This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
An object-oriented high-level language that evolved from the C language. C++ takes advantage of the benefits of object-oriented technology such as code modularity, portability, and reuse.
A level of security defined in the Trusted Computer System Evaluation Criteria (TCSEC) published by the United States Government. To meet C2 requirements, a system must perform discretionary access control, authentication and verification, object reuse protection, and auditing of security-relevant events.
A rule induction algorithm that builds either a decision tree or a rule set. The model works by splitting the sample based on the field that provides the maximum information gain at each level. See also rule induction.
A section of cable between components or devices on a network. A segment may consist of a single patch cable, multiple patch cables that are connected to one another, or a combination of building cable and patch cables that are connected to one another.
See certificate authority certificate.
- A buffer that contains frequently accessed instructions and data; it is used to reduce access time.
- Storage used to improve access times to instructions, data, or both. For example, data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.
- To place a duplicate copy of a file on random access media when the server migrates a file to another storage pool in the hierarchy.
- To place, hide, or store frequently used information locally for quick retrieval.
- Memory used to improve access times to instructions, data, or both. Data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.
Products that have their information, such as item attributes, inventory balance, or availability, stored in a local data cache. The consuming application, such as a web store, can access the information from the cache, reducing synchronous queries to the order management system.
A process by which data associated with a file is removed from the cache system. The data is removed either by using a Least Recently Used (LRU) algorithm when configured General Parallel File System (GPFS) hard or soft quota limits are exceeded or by issuing a command. When referenced again in the cache system, the data that is associated with the file is retrieved from the home system.
cache fast write
A storage control capability in which data is written directly to cache without using nonvolatile storage. Cache fast write is useful for temporary data or data that is readily re-created. See also DASD fast write.
A snapshot of a logical volume created by Logical Volume Snapshot Agent. Blocks are saved immediately before they are modified during the image backup and their logical extents are saved in the cache files.
- A processor storage reference that is satisfied by information from a cache.
- An event that satisfies a read operation by retrieving data from cache instead of retrieving it from the intended storage or a lower level of cache. See also cache miss.
- The cache component that is normally loaded, stored, and interrogated during cache lookup.
- A record that contains relevant information about the user data that is currently in the subsystem cache memory. Examples of this information include the current state of the data and the intended location of the data on one or more disks.
- A delay that occurs when the processor references data or instructions that are not already in the data cache or instruction cache.
- An event that satisfies a read operation by retrieving data from the intended storage or a lower level of cache because the requested data is not available in the only level or a higher level of cache. See also cache hit.
A coupling facility structure that stores data that can be available to all members of a Sysplex. A DB2 data sharing group uses cache structures as group buffer pools. See also group buffer pool.
In a federated system, a logical table object that is used to cache data from a data source table. A cache table comprises a nickname that identifies the data source table, one or more materialized query tables, and a schedule for replicating the data in each materialized query table.
The process of storing frequently used results from a request to memory for quick retrieval, until it is time to refresh the information. The DB2 database manager provides many forms of caching, such as directory caching, package caching, file system caching, and LDAP caching.
caching proxy server
A proxy server that stores the documents that it retrieves from other servers in a local cache. The caching proxy server can then respond to subsequent requests for these documents without retrieving them from the other servers. This can improve response time.
See client acceptor daemon.
See I/O cage.
See command attention key.
See customer acceptance laboratory.
See calculation script.
An expression that is not constant, but whose value depends upon other values. To be evaluated, a calculated expression must obtain and compute values from other sources, normally in other fields or rows.
A member of a dimension whose measure values are not stored but are calculated at run time using an expression. See also input member.
A set of ranges that can be used by a calculation rule. For example, for shipping charges, there can be a set of weight ranges that each correspond to a particular cost. That is, a product that weighs between 0 to 5 kg might cost $10.00 to ship, while a product weighing 5 to 10 kg might cost $15.00 to ship.
- A view in the Notes mail database that can be used to manage time and schedule meetings. Users can add appointments, meetings, reminders, events, and anniversaries to the Calendar view.
- A list of scheduling dates. Calendars are defined in the database and are mostly assigned to run cycles. Calendars can be used either to identify the dates when job streams or jobs can be run (when used with inclusive run cycles), or when they cannot be run (when used with exclusive run cycles). A calendar can also be designated for use as a non-working days calendar in a job stream. See also exclusive run cycle, holidays calendar, iCalendar, inclusive run cycle, non-working days calendar.
calendaring and scheduling
A feature available for clients using Notes that allows the user whose mail is enabled with Sametime to schedule an online meeting in Notes and send email invitations to prospective participants.
A schedule that defines both the days and time that processing occurs. For example, one could use a calendar schedule to make sure that a process runs every Tuesday starting between 19:00 and 19:30 and ending between midnight and 00:30.
- In capacity planning, the process of refining a model so that it represents the system the user is modeling. The predicted and measured values should match as closely as possible, with no more than a 10% difference for resource utilization, and no more than a 20% difference for response times.
- The comparison and adjustment of an instrument to a standard of known accuracy.
- A physical or logical connection between one or more parties in a telephone call.
- To start a program or procedure, usually by specifying the entry conditions and transferring control to an entry point.
- In Sametime, an audible message sent using a traditional phone call (POTS, PSTN). It may be IP based, or a hybrid using both IP and traditional phone.
- A single runtime instance of a voice application.
- An action state that invokes an operation on a classifier.
- In query management, the Common Programming Interface (CPI) that includes the definitions of the control blocks and constants used for the interface. See also command interface.
- The application server to which the QMF session is currently connected. After the connection is made, this server processes all SQL statements.
- The name of the interface program, the definition of the arguments passed to the interface program, and the definition of the data structures passed to the interface program.
- Services that are provided by IMS for use by IMS exit routines. These services provide clearly defined interfaces that allow exit routines to request various functions, such as acquiring storage or finding an IMS control block.
- A set of documented interfaces between the z/OS operating system and higher level applications that want to access functions specified in the Single UNIX Specification and earlier standards. See also system call.
- A program service provided through a programming interface. See also action service.
A call supervision packet that a called data terminal equipment (DTE) transmits to indicate to the data circuit-terminating equipment (DCE) that it accepts the incoming call. See also call connected packet, call request packet.
call attachment facility (CAF)
A DB2 for z/OS attachment facility for application programs that run in TSO or z/OS batch. The CAF is an alternative to the DSN command processor and provides greater control over the execution environment. See also Resource Recovery Services attachment facility.
- In the AIX operating system, a procedure that is called if and when certain specified conditions are met.
- A way for one thread to notify another application thread that an event has happened.
- A message consumer or an event handler routine.
- Pertaining to a characteristic that tells a remote system whether the local system it tries to access will verify its identity.
A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the web service security run time for propagation in the web service security header.
A method for authentication of a voice user who is requesting a system API. This mechanism places a callback request to VoiceLogistics Pro (VLP) to verify whether the user is logged into VLP.
- A center that handles a large number of calls to either take orders or provide customer service.
- A central point at which all inbound calls are handled by a group of individuals on a controlled sequential basis. Call centers are usually a front end to a business such as airline ticketing or mail order.
call connected packet
In X.25 communications, a call supervision packet transmitted by a DCE to inform the calling DTE of the complete establishment of the call. See also call request packet, call-accepted packet.
call detail record (CDR)
In telephony, a unit of information containing data about a completed call, such as the time the call began, its duration and date, the originating extension, and the number called.
called DLS user
The data link service (DLS) user in connection mode that processes requests for connections from other DLS users. See also Data Link Service.
See dialed number identification service.
- On a switched line, the location to which a connection is established.
- Any person, device, or system that receives a telephone call. See also caller.
- Any person, device, or system that makes a telephone call. See also called party.
- A function that calls another function.
- The requester of a service.
A communication link established between a product and a service provider. The product can use this link to place a call to IBM or to another service provider when it requires service. With access to the machine, service personnel can perform service tasks, such as viewing error and problem logs or initiating trace and dump retrievals.
See network user address.
A part of the external CICS interface (EXCI). The CALL interface consists of six commands that allow you to allocate and open sessions to a CICS system from non-CICS programs running under MVS; issue DPL requests on these sessions from the non-CICS programs; and close and deallocate the sessions on completion of the DPL requests.
call level interface (CLI)
An API for database access that provides a standard set of functions to process SQL statements, XQuery expressions, and related services at run time. See also embedded SQL.
- An outbound message to request services or data from an enterprise application or web service.
- A kernel parameter that establishes the maximum number of scheduled activities that can be pending simultaneously.
- The action of bringing a computer program, a routine, or a subroutine into effect.
Software that provides basic computer-telephony integration (CTI) enablement and comprehensive CTI functionality. This includes access to, and management of, inbound and outbound telecommunications.
call progress signal
A call control signal transmitted from the data circuit-terminating equipment (DCE) to the calling data terminal equipment (DTE) to indicate the progress of the establishment of a call, the reason why the connection could not be established, or any other network condition.
call request packet
A call supervision packet that a data terminal equipment (DTE) transmits to ask that a connection for a call be established throughout the network. See also call connected packet, call-accepted packet.
call request signal
During the establishment of a connection for a call, a signal that informs the data circuit-terminating equipment (DCE) that a data terminal equipment (DTE) has asked to make a call.
- A list of data elements that is constructed and maintained by the Java virtual machine (JVM) for a program to successfully call and return from a method.
- The ordered list of all programs or procedures currently started for a job. The programs and procedures can be started explicitly with the CALL instruction, or implicitly from some other event.
In the Distributed Computing Environment (DCE), a thread created by a remote procedure call (RPC) server's run time to execute remote procedures. When engaged by an RPC, a call thread temporarily forms part of the RPC thread of the call.
A planned series of operations including advertisements and suggestive selling techniques, that are pursued to achieve a defined set of business objectives. In the WebSphere Commerce Accelerator, campaigns are used to coordinate and aggregate groups of campaign initiatives.
Canadian Standards Association (CSA)
A not-for-profit membership-based association dedicated to standards development for business, industry, government and consumers in Canada and the global marketplace. See also CSA International.
A closedown in which a program is abnormally terminated either because of an unexpected situation or as the result of an operator command. See also orderly closedown, quick closedown.
cancellation cleanup handler
A function that you can specify to perform an action, such as releasing resources, that occurs after the thread returns from the start routine and calls pthread_exit() or after a cancellation request is performed on the thread.
One of two values, which are either enabled or disabled, that describe whether cancellation requests in the current thread are acted on or held in a pending state. If the value is enabled, the cancellation request is acted on immediately and is based on the current cancellation type. If the value is disabled, the cancellation request is held in a pending state until it is enabled.
One of two values (deferred or asynchronous) that describe how cancellation requests in the current thread are acted on when the cancellation state is enabled. If the value is deferred, the cancellation request is held pending. If the value is asynchronous, the cancel request is acted on immediately, thus ending the thread with a status of PTHREAD_CANCELED.
A known service endpoint that implements an interface for a particular request. The set of candidates is then filtered by the dynamic assembler to select the best endpoint out of all the candidates.
A short list of entities that are potential matches of the incoming identity because they share certain attributes. See also attribute.
The minimum score at which a particular attribute value must match between the incoming identity and an existing entity to satisfy the resolution rule. See also resolution rule.
In LANs, the IEEE 802.1 format for the transmission of medium access control (MAC) addresses for token-ring and Ethernet adapters. In canonical format, the least significant (rightmost) bit of each address byte is transmitted first. See also noncanonical address.
