This glossary defines terms that are used in the documentation for BEA WebLogic Platform. Terms displayed in blue, other than URLs, are defined in this glossary.
Click a letter in the glossary index. Or use the Page Down key, the Page Up key, the arrow keys, or the scroll bar to navigate. Please contact us if you know of a relevant term that is not defined in this glossary.
— A —
To terminate a transaction in such a way that the values assigned to all protected resources, such as database records, are unchanged from the beginning of the transaction.
Set of restrictions on the ability of principals (human or software entities) to use software resources. These restrictions are enforced in order to prevent unauthorized use of such resources.
access control information (ACI)
Information about the initiator of a resource access request. The ACI is used to make a decision about enforcing access control.
Data structure used to authorize or prohibit the use of resources, such as network services, by principals. Each entry in an ACL contains a set of permissions associated with a particular principal.
The WebLogic Server implementation of ACLs is based on the java.security.acl package.
In a WebLogic Integration environment, the use of different types of resources is granted to different types of principals:
In a WebLogic Integration environment, use of different types of resources is granted to different types of principals:
See also authentication, realm, permission, and principal.
Essential characteristics of transaction processing systems:
See access control list (ACL).
Basic unit of work performed during business process management functions (which are supported by WebLogic Integration). Actions define workflow and task behavior, and can be defined as parts of tasks, decisions, and events. WebLogic Integration provides numerous actions.
Components that use Component Object Model (COM) technologies to provide interoperability with other COM services and components.
See also Component Object Model (COM).
Promotional message presented in any of various formats: a piece of HTML text, an image (GIF, JPG, PNG), or a Shockwave movie.
Ads work with ad placeholders, mechanisms that query the content management system for ads and display the results in a JSP. A Business Analyst uses the BEA E-Business Control Center to define queries for an ad placeholder and a Business Engineer (BE) creates a placeholder tag in the location in which the Business Analyst wants to display ads. A Business Analyst can also create a campaign scenario that places additional queries in an ad placeholder.
See also E-Business Control CenterTM, Business Analyst (BA), and Business Engineer (BE).
Unique name for an ad, which includes a relative path. The specific content of an ad identifier can vary from one content management system to another.
See also ad and content management system.
Software component that provides an interface between an enterprise information system and an integration server.
Method for resolving inconsistent authorization decisions.
HTML interface used by an administrator to configure and monitor an application built with BEA software.
See also WebLogic Integration B2B Console and WebLogic Server Administration Console.
Advanced Program to Program Communications (APPC)
Software protocol that makes possible high-speed communications, over SNA, among programs on different computers, including portables, workstations, and midrange and host computers. This protocol is open and published. Also known as LU 6.2.
See also Systems Network Architecture (SNA).
Feature of the Personalization Server that ties together the services and components in the Personalization Server to deliver personalized content to a Web site visitor. It does this by matching content to information contained in the user profile. Specifically, it gathers information from the user profile with the User Management component, submits that information to the Rules service, and queries the document management system that the Content Management component uses. Developers determine whether the Advisor displays the results of the query with a JSP or a Java servlet.
The Advisor includes a JSP tag library and an API that EJB developers can use to access the underlying EJB stateless session bean.
See also developer, Enterprise JavaBeans (EJB), application programming interface (API), user profile, and Web application (Webapp).
Type of principal that accesses a resource in a WebLogic Server environment without being authenticated.
Third-party parser, provided by the Apache Software Foundation, that implements the W3C XML, DOM, and SAX standards.
See application programming interface (API).
See Advanced Program to Program Communications (APPC).
Client-side Java program, usually embedded in an HTML page and viewed with a Java-enabled Web browser.
One or more software programs, used collectively by an end user to perform computing tasks.
Software component that provides an interface between an enterprise information system and an integration server. An application adapter represents a system-level interface to the functionality in the application.
J2EE Connector Architecture standards-based integration broker developed by BEA Systems, Inc., as part of WebLogic Integration, for interenterprise and intraenterprise integration.
application programming interface (API)
See also enterprise resource planning (ERP).
