A

abbreviated trace
Optional format for CICS trace entries which summarizes the information in full trace entries. Each trace entry is described by a single line of text that is usually sufficient for debugging. See the CICS® Problem Determination Guidefor further information about trace. Also see full trace.
absolute time
(1) A point in time relative to a selected previous point in time from which the timescale (or measurement of time) begins. For example if you wanted to start a batch job using absolute time and the timescale begins at midnight, then specifying an absolute time of 07:00 would mean that the batch job runs at 7am. If the timescale begins at 9am with an absolute time of 07:00, the batch job would run at 4pm.
(2) As returned by an EXEC CICS ASKTIME command and input to an EXEC CICS FORMATTIME command, the number of milliseconds since 00.00 on 1 January 1900.
ACB
See access method control block (ACB).
access
The ability to read, update, or otherwise use a resource. Access to protected resources is usually controlled by system software.
access authority
One of a range of possible authority levels that control access to protected resources. In RACF, the access authorities are: NONE, EXECUTE, READ, UPDATE, CONTROL, and ALTER.
access control environment element (ACEE)
In RACF, a control block containing details of the current user, including user ID, current connect group, user attributes, and group authorities. An ACEE is constructed during user identification and verification.
accessibility
Accessibility features help a user who has a physical disability, such as restricted mobility or limited vision, to use software products successfully.
access intent
(1) In RACF, a subsystem's intended use of a protected resource.
(2) In IMS, a subsystem's intended use of a database. This is in contrast to the sharing level of the database itself, which specifies how the database can be shared.
access key
In ESA key-controlled storage, a key associated with a storage access request. When key-controlled protection applies to a storage access, a store operation (write) is permitted only when the storage key matches the access key; a fetch (read) is permitted when the keys match or when the fetch-protection bit of the storage key is zero. In most cases, the access key for a storage operation is the program status word (PSW) key in the current PSW. For information about how ESA determines when access keys match storage keys, see the IBM Enterprise Systems Architecture/390 Principles of Operation manual.
access list
In RACF, the part of a resource profile that specifies the users and groups that may access the resource and the level of access granted to each.
access method
A technique for moving data between main storage and input/output devices.
access method control block (ACB)
A control block that links an application program to VSAM or VTAM.
access method services (AMS)
A facility that is used to define and reproduce VSAM key-sequenced data sets.
access program
A user-provided part of a FEPI application that handles the main communications with application programs in CICS or IMS systems.
access register (AR)
A register through which one address space accesses the data in another address space or data space.
access register mode (AR mode)
The address space control mode in which the system uses general purpose registers and the corresponding access register (AR) to resolve an address in an address space or a data space. See also address space control mode, primary mode.
access scheduling
The selection by DL/I of IMS, DL/I, or SQL/DS database access tasks that are to be run. A CICS application program designed to access DL/I databases must schedule its access to DL/I. Scheduling includes ensuring that the PSB is valid, the application is not already scheduled, the databases referred to are open and enabled, and there is no intent conflict between the PSB and already scheduled PSBs from other application programs. Negative responses to any of the above prevents scheduling.
access security information field (ASIF)
In SNA, a field within Function Management Header Type 5 (FMH-5), which is used to convey security information.
access security information subfield (ASIS)
In SNA, a subfield within Function Management Header Type 5 (FMH-5), which is used to convey security information.
accounting class data
High-level data produced by the CICS monitoring facility which can be used for installation accounting purposes, such as the number of transactions for a given combination of transaction identifier, transaction type, terminal, and operator. This data is the minimum required to enable accounting routines to associate particular transactions with particular users or terminals.
ACEE
See access control environment element (ACEE).
ACF
See Advanced Communications Function (ACF)
ACID properties
The term, coined by Haerder and Reuter [1983], and used by Jim Gray and Andreas Reuter to denote the properties of a transaction: Transaction Processing: Concepts and Techniques (1993). The properties are atomicity, consistency, isolation, and durability. In CICS, the ACID properties apply to a unit of work (UOW). See also unit of work (UOW), atomicity, Consistency, Isolation, Durability.
acquired activity
An activity that a program executing outside the process that contains the activity has gained access to, by issuing an ACQUIRE command. The activity remains acquired until the next syncpoint occurs. Acquiring an activity enables the program to read and write to the activity's data-containers, read the process data-containers of the process that contains the activity and issue various commands, including RUN and LINK, against the activity. See also acquired process.
