Glossary Of Terminology - ITech-Ed Ltd

Transcription

Arcati Mainframe Yearbook 2022Compiled by Trevor Eddolls of GlossaryiTech-EdGlossary of TerminologyDefinitions of some mainframe-related termsThis glossary is intended as an aide memoire for experienced mainframersand a useful reference for those new to the z/OS world. If you would liketo suggest any new entries for the next edition, please send them tomainframe@arcati.com (we will even list you as a contributor!).3270IBM’s family of dumb, block-mode synchronous screenand printer terminals, which became the standard forterminal/mainframe connectivity.3270 data streamFormat used by 3270 devices for communication, andmuch used for emulation to make PCs look like dumbterminals.5250Terminal standard for the iSeries/400, System/3x etc.ABARSAggregate Backup And Recovery Support. A disasterrecovery feature within DFSMShsm for automaticallycreating files containing back-ups of critical data. Themain use of ABARS is to group all the datasets relatingto a particular application together.AbendABnormal ENDing. IBMspeak for an unexpectedtermination to a program run, eg a crash.Above the lineIn z/OS, z/VM, and VSE/ESA, above the line refers tovirtual/real memory locations with an address greaterthan 16MB. The 16MB limit resulted from earlieroperating systems supporting 24-bit addressing.Access methodIBM-specific jargon for software that moves databetween main storage and I/O devices.ACF/VTAMAdvanced Communications Function / VirtualTelecommunications Access Method is IBM’s proprietarytelecommunications software.ACIDThis acronym describes the properties of a transaction.Atomicity refers to a transaction’s changes to the state– either it all happens or nothing happens. Consistencyrefers to the state of a transaction. It must not violateany of the integrity constraints associated with the state.Isolation refers to the transaction not being affected byothers. Durability refers to the survival of changes tostate after a transaction completes.ACL (1)Access Control Lists control which users or groups ofusers can access which files and programs. They arepart of the security system and are checked by RACF.ACL (2)Automated Cartridge Library. Synonymous with ATL(Automated Tape Library).ACBAccess Control Block. The control block used to tie anapplication program to a VSAM dataset.ACOAutomated Console Operations. Automated proceduresthat replace or reduce the number of actions anoperator takes from a console in response to systemor network activities.Access controlEnforcing rules governing use of computer resourcesby restricting both the use and type of use to authorizedindividuals and the computer resources they areresponsible for.ADAProgramming language much loved by the military(ADA is a US government standard), which uses it forwriting systems for controlling guided missiles and thelike. Withdrawn August 1994. Arcati Limited, 2022121

Arcati Mainframe Yearbook 2022GlossaryAddress Resolution ProtocolThe Internet Protocol (IP) used to dynamically map IPaddresses to physical hardware Media Access Control(MAC) addresses.AMASPZAPz/OS batch utility to apply a fix directly to object code insitu. Often protected against unauthorized use becauseof its additional ability to make direct changes to disk.Address spaceThe virtual storage allocated to an executing task in amainframe. Generally used within z/OS to mean thespace used by one of batch job, system task, or TSOuser.AMODEAddressing MODE. Attribute of z/OS programsindicating the length (in bits) of the addresses usedin the program. Introduced in MVS/XA to differentiatebetween the then new 31-bit addressing that expandedthe addressable space from 16MB (24 bit) to 2GB. z/OS introduced 64-bit addressing.AgileA modern alternative to waterfall models of projectdevelopment in which requirements and solutionsemerge through collaborative working betweendevelopers and users. It results in rapid changes andinnovative solutions to problems.AIArtificial Intelligence is the simulation of humanintelligence processes by machines, especiallycomputer systems. These processes include learning(the acquisition of information and rules for usingthe information), reasoning (using rules to reachapproximate or definite conclusions), and selfcorrection.AIOpsOriginally, Algorithmic IT Operations, although sometimes thought of as artificial intelligence for IT operations, it refers to software that uses machine learningto help IT teams evaluate and act faster and moreaccurately.AIXAdvanced Interactive eXecutive. IBM’s version ofUnix for mid-range systems (System p). It is one offour commercial operating systems that are certifiedto The Open Group’s UNIX 03 standard. It is currentlysupported on IBM Power Systems alongside IBM iand Linux.AJAXAsynchronous Javascript And XML is a way ofcreating interactive Web applications using a groupof technologies together. These technologies includeXHTML (or HTML) and CSS; the Document ObjectModel; and the XMLHttpRequest object.122AMSAccess Method Services. z/OS and VSE subsystemfor performing various data-related actions on VSAMand ICF catalogs, including defining VSAM datasets,and deleting and copying most dataset types. In short,a multi-purpose utility. Also known as IDCAMS becausethat is the program name.AnalyticsExtracting hidden value from the massive volumes ofdata.AnsibleThis popular open-source software is a provisioning,configuration management, and application-deployment tool enabling infrastructure as code.APARAuthorized Program Analysis Report. An official reportof a software error to IBM. Also used to refer to the patchsupplied by IBM to fix the error (PTF is the correct term).APIApplication Program(ming) Interface. Documentedprogramming procedures to access a given piece ofsoftware; typically an entry point name and parameterlist. The re-use of APIs can speed up applicationdevelopment.APLA Programming Language, conceived within IBM by K EIverson, and popular on the mainframe in the late ’70sand early ’80s to support end-user activities. Arcati Ltd, 2022

