefix from the lexical form is resolved into the namespace URI. If the lexical form of the QName does not have a prefix, the namespace URI is the default namespace, which can be empty. See also qualified name.

expanded subprocess
A subprocess that exposes its flow detail within the context of its parent process. An expanded subprocess is enlarged to display the flow objects within.

expanded type
A typeface in which all characters are widened. See also condensed type.

expanding conversion
A process that occurs when the length of a converted string is greater than that of a source string. See also contracting conversion.

A process that searches for entities within a data source that are directly related to some selected entities.

expansion box
A box that a user can click to expand or collapse a branch of a tree. The box is filled, or solid, when the branch is collapsed and is empty, or hollow, when the branch is expanded.

expansion canister
A hardware unit that includes the serial-attached SCSI (SAS) hardware that enables the node hardware to use the drives of the expansion enclosure.

expansion enclosure
A hardware unit that includes enclosure chassis, expansion canisters, drives, and function that allows extra drives to be connected.

expansion I/O unit
Additional hardware units used to provide additional disk and I/O capacity. Expansion I/O units are located in SP frames, attached to specific SP Nodes, and controlled by a frame supervisor. Expansion I/O units are not CSM nodes.

expansion port (E_port)
In the building of a larger switch fabric, a port used as an inter-switch expansion port to connect to the E_port of another switch. See also isolated E_port.

expansion slot
In personal-computer systems, one of several receptacles in the rear panel of the system into which a user can install an adapter.

expansion tower
A piece of hardware that can be used to provide additional storage or processing to an existing server.

expansion unit
A machine type or feature that can be connected to a system unit to provide additional storage and processing capacity. This expansion unit may contain I/O hardware such as cards, tapes, and disk drives.

expectation list
A list of software items that are expected to be installed on the computers in a network. The list can be verified against the results of software scans. See also raw data set, software item.

expected arrival time
The time when an operation is expected to arrive at a workstation. It can be calculated by daily planning or specified in the long-term plan.

expected date
The anticipated date of a delivery or shipment that is based on the requested and committed dates, and can be updated by the shipment and intransit notices.

expected inventory
Inventory that has been ordered from a vendor and that is expected to be received by the Seller. This information is contained in an expected inventory record. See also expected inventory record, seller.

expected inventory record
Lists the inventory that has been ordered from a vendor and that is expected to be received by the Seller. An expected inventory record may contain information for multiple items, fulfillment centers, and dates. See also expected inventory, inventory receipt, seller.

expected license plate number (ELPN)
The license plate number sent by the supplier in the advance shipment notice (ASN).

expected result
The behavior predicted by the specification, or another source, of the component or system under specified conditions. (ISTQB) See also execution result.

expected time of arrival (ETA)
The date and time a shipment is expected to arrive at a receiving dock from the supplier who shipped it.

expected value
The average value for a given attribute for a population data set. This value is ultimately used to determine reason code assignment, it is typically used for linear and logistic models where the interaction of variables is controlled.

expected weight
Anticipated weight of a shipment calculated from standards.

expect-send sequence
In remote communications, a list of characters or signals a program or modem should expect to receive from a remote system, followed by the characters or signals the program or modem should send to the remote system after it receives the expected input. The sequence can also include a subsequence that tells the program or modem what to send if it does not receive the expected input.

expedited data
In OSI, a data transfer service provided by the session layer to transfer a small amount of data that is not subject to permission-to-send and flow-control restrictions. The OSI layers attempt to expedite the transfer of such data.

expedited flow
In SNA, a data flow designated in the transmission header (TH) that is used to carry network control, session control, and various data flow control request/response units (RUs); the expedited flow is separate from the normal flow (which carries primarily end-user data) and can be used for commands that affect the normal flow. See also normal flow.

expedited forwarding
A per-hop behavior in the Differentiated Services (DiffServ) standard that is used to create a virtual leased line service.

expedited message handler queue (EMHQ)
The expedited message handler shared queue on a coupling facility list structure.

expedited message handling (EMH)
An IMS Fast Path facility that processes single-segment input and output messages. Fast Path messages that use the EMH bypass the normal message queuing and application scheduling and therefore these messages are processed faster than non-Fast Path messages.

expense sheet template
A format of expense sheet that contains the statements of expenses incurred by the contractor while completing a project.

A question set run through a Watson pipeline based on configuration and training models. The configuration and training models are varied over time in an attempt to improve question answering accuracy. When question sets are modified, new experiments must be created.

experimental service
A service that is not ready for production and can be removed from production at any time. See also beta service.

expert cache

  1. An extension of the storage management function of the i5/OS operating system that allows the single-level storage architecture to take better advantage of the main storage (cache) capacities.
  2. A set of improved paging algorithms that is used for database files and related objects.

expert community
A public community that enables experts, such as developers to grow technical skills on IBM products, download trial versions and build relationships with external and internal experts. An example of an expert community is developerWorks.

expert integrated system
An appliance that is optimized with specific capabilities to handle a customer's workload performance problems such as transactions, analytics, and applications management.

expertise location
The identification and discovery of people with specific skills and expertise using the Profiles application.

expert system shell
Software that allows construction of a knowledge base and interaction with this knowledge base through use of an inference engine.

The process by which files, data sets, or objects are identified for deletion because their expiration date or retention period has passed.

expiration date

  1. The date at which a file is no longer protected against automatic deletion by the system.
  2. The date after which a database file member should not be used.
  3. The date associated with a specific lot of material which designates when the shelf life of the product is terminated. Generally used with products that can spoil, oxidize, or break down over time.

expiration processing
In DFSMSrmm, the process of inventory management that ensures that expired volumes are released and that carries out required release actions on those volumes. See also inventory management.

expiration time
The time at which a time-controlled CICS function is to be started.

In Backup, Recovery, and Media Services, pertaining to media that is available for a rewrite operation. Media is automatically expired when both the retention period (expiration date) and storage duration have been satisfied.

expired password
A password that has not been changed within 180 days or more.

expiring file
A migrated or premigrated file that has been marked for expiration and removal from storage. If a stub file or an original copy of a premigrated file is deleted from a local file system, or if the original copy of a premigrated file is updated, the corresponding migrated or premigrated file is marked for expiration the next time reconciliation is run.

