8.1. Glossary
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | X | Z
AES
AES (Advanced Encryption Standard) also known by its original name Rijndael. Is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
Aggregation
Collecting (related items of content) so as to display or link to them. See aggregator gateway out.
Alerts
Alert is a signal sent by the Babelway system to inform you that something abnormal has happened.
Apache
A free and open-source cross-platform web server, released under the terms of Apache License 2.0. Apache is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation.
API
API (Application programming interface) in computer programming, an application programming interface is a set of subroutine definitions, protocols, and tools for building application software.
AS2
AS2 (Applicability Statement 2) is a specification about how to transport data securely and reliably over the Internet. Security is achieved by using digital certificates and encryption. AS2 Gateway IN or AS2 Gateway OUT
ASCII
ASCII (American Standard Code for Information Interchange) abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication. ASCII codes represent text in computers, telecommunications equipment, and other devices. Most modern character-encoding schemes are based on ASCII, although they support many additional characters.
ASCX12
ASCX12 (Accredited Standards Committee X12) is a standards organization. Chartered by the American National Standards Institute (ANSI) in 1979, it develops and maintains the X12 Electronic data interchange (EDI) and Context Inspired Component Architecture (CICA) standards along with XML schemas which drive business processes globally. The membership of ASC X12 includes technologists and business process experts, encompassing health care, insurance, transportation, finance, government, supply chain and other industries.
ASN
ASN (Advance Ship Notice) is a notification of pending deliveries, similar to a packing list. It is usually sent in an electronic format and is a common EDI document. In the EDI X12 system, it is known as the EDI 856 document and the EDIFACT equivalent is the DESADV (Dispatch Advice) message.
Authentication
The process or action of verifying the identity of a user or process.
B2B
B2B (Business to Business) is denoting trade conducted via the Internet between businesses.
Billing
The process of preparing or sending invoices.
BOUNCYCASTLE
A collection of APIs used in cryptography. It includes APIs for both the Java and the C# programming languages. The APIs are supported by a registered Australian charitable organization: Legion of the Bouncy Castle Inc. Bouncy Castle is Australian in origin and therefore American restrictions on the export of cryptography from the United States do not apply to it.
C#
Is a multi-paradigm programming language encompassing strong typing, imperative, declarative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines.
Catalogue
A complete list of items (Channels, Gateways In/Out, Message In/Out, ... etc) used to create a complete channel on Babelway. See Using the Babelway catalogue.
CBC
CBC (Cipher Block Chaining) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block). Cipher block chaining uses what is known as an initialization vector (IV) of a certain length.
CER
Is a file extension for an SSL certificate file format used by Web servers to help verify the identity and security of the site in question. SSL certificates are provided by a third-party security certificate authority such as VeriSign, GlobalSign or Thawte.
Certificate
In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key. The certificate includes information about the key, information about the identity of its owner (called the subject), and the digital signature of an entity that has verified the certificate's contents (called the issuer). If the signature is valid, and the software examining the certificate trusts the issuer, then it can use that key to communicate securely with the certificate's subject. See Certificates.
Certificate for verification
Certificate used for message verification. Provided by your partner. See Certificates.
Change log
This tabs shows you all the history of changes on this message definition, and allows you to revert to a past version. See Change Log.
Channel
A channel is the path that a message follows within Babelway between 2 external systems. The elements of the channel are (Gateway In, Message In, Transformation, Message Out, Gateway Out, Notification, Routing, Test cases). See Channels.
Colorization formulas
To ease reading and error detecting of the formulas
Context in
Full context of execution of the message, as it was at the start of the processing (after reception by the gateway IN). See how to debug your channels.
Context out
Full context of execution of the message, as it was at the end of the processing. See how to debug your channels.
Cron expression
A string consisting of six or seven subexpressions (fields) that describe individual details of the schedule. These fields, separated by white space, can contain any of the allowed values with various combinations of the allowed characters for that field.
CRT
CRT is a file extension for a digital certificate file used with a web browser. CRT files are used to verify a secure website's authenticity, distributed by certificate authority (CA) companies such as GlobalSign, VeriSign and Thawte. CRT files allow a web browser to connect securely using the Secure Sockets Layer protocol.
CSV
CSV (Comma Separated Values) is a delimited text file that uses a comma to separate values. A CSV file stores tabular data in plain text. Each line of the file is a data record. See CSV.
