list of letters
This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See ATM adaptation layer.
See AppleTalk Address Resolution Protocol.
See adaptive address space.
See aggregate backup and recovery support.
abbreviated combined relation condition
In COBOL, a combined condition that omits a common subject or a common subject and common relational operator from a consecutive sequence of relational conditions. For example, (A and B) or (A and C) can be abbreviated A and (B or C).
A process in which the verification and i5/OS error recovery part of installation is done without restoring the saved version of the operating system. See also normal installation.
Optional format for CICS trace entries which summarizes the information in full trace entries. See also full trace.
See activity based costing.
See abnormal end of task.
See Agent Building and Learning Environment.
ABLE Rule Language (ARL)
A rule-based programming language that is used to express business logic outside of program logic. ARL provides tight integration with Java objects, and the tooling provided with ABLE is based on the Eclipse platform.
ABLE Rules Engine
A technology of the IBM Autonomic Computing initiative that provides a set of fast, reusable, and scalable learning and reasoning components that capture and share individual and organizational knowledge, correlate events, and apply policies to take the appropriate action.
See activity based management.
See asynchronous balanced mode extended.
- A system failure or operator action that causes a job to end unsuccessfully.
- An exit that is not under program control, such as a trap or a segmentation violation.
In data communications, a function called by a sending primary, secondary, or combined station that causes the recipient to discard and ignore all bit sequences transmitted by the sender since the preceding flag sequences or to discard and ignore all data transmitted by the sender since the previous checkpoint.
A notification that is sent to interested listeners that a property value is about to be changed, so that the listeners have an opportunity to constrain or veto the proposed new property value.
An address that, without the need for further evaluation, identifies a storage location or a device. See also relative address.
In storage management, a backup copy-group mode that specifies that a file is considered for incremental backup even if the file has not changed since the last backup. See also mode, modified mode.
The full path name of an object. Absolute path names begin at the highest level, or root directory (which is identified by the forward slash (/) or backward slash (\) character). See also relative path.
absolute path name
A string of characters used to refer to an object, starting at the highest level (or root) of the directory hierarchy. The absolute path name must begin with a slash (/), which indicates that the path begins at the root. See also relative path name.
A time relative to a selected previous time from which the time scale (or measurement of time) begins. For example, if you want to start a batch job using absolute time and the time scale begins at midnight, specifying an absolute time of 07:00 would mean that the batch job runs at 7 a.m. If the timescale begins at 9 a.m. with an absolute time of 07:00, the batch job would run at 4 p.m.
- In object-oriented programming, a class that represents a concept; classes derived from it represent implementations of the concept. An object cannot be constructed from an abstract class; that is, it cannot be instantiated. See also base class, concrete class, parent class.
- A class with at least one pure virtual function that is used as a base class for other classes.
- The creation of a view or model that suppresses unnecessary details to focus on a specific set of details of interest.
- A data type with a private representation and a public set of operations.
In UML modeling, a dependency relationship that connects model elements, or sets of model elements, that represent the same concept at different levels of abstraction, or from different viewpoints. See also dependency relationship.
A data specification that includes all distinctions that are needed in data transmissions, but that omits (abstracts) other details such as those that depend on specific computer architectures. See also transfer syntax.
Abstract Syntax Checker (ASC)
In OSI, a utility program for OSI Communications Subsystem that processes user-specified ASN.1 statements and generates (a) data structures in a user-selected programming language that define the format of the data used to communicate with peer application entities, and (b) the metatable that OSI Communications Subsystem uses to encode and decode the data passed between application entities.
Abstract Syntax Notation One (ASN.1)
In open systems interconnection (OSI), a notation for defining data structures and data types. The notation is defined in international standards ISO 8824/ITU X.208 and ISO 8825/ITU X.209.
A component or unit test that is used to test Java interfaces, abstract classes, and superclasses; that cannot be run on its own; and that does not include a test suite. See also component test.
Abstract User Interface Markup Language (AUIML)
An XML implementation that provides a platform and technology-neutral method of representing windows, wizards, property sheets, and other user interface elements. It defines the purpose of the user interface, such that it can be described once and rendered to the user in multiple environments and on various devices.
Abstract Window Toolkit (AWT)
In Java programming, a collection of GUI components that were implemented using native-platform versions of the components. These components provide that subset of functionality which is common to all operating system environments. (Sun) See also Standard Widget Toolkit, Swing Set.
See marketing experiment.
In REXX, when two terms in an expression are adjacent and are not separated by an operator, they are said to abut. The effect of this operation is that the two terms are concatenated without a blank.
See alternating current.
See autonomic computing adapter.
AC adoption model
See autonomic computing adoption model.
See application control block generation.
A name that is specified either on the VTAM APPL definition statement or on the VTAM application program's access method control block (ACB) macroinstruction. See also network name.
See application control command.
See functional verification test.
A term that has been accepted as a new, valid term for general use within an organization by the glossary administrator. See also candidate term.
- The ability to read, update, or otherwise use a resource. Access to protected resources is usually controlled by system software.
- To obtain computing services or data.
One of the two access modes that can be set for the ESS during initial configuration. It enables all host systems, attached to Fibre Channel and with no defined access profile, to access all logical volumes (LVOLs) on the ESS. With a profile defined in ESS Specialist for a particular host, that host has access only to volumes that are assigned to the worldwide port name (WWPN) for that host. See also EsconNet, FiconNet, pseudohost, worldwide port name.
One of a range of possible authority levels that control access to protected resources. See also authority.
An enterprise bean wrapper that is typically used by client programs, such as JSP files and servlets. Access beans hide the complexity of using enterprise beans and improve the performance of reading and writing multiple EJB properties.
A component that acts as an intermediary between collaborations and an external process such as a web server. The access client communicates with InterChange Server through Server Access Interface.
A group of objects that have data-level access control and to which users are granted role-based access. See also access group.
access control entry (ACE)
An entry in an access control list (ACL) that contains a set of access rights, for a particular grantee, such as a machine, a user, or a group, and whether the right is allowed or denied. An ACE can also contain information about the source, whether directly applied, inherited, or from a security template.
access control group (ACG)
A grouping of objects, such as catalogs, hierarchies, or selections, with a defined set of role-based privileges for viewing or modifying the data on the entries within those objects.
- A logical organization of data model objects, devices and software over which a user is granted access. See also access collection.
- A type of member group used to define access control. See also site administrator.
- A collection of users who share permissions, notifications, and LDAP group properties. An access group can be mapped to an LDAP group. Users inherit the permissions of the groups to which they belong.
- The resource type attribute that determines how a resource participates in a transaction when the resource has been placed under commitment control. The possible access intents are update, read-only, and undetermined access intent.
- In RACF, a subsystem's intended use of a protected resource.
- In IMS, a subsystem's intended use of a database. This is in contrast to the sharing level of the database itself, which specifies how the database can be shared.
- Metadata that optimizes and controls the runtime behavior of an entity bean with respect to concurrency control, resource management, and database access strategies.
In ESA key-controlled storage, a key associated with a storage access request. When key-controlled protection applies to a storage access, a store operation (write) is permitted only when the storage key matches the access key; a fetch (read) is permitted when the keys match or when the fetch-protection bit of the storage key is zero. In most cases, the access key for a storage operation is the program status word (PSW) key in the current PSW.
In RACF, the part of a resource profile that specifies the users and groups that can access the resource and the level of access granted to each. See also conditional access list.
- An executable file used by extended agents to connect to and control jobs on other operating systems (for example, z/OS) and applications (for example, Oracle Applications, PeopleSoft, and SAP R/3). The access method is specified in the workstation definition for the extended agent. See also extended agent.
- The part of the distributed data management architecture which accepts commands to access and process the records of a file.
- A technique for moving data between main storage and input/output devices.
- A set of routines the database server uses to manipulate and/or access a table, index or other object.
- A z/OS set of interfaces that moves data between storage and an I/O device in response to requests made by a program. An access method defines the organization of the data and the technique by which the data is stored and retrieved.
- The manner in which files are referred to by a computer. See also dynamic access, sequential access.
- One of the modes in which a logical unit (LU) in a disk controller system can operate. The three access modes are image mode, managed space mode, and unconfigured mode. See also image mode, managed mode, unconfigured mode.
- A form of access permitted for a file.
- An attribute of a storage pool or a storage volume that specifies whether the server can write to or read from the storage pool or storage volume.
- In computer security, an object that uses a resource. Users and groups are accessors.
- A pair of methods, the getter method and the setter method, that are used to access the value of an object property.
accessor environment element (ACEE)
A control block that contains a description of the current user's security environment, including user ID, current connect group, user attributes, and group authorities. An ACEE is constructed during user identification and verification. See also ENVR object.
- A type of merchandising association in which a suggested product is chosen as an addition to the currently displayed or selected product. See also cross-sell, merchandising association, up-sell.
- An IBM designation for a separately orderable part that has no type number, is for purchase only, and does not receive normal IBM maintenance.
The method that is selected by the database manager for retrieving data from a specific table. For example, an access path can involve the use of an index, a sequential scan, or a combination of the two.
access path stability
A characteristic of an access path that defines reliability for dynamic or static queries. Access paths are not regenerated unless there is a schema change or manual intervention.
- The object authority to a file in a high-performance file system.
- A privilege that permits the access or use of an object.
- A group of designations that determine the users who can access a particular file and how the users can access the file. The access permissions are read, write, and run (execute). See also permission code.
- In DB2 for i5/OS, the control structure produced during compile time that is used to process SQL statements encountered when the program is run.
- The set of access paths that is selected by the query optimizer to evaluate a particular SQL or XQuery statement. The access plan specifies the order of operations to resolve the execution plan, the implementation methods (such as JOIN), and the access path for each table that is referenced in the statement.
- A cluster node that is being used as the primary source for replicated objects and for initiating changes to the object.
- In the Distributed Computing Environment (DCE), either the point at which an abstract service is obtained, or a connection between a directory user agent (DUA) and a directory system agent (DSA).
The protocol used to gain access to a shared resource; for example, in a local area network, the shared resource is the transmission medium. The medium access protocol specified by the IEEE 802 standard are CSMA/CD token bus and token ring.
access register mode (AR mode)
The address space control mode in which the system uses general-purpose registers and the corresponding access register (AR) to resolve an address in an address space or a data space. See also address space control mode, primary mode.
- A designation of the rights that users have, such as read, modify, create, delete, and admin (RMCDA).
- A security setting that controls access to the objects in an object store or workflow.
- See permission.
The selection by DL/I of IMS, DL/I, or SQL/DS database access tasks that are to be run. A CICS application program designed to access DL/I databases must schedule its access to DL/I.
accompany data set
In aggregate backup and recovery support (ABARS), a data set that is physically transported from the backup site to the recovery site instead of being copied to the aggregate data tape. It is cataloged during recovery.
- An entity that contains a set of parameters that define the application-specific attributes of a user, which include the identity, user profile, and credentials.
- In WebSphere Commerce Payments, a relationship between the merchant and the financial institution that processes transactions for that merchant. There can be multiple accounts for each payment cassette.
- See identity.
- The quality of being responsible for one's actions.
- See nonrepudiation.
accounting class data
High-level data produced by the CICS monitoring facility which can be used for installation accounting purposes, such as the number of transactions for a given combination of transaction identifier, transaction type, terminal, and operator. This data is the minimum required to enable accounting routines to associate particular transactions with particular users or terminals.
A 15-character field, assigned to a job by the system when it is processed by the system, that is used to collect statistics for the system resources used for that job when job accounting is active.
The period of time during which statistics are gathered, beginning when the job starts or when the job's accounting code is changed, and ending when the job ends or when the job's accounting code is next changed.
A utility that monitors various aspects of system operations; it collects detailed data on each transaction and provides tools for processing the data to produce different kinds of reports.
A defined role in WebSphere Commerce responsible for creating contracts for accounts, and monitoring account activity. Account representatives are part of the sales organization, and can be involved in the creation of targeted sales promotions such as discounts and coupons.
- A printer hardware feature that supplies a separate storage area to hold data in raster form. It can be used either for composing a sheet of data that combines a large amount of variable and constant data, or for storing an electronic overlay in raster form so that the overlay is merged with variable data as the page is printed.
- A register in which one operand of an operation can be stored and subsequently replaced by the result of that operation.
- See automatic call distributor.
- See access control domain.
- See active configuration directory.
- See automatic call distribution.
In telephony, the set of multiple agents assigned to process incoming telephone calls that are directed to the same dialed number. The routing of incoming calls to one of the agents in the ACD group is based on such properties as availability of the agent and length of time since the agent completed the last incoming call.
AC distributed infrastructure
See autonomic computing distributed infrastructure.
See active control data set.
See access control entry.
See accessor environment element.
- See Advanced Communications Function for the Telecommunications Access Method.
- See Advanced Communications Function for Telecommunications Access Method.
A transaction involving multiple resource managers using the two-phase commit process to ensure atomic, consistent, isolated, and durable (ACID) properties. See also atomicity, consistency, durability, isolation.
See AFP Conversion and Indexing Facility.
See even positive acknowledgment.
- To respond to a poll, address, or message that a transmission has been received.
- In the X.25 API, to confirm that a data packet with the D-bit set has arrived.
In communications, the service that provides for the establishment of a data link level connection. Acknowledged service provides for functions such as sequencing, flow control, and error recovery. See also unacknowledged service.
See access control list facility.
See access control list group.
See administrative command-line interface.
AC maturity index
See autonomic computing maturity index.
See automated console operation.
- To assign a display station or session to a program.
- In a VTAM application program, to initiate and establish a session with another logical unit (LU). The acquire process begins when the application program issues a macroinstruction.
- In VTAM, to take over resources that were formerly controlled by an access method in another domain or to resume control of resources that were controlled by that domain but released. See also release, resource takeover.
An activity that a program executing outside the process that contains the activity has gained access to, by issuing an ACQUIRE command. The activity remains acquired until the next sync point occurs. Acquiring an activity enables the program to read and write to the data-containers of the activity, read the data-containers of the process that contains the activity and issue various commands, including RUN and LINK, against the activity. See also acquired process.
The process whose root activity a program currently has access to. A program acquires a process in one of two ways: either by defining it; or, if the process already exists, by issuing an ACQUIRE PROCESS command. The process remains acquired until the next sync point occurs. Acquiring a process enables the program to read and write to the data-containers of the process and root activity, and issue various commands, including RUN and LINK, against the process. A program can acquire only one process (root activity) or one descendant activity within the same unit of work. See also acquired activity.
An operation that makes a program device available for input or output operations. See also release-program-device operation.
In e-commerce, the financial institution (or an agent of the financial institution) that receives from the merchant the financial data relating to a transaction and authorizes the transaction.
acquisition file processor (AFP)
See UMF file conversion utility.
Tools and programs that acquire data, convert it to a recognized format (if necessary), and submit it to the pipeline for processing. These programs can be configured to run in batch mode or in real-time mode.
See automatic class selection.
See association control service element.
See automatic class selection routine.
- A defined task that an application performs on an object as a result of an event.
- A business process that is generated in response to the processing of an event.
- A task that affects the performance of an individual metric. Metric Studio tracks the dates, resources, and status of actions and their relationship to a metric.
- An activity that is run on a transition.
- A single step that specifies a unit of work in a collaboration business process. See also action node, activity, code fragment, collaboration template.
- In object-oriented development, a unit of behavior that transforms or processes information in the system. An action is executed within the context of an activity.
- A unit of work that is typically part of a larger automation process. An action is an element within an Apache Ant build file, identified by a <target> tag. Actions can call scripts, executable programs, or other actions.
- In CDE, a desktop construct that provides a method for running applications, executing commands, and other activities such as printing, removing files, and changing directories.
- In a policy-enabled system, a type of unsolicited decision that specifies the operation or set of operations to run when a policy is evaluated, selected, and executed. In Policy Management for Autonomic Computing, only a single operation is supported.
- An instruction in an artifact that defines a change management operation that needs to be performed in a hosting environment.
- A series of processing steps, such as document validation and transformation.
A CICSPlex SM command that affects one or more of the resources represented in a view. Action commands can be issued from either the COMM field in the control area of the information display or the COMMAND field in a displayed view.
An XML file that defines the specific actions that are needed to install or to uninstall an installable unit into a specific hosting environment. See also artifact.
See action identifier.
A unit of work within an activity diagram of a collaboration template. Every action node has an associated Java code fragment that defines the actions in the unit of work. Within an activity diagram in Process Designer, an action node is represented by a rounded rectangle symbol. See also action, code fragment.
- A rule in which the action is always performed. See also if-then rule, rule set.
- A business rule that can be edited in the rule editor. Action rules, decision tables, and decision trees are different representations of business rules.
- In OSI, a callable service that causes the OSI Communications Subsystem to take an action, such as a data transfer. See also callable service, extract service, set services.
- A service that triggers a process or notification to inform users about a situation.
In Struts, a program that is started by the servlet container of a web server to process a request that invokes an action, receives a forward from the action, and asks the servlet container to pass the request to the forward's URL.
- In Eclipse, a group of commands that a perspective contributes to the main toolbar and menu bar.
- The leaf of a branch in a decision tree. Action sets consist of one or more actions to be carried out when the conditions defined in the rule are met.
In X Toolkit, a table that specifies the mapping of externally available procedure strings to the corresponding procedure implemented by the widget class. All widget class records contain an action table.
- To establish a new storage management policy for the storage management subsystem (SMS) complex by loading the contents of a source control data set (SCDS) into SMS address-space storage and into an active control data set (ACDS), or loading the contents of an existing ACDS into SMS address-space storage.
- To allocate static storage for a program.
- To validate the contents of a policy set and then make it the active policy set.
- To make a resource ready to perform its function. See also deactivate.
- A processing step that prepares a program to be run. Activation can include allocating and initializing static storage for programs in a job and completing some portions of binding.
- The attachment of an activity to perform one of a series of processing steps. In order to perform all its processing, an activity may need to be activated several times. In between, it "sleeps". See also pseudoconversational.
- In Java, the process of transferring an enterprise bean from secondary storage to memory. (Sun) See also passivation.
A password that activates inactive processors or memory in Capacity Upgrade on Demand. Each activation code is uniquely created for a system and requires the system vital product data (VPD) to ensure correctness. See also Capacity Upgrade on Demand.
A substructure of a job in which Integrated Language Environment (ILE) programs and service programs are activated. This substructure contains the resources necessary to run the program. These resources include: static and global program variables, dynamic storage, temporary data management resources, certain types of exception handlers and ending procedures.
See product activation kit.
- Pertaining to a node or device that is connected or is available for connection to another node or device.
- In VTAM, pertaining to a major or minor node that has been activated by VTAM. Most resources are activated as part of VTAM start processing or as the result of a VARY ACT command. See also pending active session.
- Pertaining to a resource that is currently operational. See also inoperative.
- In cross-site mirroring, the configuration state of a mirror copy that indicates geographic mirroring is being performed.
- Pertaining to a file, page, or program that is in main storage or memory, as opposed to a file, page, or program that must be retrieved from auxiliary storage.
An agent that is processing a request for an application. See also idle agent.
The application subsystem that is currently in an extended recovery facility (XRF) session with a terminal user. See also alternate application.
active application description
An application description that is complete and ready for use in planning or scheduling. See also pending application description.