To capture detailed information about the access plan that was chosen by the SQL and XQuery compiler to resolve an SQL or XQuery statement. The information describes the decision criteria that are used to choose the access plan.

explainable statement
An SQL or XQuery statement for which the explain operation can be performed. SELECT, UPDATE, INSERT, DELETE, and VALUES are explainable SQL statements.

explained statement
An SQL or XQuery statement for which an explain operation was performed.

explain snapshot
A collection of information that is compressed when an SQL or XQuery statement is explained.

explain statistics
The statistics in the catalog that are referenced when an SQL or XQuery statement is explained.

explicit binding
A form of binding that gives the client application control over what server machines are involved.

explicit cast
A specifically invoked cast using either the CAST AS keywords or the cast operator ( :: ). The database server does not automatically invoke an explicit cast to resolve data type conversions. See also cast, implicit cast.

explicit column name
A column name that can be used to specify a column value in a column map.

explicit command
A command that is used to request the display of information that the user would otherwise obtain by navigating through a hierarchy of panels.

explicit connection
A connection to a database in which both a user ID and password are specified. See also implicit connection.

explicit destination
A destination identifier that refers to a specific route code. See also destination identifier, symbolic destination.

explicit dimension
A dimension in XBRL whose members are known and defined before use.

explicit focal point
An assigned focal point for which the set of nodes to be included in its sphere of control is defined locally. An explicit focal point initiates the management services capabilities exchange that brings a node into its sphere of control. See also implicit focal point.

explicit format
A format that relies upon syntax to separate data objects. Each data object can be identified by its position or by a delimiter in the data. Delimiters will also appear for missing data objects. See also implicit format.

explicit hierarchical locking

  1. In a DB2 pureScale environment, a locking approach whereby table locks supersede row locks or page locks, resulting in reduced network traffic to the CF.
  2. Locking that is used to make the parent-child relationship between resources known to the internal resource lock manager. This type of locking avoids global locking use when no inter-DB2 interest exists on a resource.

explicit literal
In MFS, a literal field defined by the user for inclusion in an input or output message. See also default literal, literal field, system literal.

explicit pool
A pool of workstation or printer LUs that Communications Server uses to satisfy connection requests that specify a particular device name. See also implicit pool.

explicit privilege
A privilege that has a name and is held as the result of SQL GRANT and REVOKE statements: for example, the SELECT privilege. See also implicit privilege.

explicit rebind
A process by which SQL statements are bound by a user issuing the REBIND or db2rbind command. See also rebind.

explicit relationship
The relationship between a single pair of related tables. See also data-driven relationship, generic relationship.

explicit route (ER)
In SNA, a series of one or more transmission groups that connect two subarea nodes. An explicit route is identified by an origin subarea address, a destination subarea address, an explicit route number, and a reverse explicit route number. See also path, route extension, virtual route.

explicit route length
In SNA, the number of transmission groups in an explicit route.

explicit scope terminator
In COBOL, a reserved word that ends the scope of a particular Procedure Division statement.

explicit transaction
A transaction that is initiated by the BEGIN WORK statement. This type of transaction is available only in non-ANSI compliant databases that support logging. See also implicit transaction, singleton implicit transaction.

explicit trusted connection
A trusted connection that allows both switching the current user ID of the connection to a different user ID and acquiring a trusted context role (a default or user-specific role). See also trusted connection.

explodable symbol
In Tivoli NetView, a symbol defined such that double-clicking on it or dragging and dropping it displays the child submap of the parent object that the symbol represents. See also executable symbol.

exploded access list
A list that displays every way in which a user has access to a profile.

exploded directory
See expanded application directory.

A software program, system, or technique that is used to take advantage of a particular security vulnerability in other software, typically for malicious purposes.

explorer frame
See explorer packet.

explorer packet
In LANs, a packet that is generated by the source host and that traverses the entire source routing part of a LAN, gathering information on the possible paths available to the host.

explorer view
A graphical view in the Job Scheduling Console used to modify and maintain job streams in the database and the plan. See also plan.

Explore setting
A setting that configures the parameters governing how an application will be explored by AppScan. See also Explore stage.

Explore stage
The stage of an AppScan scan during which the logic and objects of an application are identified, prior to testing. See also Explore setting.


  1. In floating-point format, an integer constant specifying the power of ten by which the base of the decimal floating-point number is to be multiplied.
  2. A number, indicating to which power another number (the base) is to be raised.

exponential smoothing
In time series analysis, a method of forecasting that uses weighted values of previous series observations to predict future values. The technique is useful for forecasting series that exhibit trend, seasonality, or both. See also time series analysis.

The process in which a quantity is raised to a power.

exponent-overflow exception
The program interruption that results when an overflow occurs during execution of a floating point instruction. The overflow is triggered when the resulting value from the instruction has a characteristic that is larger than the floating-point data format can handle. See also overflow.

exponent-underflow exception
The program interruption that occurs when the result of a floating-point instruction has a nonzero fraction and a characteristic is smaller than the floating-point data format can handle. An exponent-underflow exception can be disabled by using the bit setting on a program mask.


  1. In NCS, to provide the operations defined by an interface. A server exports an interface to a client. See also import.
  2. The operation to remove one or more logical volumes (LVOLs) from a virtual tape server (VTS) library. The list of LVOLs to export is written on an export list volume and then the export operation itself is initiated.
  3. In Network File System (NFS), to make file systems on a server available to remote clients.
  4. An access method services (AMS) operation to create a backup or portable copy of a Virtual Storage Access Method (VSAM) cluster, alternate index, or integrated catalog facility (ICF) user catalog.
  5. To save a Notes document or view in a non-Notes format.
  6. To copy data from database manager tables to a file using formats such as PC/IXF, DEL, and ASC. See also import.
  7. A function or process that converts an internal file to some standard file format for use outside of an application.
  8. An external file that is used to export data from a catalog or a hierarchy.
  9. The process of storing objects and metadata from the content repository to an external file.
  10. An exposed interface from a Service Component Architecture (SCA) module that offers a business service to the outside world. An export has a binding that defines how the service can be accessed by service requesters, for example, as a web service.
  11. To move information from one system or program to another.
  12. A process that prepares data, especially items and categories, such that it can be sent to downstream systems using various transport mechanisms, such as message queues or FTP. See also staging area.
  13. The process of making file systems accessible to authorized remote clients using supported services. See also shared file system.
  14. See share.
  15. To save a copy of the current document, database or image into the file format required by another application.
  16. An external symbol defined in a module or service program that is available for use by other modules or programs. See also import.

export commodity control number (ECCN)
A classification number given to all goods that are manufactured. The classification number is used by the customs authorities to control or monitor exports of some of these items.

exported form
In query management, the source file member that results from running an EXPORT FORM command.

exported logical volume
A logical volume (LVOL) that has been exported and currently resides on a stacked volume outside a virtual tape server (VTS) library.

exported query
In query management, the source file member that results from running an EXPORT QUERY command.

export file

  1. A file created during the development process for inbound operations that contains the configuration settings for inbound processing.
  2. The file containing data that has been exported.

