Glossaryimprove this page | report issue
This glossary provides terms and definitions for Mobile Foundation software and products.
The following cross-references are used in this glossary:
- See refers you from a nonpreferred term to the preferred term or from an abbreviation to the spelled-out form.
- See also refers you to a related or contrasting term.
For other terms and definitions, see the IBM Terminology website.
A policy that controls how data is collected from a sensor of a mobile device. The policy is defined by application code.
The server-side code of a MobileFirst application. Adapters connect to enterprise applications, deliver data to and from mobile applications, and perform any necessary server-side logic on sent data.
The database of the MobileFirst Operations Console and of the Administration Services. The database tables define elements such as applications, adapters, projects with their descriptions and orders of magnitude.
An application that hosts the REST services and administration tasks. The Administration Services application is packaged in its own WAR file.
An assumed or actual association between two data entities, or between a data entity and a pointer.
A mobile operating system created by Google, most of which is released under the Apache 2.0 and GPLv2 open source licenses. See also mobile device.
API / Application Programming Interface (API)
An interface that allows an application program that is written in a high-level language to use specific data or functions of the operating system or another program.
A web or mobile device application. See also web application.
A MobileFirst component that can be used to share applications and facilitate collaboration between team members in a single repository of mobile applications.
Application Center installer
An application that lists the catalog of available applications in the Application Center. The Application Center Installer must be present on a device so that one can install applications from your private application repository.
application descriptor file
A metadata file that defines various aspects of an application.
A security service that provides proof that a user of a computer system is genuinely who that person claims to be. Common mechanisms for implementing this service are passwords and digital signatures.
A plain-text format that is used to encode binary data. Base64 encoding is commonly used in User Certificate Authentication to encode X.509 certificates, X.509 CSRs, and X.509 CRLs. See also DER encoded, PEM encoded.
Pertaining to something that is compiled, or is executable.
A collection of several properties (such as adapter, procedure, or parameter).
A notification that is targeted to all of the users of a specific MobileFirst application. See also tag-based notification.
An object that defines a build, such as a weekly project-wide integration build.
CA / Certificate Authority (CA)
A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also certificate.
Executable code that allows a lower-level software layer to call a function defined in a higher-level layer.
A collection of apps.
In computer security, a digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. A certificate is issued by a certificate authority and is digitally signed by that authority. See also certificate authority.
certificate authority enterprise application
A company application that provides certificates and private keys for its client applications.
A request for certain information to a system. The information, which is sent back to the server in response to this request, is necessary for client authentication.
A client-side component that issues a sequence of challenges on the server side and responds on the client side.
A software program or computer that requests services from a server.
client-side authentication component
A component that collects client information, then uses login modules to verify this information.
An identical copy of the latest approved version of a component, with a new unique component ID.
A collection of complete systems that work together to provide a single, unified computing capability.
An application that is designed for internal use inside a company.
An application that can distribute other specified applications to be installed on a mobile device. For example, Application Center is a Company Hub. See also Application Center.
A reusable object or program that performs a specific function and works with other components and applications.
A set of information that grants a user or process certain access rights.
CRL / Certificate Revocation List (CRL)
A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.
The means by which an application accesses data from a database.
The process of installing and configuring a software application and all its components.
Pertaining to a binary form of an ASCII PEM formatted certificate. See also Base64, PEM encoded.
See mobile device
Data that is used to identify the location of a device. This data can include geographical coordinates, WiFi access points, and timestamp details. See also trigger.
The process of a device owner registering their device as trusted.
A JSONStore command used to create a document.
An application that can be used to run an application meant for a platform other than the current platform.
In computer security, the process of transforming data into an unintelligible form in such a way that the original data either cannot be obtained or can be obtained only by using a decryption process.
See company application.
A user, group, or resource that is defined to a security service.
A specific instance of a configuration of hardware and software.
An occurrence of significance to a task or system. Events can include completion or failure of an operation, a user action, or the change in state of a process.
An object that supports an asynchronous notification server within a single Java™ virtual machine. Using an event source, the event listener object can be registered and used to implement any interface.
An XML entity that restricts XML data types.
A networked server that is housed in a server farm.
In object-oriented programming, to cause a state transition.
