upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
An intrusion detection event that is reported by a sensor or adapter.
Industry:Software
An intrusion that originates from a remote system and targets a port and IP address on the local system.
Industry:Software
An invocation of the instrumentation facility interface (IFI) by means of one of its defined functions.
Industry:Software
An invocation of the OAM Storage Management Component (OSMC). The purpose of the storage management cycle is to ensure that every object scheduled for processing is placed in the correct level of the object storage hierarchy (as specified by its storage class), has expired or is backed up (as specified by its management class or by an explicit application request), and, if necessary, is flagged for action during a subsequent storage management cycle.
Industry:Software
An IP option, such as Loose Source and Record Route (LSRR), that is used to map a network's topology and discover private IP addresses. A hacker might try to use a restricted IP option to get through a firewall.
Industry:Software
An IP-forwarding topology where the proxy is on behalf of the back-end HTTP server. It is an application proxy for servers using HTTP.
Industry:Software
An IPL mode that automatically takes the system to the i5/OS operating system without any user interaction. This is the most commonly used IPL mode. See also attended mode IPL.
Industry:Software
An IRLM may have two kinds of VTAM sessions with another IRLM: a primary session and a secondary session (also called an alternate session).
Industry:Software
W bazie bezpośredniego hierarchiczne pierwszych 8 bajtów przestrzeni to wolne miejsce. The FSE opisuje obszar wolnego miejsca w PW lub blok, który jest 8 lub więcej bajtów długości.
Industry:Software
An ISDN configuration where several T1 facilities can be controlled by a single D-channel, instead of the normal T1 configuration where each T1 facility has 23 B-channels and a D-channel (23B+D). With NFAS, all 24 timeslots of the nonsignaling trunks are available for voice whereas only 23 channels can be used on the trunk that carries signalling traffic (23B+D+n24B). See also D-channel backup.
Industry:Software
© 2026 CSOFT International, Ltd.