In Tivoli Software Distribution, a feature that enables a Tivoli administrator to save (export) a file package definition as a text file, to edit the keywords and lists in the definition, and to retrieve (import) the definition from the text file to set the properties for the file package.

export list volume
A virtual tape server (VTS) logical volume (LVOL) containing the list of LVOLs to export.

export manifest
A temporary container for references to all the objects to export.

export map
A map that defines how to move data from EDI standard formatted documents to application files. An export map is necessary for inbound processing.

exports data set
In z/OS, an MVS file on the server containing entries for directories that can be exported to Network File System (NFS) clients. It is used by the server to determine which MVS files and prefixes can be mounted by a client, and to write-protect MVS files on the server.

export tool
See environment export.

export translation object
See export map.

export utility
A transactioned utility that extracts data from a table. See also import utility.

exposed field
A workflow-related system or data field in a roster, queue, or event log that has been made available for searches and sorting. Exposed fields can be used in a search filter, when defining an index, and when logging information to the event log.

exposed name
A name specified in a FROM clause such that it can be referenced elsewhere in the query. Exposed names include correlation names and, if correlation names are not specified for them, table names, view names, nicknames, and alias names. See also table designator.

exposed process value (EPV)
A variable that enables the participants of a process to set or change a value while an instance of a process is running, thereby assigning constants and affecting the flow of a process or task assignment.


  1. In computer security, an instance of vulnerability in which losses may result from the occurrence of one or more attacks.
  2. The degree to which information can be accessed using authorized or unauthorized methods.

exposure event
In Enhanced X-Windows, an event sent to clients to inform them when contents have been lost, as when windows are obscured or reconfigured. Servers do not guarantee the preservation of window contents when they are obscured or reconfigured.

express alternate PCB
An alternate PCB to which output messages are sent before termination of the application program. See also alternate program communication block.

express carrier service
A service that delivers products on priority, and within a short interval of time. However, the interval of time that categories a service as express may vary from one service provider to another.


  1. An operand or a collection of operators and operands that yields a single value.
  2. A variable in a firewall rule that specifies adapter numbers, network addresses, port numbers, ICMP parameters, or IP datagram protocol numbers.
  3. A series of operations that is performed on a column value.
  4. A simple statement used to perform calculations or otherwise manipulate the value of attributes. An example of using an expression is entering "=PI" instead of "3.1415". See also business rule.
  5. An SQL or XQuery operand or a collection of SQL or XQuery operators and operands that yields a single value.
  6. In Event Management, the relational expression between a resource variable and other elements (such as constants or the previous value of an instance of the variable) that, when true, generates an event.
  7. In programming languages, a combination of terms and operators that can be evaluated to a single value by using the rules of precedence for the given language.
  8. A combination of explicit values, constants, variables, operators, and functions that is used to evaluate variables and user responses and set action targets or otherwise complete the action.
  9. A statement about data objects. Expressions are a combination of literals, object names, operators, functions, and map names. Component rules are expressions that evaluate to either TRUE or FALSE. Map rules are expressions that evaluate to data to produce the desired output.

expression-based fragmentation
A fragmentation process that puts rows that contain specified values in the same fragment.

expression-based index
An index where the key includes one or more expressions consisting of more than just a column name.

expression builder
A set of input fields used throughout Opportunity Detect to compare strings and numbers, perform math operations, and apply database functions.

expression context
All of the information that can affect the result of a specific XQuery expression. This information is organized into two categories called the static context and the dynamic context. See also dynamic context, static context.

expression KPI
A KPI value that is based on an SQL query that the user defines.

expression language
A computer language that is used in JSTL to express simple expressions. EL is based on the XPath and JavaScriptor JScript languages.

expression mode
In a composite operator parameter declaration, the type of an accepted parameter value. The expression mode can be an attribute, an expression, or a constant.

expression statement
In C language, an expression that ends with a ; (semicolon). You can use an expression statement to assign the value of an expression to a variable or to call a function.

See exception request.


  1. To increase the portion of available space that can be used to store database or recovery log information.
  2. To install more than one package in the same version of Eclipse in order for their application functions to work together in the workbench environment.

extendable chunk
A chunk that Informix can automatically extend or that can be manually extended when additional storage space is required for an application.

extended ACL
A security feature that restricts a user's access to the Domino directory and extended directory catalog.

extended ACL entry
An access control list entry for an individual user or group.

Extended Adaptive Cache
A large high-speed memory that is used exclusively to store user data that would otherwise have been accessed from one or more disks.

Extended Adaptive Cache Simulator
A performance tool that allows system users to assess the benefits of an Extended Adaptive Cache before purchasing one. When the Extended Adaptive Cache simulator is active on a specified storage controller, performance information is generated for a system's actual workload over time.

extended address
See address extension.

extended addressability
The ability to create and access a Virtual Storage Access Method (VSAM) data set that is greater than 4 GB.

extended addressing
The use of 31-bit addresses (above the 16 MB line). See also extended link pack area.

extended address volume (EAV)
DASD storage that can contain more than 65 521 cylinders per volume.

extended agent
An agent that integrates Tivoli Workload Scheduler job control features with other operating systems (for example, z/OS) and applications (for example, Oracle Applications, PeopleSoft, and SAP R/3). Extended agents must be hosted by a master domain manager, domain manager, or an agent (not another extended agent) and use access methods to communicate with external systems. See also access method.

extended architecture (XA)
An extension to System/370 architecture that takes advantage of continuing high performance enhancements to computer system hardware.

extended attribute

  1. A characteristic of a shared folder file. Each extended attribute consists of a name, a value, and a set of flags.
  2. An attribute that can be added to an object through the Database Information application without having to turn on administration mode to commit the changes to the database.
  3. An attribute that is relevant to a trading relationship but that is not included in the 1SYNC core attribute set.
  4. In configuration management, a configuration item (CI) attribute that is not part of the original CI definition, but is added by the customer.
  5. In change management, a request for change (RFC) type attribute that provides information that is needed to fulfill the RFC. A required RFC type attribute must be specified when an RFC of that type is created.
  6. Information attached to an object that describes the object to an application system or user.
  7. Names or value pairs that are associated with files or directories. There are three classes of extended attributes: user attributes, system attributes, and trusted attributes.

extended attribute flag
A flag that is stored for the extended attribute, such as the read/write flag.

extended attribute name
The name that identifies the specific extended attribute that is to be stored, changed, or retrieved.

extended attribute subprofile
The interchange document subprofile that contains non-DIA extended attributes for a document.

extended attribute value
The data stored in an extended attribute.