Business-level interface to the functionality in an application. An application view is configured for a single business purpose, and contains only services related to that business purpose. Additionally, an application view represents both events and services that support a business purpose, allowing the business user to interact with the application view for all communication with an application.
Characteristic of events that occur at different times such that the relationship between the times when those events occur is unpredictable.
In distributed application architectures such as Web services, clients invoke methods (or send messages to) servers and servers respond. If a client is blocked from performing other work while waiting for a server to respond, the interaction is described as synchronous because the client is synchronized with the server.
If an interaction is designed such that a client can continue performing other work while the server prepares its response, and the server can notify the client when the response is ready, the interaction is described as asynchronous.
An asynchronous architecture is useful in event-driven scenarios, in which an event can arrive at any time and the receiver can handle it whenever it arrives.
Information that is sent with a business message.
See also access control list (ACL) and secure sockets layer (SSL).
Process of determining which services may be accessed by a particular entity (a user or a process) and then giving permission to that entity to access those services.
In a WebLogic Integration environment, trading partner authorization is a role-based security feature whereby a trading partner is allowed to send and receive certain types of messages, as defined by the trading partner's subscription in a specific conversation. Trading partners are authorized to access the transport servlet and the JDBC pool.
In addition, the WebLogic Integration software is authorized to access the transport servlet in order to send messages to trading partners.
Human users can be authorized to access JSPs and, indirectly, the JDBC pool. A WebLogic Server access control list (ACL) can be configured selectively to allow or deny a user access to a resource.
— B —
Practice whereby companies buy and sell to each other directly, that is, business-to-business (B2B), through electronic transactions.
WebLogic Integration feature that supports integration of applications among enterprises, including supply-chain integration.
WebLogic Integration Studio component that extends business process management (BPM) for use with B2B integration.
Process of exposing information within an enterprise to people or entities, known and unknown, that exist outside the enterprise.
BEA E-Business Control CenterTM
See E-Business Control CenterTM.
BEA WebLogic Personalization Server
See WebLogic Personalization Server.
Transaction in which an Enterprise JavaBean (EJB) controls the transaction boundaries. In a bean-managed transaction, controls can be specified using JTA. The EJB code manages the transaction, which can begin in one method and end in another.
See also container-managed transaction, Enterprise JavaBeans (EJB), Java Transaction API (JTA), and transaction.
Binary format in which the most significant byte has the lowest address. This format is used on IBM 370 systems and most RISC designs.
Industry initiative to define the BizTalk Framework, a set of guidelines for publishing XML schemas and using XML messages. Started by Microsoft, it is supported by a wide range of organizations, including technology vendors (such as SAP, CommerceOne, and Ariba) and technology users (such as BASDA). BizTalk is not a standards body, but a community of standards users.
See also http://www.biztalk.org.
See business process management (BPM).
Mechanism that enables you to cause Webflow to direct to different destination nodes, based on the value of the object returned from successful execution of the input processor or pipeline.
See also input processor, node, pipeline, and Webflow.
Trading partner that uses a Web browser to communicate with other trading partners.
See business transaction protocol (BTP).
Practice of adding a buffer to a method of your service to ensure that the service returns to the client immediately. This mechanism eliminates the need for the client to wait for the server to process other requests. Incoming calls to a buffered method are queued so that the server is not overwhelmed with requests.
Nontechnical staff member who is responsible for conceiving an effective model for an e-business. Usually collaborates with a Business Engineer (BE), who provides technical expertise. A Business Analyst develops strategy and goals for individual campaigns, and uses the BEA E-Business Control Center to run and evaluate campaigns.
See also E-Business Control CenterTM and Business Engineer (BE).
XML part of the payload of a business message.
Staff member who combines the skills of a Business Analyst and Developer. A BE may:
See also Business Analyst (BA) and developer.
Basic unit of communication between trading partners in a conversation. A multipart MIME message, it consists of business documents, attachments, and message headers.
Method of adding user-defined operations in WebLogic Integration by invoking EJBs or calling Java classes.
business process management (BPM)
WebLogic Integration automation tool that enables you to define and monitor workflows.
