- Industry: Computer
- Number of terms: 98482
- Number of blossaries: 0
- Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
The component of the DB2 database manager that processes requests to access or manipulate the contents of a database. For SQL requests, RDS processing involves translating statement text into an executable section, running that section, and returning the result set to the requestor.
Industry:Software
The component of the object access method (OAM) that is used in the support of tape libraries. The LCS also writes and reads objects on optical disk storage and manipulates the optical volumes on which the objects reside.
Industry:Software
The component of the WebSphere Commerce messaging system that provides a formatted output for messages using JSP templates.
Industry:Software
The component that provides an interface between the workbench, the configuration repository, and a set of runtime brokers. It provides brokers with their initial configuration, and updates them with any subsequent changes. It maintains the broker domain configuration.
Industry:Software
The compressing and expanding algorithm used in Europe, Latin America, and other countries when converting from analog to digital speech data. See also mu-law.
Industry:Software
The computer, or an application running on it, that provides dynamic data exchange (DDE) data to another DDE-enabled application. In VisualAge RPG, all components provide DDE server functions.
Industry:Software
The computer, or an application running on it, that provides the function of receiving dynamic data exchange (DDE) data from another DDE-enabled application.
Industry:Software
The configured Tivoli applications installed in a Tivoli management region.
Industry:Software
The connection from an SNA peripheral node through a boundary access node (BAN) over a frame-relay link to a subarea boundary node. The two portions of the BAN connection (one between the peripheral node and the BAN, and the other between the BAN and the boundary node) use different MAC addresses to identify the boundary node.
Industry:Software
The connection-mode network service that the CCITT specifies in Recommendation X.25.
Industry:Software