An action is a SQL statement defined as part of a format within a format specification file.
An action defines a function to perform in a subscription. An action must contain at least one option name-value pair.
A component that provides an interface between an internal application and external applications or messaging systems. An adapter detects events and validates event contents. In Sybase Enterprise Event Broker, adapters pass events to an inflow processor. Adapters also receive events at outflow processors and export the events to external applications.
The adapter runtime environment includes the Adapter Shell, e-ADK Shared Libraries, shared data dictionary, and error catalogue files. The ARE is required for testing and running the adapters that are run on the customer’s server.
A special form of compound format where one format in a set of alternatives applies to a message. For example, if the alternative format is named A, it may contain component formats B, C, and D. A message of format A may actually be of variation of only B, C, or D.
The standard code used for information interchange among data processing systems, data communication systems, and associated equipment. The code uses a coded character set consisting of 7-bit coded characters (8 bits including a parity check). The ASCII set consists of control characters and graphic characters.
Functional Acknowledgement. An EDI functional acknowledgement that indicates successful transmission of a file and whether or not the file passed syntactical edits within the receiver’s translator. Similar in function to the green return receipt one receives from the U.S. Postal Service when sending certified mail. Getting the card back indicates the letter was delivered – it does not validate that the contents of the letter were read, understood, or any action was taken as a result of receiving the letter. There are three types of functional acknowledgements. The first type is Group Accepted. The second type is Group Accepted, but Errors Were Noted. The third type is Group Rejected.
A Java program that runs within the web browser. When using Java on the Web, an applet is an HTML-based program built with Java that a browser temporarily downloads to and runs fro a user’s hard disk. Java applets can be used to add background music, real-time video displays, animation, and interactivity such as calculators and games to Web pages without having to send a user request back to the server.
Also called endpoint. These are applications such as General Ledger, Patient Admitting, or Materials Planning that run on computers attached to a network. Endpoints can be connected to other endpoints using adapters and an integration engine.
The communication layer for inbound and outbound data to and from an SAP system.
The interface (calling conventions) by which an application program accesses services. An API is defined at source-code level and provides a level of abstraction between the application and the kernel or other privileged utilities to ensure portability of the code.
In New Era of Networks Rules, an argument is evaluation criteria made up of fields from a message and associated operators. It is a standard encoding for alphanumeric data.
In electronic messaging, a method of operation in which receiving applications are loosely coupled and independent. The receiver need not respond immediately to a message, and the sender does not have to wait for a response before proceeding with the next operation. Compare to synchronous.
A method of handling computer operations in which requests for operations are grouped for periodic processing. Compare to transaction processing.
A collection of bytes containing data. It is generally stored as a flat file containing multiple, delimited records and is terminated by a number that specifies the length of the file.
A physical link between network servers that are not tightly connected via TCP/IP.
A network description parameter that describes the physical link. A logical representation of a connection between two network servers that reside on separate network LANs.
A software component that allows one integration engine to communicate with another.
See integration server.
A type of middleware that connects clients and servers.
A program that executes in the background. Also known as agents, services, or daemons, brokers only activate when defined system conditions become true. For example, a broker may activate when the system clock reaches 2:00 a.m. every other Saturday. Another broker may activate when the system senses the arrival of e-mail
An open, business-object interface used to access SAP R/3 business processes and data from external systems.
An application-level component you can use in unpredictable combinations. A business object is independent of any single application. Business objects provide a natural way for describing application-independent concepts such as customer, order, competition, money, payment, and patient. They encourage a view of software that transcends tools, applications, databases, and other system concepts.
Companies using the Web to deliver products, services, support, and information over the internet to other companies.
The integration of applications, including data and process integration, between enterprises.
A set of specific (usually standardized) characters with an encoding scheme that uniquely defines each character. ASCII is a common character set.
In object-oriented programming, a category of objects. For example, there might be a class called shape that contains objects which are circles, rectangles, and triangles. The class defines all the common properties of the different objects that belong to it.
Software that is responsible for the user interface, including menus, data entry screens, and report formats. It also is an application that sends requests to another application that acts as a server. See also
A paradigm for distributed computing under which the system is split between one or more server tasks, which accept requests according to some protocol, and client tasks, which request information or actions. Clients and servers can be placed independently on network nodes.