In computer security, an assault on a network that involves an intruder who tries to break into or take over a computer that belongs to someone else. Spoofing is an example of an active attack.
- A class representing a thread of control in the system.
- A class whose instances are active objects. See also active object.
The storage management subsystem (SMS) configuration currently used to control the managed storage in the installation. The definition of this configuration is in the active control data set (ACDS). See also SMS configuration.
active configuration directory (ACD)
The directory in which a copy of the ODM object classes are stored. Daemons, scripts, and utilities refer to the ODM data stored in the ACD at run time. See also default configuration directory, dependent resource groups, Object Data Manager, staging configuration directory.
active context handle
In DCE Remote Procedure Call (RPC) applications, a context handle that the RPC has set to a non-null value and has passed back to the calling program. The calling program supplies the active context handle in any future calls to procedures that share the same client context.
active control data set (ACDS)
A Virtual Storage Access Method (VSAM) linear data set that contains a source control data set (SCDS) that has been activated to control the storage management policy for the installation. The ACDS is shared by each system that is using the same SMS configuration to manage storage. See also communications data set, control data set, source control data set.
- Data that can be accessed without any special action by the user, such as data on primary storage or migrated data. Active data also can be stored on tape volumes. See also inactive data.
- For tape mount management, application data that is frequently referenced, small in size, and managed better on a direct access storage device (DASD) than on tape.
active environment group
A collection of mapping structured fields, positioning controls, and data descriptors that define the environment for a page. These structured fields form an internal object in a composed text page, page definition, or overlay.
active file system
A file system to which space management has been added. With space management, tasks for an active file system include automatic migration, reconciliation, selective migration, and recall. See also inactive file system.
A gateway that is treated like a network interface in that it is expected to exchange routing information. If it does not do so for a period of time, the route associated with the gateway is deleted. See also passive gateway.
An IMS that performs production work See also tracking IMS.
The internal resource lock manager (IRLM) that supports the active IMS subsystem in an XRF complex. See also alternate IRLM.
- A data set with a fixed size where recovery events are recorded as they occur. When the active log is full, the contents of the active log are copied to the archive log.
- The primary and secondary log files that are currently needed for recovery and rollback. See also archive log.
active member state
A state of a member of a data sharing group. An active member is identified with a group by the cross-system coupling facility (XCF), which associates the member with a particular task, address space, and MVS system. A member that is not active has either a failed member state or a quiesced member state.
In a token-ring network, a function performed at any one time by one ring station that initiates the transmission of tokens and provides token error recovery facilities. Any active adapter on the ring has the ability to provide the active monitor function if the current active monitor fails.
- An instance of active class. See also active class.
- An object that owns a thread and can initiate control activity.
In TCP/IP, the state of a connection that is actively providing a service. See also passive open.
In BMS, the partition that contains the cursor. It can be scrolled vertically. While a partition is active, the cursor wraps round at the viewport boundaries, and any input key transmits data from that partition only.
The character position at which the symbol representing the next graphic character will be imprinted, or relative to which the next control function will be executed. In general, the active position is indicated on a display by a cursor (see ISO/IEC 9995-1).
active radio frequency identification (active RFID)
A radio frequency identification that has an internal power source that can be turned on or off. See also radio frequency identification.
An active subfile record or any record format that is currently shown on a display. See also inactive record.
See active radio frequency identification.
Active Server Page (ASP)
An HTML page that includes embedded programming code written in scripting languages like VBScript or Jscript that is processed on a web server before the page is sent to the user. ASP is a Microsoft technology.
active sort table
A system-supplied sort table that contains the collating sequences for all defined double-byte characters in a double-byte character set. These tables are maintained by the character generator utility function of the Application Development ToolSet feature.
A subfile in which a write operation is issued to the subfile record format or to the subfile control record format when the DDS Subfile Initialize (SFLINZ) keyword for display files is in effect.
active subfile record
A record that is added to the subfile by a write operation, or a record that was initialized by the DDS keyword SFLINZ. See also inactive subfile record.
See active IMS.
- During emergency restart, a task that completed an LUW and started another, but that did not cause any records to be written to the system log during the second LUW.
- A CICS task that is eligible for dispatching by CICS.
The most recent backup copy of a file stored. The active version of a file cannot be deleted until a backup process detects that the user has either replaced the file with a newer version or has deleted the file from the file server or workstation. See also backup version, inactive version.
active working set
The logical collection of application projects that is currently displayed in the Broker Application Development perspective. See also working set.
- A database entity that uses database resources during its lifetime, which can span one or more requests. A cursor and a procedure are examples of activities.
- In BTS, one part of a process managed by CICS business transaction services. Typically, an activity is part of a business transaction. A program that implements an activity differs from a traditional CICS application program only in its being designed to respond to BTS events.
- Work that a company or organization performs using business processes. An activity can be atomic or non-atomic (compound). The types of activities that are a part of a process model are process, subprocess, and task.
- A unit of work or a building block that performs a specific, discrete task. See also task.
- In System Manager, a change management operation initiated by the central site, for example, sending an object, deleting a file, and installing a PTF. An activity is a single stop within a change request.
- A set of actions designed to achieve a particular result. An activity is performed on a set of targets on a specific schedule. Activities are usually defined as part of plans. See also activity plan.
- An element of a process, such as a task, a subprocess, a loop, or a decision. Activities are represented as nodes in process diagrams.
- An item within a course outline that contains some tasks for the student to complete, such as taking a test or attending a live session in the LearningSpace -- Virtual Classroom.
- A logical unit of work that can be completed by a human or a system during process execution in IBM Process Designer.
- In OSI, a logical unit of work into which peer application entities can separate the data that they exchange.
- A set of steps that perform a portion of a scenario. See also action, activity diagram, scenario.
- An object that tracks the work required to complete a development task. An activity includes a text headline, which describes the task, and a change set, which identifies all versions that developers create or modify while working on the activity.
- A task or occupation that is planned to be completed.
- A diagram that represents the performance of a task or duty in a workflow, or the execution of a statement in a procedure.
- A UML behavioral diagram that models the dynamic parts of a system by showing the steps or tasks that constitute a process.
- See activity graph.
- A graphical implementation of an activity, including actions, execution flow, and external calls. An activity diagram contains symbols that specify the steps, the order of the steps, and the logic that determines how they execute. See also activity.
In a Gantt chart, an instance of the class IlvActivityGraphic that is used to represent the associated activity on a row of the Gantt sheet. See also reservation graphic.
A record of task and transaction definition status on the system log made on a periodic basis to facilitate the identification of transaction backout information during emergency restart. In the event of an uncontrolled shutdown and subsequent emergency restart, activity keypoints can shorten the process of backward scanning through the system log. Activity keypoints are written automatically by the system (system activity keypoints) or by the user (user activity keypoint). See also system activity keypoint, user activity keypoint.
- A log that records normal activity messages that are generated by the server. These messages include information about server and client operations, such as the start time of sessions or device I/O errors.
- An audit trail of every function that has altered the data in the active ledger.
A group of activities where the execution can be scheduled, submitted, and monitored. See also activity.
A threshold that applies to an individual activity. If an activity exceeds the upper boundary of the threshold tracking that activity, the corresponding action is executed and applied once to that activity. See also aggregate threshold.
See activate logical unit.
See action definition.
- In UML, a person or device that interacts with a system.
- A representation of a user of a system, or an external component that sends information to, or receives information from, the system.
See activate physical unit.
In Fortran, the data passed to a called routine at the point of call. See also dummy argument.
actual configuration item
A configuration item with the attributes and relationships assigned by a discovery program See also authorized configuration item.
actual decimal point
In COBOL, the physical representation of the decimal point position in data using either of the decimal point characters (. or,). The actual decimal point appears in printed reports and requires a position in storage. See also assumed decimal point.
The unit control block (UCB) used for all I/O operations as viewed with a virtual address that is the same in every address space. The actual UCB can reside in common storage either above or below 16 MB. See also captured UCB, unit control block.
- The device within an auxiliary storage device that moves the read/write heads.
- A device that causes mechanical motion.
One of the accent marks in Latin script (‘δ). See also ogonek.
- An add-on that allows the system to interact with an external system, such as a source control system, debugging database, or testing system. An adapter can be configured to collect information for storage in the Bill of Materials (BOM) or to push information back to other information systems.
- An intermediary software component that allows two other software components to communicate with one another.
- A set of software modules that communicate with an integration broker and with applications or technologies to perform tasks such as executing application logic and exchanging data.
- A mechanism that converts business objects into representation objects and pushes these objects into the corresponding representation model. There is a specific adapter for each representation model: table, tree, equipment, and network.
- See network interface.
- A mechanism for connecting two unlike parts or machines, or for electrically or physically connecting a device to a computer or to another device.
In System i Access, a program that controls the operation of a communications adapter. For example, the twinaxial adapter handler controls the operation of a twinaxial adapter that is used to connect a personal computer to a System i platform for System i Access functions.
adapter load balancing
The ability of several adapters in a team to be active simultaneously, with the outbound-traffic load balanced across all the adapters in the team; spreading tasks among adapters improves performance by preventing uneven distribution of workload. If one adapter in the team fails, the outbound traffic is redistributed across the remaining active adapters in the team. See also teaming.
adaptive address space (AAS)
A flexible address space model that allows the developer to choose address space configurations to maximize performance. See also mostly global address space, mostly private address space.
adaptive code generation (ACG)
A technology that enables a program that uses processor features of a given system model to continue to work correctly when the program is moved to another system model that does not have all the processor features of the original model.
Data row compression that encompasses classic row compression and the compression that is provided by automatically maintained page-level dictionaries. See also classic row compression.
See adaptive session-level pacing.
adaptive session-level pacing
A form of session-level pacing in which session components exchange pacing windows that may vary in size during the course of a session. This allows transmission within a network to adapt dynamically to variations in availability and demand of buffers on a session-by-session basis. Session-level pacing occurs within independent stages along the session path according to local congestion at the intermediate and endpoint nodes. See also fixed session-level pacing, session-level pacing.
adaptive session pacing
See adaptive session-level pacing.
adaptive subfile backup
A type of backup that sends only changed portions of a file to the server, instead of sending the entire file. Adaptive subfile backup reduces network traffic and increases the speed of the backup.
See associated data.
See automatic dictionary creation.
See address constant.
A data authority that allows the user to add entries to an object; for example, to add job entries to a job queue or to add records to a file. See also delete authority.
- The information, in addition to encoding scheme identifier, code page and character set global identifiers, that is required to complete the definition associated with using particular encoding schemes. An example is the ranges of valid first bytes of double-byte code points in a PC Mixed single-byte and double-byte code.
- A specification that is required by an encoding scheme to complete its definition, which extends beyond the character set and code page elements.
- The second part of a two-part user identification used to send distributions.
- A unique code or identifier for a register, device, workstation, system, or storage location.
- Any point in a presentation surface that can be identified by a coordinate from the coordinate system of the presentation medium.
- In computer graphics, any point of a device that can be addressed. See also print position.
See addressable point.
See network address translation.
In Internet communications, the categorization by the part of an IP address that distinguishes the network address from the host address. Class A addresses allocate 7 bits to the network ID and 24 bits to the host ID. Class B addresses allocate 14 bits to the network ID and 16 bits to the host ID. Class C addresses allocate 21 bits to the network ID and 8 bits to the host ID. Class D addresses contain 1110 in the first 4 bits and identify the address as a multicast. The remaining 28 bits in the class D address specify a particular multicast group.
In X.25 communications, the optional International Telecommunication Union Telecommunication Standardization Sector (ITU-T)-specified facilities, available on networks that conform to the 1984 version of X.25.
In the Distributed Computing Environment (DCE), a set of related communication protocols that use a common addressing mechanism to identify end points, for example, the U.S. Department of Defense Internet Protocols.
The process that normalizes and standardizes address information to correct possible errors and transpositions and to enable optimal matching and linking between entities. Additional address correction software can be used to enhance the address hygiene process. See also data quality management, pipeline.
- The assignment of addresses to the instructions of a program.
- A method of identification in which the sending or control station selects the station to which it is sending data.
An XML document that CICS uses to store WS-Addressing message addressing properties (MAPs) before they are sent in SOAP request messages and after they are received in SOAP request and response messages.
A list that associates users' names with their network and user addresses. The xtalk command uses this list to make outgoing X.25 calls without the caller having to know the addresses. There is one address list for the system and one for each user.
Address Resolution Protocol (ARP)
A protocol that dynamically maps an IP address to a network adapter address in a local area network. See also gratuitous ARP, IP address takeover, IP address takeover via IP aliases, Reverse Address Resolution Protocol.
- A range of up to two gigabytes of contiguous virtual storage addresses that the system creates for the user. See also data space.
- The range of addresses available to a computer program or process. Address space can refer to physical storage, virtual storage, or both. See also allied address space, buffer pool, virtual address space.
address space control mode
The mode, determined by the program status word, that indicates where to find referenced data. Three types of address space control modes are primary, secondary, and access register. VTAM macroinstructions must be invoked in primary address space control mode. See also access register mode, primary mode.
See network address translation.
In data communications, a value used to define the format and contents of an address field. Address types are associated with the originator address, the recipient address, and the reply-to address information. The address types supported by a system are defined when the mail server framework is configured. The value associated with an address type must be unique.
See Activity Decision Flow.
See Active Directory group.
ad hoc inventory receipt
A record of physical inventory that arrived at a specific fulfillment center at a specific time, and was not expected inventory. See also inventory receipt.
ad hoc job
A job that is inserted into the current production plan. These jobs are unique to the plan, and are not saved in the database. See also plan.
ad hoc prompt dependency
A prompt dependency that is defined within the properties of a job or job stream and is unique to that job or job stream. See also prompt dependency.
ad hoc start event
An event that is triggered by a user's interaction with the process, such as through the process portal. The ad hoc start event requires an active process to be triggered. See also start event.
adjacent destination node
In OSI, a destination node that is also an adjacent node--that is, attached to the same subnetwork as the local node. See also nonadjacent destination node, relay open system.
adjacent link station (ALS)
In SNA, a link station directly connected to a given node by a link connection over which network traffic can be carried. Several secondary link stations that share a link connection do not exchange data with each other and therefore are not adjacent to each other. See also link station.
adjacent SSCP table (ADJSSCP)
A table that contains lists of the system services control points (SSCPs) that VTAM can be in session with or can use to reach destination SSCPs in the same network or in other networks. The table is filed in the VTAM definition library.
In an SNA network, two subareas connected by one or more links, with no intervening subareas. See also subarea.
See adjacent SSCP table.
A sequence of changes that are defined between a pair of statements such as setInsertionAdjusting(true) and setInsertionAdjusting(false) in order to optimize application performance.
See Advanced Distributed Learning.
See administration management domain.
See administrative domain.
In the WebSphere MQ Administration Interface (MQAI), a type of data bag that is created for administering WebSphere MQ by implying that it can change the order of data items, create lists, and check selectors within a message.
A scalable link that enables an administrator to move data between Contributor applications. An administration link can contain multiple applications and cubes as the sources and targets of the link.
administration notification log
A list of messages that helps an administrator to resolve minor issues. See also contact.
administration notification message
An alarm, error message, warning, attention message, or informational message that is written by the database manager, replication programs, user applications, or the health monitor to a notification file or event log. See also contact.
- The database and web interface that software asset managers use for maintaining information about license entitlements and instances of installed products.
- A server that contains the planning components package (COM+ package) and maintains control of the online application. The user connects to this machine when the Contributor Administration Console is first run.
A set of defined related privileges. When administrative authorities are granted to a person's ID, the person has all of the privileges that are associated with that administrative authority.
See administrative command-line interface.
- A program that runs on a file server, workstation, or mainframe that administrators use to control and monitor the server. See also backup-archive client.
- In OnDemand, the program that provides administrators with functions to maintain groups, users, printers, applications, application groups, storage sets, and folders.
administrative command-line interface (ACLI, administrative CLI)
A command-line interface used to administer all aspects of the SAN File System. The ACLI runs on all engines that host metadata servers and the administrative server.
administrative command schedule
A database record that describes the planned processing of an administrative command during a specific time period. See also central scheduler, client schedule, schedule.
- A collection of hosts and routers, and the interconnecting networks, that are managed by a single administrative authority.
- A logical collection of resources that is used to separate responsibilities and manage permissions.
- A logical collection of smaller scopes under a single administrator. For example, a WebSphere cell is an administrative domain that collects nodes and clusters for administrative purposes.
In OSI, an interactive, menu-driven utility provided by OSI Communications Subsystem with which users define and maintain their network layout, installed protocols, available application entities, and other information used by OSI Communications Subsystem.
A group of related computers. An administrator can create administrative groups to organize target systems into meaningful categories, and to facilitate deployment of software to multiple computers.
administrative privilege class
See privilege class.
A database that contains configuration, problem, change, and inventory information needed to administer the information system. The repository can be used to perform the functions of configuration management, problem management, and change management.
A set of servlets running within a customized instance of WebSphere Application Server that handles all administrative requests from the SAN File System console or from the administrative command line interface (ACLI). The administrative server also enforces administrative permissions, which restrict the use of tasks that are permitted for a specified administrator. See also SAN File System console.
A versioned object base (VOB) that contains global type objects. Local copies of global type objects can be created in any VOB that has an AdminVOB hyperlink to the administrative VOB that defines the global type object.
- A person responsible for administrative tasks such as access authorization and content management. Administrators can also grant levels of authority to users.
- In OnDemand, a person authorized to maintain the system. For example, an OnDemand administrator can add, update, and delete users and folders.
See administrative role.
See administration service.
- A policy decision that is applied initially to QoS reservation requests for controlling the admission of network traffic into the network. Admission control is the process of ensuring that the load on the network links is manageable.
- The process used by the server to ensure that its bandwidth needs are not compromised by new asset requests.
Authority given to the user by the object while the object is running. The object must be created with owner authority. These object types can have adopted authority: program, service program, and SQL package.
See Analog Display Services Interface.
See asymmetric digital subscriber line.
See automatic data set protection.
See automatic data set protection attribute.
advanced assistance level
The type of displays that provide the same functions as the intermediate assistance level. However, the displays contain as much information as possible by not displaying the allowed function keys and options.
Advanced Communications Function for Telecommunications Access Method (ACF/TCAM)
See Telecommunications Access Method.
Advanced Communications Function for the Network Control Program (ACF/NCP)
See Network Control Program.
Advanced Communications Function for the System Support Programs (ACF/SSP)
See System Support Program.
Advanced Communications Function for the Telecommunications Access Method (ACF/TCAM)
See Telecommunications Access Method.
Advanced Communications Function for Virtual Telecommunications Access Method (ACF/VTAM)
An IBM licensed program that controls communication and the flow of data in an SNA network. It provides single-domain, multiple-domain, and interconnected network capability.
Advanced Communications Function/Trace Analysis Program (ACF/TAP)
An SSP program service aid that assists in analyzing trace data produced by VTAM, TCAM, and NCP and provides network data traffic and network error reports.
advanced function common control unit (AFCCU, afccunit)
A controller that converts Intelligent Printer Data Stream (IPDS) into a presentation format that is usable by the COM and that transfers the setup data, document pages, and text-related information to COM.
