+

Search Tips   |   Advanced Search

 

Glossary

 

abstract schema

Part of the deployment descriptor for an entity bean that is used to define the bean relationships, persistent fields, or query statements.

access bean

An enterprise bean wrapper that is typically used by client programs, such as JavaServer Pages files and servlets. Access beans hide the complexity of using enterprise beans and improve the performance of reading and writing multiple enterprise bean properties.

access control

In computer security, the process of ensuring that the resources of a computer system can be accessed only by authorized users in authorized ways.

access control list (ACL)

In computer security, a list that is associated with an object that identifies all the subjects that can access the object and their specific access rights.

access ID

The unique identification of a user that is used during authorization to determine if access is permitted to the resource.

access intent

Metadata that optimizes the runtime behavior of an entity bean with respect to concurrency control, resource management, and database access strategies.

access intent policy

A grouping of access intents that governs a type of data access pattern for enterprise bean persistence.

access point group

A collection of core groups that defines the set of core groups in the same cell or in different cells that communicate with each other.

accessibility

An attribute of a software or hardware product usable by individuals who have disabilities.

activation

In EJB, the process of transferring an enterprise bean from secondary storage to memory. (Sun)

adapter

A mechanism for connecting two unlike parts or machines, or for electronically or physically connecting a device to a computer or to another device.

administrative agent

A program that provides administrative support without requiring a direct connection to a database.

agent

A function that represents a requester to a server.

alarm listener

A type of asynchronous bean that is called when a high-speed transient alarm expires.

algorithm

A set of well-defined rules for the solution of a problem in a finite number of steps.

algorithm mapping

A process by which service providers can define the mapping of Uniform Resource Identifier (URI) algorithms to cryptographic algorithms that are used for XML digital signature and XML encryption.

alias destination

A bus destination for which an alias name is used. An alias destination can be defined on the local bus or on a foreign bus.

Apache

An open source Web server.

applet

A small application program that performs a specific task and is usually portable between operating systems. Often written in Java code, applets can be downloaded from the Internet and run in a Web browser.

applet client

A client that runs within a browser-based Java runtime environment, and is capable of interacting with enterprise beans directly instead of indirectly through a servlet.

application

One or more computer programs or software components that provide functionality in direct support of a specific business process or processes.

application assembly

The process of creating an enterprise archive (EAR) file that contains all the files related to an application as well as an Extensible Markup Language (XML) deployment descriptor for the application.

application client

In J2EE, a first-tier client component that executes in its own Java virtual machine. Application clients have access to some J2EE platform APIs, for example JNDI, JDBC, RMI-IIOP, and JMS. (Sun)

application client module

A Java archive (JAR) file that contains a client that accesses a Java application. The Java application runs inside a client container and can connect to remote or client-side J2EE resources.

API

A functional interface by which an application program that is written in a high-level language can use specific data or functions of the operating system or another program.

Application Response Measurement (ARM)

An application programming interface developed by a group of leading technology vendors that can be used to monitor the availability and performance of business transactions within and across diverse applications and systems.

Application Response Measurement (ARM) agent

The implementation of the ARM standard by an implementation provider.

appserver

A server program in a distributed network that provides the startup environment for an application program.

application server root

The top directory for a WebSphere Application Server node.

artifact

A physical piece of information that is used or produced by a software development process. Examples of artifacts include models, source files, scripts, and binary executable files.

assigned bus member

The designated member of a service integration bus with messaging engines that manage the queue points for a queue destination. When a queue destination is defined and a bus member is assigned to that destination, a queue point is created for each messaging engine in the bus member.

association

1. For XML documents, the linkage of the document to the rules that govern its structure, which can be defined by a document type definition (DTD) or an XML schema.

2. In enterprise beans, a relationship that exists between two container-managed persistence (CMP) entity beans. Two types of association exist: one-to-one and one-to-many.

assured persistent

A delivery option specifying that messages are not discarded. See also express nonpersistent, reliable persistent, reliable nonpersistent, and best-effort nonpersistent.

asymmetric cryptography

In computer security, pertaining to the use of different keys for encryption and decryption; a synonym for public key cryptography.

asynchronous bean

A Java object or an enterprise bean that a Java 2 Platform, Enterprise Edition (J2EE) application can run asynchronously.

asynchronous messaging

A method of communication between programs in which a program places a message on a message queue, then proceeds with its own processing without waiting for a reply to its message.

atomic

Pertaining to transaction changes to the state of resources: either all occur or none occur. The atomic characteristic maintains data integrity by making sure that some updates are not made while others fail.

authentication

In computer security, a process that ensures that the identities of both the sender and the receiver of a network transaction are true.

authenticity

The validation of client and server identities during a Secure Sockets Layer (SSL) connection by both communicating parties using public key cryptography and asymmetric cryptography.

authorization

The process of granting a user either complete or restricted access to an object, a resource, or a function.

authorization table

A table that contains the role-to-user or group mapping information that identifies the permitted access of a client to a particular resource.

automatic restart management

The facilities that detect failures and manage server restarts.

AXIS

An implementation of the Simple Object Access Protocol (SOAP) on which Java Web services can be implemented.

basic authentication

An authentication method that uses a user name and a password.

bean

A definition or instance of a JavaBeans component.

Bean Scripting Framework

An architecture for incorporating scripting language functions within Java applications.

bean-managed messaging

A function of asynchronous messaging that gives an enterprise bean complete control over the messaging infrastructure.

bean-managed persistence (BMP)

Pertaining to an entity bean that manages its own persistence.

bean-managed transaction (BMT)

The capability of the session bean, servlet, or application client component to manage its own transactions directly, instead of through a container.

best-effort nonpersistent

A delivery option that specifies to discard messages when a messaging engine stops or fails. Messages can also be discarded if a connection that is used to send them becomes unavailable, and as a result of constrained system resources. See also reliable nonpersistent, express nonpersistent, reliable persistent, and assured persistent.

bind

To establish a connection between software components on a network using an agreed-to-protocol. In Web services, the bind operation occurs when the service requestor invokes or initiates an interaction with the service at run time using the binding details in the service description to locate, contact, and invoke the service.

binding

A temporary association between a client and both an object and a server that exports an interface to the object. A binding is meaningful only to the program that sets it and is represented by a bound handle.

block decryption

Symmetric algorithms that decrypt a block of data at one time.

block encryption

Symmetric algorithms that encrypt a block of data at one time.

bootstrap server

An appserver that runs the SIB service.

bootstrapping

The process by which an initial reference of the naming service is obtained. The bootstrap setting and the host name form the initial context for Java Naming and Directory Interface (JNDI) references.

bottleneck

A place in the system where contention for a resource is affecting performance.

bridge interface

A node and a server that run a core group bridge service.

broker archive

A file that is the unit of deployment to the broker that can contain any number of compiled message flow and message set files and a single deployment descriptor. We need a separate broker archive file for each configuration to deploy.

broker profile

A definition of the message broker properties.

brute force collision

A programming style that relies on computing power to try all the possibilities with a known hash until the solution is found.

bucket

One or more fields that accumulate the result of an operation.

bulk decryption

A synonym for block decryption.

bulk encryption

A synonym for block encryption.

bus

Interconnecting messaging engines that manage communication resources. See also service integration bus.

bus destination

A logical address to which applications can attach as a producer, consumer, or both a producer and consumer.

bus member

The appservers within which the messaging engines run to support the bus.

business activity

A collection of tasks that are linked so that they have an agreed outcome.

business activity scope

An attribute of an existing core unit of work that provides the compensation ability in the event of an error in a business activity, when that activity cannot be atomically rolled back.

business logic tier

The set of components that reside between the presentation and database tiers. This logic tier hosts the enterprise bean containers, which run the business logic.

business process container

A process engine that contains process modules.

byte order mark (BOM)

A character code at the beginning of a data stream that can be used as a signature that defines the byte order and encoding form.

cache instance resource

A location where any J2EE application can store, distribute, and share data

cache replication

The sharing of cache IDs, cache entries, and cache invalidations with other servers in the same replication domain.

callback handler

A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the Web service security run time for propagation in the Web service security header

capability list

A list of associated resources and their corresponding privileges per user.

cell

(1) An arbitrary grouping of one or more nodes in a WebSphere Application Server distributed network.

(2) One or more processes that each host runtime components. Each has one or more named core groups.

cell-scoped binding

A binding scope where the binding is not specific to, and not associated with any node or server. This type of name binding is created under the persistent root context of a cell.

certificate authority (CA)

An organization that issues certificates. The CA authenticates the certificate owner’s identity and the services that the owner is authorized to use, issues new certificates, renews existing certificates, and revokes certificates.

certificate revocation list (CRL)

A list of certificates issued by a certificate authority (CA). The certificates on this list might not be expired, but are no longer trusted by the CA.

chain

The name of a channel framework connection that contains an endpoint definition.

channel

An entry point to the Web services gateway that carries requests and responses between Web services and the gateway.

channel framework

A common model for connection management, thread usage, channel management, and message access within WebSphere Application Server.

Channel Information Control System (CICS)

An IBM licensed program that provides online transaction-processing services and management for business applications.

cheat sheet

An interface that guides users through the wizards and steps that are required to perform a complex task, and links to relevant sections of the online help.

cipher

A cryptographic algorithm that is used to encrypt data that is unreadable until converted into plain data with a predefined key.

cipher suite

A set of ciphers.

class

In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.

class file

A compiled Java source file.

class hierarchy

The relationships between classes that share a single inheritance. All Java classes inherit from the Object class.

class loader

Part of the Java virtual machine code that is responsible for finding and loading class files. A class loader affects the packaging of applications and the run-time behavior of packaged applications deployed on appservers.

class path

A list of directories and Java archive (JAR) files that contain resource files or Java classes that a program can load dynamically at run time.

client proxy

An object on the client side of a network connection that provides a remote procedure call interface to a service on the server side.

client type detection

A process in which a servlet determines the markup language type required by a client and calls the appropriate JavaServer Pages file.

client/server

Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server

Cloudscape

An embeddable, all Java, object-relational database management system (ORDBMS).

cluster

A group of appservers that collaborates for the purposes of workload balancing and failover.

coexistence

The ability of two or more entities to function in the same system or network.

collection certificate store

A collection of intermediate certificates or certificate revocation lists (CRL) that are used by a certificate path to build up a certificate chain for validation.

Collector Tool

A tool that gathers information about a WebSphere Application Server installation and packages this data in a Java archive (JAR) file to assist in problem determination and analysis. This information includes logs, property files, configuration files, operating system data, Java data, and prerequisite software presence and levels.