Arcati Mainframe Yearbook 2022GlossaryAPMApplication Performance Management monitors andmanages the performance and availability of softwareapplications in order to meet business needs.AppThis usually refers to a mobile application foundon Android and Apple smartphones and tablets.AppletA small application program written in the Java thatcan be retrieved from a Web server and executed ina browser.APPNAdvanced Peer-to-Peer Networking architecture isan enhancement to SNA architecture. It can handledynamic multipath routing.ARMAutomatic Restart Management is a sysplex-wideintegrated restart mechanism that can restart MVSsubsystems after an abend, restart workloads onanother MVS image after an MVS failure, and restarta failed MVS image.AS/400Application System/400. IBM’s mid-range processor,announced in June 1988. It was replaced by the IBMPower Systems in April 2008. Now called IBM i.ASCIIAmerican Standard Code for Information Interchange.A modification of the international code which hasbecome a de facto standard (except for IBM which alsouses the EBCDIC code) for transmitting data. Usesseven bits plus a parity bit, and includes alphanumericand control characters. ASCII must be converted toEBCDIC for uploading to IBM mainframes.ASMAuxiliary Storage Manager. The part of z/OS that looksafter the I/O operations relating to paging – specificallythe pages and page slots on external storage (typicallyDASD).AssemblerProgramming language that allows the user to getclose to the hardware on IBM mainframes. Assemblerstatements correspond one-to-one with mainframe,machine-level instructions. Arcati Limited, 2022ATLAutomated Tape Library (also known as AutomatedCartridge System – ACS, tape silo, or silo). Type ofmass storage system (MSS) in which industry standardtapes are loaded by a robotic arm.Augmented realityUsing a device, such as a smartphone or tablet, toview an object, such as server, and see on that deviceadditional information about the object – such asperformance information.Auxiliary storageAll storage needing a channel I/O to access it (basicallycache, SSD, disk, tape, mass storage).AWLCAdvanced Workload License Charges is a new monthlylicence pricing metric from IBM and applies to z196s.BaaSBlockchain as a Service – like Software as a Service(SaaS) – is where cloud-based solutions are consumedto build, host, and operate blockchains while the cloudbased service provider keeps the infrastructure agileand operational.BackoutA process that removes all database updates performedby an application that has abended (qv).BALBasic Assembler Language. The machine language onthe original S/360 from which the modern Assemblerlanguages are derived.BandwidthA measure of how fast a network can transferinformation, originally measured in Hertz (Hz), but nowused for any measure of network throughput. The moreprecise definition: frequency range within a radiationband required to transmit a particular signal. Measuresthe difference between the highest and lowest signalfrequencies in millions of cycles per second.BASICBeginners All-purpose Symbolic Instruction Code.Universal interactive programming language.123