Advanced Function Presentation (AFP)
A set of licensed programs, together with user applications, that use the all-points-addressable concept to print data on a wide variety of printers or to display data on a variety of display devices. AFP includes creating, formatting, archiving, retrieving, viewing, distributing, and printing information.
advanced function printing (AFP)
The ability of programs to use the all-points-addressable concept to print text and images on a printer. AFP supports Advanced function printing data stream (AFPDS), Intelligent printer data stream (IPDS) and SNA character string (SCS).
When implementing national language support, the addition of one or more of the following capabilities to a product: cultural sort, large character set (support for multibyte character set standards, such as Unicode or ISO/IEC 10646), multilingual option, character data integrity, linguistic functions such as spell checking, grammar, and hyphenation. See also basic implementation, linguistic function.
advanced intelligent network (AIN)
A telephone network that expands the idea of the intelligent network to provide special services more efficiently: for example, by giving users the ability to program many of the services themselves.
Advanced Peer-to-Peer Networking (APPN)
An extension to SNA that features distributed network control, dynamic definition of network resources, automated resource registration, and automated directory lookup. This network architecture supports the routing of data in a network between two or more Advanced Peer-to-Peer Communication (APPC) systems that do not need to be directly connected. See also network node.
Advanced Peer-to-Peer Networking end node
A node that provides a broad range of user services and supports sessions between its local control point (CP) and the CP in an adjacent network node. The node uses these sessions to dynamically register its resources with the adjacent CP (its network node server), to send and receive directory search requests, and to obtain management services. An APPN end node can also attach to other end nodes.
Advanced Peer-to-Peer Networking network node (APPN network node)
A node that offers a broad range of user services, including distributed directory services, intermediate routing services within an APPN network, and other services.
advanced printer function (APF)
A function of the Application Development ToolSet feature that allows a user to design symbols, logos, special characters, large characters, and forms tailored to a business or data processing application.
Advanced Program-to-Program Communication (APPC)
An implementation of the SNA LU 6.2 protocol that allows interconnected systems to communicate and share the processing of programs. See also APPC/MVS, LU type 6.2.
Advanced Program-to-Program Communication/IMS (APPC/IMS)
A part of IMS Transaction Manager that uses the common programming interface, which allows IMS application programs to communicate with other programs by using LU 6.2.
Advanced Radio Data Information Service (ARDIS)
A packet-switched network that provides a data rate of 19.2 Kbps and is known for its deep penetration into buildings. ARDIS is primarily used for field service and transportation applications.
Advanced Research Projects Agency (ARPA)
See Defense Advanced Research Projects Agency.
advanced shipment notification (ASN)
An electronic file that contains details about the smart meters, such as the meter serial number, attributes, pallet numbers, and box numbers. An ASN file is provided by the manufacturer in XML or text format.
Advanced System Management interconnect (ASM interconnect)
A feature of IBM service processors that enables users to connect up to 24 servers to one service processor, thus eliminating the need for multiple modems, telephones, and LAN ports. It provides such out-of-band management functions as system power control, service-processor event-log management, firmware updates, alert notification, and user profile configuration.
Advanced System Management interconnect network (ASM interconnect network)
A network of IBM servers created by using the ASM interconnect feature. The servers are connected through RS-485 ports. When servers containing integrated system management processors (ISMPs) and ASM processors are connected to an ASM interconnect network, IBM Director can manage them out-of-band.
Advanced System Management Interface (ASMI)
A graphical interface that is part of the service processor firmware. The ASMI manages and communicates with the service processor. The ASMI is required to set up the service processor and to perform service tasks, such as reading service processor error logs, reading vital product data, and controlling the system power.
Advanced System Management PCI adapter (ASM PCI adapter)
An IBM service processor that is built into the Netfinity 7000 M10 and 8500R servers. It also was available as an option that could be installed in a server that contained an ASM processor. When an ASM PCI adapter is used with an ASM processor, the ASM PCI adapter acts as an Ethernet gateway, while the ASM processor retains control of the server. When used as a gateway service processor, the ASM PCI adapter can communicate with other ASM PCI adapters and ASM processors only.
Advanced System Management processor (ASM processor)
A service processor built into the mid-range Netfinity and early xSeries servers. IBM Director can connect out-of-band to an ASM processor located on an ASM interconnect; an ASM PCI adapter, a Remote Supervisor Adapter, or a Remote Supervisor II must serve as the gateway service processor.
See daylight saving time.
- In Performance Tools, a tool used to analyze data collected by the performance monitor function of the operating system. The advisor analyzes a collection of performance data and produces a list of conclusions and recommendations to improve system performance.
- An application that provides a recommendation or suggestion that is based on input from the user. Advisors do not perform functions or change system values.
A type of lock that a process holds on a region of a file preventing any other process from locking the region or an overlapping region. See also enforced lock.
See application entity.
See AppleTalk Echo Protocol.
See Advanced Encryption Standard.
See application entity title.
See adapter foundation classes.
See authorized function control block.
See advanced function common control unit.
See advanced function common control unit.
A transformation that preserves colinearity, and ratios of distances within a line. Affine transformations include expansion, contraction, dilation, reflection, rotation, shear, and translation.
- In server processing, a property of a request that indicates how important it is that successive requests are allocated to the same server process and thread.
- An association between objects that have some relationship or dependency upon each other.
See Association fran?aise de normalisation.
AFP Conversion and Indexing Facility (ACIF)
An Advanced Function Presentation (AFP) program that converts a print file into a Mixed Object Document Content Architecture-Presentation (MO:DCA-P) document, creates an index file for later retrieval and viewing, and retrieves resources used by an AFP document into a separate file.
AFP statistics report (AFPSTATS)
A report that contains summary data about the resources used to print a document. The AFPSTATS report is used to indicate in which libraries PSF found a resource, diagnose some resource selection problems, obtain statistical data about how a print file is printed, and diagnose some print file printing performance problems.
See AFP statistics report.
An IBM product that assists application programmers in formatting printed output. Without requiring knowledge of the AFP data stream, AFP Toolbox provides access to sophisticated AFP functions through a callable C, C++, or COBOL interface. AFP Toolbox is available on OS/390, z/OS, AIX, and OS/400 platforms.
- A record of the contents of a data element after it has been changed. After-images are used for forward recovery.
- The contents of a record in a physical file after the data is changed by a write or an update operation.
- A business object that contains all of the entity data after changes have been made to it during an update operation. An after-image contains the complete business object rather than only the primary key and those elements that were changed. See also delta business object.
- See after-value.
A trigger that is specified to be activated after a defined trigger event (an insert, an update, or a delete operation on the table that is specified in a trigger definition). See also before trigger, instead of trigger, trigger, trigger activation, trigger activation time.
In data replication, the updated value of a source-table column after an SQL insert or update has been applied to the table. See also before-value.
To change one or more date values in order to simulate data from a different time, whether in the past or the future. Aging is accomplished by replacing the date with a date indicated by a literal, by changing only the year portion of a date value, or by incrementing or decrementing a date value by a specified number of days, weeks, months, and years. See also incremental aging, semantic aging, target aging.
- Any hardware component that is managed by the SiteProtector system. Hardware components include appliances, scanners, network sensors, server sensors, and desktop sensors.
- A thread on a server that manages the requests made by an application. See also engine dispatchable unit.
- A server program that receives virtual connections from the network manager (the client program) in an SNMP-TCP/IP network-managing environment. An agent is the interface to a managed device.
- An installed component that enables jobs to be run on a computer or a computer partition, provided that the computer or computer partition is also defined as a workstation in the Tivoli Workload Scheduler database. Agents can be standard, fault-tolerant, extended, or network. Specially configured agents are also used as backups for domain managers and the master domain manager.
- In Q replication, one of the threads of the Q Apply program that is started by the Q Apply browser. It receives transactions from the browser and applies this data to target tables. One or more agents can exist for each browser.
- The function that manages the parsing and routing of distributed data management (DDM) commands and replies.
- An entity that represents one or more managed objects by sending notifications regarding the objects and by handling requests from servers for management operations to modify or query the objects.
- A function that represents a requester to a server.
- A distributed process that executes data management services. Agents receive data management service requests from a management server.
- A process that performs an action on behalf of a user or other program without user intervention or on a regular schedule, and reports the results back to the user or program. See also common agent, subagent.
- In telephony, a customer service person whose job is to handle incoming or outgoing telephone calls.
- Software that is installed to monitor systems. An agent collects data about an operating system, a subsystem, or an application.
- A program that performs a series of automated tasks according to a set schedule or at the request of a user. An agent consists of three components: the trigger (when it acts), the search (what documents it acts on), and the action (what it does).
- In a two-phase commit sync pointing sequence, a task that receives sync point requests from an initiator.
- In the two-phase commit protocol, a node at the bottom of the transaction program network hierarchy.
- In a z/OS environment, the structure that associates all processes that are involved in a unit of work.
A daemon process that resides on each deployment host and provides the mechanism by which client applications either launch new host processes or attach to agents that coexist within existing processes on the host.
The identifier for a specific instance of the common agent software installed on a managed system. The agent ID is the same as the name of the directory in which the common agent software is installed. See also Globally Unique Identifier.
- A network service that provides authentication and authorization and that maintains a registry of configuration information about the common agents and resource managers in a user's environment.
- A manager that manages the command and control activities of agents, such as the command to start or stop collecting event data.
agent private memory
Memory that is allocated for a database agent when the agent is assigned as the result of a connect request or a new SQL request in a parallel environment. The memory is used only by the specific agent. See also private sort.
In systems management, a role assumed by a user in which the user is capable of performing management operations on managed objects and of emitting notifications on behalf of managed objects.
- A structured collection of data objects that form a data type. See also zFS aggregate.
- In Transaction Tracking, a node in a transaction topology.
- In C++, an array or a class with no user-declared constructors, no private or protected non-static data members, no base classes, and no virtual functions.
- An average of all response times that are detected by the monitoring software over a specific time period.
- An object, stored in one or more storage pools, consisting of a group of logical files that are packaged together. See also logical file, physical file.
- A calculation that returns a single result value from several relational data rows or dimensional members. Typical examples are total and average.
- To collect related information for processing and analysis.
aggregate analysis engine
An analysis engine that is implemented by configuring a collection of component analysis engines. See also analysis engine.
aggregate backup and recovery support (ABARS)
A function that backs up a user-defined related group of data sets, called an aggregate, and recovers those data sets on the same system or on a recovery system.
Total throughput, in megabits per second, that moves through a server or server subsystem. See also throughput.
See aggregated installable unit.
A function that optionally accepts arguments and returns a single scalar value that is the result of an evaluation of a set of like values, such as those in a column within a set of one or more rows. See also function, routine.
- In DFSMShsm, a collection of related data sets and control information that has been pooled to meet a defined backup or recovery strategy.
- A collection of data objects that form a data type, so that the data can be referred to collectively or individually. Aggregate group is used in conjunction with the storage of direct access storage device (DASD) data, not within an object access method (OAM) environment.
aggregate line speed
The maximum possible speed that data can be transmitted using a communications controller. The speed is determined using the sum of the speeds of the communications lines attached to the communications controller.
A metric that is calculated by finding the average, maximum, minimum, sum, or number of occurrences of an instance metric across multiple runs of a process. Examples of aggregate metrics are an average order amount, a maximum order amount, a minimum order amount, the total order amount, or the number of occurrences of $500 for an order amount. See also measure, metric.
Any object that contains child objects. Because an aggregate object is not monitored directly, it does not receive events directly. Rather, it receives only the events that are propagated by its children. See also real object.
The relationship among top level artifacts in an application diagram. These are computed from the relationships among lower level artifacts. The number of aggregate relationships is less than the total number of primary relationships.
A separate aggregate function that can be set up for use in specific dimensions to override the regular aggregate. See also multidimensional aggregation, multilevel aggregation, regular aggregate.
In SQL replication, a read-only replication target table that contains aggregations of data from the source table. This data is based on SQL column functions such as MIN, MAX, SUM, and AVG.
A threshold that applies to a group of activities. If an activity in that group exceeds the boundary set by the threshold, the corresponding action is applied to that activity. See also activity threshold.
A transaction topology that displays all known and implied transactions that might not all be related. See also instance topology.
- See import.
- A setting in an internal event trigger that determines which type of product entity is affected by the disposition action.
- The process of reading data across one level in a hierarchy or auto-level hierarchy and summarizing it. See also multidimensional aggregation, multilevel aggregation.
- The process of collecting, interpreting, and sorting data from various locations into a single file.
- The structured collection of data objects for subsequent presentation within a portal.
- An association that models a whole-part relationship between an aggregate (the whole) and its parts.
An agent that stores the tracking data from multiple Data Collector plug-ins and other monitors and computes aggregates for use by the Transaction Reporter. Aggregation agents include the Transaction Col-lector and Web Response Time agent.
In UML modeling, a relationship that depicts a classifier as part of, or as subordinate to, another classifier. See also composition relationship.
- A program that regularly scans a set of sources and presents a summary of information.
- A software component responsible for displaying the navigation and portlets available to a user.
See agile software development.
agile software development
A software design philosophy that promotes teamwork, customer involvement, user centered design and the separation of larger projects into many smaller projects. This approach is much more flexible than traditional models of software design because of the ability to reform design following early user feedback.
See application group name.
See Authentication Header.
See application interface block.
See asynchronous index cleanup.
See attention identifier key.
See application identity mapping.
See advanced intelligent network.
Aircraft Industry Computer-Based Instruction Consortium (AICC)
A body responsible for maintaining standards for computer-managed instruction. AICC also refers to the format meeting these standards that is often used in online courses and is supported by many e-learning products.
See autoinstall terminal model.
AIX 5L operating system
IBM's implementation of the UNIX operating system. AIX 5L is particularly suited to support technical computing applications, including high function graphics and floating point computations.
A software graphical user interface environment based on OSF/MOTIF consisting of the AIXwindows Toolkit, graphics libraries, window manager, and desktop running on a compatible operating system.
An object-oriented collection of C language data structures and subroutines that supplement the Enhanced X-Windows Toolkit and simplify the creation of interactive client-application interfaces. See also Enhanced X-Windows Toolkit.
See arbitrated loop physical address.
A language (APL)
A programming language based on mathematical notation that is used to develop application programs. A is particularly useful for commercial data processing, system design, mathematical and scientific computation, database applications, and teaching mathematics.
- An audible or visual signal at a device, such as a display station or printer, that is used to notify the user that a predefined condition exists.
- Any condition that DirectTalk considers worthy of documenting with an error message. Strictly speaking, the term alarm should include only red (immediate attention) and yellow (problem situation) conditions, but it is also used to refer to green (a red or yellow message has been cleared) and white (information) conditions.
See response level.
The compressing and expanding algorithm used in Europe, Latin America, and other countries when converting from analog to digital speech data. See also mu-law.
- To cause the user's terminal to give some audible or visual indication that an error or some other event has occurred.
- An informational event that requires user action. See also event.
- A message or other indication that signals an event or an impending event. See also attribute alert, role alert.
- A notice that describes replication events and conditions. The Replication Alert Monitor sends alerts to an email address or to a pager.
A character that in the output stream causes a terminal to alert its user by way of a visual or audible notification. The alert character is the character designated by a '\a' in the C and C++ languages. It is unspecified whether this character is the exact sequence transmitted to an output device by the system to accomplish the alert function.
alert ID number
A value created from specific fields in the alert using a cyclic redundancy check. A focal point uses this value to refer to a particular alert, for example, to filter out duplicate alerts.
alert standard format
A specification created by the Distributed Management Task Force (DMTF) that defines remote-control and alerting interfaces that can best serve a client system in an environment that does not have an operating system.
An object consisting of alert descriptions that define the contents of a Systems Network Architecture (SNA) alert for particular error conditions. The system-recognized identifier for the object type is *ALRTBL.
See access list entry token.
A process by which service providers can define the mapping of Uniform Resource Identifier (URI) algorithms to cryptographic algorithms that are used for XML digital signature and XML encryption.
- An alternative name used instead of a primary name.
- An assumed or actual association between two data entities, or between a data entity and a pointer.
- A pointer to another directory object. Aliases can be used within LDAP to reference entries anywhere within the directory tree.
- The user name for a server in an implementation repository.
- In EGL generation, a name that is placed in the output source file in place of the name that was in the EGL source code. In most cases, the original name is aliased because it was not valid in the target generation language.
- An alternative name for an integrated catalog facility (ICF) user catalog, a file that is not a Virtual Storage Access Method (VSAM) file, or a member of a partitioned data set (PDS) or a partitioned data set extended (PDSE).
- In an internet, a name assigned to a server that makes the server independent of the name of its host system. The alias must be defined in the domain name server.
- An alternative name used to identify a database, a module, a nickname, a sequence, a table, a view, or another alias. An alias can be used in SQL statements to refer to an object in the same DB2 system or subsystem or in a remote DB2 system or subsystem. See also alias chain, database name, public alias, server name.
- In an SQL query or in a form-specification file, a single-word temporary alternative name that is used in place of a qualified table name (for example, t1as an alias for owner.table_name). Aliases are often used in complex subqueries and are required for a self-join.
An alternative address for a network interface that can be used in place of the real address. See also network address translation.
- One or more address identifiers that can be recognized by a node port (N_port) in addition to its N_port identifier. Alias address identifiers are used to form groups of N_ports so that frames can be addressed to a group rather than to individual N_ports.
- A set of alternative volume addresses for a single volume that are used in the parallel access volume (PAV) function.
An arbitrated loop physical address (AL_PA) value recognized by a loop port (L_port) in addition to the AL_PA assigned to the port. See also arbitrated loop physical address.
A series of aliases that refer to one another in a sequential, non-repeating fashion; that is, cycles are not allowed. See also alias.
- In TCP/IP host table processing, a process used to convert internet addresses to host names or host names to internet addresses.
- In a TCP/IP Simple Mail Transfer Protocol (SMTP) application, a process used to convert SNA distribution services (SNADS) names in the origin and destination fields of a distribution to SMTP names. System and personal are the two types of aliasing on the System i platform.
- A capability of TCP/IP that allows multiple IP addresses to be configured on a physical network interface. The second and subsequent addresses on an interface are the alias addresses. See also IP address takeover, IP address takeover via IP aliases.
- A compilation process that attempts to determine what aliases exist, so that optimization does not result in incorrect program results.
A name that is used to represent all or part of a command. See also name translation.
A WebSphere MQ object, the name of which is an alias for a base queue or topic that is defined to the local queue manager. When an application or a queue manager uses an alias queue, the alias name is resolved and the requested operation is performed on the associated base object.
alias queue object
A WebSphere MQ object, the name of which is an alias for a base queue defined to the local queue manager. When an application or a queue manager uses an alias queue, the alias name is resolved and the requested operation is performed on the associated base queue.
An object authority that allows the user to perform all operations on the object except those limited to the owner or controlled by authorization list management authority. The user can control the object's existence, specify the security for the object, and change the object. See also exclude authority.
A long-term partnership formed between IBM and one or more other companies to develop and deliver a technology, product, or service. The participants in an alliance share the risks, the benefits, the revenue, and the expenses.