Extended Binary Coded Decimal Interchange Code (EBCDIC)

  1. A coded character set of 256 8-bit characters developed for the representation of textual data. See also American Standard Code for Information Interchange.
  2. A group of coded character sets that consists of eight-bit coded characters. EBCDIC coded character sets map specified graphic and control characters onto code points, each consisting of 8 bits. EBCDIC is an extension of BCD (Binary-Coded Decimal), which uses only 7 bits for each character.

extended bind
A bind request that includes the Fully Qualified Procedure Correlation Identifier (FQPCID) control vector.

extended bin support
In DFSMSrmm, the start and completion information stored in volume and bin records for volume moves to and from bin-managed storage locations.

extended border node (EBN)
A border node that interconnects (a) APPN networks having different network identifiers or (b) separate partitions of the same APPN network, where the partitioning is to allow isolated topology subnetworks (or clusters). An extended border node supports intermediate network routing, allowing it to support LU-LU sessions that do not terminate in its native network. See also peripheral border node.

extended character

  1. A character other than a 7-bit ASCII character. An extended character can be a 1-byte code point with the eighth bit set (ordinal 128 through 255).
  2. Double-byte characters that are stored in a DBCS font file, not in the hardware of a DBCS-capable work station. When displaying or printing extended characters, the work station receives them from the DBCS font table under control of the extended character processing function of the operating system. See also basic character.

extended character processing
A function of the operating system that is required to make characters stored in a DBCS font file available to a DBCS-capable work station. Basic characters, which are stored in the work station, do not require extended character processing. Extended characters, which are stored in a DBCS font table, require extended character processing before they can be displayed or printed. See also basic character.

extended checkpoint/restart
The facility that allows batch processing programs to establish database positioning and initiate user-specified areas with a DL/I call in place of an OS CHKPT macro.

extended CICS dynamic storage area (ECDSA)
Storage area allocated above 16 MB but below 2 GB for CICS code and control blocks that are eligible to reside above 16 MB but below 2 GB, but that are not eligible for the ERDSA (that is, they are not reentrant).

extended common object file format (XCOFF)
The object file format for Version 3 of the operating system. XCOFF combines the standard common object file format (COFF) with the TOC module format concept, which provides for dynamic linking and replacement of units within an object file.

extended common service area (ECSA)
A major element of z/OS virtual storage above the 16 MB line. This area contains pageable system data areas that are addressable by all active virtual storage address spaces. It duplicates the common system area (CSA) which exists below the 16 MB line.

extended count key data (ECKD)
An extension of the count-key-data (CKD) architecture. It includes additional commands that can be used to improve performance.

extended count key data device (ECKD device)
A disk storage device that has a data transfer rate faster than some processors can utilize and that is connected to the processor through use of a speed matching buffer. A specialized channel program is needed to communicate with such a device. See also fixed-block architecture disk device.

extended curses
A system library (the libcurses.c library) that contains the control functions for writing data to and getting data from the terminal screen. It supports color, multiple windows, and an enhanced character set.

extended data element
An application-specific element that contains information relevant to an event.

extended data object (XDO)
In an application program, a generic representation of a stored complex multimedia object that is used to move that object in to, and out of, storage. XDOs are most often contained within DDOs.

extended data type
A term used to refer to data types that are not built in; namely complex data types, opaque data types, and distinct data types.

extended dimension
A dimension that can be defined by the user.

extended directory catalog
A directory catalog used by Domino servers that, to facilitate quick name lookups, retains the individual documents and the multiple, sorted views available in the Domino Directory.

extended enterprise
A heterogeneous computing environment that often includes both centralized hosts and distributed workstations connected in a network. Gateways within the extended enterprise provide connections to local area networks (LANs). These LANs can serve any computing system architecture. See also Distributed FileManager.

extended error queue element (EEQE)
Data that describes an I/O error on a local DL/I database. EEQEs are recorded by CICS in the global catalog. CICS uses EEQEs to provide I/O error handling during CICS restarts, including cold starts.

extended extract data set
In DFSMSrmm, a data set whose records combine data set and volume information into single records.

Extended Fabrics
A feature that runs on the Fabric Operating System (OS) and allows creation of a Fibre Channel fabric interconnected over distances of up to 100 km (62.14 mi).

extended feedback
Feedback that users can submit in addition to primary feedback. It is used to map the same Spend data to other dimensions.

extended font
A collection of font sections to support languages requiring more than 256 graphic characters at one time.

extended format
The format of a data set that is not basic format or large format and might be striped or compressed. The logical structure of the data set is the same as a data set that is not in extended format, but the physical format is different. See also basic format, compressed format, large format, striped data set.

extended formula cache
The cache of target fields and association relationships that are defined by the complex formula metadata on a system.

extended graphic character set
A graphic character set, such as a kanji character set, that requires two bytes to identify each graphic character.

extended graphic font
See double-byte coded font.

extended group
A locally-defined group of remote users. Extended groups are defined when groups in the remote directory are not fine-grained enough.

extended help
Online documentation that explains the purpose of the display. Extended help appears if the user presses the Help key when the cursor is outside the areas for which contextual help is available. See also context-sensitive help.

Extended Identity Context Reference (ICRX)
A control block in RACF that contains information about the distinguished name and realm of a user, which are used for identity propagation.

extended indicator variable
A variable that is used with a host variable to represent the SQL null value, the default value, or the unassigned value in an application program. See also indicator variable.

Extended Industry Standard Architecture (EISA)
The PC bus standard that extends the AT bus (ISA bus) to 32 bits and provides support for bus master. It was announced in 1988 as a 32-bit alternative to the Micro Channel that would preserve investment in existing boards. PC and AT adapters (ISA adapters) can plug into an EISA bus.

extended interface
In query management, the set of language-specific interfaces used to run commands that require access to program variables.

extended link
A link that associates an arbitrary number of resources. The participating resources can be any combination of remote and local.

extended link pack area (ELPA)
The portion of virtual storage above 16 MB that contains frequently used modules. See also extended addressing.

extended logical unit of work
A logical unit of work that is extended across successive ECI requests to the same CICS server.

extended MCS console
In MVS, a console other than a multiple console support (MCS) console from which operators or programs can issue MVS commands and receive messages.

extended memory
Personal computer memory that is addressed by DOS, from 1 MB to 16 MB, to increase conventional memory and expanded memory.

extended messaging
A function of asynchronous messaging where the application server manages the messaging infrastructure and extra standard types of messaging beans are provided to add functionality to that provided by message-driven beans.

