This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
A digital trunking facility standard used in the United States and elsewhere, capable of transmitting and receiving 24 digitized voice or data channels. Signaling can be imbedded in the voice channel transmission when robbed-bit signaling is used. The transmission rate is 1544 kilobits per second. See also E1.
See train the trainer.
See predictive text.
See tools as a service.
- A preset point in the typing or output line at which typing or printing stops.
- A control in a graphical user interface (GUI) that is used to switch between pages. See also page.
- To move a cursor on a display or the print head of a printer to a preset location.
A character that indicates that printing or displaying should start at the next horizontal position on the current line. The tab is designated by '\t' in the C language and is named in the portable character set.
- An orderly arrangement of data in rows and columns that can contain numbers, text, or a combination of both.
- In a relational database, a database object that consists of a specific number of columns and is used to store an unordered set of rows. See also base table, temporary table, view.
- In COBOL, a set of logically consecutive data items that are defined in the Data Division with the OCCURS clause.
- In RPG, a series of elements with like characteristics. A table can be searched for a uniquely identified element, but elements in a table cannot be accessed by their position relative to other elements.
table check constraint
See check constraint.
In a partitioned database environment, a state that occurs when two tables that have the same number of compatible partitioning keys are stored in the same database partition group. In this situation, the DB2 database management system can perform the join or subquery processing at the database partition where the data is stored.
An exposed name that is used to qualify a column name. See also exposed name.
An expression that creates a temporary result table from a query. For example, a table expression might be a query that selects all of the managers from several departments and further specifies that they have over 15 years of working experience and are located at the main branch.
A function that receives a set of arguments and that returns a table to the SQL statement that references the function. A table function can be referenced only in the FROM clause of a subselect. See also function, routine, user-defined function.
A structure representing the relationship between typed tables in which subtables inherit the behavior (constraints, triggers, storage options) from supertables. Subtables can have additional constraint definitions, storage options, and triggers.
A mechanism that allows access to trigger tables in SQL or from within user-defined functions. A table locator is a fullword integer value that represents a transition table. See also transition table.
In SQL replication, a type of replication subscription-set processing in which the Apply program retrieves all of the data from the source CD table, applies the data (one member at a time) to each target table, and finally commits its work. See also transaction-mode processing.
table object ID
Internal logical identifier for a table. In DB2 for Linux, UNIX, and Windows, table object IDs for each table in a database are stored in the TABLEID column of the SYSCAT.TABLES catalog view.
A set of tables used for processing specifications: the JES2 table provides the default processing specifications and the user table provides updates or deletions to the default processing specifications. See also dynamic table, JES2 table, user table.
A data organization scheme in which table data is divided across multiple data partitions according to values in one or more partitioning columns of the table. Data from a given table is partitioned into multiple storage objects, which can be in different table spaces, based on the specifications that are provided in the PARTITION BY clause of the CREATE TABLE statement. See also data partition, database partitioning.
An ordered set of one or more columns whose values are used to determine in which data partition each table row belongs. See also data partition, database partition, distribution key.
A mechanism for transferring rows between database partitions. Table queues are distributed row streams with simplified rules for the insertion and removal of rows. Table queues can also be used to deliver rows between different processes in a single-partition database.
- A logical unit of storage in a database. In DB2 for z/OS, a table space is a page set and can contain one or more tables. In DB2 for Linux, UNIX, and Windows, a table space is a collection of containers, and the data, index, long field, and LOB portions of a table can be stored in the same table space or in separate table spaces. See also container, page set.
- A logical collection of extents that are assigned to a table. A table space contains all the disk space that is allocated to a given table or table fragment and includes pages allocated to data and to indexes, pages that store TEXT or BYTE data in the dbspace, and bitmap pages that track page use within the extents.
table space ID
Internal logical identifier for the primary table space for an object. In DB2 for Linux, UNIX, and Windows, table space IDs for each table space in a database are stored in the TBSPACEID column of the SYSCAT.TABLES catalog view.
table space set
A set of table spaces and partitions that should be recovered together because the tables contained in the table spaces have dependencies on one another. The dependencies can, for example, be between parent table and descendent table or between base table and auxiliary table.
- A mobile touchscreen computer that is typically controlled by gestures using the user's fingers, a soft keyboard, or a stylus. See also mobile device, smart device.
- In computer graphics, a locator device with a mechanism for indicating coordinate data.
A graphical view in the Job Scheduling Console used to display database and plan object data in tabular format. See also job scheduling console.
See terminal abnormal condition line entry.
See text analysis engine.
- One or more characters attached to a set of data (for example, a field or document element) that contain information about the set, including its identification.
- In FD:OCA, a special attribute triplet that can be attached to attribute triplets to provide them with additional information.
- A word or phrase that is assigned to application environments. Users create tags to configure which application environments are included in automated tasks. See also automated task.
- To scan a 2D or 3D barcode using a mobile device. See also matrix code, Quick Response code, tagging.
- A link between an XBRL fact and its source data, such as a report object or the result of a query.
- An identifier that groups related artifacts.
- A physical label that is applied to an asset to indicate the device, its position, and the controlling authority.
- In GL, a marker in the display list used as a location for display list editing.
- A word or phrase that users create and assign to an asset. Users create tags to develop search criteria that is meaningful to themselves. See also Dogear.
- A structure that contains all of the required JAR files and resources for a web project. For example, the supporting classes extend the base Struts tags to let them nest inside each other, so they keep the fundamental logic of the original tags, except that all references to beans and bean properties are managed in a nested context.
- A short key word that is a means of classifying and retrieving content in a way that is meaningful. Tags are single words, or multiple words that are connected with hyphens or underscores. For example, "social-bookmarking", "status_reports", and "payroll" are all valid tags.
- A text string attached to any instance of a word in a grammar. A tag can be used to distinguish two occurrences of the same word in a grammar, or to identify more than one word in a grammar as having the same meaning.
- An item that contains identifying information about a person or device. Tags enable tracking and monitoring of assets within locations, areas, and zones.
- The statements of the user interface manager (UIM) tag language. Tags describe the actions, format, and data of the panel. Tags are used to define the formatting of help information.
- A mechanism used to identify certain attributes having some bearing on handling of character data. Some examples are character set identifier, code page identifier, language identifier, country identifier, and encoding scheme identifier.
- A property that is associated with a host.
- In markup languages such as SGML, XML, and HTML, a token that represents the start or end of an element.
- To indicate that content is relevant to a specific subject on a social media site or application.
- A type of structured field used for indexing in an AFP document. Tags associate an index attribute-value pair with a specific page or group of pages in a document.
A notification that is targeted to devices that are subscribed for a specific tag. Tags are used to represent topics that are of interest to a user. See also broadcast notification.
A visual representation of tags, where frequently used tags are displayed with more emphasis. For example: tags can be represented by text, with varying degrees of bolding, or images with varying sizes.
A key-value pair that associates a service in a process. See also key-value pair.
In JSP technology, a collection of tags identifying custom actions described using a taglib descriptor and Java classes. A JSP tag library can be imported into any JSP file and used with various scripting languages. (Sun)
See trust association interceptor.
- In an XRF environment, the process by which the failing active IMS is released from its XRF sessions with terminal users and replaced by an alternate IMS. See also giveback.
- See fallover.
- An automatic operation that switches from a redundant or standby system or node when the primary system or node becomes available after a software, hardware, or network interruption.
A value assigned to each configured cluster resource on a per-node basis. In the event of a takeover, the active node with the highest priority acquires the resource. A node with a higher priority is listed before the node with a lower priority. See also node priority policy, resource group, resource group policies.
The process of finding the right people, with the right skills, abilities, and fit, who may be hired or already working for the company (organization) or may be working for competing companies.
talent data center
XML integration that allows an organization to contract with a third party vendor to process resumes and transfer the resume and optional ranking or candidate form information into 2x.
talent management system
A software application that enables the electronic handling of recruitment needs. The system can be implemented on an enterprise or small business level, depending on the needs of the company. These systems are very similar to customer relationship management systems, but are designed for recruitment tracking purposes. Talent management systems typically are comprised of one or more candidate portal(s), a recruiter portal for candidate data mining and candidate processing, and a hiring manager portal. They generally also include candidate correspondence and interview scheduling functionality, plus ad hoc reporting and a metrics dashboard. See also applicant tracking system.
To briefly touch a touchscreen. Typically, apps use tap gestures to select items (similar to a left mouse button click). See also gesture.
tape configuration database (TCDB)
The set of tape library records and tape volume records that reside in integrated catalog facility (ICF) volume catalogs and describe the current tape library configuration.
A collection of tape units that share a model type and serial number, such as all the logical unit numbers (LUNs) of a tape library. See also tape unit.
- A device that includes a selection of cartridges in a common (secure) area within access of one or more automated removable media (ARM).
- A set of equipment and facilities that support an installation's tape environment. The tape library can include tape storage racks, mechanisms for automatic tape mounting, a set of tape drives, and a set of related tape volumes mounted on those drives. See also Automated Tape Library Dataserver, manual tape library, system-managed tape library.
tape library data server
An IBM hardware device that maintains the tape inventory that is associated with a set of tape drives. A tape library data server also manages the mounting, removal, and storage of tapes.
tape mount management
The methodology used to optimize tape usage in order to decrease the number of tape mounts and increase the amount of data on each tape. This optimization is accomplished by redirecting appropriate tape requests to disk and collecting the data in larger amounts on tape soon after the applications are completed. This methodology also reduces the time required to run the application.
tape storage group
A collection of tape volumes that contain private user data. A volume becomes part of the tape storage group when it is mounted to satisfy a scratch volume request for the storage group, or when it is entered into one of the tape libraries and assigned to the tape storage group by the cartridge entry process. The volume is removed from the tape storage group when it is returned to scratch after the data sets on it have expired. See also storage group.
A magnetic tape subsystem consisting of a controller and magnetic tape devices, which allows for the storage of user data on tape cartridges. See also storage subsystem.
- The physical enclosure containing the tape drive.
- A tape device or a robotics controller that is visible over a storage network. A tape unit is a member of a single storage network (of 1 - n fabrics), but can have 1 - n equivalent paths. See also tape device.
The recording space on a single tape cartridge or reel. See also shelf-resident tape volume.
tape volume table of contents (TVTOC)
Information about a tape data set that RACF stores in the TAPEVOL profile for the volume on which the data set resides. The TVTOC includes the data set name, data set sequence number, creation date, and an indicator as to whether a discrete tape data set profile exists.
See title, affix, and qualifier.
See tape archive.
- A computer that is known to an OS deployment server.
- The field for which a user wants to predict the value, which is assumed to depend on the values of other fields (the predictors). See also binomial logistic regression, multinomial logistic regression.
- A collection of logical units (LUs) that are directly addressable on the network. The target corresponds to the server in a client-server model.
- A value that a Key Performance Indicator (KPI) should achieve, such as "300" or "5 days."
- One of the threshold values that is displayed on the scorecard and is used to determine which status icon to display.
- The program or system to which a request for files or processing is sent.
- The destination for an action or operation.
- In distributed data management (DDM), the platform that fulfills a request for remote data. A target is also known as a server. See also Distributed FileManager, source.
- A technical view of an IT application (for example, active directory). A target can refer to several applications.
- To match content with devices in a deployment, either by selecting the content for deployment, or selecting the devices to receive content.
- The node at which a password is to be installed. If the password specifies a nodelocked license, the target is the node where the licensed product is run. If the password specifies multiple nodelocked license (that is, a compound password for nodelocked licenses) or network licenses, the target is a node at which the network license server is running.
- In VisualAge RPG, a part that receives a target event from a source part whenever the state of the source part changes.
- A storage device on a fibre-channel network.
- In SEU, a line command, such as B (Before) or A (After), that specifies the destination for other line commands such as C (Copy) or M (Move).
- A person or data source that owns or contains information that might be pertinent to a legal matter.
A command that can be executed on a different target container. A targetable command invocation incurs some overhead; making the task command not targetable can improve the performance of the overall command framework.
A feature that allows the user to perform date aging based on a specific date. For example, the base date of the production run and a target date for a particular test can be specified. Dates are automatically aged to maintain the relationship between the base and target. See also age, incremental aging, semantic aging.
target catalog entry
A promotional product or SKU that is defined as a merchandising association. See also source catalog entry.
A customization definition document (CDD) to which placeholders have been added, and for which placeholder values have been specified. A target CDD describes a particular target customization definition.
A configuration item (CI) that is expected to be affected by a proposed change. A target CI can be defined when a request for change (RFC) is created, when an implementation task is defined, or at other points in the change process, especially during impact analysis.
target customization definition
A customization definition that describes a changed version of a current customization definition. Each target customization definition has a target CDD that describes it.
target data queue program
In System i Access, a series of programs that receive requests for data manipulation from the source data queue program. Target data queue programs also send data and replies (to previous requests) to the source data queue program.
target distributed data manager (TDDM)
In a distributed data management network, programming support that translates the DDM requests received from a source system into data management or SQL requests on the target (or remote) system. See also source distributed data manager.
- An RRSF node that a given RRSF node is logically connected to.
- A client node for which other client nodes (called agent nodes) have been granted proxy authority. The proxy authority allows the agent nodes to perform operations such as backup and restore on behalf of the target node, which owns the data.
See target type.
- In VisualAge RPG, the object to be built by the project, such as a Dynamic Link Library (DLL).
- In communications, the program that is started on the remote system at the request of the source system. See also source program.
- In display station pass-through, a program that runs on the remote system.
target queue manager
See remote queue manager.
target recovery time
The amount of time estimated by the system that it will need to recover access paths during an initial program load (IPL) after an abnormal system end. Actual performance may range around the target.
- In upgrades, the version, release, and modification level of software that is to be installed.
- The release of the operating system on which a user intends to use an object being created, or intends to restore or use an existing object. See also source release.
- In upgrades, the planned hardware configuration and software level that exists when the upgrade is completed.
- In Q replication and SQL replication, a database or subsystem that contains replication target tables or procedures.
- A database that contains replication target tables.
- A system where supported middleware products are installed and maintained. A target system can be a physical system, a virtual system, or a system instance in the cloud. It can play a role as a source, a destination, or both source and destination for configuration data.
- In upgrades or migrations, the planned hardware configuration and software level which will exist when the upgrade is completed.
- The system that receives a request from another system. See also source system.
- A managed system on which an IBM Director task is performed.
- In Q replication, a table that is the destination for replicated changes from a source that is part of a Q subscription.
- The underlying base table that a violations table and diagnostics table are associated with.
- In SQL replication, a table that is the destination for changes from a registered replication source. A target table can be a user copy table, a point-in-time table, a base aggregate table, a change aggregate table, a CCD table, or a replica table. See also Apply program, replication target, source table.
target user ID
The recipient of actions that were directed by RRSF. See also source user ID.
In the System Modification Program/Extended (SMP/E), a collection of VSAM records describing the target system macros, modules, assemblies, load modules, source modules, and libraries copied from distribution libraries (DLIBs) during system generation, and the system modifications (SYSMODs) applied to the target system.