- An area of storage that is external to DB2 and that is connected to DB2. An allied address space can request DB2 services. See also address space, address space connection.
- A z/OS address space that is connected to WebSphere MQ for z/OS.
An agent that represents work requests that originate in allied address spaces. See also system agent.
- To assign a resource to a specific task.
- In Network Computing System (NCS), to create a Remote Procedure Call (RPC) handle that identifies an object.
allocate data set
In aggregate backup and recovery processing, a data set name that is listed in the selection data set. The space for this data set is allocated and the data set is cataloged at the recovery location, but the actual data is not restored.
For variable-length character fields or variable-length graphic fields, the length that indicates the portion of the variable-length field that should be reserved in the fixed portion of the physical file member.
The space that is allocated to volumes but is not yet assigned. See also assigned storage.
- The distribution of data, specified at a summary level of a dimension, to lower levels. For example, the measures used to forecast quarterly sales revenue can be distributed to the month and day levels.
- The establishing of correspondences between a given logical structure and a given physical structure.
- The process of temporarily connecting a program to a data set, file, or device.
- The assigning of various types of programs and record categories to system storage locations, such as main storage or disk storage.
A data structure that represents a hierarchical relationship among transaction programs and other resource managers in a two-phase commit operation. The root node of the tree is the application that starts the transaction, which may not be the initiator of the commit request in a peer-to-peer communication protocol like LU 6.2.
The capability to address, reference, and position text, overlays, and images at any defined position or picture element (pel) on the printable area of a page. This capability depends on the ability of the hardware to address and to display each picture element.
Able to address, reference, and position text, overlays, and images at any defined position or picture element (pel) on the printable area of the paper. This capability depends on the ability of the hardware to address and to display each picture element.
all-points addressable (APA)
Able to address, reference, and position text, overlays, and images at any defined position or picture element (pel) on the printable area of the paper. This capability depends on the ability of the hardware to address and to display each picture element.
See broadcast address.
See allied address space.
See application lifecycle management.
Pertaining to the set of letters and symbols, excluding digits, used in a language. This set usually consists of the uppercase and lowercase letters plus special symbols (such as $ and _) allowed by a particular language.
A letter or other symbol, excluding digits, used in a language. Usually the uppercase and lowercase letters A through Z plus other special symbols (such as $ and _) allowed by a particular language.
alphanumeric weight (AW)
In cultural sorting, the sort weight value attributable to a basic letter such as a, b, and c. See also case weight, diacritical weight, indifferent weight, level 1, mark weight, special weight.
An indicator that is in the attach function management header. The indicator means that the ID-password confirmation has already been verified. Therefore the conversation request is sent with a user ID but without a password.
See adjacent link station.
The key to the left of the space bar on a keyboard. Some keyboards also have an Alt key to the right of the space bar. Alt keys are usually combined with other keys to produce different functions.
The subsystem that is prepared to take over a particular active application's extended recovery facility (XRF) sessions with terminal users in case the application fails. See also active application.
A twinaxial console that acts as a backup console and is used only to determine why the system console failed. An alternate console cannot be used to install the system. The alternate console can manage the system only when the system console is defined as the twinaxial console during a manual IPL. See also backup console, twinaxial console.
- In a cube, an alternate path within a dimension that leads to child categories.
- An alternate path traced from the root category, through a drill category, leading to a low-level category. Certain tasks, such as partitioning and allocating, cannot be performed on alternate drill-down paths.
alternate entry point
A load module or program object alias for which the entry point is not the primary entry point. Other program attributes can differ within a defined alias from those of the primary entry point. See also primary entry point.
In distributed transaction programming, an IRC or SNA session that is obtained by a transaction by means of an ALLOCATE command. See also principal facility.
alternate Hardware Management Console (alternate HMC)
A System z Hardware Management Console (HMC) that is paired with the primary HMC to provide redundancy. See also Hardware Management Console, primary Hardware Management Console.
See special category.
See alternate Hardware Management Console.
- For VSAM key-sequenced data sets and entry-sequenced data sets, an index of alternate keys that provides a path for secondary access to the data set. If the records have alternate keys, the alternate index is built when the data set is created. See also secondary index.
- In CICS, an index based on an alternate key. It allows the file to be processed in a secondary key order.
- A subordinate index in a hierarchy of indexes.
- In z/OS Virtual Storage Access Method (VSAM), a collection of index entries related to a given base cluster and organized by a key other than the prime key of the associated, base-cluster, data records. An alternate index provides an alternate directory for locating records in the data component of a base cluster.
In the Virtual Storage Access Method (VSAM), a catalog entry that contains information about an alternate index. An alternate-index entry points to a data entry and an index entry to describe the alternate index's components, and to a cluster entry to identify the alternate index's base cluster. See also alternate-index record, base cluster, cluster entry.
In the Virtual Storage Access Method (VSAM), a collection of alternate-index entries used to sequence and locate one or more data records in a base cluster. Each alternate-index record contains an alternate-key value and one or more pointers. When the alternate index supports a key-sequenced data set (KSDS), the pointer is the prime key value of each data record. When the alternate index supports an entry-sequenced data set (ESDS), the pointer is the relative byte address (RBA) value of the data records. See also alternate key, alternate-index entry, key.
alternate installation device
A tape device that is used to load Licensed Internal Code from the tape device to the load-source disk unit during a restore or installation operation. The alternate installation device can be on a different bus unit or on a different input/output processor (IOP) than the load-source disk unit.
alternate installation IPL
A special type of installation IPL (a D-mode IPL) in which the system uses the installation device to IPL itself. The system then copies the Licensed Internal Code from the alternate installation device to the load-source disk unit.
The process of loading code into main storage from a designated input/output device instead of from the load-source disk unit for the system, and of preparing for system operations. An alternate IPL is a type D IPL.
The internal resource lock manager (IRLM) supporting the alternate IMS subsystem in an Extended Recovery Facility (XRF) complex. See also active IRLM.
- In VSAM, a field, other than the primary key, of fixed length and position in a record. A set of alternate keys is used to build an alternate index that provides an alternative or secondary path for access to the data set. There can be any number of alternate keys in a record and they need not be unique.
- In z/OS Virtual Storage Access Method (VSAM), one or more bytes within a data record used to identify the data record or control its use. Unlike the prime key, the alternate key can identify more than one data record. It is used to build an alternate index or to locate one or more base data records using an alternate index. See also alternate-index record, key field.
Any of the keyboard layers which is not automatically invoked when the keyboard is powered on (see IBM Corporate Standard C-S 2-0161-008: Keyboard National Requirements). See also primary layer, secondary group layout.
alternate mark inversion (AMI)
A T1 line coding scheme in which binary 1 bits are represented by alternate positive and negative pulses and binary 0 bits by spaces (no pulse). The purpose is to make the average dc level on the line equal to zero.
A channel that an operation can use after a failure. See also primary path.
alternate path retry (APR)
A facility that allows a failed I/O operation to be retried on another channel assigned to the device performing the I/O operation. It also provides the capability to establish other paths to an online or offline device.
See alternate program communication block.
alternate program communication block (alternate PCB)
A telecommunication-program program communication block (TP PCB) that is defined by the user and can be used to describe output message destinations other than the terminal that originated the input message. See also alternate response PCB, express alternate PCB, input/output program communication block, modifiable alternate PCB.
alternate response PCB
A program communication block (PCB) that defines a logical terminal and can be used instead of the I/O PCB when required to direct a response to a terminal in response mode, conversational mode, or exclusive mode. See also alternate program communication block.
alternate tape volume
In DFSMShsm, copies of original tape volumes created during tape copy processing. The volumes can be stored either on-site or off-site for use later in the event of a disaster. During the tape-replacement processing, these volumes can replace the original volumes that might be lost.
alternate tape volume reference
In DFSMShsm, additional fields in the tape table of contents (TTOC) record that contain information about the alternate tape volume. These fields provide the information necessary to refer to the alternate tape volume.
alternate TP PCB
In IMS, a PCB that defines an alternate destination (a logical terminal or a message program) and that can be used instead of the I/O PCB when it is necessary to direct a response to a terminal. The existence of alternate PCBs in the PSB affects the PCB number used in the PCB keyword in an EXEC DLI application program.
alternate user authority
The ability of a user ID to supply a different user ID for security checks. When an application opens a WebSphere MQ object, it can supply a user ID on the MQOPEN, MQPUT1, or MQSUB call that the queue manager uses for authority checks instead of the one associated with the application.
A display device assigned by the operating system to function as the console if the console is not working. The system searches for an alternative console when contact with the system console fails.
In System i Access, an operation that defines a different set of characters or functions for the keyboard when the Alt key is pressed; for example, the Backspace key may represent the clear function when the Alt key is pressed.
alternative text (alt text)
Text that is placed within the IMG element to describe the purpose of the image. If the image is not displayed, the alternative text can be presented instead. See also long description.
alternative transport class
In OSI, a transport class that an application entity will accept for use in an association. See also preferred transport class.
The key to the right of the space bar on a keyboard. Alt-Gr keys provide access to characters engraved on the front face of a key. Alt-Gr keys are usually combined with other keys to generate different graphic characters.
See alternative text.
See arithmetic logic unit.
See agile modeling.
See arbitrary MAC addressing.
In three-dimensional graphics, light that reflects off one or more surfaces in the scene before arriving at the target surface. Ambient light is assumed to be nondirectional, and is reflected uniformly in all directions by the reflecting surface. In Graphics Library, ambient light is simulated by use of ambient terms in the lighting equation, rather than computing the reflections.
See Autonomic Management Engine.
American National Standards Institute (ANSI)
A private, nonprofit organization whose membership includes private companies, U.S. government agencies, and professional, technical, trade, labor, and consumer organizations. ANSI coordinates the development of voluntary consensus standards in the U.S.
American Standard Code for Information Interchange (ASCII)
A standard code used for information exchange among data processing systems, data communication systems, and associated equipment. ASCII uses a coded character set consisting of 7-bit coded characters. See also Extended Binary Coded Decimal Interchange Code.
See advanced management module.
See addressing mode.
See Advanced Mobile Phone Service.
See authority mask register.
See Action Message Retention Facility.
See address mapping table.
Pertaining to data that consists of continuously variable physical quantities. See also digital.
Analog Display Services Interface (ADSI)
A Bellcore signaling protocol used with existing voice networks. ADSI supports analog transmission of voice and text-based information between a host or switch, voice mail system, service bureau, or similar, and a subscriber's ADSI-compatible screen telephone. A single voice-grade telephony channel is shared between voice and data, using a technique by which the channel is taken over for the transmission of modem-encoded data.
An abstraction of a role played by a design element in the system, typically within the context of a use-case realization. Analysis classes can provide an abstraction for several roles, representing the common behavior of those roles.
A database that InfoSphere Information Analyzer uses when it runs analysis jobs and where it stores the extended analysis information. The analysis database does not contain the InfoSphere Information Analyzer projects, analysis results, and design-time information; all of this information is stored in the metadata repository.
In real-time analysis, a definition of the evaluations to be performed on specified CICS resources, the intervals at which those evaluations are to be performed, and the actions to be taken when a notif condition occurs.
A program that analyzes artifacts, such as documents, and infers information about them. See also aggregate analysis engine, custom text analysis engine, hybrid analysis engine, loosely coupled analysis engine, primitive analysis engine, tightly coupled analysis engine.
analysis point monitoring (APM)
In real-time analysis, resource monitoring across multiple CICS system within a CICSplex that results in a single notification of a condition, rather than one notification for each system.
The autonomic manager component that correlates and models complex situations to understand the current system state. See also autonomic manager.
- In Enhanced X-Windows, a widget that has inferior widgets. In other words, an ancestor is the superior or predecessor of an inferior widget. If W is an inferior of A, then A is an ancestor of W.
- A member that exists at a higher level than another member in a hierarchy and is connected by a series of parent-child relationships.
- The object from which another object derives its attributes.
- The first item that is clicked when using multiple select actions to select a range of items.
- An agent that enables discovery programs to access data from machines that have firewalls or another kind of protections.
In the GUI designer tool suite of VisualAge RPG (a feature of the WebSphere Development Studio Client licensed program), when the user has selected a group of controls in the design window, the attributes of the anchor control, such as position, size, and alignment, are applied to the other selected controls in the group.
See auxiliary equipment.
A step in the workflow that acts as a collector for an AND-split step. An AND-split step results in the workflow simultaneously following multiple routes; the AND-join step subsequently brings the workflow back into a single path.
See automatic number identification.
See simulated annealing.
annotated XML schema
An XML schema composed of XML schema documents that use annotation elements and attributes that are specific to XML document decomposition. An annotated XML schema is used by decomposition procedures to specify the mapping of XML data to database tables and columns.
- An added descriptive comment or explanatory note.
- A graphical object drawn by the renderer to add additional information about a given data point.
- In speech recognition, an alphanumeric string used to mark a grammar when it is defined. When the grammar is used in an application, both the word and the alphanumeric string are returned to the application.
- Information about a span of text. For example, an annotation could indicate that a span of text represents a company name. In the Unstructured Information Management Architecture (UIMA), an annotation is a kind of feature structure. See also Common Analysis Structure.
A tag that can be inserted into source code like a Javadoc comment. In EJB beans they provide metadata that is used to generate other application artifacts. See also doclet.
An Anonymous Resolution component that performs data quality management processes and then applies an industry-standard cryptographic one-way hash to anonymize the data into a unique value that is mathematically indecipherable and irreversible. See also hashing algorithm.
An organization that has a license for Anonymous Resolution and runs the anonymizer to anonymize the data. Anonymizer sites belong to an Anonymous Resolution group. See also Anonymous Resolution group, resolver site.
See automatic network routing.
See American National Standards Institute.
ANSI carriage control character
A character that specifies that a write, space, or skip operation should be performed before printing the line that contains the carriage control. ANSI carriage control characters are encoded in ASCII or EBCDIC.
ANSI control character
A control character as defined by the FORTRAN standards of American National Standards Institute (ANSI) and International Organization for Standardization (ISO). It appears at the beginning of each record.
To apply techniques to smooth the edges of lines after scan conversion. Common techniques include adjusting pixel positions or setting pixel intensities according to the percent of pixel area coverage at each point.
A technique used to smooth the edges of lines and polygon edges after scan conversion. Common techniques include adjusting pixel positions or setting pixel intensities according to the percent of pixel area coverage at each point.
In CICS, the acquisition at task initialization time of one or more consecutive pages in real storage for a task's TCA and data areas. Anticipatory paging can be used to have asynchronous paging of the task control and work areas (TCA/TWA), associated task data areas, and program storage associated with the task.
A resource distribution policy for service labels on IPAT via IP aliases networks to ensure that all resources of this type are allocated on the first physical resource that is not already serving, or serving the least number of, a resource of the same type. See also collocation, distribution preference.
- An example of an inferior design solution that is commonly made by developers. They are used to reinforce better planning during the development process as well as provide a problem solving reference point.
- An inferior process pattern that teams follow or a design solution that teams commonly make. Antipatterns are used to reinforce better planning and provide a problem solving reference point.
Communication between a single sender and the nearest receiver in a group. See also unicast.
An IBM implementation of the Multiprotocol Transport Network (MPTN) architecture, such as AnyNet/2 and AnyNet/MVS. AnyNet capability allows applications and associated services that use application programming interfaces, such as sockets, ICF, or CPI-Communications, the flexibility to use alternative network protocols, such as SNA or TCP/IP, and a variety of subnetwork types, such as a LAN, frame-relay, and ISDN.
AnyNet product family
A group of IBM products that implement the multiprotocol transport networking (MPTN) architecture, thus enabling application programs to communicate independently of the underlying network transport protocol.
The Language Environment heap controlled by the ANYHEAP runtime option. It contains library data, such as Language Environment control blocks and data structures not normally accessible from user code. The anywhere heap may reside above 16MB.
See Automated Operator.
See Automated Operator Interface.
See application-owning region.
See authorized program analysis report.
See Application Program Driver.
See application-layer protocol data unit.
See application programming interface.
A user-written program that monitors or modifies the function of an MQI call. For each MQI call issued by an application, the API exit is invoked before the queue manager starts to process the call and again after the queue manager has completed processing the call. The API exit can inspect and modify any of the parameters on the MQI call.
See A language.
See analysis point monitoring.
See Advanced Program-to-Program Communication/IMS.
A session environment in support of LU 6.2 transaction scheduling and communications. APPC/MVS is the MVS implementation of APPC. See also Advanced Program-to-Program Communication.
A component that receives logging requests from a logger and writes log statements to a specified file or console. See also logger.
AppleTalk Address Resolution Protocol (AARP)
In AppleTalk networks, a protocol that (a) translates AppleTalk node addresses into hardware addresses and (b) reconciles addressing discrepancies in networks that support more than one set of protocols.
AppleTalk Echo Protocol (AEP)
In AppleTalk networks, a protocol that provides a node destination test function by means of a send and receive transaction where the packet received at the source node is identical to the packet sent to the destination node.
AppleTalk Transaction Protocol (ATP)
In AppleTalk networks, a protocol that provides client/server request and response functions for hosts accessing the Zone Information Protocol (ZIP) for zone information.
- A drop-in network device, including hardware and firmware, that simplifies IT deployment for a specific set of business requirements.
- An inline security device on a network or gateway. Depending on the type of appliance, it can provide any combination of intrusion detection and prevention, antivirus, anti-spam, virtual private networking (VPN), web filtering, and firewall functions.
- A stand-alone hardware device or software environment that is dedicated to a specific task. See also virtual appliance.
- In OnDemand, an object that describes the physical attributes of a report or input file, such as the type of data found in the input file, the code page, and whether the input data contains carriage control characters. An application also contains instructions that the data indexing and loading programs use to process the input data.
- An object that functions as a virtual folder to organize shortcuts to other objects, external files, and URLs in a logical, job-specific or project grouping.
- A measurable and controllable unit of work that completes a specific user task, such as the running of payroll or financial statements. The smallest entity that an application can be broken down into is an operation. Generally, several related operations make up an application.
- One or more computer programs or software components that provide a function in direct support of a specific business process or processes. See also application monitoring, application server, multitiered application.
The process of creating an enterprise archive (EAR) file containing all the files related to an application as well as an Extensible Markup Language (XML) deployment descriptor for the application.
Application Assembly Tool
See Application Server Toolkit.
During the save-while-active operation, a point in time when all of the objects that a particular application is dependent on are: 1) at a consistent state in relationship to each other, and 2) in a state where the application can be started or started again.
- A program that is installed on a system to protect an application. The server provides backup services to an application client.
- In Java EE, a first-tier client component that runs in its own Java virtual machine. Application clients have access to some Java EE platform APIs, for example JNDI, JDBC, RMI-IIOP, and JMS. (Sun)
application client module
A Java archive (JAR) file that contains a client that accesses a Java application. The Java application runs inside a client container and can connect to remote or client-side Java EE resources.
- An object that provides access to common contextual data (such as the locale or the current user) and services (such as the URL access service or the class manager).
- In OSI, a set of rules for two application entities to use for an association that provides a means for agreement on the type of processing to be done. Included are the set of application service elements and their options that are to be used for the association. The application context is negotiated by the ACSE when it establishes the association.