A device or program used to connect networks or systems with different network architectures.
The process of identifying geocodes from more traditional geographic markers (addresses, postal codes, and so on). For example, a landmark can be located at the intersection of two streets, but the geocode of that landmark consists of a number sequence.
The process of pinpointing a location based on the assessment of various types of signals. In mobile computing, often WLAN access points and cell towers are used to approximate a location. See also geocoding, location services.
homogeneous server farm
A server farm in which all application servers are of the same type, level, and version.
An application that is primarily written in web-oriented languages (HTML5, CSS, and JS), but is wrapped in a native shell so that the app behaves like, and provides the user with all the capabilities of, a native app.
See company application.
JMX / Java Management Extensions (JMX)
A means of doing management of and through Java technology. JMX is a universal, open extension of the Java programming language for management that can be deployed across all industries, wherever management is needed.
A cryptographic mathematical value that is used to digitally sign, verify, encrypt, or decrypt a message. See also private key, public key. One or more characters within an item of data that are used to uniquely identify a record and establish its order with respect to other records.
A password management system for Apple software. A keychain acts as a secure storage container for passwords that are used by multiple applications and services.
In computer security, a public key and a private key. When the key pair is used for encryption, the sender uses the receiver’s public key to encrypt the message, and the recipient uses their private key to decrypt the message. When the key pair is used for signing, the signer uses their private key to encrypt a representation of the message, and the recipient uses the sender’s public key to decrypt the representation of the message for signature verification.
A system object that serves as a directory to other objects. A library groups related objects, and allows users to find objects by name. A collection of model elements, including business items, processes, tasks, resources, and organizations.
A computer networking method for distributing workloads across multiple computers or a computer cluster, network links, central processing units, disk drives, or other resources. Successful load balancing optimizes resource use, maximizes throughput, minimizes response time, and avoids overload.
An area on a device where applications can locally store and retrieve data without the need for a network connection.
MBean / Managed Bean (MBean)
In the Java Management Extensions (JMX) specification, the Java objects that implement resources and their instrumentation.
See mobile device.
See Application Center installer.
A telephone, tablet, or personal digital assistant that operates on a radio network. See also Android.
MobileFirst Data Proxy
A server-side component to the IMFData SDK that can be used to secure mobile application calls to Cloudant by using Mobile Foundation OAuth security capabilities. The MobileFirst Data Proxy requires an authentication through the trust association interceptor.
MobileFirst Operations Console
A web-based interface that is used to control and manage MobileFirst runtime environments that are deployed in MobileFirst Server, and to collect and analyze user statistics.
MobileFirst runtime environment
A mobile-optimized server-side component that runs the server side of your mobile applications (back-end integration, version management, security, unified push notification). Each runtime environment is packaged as a web application (WAR file).
A MobileFirst component that handles security, back-end connections, push notifications, mobile application management, and analytics. The MobileFirst Server is a collection of apps that run on an application server and acts as a runtime container for MobileFirst runtime environments.
An app that is compiled into binary code for use on the mobile operating system on the device.
A logical group of managed servers.
An occurrence within a process that can trigger an action. Notifications can be used to model conditions of interest to be transmitted from a sender to a (typically unknown) set of interested parties (the receivers).
An HTTP-based authorization protocol that gives applications scoped access to a protected resource on behalf of the resource owner, by creating an approval interaction between the resource owner, client, and resource server.
A browser feature that enables users to navigate backwards and forwards in a browser.
Pertaining to a Base64 encoded certificate. See also Base64, DER encoded.
PKI / Public Key Infrastructure (PKI)
A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in a network transaction.
A MobileFirst Server concept that enables the User Certificate Authentication framework to communicate with a PKI.
To repeatedly request data from a server.
In secure communication, an algorithmic pattern used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user system and is protected by a password. See also key, public key.
The development environment for various components, such as applications, adapters, configuration files, custom Java code, and libraries.
project WAR file
A web archive (WAR) file that contains the configurations for the MobileFirst runtime environment and is deployed on an application server.
To provide, deploy, and track a service, component, application, or resource.
An application gateway from one network to another for a specific network application such as Telnet or FTP, for example, where a firewall proxy Telnet server performs authentication of the user and then lets the traffic flow through the proxy as if it were not there. Function is performed in the firewall and not in the client workstation, causing more load in the firewall.
