Terms







Index:
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
 

 

 


ASP

A specification for a dynamically created Web page with a .ASP extension that utilizes ActiveX scripting -- usually VB Script or Jscript code. When a browser requests an ASP page, the Web server generates a page with HTML code and sends it back to the browser. So ASP pages are similar to CGI scripts, but they enable Visual Basic programmers to work with familiar tools.


COM

A model for binary code developed by Microsoft. The Component Object Model (COM) enables programmers to develop objects that can be accessed by any COM-compliant application. Both OLE and ActiveX are based on COM.

CORBA

Common Object Request Broker Architecture.  An architecture that enables pieces of programs called "objects" to communicate with one another regardless of programming language implemented in or operating system they are running on.



DBMS

Database Management System.  Synonym with the term Database System and often used in place of the term Database.  It is technically the software product that manages a database.
 
DBA
Database Administrator.  Person that installs, creates, maintains a database.
DCOM

Distributed Component Object Models.   Is a Microsoft platform-specific distributed object communications paradigm. Extension of COM.

Digital Cash

A system that allows a person to pay for goods or services by transmitting a number from one computer to another. Like the serial numbers on real dollar bills, the digital cash numbers are unique. Each one is issued by a bank and represents a specified sum of real money. One of the key features of digital cash is that, like real cash, it is anonymous and reusable. That is, when a digital cash amount is sent from a buyer to a vendor, there is no way to obtain information about the buyer. This is one of the key differences between digital cash and credit card systems. Another key difference is that a digital cash certificate can be reused. There a number of competing protocols, and it is unclear which ones will become dominant. Most digital cash systems start with a participating bank that issues cash numbers or other unique identifiers that carry a given value, such as five dollars. To obtain such a certificate, you must have an account at the bank; when you purchase digital cash certificates, the money is withdrawn from your account. You transfer the certificate to the vendor to pay for a product or service, and the vendor deposits the cash number in any participating bank or retransmits it to another vendor. For large purchases, the vendor can check the validity of a cash number by contacting the issuing bank.

 

Digital Wallet

Software that works like a physical wallet during electronic commerce transactions. A wallet can hold a user's payment information, a digital certificate to identify the user, and shipping information to speed transactions. The consumer benefits because his or her information is encrypted against piracy and because some wallets will automatically input shipping information at the merchant's site and will give the consumer the option of paying by digital cash or check. Merchants benefit by receiving protection against fraud. Most wallets reside on the user's PC, but recent versions, called "thin" wallets, are placed on the credit card issuer's server. Netscape and Microsoft now support wallet technology on their browsers.


EDI

Electronic Data Interchange, the transfer of data beween different companies using networks, such as the Internet. As more and more companies get connected to the Internet, EDI is becoming increasingly important as an easy mechanism for companies to buy, sell, and trade information. ANSI has approved a set of EDI standards known as the X12 standards.

EJB

Enterprise JavaBeans.  Is a Java API developed by Sun Microsystems that defines a component architecture for multi-tier client/server systems. EJB specification defines a Java-based standard interface contract that exists between enterprise application components and enterprise application service framework products.  Concept:  EJBs implemented for one vendor's enterprise application server framework product solution could run atop another vendor's enterprise application service framework product solution.

F
A.

H
U.

 
 
 


I

I


JavaBeans

A specification developed by Sun Microsystems that defines how Java objects interact. An object that conforms to this specification is called a JavaBean, and is similar to an ActiveX control. It can be used by any application that understands the JavaBeans format. The principal difference between ActiveX controls and JavaBeans are that ActiveX controls can be developed in any programming language but executed only on a Windows platform, whereas JavaBeans can be developed only in Java, but can run on any platform.

J2EE

Java 2 Enterprise Edition.  Describes version of Java.
 

JDBC

Java Database Connectivity, a Java API that enables Java programs to execute SQL statements. This allows Java programs to interact with any SQL-compliant database. Since nearly all relational database management systems (DBMSs) support SQL, and because Java itself runs on most platforms, JDBC makes it possible to write a single database application that can run on different platforms and interact with different DBMSs.

Jini

Is a collection of Java APIs that is marketed as the next-generation technology for building distributed systems.  Specifically, seeks to simplify the connection and sharing of devices, such as printers and disk drives, on a network. For example, if a disk drive on a network had Jini capabilities, any computer on that network could use the drive as though it were its own. The software works by passing snippets of programs, called applets, back and forth among devices. Sits on top of the Java 2 platform (either J2SE or J2EE).  Uses Java's RMI infrastructure.


JMS

Java Message Service.   Is an API that is part of J2EE.

JNDI

Java Naming and Directory Interface.  Is part of J2EE.   Is used to provide a common Java API to various underlying naming service implementations and types.  Naming services are used to reference and look up distributed objects on a network in terms of a human-readable name (binds names to objects and vice versa).