Extended Multiple Console Support (EMCS)

extended namespace
An extension of the standard Windows or UNIX file system that allows access to versions of elements.

extended network addressing
The network addressing system that splits the address into an 8-bit subarea and a 15-bit element portion. The subarea portion of the address is used to address host processors or communication controllers. The element portion is used to permit processors or controllers to address resources.

extended pageable link pack area (EPLPA)
The extension of the pageable link pack area (LPA) that resides above 16 MB in virtual storage. See also pageable link pack area.

extended parameter list
In query management, the arguments of the extended interface that are not defined on the short interface.

extended partition specification table (EPST)
For Fast Path, an extension of the partition specification table (PST) that contains information for a dependent region that is unique to Fast Path.

extended permission
An access mode that modifies the base permissions to a file for specified individuals or groups. An extended permission can deny or permit an access mode.

extended pointer set (EPS)
In a HALDB, an expanded segment prefix that includes information that allows the use of indirect pointers. An EPS is created for logical child segments and secondary index segments.

Pertains to the use of more than two computer words to represent a floating point number in accordance with the required precision. For example, in z/OS, four computer words are used for an extended-precision number.

extended private area
An element of MVS virtual storage above the 16 MB line. This area duplicates the private area except for the 16 KB system region area.

extended read-only dynamic storage area (ERDSA)
An area of storage allocated above 16 MB but below 2 GB and used for eligible, reentrant CICS and user application programs, which must be link-edited with the RENT and RMODE(ANY) attributes. The storage is obtained in key 0, non-fetch-protected storage, if the system initialization parameters include RENTPGM=PROTECT. If RENTPGM=NOPROTECT is specified, the ERDSA is in CICS-key storage.

extended record
A record in the DFSMSrmm extract data set that contains both data set and volume information.

extended recovery facility (XRF)
A facility that minimizes the effect of failures in z/OS, VTAM, the host processor, or high-availability applications during sessions between high-availability applications and designated terminals. This facility provides an alternative subsystem to take over sessions from the failing subsystem.

extended remote copy (XRC)
See Global Mirror.

extended restart (XRST)
A restart, initiated by a DL/I call, that reestablishes database positioning and user-specified areas. See also symbolic checkpoint.

extended result
An exception notification that has data defined in the result_ext field of the dlc_getx_arg structure.

extended rule
A rule that defines complex translations and consists of declaration and statement sections.

Extended Service
An optionally installed operating system function or program.

extended shared dynamic storage area (ESDSA)
The user-key storage area for any non-reentrant user-key RMODE(ANY) programs, and also for any storage obtained by programs issuing CICS GETMAIN commands for storage above 16 MB but below 2 GB with the SHARED option.

Extended Simple Mail Transfer Protocol (ESMTP)
An extension to the Simple Mail Transfer Protocol (SMTP) that supports graphics, audio and video files, and text in various languages. See also email, Simple Mail Transfer Protocol.

extended site business model
A business model that supports one seller with many sites aimed at different audiences.

extended site store
A customer-facing store that is created by the site operator for the owner of the store. See also direct sales store.

extended specify task abnormal exit (ESTAE)
A z/OS macro that provides recovery capability and gives control to the user-specified exit routine for processing, diagnosing an abend, or specifying a retry address.

extended standard line definition
The copy of a standard line definition within a contract template that can be edited to add user-defined fields.

extended status code
A code that provides additional information about the status of operations. The extended status code is not always present.

extended subarea addressing (XSA)
A network addressing system that is used in a network with more than 255 subareas.

Extended Submit Facility (ESF)
In Sterling Connect:Direct for z/OS, the facility that enables data transfer requests to be queued to a node that is not active.

extended support mode
A mode that allows the user to record usage options and behavior, and to save the data in a file to send to technical support.

extended support release (ESR)
Resources and assistance for groups who deploy and maintain a Firefox desktop environment in large organizations.

extended symbol processing
In DCF, the processing of a symbol whose value causes the rest of the line to be stacked and later processed as a new input line.

extended syntax
Syntax that is used for certain commands and function calls. Extended syntax defines parameters used by callable interface applications written in Assembler, C, COBOL, Fortran, or PL/I.

extended system contents directory (ESCD)
An extension of SCD that is used for Fast Path.

extended system queue area (ESQA)
A major element of z/OS virtual storage above the 16 MB line. This storage area contains tables and queues relating to the entire system. It duplicates above the 16 MB line the system queue area (SQA).

Extended Terminal Option (ETO)
A feature of IMS Transaction Manager that enables users to add or delete ACF/VTAM terminals or message queues (LTERMs) dynamically.

extended unique identifier (EUI)
A unique iSCSI name that identifies an iSCSI target adapter or an iSCSI initiator adapter as defined by the iSCSI standard (RFC 3722).

Extended UNIX Code (EUC)
A protocol that can support sets of characters from 1 to 4 bytes in length. EUC is a means of specifying a collection of code pages rather than actually being a code page encoding scheme itself.

extended UNIX coded character set
A set of characters that contains mixed characters. EUC is the mixture of the ISO 7- or 8-bit code page and up to 3 other code pages that can have characters represented internally in 1 to 3 bytes. Extended UNIX coded character set uses multiple shift-in and shift-out control characters and TCP/IP escape sequences within the data stream to switch between four different character sets.

Extended UNIX Code encoding scheme (EUC encoding scheme)
An encoding scheme that defines a set of encoding rules that can support one to four character sets. The encoding rules are based on the ISO2002 definition for the encoding of 7-bit and 8-bit data. The EUC encoding scheme uses control characters to identify some of the character sets.

Extended UNIX code Japanese (EUC-JP)
A protocol that supports the use of Japanese Industry Standard character set.

Extended UNIX code Korean (EUC-KR)
A way to encode Korean with an 8-bit coding of ISO-2022-KR (KS X 1001), implemented by adding 128 to each byte.

extended user dynamic storage area (EUDSA)
Storage area allocated above 16 MB but below 2 GB used for data and for user application programs that execute in user-key and are eligible to reside above 16 MB but below 2 GB, but that are not eligible for the ERDSA (that is, not reentrant.)

extend mode

  1. In COBOL, the state of a file after running an OPEN statement, with the EXTEND phrase specified for that file, and before running a CLOSE statement, without the REEL or UNIT phrase specified for that file.
  2. In COBOL, a method of adding records to the end of a sequential file when the file is opened.

extend relationship
Class X extends class Y to add functionality, either by adding fields or methods to class Y, or by overriding methods of class Y. An interface extends another interface by adding methods. Class X is said to be a subclass of class Y. (Sun)

extensibility element
Component of a hierarchical structure defined by a document that allows a programmer to add features to a program without disturbing the source code.

Pertaining to something, such as a program, programming language, or protocol, that is designed so that users (or later designers) can extend its capabilities.

Extensible Access Control Markup Language (XACML)
A language used to express policies and rules for controlling access to information.

eXtensible Business Reporting Language (XBRL)
A communication method for electronic business reporting.

extensible error feedback
A mechanism that captures and displays error messages generated by language source files and that can be extended to support custom preprocessors and additional languages.

