Action | ----- | |
Administrator | ----- | |
history Audit
|
----- | |
Authenticate | ----- |
are challenged when they first access a .
|
Authorize | ----- |
Most require .
|
|
----- | |
Cell Specific
|
----- |
are a of a cell and apply only to that cell.
|
CellSpace | ----- |
A is a distributed workspace in which collaborators can build, update and review a dynamic model of an enterprise.
|
cloud_circle CellSpace Connection |
----- | |
CellSpace License
|
----- |
The authorizes an installation.
|
CellSpace License |
----- |
The authorizes an installation.
|
![]() CellSpace Server |
----- |
A refers to a portion of the model running within one server.
With CellSpace/Enterprise the model is distributed across multiple .
|
![]() |
----- |
The is stand-alone
CellSpace Server |
CLS File | ----- | |
|
----- |
A is a multidimensional representation of a portion of an analytic model -- similar to OLAP-style hyper-cubes.
|
storage DataSource
|
----- |
A is a connection to a
database .
|
Descendant | ----- | |
|
----- | |
Editor
|
----- |
A viewer or editor of an .
|
|
----- | |
folder Folder
|
----- | |
Foreign User Account |
----- |
A is part of different
security realm .
|
|
----- |
The formula language is similar to the languages in
traditional spreadsheets with an important difference.
|
|
----- | |
|
----- | |
History | ----- | |
Home Database
|
----- |
With the CellSpace/Enterprise product, a houses the for the . The other are housed in a .
|
security Home
DataSource |
----- |
With the CellSpace/Enterprise product, a is a connection to a that houses a .
|
home Home Server
|
----- |
A houses the as well as and to in .
|
Hostname | ----- |
In computer networking, a is a label that is assigned to a device connected to a computer network and that is
used to identify the device in various forms of electronic communication,
such as with ,
databases and .
|
Installer | ----- | |
|
----- | |
JDBC | ----- |
or Java Database Connectivity, is an application programming interface (API) for the programming language Java,
which defines how a client may access a database.
|
JDBC URL
|
----- | |
Keystore | ----- |
A Java or (JKS) is a repository of security certificates – either
authorization certificates or public key certificates – plus corresponding private keys, used for instance in encryption.
|
LAN | ----- |
A local area network () is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
|
Manual | ----- | |
Manual Popup
|
----- |
help opens window for a section of the .
|
bookmark Marker
|
----- |
are symbolic connections to an .
|
cloud_queue Message Broker
|
----- |
A is an intermediary computer program module that translates a message
from the formal messaging protocol of the sender to the formal messaging protocol of the receiver.
|
Message Broker Type
|
----- |
The is the type of
message broker server |
Modeler | ----- | |
Network | ----- |
The term is used here to refer the or
that connects the , , and other services.
|
Network Administrator
|
----- |
A network administrator is the person designated in an organization whose responsibility includes maintaining computer infrastructures with emphasis on networking.
|
Object | ----- |
The term '' refers to the parts of the that can be added, modified and viewed.
These include and .
|
Object Selector
|
----- |
The is the column on the left side of the
CellSpace Server |
Page | ----- | |
Password | ----- | |
Port | ----- |
In computer networking, a port is an endpoint of communication.
|
Primary Database
|
----- |
With the CellSpace/Enterprise product, a houses most of the in a with the exception of the which are housed in the .
|
storage Primary
DataSource |
----- |
A is a connection to a .
|
Private Clipboard | ----- |
Some browsers and browser versions do not allow the contents of the to be examined or modified.
|
Procedure | ----- | |
Propagate | ----- |
The connection information for a is propagated across the when that server connects to another in the .
|
Property | ----- |
are the values that define an .
|
|
----- | |
Queue | ----- |
names are used to identify publishers and subscribers to a service facilitated by a .
|
Range | ----- |
Ranges of are used to aggregate values, often with the sum() function.
|
|
----- | |
restore_from_trash Recycle Bin
|
----- |
A lists after they have been deleted.
|
Reference | ----- | |
Remote Object
|
----- | |
Remote Queue
|
----- |
names are used to identify publishers and subscribers to a service facilitated by a .
|
Response Address | ----- |
The specifies how a remote should response back to the local .
|
Response Queue
|
----- |
names are used to identify publishers and subscribers to a service facilitated by a .
|
REST Connection | ----- |
or Representational State Transfer is a software architectural style that defines a set of constraints to be used with Web services. A is an example of such a Web service.
|
Reviewer | ----- |
A interrogates the model and cannot make significant changes.
|
Role | ----- |
have that have been assigned by an when a is created or edited.
|
|
----- | |
Signon | ----- |
are challenged when they first access a .
|
|
----- |
are a of a cell and apply only to that cell.
|
SSL | ----- |
Transport Layer Security (TLS), and its now-deprecated predecessor, Secure Sockets Layer (SSL),
are cryptographic protocols designed to provide communications security over a computer network.
|
System Clipboard | ----- |
Some browsers and browser versions do not allow the contents of the to be examined or modified.
|
Target Address | ----- | |
Terms and Conditions | ----- |
CellWorks Software provides this license for CellSpace/Manual (draft). This license does not apply to other CellWorks Software products.
|
TLS | ----- |
Transport Layer Security (TLS), and its now-deprecated predecessor, Secure Sockets Layer (SSL),
are cryptographic protocols designed to provide communications security over a computer network.
|
Truststore | ----- |
A Java or (JKS) is a repository of security certificates – either
authorization certificates or public key certificates – plus corresponding private keys, used for instance in encryption.
|
URL | ----- |
A Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
|
person User Account |
----- |
are created with an .
|
User Credentials
|
----- | |
|
----- | |
WAN | ----- |
A local area network () is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
|