acquired process
The process whose root activity a program currently has access to. A program acquires a process in one of two ways: either by defining it; or, if the process already exists, by issuing an ACQUIRE PROCESS command. The process remains acquired until the next syncpoint occurs. Acquiring a process enables the program to read and write to the process's data-containers, read and write to the root activity's data-containers, and issue various commands, including RUN and LINK, against the process. See also acquired activity.
action command
A CICSPlex SM command that affects one or more of the resources represented in a view. Action commands can be issued from either the COMM field in the control area of the information display panel or the COMMAND field in a displayed view. Valid action commands are listed with the description of each view.
action definition (ACTNDEF)
In real-time analysis, a definition of the type of external notification that is to be issued when the conditions identified in an analysis definition are true.
activation
The attachment of an activity to perform one of a series of processing steps. In order to perform all its processing, an activity may need to be activated several times. In between, it "sleeps". See pseudoconversational
active-alternate pair
An SAA run-time library that establishes a common execution environment for a number of SAA programming languages. See also Systems Application Architecture (SAA)
active partition
In BMS, the partition that contains the cursor. It can be scrolled vertically. While a partition is active, the cursor wraps round at the viewport boundaries, and any input key transmits data from that partition only.
active session
(1) A session that connects the active CICS to an end user.
(2) In XRF, a session between a class 1 terminal and the active system.
active system
In an XRF environment, the CICS system that currently supports the processing requests of the user.
active task
(1) A CICS task that is eligible for dispatching by CICS.
(2) During emergency restart, a task that completed an LUW and started another, but that did not cause any records to be written to the system log during the second LUW. During recovery-control processing, an LUW completion but no physical end-of-task (that is, task DETACH) is found.
activity
In BTS, one part of a process managed by CICS business transaction services. Typically, an activity is part of a business transaction. A program that implements an activity differs from a traditional CICS application program only in its being designed to respond to BTS events.
activity completion event
An atomic event that fires when an activity completes.
activity identifier
A means of uniquely referring to an instance of a BTS activity. Activity identifiers are assigned by CICS.
activity keypoint
A record of task and DCT entry status on the system log made on a periodic basis to facilitate the identification of transaction backout information during emergency restart. In the event of an uncontrolled shutdown and subsequent emergency restart, activity keypoints can shorten the process of backward scanning through the system log. Activity keypoints are written automatically by the system (system activity keypoints) or by the user (user activity keypoints). See also system activity keypoint, user activity keypoint
activity tree
A hierarchy of activities. An activity tree may be several levels deep.
ACTNDEF
See action definition (ACTNDEF).
addressed direct access
In VSAM, the retrieval or storage of a data record identified by its relative byte address.
addressed sequential access
In VSAM, the retrieval or storage of a data record in its entry sequence relative to the previously stored or retrieved record.
addressing
In data communications, the way that the sending or control station selects the station to which it is sending data.
addressing mode (AMODE)
The mode, 24-bit or 31-bit, in which a program holds and processes addresses. The AMODE linkage-editor control statement specifies the addressing mode of the load module produced.
address space
A range of up to two gigabytes of contiguous virtual storage addresses that the system creates for the user. Unlike a data space, an address space contains user data and programs, as well as system data and programs, some of which are common to all address spaces. Instructions execute in an address space, not a data space. See also >data space.
address space control mode
The mode, determined by the program status word, that indicates where to find referenced data. Three types of address space control modes are primary, secondary, and access register. VTAM macroinstructions must be invoked in primary address space control mode. See also access register mode (AR mode).
ADI
See alternate delay interval (ADI)
adjacent CMAS
A CICSPlex SM address space (CMAS) that is connected to local CMAS via a direct CMAS-to-CMAS link.
ADS
See area data set (ADS).
ADSP
See automatic data set protection (ADSP)
Advanced Communications Function (ACF)
A group of IBM licensed programs, principally VTAM, TCAM, NCP, and SSP, that use the concepts of Systems Network Architecture (SNA), including distribution of function and resource sharing.
advanced program-to-program communication (APPC)
An implementation of the SNA LU 6.2 protocol that allows interconnected systems to communicate and share the processing of programs. The APPC protocol is used for communication between IBM CICS Clients and CICS on System/390 systems.
AFCB
See authorized function control block (AFCB)
after-image
A record of the contents of a data element after it has been changed. After images are used for forward recovery.
agent
In a two-phase commit syncpointing sequence (LU6.2 or MRO), a task that receives syncpoint requests from an initiator (a task that initiates syncpointing activity). See also initiator.
AGN
See application group name (AGN)
AID
See automatic initiate descriptor (AID). See attention identifier (AID).
AITM
See autoinstall terminal model (AITM).
