Glossary entries exist beginning with the following letters:
A security mechanism that regulates access to an object stored in a Tamino database. An access control list contains one or more access control elements (ACEs), which are stored in the doctype ino:acl in the collection ino:security.
A security mechanism that regulates access to an object or a group of objects stored in a Tamino database. An access control list contains one or more access control elements (ACEs), which are stored in the doctype ino:acl in the collection ino:security.
Transactions are called ACID transactions (concerning relational databases) if they fulfil the following requirements:
Atomicity: Either the transaction is fully completed or it is not executed at all.
Consistency: The transaction always has to provide consistent results.
Isolation: The transaction is independent of any other process that may be run in parallel.
Durability: Once the transaction is completed, the results remain as persistent data.
See Access Control List.
The master database propagates changes as soon as they occur. Contrast passive replication.
The client-side, Internet-enabled portion of Microsoft's component-object architecture COM.
A popular open source web server available for many operating systems. See also Web Server.
A formally defined programming language interface between a program product and its user.
In asymmetric replication, there is one master server (on which all updates are performed), and one or more slave servers to which the updates are propagated. It is also called read-only replication. See also Symmetric Replication.
If a database is replicated asynchronously, updates are not propagated as part of the user transaction that does the update. As a consequence, the replication databases are not up-to-date, but reflect changes only after a certain delay. See also Synchronous Replication.
A name-value pair associated with an XML element. Can appear only within start tags and empty element tags. Its value can be constrained by datatype information provided by a schema or DTD.
The process by which the security system verifies that a client user is actually who it claims to be. Authentication is performed at the user point of entry, which avoids the need for multiple sign-ons to the different security systems.
The process whereby a client's access rights to a specific service or resource are verified.
The authorization level in an access control element specifies the type of access that is allowed to the object in question.
In XPath, a part of a location path specifying the relationship between the current node and a set of selected nodes.
A copy of a database, generally made at regular intervals (e.g. once a day). If data in the database should become corrupted, the data can be restored from the backup. If the data changed since the last backup, it is necessary to perform a recovery operation, which re-applies the changes that are stored in the log spaces to the data. See also complete backup, incremental backup, partial backup.
A part of a database backup. See also Database Backup Location.
A simple method of performing authentication. In the HTTP protocol, Basic Authentication refers to a mechanism of authenticating users by the use of a user-ID and a password.
Interfaces of the Tamino Server that can be used in a Server Extension Function to access both the various databases administrated by the Tamino Server and system information available in the running Tamino Server.
A simple mechanism for adding formatting information (e.g. fonts, colors, spacing) to HTML and XML documents. A CSS, for example, can be attached to an HTML document to influence its layout when accessed via a browser. Cascading means that a single document may use two or more stylesheets that are then applied according to specified priorities (=cascade) to produce different output.
A digitally signed data structure defined in the X.509 standard that binds the identity of a certificate holder to a public key.
A third party that registers users and certifies their identity by signing their public-key certificates.
A list of revoked but unexpired certificates issued by a Certificate Authority.
The systematic ordering and numbering of a set of characters (such as letters in an alphabet), by which each character is assigned a fixed position (its so-called code point) in the set. Common encodings are ASCII, ISO 8859-1 and Unicode encodings such as UCS-2, UCS-4, UTF-8 and UTF-16. See also the frequently asked questions and glossary section at http://www.unicode.org/.
In general, a client program is a piece of software that issues a request and thus initiates communication. Traditionally, the basic form of such communication would be a PC client program accessing a remote database on the mainframe (acting as the server).
A coded character set. This term is often used when referring to a coded character set used by a personal computer, for example, PC code page 437, the default coded character set used by DOS.
The position (usually a numerical index) of a character within a table that contains all the characters of a character set.
The process of ordering units of textual information according to a well defined set of rules. These rules may be relatively simple, based solely on the order of component symbols; on the other hand, they may be arbitrarily complex, requiring grammatical or semantic interpretation.
In Tamino, collations can be used to define a sorting sequence for multibyte character data.
In Tamino, a collection is the largest unit of information within a database. Each collection can contain multiple doctypes. It is a container for related information.
One of the set of programming instructions that the X-Machine offers in its low-level API.
To complete a transaction and cause its effects to be stored in the database persistently. Contrast roll back.
Also known as full backup. A backup that saves all data of the whole database. See also partial backup, incremental backup.
The whole database is replicated, in contrast to a partial replication.
A piece of software, program, dynamic link library, or shared library covering a single or multiple tasks, normally covering a whole functional aspect of a system.
Microsoft's framework for developing and supporting program component objects. COM provides a set of interfaces allowing clients and servers to communicate within the same computer. See also DCOM.
