Browse Definitions :
Definition

3270 (Information Display System)

Contributor(s): Jason Kelley

The 3270 Information Display System, a product from IBM, was, prior to the arrival of the PC, the way that almost the entire corporate world interfaced with a computer. When first produced (the early 1970s), a 3270 display terminal was considered a vast improvement over its predecessor, the 2260.

The 3277 terminal was a non-graphical (text only) monochrome (black screen with green letters) display that buffer ed data so that key strokes could be saved until the ENTER key was pressed. (Previous terminals sent every key stroke immediately to the computer to which the terminal was attached.) The 3277 was also field-oriented rather than line-oriented which meant that a program could write an output data stream to the terminal based on application-oriented fields rather than having to create the display output line by line. A number of 3277s could be attached to a control unit or cluster controller which in turn was attached to an IBM mainframe computer. Terminals could be attached to the computer on a relatively high-bandwidth local link called a channel or remotely over a telecommunication link that was either dedicated (usually a leased line ) or dial-up .

After the personal computer arrived with its own self-sufficient operating system and applications, it gradually replaced the 3270 system in much of the corporate world (although there almost certainly are some working 3270s in use as this is being written). A 3270 terminal became the most prominent example of what became known as a " dumb terminal ," since it relied entirely on its attachment to a mainframe (and sometimes a minicomputer ) for its "brains." The PC attached to a mainframe then became known generically as an " intelligent workstation ." It could run its own programs independently of the mainframe and it could also interface with mainframe applications. There was one product attempt to blend the two, called the 3270 PC.

The terminals themselves were the 3277 (which attached to a control unit), a 3275 standalone terminal (for locations where only a single terminal was needed), the 3278 (a sleeker version of the 3277), and the 3279 color terminal. The control units were the 3271 (channel attachment), 3272 (telecommunication attachment), and the 3274 (a control unit with a smaller form factor that could handle up to 32 terminals). For about 15 years, the 3270 family, one of IBM's most successful products ever, was a ubiquitous feature of offices the world over. The PC changed all that.

However, many thousands of corporate legacy application programs written to interact with users at 3270s are being used from PCs equipped with software known generally as 3270 emulator s. TN3270 is a program that provides PC users remote ( Telnet ) connection to an IBM computer that is running 3270 applications.

This was last updated in March 2011

Continue Reading About 3270 (Information Display System)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close