- Industry: Computer
- Number of terms: 98482
- Number of blossaries: 0
- Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
A protocol that, when used with IPSec, supports the automatic negotiation of security associations as well as the automatic generation and refresh of cryptographic keys. Generally, IKE is used as part of virtual private networking.
Industry:Software
A protocol used by OSPF systems for establishing and maintaining neighbour relationships.
Industry:Software
A protocol used for communication between Common Object Request Broker Architecture (CORBA) object request brokers. See also Common Object Request Broker Architecture.
Industry:Software
A protocol, developed by Sun Microsystems, Incorporated, that allows a computer to access files over a network as if they were on its local disks.
Industry:Software
A protocol-independent set of application programming interfaces (APIs) that were defined by the Distributed Management Task Force (DMTF). These interfaces give management application programmes standardised access to information about hardware and software in a system.
Industry:Software
A provision that ensures that an error is recorded if a system fails or a permanent I/O error occurs during allocation of space or during performance of a routine that updates the volume table of contents (VTOC). The DIRF turns on a bit in the VTOC upon entry to a direct access device space management (DADSM) function and, if no errors occur during processing, turns off that bit upon exiting from that function.
Industry:Software
A proxy server that provides a secure one-way connexion through a firewall to server applications in a nonsecure network. The server applications in the secure network must be compatible with the socket interface.
Industry:Software
A public, key-exchange algorithm that is used for securely establishing a shared secret over an insecure channel.
Industry:Software
A public, key-exchange algorithm that is used for securely establishing a shared secret over an insecure channel. During Phase II negotiations, the Diffie-Hellman group prevents someone who intercepts your key from deducing future keys that are based on the one they have.
Industry:Software
A public-key encryption technology technology developed by RSA Data Security, Inc, and used in the IBM implementation of SSL.
Industry:Software