Common Criteria

The title of a set of documents that describe a particular set of IT security evaluation criteria.

Common Object Request Broker Architecture (CORBA)

An architecture specification for distributed object-oriented computing that separates client and server programs with a formal interface definition.

Common Secure Interoperability V2 (CSIv2)

An authentication protocol developed by the Object Management Group (OMG) that supports interoperability, authentication delegation and privileges.

compilation unit

A Java source file.

complex type

In XML, a type that supports elements in its content and that can carry attributes.

concurrency control

The management of contention for data resources.

configuration repository

A storage area of configuration data that is typically located in a subdirectory of the product installation root directory.

configuration root

The mount point for the configuration file system.

configured name binding

Persistent storage of an object in the name space that is created using either the console or the wsadmin program.

connection factory

A set of configuration values that produces connections that enable a J2EE component to access a resource. Connection factories provide on-demand connections from an application to an enterprise information system (EIS).

connection handle

A representation of a physical connection.

connection pooling

A technique used for establishing a pool of resource connections that applications can share on an appserver.

connector

In J2EE, a standard extension mechanism for containers to provide connectivity to enterprise information systems (EISs). A connector consists of a resource adapter and application development tools. (Sun)

constructor

In object-oriented programming, a special method used to initialize an object.

consumer

1. An application that attaches to a bus destination and receives messages from the service integration bus.

2. In JMS, an object that is used for receiving messages from a destination.

container

In J2EE, an entity that provides life-cycle management, security, deployment, and run-time services to components. (Sun)

Each type of container (EJB, Web, JSP, servlet, applet, and application client) also provides component-specific services.

container transaction

A transaction that has its boundaries set by the container for method invocations of the enterprise bean.

container-managed persistence (CMP)

In J2EE technology, a data transfer between the variables of an entity bean and a resource manager administered by the entity bean container.

container-managed transaction (CMT)

A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions. (Sun)

content based routing (CBR)

An optional feature of the caching proxy that provides intelligent routing to back-end appservers. This routing is based on HTTP session affinity and a weighted round-robin algorithm.

context parameter

A definition of the server view of the Web application within which the servlet is running and supports servlet access to available resources.

control region

A virtual storage area that provides the control, scheduling, and work management mechanisms that are necessary to coordinate shared resources.

controller

A regulating mechanism that controls the scheduling and work management coordination for shared resources.

core group

A group of processes that are directly accessible to each other and are connected using a local area network (LAN).

core group access point

A definition of a set of servers that provides access to the core group.

core group bridge

The means by which core groups communicate.

core group member

A server within the cluster in a core group.

create method

In enterprise beans, a method that is defined in the home interface and invoked by a client to create an enterprise bean. (Sun)

credential

In the JAAS framework, a subject class that owns security-related attributes. These attributes can contain information used to authenticate the subject to new services.

cryptographic token

A logical view of a hardware device that performs cryptographic functions and stores cryptographic keys, certificates, and user data.

custom service

A configurable service that plugs in to a WebSphere Application Server and defines a hook point that runs when the server starts and shuts down when the server stops.

custom user registry

A customer-implemented user registry that implements the UserRegistry Java interface. This registry type can support virtually any kind of accounts repository from a relational database and can provide flexibility in adapting product security to various environments.

customized installation package (CIP)

A customized installation package that installs and configures a WebSphere product in a one-step process.

daemon

A program that runs unattended to perform continuous or periodic system-wide functions, such as network control. Some daemons are triggered automatically to perform their task; others operate periodically.

data access bean

A class library that provides a rich set of features and functions, while hiding the complexity associated with accessing relational databases.

data definition language (DDL)

A language for describing data and its relationships in a database.

data graph

A collection of tree-structured or graph-structured data objects.

data replication service (DRS)

A service that transfers data, objects, or events among appservers.

data source

1. In Java Database Connectivity (JDBC), an interface that provides a logical representation of a pool of connections to a physical data source. Data source objects provide application portability by making it unnecessary to supply information specific to a particular database driver.

2. A repository of data to which a federated server can connect and then retrieve data by using wrappers. A data source can contain relational databases, Extensible Markup Language (XML) files, search algorithms, table-structured files, or other objects. In a federated system, data sources appear as a single collective database.

data store

1. A place (such as a database system, file, or directory) where data is stored.

2. In service integration technologies, the set of tables that a messaging engine uses to store persistent data in a database.

3. In JMS, an administered object that encapsulates the identity of a message destination. See bus destination.

datagram

A form of asynchronous messaging in which an application sends a message, but does not want a response.

DB2

A family of IBM licensed programs for relational database management.

debugger

A tool that is used to detect and trace errors in computer programs.

declarative security

The security configuration of an application during assembly stage that is defined in the deployment descriptors and enforced by the security run time.

delegation

The process of propagating a security identity from a caller to a called object. According to the J2EE specification, a servlet and an enterprise bean can propagate either the client identity when invoking enterprise beans, or can use another specified identity as indicated in the corresponding deployment descriptor.

demarshal

The conversion of a data stream into an object.

demilitarized zone (DMZ)

A configuration including multiple firewalls to add layers of protection between a corporate intranet and a public network, like the Internet.

deploy

The placement of files or the installation of software into an operational environment. In J2EE, this action involves creating a deployment descriptor suitable to the type of application that is being deployed.

deployer

A person who installs modules and Java 2 Platform, Enterprise Edition (J2EE) applications into an operational environment.

deployment descriptor

An XML file that describes how to deploy a module or application by specifying configuration and container options.

deployment manager

A special type of server that manages operations for a cell.

deprecated

Pertaining to an entity, such as a programming element or feature that is supported, but no longer recommended and that might become obsolete.

deserializer

A method for converting a serialized variable into object data.

destination

In JMS, an administered object that encapsulates the identity of a message destination. See bus destination.

destination routing path

A sequence of intermediary bus destinations that messages must pass through to reach a target bus destination.

digest code

A number that is the result of a message digest function or a secure hash algorithm distilling a document.

digital certificate

An electronic document used to identify an individual, server, company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certification authority and is digitally signed by that authority.

digital signature

The encrypted digest code that is appended to a document. In an authentication system that uses public-key encryption, digital signatures are used to sign certificates.

directive

A first-failure data capture (FFDC) construct that can be contained in a WebSphere Application Server symptom database to provide information and suggested actions to assist a diagnostic module in customizing the data that is logged.

discover

In Universal Description, Discovery, and Integration (UDDI), to browse the business registry to locate existing Web services integration.

discovery protocol

Pertaining to the protocol that is followed to retrieve information from a network.

distinguished name (DN)

A set of name-value pairs (such as CN=person's name and C=country or region) that uniquely identifies an entity in a digital certificate.

distributed application

An application made up of distinct components that are physically located on different computer systems, connected by a network.

Document Object Model (DOM)

A system in which a structured document, for example an Extensible Markup Language (XML) file, is viewed as a tree of objects that can be programmatically accessed and updated.

document type definition (DTD)

The rules that specify the structure for a particular class of Standard Generalized Markup Language (SGML) or XML documents.

domain

An object, icon, or container that contains other objects representing the resources of a domain. You can use the domain object to manage those resources.

drop-down

Pertaining to a list or a menu that opens when clicked and stays open until the user selects a menu or a list item or clicks elsewhere in the user interface.

durable subscription

A subscription that can accumulate messages, even when no consumers are attached.

dynamic cache

A consolidation of several caching activities, including servlets, Web services, and WebSphere commands into one service where these activities work together to improve performance and share configuration parameters.

dynamic cluster

A server cluster that uses weights to balance the workloads of its cluster members dynamically, based on performance information that is collected from cluster members.

dynamic policy

A template of permissions for a particular type of resource.

dynamic reloading

The ability to change an existing component without restarting the server for the changes to become effective.

Edge Side Include (ESI)

A technology supporting cacheable and noncacheable Web page components that can be gathered and assembled at the edge of a network.

EJB container

A container that implements the EJB component contract of the J2EE architecture. This contract specifies a run-time environment for enterprise beans that includes security, concurrency, life-cycle management, transactions, deployment, and other services. An EJB container is provided by an EJB or J2EE server. (Sun)

EJB context

In enterprise beans, an object that allows an enterprise bean to invoke services provided by the container and to obtain information about the caller of a client-invoked method. (Sun)

EJB inheritance

A form of inheritance in which an enterprise bean inherits properties, methods, and method-level control descriptor attributes from another enterprise bean that resides in the same group.

EJB module

A software unit that consists of one or more enterprise beans and an EJB deployment descriptor. (Sun)

EJB object

In enterprise beans, an object whose class implements the enterprise bean remote interface (Sun).

EJB query

A string that contains an optional SELECT clause that specifies the Enterprise JavaBeans (EJB) objects to return, a FROM clause that names the bean collections, an optional WHERE clause that contains search predicates over the collections, an optional ORDER BY clause that specifies the ordering of the result collection; and input parameters that correspond to the argument of the finder method.

EJB reference

A logical name that is used by an application to locate the home interface of an enterprise bean in the target operational environment.

EJB server

Software that provides services to an EJB container. An EJB server may host one or more EJB containers (Sun).

Electronic Service Desk (ESD)

A facility for issue resolution that provides a single point of access to problem determination tools and external troubleshooting resources.

element

In Hypertext Markup Language (HTML), XML, or Extensible Stylesheet Language (XSL), a basic unit that consists of a start-tag, an end-tag, associated attributes and their values, and any text that is contained between the two.

enclave

A construct that represents a business transaction or unit of work on the OS/390 workload manager.

endian

A data type that is longer than a byte and that is stored in computer memory with the most significant byte first or last.

endpoint

The system that is the origin or the destination of a session.

endpoint listener

The point or the address at which incoming messages for a Web service are received by a service integration bus.

endpoint reference

The combination of the address of a Web service that implements the manageability interface for a managed resource type and the properties that allow that Web service to identify the managed resource.

enterprise application

An application that conforms to the J2EE specification.

enterprise archive (EAR)

A specialized Java archive (JAR) file, defined by the Java 2 Platform, Enterprise Edition (J2EE) standard and used to deploy J2EE applications to J2EE appservers. An EAR file contains enterprise beans, a deployment descriptor, and WAR files for individual Web applications.

enterprise bean

A component that implements a business task or business entity and resides in an EJB container. Entity beans, session beans, and message-driven beans are all enterprise beans. (Sun)

enterprise information system (EIS)

The applications that comprise the existing system of an enterprise for handling company-wide information. Examples of enterprise information systems include: an enterprise resource planning (ERP) system, a mainframe transaction processing system, and a legacy database system. (Sun)

EJB

A component architecture defined by Sun Microsystems for the development and deployment of object-oriented, distributed, enterprise-level applications.

entity

In markup languages such as XML, a collection of characters that can be referenced as a unit; for example, to incorporate often repeated text or special characters within a document.

entity bean

In EJB programming, an enterprise bean that represents persistent data maintained in a database. Each entity bean carries its own identity. (Sun)

There are two types of entity beans: container-managed persistence (CMP) entity beans and bean-managed persistence (BMP) entity beans.

environment variable

A variable that specifies how an operating system or another program runs, or the devices that the operating system recognizes.

error

A discrepancy between a computed, observed, or measured value or condition and the true, specified, or theoretically correct value or condition.

error log stream

A continuous flow of error information that is transmitted using a predefined format.