- A matrix of shipping charges that the shipper and carrier agree to use for LTL shipments. The charges are based on the origin and destination of a shipping lane, the freight class of a shipment, and the weight of a shipment.
- The fee the packet-switching data network charges a user for sending data. The tariff is usually based on the number of packets sent over the network.
- An action performed by an agent if the event status meets the task execution rules. For example, an agent can send an email, publish a news item, or run a report.
- A type of Fixlet designed for re-use, for example, to perform an ongoing maintenance task.
- An activity that has business value, is initiated by a user, and is performed by software.
- See operation.
- An atomic activity that is included within a process. A task is used when the work in the process is not broken down to a finer level of process model detail. Generally, an end-user, an application, or both perform the task.
- A unit of work representing one of the steps in a process.
- A process and the procedures that run the process.
- A set of actions designed to achieve a particular result. A task is performed on a set of targets on a specific schedule.
- In agile development, a work item that defines a specific piece of work.
- In Tivoli Intelligent Orchestrator, an action that runs a deployment job on one or more target devices. A deployment job can include one or more job items that correspond to workflows.
- An action assigned to an operator by a supervisor or a system in a warehouse, such as a move, putaway, or pick task.
- A unit of work to be accomplished by a user, device, or process.
- In CICS, a single instance of the execution of a transaction.
- A sub-division or portion of an activity. See also activity.
- An action item that is created and assigned as part of a project schedule.
- In Ada language, a routine that operates in parallel with other parts of the program. A task is written as a task specification (which specifies the name of the task, and the names and formal parameters of its entries), and a task body which defines its execution.
- A set of jobs (TP module) that are linked together to form a complex function to be run.
- An operation in the console that is launched from a node in the console navigation and completed on a page in the work area.
- A parameters-defined request to receive specific updated information in real time within the available databases.
- One or more actions associated with a case. A task has one or more steps that must be completed to finalize the task. For example, a task might be to review new hire applications. A case is not complete until all required tasks are completed or manually disabled. Each task has roles that are associated with it.
- An activity that can be performed by a single user.
- A work item that an administrator performs, for example: granting permissions and adding users to a community.
- A unit of work to be accomplished by a device or process.
- The smallest unit of work in a workspace that can be assigned to one Content Contributor. See also task group, workspace, workspace content contributor.
- A unit of computation. In a parallel job, two or more concurrent tasks work together through message passing. Although it is common to allocate one task per physical or logical processor, the terms "task" and "processor" are not interchangeable.
- In the Dynamic Workload Console, a filter, by scheduling object type, which returns a list of objects with attributes matching those specified in the task definition.
- In a Tivoli environment, the definition of an action that must be routinely performed on various managed resources throughout the network. A task defines the executables to be run; the authorization role required to execute the task; and the user or group name under which the task will execute.
- An activity that a user is required to perform on a contract.
- A scheduled project activity to which a resource can be assigned to perform work.
- An action performed by the provisioning server on a host. Examples of tasks are deployment, creating cloning profiles, and detecting the currently installed operating system.
- The basic unit of organization in a rule flow.
The type of user assistance that is readily accessible from the product and that includes both task topics that provide step-by-step instructions for how to use one product interface or a set of product interfaces and the concept and reference topics that are closely related to those task topics. Task-based assistance is often included in help systems and information centers.
A command that implements a specific application logic. In general, a controller command and a set of task commands together implement the application logic for a URL request. See also controller command.
task control area (TCA)
An area of main storage acquired by CICS when a task is first dispatched. It is used to control the processing of the task. Once acquired, the TCA exists until the task is terminated. It contains the current status of the task, its relative dispatching priority, and parameters and information being passed between CICS and the application program.
task control block (TCB)
A z/OS control block that is used to communicate information about tasks within an address space that is connected to a subsystem. See also address space connection.
The smallest unit of work in a workspace that can be committed to production-ready data. See also commit, production-ready data, quick publish, task, workspace, workspace manager, workspace task group approver.
See trigger monitor.
In System i Navigator, a view of system tasks that lets a user interact with i5/OS operating system functions. A taskpad contains a set of interrelated tasks that either perform a function or launch help that explains how to perform a function.
A module that is used to manage asynchronous processes that can be completed at a future time (for example, processes involved in the production of reports or for some type of batch processing).
task-related user exit (TRUE)
A user exit program that is associated with specified events in a particular task, rather than with every occurrence of a particular event in CICS processing (as is the case with global user exits). See also global user exit, resource manager interface.
A group of elements which can be customized on a host computer. They are either deployment parameters or graphical user interface elements which condition the appearance of the target computer screen when Tivoli Provisioning Manager for OS Deployment is managing the computer. See also deployment scheme.
Indicates the different categories of tax a store may be required to collect, such as federal, state or provincial, and municipal tax. Each tax category must be assigned one of the tax types; either sales or shipping.
- A dictionary that enables users to search for synonyms of their query terms when they search a collection. See also category tree.
- The hierarchical classification of information according to a known system that is used to easily discuss, analyze, or retrieve that information. See also ontology.
- A description of a multidimensional data store expressed in XML.
See Telecommunications Access Method.
See tape configuration database.
A group of one or more systems or sysplexes, or both, that share the same tape configuration database (TCDB). The individual systems in the TCDBplex share access to one or more tape library data servers and to a common pool of scratch volumes in each tape library. They can also share access to the set of private volumes in each tape library.
See automation package.
See transaction certificate.
See transport connection identifier.
See total cost of ownership.
See Transmission Control Protocol.
TCP ACK storm
A denial-of-service attack on a server in which a hacker or cracker secretly inserts data into a client/server session in an attempt to disrupt the session. The resulting acknowledgements (ACKs) bounce back and forth and a TCP ACK storm ensues after the hacker has hijacked multiple client/server sessions.
See to complete performance index.
See Transmission Control Protocol/Internet Protocol.
In PSF, pertaining to a device that is linked to the OS/390 system through a TCP/IP network and receives data from the OS/390 system using the application-layer IBM protocol for IPDS printers. Some TCP/IP-attached printers require the i-data 7913 IPDS Printer LAN Attachment. See also SNA-attached.
See transmission control queue.
See terminal control system.
See Tenex C shell.
See Telephony Control Service Provider Interface.
See terminal control table.
See terminal control table terminal entry.
See terminal control table line entry.
See terminal control table system entry.
See terminal control table terminal entry.
See terminal control table user area.
See transmission control unit.
See trivial database.
See target distributed data manager.
See Triple Data Encryption Algorithm.
TDI configuration editor
An application that provides an interface for designing ETL transformation scripts. This application creates TDI assembly lines, which can be used by the ETL custom workflow task.
See twinaxial data link control.
See transient data queue.
See Tagged/Delimited String Format.
See transaction dump table.
See topology database update.
See terminal equipment.
See terminal equipment 1.
See terminal equipment 2.
See time variance at completion.
A categorization that associates users with roles. When one assigns a user to a team, one also assigns that user to a role because roles are assigned to teams. See also user.
The grouping of two to four ports or adapters to increase transmission and reception throughput. Teaming creates a single, high-speed, fault-tolerant link that provides load balancing for both outbound and inbound traffic. See also adapter load balancing.
The component that interacts with a repository to share and version projects and project data. See also version control.
See terminal error block.
An abstract about the document, such as a newsletter, guide, or release note, that includes a pointer to that document. See also technote.
technical information exchange (TIE)
A part of the electronic customer support function that allows a user to send files to and receive files from a remote support system, and to search for information on a remote support system. The files are sent and received through a remote support network.
A record that maintains information that is related to an externally published directive or bulletin, such as an airworthiness directive or a customer service notification. Technical records are used in highly regulated industries to ensure that all regulations are properly implemented.
A record that maintains information that is related to an externally published directive or bulletin, such as an airworthiness directive or a customer service notification. Technical records are used in highly regulated industries to ensure that all regulations are properly implemented.
An adapter that is designed for interactions that conform to a specific technology. For example, the WebSphere Adapter for FTP, is an intermediary through which an integration broker sends data to a file system that resides on a local or remote FTP server.
technology-independent machine interface (TIMI)
The lowest visible architectural layer of the server. TIMI defines the high-level machine instruction set and application programming interface that is independent of the underlying implementation. This allows the underlying hardware and Licensed Internal Code to evolve over time to take advantage of technology advances without affecting the user-level interface.
A short document about a single topic. See also techdoc.
See terminal endpoint identifier.
- The part of a data circuit external to the equipment that connects to a data-switching exchange.
- Any physical medium, such as a wire or microwave beam, that is used to transmit data.
telecommunication program PCB (TP PCB)
The program communication block (PCB) that supports communication between an application program and a terminal or other application program. There are two types of TP PCBs: I/O PCB and alternate PCB.
Telecommunication Standardization Sector
See International Telecommunication Union Telecommunication Standardization Sector.
The sending, receiving, and storing of information by way of telecommunication devices. In particular, the use of data collection devices in vehicles to gather and transmit diagnostic and tracking data.
- The hardware and software technology that supports computer-based phone calls.
- The use or operation of systems for the transmission of voice or data communications between separate points.
Originally an electromagnetic device consisting of a combined keyboard and printer used to communicate over telephone lines or other wired serial connections. The abbreviation TTY is now used to describe any serial teletypewriter-like connection.
teletypewriter exchange service (TWX)
Teletypewriter service in which suitably arranged teletypewriter stations are provided with lines to a central office for access to other such stations throughout the U.S. and Canada. Both baudot- and ASCII-coded machines are used. Business machines may also be used, with certain restrictions.
Telex Correspondents File
A file that stores data about correspondents. When the user enters the corresponding nickname in a Telex message, the corresponding information in this file is automatically retrieved and entered into the Telex header area.
In TCP/IP, a protocol that provides remote-terminal connection service. Telnet enables users of one host to log on to a remote host and interact as if they were directly attached terminal users of that host.
- A family of C++ classes or functions with variable types.
- A HATS resource that describes the relatively static portion of the web pages presented by the HATS application, including a banner and navigation area.
- An object used to create new objects of the same type. The created object has the same characteristics as the template. See also application security template, entry template, property template, publish template, publishing style template, search template, security template, versioning security template.
- The metadata that defines the format of data in the RACF database.
- An XML representation of the instructions that call the promotions engine.
- In UML modeling, a model element with unbound formal parameters that you can use to define families of classifiers, packages, and operations. A parameterized model element that describes or identifies the pattern for a group of model elements of a particular type.
- In enhanced edit mode, a character buffer that is associated with the terminal.
- A group of elements that share common properties. These properties can be defined only once, at the template level, and are inherited by all elements that use the template.
- A component that can be used to define reference structure attributes or dimension table columns together with their semantics.
- A generalized project or deliverable plan without populated data for use by project managers for planning a project.
- In report authoring, a reusable report layout or style that can be used to set the presentation of a query or report.
- A predefined process of activity roadmap that can be applied to specific process workflows and modified to meet the needs of a specific workflow. Templates can be created, edited, cloned, or deleted.
- In Informix, a mechanism that is used to set up and deploy Enterprise Replication for a group of tables on one or more servers.
- In digital marketing, a document that is used to prepare emails to send to contacts. A template is used as a pattern and can include dynamic information, personalization, and external information.
- A DB2 utilities output data set descriptor that is used for dynamic allocation. A template is defined by the TEMPLATE utility control statement.
- In REXX, a guide that allows strings to be parsed by words (delimited by blanks), by explicit matching of strings, or by specifying numeric positions.
- An object that represents the framework of future objects. Each future instance of an object is created by copying the template’s components. See also clause template, contract template, format template, line clause template, notification template, term definition.
- A model of a new Notes database. If it is a design template, it will update database design elements created from the template.
- In WebSphere Commerce, a predefined skeleton or pattern that determines how information displays on a web page. The template defines characteristics such as the location and type of text and images, and background color.
- A pattern to help the user identify the location of keys on a keyboard, functions assigned to keys on a keyboard, or switches and lights on a control panel.
- A predefined format that is designed to retrieve particular data on a regular basis and in a consistent format.
- A predefined structure for an artifact.
In Notes, a file with the extension NTF that contains the structure for the database -- that is, forms, folders, and views -- but does not contain documents. Domino Designer comes with a collection of templates that can be used to create system and application databases.
A Template Organization is a role associated with an organization that defines point-of-sale rules, business processes, and configurations for a store or a group of stores. When a config organization is defined only for the purpose of managing business rules, the config organization must be designated as a Template Organization. Template Organizations are not logical organizations. Template organizations can be configured in the inheritance structure so that one Template inherits rules from another Template.
temporary baseline increment
In architecture, a positive or negative value that is added to the current baseline presentation coordinate to specify the position of a temporary baseline in a presentation space or on a physical medium. Several increments might have been used to place a temporary baseline at the current baseline presentation coordinate.
temporary data set
An uncataloged data set with a name that begins with an ampersand (&) or two ampersands (&&) and that is normally used only for the duration of a job or interactive session. See also permanent data set.
temporary dynamic queue
A dynamic queue that is deleted when it is closed. Temporary dynamic queues are not recovered if the queue manager fails, so they can contain nonpersistent messages only. See also permanent dynamic queue.
- An error that requires an operation to be retried a number of times before it is successfully completed.
- A resource failure that can be resolved by error recovery programs. See also permanent error.
temporary file system (TFS)
A temporary, in-memory physical file system that supports in-storage mountable file systems. Normally, a TFS runs in the kernel address space, but it can be run in a logical file system (LFS) colony address space.
A library that is automatically created for each job to contain temporary objects that are created by the system for that job. The objects in the temporary library are deleted when the job ends. The system name for temporary library is QTEMP.
- The section of computer storage in which data is stored temporarily while a program is running.
- The CICS facility that allows application programs to store data in a temporary storage queue for later retrieval.
- A table that holds temporary data. Temporary tables are useful for holding or sorting intermediate results from queries that contain many rows. The two kinds of temporary tables, which are created by different SQL statements, are the created temporary table and the declared temporary table. See also base table, created temporary table, declared temporary table, result table, table.
- A table that the DBMS destroys automatically at the end of a session or transaction.
See terminal error program.
For processor storage, real and virtual storage, and channel volume, 2 to the power of 40 or 1 099 511 627 776 bits. For disk storage capacity and communications volume, 1 000 000 000 000 bits.
For processor storage, real and virtual storage, and channel volume, 2 to the 40th power or 1 099 511 627 776 bytes. For disk storage capacity and communications volume, 1 000 000 000 000 bytes.
- In a business glossary, a word or phrase that describes a characteristic of the enterprise. By assigning assets to terms in the business glossary, information assets can be organized based on business meaning. See also business glossary.
- A string, symbol, or function call contained within a REXX expression.
- The smallest part of an expression that can be assigned a value.
A placeholder with a set of properties that determine the behavior and possible values of a term. See also template.
See Term Extraction tool.
- In curses and extended curses, a screen that represents what the workstation's display screen currently looks like. The terminal screen is identified by a window named curscr, which the user does not access directly.