A network architecture in which one or more computers (servers) accept requests for services from one or more workstations (clients). This may also refer to a back-end application (server) that accepts requests for information from a front-end application (client).
An instruction to a database to make permanent all changes made to one or more database files since the last commit or rollback operation and to make the changed records available to other users. compare with rollback.
A standard for running external programs from a World Wide Web HTTP server. CGI specifies how to pass arguments to the executing program as part of an HTTP request. It also defines a set of environment variables. Commonly, a program will generate some HTML which will be passed back to the browser but it can also request URL redirection.
CGI allows the returned HTML (or other document type) to depend in any arbitrary way on the request. The CGI program can, for example, access information in a database and format the results as HTML. A CGI program can be any program which can accept command line arguments.
CORBA is a distributed-objects standard developed and defined by the Object Management Group (OMG). CORBA provides the mechanism by which objects transparently make request and receive responses, as defined by OMG’s Object Request Broker (ORB). The CORBA ORB is an application framework in which objects can communicate with each other, even if they are written in different programming languages, are running on different platforms, reside at different locations. or were developed by different vendors.
An SNAplus API which allows peer-to-peer communication between TPs in a network. CPI-C uses the same underlying communications elements (modes, LUs and security information) as APPC, and the information transferred between CPI-C applications is in the same format as information transferred between APPC TPs. This means that a CPI-C application may communicate with an APPC application, and neither application needs to know which API the other is using.
In programming and engineering disciplines, a component is an identifiable part of a larger program or construction. Usually, a component provides a particular function or group of related functions. In object-oriented programming and distributed object technology, a component is a reusable program building block that can be combined with other components in the same or other computers in a distributed network to form an application. Examples of a component include a single button in a graphical user interface, a small interest calculator, an interface to a database manager. Components can be deployed on different servers in a network and communicate with each other for needed services. A component runs in a context called a container. Examples of containers include pages on a Web site, Web browsers, and word processors.
An architecture for defining interfaces and interaction among objects implemented by widely varying software applications. A COM object instantiates one or more interfaces, each of which exposes zero or more properties and zero or more methods. All COM interfaces are derived from the base class IUnknown. MMC is built on the COM foundation.
To define to a system the devices, optional features, and programs installed on the system.
A connection string is a string version of the initialization properties needed to connect to a data source and enables you to easily store connection information within your application or pass it between applications. Without a connection string, you would be required to store or pass a complex array of structures to access data. The basic format of a connection string is based on the ODBC connection string. The string contains a series of keyword/value pairs separated by semicolons. The equals sign (=) separates each keyword and its value.
A daemon is a program that is always running in the background on the system, initialized, and waiting for something to do.
A computer-based system for defining, creating, manipulating, controlling, managing, and using databases. It is a program that lets one or more computer users create and access data in a database. The DBMS manages users requests (and requests from other programs) so that users and other programs are free from having to understand where the data is physically located on storage media and, in a multi-user system, who else may also be accessing the data. In handling user requests, the DBMS ensures the integrity of the data (that is, making sure it continues to be accessible and is consistently organized as intended) and security (making sure only those with access privileges can access the data). The software for using a database can be part of the database management system or it can be a stand-alone database system. Contrast with relational database management system.
A collection of descriptions of the data object or items in a data model for the benefit of programmers and others who might need to refer to them. A data dictionary can be consulted to understand where a data item fits in the structure and what values it may contain.
The process of copying data to remote locations. The copied (replicated) data is then kept synchronized with the primary data. Data replication is distinct from data distribution. Replicated data is stored copies of data in particular sites throughout a system and is not necessarily distributed data. See also data distribution and transaction replication.
A database management system program that responds to client requests. See also local area network.
A textual string that is used to reference the data source by application programs. A unique identifier must be provided for each data source. A data source consists of the data a user wants to access, its associated database management system (DBMS), the platform on which the DBMS resides, and the network (if any) used to access that platform. Each data source requires that a driver provide certain information in order to connect to it. At the core level, this is defined to be the name of the data source, a user ID, and a password. ODBC extensions allow drivers to specify additional information, such as a network address or additional passwords.
