- Industry: Computer
- Number of terms: 98482
- Number of blossaries: 0
- Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
An encoding scheme that contains a mixture of single-byte EBCDIC code pages and double-byte host code pages. A 5026 encoding scheme, for example, is CP290 (single byte) and CP300 (double byte).
Industry:Software
A Virtual Storage Access Method (VSAM) data set that can be reused as a work file, regardless of its old contents. It must not be a base cluster of an alternate index.
Industry:Software
An alarm, error message, warning, attention message, or informational message that is written by the database manager, replication programs, user applications, or the health monitor to a notification file or event log. See also contact.
Industry:Software
An encoding/decoding device that is a class-1 laser component assembly with transmitting and receiving receptacles that connect to fiber-optic cables. GBICs perform a serial optical-to-electrical and electrical-to-optical conversion of the signal. The GBICs in the switch can be hot-swapped.
Industry:Software
A Virtual Storage Access Method (VSAM) file occupying a portion of a data space that is already defined. The data space may contain other files. See also unique file.
Industry:Software
An alert that is generated by the health monitor and is based on the type of health indicator. See also health indicator.
Industry:Software
An encrypted file used to store sensitive information, such as database passwords. A separate file contains a key that is used to decrypt the data in the vault file.
Industry:Software
A Virtual Storage Access Method (VSAM) file that occupies a data space of its own. The data space is defined at the same time as the file and cannot contain any other file. See also suballocated file.
Industry:Software
An algorithm designed so that the key used for encryption is different from the key used for decryption. The decryption key cannot be derived, at least not in any reasonable amount of time, from the encryption key.
Industry:Software
An encrypted value that is used to retrieve the initial password of a user. This value is defined when the personal information for the user is initially loaded into the system.
Industry:Software