Extensible Hypertext Markup Language (XHTML)
A reformulation of HTML 4.0 as an application of XML. XHTML is a family of current and future DTDs and modules that reproduce, subset, and extend HTML.

Extensible Markup Language (XML)
A standard metalanguage for defining markup languages that is based on Standard Generalized Markup Language (SGML).

Extensible Program Call Markup Language (XPCML)
An extension to Program Call Markup Language that provides the ability to use XML schemas.

Extensible Stylesheet Language (XSL)
A language for specifying style sheets for XML documents. Extensible Stylesheet Language Transformation (XSLT) is used with XSL to describe how an XML document is transformed into another document.

Extensible Stylesheet Language Transformation (XSLT)
An XML processing language that is used to convert an XML document into another document in XML, PDF, HTML, or other format.


  1. A client-side element or function that is not installed with a system, but instead is authored by a system user.
  2. A class of objects designated by a specific term or concept; denotation.
  3. An additional field that the shipper can use to track the items in a shipment manifest, such as the height, length, or width of an order. Shippers can also add qualifiers, such as the product family, commodity code, or bar code identifier.
  4. In digital certificates, an element that allows other data to be encoded into a certificate to expand the function of the certificate. Additionally, extensions allow organizations to customize the use of certificates within their environments.
  5. An element or function not included in the standard language.
  6. In Eclipse, the mechanism that a plug-in uses to extend the platform. See also extension point.

extension point

  1. In Eclipse, the specification that defines what attributes and values must be declared by an extension. See also extension.
  2. The areas in the implementation that can have customizations added that represent the customer-specific business logic. Extension points can include specifications, validation rules, value rules, pre-processing scripts, post-processing scripts, and workflow step functions.

extension script
A script that augments the Tivoli Data Warehouse scripts. For example, extension scripts might be scripts that run before or after the ETL steps are run.

extension taxonomy
An extension of a base taxonomy that includes all the changes that are required for the specific reporting requirements of an entity.


  1. The part of a file that is created during the data-deduplication process. Extents are compared with other file extents to identify duplicates.
  2. In FD:OCA, one of the characteristics of a dimension. If all partitions of a dimension have the same number of subpartitions, then this number is called the extent of the next lower dimension.
  3. A continuous space on a disk, direct-access storage volume, or diskette that is occupied by or reserved for a particular data set, data space, or file.
  4. A unit of data that manages the mapping of data between managed disks (MDisks) and volumes. See also multiple allegiance.
  5. An allocation of storage on each data slice that holds rows of user tables. Each extent is divided into 24 128 KB pages.
  6. An allocation of space, within a container of a table space, to a single database object. This allocation consists of multiple pages.

extent map
A metadata structure stored within a table space that records the allocation of extents to each object in the table space.

extent reduction
In DFSMShsm, the releasing of unused space, reducing the number of extents, and compressing partitioned data sets (PDSs).

extent size
In a table space, the number of pages of table data that are written to a container before data is written to the next container.

extent type
See storage architecture type.

exterior gateway
In Internet communications, a gateway on one autonomous system that communicates with another autonomous system. See also interior gateway.

Exterior Gateway Protocol (EGP)
The mechanism that allows the exterior gateway of an autonomous system to share routing information with exterior gateways on other autonomous systems. See also Border Gateway Protocol.

In programming languages, pertaining to a language object that has a scope that extends beyond one module, for example, the entry names of a module.

External Authentication Interface application (EAI application)
An application that handles authentication and session management for protected resources.

External Authentication Server
A server that can be used to implement extended authentication and validation services for IBM products, called client applications. Sterling External Authentication Server includes a server that client applications connect to and a GUI to configure Sterling External Authentication Server requirements.

external call interface (ECI)
An application programming interface that allows a non-CICS program running on a client to call a CICS program located on a CICS server. Data is exchanged in the COMMAREA as for normal CICS interprogram communication. See also client API.

external CCD table
In SQL replication, a CCD table that can be subscribed to directly because it is a registered replication source. It has its own row in the register table, where it is referenced as SOURCE_OWNER and SOURCE_TABLE. See also consistent-change-data table, internal CCD table.

external center (EC)
A traffic data center, such as a TMC, that receives TMDD information developed or stored within it from another center. The owner center can also have direct control of field devices. In the context of the most common dialogs used by this standard, the external center requests and receives information from an owner center.

external CICS interface (EXCI)
A CICS application programming interface that helps to make CICS applications more easily accessible from non-CICS environments. It enables a non-CICS program (a client program) running in MVS to call a program (a server program) running in a CICS Transaction Server region and to pass and receive data by means of a communications area.

external clocking
In data communications, the ability of a modem to provide data clocking.

external cloud
See public cloud.

external command
A command that causes the command-line interface (CLI) to generate a message and send it to a service to be processed.

external communication adapter (XCA)
A communication adapter that is part of a device other than the host processor. See also integrated communication adapter.

external company
A business entity that is separate from the customer company organization hierarchy.

external contact
The contract contact who represents the external party for purposes of activity and notification.

external content
Content that goes into an email that is hosted at some other location, such as an IBM Silverpop FTP directory or a company website. External content can be changed, contained in multiple mailings, or put in a standard format for all mailings.

external content retrieval
A process used to transfer HTML or text from a specified URL or a file path, typically using FTP. External content can be used to create mailings to send to multiple contacts.

external coordinator
A coordinator that controls the two-phase commit for a unit of recovery (UR) owned by another subsystem or component.

external data

  1. Data that is exported from one procedure and imported into another procedure. See also internal data.
  2. In COBOL, the data described in a program as external data items and external file connectors.
  3. Data that is initialized outside of the model file, in a separate.dat file. See also internal data.
  4. Data that persists over the lifetime of an enclave and maintains last-used values whenever a routine within the enclave is reentered.

external data definition
A description of a variable appearing outside a function. It causes the system to allocate storage for that variable and makes that variable accessible to all functions that follow the definition and are located in the same file as the definition.

external data item
In COBOL, a data item that is described as part of an external record in one or more programs of a run unit and which itself may be referred to from any program in which it is described.

external data record
In COBOL, a logical record that is described in one or more programs of a run unit and whose constituent data items may be referred to from any program in which they are described.

