upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) For processor storage, real and virtual storage, and channel volume, 2 to the power of 10 or 1024 bits.<br />(2) For disc storage capacity and communications volume, 1000 bits.
Industry:Software
(1) In RPG, the layout of a field within a data structure.<br />(2) A subdivision of a field with a specific meaning. For example, the SWIFT field 32 has the subfields date, currency code, and amount. A field can have several subfield layouts depending on the way the field is used in a particular message.
Industry:Software
(1) A transfer of funds (credit or debit) between banks.<br />(2) In WebSphere Commerce Payments, a merchant's request of a financial institution to approve all or part of an order. In many cases, all the money authorised for collection by an order will be collected in a single payment. Some payment systems allow the money authorised in one order (that is, one set of payment instructions) to be collected in multiple payments, depending on the business model.
Industry:Software
(1) In a Tivoli environment, the object identifier (OID) that is given to an object during its creation.<br />(2) In Common Object Request Broker Architecture (CORBA), the information needed to reliably identify a particular object.
Industry:Software
(1) In System Manager, an instance of a change request description that has been submitted to run or is running. A change request is uniquely identified by the change request name and a sequence number.<br />(2) A request from a stakeholder to change an artefact or process. See also defect, enhancement request.<br />(3) A request to change some aspect of the project, project plan, activity definition or document.
Industry:Software
(1) A structured collection of data objects that form a data type.<br />(2) An array, structure, or union.<br />(3) In C++, an array or a class with no user-declared constructors, no private or protected non-static data members, no base classes, and no virtual functions.
Industry:Software
(1) For the IMS subsystem, the first 1 to 8 characters of the first segment of a message sent to IMS/VS. The transaction code identifies the application programme for which the message is intended.<br />(2) A 1- to 8-character alphameric code that invokes an IMS message processing program.<br />(3) In IMS and CICS, an alphanumeric code that calls an IMS message processing programme or a CICS transaction. Transaction codes have 4 characters in CICS and up to 8 characters in IMS.
Industry:Software
(1) In secure communication, an algorithmic pattern used to decrypt messages that were encrypted by the corresponding private key. A public key is also used to encrypt messages that can be decrypted only by the corresponding private key. Users broadcast their public keys to everyone with whom they must exchange encrypted messages. See also key, private key.<br />(2) In computer security, a key that is made available to everyone. See also private key.<br />(3) The non-secret half of a cryptographic key pair that is used with a public key algorithm. The public key is made available to everyone. Public keys are typically used to verify digital signatures or decrypt data that has been encrypted with the corresponding private key. See also private key.<br />(4) An encryption key associated with a Notes ID that is used to verify an electronic signature, encrypt a message, or identify an authenticating user. A public key is part of each user ID, and a copy of the key is stored in the Domino Directory. Certificates on IDs ensure that public keys are valid.
Industry:Software
(1) A two-step process by which recoverable resources and an external subsystem are committed. During the first step, the database manager subsystems are polled to ensure that they are ready to commit. If all subsystems respond positively, the database manager instructs them to commit. See also distributed transaction.<br />(2) The process used by resource managers to coordinate changes in an atomic, consistent, isolated, and durable (ACID) transaction. In the first phase, all resource managers confirm that a transaction has been received and that it is possible to process it. In the second phase, the changes are committed if all the resource managers agreed to them. If any resource manager fails to confirm that it is able to process the transaction, then no databases are updated. Using the two-phase commit process, multiple changes across multiple resource managers can be treated as a single ACID transaction.
Industry:Software
(1) In a Tivoli environment, the process of identifying the subscribers that the profiles are distributed to.<br />(2) A record that contains the information that a subscriber passes to its local broker to describe the publications that it wants to receive.<br />(3) In SQL replication, an object that creates subscription sets and subscription-set members. See also replication subscription, registration, Q subscription.<br />(4) E-mail notices and Really Simple Syndication (RSS) feeds that repository users create to receive when the state of an asset changes.
Industry:Software
© 2026 CSOFT International, Ltd.