upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
A character string used to identify a GPFS security key.
Industry:Software
A character that in the output stream causes a terminal to alert its user by way of a visual or audible notification. The alert character is the character designated by a 'a' in the C and C++ languages. It is unspecified whether this character is the exact sequence transmitted to an output device by the system to accomplish the alert function.
Industry:Software
A character that indicates that printing or displaying should start at the next horizontal position on the current line. The tab is designated by ' ' in the C language and is named in the portable character set.
Industry:Software
A character-based 5250 workstation with an enhanced character set that allows the presentation of characters that look like graphical symbols.
Industry:Software
A characteristic of an item of data that determines how that data is processed. ESQL supports six data types (boolean, datetime, null, numeric, reference, and string). Data that is retrieved from a database or is defined in a message model is mapped to one of these basic ESQL types when it is processed in ESQL expressions.
Industry:Software
A characteristic or attribute that controls the behaviour of a Universal Description, Discovery, and Integration (UDDI) node.
Industry:Software
A character-mode work station. Characters are sent immediately to the host system when a key is pressed.
Industry:Software
A character-mode work station. Characters are sent immediately to the host system when a key is pressed.
Industry:Software
A cheque that determines if a host responds to Internet Control Message Protocol requests, such as a ping.
Industry:Software
A checkpointing mode that provides the alternate use of two primary checkpoint data sets (CKPT1 and CKPT2). The datasets are referred to as the to-be-read-from and to-be-written-to data sets.
Industry:Software
© 2026 CSOFT International, Ltd.