- The filtering options defined in the capture specification for application events. These options define the environment for the event capture.
application context name
In OSI, a name that specifies the application context to be used for an association and the kind of work that an application does. In OSI, application context names are in object ID format. For applications that are defined by the ISO, such as FTAM, the ISO specifies application context names. For other applications, the application context names are specified by the user.
application control block (ACB)
A control block that is created from the output of DBD and PSB generation and placed in the ACB library for use during online and database batch (DBB) region type execution of IMS.
- A PowerHA SystemMirror entity that manages an application included in a resource group. The application controller specifies the scripts to start, stop, and (optionally) monitor an application. See also application.
- See objective analyzer.
Application data in a message for which the user application defines the meaning. See also built-in format.
application delivery notification
A delivery notification that is passed to an application. Typically, an application delivery notification is based on a network delivery notification, for example a FileAct delivery notification, but has been modified in some way by the service that exchanges data directly with the application. See also FileAct delivery notification.
Application Development Toolset
A feature of the WebSphere Development Studio licensed program that provides an integrated set of application development tools, or utilities, to be used by programmers, analysts, and support personnel. This package includes the following utilities: programming development manager (PDM), source entry utility (SEU), file compare and merge utility (FCMU), interactive source debugger (ISDB), screen design aid (SDA), data file utility (DFU), report layout utility (RLU), and advanced printer function (APF). In addition, the character generator utility (CGU) is added to the package if the user's system supports the double-byte character set (DBCS).
CICS domain that contains several major components, including application and system services, intercommunication (ISC and MRO), system control, and reliability. Application programs run in this domain. Most application domain functions are either provided by modules that are an integral part of the CICS system and are loaded at system initialization, or they are system application programs that are loaded as needed, in the same way as user applications.
- In Open Systems Interconnection (OSI), the part of an application process that contains the OSI communications functions. Application entities can have more than one application association. See also application entity title.
- A logical grouping of application data into a unit with a discrete function, such as a case, contract, contact, or item. An application data entity is the way an application organizes data in database tables into units or objects that correspond to business functions.
- An independent, self-contained, distinct set of software components that perform specific tasks.
application entity common name
In OSI, a user-defined character string recommended by ISO for identifying an application entity. The application entity common name is part of the distinguished name of an application entity and must be unique within its next higher-level object--the application process common name.
application entity descriptor
In OSI, information that identifies an application entity to OSI Communications Subsystem. The application entity descriptor also specifies the default application mode to be used for associations that are established by the application entity.
application entity environment
In OSI, an environment that OSI Communications Subsystem establishes when an application entity identifies itself to OSI Communications Subsystem. The OSI Communications Subsystem requires that an application entity environment be established before an application entity can be activated. See also application entity identifier.
application entity ID
See application entity identifier.
application entity identifier (application entity ID)
In OSI, a parameter that identifies a particular application entity to the programming interface. The programming interface returns the application entity identifier when the customer program builds an application entity environment. The customer program then uses the application entity identifier to identify itself to OSI Communications Subsystem on later calls. See also application entity environment.
application entity title (AE title)
In OSI, an identifier for an application entity that supplements the generic information in the application context name. Application entity titles are represented as distinguished names, and can also be optionally represented as object IDs. In object ID form, the application entity title consists of an application process title and an optional application entity qualifier. See also application entity, application process title.
- An operation that modifies an application entity and is of interest to the WebSphere business integration system. See also event, event detection.
- A type of business event that contains application data. See also business event.
- Any of the events defined by HATS except the recognition of a host screen, such as connect, disconnect, start and stop.
An application development tool that creates applications, application components (panels, data, databases, logic, interfaces to system services), or complete application systems from design specifications.
- A set of applications that share the same directory. A user can logon to any of the applications in the application group using the same user name.
- In CDE, an Application Manager folder that contains a specific software application or set of software applications.
- An application description that holds run cycle and calendar information for standard applications or job descriptions that have been defined as a member of the group.
- A unique string that is generated when an application connects to a database or when DB2 Connect receives a request to connect to a Distributed Relational Database Architecture database. This ID is known on both the client and the server and can be used to correlate the two parts of the application.
- The name of an application (for example, PAYROLL or DAILYJOBS).
- A unique identifier for an application in a Remote Procedure Call (RPC) that is sent in a distributed environment.
Program data that can be reused by multiple applications, such as collation tables, transliteration rules, and names of date and time elements. Application-independent data is usually managed so as to be available to multiple programs that might need it.
application infrastructure virtualization
The pool of application server resources that separates applications from the physical infrastructure on which they run. As a result, workload can be dynamically placed and migrated across the application server pool.
application interface block (AIB)
An area in user-defined storage that is passed to IMS for DL/I calls that use the AIBTDLI interface. Application programs can use the AIB to communicate with IMS by using a PCB name instead of a PCB address.
A set of buttons or links representing HATS application-level functions. See also host keypad.
In the Open Systems Interconnection (OSI) reference model, the layer that provides means for application processes residing in open systems to exchange information and that contains the application-oriented protocols by which these processes communicate.
application lifecycle management (ALM)
An iterative and continuous process of coordinating people, processes, and tools in software activities, with the goal of delivering a software project. This process involves planning and change management, requirements definition and management, architecture management, software configuration management, build and deployment automation, application security, and quality management. The features of this process include traceability across lifecycle artifacts, process definition and enactment, and reporting.
In the OSI Communications Subsystem licensed program, a set of values that represent the communications services requested when establishing an association. If the application entity uses the presentation layer services, the application mode specifies both presentation layer and session layer values; if the application entity uses the session layer services, the application mode specifies session layer values only. The application mode also indicates the transport mode to be used for an association.
A component that monitors pipeline errors, status, and statistics and that sends routing information to pipelines. The application monitor is installed with the pipeline, however it can be installed separately as well.
A function that monitors applications and that restarts the applications when a problem is detected. See also application.
In System Manager, a group of one or more loads, one of which must be a code load. An application option is an independent piece of an application program that may or may not be used with the base application program.
application-owning region (AOR)
In multiregion operation (MRO) or intersystem communication (ISC), a CICS address space whose primary purpose is to manage application programs. It receives transaction routed requests from a terminal-owning region (TOR). See also data-owning region, terminal-owning region.
application partition set
The partition set that CICS loads into the buffers of a display device when a user application program issues an output request. By default, this is the partition set that was named when the transaction was added to the CICS system. Alternatively, it is the partition set named by the most recent SEND PARTNSET command that the program issued.
A pair of columns with application-maintained values that indicates the period of time when a row is valid. See also application-period temporal table.
The Tivoli NetView submap layer on which icons of managed objects of at least one network or systems management application are displayed without shading, making the icons appear directly against the background plane. See also background plane.
- A unit to which resources and locks are allocated. An application process involves the running of one or more programs.
- In OSI, the part of an application that resides in a single node. An application process consists of one or more application entities and other parts of an application that are unrelated to OSI data communications.
application process common name
In OSI, a user-defined character string recommended by ISO for identifying an application process. The application process common name is part of the distinguished name of an application.
application process title
In OSI networking, the identifier for an application process. This and the application entity qualifier make up an application entity title. See also application entity title.
Data that describes initial actions to be performed when the telephone is answered. Information in an application profile indicates to the channel process what state table to load.
- A complete, self-contained program, such as a text editor or a web browser, that performs a specific task for the user, in contrast to system software, such as the operating system kernel, server processes, and program libraries.
- A program used to communicate with stations in a network, enabling users to perform application-oriented activities.
Application Program Driver (APD)
An IBM licensed program used to integrate multiple applications into a common environment and to integrate functions common to those applications. The APD/400 program provides a standardized interface that allows users to access their applications and to switch between applications.
application program major node
In VTAM, a group of application program minor nodes. In the VTAM definition library, it is a member, book, or file that contains one or more APPL statements, which represent application programs. In MVS, it is a member of the library; in VSE, it is a book; and in VM, it is a CMS file of file type VTAMLST.
application programming interface (API)
An interface that allows an application program that is written in a high-level language to use specific data or functions of the operating system or another program.
application program output limit
A system definition option that enables users to limit the size and number of output segments that are produced by an application program. This option protects available message queue space from being depleted by a program output loop.
The process of configuring the minimum and the desired amounts of CPU and memory that is provisioned for an application controller with the use of dynamic LPAR and Capacity Upgrade on Demand (CUoD). See also Capacity Upgrade on Demand, dynamic LPAR.
application registration file (ARF)
The registration file created when an application program is integrated into Tivoli NetView that identifies how to start the application program, where the help information is located, and where the application program appears in the Tivoli NetView menu structure.
A request issued directly by an external application, such as an OPEN or EXECUTE request. See also request.
The source of a request to a remote DRDA-enabled relational database management system (RDBMS). See also application server.
Application Response Measurement (ARM)
An application programming interface (API), developed by a group of technology vendors, that can be used to monitor the availability and performance of business transactions within and across diverse applications and systems.
- See job server.
- A host that is attached to the storage area network (SAN) and that runs applications.
- The target of a request from an application requester. The database management system (DBMS) at the application server site services the request. See also application requester.
- A server program in a distributed network that provides the execution environment for an application program. See also application.
- Software that handles communication with the client requesting an asset and queries of the Content Manager.
- A server that enables communication between the console and the site database.
Application Server Toolkit (AST)
A tool that provides a graphical interface for packaging code artifacts into modules and configuring Java Platform, Enterprise Edition (Java EE)-compliant deployment descriptions.
application service element (ASE)
A set of functions in the application layer of OSI that provides a capability for the interworking of application entities for a specific purpose on a single application association. The set of functions is identified during association establishment to be used or provided by the peer application entities.
application-specific business object
A business object whose attributes represent an entity in an application data model. Such a business object typically contains attributes that correspond to the fields of the application entity, and contains application-specific metadata, which gives the connector information on how to process the business object and its attributes. See also generic business object, metadata.
The component of a connector that contains code tailored to a particular application or technology. The application-specific component can respond to requests and implement an event-notification mechanism that detects and responds to events initiated by an application or external programmatic entity.
Part of the metadata of a business object that enables the connector to interact with its application (for example, Ariba Buyer) or a data source (for example, a web servlet). See also metadata.
application-specific integrated circuit (ASIC)
In computer chip design, a integrated circuit created by first mounting an array of unconnected logic gates on a substrate and later connecting these gates in a particular configuration for a specific application. This design approach allows chips for a variety of applications to be made from the same generic gate array, thereby reducing production costs.
application support process
An executing instance of an application support program. Each application support process is associated with an ASP entry in the partner table. An ASP that handles outgoing messages is a sending ASP; one that handles incoming messages is a receiving ASP.
application support program
In MERVA Link, a program that exchanges messages and reports with a specific remote partner ASP. These two programs must agree on which conversation protocol they are to use.
A system made up of one or more host systems that perform the main set of functions for an establishment. The application system updates the primary disk volumes that are being copied by a copy services function.
A group of application servers that collaborates for the purposes of workload balancing and failover. See also high availability.
application tier component
For installation, the set of processors that access the query databases to gather information and then render the results as PDF and HTML reports and metrics. Application tier components also pass requests to Content Manager and render the results that Content Manager retrieves from the content store.
application transaction program
A program that runs an application or part of an application. See also service transaction program.
application unit of work
A set of actions within an application that the designer chooses to regard as an entity in its own right. The designer decides how (if at all) an application should be subdivided into application units of work, and whether any application unit of work shall consist of just one or of many CICS logical units of work (LUWs). Typically, but not exclusively, an application unit of work would correspond to a CICS transaction.
A rectangular area that displays the graphics associated with a specific application. Application windows can be opened, closed, combined with other types of windows, moved, stacked, and otherwise manipulated through user interaction with a window manager.
See application identifier.
- To carry out the selected choice in a window without closing the window.
- In journaling, to place after-images of records into a physical file member. The after-images are recorded as entries in a journal.
- In data replication, to take source table changes and commit them to a target table.
Apply control server
In SQL replication, a database or subsystem that contains the Apply control tables, which store information about registered replication source tables and subscription sets. See also Apply server, control server.
In SQL replication, the approximate time that it takes the Apply program to commit source transactions to target tables after the transactions are made available to the program. See also Capture latency, end-to-end latency, latency, Q Apply latency, Q Capture latency.
See Advanced Peer-to-Peer Networking.
APPN end node
See Advanced Peer-to-Peer Networking end node.
A command or group of commands invoked by a user that cannot be executed without prior approval from an approver within the organization. See also approval flow, approver, approver group.
In WebSphere Commerce Payments, the creation of a Payments object by a merchant. For cassettes that implement credit card protocols, approval will likely map to authorization. Other cassettes might implement the approval process differently.
The series of steps initiated when a user attempts to execute a task involving an approvable action. See also approvable action.
The individual authorized to approve or reject an approvable action. See also approvable action.
The designated users within a specific organization to whom an approval request is directed when an approvable action is invoked. Requests are directed to the entire unit, rather than a single individual. See also approvable action.
See alternate path retry.
See access register.
A country in which the Arabic script is the predominant writing system. Arabic countries include Algeria, Bahrain, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Morocco, Oman, Qatar, Saudi Arabia, Sudan, Syria, Tunisia, United Arab Emirates, and Yemen.
A cursive script used in Arabic countries. Other writing systems such as Latin and Japanese also have a cursive handwritten form, but usually are typeset or printed in discrete letter form. Arabic script has only the cursive form, and is also used for Urdu, (which is spoken in Pakistan, Bangladesh, and India), Farsi or Persian (which is spoken in Iran, Iraq, and Afghanistan).
See arbitrate primitive signal.
A rule that defines the limits of an SQL query that uses any relational or logical operators to define expressions. See also range rule.
- For fibre-channel connections, a topology that enables the interconnection of a set of nodes.
- A shared fibre-channel transport, operating at 100 MBps or more, that is structured as a loop and supports up to 126 devices and one fabric attachment. A port must successfully arbitrate before a circuit can be established. See also arbitrate primitive signal, node loop port, switched fabric.
arbitrated loop physical address (AL_PA)
An 8-bit value used to identify a participating device in an arbitrated loop. See also alias AL_PA.
arbitrate primitive signal (ARB)
A primitive signal that is transmitted as the fill word by a loop port (L_port) to indicate that the L_port is arbitrating to access to the loop. See also arbitrated loop.
A pattern that expresses a fundamental structural organization schema for software systems. It provides a set of predefined subsystems, specifies their responsibilities, and includes rules and guidelines for organizing the relationships between them.
- The set of rules and conventions that govern the creation and control of data types such as text, image, graphics, font, fax, color, audio, bar code, and multimedia.
- Organization and justification of static and behavioral artifacts for software and its structure.
- The fundamental organization of a system embodied in its components, their relationships to each other, and to the environment, and the principles guiding its design and evolution.
- A set of defined terms and rules used as instructions to build products.
In the Reusable Asset Specification (RAS), a collection of artifacts documenting the architecture of the system. More precisely, an architectural description is a subset of the system models that best captures and explains the architectural decisions.
architecture description specification (ADS)
In the Reusable Asset Specification (RAS), a set of concepts, notations with semantics, and guidelines for describing architectures and architecture frameworks of e-Business systems.
- Persistent storage used for long-term information retention, typically very inexpensive for each stored unit and slow to access, and often in a different geographic location to protect against equipment failures and natural disasters.
- To copy programs, data, or files to another storage media, usually for long-term storage or security. See also retrieve, storage pool.
- A backup copy of a module or project that can be stored on any computer and restored to a database.
- A list of jobs whose output files have been deleted but that still have data in the database.
- A service that copies inactive files from disk to removable media for longer term storage and removes the files from disk to free disk storage space. The user can select specific objects or groups of objects to include or exclude from the archive process.
In Backup, Recovery, and Media Services, an object or document that has been selected by an archive control group to archive. Archive candidates are reported on the Archive Candidate Report, which is produced by the Start Archive using BRM (STRARCBRM) command.
archive control group
In Backup, Recovery, and Media Services, a group of objects (lists) that share common archive characteristics. The default values for archive control groups are defined in the BRM archive policy and can be used or overridden in each archive control group.
archive copy group
A policy object containing attributes that control the generation, destination, and expiration of archived files. See also copy group.
A facility for grouping application-program object files. The archive library file, when created for application-program object files, has a special symbol table for members that are object files.
- A data set on a storage device to which WebSphere MQ copies the contents of each active log data set when the active log reaches its size limit. See also recovery log.
- The set of log files that are closed and are no longer needed for normal processing. These files are retained for use in rollforward recovery. See also active log, circular log.
In Backup, Recovery, and Media Services, a policy that defines the default values that are used in archive control groups. Archive policy values can be overridden at the individual archive control group level. The archive policy inherits defaults from the system policy. System policy defaults can be used or overridden in the archive policy.
archive-retention grace period
The number of days that the storage manager retains an archived file when the server is unable to rebind the file to an appropriate management class. See also bind.
A table created in an application to store information about a processed event. This table is created as part of the installation and configuration of a connector. Not all connectors use an archive table.
ARC Standard Raster Product
A map format for scanned maps, published by the Digital Geographic Information Exchange Standard (DIGEST). An ASRP file contains a single scanned map, transformed to the Equal Arc-Second Raster Chart/Map (ARC) system frame of reference.
See Advanced Radio Data Information Service.
- In a link-state routing protocol, groups of contiguous networks and attached hosts. An autonomous system can be divided into areas, which are connected to each other by routers. Routers within the same area share an identical link-state database. See also autonomous system.
- A subset of a data entry database (DEDB) that is defined as a VSAM entry-sequenced data set (ESDS). Each area in a DEDB consists of a root-addressable part, an independent-overflow part, and a sequential-dependent part. Areas contain the entire logical structure for a set of root segments and their dependent segments.
- A representation of the physical space within the location to be monitored. Areas are the container for all zones. See also location.
- In Internet and DECnet routing protocols, a subset of a network or gateway grouped together by definition of the network administrator. Each area is self-contained; knowledge of an area's topology remains hidden from other areas.
area border router
A router that is located on the border of OSPF areas and connects these areas to the backbone network. An area border router has multiple interfaces to multiple areas, maintains separate link-state databases for each area, and maintains a routing table describing both the backbone topology and the topology of the other areas.
area data set (ADS)
A data set that contains a data entry database (DEDB) area. IMS can maintain up to seven copies of this data set. See also multiple area data set.
See level one data sharing.
In an application program using DDS, help information supplied by the programmer for the area of the screen where the cursor is located when the person using the program presses the Help key.
See autonomic request flow manager.
- An independent variable or any value of an independent variable. Examples of arguments are a search key and a number identifying the location of an item in a table.
- A value passed to or returned from a function or procedure at run time.
See also parameter declaration.
- In REXX, a complete set of arguments, separated by commas, that are passed between a calling routine and a called routine.
- In UIM, a list of values that are passed to a program.
A statement that contains values joined together by one or more arithmetic operators and that is processed as a single numeric value. See also arithmetic operator.
- In COBOL, the process caused by the running of an arithmetic statement or the evaluation of an arithmetic expression that results in a mathematically correct solution to the arguments presented.
- An operation such as addition, subtraction, multiplication, division, or exponentiation that is performed only on numeric fields.
