Browse Definitions :
Definition

Tuxedo (Transactions for UNIX, Enhanced for Distributed Operation)

Contributor(s): Bruce Watson, Dennis A. J. Pazicni and Dave Reynolds

Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases. Tuxedo operates as an extension of the operating system: as a platform for execution as well as development, it is designed for the creation and administration of e-commerce online transaction processing (OLTP) systems.

Tuxedo's three main functions are: as middleware, to relay request and response communications between servers and clients; as a transaction processing (TP) monitor, to initiate, monitor, and terminate transactions; and, as a distributed TP monitor, to enable interaction between transaction participants on different machines and associated with different databases. The Gap, E*TRADE, and Hong Kong International Terminals are some organizations that use Tuxedo for large scale transaction processing.

Originally developed at AT&T in the 1970s, Tuxedo was subsequently owned by Unix System Laboratories (USL), and then Novell before it was taken over by BEA Systems. Oracle, which acquired BEA Systems, is the current owners.

This was last updated in September 2005

Continue Reading About Tuxedo (Transactions for UNIX, Enhanced for Distributed Operation)

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

According to "TUXEDO - An Open Approach to OLTP" by Fulvio Primatesta, Prentice Hall International (1995), ISBN 0-13-101833-7, page 11 ...
"At that point the name for TUX ws changed to TUXEDO, an acronym for transactions for UNIX extended for distributed transactions."
Cancel
Take a look on cost effective open source Enduor/X middleware which provides Tuxedo APIs.
Cancel

-ADS BY GOOGLE

Dateiendungen und Dateiformate

Gesponsert von:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close