- In a system or communications network, a point at which data can either enter or leave.
- See display station.
- In data communication, a device, usually equipped with a keyboard and display device, capable of sending and receiving information.
- A physical or emulated device, associated with a keyboard and display device, capable of sending and receiving information.
terminal abnormal condition line entry (TACLE)
An area containing CICS error information and a copy of the data event control block (DECB) at the time an error occurred on a non-SNA LU or line. When an abnormal condition occurs on a non-SNA LU or line, terminal control places the terminal out of service and dynamically creates a TACLE, which is chained off the terminal control table line entry (TCTLE) for the terminal or line on which the error occurred.
In CICS, a facility that handles addressing, and transmission error detection and correction for terminals (displays and printers) associated with the local CICS system. It also handles the intercommunication data queue used by CICS.
- CICS control table retained to define non-SNA LU networks.
- A table describing the terminals and logical units within a CICS network.
terminal control table line entry (TCTLE)
A control block in the TCT for all non-SNA LUs on the same line. The TCTLE contains all parameters necessary for processing requests for terminals on the line.
terminal control table terminal entry (TCTE, TCTTE)
In the TCT, an entry for each terminal known to CICS. TCTTEs are generated either during system initialization (for terminals predefined by resource definition) or when a terminal is autoinstalled. The TCTTE describes the terminal and addresses the corresponding TCTLE, the active TCA, and TIOAs; it also contains control information relating to terminal control requests issued by the CICS application program.
terminal device file
See character special file.
terminal equipment 1 (TE1)
Data terminal equipment (DTE) with integrated ISDN support. In an ISDN, the System i system is a TE1. See also terminal equipment 2.
terminal equipment 2 (TE2)
Data terminal equipment (DTE) without an ISDN interface. To communicate with other equipment through an ISDN, this equipment must have the protocol converted to one that can be recognized by the network. For example, a 7820 ISDN terminal adapter may be used. See also terminal equipment 1.
terminal error program (TEP)
A user-replaceable CICS program used to handle error conditions that can occur when sequential devices are used. Node error programs must be used for z/OS Communications Server-supported devices. The terminal error program analyzes the cause of the terminal or line error that has been detected by the terminal control program.
The resource in a 3270 service project that contains the information necessary for connecting to the host system during build time. Terminal files are automatically generated when the 3270 terminal service project is created. In the Navigator view, if a terminal file is selected, the 3270 terminal service recorder opens in the editor area.
terminal-initiated transaction routing
Transaction routing that is initiated by a request to start a remote transaction arriving from a terminal. On the basis of an installed resource definition for the transaction and possibly on decisions made in a user-written dynamic transaction routing program, the request is routed to the appropriate remote system. The transaction runs as if the terminal were attached to the transaction-owning system.
A type of main storage database (MSDB) in which each segment is assigned to and owned by one logical terminal (LTERM), the owner with terminal security may alter or update that segment, and a segment may be referenced by someone other than the owner. Terminal-related MSDBs are either fixed ((permitting changes) or dynamic (permitting segment insertion and deletion).
terminal response mode
The type of response mode that suspends all input operations from the terminal until the application program has generated the output message. See also line response mode, response mode.
The use of system definition macros and security maintenance utility control statements to authorize a particular logical or physical terminal to issue some or all of the operator commands and to send or receive some or all of the currently defined transactions.
terminate end event
An end event that will stop all parallel activities within its process level and all lower process levels. See also end event.
A node that marks the end of a process. When a flow reaches a terminate node while the process is running, the process immediately terminates, even if there are other currently executing flows within the process.
In SNA, a request unit that is sent by a logical unit (LU) to its system services control point (SSCP) to cause the SSCP to start a procedure for ending one or more designated LU-LU sessions.
termination imminent step
The final step of the three-step condition-handling model. In the termination imminent step, a final chance is provided to handle conditions or to perform cleanup before the thread is terminated. See also condition step, enablement step.
- The part of a program that performs the action necessary to end a job or program.
- A syntax object that signifies the end of a data object. For example, a carriage return or line feed at the end of a record might be the record's terminator.
The representation of a term that serves as a variable within a contract or clause and is populated with a term value. It may have a defined default value or it can be changed by a user. It may be used as a criterion for a search, condition, or event. See also variable.
A specific value that populates a term placeholder. It may be selected from a list of possible values, typed directly as defined in the term placeholder, or provided by the system in the case of a system term.
- The designated account set or physical geography where a sales or service employee sells or provides products or services.
- A portion of the POSIX locale that is mapped to the territory code for internal processing by the database manager.
A code that is used by the DB2 database manager to preset the default collation order for an SBCS database and to establish monetary, date, time, and numeric formatting that is specific to a country, region, or territory.
Territory Optimization Program (TOP)
An IBM-wide initiative for designing high-quality sales territories based on market opportunity (identified through the Market Alignment Program (MAP) and augmented by revenue commitment interlocks. See also Market Alignment Program.
- A series of actions to run an operation and validate its correctness.
- In communications, a data link command or response used to perform a basic test of the station-to-station link connection.
- The inputs, execution conditions, and expected results that are used to evaluate an aspect of a system under test.
- A set of tasks, scripts, or routines that automate the task of testing software.
- A set of input values, execution preconditions, expected results and execution postconditions, developed for a particular objective or test condition, such as to exercise a particular program path or to verify compliance with a specific requirement. (ISTQB)
- A property of the integration test client that is used to specify modules for testing and to control the tests.
- A set of characteristics of the system that hosts the system under test. These characteristics affect the conditions for test execution and the evaluation of test results.
A software module or application used to invoke a test and, often, provide test data, control and monitor execution, and report test outcomes. A test driver sequences and controls the automated execution of one or more tests.
- An environment containing hardware, instrumentation, simulators, software tools, and other support elements needed to conduct a test. (ISTQB)
- A specific instance of a configuration of hardware and software established for the purpose of conducting tests under known and controlled conditions.
The calculated approximation of a result related to various aspects of testing (e.g. effort spent, completion date, costs involved, number of test cases, etc.) which is usable even if input data may be incomplete, uncertain, or noisy. (ISTQB)
- A series of script files used to enable a DB2 database for use by the DB2 XML Extender. A test harness is optionally created when a DAD file is generated from a relational database to XML mapping. Once enabled, it tests composing XML from data as well as decomposing XML files into relational data.
- For a Netezza user-defined function or aggregate, a test environment that allows you to debug your user-defined objects outside of the Netezza runtime engine.
The stage of model building in which the model produced by the training stage is tested against a data subset for which the outcome is already known. See also model building, training, validation.
A set of questions and answers that is used to evaluate system metrics after ingestion and training. See also training data.
A key added to a telex message to ensure message integrity and authorized delivery. The test key is an integer value of up to 16 digits, calculated manually or by a test-key processing program using the significant information in the message, such as amounts, currency codes, and the message date.
test-key processing program
A program that automatically calculates and verifies a test key. The Telex Link supports panels for input of test-key-related data and an interface for a test-key processing program.
A user-defined library used for debugging operations that does not contain objects needed for normal processing. See also production library.
A list of email addresses used for testing visual elements, wording, and the links of a mailing before it is sent to the contacts in a database. See also regular database.
- The mode that causes any input message entered into a terminal under test to be returned to the test terminal, with error analysis procedures bypassed.
- In printers, the operational mode in which the printer can produce print samples, accept configuration changes, and control traces. For example, when the IBM 3900 Advanced Function Duplex Printing System is in test mode, it is not accepting information from the attached controlling computer system. See also diagnostic mode, print mode.
- The mode employed in testing a new user interface, in which the compiled application is used to drive the interface. Allows building, modifying, testing, and refining operations without having to compile, link, and debug.
A template used for the automatic generation of component tests. There are several test patterns available for testing both Java and EJB components. See also component test.
- Commonly used to refer to a test procedure specification, especially an automated one. (ISTQB)
- A collection of step-by-step instructions that realize a test, enabling its execution. Test scripts may take the form of either documented textual instructions that are executed manually or computer readable instructions that enable automated test execution.
The stage of the scan during which the objects and logic of the scanned application are submitted to a comprehensive barrage of typical, erroneous, and simulated-malicious usage techniques, resulting in a complete inventory of security vulnerabilities.
- A collection of test cases that are grouped for execution purposes.
- A set of usage scenarios with which the user can verify that business rules are correctly designed and written. Running test suites produces a report comparing the expected results and the actual results obtained when applying rules to the scenarios.
- A collection of test cases that define test behavior and control test execution and deployment.
test suite execution record
A record of the execution environments for a specific instance of a test suite. One can use this record to run a test suite instance and to track the status of each test run.
- A Data Collection question that is used for the entry of open-ended data. See also response.
- To send a text message.
- A finishing item that consists of any alphanumeric or special characters.
- A sequence of characters that can be read by a person and encoded into formats such as ASCII that can be interpreted by a computer.
The process of extracting semantics and other information from text to enhance the retrievability of data in a collection. See also semantic search.
text analysis engine (TAE)
A software component that is responsible for discovering and representing context and semantic content in text. See also common analysis structure.
The process of assigning an integer value to a document that signifies the relevance of the document with respect to the terms in a query. A higher integer value signifies a closer match to the query. See also dynamic ranking, static ranking.
text control chaining
Two or more text controls that use the chain control codes and are started with a single set of control characters. See also control sequence chaining.
A substitution method that uses lexical analysis and dictionary support to propose candidates for corrected text, for example: spelling suggestion, search query resolution, and thesaurus lookup.
Entry of characters in a free format. Entry of text is generally done to provide information for human comprehension, with or without further machine processing. See also data entry, free format.
A file that contains only printable characters. See also binary file.
- A description of the appearance of text as a combination of print direction and character rotation.
- See global orientation.
- See word processing.
- Pertaining to computer systems, stand-alone devices, and application software products that allow a user to enter, modify, rearrange, format, display, and print out text.
- In SCRIPT/VS, the person who writes SCRIPT/VS macros and organizes macro libraries and profile files so that the appropriate composition will be done for each tag.
- The person who implements APFs that provide the processing specified by the document administrator.
text search index database
The database files used by text search services for storing the significant words of documents. These database files are used when a user requests a search of the document library for one or more phrases.
text search index partition
The collection that contains the text search index data from a specific database partition. A text search index is mapped to one or more collections to match the distribution of the data table that hosts the text index.
- A sequence of characters (alphanumeric or special) defined by the user.
- A string of graphic characters.
The intentional omission of portions of text in copy groups specified in the form definition. See also suppressible text.
In binary synchronous communication (BSC), a method of sending and receiving data containing any or all of the 256 character combinations in EBCDIC in specific bit patterns, including transmission control characters.
See ordering scheme.
- A variable that contains data that is text, such as names and addresses or responses to open-ended questions.
- A symbol whose final value is to be treated only as text.
See transfer form data.
See temporary file system.
See Trivial File Transfer Protocol.
See transmission group.
See ticket-granting service.
See transmission header.
An operation in which a storage system releases the block of the I/O from the host system to the affected volumes on the primary site. A thaw operation can occur after a freeze operation ends and consistency is formed on the secondary site. See also freeze.
- The style element that gives a place a particular look. The portal provides several themes, similar to virtual wallpaper, which can be chosen when creating a place.
- A collective set of style sheets that supports the look and feel of the Rational Asset Manager Web client.
- The style element that gives a place a particular look. IBM Intelligent Operations Center provides several themes, similar to virtual wallpaper, which can be chosen when creating a place.
A type of concept extraction that automatically recognizes significant vocabulary items in text documents to extract the theme or topic of a document. See also concept extraction.
A client that has little or no installed software but has access to software that is managed and delivered by network servers that are attached to it. A thin client is an alternative to a full-function client such as a workstation. See also rich client.
An appliance that provides a 5250-based operating system console for the IBM i operating system. This appliance connects directly to the server using one of the HMC Ethernet ports (labeled HMC 1 and HMC 2) on the back of the server.
- A mechanism that provides the ability to define logical volume sizes that are larger than the physical capacity installed on the system.
- The ability to define a storage unit (full system, storage pool, volume) with a logical capacity size that is larger than the physical capacity assigned to that storage unit. See also volume.
third-generation language (3GL)
A high-level programming language that was designed to run on the third generation of computer processors, built on integrated circuit technology roughly from 1965 to 1970. C, FORTRAN, Basic and Pascal are examples of third-generation languages still in use today.
third-party data source
Data, information, and services that are not owned by IBM and that are accessed using feeds, web services, or another remote access method. Examples of third party data sources are Google Maps service, Google gadgets, AccuWeather, and Yahoo News.
See value-added network.
See target library high-level qualifier.
- The local symbol used to separate every third digit in large numbers or lengthy decimal fractions.
- The character (comma in the United States) placed every third number starting left of the decimal point. For example, three thousands separators are used in the number: 641,322,974,821.
A condition, caused by a high level of memory over-commitment, in which the system is spending all of its time writing out virtual-memory pages and reading them back in. The application programs make no progress because their pages don't stay in memory long enough to be used. Memory load control is intended to avoid or stop thrashing.
- The DB2 structure that describes the connection of an application, traces its progress, processes resource functions, and delimits its accessibility to DB2 resources and services. Most DB2 functions execute under a thread structure.
- A stream of computer instructions that is in control of a process. In some operating systems, a thread is the smallest unit of operation in a process. Several threads can run concurrently, performing different jobs. See also user thread.
- See message thread.
- In printers, passing paper by hand through the paper path.
- The process whereby various transactions undergo concurrent execution.
- A mechanism that allows each thread in a multithread process to allocate storage for its corresponding data.
- See thread-specific storage.
thread private storage
See thread-specific storage.
- Pertaining to user-written code or CICS functions that use appropriate serialization techniques to maintain the integrity of resources that are being used by other tasks at the same time.
- Pertaining to a function, macro, or operating system service that can be called from multiple threads in a process at the same time. See also multithreaded application, reentrant code, thread unsafe.
The ability to synchronize the activities of various threads. A thread synchronizes itself with another thread by putting itself to sleep. Before doing so, the thread notifies the operating system as to what event has to occur in order for the thread to resume execution.
Pertaining to a function, macro, or operating system service that cannot be called from multiple threads in a process at the same time. See also threadsafe.
three-dimensional concurrent engineering (3DCE)
A way of improving the design of a product, process, and supply chain through outcomes such as reduced time to market, lower costs, and improved customer acceptance.
- A setting that applies to an interrupt in a simulation that defines when a process simulation should be halted based on a condition existing for a specified proportion of occurrences of some event.
- A specified percentage of licenses; if more than this percentage of licenses for a product are in use, messages about the level of use are logged.
- A user-defined entity that establishes a condition or boundary that, if exceeded, causes the data server to take a prescribed set of actions. See also workload definition.
- In OSI, a user-specified value that determines the frequency with which events will be reported. For example, if a certain error threshold is set at 10, the error will not be reported until the tenth occurrence of the error.
- A specified limit that defines when a maintenance task must be performed. See also interval.
- A customizable value for defining acceptable tolerance limits (maximum, minimum, or reference limit).