CXML
CXML (Commerce eXtensible Markup Language) is a protocol, created by Ariba in 1999, intended for communication of business documents between procurement applications, e-commerce hubs and suppliers. cXML is based on XML and provides formal XML schemas for standard business transactions, allowing programs to modify and validate documents without prior knowledge of their form.
Data privacy
Data privacy also called information privacy, is the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
Date time
Date time a date is an instant, like '02/06/2017 13:25:17.645'.
Date time format a DateTimeFormat is a String that is used to represent the format of a DateTime. Besides being a String, it must comply to the same requirements as DateFormat.
Decryption
Decryption the conversion of encrypted data into its original form.
Deloitte
Deloitte is a UK-incorporated multinational professional services network.
Deployment
Deploy when you are setting up your channels, you're working in a sandbox that is separate from the production systems, so that you can make any changes or tests you want without any risk to the production system and your production flow of messages. See Deployment.
Deprecated
Deprecated is the discouragement of use of some terminology, feature, design, or practice, typically because it has been superseded or is no longer considered efficient or safe, without completely removing it or prohibiting its use.
DER
DER the DER extension is used for binary DER encoded certificates. These files may also bear the CER or the CRT extension.
DES
DES (Data Encryption Standard) is a block cipher, meaning acryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time. To encrypt a plaintext message, DES groups it into 64-bit blocks.
DESADV
DESADV (Despatch Advice) a message specifying details for goods despatched or ready for despatch under agreed conditions.
Description
Description allows you to save some more documentation about this node.
DH
DH (Diffie-Hellman) is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES.
DNS
DNS (Domain Name System) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
E
Easy function editor
Easy function editor can help you writing your formulas. See Understanding functions.
EC
EC (Elliptic-curve) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography (based on plain Galois fields) to provide equivalent security.
ECDH
ECDH (Elliptic-curve Diffie-Hellman) is an anonymous key agreement protocol that allows two parties, each having an elliptic-curve public-private key pair, to establish a shared secret over an insecure channel.
ECDHE
ECDHE (Elliptic Curve Diffie-Hellman) suites use elliptic curve diffie-hellman key exchange, where DHE suites use normal diffie-hellman. This exchange is signed with RSA, in the same way in both cases. The main advantage of ECDHE is that it is significantly faster than DHE.
ECDSA
ECDSA (Elliptic Curve Digital Signature Algorithm) in cryptography, it offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic curve cryptography.
EDI
EDI (Electronic Data Interchange) is the computer-to-computer exchange of business documents in a standard electronic format between business partners.
EDIFACT
EDIFACT( Electronic Data Interchange For Administration, Commerce and Transport) is a widely accepted international EDI standard used by many organisations. EDIFACT defines the syntax to structure data for over 200 business documents (like invoices, orders, despatch notes, etc. ) such that they can be exchanged unambiguously between 2 between partners. In practice, a single organisation would typically handle 2 to 8 business document types. See Edifact.
EERP
EERP (End to End ResPonse) is generated when a file reaches its ultimate destination. It is sent to the originator of the file to inform them that the file has been received.
Encryption
Encryption the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
Encryption algorithm
Encryption algorithm a mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form.
Environment
Environment an account environment contains a collection of one or more channels that are managed together. See Environment settings.
ERP
ERP (Enterprise resource planning) the integrated management of core business processes, often in real-time and mediated by software and technology. ERP is usually referred to as a category of business-management software - typically a suite of integrated applications-that an organization can use to collect, store, manage, and interpret data from these many business activities.
Excel
Excel files are used very similarly to CSV files. One row is designated the header file and the subsequent rows contain data related to each header column. The difference with Excel files to CSV is that they can have multiple pages within one file, so you can have differently defined headers and data. See Message definition formats.
Execution
Execution the process by which a computer or a virtual machine performs the instructions of a computer program. The instructions in the program trigger sequences of simple actions on the executing machine. Those actions produce effects according to the semantics of the instructions in the program.
Extra processings
Extra processings is an additional operation that must be applied on all messages. The extra processings can take place before of after each of the 5 main operations applied to messages in Babelway (gateway in, message in, transformation, message out and gateway out). Some examples are: extract a message from a zip file, sign a message, reject a message if it is a duplicate, ... See Extra processings.