A special kind of index for natively stored data. It is especially suited for accelerating queries containing combined value conditions that appear with a multiplicity of more than one. A compound index consists of two or more different components.
Efficient parallel execution of multiple transactions. As there may be interference between transactions, concurrency conflicts with isolation. Increasing concurrency decreases the degree of isolation and vice versa.
A situation leading to incorrect results of a transaction which occur when concurrent transactions access the same resources in a specific order. These include: lost updates, dirty read/write, non-repeatable read/write, phantom effect. Concurrency phenomena reduce the degree of isolation.
Available with the Tamino X-Plorer. Displays the content of the object that is currently selected in the navigation tree. This may be, for example, XML code or an image in GIF format.
A cursor allows a client to treat a query result like a navigable object. If a query result contains many documents, a cursor can be used to position forwards and backwards within the query result without having to re-issue the query.
The default location for backup spaces. If a database is backed up without explicitly defining a location for the backup, the backup is written to the database backup location.
An operation which checks the consistency of a database's data and indexes and makes any necessary repairs. If, for example, an index is inconsistent, the consistency check will rebuild it.
A storage unit known to the operating system, such as a file system directory, a raw section or a tape drive.
A log file of all database update operations. Database logs are required for recovery operations. See also: Log Space.
The collective term for data space, index space, journal space, log space, temporary working space, backup space, utility recovery space.
When a database is being synchronized, no new update transactions are allowed until all open update transactions are finished. After that, all updated data is written to disk.
Tamino's knowledge base. It contains the schemas, collections, doctypes, databases and XML documents of Tamino.
Where the data of the data store is stored. A data space cannot span multiple database locations, but a database location may contain several data spaces.
Tamino's data storage area for XML and non-XML objects.
A deadlock situation occurs when each of two or more concurrent transactions is waiting for a lock to be released that is being held by one of the other transactions.
An algorithm that creates a shared secret random number that can then be used as a symmetric algorithm's session key.
A cryptographic method that can be used to verify the origin of a document, the identity of the sender, the time and date a document was sent and/or signed, the identity of a computer or user, and more. A document's digital signature is based on both the document and the signer's private key.
A concurrency
phenomenon that may appear in some
isolation levels. The dirty read
phenomenon may occur when a transaction modifies data and another
transaction reads the same data before the first transaction is
committed or
rolled back. In Tamino, this is only
possible in isolation level
uncommittedDocument
.
Disaster recovery stands for the restoration of a Tamino database when everything is lost except for a backup of the database and recovery files. This may be the case after a total loss of the computing environment, in which backup and recovery files are still available on an archive.
A set of Microsoft concepts and program interfaces in which client program objects can request services from server program objects on other computers in a network. DCOM can also work on a network within an enterprise or on other networks besides the public Internet.
An industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers. DCE is typically used in a larger network of computing systems. DCE uses the client/server model.
See Dynamic Link Library.
Represents a container for XML documents with the same root element within a collection.
A platform- and language-neutral interface that provides a standard model of how the various items in an XML object are put together, and a standard interface for accessing and manipulating these items and their interrelationships.
A method of defining the structure to which a valid XML document must adhere. See also XML Schema.
In the Tamino security context, a domain is a group of users that are all authenticated against the same authentication services (for example all users belonging to one Windows NT domain, or all users known to a certain UNIX machine).
These character sets are often encoded in such a way as to allow mixing double byte character encodings with single byte character encodings. Used, for example, for representing Chinese, Japanese, and Korean text, e.g., JIS X 0208-1990.
A collection of small programs, any of which can be called when needed by a larger program that is running in the computer.
The conduct of business on the Internet, not only buying and selling but also servicing customers and collaborating with business partners. Using Electronic Business, companies can for example buy parts and supplies from each other, collaborate on sales promotion, and do joint research.
A standard format for exchanging business data.
An XML document consists of elements, attributes, comments, and processing instructions. Each element has an opening tag which places the name of the element between a less-than and a greater-than sign, and a closing tag which is identical except for the forward slash that appears before the element name, e.g. <myElement>myContent</myElement>. There is a short notation for empty elements: <MyEmptyElement/>.
A unit of information that is recorded in the job log.
A tuple (URI, localName), which may also be derived from a string
prefix:localName
in conjunction with a namespace declaration like
xmlns:prefix="URI" or a namespace context.
An industry standard endorsed by the IETF (Internet Engineering Task Force) for the application of a public key infrastructure.
A network communication facility that can be used to send queries to a Tamino Server. For more information about its use and configuration, refer to the installation documentation.
A simpler and easier-to-use subset of SGML (an international documentation standard) that is designed for use with objects that are distributed over the World Wide Web.
A stylesheet language that describes how XML data is to be presented to the user.
A backup that is written to a storage management system outside of the database server, possibly using advanced backup techniques such as mirroring or snapshots.