A keyword that identifies the characteristics of stored information on a computer. Some common data types are char, int, smallint, date, time, numeric, and float. Different databases support different datatypes.
Decryption is the process of converting encrypted data back into its original form, so it can be understood
Process of walking a tree (for example, the DataTree of the NNDOObject) and writing the data for each node to a string buffer. This generates a buffer containing the wire format representation of the data in the tree.
A protocol that enables software components to communicate directly over a network in a reliable, secure, and efficient manner. Based on the Open Software Foundation's DCE-RPC specification, DCOM deploys across heterogeneous platforms and works with both Java applets and ActiveX components.
A distributed function call has three major components: the DFC command definition in a client module that identifies the DFC command's name and its arguments; the DFC service in a server module that receives the command and its arguments and processes them in some way; and the Impact Manager Configurator entries that identify where the DFC command is serviced.
A document type definition is a specific definition that follows the rules of the Standard Generalized Markup Language (SGML). A DTD accompanies a document and identifies what the codes (or markup) are that separate paragraphs and identify topic headings and how each is to be processed. A generated document that specifies the grammatical structure of other SML documents. A hypertext markup language entity to describe the document type.
A group of computers and other devices that are networked and managed as a unit, with policies and rules specific to the unit.
An internet service that translates domain names into IP addresses.
A program that interacts with a particular device or specially (frequently optional) kind of software. The driver contains the special knowledge of the device or special software interface that programs using the driver do not. In a personal computer, a driver is often packaged as a dynamic link library (DLL) file.
A module containing functions and data that can be loaded at run time by a calling module (an executable file or another dll). A file containing executable code and data bound to a program at load time or run time, rather than during linking. The code and data in a dynamic link library can be shared by several applications simultaneously.
This is the Sybase web application server. An integrated set of application servers used to deploy web applications.
The United Nations’ counterpart to ANSI’s X12. Another format for businesses exchanging data electronically.
A standard for exchanging business data. EDI is the process of sending and receiving electronic messages in standardized formats between business partners. Electronic messages are exchanged between companies’ computer systems and are used to replace traditional paper based transactions and sometimes telephone call confirmations of transactions. EDI solutions have allowed businesses to exchange information more accurately and in a matter of minutes or hours rather than days
Basic building block of an X12 transaction. Each segment is comprised of one or more elements. Its segment and then its position within that segment describe each element. A transaction-specified delimiter separates these elements.
The character that will appear at the end of each element within an X12 transaction. For inbound X12 documents, this character definition is read directly from the envelope. For outbound documents, customer-specific element separators are retrieved from the trading partner database.
Encryption is the conversion of data into a form that cannot be easily intercepted by unauthorized people.
An application that can be directly accessed or updated by an acquisition or delivery adapter (via an integration server).
EAI involves the integration of applications (including data and process integration) within an enterprise.
The systems that provide the information infrastructure for an enterprise. Enterprise resource planning systems, relational database management systems, and legacy information systems are examples of enterprise information systems.
Specification for creating server-side scalable, transactional, multi-user, secure enterprise-level applications. Provides consistent component architecture framework for creating distributed n-tier middleware. Low-level details are separated from business logic.
The header and trailer information contained within an ANSI ASC X12 transaction. The envelope is critical for routing, trade agreement determination, and message management.
An entity that is sent into the system and drives the business processing. It consists of a name, scope, and attributes.
The format used by New Era of Networks Process Server to describe a business process.
A variable that describes how an operating system runs and the devices it recognizes.
An IBM code for representing characters with numerical values. This code is used mainly on IBM computers.
A simplified subset of Standard Generalized Markup Language (SGML) that provides a file format for representing data, a method for describing data structure, and as a mechanism for extending and annotating HTML with semantic information.
As a universal data format, XML provides a standard for the server-to-server transfer of different types of structured data so that the information can be decoded, manipulated, and displayed consistently and correctly. In addition, it enables the development of three-tier Web applications, acting as the data transfer format between the middle-tier Web server and the client.abend.
The smallest possible container for information. You can use a field in more than one table. If the first_name field exists in one table, for example, you can use the same field in other tables.