Set of rules that governs the electronic exchange of business information between enterprises across a network. A business protocol specifies the structure of business messages, the method for processing the messages, and the method for routing them to the appropriate recipients. WebLogic Integration trading partners can use the RosettaNet business protocol to send and receive business messages.
Set of logic plug-ins that implements a business protocol.
Interface to a conversation definition. A trading partner offers a business service to other trading partners who may want to interact with it.
business transaction protocol (BTP)
Standard that provides an open and well-defined method for managing long-running, complex transactions common in B2B e-commerce. BTP is an XML-based vocabulary protocol for representing and seamlessly managing complex, multistep B2B transactions over the Internet. BTP enables trading partners to manage complex XML message exchanges as long-running, loosely coupled conversations.
business-to-business (B2B) e-commerce
business-to-business (B2B) integration
business-to-consumer integration
Compiled format for Java programs that can be run (interpreted) on any computer with a Java virtual machine (JVM).
See also Java virtual machine (JVM).
— C —
Compressed file used to load classes and other files required to run an applet in a single hypertext transfer protocol (HTTP) request. Can be used only with applets running under Microsoft Internet Explorer, version 4.0 or later.
See also JAR file, applet, and hypertext transfer protocol (HTTP).
Method defined on the client that can be called by your service. Callbacks make it possible to support an asynchronous two-way exchange between a client and a service. For example, if a service performs a time-consuming operation, the service can immediately acknowledge the client's request with a simple return value, then later use the callback to return the full result of the operation. A callback must participate in a conversation.
Method run by your service when it receives a corresponding callback. It is defined by the control that includes the callback. For example, the timer control provides the onTimeout method as a callback handler. You have the option of adding code that will run when the timer fires.
Principal that is associated with an application component instance during a method invocation. For example, an EJB instance can call the getCallerPrincipal method to get the principal associated with the current security context.
See also Enterprise JavaBeans (EJB) and principal.
Named group of scenarios that work together to achieve strategic business goals. A campaign coordinates multiple Personalization, Commerce, and Campaign services to create and track marketing goals on an e-commerce Web site.
Reduction in the price charged for a product item, an order, or the shipping cost associated with an order conditionally targeted to a subset of the entire user population. The BEA E-Business Control Center allows you to define the discounts that you might later decide to offer to your online customers.
See also E-Business Control CenterTM.
Goal for a campaign. When the goal is satisfied, the campaign can end, even if the goal is fulfilled before the scheduled end date. This goal is specified in the BEA E-Business Control Center.
See also E-Business Control CenterTM.
Set of services provided by WebLogic Portal that enable Business Analysts and Business Engineers to create and track marketing goals on an e-commerce Web site. Campaigns are set up and managed using the E-Business Control Center.
See also E-Business Control CenterTM, Business Analyst (BA), and Business Engineer (BE).
Organization that commissions a campaign. Is often the organization that owns and operates the e-business Web site (or a subset of that organization).
In the BEA E-Business Control Center, the sponsor can be used as a criterion for campaign searches, as well as for reporting and analysis.
You can specify a campaign sponsor by using the BEA E-Business Control Center.
See also E-Business Control CenterTM.
State of a campaign: active or deactive.
When a campaign is saved, it is in an active state. In other words, the campaign is ready to run between the specified start and stop times, and when the appropriate conditions are met.
When you disqualify an active campaign from running, or when you stop a running campaign before it reaches either the specified stop date or its goals, the
campaign is in a deactive state. In the campaign list of the E-Business Control Center (shown in the Control Center's Explorer window) deactivated campaigns are displayed in a lighter color than other items in the list.
See also E-Business Control CenterTM.
Single point of access to several product catalog services: Category Manager service, Product Item Manager service, Custom Data Manager service, and Catalog Query Manager service.
See also product catalog and service.
Service that queries the Commerce services product catalog. It defines two types of catalog searches: keyword searches and attribute-based searches. A keyword search is a simple search on a number of keywords, whereas an attribute-based search allows a complex Boolean expression on any of the item attributes to be evaluated.