Arcati Mainframe Yearbook 2022GlossaryBatchAn accumulation of data brought together for processingor transmission, usually unattended. Less formally,the processing of such data, as opposed to onlineprocessing where a user is present to respondinteractively.BCDBinary-Coded Decimal. A binary-coded notation inwhich each of the decimal digits is represented bya binary numeral. This differs from the pure binarynotation, where the entire number is represented as asingle binary numeral.BCSThe Basic Catalog Structure and the VVDS are the twoparts of the ICF catalog. The BCS contains dataset andalias names and volume serial numbers.BCUA Balanced Configuration Unit comprises processormemory, I/O, storage, and DB2 resources. It is thesmallest combination of these that work togetherefficiently. As more work is added to the system,so more BCUs can be added. This avoids any onecomponent being too big in terms of the others.BDAMBasic Direct Access Method allows programmers toaccess specific blocks of data on DASD.BenchmarkAn agreed workload used as a standard against whichto compare the performance of different hardware/software. For a benchmark to be useful it needs to bea public standard.Big DataThe SNA/APPN command used to activate an LU-LUsession following the successful completion of the SNA/APPN session initiation processing.Big SQLThis allows users to access Hadoop-based datausing familiar SQL statements. It utilizes InfoSphereBigInsights.Bimodal ITGartner’s management of IT model where one strandis very conservative and unwilling to change and theother strand embraces rapid application developmentand is tightly linked to business needs.124BINDThe SNA/APPN command used to activate an LU-LUsession following the successful completion of the SNA/APPN session initiation processing.BIOSBasic Input/Output System. The I/O component of asimple operating system defining the interface betweenthe operating system and the outside world.BitcoinsBitcoins originated in a 2008 concept paper by SatoshiNakamoto. Bitcoins are a virtual currency that are‘mined’ by solving complex algorithms and are usuallystored in a digital wallet. Bitcoin exchanges arecompletely private, which makes them popular withcriminals! Many legitimate companies offer productsfor sale using bitcoins.BLOBBinary Large OBject. A generic term for a file containingsome kind of binary data (text, image, document,sound, etc). Typically, BLOBs can be transferred andmanipulated across a wide range of platforms.BlockA string of data elements, such as characters, words,or physical records, that are recorded or transmittedas a unit.BlockchainA blockchain is a distributed database that maintainsa continuously growing list of ordered records.Blockchains are secure by design and an example ofa distributed computing system. Once recorded, thedata in a block cannot be altered retroactively.BluemixBluemix is an open-standards, cloud-based platform forbuilding, managing, and running all types of apps, forWeb, mobile, big data, and smart devices. It includesJava, mobile back-end development, and applicationmonitoring, all provided as-a-service in the cloud.BMSBasic Mapping Support. An interface between CICSand an application to control the movement andpresentation of datastreams to and from a dumbterminal. BMS allows data to be displayed withoutallowing for display-dependent formatting characters. Arcati Ltd, 2022

Arcati Mainframe Yearbook 2022GlossaryBooleanAn operation that follows the rules of Boolean algebra.BootTo prepare a computer system for operation by loadingan operating system.BPAMBasic Partitioned Access Method is a low-level accessmethod used to access Partitioned DataSets (PDSs).BreachThis is where a cyberattack has gained access toa network and the mainframe, giving unauthorisedaccess to data and backups to hackers.BSAMBasic Sequential Access Method, along with QSAM, isan access method used to access sequential datasets.BusGeneric term in data communications to describe awiring topology (such as that used in Ethernet) in whichdevices are connected along a single linear medium.BYODBring your own device is the policy many companiesare adopting to allow employees to bring their ownmobile devices (laptops, tablets, and smartphones) totheir workplace, and to use those devices to accessprivileged company information and applications.BYOIBring Your Own Identity is the growing practice of takinga validated identity with you and so not needing toremember different user-ids and passwords for differentenvironments. There are security issues.ByteA string of 8 bits that represents one EBCDIC character.The IBM mainframe architecture is organized aroundthe concept of the byte.CA programming language developed at Bell Labs in1972, so named because its predecessor was namedB. Unix was written in C. Arcati Limited, 2022C/C An optional, separately priced feature of z/OS, availablewith or without Debug Tool. The C/C IBM Open ClassLibrary is included with z/OS, but is only enabled whenC/C is licensed.CacheHigh-speed buffer between a fast device and a slowdevice. In large IBM systems cacheing may takeplace in the CPU (in main or expanded storage), thecontroller, device head-of-string, or the device itself(eg in a track buffer). It is used to reduce access time.Capacity on DemandProcessors can be purchased with extra capacityalready on-board but not functioning. When extracapacity is required at a site, it is turned on. This isnon-disruptive and customers don’t pay for the extracapacity until they start using it.CatalogA dataset that contains information about otherdatasets, eg type, location, size, format. The z/OSmaster catalog usually also contains entries for usercatalogs.CCLCommunication Controller for Linux (CCL) on zSeriesruns the Network Control Program (NCP) softwareproduct in Linux, enabling users to get rid of their legacy3745 communication controllers running NCP-basedSNA workloads to zSeries servers.CDSConfiguration DataSet.CGICommon Gateway Interface. A mechanism usedby HTTP servers to invoke arbitrary programs foradditional processing of certain requests; typically,those involving database access.Change managementThe methodology for planning and controlling softwarechanges.125

