upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) That portion of the CICS region that holds the CSA, management modules, control tables, and resident application programs.<br />(2) That portion of a control programme that always remains in central storage.
Industry:Software
(1) The 8-character subscript on the DESTID initialization statement or command that corresponds to a combination of a first-level destination and a second-level destination that determines where data should be sent in a JES2 installation. A DESTID can be either a symbolic destination or an explicit destination. See also explicit destination, symbolic destination.<br />(2) The 3-byte destination ID of the destination device, in the 0xDomainAreaALPA format.
Industry:Software
(1) The ability of equipment to be transported manually.<br />(2) The ability of a programme to run on more than one type of computer system without modification.<br />(3) The ability of a programming language to compile successfully on different operating systems without requiring changes to the source code.<br />(4) The ability to use Virtual Storage Access Method (VSAM) data sets with different operating systems. Volumes whose data sets are catalogued in a user catalogue can be removed from storage devices of one system, moved to another system, and mounted on storage devices of that system. Individual data sets can be transported between operating systems using access method services (AMS).
Industry:Software
(1) The ability of two or more entities to function in the same system or network.<br />(2) During migration, the state during which two releases exist in the same data sharing group.
Industry:Software
(1) The ability to access a protected object, such as a file or directory. The number and meaning of permissions for an object are defined by the access control list.<br />(2) The authority granted to users to give them access to an application's features and functions.<br />(3) Authorization to perform activities, such as reading and writing local files, creating network connections, and loading native code.<br />(4) An entitlement or privilege that governs how a user interacts with the repository, specified by role, not the individual user.
Industry:Software
(1) The ability to access and manage all CICS systems and their resources in a CICSplex from a single terminal or user session.<br />(2) The control interface that sends commands to one or more members of an IMSplex and receives command responses.
Industry:Software
(1) The ability to change how objects on a personal computer look and work. For example, a user can tailor what objects are in a work area by creating, moving, or copying objects to the work area.<br />(2) The process of describing optional changes to defaults of a software programme that is already installed on the system and configured so that it can be used. See also configuration.<br />(3) The process of designing a data processing installation or network to meet the requirements of particular users. Activities can include installing additional products, taking advantage of new software features and functions, and enabling or disabling optional features.<br />(4) The modification of a portal page or portlet by a user. WebSphere Portal enables a user to customise a portal page by modifying the page layout and by selecting which portlets will display per device. See also personalization.
Industry:Software
(1) The ability to read, update, or otherwise use a resource. Access to protected resources is usually controlled by system software.<br />(2) To obtain computing services or data.
Industry:Software
(1) The act a terminal user performs in order to identify a user to IMS. When the terminal is an ETO terminal, the signon process also creates a user structure and connects the user structure to the terminal structure.<br />(2) The procedure by which the user starts working at a workstation.<br />(3) A request that is made on behalf of an individual CICS or IMS application process by an attachment facility to enable DB2 for z/OS to verify that it is authorised to use DB2 resources.
Industry:Software
(1) The act of acquiring a locked resource by quiescing access to that object. See also claim, logical drain.<br />(2) An operator action to halt the flow of jobs to a printer, usually to stop the printer or to change print options.<br />(3) To honour pending allocation requests before deactivating sessions with a partner logical unit. This applies to LU 6.2 only.
Industry:Software
© 2026 CSOFT International, Ltd.