See ABLE Rule Language.
See Application Response Measurement agent.
See Application Response Measurement engine.
See access register mode.
See Address Resolution Protocol.
See Advanced Research Projects Agency.
- A structure that contains an ordered collection of elements of the same data type in which each element can be referenced by its index value or ordinal position in the collection. See also associative array, element, ordinary array.
- In EGL, a structure item that has an occurs value greater than one. If an array has a subordinate structure item that also has an occurs value greater than one, the subordinate structure item declares an array with an additional dimension.
- An ordered collection, or group, of physical devices (disk drive modules) that are used to define logical volumes or devices. An array is a group of drives designated to be managed with a Redundant Array of Independent Disks (RAID). See also Redundant Array of Independent Disks.
- In programming languages, an aggregate that consists of data objects, with identical attributes, each of which can be uniquely referenced by subscripting. See also scalar, vector.
An attribute that represents an array of child business objects in a WebSphere business integration system. The type of this attribute is the same as that of the array it represents. See also attribute, child business object, simple attribute, single-cardinality attribute.
An order in which records are retrieved that is based on the order in which records are stored in a physical file. See also keyed sequence.
In the Reusable Asset Specification (RAS), the degree to which an asset is described. The level and degree of specification, implementation and testing artifacts describe an asset. Each asset category in the RAS further describes types of assets for a given category, possessing varying degrees of articulation.
- An entity that is used or produced by a software development process. Examples of artifacts are models, source files, scripts, and binary executable files.
- The object being analyzed, such as a text document, or audio or video stream.
- The data that is available for analysis from the files collected for problem determination, from the results of probes that were requested, or from event streams of managed resources. See also installable unit.
- A UML model element that describes the implementation of components by representing physical implementation units, such as executable files, libraries, software components, documents, and databases.
- A graphical object that provides supporting information about the process or elements within the process without directly affecting the semantics of the process.
- Any file, object, or other piece of data that is created or used during the execution of a process.
- An archive file that contains an action descriptor, optionally a media descriptor, and the set of files that are required for the change management operations. See also action descriptor, media descriptor.
A set of related artifacts which help to present one aspect of the system. Artifact sets cut across disciplines, as several artifacts are used in a number of disciplines; for example, the Risk List, the Software Architecture Document, and the Iteration Plan.
A class of objects that is specific to a requirement definition technique. Artifact types include document, business process sketch, user interface sketch, user interface sketch part, screen flow, storyboard, use case diagram, requirement, glossary, and term.
artificial JQE (JQA)
A control block containing a summary of information from a job control table (JCT) entry that consists of the base job queue element (JQE), the job queue element extension (JQX), and additional fields in the artificial JQE (JQA).
See autonomous system.
See Abstract Syntax Checker.
The part of certain lowercase letters, such as b, d, or f, that rises above the top edge of other lowercase letters, such as a, c, and e. Letters with ascenders are b, d, f, h, k, l, and t. See also descender.
The values by which data is arranged from the lowest value to the highest value of the key field in accordance with the rules for comparing data items. See also descending key.
ascending key sequence
The arrangement of data in order from the lowest value of the key field to the highest value of the key field. See also descending key sequence.
The arrangement of data in order from the lowest value to the highest value, according to the rules for comparing data. See also descending sequence.
ASCII line-mode display station
A display station that has the characteristics of Teletype equipment or typewriters. The display station has a one-line input field at the bottom of the screen. The output field is located above the input field and receives data, one line at a time, with the most recent data at the bottom of the output field.
ASCII port sharing
A function that allows the user to have different ASCII devices (programmable or nonprogrammable work stations) share the same port, at different times, without needing to manually create a configuration description for each new device.
See application service element.
A cursor whose sensitivity is dependent on how an SQL statement is optimized. An asensitive cursor can behave as a sensitive cursor or an insensitive cursor. See also cursor, cursor sensitivity.
See application support filter.
See application server interface.
See application-specific integrated circuit.
See address space identifier.
See access security information field.
See access security information subfield.
See address space manager.
See Advanced System Management Interface.
See Advanced System Management interconnect.
ASM interconnect gateway
See gateway service processor.
ASM interconnect network
See Advanced System Management interconnect network.
ASM PCI adapter
See Advanced System Management PCI adapter.
See Advanced System Management processor.
See advanced shipment notification.
See Abstract Syntax Notation One.
ASN.1 encoding rule
In OSI, a rule that specifies the representation during transfer of the value of any ASN.1 type. ASN.1 encoding rules enable information being transferred to be identified by the recipient as a specific value of a specific ASN.1 type.
A form of connectivity that implements or enforces cross-cutting aspects in service-oriented architecture (SOA), such as security, management, logging, and auditing, by removing such aspects from the concern of the service requesters and providers.
- To collect the resources of a HATS project, along with the necessary executable code, into an application EAR file in preparation for transferring the application to the server.
- To translate an assembly program into a computer language. Assembling is usually accomplished by substituting the computer language operation codes for the assembly language operation code, and by substituting absolute addresses, immediate addresses, relocatable addresses, or virtual addresses for symbolic addresses.
The phase of the SOA Foundation lifecycle that translates the business design into an assembly of information artifacts that implement the business design. This includes the development of business process definitions and activities, the identification, design and implementation of services and the application of policies and conditions to control how applications operate within the production environment.
- A collection of types and resources that form a unit of deployment, version control, reuse, activation scoping, and security permissions in .NET Framework applications.
- A component that is made out of unique code and common components and that can become part of a product or bundle. See also common component, component, feature, offering, serviceable software asset.
- A concept in the meta-model that is used to specify a policy requirement and evaluating endpoints at run time. An assertion is also used to describe the capabilities of an endpoint.
- A logical expression specifying a program state that must exist or a set of conditions that program variables must satisfy at a particular point during program execution.
- In the context of the SAML protocol, data that contains the following types of information in a message: authentication, attribute, or both.
- An optional quiz or evaluation that is built into a course.
- A collection of findings as a result of scanned code that a user can work with, save, and share with other people.
- Any equipment or facility that plays a key role in the core business of an enterprise.
- In the Reusable Asset Specification (RAS), a collection of related artifacts packaged to provide solutions to a recurring problem, along with the supporting files to understand and apply the asset.
- A digital multimedia resource that is stored for later retrieval as requested by an application. An example of such a resource is a digitized video or audio file. An asset is stored as a file in a multimedia file system supported by the data pump.
- A manageable object that is either deployed or intended to be deployed in an operational environment. See also configuration item.
- A collection of artifacts that provide a solution to a specific business problem. Assets can have relationships and variability or extension points to other assets.
In the Reusable Asset Specification (RAS), a grouping of assets that share common scope, variability, granularity, visibility, content, and purpose. For instance, an asset category may be a framework or a mechanism.
An organizational grouping within the multimedia file system with similar characteristics. You can use an asset group to allocate resources of a data pump. For example, you could establish two asset groups representing distinct departments whose assets should be kept separate for security or billing purposes.
A store that contains a collection of sharable resources (business artifacts, business processes, and storefront assets) that can be leveraged in other types of stores. An asset store does not perform or record business transactions; it is simply a holder of assets that can be used by other stores. See also catalog asset store, storefront asset store.
asset structure model
In the Reusable Asset Specification (RAS), a model that describes the logical composition of an asset. This model describes the major sections of the asset and the relevant artifacts and descriptors. Elements of this model are described in further detail by the semantic model.
A record that specifies asset information that is shared by multiple asset records. An asset template can be applied to existing asset records or it can be used to generate multiple new asset records for similar assets, such as a fleet of vehicles.
In the Reusable Asset Specification (RAS), a refinement of an asset category, providing more detailed description of the asset or assets. For instance, whereas an asset category may be a framework, an asset type for that category may be a requirements framework or a component framework.
assigned focal point
A focal point at which a node is included in a sphere of control (SOC) by explicit definition at either the focal point or SOC node. When a node's inclusion in the sphere of control is defined at the focal point, the focal point is termed an explicit focal point for that SOC node. When a node's inclusion in the sphere of control is defined at the SOC node, the focal point is termed an implicit focal point for that node. See also default focal point.
The space allocated to a volume and assigned to a port. See also allocated storage.
- In REXX, a single clause with the form symbol = expression. An assignment gives a variable a new value.
- A labor requirement on a work order record that has been matched to an appropriate laborer.
- The process of giving a value to a variable.
An operator that sets or resets a value to a variable. See also operator.
A purchase arrangement where the buyer of the imported merchandise provides something of value (either no charge or at a reduced cost) to a supplier for use in connection with the production or the sale of merchandise being imported.
A general set of capabilities for assisting users during creation of models. Two general categories of functionality are GUI assists for common operations and validation of user actions against modeling rules in real time with provision of 'lightweight' and user-tunable GUI feedback regarding rules exceptions.
associated address space
In VTAM, the address space in which RPL-based requests are issued that specify an access method control block (ACB)that is opened in another address space. See also session address space.
associated DDM attribute
A data set attribute that is defined in distributed data management (DDM). Examples of associated DDM attributes are file size, lock options, and end-of-file offset for byte-stream files. Associated DDM attributes are not necessarily exclusive to DDM; they also can be used by other applications that access the same data sets.
A technique for directing application program printout output to a specific printer node name. The destination print queue is specified at logon or sign-on time, and is created during sign-on of the user who created the input transaction.
An object that refers to a source object. See also referenced type.
- For XML documents, the linkage of the document itself to the rules that govern its structure, which might be defined by a Document Type Definition (DTD) or an XML schema.
- The defined relationship between a client node and a client schedule. An association identifies the name of a schedule, the name of the policy domain to which the schedule belongs, and the name of a client node that performs scheduled operations.
- The semantic relationship between two or more classifiers that specifies connections among their instances. See also association end, client.
- In VTAM CMIP services, the cooperative relationship between application entities for data exchange.
- In enterprise beans, a relationship that exists between two container-managed persistence (CMP) entity beans. There are two types of association: one-to-one and one-to-many.
- A connecting object that is used to link information and artifacts with flow objects. An association is represented as a dotted graphical line with an arrowhead to represent the direction of flow.
- A class that contains two references that define a relationship between two referenced objects.
- A visual representation of the members in a group that shows relationships or provides additional information about the members of a group.
- A model element that has both association and class properties. An association class can be seen as an association that also has class properties, or as a class that also has association properties.
- A class that holds information belonging to a link between two objects.
association control service element (ACSE)
In OSI, a set of services defined by ISO 8649 for controlling an application association between two application entities that communicate using a presentation connection. The ACSE services provide a means to establish and release an association between the application entities.
In UML modeling, the connection point of an association relationship that specifies the model element's role in the relationship. See also association.
In OSI, an environment that OSI Communications Subsystem for AS/400 establishes for an association. OSI Communications Subsystem for AS/400 requires that an association environment be established before an application entity can establish an association.
See association identifier.
association identifier (association ID)
In the OSI Communications Subsystem licensed program, a parameter that identifies a particular association to the programming interface. The programming interface returns the association identifier when the application entity builds an association environment. The application entity then uses the association identifier to specify the association on later OSI Communications Subsystem calls.
In UML modeling, a structural relationship between two model elements (the supplier and the client) that describes the reasons for the relationship and the rules that govern it. See also directed association relationship.
A description of the association between an item in a model and a data source. For example, an association may include a source role of Product Number and a label role of Product Name.
In the OSI Communications Subsystem licensed program, the set of states that an association can be in after an association environment is established. The state of an association determines what actions the application entity can take for that association.
An array with no user-defined upper boundary on the number of elements, which are ordered by and can be referenced by an array index value. Array index values are unique and do not have to be contiguous. See also array, cardinality, element, ordinary array.
assumed decimal point
In COBOL, a logical decimal point position that does not occupy a storage position in a data item. It is used by a compiler to align a value properly for calculation or input/output operations. See also actual decimal point.
See Application Server Toolkit.
See automatic screen update.
See public key algorithm.
See public key cryptography.
asymmetric digital subscriber line (ADSL)
A technology based on Digital Subscriber Line (DSL) technology that is for Internet access where fast downstream is required, but slow upstream is acceptable. ADSL uses the portion of a phone line‘―s bandwidth not used by voice, resulting in simultaneous voice and data transmission.
asymmetric key cryptography
A system of cryptography that uses two keys: a public key known to everyone and a private key known only to the receiver or sender of the message. See also symmetric key cryptography.
In stacked dimensions, a selection in whose members in rows or columns can be different for each group. An asymmetric selection can be made manually, or can be the result of a sort action or a result of removing missing value.
A virtualization technique in which the virtualization engine is outside the data path and performs a metadata-style service. The metadata server contains all the mapping and locking tables while the storage devices contain only data. See also metadata server, symmetric virtualization.
- Pertaining to events that are not synchronized in time or do not occur in regular or predictable time intervals. See also synchronous.
- In cross-site mirroring, pertaining to the mode of geographic mirroring in which the program issuing the update waits until the operation is complete on the production copy and received for processing on the target system.
A request sent by an object that does not wait to receive the result. See also synchronous action.
asynchronous balanced mode
In communications, an operational mode of a balanced data link in which either combined station can send commands at any time and can initiate transmission of response frames without explicit permission from the other combined station. See also normal response mode.
asynchronous batched update
A process in which all changes to the source are recorded and applied to existing target data at specified intervals. See also asynchronous continuous update.
A method of communication supported by the operating system that allows an exchange of data with a remote device, using either a start-stop line or an X.25 line. Asynchronous communication includes the file transfer support and the interactive terminal facility support. See also start-stop, synchronous operation, System i Access asynchronous communications.
Asynchronous Communications Device Interface (ACDI)
An application programming interface or service that is used by application programs. Application programs use the ACDI service to communicate with programs on other systems that use asynchronous communications.
A process that uses a set of MQI calls that allow an application to consume messages from a set of queues. Messages are delivered to the application by invoking a unit of code identified by the application, passing either the message or a token representing the message.
asynchronous continuous update
A process in which all changes to the source are recorded and applied to existing target data immediately after being committed in the base table. See also asynchronous batched update.
asynchronous controller description
A controller description that represents a remote system or device when using asynchronous transmission methods on an asynchronous communications line or when using non-SNA protocols on an X.25 communications line to communicate with the system.
A device using data transmission in which transmission of a character or a block of characters can begin at any time, but in which the bits that represent the character or block have equal time duration.
asynchronous disk I/O
In Performance Tools, a disk access operation that is not expected to complete before program operation can continue. See also synchronous disk I/O.
asynchronous disk I/O virtual processor
A virtual processor that performs nonlogging disk input/output. See also virtual processor.
An event that does not occur at predetermined or regular intervals. When using asynchronous event actions in subscriptions, the subscription processor continues processing events without waiting for the results of an action.
- The nonsequential processing of read and write requests across multiple disks.
- A series of input/output operations that are being done separately from the job that requested them.
A method of communication between programs in which a program places a message on a message queue, then proceeds with its own processing without waiting for a reply to its message. See also synchronous messaging.
In high availability disaster recovery, the synchronization mode in which the primary database considers a transaction committed when it successfully submits the relevant log data to the network. The primary database does not wait for an acknowledgment that the log data was received by the standby system. See also high availability disaster recovery, peer state, synchronization mode.
- An operation that does not of itself cause the process requesting the operation to be blocked from further use of the processor. Asynchronous operation implies that the process and the operation are running concurrently.
- An operation that occurs without a regular or predictable time relationship to a specified event. While the asynchronous operation is performed, the application program is allowed to continue execution. For example, the calling of an error diagnostic routing may receive control at any time during the execution of a computer program.
asynchronous partition detach
An asynchronous task that makes a logically detached partition into a stand-alone nonpartitioned table. See also logically detached partition.
A series of operations that are done separately from the job in which they were requested; for example, submitting a batch job from an interactive job at a work station. See also synchronous processing.
A shard that receives updates after the transaction commits. This method is faster than a synchronous replica, but introduces the possibility of data loss because the asynchronous replica can be several transactions behind the primary shard. See also synchronous replica.
In replication, the process of copying data from a source table to a target table outside the scope of the original transaction that updated the source table. See also synchronous replication.
A request for an asynchronous operation. See also synchronous request.
asynchronous transfer mode (ATM)
A communication method in which information is organized into small, fixed-length cells that recur without regular or predictable time relationships. ATM incorporates network switches and negotiated service connections.
A method of transmission in which the sending and receiving of data is controlled by control characters such as a start bit and a stop bit, instead of by a timing sequence. See also synchronous transmission.
See auxiliary task control block.
See auxiliary task-dispatching element.
See Asynchronous Terminal Emulation.
See automatic transaction initiation.
See automated tape library.
See asynchronous transfer mode.
ATM adaptation layer (AAL)
A layer in the asynchronous transfer mode (ATM) endsystem model that defines services provided by the ATM layer as needed by the higher layers. AALs in separate ATM endsystems communicate with each other using a standardized peer protocol. There are several classes of ATM adaptation layers, each of which corresponds to a major type of network traffic (for example, data, voice, or video).
A 20-digit hexadecimal number that uniquely identifies an end system in an asynchronous transfer mode (ATM) network. i5/OS registers a unique ATM address for each input/output adapter (IOA).
ATM campus network
A network of ATM nodes providing connectivity for ATM endsystems located in buildings within the same general area (for example, the distance between buildings is 1 kilometer or less).
See ATM endsystem.
A node at which an asynchronous transfer mode (ATM) connection is initiated or terminated. An originating endsystem initiates the ATM connection, and a terminating endsystem terminates the ATM connection.
A worldwide organization that promotes asynchronous transfer mode within the industry and the end-user community. The ATM forum defines two basic standards of interoperability: user-to-network interface (UNI) 3.0 and UNI 3.1.
ATM traffic descriptor
A list of traffic parameters (such as forward/backward peak cell rate or forward/backward maximum burst size) that can be used to capture the intrinsic traffic characteristics of a requested asynchronous transfer mode (ATM) connection.
An XML-based format for syndicated web content and a protocol for editing and publishing web resources that is based on the Atom Specification Format. See also feed, RDF Site Summary, Really Simple Syndication, Rich Site Summary.
- A unique ID corresponding to a string name. Atoms are used to identify properties, types, and selections.
- A 32-bit number that represents a string value.
- In commitment control, a characteristic that allows individual changes to objects to appear as a single change.
- In DB2 for i5/OS SQL, a characteristic of database data definition functions that allows the function to complete or return to its original state if a power interruption or abnormal end occurs.
- Pertaining to a transaction's changes to the state of resources: either all occur or none occur. The atomic characteristic maintains data integrity by making sure that some updates are not made while others fail. See also commit.
A single, "low-level" non-composite event. The types of atomic event are activity completion, input, timer, and system. See also composite event.
In DB2 XQuery, a data type that can be either a primitive simple data type or a derived type that is based on a primitive simple type. See also atomic value.
A method of data type conversion that the XQuery language uses to process expressions that expect a sequence of atomic values. Atomization takes a sequence of items and returns the atomic values in the sequence.
See AppleTalk Transaction Protocol.
See available to promise inventory.
- In z/OS, to create a task that can execute concurrently with the attaching code.
- To make a device a logical part of a network.