External Data Representation (XDR)
A representation of data in machine-independent format. Because XDR is a vendor-independent method for representing the data, new computer architectures can be integrated into the network without requiring the updating of translation routines.

external data source
A data source for federation that is not crawled, parsed, or indexed by WebSphere Information Integrator OmniFind Edition. Searches of external data sources are delegated to the query application programming interface of those data sources.

external dependency

  1. A relationship between two occurrences, in which an operation in the first occurrence (the predecessor) must successfully finish before an operation in the second occurrence (the successor) can begin processing.
  2. A dependency defined in one job or job stream that refers to another job stream or to a job in another job stream. See also dependency, external job.

external domain
A domain that has a different URL, up to the first backslash, from the starting URL of the site being scanned.

external entity
In XML, an entity such as an XML schema, an Extensible Stylesheet Language (XSL) style sheet, a document type definition (DTD), or other XML instance document that is accessed using a Uniform Resource Identifier (URI) in an XML instance document. This URI is required to validate the instance document.

external event
An event that occurs outside the system, but can directly impact the cutoff and disposition of entities.

external exit class
A Java class that is the main processing class that is used by the integration framework for publish channel, enterprise service, and invocation channel processing. See also user exit class.

external file connector
In COBOL, a file connector that is accessible to one or more programs in the run unit.

external function

  1. See external routine.
  2. A function that has its functional logic implemented in a programming language application that is outside the database, in the file system of the database server. The association of the function with the external code application is specified by the EXTERNAL clause in the CREATE FUNCTION statement. See also external routine, function, user-defined function.

external ID

  1. A unique key that identifies an identity from a given data source. An external ID typically consists of a unique ID for the data source and a unique ID for the identity within its original data source. For example, an external ID for an identity in the customer records for a bank might contain the bank name (for the data source) and the account number (for the identity in the data source), such as FirstCapital, 0123456789.
  2. An identifier of an organization that is defined in an outside system.

external indicator
In RPG, an indicator that can be set by another program before a program is run, or changed by another program while the program is running. Valid external indicators are U1 through U8.

externalized customization API extension
An API extension that is created by an IBM Client, System Integrator, or SaaS extension support provider for a WebSphere Commerce service. An externalized customization API extension must follow the Externalized Customization programming model.

externalized customization programming model
In IBM Commerce on Cloud, a programming model for a WebSphere Commerce service. This model separates custom API extension code and customization logic from any IBM provided platform logic and code. The externalized customization programming model supports the most common WebSphere Commerce customization scenarios such as creating custom API extensions for common business logic components, customizing the store front-end and configuring the search index and search runtime behavior.

externalized customization workspace
A workspace within a WebSphere Commerce programming environment that is used for creating customizations that follow the Externalized Customization programming model. An Externalized Customization workspace can include one or more separate servers for customizing different WebSphere Commerce components.

externalized data value
See sensor value.

externalized form
In query management, the name of the file resulting from running an EXPORT command against a form.

externalized query
In query management, the name of the form resulting from running an EXPORT command against a query.

external job
A job referred to in an external dependency. See also external dependency.

external label
The label attached to the outside of a tape cartridge that can be read by the user and is sometimes machine-readable. The label contains the volume serial number (VOLSER) of the tape volume and sometimes additional information. See also internal label.

external leading
The amount of white space, in addition to the internal leading, that can be added to the interline spacing without degrading the aesthetic appearance of a font. This value is usually specified by a font designer. See also internal leading.

external library
A collection of drives that is managed by the media-management system other than the storage management server.

external library member

  1. Output of Print Management Facility that can be used by other program products while running print jobs; for example, coded fonts, code pages, font character sets, form definitions, page definitions, and page segments.
  2. See resource object.

external library object
Synonym for resource object.

external library resource
See external object.

external line format message (ELF message)
A message that is not fully tokenized, but is stored in a single field in the TOF. Storing a message in ELF improves performance because no mapping is needed and checking is not performed.

external link

  1. A connection from an object to an entity or resource that is outside the Rational DOORS database.
  2. A symbolic link that contains the name of an object that is outside the hierarchical file system.
  3. In the Integration Flow Designer, solid lines displayed in a system definition diagram that visually represent the data flow between two map components.

externally authenticated user
A user who is authenticated by a service running outside of the database server (such as a UNIX password file, PAM, or Kerberos). See also internally authenticated user.

externally described data
Data contained in a file for which the fields and the records are described outside of the program (such as with files created by DDS, IDDU, or DB2 for i5/OS) that processes the file.

externally described file
A file in which the records and fields are described to the system when the file is created, and used by the program when the file is processed. See also program-described data, program-described file.

externally triggered transaction
A transaction that is external to the Sterling Selling and Fulfillment Foundation. This transaction calls a corresponding API within the Sterling Selling and Fulfillment Foundation for execution.

external message queue
A message queue used by all programs and procedures running within a job to send and to receive messages outside a job, for example, between an interactive job and the workstation user.

external method
A method that has its method logic implemented in a programming language application that is outside the database, in the file system of the database server. The association of the method with the external code application is specified by the EXTERNAL clause in the CREATE METHOD statement. See also external routine, method.

external name

  1. In a program, a name whose scope is not necessarily confined to one block and its contained blocks.
  2. The name of an executable library or class file that is on the database server and contains the logic for an external routine (an external procedure, external function, or external method).
  3. A name that can be referred to by any control section or separately assembled or compiled module; a control section name or an entry name in another module.

external object

  1. An object that has a defined object type (such as *FILE or *PGM). In general, external objects can be displayed by a user. See also internal object.
  2. An object that can be used by other program products while running print jobs. For example, coded fonts, code pages, font character sets, form definitions, page definitions, and page segments.
  3. See resource object.

external organization
The organization that represents an external company.

external parameter
In architecture, a parameter for which the current value can be provided by the controlling environment, for example, the data stream, or by the application itself. See also internal parameter.

external partner
A trading community participant that sends business documents to and receives business documents from the internal partner. See also trading partner.

external party
The collective participants of a contract who represent an external organization.

external party user
An external user associated with a contract who can view the contract and perform certain standard functions.

external PO
See external purchase order.

external presentation interface (EPI)
An application programming interface that allows a non-CICS client program to appear to a CICS server as one or more standard 3270 terminals. This enables the client to access, for example, CICS transactions written for 3270 terminals, without needing to change the CICS code.

external procedure
A procedure that has its procedural logic implemented in an external programming language application. The association of the procedure with the external application is specified by a CREATE PROCEDURE statement with a LANGUAGE clause that has a value other than SQL and an EXTERNAL clause that implicitly or explicitly specifies the name of the external application. See also built-in procedure, external routine, external SQL procedure, native SQL procedure, procedure, user-defined procedure.

external project
A project containing requirements used to establish traceability relationships with requirements in a currently open project. See also cross-project traceability.

external purchase order (external PO)
A purchase order or request to an outside vendor. See also internal purchase order.

external PVC segment
In NCP, a permanent virtual circuit (PVC) segment between two frame-relay subports in adjacent NCPs. When the two NCPs are directly attached, the two subports have the same data link connection identifier (DLCI).