A format for storing hierarchical names that displays the hierarchical attribute of each component of the name. For example, the canonical format for the name Reuben D. Smith/Ottawa/Acme/CA is: CN=Reuben D. Smith/OU=Ottawa/O=Acme/C=CA where: CN is the common name, OU is the organizational unit, O is the organization, and C is the region or country code.
See line mode.
See Common Alerting Protocol.
- A group of functions and features that can be hidden or revealed to simplify the user interface. Capabilities can be enabled or disabled by changing preference settings, or they can be controlled through an administration interface.
- A function or feature that is made available by an application, tool, or product.
- Specific features or characteristics of a piece of software, such as the database version.
In OSI, a confirmed data transfer service provided by the session layer to transfer a limited amount of data outside of an activity. Capability data can be used by two peers to exchange information about their capability to start an activity.
A series of messages that pass between two CICS regions to establish if they can communicate using IP interconnectivity (IPIC). The capability exchange determines the security controls that are applied to the connection, the number of sessions to be made available, and resynchronizes any outstanding work if the connection has previously failed.
A category, such as "database" or "hardware" that is used to group characteristics of a piece of software. For example, the "hardware" capability type includes characteristics such the BIOS vendor and BIOS version.
- A measure of how much volume or revenue can be handled by a specific resource.
- The actual number of parallel servers and workstation resources available during a specified open interval.
A rule that governs the amount of items that can be awarded to a supplier. Using a capacity constraint, business can be awarded to a preferred supplier or the volume of business for a supplier can be limited.
A licensing model that licenses features with a price-per-terabyte model. Licensed features are FlashCopy, and Metro Mirror and Global Mirror, and virtualization. See also FlashCopy, Metro Mirror, virtualization.
A function that uses information about the system, such as a description of the system's workload, performance objectives, and configuration, to determine how the data processing needs of the system can best be met. The capacity planner then recommends, through the use of printed reports and graphs, ways to enhance performance, such as hardware upgrades, performance tuning, or system configuration changes.
- The process of scheduling the resources required to perform project work.
- The process of determining the hardware and software configuration required to accommodate the anticipated workload on a system.
capacity requirements planning (CRP)
The process of specifying the level of resources (facilities, equipment, and labor force size) that best supports the competitive strategy for production of the enterprise.
Capacity Upgrade on Demand (CUoD)
The capability to permanently activate one or more inactive processors without having to restart the server or interrupt the data flow of the business, through the purchase of a permanent processor activation. This capability adds significant value by enabling a fast and economical way to add capacity for new workloads, enabling the server to adapt to unexpected performance demands. See also activation code, application provisioning, dynamic LPAR, free pool, Hardware Management Console.
An uppercase letter. See also simple letter.
capital lock (caps lock)
The keyboard function that invokes the uppercase of alphabetic characters, but does not change the response of numeric and other keys. This function is convenient for combining uppercase letters with numbers as in the string "M3C 1H7". Capital Lock is a toggle key.
capitals lock state
A state that, if activated, will result in the generation of the capital form of all graphic characters on the keyboard for which such a form exists. National standards or usage may determine which graphic characters are affected by this state (see ISO/IEC 9995-1).
See capital lock.
A specification of the type of capsule that can occupy a particular position in a capsule's collaboration or structure. Capsule roles are strongly owned by the container capsule and cannot exist independently of it.
- A National Language Support-enabled text string in a policy expression that describes the policy.
- Text associated with, and describing, a table or figure.
- A description associated with an identifier. The caption is often used in preference to the identifier in reports to make them more comprehensible.
- To digitize an image into the video memory of the M-Video Capture Adapter.
- In SQL replication, event publishing, and Q replication, to gather changes from a source database. These changes can come from the DB2 log or journal or from source transactions in a relational database that is not a DB2 database.
- The process by which an acquirer receives payment from the customer's financial institution and remits the payment. A "capture" is the guarantee that the funds are available and that the transfer will take place.
Capture control server
In SQL replication, a database or subsystem that contains the Capture control tables, which store information about registered replication source tables. The Capture program runs on the Capture control server.
A virtual window into the actual unit control block (UCB). Captured UCB resides in private storage below 16 MB. All the virtual windows on the actual UCB view the same data at the same time. Only actual UCBs above 16 MB are captured. See also actual UCB, unit control block.
In SQL replication, an approximate difference between the time that source data was changed and the time that the Capture program made the data available to the Apply program by committing the data to a CD table. Capture latency is a subset of the end-to-end latency in a replication configuration. See also Apply latency, end-to-end latency, latency, Q Apply latency, Q Capture latency.
In SQL replication, a program that reads database log or journal records to capture changes that are made to DB2 database source tables and store them in staging tables. See also Apply program, Capture trigger, Q Capture program.
A capture specification provides the information that CICS will use to detect an event within an application or in the system. The capture specification can include the capture point, capture data, and predicates for filtering and is defined in the event binding file.
In SQL replication, a mechanism that captures delete, update, or insert operations that are performed on source tables other than DB2 source tables. See also Apply program, Capture program.
A transferrable permit that allows an organization to release one ton of carbon dioxide into the environment. The implementation of carbon credits is an attempt to reduce the amount of greenhouse gases that are being produced.
The amount of greenhouse gas that a person or organization is responsible for producing. A smaller carbon footprint is associated with having less detrimental effect on the environment.
- An electronic circuit board that is plugged into a slot in a system to give it added capabilities.
- An item of equipment that is inserted in a shelf. A card is a predefined business object.
- A Wireless Markup Language (WML) document that provides user-interface and navigational settings to display content on mobile devices. See also deck.
- In the Map Designer, a data object. There are two types of map cards: input and output.
A one-to-one representation of the hole patterns of a punched card; for example, a card image might be a matrix in which a one represents a punch and a zero represents the absence of a punch.
- For relational data sources, a numerical indication of the relationship between two query subjects, query items, or other model objects.
- The number of elements in a set. See also multiplicity.
- For OLAP data sources, the number of members in a hierarchy. The cardinality property for a hierarchy is used to assign solve orders to expressions.
- The number of rows in a database table or the number of elements in an array. See also associative array.
- In information analysis, a measure of the number of unique values in a column.
card verification value authorization code (CVV auth code)
A separate authorization code that might be returned in addition to a credit card authorization code when a financial institution approves a credit card transaction.
A series of jobs within a profession or across professions. The career is owned by an individual who also has the responsibility for managing it and for developing the required skills. A career is usually but not always tangible evidence of growth in skills, capability, prestige, recognition and compensation.
The work an individual does. Career paths are frequently aligned with an organization (e.g., Marketing Professional Career). Career paths are divided into job categories and job categories are divided into job roles.
See Continuous Association Rule Mining Algorithm.
carriage control character
A character that is used to specify a write, space, or skip operation. See also control character.
- The movement of the printing position or display position to the first position on the same line.
- A keystroke generally indicating the end of a command line.
- The action that indicates that printing is to be continued at the left margin of the next line. A carriage return is equivalent to the carriage return of a typewriter.
- A transportation service provider that provides delivery and shipping services between buyers, sellers, and customers.
- A continuous frequency (a pulse train, or an electric or electromagnetic wave) that may be varied by a signal bearing information to be transmitted over a communication system.
A code that identifies a carrier organization in regions outside North America, which do not use a SCAC as an identifier. See also Standard Carrier Alpha Code.
carrier management system
A network management product that a communication common carrier provides to a customer; this product monitors and manages the telecommunication equipment that the communication common carrier provides for the customer's network.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
An arbitration protocol in which multiple stations access the network without explicit coordination, avoiding contention by checking for other signals (sensing the carrier) and deferring if a signal is already present. Should two signals collide, each station detects the collision and transmits again after a random amount of time.
See command and response token.
carton flow rack
Storage rack consisting of multiple lanes of gravity fed carton flow conveyors. The lanes are replenished from the rear. The material flows through the rack and is picked from the front.
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the act of physically removing a tape cartridge, usually under robot control, by placing it in an output station. The software logically removes the cartridge by deleting or updating the tape volume record in the tape configuration database (TCDB). For a manual tape library, cartridge eject is the logical removal of a tape cartridge from the manual tape library by deleting or updating the tape volume record in the TCDB.
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the process of logically adding a tape cartridge to the library by creating or updating the tape volume record in the tape configuration database (TCDB). The cartridge entry process includes the assignment of the cartridge to the scratch or private category in the library.
- See China Association for Standards.
- See channel associated signaling.
- See Common Analysis Structure.
- An operation that propagates the exact same operation to all dependant objects.
- To connect in a series or in a succession of stages so that each stage derives from or acts upon the product of the preceding stage. For instance, network controllers might be cascaded in a succession of levels in order to concentrate many more lines than a single level permits.
A transaction that spans nodes and is coordinated by Resource Recovery Services (RRS). cascaded multisystem transaction. A transaction that spans systems in a sysplex and is coordinated by Resource Recovery Services (RRS).
The process of deleting rows from a child table when the foreign key is deleted from the parent table. When any rows are deleted from the primary key column of a table, cascading deletes, if enabled, delete identical information from any foreign-key column in a related table.
A replication topology in which there are multiple tiers of servers. A peer/master server replicates to a small set of read-only servers which in turn replicate to other servers. Such a topology off-loads replication work from the master servers.
A resource that can be taken over by more than one node. A takeover priority is assigned to each configured cluster resource group on a per-node basis. In the event of a takeover, the node with the highest priority acquires the resource group. If that node is unavailable, the node with the next-highest priority acquires the resource group, and so on.
- A process instance and related set of documents, properties, roles, and tasks that are used to facilitate the collaboration of people to achieve a business outcome. See also task.
- A container that holds a specified quantity of identical items (SKU) as packaged by a vendor. Cases are identified by license plate number and are generally put away into storage, in their original condition until picked.
- The basic unit of analysis. In a data set based on a simple survey, a case generally corresponds to a respondent.
See Computer Assisted Software Engineering.
See factory carton code.
- The word case followed by a constant expression and a colon. When the selector is evaluated to the value of the constant expression, the statements following the case label are processed.
- In Pascal, a value or range of values that comes before a statement in a CASE statement branch. When the selector is evaluated to the value of a CASE label, the statement following the case label is processed.
The definition of a case. The information that a case type provides is similar to that information that a process definition or template provides for a process instance. See also case property.
case weight (CW)
In cultural sorting, the combined weight value of case, subscripting, superscripting, fractions, and other factors. For example, the lowercase letter a precedes the uppercase letter A, and middle Arabic shapes precede final Arabic shapes. See also alphanumeric weight, diacritical weight, indifferent weight, level 3, mark weight, special weight.
A service that provides customers with the ability to receive cash in addition to the goods that they purchased in a store using an alternate payment method. The total amount of the transaction, which includes the cost of the purchased goods and the amount of the cash received, is debited from the customer's account. For example, a customer might charge $37 to their credit card for a $17 item in order to get that item and $20 back from the store.
See computer assisted self-interviewing.
A certificate that is signed using a key maintained by a certificate authority. Before issuing a certificate, the certificate authority evaluates a certificate requestor to determine that the requestor is the certificate holder referenced in the certificate.
See common analysis structure processor.
- In cut-sheet printers, a removable container for a supply of paper.
- A software component which supports a particular payment protocol.
- In programming languages, an expression that converts the value of its operand to a specified type.
- A database object and an operator for converting data from one data type to another. Built-in data types have built-in casts to compatible data types within database server. See also explicit cast, implicit cast, user-defined cast.
A function that is used to convert instances of a source data type into instances of a different target data type. In general, a cast function has the name of the target data type and has one single argument whose type is the source data type. Its return type is the target data type.
