Browse Definitions :
Definition

3270 (Information Display System)

Contributor(s): Jason Kelley

The 3270 Information Display System, a product from IBM, was, prior to the arrival of the PC, the way that almost the entire corporate world interfaced with a computer. When first produced (the early 1970s), a 3270 display terminal was considered a vast improvement over its predecessor, the 2260.

The 3277 terminal was a non-graphical (text only) monochrome (black screen with green letters) display that buffer ed data so that key strokes could be saved until the ENTER key was pressed. (Previous terminals sent every key stroke immediately to the computer to which the terminal was attached.) The 3277 was also field-oriented rather than line-oriented which meant that a program could write an output data stream to the terminal based on application-oriented fields rather than having to create the display output line by line. A number of 3277s could be attached to a control unit or cluster controller which in turn was attached to an IBM mainframe computer. Terminals could be attached to the computer on a relatively high-bandwidth local link called a channel or remotely over a telecommunication link that was either dedicated (usually a leased line ) or dial-up .

After the personal computer arrived with its own self-sufficient operating system and applications, it gradually replaced the 3270 system in much of the corporate world (although there almost certainly are some working 3270s in use as this is being written). A 3270 terminal became the most prominent example of what became known as a " dumb terminal ," since it relied entirely on its attachment to a mainframe (and sometimes a minicomputer ) for its "brains." The PC attached to a mainframe then became known generically as an " intelligent workstation ." It could run its own programs independently of the mainframe and it could also interface with mainframe applications. There was one product attempt to blend the two, called the 3270 PC.

The terminals themselves were the 3277 (which attached to a control unit), a 3275 standalone terminal (for locations where only a single terminal was needed), the 3278 (a sleeker version of the 3277), and the 3279 color terminal. The control units were the 3271 (channel attachment), 3272 (telecommunication attachment), and the 3274 (a control unit with a smaller form factor that could handle up to 32 terminals). For about 15 years, the 3270 family, one of IBM's most successful products ever, was a ubiquitous feature of offices the world over. The PC changed all that.

However, many thousands of corporate legacy application programs written to interact with users at 3270s are being used from PCs equipped with software known generally as 3270 emulator s. TN3270 is a program that provides PC users remote ( Telnet ) connection to an IBM computer that is running 3270 applications.

This was last updated in March 2011

Continue Reading About 3270 (Information Display System)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close