- A customizable value for defining the acceptable tolerance limits (maximum, minimum, or reference limit) for an application resource or system resource. When the measured value of the resource is greater than the maximum value, less than the minimum value, or equal to the reference value, an exception or event is raised. See also performance threshold.
- A storage group attribute that controls the space usage on direct access storage device (DASD) volumes, which is defined as a percentage of occupied tracks versus total tracks.
- A predefined value per metric that is used to compare data points.
- A level that is set on the Director server to define the configuration status of the monitored systems.
- A level set in the system at which a message is sent or an error-handling program is called. For example, in a user auxiliary storage pool, the user can set the threshold level in the system values, and the system notifies the system operator when that level is reached.
threshold definition domain
The object that a threshold is associated with and whose activities are monitored to ensure that the threshold condition is not exceeded. A threshold affects only activities within its domain.
threshold enforcement scope
The area for which a threshold is both monitored and enforced for activities to which the threshold has been applied. Examples of this area include a workload occurrence, a database partition, or a database.
In OSI, an event that occurs when a counter has reached its user-specified threshold. OSI Communications Subsystem logs threshold events and generates messages to the operator about these events.
The process of moving files from a local file system to server storage based on the high and low thresholds that are defined for the file system. See also automatic migration, demand migration, migration job, selective migration.
In the capacity planning tool, a value used as a general guide for optimal resource utilization. If resource utilization is above the threshold value, the resource performance may be unacceptable. Threshold values are also available for the rate of synchronous reads in the machine pool and for the sum of all pools. See also guideline value.
A utility that has a limit placed on the resources that would otherwise be consumed. The degree to which the resources are limited is based on the current workload of the system. Supported utilities include backup, restore, and table space reorganization.
A threshold where the system stops accepting new connections. See also kill threshold.
- A method of managing system performance by scheduling or preventing certain processes or groups of processes from running to avoid too high a demand on system resources at any time. See also throttling group.
- A method of regulating the amount of mailings that are sent per hour.
A collection of processes, such as flowchart runs or mailings, that are grouped so that the run times can be controlled together to prevent the processes from placing too high a demand on the system. See also throttling.
- In data communications, the total traffic between stations over a period of time.
- A measure of the amount of information transmitted over a network in a given period of time. Throughput is generally measured in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps). See also aggregate bandwidth.
- In storage management, the total bytes in the workload, excluding overhead, that are backed up or restored, divided by elapsed time.
- The measure of the amount of work performed by a device, such as a computer or printer, over a period of time, for example, number of jobs per day.
- In OSI, a network layer facility that selects the speed with which data transmission requests are to be handled.
- In X.25, a packet-switching data network optional facility that allows the data terminal equipment (DTE) to negotiate the speed at which its packets travel through the packet-switching data network.
throwing message intermediate event
An intermediate event that sends a message. See also intermediate event.
- A formal record of identified issues or requests that are created against an item and assigned to appropriate users to resolve those issues or complete the requests.
- A record, such as a service request, incident, or problem report, that can be routed and assigned a status.
- A mechanism for securely transmitting the identity of a client to a server.
A part of the key distribution center (KDC) that generates service tickets. A principal presents a ticket-granting ticket to the ticket-granting server when the principal requests a service ticket. The ticket-granting server uses the ticket-granting ticket to verify that the principal has authenticated to the authentication server before it grants the request for a service ticket.
- A ticket that allows access to the ticket granting service on the key distribution center (KDC). Ticket granting tickets are passed to the principal by the KDC after the principal has completed a successful request. In a Windows 2000 environment, a user logs on to the network and the KDC will verify the principal's name and encrypted password and then send a ticket granting ticket to the user.
- A ticket that a principal passes to the ticket-granting server when a service ticket is requested. The ticket-granting service uses the ticket-granting ticket to verify that the principal has authenticated to the authentication server before it grants the request for the service ticket.
Applying special customer tickets or labels to cartons prior to shipping to comply with customer requirements. See also value-added service.
- A situation where a domain or group has exactly half of the defined quorum members. If a quorum is not explicitly defined, all members are considered to be quorum members. See also quorum, tiebreaker.
- The interval between cuts of a perforation.
See technical information exchange.
A monitoring resource that determines how tie situations are resolved. See also tie.
- A group of servers that share a function in an application.
- A group of layers that define the tasks and execution order to provision a specific group of nodes. Layers can consist of pre-provision script templates, post-provision script templates, and server templates.
- A group of appliances that perform a specific function; for example, Gateway tier. A tier is made up of one of more nodes; for example, the Gateway tier consists of one or more IBM WebSphere DataPower nodes.
- The logical group of components and the computers on which those components are installed.
A service level agreement (SLA) that includes an offering containing at least one previously deployed SLA. They can be used to include the results of operational level agreements, internal SLAs or outsourced SLAs, in an external SLA that are supplied to a customer.
See Tagged Image File Format.
See Tag Image File Format-Fax.
tightly coupled analysis engine
An aggregate analysis engine whose component analysis engines run in the same address space. See also analysis engine.
One of the accent marks in Latin script (~). See also ogonek.
- See pixel map.
- A visual representation of a running application that provides status on a dashboard.
- To replicate a pixmap in two dimensions.
- To fill a region with a pixmap.
A three-part value that designates a time of day in hours, minutes, and seconds. See also timestamp.
See pantry loading.
time-division multiplex bus
A method of transmitting many channels of data over a smaller number of physical connections by multiplexing the data into timeslots, and demultiplexing at the receiving end. In this document one such channel can be considered to be a half-duplex unidirectional stream of 64 kilobits per second.
- A time span marked by a start date and an end date that is used to identify an activity over a specific time.
- A DECIMAL (6,0) value that represents a number of hours, minutes, and seconds.
See asynchronous messaging.
- In social networking, a sequential collection of activities, photos, and bookmarklets that make up a profile
- An area of activity in a project that typically has its own schedule, deliverables, teams, and process.
- A list display that is used to textually show events in the map landscape. Events are sortable by description, crime type, start date, and end date.
A chart or a portion of a chart that shows a chronology of events. For example, a series of meetings that occur over several days, or a set of transactions that occur over a period of time.
time-of-day clock (TOD clock)
A timing device that counts units of time based on the starting point of 00 hours, 00 minutes, and 00 seconds on January 1, 1900. Time-of-day (TOD) information is used to monitor computer operations and events. See also time tolerance.
- A time interval that is allotted for an event to occur or complete before operation is interrupted.
- An event that occurs at the end of a predetermined period of time that began at the occurrence of another specified event.
- Abnormal termination of either an application or the DB2 for z/OS subsystem because of the unavailability of resources.
- A specified time interval during which a primary participant must approve a document.
- A task that produces output at certain points in time.
- A BTS object that expires when the system time becomes greater than a specified time, or after a specified period has elapsed. When a timer is defined, a timer event is automatically associated with it. When the timer expires, its associated event fires.
- An event that is triggered by an occurrence at a specific time.
Major component of CICS that provides interval timing and alarm clock services for CICS domains. These are processes that cause an action to occur at some predetermined future time. This service can be performed after a specific interval, at periodic intervals, at a specified time of day, or at a specific time of day every day. It also provides date and time provision and conversion facilities.
A restriction that determines the times before which, after which, or both, that a job or job stream cannot be run. Specifying both defines a time frame within which a job or job stream runs. Jobs can also have a repetition rate. For example, IBM Workload Scheduler can launch the same job every 30 minutes between the hours of 8:30 a.m. and 1:30 p.m. See also duration, timeline view.
- An atomic event that fires when its associated timer expires. See also user-defined event.
- An event that is triggered when a time condition is satisfied. See also intermediate event.
timer intermediate event
An intermediate event that is triggered when a time condition is satisfied. A timer intermediate event can delay the flow of the process or can generate a timeout for activities that exceed the time condition.
A unit of measurement used to give a rough relative estimate of the resources required, or the cost, for the database server to execute two plans for the same query. The resources calculated in the estimate include weighted processor and I/O costs.
timer start event
A start event that is triggered when a time condition is satisfied. A timer start event is used only for event subprocesses. See also start event.
- A set of time-stamped data that consists of measurements taken at different times. Examples of time series data time include electricity usage that is collected from smart meters and stock trading activity. See also irregular time series, regular time series. See also irregular time series, regular time series.
- A set of values of a variable at periodic points in time.
time series analysis
A set of data analysis techniques that involve taking measurements on the same unit at regular time intervals in order to predict future measurements or events. See also AutoRegressive Integrated Moving Average, exponential smoothing, seasonality.
Time Sharing Option (TSO)
A base element of the z/OS operating system with which users can interactively work with the system. See also Interactive System Productivity Facility.
- The interval between scheduled checks by the CPU scheduler to see if a different thread should be dispatched. Unscheduled checks may occur as a result of interrupts or system calls.
- The amount of processor time (specified in milliseconds) allowed for a job before other waiting jobs of equal priority are allowed to process data.
timestamp with time zone
A two-part value that consists of a timestamp and time zone. The timestamp with time zone is expressed in years, months, days, hours, minutes, seconds, microseconds, time zone hours, and time zone minutes.
A measure that represents the state of a system at a specific point in time. For example, a time-state measure might show the number of employees in a company at the start of each month, or the product inventory on a given day for each week. A time-state measure can be aggregated by operations, such as totaling across other dimensions, but not across time.
A schedule of times. In business process modeling, timetables are typically associated with resources or costs. For resources, timetables indicate availability (such as Monday to Friday). For costs, timetables are useful if the cost varies with time of day (such as electricity) or time of year (such as seasonal foods).
A standard recruitment metric that measures the time taken to identify a hire against an open requisition. The parameters for time-to-fill varies by customer. For example, customers may stop the time-to-fill “clock” once an offer is accepted, once pre-employment screening has been cleared, or once a new hire starts in the role.
The difference between the TOD clocks on two adjacent nodes, beyond which the path manager will not allow a session to be established. See also time-of-day clock.
- A technique used by best-effort delivery protocols to inhibit endlessly looping packets. The packet is discarded if the TTL counter reaches 0.
- The time interval in seconds that an entry can exist in the cache before that entry is discarded.
time zone support
A feature of Tivoli Workload Scheduler for z/OS that lets applications be planned and run with respect to the local time of the processor running the application. The controlling processor makes allowances for differences in time zones during planning activities to ensure that interacting activities are correctly coordinated.
See technology-independent machine interface.
A specialized validation action used to measure the duration of a method call or a sequence of method calls. See also validation action.
See terminal input/output area.
- In OSI, a permanent identifier for an object.
- The part of a personal name that represents a social, religious, or academic status, such as "Dr.," "Ms.," or "Colonel." A title is an optional part of a personal name that typically precedes given names. For name-matching purposes, a title is considered to be a peripheral or minor part of a personal name. See also honorific, title, affix, and qualifier.
title, affix, and qualifier (TAQ)
A name token that often helps identify that a string of text represents a name. While these tokens usually indicate something about the name, only affixes are part of the actual name. See also affix, qualifier, title.
Tivoli common directory
A common directory where Tivoli programs store message logs, event logs, or trace logs in XML format, for subsequent filtering by the Tivoli XML Log Viewer utility. See also log viewer, Tivoli XML log format.
Tivoli management region (TMR)
See Tivoli region.
Tivoli Presentation Services Web Component Library (WCL)
An Integrated Solutions Console technology that includes a foundation layer and a set of reusable web components that enable developers to create scalable and extendable user-interface components for web applications.
The Tivoli server and the set of managed node gateways and endpoints that it serves. An organization can have more than one region. A Tivoli region addresses the physical connectivity of resources, whereas a policy region addresses the logical organization of resources.
Tivoli Space Manager
A feature of the Tivoli Storage Manager product that handles the moving of files in and out of a secondary storage medium based upon actual file accesses in the primary native file system. This feature can be used with DB2 Data Links Manager to enable DATALINK files to be stored in a virtually infinitely sized file system.
Tivoli Storage Manager
A client/server product that provides storage management and data access services in a heterogeneous environment. Tivoli Storage Manager supports various communication methods, provides administrative facilities to manage the backup and storage of files, and provides facilities for scheduling backups.
Tivoli Storage Manager command script
A sequence of Tivoli Storage Manager administrative commands that are stored in the database of the Tivoli Storage Manager server. The script can run from any interface to the server. The script can include substitution for command parameters and conditional logic. See also macro file, script.
See Trusted Key Entry.
See top level aggregate analysis engine.
A file of a recorded session that can be exported and replayed with Tealeaf replay tools. The TLA file includes data in json format that communicates to IBM Tealeaf clients a visitor's journey through the business's website.
See translation lookaside buffer.
A memory delay that occurs when a memory location is referenced and the page that contains that memory location does not have an entry in the appropriate transition lookaside buffer (instruction or data).
See Transport Layer Interface.
See target library.
See terminal list table.
See traffic management center.
See Transaction Manager database.
See target member.
See Transaction Manager Facility.
See trigger monitor interface.
See Terminal Monitor Program.
See Tivoli management region.
See Transport Manager Subsystem.
A component of Communications Server that enables a TCP/IP client workstation to communicate with an SNA-based host application by transmitting 3270 datastream information over a TCP/IP connection.
to complete performance index (TCPI)
The difference between budget at completion and budgeted cost of work performed divided by the difference between budgeted at completion and actual cost of work performed.
See title-oriented document.
See time-of-day clock.
See tokenized form.
- To switch between two modes on a computer or network; for example, to switch between data entry and command entry modes or between stand-alone operation and device emulation.
- In printers, to switch between options by selecting and reselecting the same button, key, or field. Often toggling turns a selection on or off.
- Pertaining to any device having two stable states.
- Pertaining to a switching device, such as a toggle key on a keyboard, that allows a user to switch between two types of operations.
- A real or virtual device that stores cryptographic data objects such as keys and digital certificates.
- A value passed as a parameter for the purpose of uniquely identifying objects.
- A particular message or bit pattern that signifies permission or temporary control to transmit over a network. See also assertion.
- A marker that progresses through a process instance and indicates which element is currently running. A process instance can generate several tokens. A token can take only one path.
- In OSI, an attribute of a connection. The token is dynamically assigned to one session-service user at a time to permit certain services to be called. Tokens are a session layer concept.
- The basic syntactic unit of a computing language. A token consists of one or more characters, excluding the blank character and excluding characters within a string constant or delimited identifier.
- In checkpoint processing, an identifier that is used to determine checkpoint I/O status.
- The basic textual units that are indexed by enterprise search. Tokens can be the words in a language or other units of text that are appropriate for indexing. See also lexical parsing item.
- A syntactic element, such as a phrase, a word, or a set of one or more characters, that is used for analyzing and processing text. See also parsing, separation character, strip character, tokenization, value.
A mechanism that controls data flow. As an application requests permission into a network, the token bucket adds characters (or tokens) into a buffer (or bucket). If enough room is available for all the tokens in the bucket, the application is allowed to enter the network.
- The process that segments data into tokens. See also parsing, token.