ESI processor

A feature in the WebSphere Web server plug-in that supports fragment caching and fragment assembly into full pages.

event

The encapsulated data that is sent as a result of an occurrence or situation in the system.

event factory

An object that returns new instances of either the CommonBaseEvent element or of the specialized classes representing complex property data types.

event listener

A type of asynchronous bean that serves as a notification mechanism and through which J2EE components within a single application can notify each other about various asynchronous events.

event source

An object that supports an asynchronous notification server within a single Java virtual machine. Using an event source, the event listener object can be registered and used to implement any interface.

exception

An event during program execution that prevents the program from continuing normally.

exception destination

A destination that is used to handle messages that cannot be delivered to their intended bus destination.

exception handler

A block of code that reacts to a specific type of exception.

express nonpersistent

A delivery option that specifies that messages are discarded when a messaging engine stops or fails. Messages can also be discarded if a connection that is used to send them becomes unavailable. See also best effort nonpersistent, reliable nonpersistent, reliable persistent, and assured persistent.

extended common system area (ECSA)

A major element of MVS/ESA virtual storage above the 16 MB line. This area contains pageable system data areas that are addressable by all active virtual storage address spaces. It duplicates the common system area (CSA), which exists below the 16 MB line.

extended deployment

The software that monitors network efficiency and distributes unexpected workloads.

extended messaging

A function of asynchronous messaging where the appserver manages the messaging infrastructure and additional types of messaging beans are provided to add functionality to that provided by message-driven beans.

XML

A standard metalanguage for defining markup languages that is based on Standard Generalized Markup Language (SGML).

Extensible Stylesheet Language (XSL)

A language for specifying style sheets for Extensible Markup Language (XML) documents. XSL Transformation (XSLT) is used with XSL to describe how an XML document is transformed into another document.

extension

A class of objects or a set of elements added into a programming language or a program to provide additional capabilities.

factory

In object-oriented programming, a class that is used to create instances of another class. A factory is used to isolate the creation of objects of a particular class into one place so that new functions can be provided without widespread code changes.

failover

A cluster event where the primary database server or appserver switches over to a backup system due to the failure of the primary server.

FAP

See Formats and Protocols.

fast response cache accelerator (FRCA)

A cache that resides in the kernel on AIX and Windows platforms that provides support for caching on multiple Web servers and on servers with multiple IP addresses.

fault message

An object that contains status information and details about a problem with a message.

Federal Information Processing Standard (FIPS)

A standard produced by the National Institute of Standards and Technology when national and international standards are nonexistent or inadequate to satisfy the U.S. government requirements.

federation

The process of hooking together naming systems so that the aggregate system can process composite names that span the naming systems.

file serving

A function that supports the serving of static files by Web applications.

file store

A type of message store that directly uses files in a file system through the operating system.

filter

A device or program that separates data, signals, or material in accordance with specified criteria.

finder method

In enterprise beans, a method defined in the home interface and invoked by a client to locate an entity bean. (Sun)

fingerprint

A synonym for digest code.

firewall

A network configuration, usually both hardware and software that prevents unauthorized traffic into and out of a secure network.

first-failure data capture

A problem diagnosis aid that identifies errors, gathers and logs information about these errors, and returns control to the affected run-time software.

fix pack

A cumulative collection of fixes that does not contain new functions. A fix pack can contain fixes that have not been shipped previously. Full regression testing is performed on fix packs.

folder

A container used to organize objects.

foreign bus

One of the other service integration buses with which a particular service integration bus can exchange messages.

foreign destination

A destination that identifies a destination on a foreign bus.

Formats and Protocols (FAP)

In message queuing, a definition of how queue managers communicate with each other, and of how clients communicate with server queue managers.

form logout

A mechanism to log out without having to close all Web browser sessions.

form-based login

An authentication process where a user ID and a password are retrieved using an Hypertext Transfer Markup Language (HTML) form, and sent to the server over the Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS) protocol.

forward routing path

A set of bus destinations to which a message is routed and held as a stack property within the message. When a message is created, the forward routing path is added to the message. When the message reaches a destination, that destination is removed from the forward routing path in the message.

forwardable credentials

A mechanism-specific security credential that is issued to access a resource, which is used to obtain another credential for access to a different resource.

garbage collection

A routine that searches memory to reclaim space from program segments or inactive data.

gateway

A middleware component that bridges Internet and intranet environments during Web service invocations.

gateway destination

A type of service destination that receives messages for gateway services. Gateway destinations are divided into those that are used for request processing and those that are used for reply processing.

gateway queue manager

The queue manager to which the connection is made in a WebSphere MQ link.

gateway service

A Web service that is made available through the Web services gateway.

General Inter-ORB Protocol (GIOP)

A protocol that Common Object Request Broker Architecture (CORBA) uses to define the format of messages.

generic server

A server that is managed in, but not supplied by WebSphere Application Server. Any server or process that is necessary to support the Application Server environment, including a Java server, a C or C++ server or process, a CORBA server, or a RMI server.

generic server cluster

A group of remote servers that need routing by the proxy server.

getter method

A method whose purpose is to get the value of an instance or a class variable. With this capability, another object can find out the value of one of its variables.

global security

Pertains to all applications running in the environment and determines whether security is used, the type of registry used for authentication, and other values, many of which act as defaults.

grammar

A document type definition (DTD) or schema providing a structured format used for successful processing by the trace service.

group

A collection of users who can share access authorities for protected resources.

HA group

A collection of one or more members. A common group name relates the members together.

HA policy

A set of rules that is defined for a high availability (HA) group that dictate whether zero (0), or more members are activated. The policy is associated with a specific HA group by matching the policy match criteria with the group name.

handle

In the J2EE specification, an object that identifies an enterprise bean. A client may serialize the handle, and then later deserialize it to obtain a reference to the enterprise bean. (Sun).

handler

In Web services, a mechanism for processing service content and extending the function of a Java API for XML-based RPC (JAX-RPC) runtime system.

handshake

The exchange of messages at the start of a Secure Sockets Layer session that allows the server to authenticate itself to the client using public-key techniques, then allows the client and the server to cooperate in creating symmetric keys for encryption, decryption, and detection of tampering.

hash

In computer security, a number generated from a string of text that is used to ensure that transmitted messages arrived intact.

hash map

A data structure that associates keys with values.

hierarchical

Pertaining to data that is organized on computer systems using a hierarchy of containers, often called folders (directories) and files. In this scheme, folders can contain other folders and files. The successive containment of folders within folders creates the levels of organization, which is the hierarchy.

high availability

Pertaining to a clustered system that is reconfigured when node or daemon failures occur, so that workloads can be redistributed to the remaining nodes in the cluster.

high availability file system

A cluster file system that can be used for component redundancy to provide continued operations during failures.

high availability manager

A framework within which core group membership is determined and status is communicated between core group members.

home interface

In enterprise beans, an interface that defines zero or more create and remove methods for a session bean or zero or more create, finder, and remove methods for an entity bean.

home method

A method in the home interface that is used by a client to create, locate, and remove instances of enterprise beans.

horizontal scaling

A topology in which more than one appserver running on multiple computing nodes is used to run a single application.

host

1. A computer that is connected to a network and provides an access point to that network. The host can be a client, a server, or both a client and server simultaneously.

2. In performance profiling, a machine or a machine starting partition on which an application under test resides. The host owns the processes that are profiled.

host name

The network name for a network adaptor on a physical machine in which the node is installed.

hot deployment

The process of adding new components to a running server without stopping and restarting the appserver or application.

hot servant region

A servant region that has a request dispatched to it previously and now has available threads.

hover help

A form of online help that can be viewed by moving a mouse or other pointing device over a GUI item such as an icon or field.

HTTP channel

A type of channel within a transport chain that provides client applications with persistent Hypertext Transfer Protocol (HTTP) connections to remote hosts that are either blocked by firewalls or require an HTTP proxy server. An HTTP channel is used to exchange application data in the body of an HTTP request and an HTTP response that are sent to and received from a remote server.

Hypertext Markup Language (HTML)

A markup language that conforms to the Standard Generalized Markup Language (SGML) standard and was designed primarily to support the online display of textual and graphical information that includes hypertext links.

Hypertext Transfer Protocol (HTTP)

In the Internet suite of protocols, the protocol that is used to transfer and display hypertext and XML documents on the Web.

Hypertext Transfer Protocol Secure (HTTPS)

An Internet protocol that is used by Web servers and Web browsers to transfer and display hypermedia documents securely across the Internet.

identifier

The name of an item in a program written in the Java language.

identity

The data that represents a person and that is stored in one or more repositories.

identity assertion

The invocation credential that is asserted to the downstream server. This credential can be set as the originating client identity, the server identity, or another specified identity, depending on the RunAs mode for the enterprise bean.

identity token

The token that contains the invocation credential identity, which with the client authentication token are required by the receiving server to accept the asserted identity.

inbound authentication

The configuration that determines the type of accepted authentication for inbound requests.

inbound port

A type of port that takes a message that is received at an endpoint listener and passes the message to the service integration bus for forwarding to the appropriate inbound service.

inbound service

A Web service that is available locally and which is accessible through a service integration bus. An inbound service is associated with a service destination, and one or more inbound ports (each with an associated endpoint listener) through which service requests and responses are passed to and from the service.

inbound transport

Network ports in which a server listens for incoming requests.

indirect link

A link from a service integration bus to a foreign bus that is made through one or more intermediate foreign buses. The intermediate foreign buses can be service integration buses or WebSphere MQ systems.

information center

A collection of information that provides support for users of one or more products, can be launched separately from the product, and includes a list of topics for navigation and a search engine.

inheritance

An object-oriented programming technique that supports the use of existing classes as a basis for creating other classes.

initial context

The starting point in a namespace.

initial reference

A well-known reference that is associated with an identifier.

installation factory

A tool that creates a single, customized installation image.

instance

In object-oriented programming, an object of a particular class.

integrated development environment (IDE)

A set of software development tools such as source editors, compilers, and debuggers, that is accessible from a single user interface.

