upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
A type 5 node and its subordinate type 4 nodes that support LEN protocols and appear to an attached APPN or LEN node as a single LEN node.
Industry:Software
A type of authentication where the user name and password are transmitted in an unencrypted form. This is a more basic form of authentication than Challenge Handshake Authentication Protocol (CHAP). See also Challenge Handshake Authentication Protocol.
Industry:Software
A type of call linkage that can improve performance in an environment of frequent calls between small functions.
Industry:Software
A type of channel within a transport chain that associates a Secure Sockets Layer (SSL) configuration repertoire with the transport chain.
Industry:Software
A type of channel within a transport chain that creates a bridge in the transport chain between an HTTP inbound channel and a servlet or JavaServer Pages (JSP) engine.
Industry:Software
A type of channel within a transport chain that provides client applications with persistent connexions within a local area network (LAN).
Industry:Software
A type of channel within a transport chain that provides client applications with persistent HTTP connexions to remote hosts that are either blocked by firewalls or require an HTTP proxy server. An HTTP channel is used to exchange application data in the body of an HTTP request and an HTTP response that are sent to and received from a remote server.
Industry:Software
A type of CICS data table, for which CICS automatically maintains consistency between the table and its source data set. All changes to the data table are reflected in the source data set and all changes to the source data set are reflected in the data table.
Industry:Software
A type of crawler that explores the Web by retrieving a Web document and following the links within that document.
Industry:Software
A type of denial-of-service attack in which an attacker sends a large number of TCP connexion requests to a target computer, without answering the target computer's acknowledgment requests. The target computer becomes overloaded and denies service to legitimate users.
Industry:Software
© 2026 CSOFT International, Ltd.