See Customer Premise Equipment Alerting Signal tone.
- A container for one or more offerings that a user can request.
- A container that, depending on the container type, holds processes, data, resources, organizations, or reports in the project tree.
- The highest level of the category hierarchy. All of the groupings that exist below the catalog are referred to as categories.
- A data set that contains information about other data sets.
- A collection of tables and views that contains descriptions of objects such as tables, views, and indexes.
- A repository for storing specifications for builds, reference structures, connections, and other components.
- A container that stores items. An item can belong to only one catalog. Each catalog must be associated with at least one hierarchy, the primary hierarchy, and can be associated with one or more secondary hierarchies. See also item.
- To specify the record class and file plan location when declaring a record.
- A directory of files and libraries, with reference to their locations.
- To enter information about a data set or a library into a catalog.
A catalog entry, either a user catalog entry or a catalog connector entry, in the master catalog that points to a user catalog's volume (that is, it contains the volume serial number of the direct access volume that contains the user catalog).
An object in an online catalog. An entry has a name, description, list price, and other details. The entry can be as simple as a SKU; it may also be a product that is automatically broken down into its component items such as a bundle or package. See also list price.
A filter that controls product entitlement by dividing catalogs into subsets as defined by the business owner. Catalog filters can also be used as one of the price rules conditions when determining the prices for the set of catalog entries that a set of customers are entitled to.
See catalog partition.
- In a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server. The catalog partition for a database is automatically created on the database partition server where the CREATE DATABASE command is run.
- In a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server.
catalog recovery area (CRA)
An entry-sequenced data set (ESDS) that exists on each volume owned by a recoverable catalog, including the volume on which the catalog resides. The CRA contains copies of the catalog's records and can be used to recover a damaged catalog.
A table that is automatically created in the DB2 database catalog when a database is created. Catalog tables contain information about a database and its objects. See also catalog view.
- In DB2 for Linux, UNIX, and Windows, a SYSCAT or SYSSTAT view on the catalog table.
- One of a set of views automatically created when a database is created. Catalog views contain information about the database and the objects in that database. Examples of information about the database are definitions of database objects and information about the authority that users have on these objects. See also catalog table.
A block associated with a try block that receives control when an exception matching its argument is thrown. See also try block.
A server that service personnel use to collect and retain status data that other machines, such as the TotalStorage Enterprise Storage Server (ESS), send to it. See also catcher telephone number.
catcher telephone number
The telephone number that connects the ESS to the support-catcher server and enables the ESS to receive a trace or dump package. See also catcher, Remote Technical Assistance and Information Network.
catching message intermediate event
An intermediate event that is triggered when a specific message is received. See also intermediate event.
A local mount that z/OS UNIX automatically issues to every other system's physical file system that is running sysplex-aware for that mode (read-write or read-only) when a file system mount is successful on a system in a shared file system environment.
In an RSR environment, the process by which tracked log data is used to make all recoverable resources (for example, shadow databases) current with those resources on the active IMS.
In high availability disaster recovery, a state in which the standby database might not have applied all logged operations that occurred on the primary database. In this state, the standby database retrieves and applies previously generated log data to synchronize with the primary database. There are two types of catchup states: local and remote.
A variable that has a limited number of distinct values or categories, such as a variable that is based on a question that has a predefined set of answers. Categorical variables can be single response or multiple response.
- A logical subset of volumes in a tape library. A category can be assigned by the library manager (for example, the insert category) or by the software (such as, the private or scratch categories).
- A group of brands that are related by customer type, technology, capability or requirements for market success.
- A container used in a structure diagram to group elements based on a shared attribute or quality.
- The recommended security specifications needed for both the CICS transaction definitions and the corresponding RACF profiles.
- A set of items that are grouped according to a specific description or classification. Categories can be different levels of information within a dimension. See also member.
- A closed-ended response to a question or item in a shared list.
- A classification of an item. Hierarchies are made up of categories and items. Items in a catalog can be associated to one or more categories from the specifications of the catalog. Items can also be unassigned, which is their default state, which means they are not in any category yet. Every hierarchy has exactly one root category. Every category can have any number of additional categories within it, called sub-categories. See also container, hierarchy.
- A group within a system of classification whose contents share similar properties. See also category page.
- An optional grouping of messages that are related in some way. For example, messages that relate to a particular application might be included in a single category. See also message.
- A classification of elements for documentation or analyses.
- A property that is set on an element of the business object model (BOM) and can be applied to business classes and filtered in business rules. This property allows the user to specify whether a business class and its members are visible in a rule.
- A container that groups a set of related records within a file plan.
- A word or phrase that classifies and organizes terms in the business glossary. A category can contain other categories, and it can also contain terms. In addition, a category can reference terms that it does not contain. See also business glossary.
- A type class that is used to organize types in a type tree in the Type Designer. Categories organize types that have common properties.
- A set of catalog items in a number of different hierarchical and searchable groupings.
- A word, phrase, or number used to group documents in a view.
- One possible answer in a set of answers that are defined in the category list of a categorical or grid question.
category 1 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are never associated with a terminal: that is, they are for CICS internal use only and should not be invoked from a user terminal. For this reason, CICS does not perform any security checks when it initiates transactions in this category for its own use.
category 2 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either initiated by the terminal user or are associated with a terminal. You should restrict authorization to initiate these transactions to user IDs belonging to specific RACF groups.
category 3 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either invoked by the terminal user or associated with a terminal. All CICS users, whether they are signed on or not, require access to transactions in this category. For this reason, they are exempt from any security checks and CICS permits any terminal user to initiate these transactions. Examples of category 3 transactions are CESN and CESF, to sign on and off, respectively.
An attribute instance on a category. The attribute is defined in the specification of the owning hierarchy or by a secondary specification associated to that category. See also attribute instance.
A value that uniquely identifies every category within a dimension. See also member unique name.
category data set
A data set in which the user can specify whether x-values should be stored in memory or computed according to the indices of data points. The x-values correspond to a category number.
An additional field that is created by a buyer user to gather more information about categories and items. A category property is specific to the category for which it is created and applies only to items of that category.
A list of predefined answers that are in a categorical or grid question. The respondent selects the answers to the question from this list. For example, a list of brand names is a category list.
The management system for rationalizing a group of related brands, branded offerings, brand units and/or business units. Category managers need to manage the inevitable overlap between brands and units which occurs as successful brands and units expand their scope.
A defined role in WebSphere Commerce that manages the category hierarchy by creating, modifying, and deleting categories. The category hierarchy organizes products or services offered by the store. The category manager also manages products, expected inventory records, vendor information, inventory, and return reasons.
The organizational structure for managing groups of related brand units or business units. The organization focuses on coordinating and rationalizing activities across a portfolio of brands and with other categories.
A web page in an online store that displays product categories. Category pages connect customers to child category pages or to products that belong to the selected category. See also category, child category.
The answer portion of categorical, grid, and numeric grid Looks. The category replication controls which category rows in a Look are repeated when the Look is applied to a question.
A subset of the categories in a dimension, either from a single level or from different levels in the same dimension. See also set.
category-specific item attribute
An attribute instance that applies to an item because of the presence of that item in a given category. A secondary specification with additional attributes is applied to that category, and all items in that category gain those extra fields. See also attribute instance.
See computer assisted telephone interviewing.
See Controlled Access Unit.
See cube adjusted weight.
See cipher block chaining.
See component-based development.
See control blocks in common.
See Class Broker for Java.
See Custom-built Product Delivery Option.
See composite business service.
See computerized branch exchange.
See Common Cryptographic Architecture.
See C/370 common anchor area.
- See command control block.
- See connection control block.
- See conversation control block.
- See change control board.
See concurrent copy-compatible snapshot.
See client channel definition table.
See consistent-change-data table.
See custom card identification number.
See common communication layer.
See change and configuration management.
See channel command retry.
- See Common Communications Support.
- See console communication service.
- See coded character set.
- See common channel signaling.
See coded character set identifier 65534.
See coded character set identifier 65535.
See closed-circuit television.
See channel command word.
See compact disc.
See channel definition file.
See connector development kit.
See Common Data Link Interface.
See Case Data Model.
See code division multiple access.
See Commercial Data Masking Facility.
See cross-domain network manager session.
See Continuous Data Protection.
See cellular digital packet data.
See compact disc recordable.
See CD-ROM file system.
See cross-domain resource manager.
See compact-disc read-only memory.
See cross-domain resource.
- See control data set.
- See central directory server.
- See Cell Directory Service.
- See couple data set.
See CICS dynamic storage area.
See case data source component.
See CDS control program.
See connect data set to line.
See change-data table.
See channel enablement.
See conditional end bracket.
See country extended code page.
A dump of the run-time environment for Language Environment and the member language libraries. Sections of the dump are selectively included, depending on options specified on the dump invocation. This is not a dump of the full address space, but a dump of storage and control blocks that Language Environment and its members control.
See Common Event Infrastructure.
See Command Execution Language.
- In asynchronous transfer mode (ATM), a medium access control (MAC) protocol data unit (PDU) of fixed size.
- The rectangular juncture of a horizontal row and a vertical column. Examples include the cells of an electronic spreadsheet and the cells utilized by an XmRowColumn widget in an AIXwindows graphic interface.
- One or more processes that each host runtime components. Each has one or more named core groups.
- In a multidimensional clustering table, a unique combination of dimension values. Physically, a cell is made up of blocks of pages whose records all share the same values for each dimension column.
- In mobile computing, an area of radio coverage that is ttransmitted from a base station. See also base station, radio.
- A logical grouping of users, computers, data, and other resources that share either a common purpose or a common level of trust.
- A group of managed processes that are federated to the same deployment manager and can include high-availability core groups.
- In a WebSphere Application Server distributed network, an arbitrary, logical grouping of one or more notes that are managed together.
- A single cartridge location within an Automated Tape Library Dataserver (ATLDS). See also rack number, slot.
Cell B.E. processor
See Cell Broadband Engine processor.
Cell Broadband Engine processor (Cell B.E. processor)
A single-chip multiprocessor consisting of one or more PowerPC Processor Elements (PPEs) and one or more (typically eight) Synergistic Processor Elements (SPEs). It is used for distributed processing and media-rich applications. See also PowerPC Processor Element, Synergistic Processor Element.
Cell Directory Service (CDS)
A Distributed Computing Environment (DCE) component that manages a database of information about the resources within a cell. See also Global Directory Service.
A portable telephone that operates on a cellular radio network instead of a traditional wired network over a fiber optic network or the Internet. See also mobile phone.
See local name.
See base station.
cellular digital packet data (CDPD)
A standard for transmitting data over a cellular network that places the data in digital electronic envelopes and sends it at high speed through underused radio channels or during pauses in cellular phone conversations. See also packet switching.
See Central Europe, Middle East, and Africa.
central data warehouse
The component of Tivoli Enterprise Data Warehouse that contains the cleansed historical data. Data in the central data warehouse is derived from operational data, although operational data is not stored directly in the central data warehouse.
central data warehouse ETL
In Tivoli Enterprise Data Warehouse, the extract, transform, and load (ETL) process that reads the data from the operational data stores of the application that collects it (for example, a log file, a Tivoli Inventory repository, or a Tivoli Enterprise Console database), verifies the data, makes the data conform to the Tivoli Enterprise Data Warehouse schema, and places the data into the central data warehouse. See also data mart ETL.
central directory server (CDS)
A network node that provides a repository for information on network resource locations. It also reduces the number of network searches by providing a focal point for queries and broadcast searches, and by storing the results of network searches to avoid later broadcasts for the same information.
central electronic complex
See central processor complex.