The file produced by basic EDI translation software to serve as input to the interface. Usually has the same fields as the standard but has each field expanded to its maximum length. A computer file where all the information is run together in a single character string.
A format containing only fields and associated controls. Flat input formats are composed of fields with associated control input controls. Flat output formats are composed of fields with associated output controls.
Formats describe how messages are constructed. Input formats describe how to separate input messages into their component parts. Output formats describe how to build output messages from the parsed components of the input message..
An ABAP function accessible using RFC. The interface to a specific function module is defined in the R/3 data dictionary.
An option available with DFC command definition. It automatically builds a callback function that, upon receiving an altered data condition (CBE_ALT), issues the DFC command and checks for an error condition return. The function name is the same as the DFC command, but with a preceding underscore character (_dfc_cmd_name). The user can attach the function directly to a callback function property for any control in a user interface's form object.
The combination of internationalization and localization. See also internationalization and localization.
A type of computer interface consisting of a visual metaphor of a real-world scene, often of a desktop. Within that scene are icons, representing actual objects, that the user can access and manipulate with a pointing device.
A host computer is directly connected to the Internet that provides services to other computers on the network, such as e-mail connections or access to program and data files. Each host computer has a unique Internet address, or IP, and a unique domain name, which identifies the computer to other computers and users on the Internet. Host means any computer that has full two-way access to other computers on the Internet.
The language used to mark a document so it can be published on the World Wide Web (WWW) and viewed with a browser.
HyperText Transport (or Transfer) Protocol is the set of rules that governs the exchange of text, graphic, sound, and video files on the World Wide Web.
A User Interface that allows users to build complex projects or programs by filling out forms in a Windows program. Examples are the MSG-IDE tool (for creating custom adapters) and the TRAN-IDE tool (for creating production objects).
This term means unchanged when multiplied by itself. In the context of New Era of Networks products, the term idempotent refers to the idempotent attribute, which specifies that an operation can be safely executed any number of times. If an operation is idempotent, the server does not need to save results and the client does not need to issue acknowledgements (improving performance). An example of an idempotent operation is one that simply reads a value. An operation that increments a value, for example, is not idempotent.
An identifier data element always contains a value from a predefined list of values (codes) that are maintained by the ASC X12 or some other body recognized by the X12 Committee.
An Oracle-specific term for a set of memory structures and background processes that access a set of database files. Compare to database sever.
A programming environment integrated into an application. For example, Microsoft Office applications support various versions of the BASIC programming language. You can develop a WordBasic application while running Microsoft Word. .
An integration point is an entry point into a computer system. It typically consists of the login information required to establish a connection with a software system so that information can be transferred into and out of the system.
A User Interface that allows users to build complex projects or programs by filling out forms in a Windows program. Examples are the MSG-IDE tool (for creating custom adapters) and the TRAN-IDE tool (for creating production objects).
A data container used by R/3 applications used by ALE to send and receive information. MQSeries Link for R/3 works with IDocs only.
An organization of national standards bodies from various countries established to facilitate international exchange of goods and services and develop cooperation in intellectual, scientific, technological, and economic activity.
The process of extracting locale-specific components from the source code and moving them into one or more separate modules, making the code culturally neutral so it can be localized for a specific culture. See also globalization. Compare with localization.
A 32-bit number that identifies each sender or receiver of information that is sent in packets across the Internet. An IP address has two parts: the identifier of a particular network on the Internet and an identifier of the particular device, which can be a server or a workstation, within that network.
Microsoft's programming interface between applications and their Internet Server. Active Servers created with ISAPI extensions can be complete in-process applications themselves, or can "connect" to other services. ISAPI is used for the same sort of functions as CGI but uses Microsoft Windows dynamic link libraries (DLL) for greater efficiency. The server loads the DLL the first time a request is received and the DLL then stays in memory, ready to service other requests until the server decides it is no longer needed. This minimizes the overhead associated with executing such applications many times.
For users: Use this term when referring to specific content in the console tree. Do not use the terms node or namespace. If possible, refer to the actual name of the item in the tree unless you must use an explicit term. To direct users to an item, you should write out the entire path to the item.