Fail-over
Is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time, see DNS load-balancing.
FAQ
FAQ (Frequently Asked Questions) are listed questions and answers, all supposed to be commonly asked in some context, and pertaining to a particular topic
Flat file
Rows of text that convey pre-defined information. Typically, a flat file will begin with a line identifier, letting a system know what string of data is about to follow. A Flat File can contain multiple lines of data with each line containing different line identifiers. Each line can have many fields of data, separated by a special character. Many systems use Flat File formats to import and export data as it is very favorable to understand easily for a machine, see Message definition formats.
Formula bar
By default, when you just make your mappings by dragging and dropping your source fields to the corresponding target fields, the values are associated without any transformation. See Edit formula.
FTP
FTP (File Transfer Protocol) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server.
Functional acknowledgement
Indicate if the original X12 message is structurally valid or not optionally describe the errors found (data element too long, invalid control numbers etc) provide an acknowledgement code indicating if the message was accepted or not, see Support for 997 Acknowledgements.
Functions
A function is an operation that takes values as input (the parameters), and computes an output value (the result).
Gateway
A gateway is a hardware device that acts as a "gate" between two networks. It may be a router, firewall, server, or other device that enables traffic to flow in and out of the network.
Gateway IN
The gateway IN specifies the way incoming messages are communicated from the source external system to Babelway, see Gateways.
Gateway OUT
The gateway OUT specifies how the outgoing message should be communicated to the target external system, see Gateways.
GLN
GLN (Global Location Number) the Global Location Number (GLN) is part of the GS1 systems of standards. It is a simple tool used to identify a location and can identify locations uniquely where required. This identifier is compliant with norm ISO/IEC 6523. The GS1 Identification Key is used to identify physical locations or legal entities. The key comprises a GS1 Company Prefix, Location Reference, and Check Digit. Location identified with GLN could be a physical location such as a warehouse or a legal entity such as a company or customer or a function that takes place within a legal entity. It can also be used to identify something as specific as a particular shelf in a store. Being able to identify locations with a unique number is a key to many business processes. The GLN is used in electronic messaging between customers and suppliers, where location advice is important. GLN is also used within companies to identify specific locations both electronically in a database and physically where the GLN can be produced in a bar code or GS1 EPC tag.
Grid
The Grids are used in the Babelway system in (Monitoring, Alerts, Lookup table, Certificates, .... etc), The grids are very powerful, and have many options that simplify the workflow steps done to achive your request.
H
Handshaking
Is often the steps of verifying the connection, the speed, or the authorization of the computer trying to connect to it. An example of handshaking is when a modem connects to another Modem; the tones heard after the dialing is thehandshake and is how the computers greeting each other. See Security Management.
Hosting
A network host is a computer or other device connected to a computer network. A network host may offer information resources, services, and applications to users or other nodes on the network. A network host is a network node that is assigned a network address, see DNS load-balancing.
HTTP
HTTP (Hypertext Transfer Protocol) is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext.
HTTP(S)Post
POST is a request method supported by HTTP used by the World Wide Web. By design, the POST request method requests that a web server accepts the data enclosed in the body of the request message, most likely for storing it. It is often used when uploading a file or when submitting a completed web form,
HTTPS
HTTPS (Hypertext Transfer Protocol Secure) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS), or formerly, its predecessor, Secure Sockets Layer (SSL). The protocol is therefore also often referred to as HTTP over TLS, or HTTP over SSL.
I
IP address
IP address (Internet Protocol Address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.
Java
Java general-purpose computer-programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation.
JSON
JSON (JavaScript Notation) it is based on a subset of the JavaScript Programming Language. Used for data interchange, it is a lightweight text-based open standard so it is easy for humans to read it and even write it. It is also easy for machines to parse and generate. The JSON format is often used for serializing and transmitting structured data over a network connection. It is used primarily to transmit data between a server and web application, serving as an alternative to XML.
keystore
keystore a Java KeyStore (JKS) is a repository of security certificates - either authorization certificates or public key certificates - plus corresponding private keys, used for instance in SSL encryption. The keystore is the page where you can modify the keystore specific to your account. Each Babelway account environment has its own keystore and is able to add or remove certificates without affecting other users.