In Eclipse, the IDE is called the Workbench.

Integrated Solutions Console (ISC)

The core technology of the IBM Autonomic Computing initiative that provides a common, consistent portal-based user interface, based on industry standards and component reuse, that can host common system administrative functions that are provided by IBM server, software, or storage products.

Interactive System Productivity Facility (ISPF)

An IBM licensed program that serves as a full-screen editor and dialog manager. Used for writing application programs, it provides a means of generating standard screen panels and interactive dialogs between the application programmer and terminal user.

Interface Definition Language (IDL)

In Common Object Request Broker Architecture (CORBA), a declarative language that is used to describe object interfaces, without regard to object implementation.

International Organization for Standardization (ISO)

An international body charged with creating standards to facilitate the exchange of goods and services as well as cooperation in intellectual, scientific, technological, and economic activity.

internationalized

An application that is coded such that it can present information to users in different locales or languages, and accept input data from users in multiple locales.

Internet Engineering Task Force (IETF)

The task force of the Internet Architecture Board (IAB) that is responsible for solving the short-term engineering needs of the Internet. The IETF consists of numerous working groups, each focused on a particular problem. Internet standards are typically developed or reviewed by individual working groups before they can become standards.

IIOP

A protocol used for communication between Common Object Request Broker Architecture (CORBA) Object Request Brokers.

interoperability

The capability to communicate, run programs, or transfer data among various functional units in a way that requires the user to have little or no knowledge of the unique characteristics of these units.

Interoperable Naming Service (INS)

A program that supports the configuration of the ORB administratively to return object references.

interoperable object reference (IOR)

An object reference with which an application can make a remote method call on a CORBA object. This reference contains all the information needed to route a message directly to the appropriate server.

invocation

The activation of a program or a procedure.

invocation credential

An identity with which to invoke a downstream method. The receiving server requires this identity with the sending server identity to accept the asserted identity.

invoker attribute

An assembly property for a Web module that is used by the servlet that implements the invocation behavior.

J2EE application

Any deployable unit of J2EE functionality. This unit can be a single module or a group of modules packaged into an enterprise archive (EAR) file with a J2EE application deployment descriptor. (Sun)

J2EE Connector architecture (JCA)

A standard architecture for connecting the J2EE platform to heterogeneous enterprise information systems

J2EE server

A run-time environment that provides enterprise bean or Web containers.

Java

An object-oriented programming language for portable interpretive code that supports interaction among remote objects. The Java language was developed and specified by Sun Microsystems, Incorporated.

Java 2 Connector Security

An architecture designed to extend the end-to-end security model for J2EE-based applications to include enterprise information systems (EIS).

J2EE (J2EE)

An environment for developing and deploying enterprise applications, defined by Sun Microsystems Inc. The J2EE platform consists of a set of services, APIs, and protocols that provide the functionality for developing multitiered, Web-based applications.

Java API for XML (JAX)

Refers to a set of Java-based application programming interfaces for handling various operations involving data that is defined through Extensible Markup Language (XML).

Java API for XML-based RPC (JAX-RPC)

A specification that describes application programming interfaces and conventions for supporting XML-based remote procedure call (RPC) protocols in the Java platform.

JAAS

A package through which services can authenticate and authorize users while enabling the applications to remain independent from underlying technologies.

Java Command Language (Jacl)

A scripting language for the Java 2 environment that is used to create Web content and to control Java applications.

Java Database Connectivity (JDBC)

An industry standard for database-independent connectivity between Java code and a wide range of databases. The JDBC provides a call-level application programming interface (API) for SQL-based database access.

Java Generic Security Services (JGSS)

A specification that provides Java programs access to the services that include the signing and sealing of messages and a generic authentication mechanism.

JMX

A means of doing management of and through Java technology. JMX was developed through the Java Community ProcessSM program, by Sun Microsystems, Inc. and some leading companies in the management field. JMX is a universal, open extension of the Java programming language for management that can be deployed across all industries, wherever management is needed.

JMS

A Java API that supports the creation and communication of various messaging implementations.

Java Naming and Directory Interface (JNDI)

A Java extension that provides an interface for various directory and naming services in an enterprise.

Java platform

A collective term for the Java language for writing programs; a set of APIs, class libraries, and other programs used in developing, compiling, and error-checking programs; and a Java virtual machine which loads and executes the class files. (Sun)

Java Runtime Environment (JRE)

A subset of the Java Software Development Kit (SDK) that contains the core executables and files that constitute the standard Java platform. The JRE includes the JVM, core classes, and supporting files.

Java Secure Socket Extension (JSSE)

A Java package that enables secure Internet communications. It implements a Java version of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols and supports data encryption, server authentication, message integrity, and optionally, client authentication.

JVM

A software implementation of a central processing unit that runs compiled Java code (applets and applications).

Java Virtual Machine Profiler Interface (JVMPI)

A profiling tool that supports the collection of information, such as data about garbage collection and the JVM application programming interface (API) that runs the appserver.

Java Widget Library (JWL)

An extended widget set usable by portal and portlet programmers that adds JavaScript client-side processing to JavaServer Faces.

JavaBeans

As defined for Java by Sun Microsystems, a portable, platform-independent, reusable component model.

JavaBeans Activation Framework (JAF)

A standard extension to the Java platform that determines arbitrary data types and available operations and can instantiate a bean to run pertinent services.

JavaMail API

A platform and protocol-independent framework for building Java-based mail client applications.

JavaServer Faces (JSF)

A Java framework that is used for developing Web applications.

JavaServer Pages

A server-side scripting technology that enables Java code to be dynamically embedded within Web pages (HTML files) and run when the page is served to return dynamic content to a client.

JavaServer Pages file

Application building blocks coded to the Sun Microsystems JavaServer Pages specification. JSP files enable the separation of the Hypertext Markup Language (HTML) code from the business logic in Web pages so that HTML programmers and Java programmers can collaborate when creating and maintaining pages.

JAX-RPC handler

A Java class that performs a range of handling tasks, including logging messages, transforming message content, or terminating an incoming request.

JFAP

The proprietary formats and protocols that are used to communicate between messaging engines, and between clients and messaging engines.

JMS provider

The software that implements the JMS specification for a messaging product.

JMS Topic

In JMS, a JMS-managed object that manages the message flow from publishers to subscribers.

JRas

A toolkit that consists of a set of Java packages that enable developers to incorporate message logging and trace facilities into Java applications.

JSP page

A text-based document using fixed template data and JSP elements that describes how to process a request to create a response. (Sun)

junction

A logical connection created to establish a path from one server to another.

kernel

The part of an operating system that performs basic functions such as allocating hardware resources.

key

A cryptographic mathematical value that is used to digitally sign, verify, encrypt, or decrypt a message.

key database file

A synonym for a key ring.

key file

A synonym for key ring. The file that stores the keys used during the authentication of a message.

key locator

A mechanism that retrieves the key for XML signing, XML digital signature verification, XML encryption, and XML decryption.

key ring

In computer security, a file that contains public keys, private keys, trusted roots, and certificates.

Keyed-Hashing Message Authentication Code (HMAC)

A mechanism for message authentication that uses cryptographic hash functions.

keystore file

A key database file that contains both public keys stored as signer certificates and private keys stored in personal certificates.

keystring

Additional specification of the entry within the naming service.

launchpad

A graphical interface for launching the product installation.

lazy authentication

The process whereby the security run time obtains the required authentication data when the Java client accesses a protected enterprise bean for the first time.

LDAP

An open protocol that uses TCP/IP to provide access to information directories that support an X.500 model and that does not incur the resource requirements of the more complex X.500 Directory Access Protocol (DAP). For example, LDAP can be used to locate people, organizations, and other resources in an Internet or intranet directory.

A protocol that uses cryptography to support security in a distributed environment.

link name

A name that is defined in the deployment descriptor of the encompassing application.

link pack area (LPA)

A major element of MVS/ESA virtual storage below the 16MB line. The storage areas that make up the LPA contain all the common reentrant modules shared by the system. The LPA provides economy of real storage by sharing one copy of the modules, protection because LPA code cannot be overwritten even by key 0 programs, and reduced path length because the modules can be branched to.

listener

A program that detects incoming requests and starts the associated channel.

listener port

An object that defines the association between a connection factory, a destination, and a deployed message-driven bean. Listener ports simplify the administration of the associations between these resources.

load balancing

The monitoring of appservers and management of the workload on servers. If one server exceeds its workload, requests are forwarded to another server with more capacity.

local

Pertaining to a device, file, or system that is accessed directly from a user’s system, without a communication line.

local transaction containment (LTC)

A bounded scope that is managed by the container to define the appserver behavior in an unspecified transaction context.

location service daemon

A component of the Remote Method Invocation and Internet inter-ORB Protocol (RMI/IIOP) communication function that works with workload management to distribute RMI requests among appservers in a cell.

log handler

A class that uses loggers, levels, and filters to direct whether events are processed or suppressed.

logger

A named and stateful object with which the user code interacts that logs messages for a specific system or application component.

logging

The recording of data about specific events on the system, such as errors.

logging level

A value that controls which events are processed by Java logging.

login binding

A definition of the implementation to provide login information per authentication methods.

login mapping

A JAAS login configuration that is used to authenticate a security token in a Web service security header.

long name

The property that specifies the logical name for the server on the z/OS platform in WebSphere Application Server.

mail session

A resource collection of protocol providers that authenticate users and control user access to messaging systems.

Managed Bean (MBean)

In the JMX specification, the Java objects that implement resources and their instrumentation. MBeans must follow the design patterns and interfaces defined in the instrumentation level of the JMX specification to ensure that all MBeans provide the instrumentation of managed resources in a standardized way. MBeans are manageable by any JMX agent, but they can also be managed by non-compliant agents that support the MBean concept.

managed node

A node with an appserver and a node agent that belongs to a cell.

managed resource

An entity that exists in the run-time environment of an IT system and can be managed.

marooned message

A message that cannot be delivered due to the unavailability of a component that is necessary to its processing.

marshal

The conversion of an object into a data stream for transmission over a network.