Developed by Sun Microsystems, Java is an object-oriented programming language, similar to C++. Java-based applications, or applets, can be quickly downloaded from a Web site and run using a Java-compatible Web browser such as Microsoft Internet Explorer or Netscape Navigator. Java applets are the most widespread use of Java on the Web. Java programs or source code files (.java) are compiled into a format known as bytecode files (.class). These files, once complied, can be executed by a Java interpreter. Most operating systems, including Windows, Macintosh OS, and UNIX, have Java interpreters and run-time environments known as Java Virtual Machines.
Sun Microsystems, Inc. Java™ 2 Platform, Enterprise Edition (J2EE) defines the standard for developing multi-tier enterprise applications. J2EE simplifies enterprise applications by basing them on standardized, modular components, by providing a complete set of services to those components, and by handling many details of application behavior automatically, without complex programming.
Sun Microsystems, Inc. architecture that defines a uniform way to integrate J2EE application servers with enterprise information systems. A compliant EIS can plug into any application server that supports the connector architecture. An application server that conforms to this standard can connect to any EIS that provides a standard resource adapter.
Sun Microsystems, Inc.’s foundation for building and deploying client-side enterprise applications with cross-platform compatibility.
The Java Dynamic Management™ Kit is the foundation for building and distributing network management intelligence into applications, networks, and devices.
One of Sun Microsystems, Inc.’s application program interfaces (APIs): Java Database Connectivity (JDBC™) Java Remote Method Invocation (RMI) Java Interface Definition Language (JavaIDL) Java Naming and Directory Interface (JNDI).
Sun Microsystems, Inc. technology used to embed bits of Java™ code (or scriptlets) in HTML documents.
A named disk area that can contain programs and related information. A library consists of different sections, called library members.
A logical grouping of network servers. In the network, every network server must be on a LAN. Servers on the same LAN must be connected with TCP/IP.
When using MQSeries Remote Queueing, a local queue is defined on the receiver side that can be referred to from the sending queue. The receiving application talks to the local queue.
The process of preparing an extracted module for a target environment, in which messages are displayed and logged in the user’s language; numbers, money, dates, and time are represented using the user’s cultural convention; and documents are displayed in the user’s language. See also globalization. Compare with internationalization.
A system in which applications run integrated on a common database. A client corresponds to a logical system.
A type of unit that enables end-users or programs to gain access to network resources and communicate with each other.
A protocol used for APPC and CPI-C communications between transaction programs. LU 6.2 uses the generalized data stream (GDS) format. SNAplusAPI APPC and CPI-C support LU type 6.2
Specification that indicates the value for an element or attribute in a target document that is produced by a Mapper transformation. A mapping can be an XPath to a source schema item, a string literal, or a function that operates on XPaths, string literals, or functions.
The translation process from a standard format to another format. The software component that governs the conversion of application data to and from EDI interchanges is called an EDI translator. Most EDI translators provide two services: data mapping and standards formatting.
To access the data, most translators support a file interface. For outbound transactions an application writes the transaction data to a sequential text file (also called a flat-file). The translator formats the data according to the appropriate EDI syntax rules and produces an EDI file, which is ready to be communicated to a trading partner. For inbound transactions the translator verifies that the standard version and release are supported, and that the syntax of the interchange is in compliance with the standards. The translator produces a flat-file for the application as output.
To convert flat-file data to and from EDI data, a translator must understand the format of the flat-file data. This understanding is achieved in one of two ways. First, the translator might require the user to generate the flat-file according to a format defined by the translator. This means that the user must modify the application data so the translator can process it. Second, the translator might provide a tool that allows the user to specify the format of the flat-file. This tool is called a data mapper. Data mapping reduces or eliminates the programming required to integrate the translator with a business application.
A message type defines the layout of a string of data. The message type name in the Rules GUI is the same as the input format name in Formatter.
A string of bytes that has meaning to the applications that use it. Messages are used for transferring information from one application to another between components in a single application. The applications can be running on the same platform or on different platforms.
Components that enable asynchronous, event-based processing in the application server.
