upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) In System Manager, an object that contains the control information about an option. The object type is *PRODLOD. A product load is identified by the product identifier (PRDID), release (RLS), option (OPTION), and load identifier (LODID) parameters.<br />(2) The smallest logical collection of objects that can make a product option.
Industry:Software
(1) A structured collection of words and phrases bound together by rules. A grammar defines the set of all words, phrases and sentences that might be spoken by a caller and are recognised by the engine. A grammar differs from a vocabulary in that it provides rules that govern the order in which words and phrases can be joined together.<br />(2) A document type definition (DTD) or schema providing a structured format used for successful processing by the trace service.
Industry:Software
(1) For the predefined SYSADM ID, the set of all possible privileges. For any other authorization identifier, the set of all privileges that are recorded for that identifier in the DB2 for z/OS catalog.<br />(2) A collection of privileges for working with system components and functions. The administrator assigns privilege sets to users (user IDs) and user groups.
Industry:Software
(1) In secure communication, an algorithmic pattern used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user's system and is protected by a password. See also key, public key.<br />(2) In computer security, a key that is known only to its owner. See also public key.<br />(3) In computer security, the secret half of a cryptographic key pair that is used with a public key algorithm. The private key is known only to its owner. Private keys are typically used to digitally sign data and to decrypt data that has been encrypted with the corresponding public key. See also public key.
Industry:Software
(1) A type of access control in which VSAM keeps control of the control interval (CI) containing a specific record until a REWRITE, UNLOCK, or DELETE command is issued for that record. The purpose of exclusive control is to protect against simultaneous update.<br />(2) A method for preventing multiple, write-add, basic direct access method (BDAM) requests from updating the same dummy record or writing over the same available space on a track. When specified by the user, the exclusive-control lock requests that the system prevent the data block that is about to be read from being modified by other requests; it is specified in a read macro and released in a write or read macro. When a write-add request is about to be processed, the system automatically obtains exclusive control of either the data set or the track.
Industry:Software
(1) In a Web site, a link to a Web address that is outside the current Web site.<br />(2) A symbolic link that contains the name of an object that is outside the hierarchical file system.
Industry:Software
(1) In System Manager, the interfaces that define guidelines, standards, services, and other interfaces for integrating systems management applications.<br />(2) A data category that is used to organise and select monitoring context instances for reporting and analysis. Examples of dimensions are time, accounts, products, and markets. See also member.<br />(3) In multidimensional data, a structural attribute of a cube that organises data to enable in-depth business analysis.<br />(4) A data category, such as time, accounts, products, or markets, that represents the highest consolidation level in a multidimensional database outline.
Industry:Software
(1) A subarea link connecting two subareas that are in different domains.<br />(2) A link physically connecting two domains.
Industry:Software
(1) For XML documents, the linkage of the document itself to the rules that govern its structure, which might be defined by a Document Type Definition (DTD) or an XML schema.<br />(2) In enterprise beans, a relationship that exists between two container-managed persistence (CMP) entity beans. There are two types of association: one-to-one and one-to-many.<br />(3) The semantic relationship between two or more classifiers that specifies connexions among their instances. See also association end, client.<br />(4) A visual representation of the members in a group that shows relationships or provides additional information about the members of a group.
Industry:Software
(1) In security management, a service and list of attributes that identifies the target for a provisioning policy.<br />(2) A data structure that contains externalised security policy information. Entitlements contain policy data or capabilities that are formatted in a way that is understandable to a specific application.
Industry:Software
© 2026 CSOFT International, Ltd.