- The process of replacing sensitive data, such as a credit card number, with a unique token. The sensitive data is stored securely in an external vault. The only way to return the token to its original value is to contact the external vault system.
A licensing model in which each product requires a predefined number of tokens for each active user or license feature. See also floating license.
A system for controlling file access in which each application performing a read or write operation is granted some form of access to a specific block of file data. Token management provides data consistency and controls conflicts. Token management has two components: the token management server and the token management function.
According to IEEE 802.5, network technology that controls media access by passing a token (special packet or frame) between media-attached stations. See also local area network.
A local area network that connects devices in a ring topology and allows unidirectional data transmission between devices by a token-passing procedure. A device must receive a token before it can transmit data. See also local area network.
In CoOperative Development Environment/400, a token or set of tokens having a similar characteristic or function, and assigned the same display attributes by the CoOperative Development Environment/400 program.
- An acceptable value or value range for a specified output value.
- A specified time period before or after a deadline during which tasks must be completed.
- See benchmark.
- The extent to which a supplier is risk averse. It is a value that is tolerable but one that poses a potential risk at the time of assessment.
A configured value that specifies the variance that is allowed on a specified performance requirement. For example, the number of days that are allowed to lapse after the expected ship date or the requested ship date; if the days exceed the tolerance limit, an event is raised.
A form of maintenance that is needed to ensure an upgraded system can be restored to its older version. Toleration maintenance should be researched, installed on a test platform, and tested thoroughly before being installed on any production system.
A small subset of attributes of a deleted object. The tombstone object is retained for a specified period, and at the end of the specified period, the tombstone object is permanently deleted.
An audible signal sent across a telephone network. There are single (one-frequency) tones, tritones (three sequential tones at different frequencies), dual tones (two simultaneous tones at different frequencies), and dual sequential tones. Each has a different meaning.
In architecture, containing marking agents such as toner or ink. See also untoned.
Toolbox for Java
See IBM Toolbox for Java.
A presentation that is given to inform employees about safety procedures. Toolbox talks are important for communicating safety procedures as well as for sharing information between the members of the team who are charged with carrying out the tasks that are associated with permits to work.
- A collection of artifacts that are organized into a package. A toolkit includes one or more namespaces, which contain the functions, operators, and types that are packaged as part of the toolkit, all of which can then be reused in other applications.
- A container where artifacts can be stored for reuse by process applications or other toolkits.
- A set of development tools used to write and test software applications.
A form of user assistance that is displayed when a cursor is moved over a graphical image, such as an icon, that does not otherwise have a label. A tooltip provides a brief, plain text description of function. See also hover help.
See Territory Optimization Program.
In web services, the process of developing a service from a Web Services Description Language (WSDL) file. See also bottom-up development.
- Logical channel of communication between one or more transmitters and one or more receivers.
- A single web page at any level within an information center hierarchy.
- A character string that describes the nature of the data that is being published in a publish/subscribe system.
- An item for discussion within a forum.
- In dynamic data exchange (DDE), the data that is to be exchanged within a DDE conversation.
- A type of message destination for which all active subscribers receive the message.
- An independent unit of information that follows the rules for a specific information type and that is meaningful when it is displayed alone.
- A functional group of web pages. A topic collection can be a grouping at any level within an information center hierarchy.
- A set of closely related topics that is presented in a standard hierarchy within an information unit.
topic connection factory
An interface used by a Java application to create topic connection objects. These objects allow messages to be placed on that topic. It is used by the JMS Listener to retrieve messages from the topic.
topic host routing
An option for routing publications in a publish/subscribe cluster. With topic host routing, only selected cluster queue managers host the topic definitions. Publications from non-hosting queue managers are routed through the hosting queue managers to any queue manager in the cluster with a matching subscription.
top level aggregate analysis engine (TLA)
An analysis engine made up of multiple subcomponent analysis engines arranged in a flow. The flow can be one of the built-in UIMA flows, or a custom flow provided by the user.
A strategy of replenishment which complements min-max replenishment. Top-off replenishment is also driven by inventory in reserved locations. However, instead of creating replenishment tasks if the inventory falls below a minimum (trigger) level, the system creates replenishment tasks if the inventory falls below the maximum (cap) level. See also min-max.
top-of-rack switch (TOR switch)
A network switch that is located in the first rack of an IBM System z BladeCenter Extension (zBX). See also intraensemble data network TOR switch, management TOR switch.
- A graphical breakdown of a transaction displayed in an hierarchical arrangement of software components and transactions.
- The physical or logical mapping of the location of networking components or nodes within a network. Common network topologies include bus, ring, star, and tree.
- The cluster layout and connections, as well as cluster, node, network, and network interface information.
- An inventory of CICS and CICSPlex SM resources, and a map of their relationships. CICSPlex SM supports the definition of resource and system topology.
- The physical or logical mapping of the location of networking components or nodes within a network.
- The mapping of slices of a database to individual disks, mirroring assignments between disks, spare disks, and to SPU ownership for the active data slices.
- In fibre-channel technology, the configuration of the fibre-channel network and the resulting communication paths allowed. Possible topologies are point-to-point, switched fabric, and arbitrated loop.
- A graphical view of a configured item and its relationships.
topology database update (TDU)
A message about a new or changed link or node that is broadcast among APPN network nodes to maintain the network topology database, which is fully replicated in each network node. TDU messages contain identifying information, node and link characteristics, and resource sequence numbers to identify the most recent updates for each of the resources described in the TDU.
A function of the Managed System Services program that is responsible for collecting topology information from nodes and clients in the network. The topology manager can reside on any system in the network; however, this system is most likely to be the central site system.
In AIXwindows, a narrow band of lighter color that is located across the top of a rectangular graphical object (a widget or gadget). The top shadow creates a three-dimensional appearance when the object is manipulated.
See terminal-owning region.
See top-of-rack switch.
See terminal operating system.
In DFU, a storage area where final totals for a field are kept. See also batch accumulator.
total awareness variable
A variable that combines the responses to two or more questions about brands that share a brand list. A total awareness variable typically combines the responses to questions that ask respondents to select their favorite brand, and which brands they can remember, first unprompted and then prompted.
In an advanced order, the cost of all order items, along with additional fees and taxes. See also current charge.
total cost of ownership (TCO)
A methodology for calculating the actual cost of owning a product over the period of ownership and use based on combining costs of acquisition or leasing, training, deployment, support, residual equipment values, return on investment, time to market, and so forth.
Total program costs, including the one time AD expenditure and the "move forward" or recurring costs that cover maintenance and runtime expenses for the expected life of the program.
In RPG, an output record written after a group of detail records. Total records generally contain data that is the result of calculations performed on the information in a group of detail records. See also detail record.
The part of the RPG program cycle in which calculation and output operations specified for a group of records are done. See also detail time.
- An application or place where a marketer can interact with a customer. A touchpoint can be a channel where the customer initiates the contact (an "inbound" interaction) or where the marketer contacts the customer (an "outbound" interaction). Common examples are websites and call center applications. See also inbound interaction, outbound interaction.
- The interface to an instance of a managed resource, such as an operating system or a server. A touchpoint implements a sensor and an effector for the managed resource, and maps the sensor and effector to existing interfaces. See also effector, manageability interface, sensor.
A bezel that responds to gestures that take place directly on the bezel, start on the bezel, or end on the bezel. For example, swiping from the right side of the bezel on to the screen of a BlackBerry PlayBook switches between apps.
See Transaction Processing Council.
See transport-layer protocol data unit.
See Transaction Processing Facility.
See time provider interface.
See transaction pipe.
See third party maintenance.
See Translation Plan Management System.
See Translation Plan Management System information.
See transaction program name.
See Teleprocessing Network Simulator.
See telecommunication program PCB.
See temporary price reduction.
- To record data that provides a history of events occurring in the system.
- A record of the processing of a computer program or transaction. The information collected from a trace can be used to assess problems and performance.
- A DB2 for z/OS facility that provides the ability to collect monitoring, auditing, performance, accounting, statistics, and serviceability (global) data.
- In DB2 replication, a facility that is used to collect monitoring, auditing, and performance data for the Capture program, the Q Capture program, the Apply program, the Q Apply program, or the Replication Alert Monitor.
- The ability to identify the measuring and test equipment that was used to calibrate an asset.
- The ability to trace a project element to other related project elements, especially those related to requirements.
A view that illustrates the relationships between requirements of the same or different types. This matrix is used to create, modify, and delete traceability relationships and view indirect relationships and traceability relationships with a suspect state. See also suspect relationship state, view.
See trace to/trace from relationship.
A view of requirements of a single type that displays other requirements traced to or from them. See also view.
Trace Analysis Program (TAP)
See Advanced Communications Function/Trace Analysis Program.
- A section of a dump that provides information about the stack frame, the program unit address, the entry point of the routine, the statement number, and status of the routines on the call-chain at the time the traceback was produced.
- For the Ada debugger, a listing of the routines that are in the call chain above the code that is being debugged. For example, if a breakpoint is set within an Ada procedure and a call traceback is requested, a list appears that includes all of the procedures that called the Ada procedure, in the order that they called it. All the calling procedures in the call chain are listed up to, but not including, the operating system calling the original highest level routine.
A level associated with each trace point. The level of a trace point depends on where the trace point is and on what sort of detail it can provide on a trace call. Most trace points are trace level 1 or 2.
A hyperlink that conveys relationships between the artifacts it links, such as dependency, origin, derivation, implementation, or validation. Trace links have link types, which are defined by an Open Services for Lifecycle Collaboration specification or by a project. See also content link.
An alert that can be attached to a single order or shipment. A tracer is sent automatically when the plan status, shipment status, or voucher status of the shipment changes. See also manual alert.
trace to/trace from relationship
A relationship between two requirements that implies the source, derivation, or dependencies between the requirements. The trace to/trace from state appears in a Traceability Matrix or Traceability Tree when a relationship is created between two requirements.
- A unit of storage on a count-key-data (CKD) device that can be formatted to contain a number of data records. See also data record, home address, track-descriptor record.
- An optional subdivision in a process application that is based on team tasks, process application versions, or both. When enabled, tracks allow parallel development to occur with isolation from changes in other tracks. For example, using tracks one team can fix the current version of a process, while another team builds a completely new version based on new external systems and a new corporate identity.
- A circular path on the surface of a disk or diskette on which information is magnetically recorded and from which recorded information is read.
track and trace service
A service that uses an RFID infrastructure to trace a food product from its point of origin; manufacturers and food retailers can view the complete history of a food product, and speed their response to potential contamination. See also RFID tag, smarter food system.
A special record on a track that follows the home address. The control program uses the track-descriptor record to maintain certain information about the track. The record has a count field with a key length of zero, a data length of 8, and a record number of 0. This record is sometimes referred to as R0. See also track.
- In Tivoli Workload Scheduler for z/OS, a component that runs on every system in a complex. It acts as the communication link between the z/OS system that it runs on and the controller.
- See tracking IMS.
- A user who is authorized to monitor, manage, and modify workflows.
A group of tracked process variables and data, such as KPIs, from one or more BPDs or process applications. Tracking groups are used to monitor performance and report analyses of information.
In an RSR environment, an IMS that tracks the activities of active IMSs to provide disaster recovery support. A tracking IMS is usually geographically remote from the active IMSs. See also active IMS, Remote Site Recovery.
tracking intermediate event
An intermediate event that indicates a point in a process when runtime data is captured for reporting. See also intermediate event.
An identifying number assigned by a common carrier that is used to track the transportation of a shipment (usually parcels) through the carrier's transportation process. See also PRO number.
The XRF phase during which the active processes the IMS workload and the alternate maintains IMS control blocks to duplicate those in the active and uses surveillance to check the active for signs of failure.
See tracking IMS.
track space-efficient volume (TSE volume)
A volume in which storage space is allocated on an as-needed basis by using space on the target volume only when tracks are copied from the source volume to the target volume.
- A truck that is used to haul freight. See also asset.
- The mechanism that controls movement of continuous forms by means of the carrier holes.
See carrier hole.
Monies offered to a retailer by a manufacturer for the promotion of a set of products. This fund is usually allocated to pay for promotional activities on the part of the retailer, including ads, displays, and temporary price reductions.
See trade fund.
In WebSphere Commerce, a method by which buyers and sellers carry out business transactions. Depending on the edition of WebSphere Commerce, these methods may include: fixed price, contract, and RFQ.
A company, such as a manufacturer or a supplier, that agrees to exchange information using electronic data interchange, or an entity in an organization that sends and receives documents that are translated. See also external partner.
trading partner agreement
Information exchanged between trading partners that describes certain mutually agreed upon execution parameters and service level expectations that will be used when conducting business.
trading position container
A price list that contains offers, also known as trading positions. The trading positions in a trading position container are made available to customers by associating the trading position container with the terms and conditions of one or more contracts.
A profile that describes the technology and business capabilities of the trading partner that enable the partner to engage in electronic business with other trading partners. The profile links the trading partner with business processes to exchange documents with other partners.
- Characters used mainly in Taiwan and historic Chinese documents. Japanese Kanji and Korean Hanja characters are originally derived from traditional Chinese characters. See also Hanyu, Simplified Chinese.
- The Chinese character set expressed in traditional form. Traditional Chinese characters are used in Taiwan, China (Hong Kong S.A.R. of the PRC), and some other parts of the world.
Traditional Chinese double-byte character set
An IBM-defined DBCS for Traditional Chinese, consisting of Traditional Chinese non-Chinese set, primary set, secondary set, and up to 2,632 user-definable characters.
Traditional Chinese non-Chinese character set
A subset of the Traditional Chinese DBCS, consisting of non-Chinese characters, such as Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana, Hiragana, special symbols and Chinese phonetic symbols. There are 675 characters in this set.
traditional file management
The part of the operating system that controls the storing and accessing of traditional file objects (*FILE objects in the QSYS.LIB library) on a System i system. The data may be on internal storage (for example, database objects), on external media (diskette, tape, or printer objects), or on another system.
traditional line data
A form of line data that is prepared for printing on a line printer, such as 6262 or 3211. See also line data.
In QoS, control functions that are performed to enforce rules specified in a traffic conditioning agreement. Types of traffic conditioning include metering, marking, shaping, and policing.
A significant occurrence that happens at a given place and time involving a vehicle, road network, or traffic device. See also traffic incident.
A traffic event that has an adverse effect. See also traffic event.
A reporting mechanism that typically highlights good data as green, marginal data as yellow, and problem data as red. In most software packages that support traffic lighting, the user is able to define the numeric ranges that determine the color of a given value.
traffic management center (TMC)
The hub of a transportation management system. Information about the transportation network is collected and combined with other operational and control data to manage the transportation network and produce traveler information. It includes the combination of the hardware and software located in the center, including operators and maintenance personnel, policies and procedures and other entities.
traffic regulation anomaly
A deviation from normal network traffic patterns that is detected by an intrusion detection system. A traffic regulation anomaly could indicate a denial-of-service attack or a hacker who is monitoring connections to a web server.
A separator page that follows a printed file or a print job. See also job trailer.