AIX VSAM
See alternate index (AIX).
allocation
The assigning of various types of programs and record categories to system storage locations, such as main storage or disk storage.
alternate delay interval (ADI)
In XRF, the interval that must elapse between the (apparent) loss of surveillance signal from the active system and any reaction from the alternate system. The ADI system initialization parameter specifies the alternate delay interval for use with XRF. The corresponding parameter for the active system is PDI. See the CICS System Definition Guideor the CICS/VSE System Definition and Operations Guide for more information.
alternate facility
In distributed transaction programming, an IRC or SNA session that is obtained by a transaction by means of an ALLOCATE command. See also principal facility.
alternate index
(1) For VSAM key-sequenced data sets and entry-sequenced data sets, an index of alternate keys that provides a path for secondary access to the data set. If the records have alternate keys,the alternate index is built when the data set is created. See also secondary index.
(2) A subordinate index in a hierarchy of indexes.
alternate index base data set (AIX VSAM)
The VSAM data set that is the base or normal route of file access in a VSAM alternate index arrangement.
alternate key
In VSAM, a field, other than the primary key, of fixed length and position in a record. A set of alternate keys is used to build an alternate index that provides an alternative or secondary path for access to the data set. There can be any number of alternate keys in a record and they need not be unique.
alternate routing
A function provided by the VTAM class of service (COS) facility in which virtual routes for a given class of service can be assigned to different physical paths (explicit routes).
alternate screen size
An option that permits the size of a display screen to be defined differently from the standard size.
alternate system
In an XRF environment, a CICS system that stands by to take over the user workload when the active CICS system fails or a takeover is initiated.
alternate TP PCB
In IMS, a PCB that defines an alternate destination (a logical terminal or a message program) and that can be used instead of the I/O PCB when it is necessary to direct a response to a terminal. The existence of alternate PCBs in the PSB affects the PCB number used in the PCB keyword in an EXEC DLI application program.
American National Standards Institute (ANSI)
A private, nonprofit organization whose membership includes private companies, U.S. government agencies, and professional, technical, trade, labor, and consumer organizations. ANSI coordinates the development of voluntary consensus standards in the U.S.
American Standard Code for Information Interchange
See ASCII.
AMODE
See addressing mode (AMODE).
AMS
See access method services (AMS).
AMT
See autoinstall model table (AMT).
analysis definition
In real-time analysis, a definition of the evaluations to be performed on specified CICS resources, the intervals at which those evaluations are to be performed, and the actions to be taken when a notif condition occurs.
analysis group
In real-time analysis, a group of one or more analysis definitions, status definitions, or both. Analysis definitions and status definitions belong to an analysis group if they are to be installed automatically in
analysis point monitoring (APM)
In real-time analysis, resource monitoring across multiple CICS system within a CICSplex that results in a single notification of a condition, rather than one notification for each system.
analysis point specification
In real-time analysis, a specification that identifies the CMAS that are to be responsible for analysis point monitoring.
analysis specification
In real-time analysis, a specification that establishes system availability monitoring or MAS resource monitoring within a group of CICS systems.
ANSI
See ***.
anticipatory paging
In CICS, the acquisition at task initialization time of one or more consecutive pages in real storage for a task's TCA and data areas. Anticipatory paging can be used to have asynchronous paging of the task control and work areas (TCA/TWA), associated task data areas, and program storage associated with the task.
AOR
See application-owning region (AOR).
AP
See application program.
APAR
See authorized program analysis report (APAR).
APF
See authorized program facility (APF).
API
See application programming interface (API).
APM
See analysis point monitoring (APM).
APPC
See Advanced Program-to-Program Communication (APPC).
application
(1) A particular use to which an information processing system is put - for example, a stock control application, an airline reservation application, an order entry application.
(2) A program or suite of programs that perform a task or specific function. For example, a stock control application or an airline reservation application.
application domain
CICS domain that contains several major components, including application and system services, XRF, intercommunication (ISC and MRO), system control, and reliability. Application programs run in this domain. Most application domain functions are either provided by modules that are an integral part of the CICS system and are loaded at system initialization, or they are system application programs that are loaded as needed, in the same way as user applications.
application group name (AGN)
In DBCTL, the name of an application group. An application group is a set of PSBs that can be accessed by one particular CICS system or BMP as a single entity.
application identifier
The name by which a logical unit is known in a VTAM network. The CICS applid is specified in the APPLID system initialization parameter.
