upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
An Intel standard for the design of PC expansion boards. It enables computers to recognize new peripheral devices without additional configuration steps.
Industry:Software
(1) A value passed to or returned from a function or procedure at run time.<br />(2) An independent variable or any value of an independent variable. Examples of arguments are a search key and a number identifying the location of an item in a table.
Industry:Software
(1) In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified.<br />(2) To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may check out the same element at a time.
Industry:Software
(1) In the Kerberos protocol, a file that contains service principal names and secret keys. The secret keys should be known only to the services that use the key table file and to the key distribution center (KDC).<br />(2) A file on the service's host system. Each entry in the file contains the service principal's name and secret key. On i5/OS, a key table file is created during configuration of network authentication service. When a service requests authentication to i5/OS with Network Authentication Service configured, that i5/OS checks the key table file for that service's credentials.
Industry:Software
(1) A token that performs a control function such as the symbols ().<br />(2) For logical unit (LU) 6.2, a service transaction program that describes and controls the availability of certain resources. For example, it describes network resources accessed by the local LU, and it controls session limits between the LU and its partners.
Industry:Software
(1) In a Tivoli environment, a file that contains the management information and instrumentation for enabling a particular application or business system to be managed by Tivoli management software. This file may be in the form of a Tivoli installation image or an application management package. Types of management modules include base modules, Tivoli Business Systems Manager modules, and Tivoli Plus modules.<br />(2) The BladeCenter component that handles system-management functions. It configures the chassis and switch modules, communicates with the blade servers and all I/O modules, multiplexes the keyboard/video/mouse (KVM), and monitors critical information about the chassis and blade servers.
Industry:Software
(1) In System Manager, a grouping of systems management tasks that support an enterprise's information system environment. Examples of disciplines are change management and problem management.<br />(2) A collection of related activities that are related to a major task in the development process. The disciplines in RUP include: Business Modeling, Requirements, Analysis and Design, Implementation, Test, Deployment, Configuration and Change Management, Project Management, Environment.
Industry:Software
(1) A value returned by a program to indicate the result of its processing.<br />(2) The collective name for completion codes and reason codes.
Industry:Software
(1) In CICS intercommunication, the chain of sessions that results when a system requests a resource in a remote system, but the remote system discovers that the resource is in a third system and has itself to make a remote request.<br />(2) See serial connection.
Industry:Software
(1) In the Kerberos protocol, the set of principals for which a specific key distribution center (KDC) is the authenticating authority.<br />(2) A grouping of customers, organized by division, region, or company, which is used to separate customer data.<br />(3) A collection of resource managers that honor a common set of user credentials and authorizations.
Industry:Software