Arcati Mainframe Yearbook 2022GlossaryChannelA specialized computer used in the IBM mainframearchitecture to control transfers between devices andthe processor unit. The channel offloads some of theprocessing associated with I/O from the main CPU.Channel adapterHardware unit to attach a channel to a processor.Channel attachedDevices that are directly attached to the processor bycable rather than over a communications link.ChannelsCICS TS 3.1 introduced a replacement for sizerestricted COMMAREAs – they are channels andcontainers. Any number of containers can be passedbetween programs and they are grouped together inchannels.CLISTControl language used to manage interactiveapplications in the z/OS TSO environment. Largelysuperseded by REXX.Cloud computingA new name for something similar to client/servercomputing. A user launches a browser and clicks a link.Somewhere else an application launches and work isdone. The mainframe seems to have always workedin this way. Organizations like Microsoft, Amazon, andGoogle are trying to become big players in this ‘new’paradigm.Cloud PaksIBM Cloud Paks are AI-powered software that comewith pre-integrated data, automation, and securitycapabilities. They help create hybrid cloud platforms.CHPIDCHannel Path IDentifier. A single byte binary value usedto uniquely identify each channel path on an eServerzSeries and previous mainframe systems.CMOSComplementary Metal Oxide Semiconductor. A chiptechnology used widely by IBM in its processors,superseding the water-cooled ECL chips on themainframe.CICSCustomer Information Control System. Generalpurpose TP monitor for terminal-oriented and intersystem transaction processing in z/OS and VSE/ESAenvironments. Now with added SOA.CMSConversational (originally Cambridge – the lab whereit was built) Monitor System. Operating system runningunder VM, and providing timesharing and programdevelopment facilities.CICS ExplorerThis is a system management tool for CICS systemsthat’s based on the Eclipse platform.COBOLProgramming language, very widely used forcommercial applications on the mainframe. Somesources suggest that CICS and COBOL account for85% of all transactions processed.CICSplexA CICS complex (CICSplex) is a group of intercommunicating CICS systems.CICSPlex System Manager (CPSM)This provides system management as well asautomation and workload management.CKDCount Key Data is a way to format disk drive usingcylinder number, track number, and physical record.Client/serverGeneric term for systems (also known as server/requester) in which one machine provides a range ofservices to one or more other machines.126Communication ServerIBM’s all inclusive, multi-platform, software bundle thatprovides a plethora of terminal emulation, Web-to-host,and networking capabilities.CompileThe translation of a high-level programming language(source program) into a machine language program(an executable program).CompilerA program that translates high-level programminglanguages into machine language programs. Arcati Ltd, 2022

Arcati Mainframe Yearbook 2022GlossaryComposite applicationsA composite application is an application built bycombining multiple services. This tends to meantaking part of a really useful mainframe applicationand combining it with some other code so that themainframe application becomes available over the WebCPCCentral Processor Complex.CompressionGeneric term for a method of reducing the amount ofspace needed to store data, by encoding the data. Thisis achieved through the elimination of empty fields,gaps, redundancies, and unnecessary data to shortenthe length of records or blocks.CRMCustomer Relationship Management refers to theway organizations manage their relationships withcustomers – including finding, marketing to, selling to,and servicing these customers.ConnectorOne way of integrating CICS applications as Webservices is to use connectors on the mainframe anduse native interfaces to permit tight integration with thetarget application.ContainersCICS TS 3.1 introduced a replacement for sizerestricted COMMAREAs – they are channels andcontainers. Any number of containers can be passedbetween programs and they are grouped together inchannels. Channels are deleted when no programsare using them.Control PointSNA/APPN/HPR functionality that performsauthorization, directory services and configurationmanagement.CORBACommon Object Request Broker Architecture. Set ofstandards for distributed object management from theObject Management Group (OMG).CouplingGeneric term used to mean connecting of processorstogether into a more or less tightly-knit computingcomplex. Used specifically by IBM to mean theconnection of multiple eServer zSeries processors ina Sysplex.Coupling FacilityHardware from IBM, where common tables can beshared in a Sysplex, for high-speed cacheing, updatelocking of shared data, list processing and workloadbalancing between multiple processors. Arcati Limited, 2022CPUCentral Processing Unit. Processor. The part of acomputer that executes instructions.CTGCICS Transaction Gateway provides J2EE standardsbased access to CICS applications, which means it’san easy way to make existing CICS applications partof a Service-Oriented Architecture (SOA).CTCChannel-To-Channel connections would link twomainframes and provide high-speed communication.CyberattackBad actors trying to and often successfully gainingaccess to a network and the mainframe, then exfiltratingoften confidential data.CyberSecurity Mesh Architecture (CSMA)An integrated approach to securing IT assetsregardless of their location. It redefines the perimetersof cybersecurity to the identity of a person or a thing.Gartner predicts that this will reduce the financialimplications of cyber incidents by 90% in less thantwo years.CylinderThe tracks, in an assembly of magnetic disks, thatcan be accessed without repositioning the accessmechanism.DASDDirect Access Storage Device. IBMspeak for disk.DATDynamic Address Translation. The process by whichvirtual addresses are converted into real addressesduring instruction execution.127