KPMG
KPMG is a professional service company and one of the Big Four auditors, along with Deloitte, Ernst and Young (EY), and PricewaterhouseCoopers (PwC).
Load balancing
Load balancing refers to efficiently distributing incoming network traffic across a group of backend servers, also known as a server farm or server pool.In this manner, a load balancer performs the following functions: Distributes client requests or network load efficiently across multiple servers.
Lookup tables
Lookup tables are tables of values, that can be accessed by transformations
Mandatory
Mandatory when a field is marked as mandatory, it must have a non-empty value. From the xml point of view, it means that the element must be present, and may not be empty.
Mapping definition
Mapping definition this file is the definition of the visual mapping. You normally edit it via the mapping tree editor.
MD5
MD5 algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities.
MDN
MDN (Message Delivery Notification) of a Message Level Response (MLR) is a proof from the receiver that the MLR was correctly submitted to its destination.
Message
Message is a piece of information about data processing of an input file by Babelway system.
Message definition
Message definition describe in Babelway the format (CSV, XML, EDIFACT, ... etc) and the structure (all the fields) of an exchanged file.
Message storage duration
Message storage duration is how long the message will be kept in the system of Babelway
Messaging engine
Messaging engine groups the different components processing and storing messages. This leverages Babelway multi cloud architecture allowing to load balance operations on several infrastructures.
Metadata
Metadata are data that are associated with the processing of the message, on top of the processed input and output files. For example, metadata can be the date and time when the message was received, the channel that processed the message, information about the sender of the message, ... etc.
MLR
MLR (Message Level Response ) a Message Level Response (MLR) is a business acknowledgment that tells the sender if the received message follows business rules related to the document type and business flow.
Monitoring
The monitoring section of the application contains all the tools and information that allow you to follow and manage the messages processed by the system, once the rules for how to handle the messages have been setup
MR File
Is a multirecord definition file used by the Self-Service MultiRecord wizard to generate the corresponding message definition and also build the corresponding serving xml resource file.
N
NemHandel
EasyTrade (NemHandel in Danish) is a Danish e-invoicing infrastructure, developed by the National IT and Telecom Agency and launched in 2007. EasyTrade is based on open standards (including the Universal Business Language, Reliable Asynchronous Secure Profile (RASP), and UDDI), open source components, and digital certificates. It was launched as part of a Danish Government Globalisation initiative in 2005 under the auspices of Prime Minister Anders Fogh Rasmussen.
Number
Number a number can contain any numeric value, like 2 or 3.5.
Odette
ODETTE (The Organization for Data Exchange by Tele Transmission (ODETTE) in Europe) is a group that represents the interests of the automotive industry in Europe. They are the equivalent of the Automotive Industry Action Group (AIAG) in North America. ODETTE has been responsible for developing communication standards such as OFTP and OFTP2.0.
OFTP
OFTP (Odette File Transfer Protocol) a protocol created in 1986, used for EDI (Electronic Data Interchange) between two communications business partners. Its name comes from the Odette Organisation (the Organization for data exchange by teletransmission in Europe).
ORDSP
ORDSP (Purchase Order Acknowledgment) is an electronic version of a phone call or fax that tells the buyer who sent you a purchase order that you will be filling the purchase order as requested. The buyer then knows that you will be filling the order and shipping the goods as requested by the date requested. How to Integrate with Amazon?.
Pagination
Pagination the process of dividing a document into discrete pages, either electronic pages or printed pages. Grids.
Partners
Partners are the entities that communicate via Babelway.
PCI-DSS
PCI-DSS (Payment Card Industry Data Security Standard) applies to companies of any size that accept credit card payments. If your company intends to accept card payment, and store, process and transmit cardholder data, you need to host your data securely with a PCI compliant hosting provider. Security Management.
PDF (Portable Document Format) is a file format developed in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. Based on the PostScript language, each PDF file encapsulates a complete description of a fixed-layout flat document, including the text, fonts, vector graphics, raster images and other information needed to display it. PDF was standardized as an open format, ISO 32000, in 2008, and does not require any royalties for its implementation. See PDF.
PEPPOL
PEPPOL (Pan-European Public Procurement OnLine) Pan-European Public Procurement OnLine (PEPPOL) is an international project aimed at standardizing cross-border electronic public procurement within the European Union.
PGP
PGP (Pretty Good Privacy) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991.