Application Migration Aid
A program which simplifies conversion of assembler language and COBOL applications from macro to command-level. The Application Migration Aid reads assembler language and COBOL source code and writes a new source file, converting the simpler macros to equivalent API commands and providing guidance on the complex macros.
application-owning region (AOR)
In multiregion operation (MRO) or intersystem communication (ISC), a CICS address space whose primary purpose is to manage application programs. It receives transaction routed requests from a terminal-owning region (TOR). In a configuration that does not have a data-owning region (DOR), the AOR may contain file-related resources. See also data-owning region (DOR) and terminal-owning region (TOR).
application partition set
The partition set that CICS loads into the buffers of a display device when a user application program issues an output request. By default, this is the partition set that was named when the transaction was added to the CICS system. Alternatively, it is the partition set named by the most recent SEND PARTNSET command that the program issued.
application program (AP)
(1) A program used to connect and communicate with stations in a network, enabling users to perform application-oriented activities.
(2) A complete, self-contained program, such as an editor or electronic mail, that performs a specific task for the user, in contrast to system software, such as the operating system kernel, server processes, and program libraries. See also application programming interface (API).
application programming interface (API)
(1) The formally defined programming language interface that is between a system control program or a licensed program and the user of the program.
(2) In CICS, the command-level programming interface supported by CICS for user application programs.
application server
A server program in a distributed network that provides the execution environment for an application program. For example, the WebSphere Commerce Server provides the execution environment for online stores.
application unit of work
A set of actions within an application that the designer chooses to regard as an entity in its own right. The designer decides how (if at all) an application should be subdivided into application units of work, and whether any application unit of work shall consist of just one or of many CICS logical units of work (LUWs). Typically, but not exclusively, an application unit of work would correspond to a CICS transaction.
AR
See access register (AR).
archive
To store backup copies of data sets, usually for a given period of time.
area data set (ADS)
A data set that contains a DEDB area. IMS can maintain up to seven copies of this data set.
ARF
See automatic reconfiguration facility (ARF)
argument
An independent variable or any value of an independent variable; for example, a search key; a number identifying the location of an item in a table.
ARM
See automatic restart manager (ARM).
AR mode
See access register mode (AR mode).
ASCII (American Standard Code for Information Interchange)
The standard code, using a coded character set consisting of 7-bit coded characters (8-bits including parity check), that is used for information interchange among data processing systems, data communication systems, and associated equipment. The ASCII set consists of control characters and graphic characters.(A) IBM has defined an extension to ASCII code (characters 128-255) that uses all 8 bits. DCF uses this 8-bit extension. See also EBCDIC.
ASIF
See access security information field (ASIF).
ASIS
See access security information subfield (ASIS).
assembler
A computer program that converts assembler language instructions into object code.
assembler language
A symbolic programming language in which the set of instructions includes the instructions of the machine and whose data structures correspond directly to the storage and registers of the machine.
ASU
See automatic screen update (ASU).
ASYNC
See asynchronous.
asynchronous (ASYNC)
Pertaining to events that are not synchronized in time or do not occur in regular or predictable time intervals. For example, input events are controlled by the user; the program can read them later. See also synchronous.
asynchronous processing
A series of operations that are done separately from the job in which they were requested; for example, submitting a batch job from an interactive job at a work station. See also synchronous processing.
ATI
See automatic transaction initiation (ATI).
atomic event
A single, "low-level" non-composite event. The types of atomic event are activity completion event, input event, timer event, and system event. See also composite event.
atomicity
A transaction's changes to the state (of resources) are atomic: either all happen or none happen. See also ACID properties.
attach
(1) In programming, to create a task that can execute concurrently with the attaching code.
(2) In SNA, the request unit that flows on a session to initiate a conversation.
attach FMH
See FMH-5.
attach header
In SNA, a function management header (FMH5) that causes a remote process or transaction to be attached.
attach request
A request that causes a remote process or transaction to be attached.
attention identifier (AID)
A character in a data stream that is sent to the host system when a display station user presses an attention identifier (AID) key. Typical AID keys are function keys or the Clear, Enter, Page Up, Page Down, Help, Print, and Home keys.
attention routine
In CICS/VSE, a routine of the system that receives control when the operator presses the Attention key. The routine sets up the console for the input of a command, reads the command, and initiates the system service requested by the command.
audit trail
Data, in the form of a logical path that links a sequence of events, used for tracing the transactions that affected the contents of a record.
audit trail utility
A CICS-supplied utility program, DFHATUP, that enables you to print selected BTS audit records from a specified logstream.
authority
The right to access objects, resources, or functions. See access authority, group authority, and class authority (CLAUTH).