In secure communication, an algorithmic pattern used to decrypt messages that were encrypted by the corresponding private key. A public key is also used to encrypt messages that can be decrypted only by the corresponding private key. Users broadcast their public keys to everyone with whom they must exchange encrypted messages. See also key, private key.
To send information from a server to a client. When a server pushes content, it is the server that initiates the transaction, not a request from the client.
An alert indicating a change or update that appears on a mobile app icon.
An IP-forwarding topology where the proxy is on behalf of the back-end HTTP server. It is an application proxy for servers using HTTP.
The directory that contains all other directories in a system.
Randomly generated data that is inserted into a password or passphrase hash, making those passwords uncommon (and more difficult to hack).
SDK / Software Development Kit (SDK)
A set of tools, APIs, and documentation to assist with the development of software in a specific computer language or for a particular operating environment.
An ordered set of authentication realms that is used to protect a resource such as an adapter procedure, an application, or a static URL.
A group of networked servers.
A program that performs a primary function within a server or related software.
A logical or virtual connection between two stations, software programs, or devices on a network that allows the two elements to communicate and exchange data for the duration of the session.
To attach a unique electronic signature, derived from the sender’s user ID, to a document or field when a document is mailed. Signing mail ensures that if an unauthorized user creates a new copy of a user’s ID, the unauthorized user cannot forge signatures with it. In addition, the signature verifies that no one has tampered with the data while the message was in transit.
An environment for staging code that is written for a different platform. Simulators are used to develop and test code in the same IDE, but then deploy that code to its specific platform. For example, one can develop code for an Android device on a computer, then test it using a simulator on that computer.
An element of a graphical user interface that can be changed to alter the appearance of the interface without affecting its functionality.
To move a slider interface item horizontally on a touchscreen. Typically, apps use slide gestures to lock and unlock phones, or toggle options.
In UN/EDIFACT EDI standards, an EDI data element that is part of an EDI composite data element. For example, an EDI data element and its qualifier are subelements of an EDI composite data element.
A record that contains the information that a subscriber passes to a local broker or server to describe the publications that it wants to receive.
The rules for the construction of a command or statement.
An automated message on a mobile device that provides operational status or alerts, for example if connections are successful or not.
A notification that is targeted to devices that are subscribed for a specific tag. Tags are used to represent topics that are of interest to a user. See also broadcast notification.
TAI / Trust Association Interceptor (TAI)
The mechanism by which trust is validated in the product environment for every request received by the proxy server. The method of validation is agreed upon by the proxy server and the interceptor.
To briefly touch a touchscreen. Typically, apps use tap gestures to select items (similar to a left mouse button click).
A group of elements that share common properties. These properties can be defined only once, at the template level, and are inherited by all elements that use the template.
A mechanism that detects an occurrence, and can cause additional processing in response. Triggers can be activated when changes occur in the device context. See also device context.
A pane that is outside of the editor area that can be used to look at or work with the resources in the workbench.
web app / application
An application that is accessible by a web browser and that provides some function beyond static display of information, for instance by allowing the user to query a database. Common components of a web application include HTML pages, JSP pages, and servlets. See also app.
web application server
The runtime environment for dynamic web applications. A Java EE web application server implements the services of the Java EE standard.
Any one of the resources that are created during the development of a web application for example web projects, HTML pages, JavaServer Pages (JSP) files, servlets, custom tag libraries, and archive files.
A portable, reusable application or piece of dynamic content that can be placed into a web page, receive input, and communicate with an application or with another widget.
A section of code that contains code that could otherwise not be interpreted by the compiler. The wrapper acts as an interface between the compiler and the wrapped code.
A certificate that contains information that is defined by the X.509 standard.▲
Inclusive terminology note: The Mobile First Platform team is making changes to support the IBM® initiative to replace racially biased and other discriminatory language in our code and content with more inclusive language. While IBM values the use of inclusive language, terms that are outside of IBM's direct influence are sometimes required for the sake of maintaining user understanding. As other industry leaders join IBM in embracing the use of inclusive language, IBM will continue to update the documentation to reflect those changes.