Available with the Tamino X-Plorer. Reduces the number of instances that are shown in the navigation tree. For example, you can define a filter which shows only the instances with a specific last name.
Stands for for, let, where, and return. The acronym FLWR refers to the fact that such an expression consists of one or more for and/or let clauses, an optional where clause, and a return clause. A where clause causes the return clause to be evaluated only when the where expression is true.
See HTML Form.
Available with the Tamino X-Plorer. A small part of an XML instance which is shown for a more specific query. For example, if your query expression is "/patient/name/surname", the query result only shows the fragment of the XML code which applies to the surname.
The complete database is recovered. A full recovery is only possible after a full restore. Contrast partial recovery.
The complete database is restored. Contrast partial restore.
The world-wide unique ID of an object.
Refers to the range of items in the database that will be affected by a lock. In Tamino, this can be the whole database, the collection, the doctype or the document.
Available with the Tamino X-Plorer. A node in the navigation tree. For each schema containing a doctype, a collection contains one group of instances of that doctype.
Available with the Tamino X-Plorer. A node in the navigation tree. Each collection contains one group of schemas.
See Globally Unique ID.
High availability is defined as the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliability of its constituent components would suggest.
One member of the result set yielded by a successful query.
The number of documents that satisfy a given query.
A section of an HTML page that uses the HTML statement FORM. This typically allows the user to input and receive data interactively to/from an associated application.
One of a set of commands that can be used in an HTTP request, typically to send or receive data in a particular format.
see Web Server.
An object that consists of several nested objects, distributed over multiple heterogeneous databases.
The set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser. The markup tells the Web browser how to display a Web page's text.
The set of rules for communication on the World Wide Web. Relative to the TCP/IP suite of protocols, which is the basis for information exchange on the Internet, HTTP is an application protocol.
See Internationalization.
Internet Assigned Numbers Authority. See http://www.iana.org/.
Institute of Electrical and Electronics Engineers, Inc. A large international organization of electrical and electronic engineers maintaining more than 800 standards.
IEEE standard 754-1985 is the standard for binary floating-point
arithmetic. It is relevant for the data types xs:float
and
xs:double
.
(Context: Namespaces) A construction mechanism for multi namespace schemas in TSD and XML Schema that has been defined by the W3C.
Only the data which has been changed since the previous backup is saved. Successful recovery is only possible if a previous complete backup is available, as well as all subsequent incremental backups. See also partial backup.
A look-up table for data created internally within a database in order to accelerate database access for specific queries. Tamino supports indexing of XML data similar to the standard indexing functionality provided by other databases (text index and standard index), and also offers special support for indexing of non-XML data with the tool Non-XML Indexer. In addition, Tamino supports several special categories of indices that accelerate data access in very special situations, namely structure index, reference index, multi-path index and compound index.
The location where a database's index is stored. An index space cannot span multiple database locations, but a database location may contain several index spaces.
A special collection in Tamino.
A Tamino system collection that contains the doctypes ino:user, ino:group, ino:acl (ACL = access control list) and ino:domain. Access control is implemented by storing security definitions into ino:security.
A component of the installation package for a server extension. The installation document is an XML document that contains general information about the server extension, such as the name of the server extension, the required parameters, the COM ID and the URLs of the server extension's help files.
Available with the Tamino X-Plorer. Defines the attributes of an instance that are to be shown in the navigation tree (for example, a last name, city and phone number) and the sorting sequence.
Available with the Tamino X-Plorer. Limits the number of instances that can be shown in the navigation tree at the same time.
Special locks that Tamino uses internally for implementing hierarchical locking (multiple granularity locking) indicating the intention to issue further subsequent lock requests for items from a lower granularity than that of the locked item.
Tamino records configuration data, such as the location of database spaces, existence of backup etc., internally. Depending on the platform, this data is either stored in a dedicated file on the file system or is managed by the operating system.
The process of making application software or a system independent of or transparent to natural language. If an application or a system can support any language, then it is fully internationalized; if it supports only a limited subset of languages, then it is partially internationalized. The goal of Unicode is to support full internationalization. See also localization.
Has the same purpose as a URI, but unlike a URI can contain characters from the Universal Character Set (ISO 10646).
An international federation of national standards organizations.
A web server developed by Microsoft for the Windows operating systems.
The server API for the Internet Information Server.
A standard provided by the ISO for ISO language codes. Each code consists of two or three lowercase letters. The codes define specific languages in internationalized applications. In Tamino, they are used in collations. You can find a full list under http://www.loc.gov/standards/iso639-2/iso639jac.html.
A standard provided by the ISO for ISO country codes. Each code consists of two or three uppercase letters. The codes define specific languages in internationalized applications. In Tamino, they are used in collations. You can find a full list at http://www.iso.org/iso/country_codes.htm.
