Systems Network Architecture (SNA)
Storage on the client machine that an applet can safely access without needing full access to the client file system. Scratch space is managed by the Microsoft Virtual Machine for Java to ensure that it cannot be abused by malicious applets.
A process that automates interaction between two computer systems by allow data to be sent to, and read from, specific locations on the screen. Screen scraping allows client computers to interact with host programs that simply expect data to be filled in at field locations on the screen.
A protocol designed to provide secure communications on the Internet. SSL operates by layering a security protocol on top of an underlying reliable connection-oriented transport protocol. The combined protocol establishes a connection with a remote host and then performs a handshake between the two nodes to establish a secure session. Once the security handshake is complete, the protocol then encrypts and authenticates data sent from the local host and decrypts and verifies data received from the remote host.
Cursors that reside on the server, as opposed to residing on the client machine. While client-side cursors copy the keyset to the workstation, server-side cursors use the resources of the database server to maintain the cursor keysets.
A collection of related features that respond to requests for specific activities and/or yield information, based on a published specification of interface or behavior, and accessed through a consistent interface that encapsulates its implementation.
A way of viewing applications as a set of features or services that are used to fulfill consumer requests. By encouraging the developer to model an application as a collection of discrete services, features and functionality can be packaged for reuse, sharing, and distribution across functional boundaries.
In source control, causing a single item to appear to exist simultaneously in multiple source control projects, yet changes to the file from one project are automatically seen by other projects sharing the file. There is only one copy of the item in the source control database, and each project to which the file belongs simply has a pointer to that copy.
The management of an item's history and the item's relation to a larger grouping of related files known as a project. Source code control is a vital part of the efficient development of software applications.
A security mechanism which uses SQL Server login validation process for all connections. To log into a SQL Server, each user must provide a valid login ID and password.
A type of cursor in which neither the cursor owner nor any other user can change the result set while the cursor is open. Values, membership, and order remain fixed until the cursor is closed. You can either take a "snapshot" (temporary table) of the result set, or you can lock the entire result set to prevent updates. When you take a snapshot of the result set, the result set diverges increasingly from the snapshot as updates are made.
Precompiled collection of SQL statements and optional control-of-flow statements stored under a name and processed as a unit. Stored procedures are stored within a database; can be executed with one call from an application; and allow user-declared variables, conditional execution, and other powerful programming features.
Systems Network Architecture (SNA)
A communications framework developed by IBM. Microsoft® System Network Architecture (SNA) Server provides a gateway connection between personal computer local area networks (LANs) or wide area networks (WANs), along with IBM mainframe and AS/400 hosts.