MBean provider

A library containing an implementation of a Java Management Extensions (JMX) MBean and its MBean XML descriptor file.

MD5

A type of message algorithm that converts a message of arbitrary length into a 128-bit message digest. This algorithm is used for digital signature applications where a large message must be compressed in a secure manner.

mediation

1. The handling of inflight messages between the production of a message by one application, and the consumption of a message by another application. Mediation processing includes:

  • Message transformation from one representation to another.

  • Message routing to one or more targets that were not specified by the sending application.

  • Message augmentation by adding data from a data source.

2. The administered object that defines the information that is needed by a messaging engine to mediate associated destinations.

mediation handler

A unit of mediation function that performs specific message processing at run time. A mediation handler can be deployed as a simple Java bean or as a stateless session enterprise bean.

mediation point

A location in a messaging engine at which messages are mediated.

memory leak

The effect of a program that maintains references to objects that are no longer required and therefore need to be reclaimed.

memory-to-memory replication

The session replication of one instance of WebSphere Application Server to another.

message digest

A hash value or a string of bits resulting from the conversion of processing data to a number.

message point

A location in a messaging engine at which messages are held before being processed. See queue point, publication point, and mediation point.

message-driven bean

An enterprise bean that provides asynchronous message support and clearly separates message and business processing.

messaging bus

The role of a service integration bus when providing the messaging system for JMS applications using the default messaging provider.

messaging engine

A component of a service integration bus that provides messaging function and a connection point to which applications connect to the bus. A messaging engine runs within a server and uses an instance of a Java Database Connectivity (JDBC) data source to interact with the database that contains the data store for that messaging engine.

metadata

Data that describes the characteristics of stored data; descriptive data. For example, the metadata for a database table might include the name of the table, the name of the database that contains the table, the names of the columns in the table, and the column descriptions, either in technical terms or business terms. Database catalogs and information catalogs contain metadata.

method

In object-oriented design or programming, the software that implements the behavior specified by an operation.

method extension

An IBM extension to the standard deployment descriptors for enterprise beans that define transaction isolation methods and control the delegation of credentials.

method permission

A mapping between one or more security roles and one or more methods that a member of a role can call.

module

In J2EE, a software unit that consists of one or more components of the same container type and one deployment descriptor of that type. Examples include EJB, Web, and application client modules. Modules can be deployed as stand-alone units or assembled into an application. (Sun).

monitor

In performance profiling, to collect data about an application from the running agents that are associated with that application

mount point

A logical drive through which volumes are accessed in a sequential access device class. For removable media device types, such as cartridges, a mount point is a logical drive associated with a physical drive. For the file device type, a mount point is a logical drive associated with an I/O stream.

multicast

Transmission of the same data to a selected group of destinations.

multiple configuration instance

More than one instance of a product running in the same machine at the same time.

multiprocess multithread (MPMT)

A process architecture of the IBM HTTP Server that supports multiple processes as well as multiple threads per process.

Multipurpose Internet Mail Extensions (MIME)

An Internet standard that allows different forms of data including video, audio, or binary data to be attached to e-mail without requiring translation into ASCII text.

namespace

A space that is reserved by a file system to contain the names of its objects.

naming

An operation that is used by clients of WebSphere Application Server applications to obtain references to objects that are related to those applications.

naming context

A logical namespace that contains name and object bindings.

naming federation

The process of linking together naming systems so that the aggregate system can process composite names that span the naming systems.

naming service

An implementation of the Java Naming and Directory Interface (JNDI) standard.

native

Pertaining to the relationship between a transport user and a transport provider that are both based on the same transport protocol.

network address translation (NAT)

The conversion of a network address that is assigned to a logical unit in one network into an address in an adjacent network.

network file system (NFS)

A base element of z/OS that allows remote access to z/OS host-processor data from workstations, personal computers, or any other system on a Transmission Control Protocol/Internet Protocol (TCP/IP) network that is using client software for the Network File System (NFS) protocol.

network protocol stack

A set of network protocol layers and software that work together to process the protocols.

node

A logical grouping of managed servers.

node agent

An administrative function that manages all appservers on a node and represents the node in the managed cell.

node federation

The process of combining the managed resources of one node into a distributed network such that the central manager application can access and administer the resources on the node.

node group

A collection of WebSphere Application Server nodes that defines a boundary for server cluster formation.

node name

The machine name or host name; an arbitrary WAS-specific name that must be unique.

nonce

A unique cryptographic number that is embedded in a message to help detect a replay attack.

nondurable subscription

A subscription that only exists for the lifetime of a consumer connection to a service integration bus.

nonrepudiation

In business-to-business communication, the ability of the recipient to prove who sent a message based on the contents of the message. This proof is derived from the use of a digital signature in the message, which links the sender to the message.

notification

A message that contains the event descriptions that are sent to managed resources, autonomic managers, and other resources.

object

In object-oriented design or programming, a concrete realization (instance) of a class that consists of data and the operations associated with that data. An object contains the instance data that is defined by the class, but the class owns the operations that are associated with the data.

object adapter

A Common Object Request Broker Architecture (CORBA) term that denotes the primary interface that a server implementation uses to access Object Request Broker (ORB) functions.

Object Request Broker (ORB)

In object-oriented programming, software that serves as an intermediary by transparently enabling objects to exchange requests and responses.

one-way hash

An algorithm that converts processing data into a string of bits; known as a hash value or a message digest.

Open Service Gateway initiative (OSGi)

A consortium of more than 20 companies, including IBM, that creates specifications to outline open standards for the management of voice, data and multimedia wireless and wired networks.

Open Servlet Engine (OSE)

A lightweight communications protocol that was developed by IBM for interprocess communication.

outbound authentication

The configuration that determines the type of accepted authentication for outbound requests.

outbound port

A port through which an outbound service communicates with the externally-hosted Web service. Messages pass between the outbound service and the external service through the appropriate port.

outbound service

A representation of a Web service that is hosted externally and accessible through a service integration bus. An outbound service is associated with a service destination, and one or more outbound ports through which service requests and responses are passed to and from the external Web service.

package

(1) In Java programming, a group of types. Packages are declared with the package keyword. (Sun)

(2) In J2EE technology, to assemble components into modules and modules into enterprise applications.

page list

An assembly property that specifies the location to forward a request, but automatically tailors that location, depending on the Multipurpose Internet Mail Extensions (MIME) type of the servlet.

parallel garbage collection

A type of garbage collection that uses several garbage collection threads at one time.

part reference

An object that is used by a configuration to reference other related configuration objects.

partitioned destination

A bus destination that is assigned to a cluster bus member. Each messaging engine in the server cluster has a separate queue point for the destination. Messages that are sent to a partitioned destination are routed to one of the queue points based on workload management (WLM) algorithms.

passivation

In enterprise beans, the process of transferring an enterprise bean from memory to secondary storage. (Sun)

PassTicket

In Resource Access Control Facility (RACF) secured signon, a dynamically generated, random, one-time-use, password substitute that a workstation or other client can use to sign on to the host rather than sending a RACF password across the network.

payload

The body of the message that holds the content.

peer access point

A means by which core groups can communicate with other cells.

Performance Monitoring Infrastructure (PMI)

A set of packages and libraries that are assigned to gather, deliver, process, and display performance data.

permanent destination

A bus destination for which a runtime instance is created automatically when the messaging engine starts. Permanent destinations remain until they are explicitly deleted by an administrative action. See temporary destination.

permission

Authorization to perform activities, such as reading and writing local files, creating network connections, and loading native code.

persist

To be maintained across session boundaries, usually in nonvolatile storage such as a database system or a directory.

persistence

(1) A characteristic of data that is maintained across session boundaries, or of an object that continues to exist after the execution of the program or process that created it, usually in nonvolatile storage, such as a database system.

(2) In J2EE technology, the protocol for transferring the state of an entity bean between its instance variables and an underlying database. (Sun)

perspective

A group of views that show various aspects of the resources in the workbench. The workbench user can switch perspectives, depending on the task at hand, and customize the layout of views and editors within the perspective.

plain old Java object (POJO)

Another name for a simple or regular Java object and not an enterprise bean.

plug-in

A software module that is often written by a third party that adds function to an existing program or application, such as a Web browser.

point-to-point

A style of messaging application in which the sending application knows the destination of the message.

poisoned message

A message that is badly formatted and which, when it arrives on a queue, causes the receiving application to back out the receipt of the message.

policy

A set of considerations that you set up to automatically control the behavior of a managed resource or user.

port

As defined in a Web Services Description Language (WSDL) document, a single endpoint that is defined as a combination of a binding and a network address.

port destination

A specialization of a bus destination that is used to pass messages to an external Web service. You can configure one or more port destinations for each type of message protocol and transport mechanism (for example, SOAP over HTTP or SOAP over JMS) through which service requests and responses can pass to the external service.

port number

In the Internet suite of protocols, the identifier for a logical connector between an application entity and the transport service.

portal

A single, secure point of access to diverse information, applications, and people that you can customize and personalize.

portal application archive (PAA)

A portlet application that is packaged as a Web or enterprise archive with two additional XML descriptors that define access control, page layout, and navigation as well as any other resources in the package (for example, themes, wires, or J2EE artifacts).

portlet

A reusable Web module that runs on a portal server. Portlets have predefined roles such as retrieving news headlines, searching a database, or displaying a calendar.

presumed trust

A type of identity assertion where trust is presumed and additional trust validation is not performed. Use this mode only in an environment where trust is established with some other mechanism.

primary key

An object that uniquely identifies an entity bean within a home (Sun).

primitive key

In Java programming, a type of data that describes a variable containing a single value of the appropriate size and format for its type: a number, a character, or a Boolean value. Examples of primitive types include byte, short, int, long, float, double, char, boolean.

principal

An entity that can communicate securely with another entity.

private key

In secure communication, an algorithmic pattern that is used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user’s system and is protected by a password.

process definition

A specification of the runtime characteristics for an appserver process.

process module

A program unit that contains a set of process templates that support administrative tasks.

producer

1. An application that attaches to a destination and produces messages that are put onto the service integration bus.
2. In JMS, an object that is used for sending messages to a destination.

profile

Data that describes the characteristics of a user, group, resource, program, device, or remote location.

profile root

The home directory for a particular instantiated profile.

programmatic login

A type of form login that supports application presentation site-specific login forms for the purpose of authentication.

programmatic security

A collection of methods that applications use when declarative security is not sufficient to express the security model of the application.