See also product catalog and service.
Service that manages the hierarchical structure of the Commerce services product catalog. It defines a complex interface for creating and modifying the hierarchy and for mapping items into categories.
See also product catalog and service.
See compact disc-read only memory (CD-ROM).
Digital statement that associates a particular public key with a name or other attributes. It is digitally signed by a certificate authority (CA). By trusting that authority to sign only true statements, you can trust that the public key belongs to the person named in the certificate.
See also certificate authority (CA) and certificate authentication (CA).
certificate authentication (CA)
Method of providing a confident identification of a client by a server through the use of digital certificates. Certificate authentication is generally preferred over password authentication because it is based on what the user has (a private key), as well as what the user knows (a password that protects the private key).
See also authentication, certificate authority (CA), and certificate.
Standard interface defined in WebLogic Server to map digital certificates to WebLogic Server users. After verifying an incoming certificate, the certificate authenticator maps the incoming trading partner associated with the certificate to the corresponding WebLogic Server user, based on the certificate.
Well-known and trusted entity that issues public key certificates. A certificate authority attests to a user's real-world identity, much as a notary public does.
See also certificate and certificate authentication (CA).
Well-known and trusted organization, such as VeriSign, that issues digital certificates for the purpose of authenticating a certificate holder's identity to another party.
Process that causes a Webflow to move from one processor node (that is, an input processor or pipeline) to another processor node. This mechanism relieves you of the need to use processor nodes between presentation nodes. In a chaining
arrangement, the result state of one successfully executed processor node is another processor node.
See also input processor, node, pipeline, and Webflow.
Interactive process whereby a customer confirms items to be purchased, and provides payment and shipping information. The Commerce services then validate the customer information, post the credit card transaction, and log shipping and tax payment requirements. The checkout process invokes the Registering Users and Managing Customer services and the Managing Purchases and Processing Orders services.
See also Managing Purchases and Processing Orders services and Registering Customers and Managing Customer services.
See Customer Information Control System (CICS).
In cryptography, a coding system used to create encrypted messages.
See also cipher, cipher suite, cipher text, and secure sockets layer (SSL).
Secure sockets layer (SSL) encryption method. Includes three types of algorithms that can be used to protect the integrity of a communication: the key exchange algorithm, the symmetric encryption algorithm, and the secure hash algorithm.
See also cipher and secure sockets layer (SSL).
In cryptography, text that is encrypted.
Category of objects used in object-oriented programming. A class defines the implementation of a particular kind of object. A class definition defines instances and class variables and methods, and specifies the interfaces and class implementations and the immediate superclass of the class. If the superclass is not explicitly specified, it is implicitly assumed to be Object.
See also object-oriented programming (OOP) and class library.
A set of client programming tools called classes. These tools can be used in a Java or C++ program, or in a Java applet that can be embedded in a Web page.
List of paths for the file system directories or Java archive files to be searched by a Java Virtual Machine (JVM) at run time, in order to locate the executable class files required at that time. The list may be supplied through an operating system environment variable (CLASSPATH) or a command-line switch (-classpath) sent to the virtual machine. Application server containers, such as servlet engines and EJB containers, may contain additional levels of classpath information.
See also class and class library.
Act of clicking an ad. The number of clickthroughs can be used as one criterion to determine whether the goal of a campaign has been met.
If a client is located on a machine that belongs to the domain to which the target servers also belong, then the client is called a native client. If the client is located on a machine outside that domain, then the client is called a remote client or a Workstation client.
Entity that makes a request to a Web service to return data. Can be written in any language and run on any platform, as long as it communicates in the manner expected by the Web service. Most Web services expect to receive requests over an Internet protocol, such as HTTP, and they expect those requests to be XML messages formatted according to the SOAP specification.
client connector interface (CCI)
Interface that allows a J2EE-based application to connect to back-end systems and access them. The CCI manages the flow of data between a client application and its back-end system. It does not have any visibility into the activities, with the adapter, of the container or the application server.