Central Europe, Middle East, and Africa (CEMA)
For organizational, legal, or administrative purposes, the region comprising Bulgaria, Croatia, Czech Republic, Egypt, Hungary, Pakistan, Poland, Romania, Russia, Serbia and Montenegro, Slovakia, Slovenia, and IBM Middle East. See also Northeast Europe.
A type of control in which in which all the primary station functions of the data link are centralized in one data station. See also independent control.
centralized directory service
In OSI, a method of organizing directory services so that one node provides directory service for other nodes. OSI Communications Subsystem supports only centralized directory service.
central office (CO)
A telephone switching system that connects customer-premise business and subscriber lines to other customer lines or trunks, both locally or remotely. A central office is located on the edge of the telephone service provider's network, rather than on a customer's premises.
central processing unit (CPU)
A server's database that logs requests for licenses, upgrades for licenses, and journals all license activity in a tamper-proof auditable file. The central registry is a component of the License Use Management network topology.
A function that permits an administrator to schedule client operations and administrative commands. The operations can be scheduled to occur periodically or on a specific date. See also administrative command schedule, client schedule.
In a network of systems, the system licensed to receive program temporary fixes (PTFs) and distribution media from IBM. This system is also used to provide problem handling support to other systems in a network. In a distributed data processing network, the central site is usually defined as the focal point in a communications network for alerts, application design, and remote system management tasks such as problem management.
central site control facility (CSCF)
In Tivoli NetView for OS/390, NetView for VM, and NetView for VSE, a function that allows a network operator to run the test facilities of the IBM 3172 Nways Interconnect Controller and the IBM 3174 Establishment Controller remotely from the NetView console.
Storage that is an integral part of the processor unit. Central storage includes both main storage and the hardware system area. UNIX-experienced users refer to central storage as memory.
See complex event processing.
- See Commission of European Post and Telegraph.
- See Conference Europeenne des Administrations des Postes et Telecommunications.
See CERT Coordination Center.
CERT Coordination Center (CERT/CC)
A major reporting center for Internet security problems. Staff members provide technical advice and coordinate responses to security compromises, identify trends in intruder activity, work with other security experts to identify solutions to security problems, and disseminate information to the broad community. The CERT/CC also analyzes product vulnerabilities, publishes technical documents, and presents training courses.
In computer security, a digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. A certificate is issued by a certificate authority and is digitally signed by that authority. See also certificate authority, certificate signing request, SSL server authentication.
- A component that issues certificates to each computer on which components are installed.
- A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also certificate, Globus certificate service, SSL server authentication.
- A digital certificate that is issued by a certificate authority. The CA verifies trusted certificates for trusted roots.
- In computer security, a digital document that identifies an organization that issues certificates. See also digital certificate.
certificate name filter
A general resource profile that maps multiple user IDs to a digital certificate in order to simplify administration of certificates, conserve storage space in the RACF database, maintain accountability, or maintain access control granularity.
certificate revocation list (CRL)
A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.
certificate signing request (CSR)
An electronic message that an organization sends to a certificate authority (CA) in order to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key. See also certificate, keystore.
- The Windows name for a key repository.
- A collection of certificates.
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.
See connection event sequence.
CF cache structure
See coupling facility cache structure.
See combined function IOP.
See command function key.
CF lock structure
See coupling facility lock structure.
See Configuration File Manager.
Confirmed message. When a sending MERVA Link system is informed of the successful delivery of a message to the receiving application, it routes the delivered application messages as CF messages, that is, messages of class CF, to an ACK wait queue or to a complete message queue.
See coupling facility resource management.
See coupling facility resource management policy.
See continuous-forms stacker.
See coded graphic character set global identifier.
See Common Gateway Interface.
See CGI script.
A computer program that runs on a web server and uses the Common Gateway Interface (CGI) to perform tasks that are not usually done by a web server (for example, database access and form processing).
See Computer Graphics Metafile.
See compound growth rate.
See character generator utility.
- The name of a channel framework connection that contains an endpoint definition.
- A group of request units delimited by begin-chain and end-chain. Responses are always single-unit chains.
- In DFU, a way to change from one display format to another after the user signals that the first display format was completed.
- A group of logically linked records that are transferred over a communications line.
- In RPG, an operation code that reads input records identified by specified relative record numbers or keys.
- A set of enclosures that are attached to provide redundant access to the drives inside the enclosures. Each control enclosure can have one or more chains.
In CICS intercommunication, a grouping of one or more request units to satisfy a single request. Instead of an input request being satisfied by one RU at a time until the chain is complete, the whole chain is assembled and sent to the CICS application satisfying just one request. This ensures that the integrity of the whole chain is known before it is presented to the application program.
An order that must finish its fulfillment process before its parent order can be considered fulfilled. An order is chained when a parent order must communicate some portion of the order fulfillment execution to a third party.
- A method of storing records in which each record belongs to a list or group of records and has a linking field for tracing the chain.
- In the Distributed Computing Environment (DCE), a mode of interaction optionally used by a directory system agent (DSA) that cannot perform an operation by itself. The DSA chains by invoking the operation in another DSA and then relaying the outcome to the original requester.
Challenge Handshake Authentication Protocol (CHAP)
An authentication protocol that protects against eavesdropping by encrypting the user name and password. See also Password Authentication Protocol.
An authentication method that requires users to respond to a prompt by providing information to verify their identity when they log in to the system. For example, when users forget their password, they are prompted (challenged) with a question to which they must provide an answer (response) in order to either receive a new password or receive a hint for specifying the correct password. See also knowledge-based authentication.
- The process of merging log data sets and reducing the information they contain to the minimum required to perform recovery on a particular database or group of databases.
- The process of creating a compacted version of one or more IMS log data sets by eliminating records not related to recovery, and by merging multiple changes to a single segment into a single change.
change aggregate table
In SQL replication, a type of replication target table that contains data aggregations that are based on the contents of a CD table. See also base aggregate table.
change and configuration management (CCM)
A systematic approach to establish and maintain the consistent performance of a system or product throughout its lifecycle, and to effectively manage changes in that product or system.
An object authority that allows a user to perform all operations on the object except those limited to the owner or controlled by object existence authority, object management authority, object alter authority, and object reference authority. The user can add, change, and delete entries in an object, or read the contents of an entry in the object. Change authority combines object operational authority and all the data authorities.
- A character used in the left margin to indicate that a document line is changed.
- An indicator that displays when an object was last changed.
The process of capturing changes that are made to a replication source table and applying them to a replication target table. See also full refresh.
change control client
A workstation that (a) receives software and data files from its change control server and (b) installs and removes software and data files as instructed by its change control server. See also change control single node.
change control server
A system that controls and tracks the distribution of software and data files to other workstations. See also change control single node.
change control single node
A workstation that controls, tracks, installs, and removes software and data files for itself. A CC single node can also prepare software for distribution. See also change control client, change control server.
change-data table (CD table)
In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. See also synchpoint.
In SNA, a data flow control protocol in which the sending logical unit (LU) stops sending normal-flow requests, signals this fact to the receiving LU using the change-direction indicator (in the request header of the last request of the last chain), and prepares to receive requests.
changed subfile record
A subfile record into which the work station user has entered data, or a subfile record for which a write or change operation was issued with the DDS keyword SFLNXTCHG or DSPATR(MDT) in effect.
change implementation schedule
A view in change management that shows the start and end dates for changes to selected configuration items in the environment, the RFC that defines the change, and other details.
- For directory shadowing, a record of changes made to directory entries, departments, and locations for the purpose of sending only the updates and not the entire directory to collecting systems.
- The area of the checkpoint data set that contains the specific control blocks changed by the last member of the multi-access spool configuration to own the checkpoint data set.
A relationship between two artifacts. A change to either artifact affects the relationship. See also suspect relationship state.
- The process of planning (for example, scheduling) and controlling (for example, distributing, installing, and tracking) software changes over a network.
- The process of controlling and tracking modifications to artifacts. See also scope management.
- The process of planning for and executing changes to configuration items in the information technology environment. The primary objective of change management is to enable beneficial changes to be made with minimum disruption to services.
The deployment management component that decomposes aggregated installable unit (IUs) and coordinates the change management operations across the hosting environments. See also aggregated installable unit, hosting environment.
A recorded instance that is created with each write action to the repository. The change record contains metadata about all repository changes (such as who was responsible for a commit action) and can be used as a version history view of the repository.
- In System Manager, an instance of a change request description that has been submitted to run or is running. A change request is uniquely identified by the change request name and a sequence number.
- A request from a stakeholder to change an artifact or process. See also defect, enhancement request.
- A request to change some aspect of the project, project plan, activity definition, or document.
change request description (CRQD)
An i5/OS object that describes a change to be made to the computing environment. The object, which is maintained only at the central site system or systems, consists of a list of activities that describe the steps needed to make the change.
- A cohesive unit consisting of a number of related changes that need to be made together.
- A group of related changes to files, folders, or symbolic links in a workspace or stream.
- A list of versions of elements that are associated with a Unified Change Management (UCM) activity.
- In mainframe computing, the part of a channel subsystem that manages a single I/O interface between a channel subsystem and a set of control units.
- A WebSphere MQ object that defines a communication link between two queue managers (message channel) or between a client and a queue manager (MQI channel). See also message channel, MQI channel, queue manager.
- The means of distribution of a company's products. Examples are e-commerce and physical stores.
- A link along which signals can be sent, such as the channel that handles the transfer of data between processor storage and local peripheral equipment. See also trunk.
- A specialized web application within a portal to which a user can subscribe.
- A communication path through a chain to an endpoint.
A business function that can be issued on a channel. Channel actions are role specific and an authorization policy makes it possible to control which role can perform which action in a channel.
channel associated signaling (CAS)
A method of communicating telephony supervisory or line signaling (on-hook and off-hook) and address signaling on T1 and E1 digital links. See also common channel signaling.
- Pertaining to the attachment of devices directly by input/output channels to a host processor.
- Pertaining to devices attached to a controlling unit by cables, rather than by telecommunication lines. See also link-attached.
- A major node that may include minor nodes that are resources (host processors, NCPs, line groups, lines, SNA physical units and logical units, cluster controllers, and terminals) attached through a communication adapter.
- A major node that includes an NCP that is channel-attached to a data host.
A mechanism that ensures that the channel connection is established to the correct machine. In a channel callback, a sender channel calls back the original requester channel using the sender's definition.
channel control function (CCF)
A program to move messages from a transmission queue to a communication link, and from a communication link to a local queue, together with an operator panel interface to allow the setup and control of channels.
channel enablement (CE)
Offering, solution or program related activities that enable IBM sellers in all channels to communicate effectively with customers, to build a robust pipeline and to close profitable deals in a short time frame.
An event reporting conditions detected during channel operations, such as when a channel instance is started or stopped. Channel events are generated on the queue managers at both ends of the channel.
A System/390 I/O channel-to-control-unit interface that has an SNA network address. A channel link can be a subarea link, a peripheral link, a LEN link, or an APPN link. See also subarea link.
A defined role in WebSphere Commerce that manages the channel hub, as well as the distributors and resellers associated with that hub, including creating and importing distributor and reseller contracts.
- A number that identifies the path by which data is transferred between a particular input or output device and the processor of the computer.
- The identifying number assigned to a licensed channel on the T1 or E1 trunk that connects DirectTalk to the switch, channel bank, or channel service unit.
- In mainframe computing, the interconnection between a channel and its associated control units.