A form of communication between programs. Application data is combined with a header (information about the data) to form a message. Messages are stored in queues, which can be buffered or persistent (see buffered queue and persistent queue). It is an asynchronous communications style and provides a loosely coupled exchange across multiple operating systems.
A message type defines the layout of a string of data. The message type name in the Rules GUI is the same as the input format name in Formatter.
Data that describes other data. Any file or database that holds information about another database's structure, attributes, processing, or changes.
Software that facilitates the communication between two applications. It provides an API through which applications invoke services and it controls the transmission of the data exchange over the network. There are three basic types: communications middleware, database middleware, and systems middleware.
A method used by adapters to invoke specific methods of operation. New Era of Networks version 3.9 adapters use Acquire, Deliver, Schema, Schema Remove, and Process modes. The user guide for each adapter contains detailed information about modes and data representation.
Mutex stands for mutually exclusive. This means that a computer resource can be made available to one user at a time. It can best be explained by this simple example. Person A wants to run a process script and does not want the file to be accessed by anyone else during the run time of the script. The use, therefore, locks the file. Once the process script has completed running, the computer resource can be unlocked and then becomes available for other to access.
The mnemonic for ASCII character 21.
Sometimes used as the response to receipt of a corrupted packet of information.
Any message transmitted to indicate that some data has been received incorrectly, for example it may have a checksum or message length error. A NAK message allows the sender to distinguish a message which has been received in a corrupted state from one which is not received at all
An alternative is to use only ACK messages, in which case the non-receipt of an ACK after a certain time is counted as a NAK but gives no information about the integrity of the communications channel.
Level within the hierarchy of a specific component. A repeating child format and the fields within it may have a nesting level one greater than that of the parent format and any nonrepeating components of the parent format. The nesting level of the root format is one.
A binary file (NIDL.exe) used to compile ".idl type" files. IDL files are created to allow C-based programs to contain DFC functions.
New Era of Networks canonical form (NCF) is a layout specification that states how data is transported to the wire.
New Era of Networks data object (NDO) is the in-memory form of New Era of Networks canonical form.
The New Era of Networks-provided language that users can use to build Initialization, De-initialization, Validation, Callback, and Custom functions in programs.
Software that allows objects to dynamically discover each other and interact across machines, operating systems, and networks.
ODBC is a Windows standard API that is used for SQL communication to connect applications to a variety of data sources. By using ODBC statements in a program, you can access files in a number of different databases, including Access, dBase, Excel, and Text. ODBC is based on and closely aligned with the Open Group standard Structured Query Language (SQL) Call-Level Interface. ODBC handles the SQL request and converts it into a request the individual database system understands. An open system (as opposed to a proprietary system) is one that adheres to a publicly known and sometimes standard set of interfaces so that anyone using it can also use any other system that adheres to the standard. Access is generally provided through the Control Panel, where data source names (DSNs) can be assigned to use specific ODBC drivers.
Open Transport configuration provides a means to adapt New Era of Networks applications to supported transport and transaction manager environments. This configuration capability increases the stability of the entire application by providing a single code base that maintains flexibility required by clients in a heterogeneous enterprise setting
An option consists of a name-value pair of data related to an action. An option name can be predefined (for Reformat and Put Message) or user-defined.
A variable that is given a constant value for a specified application and that can denote the application. Compare with property.
Compound formats contain other flat and compound formats. If you have a compound format (X) that contains a repeating format (Y), X is the parent ot child Y.
The ability of a computerized system to remember the state of data or objects between runs.
An external software or SQL program that is accessed by a larger application to provide added and customer-specific functionality.
In programming, a port is a “logical connection place” and specifically, using the Internet’s protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network. When a service (server program) initially is started, it is said to bind to its designed port number. As any client program wants to use that server, it also must request to bind to the designated port number.
A Web site that offers users access to a broad array of resources and services, such as email, forums, search engines, and online shopping malls.
A protocol for communication between two computers using a serial interface, typically a personal computer connected by a telephone line to a server.
A process is an instance of a program running in a computer. It is close in meaning to task, a term used in some operating systems. In UNIX and some other operating systems, a process is started when a program is initiated (either by a user entering a shell command or by another program). Like a task, a process is a running program with which a particular set of data is associated so that the process can be kept track of. A process can initiate a sub-process, which is a child process (and the initiating process is sometimes referred to as its parent). A child process is a replica of the parent process and shares some of its resources, but cannot exist if the parent is terminated.