Network in which heterogeneous clients make requests over various protocols for many different services on the network and the requests are fulfilled transparently by a high-performance, intelligent intermediate server or cluster of servers, such as the pure-Java WebLogic Server.
See also client/server and Web service.
Network architecture in which computer processing is distributed among clients (desktop PCs) and a server or servers (central computer).
Group of servers that work together to provide an application platform that is more powerful and reliable than a single server. A cluster appears to its clients as a single server but it is, in fact, a group of servers acting as one. If properly designed and configured, a cluster can provide both availability and scalability. New processes and machines can be added to a cluster, dynamically, to handle increased load without shutting down the cluster. Individual servers can be removed from the cluster periodically so that maintenance can be done without affecting cluster performance.
Clusterable stub is a wrapper that delegates its calls to a service instance. It has intelligence about how to deal with load balancing and failover situations, in which a service might be handled transparently by another server. You generate clusterable stubs by setting the -clusterable flags for RMIC or similar EJB deployment descriptor properties.
See also failover, load balancing, and stub.
Entity that reads a COBOL Copybook and generates a message format reflecting the data structure of the COBOL Copybook.
In this documentation, the character encoding of the field data.
See also applet and package name.
Base URL for locating an applet's classes on the server host. To get the complete URL for an applet, combine the CODEBASE with the applet's CODE name.
See also applet, CODE tag, and uniform resource locator (URL).
Definition of the interactions that trading partners agree to carry out, along with a specification for the methods through which these interactions are conducted. This specification includes details about transport, messaging, security constraints, and bindings to a process specification.
Workflow used by trading partners to implement a role while conducting business with the B2B integration component of WebLogic Integration.
MBean interface that represents trading partners in a run-time environment. WebLogic Integration management applications can use CollaboratorMBean objects to monitor trading partners.
See Component Object Model (COM).
Representation of an object that conforms to the Component Object Model (COM) standards, including implementations of all necessary interfaces.
See also Component Object Model (COM)
Development kit for a Web application that displays product descriptions and manages customer orders. It includes a set of JSP templates, database schemas, Java components, and configuration files.
See also JSP template and Web application (Webapp).
Defines a standard client API for application components and enables application components and Enterprise Application Integration (EAI) frameworks to drive EIS) using a common client API. The J2EE Connector Architecture defines a CCI for EIS access.
See also application programming interface (API), Enterprise Information System (EIS), and J2EE Connector Architecture.
common object request broker architecture (CORBA)
Standard from the Object Management Group (OMG) for communicating between distributed objects. CORBA uses IDLs (interface definition language) and ORBs (object request brokers), and communicates with IIOP (Internet InterOperability Protocol).
See also interface definition language (IDL), Internet Interoperability Protocol (IIOP), and object request broker (ORB).
compact disc-read only memory (CD-ROM)
Disk from which data is read optically by laser and on which data cannot be modified except under special conditions.
Collection of services that enables software components to interoperate in a networked environment.
Criterion for determining the conditions under which an ad will be displayed, when a discount will be offered, or when an e-mail will be sent. In the BEA E-Business Control Center, text describing the selected conditions appears in the Action portion of the respective New Action window.
See also E-Business Control CenterTM.
Set of hardware, hardware options, software, and software setup on a computer or on a network.
See also configuration set and configure.
Name or number used to reference a particular configuration in a configuration partition. Each configuration set describes the services to be used when the configuration is active.
See also configuration and configure.
To customize hardware and software for a computer or for a network.
See also configuration and configuration set.
Confirmed_Delivery_to_Destination
Quality of Service (QoS) option that verifies receipt of a message by all recipient trading partners. Delivery can be made more reliable by use of options such as Retry Attempts and Durability (Persistent option).
Confirmed_Delivery_to_Destination can also provide additional information to the sender and administrators, including delivery status from recipients, complete message tracking for administrators, and confirmation from the B2B integration component of WebLogic Integration upon completion of delivery. Availability depends on the business protocol that is used.