- A single interface attaching one or more control units.
A plan that describes the channels that are appropriate for selling the brand. The plan should consider the promise of value, price point, image and target market for the brand. It should also include volume, revenue and cost per channel.
- The AIX process that executes the logic of the state table; each active caller session has one active channel process.
- In WebSphere Voice Server, the system process that manages call flow.
- A market segment based on the types of channels through which a customer buys.
- A set of channels that have been grouped according to characteristics that are relevant to the goals of an individual or organization.
- An American Telephone and Telegraph (AT&T) unit that is part of the AT&T nonswitched digital data system.
- A device used to connect a digital phone line to a multiplexer, a channel bank, or directly to another device producing a digital signal. A CSU performs certain line-conditioning and equalization functions, and responds to loopback commands sent from the central office (CO). See also data service unit.
channel subsystem (CSS)
A collection of subchannels that directs the flow of information between I/O devices and main storage, relieves the processor of communication tasks, and performs path management functions.
In mainframe computing, the logical functions that a system requires to perform the function of a channel subsystem. With ESCON multiple image facility (EMIF), one channel-subsystem image exists in the channel subsystem for each logical partition (LPAR). Each image appears to be an independent channel-subsystem program, but all images share a common set of hardware facilities.
An iterative relaxation method that uses a combination of the Gauss-Seidel and Jacobi-Seidel methods. The array of discrete values is divided into subregions that can be operated on in parallel. The subregion boundaries are calculated using the Jacobi-Seidel method, while the subregion interiors are calculated using the Gauss-Seidel method. See also Gauss-Seidel.
See Clearing House Automated Payment System.
The Euro-denominated RTGS payment system operated by the CHAPS Clearing Company Ltd. and comprising a network, central message handling software, elements of members' interfaces to the network, and the Bank of England's central interface.
- In a computer system, a member of a set of elements that is used for the representation, organization, or control of data. See also glyph.
- A sequence of one or more bytes representing a single graphic symbol or control code.
- Any symbol that can be entered on a keyboard, printed, or displayed. For example, letters, numbers, and punctuation marks are all characters.
- The maximum physical boundary of a single character. For example on the IBM 3800 Printing Subsystem, a cell is made up of 24 rows with total height of 4.23 mm and 18 bit positions having a total width of 2.54 mm.
- The physical width and height in pels of a font.
- In the GDDM function, the imaginary box whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a work station.
- As defined in ISO/IEC 10646, the place within a row at which an individual graphic character may be allocated.
A named set of characters sharing an attribute associated with the name of the class. The classes and the characters that they contain are dependent on the value of the LC_CTYPE category in the current locale.
- The actual character value (a symbol, quantity, or constant) in a source program that is itself data, instead of a reference to a field that contains the data. See also numeric constant.
- In the C language, a character or an escape sequence enclosed in quotation marks.
- Data in the form of letters and special characters, such as punctuation marks.
- Data that has an associated coding representation that defines how to interpret each specific pattern of bits that are grouped into one or more bytes.
Character Data Representation Architecture (CDRA)
An IBM architecture that defines a set of identifiers, resources, services, and conventions to achieve consistent representation, processing, and interchange of graphic character data in heterogeneous environments.
character data representation identifier
A tag that is used to achieve data integrity. The Character Data Representation Architecture specifies that you should tag all character data as it flows through the system. You can tag using a short-form or a long-form identifier. A coded character set identifier (CCSID) is an example of a character data representation identifier.
A display that uses a character generator to display predefined character boxes of images (characters) on the screen. This kind of display cannot address the screen any less than one character box at a time.
- A character set consisting of a code that pairs a sequence of characters from a given set with something else, such as a sequence of natural numbers, octets or electrical pulses. Encoding facilitates the storage and transmission of text through telecommunication networks.
- The mapping from a character (a letter of the alphabet) to a numeric value in a character code set. For example, the ASCII character code set encodes the letter "A" as 65, while the EBCIDIC character set encodes this letter as 43. The character code set contains encodings for all characters in one or more language alphabets.
character entity reference
A character string of the form � or dddd, where dddd is the hexadecimal or decimal equivalent of the Unicode code point of a character. For example, > and > are both character entity references to the > (greater-than) sign.
A character constant, a simple character variable, an element of a character array, a character-valued function reference, a substring reference, or a sequence of the above separated by the concatenation operator and parentheses.
An area that is reserved for information that can contain any of the characters in the character set. See also numeric field.
- In word processing, the way to generate visual characters and symbols for coded data.
- In computer graphics, a function that converts the coded representation of a graphic character into the shape of the character for display or print.
In Business Graphics Utility, an invisible network of uniformly spaced horizontal and vertical lines covering the chart area. Used by the Business Graphics Utility to determine the physical dimensions of the chart and the placement of the data on it.
See character identifier.
- The standard identifier for a character, regardless of its style. For example, all uppercase A's have the same character identifier.
- On a system, a 4-byte binary value. The value is a concatenation of the graphic character set global identifier followed by the code page global identifier. For example, the character identifier for German (feature 2929) is 00697 00273.
The distance from the character reference point to the character escapement point. Character increment is the sum of the A-space, B-space, and C-space. Usually the distance between the current print position and the next print position.
A user-defined trait or property that is associated with an identity that is not commonly expressed as a name, number, address, or email. This attribute allows users to extend the product by defining customizable entity attributes that are meaningful to their data sources. See also attribute, identity.
- A data type whose value is a sequence of characters (single byte, multibyte, or both) that can range in size from 0 bytes to 2 gigabytes less 1 byte. In general, the CLOB data type is used whenever a character string might exceed the limits of the VARCHAR data type. See also large object.
- A character string that contains single-byte characters with an associated code page.
A device that prints a single character at a time. See also line printer.
The alignment of a character with respect to its character baseline, measured in degrees in a clockwise direction. See also orientation.
- A defined set of characters with no coded representation assumed that can be recognized by a configured hardware or software system. A character set can be defined by alphabet, language, script, or any combination of these items.
- A set of binary codes that represent specific text characters.
character set identifier 65534
The character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 ( FFFE ) is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs tagged for each individual field it contains. If the file is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.
character special file
An interface file that provides access to an input or output device, which uses character I/0 instead of block I/0. See also block special file.
- A contiguous sequence of characters terminated by and including the first null byte.
- A contiguous sequence of characters that are treated as a unit.
- A sequence of bytes that represents bit data, single-byte characters, or a mixture of single-byte and multibyte characters.
In CCP, the maximum number of times that the temporary text delay character can (a) be sent to a terminal before the operation stops; or (b) be sent between the end of a receive operation and the beginning of a transmit operation.
In international character support, the dd command and various conversion subroutines that translate between extended characters and ASCII escape strings to preserve unique character information.
- In the C language, a data object having a value that can be changed while a program is running and having a data type that is a signed or unsigned character.
- Character data with a valuethat is assigned or changed while the program is running.
The sequence in which Sterling Selling and Fulfillment Foundation creates authorization or charge requests. For example, the charge sequence might specify that gift certificates are to be used before a credit card is charged.
In Business Graphics Utility, an object containing chart characteristics, such as the chart type, chart heading, legend position, and so on. The chart format does not include the data values to be plotted. The system-recognized identifier for the object type is *CHTFMT.
chassis detect-and-deploy profile
A profile that IBM Director automatically applies to all new BladeCenter chassis when they are discovered. The profile settings include management module name, network protocols, and static IP addresses. If Remote Deployment Manager (RDM) is installed on the management server, the chassis detect-and-deploy profile also can include deployment policies.
The sending of typed messages between online participants. See also instant message.
The process of determining whether a component is appropriate or meets the necessary requirements. For example, an environment check verifies that the target systems contain the appropriate operating systems and software for an operation.
A square box with associated text that represents a choice. When a user selects the choice, the check box is filled to indicate that the choice is selected. The user can clear the check box by selecting the choice again, thereby deselecting the choice.
A user-defined constraint that specifies the values that specific columns of a base table can contain. See also constraint.
- A check key consisting of a single digit.
- The far right number of a self-check field that is used to verify the accuracy of the field.
A copy of a file that corresponds to a version of an element. See also version.
- To replace an inactive document, project WBS element, scope element, requirement or resource record (with its modifications) to its repository directory so that others can view it or modify it.
- To upload the language of a checked out draft authored/received contract or amendment contract into the application.
- In certain software configuration management (SCM) systems, to copy files back into the repository after changing them.
- To save local changes in a change set that is part of a repository workspace. A checked-in change set can later be shared with a team by delivering the change set.
The screen identifying the host screen that should be active for a connection to be considered ready to be returned to the connection pool. If the application is not on the screen specified by the checkin screen, the connection will be discarded or recycled in attempt to return the connection to the host screen specified by the checkin screen. The checkin screen is only meaningful if connection pooling is specified for a connection.
- To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may check out the same element at a time.
- To download the language of a draft authored/received contract or amendment contract from the application to modify it.
- In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified. See also reservation version status.
- In DB2 for z/OS, a state into which a table can be put where only limited activity is allowed on the table and constraints are not checked when the table is updated. See also set integrity pending.
- A state that occurs when data for a constraint cannot be verified as valid. A constraint could be either a referential constraint or a check constraint.
- A place in a program at which a check is made, or at which a recording of data is made to allow the program to be restarted in case of interruption.
- A point at which the database manager records internal status information in the log; the recovery process uses this information if the subsystem abnormally terminates.
The periodic copying of processing information to the checkpoint data set. Checkpointing ensures that information about in-storage job and output queues is not lost in the event of a hardware or software error.
The process of resuming a job at a checkpoint within the job step that caused abnormal termination. The restart can be automatic or deferred. A deferred restart requires that the job be resubmitted. See also automatic restart, deferred restart, step restart.
A facility for restarting execution of a program at some point other than at the beginning, after the program was terminated due to a program or system failure. A restart can begin at a checkpoint or from the beginning of a job step, and uses checkpoint records to reinitialize the system.
In OSI X.400, the maximum amount of data (in units of 1024 bytes) that can be sent between two minor synchronization points. The checkpoint size is used by the X.400 reliable transfer server.
- The sum of a group of data that is associated with a group of data and that is used for error detection.
- On a diskette, data written in a section for error detection purposes.
- In TCP/IP, the sum of a group of data associated with the group and used for error checking purposes.
- A function that protects data stored in an auxiliary storage pool from being lost because of the failure of a single disk. When checksum protection is in effect and a disk failure occurs, the system automatically reconstructs the data when the system program is loaded after the device is repaired. See also device parity protection, mirrored protection.
In agile development, the peripheral participants in scrum development. This includes the product manager, testers, customers, customer advocates, and other stakeholders. See also pig role, scrum.
- A node that is subordinate to another node in a tree structure. Only the root node is not a child.
- Pertaining to a secured resource, either a file or library, that uses the user list of a parent resource. See also parent.
- In a generalization relationship, the specialization of another element, the parent. See also parent.
- In a hierarchy or auto-level hierarchy, a member that has at least one parent.
An activity that is launched during the processing of another activity, which becomes the parent activity. See also parent activity.
child business object
A business object that is contained or referenced by another business object. When the full child business object is part of its parent hierarchy, the child is contained by the parent. See also array attribute, foreign key attribute, single-cardinality attribute.
A class that inherits instance methods, attributes, and instance variables directly from the parent class (also known as the base class or superclass), or indirectly from an ancestor class.
A list of columns in a child table that relate to corresponding columns in a parent table. See also parent expression.
In explicit hierarchical locking, a lock that is held on a table, a page, a row, or a large object. Each child lock has a parent lock. See also parent lock.