PHP
PHP (Hypertext Preprocessor) a server-side scripting language designed for Web development, but also used as a general-purpose programming language. It was originally created by Rasmus Lerdorf in 1994, the PHP reference implementation is now produced by The PHP Group. PHP originally stood for Personal Home Page, but it now stands for the recursive acronym PHP: Hypertext Preprocessor.
PKCS12
PKCS12 in cryptography, PKCS #12 defines an archive file format for storing many cryptography objects as a single file. It is commonly used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust. A PKCS #12 file may be encrypted and signed. The internal storage containers, called ""SafeBags"", may also be encrypted and signed. A few SafeBags are predefined to store certificates, private keys and CRLs. Another SafeBag is provided to store any other data at individual implementer's choice. PKCS #12 is one of the family of standards called Public-Key Cryptography Standards (PKCS) published by RSA Laboratories. The filename extension for PKCS #12 files is "".p12"" or "".pfx"". Certificates.
PKCS7
PKCS7 in cryptography, PKCS stands for ""Public Key Cryptography Standards"". These are a group of public-key cryptography standards devised and published by RSA Security Inc, starting in the early 1990s. The company published the standards to promote the use of the cryptography techniques to which they had patents, such as the RSA algorithm, the Schnorr signature algorithm and several others. PKCS 7 Version 1.5, Cryptographic Message Syntax Standard used to sign and/or encrypt messages under a PKI. Used also for certificate dissemination (for instance as a response to a PKCS #10 message). Formed the basis for S/MIME, which is as of 2010 based on RFC 5652, an updated Cryptographic Message Syntax Standard (CMS). Often used for single sign-on. Certificate's Details.
PO
PO (Purchase order) a commercial document and first official offer issued by a buyer to a seller, indicating types, quantities, and agreed prices for products or services. It is used to control the purchasing of products and services from external suppliers.
POLL/POLLING
POLL/POLLING polling is the process of retrieving files from a remote server, FTP server for instance.
Python
Python interpreted high-level programming language for general-purpose programming. Created by Guido van Rossum and first released in 1991, Python has a design philosophy that emphasizes code readability, notably using significant whitespace. It provides constructs that enable clear programming on both small and large scales.
RC4
RC4 (Rivest Cipher 4) is a stream cipher. While remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. Security Management.
Redundancy
Redundancy is a condition created within a database or data storage technology in which the same piece of data is held in two separate places. This can mean two different fields within a single database, or two different spots in multiple software environments or platforms. DNS load-balancing.
Regular expression
Regular expression regex or regexp (sometimes called a rational expression) is, in theoretical computer science and formal language theory, a sequence of characters that define a search pattern. Usually this pattern is then used by string searching algorithms for ""find"" or ""find and replace"" operations on strings, or for input validation. The concept arose in the 1950s when the American mathematician Stephen Cole Kleene formalized the description of a regular language. The concept came into common use with Unix text-processing utilities. Since the 1980s, different syntaxes for writing regular expressions exist, one being the POSIX standard and another, widely used, being the Perl syntax. Regular expressions are used in search engines, search and replace dialogs of word processors and text editors, in text processing utilities such as sed and AWK and in lexical analysis. Many programming languages provide regex capabilities, built-in or via libraries.
Note: In Babelway, we're using the standard Java version of REGEX, and it's the same used all over the system.
Release
Release a software release life cycle is the sum of the stages of development and maturity for a piece of computer software: ranging from its initial development to its eventual release, and including updated versions of the released version to help improve software or fix software bugs still present in the software.
Rest API
Rest API (Representational State Transfer) is a method of allowing communication between a web-based client and server that employs representational state transfer (REST) constraints. Rest API.
Root certificate
Root certificate in cryptography and computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA). Root certificates are self-signed and form the basis of an X.509-based public key infrastructure (PKI). Either it has matched Authority Key Identifier with Subject Key Identifier, in some cases there is no Authority Key identifier, then Issuer string should match with Subject string (RFC5280). For instance, the PKIs supporting HTTPS for secure web browsing and electronic signature schemes depend on a set of root certificates. Trust new certificate.
RosettaNet
RosettaNet is a non-profit consortium aimed at establishing standard processes for the sharing of business information (B2B).
Routing
Routing used to choose which channel must process a message when different channels share the same gateway in. or whcih message deiniation should process the message when different channels sharing the same message definition. Routing.