Default Quality of Service (QoS) option that verifies receipt of a message by the B2B integration component of WebLogic Integration. This option is often used when system performance is an issue. It does not provide delivery status from recipients, nor does it provide message tracking. Because the selection process for trading partners is performed after confirmation reaches the sender, no information about potential recipients is available. Availability depends on the business protocol that is used.
Provides connectivity to a resource manager and enables an application client to connect to a resource manager, perform transactions, and access services provided by that resource manager. A connection can be either transactional or nontransactional. Examples include a database connection and an SAP R/3 connection.
In Webflow, a small graphical device on the edge of a node that marks the point at which an event or exception is connected to that node. In some cases, it may be helpful to move the node's connection port.
See also node and Webflow.
In a WebLogic Server environment—Pseudomethod used to create an object. In Java, constructors are instance methods with the same names as their classes. Java constructors are invoked using the new keyword.
See also class, instance, Java, metadata interface, and object.
Part of an application server, such as WebLogic Server, that provides deployment and run-time support for application components. A container allows you to monitor and manage supported components as well as the service(s) that monitor and manage the components. A container can be any of the following:
See also Enterprise JavaBeans (EJB), Java Server Pages (JSP), and servlet.
Transaction in which an Enterprise JavaBean container controls the transaction boundaries. In a container-managed transaction, controls are specified in the deployment descriptor. When a bean method is invoked, the container manages the transaction, which begins and ends in the same method. An entity bean must use container-managed transactions.
See also bean-managed transaction and transaction.
System that manages a collection of content objects (articles, documents, images, and so forth), including metadata about the content. Content management systems, such those marketed by Interwoven and Documentum, usually provide services such as retrieval of content and content authoring services. Content authoring services may include services for creating, editing, and versioning content objects, and workflow services
Key WebLogic Personalization Server component that provides access to content via both JSP tags and EJBs. The JSP tags provide a developer with an enumeration of content objects by querying the content database directly using a search expression syntax. The content management tools are designed to be used with the rules manager and rules services, user profiles, and property set manager to create personalized content delivery on an e-commerce site. The primary interface to the functionality of the content management component is the ContentManager session bean.
See also Enterprise JavaBeans (EJB), JSP tag, property set management, and user profile.
Mechanism that queries, under a set of conditions, the content management system for documents. In the BEA E-Business Control Center, a Business Analyst specifies the conditions that trigger a content selector to run a query. A Business Analyst also uses the BEA E-Business Control Center to construct the query that the content selector runs. A Business Engineer creates a content-selector JSP tag where the Business Analyst wants to display documents.
See also E-Business Control CenterTM, Business Analyst (BA), and Business Engineer (BE).
Component used in a Web service so that a service can communicate with other kinds of applications and components. For example, a database control enables a Web service to request data from a database. A service control makes it easy for one Web service to call another.
Service that manages conversation life cycles, according to the rules of the corresponding business protocols, and supports long-living, durable conversations that span multiple organizational boundaries. The conversation coordinator generates conversation IDs; registers trading partners in a conversation; delivers business and system messages to clients; maintains status information about conversations; and provides the conversational context for execution of the business protocol.
Collection of values that specifies the parameters of a conversation.
Trading partner that initiates and terminates a conversation.
Period during which messages are exchanged between trading partners.
Trading partner that receives and processes business messages.
Intelligent and controlled cessation of message exchanges performed as part of a B2B integration or business process management (BPM) function, both of which are supported by WebLogic Integration:
Interface that enables a trading partner to send and receive business messages in conversations. A conversation handler must be registered for one or more conversation types in order for the associated trading partner to participate in conversations.
MBean interface that represents a conversation. WebLogic Integration management applications use ConversationMBean objects to monitor conversations in a run-time environment.
Common piece of source code designed to be copied into many source programs; used mainly in IBM DOS mainframe programming. In mainframe DOS (for example, DOS/VS and DOS/VSE), the copybook was stored as a book in a source library. A library comprising books, the name of each of which began with a letter prefix designating a programming language (for example, A.name for Assembler, C.name for COBOL) because DOS did not support multiple or private libraries. This term is used mainly by COBOL programmers, but it is supported by most mainframe languages. The IBM OS series did not use the term copybook; instead, it referred to such files as libraries implemented as partitioned data sets or PDSs. A copybook is functionally equivalent to a C or C++ include file.