Arcati Mainframe Yearbook 2022GlossaryData dictionaryA data dictionary (DD) is a database containinginformation about the way items of data are used.Typically a DD contains details of data names, datausage, data structures, data models, and so on.Db2ZAIIBM Db2 AI for z/OS empowers the optimizer in theDb2 for z/OS engine to determine the best-performingquery access paths, based on a site’s workloadcharacteristics.Data lakeA data lake is a repository of data stored in its naturalformat. This could be in a Hadoop-based repository.DebugThe human problem determination process forsoftware. Literally, to remove bugs.Data miningThe practice of using a data warehouse for highlycomplex, ad hoc queries.DEDBData Entry DataBases are one of two types of IMS fastpath database. These databases do not have indexesand are stored in VSAM files.Data Privacy PassportsThese were introduced with the z15 mainframe. Theyenable users to protect and provision data, and revokeaccess to that data at any time. They not only work inthe z15 environment, but also across an enterprise’shybrid multi-cloud environment.Data sewerWhat happens to a data lake as more and more recordsare added.Data warehouseGeneral term for a collection of database, middleware,and query tools that allow fast, flexible access to nearoperational corporate data.DataOpsThis is an automated, process-oriented methodology,that’s used to improve the quality and reduce the cycletime of data analytics.DataPowerIBM WebSphere DataPower SOA Appliances is a familyof pre-built, pre-configured rack mountable networkdevices that accelerate Web services deploymentswhile extending SOA infrastructure.DatasetA unit of data storage and retrieval consisting of oneor more data records. Outside of the IBM mainframeenvironment, people call them files.DB2Database/2. Relational database management systemfirst announced for mainframe environments in 1983.Originally promoted as an end-user tool, but is nowIBM’s preferred DBMS for just about everything andruns on all platforms.128DefragmentationThe use of a software utility to improve accessand retrieval time by rewriting fragmented data tocontiguous sectors of a computer storage medium.Denial of ServiceAn insidious, carefully-orchestrated attack on computersystems or networks to overload their resources with abarrage of requests in the hope of discovering overloadinduced vulnerabilities within the targets or to justdisrupt the mission-critical activities of an enterprise.DeOSNo longer is DDoS (Distributed Denial of Service)our only worry, we need to think about Destruction OfService attacks.DeviceAny computer peripheral, such as tape or DASD, orany object that appears to be a peripheral.DevOpsPart DEVelopment and part OPerations, DevOpsis a philosophy emphasizing the collaboration andcommunication between software developers andother IT people, so that building, testing, and releasingsoftware, can happen rapidly, frequently, and morereliably.DevSecOpsDevSecOps is DevOps with security considerationintroduced earlier in the life cycle of applicationdevelopment in an attempt to minimize vulnerabilities. Arcati Ltd, 2022