An international standard on date and time formats established by the ISO. See http://www.iso.org/iso/support/faqs/faqs_widely_used_standards/widely_used_standards_other/date_and_time_format.htm.
A degree of concurrency and isolation that can be chosen as a standard for the locking behavior of transactions. It can be overridden partially by applying locking parameters.
A representation of an XML document in Java. It provides an API for accessing and manipulating XML documents.
All actions performed on the database are stored in the job log.
Information needed for backing out transactions, rolling back unsuccessful commands, and restarting a database after a database or system crash. In contrast to log information, journal information is temporary.
A place where a database's journal information may be stored. A journal space cannot span multiple database locations, but a database location may contain several journal spaces.
A secure method for authenticating a request for a service in a computer network. Kerberos was developed in the Athena Project at the Massachusetts Institute of Technology (MIT).
See Local Area Network.
A string prefix:localName
without a namespace context or
declaration.
A software protocol for locating organizations, individuals, and other resources such as files and devices in a network, whether on the Internet or on an intranet.
A network of interconnected workstations within a relatively small geographic area.
A structure holding regional characteristics of an environment such as date/time format, language used, character coding, etc.
The process or result of modifying system or application software to support a particular language environment. Often this entails making coding decisions based on the particular language supported. Localization differs from internationalization, which attempts to remove all references to language from a system or application.
Used in XPath for addressing one or more nodes of a given XML object tree. In X-Query a path starts from the root node and has one or more location steps.
In XPath, a location step selects a set of nodes of a given XML object tree. It contains an axis, a node test and optional predicates (filter expressions).
Defines rules according to which instances are validated (e.g. nesting of elements, occurrence indicators, data types). See also Physical Schema.
Information required, together with the database backup, in order to recover a database (for example after data loss due to a media failure).
A file that contains information about completed transactions for the current database session. The log space is used in the database recovery process to bring the database to its most recent state after a database backup. If there have been several database sessions since the most recent backup, each session will have at least one own log space.
A concurrency phenomenon. The lost update phenomenon occurs when two or more concurrent transactions read and update the same data. Lost updates represent a kind of write/write dependency. With the isolation levels provided by Tamino, lost update cannot occur.
A process which accesses and integrates data that is not stored in native XML format, for example the contents of ADABAS or SQL databases, or that is stored in an external system such as a spreadsheet application, into a Tamino collection.
Updates are possible in master and replication databases; however, updates in the master database always succeed, whereas updates in replication databases may be rejected by the master at its own discretion. As a consequence, transactions running at the master retain the ACID property, transactions at the replication database do not. The consequences at the replication database can be cascading rollbacks or undetected wrong analysis, therefore not available for Tamino.
Used in mail and HTTP to give information about the data provided and give instructions on how to treat the data or specify an application to use in conjunction with the data (also referred to as MIME Media Type). In Tamino, each document can be associated with a Media Type which can be returned when the document is retrieved.
A schema containing the formal definition and description of a schema language. Also schema of schemas.
Transfer of a Tamino system from an older to a newer version of Tamino, from one machine to another, from one architecture to another or from one operating system to another.
A standard for identifying files of different types and formats by different applications. MIME introduces content-types, which are a descriptive and a platform-independent way to tell an application, such as a browser, what kind of file it is loading and what it should do with the file.
A copy of the database is generated on a separate volume.
Offers the possibility to collect data from multiple paths into one single index. It is filled with the data of all nodes, matching the various XPath conditions. This increases the performance for queries with wildcards significantly, as only the sum of all interesting entries is searched and not all possible combinations as in a simple index.
A hierarchical locking technique applied in Tamino in order to achieve concurrency and reduce the risk of deadlocks. It is based on intention locks working on different granularities.
See XML Namespaces.
The process of correction of incorrect namespace declarations or prefix usage in schemas and data belonging to the schemas (the latter case is called Instance Namespace Cleaning).
A table that uniquely maps namespace prefixes to associated namespace URIs.
A database that stores and manages XML documents directly without converting them to a non-XML format. These databases and their management tools are built expressly for handling XML objects.
A non-colonized name that does not contain a colon. It can be used as a local name within a definition of a QName.
A service that enables computers, possibly with different architectures and running different operating systems, to share file systems across a network. In conjunction with other Remote Procedure Call (RPC) services, it permits the user to access remote files and hierarchies transparently, as if they were local to the user's computer. To the user, all files accessed through NFS look just like local files. There is no apparent difference between reading and writing a file on a local disk and a file located on the disk of a computer in a different location.
See Network File System.
An information item in a tree structure.
Non-repeatable read phenomena may occur when one transaction reads and modifies data and the same data is read by a concurrent transaction multiple times. Choose isolation level 'stable document' or 'serializable' in order to avoid the non-repeatable read phenomenon.