A node within the scope of another node. See also parent node.
For subscriptions or recurring orders, the subordinate to the parent order. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues.
child resource group
A resource group that depends on certain application services that a parent resource group provides. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also dependent resource groups, parent resource group.
A table that has a referential constraint to a column in a different table; the referenced table is called a parent table. See also parent table.
In AIXwindows and Enhanced X-Windows, a widget that is managed by another widget, the parent. For example, Composite widgets typically manage the Primitive children widgets attached to them.
A window that appears within the border of its parent window (either a primary window or another child window). When the parent window is resized, moved, or destroyed, the child window also is resized, moved, or destroyed. However, the child window can be moved or resized independently from the parent window, within the boundaries of the parent window.
One of the Chinese characters that represent numbers. For example, the Chinese characters for 1, 2, and 3 are written with one, two, and three horizontal brush strokes, respectively. See also Arabic numeral, Hindi numeral, number, Roman numeral.
See Contract Handling International System.
A test statistic used to indicate the probability that two fields are unrelated, in which case any differences between observed and expected frequencies are the result of chance alone. If this probability is very small (typically less than 5%) the relationship between the two fields is said to be significant.
Chi-squared Automatic Interaction Detector algorithm (CHAID)
A decision tree algorithm that uses chi-square statistics to identify optimal splits. Unlike the C & R tree and QUEST nodes, CHAID can generate nonbinary trees, meaning that some splits have more than two branches. See also decision tree algorithm, regression tree algorithm.
One of three types of complex BPML activities. A choice activity is used to make decisions in the business process model and runs only one of the child activities it contains. The choice activity makes it possible to model branch processing.
A point that is set automatically by CP Optimizer as it executes a goal during the search for a solution. At the choice point, the engine records the current state of constraints, variables, and domains, along with other goals not yet executed. If execution of the goal leads to failure, CP Optimizer backtracks to the choice point, restores the state recorded, and tries one of the stored goals.
A group type with a subclass equal to choice that is used to define a selection from a set of components. A choice type defines a choice group, which is valid when the data matches one of the components in the choice group.
- An agreed upon sequence of business events that is allowed by a seller for each transaction.
- An ordered sequence of message exchanges between two or more participants. In a choreography there is no central controller, responsible entity, or observer of the process.
See channel process.
See Simplified Chinese.
See Traditional Chinese.
See Compact Hypertext Markup Language.
- A data storage location. For example, a raw disk device or a cooked file.
- A group of archived business processes.
See condition information block.
See business transaction services.
A set of XML files that defines or references the resources for a component of an application or a whole application, or another artifact relating to applications, such as a policy. A CICS bundle is installed in a CICS region. Multiple CICS bundles can be referenced by a management bundle. See also bundle, management bundle.
CICS dynamic storage area (CDSA)
A storage area allocated from CICS-key storage below the 16 MB line. The CDSA is used for all non-reentrant CICS-key RMODE(24) programs, all CICS-key task-lifetime storage in 24-bit storage, and CICS control blocks that reside in 24-bit storage.
CICS EJB server
One or more CICS regions that support enterprise beans. A logical CICS EJB server typically consists of multiple (cloned) CICS listener regions and multiple (cloned) CICS AORs. The listener regions and AORs may be combined into listener/AORs.
Storage protection key in which CICS is given control (key 8) when CICS storage protection is used. This key is for CICS code and control blocks. CICS-key storage can be accessed and modified by CICS. Application programs in user-key cannot modify CICS-key storage, but they can read it. CICS-key storage is obtained in MVS key-8 storage. See also user-key storage.
CICS-maintained data table
A type of CICS data table, for which CICS automatically maintains consistency between the table and its source data set. All changes to the data table are reflected in the source data set and all changes to the source data set are reflected in the data table.
CICS monitoring facility
The CICS component responsible for monitoring and producing task-related statistics information, such as task CPU usage and waits for I/O request units on an individual task basis. Reporting is divided into classes.
A set of CICS systems that are managed and manipulated as if they were a single entity. A CICSplex can be managed by CICSPlex SM. See also multiregion operation.
CICSPlex SM address space (CMAS)
A CICSPlex SM component that is responsible for managing CICSplexes. A CMAS provides the single-system image for a CICSplex by serving as the interface to other CICSplexes and external programs. There must be at least one CMAS in each MVS image on which you are running CICSPlex SM. A single CMAS can manage CICS systems within one or more CICSplexes.
CICS primary connection region
The web owning region (WOR) of the Multi-Region Option (MRO) connected regions in a CICS test environment. This is the region in which the CICS resource definition server for Application Deployment Manager runs.
CICS region user ID
The user ID assigned to a CICS region at CICS initialization. It is specified either in the RACF started procedures table when CICS is started as a started task, or on the USER parameter of the JOB statement when CICS is started as a job.
- In CICSPlex SM topology, a definition referring to a CICS system that is to be managed by CICSPlex SM.
- The entire collection of hardware and software required by CICS.
- A set of CICS systems within a CICSplex that can be managed as a single entity.
- In CICSPlex SM topology, the user-defined name, description, and content information for a CICS system group. A CICS system group can be made up of CICS systems or other CICS system groups.
- In CICS business transaction services (BTS), a BTS set, that is the set of CICS regions across which BTS processes and activities may execute.
CICS Transaction Affinities Utility
A utility designed to detect potential causes of inter-transaction affinity and transaction-system affinity for those users planning to use dynamic transaction routing.
CICS-value data area (CVDA)
An argument to which CICS has assigned a specific and limited set of meaningful values. When a CVDA is specified in an EXEC CICS command, CICS converts the CVDA value name to the corresponding numeric representation.
See control interval definition field.
An IBM-specified way to install and configure products on, or remove products from, remote workstations and hosts. Response files and redirected installation and configuration may be used by a CID-enabled product to eliminate or reduce user interaction with the CID-enabled product. See also response file.
See Classless Inter-Domain Routing.
See Common Internet File System.
CII data format
See Center for the Information of Industry data format.
See Common Information Model.
The code that consists of common building blocks that can be used instead of proprietary software or device-specific programming interfaces to manage devices that are compliant with the Common Information Model (CIM).
CIM object manager (CIMOM)
The common conceptual framework for data management that receives, validates, and authenticates the CIM requests from the client application. It then directs the requests to the appropriate component or service provider.
See CIM object manager.
See Common INET.
See Chief Information Officer.
cipher block chaining (CBC)
A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted.
Data that is encrypted. Ciphertext is unreadable until it is converted into plaintext (decrypted) with a key. See also cleartext.
- One or more conductors through which an electric current can flow. See also link, packet switching.
- In fibre-channel technology, an established communication path between two ports, which consists of two virtual circuits capable of transmitting in opposite directions. See also link.
circuit-switched data transmission service
A service that uses circuit switching to establish and maintain a connection before data can be transferred between data terminal equipment (DTE). See also packet-switched data transmission service.
A process that, on demand, connects two or more data terminal equipment (DTEs) and permits the exclusive use of a data circuit between them until the connection is released. See also message switching, packet switching.
A database log in which records are overwritten if they are no longer needed by an active database. See also archive log.
In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, the process of keeping all restart data in a ring of log files. See also linear logging.
circular traceability relationship
A relationship between a requirement and itself, or an indirect relationship that leads back to a previously traced-from node. Traceability relationships cannot have circular references.
See complex instruction set computer.
- A request for reimbursement, replacement, or repair for an item or an asset that is under warranty.
- A notification to DB2 for z/OS that an object is being accessed. A claim prevents a drain from occurring until the claim is released, which usually occurs at a commit point. See also drain, logical claim.
- In RACF, a collection of defined entities (users, groups, and resources) with similar characteristics.
- A grouping of projects that has global properties. The properties are used to manage completed jobs, typically deleting them periodically or starting another job that performs specific cleanup tasks.
- In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.
- An object that contains specifications, such as priority, maximum processing time, and maximum storage, to control the run-time environment of a job. The system-recognized identifier for the object type is *CLS.
- A collection of processes (and their associated threads) that have a single set of resource limitation values and target shares applied to them.
- A description of a set of objects that share the same attributes, operations, methods, relationships, and semantics. A class can use a set of interfaces to specify collections of operations that it provides to its environment. See also interface, object.
- The set of all members of a type of object, such as all contracts, term definitions, organizations, and so on.
- In the Distributed Computing Environment (DCE), a category into which objects are placed based on their purpose and internal structure.
- The syntactic category for a group of related values. A value can be assigned to different classes in different contexts or scenarios. See also classification, classification, pattern, value.
- The definition of an object within a specific hierarchy. A class can have properties and methods and can serve as the target of an association.
- In C++, a user-defined data type. A class data type can contain both data representations (data members) and functions (member functions).
- A section of a module. A class can represent program text, that is, the instructions and data that are loaded into virtual storage during execution. Other classes, such as an external symbol dictionary (ESD) and a relocation dictionary (RLD), are required for binding and loading the program.
- An attribute that is related to a transaction code and a message region that is used to determine scheduling. See also message class, region class.
- A basic unit of the classification hierarchy used in the Type Designer. There are three classes: item, group, and category.
See transport class 0.
- Connectionless service between ports with notification of delivery or nondelivery.
- See transport class 2.
In fibre-channel technology, connectionless service between ports without notification of delivery. Other than notification, the transmission and routing of class 3 frames is identical to that of class 2 frames.
See transport class 4.
A value in a class object that controls the processing of routing steps in a job. These values include the run priority, time slice, eligibility for purge, default wait time, maximum processing unit time, and maximum temporary storage parameters.
class authority (CLAUTH)
An attribute that allows a user to define RACF profiles in a class defined in the class descriptor table. A user can have class authority to zero or more classes. See also authority.
class binding signature
A hexadecimal value that contains the class signature (obtained from the signature bank) and the inheritance level. The class binding signature is added to the Interface Definition Language (IDL) source file by the signature emitter.
class B network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are set to 1 and 0, respectively, and the host ID occupies the two low-order octets.
Class Broker for Java (CBJ)
A Java tool that allows Java applications to run on a host system that does not have a graphical user interface (GUI). Because the IBM Developer Kit for Java Remote Abstract Window Toolkit is not recommended for complex graphics or highly interactive operations, CBJ for high-performance GUI services can be used.
class C network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are both set to 1 and the next high-order bit is set to 0. The host ID occupies the low-order octet.
A diagram that shows a collection of declarative (static) model elements, such as classes, types, and their contents and relationships. See also object diagram.
classic row compression
Data row compression that is provided by static, table-level compression dictionaries. See also adaptive compression.
- The process of grouping values into specific classes. See also class.
- A process for automatically acquiring document properties from the document content or another source.
- The system that defines classes and the relationships among those classes. See also class.
classification and regression tree algorithm
A decision tree algorithm that uses recursive partitioning to split the training records into segments by minimizing the impurity at each step. See also Quick, Unbiased, Efficient Statistical Tree algorithm.
The hierarchy of a type tree in the Type Designer. The deeper the subtype, the more specific the data characteristics are. See also compositional hierarchy.
See file plan.
- A specialized attribute used for grouping and color-coding process elements.
- A mechanism that describes behavioral and structural features. Classifiers include interfaces, classes, data types, and components.
- In QoS, a control function that selects packets according to the content within the packet headers.
Classless Inter-Domain Routing (CIDR)
A method for adding class C Internet Protocol (IP) addresses. The addresses are given to Internet Service Providers (ISPs) for use by their customers. CIDR addresses reduce the size of routing tables and make more IP addresses available within organizations.
