upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
A Virtual Storage Access Method (VSAM) file occupying a portion of a data space that is already defined. The data space may contain other files. See also unique file.
Industry:Software
An alert that is generated by the health monitor and is based on the type of health indicator. See also health indicator.
Industry:Software
An encrypted file used to store sensitive information, such as database passwords. A separate file contains a key that is used to decrypt the data in the vault file.
Industry:Software
A Virtual Storage Access Method (VSAM) file that occupies a data space of its own. The data space is defined at the same time as the file and cannot contain any other file. See also suballocated file.
Industry:Software
An algorithm designed so that the key used for encryption is different from the key used for decryption. The decryption key cannot be derived, at least not in any reasonable amount of time, from the encryption key.
Industry:Software
An encrypted value that is used to retrieve the initial password of a user. This value is defined when the personal information for the user is initially loaded into the system.
Industry:Software
A Virtual Storage Access Method (VSAM) linear data set that contains a source control data set (SCDS) that has been activated to control the storage management policy for the installation. The ACDS is shared by each system that is using the same SMS configuration to manage storage. See also communications data set, control data set, source control data set.
Industry:Software
An algorithm that scrambles the data so that it becomes unreadable to someone who intercepts it.
Industry:Software
An encryption key that is created at the beginning of the SSL handshake, which determines the key used when encrypting information over an SSL connection. The negotiated session key changes each time a new session is initiated.
Industry:Software
A virtual tape server (VTS) logical volume (LVOL) containing the list of LVOLs to export.
Industry:Software