external reference

  1. An additional identifier for an identity in a data source for the purpose of full-attribution. The external reference is used to uniquely identify the source of each data record sent to the pipeline for ingestion. For example, an employee data source might use the employee serial number as the external ID and the employee's social security number as the external reference.
  2. A reference to a symbol, such as an entry point name, defined in another program or module.
  3. A document with content consisting of a URL or a UNC path linking to another location.
  4. A reference whose definition is obtained from a drawing on disk.

external requirement
A requirement that resides in an external project. Traceability relationships can be created between requirements in different projects.

external role
A particular type of entitlement, which is built on a set of permissions and roles that are received from an external application (or target). It is conceptually like a business role, but is received directly from a connected target.

external routine

  1. A procedure or function called from outside the program in which the routine is defined.
  2. A function, method, or procedure that has its routine logic implemented in a programming language application that is outside the database, in the file system of the database server. The association of the routine with the external code application is specified by the EXTERNAL clause in the CREATE statement for the routine. See also external function, external method, external procedure, routine.
  3. In REXX, a program external to the user's program, language processor, or both. These routines can be written in any language (including REXX) that supports the system-dependent interfaces used by REXX to start it.

external scanning appliance
A machine that is connected to the network to gather vulnerability information about assets in the network.

external security interface (ESI)
A facility that enables client applications to verify and change passwords for user IDs on CICS servers. See also client API.

external security manager (ESM)
A security product that performs security checking on users and resources. RACF is an example of an ESM.

external space
Storage space that a user-defined access method manages rather than the database server. The IN clause of the CREATE TABLE and CREATE INDEX statements can specify the name of an external space instead of a dbspace.

external SQL procedure
An SQL procedure that is processed using a generated C program that is a representation of the procedure. When an external SQL procedure is called, the C program representation of the procedure is executed in a stored procedures address space. See also external procedure, native SQL procedure.

external storage

  1. Managed disks (MDisks) that are SCSI logical units presented by storage systems that are attached to and managed by the clustered system.
  2. Data storage not located in main or auxiliary storage, such as tape or diskette.

external subsystem
A subsystem that provides a set of resources that is used by IMS, but is not controlled by it

External Subsystem Attach Facility (ESAF)
A facility that allows applications running under IMS to obtain data from external subsystems, such as DB2.

external switch
In COBOL, a hardware or software device, defined and named by the compiler, that is used to indicate that one of two states exists.

external symbol

  1. An item defined in a high-level language program that represents such things as procedures or variables. Resolving external symbols is the means by which the binder connects modules to form a bound program or a service program.
  2. A symbol that is defined in a file other than the file in which the symbol occurs.
  3. An entry-point name or external variable that is defined or referred to in a particular module or program.

external synchronization
The final step of a data synchronization project, in which two trading partners compare data of record in order to detect and resolve exceptions.

external system
A system that exists outside a particular network.

external table
Data organized in table format that is stored externally to the database server.

external time reference (ETR)
The synchronization of server time-of-day (TOD) clocks to ensure consistent time-stamp data across multiple servers and operating systems. External time reference (ETR) is the MVS generic name for the IBM Sysplex Timer. See also Sysplex Timer.

external traceability
The ability to trace relationships between artifacts in two projects. See also cross-project traceability.

external user
A user who does not belong to any internal organization.

external variable

  1. A variable accessible to another compilation unit.
  2. A variable that is outside the lexical scope of the function, procedure, or program that is calling it.

external writer
A program that performs output processing for data sets that are not eligible for processing by the primary job entry subsystem (JES). For example, an external writer might process a data set that has been directed to a printer and that will be stored on a device that is not supported by JES.

To obtain information from a set of data.

extract, load, and transform (ELT)
The process of extracting data from one or more sources, loading it directly into a relational database, and then using the database engine to run data transformations. See also extract, transform, and load.

extract, transform, and load (ETL)

  1. The process of collecting data from one or more sources, cleansing and transforming it, and then loading it into a database. See also extract, load, and transform, warehouse enablement pack.
  2. See data collection.

A Sterling B2B Integrator Mailbox concept that determines whether a message that resides in a mailbox can be extracted from the mailbox by a business process or the Mailbox Browser interface (MBI).

extract control file
A file that contains statements that control the operation of an extractor utility program.

extract data set
In DFSMSrmm, a data set used to generate reports.

extract data set record
In DFSMSrmm, a record in an extract data set that is mapped by a DFSMSrmm mapping macro.

extract file
A file that contains a set of related rows extracted from one or more tables, saved in proprietary format. An extract file can contain data, object definitions, or both.

extraction tool
A set of compressed files that contain executable .jar files, properties files, and directories that are used to migrate data from pre-10.0 versions of the Emptoris applications to the latest version.


  1. A module that is used to download documents from the Sterling Commerce Network, which are then routed to the Central Message Store.
  2. An application that extracts structured information from unstructured or semi-structured text by using AQL constructs.

extract service
In OSI, a callable service that obtains optional information from OSI Communications Subsystem. See also action service, set services.

extraneous item
An item that has been wrongly shipped to a customer.

An intranet with extended access, generally behind a firewall. An extranet allows members of the public with valid user names and passwords to gain access to certain parts of an intranet.

extrapartition destination
In CICS, a type of transient data queue. Extrapartition destinations can be accessed either within the CICS environment or outside of CICS; they can be defined as either input or output.

extrapartition transient data
A CICS facility for temporarily saving data in the form of queues, called destinations. See also intrapartition transient data.

Extra Performance Linkage (XPLINK)
A type of call linkage that can improve performance in an environment of frequent calls between small functions.

extreme programming (XP)
An agile software development method that relies on a strict plan and focuses on short release cycles, very frequent user participation, refactoring, pair programming, collective code ownership and testing throughout the entire development process, from start to finish. See also iterative development.

eXtreme Scale grid
A pattern that is used to interact with eXtreme Scale when all of the data and clients are in one process.


  1. An attack that originates from a system within a network. For example, a trusted insider might use a company machine as the origin of a denial-of service attack.
  2. A 3D definition that associates a Z height with all the elements in an object so that each element becomes a vertical plane.

extrusion rule
A rule that evaluates data that is returned by the server (in response to a request), rather than the request itself.

A logical name associated with an arbitrary string that signifies the location of external data.

eye catcher
A structure identifier. Typically, an eye catcher is a string value included in program code or data to make it easy to find specific program sections or types of information.

eye coordinate
In GL, the coordinate system in which the viewer's eye is located at the origin, and thus all distances are measured with respect to the eye. Viewing transformations map from world coordinates into eye coordinates, and projection transformations map from eye coordinates to normalized device coordinates.