JSP

Java Server Pages.   A server-side technology, Java server pages are an extension to the Java servlet technology that was developed by Sun as an alternative to Microsoft's ASPs (Active Server Pages). JSPs have dynamic scripting capability that works in tandem with HTML code, separating the page logic from the static elements -- the actual design and display of the page. Embedded in the HTML page, the Java source code and its extensions help make the HTML more functional, being used in dynamic database queries, for example. JSPs are not restricted to any specific platform or server.
 

L
 

M
D



ODBC

Open DataBase Connectivity, a standard database access method developed by Microsoft Corporation. The goal of ODBC is to make it possible to access any data from any application, regardless of which database management system (DBMS) is handling the data. ODBC manages this by inserting a middle layer, called a database driver , between an application and the DBMS. The purpose of this layer is to translate the application's data queries into commands that the DBMS understands. For this to work, both the application and the DBMS must be ODBC-compliant -- that is, the application must be capable of issuing ODBC commands and the DBMS must be capable of responding to them

PHP

PHP Hypertext Preprocessor is a server-side, HTML embedded scripting language used to create dynamic Web pages. In an HTML document, PHP script (similar syntax to that of Perl or C ) is enclosed within special PHP tags. PHP can perform any task any CGI program can do, but its strength lies in its compatibility with many types of databases. Also, PHP can talk across networks using IMAP, SNMP, NNTP, POP3, or HTTP. Today, PHP is shipped standard with a number of Web servers, including RedHat Linux.

PKI

Public Key Infrastructure. Is a system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction.

 

Portal

A Web site or service that offers a broad array of resources and services, such as e-mail, forums, search engines, and on-line shopping malls. The first Web portals were online services, such as AOL, that provided access to the Web, but by now most of the traditional search engines have transformed themselves into Web portals to attract and keep a larger audience.

 


Relational Database
Database where data is stored in tables and manipulated through the use of mathematically defined relations.
 
RMI
Remote Method Invokation. API, protocol, developed by Sun's JavaSoft division that enables Java objects to communicate remotely with other Java objects. RMI is a relatively simple protocol, but unlike more complex protocols such as CORBA and DCOM, it works only with Java objects. CORBA and DCOM are designed to support objects created in any language.
 


Secure HTTP (S-HTTP)

Protocol for transmitting data securely over the World Wide Web. Whereas SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely, S-HTTP is designed to transmit individual messages securely. Not as prevalent as SSL.

Servlet

Kind of Java program (extends a Java class, API), that runs on the server and can process CGI requests and return responses (including creation of dynamic HTML). Java servlets are becoming increasingly popular as an alternative to CGI programs. The biggest difference between the two is that a Java servlet is persistent. This means that once it is started, it stays in memory and can fulfill multiple requests. In contrast, a CGI program disappears once it has fulfilled a request. The persistence of Java servlets makes them faster because there's no wasted time in setting up and tearing down the process.

 

SET

Secure Electronic Transaction, a new standard that will enable secure credit card transactions on the Internet. SET has been endorsed by virtually all the major players in the electronic commerce arena, including Microsoft, Netscape, Visa, and Mastercard. By employing digital signatures, SET will enable merchants to verify that buyers are who they claim to be. And it will protect buyers by providing a mechanism for their credit card number to be transferred directly to the credit card issuer for verification and billing without the merchant being able to see the number.

SmartCard

A small electronic device about the size of a credit card that contains electronic memory, and possibly an embedded integrated circuit (IC). Smart cards containing an IC are sometimes called Integrated Circuit Cards (ICCs). Smart cards are used for a variety of purposes, including: Authentication (security), Storing a patient's medical records. Storing digital cash Generating network IDs (similar to a token) To use a smart card, either to pull information from it or add data to it, you need a smart card reader, a small device into which you insert the smart card.

S/MIME

Secure/MIME, a new version of the MIME protocol that supports encryption of messages. S/MIME is based on RSA's public-key encryption technology.

 

 

SSH

Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled. When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords. SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSA authentication. Developed by SSH Communications Security Ltd

SSL

Secure Socket Layer. A protocol developed by Netscape for transmitting private documents via the Internet. Actually creates a secure connection over which any amount of encrypted data can be sent. SSL works by using a private key to encrypt data that's transferred over the SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, Web pages that require an SSL connection start with https: instead of http:.

SQL

Structured Query Language.  Language used by many databases for data manipulation.

 


T

D

V
S
 

XML
Extensible Markup Language. A specification developed by the W3C. XML is a pared-down version of SGML, designed especially for Web documents. It allows designers to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations.
© Lynne Grewe 2000