A special tool for indexing non-XML data within Tamino.
An X-Tension tool to check whether available files are suitable to be used as Tamino Server Extensions or to select some functions from a great number of functions, and then to create a package file ready for installation.
Used when information is to be retrieved from the Data Map. Using the storage and retrieval rules defined in the Data Map, the Object Composer constructs the information objects and returns them as XML documents.
An internal sequence number applied by the X-Machine to an XML object when the object is first stored in the database.
Microsoft's framework for a compound document technology.
A group of vendors who created CORBA (Common Object Request Broker Architecture), which is a standard architecture for distributed objects in networks.
A database management system that supports the modelling and creation of data as objects. This includes support for classes of objects and the inheritance of class properties and methods by subclasses and their objects.
Used when storing data into Tamino. The schemas in Tamino's Data Map provide the Object Processor with the information required to store XML data in Tamino's XML store. Support of external data sources is provided by the X-Node.
In CORBA, an ORB is the program that acts as a "broker" between a client request for a service from a distributed object or component and the completion of that request. A client program can request a service without having to understand where the server is in a distributed network or exactly what the interface to the server program looks like.
A backup that is performed when the server is down, or in stand-by mode.
A set of OLE interfaces that provide applications with uniform access to data stored in diverse information sources, regardless of their location or type.
Enables a user to extract and view data from different points of view.
Facilitates and manages transaction-oriented applications, typically for data entry and retrieval transactions.
A standard application programming interface (API) for accessing a database. By using ODBC statements in a program, you can access files in a number of different databases.
An X-Tension tool to view the content of a Server Extension package file.
A parallel backup writes in parallel to more than one backup device. This increases the speed of the backup process, if the backup device is much slower than the disks where the database is stored.
A program, usually part of a compiler, that receives input in the form of sequential source program instructions, interactive online commands, markup tags, or some other defined interface and breaks it up into parts that can then be managed by other programs. A parser may also check to see that all input has been provided that is necessary.
In the context of XML, a parser transforms an XML document into an internal representation (e.g. a tree structure suitable for DOM access, or a sequence of SAX events).
Only a logical or physical subset of the database is saved. See also complete backup, incremental backup.
Only a logical subset of the database is recovered. A partial recovery is possible after a full or partial restore.
Only parts of a database are replicated, in contrast to a complete replication.
Only a logical subset of a database is restored. A partial restore is possible after a full or partial backup. Contrast full restore.
Updates from a master database are propagated on request from the client running the replication database. Contrast active replication.
When replicating, updates are possible in all copies of the database. They are merged. Conflicts may occur which have to be resolved either by a default strategy or by a custom strategy. The ACID property cannot be guaranteed for any transaction. Either cascading rollbacks or undetected wrong analysis can be the consequences at any copy of the database.
In Tamino, performance means the speed at which Tamino can index, store, and retrieve data.
The phantom phenomenon may occur when one transaction establishes a set of documents as the result of a query and other concurrent transactions insert or delete documents which would have been part of that set. Choose isolation level 'serializable' in order to avoid the phantom effect.
Determines where XML objects are stored and how they are indexed. The physical schema does not influence the behaviour of applications. See also Logical Schema.
The process of periodically inquiring about the status of an object or condition. Contrast this with event driven or signal driven processing.
Logical connection place; specifically in the Internet protocol suite TCP/IP the way a client program specifies a particular server program on a computer in a network. Higher-level applications that use TCP/IP such as the web protocol HTTP have ports with preassigned numbers. These are "well-known" ports that have been assigned by the IANA. Other application processes are given port numbers dynamically for each connection.
A prepared query is a query that is stored as a compiled object and can be executed by reference many times.
(Context: Namespaces) Same as Lexical QName.
A PKI represents all requirements to process and handle digital signatures, certificates and encryption methods, using so-called public key cryptography. These mathematical algorithms define one key to encrypt data (usually called the public key) and a different key to decrypt data (usually called the private key).
See Lexical QName and Expanded QName.
The part of the X-Machine that analyzes and evaluates client queries.
RAID (redundant array of independent disks; originally redundant array of inexpensive disks) is a way of storing the same data in different places (thus, redundantly) on multiple hard disks. By placing data on multiple disks, I/O operations can overlap in a balanced way, improving performance. Storing data redundantly also increases fault tolerance.
A logical or physical volume (disk space) that is directly addressed by the database system without using the operating system's file system.
The process of re-applying database modifications from the log spaces, in order to bring a database back to its most recent valid state after a database loss. Recovery is used together with Restore if a database was lost; the restore operation restores the database to the state of the corresponding database backup, and the recovery operation re-applies changes that were made to the database since the backup was made.