programming model extension (PME)

The programming model capabilities that ship with WebSphere Application Server Enterprise Edition. These capabilities are also known as enterprise services.

property

A characteristic or attribute that describes a unit of information.

proxy cluster

A group of proxy servers that distributes HTTP requests across the cluster.

proxy peer access point

A means of identifying the communication settings for a peer access point that cannot be accessed directly.

proxy server

A server that acts as an intermediary for HTTP Web requests that are hosted by an application or a Web server. A proxy server acts as a surrogate for the content servers in the enterprise.

public

In the Java programming language, pertains to a method or variable that can be accessed by elements residing in other classes. (Sun)

public key

In secure communication, an algorithmic pattern that is used to decrypt messages that were encrypted by the corresponding private key. You can use a public key to encrypt messages that are decrypted only by the corresponding private key. Users broadcast their public keys to everyone with whom they must exchange encrypted messages.

public-key algorithm

An algorithm that is designed so that the key used for encryption is different from the key that is used for decryption. The decryption key cannot be derived, at least not in any reasonable amount of time, from the encryption key.

publication point

A message point that is associated with a topic space destination. When you define a topic space, a publication point is created in each messaging engine within the bus. Messages are held at the publication point until they are consumed by all of the local subscribers.

publish

1. To make a Web site public, for example by putting files in a path known to the HTTP server.

2. In Universal Description Discovery and Integration (UDDI), to advertise a Web service so that other businesses can find and bind with it. Service providers publish the availability of their services through a registry.

publish/subscribe

A style of messaging application in which the providers of information or publishers, are decoupled from the consumers of that information or subscribers, using a broker.

publish/subscribe bridge

The component of a WebSphere MQ link that enables publish/subscribe messaging between the service integration bus and WebSphere MQ.

quality of service (QoS)

A set of communication characteristics that an application requires. QoS defines a specific transmission priority, level of route reliability, and security level.

queue

A WebSphere MQ object to which message queuing applications can put messages, and from which they can get messages. Local queues can contain a list of messages waiting for processing. Queues of other types cannot contain messages: they point to other queues, or can be used as models for dynamic queues.

queue destination

A bus destination that is used for point-to-point messaging.

queue point

A messaging point at which messages are held in a queue until they are consumed. When you define a queue destination and assign it to a bus member, a queue point is created for each messaging engine in the assigned bus member.

queueing network

A group of interconnected components.

rapid deployment tool

One of a set of tools to rapidly develop and deploy Java 2 Platform, Enterprise Edition (J2EE) artifacts on the server and package the J2EE artifacts into the deployed enterprise archive (EAR) file.

realm

A collection of resource managers that honor a common set of user credentials and authorizations.

realm name

The machine name of a user registry.

reentrance

A situation where a thread of control attempts to enter a bean instance again.

reference

A logical name that is defined in the application deployment descriptor and used to locate external resources for enterprise applications. At deployment, the references are bound to the physical location of the resource in the target operational environment.

referential integrity

In XML tools, the condition that exists when all of the references to items in the XML schema editor or document type definition (DTD) editor are automatically cleaned up when the schema is detected or renamed.

referral

In the LDAP, a pointer from one LDAP directory server to another.

refresh pack

A fix pack, which is a cumulative collection of fixes, that also contains new functions. Full regression testing is performed on refresh packs.

region

A contiguous area of virtual storage that has common characteristics and that can be shared between processes.

registry

A repository that contains access and configuration information for users, systems, and software.

relational database management system (RDBMS)

A collection of hardware and software that organizes and provides access to a relational database.

reliability attribute

A quality of service attribute for messages that specify the reliability of message delivery options. The following options are available: best-effort nonpersistent, express nonpersistent, reliable nonpersistent, reliable persistent, and assured persistent.

reliable nonpersistent

A delivery option that specifies that messages are discarded when a messaging engine stops or fails.

reliable persistent

A delivery option that specifies that messages can be discarded when a messaging engine fails.

remote

Pertaining to a system, program, or device that is accessed through a communications line.

remote home interface

In enterprise beans, an interface that specifies the methods that are used by remote clients for locating, creating, and removing instances of enterprise bean classes.

remote interface

In enterprise beans, an interface that defines the business methods that can be called by a client.

remote mediation point

The representation of a remote proxy for a mediation point that exists at a remote messaging engine. The remote mediation point manages an outbound message stream to the mediation point at the remote messaging engine.

remote message point

A message point that a messaging engine creates dynamically for the purpose of sending and receiving messages to and from a message point on another messaging engine in the service integration bus. Different types of remote message points exist: remote queue point, remote publication point, and remote mediation point. Messages can accumulate at these points in transit to their corresponding message points on the remote engines.

remote method

A business method in the remote interface that a client can call.

RMI

A protocol that is used to communicate method invocations over a network. Java Remote Method Invocation is a distributed object model in which the methods of remote objects that are written in the Java programming language can be invoked from other Java virtual machines, possibly on different hosts.

Remote Method Invocation over Internet Inter-ORB Protocol (RMI/IIOP)

Part of the Java 2 Platform, Standard Edition (J2SE) model that developers can use to program in the Java language to work with RMI interfaces, but use IIOP as the underlying transport.

Remote OSE

The use of the Open Servlet Engine (OSE) protocol as a transport mechanism to communicate between two separate machines in the WebSphere Application Server environment.

remote procedure call (RPC)

A protocol that allows a program on a client computer to run a program on a server.

remote publication point

A representation of a remote proxy for a publication point that exists at a remote messaging engine. The remote publication point manages an outbound message stream to the publication point at the remote messaging engine.

remote queue point

The representation of a remote proxy for a queue point that exists on a remote messaging engine. The remote queue point manages an outbound message stream to the queue point on the remote messaging engine, and an inbound message retrieval request stream for messages received from the queue point.

remove method

In enterprise beans, a method that is defined in the home interface and invoked by a client to destroy an enterprise bean.

repertoire

Configuration information that contains the necessary details for building a Secure Sockets Layer (SSL) connection.

replication

The process of copying objects from one node in a cluster to one or more other nodes in the cluster, which makes the objects on all the systems identical.

replication entry

A run-time component that handles the transfer of internal WebSphere Application Server data.

repository

A persistent storage area for source code and other application resources.

request consumer binding

A definition of the security requests for the request message that is received by a Web service.

request generator binding

A definition of the security requests for the request message that is sent to a Web service.

request metrics

A mechanism to monitor and troubleshoot performance bottlenecks in the system at an individual request level.

request receiver binding

A definition of the security requirements for the request message that is received from a request to a Web service.

request sender binding

A definition of the security requirements for the request message that is sent to a Web service.

Resource Access Control Facility (RACF)

An IBM licensed program that provides access control by identifying users to the system; verifying users of the system; authorizing access to protected resources; logging detected, unauthorized attempts to enter the system; and logging detected access to protected resources.

resource adapter

A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system (EIS). A resource adapter plugs in to a container; the application components deployed on the container then use the client API (exposed by adapter) or tool-generated, high-level abstractions to access the underlying EIS. (Sun).

resource adapter archive (RAR)

A Java archive (JAR) file that is used to package a resource adapter for the Java 2 Connector (J2C) architecture. .

resource environment reference

A reference that maps a logical name that is used by the client application to the physical name of an object.

resource manager local transaction (RMLT)

A resource manager view of a local transaction that represents a unit of recovery on a single connection that is managed by the resource manager.

resource property

A property for a Java Database Connectivity (JDBC) data source in a server configuration; for example the server name, user ID, or password.

Resource Recovery Services (RRS)

A z/OS platform facility that provides two-phase synchronization point support across participating resource managers.

response consumer binding

A definition of the security requests for the response message that is received by a Web service.

response generator binding

A definition of the security requests for the response message that is sent to a Web service.

response receiver binding

A definition of the security requirements for the response message that is received from a request to a Web service.

response sender binding

A definition of the security requirements for the response message that is sent to a Web service.

reverse proxy

A reverse proxy or surrogate is a proxy server that is installed within the neighborhood of one or more servers. Typically, reverse proxies are used in front of Web servers. All connections coming from the Internet addressed to one of the Web servers are routed through the proxy server, which may either deal with the request itself or pass the request wholly or partially to the main web servers.

reverse routing path

A stack of bus destinations within a request message through which a message is routed back to its origin. When the message is created, the reverse routing path is empty. As the message passes through each destination, the destination is pushed onto the stack. When the message reaches the final destination, the reverse routing path is copied to the forward routing path and the message is routed back through all the appropriate destinations.

ripplestart

An action where the system waits for each member in a cluster to start before starting the next member of the cluster.

role

A logical group of principals that provide a set of permissions. Access to operations is controlled by granting access to a role.

role mapping

The process of associating groups and principals that are recognized by the container to security roles that are specified in the deployment descriptor.

role-based authorization

The use of authorization information to determine whether a caller has the necessary privilege to request a service.

routing policy

A set of rules that determine how the server routes incoming requests.

run time

The time period during which a computer program runs.

RunAs role

A role that is used by a servlet or an enterprise bean component to invoke and delegate a role to another enterprise bean.

scalability

The ability of hardware, software, or a distributed system to continue to function well as it is changed in size or volume. For example, the ability to retain performance levels when you add processors, memory, and storage.

scheduler

A service that provides time-dependent services.

schema

1. A collection of database objects such as tables, views, indexes, or triggers that define a database. A database schema provides a logical classification of database objects.

2. In XML, a mechanism for describing and constraining the content of XML files by indicating which elements are allowed and in which combinations. XML schemas are an alternative to the document type definition (DTD) and used to to extend functionality in the areas of data typing, inheritance, presentation, and functionality.

scope

A specification for the boundary within which you can use system resources.

script

A series of commands, combined in a file that carry out a particular function when the file runs. Scripts are interpreted as they run.

scripting

A style of programming that reuses existing components as a base for building applications.

SDO

See Service Data Objects.

SDO repository

A database that the service integration bus for Web services enablement uses for storing and serving Web Services Description Language (WSDL) definitions

Secure Association Service (SAS)

An authentication protocol that the client principal uses to communicate by establishing a secure association between the client and server.

Secure Sockets Layer (SSL)

A security protocol that provides transport layer security, which consists of authenticity, integrity, and confidentiality, for a secure connection between a client and a server. The protocol runs above TCP/IP and below application protocols.