The edge of the paper that proceeds into the printer last as it is fed from one of the paper supplies. For example, from the front of the IBM 3935 Advanced Function Printer, the trailing edge of the paper is the left-hand edge.
To set up a Watson instance with components that enable the system to function in a particular domain (for example: corpus content, training data that generates machine learning models, programmatic algorithms, annotators, or other ground truth components) and then making improvements and updates to these components based on accuracy analysis.
- The act of a collecting the signal pattern of a device to broadcast its known position at a site.
- The initial stage of model building, involving a subset of the source data. The model can then be tested against a further, different subset for which the outcome is already known. See also model building, testing, validation.
- A request by a transactor to the blockchain to execute a function on the ledger.
- A request and the response it generated.
- A group of data segments that have related data elements or fields. The group makes up a business document, such as a claim for services. The type of transaction is identified by a transaction code, such as B1 for Billing and N3 for Information Reporting Rebill.
- An atomic series of SQL statements that make up a logical unit of work. All of the data modifications made during a transaction are either committed together as a unit or rolled back as a unit.
- A specific set of input data that triggers a specific process or job. A transaction also can refer to a message destined for an application program.
- A logical unit of work that performs an activity such as order creation, inventory changes, payment authorizations, and other system events.
- A unit of processing consisting of one or more application programs, affecting one or more objects, that is initiated by a single request.
- An exchange between two programs that carries out an action or produces a result. An example is the entry of a customer's deposit and the update of the customer's balance. See also availability, conversation, session.
- A subprocess that represents a set of coordinated activities that are carried out by independent, loosely coupled systems in accordance with a contractually defined business relationship. This coordination leads to an agreed, consistent, and verifiable outcome across all participants.
- A process in which all of the data modifications that are made during a unit of processing are either committed together as a unit or rolled back as a unit.
- The processing of an integration message through the integration framework. A successful transaction is a message that processes with no errors. A transaction that encounters an error does not process the integration message to completion.
- An exchange between the user and the system. Each activity the system performs for the user is considered a transaction.
transaction abend code
A four-character code, defined by CICS or the user, that is used when abnormally terminating a transaction. CICS-defined transaction abend codes begin with the letter 'A'. A transaction abend code is used to indicate the cause of an error that may have occurred in CICS code or in a user program. See also transaction dump code.
Pertaining to an application program that is divided into segments, where each segment typically requests an I/O operation with a terminal user, giving up control to other application program segments for the duration of the I/O operation.
transactional data source
A data source that contains records and provides the measure values for cubes. In combination with one or more structural data sources, transactional data sources populate the model in Transformer. See also structural data source.
A mode of operation in which install and remove operations occur in two phases: the preparation phase and the commit phase. See also commit operation.
A DFSMS function that provides record-level sharing and transactional recovery for VSAM data sets. Transactional VSAM provides a data set access mode that is used by DBRC to provide parallel RECON data set access.
transaction backout program
A program (part of the emergency restart function) that is invoked during emergency restart, and that reads backout information (written to the restart data set by the recovery utility program) for task, message, DL/I, and file tables.
In SQL replication, a type of processing in which every transaction is replicated to the target table when it is committed in the source table. See also transaction-consistent replication.
transaction capabilities application part (TCAP)
Part of the SS7 protocol that provides transactions within the signaling network. A typical use of TCAP is to verify a card number, for the credit card calling service.
A channel that is available for the lifetime of a transaction. Containers in this channel are available to any program throughout the transaction, including any exit points that are API-enabled.
A subcontainer of a service policy that is used for finer-grained monitoring. See also message class.
transaction command security
The use of system definition macros and security maintenance utility control statements to permit specific application programs to issue some of the IMS operator commands.
In SQL replication, a type of processing in which the net result of all transaction updates is replicated to the target table. See also transaction-based replication.
transaction data file (TDF)
A file that serves as a filter between document files and the Gentran Server for Windows translator. For outbound processing, data is imported from a TDF file and translated to EDI format using a TDF Import translation object. The data is then ready to be posted and sent to a trading partner. For inbound processing, EDI documents that are received by Gentran Server for Windows can be exported to a TDF-formatted file using a TDF Export translation object. This data file is then ready to be processed or converted to internal application files.
A set of filters and maintenance schedules that are created in the Application Management Con-figuration Editor which are applied to the collected data and determine how that data is processed and displayed.
transaction dump code
A name of up to four characters by which a transaction dump will be known. When a transaction abend causes CICS to create a transaction dump, the associated transaction abend code is used as the transaction dump code. See also dump code, transaction abend code.
transaction dump table (TDT)
A CICS table which may contain an entry for each transaction dump code. See also dump code.
- A file containing data, such as customer orders, that is usually used only with a master file.
- In COBOL, an input-output file used to communicate with display stations and ICF sessions.
See transaction identifier.
- A unique name that is assigned to a transaction and is used to identify the actions associated with that transaction.
- A number associated with each of several request-parameter lists that define requests belonging to the same data transaction.
A CICS facility that offers storage protection between transactions, ensuring that a program of one transaction does not accidentally overwrite the storage of another transaction. See also storage protection.
transaction list table (XLT)
CICS control table containing a list of transaction identifications. Depending on a system initialization specification that can be changed during system termination, the transactions in a particular XLT can be initiated from terminals during the first quiesce stage of system termination. During CICS execution the suffix of an XLT can be entered at the master terminal - the transactions in that XLT can then be enabled or disabled as a group.
transaction load balancing
An optional facility that enables a transaction to be scheduled into more than one message or batch message region at the same time. See also load balancing.
- A software unit that coordinates the activities of resource managers by managing global transactions and coordinating the decision to commit them or roll them back.
- See sync point manager.
- A function that assigns identifiers to transactions, monitors their progress, and takes responsibility for transaction completion and failure recovery.
Transaction Manager database (TM database)
A database that is used to log transactions when a two-phase commit (SYNCPOINT TWOPHASE) is used with DB2 databases. If a transaction fails, the TM database information can be accessed to resynchronize databases that were involved in the failed transaction.
transaction manager domain
A CICS domain that provides transaction-related services to create, terminate, purge, and inquire on tasks; and manage transaction definitions and transaction classes. The transaction manager domain is designed to provide greater reliability and improved function; it has minimal impact on end users.
In SQL replication, a type of replication subscription-set processing in which the Apply program retrieves data from the source CD table, then applies the data to the target table in the same commit sequence that is used at the source. The Apply program processes transactions for all subscription-set members together, rather than sequentially. See also table-mode processing.
See base node.
transaction-oriented BMP program
A batch message processing program (BMP program) that performs transaction-type processing in a batch environment. A transaction-oriented BMP program obtains its input from the IMS message queues and can also use the message queues for output See also batch-oriented BMP program.
A style of computing that supports interactive applications in which requests submitted by users are processed as soon as they are received. Results are returned to the requester in a relatively short period of time. A transaction processing system supervises the sharing of resources for processing multiple transactions at the same time
Transaction Processing Facility (TPF)
An IBM platform for high volume, online transaction processing. It is used by industries demanding large transaction volumes such as airlines and banks. See also program update tape.
transaction processing system
An IMS in a multisystem environment that accepts transactions from the front-end system, calls application programs for transaction processing, and routes all replies back to the front-end system for response to the terminal. See also front-end system, pseudo-front-end system.
- A program that uses the Advanced Program-to-Program Communications (APPC) application programming interface (API) to communicate with a partner application program on a remote system.
- A program that processes transactions in an SNA network.
- A user-supplied application program for processing data received by the system from a finance device.
- The name by which each program participating in an LU 6.2 conversation is known. Normally, the initiator of a connection identifies the name of the program it connects to at the other LU. When used in conjunction with an LU name, a TPN identifies a specific transaction program in the network.
- In SNA LU 6.2 conversations, the name of the program at the remote logical unit that is to be the other half of the conversation.
transaction program network
The hierarchical structure of user or system transaction programs communicating at a synchronization level of none, confirm, or commit. When the synchronization level is commit, the transaction programs communicate over protected conversations using the two-phase commit protocol. In this case, the hierarchy consists of an initiator, optionally one or more cascaded initiators, and agents.
- An intercommunication facility that allows terminals or logical units connected to one CICS region to initiate and to communicate with transactions in another CICS region within the same processor system or in another CICS system connected by an APPC link.
- A CICS facility that provides support for inbound and outbound terminal requests from another CICS system connected by an advanced program-to-program communications (APPC) link.
A call to RACF each time a transaction identifier is entered at a terminal to verify that the terminal user or user ID associated with that terminal is permitted to run the transaction.
The basic business document in EDI data. Transaction sets are enclosed in an envelope that separates one transaction set from another. Groups of transaction sets that are functionally related are enclosed in a functional group envelope.
A generated column that is defined with the AS TRANSACTION START ID clause. The value is assigned whenever a row is inserted into the table or any column in the row is updated. A transaction-start-ID column is intended for use in a system-period temporal table. See also generated column, row-begin column, row-end column.
An affinity between a transaction and a particular CICS region, where the transaction interrogates or changes the properties of that CICS region. Transactions with affinity to a particular system, rather than another transaction, are not eligible for dynamic transaction routing. In general, they are transactions that use INQUIRE and SET commands, or have some dependency on global user exit programs, which also have an affinity with a particular CICS region.
transaction work area (TWA)
An optional extension of the TCA, used as a work area for a given task. The TWA can be used for the accumulation of data and intermediate results during the execution of the task. When the amount of working storage for a task is relatively static, the TWA may be used if data is accessed by different programs during task processing. This approach cannot be used for multiple transactions; the TWA is released automatically at task termination. See also common work area.
- A device capable of both transmitting and receiving signals. In mobile computing, transceivers are used extensively in geolocation. See also radio.
- In LANs, a physical device that connects a host interface to a local area network, such as Ethernet. Ethernet transceivers contain electronics that apply signals to the cable and that sense collisions.
- In communications, the device that connects the transceiver cable to the Ethernet coaxial cable. The transceiver is used to transmit and receive data.
- To copy an application EAR file to the server, usually by FTP. See also deploy.
- To send data from one location to another.
See committed page counter.
A document that is used to move inventory between facilities in a multi-plant environment. See also procurement transfer order.
See franchise pricing.
- Printing process at which the data set becomes visible to the operator, and is therefore the point at which all operator commands are directed.
- In nonimpact printers, the assembly where the toned image on the photoconductor is transferred to the paper.
- In OSI, a set of rules for the representation of user information while it is in transit between presentation layer entities. The transfer syntax is usually derived from the abstract syntax by use of encoding rules.
- In DCE Remote Procedure Call (RPC), a set of encoding rules used for transmitting data over a network and for converting application data to and from different local data representations. See also abstract syntax.
- A modification of one or more characteristics of a picture. Examples of picture characteristics that can be transformed are position, orientation, and size.
- A collection of installation-related changes that are applied to a Windows Installer database.
- An output from Spoon. When the transform is passed to the Kettle API, the data is migrated from one or more sources to a destination. The file is stored with a ktr extension.
- To translate a Java class file to an IBM i Java program.
- Programming logic that converts data from one format into another format.
- To change the composition of a data stream (AFP) to perform the same functions in a different data stream (ASCII).
- To change the form of data according to specified rules without significantly changing the meaning of the data.
- To convert a document from one form to another, such as using a purchase order formatted as an XML document to create the same purchase order formatted as an EDI document.
- In a virtual private network (VPN), a collection of authentication algorithms, Diffie-Hellman groups, and encryption algorithms that are used during both phases of negotiation.
A procedure that is used to transform the message for web services security message processing, such as the C14N (canonicalization) transform that is used for XML digital signatures.
- The conversion of data from one format to another. For example, converting flat Ffle data in a CSV format to XML data. Transformations can also suppress data, add data, alter data types, and perform calculations.
- A formula that is applied to the values of a field to alter the distribution of values. Some statistical methods require that fields have a particular distribution. When a field's distribution differs from what is required, a transformation (such as taking logarithms of values) can often remedy the problem.
- A HATS resource that specifies how to convert components of a host screen into widgets on a web page.
- The process of changing data from one format or structure to another format or structure.
- In GL, a four-by-four matrix that helps determine the location of a three-dimensional drawing, the position of the viewpoint (the viewer's "eye"), and the amount of the scene that will be encompassed and visible. Transformations occur at four points within the graphics pipeline: modeling transformation, viewing transformation, projection transformation, and viewport transformation.
transformation model element
An element of the transformation model in a fact build. A transformation model element can be a dimension, a derived dimension element, a measure, an attribute, or a derivation.
For Enterprise Service Tools, an application transformation style that changes the way in which enterprise applications are accessed and transforms the way in which the enterprise application is used. Instead of having to run a CICS application by connecting to a particular server, customers can invoke the CICS application across the company intranet or across the internet.
- A kernel services that converts the application model from a logical description into a topology document that is used to deploy the virtual application.
- A device that converts power from one circuit to another at the same frequency, but at a changed voltage and current.
A function of the i5/OS operating system that converts PostScript Level 1 spooled files to output. This output can be printed on either IBM Advanced Function printers (i5/OS system printers) or Hewlett Packard Printer Control Language printers (commonly used PC printers).
See transaction identifier.
- In Sterling Connect:Direct for z/OS, a CICS temporary storage queue in which event data is stored so that a client application can retrieve the information.
- A file to which runtime messages are written under CICS. A transient data queue also is a sequential data set used by the Folder Application Facility in CICS to log system messages.
In OSI, an error that occurs once or at unpredictable intervals--for example, network congestion. See also permanent error.
In OSI, an event that indicates the occurrence of an intermittent error or an error that can be recovered through retry. Transient events are logged but do not result in messages to the operator. See also permanent event.
A library routine that is loaded at run time. See also resident routine.
A session token, such as a cookie or a parameter. See also session token.
transit delay processing
In OSI, an X.25 quality-of-service function that keeps track of delays that data encounters on the way to its destination. Any node that receives a call packet can reject it if the transit delay exceeds the maximum specified by the sender.
- A relationship between two states indicating that an object in the first state performs certain specified actions and then enters the second state when a specified event occurs and specified conditions are satisfied. On such a change of state, the transition is said to fire.
- A connection between two tasks in a rule flow. Transitions are unidirectional, and they can have conditions attached to them.
- A Boolean expression that determines when processing control should be passed to the targeted node.
- In a rule flow, a specification of a transition that dictates when the target task can be executed.
A temporary table that contains all of the affected rows of a subject table in their state before or after a triggering event occurs. Triggered SQL statements in the trigger definition can reference the table of changed rows in the old state or the new state. See also table locator.
A variable that is valid only in FOR EACH ROW triggers. It allows access to the transition values for the current row. An old transition variable is the value of the row before the modification is applied, and the new transition variable is the value of the row after the modification is applied.
- To check source code of an automatic class selection (ACS) routine for syntactic and semantic errors. If no errors exist, the translation process generates an object table from the source code and places the object table into a specified source control data set (SCDS).
- In computer graphics, to move all or part of a display image on a display space from one location to another without rotating the image.
- The movement of an object by a specific distance.