Arcati Mainframe Yearbook 2022GlossaryDFSMSData Facility Storage Management Subsystem. Anelement of z/OS and also available for z/VM, asDFSMS/VM. The idea is that you simply tell the systemabout your storage, back-up, performance, and otherrequirements of the data, and the system does the restfor you. Of course, it’s not really that simple.DFSMSdfpDFSMS Data Facility Product. A component of DFSMSthat provides functions for storage, data, program, anddevice management, in conjunction with distributeddata access. Enables the definition of the servicesto be assigned to new datasets. Handles catalogmanagement and access methods.DFSMSdssDFSMS DataSet Services. An optional, separatelypriced feature of DFSMS that handles device migration,copy, space management, and dump/restore. Italso converts existing data between non-SMS andSMS volumes, and provides an interface for storageadministrators (ISMF).Disruptive technologyHenry Ford said: “If I had asked people what theywanted, they would have said faster horses”. That’s anexample of a disruptive technology – something thatchanges the way people do things.DL/IData Language/I. The I is the Roman numeral One. Thedata manipulation language within IMS DB. DL/I is alsothe product name for IBM’s VSE/ESA implementationof IMS DB.DLSwWidely-used SNA/APPN(/NetBIOS)-over-TCP/IPtransport mechanism which, however, unlike EE, doesnot support SNA COS or routing.DMZA De-Militarized Zone is used in the on-going waragainst viruses and malware etc. Typically, onecomputer accepts incoming data and send outgoingdata. Behind it is a firewall, and behind that is theprotected LAN.DFSMShsmDFSMS Hierarchical Storage Manager. An optional,separately priced feature of DFSMS. It is a sophisticatedautomated system for both back-up and hierarchicalstorage management. It includes an ISPF interfacefor end users who wish to migrate, recall, back-up, orrecover individual datasets, or to override the defaultmigration and/or back-up parameters.DockerDocker is a software container platform. Everything youneed to make the software work is packaged into thiscontainer. It includes libraries and settings to run on anyplatform. This way, you get an efficient, lightweight, selfcontained system, plus the assurance that the softwarewill always run the same, no matter where it’s deployed.IBM has Docker Enterprise Edition for IBM Cloud.DFSMSrmmDFSMS Removable Media Manager. Its goal was tointegrate the system managed storage principles ofDFSMS into all removable media, most notably tapeand optical.DominoWeb server technology from Lotus (June 1996), whichallows browsers to interact with Notes and access Notesdatabases. Now closely integrated with WebSphere.Digital reinventionSuccessful digital reinvention follows a fundamentalrethink or reimagining of how an organization operatesand how it engages with its environment and customers.Digital Transformation (DX)Another way of describing the inevitable change intechnology that occurs in businesses that plan to stayin business. Arcati Limited, 2022DRaaSDisaster Recovery as a Service is the replication andhosting of physical or virtual servers by a third-party toprovide failover in the event of a catastrophe.EBCDICExtended Binary Coded Decimal Interchange Code.Coded 8-bit character set (giving 256 characters) usedby IBM mainframes.129

Arcati Mainframe Yearbook 2022Glossarye-businessUsed to refer to business transactions that use theInternet.ECIThe External Call Interface is used by CICS to allownon-CICS programs to invoke programs under CICS.EclipseEclipse is an Open Source IDE. IBM’s version is soldas WebSphere Studio Workbench. The Eclipse platformcomprises the platform run-time, the workspace, theworkbench, the Standard Widget Toolkit (SWT), theVersion and Configuration Management (VCM), andthe help system. Eclipse comes with a large numberof plug-ins. The user interface for Eclipse is known asthe workbench.Edge computingPutting some computing power at the furthest reachesof the network to control IoT devices, for exampleEEHPR-over-UDP/IP, created by committee and codifiedin RFC 2353 in 1998, which permits SNA/APPNnetworking, replete with native COS and routing, acrossIP networks.EJBEnterprise JavaBeans. A server-side, transactionoriented extension to the JavaBeans component modelspecification published by Sun. EJB are JavaBeans, buthave no user interface and are designed to run within aspecial EJB container. In principle, any properly codedEJB should run within any fully compliant EJB container.EnqueueThe z/OS expression (often abbreviated to ENQ) forrequesting resource serialization. ENQ can be used toput a user-named entry in the system resource queuein order to prevent another program using a seriallyusable resource.Enterprise Content Management (ECM)This refers to a way of organizing and storing anorganization’s documents, and other content, thatrelate to the organization’s processes. Nowadays,ECM can be used when talking about strategies,methods, and tools used throughout the life-cycle ofthe content. ECM also covers the capture, search,and networking of documents with digital archiving,document management, and workflow.130Enterprise ExtenderEnterprise Extender (EE) is a combination of SNAencapsulated in IP packets, so it can be thought of asa kind of protocol.EPIA CICS External Presentation Interface

Glossary of Terminology Definitions of some mainframe-related terms This glossary is intended as an aide memoire for experienced mainframers and a useful reference for those new to the z/OS world. If you would like to suggest any new entries for the next edition, please send them to mainframe@arcati.com (we will even list you as a contributor .