Part of the Java virtual machine (JVM) that is responsible for finding and loading class files. A class loader affects the packaging of applications and the runtime behavior of packaged applications deployed on application servers.
- A method that creates class instances.
- In Java, a method that is called without referring to a particular object. Class methods affect the class as a whole, not a particular instance of the class. See also instance method.
- A unique identifier of a class type that becomes a reserved word within its scope.
- In the X Window System, the name of a class of resources, widgets, or clients. Resource and widget class names are typically defined in the programming libraries used to create the client.
In COBOL, a user-defined word defined in the SPECIAL-NAMES paragraph of the Environment Division that assigns a name to the proposition, for which a truth value can be defined, to verify that the content of a data item consists exclusively of those characters listed in the definition of the class-name.
- In fibre-channel technology, a specified set of delivery characteristics and attributes for frame delivery.
- A set of characteristics (such as route security, transmission priority, and bandwidth) used to construct a route between session partners. The class of service is derived from a mode name specified by the initiator of a session.
- A set of link and node characteristics, associated with a session or a set of sessions, that determine the route that is selected for the sessions through an APPN network.
- A VTAM term for a list of routes through a network, arranged in an order of preference for their use.
A database that is maintained independently by each network node, and optionally by APPN end nodes. The database contains one entry per class-of-service name. Each database entry contains: (a) A definition of the acceptable values for transmission group (TG) and node characteristics for routes described by that class-of-service name and the weight function to be used to compute the weights of nodes and TGs that meet the acceptable values; (b)The transmission priority to be used for traffic that flows on routes described by that class-of-service name.
A system object created for Advanced Peer-to-Peer Networking (APPN) support that provides the information required to assign relative priority to the transmission groups and intermediate routing nodes for an APPN session. The system-recognized identifier for the object type is *COSD.
A technique in object-oriented development to define what objects should do in the system (their responsibilities), and identify other objects (the collaborators) that are involved in fulfilling these responsibilities.
The scope of C++ class members. See also namespace scope.
A hexadecimal value obtained from a server and placed in a signature bank on the workstation. The signature bank uniquely identifies an Interface Definition Language (IDL) interface. Class signatures are added to the IDL source file by the signature emitter.
Statistical information that includes information such as the number of instances of the class in the application, the CPU time spent in that class, the number of calls made to the class, and so on.
class template declaration
A class template declaration introduces the name of a class template and specifies its template parameter list. A class template declaration may optionally include a class template definition.
class template definition
A definition that describes various characteristics of the class types that are its specializations. These characteristics include the names and types of data members of specializations, the signatures and definitions of member functions, accessibility of members, and base classes. See also base class.
A change in an object's management class or storage class when an event occurs that brings about a change in an object's service level or management criteria. Class transition occurs during a storage management cycle.
- A set of consecutive character strings that specify a characteristic of an entry. There are three types of clauses: data, environment, and file.
- The fundamental grouping of REXX syntax. A clause is composed of zero or more blanks, a sequence of tokens, zero or more blanks, and the semicolon delimiter.
- In SQL, a distinct part of a statement in the language structure, such as a SELECT clause or a WHERE clause.
- A building block of the contract language that may contain legal language or line data.
A template that contains the standard language of a clause and includes the legal language, terms, and other properties. See also template.
See class authority.
See Common Link Access to Workstation.
See communication line block.
See Common Locale Data Repository.
- To transform the data extracted from operational systems to make it usable by a data warehouse.
- To ensure that all values in a data set are consistent and correctly recorded.
In SNA products, a network services request, sent by a system services control point (SSCP) to a logical unit (LU), that causes a particular LU-LU session with that LU to be ended immediately without requiring the participation of either the other LU or its SSCP.
The time period during which a database record that has reached its final state or condition is to remain in the database. After the cleanup period expires for such a record, database cleanup causes the record to be deleted from the database.
A procedure that instructs the system to attempt to remove software products that were partially installed and to revert to the previous version of the product. If the system successfully reverts to the previous version, it becomes the currently active version; otherwise, the software product is marked as broken.
See cause code.
See plain text.
See diagnostic code.
clear indication packet
In X.25 communications, a call supervision packet that a data circuit-terminating equipment (DCE) transmits to inform a data terminal equipment (DTE) that a call has been cleared.
clearing channel (CC)
A payment system in a settlement bank that originates, schedules, disperses, and accounts for payments. Examples are CHAPS-Euro, Euro1, and RTGSplus. Each clearing channel has a corresponding S.W.I.F.T. service code.
In the Distributed Computing Environment (DCE), a collection of directory replicas on one Cell Directory Service (CDS) server. A clearinghouse takes the form of a database file. See also control access.
See clearing channel.
A string of characters sent over a network in readable form. It might be encoded for the purposes of compression, but it can easily be decoded. See also ciphertext.
clear to send (CTS)
In data communication, a signal raised by data circuit-terminating equipment (DCE) when it is ready to accept data, usually in response to request to send (RTS) being raised. See also request to send.
A record for which the matching process cannot definitively determine if the record is a duplicate record or a nonmatched record or if the record is a matched record or a nonmatched record. See also duplicate record, matched record, nonmatched record.
- In the DCE Cell Directory Service (CDS), a software component that receives CDS requests from a client application, ascertains an appropriate CDS server to process the requests, and returns the results of the requests to the client application.
- In the DCE Distributed Time Service (DTS), a software component that synchronizes the clock for its client system by requesting time values from servers, computing a new time from the values, and supplying the computed time to client applications.
The Macromedia LikeMinds Personalization Server component that accesses transaction information and generates recommendations based on users' shopping behavior as they navigate a website. WebSphere Commerce generates events based on shopping behavior, including viewing a product detail page and adding items to a shopping cart or wish list. These events are forwarded to the Clickstream Engine.
In web advertising, the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page. See also impression.
A method for implementing cooperative portlets, whereby users can click an icon on a source portlet to transfer data to one or more target portlets. See also cooperative portlets, wire.
- A person or organization that receives a deliverable or work product. See also interprocess communication.
- A runtime component that provides access to queuing services on a server for local user applications. The queues used by the applications reside on the server. See also WebSphere MQ fully managed .NET client, WebSphere MQ Java client, WebSphere MQ MQI client.
- A software program or computer that requests services from a server. See also host, server.
- A classifier that requests a service from another classifier. See also association.
An HTTP service that serves the Java applet for the web client to web browsers. On Windows systems, the client acceptor is installed and run as a service. On AIX, UNIX, and Linux systems, the client acceptor is run as a daemon.
client acceptor daemon (CAD)
See client acceptor.
- A user application, written in a supported programming language other than Java, that communicates directly with the Client daemon.
- A storage management program that initiates Common Information Model (CIM) requests to the CIM agent for the device.
- An application written with the Content Manager APIs to customize a user interface.
- An application written with object-oriented or Internet APIs to access content servers from Information Integrator for Content.
- An application, running on a workstation and linked to a client, that gives the application access to queuing services on a server.
- An application that users the services of the database services by direct connection or via application servers. See also client/server architecture.
Client Application for Windows
A complete object management system provided with Content Manager and written with Content Manager APIs. It supports document and folder creation, storage, and presentation, processing, and access control.
client-connection channel type
The type of MQI channel definition associated with a WebSphere MQ client. See also server-connection channel type.
In the Distributed Computing Environment (DCE), the state within a Remote Procedure Call (RPC) server generated by a set of remote procedures and maintained across a series of calls for a particular client.
A daemon that manages network connections to CICS servers. It processes ECI, EPI, and ESI requests, sending and receiving the appropriate flows from the CICS server to satisfy the application requests. The Client daemon (process cclclnt) exists only on distributed platforms.
The set of drives, file systems, or volumes that the user selects to back up or archive data, using the backup-archive client. See also domain.
client logical partition
A logical partition that uses the I/O resources of another logical partition, for example, a logical partition that uses the resources of a Virtual I/O Server logical partition.
A message from a client application that is to be sent by means of a network to its destination, or a message that is routed to a client application to acknowledge the receipt of a client message by a network.
- A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.
- In a single system image (SSI), a WebSphere Voice Response system that handles interactions with callers. A client node must have a telephony connection. It does not store application or voice data; it gets data from the server node of the SSI.
client-polling scheduling mode
A method of operation in which the client queries the server for work. See also server-prompted scheduling mode.
A process that requests services from a server process. See also server process.
- A program that uses a C++ class.
- In dynamic routing the application program, running in the requesting region, that issues a remote link request.
- In the client/server model, the front-end transaction.
A method that allows a client application, upon the loss of communication with a database server and the predefinition of an alternative server, to continue working with the original database server or the alternative server with only minimal interruption of the work.
A database record that describes the planned processing of a client operation during a specific time period. The client operation can be a backup, archive, restore, or retrieve operation, a client operating system command, or a macro. See also administrative command schedule, central scheduler, schedule.
Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server. See also distributed application.
A hardware and software design that allows the user interface and database server to reside on separate nodes or platforms on a single computer or over a network. See also client application, server-processing locale, three-tier client/server architecture model, two-tier client/server architecture model.
- A station that consists of a control unit (a cluster controller) and the terminals attached to it.
- A component of the client kernel that provides protocol support for the client.
In the Distributed Computing Environment (DCE), the surrogate code for a remote procedure call (RPC) interface that is linked with and called by the client application code. In addition to general operations such as marshaling data, a client stub calls the RPC runtime library to perform remote procedure calls and, optionally, to manage bindings.
client system-options file
A file, used on AIX, UNIX, or Linux system clients, containing a set of processing options that identify the servers to be contacted for services. This file also specifies communication methods and options for backup, archive, hierarchical storage management, and scheduling. See also client user-options file.
The client programs and consoles that are used for development, administration, and other tasks for the InfoSphere Information Server suite and product modules and the computers where they are installed.
client user-options file
A file that contains the set of processing options that the clients on the system use. The set can include options that determine the server that the client contacts, and options that affect backup operations, archive operations, hierarchical storage management operations, and scheduled operations. This file is also called the dsm.opt file. For AIX, UNIX, or Linux systems, see also client system-options file. See also client system-options file.
In the NetView Graphic Monitor Facility, a workstation that depends on a server workstation to provide it with views and status information. A client workstation receives status information from the server workstation over an LU 6.2 session.
See Client Input Output Sockets.
See calling line identification presentation.
- In the GDDM function, the process of cutting off the image at the border of the display but allowing the coordinates of the lines to extend beyond.
- In computer graphics, removing those parts of display elements that lie outside of a given boundary.
In GL, primitive space that is mapped to normalized device coordinates before clipping occurs. The clipping planes x=+/-w; y=+/-w; or z=+/-w correspond to the left, right, top, bottom, near, and far planes bounding the viewing frustum.
See command list.
A word that syntactically functions separately but is phonetically connected to another word. A clitic can be written as connected or separate from the word it is bound to. Common examples of clitics include the last part of a contraction in English 'wouldn't' or 'you're'.
The process by which a complex word or expression is formed by attaching a clitic to another word. A common example of cliticization includes attaching a clitic to a verb, for example: "je t'aime" in French.
See Collaborative Lifecycle Management.
See control language module.
See connectionless-mode network service.
CLNS path maintenance
In OSI, an option of whether or not to maintain a CLNS path to an adjacent node permanently (until OSI Communications Subsystem is restarted), or release the path when no active CLNS connection uses it. These connections include both network management and directory service connections and connections between customer programs.
A customization option that restricts access to selected information in the cube. The cloak option removes a category and its descendants from a dimension, but summarizes the values in the ancestor categories.