- To remotely access objects at the instance level.
attached data partition
A data partition that is attached to a table but is not validated using integrity processing. Data in attached data partitions is unavailable to SQL statements. See also visible data partition.
Any device that is physically connected to a network and can communicate over the network. See also station.
- A port or a pair of ports, optionally including an associated optical bypass, that are managed as a functional unit. A dual attachment includes two ports: port A and port B. A single attachment consists of one port: port S.
- A type of resource that controls CPs, logical link control, and physical link control.
- A file that is attached to an email message or other electronic document.
- In WebSphere Commerce, a collection of one or more files that are associated to a catalog or marketing asset. See also attachment asset, attachment target.
- An entire device or feature attached to a processing unit, including required adapters.
attachment reference type
A value used to define the format and contents of an attachment reference, so that the programs that work with specific types of attachment references are supported. The attachment reference types supported on a system are defined when the mail server framework is configured. The value associated with an attachment reference type must be a unique type value.
- In a local area network, the interface between the medium attachment unit and the data terminal equipment within a data station.
- See transceiver cable.
Any attempt by an unauthorized person to compromise the operation of a software program or networked system. See also attacker.
attended mode IPL
A type of IPL in which the IPL stops at the dedicated service tools (DST) environment, allowing the user to make changes to the system or to debug a problem with the system. See also unattended mode IPL.
attention identifier (AID)
A character in a data stream that is sent to the host system when a display station user presses an attention identifier (AID) key. Typical AID keys are function keys or the Clear, Enter, Page Up, Page Down, Help, Print, and Home keys.
attention identifier key (AID key)
A key that causes an attention identifier (AID) to be sent to the host system when pressed, such as a function key or the Clear, Enter, Page Up, Page Down, Help, Print, and Home keys.
- A decrease in magnitude of current, voltage, or power of a signal in transmission between points. It may be expressed in decibels or nepers.
- In 3D graphics, the reduction of light intensity due to an increase in distance.
- Descriptive information that provides important details about a module, requirement, discussion, or element.
- In relational models, a query item that is not a measure or identifier. When a query item is an attribute, it is not intended to be aggregated, or used for grouping or generating prompt pick lists.
- A set of factors that are used as variables in determining the score of an entity. The value of an attribute can be a natural number, a floating point number, a Boolean value, a character, or a character string. An attribute can be the result of the execution of another rule or a combination of other attributes.
- A characteristic or trait of an entity that describes the entity; for example, the telephone number of an employee is one of the employee attributes. See also attribute type, candidate builder, characteristic, entity, entity model, identity.
- In dimensional models, a property that provides qualitative information about members of a level in a dimension. For example, the Store level within the Retailer dimension might have properties such as address or retail space. In general, dimensional attributes do not have measure values or rollups associated with them, but are used to locate or filter members.
- A system or application element being monitored by a monitoring agent, such as Disk Name and Disk Read/Writes Per Second.
- The application properties that are measured and reported on, such as the amount of memory that is used or a message ID. See also attribute group.
- A property that provides qualitative information about dimensions.
- A data field on an item or category that has an attribute definition and any number of attribute instances. See also attribute definition, attribute instance, core attribute collection.
- A defined quality and values that can be assigned to an artifact. For example, a work item artifact might have a 'priority' or 'severity' attribute.
- In markup languages such as SGML, XML, and HTML, a name-value pair within a tagged element that modifies features of the element.
- In user interface manager (UIM) tag language, an identifier used with related material that takes on a specific meaning, such as an action to be taken or the characteristics of text or data.
- The information, data, or properties that belong to instances of an object.
- In object oriented programming, a property of an object or class that can be distinguished distinctly from any other properties. Attributes often describe state information.
- In Graphics Library, a parameter that can affect the appearance of a drawing primitive. For instance, color is an attribute.
- In BI Modeling, a characteristic of an entity which is descriptive rather than a unique identifier or an aggregative measure.
- A property, quality, or characteristic whose value contributes to the specification of an element or program function. For example, "cost" or "location" are attributes that can be assigned to a resource. See also array attribute, simple attribute, single-cardinality attribute.
- Data that is associated with a component. For example, a host name, IP address, or the number of hard drives can be attributes associated with a server component.
- A characteristic of an application that helps organize the scan results into meaningful groupings, such as by department or project leader.
attribute access class
Class that consists of attributes that require similar permission for access. Attributes are assigned to an access class within the schema files. The three user-modifiable access classes are normal, sensitive, and critical.
An alert that identifies entities that match a specified set of attributes. See also alert.
attribute alert generator
A set of customer-defined attributes that the pipeline uses to compare with the incoming attributes of identities. If the attributes match, the pipeline generates an attribute alert.
attribute change tracking
A technique for managing historical data in a dimension build. The user can apply attribute change tracking to a business dimension in which one or more non-key values may change without a corresponding change in the key values. For example, this technique enables the business to make a minor change to a product specification without a corresponding change in product code and have the resulting data mart reflect the specification before and after the change.
A named group of attributes that can be specified exactly or that can be specified by reference to the containing specification. Attribute collections can be used to determine which attributes are accessible and validated in a given workflow step, in catalog or hierarchy views, and when setting privileges on a catalog or hierarchy. See also core attribute collection, view.
attribute configuration file (ACF)
In the Distributed Computing Environment (DCE), an optional companion to an interface definition file that modifies how the Interface Definition Language (IDL) compiler locally interprets the interface definition.
- An object that users create to store information in addition to the system attributes where data is stored.
- The description of a field, such as its data type, validation rules, or the allowed number of occurrences. Attribute definitions are specified in a specification, which can be applied to a container (catalog or hierarchy) or category, whose entries can then have instances of those attributes. Previously called spec node or node. See also attribute, validation rule.
A feature in Management Center that is used to manage a set of attributes and values. These attributes and values can then be reused by multiple catalog entries. If an attribute is changed in the attribute dictionary, all catalog entries that share that attribute are updated.
An element in the transformation model that holds non-additive information that is not a dimension or a measure but that may be of interest. For example, descriptive information is typically treated as an attribute.
In system configuration, a text file that is organized into stanzas, each of which has a stanza name and a set of attribute definitions in the form of Attribute=Value pairs. Configuration files have the attribute file format.
- A set of related attributes that can be combined in a view or a situation. See also attribute.
- A set of attributes that can appear in a complex type.
- Convenience grouping of one or more attributes. For example, the attribute group "Address" might include the attributes Street, City, State, and Zip.
The value or potential value of a field for an entry. Each attribute instance for an entry corresponds to an attribute definition in the specification of the container of that entry. See also attribute, category attribute, category-specific item attribute, item attribute, validation rule.
A spreadsheet-like table view that displays requirements in rows and the attributes that describe them in columns. Values in attribute fields can be added or changed. See also view.
- A set of descriptive and operational information associated with a requirement attribute when the attribute is created. See also entry-type attribute, list-type attribute.
- In Distributed Computing Environment (DCE) X/Open Object Management (XOM), any of various categories into which the client dynamically groups values on the basis of their semantics. It is an integer unique only within the package.
- The specification in an attribute definition of the kind of data that can be stored in an instance of an attribute. Examples include simple data types, such as string or number, as well as more complex data types like currency or date.
- A specific classification of an attribute. The supported attribute types are characteristics, numbers, names, addresses, and email addresses. See also attribute.
- In the Distributed Computing Environment (DCE) X/Open Directory Service (XDS), the component of an attribute that indicates the type of information given by that attribute. Because it is an object identifier, it is unique among other attribute types.
- In the Distributed Computing Environment (DCE), a particular instance of the type of information indicated by an attribute type.
- Information assigned to a requirement attribute. Attribute values can be text or numbers. For example, the attribute priority can be assigned the values Low, Medium, and High. See also entry-type attribute, list-type attribute.
- The sound portion of a video signal.
- Pertaining to the portion of recorded information that can be heard.
The hardware that ties several phone lines together for a conference call. When each participant dials the bridge and authenticates, all of the lines are able to listen and talk to each other.
- To webcast an audio conference to participants over their computer speakers.
- A one-way audio transmission that allows the presenters to webcast an audio conference to participants over their computer speakers.
Audio/Video Interleave (AVI)
A RIFF (Resource Interchange File Format) file specification that permits audio and video data to be interleaved in a file. The separate tracks can be accessed in alternate chunks for playback or recording while maintaining sequential access on the file device.
Audio-Video Subsystem (AVS)
File format for files that can contain video and audio data, video-only data, audio-only data, or image data (a single still image). The Audio-Video Subsystem format is supported by the ActionMedia II MMPM/2 Media Control interface.
- To record information about database or instance activity by applications or individuals.
- In ITIL, the act of confirming compliance with a standard or set of guidelines, or comparing actual measurements to targets, or verifying the accuracy of recorded information.
- A process that logs modifications to the database and plan.
- To review and examine the activities of a data processing system mainly to test the adequacy and effectiveness of procedures for data security and data accuracy.
- To check for logical inconsistencies between information that the server has and the actual condition of the system. The storage manager can audit information about items such as volumes, libraries, and licenses. For example, when a storage manager audits a volume, the server checks for inconsistencies between information about backed-up or archived files that are stored in the database and the actual data that are associated with each backup version or archive copy in server storage.
- To record information about build or JobStream execution for subsequent analysis.
- A DFSMShsm process that detects discrepancies in data set information contained in the volume tables of content (VTOCs), the computing system catalog, the migration control data set (MCDS), the backup control data set (BCDS), and the offline control data set (OCDS).
- An occurrence on the system that may be a security violation. This event causes an audit record to be written.
- A record of an action in the audit log/change history. For example, an audit entry is created when a resource is edited.
- Any database server activity or operation that can potentially access or alter data.
A utility that generates a trail of audit records for a series of predefined and monitored database events. See also audit policy.
A file that contains records of audit events and resides in the specified audit directory. Audit files provide an audit trail of information that can be extracted by the database secure auditing facility for analysis.
A mechanism that lets an administrator detect potential or actual security violations in the system. Components of this subsystem detect audit events, log and collect audit events in a system audit trail, and process the audit trails.
auditing system value
See audit value.
The types of user actions that are currently being audited for the entire system or for specific users on the system. Actions that can be audited include authority failures and restoring objects. A record of each action is written to the audit journal.
- An unalterable log file with chronological information that can include the time in which a document is created, accessed, or deleted.
- An unalterable log file that records all successful configuration commands and the identity of who issued them.
- A log that maintains the history of all commands that modify metadata or configuration data and significant operations, including commands that would have made a change but failed to do so.
- A log file containing a record of system events and responses.
- A policy that determines if audit trails should be kept. See also application policy.
- An instance of the audit configuration within a database. Users can define one or more audit policies in a database to define what information is recorded by the DB2 audit facility. See also audit facility.
A chronological record of events or transactions. An audit trail is used for examining or reconstructing a sequence of events or transactions, managing security, and recovering lost transactions.
To convert a profile to another kind of profile. For example, a server profile can be modified to become a bus profile. See also unaugment.
See attachment unit interface.
See Abstract User Interface Markup Language.
- A user whose identify has been verified by the system.
- A portal user who has logged in to the portal with a valid account (user ID and password). Authenticated users have access to all public places. See also anonymous user, registered user.
- The process by which a system verifies a user's identity. User authentication is completed by a security facility outside the DB2 database system, often part of the operating system or a separate product.
- In computer security, verification of the identity of a user or process and the construction of a data structure that contains the privileges that were granted to the user or process. See also password.
- A security service that provides proof that a user of a computer system is genuinely who that person claims to be. Common mechanisms for implementing this service are passwords and digital signatures.
- The process of validating the identity of a user or server.
- In computer security, a process that ensures that the identities of both the sender and the receiver of a network transaction are true.
In the Simple Network Management Protocol (SNMP), the network management agent responsible for verifying that an entity is a member of the community it claims to be in. This entity is also responsible for encoding and decoding SNMP messages according to the authentication algorithm of a given community.
The device, biometrics, or secret required as a credential for validating digital identities (e.g., passwords, Encentuate USB Key, RFID, biometrics, and one-time password tokens).
See protection level.
A content asset that contains an authenticator (in the case of form-based authentication), or was accessed by means of an authenticator (in the case of HTTP, NT Lan Manager, or certificate-based validation).
The communication mechanism to an external authentication source. Functionalities, such as user authentication, group membership, and namespace searches, are made available through authentication providers.
A part of the key distribution center (KDC) that verifies the identity of a principal through a name and a password. If the identity is authenticated, the server issues a ticket-granting ticket.
- One of the three services provided by the Security Service in the Distributed Computing Environment (DCE). It verifies principals according to a specified authentication protocol. The other Security services are the Privilege Service and the Registry Service.
- A service that verifies the validity of an account; applications authenticate against their own user store or against a corporate directory.
See security token.
One of a finite number of predefined methods for an instance or subsystem that is used to determine how and where a user is authenticated before being permitted access to the instance or subsystem or to any objects found in that instance or subsystem.
An instance of a WebSphere Commerce staging server that has workspaces enabled. See also commit, production server, production-ready data, quick publish, staging server, workspace, workspace task group approver.
A component of the Lotus Learning Management System that allows course developers to create online courses for use with the Lotus Management System and to import courses purchased from commercial vendors into the Lotus Management System.
See authorization check.
An object that specifies and reserves an authority for a program-described database file before the file is created. When the file is created, the authority specified in the holder is linked to the file.
A user's access and ability to perform high-level database management operations such as maintenance and utility operations. In addition, a user's authority level can implicitly include privileges on database objects. See also authorization, database authority, implicit privilege, load authority, privilege, system authority.
authority mask register (AMR)
A register used with POWER6 processors that defines the current authority to access pages of virtual memory according to their storage protection keys. See also storage protection key.
In the OSI Communications Subsystem licensed program, a nickname for the higher portion (a set of names that are higher in the hierarchy) of an application entity's distinguished name. The authority nickname refers to that portion of the application entity's distinguished name above the application process common name. The authority nickname can be shared by many application entities.
- The process of granting a user, system, or process either complete or restricted access to an object, resource, or function.
- In computer security, the right granted to a user to communicate with or make use of a computer system.
- The process of obtaining permission to perform specific actions.
- The process by which data in the database catalog is used to obtain information about an authenticated user, such as which database operations the user can perform and which data objects the user can access. See also authority level, database authority, privilege.
- The method that determines which portlets a user or a user group can access.
A security check that is performed when a user or application attempts to access a system resource; for example, when an administrator attempts to issue a command to administer WebSphere MQ or when an application attempts to connect to a queue manager.
The action of determining whether a user is permitted access to a protected resource. RACF performs authorization checking as a result of a RACHECK or FRACHECK request See also FRACHECK request, RACHECK request.
- An alphanumeric code for administrative functions, such as password resets or authentication factors for a wallet.
- A numeric code given when a transaction is authorized.
See authorization identifier.
authorization identifier (authorization ID)
A character string that designates a set of privileges and can be used to verify authority. An authorization ID can represent an object, an individual user, an organizational group, a function, or a database role.
- A policy whose policy target is a business service and whose contract contains one or more assertions that grant permission to run a channel action.
- A set of conditions that define whether a user can access a protected resource. See also policy.
In the Distributed Computing Environment (DCE), a formal procedure for establishing the authorization of principals with respect to protected objects. Among the authorization protocols supported by DCE security services are DCE authorization and name-based authorization.
A role assigned to administrators that enables them to perform their assigned systems management tasks. A role can be granted over the entire Tivoli management region or over a specific set of resources, such as those resources that are contained in a policy region. Examples of authorization roles include super, senior, admin, and user.
In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, a service that provides authority checking of commands and MQI calls for the user identifier associated with the command or call.
- To grant to a user the right to communicate with or make use of a computer system or display station.
- To give a user either complete or restricted access to an object, resource, or function.
- To allow a user to communicate with or make use of an object, resource, or function.
authorized APPN end node
In APPN, an end node that is trusted by its network node server to supply directory and routing information about its resources that will affect the network directory database. If a node is authorized, all information it sends about itself is accepted. The authorization status of an end node is system-defined in its network node server.
An asset that conforms to specified rules and relationships assigned to it and can therefore be installed. See also deployed asset.
authorized configuration item
A configuration item that is under the control of configuration management and change management processes. See also actual configuration item.
authorized end node
See authorized APPN end node.
authorized function control block (AFCB)
Control block used to contain control information for various functions that require special authorization, and the addresses of the common system area (CSA) and the application interface block. The AFCB is used as an address vector for the CICS type 3 SVC, or for the authorization of use of the SVC.
An operator who is authorized to receive undeliverable messages and lost terminal messages. See also authorized receiver.
An authorized operator who receives the unsolicited and authorized-receiver messages that are not assigned to a specific operator. See also authorized operator.
- A single individual who has a Proof of Entitlement (PoE) to access a licensed program.
- A user who has administrative authority for the client on a workstation. This user changes passwords, performs open registrations, and deletes file spaces.
See automatic answering.
See automatic calling.
- A process that allows a system to collect and reuse user credentials for different applications. These credentials are captured when the user enters information for the first time, and then stored and secured for future use.
- A function that allows the system to automatically fill out previously captured and recorded user credentials for different applications, through sign-on automation.
See automounted file system.
A method of creating and installing resources dynamically as terminals log on, and deleting them at logoff. Autoinstall can be used for VTAM terminals, MVS consoles, APPC connections, programs, map sets, partitionsets and journals.
autoinstall control program
A user-replaceable CICS program used to select some of the data needed to automatically install terminals, notably the CICS terminal identifier (TERMID) and the model name to be used in each instance.
autoinstall terminal model (AITM)
A model terminal definition used by CICS during autoinstall of terminals. Definitions can be user-created or supplied by CICS, and are held in the autoinstall model table (AMT). The acronym AITM is sometimes loosely used to refer to the CICS routines that manage operations involving the autoinstall model table (AMT).
A hierarchy that does not have a fixed number of levels. An auto-level hierarchy is structured solely in terms of parent-child relationships. For example, employees report to managers, who may report to other managers. See also recursive level.
- An automatic library look-up function of the linkage editor. The function resolves any external reference that is included in the currently processed module and searches the active search chain for an object module of the same name as the encountered external reference.
Auto-Logical Drive Transfer
See auto volume transfer/auto disk transfer.
See automatic logon.
An optional process that automatically generates a generic asset or configuration item during automated linking, whenever the counterpart of an authorized asset or CI cannot be found.
An optional process that uses link rules and discovered data to automatically match and link authorized assets and configuration items that represent the same IT resource, so they can be managed together.
Automated Operator Interface (AOI)
An IMS interface that allows installations to monitor and control IMS activities. The interface enables an application program, by using DL/I calls, to issue a subset of IMS operator commands and receive command responses; a user exit routine to monitor activities and take appropriate action; and operator commands, responses, and asynchronous output that is destined for the IMS master terminal to be logged to the secondary master terminal.
A predefined response to particular events that is run by a Tivoli application. For example, if the Tivoli Enterprise Console product detects that a process stopped early, it can automatically restart the process without intervention by an administrator.
An optional process that is used to make equal the attributes and values of an authorized asset and its corresponding configuration item at the time they are first linked. Thereafter, synchronization occurs automatically when triggered by an attribute or attribute value change to either the authorized asset or the CI, whichever changes first.