See common object request broker architecture (CORBA).
Capability provided automatically, by WebLogic Workshop, to Web services. If a Web service has many simultaneous clients, it must keep track of which responses go to which clients in response to requests. This includes callbacks: when events occur in the Web service that must be passed on to clients via callbacks, WebLogic Workshop's correlation capability routes the callback messages automatically.
Quality of Service (QoS) option that contains the message identification string. It can be used to correlate different business messages within an application. Availability depends on the business protocol that is used.
Data entity that contains or references security information that can authenticate a principal to additional services. A principal acquires a credential upon authentication or from another principal that allows its credential to be used: the latter is termed principal delegation. A credential may be a password, an X509 digital certificate or a certificate chain, or any other token that validates a user.
See also realm and user.
Service that defines an interface for giving persistence to custom attributes of product items. (Custom attributes are attributes not defined in the ProductItem interface.)
Security components written by security vendors and application developers. Custom security providers are implementations of the Security Service Provider Interfaces (SSPIs).
See also Security Service Provider Interfaces (SSPIs) and WebLogic Server security providers.
Customer Information Control System (CICS)
IBM-licensed program that enables transactions entered at remote terminals to be processed concurrently by user-written application programs.
Collection of information that is gathered, saved, and updated as customers visit your Web site, or from other offline sources. Customer profiles are unique to each customer and can contain a variety of information, from product preferences to the demographic data customers provide on a form page. Each piece of information stored in a customer profile (or any combination of that information) can be used to create a customer segment.
Implementation of business logic and presentation logic through which customers modify their user profiles.
See also business logic, service, user profile.
Grouping of customers based on common characteristics gathered from their customer profiles, such as product preferences or age.
— D —
Program that runs automatically and continuously in the background.
See Direct Access Storage Device (DASD).
WebLogic Integration component that translates XML files to nonXML format, and vice versa.
WebLogic Integration Studio component that extends business process management (BPM) functionality for use with data integration functionality.
SSL-based security feature in WebLogic Integration that provides link-level encryption of messages in communications between trading partners. Human users do not have data privacy (SSL) when their names and passwords are used for identification. A digital certificate is required to provide data privacy.
In a WebLogic Integration environment—Mapping of data provided in one XML format to another XML format. For example, data transformation is performed when a RosettaNet document is mapped to an ebXML document.
In a WebLogic Integration environment—Process of converting binary data to or from XML.
data universal numbering system (DUNS)
Standard for assigning nine-digit strings, as internationally-recognized identifiers, to companies that engage in global electronic commerce transactions. Business identifiers are assigned to trading partners for external use by some business protocols; they differ from internal WebLogic Integration trading partner names. Implementations of the RosettaNet business protocol must use DUNS numbers.
Collection of interrelated or independent data items stored together without redundancy to serve one or more applications.
database management system (DBMS)
Program or set of programs that enables users to structure and manipulate the data in the tables of a database. Use of a DMBS ensures data privacy and integrity, and the ability to recover data in a multiuser environment.
Programming classification indicating the type of data in a variable. Some commonly used datatypes are various forms of integers, character, and Boolean. Most programming languages require that the datatype must be declared for data objects or fields. Datatypes are dependent upon the programming language used.
In a WebLogic Server environment—Set of high-level Java objects that may be used with any JDBC driver for database access.
See database management system (DBMS).
The business process management (BPM) term for a workflow component that contains a condition to be evaluated when a transition occurs. The result of the evaluation (true or false) determines the appropriate dependent node to which flow control then passes.
Component that processes the protocol-specific message headers, identifies the sending trading partner, enlists the sending trading partner in a conversation, prepares a reply for the sender, and forwards the message to the scheduling service.
Process of taking cipher text (encrypted data) and a cryptographic key and producing plain text (the original unencrypted data).