A business program, built around the BEA Tuxedo system, that is defined and controlled by a single BEA Tuxedo configuration file, and that is administered as a single entity. Such an application may comprise one or more clients (local or remote), one or more servers, and one or more machines. At a minimum, a BEA Tuxedo application includes one machine, one server, and one client. Also referred to as a BEA Tuxedo domain.
When using OMG IDL, that part of an OMG IDL interface that is similar to a public class field or data member. The compiler maps an OMG IDL attribute to accessor and modifier methods in either the C++ or Java programming language. For example, an interface ball might include the attribute color. The idltojava compiler would generate a C++ or Java programming language method to get the color, and, unless the attribute is read-only, would generate a method to set the color. CORBA attributes correspond closely to JavaBeans properties.
(CORBA) A set of system services for objects that were developed for the programmer. These services, defined in OMG IDL by the OMG, can be used to create objects, control access to objects, track objects and object references, and control the relationship between types of objects. Programmers can call object service functions instead of writing and calling their own private object service functions.
A digital code, attached to an electronically transmitted message, that uniquely identifies the sender and that can, therefore, be used to authenticate the identity of the sender. When a message is authenticated, verification is provided that: (1) the message is genuine; (2) the message has arrived exactly as it was sent; and (3) the message has come from the stated source.
Digital signatures are especially important for electronic commerce and are a key component of most authentication schemes. The recipient of signed data can use a digital signature to prove to a third party that the signature was, in fact, generated by the signatory. When such proof is provided, the signed data is protected by nonrepudiation: the signatory cannot, at a later time, deny authorship of the signature.
An algorithm that transforms a message of any length to a digital signature in such a way that it is computationally infeasible to (1) find two messages with the same digital signature, (2) produce a message from a given, predetermined digital signature, or (3) find the digital signature of a given message without knowledge of the sender's private key. Typically, a digital signature algorithm is implemented by computing a message digest on the message, then encrypting the message digest with the sender's private key.
A software entity, defined within the Management Information Base (MIB), that represents a feature of a managed resource (such as a process, a piece of hardware, or system performance attribute) and is controlled through a management infrastructure, such as the BEA Tuxedo TMIB, on behalf of a management console.
When addresses are available on separate networks, even if one virtual circuit is disrupted, another circuit can continue undisturbed. Only a failure on all configured networks makes reconnection of the BRIDGE processes impossible. For example, when a high-priority network fails, its load can be switched to an alternate network with a lower priority. When the higher-priority network returns to service, the network load returns to it.
An application development approach that distributes application logic across three or more environments: the desktop computer, one or more application servers, and a database server. The main advantage of the n-tier client/server model is that it extends the benefits of client/server architecture to the enterprise level. Other advantages include added manageability, scalability, security, and higher performance.
(CORBA) The interface to an object, as defined in an application's OMG IDL statements. The object interface identifies the set of operations and attributes that can be performed on an object. For example, the interface for a teller object identifies the types of operations that can be performed on that object, such as withdrawals, transfers, and deposits. Tobj::TransactionCurrent is an example of an object interface provided by the BEA Tuxedo software.
(CORBA) A software system that stores, manipulates, and uses a collection of objects according to a set of system-specific standards. An object system specifies how information is exchanged between objects, and how objects are implemented in accordance to an object model, such as CORBA COM, EJB, and RMI.
Outbound IIOP, via a second connection, to joint client/server applications that are not connected to an ISH. This feature of the BEA Tuxedo software is supported for GIOP 1.0, GIOP 1.1, and GIOP 1.2 client applications, server applications, and joint client/server applications.
Outbound IIOP to a remote joint client/server application that is connected to an ISH. Unlike bidirectional outbound IIOP, the outbound callback uses a second connection that is separate from the connection initially used by the joint client/server application for inbound calls. This feature of the BEA Tuxedo software is supported for GIOP 1.0, GIOP 1.1, and GIOP 1.2 client applications, server applications, and joint client/server applications.
One of a set of Public-Key Cryptography Standards developed by RSA Laboratories in cooperation with an informal consortium, originally including Apple, Microsoft, DEC, Lotus, Sun and MIT. PKCS-7 defines a general syntax for messages that include cryptographic enhancements such as digital signatures and encryption. BEA Tuxedo public key security complies with the PKCS-7 standard.
In transaction systems, after a failure, the ability to restore the system to the most recently committed, and therefore consistent, state. In distributed systems, recovery may involve resynchronizing several distributed components. Once a system has been recovered, processing can resume, and transactions aborted as a result of the failure can be resubmitted.
A BEA Tuxedo feature that enables users to monitor application-to-application transactions and, if necessary, troubleshoot distributed applications under development or during production. Also, it allows users to pinpoint problems to any hardware, operating system, network, or application code.
In the delegation-based approach, the implementation does not inherit from the POA skeleton class. Instead, a wrapper class inherits from the POA skeleton and delegates upcalls to an implementation that is coded as required. This wrapper class, called a tie class, is generated by the IDL compiler, along with the same skeleton class used for the inheritance approach. Like the skeleton, the tie class provides a method corresponding to each OMG IDL operation for the associated interface; however, you may need to modify the tie class to adapt it to the interface of your legacy object. The name of the generated tie class is the same as the generated skeleton class, with the addition that the string _tie is appended to the end of the class name.
(CORBA) A thread that is scheduled to execute a request from a client application. The BEA Tuxedo Java software uses a thread pooling model, where a pool of available worker threads is managed by the software. When the BEA Tuxedo Java software receives a request from a client application, the software schedules, from the thread pool, an available worker thread to execute the request. When the request is complete, the worker thread returns to the thread pool. A worker thread can serve only one request at a time.
(ATMI) A non-nested C structure whose elements are any of the following C data types: int, short, long, char, float, double, character string, and octet array. X_C_TYPE is one of three buffers that are defined in the X/Open XATMI standard. It is equivalent to the BEA Tuxedo VIEW buffer.