- Industry: Computer
- Number of terms: 98482
- Number of blossaries: 0
- Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) For each user, the group ID defined in the password file.<br />(2) The attribute of a process that, at the time of process creation, identifies the group of the user who created the process. This value is subject to change during the process lifetime.
Industry:Software
(1) For each user, the user ID that is specified in the /etc/passwd file.<br />(2) The attribute of a process that, at the time a process is created, identifies the user who created the process.
Industry:Software
(1) For i5/OS, the layered architecture below the machine interface (MI). The licenced Internal Code is a proprietary system design that carries out many functions. These functions include but are not limited to storage management, pointers and addressing, programme management functions, exception and event management, data functions, I/O managers, and security.<br />(2) Microcode that IBM does not sell as part of a machine, but licences to the customer. LIC is implemented in a part of storage that is not addressable by user programs. Some IBM products use it to implement functions as an alternative to hardware implementations.
Industry:Software
(1) In an RSR environment, an IMS that runs at an active site, performs production work, and is monitored by the tracking IMS. See also tracker.<br />(2) In an XRF environment, an IMS that performs production work and is monitored by the alternate IMS. See also alternate IMS.<br />(3) If FDBR is used, the IMS that performs production work. The active IMS is monitored by a separate Fast Database Recovery IMS control region.
Industry:Software
(1) In Cryptographic Support, the equivalent to the Data Encryption Standard.<br />(2) In computer security, a 64-bit block cypher that uses a 64-bit key, of which 56 bits are used to control the cryptographic process and 8 bits are used for parity checking to ensure that the key is transmitted properly.
Industry:Software
(1) In data communications, the remote application programme or the remote computer.<br />(2) In distributed processing, any one of the separate communicating parts of an application. In CICS Transaction Server intercommunication, a transaction communicating with a remote transaction or system. A CICS programme using the SAA communications interface requires a local PARTNER resource definition for its remote partner. An EXEC CICS INQUIRE
Industry:Software
(1) In HTTP, a parameter on the METHOD attribute of the FORM tag that specifies that a browser will send form data to a server in an HTTP transaction separate from that of the associated URL.<br />(2) A series of internal diagnostic tests activated each time the system power is turned on.
Industry:Software
(1) A standard for the definition of information models and the subsequent mapping of these models to CORBA interfaces.<br />(2) An abstract language and a framework for specifying, constructing, and managing technology neutral metamodels. Examples include the metamodels for UML, CWM, and the MOF itself, as well as those in various OMG specifications in progress.
Industry:Software
(1) A storage area allocated from CICS-key storage below the 16MB line. The size of the CDSA is controlled by the CDSASZE system initialization parameter.<br />(2) In CICS/VSE, the CICS DSA is preallocated at system initialization, and is the area of storage left within the CICS partition after the CICS nucleus has been loaded. The size of the partition is determined by the EXEC DFHSIP SIZE parameter.
Industry:Software
(1) A string of bit combinations that is used to escape from normal data, such as text code points, into control information.<br />(2) A character that is preceded by a (backslash) and is interpreted to have a special meaning to the operating system.<br />(3) A sequence of characters that contains the symbol followed by one of the characters: a ,b ,f ,n ,r ,t ,v ,' , ,x , , or by one or more octal or hexadecimal digits.
Industry:Software