The EC Gateway module which allows definition of how the EDI solution will function in its native lights-out unattended mode of operation.
A list constructed and maintained so that the next data element to be retrieved is the one stored first.
For example, one application can put a message on a queue, and another application can retrieve the message from the same queue.
Basic building block of a database. Each record is the lowest-level complete entity within a table in the database. Also known as a “row.” A group of one or more records make up a table.
The part of the Window NT operating system that holds configuration information for a particular machine.
A collection of data in which relationships between data items are explicitly specified as equally accessible attributes. The data is viewed as being stored in tables consisting of columns (data items) and rows (units of information). Relational databases can be accessed by SQL requests. See also Structured Query Language.
A character in data which indicates that a delimiter is following, and that the delimiter should be processed as data vice as a delimiter.
An RFC is used to provide a “handshake” between two systems that are not connected. ALE and RFC are often used together.
A feature that allows a System Administrator to manage multiple DirectConnect Servers and multiple services from a client.
A component, a field or format, that may appear multiple times in an input or output message.
One or more database operations an application sends as a unit to the database. During a request, the application gives up control to the DBMS and waits for a response. See also commit, rollback, and unit of work.
An instruction to a database not to implement the changes requested in a unit of work and to return to the pre-transaction state. See also transaction and unit of work. Compare with commit.
A rule is uniquely defined by its application group, message type, and rule name. It contains evaluation criteria (a rules expression) and is associated with subscriptions to perform if the rule evaluates to true. Rules also have permissions that determine user access.
The ability of an information system to provide high performance as greater demands are placed upon it, through the addition of extra computing power.
Basic building block of an X12 transaction. Each segment is identified by a three-character code. Segments are comprised of elements and sub-elements and a group of segments are called a transaction or document.
An indexing device within a queue section. A series of contiguous slots that store information.
The character that appears at the end of each segment within an X12 transaction. For inbound X12 documents, this character definition is read directly from the envelope. For outbound documents, customer-specific segment delimiters are retrieved from the trading partner database.
Process of taking items from a buffer and creating the corresponding tree representation from the wire format.
A functional unit that provides shared services to workstations over a network. See also client/server. Compare with client.
A servlet is a small, persistent, low-level program that runs on a server. The term was coined in the context of the Java applet, a small program that is sent as a separate file along with a Web (HTML) page.
Some programs that access databases based on user input need to be on the server. These programs were most often implemented using a Common Gateway Interface (CGI) application. However, if a Java virtual machine is running in the server, servlets can be implemented in Java. A Java servlet can execute more quickly than a CGI application. Instead of creating a separate program process, each user request is invoked as a thread in a single daemon process, so that the system overhead for each request is slight.
A connection between two programs or processes. In APPC communications, sessions allow transaction programs to have conversations between the partner logical units. Sessions are established through SNA bind requests. There are several types of sessions: single, multiple, and parallel. See also advanced program-to-program communications and parallel sessions.
A subscription that is associated with more than one rule. This subscription will only be retrieved once by the Rules APIs even if multiple associated rules evaluate true.
A floating list of actions. to open a shortcut menu, click an object and hold down the right mouse button; the available actions depend on the object.
A programming language that is used to write event procedures (scripts), which are attached to object definitions.
Simple Mail Transfer Protocol is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one or two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. SMTP is the Internet’s standard host-to-host mail transport protocol and traditionally operates over TCP port 25.
Simple Object Access Protocol provides a way for applications to communicate with each other over the Internet, independent of platform. Remote objects can give a program almost unlimited power over the Internet, but most firewalls block non-HTTP requests. SOAP, an XML-based protocol, gets around this limitation to provide intraprocess communication across machines.
In Enterprise Portal, the implementation of SOAP is intended to provide businesses with a way to expose corporate software functionality to their customers with minimal firewall constraints, platform dependencies or complex development implementations involving DCOM or CORBA.
SOAP was developed by Microsoft, DevelopMentor, and Userland Software and has been proposed to the Internet Engineering Task Force (IETF) as a standard.
