Agile application

An application that can be easily modified and continually updated to address changing business needs. Agility is often attained by encapsulating specific application functions as discrete entities (commonly called services).

Application firewall

A set of methods that limit and control access to an application.

Application integration

The sharing of data and logic between applications so multiple applications can work as a single unit.

Application reuse

Modification of existing IT assets for new purposes. Legacy modernization is a good example of application reuse with high ROI.

Automated integration

The combining of applications or functions so that certain events trigger pre-programmed actions without human intervention.

BMS access

The programmatic control of applications via direct manipulation of a CICS application’s Basic Mapping Support. Instead of interacting with the UI datastream (as in screen access), BMS access occurs deeper in the application, directly with the logic that is used to build and interpret screens.

Critical applications

The core applications, often residing on a mainframe, that are indispensable in running a business. These assets are often the applications of record that contain a business’s core proprietary information.

End-to-end security

The presence of safeguards through every step of a transaction to ensure it runs as expected by those with the correct authority and is visible only to them.

Enterprise cloud computing

A model for making applications available as services over the Internet (or an intranet). The services are accessed in the cloud by end users or other applications.

Fault tolerance

The ability of an IT implementation to preserve service in the event of component failure.

GUI modernization

The updating of a green-screen interface to provide simplicity for users, while retaining the code and basic operational characteristics of the original application.

Legacy modernization

Removal of the impediments (caused by the use of out-of-date technologies) from existing applications.

Managed services

The ability of administrators to have full insight into the activities that are using their enterprise applications. This ability is enhanced when administrators can deploy, monitor, and configure services (for reporting data to higher-level monitoring tools).

Mobility control

The ability to manage and safely disseminate enterprise data to modern devices such as smart phones and tablets.

Non-invasive process

Modifying an application without making changes to the existing code. This is a common best practice when modification of the source application would be too risky.

Rapid integration

An application-integration method with attributes that allow a short time to market.


The location of a CICS application component entirely within a CICS partition. (A CICS partition is commonly called a region and is the equivalent of a mainframe application server.) When an application component is region-resident, it is not available to the system as whole and greatly lessens issues due to change control.


The modernization of an application’s user interface. This is most commonly done using standard web technologies.

Risk mitigation

A project approach that incorporates processes to safeguard the finished solution from both foreseen and unforeseen issues.


The ability of a solution to grow with respect to larger user populations or increased transaction rates, without losing functionality. Host applications typically reside on platforms (e.g., mainframes) that are considered inherently scalable; for middle-tier applications, scalability is most commonly associated with server redundancy and clustering.

Screen access

The programmatic control of applications via direct manipulation of the UI datastream.

Server-side emulation

Interaction with legacy applications in a way that requires no need for an installed client application. All work (host access and interpretation of host data) is performed on a server that the user manipulates via an emulation-like browser UI.

Service enablement

A process of breaking monolithic applications (which were not designed to share internal logic or data) into standardized components with the intent of sharing the components beyond the application’s original context.

Session pooling

The systematic sharing of host sessions to decrease the demand on costly host resources. As each transaction with the host is completed, the session used for accessing the host is made available for waiting transactions.

Transactional access

The direct manipulation of a host application’s internal methods. This access type has full view of the application’s internal code and the ability to invoke it.

Web enablement

A process for modernizing an application’s user interface so that the resulting UI runs in a browser via non-proprietary, standards-based web technologies.


The modifying of host-based applications into browser-based applications. One of the most basic forms of legacy modernization, it can give users a simple web interface while leaving the original application as is.