RSA
RSA (Rivest-Shamir-Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and it is different from the decryption key which is kept secret (private). In RSA, this asymmetry is based on the practical difficulty of the factorization of the product of two large prime numbers, the "factoring problem". The acronym RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly described the algorithm in 1978.
S/MIME
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of MIME data. S/MIME is on an IETF standards track and defined in a number of documents, most importantly RFC 3369, 3370, 3850 and 3851. It was originally developed by RSA Data Security Inc. and the original specification used the IETF MIME specification with the de facto industry standard PKCS#7 secure message format. Change control to S/MIME has since been vested in the IETF and the specification is now layered on Cryptographic Message Syntax, an IETF specification that is identical in most respects with PKCS #7. S/MIME functionality is built into the majority of modern email software and interoperates between them.
SAAS
SAAS (Software As A Service) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
Sandbox
A sandbox is a testing environment that isolates untested code changes and outright experimentation from the production environment or repository. Deployment.
SAX
SAX (Simple API for XML) is an event-driven online algorithm for parsing XML documents, with an API developed by the XML-DEV mailing list. SAX provides a mechanism for reading data from an XML document that is an alternative to that provided by the Document Object Model (DOM). Where the DOM operates on the document as a whole, i.e. building the full AST of an XML document for convenience of the user, SAX parsers operate on each piece of the XML document sequentially, issuing parsing events while making single pass through the input stream.
SDBH
SDBH (Standard Business Document Header) is the effective message sent to a PEPPOL Access Point. It's the UBL message wrapped in an envelop that identifies key data about the document SAX provides a mechanism for reading data from an XML document that is an alternative to that provided by the Document Object Model (DOM). Where the DOM operates on the document as a whole, i.e. building the full AST of an XML document for convenience of the user, SAX parsers operate on each piece of the XML document sequentially, issuing parsing events while making single pass through the input stream.
Self-signed
In cryptography and computer security, a self-signed certificate is an identity certificate that is signed by the same entity whose identity it certifies. This term has nothing to do with the identity of the person or organization that actually performed the signing procedure. In technical terms a self-signed certificate is one signed with its own private key. Certificates.
Serving XML
Serving XML is an open source, Apache 2.0 licensed, framework for flat/XML data transformations.
SFID
SFID (Start File Identification) this is a request for permission to send a file. It contains information such as the origin and destination of the file, its name and physical size.
SFTP
SFTP (Secure File Transfer Protocol) is a secure version of File Transfer Protocol (FTP), which facilitates data access and data transfer over a Secure Shell (SSH) data stream. It is part of the SSH Protocol. This term is also known as SSH File Transfer Protocol.
SHA
SHA (Secure Hash Algorithms) a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including:SHA-0,SHA-1,SHA-2 and SHA-3.
SHA 1
SHA 1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long. It was designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard.
SHA 256
SHA 256 (Secure Hash Algorithms 256) a family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words.
SLA
SLA (Service-Level Agreement) is a commitment between a service provider and a client. Particular aspects of the service - quality, availability, responsibilities - are agreed between the service provider and the service user.
SMTP
SMTP (Simple Mail Transfer Protocol) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with Extended SMTP additions by RFC 5321, which is the protocol in widespread use today.
SOAP
SOAP (Simple Object Access Protocol) is a messaging protocol specification for exchanging structured information in the implementation of web services in computer networks. Its purpose is to induce extensibility, neutrality and independence. It uses XML Information Set for its message format, and relies on application layer protocols, most often Hypertext Transfer Protocol (HTTP) or Simple Mail Transfer Protocol (SMTP), for message negotiation and transmission.
SOC2
SOC2 (Service Organization Control 2) is a report focuses on a business's non-financial reporting controls as they relate to security, availability, processing integrity, confidentiality, and privacy of a system, as opposed to SOC 1/SSAE 16 which is focused on the financial reporting controls. Security Management.
SSH
SSH (Secure Socket Shell) a network protocol that provides administrators with a secure way to access a remote computer.
SSID
SSID (Start Session IDentification) a request for initiate a session. It contains information such user and password of the requester.
SSL
SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.
String
It is the most basic type. It is just a sequence of characters, without any more constraint.