authorization checking
The action of determining whether a user is permitted access to a protected resource. RACF performs authorization checking as a result of a RACHECK or FRACHECK request
authorized function control block (AFCB)
Control block used to contain control information for various functions that require special authorization, and the addresses of the common system area (CSA) and the application interface block. The AFCB is used as an address vector for the CICS type 3 SVC, or for the authorization of use of the SVC.
authorized program analysis report (APAR)
A request for correction of a defect in a current release of an IBM-supplied program.
authorized program facility (APF)
A facility that permits the identification of programs that are authorized to use restricted functions.
autoinstall
A method of creating and installing resources dynamically as terminals log on, and deleting them at logoff. Autoinstall can be used for VTAM terminals, MVS consoles, APPC connections, programs, map sets, partition sets, and journals.
autoinstall control program
A user-replaceable CICS program used to select some of the data needed to automatically install terminals, notably the CICS terminal identifier (TERMID) and the model name to be used in each instance. For programming information, see the CICS Customization Guide.
autoinstall model table (AMT)
CICS control table that contains model terminal definitions to be used during autoinstall.
autoinstall terminal model (AITM)
A model terminal definition used by CICS during autoinstall of terminals. Definitions can be user-created or supplied by CICS, and are held in the autoinstall model table (AMT). The acronym AITM is sometimes loosely used to refer to the CICS routines that manage operations involving the autoinstall model table (AMT).
autolink
An automatic library look-up function of the linkage editor. The function (1) resolves any external reference that is included in the currently processed module and (2) searches the active search chain for an object module of the same name as the encountered external reference.
automatic data set protection (ADSP)
A user attribute that causes all permanent data sets created by the user to be automatically defined to RACF with a discrete RACF profile.
automatic initiate descriptor (AID)
A control block used internally by CICS for scheduling purposes. An example of AID use is scheduling a transaction, optionally associating it with a terminal and a temporary storage queue. Another use is scheduling MRO, LU6.1, and LU6.2 ALLOCATE requests.
automatic journal archiving
A function that automatically creates and submits an archive job for a journal that is ready for archiving. When a journal, defined to use this function, is ready for archiving, CICS automatically creates and submits an archive job. The journal data set is not reused until archiving is complete, and CICS ensures that the archive jobs are submitted promptly.
automatic reconfiguration facility (ARF)
In a multisystem sysplex on PR/SM, the XCF component that provides automatic reconfiguration when one ESA system in the sysplex fails. ARF provides high availability for multisystem applications in the sysplex. ARF is also known as XCF PR/SM policy.
automatic restart manager (ARM)
A z/OS recovery function that can improve the availability of specific batch jobs or started tasks, and therefore result in faster resumption of productive work.
automatic screen update (ASU)
A CICSPlex SM facility that automatically updates the data in all unlocked windows at user-defined intervals.
automatic screen update interval
The time interval between one automatic screen update and the next. The interval can be set in the CICSPlex SM user profile or when the ASU facility is turned on.
automatic transaction initiation (ATI)
The initiation of a CICS transaction by an internally-generated request, for example, the issue of an EXEC CICS START command or the reaching of a transient data trigger level. CICS resource definition can associate a trigger level and a transaction with a transient data destination. When the number of records written to the destination reaches the trigger level, the specified transaction is automatically initiated. See also trigger level.
auxiliary storage
All addressable storage other than main storage. See also main storage.
auxiliary trace
An optional CICS function that causes trace entries to be recorded in the auxiliary trace data set, a sequential data set on disk or tape.
auxiliary trace data set
A sequentially organized data set on disk or tape, used to record all trace entries generated while the auxiliary trace function is active. Either one or two auxiliary trace data sets can be defined; the latter allows the data sets to be switched when the one currently being used is full. The trace utility program (DFHTUP) can be used to print records from auxiliary trace data sets.
availability
The degree to which a system or resource is ready when needed to process data; the percentage of time a system, network, or component can be utilized, within a certain time frame. Generally, the percentage is derived by dividing actual availability time by scheduled availability time.
availability manager (AVM)
In XRF, the programs that handle communication between active and alternate IMS, DL/I, or SQL/DS XRF systems. See also CICS availability manager (CAVM).
average throughput rate
The power of a system to process a representative work load. The power of the system is measured in units of data processing work; for example, jobs or transactions successfully completed per hour, minute, or second.
AVM
See availability manager (AVM).
AXM
The "authorized cross-memory" server environment. A series of modules providing run-time services for CICS-related cross-memory servers which run in MVS authorized state (unlike CICS itself, which runs unauthorized once initialization has completed) such as the temporary storage data sharing server.
[[ Contents Previous Page | Next Page Index ]]