A feature of database recovery processing, whereby transaction logs can be excluded from the recovery procedure. These logs are marked as excluded logs for subsequent recovery processing.
A reference index is a special kind of index for natively stored data especially suited to accelerate queries containing combined value conditions on inner nodes (i.e. neither a root node nor a leaf node), appearing with a multiplicity of more than one. It is based on the idea that only a partial sub-tree of the document tree is indexed.
Users often need to maintain duplicates of a database on remote servers. A replication database is a "hot standby" system with up-to-date copies of all transactions available for applications to work with in case the primary system fails. Unlike a conventional backup that must be restored from tape or CD, the replication database is available to applications as soon as they can be pointed to it.
A Tamino request is the invocation of the Tamino Server. A request may consist of one or more X-Machine commands.
An infrastructure that enables the encoding, exchange and reuse of structured metadata. It is a mechanism for associating properties with resources. RDF uses XML as a common syntax for the exchange and processing of metadata.
A well-formed XML document returned by Tamino to the client in response to a client request such as a database query.
The process of re-creating the contents of a database by copying in the contents of a previous backup.
To abort a transaction so that all commands in the transaction are annulled. Contrast commit.
The outermost element of an XML document.
An asymmetric algorithm used primarily to create digital signatures, and more rarely for encryption. It is named after its creators: Rivest, Shamir and Adleman. It provides security by factorization intractability.
See Simple API for XML.
The ability to maintain high performance levels despite a significant increase in database size and/or workload.
A Tamino schema complies with the W3C XML Schema standard with Tamino-specific information defined in annotations. Within a schema, we distinguish between a physical schema and a logical schema.
The physical schema describes how XML documents are physically stored and indexed; changes to the physical schema do not influence the semantics and syntax of Tamino operations.
The logical schema consists of rules describing the relationship between and properties of elements and attributes in valid XML documents.
Changes to the logical schema (content model, data type, occurrence restrictions, collations, etc.) may impact the semantics of Tamino operations.
A graphical editor in Tamino that facilitates writing a Tamino schema.
The language used to describe a schema.
See Meta Schema.
A collection of predicates linked by Boolean operators.
A secure modification of HTTP that encrypts and decrypts user page requests as well as the pages that are returned by the web server.
A security protocol that prevents eavesdropping, tampering, or message forgery and provides server-side, and optionally client-side, authentication.
In general, a computer program that provides services to other computer programs in the same or other computers. The computer in which a server program runs is also frequently referred to as a server (though it may contain a number of server and client programs). In the client/server programming model, a server is a program that awaits and fulfills requests from client programs in the same or other computers. A given application in a computer may function as a client with requests for services from other programs and also as a server of requests from other programs.
A Web server is the computer program (housed in a computer) that serves requested HTML pages or files. A Web client is the requesting program associated with the user. The Web browser in your computer is a client that requests HTML files from Web servers.
A Tamino Server Extension is a user-defined function of the Tamino server. A typical user-defined function is one that handles data in some specific way that could not be anticipated by standard Tamino functions. A Server Extension is installed in the Tamino Server using the Tamino Manager. Once installed, Tamino Server Extensions are not distinguishable to the end user from Tamino's standard functions.
The time between starting and stopping the Tamino server. Also, a backup establishes a new session
A virtual connection between a client program and the Tamino Server. It allows multiple commands issued in different requests within the same session to be executed within a single transaction.
In Tamino, a session is established by a
connect
command and terminated by a
disconnect
command (or an equivalent action in an
API).
A unique identifier for a session.
An identifier that identifies the current X-Machine command as part of an active transaction.
Statements to handle database sessions, e.g.
_connect
,
_disconnect
.
An XML document created from a document containing non-XML data by the user-supplied shadow function for efficient non-XML indexing purposes.
A function that acts as a converter between a non-XML document and its shadow document. It must be implemented by the user as a Tamino Server Extension depending on his needs.
A Java applet that is guaranteed by its author to work as specified. A signed applet contains its author's name and information about the validity of the current version. If you as an end-user want to download the signed applet in a web browser session, the browser displays information about the author of the applet and asks you for confirmation before permitting the applet to run on or be loaded onto your machine.
See Recovery Skipping.
A plastic card with a microprocessor that can store information and perform certain calculations and cryptographic functions.
You can perform an external backup based on snapshots. A snapshot is a logical, not a physical copy of the database. When a data block is updated after a snapshot has been created, the block is not updated, but copied to a new place. While the snapshot still references the old block, the original file references the updated block at the new place. Since generating a snapshot does not perform a physical copy of the data, it is very fast.
A metalanguage for specifying document markup languages or tag sets. HTML is an example of an SGML-based language.
(Context: Namespaces) The same as Expanded QName.
