upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) For processor storage, real and virtual storage, and channel volume, 2 to the power of 10 or 1024 bits.<br />(2) For disk storage capacity and communications volume, 1000 bits.
Industry:Software
(1) In RPG, the layout of a field within a data structure.<br />(2) A subdivision of a field with a specific meaning. For example, the SWIFT field 32 has the subfields date, currency code, and amount. A field can have several subfield layouts depending on the way the field is used in a particular message.
Industry:Software
(1) A structured collection of data objects that form a data type.<br />(2) An array, structure, or union.<br />(3) In C++, an array or a class with no user-declared constructors, no private or protected non-static data members, no base classes, and no virtual functions.
Industry:Software
(1) For the IMS subsystem, the first 1 to 8 characters of the first segment of a message sent to IMS/VS. The transaction code identifies the application program for which the message is intended.<br />(2) A 1- to 8-character alphameric code that invokes an IMS message processing program.<br />(3) In IMS and CICS, an alphanumeric code that calls an IMS message processing program or a CICS transaction. Transaction codes have 4 characters in CICS and up to 8 characters in IMS.
Industry:Software
(1) In secure communication, an algorithmic pattern used to decrypt messages that were encrypted by the corresponding private key. A public key is also used to encrypt messages that can be decrypted only by the corresponding private key. Users broadcast their public keys to everyone with whom they must exchange encrypted messages. See also key, private key.<br />(2) In computer security, a key that is made available to everyone. See also private key.<br />(3) The non-secret half of a cryptographic key pair that is used with a public key algorithm. The public key is made available to everyone. Public keys are typically used to verify digital signatures or decrypt data that has been encrypted with the corresponding private key. See also private key.<br />(4) An encryption key associated with a Notes ID that is used to verify an electronic signature, encrypt a message, or identify an authenticating user. A public key is part of each user ID, and a copy of the key is stored in the Domino Directory. Certificates on IDs ensure that public keys are valid.
Industry:Software
(1) A structured collection of words and phrases bound together by rules. A grammar defines the set of all words, phrases and sentences that might be spoken by a caller and are recognized by the engine. A grammar differs from a vocabulary in that it provides rules that govern the order in which words and phrases can be joined together.<br />(2) A document type definition (DTD) or schema providing a structured format used for successful processing by the trace service.
Industry:Software
(1) For the predefined SYSADM ID, the set of all possible privileges. For any other authorization identifier, the set of all privileges that are recorded for that identifier in the DB2 for z/OS catalog.<br />(2) A collection of privileges for working with system components and functions. The administrator assigns privilege sets to users (user IDs) and user groups.
Industry:Software
(1) In secure communication, an algorithmic pattern used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user's system and is protected by a password. See also key, public key.<br />(2) In computer security, a key that is known only to its owner. See also public key.<br />(3) In computer security, the secret half of a cryptographic key pair that is used with a public key algorithm. The private key is known only to its owner. Private keys are typically used to digitally sign data and to decrypt data that has been encrypted with the corresponding public key. See also public key.
Industry:Software
(1) A subarea link connecting two subareas that are in different domains.<br />(2) A link physically connecting two domains.
Industry:Software
(1) For XML documents, the linkage of the document itself to the rules that govern its structure, which might be defined by a Document Type Definition (DTD) or an XML schema.<br />(2) In enterprise beans, a relationship that exists between two container-managed persistence (CMP) entity beans. There are two types of association: one-to-one and one-to-many.<br />(3) The semantic relationship between two or more classifiers that specifies connections among their instances. See also association end, client.<br />(4) A visual representation of the members in a group that shows relationships or provides additional information about the members of a group.
Industry:Software