Security Assertion Markup Language (SAML)

An XML framework for exchanging authentication and authorization information.

security attribute propagation

The transportation of security attributes from one server to another server in a WebSphere Application Server configuration.

security constraint

A declaration of how to protect Web content, and how to protect data that is communicated between the client and the server.

security domain

The set of all the servers that are configured with the same realm name for the user registry or repository.

security permission

Authorization granted to access a system resource.

security policy

A written document that defines the security controls that you institute for your computer systems. A security policy describes the risks that you intend these controls to minimize and the actions to take if someone breaches your security controls.

security role reference

A role that defines the access levels a user has and the specific resources that they can modify at those levels.

security token

A representation of a set of claims that are made by a client that can include a name, password, identity, key, certificate, group, privilege, and so on.

selector

A filter that is applied when a consumer attaches to a bus destination, to indicate which messages the consumer is prepared to accept.

sequence grouping

The specification of the order in which entity beans update relational database tables.

servant region

A contiguous area of virtual storage that is dynamically started as load increases and automatically stopped as load decreases.

server

In a network, hardware or software that provides facilities to other stations. Examples of a server include a file server, a printer server, and a mail server.

server cluster

A group of servers that are typically on different physical machines and have the same applications configured within them, but operate as a single logical server.

server implementation object

Enterprise beans that client applications require to access and implement the services that support those objects.

server-side include (SSI)

A facility for including dynamic information in documents that are sent to clients, such as current date, the last modification date of a file, and the size or last modification of other files.

service access point

A logical address that allows a system to route data between a remote device and the appropriate communications support.

service class

A subset of a workload that has the same service goals or performance objectives, resource requirements, or availability requirements. For workload management, you assign a service goal to a service class.

Service Component Architecture (SCA)

An architecture in which all elements of a business transaction, such as access to Web services, enterprise information system (EIS) service assets, business rules, workflows, databases and so on, are represented in a service-oriented way.

service context

Part of a General Inter-ORB Protocol (GIOP) message that is identified with an ID and contains data used in specific interactions, such as security actions, character codeset conversion, and Object Request Broker (ORB) version information.

Service Data Objects (SDO)

An open standard for enabling applications to handle data from heterogeneous data sources in a uniform way. SDO incorporates Java 2 Platform, Enterprise Edition (J2EE) patterns, but simplifies the J2EE data programming model.

service description

The description of a Web service, which you can define in any format such as Web Services Description Language (WSDL), Universal Description, Discovery, and Integration (UDDI), or Hypertext Markup Language (HTML).

service destination

A specialization of a service integration bus destination. Each service destination can directly represent a Web service implementation or can indirectly represent the service through a Web Services Description Language (WSDL) document.

service integration bus

A managed communication mechanism that supports service integration through synchronous and asynchronous messaging. A bus consists of interconnecting messaging engines that manage bus resources.

service integration bus link

A link between messaging engines on different service integration buses.

service integration bus Web services enablement

A software component that enables Web services to use IBM service integration technologies. This capability provides a quality of service choice and message distribution options for Web services, with mediations that support message rerouting or modification.

service oriented architecture (SOA)

A conceptual description of the structure of a software system in terms of its components and the services they provide, without regard for the underlying implementation of these components, services, and connections between components.

service principal name (SPN)

The name that uniquely identifies a service instance to a client.

service type definition

In Universal Description Discovery and Integration (UDDI), a description of specifications for services or taxonomies.

servlet

A Java program that runs on a Web server and extends the capabilities of a Web server by generating dynamic content in response to Web client requests. Servlets are commonly used to connect databases to the Web.

servlet filtering

The process of transforming a request or modifying a response without exposing the resource that is used by the servlet engine.

servlet mapping

A correspondence between a client request and a servlet that defines their association.

session

A series of requests to a servlet that originates from the same user at the same browser.

session affinity

A method of configuring applications in which a client is always connected to the same server. These configurations disable workload management after an initial connection by forcing a client request to always go to the same server.

session bean

An enterprise bean that is created by a client and that usually exists only for the duration of a single client/server session. (Sun)

Session Initiation Protocol (SIP)

A protocol that initiates, modifies, and terminates interactive user sessions that involve multimedia. It works with other protocols and is involved specifically in the signaling portion of a communication session.

setup

The physical and logical arrangement of hardware and software that make up a data processing system.

setter method

A method whose purpose is to set the value of an instance or class variable. With this capability, another object can set the value of one of its variables.

SHA-1

A Secure Hash Algorithm for computing a condensed representation of a message or data file.

shared library file

A file that consists of a symbolic name, a Java class path,and a native path for loading Java Native Interface (JNI) libraries. Applications that are deployed on the same node as this file can access this information.

short name

In personal communications, the one-letter name (A through Z) of the presentation space or emulation session.

SIB service

In an appserver, the service that provides service integration functions.

signer certificate

The trusted certificate entry that is usually in a truststore file.

silent installation

An installation that does not send messages to the console, but instead stores messages and errors in log files. A silent installation can use response files for data input.

Simple and Protected Negotiation Mechanism (SPNEGO)

A protocol by which clients and servers determine an authentication mechanism.

Simple Authentication and Security Layer (SASL)

An Internet protocol that allows LDAP (LDAP) clients to authenticate with an LDAP server and provides security for the data that is transmitted with this protocol.

Simple Object Access Protocol (SOAP)

A lightweight, XML-based protocol for exchanging information in a decentralized, distributed environment. You can use SOAP to query and return information and invoke services across the Internet.

simple type

In XML, a type that cannot have element content and cannot carry attributes. Elements that contain numbers, strings, dates, and so on, but do not contain any subelements.

SSO

An authentication process in a client and server relationship in which the user can enter one name and password, and have access to more than one application.

smart card

An intelligent token that is embedded with an integrated circuit chip that provides memory capacity and computational capabilities.

SOAP with attachments API for Java (SAAJ)

An API that is used to send XML documents over the Internet from a Java base.

socket

A method of communication between two processes. A socket is an identifier that the application uses to uniquely identify an end point of communications. The user associates a protocol address with the socket by associating a socket address with the socket.

Sockets Secure (SOCKS)

A client/server architecture that transports TCP/IP traffic through a secure gateway. A SOCKS server and a proxy server perform many of the same services.

software development kit

A set of tools, APIs, and documentation to assist with the development of software in a specific computer language or for a particular operating environment.

special-subject

A generalization of a particular class of users; a product-defined entity that is independent of the user registry.

SSL channel

A type of channel within a transport chain that associates a Secure Sockets Layer (SSL) configuration repertoire with the transport chain.

stack

An area in memory that stores temporary register information, parameters, and the return addresses of subroutines.

Standard Generalized Markup Language (SGML)

A standard metalanguage for defining markup languages that is based on the ISO 8879 standard. SGML focuses on structuring information rather than presenting information; it separates the structure and content from the presentation. It also facilitates the interchange of documents across an electronic medium.

stateful session bean

A session enterprise bean that acts on behalf of a single client and maintains client-specific session information, which is called conversational state, across multiple method calls and transactions.

stateless session bean

A session bean that is a collection of operations. The server can optimize resources by reusing bean instances on every method call.

static

A Java programming language keyword that is used to define a variable as a class variable.

static cluster

A backup cluster that is defined statically to handle requests if the primary cluster fails.

store archive (SAR)

A platform-independent file format that aggregates many files into one.

stored procedure

A block of procedural constructs and embedded Structured Query Language (SQL) statements that is stored in a database and can be called by name. Stored procedures allow an application program to run in two parts, one on the client and the other on the server, so that one call can produce several accesses to the database.

stream decryption

A symmetric algorithm that decrypts data one bit or byte of data at a time.

stream encryption

A symmetric algorithm that encrypts data one bit or byte of data at a time.

string

In programming languages, the form of data that is used for storing and manipulating text.

Structured Query Language (SQL)

A standardized language for defining and manipulating data in a relational database.

Structured Query Language for Java (SQLJ)

A standard set of programming extensions that allows embedded SQL statements in a Java program.

Struts

An open source framework for building Java Web applications.

Struts module

A Struts configuration file and a set of corresponding actions, form beans, and Web pages. A Struts application comprises at least one Struts module.

stub

A small program routine that substitutes for a longer, possibly remote, program. For example, a stub might be a program module that transfers remote procedure calls (RPCs) and responses between a client and a server. In Web services, a stub is an implementation of a Java interface that is generated from a Web Services Description Language (WSDL) document.

subscription point

A message point that represents a durable subscription and is associated with a publication point.

symmetric algorithm

An algorithm where the encryption key can be calculated from the decryption key and vice versa. In most symmetric algorithms, the encryption key and the decryption key are the same.

syntax

The rules for the construction of a command or statement.

System Authorization Facility (SAF)

An interface defined by MVS that enables programs to use system authorization services to protect access to resources such as data sets and MVS commands. The IBM Resource Access Control Facility (RACF) is a product that uses the SAF interface.

system complex (sysplex)

A set of MVS or OS/390 systems communicating and cooperating with each other through certain multisystem hardware components and software services to process customer workloads.

system logger

A central and integrated logging facility for system and subsystem components to use.

tag library

In JSP technology, a collection of tags identifying custom actions described using a taglib descriptor and Java classes. A JSP tag library can be imported into any JSP file and used with various scripting languages. (Sun)

target

The destination for an action or operation.

target service

A service that exists outside of the gateway.

TCP channel

A type of channel within a transport chain that provides client applications with persistent connections within a local area network (LAN).

temporary destination

A bus destination that is created by an application from a model destination that an administrator preconfigured. The application can delete temporary destinations automatically when the application disconnects. See permanent destination.

temporary file system (TFS)

A temporary, in-memory physical file system that supports in-storage mountable file systems. Normally, a TFS runs in the kernel address space, but it can also run in a logical file system (LFS) colony address space.

thin application client

A lightweight, downloadable Java application run time that is capable of interacting with enterprise beans.

thin client

A client that has little or no installed software, but has access to software that is managed and delivered by network servers that are attached to it. A thin client is an alternative to a full-function client, such as a workstation.

thread

A stream of computer instructions that is in control of a process. A multithread process begins with one stream of instructions, one thread, and might later create other instruction streams to perform tasks.

throughput

The measure of the amount of work that is performed by a device, such as a computer or printer, over a period of time; for example, the number of jobs per day.

Time Sharing Option (TSO)

An option of the MVS operating system that provides interactive time sharing from remote terminals.