A term extended from print publishing to online media. A style sheet is a definition of a document's appearance. Typically, a style sheet is specified at the beginning of an electronic document, either by embedding it or linking to it. This style sheet applies to the entire document. Specific elements of the overall style sheet can be overridden as necessary by special coding that applies to a given section of the document.
Also called "branch". Part of a doctype structure or of an XML document, namely a subordinate node that has various other nodes or terminal nodes.
In symmetric replication, updates made to any of the replication databases are propagated to all other replication databases. This usually leads to conflicts caused by simultaneous updates of the same data on multiple replication databases. Such conflicts can only be resolved by application logic. See also Asymmetric Replication.
The propagation of updates when replicating databases is part of the user transaction. All replication databases always reflect the latest data; however, user transactions are delayed due to the update propagation, which can seriously affect performance, in particular in the presence of network delays. See also Asynchronous Replication.
The standard, GUI-based, central point of administration for Software AG's products.
A utility in Tamino that automates the process of loading large amounts of data into a Tamino database. It also includes an unloading function, which produces a file that is suitable for a subsequent load operation.
A browser-based interface for sending requests to the Tamino Server. It can be used to define and undefine Tamino collections and schemas as well as to load, retrieve or delete XML objects or parts of them.
One of the permitted data formats required when loading data from a single input data file into Tamino using the Tamino Data Loader utility. Tamino load format consists of a series of XML documents, all of which have the same top-level element name. The file can begin with an XML declaration.
Tamino provides an administration tool implemented as a client-server application. The point of central administration is the Tamino Manager, which provides a GUI that runs in a standard web browser. For basic administration functions (create database, start/stop database, backup, restore etc.), the Tamino Manager uses the administration agent component that is installed on the node where the Tamino server to be administered runs.
Tamino's schema language, which is based on XML Schema (W3C Recommendation) with various extensions.
A GUI-based tool for granting and denying access to XML nodes (elements and attributes) in the Tamino repository. The Tamino Security Manager is integrated in the Tamino Manager.
The central piece of Tamino's software. It is the software component that processes all administration and client requests for a Tamino database.
Displays the content of one or more Tamino databases in a navigation tree. It allows designers, builders and developers of XML database applications to explore and manipulate the contents of a Tamino database.
The component of Tamino that provides tools for the development, implementation, administration and execution of Tamino Server Extensions.
(Context: Namespaces) A kind of default namespace in which all elements that do not have an explicit prefix reside.
A database space that stores intermediate results.
The "lowest" part of a tree representing a doctype. As such, it contains real data, in contrast to subtrees, which are intermediate nodes (also called branches). A terminal node is hence a leaf of a tree.
The process of segmenting a sequence of characters into a set of symbols that are defined by a grammar. The symbols can be words of a natural language or syntax constructs of a programming language. Tamino's full-text retrieval system offers a special tokenizers for Japanese.
The smallest unit of work, as defined by the user, that must be performed in its entirety to ensure that the information contained in the database is logically consistent. A transaction may comprise one or more Tamino commands that together perform the database operations required to complete a logical unit of work.
Stores changes that have been made to database data during the current user session. The changes are stored in chronological order. The transaction log is required for the recovery operation, so that data changes that occurred since the most recent database backup can be re-applied if data has become corrupted. If there have been several user sessions since the most recent backup, each session has its own transaction log, so it is necessary to apply all of the transaction logs in the correct order to recover corrupt data.
In Tamino this is the mapping of a given character sequence into another character sequence according to a translation table. It is used in text retrieval operations and query expressions with wildcard characters.
Provides a predefined way of database processing (see Trigger Function) which is executed exclusively if special conditions (see Trigger Event) occur.
An event initiating the processing of a database trigger in Tamino.
A predefined database action to be processed if a trigger event occurs.
A 2-byte mapping onto a table of internally agreed character sets, including all the world's commonly used alphabets. The two bytes allow 65536 characters to be mapped. See also Character Encoding.
The 4-byte extension of UCS-2. The first 65536 characters are identical to UCS-2. See also Character Encoding
A set of mapping algorithms that allow fixed length addressing mechanisms such as UCS-2 and UCS-4 to be represented as a variable length set of bytes. See also Character Encoding.
Same as UCS Transformation Format
A character string that identifies the name and address of a web object and the protocol used to access it. See also: URL.
A field or combination of fields of a database that is required to have unique values, meaning that each value (combination) appears only once within all instances of this field. Like many other databases, Tamino offers a mechanism to ensure this automatically.
A built-in mechanism in a database system to ensure and verify that a condition for a database field, or a combination of fields in the case of a composed key, to contain unique values is always fulfilled, i.e. for each record/instance the value of the field (combination) must be different from all other records' or instances' values. The database guarantees the validity of this constraint by suppressing updates with already-present values for this field (combination), which is characterized as the unique key. In Tamino, uniqueness constraints are specified at the doctype level. If an attempt is made to violate a uniqueness constraint, an error message is issued indicating the constraint that would have been violated.
