upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
A protocol that provides the mechanism to establish Security Associations (SA) and cryptographic keys in an Internet environment. ISAKMP establishes the security characteristics and cryptographic keys to be used in a virtual private network (VPN).
Industry:Software
A protocol that routes data through a network or interconnected networks. This protocol acts as an intermediary between the higher protocol layers and the physical network. See also Transmission Control Protocol.
Industry:Software
A protocol that synchronizes the clocks of computers in a network.
Industry:Software
A protocol that, when used with IPSec, supports the automatic negotiation of security associations as well as the automatic generation and refresh of cryptographic keys. Generally, IKE is used as part of virtual private networking.
Industry:Software
A protocol used by OSPF systems for establishing and maintaining neighbor relationships.
Industry:Software
A protocol used for communication between Common Object Request Broker Architecture (CORBA) object request brokers. See also Common Object Request Broker Architecture.
Industry:Software
A protocol, developed by Sun Microsystems, Incorporated, that allows a computer to access files over a network as if they were on its local disks.
Industry:Software
A protocol-independent set of application programming interfaces (APIs) that were defined by the Distributed Management Task Force (DMTF). These interfaces give management application programs standardized access to information about hardware and software in a system.
Industry:Software
A provision that ensures that an error is recorded if a system fails or a permanent I/O error occurs during allocation of space or during performance of a routine that updates the volume table of contents (VTOC). The DIRF turns on a bit in the VTOC upon entry to a direct access device space management (DADSM) function and, if no errors occur during processing, turns off that bit upon exiting from that function.
Industry:Software
A proxy server that provides a secure one-way connection through a firewall to server applications in a nonsecure network. The server applications in the secure network must be compatible with the socket interface.
Industry:Software