Automated Tape Library Dataserver
A device consisting of robotic components, cartridge storage areas, tape subsystems, and controlling hardware and software, along with the set of tape volumes that reside in the library and can be mounted on the library tape drives. See also manual tape library, tape library.
In VTAM, the activation of links and link stations in adjacent subarea nodes as a result of channel device name or RNAME specifications related to an activation command that names a subarea node. See also direct activation.
In data communications, a line type that does not require operator action to receive a call over a switched line. See also manual answer.
A machine feature that permits a station to respond without operator action to a call it receives over a switched line. See also automatic calling.
automatic application installation project
A monitored directory to which the addition of a fully composed EAR, WAR, EJB JAR, or stand-alone RAR file triggers automatic deployment and publication to a target server. Deletion of an EAR or Java EE module file from this directory triggers automatic uninstalling. See also monitored directory.
- In DFSMShsm, the process of automatically copying data sets from primary storage volumes or migration volumes to backup volumes.
- In the object access method (OAM), the process of automatically copying a primary copy of an object from a direct access storage device (DASD), optical, or tape volume to a backup volume contained in an object backup-storage group.
A process by which SQL statements are bound automatically (without a user issuing a BIND command) when an application process begins execution and the bound application plan or package it requires is not valid. See also dynamic bind, incremental bind, static bind.
automatic binding method
In the Distributed Computing Environment (DCE), a method of managing the binding for a Remote Procedure Call. It completely hides binding management from client application code. If the client makes a series of remote procedure calls, the stub passes the same binding handle with each call.
The process used by the linkage editor to resolve external symbols left undefined after all the primary input has been processed. See also automatic call library.
automatic call distribution (ACD)
In telephony, a service that allows incoming telephone calls directed to the same dialed number to be routed to one of multiple agents, all of whom can provide the same service to the calling party and all of whom are assigned to the same ACD group.
automatic call distributor (ACD)
A telephone system feature that automatically queues and processes inbound calls according to predefined criteria. For example, a call might be routed to the agent whose line has been idle longest.
- A feature that permits a station to initiate a connection with another station over a switched line without operator action. See also automatic answering, manual call.
- Calling in which the elements of the selection signal are entered into the data network contiguously at the full data signaling rate. The selection signal is generated by the data terminal equipment.
automatic call library
A group of modules that are used as secondary input to the binder to resolve external symbols left undefined after all the primary input has been processed. The automatic call library can contain: object modules, with or without binder control statements; load modules; and runtime routines. See also automatic call.
automatic class selection (ACS)
A mechanism for assigning storage management subsystem (SMS) classes and storage groups to data sets. The storage administrator is responsible for establishing ACS routines appropriate for an installation's storage requirements.
automatic class selection routine (ACS routine)
A procedural set of automatic class selection (ACS) language statements. Based on a set of input variables, the ACS routine generates, for a data set, the name of a predefined storage management subsystem (SMS) class or a list of names of predefined storage groups.
automatic command direction
An RRSF function that enables RACF to automatically direct certain commands to one or more remote nodes after running the commands on the issuing node. Commands can be automatically directed based on who issued the command, the command name, or the profile class related to the command. See also automatic direction of application updates, automatic password direction, command direction, directed command.
In Enhanced ASCII, the conversion of text data from EBCDIC to ASCII and from ASCII to EBCDIC. This capability makes it easier to port international applications developed on, or for, ASCII systems to z/OS systems. See also file tag, program CCSID.
Data that is stored in automatic storage. See also static data.
automatic data set protection (ADSP)
In z/OS, a user attribute that causes all permanent data sets created by the user to be automatically defined to RACF with a discrete RACF profile. See also automatic data set protection attribute.
automatic data set protection attribute (ADSP attribute)
A user attribute that establishes an environment in which all permanent direct access storage device (DASD) data sets created by the user are automatically defined to RACF and protected with a discrete profile. See also automatic data set protection.
In VTAM, the deactivation of links and link stations in adjacent subarea nodes as a result of a deactivation request that names a subarea node. Automatic deactivation occurs only for automatically activated links and link stations that have not also been directly or indirectly activated. See also direct deactivation.
automatic dictionary creation (ADC)
The process of automatically creating a compression dictionary based on conditions associated with data in a table, XML data stored in an XML storage object, or data in a table space partition. See also compression dictionary.
automatic direction of application updates (ADAU)
An RRSF function that automatically directs macros ICHEINTY and RACROUTE that update the RACF database to one or more remote systems. See also automatic command direction, automatic password direction.
An option of the data file utility (DFU) function of the Application Development ToolSet feature that allows information from a previous record to be automatically copied into the current record.
A function used to control jobs that are submitted outside Tivoli Workload Scheduler for z/OS. This allows you to define whether such jobs should be automatically released at the appropriate time, if placed in HOLD status when submitted.
automatic initiate descriptor (AID)
A control block used internally by CICS for scheduling purposes. An example of AID use is scheduling a transaction, optionally associating it with a terminal and a temporary storage queue. Another use is scheduling MRO, LU6.1, and LU6.2 ALLOCATE requests.
automatic initiation descriptor (AID)
In CICS, an interval control element (ICE) that has expired. If all of its required resources are available, it becomes an enabled AID. If it is waiting for a resource to become free, it becomes a suspended AID.
automatic interval migration
Migration that occurs periodically when a threshold level of occupancy is reached or exceeded on a DFSMShsm-managed volume during a specified time interval. Data sets are moved from the volume, in descending order of the largest eligible data sets, until the low threshold of occupancy is reached.
A set of rules and definitions connected to a control table. Automatic journals define which eliminations should be calculated in a consolidation, as well as how and when the consolidation should take place.
In Q replication, a load process in which the Q Apply program loads data into a target table. The user can specify a load utility or let the Q Apply program choose the best available utility. See also manual load.
- In VM, a process by which a virtual machine is initiated by something other than the user of that virtual machine; for example, the primary VM operator's virtual machine is activated automatically during VM initialization.
- A process by which VTAM automatically creates a session-initiation request to establish a session between two logical units (LUs). The session is between a designated primary logical unit (PLU) and a secondary logical unit (SLU) that is neither queued for nor in session with another PLU. See also controlling logical unit.
A process by which a DB2 database system uses user-defined objectives to identify and run required maintenance activities during the next available maintenance window. See also maintenance window.
Automatically determining whether each incoming payment corresponds to a received advice and, if so, causing the matched advice to be disregarded when calculating expected end-of-day positions.
automatic memory reclamation
See garbage collection.
The process that is used to automatically move files from a local file system to storage, based on options and settings that are chosen by a root user on a workstation. See also demand migration, threshold migration.
An operating mode in which all deployment requests are automatically generated and approved. This operating mode is for applications or clusters that do not require human review and approval of deployment recommendations.
automatic network routing (ANR)
In High-Performance Routing (HPR), a highly efficient routing protocol that minimizes cycles and storage requirements for routing network layer packets through intermediate nodes on the route. See also Rapid Transport Protocol.
automatic number identification (ANI)
In telephony, a service available in the United States that is provided by enhanced switch networks and that passes the calling party's telephone number through the network to the called party's telephone number.
automatic password direction
A RACF remote sharing facility (RRSF) function that extends password synchronization and automatic command direction to cause RACF to automatically change the password for a user ID on one or more remote nodes after the password is changed on the local node. See also automatic command direction, automatic direction of application updates, password synchronization.
automatic primary-space management
In DFSMShsm, the process of automatically deleting expired data sets, deleting temporary data sets, releasing unused space, and migrating data sets from primary storage volumes.
A tape volume profile that RACF creates when a RACF-defined user protects a tape data set. When the last data set on the volume is deleted, RACF automatically deletes the tape volume profile. See also non-automatic profile.
In Business Graphics Utility, the use of system-supplied values to determine the intervals on a chart so that the maximum and minimum data values can be represented on the work station or plotter.
- In DB2 for z/OS and DB2 for IBM i, a process by which SQL statements are bound automatically (without a user issuing a command) when an application process begins execution and the bound application plan or package that it requires is not valid. See also rebind.
- See implicit rebind.
The process that is used to reconcile file systems at regular intervals. The intervals are set by a user with root user authority. See also reconciliation.
automatic reconfiguration facility (ARF)
In a multisystem sysplex on PR/SM, the XCF component that provides automatic reconfiguration when one system in the sysplex fails. ARF provides high availability for multisystem applications in the sysplex.
A restart that takes place during the current run, that is, without resubmitting the job. An automatic restart can occur within a job step or at the beginning of a job step. See also checkpoint restart, deferred restart.
automatic secondary-space management
In DFSMShsm, the process of automatically deleting migrated data sets that have expired, deleting expired records from the migration control data sets, and migrating eligible data sets from migration-level-1 volumes to migration-level-2 volumes.
automatic single-route broadcast
A function that is used by some IBM bridge programs to determine the correct settings and to set the bridge single-route broadcast configuration parameters dynamically, without operator intervention. As bridges enter and leave the network, the parameter settings may need to change to maintain a single path between any two LAN segments for single-route broadcast messages.
- Storage that is allocated on entry to a routine or block and is freed when control is returned. See also dynamic storage.
- An area that is allocated by the system when a program or procedure is called. Within automatic storage, data is defined each time the program or procedure is called. See also static storage.
automatic storage reclamation
See garbage collection.
In round-trip engineering between model information and code, a process that maintains an exact match between a model element's properties and its equivalent source code declarations.
automatic transaction initiation (ATI)
The initiation of a CICS transaction by an internally generated request, for example, the issue of an EXEC CICS START command or the reaching of a transient data trigger level. CICS resource definition can associate a trigger level and a transaction with a transient data destination. When the number of records written to the destination reaches the trigger level, the specified transaction is automatically initiated. See also trigger level.
- A variable that a user can declare as an instance of a specific business object model (BOM) class.
- A variable allocated on entry to a routine and deallocated on the return. See also static variable.
A logical set of steps or actions to achieve a particular outcome, for example, restart a server environment. An automation library can contain actions and nested libraries, and can be reused within one or more automation plans.
A collection of commands, shell scripts, workflows, logical device operations, and Java plug-ins that applies to the operation of a specific type of software component or a physical device.
A logical collection of actions and libraries that can be run against a managed system to achieve a particular outcome, for example, to install an application with the latest patches and fix packs on the managed system.
Automotive Multimedia Interface-Collaboration (AMI-C)
A worldwide organization of automobile manufacturers that is involved in the standardization of automotive multimedia interfaces to motor vehicle communication networks.
automounted file system (AutoFS)
A file system that is managed by an automounter daemon. The automounter daemon monitors a specified directory path, and automatically mounts the file system to access data.
A universal mechanism to exchange network capabilities between two Ethernet nodes. The exchange takes place at power-up (or link reset) time. It automatically establishes a link that takes advantage of the highest common denominator of the mutual capabilities of the two Ethernet nodes. The universal mechanism negotiates capabilities that include link speed, PHY types, and full duplex or half duplex.
Pertaining to an on-demand operating environment that responds automatically to problems, security threats, and system failures. See also on demand operating environment.
A computing environment with the ability to manage itself and dynamically adapt to change in accordance with business policies and objectives. By sensing and responding to situations that occur, autonomic computing shifts the burden of managing a computing environment from people to technology. An autonomic computing environment is self-configuring, self-healing, self-optimizing, and self-protecting. See also Generic Log Adapter, self-configure.
autonomic computing adapter (AC adapter)
The adapter that transforms complex incoming messages (from log files or data streams) into standard output formats (such as the Common Base Event), based on parsing rules, and forwards the normalized data to a data consumer.
autonomic computing adoption model (AC adoption model)
A standard for implementing autonomic computing in a staged progression into IT environments. This progression is based on increasing the scope of autonomic control of elements and on increasing the autonomic functionality within the IT environment. See also autonomic computing maturity index.
autonomic computing distributed infrastructure (AC distributed infrastructure)
The set of autonomic managers and managed resources that form the basis of an autonomic computing system. The AC distributed infrastructure collects and personalizes metrics for autonomic managers, forwards notifications to the interested autonomic managers, routes operations to the managed resources, and routes calls from the managed resources to the appropriate autonomic managers. See also autonomic manager, managed resource.
autonomic computing maturity index (AC maturity index)
A graduated scale that expresses the level of maturity of autonomic computing, where level 1 is basic (completely manual), level 2 is managed, level 3 is predictive, level 4 is adaptive, and level 5 is completely autonomic. See also autonomic computing adoption model.
Autonomic Computing Policy Language
The XML specification for defining the four components of a policy expression: the scope, condition, decision, and business value. See also Simplified Policy Language.
autonomic computing system
A computing system that senses its operating environment, models the behavior of the environment, and takes action to change the environment or its behavior. An autonomic computing system has the properties of self-configuration, self-healing, self-optimization, and self-protection.
Autonomic Computing Toolkit
The collection of core technologies that enable products to develop solutions that are compliant with the architectural standards of the IBM Autonomic Computing Initiative. The Autonomic Computing Toolkit also contains standard interfaces for developing autonomic managers and managed resources as well as scenarios and documentation explaining how to enable these entities to work together to solve customer problems in an autonomic computing system.
autonomic control loop
See autonomic manager.
See autonomic manager.
Autonomic Management Engine (AME)
An example implementation of an autonomic manager that provides event monitoring, filtering, and aggregation capabilities. It can also perform analysis and execute scripts to make changes to the system state.
A set of software or hardware components, configured by policies, which manage the behavior of other software or hardware components as a human might manage them. An autonomic manager includes a control loop that consists of monitor, analyze, plan, and execute components. See also analyze component, autonomic computing distributed infrastructure, decision point, execute component, manageability interface, monitor component, plan component.
A core capability of the IBM Autonomic Computing Initiative that addresses the need to easily determine the root cause of a problem such that the appropriate corrective action can be taken. See also resource model engine.
autonomous system (AS)
In TCP/IP, a group of networks and routers under one administrative authority. These networks and routers cooperate closely to propagate network reachability (and routing) information among themselves using an interior gateway protocol of their choice. See also area.
autonomous system number
In TCP/IP, a number that is assigned to an autonomous system by the same central authority that assigns IP addresses. The autonomous system number makes it possible for automated routing algorithms to distinguish autonomous systems.
autonomous system path
In the Border Gateway Protocol (BGP), the autonomous systems that are traversed to reach the networks listed in the update message. The path helps to suppress looping of routing information.
The function that restarts a system automatically. This is typically used when power has been restored to the system and any backup power supply has recharged after a temporary power failure or after an unexpected power line disturbance that caused the system to shut down unexpectedly.
Pertaining to a characteristic of database-managed space (DMS) table spaces and regular and large automatic storage table spaces. The table space expands automatically by extending or acquiring containers, as needed, to increase the table space size until the file systems are full or a user-specified limit is reached.
- An OSI Communications Subsystem function that starts an X.25 line automatically when the line set that it belongs to is started.
- Pertaining to a system activity that starts automatically, usually based on the start or end of some other activity.
A batch job doing repetitive work or one-time initialization work that is associated with a particular subsystem. The autostart jobs associated with a subsystem are automatically started each time the subsystem is started.
An unattended operator station task that does not require a terminal or a logged-on user. Autotasks can run independently of VTAM and are typically used for automated console operations. See also logged-on operator.
auxiliary data set
In AFP printing, a data set that contains job header, data set header, job trailer, or message data. See also print data set.
auxiliary HADR standby database
In an HADR multiple standby system, a standby database that allows only the superAsync synchronization mode. Multiple auxiliary HADR standby databases can be defined in a multiple standby system. See also principal HADR standby database, standby database.
auxiliary network address
In VTAM, any network address, except the main network address, that is assigned to a logical unit capable of having parallel sessions. See also main network address.
A type of business schedule that is associated with one or more other schedules and that specifies multiple dates for exceptions to regular business schedules that do not occur on regular intervals. For example, company holidays or irregular maintenance times that apply to all service offerings in an enterprise can be specified once in a auxiliary schedule and then applied to schedules across multiple service offerings.
auxiliary standby database
See auxiliary HADR standby database.
All addressable storage other than main storage. See also memory.
- A group of disk units defined from the auxiliary storage devices. See also system ASP, user ASP.
- One or more storage units that are defined from the storage devices or storage device subsystems that make up auxiliary storage. An ASP provides a way of organizing data to limit the effect of storage-device failures and to reduce recovery time. See also main storage pool.
auxiliary storage - TS queue
In CICS, a temporary storage queue that is in a physical file managed by CICS. Auxiliary storage should be used to store large amounts of data, or data needed for a long period of time. See also main storage - TS queue.
A table that stores columns outside the table in which they are defined. See also base table.
auxiliary trace data set
A sequentially organized data set on disk or tape, used to record all trace entries generated while the auxiliary trace function is active. Either one or two auxiliary trace data sets can be defined; the latter allows the data sets to be switched when the one currently being used is full. The trace utility program (DFHTUP) can be used to print records from auxiliary trace data sets.
- The degree to which a system or resource is ready when needed to process data.
- The total amount of time that a resource can devote to new assignments.
- The delivery of reliable service during scheduled periods
- The successful execution of a monitored transaction over a specified period of time. See also transaction.
- The time periods during which a resource is accessible. For example, a contractor might have an availability of 9 AM to 5 PM every weekday, and 9 AM to 3 PM on Saturdays.
- The condition allowing users to access and use their applications and data.
- In DFSMShsm, the process of ensuring that a current version (backup copy) of the installation's data sets resides on tape or a direct access storage device (DASD).
- A service management process that helps to define customer requirements for information technology service availability, the capabilities of the IT infrastructure to deliver those levels of availability, and the actions that are needed to improved availability. See also deployment management, operations and administration, security management.
available to promise inventory (ATP inventory)
The inventory that is available in stock (on hand) plus the inventory that is on order, not including inventory that is currently being processed, reserved or allocated to backorders.
average throughput rate
The power of a system to process a representative work load. The power of the system is measured in units of data processing work; for example, jobs or transactions successfully completed per hour, minute, or second.
See Audio/Video Interleave.
See availability manager.
See automatic volume recognition.
See Audio-Video Subsystem.
See auto volume transfer/auto disk transfer.
See alphanumeric weight.
See arbitration wait timeout value.
See Abstract Window Toolkit.
- In Business Graphics Utility and the GDDM function, one of the intersecting horizontal or vertical scales where data values are plotted on a chart.
- The direction of movement through an instance of the XQuery and XPath data model. The six supported axes are child, parent, self, attribute, descendant, and descendant-or-self.
- A part of a location step in a search path. An axis defines the direction of the search for objects in the object hierarchy of the content store. An axis indicates where to search for objects by defining a set of objects relative to the current context object. For example, the ancestor axis specifies the ancestor of the current context object.
- The representation in screen coordinates of the points where a coordinate value varies and all other coordinate values are zero.
The "authorized cross-memory" server environment. A series of modules providing runtime services for CICS-related cross-memory servers which run in MVS authorized state (unlike CICS itself, which runs unauthorized once initialization has completed) such as the temporary storage data sharing server.
A keyboard in which the keys in the second-from-top row (row D) are labeled (from left to right): A, Z, E, R, T, Y, U, I, O, and P. See also QWERTY keyboard.