Tivoli Performance Viewer

A Java client that retrieves the Performance Monitoring Infrastructure (PMI) data from an appserver and displays it in various formats.

token

A particular message or bit pattern that signifies permission or temporary control to transmit on a network.

topic

A character string that describes the nature of the data that is being published in a publish/subscribe system.

topic space

1. A hierarchical collection of named topics.
2. A bus destination that is used in publish/subscribe messaging.

topology

The physical or logical arrangement of nodes in a network, especially the relationships among nodes and the links between them.

transaction

A specific set of input data that runs a specific processor job; a message that is destined for an application program.

transaction class

An interface class that defines all of the methods that a business object implements and that an application can use.

transform algorithm

A procedure that is used to transform the message for Web services security message processing, such as the C14N (canonicalization) transform that is used for XML digital signatures.

transport

The request queue between a WebSphere Application Server plug-in for Web servers and a Web container in which the Web modules of an application reside. When a user at a Web browser requests an application, the request is passed to the Web server, and then along the transport to the Web container.

transport chain

A representation of a network protocol stack that is operating within an appserver.

transport channel chain

A specification of the transport channels that are used by a server for receiving information. Transport channel chains contain endpoints.

Transport Layer Security (TLS)

An Internet Engineering Task Force (IETF)-defined security protocol that is based on Secure Sockets Layer (SSL) and is specified in RFC 2246.

trust anchor

A trusted keystore file that contains a trusted certificate or a trusted root certificate that is used to assert the trust of a certificate.

trust association

An integrated configuration between the security server of the product and third-party security servers. A reverse proxy server acts as a front-end authentication server, while the product applies its own authorization policy onto the resulting credentials that are passed by the proxy server.

trust association interceptor (TAI)

The mechanism by which trust is validated in the product environment for every request that is received by the proxy server. The method of validation is agreed upon by the proxy server and the interceptor.

trust file

A file that contains signer certificates.

trust relationship

An established and trusted communication path through which a computer in one domain can communicate with a computer in the other domain. Users in a trusted domain can access resources in the trusting domain.

trusted identity (ID) evaluator

A mechanism that is used by a server to determine whether to trust a user identity during identity assertion.

truststore file

A key database file that contains the public keys for that target server.

type

1. In Java programming, a class or interface.

2. In a Web Services Description Language (WSDL) document, a container for data type definitions using some type system, such as XML Schema Infoset Model (XSD).

type hierarchy

The complete context for a Java class or interface including its superclasses and subclasses.

UDDI node

A set of Web services that supports at least one of the Universal Description, Discovery, and Integration (UDDI) APIs. A UDDI node consists of one or more instances of a UDDI application running on an appserver or a cluster of appservers with an instance of the UDDI database.

UDDI node initialization

The process by which values are set in the Universal Description, Discovery, and Integration (UDDI) database and the behavior of the UDDI node is established.

UDDI node state

A description of the current status for the Universal Description, Discovery, and Integration (UDDI) node.

UDDI policy

A statement of the required and expected behavior for a Universal Description, Discovery, and Integration (UDDI) registry that is specified through policy values that are defined in the UDDI specification.

UDDI property

A characteristic or attribute that controls the behavior of a Universal Description, Discovery, and Integration (UDDI) node.

Unified Modeling Language (UML)

A standard notation for the modeling of a real-world object as a first step in developing an object-oriented design methodology.

URI

A compact string of characters that identifies an abstract or physical resource.

URL

The unique address of a file that is accessible in a network such as the Internet. The URL includes the abbreviated name of the protocol that is used to access the information resource and the information used by the protocol to locate the information resource.

unit of work (UOW)

A recoverable sequence of operations that is performed by an application between two points of consistency. A unit of work begins when a transaction starts or at a user-requested synchronization point. The UOW ends either at a user-requested syncpoint or at the end of a transaction.

Universal Description, Discovery, and Integration (UDDI) registry

A distributed registry of businesses and their service descriptions that adhere to the Universal Description, Discovery, and Integration (UDDI) standard for managing the discovery of Web services. UDDI registries come in two forms: public and private. Both of these forms are implemented in a common Extensible Markup Language (XML) format.

universal unique identifier (UUID)

The 128-bit numerical identifier that is used to ensure that two components do not have the same identifier. The identifier is unique for all space and time.

unmanaged node

A node that is defined in the cell topology that does not have a node agent managing the process. An unmanaged node is typically used to manage Web servers.

URL scheme

The identification of an electronically accessible resource, the path to that resource, and the resource name.

User Datagram Protocol (UDP)

An Internet protocol that provides unreliable, connectionless datagram service. It enables an application program on one machine or process to send a datagram to an application program on another machine or process.

user name token

A type of token that is represented by a user name and optionally, by a password.

user registry

A database of known users and user-provided information that is used for authentication purposes.

validation

The checking of data or code for correctness or for compliance with applicable standards, rules, and conventions.

variable

A configuration property that provides a parameter for any value in the system. It has a name and a value to use in place of that name wherever the variable name is located within the configuration files.

vertical scaling

The process of setting up multiple appservers on one machine, usually by creating cluster members.

view

In Eclipse-based user interfaces, any pane in the workbench that is outside the editor area and can stack (dragged and dropped) on top of other views. Views provide different ways to work with the resources in the workbench.

view synchronous high-availability manager group

A special class of high availability (HA) group that you can create for components to use that require a certain virtual synchrony (VS) quality of service (QoS) for group communication.

View Synchrony Protocol

A multipoint communication protocol that provides synchronous message delivery and group membership; also known as Virtual Synchrony.

virtual host

A configuration that enables a single host machine to resemble multiple host machines. Resources that are associated with one virtual host cannot share data with resources that are associated with another virtual host, even if the virtual hosts share the same physical machine.

virtual machine

An abstract specification for a computing device that can be implemented in different ways in software and hardware.

virtual private network (VPN)

An extension of a company intranet over the existing framework of either a public or a private network. A VPN ensures that the data that is sent between the two endpoints of its connection remains secure.

virtual synchrony (VS)

A property of group communication that guarantees how messages are delivered when the view changes, for example, when existing members fail or new members join.

waiter

A thread waiting for a connection.

Web application

An application that consists of one or more related servlets, JavaServer Pages technology, and HyperText Markup Language (HTML) files that are managed as a unit.

WAR

A compressed file format that is defined by the Java 2 Platform, Enterprise Edition (J2EE) standard for storing all the resources that are required to install and run a Web application in a single file.

Web browser

A client program that initiates requests to a Web server and displays the information that the server returns.

Web component

A servlet, JavaServer Pages file, or a HyperText Markup Language (HTML) file. One or more Web components make up a Web module.

Web container

A container that implements the Web component contract of the J2EE architecture. (Sun).

Web container channel

A type of channel within a transport chain that creates a bridge in the transport chain between an HTTP inbound channel and a servlet or JavaServer Pages engine.

Web module

A unit that consists of one or more Web components and a Web deployment descriptor. (Sun)

Web property extension (WPX)

IBM extensions to the standard deployment descriptors for Web applications. These extensions include Multipurpose Internet Mail Extensions (MIME) filtering and servlet caching.

Web resource

Any one of the resources that are created during the development of a Web application; for example, Web projects, HTML pages, JavaServer Pages files, servlets, custom tag libraries, and archive files.

Web resource collection

A list of URL patterns and HTTP methods that describe a set of resources to be protected. (Sun)

Web server

A software program that is capable of servicing Hypertext Transfer Protocol (HTTP) requests.

Web server plug-in

A software module that supports the Web server in communicating requests for dynamic content, such as servlets, to the appserver.

Web server separation

A topology where the Web server is physically separated from the appserver.

Web service

A software system that is designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format, specifically Web Services Description Language (WSDL).

Web Service Coordination (WS-COOR)

An extensible framework for providing protocols that coordinate the actions of distributed applications.

Web Services Atomic Transaction (WS-AT)

A specific coordination type that defines protocols for atomic transactions.

Web Services Description Language (WSDL)

An XML-based specification for describing networked services as a set of endpoints that operate on messages containing either document-oriented or procedure-oriented information.

Web Services Interoperability (WS-I)

An organization that promotes Web service interoperability across platforms, operating systems, and programming languages.

Web Services Invocation Framework (WSIF)

A Java API that supports dynamic invoking of Web services, regardless of the format in which the service is implemented or the access mechanism.

WebSphere Common Configuration Model (WCCM)

A model for programmatic access to configuration data that is used by the WebSphere Application Server tooling, run time, and console.

WebSphere MQ client link

An optional component of a messaging engine that presents the messaging engine, and thereby the bus, as a WebSphere MQ queue manager to which WebSphere MQ clients can attach.

WebSphere MQ link

An optional component of a messaging engine that defines the connection information necessary to establish a connection to a remote WebSphere MQ queue manager.

wizard

An active form of help that guides users through each step of a particular task.

work manager

A thread pool for J2EE (J2EE) applications.

work object

A type of asynchronous bean that applications implement to run code blocks asynchronously.

workflow

The sequence of activities that are performed in accordance with the business processes of an enterprise.

workload management

The optimization of the distribution of incoming work requests to the appservers, enterprise beans, servlets and other objects that can effectively process the request.

workspace

A temporary repository of configuration information that administrative clients use.

World Wide Web Consortium (W3C)

An international industry consortium that develops common protocols to promote evolution and interoperability of the World Wide Web.

wrapper

An alternate and supported interface that hides unsupported data types that are required by a server object behind a thin intermediate server object.

WS-I Basic Profile

An outline of the requirements that Web Services Description Language (WSDL) and Web service protocol traffic must comply with, to claim conformance for Web services interoperability (WS-I).

WS-Security

A Web services security standard that provides secure transmission of SOAP messages.

X.509 certificate

A certificate that contains information that is defined by the X.509 standard.

X/Open XA

The X/Open Distributed Transaction Processing XA interface. A proposed standard for distributed transaction communication. The standard specifies a bidirectional interface between resource managers that provide access to shared resources within transactions, and between a transaction service that monitors and resolves transactions.

XML digital signature

A specification that defines the XML syntax and the processing rules to sign and verify the digital signatures for the digital content.

XML encryption

A specification that defines how to encrypt the content of an XML element.

XML parser

A program that interprets the contents of an XML file and determines what to do with the input.

XML Schema Infoset Model (XSD)

A library that provides an API for manipulating the components of an XML Schema, as described by the W3C XML Schema specifications.

XML token

A security token that is in an XML format, such as a Security Assertion Markup Language (SAML) token.

zip

One or more files that are compressed and stored in a single file with a name ending in .zip.

Various Java definitions reprinted with permission from SUN Microsystems, Inc.