- In computer graphics, the movement of a display image along a straight line from one location to another.
A translation productivity tool comprising a database containing segments of source and target language texts that have been aligned to match each other. Translation memories are used to retrieve previously translated material as in the case of new versions of existing documents.
- A source map that has been compiled to provide instructions for translating from one format to another in a way that can be interpreted by the translator.
- A set of rules that instruct the translator how to convert a file from one format to another. Every function performed during translation requires a translation object. Translation objects are used to control all the functions of Gentran Server for Windows EDI translation.
A source file together with all headers and source files included via the preprocessing directive #include, less any source files skipped by any of the conditional inclusion preprocessing directives.
translation verification test (TVT)
All testing necessary to review and correct the translated software or hardware user interface, run-time messages, and on-line help, after build or integration and compilation, in order to verify that the translation has not been altered or corrupted by these processes. This testing includes a review for screen layout, truncation, localized links, mixing of languages, and for consistency and accuracy of the translation in context. See also globalization verification test.
- An engine that processes data for Gentran Server for Windows, the Application Integration subsystem, and the Forms Integration subsystem.
- A Jazz model object that describes a single build step in which a translator executable program is invoked with the required inputs and outputs. Inputs and outputs are the same as z/OS data sets or IBM i libraries, so a translator must reference multiple data set or library definitions.
- An engine that translates data.
- An i5/OS component that performs the final step in a program or module compilation. In the Integrated Language Environment (ILE) model, this is called the optimizing translator.
To map correspondences from one writing system to another. For example, non-ASCII characters are often transliterated to equivalent ASCII characters. See also Romanization, transliterator, writing system.
An entire file that is submitted electronically, unless it is a batch. A transmission includes telecommunication routing information, identification, and other information that applies to the entire collection of data.
- A control character used to control or facilitate transmission of data between data terminal equipments.
- In data communications, a special character that can be included in a message to control communications over a data link. For example, the sending station and the receiving station use transmission control characters to exchange information; the receiving station uses transmission control characters to indicate errors in data it receives.
Transmission Control Index
In Sterling Connect:Direct for z/OS, a VSAM relative record data set file that contains a record with bitmaps to indicate the availability of space in the transmission control queue.
transmission control layer
In SNA, the layer within a half-session that synchronizes and controls the speed of session-level data traffic, checks sequence numbers of requests, and enciphers and deciphers end-user data.
Transmission Control Protocol (TCP)
A communication protocol used in the Internet and in any network that follows the Internet Engineering Task Force (IETF) standards for internetwork protocol. TCP provides a reliable host-to-host protocol in packet-switched communication networks and in interconnected systems of such networks. See also Internet Protocol.
Transmission Control Protocol/Internet Protocol (TCP/IP)
An industry-standard, nonproprietary set of communication protocols that provides reliable end-to-end connections between applications over interconnected networks of different types. See also communication method.
transmission control unit (TCU)
A communication control unit whose operations are controlled solely by programmed instructions from the computing system to which the unit is attached. No program is stored or executed in the unit. Examples are the IBM 2702 and 2703 Transmission Controls. See also communication controller.
transmission group (TG)
In SNA, a group of links between directly attached nodes appearing as a single logical link for routing messages. A transmission group may consist of one or more SDLC links (parallel links) or of a single System/370 channel. For type 2.1 nodes in System i networks, a transmission group can only be a single-link connection.
transmission group vector
A representation of an endpoint TG in a T2.1 network that consists of two control vectors: the TG Descriptor (X'46') control vector and the TG Characteristics (X'47') control vector.
transmission header (TH)
In SNA, control information, optionally followed by a basic information unit or a basic information unit segment, that is created and used by path control to route messages within the network.
See telecommunication line.
In a printer, a number designating the number of transmissions of a particular print data set or file. PSF uses the transmission number to select the appropriate form environment group.
transmission priority (TP)
A rank assigned to a message unit that determines its precedence for being selected by the path control component in each node along a route for forwarding to the next node in the route. The four possible values are low, medium, high, and network.
See message channel agent.
A group of four transmission characters. See also data word.
- A picture or text on an acetate sheet designed to be viewed by light shining through it.
- Terminal attribute whereby data is not translated between terminal and main storage representation on read or write requests. This allows the transmission of all 256 possible byte values.
- See transparent text mode.
- In asynchronous communications, a method of hiding certain ASCII control characters from modems or asynchronous devices.
- Data that can contain any hexadecimal value.
- A set of code points that is interpreted as presentable data, not as control data. In the AFP architecture, transparent data is identified with a control byte and a count of the number of bytes that follow.
A mode of binary synchronous transmission in which transmission control characters are treated as text unless they are preceded by the data link escape character (DLE). See also nontransparent mode.
The process that is used to automatically recall a migrated file to a workstation or file server when the file is accessed. See also selective recall.
transparent text mode
In binary synchronous communications, a method of transmission in which only transmission control characters preceded by the DLE control character are processed as transmission control characters.
- A protocol that provides the information needed by the product to communicate with other messaging software systems.
- A physical connection to a database. A transport can be reused by multiple logical connections.
- The request queue between a web servers plug-in and a web container in which the web modules of an application reside. When a user requests an application from a web browser, the request is passed to the web server, then along the transport to the web container.
- To restore a transportable set from a backup image into a database other than the one from which the backup image was taken.
- A communication layer that allows the product to send and receive data between the user data source and a pipeline. Examples of transports include the HTTP transport, the queue transport, the database transport, and the file transport.
- A service plug-in for WebSphere Developer that manages the connection between a CARMA hierarchy and its CARMA host. The CARMA transport packages and sends commands from the CARMA hierarchy and returns responses from the CARMA host.
- The process or protocol mechanism of transferring an XML message or document between parties as part of a meaningful, reliable exchange. The most common transports for web services are SOAP/HTTP, SOAP/HTTPs, and SOAP/JMS.
An adapter (such as an HTTP Adapter) that is used with an encoding/decoding adapter to support various protocols (for example, SOAP) in a transport-independent way. The transport adapter is used to transport the data either from the source or to the destination.
transportation prediction feature
A feature that anticipates traffic conditions within an hour from the current time, provides customized reports, and configures data collection, enablement, and calculation in the administration portlets.
A network protocol stack that is used for I/O operations in an application server environment. Transport chains are part of the channel framework function that provides a common networking service for all components.
- In OSI architecture, the layer that provides services for flow control and recovery between open systems with a predictable quality of service.
- A network service that provides end-to-end communication between two parties, while hiding the details of the communication network. The Transmission Control Protocol (TCP) and ISO TP4 transport protocols provide full-duplex virtual circuits on which delivery is reliable, error free, sequenced, and duplicate free.
A record that describes the document delivery protocol. It identifies the protocol, such as HTTP, FTP, or SMTP. It also details the use of the protocol, such as HTTP configured with SSL for secure data exchange.
transport staging database
A temporary database that is created as a part of a transport operation. The transport staging database is used to extract data and logical objects from a backup image and, if necessary, bring them to a point of transactional consistency before they are re-created in the target database.
The time allotted for transporting materials from the workstation where the preceding operation took place to the workstation where the current operation is to occur. The transport time is used only for planning purposes. Operations will be started irrespective of the transport time specified.
- An unprogrammed, hardware-initiated, conditional jump to a specific address. A trap occurs as a result of an error or certain other conditions. A record is made of the location from which the jump occurred.
- In the Simple Network Management Protocol (SNMP), a message sent by a managed node (agent function) to a management station to report an exception condition.
- A special statement used to catch signals within the z/OS shell.
- In REXX, to recognize that a currently enabled condition occurred and to perform the CALL or SIGNAL instruction specified when the condition trap was enabled.
- An unsolicited event generated by an agent and forwarded to a manager. Traps inform the manager of changes that occur in the network.
A path that directs an extract or archive process through related tables specified in an access definition. It begins at the start table and proceeds through the data model and all relationships from parent to child.
See Transformation API for XML.
See table reference character.
A rule that assigns an offer to a smart segment. The assignments are further constrained by the custom-defined zone associated with the offer in the treatment rule. Each treatment rule also has a marketing score. If a customer is assigned to more than one segment, and therefore more than one offer is applicable, the marketing scores help define which offer Interact suggests.
An XML format that is used for Text REtrieval Conference information retrieval competitions sponsored by NIST. TREC format is supported as an intermediate file format that can be used during ingestion.
- A data structure whose elements are linked in a hierarchical fashion.
- A hierarchical collection of nodes that can have an arbitrary number of references to other nodes. A unique path connects every two nodes.
A visualization of hierarchical data. Each object in the hierarchy is represented as a rectangle. The child objects of a parent object rectangle are represented by nonoverlapping rectangles inside the parent object rectangle. The area of a rectangle is typically proportional to a property of the object that can be viewed as distributed across its child objects.
- See traceability tree.
- A view that provides a hierarchical view of an object and the objects that it contains.
- A subject that is algorithmically determined to be more popular than other current subjects. See also aggregator, leaderboard.
- A series of related measurements that indicates a defined direction or a predictable future result.
- A license key that provides clients access to an application for a specified time for product evaluation purposes. See also permanent license key.
- A temporary entitlement to use a licensed function.
A shipment of goods that is ordered from one intercompany or supplier location, delivered directly to a second location, and billed to a third location. For example, if IBM Dublin orders goods from Hungary and has the Hungarian supplier ship those goods to IBM France and bill the Dublin site, that is a triangular shipment.
A collection of collocated squads that are thematically linked to a larger project (like backend infrastructure or an entire component). Tribes are analogous to a small organization within the company. Tribes are meant to be smaller than 100 people to reduce the amount of wasted time caused by bureaucracy and politics. See also chapter, gathering, guild, squad.
- An event or condition that causes the software to execute a program or script. Users can predefine triggers.
- A representation of dependencies between workflow tasks that joins activities in a sequence job. Activities typically have one input trigger, but multiple output triggers.
- A monitor that specifies one or more standard programs or built-in actions to be executed whenever a certain ClearCase operation is performed.
- In profiling, an event that causes transitions between states in a states engine, such as, the loading of a web page or the appearance of a window on the desktop.
- A mechanism that detects an occurrence, and can cause additional processing in response. Triggers can be activated when changes occur in the device context. See also device context.
- A condition that signals that a risk factor should be monitored.
- An action that precipitates other actions.
- A mechanism that detects an occurrence and can cause additional processing in response.
- A user-defined point or set of points during a session at which an event is activated.
- To initiate or reinitiate copying between a pair of volumes that have a copy relationship.
- A database object that is associated with a single base table or view and that defines a rule. The rule consists of a set of SQL statements that runs when an insert, update, or delete database operation occurs on the associated base table or view. See also after trigger, before trigger, delete trigger, insert trigger, instead of trigger, trigger activation, trigger activation time, trigger granularity, update trigger.
- In the Application Lab, a condition that, when satisfied, starts a process.
- In database technology, a program that is automatically called whenever a specified action is performed on a specific table or view. See also read trigger.
- A specific event or start date that activates an automated message.
- A mechanism that initiates actions. Triggers can be explicitly fired by a user or fired on behalf of a user by an external event source.
- Data values for which AFP Conversion and Indexing Facility (ACIF) searches, to delineate the beginning of a new group of pages. The first trigger is then the anchor point from which ACIF locates the defined index values.
A set of actions (high-level language statements, SQL statements, or i5/OS utilities) that are performed automatically when a specified change operation (trigger event) occurs on a specified table or file.
The process that occurs when the trigger event that is defined in a trigger definition is executed. Trigger activation consists of the evaluation of the triggered action condition and conditional execution of the triggered SQL statements. See also after trigger, before trigger, trigger, trigger activation time, trigger event.
trigger activation time
An indication in a trigger definition of whether the trigger should be activated before or after a trigger event. See also after trigger, before trigger, trigger, trigger activation, trigger event.
The set of triggered SQL statements that is run when a trigger is activated and its triggered action condition evaluates to true. See also triggered action, triggered action condition, triggered SQL statement.
The SQL logic that is performed when a trigger is activated. The triggered action consists of an optional triggered action condition and a set of triggered SQL statements that is run only if the triggered action is true. See also trigger body, trigger event, triggered action condition, triggered SQL statement.
triggered action condition
An optional part of a triggered action. This Boolean condition is defined by a WHEN clause and specifies a condition that is evaluated to determine whether the triggered SQL statements should be run. See also trigger body, triggered action, triggered SQL statement.
A local queue, usually an application queue, that has triggering enabled so that a message is written when a trigger event occurs. The trigger message is often written to an initiation queue.
triggered SQL statement
One of a set of SQL statements that is run when a trigger is activated and its triggered action condition evaluates to true. The set of triggered SQL statements is also called the trigger body. See also trigger body, triggered action, triggered action condition.
- In a CREATE TRIGGER statement, the specification of an insert, update, or delete operation on a specified table that activates the trigger. See also trigger activation, trigger activation time, trigger granularity, triggered action.
- An event, such as a message arriving on a queue, that causes a queue manager to create a trigger message on an initiation queue.
- A change operation that calls the trigger action to be run. The trigger event can be an insert, update, or delete operation in any high-level language and in SQL.
In BMS, a field that is transmitted to the host processor as soon as the terminal operator has modified the field and then tries to move the cursor out of it. You can use display trigger fields to initiate input to an application program. The trigger attribute is ignored if the operator has not modified the trigger field.
In SQL, the characteristic of a trigger that determines whether the trigger is activated only once for the triggering SQL statement or once for each row that the SQL statement modifies. See also trigger, trigger event.
The specified operation in a trigger definition that causes the activation of that trigger. The triggering event is comprised of a triggering operation (insert, update, or delete) and a subject table or view on which the operation is performed.
The number of records written to an intrapartition transient data destination or queue that will cause CICS to automatically initiate a task to process that queue. See also automatic transaction initiation.
- A program that responds to trigger conditions on a message queue by starting a transaction. A trigger monitor is usually a continuously-running program.
- A continuously running application that serves one or more initiation queues. When a trigger message arrives on an initiation queue, the trigger monitor retrieves the message. It uses the information in the trigger message to start a process that serves the queue on which a trigger event occurred.
- Eliminating those parts of a picture that are outside of a clipping boundary such as a viewing window or presentation space. See also viewing window.
- Removal of records or bytes that are no longer required.
Triple Data Encryption Algorithm (TDEA, Triple DEA)
An encryption method that applies the Data Encryption Standard (DES) algorithm three times to the data. See also Data Encryption Standard.
Triple Data Encryption Standard (3DES, Triple DES)
A block cipher algorithm that can be used to encrypt data transmitted between managed systems and the management server. Triple DES is a security enhancement of DES that employs three successive DES block operations.
See Triple Data Encryption Algorithm.
See Triple Data Encryption Standard.
- In architecture, a three-part self-defining variable-length parameter consisting of a length byte, an identifier byte, and one or more parameter-value bytes.
- A length byte, a type byte, and one or more parameter-value bytes in a Formatted Data Object Content Architecture (FD:OCA) descriptor.