Test case
Test case allows you to easily test channel operations to validate it before deployment. This is done by creating and running test cases and providing the input messages that will be processed by the channel in order to check the mapping, see Test cases.
Timestamp
Timestamp is a sequence of characters or encoded information identifying when a certain event occurred, usually giving date and time of day, sometimes accurate to a small fraction of a second.
TLS
TLS (Transport Layer Security) is cryptographic protocol that provide communications security over a computer network., see Security management.
TRADACOM
TRADACOM is an early standard for EDI (Electronic Data Interchange) primarily used in the UK retail sector. It was introduced in 1982 as an implementation of the UN/GTDI syntax, one of the precursors of EDIFACT, and was maintained and extended by the UK Article Numbering Association (now called GS1 UK), see Message definition formats.
Transformation
The Transformation tells Babelway how the incoming message should be translated to the outgoing message, see Transformations.
TSA
TSA (Timestamp Authority) is the process of securely keeping track of the creation and modification time of a document.
UBL
UBL (Universal Business Language) is a royalty-free library of standard XML business documents. It supports the digitizing of commercial and logistical processes for domestic and international supply chains such as orders and invoices. It can be thought of as a language that allows business applications to exchange information along their supply chains in the same common format, see UBL.
UN/EDIFACT
UN/EDIFACT (United Nations/Electronic Data Interchange for Administration, Commerce and Transport) is the international EDI standard developed under the United Nations impulse. This standard is maintained and further developed by a UN body. EDIFACT has now been adopted by the International Organization for Standardization (ISO) as the ISO standard ISO 9735, see Edifact.
URI
URI (Uniform Resource Identifier) is a string of characters designed for unambiguous identification of resources and extensibility via the URI scheme. Such identification enables interaction with representations of the resource over a network, typically the World Wide Web, using specific protocols. Schemes specifying a concrete syntax and associated protocols define each URI.
URL
URL (Uniform Resource Locator) is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identifier (URI), although many people use the two terms interchangeably. URLs occur most commonly to reference web pages (http), but are also used for file transfer (ftp), email (mailto), database access (JDBC), and many other applications.
UTC/GMT
UTC/GMT (Greenwich Mean Time/Coordinated Universal Time) where Greenwich Mean Time (GMT) is often interchanged or confused with Coordinated Universal Time (UTC). But GMT is a time zone and UTC is a time standard.
Although GMT and UTC share the same current time in practice, there is a basic difference between the two:
-
GMT is a time zone officially used in some European and African countries. The time can be displayed using both the 24-hour format (0 - 24) or the 12-hour format (1 - 12 am/pm).
-
UTC is not a time zone, but a time standard that is the basis for civil time and time zones worldwide. This means that no country or territory officially uses UTC as a local time.
UUID
UUID (Universally Unique Identifier) is a 128-bit number used to identify information in computer systems.
VAN
VAN (Value-Added Network) is a hosted service offering that acts as an intermediary between business partners sharing standards based or proprietary data via shared business processes. The offered service is referred to as "value-added network services".
VAT
VAT (Value-Added Tax) is a type of tax that is assessed incrementally, based on the increase in value of a product or service at each stage of production or distribution.
VDA
VDA (Verband der Automobilindustrie) maintains a series of fixed format messages that describe business documents typically exchanged between automotive manufacturers and suppliers.
X.400
X.400 is a suite of ITU-T Recommendations that define standards for Data Communication Networks for Message Handling Systems (MHS) - more commonly known as email. At one time, the designers of X.400 were expecting it to be the predominant form of email, but this role has been taken by the SMTP-based Internet e-mail.
X12
ANSI ASC X12 is the official designation of the U.S. national standards body for the development and maintenance of Electronic Data Interchange (EDI) standards. ASC X12 has sponsored more than 315 X12-based EDI standards for health care, insurance, government, transportation, finance, and many other industries, see X12.
XPATH
XPATH (Extensible Markup Language) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
XSD
XSD (XML Schema Definition) is a recommendation of the World Wide Web Consortium (W3C), specifies how to formally describe the elements in an Extensible Markup Language (XML) document. It can be used by programmers to verify each piece of item content in a document. They can check if it adheres to the description of the element it is placed in.
XSLT
XSLT (Extensible Stylesheet Language Transformations) is the xslt transformation file that will be applied on the internal xml representation of your incoming message to transform it into the outgoing message.