A character encoding standard defined by ISO 10646, using a fixed 4-byte mapping for each character. This allows a set of approximately 2 billion (2*109) characters to be defined. See also character encoding.
The address of a file or other resource that can be accessed on the Internet.
A variable-length encoding of UCS-2 that allows a character to be represented by a string of one to four bytes. In general, the characters appearing most frequently in other major international character sets are assigned UTF-8 encodings that require the fewest bytes (for example, each character in the ASCII character set requires one byte in UTF-8). See also Character Encoding.
A character encoding that uses a 2-byte representation equivalent to UCS-2 for Unicode characters up to U+FFFF (the Unicode character represented by the hexadecimal value "FFFF") and a 4-byte representation for characters from U+10000 upwards. See also Character Encoding.
The final, approved form of a new standard resulting from the W3C review procedure, effectively releasing the standard for general use by the IT community. See http://www.w3.org/ for a description of the W3C review process.
A collection of servlets, HTML pages, classes, and other resources that make up a complete application on a web server. The web application can be bundled and run on multiple containers from multiple vendors.
An XML based language to describe the interfaces of a web site for automated web access from programs.
A program that uses the client/server model and the World Wide Web's Hypertext Transfer Protocol to serve the files that form web pages to web users (whose computers contain HTTP clients that forward their requests). Every computer on the Internet that contains a web site must have a web server program. Web servers often come as part of a larger package of Internet- and intranet-related programs for serving e-mail, downloading requests for File Transfer Protocol files, and building and publishing Web pages. Also a synonym for HTTP server.
A well-formed XML document consists of a prologue and elements; each element has a start tag and an end tag, or is an empty element without content; elements are hierarchically ordered; attributes may occur within a start-tag; exactly one enclosing root element exists for the document.
An industry consortium that promotes standards for the evolution of the World Wide Web (WWW) and interoperability between WWW products by producing specifications and reference software. Although W3C is funded by industrial members, it is vendor-neutral, and its products are freely available. See http://www.w3.org/.
The starting and ending tags of an XML element, placed at the beginning and end of data that is not necessarily in the form of a well-formed XML document, so that the resulting object can be considered to be a well-formed XML object.
A standard for the binary representation of a certificate.
The engine that drives Tamino. Its basic function is to store XML and non-XML objects in and retrieve them from their respective data sources. It does this based on the schemas defined by the administrator in the Data Map. See also Command, X-Machine.
See Element.
Namespaces are created to ensure uniqueness among XML elements. They are not mandatory in XML. When two XML documents containing identical elements from different sources are merged, those elements collide. Namespaces help to avoid element collision by scoping each tag. See also the W3C Recommendation Namespaces in XML.
A collection of data that is structured according to the rules for well-formed XML documents.
An XML object to be stored by the X-Machine is described by its schema stored in Tamino's Data Map. The X-Machine's internal XML parser checks the syntactical correctness of the schema and ensures that incoming XML objects are well-formed.
Resolves Tamino query requests and interacts with the Object Composer to retrieve XML objects according to the schema stored in the Data Map.
A standard for the description of the structure of XML documents, developed and maintained by the W3C. Tamino schema definition is based on XML Schema.
A method of associating a key with referenced data (octets). XML Signature can be applied to any digital content (data object), including XML. An enveloped or enveloping signature is over data within the same XML document as the signature; a detached signature is over data external to the signature element.
The part of a Tamino database where XML data is stored natively.
Tamino's component for integration with external data storage systems. It allows applications to access data regardless of database type or location. The data can reside in heterogeneous databases, be stored in file systems or be provided by a message system.
A language for addressing parts of an XML document. It is the result of an effort of the W3C to provide a common syntax and semantics for functionality shared between XSL Transformations (XSLT) and the XPointer Framework. XPath also provides basic facilities for manipulating strings, numbers and booleans.
See Tamino X-Plorer
The X-Port module links Tamino to the web server.
Also known as XML Query. A powerful and convenient language for processing XML data. It is a W3C "recommendation", i.e. a specification. Tamino supports XQuery syntax, in parallel to its proprietary query language X-Query (with a dash). The Tamino implementation of XQuery is called Tamino XQuery 4.
In Tamino, this is a proprietary query language for accessing any XML objects. It uses the standard XPath addressing mechanism with additional database query features. Do not confuse with the W3C standard XQuery (without a dash), which is also supported by Tamino.
See XSL Transformations.
A language for transforming XML documents into other XML documents.
See Tamino X-Tension
X-Tension tool for developing Server Extensions in Java or C.