- A byte composed of three binary elements. (I) (A)
See talent management system report.
A computer program that appears to perform a useful and innocent function but contains hidden functions that use approved authorizations assigned to users when they start the program. For example, it may copy internal authorization information from a computer and send it back to the originator of the Trojan horse.
A connected voice path which enters an IVR from a switch on one circuit, then returns to the same switch on a parallel circuit. Two IVR ports and two circuits are consumed, but in some circumstances this might be the only way to make a connection between two callers if the attached switch does not support a Call Transfer function.
See test readiness review.
The percentage of weight of a shipment that is on the truck for the duration of the shipment. A highly efficient truckload is one in which most of the load (measured by weight) travels most of the distance from the origin to the final destination.
See task-related user exit.
True Image data view
A data view that allows a file to be restored in the event of accidental deletion. It consists of point-in-time images that provide a near-instant virtual copy of an entire storage volume.
A custom visitor path scenario that can be defined using the TruePath Builder within the Digital Analytics Tools Browser plug-in. Users can measure the success of visitors navigating through online processes such as check-out, registration, and online applications; or of visitors completing calls-to-action on specific marketing landing pages.
- To end a computational process in accordance with a rule; for example, to end the evaluation of a power series at a specified term.
- To cut off data that cannot be printed or displayed in the line width specified or available. See also fold.
- To shorten a field, value, statement, or string.
- The process of discarding part of a result from an operation when it exceeds memory or storage capacity.
- In printing, the planned or unplanned end of a print line when there are more characters for the line than can be printed.
- In the CVS team development environment, the main stream of development, also referred to as the HEAD stream.
- A telephone connection between two central offices or switching devices. In DirectTalk, a trunk refers to 24 or 30 channels carried on the same T1 or E1 digital interface. See also channel.
- In telephony, circuits that connect two switching systems, as opposed to connecting a customer line to a switching system.
A set of trunked inter-switch links (ISLs). See also ISL Trunking.
A port that is employed in a trunking group. See also ISL Trunking.
trunk interface card (TIC)
The component of the VPACK that manages the trunk connection to the switch. See also base card.
An integrated configuration between the security server of the product and third-party security servers. A reverse proxy server acts as a front-end authentication server, while the product applies its own authorization policy onto the resulting credentials passed by the proxy server.
trust association interceptor (TAI)
The mechanism by which trust is validated in the product environment for every request received by the proxy server. The method of validation is agreed upon by the proxy server and the interceptor.
- Pertaining to a federated wrapper that is defined to run in the database manager process. See also fenced.
- Pertaining to the control of a security policy.
A database connection whose attributes match the attributes of a unique trusted context that is defined at the database server. See also explicit trusted connection, implicit trusted connection.
A consumer that can share authorization with other trusted consumers and does not require user approval to access data. A consumer must be designated as trusted in an access request to become a trusted consumer.
trusted context default role
The role that is inherited by all users of a trusted context unless it is overridden by a user-specific role in the trusted context definition. See also trusted context user-specific role.
trusted context user-specific role
A role that is associated with a specific trusted context user. It overrides the trusted context default role if the current user ID on the trusted connection matches the ID of the specific trusted context user. See also trusted context default role.
trusted node security
In Sterling Connect:Direct for z/OS, a security feature that allows a local node to enforce more restrictive security parameters when dealing with specific trading partner remote nodes. See also data direction restriction.
A privileged relationship between two entities such as a middleware server and a database server. This relationship allows for a unique set of interactions between the two entities that would be impossible otherwise.
- In the Secure Sockets Layer (SSL), the public key and associated distinguished name of a certificate authority (CA).
- A certificate signed by a trusted certificate authority (CA). See also certificate authority, intermediate certificate.
- A certificate authority's certificate merged into the Domino Directory, client's browser, or the server's key ring file, which allows clients and servers to communicate with any client or server that has that certificate authority's certificate marked as trusted.
- The foundation upon which chains of trust are built in certificates. Trusting a CA root means that all certificates issued by that CA can be trusted.
trusted root certificate file
A file stored in a local directory on a client system that contains a list of trusted sources. During communications connections, the client compares the server certificate to the trusted root certificate file to determine whether the server certificate was signed by a trusted source. The client can establish a secure communications connection if a trusted source signed the server certificate.
A trusted list of certificates that are used to control the trust and validity period of certificates. It enables the trust of certificates issued by a certificate authority to be limited.
An established and trusted communication path through which a computer in one domain can communicate with a computer in the other domain. Users in a trusted domain can access resources in the trusting domain.
- In security, a storage object, either a file or a hardware cryptographic card, where public keys are stored in the form of trusted certificates, for authentication purposes in web transactions. In some applications, these trusted certificates are moved into the application keystore to be stored with the private keys. See also keystore.
- A key database that holds signer certificates for only the target servers that the user trusts. See also signer certificate.
A nodelocked license that has a fixed duration and a start date equal to the date when the license is enrolled. A try-and-buy license is made available for purposes of evaluating the application, and can be replaced by a production license after evaluation.
A C++ block in which a known exception is passed to an exception handler. See also catch block.
See transport-layer service access point.
See transport-layer service data unit.
See track space-efficient volume.
In WebSphere Voice Server, a process that controls which engine processes are being used at any time. Requests for an engine by a WebSphere Voice Server Client are accepted or rejected depending on whether an engine meeting the Tsm Client's criteria is available.
See Time Sharing Option.
See Time Sharing Option Extensions.
See Time Sharing Option single point of control.
See transmission services profile.
See terminate-and-stay-resident program.
See Technical Support Services.
See temporary storage table.
See temporary-text-delay character.
See time to live.
See tape table of contents.
See track record address.
See terminal type.
See Terminal User Control Block.
Pertaining to printing on both sides of a sheet of paper such that the bottom of the printed image on one side of the paper is juxtaposed against the top of the printed image on the other side of the paper. See also simplex.
Printing on both sides of the paper such that the top of one side is at the same end as the bottom of the other side. Tumble duplex printing is used for forms that are bound on the short edge of the paper, regardless of whether the printing is portrait or landscape. See also duplex, normal duplex.
tumbling set function
A function that performs calculations on a windowed set of the rows in a view. The set of rows to include is determined when a new data stream arrives, and the set empties when full.
See network tunnel.
- See IP tunnel.
- An L2TP access concentrator (LAC)-L2TP network server (LNS) pair. A tunnel carries Point-to-Point Protocol (PPP) datagrams between the LAC and the LNS. There may be many sessions in a single tunnel. A control connection that operates in the tunnel controls the establishment, release, and maintenance of sessions and the tunnel itself.
See trace utility program.
- An ordered collection of two or more members from different dimensions. For example, the tuple (2007, Camping Equipment, Japan) returns the value for the intersection of the three members: 2007, Camping Equipment, and Japan. Tuples can be used to filter and sort data, and to create calculations.
- A data structure that contains a given number of elements in a given order. In a relational database, a tuple represents a row or record of a table in the database.
- An individual piece of data in a stream that is represented as a set of attributes and data values. Typically, the data values in a tuple represent a single observation of data, such as a stock ticker quote or a temperature reading from an individual sensor. See also operator.
- In a multi-version RDBMS, a row that is valid for a specific transaction timeframe.
- See row.
- An XML structure that is used to group concepts in an XBRL taxonomy that must be understood together.
See tie-up record.
See Traversal Using Relay around NAT.
A series of instructions that the system uses to create a turnaround document (a logical response document to the source) from an inbound (source) document, by transferring data from the source document to elements in the target document (translation object).
- The elapsed time between entry of the first character of the first input into the input interface and the passage of the last character of the last output through the output interface.
- In communications, the time required to reverse the direction from sending to receiving or from receiving to sending on a communications line.
- The total time consumed from the start to the completion of a specific unit of work measured at specific interfaces. When multiple inputs and/or multiple outputs are parts of one unit of work, intermediate turnaround time specifications may be needed.
Information designed around specified learning objectives and broken into smaller chunks of information, such as lessons. A tutorial allows a user to interact with a product example to learn the requisite base knowledge of a technology, concept, or product. A tutorial teaches fundamental distinctions, skills, and approaches to using a product or technology more effectively.
Tutorial System Support
An education course, supplied with the operating system licensed program, that provides introductory education for a variety of computer users, including system operators and business and data processing professionals. Tutorial System Support is part of the total IBM curriculum for the System i platform, which consists of classroom training and other methods of self-study.
See time variance.
See translation verification test.
See tape volume table of contents.
See transaction work area.
- A message that cannot exceed 140 characters and is posted on Twitter. See also hashtag, social network, social networking.
- To post a message on Twitter. See also social network, social networking.
A 5250-based workstation using a twinaxial cable to connect to the system. The twinaxial console and the Operations Console can be a backup console for each other. See also alternate console, backup console, Operations Console.
twinaxial data link control (TDLC)
A communications function that allows personal computers, which are attached to the work station controller by twinaxial cable, to use advanced program-to-program communications (APPC) or Advanced Peer-to-Peer Networking (APPN) support.
In a database, all child segments of the same segment type that have a particular instance of the same parent segment type. Root segments are also considered twins to each other. See also physical twins, sibling segments.
Pertaining to a transmission medium that consists of two insulated conductors twisted together to reduce interference. For example, twisted-pair wiring can be used as an alternative to twinaxial cable.
See tiered entry workload license charge.
A business activity comprised of the following message choreography: Partner A sends a business action to Partner B, Partner B sends a Receipt Acknowledgement signal back to Partner A, then later Partner B sends a response business action to Partner A, and Partner A sends a Receipt Acknowledgement back to Partner B. When these messages have been exchanged successfully between these trading partners, the activity is deemed complete. For RosettaNet, PIP 3A4 (Manage Purchase Order) is an example of a PIP that specifies a two-action activity.
A hardware feature with which an I/O device can be attached to two channels. A dynamic switch can be added, which makes it possible for both interfaces to be enabled at the same time with channel selection determined by programming.
two-dimensional bar code
See stacked bar code.
A two-step process by which recoverable resources and an external subsystem are committed. During the first step, the database manager subsystems are polled to ensure that they are ready to commit. If all subsystems respond positively, the database manager instructs them to commit. See also distributed transaction.
A radix complement in the pure binary numeration system. The twos complement is derived by taking the ones complement and then adding one to the resulting number. In a twos complement system, the twos complement of a number n is -n.
A clustering method that involves preclustering records into a manageable set of subclusters, and then applying a hierarchical clustering technique to those subclusters to define the final clusters.
two step movement
See two step putaway.
two step putaway
A putaway, or movement, task that requires the use of two separate pieces of material handling equipment and, therefore, two steps to complete the task. For example, a pallet jack may be used to transport a pallet to the end of a rack aisle, but a fork lift truck would be necessary to lift the pallet onto the rack. The system would be set to plan for two steps directing the pallet jack operator to deliver the pallet to a drop-off location, and the fork lift truck operator to pick up the pallet from the drop-off location.
In X.25 communications, a logical channel that allows both incoming and outgoing calls. See also one-way channel.
See teletypewriter exchange service.
See telex interface program.
See type coercion.
- A characteristic of a message element that describes its data content.
- In Ada language, a set of values and the set of operations that apply to those values.
- In a WSDL document, an element that contains data type definitions using some type system (such as XSD).
- An object that defines a data structure.
- In DCE X/Open Object Management (XOM), a category into which attribute values are placed on the basis of their purpose.
- A characteristic that specifies the internal format of data and determines how the data can be used.
- A description of data characteristics. The descriptions include the operations that can be performed on or by the data. See also data type.
- In Enhanced X-Windows, an arbitrary atom used to identify the data.
- In Java programming, a class or interface.
- A class of objects. All objects of a specific type can be accessed through one or more of the same interfaces.
- The definition of a data object or set of data objects that is graphically represented in a type tree in the Type Designer.
A command, generally preceded by a leading slash character, that can be entered from any valid IMS command source. See also type-2 command.
type 1 font
See outline font.
type 1 GUID
A globally unique identifier (GUID) that is generated using a combination of the generating system's MAC address, a time stamp, and a large random number. There is a very high probability that a type 1 GUID will be unique. See also globally unique identifier.
A command that is entered only through the OM API. Type-2 commands are more flexible and can have a broader scope than type-1 commands. See also type-1 command.
type 3 GUID
A globally unique identifier (GUID) that is generated by a uni-directional hash of textual or binary data. The same data always produces the same GUID, however there is a very low probability that other data will produce the same GUID. See also globally unique identifier.
- A pivoted type carrier having a type slug at its free end. (T)
- A bar, mounted on an impact printer, that holds type slugs. (I) (A)
type coercion (TyCor)
The step in the process of identifying the correct answer that determines the question type information. One or more lexical answer types (LATs) and a candidate answer are the inputs to type coercion scoring.
- A routine or set of routines that enables an application to change a specified string of data from one declared type to another. In AIXwindows programming, type conversion is performed on strings using conversion information contained in the MRM database.
- See boundary alignment.
typed collection variable
An ESQL/C collection variable or SPL variable that has a defined collection data type associated with it and can only hold a collection of its defined type. See also untyped collection variable.
All characters of a single type family or style, weight class, width class, and posture, regardless of size. An example is Helvetica bold condensed italic, in any point size. See also font.
- All characters of a single design, regardless of attributes, such as width, weight, style, and size; for example, Courier, Gothic, or Helvetica.
- A complete character set of a font.
- All the type sizes and styles of one typeface. The group shares a common design but can differ in attributes such as character width and weight (examples are roman and italic, condensed and ultra bold). A typical font family contains four typestyles: Roman, Italic, Bold, and Bold Italic.
- The complete context for a Java class or interface including its superclasses and subclasses.
- A relationship that you define among named row data types in which subtypes inherit representation (data fields) and behavior (routines) from supertypes and can add more fields and routines.
A measurement level used for data that does not conform to any of the other measurement levels (continuous, categorical, flag, nominal or ordinal). The typeless measurement level can also be used for fields with a single value, or for nominal data where the set has more members than the defined maximum. It is also useful for cases in which the measurement level would otherwise be a set with many members (such as an account number).
The process of converting an atomic value from an earlier data type to a later data type in an ordered sequence. One example of an ordered sequence is INTEGER, DECIMAL, FLOAT, DOUBLE; another example is anyURI, string. Type promotion can be used, for example, in function calls and in the processing of operators that accept numeric or string operands.
A method for ensuring strict typing in C++ by resolving references to functions only when argument types and return values match or have defined conversions, as well as matching function names.
- Pertaining to material that has been set in type.
- To arrange the type on a page for printing.
The type system defines the types of objects (feature structures) that may be discovered by a text analysis engine in a document. The type system defines all possible feature structures in terms of types and features. Any number of different types can be defined in a type system. A type system is domain and application specific.
- The horizontal size (set size) of a given typeface. The width may be given in units of measurement, such as set 9 point, or it may be descriptive, such as ultra-condensed, condensed, and expanded.
- A parameter indicating a relative change from the font's normal width-to-height ratio. Examples are normal, condensed, and expanded.
See proportionally spaced font.