upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
An IBM architecture that provides for the remote, unattended installation and configuration of applications.
Industry:Software
A user-provided part of a FEPI application that handles unsolicited inbound data.
Industry:Software
An 8-byte field, used in a spanning tree protocol, composed of the MAC address of the port with the lowest port identifier and a user-defined value.
Industry:Software
An association between two catalogue items for the purpose of a sales activity. For example, a camera might have a "requires" merchandising association with a set of batteries, and a dictionary might have a "goes with" merchandising association with a thesaurus. See also accessory.
Industry:Software
A user-provided programme that defines and inquires about FEPI resources, and performs housekeeping for the sessions.
Industry:Software
An 8-byte identifier for an address space, data space, or hiperspace. A STOKEN is similar to an address space identifier (ASID), except for two important differences: the system does not reuse the STOKEN value while a programme is running and data spaces do not have ASIDs.
Industry:Software
An association between two classes. A special case of an n-ary association. See also n-ary association.
Industry:Software
An IBM licenced programme that provides a solution for desktop business conferencing. Ultimedia Business Conferencing is a cooperative processing application that manages the conference from scheduling to completion.
Industry:Software
An IBM licenced programme that provides a work environment for the development of programmes and the use of functions like Edit and Browse.
Industry:Software
An IBM licenced programme that provides access control by identifying users to the system; verifying users of the system; authorising access to protected resources; logging unauthorised attempts to enter the system; and logging accesses to protected resources.
Industry:Software
© 2026 CSOFT International, Ltd.