A software component that provides easy access and configuration of information from the framework of the Microsoft Management Console for Windows NT.
The socket is the method for accomplishing inter-process communication. What this means is a socket is used to allow one process to speak to another, very much like the telephone is used to allow one person to speak to another. A socket must be created to listen for connections. Sockets have the ability to queue incoming connection requests. The communication that occurs between the client and the server must be reliable. That is, no data can be dropped and it must arrive on the client side in the same order in which the server sent it.
Standard ML is a general-purpose programming language designed for large projects.
A language developed by IBM to process data in a relational database. SQL is an industry standard.
Basic building block of an X12 transaction. Some X12 elements are comprised of multiple entities. The sub-element separator separates these sub-elements.
The character that appears at the end of each sub-element within an X12 transaction. For inbound X12 documents, this character definition is read directly from the envelope. For outbound documents, customer-specific sub-element separators are retrieved from the trading partner database.
A subscription is uniquely identified by its application group, message type, and subscription name. It contains actions with options and can be associated with one or more rules. Subscriptions also have permissions that determine user access to change the subscription definition.
In electronic messaging, a method of operation in which sender and receiver applications are tightly coupled and dependent. The receiver must answer the sender’s message immediately with a well-defined response; the sender must wait for the receiver’s response before proceeding to the next operation. Compare to asynchronous.
The person at a computer installation who designs, controls, and manages the use of the computer system.
The process of initiating, configuring, monitoring, and adjusting applications on a system.
The TA1 is an Interchange Acknowledgement. A network provider uses it to report the status of processing a received interchange header and trailer or the non-delivery.
A database remembers relationships between pieces of information by storing the information in tables. The columns and rows in each table define the relationships in a highly structured way. We can classify tables by function into two types: support tables and data tables. Most tables fit into only one category, but some can serve as both support and data tables.
A support table stores information that changes infrequently and functions as a list from which you make selections.
A set of bits or characters that identify various conditions about data in a file. In Formatter, a standard value indicating the field’s name.
A form, mold, or pattern used as a guide to making something. In programming, a template is a generic class or other unit of source code that can be used as the basis for unique units of code.
Thin client refers to the Net PC or the network computer (NC), personal computers for businesses that are centrally-managed, configured with only essential equipment, and don't have CD-ROM players, diskette drives, or expansion. Since the idea is to limit such computers to essential applications, they tend to remain "thin" in terms of the client applications they include.
A component or service is termed thread safe if multiple instances can be run at the same time. For example, a service may be used by multiple components that are running concurrently in multiple enclaves. Each component must be able to invoke that service without sharing violations.
The process of recording the sequence in which the statements in a program are executed and, optionally, the values of the program variables used in the statements.
The IDE tool used to develop Production Objects used by e-Biz Impact. Production Objects process incoming messages by filtering, mapping, and/or exploding messages for the required endpoint destination applications.
An activity or request. Additions, changes, and deletions are typical transactions stored in a computer. An exchange between a program on a local system and a program on a remote system that accomplishes a particular action or results.
A method of handling electronic messaging in which only committed messages are sent, and only messages received and committed are considered delivered.
A method of handling computer operations in which the operations take place immediately upon receipt of the processing request. Also called realtime or online processing. Compare to batch processing.
A piece of software that converts data from one format to another, often with intermediate lookups, validations, and edits.
A compact string of characters for identifying an abstract or physical resource and provides a simple and extensible means for identifying resources. An example of an URI is a URL.
A subset of a URI, a URL is like a networked extension of the standard filename concept: you can point to a file in a directory, but that file and directory can exist on any machine on the network. They can also be served by any of several different methods. URLs can also point to queries, documents stored deep within databases, and so on.
One of more database operations grouped under a commit or rollback. A unit of work ends when an application commits or rolls back a series of request or when the application terminates. See also commit, rollback, and transaction.
An alternative representation of data from one or more tables. A view can include all or some of the columns contained in the table or tables on which it is defined.
Software used to automatically route events or work-items from one user or program to another. Workflow is synonymous with process flow, although traditionally has been used in the context of person-to-person information flows.