See character large object.
- A device that generates periodic signals used for synchronization.
- In data communication, equipment that provides a time base used in a transmission system to control the timing of certain functions, such as sampling, and to control the duration of signal elements.
- In communications, a method of controlling the number of data bits sent on a communications line in a specified time.
- In binary synchronous communication, the use of clock pulses to control synchronization of data and control characters.
The elapsed time in real time. Clock time differs from CPU time as thread switches and process context switches introduce uncertainty in performance calculation; clock time does not account for this execution behavior.
- To preserve the characteristics of the original but personalize instance-specific data. The result is a new instance of an entity (for example, of a virtual disk, a virtual computer system, or an operating system) rather than a backup of the original.
- An operation that enables an administrator to replicate profiles. This capability simplifies the task of creating multiple profiles with similar properties.
- An identical copy of the latest approved version of a component, with a new unique component ID.
- A copy of an application, created so that it can be customized while the original is retained.
- To prepare a reference computer and create a system profile ready for deployment. See also unattended setup.
- A copy of a volume on a server at a particular point in time. The contents of the copy can be customized while the contents of the original volume are preserved.
- An identical copy of the data and configuration of a server at a particular point in time.
A table that is structurally identical to a base table. The base and clone table each have separate underlying VSAM data sets, which are identified by their data set instance numbers. See also base table.
- To end an activity and remove that window from the display.
- To end processing by ending the connection between the file and a program.
A registration process in which only an administrator can register workstations as client nodes with the server. See also open registration.
closed user group (CUG)
In data communication, a group of users who can communicate with other users in the group, but not with users outside the group. A data terminal equipment (DTE) may belong to more than one closed user group. See also bilateral closed user group.
closed user group with outgoing access
A closed user group that has a user-assigned facility which enables a user to communicate with other users. These users include: users of a data network transmission service and users who have a data terminal equipment that is connected to any other switched network with available interworking facilities.
In the GDDM function, a line added by the system to enclose an area being filled with a pattern, in instances when the routines that precede the GSENDA routine fail to form an enclosed area.
- See cloud computing.
- A network that delivers requested virtual resources as a service.
cloud computing (cloud)
A computing platform where users can have access to applications or computing resources, as services, from anywhere through their connected devices. A simplified user interface and application programming interface (API) makes the infrastructure supporting such services transparent to users.
See infrastructure as a service.
A description of resources to be provided by a cloud. Typically, a cloud request consists of a list of cloud images to be provided by the cloud and information about how those cloud instances are to be configured.
- A storage resource provided by a cloud, or the storage of data on virtual public or private servers in the cloud.
- A network of virtual servers that store data, usually hosted by third parties.
- See current line pointer.
- See communication line processor.
- See container load plan.
- See command line processor.
See create link pack area.
See control language procedure.
See control language program.
See common language runtime.
See Continuous Linked Settlement.
See class identifier.
See control logical unit.
See cluster-receiver channel.
See cluster-sender channel.
- In SNA, a group of stations that consist of a controller (cluster controller) and the workstations attached to it.
- See clustered system.
- In WebSphere MQ, a group of two or more queue managers on one or more computers, providing automatic interconnection, and allowing queues to be advertised among them for load balancing and redundancy.
- A group of two or more Domino servers that provides users with constant access to data, balances the workload among servers, improves server performance, and maintains performance when the size of an enterprise increases.
- Two or more connected copies of Sterling B2B Integrator that share a database.
- A group of computers and other resources that operate together as a single system. See also clustered system, GPFS cluster.
- A group of application servers that collaborate for the purposes of workload balancing and failover.
- A data set defined to VSAM. A cluster can be a key-sequenced data set, an entry-sequenced data set, or a relative record data set.
- A collection of complete systems that work together to provide a single, unified computing capability.
- A group of servers connected by a network and configured in such a way that if the primary server fails, a secondary server takes over.
- In Storwize® V7000, a pair of nodes that provides a single configuration and service interface.
- A set of independent systems or logical partitions (called nodes) that are organized into a network for the purpose of sharing resources and communicating with each other.
- In IBM System Storage DS8000, a partition capable of performing all DS8000 series functions. With two clusters in the DS8000 storage unit, any operational cluster can take over the processing of a failing cluster.
- In Microsoft Cluster Server, a group of computers, connected together and configured in such a way that, if one fails, MSCS performs a failover, transferring the state data of applications from the failing computer to another computer in the cluster and reinitiating their operation there.
- A group of appliances in which one appliance acts as the central appliance, and the other appliances act as its clients.
- A set of nodes that must be placed close together by a layout algorithm.
- A loosely coupled collection of independent systems (or nodes) organized into a network for the purpose of sharing resources and communicating with each other. See also GPFS cluster.
Cluster Aware AIX (CAA)
A technology that builds clustering capabilities into the AIX operating system. This built-in clustering support provides commands and programming APIs to create a cluster from a group of AIX instances. CAA provides kernel-based heartbeat, monitoring, and event infrastructure.
cluster caching facility (CF)
A subsystem, typically on a dedicated computer or LPAR, that assists in global locking and group buffer pool management for a DB2 pureScale instance on Linux and AIX operating systems. See also preferred primary cluster caching facility, primary cluster caching facility, secondary cluster caching facility.
A user definition of all cluster components. Component information is stored in the ODM. Components include cluster name and ID, and information about member nodes, network interface, and network modules. See also dynamic automatic reconfiguration.
cluster configuration database
See Object Data Manager.
A virtual collection of physical elements such as computer systems and logical elements such as software instances that can provide services to a client as a single unit. See also cluster domain node.
An index whose sequence of key values closely corresponds to the sequence of rows stored in a table. The degree of correspondence is measured by statistics that are used by the optimizer.
A catalog entry that contains the following information about a key-sequenced or entry-sequenced Virtual Storage Access Method (VSAM) cluster: ownership, cluster attributes, and the cluster's passwords and protection attributes. A key-sequenced cluster entry points to both a data entry and an index entry; an entry-sequenced cluster entry points to a data entry only. See also alternate-index entry.
- A topology in which an application server is defined over several machines or CPUs. See also horizontal clustering, vertical clustering.
- See cluster configuration.
- The ability to group independent systems to work together as a single system.
- The process of grouping records together based on similarity. Similar records are labeled according to their group, so there is no predefined target field for the model to predict.
clustering block index
See dimension block index.
An index that determines how rows are physically ordered (clustered) in a table space. If a clustering index on a partitioned table is not a partitioning index, the rows are ordered in cluster sequence within each data partition instead of spanning the partitions.
- A software daemon that runs on every node in the cluster and is responsible for responding to failures and coordinating recovery actions.
- The node that monitors node status using disk leases, detects failures, drives recovery, and selects file system managers. The cluster manager is the node with the lowest node number among the quorum nodes that are operating at a particular time.
An identically configured copy of an object, such as an application server. Cluster members can be used for workload management purposes, for example, to support horizontal scaling and vertical scaling.
An IBM designation that defines certain high-availability requirements that are applied to a software product either by itself or in combination with other software products. A solution that satisfies the technical criteria of these requirements can be validated with IBM and licensed to be marketed with IBM's ClusterProven trademark.
A local queue that is hosted by a cluster queue manager, and defined as a target for messages being put from an application connected to any queue manager within the cluster. All applications retrieving messages must be locally connected.
cluster-receiver channel (CLUSRCVR)
A channel on which a cluster queue manager can receive messages from other queue managers in the cluster, and cluster information from the repository queue managers.
Any part of the system that is available across multiple cluster nodes. The two types of system resources that can be resilient are the following: Objects that are kept up to date by using replication. A resilient application and its associated IP address, which can be switched.
cluster resource group (CRG)
A collection of related cluster resources that defines actions to be taken during a switchover or failover operation of the access point of resilient resources. The group describes a recovery domain and supplies the name of the cluster resource group exit program that manages the movement of an access point.
A Windows (TM) service that manages the cluster specific activities and is installed on each node of the cluster. The components of the Cluster service provide high availability, easy management and enhanced scalability for Windows.
The high availability services, such as the cluster manager and other services running on the nodes, that monitor the cluster resources. The resources and data maintained on the cluster for access by clients and their applications are cluster services.
cluster transmission queue
A transmission queue that holds all messages from a queue manager destined for another queue manager that is in the same cluster. The queue is called SYSTEM.CLUSTER.TRANSMIT.QUEUE.
See color lookup table.
See control language variable.
See CICSPlex SM address space.
A communications link between one CICSPlex SM address space (CMAS) and another CMAS or a remote managed application system (remote MAS). CMAS links are defined when CICSPlex SM is configured.
See comarketing center.
See Configuration Management Database.
See compiled message flow.
See control message interface.
See Common Management Information Protocol.
The VTAM implementation of the Common Management Information Protocol (CMIP), which provides a common set of program services for application programmers to use in writing CMIP application programs. These services include controlling associations, converting basic encoding rules (BER) syntax, and validating protocols.
See common management information service.
See configuration-managed item.
See complementary metal-oxide semiconductor.
See container-managed persistence.
See New Business Partner Customer.
See cross-memory resource-owning task.
- See Conversational Monitor System.
- See Central Message Store.
- See configuration management system.
- See content management system.
CMS extended parameter list
A type of parameter list available in the CMS environment consisting of a string composed exactly as the user typed it at the terminal. There is no tokenization performed on the string.
See Co-Marketing Tool.
See communication network management.
See composite network node.
See change number of sessions.
See communication name table.
See confirm-on-arrival report.
Pertaining to viewing a group of objects from an abstract or high level. See also fine-grained.
The concept of VTAM's writing PIUs to NCP and reading PIUs from NCP with a single channel program. The values coded for the DELAY keywords on the VTAM PCCU definition statement and the NCP LINE definition statement affect the degree of coattailing. A user can increase the probability of VTAM's writing and reading PIUs with a single channel program by adjusting these DELAY keywords. An increase in the degree of coattailing improves channel efficiency but may increase response time.
See Common Business Oriented Language.
COBOL reserved-word file
In EGL, a user-defined text file that contains reserved words other than EGL reserved words. If an EGL variable name matches a reserved word, EGL aliases the variable name at generation time, as reflected in the generated output.
The interaction of multiple users sharing information about their individual web interactions. With this interaction users can share a view of the same web page simultaneously and share further interactions with the web page they are jointly viewing.
See center of competency.
See capacity on demand.
- A representation of a condition, such as an error code.
- A system of bit patterns to which a specific graphic or a control meaning has been assigned.
- A set of instructions for a computer.
- A number that uniquely identifies a catalog entry in the WebSphere Commerce system. A product code is used as the prefix for creating individual SKU codes.
- To write instructions for the computer; to program.
See content assist.
Works together with the code attribute in the APPLET tag to give a complete specification of where to find the main applet class file: code specifies the name of the file, and codebase specifies the URL of the directory containing the file.(Sun)
- A technology that compresses and decompresses data for the purpose of reducing the bandwidth required to send streaming data.
- A program that can encode and decode a digital data stream or signal. In mobile computing, there are separate codecs for multimedia processing and voice processing.
coded character set (CCS)
A set of unambiguous rules that establishes a character set and the one-to-one relationships between the characters of the set and their coded representations. See also invariant character set.
Coded Character Set Identifier (CCSID)
A 16-bit number that includes a specific set of encoding scheme identifiers, character set identifiers, code page identifiers, and other information that uniquely identifies the coded graphic-character representation.
coded character set identifier (CCSID)
A 16-bit number that includes a specific set of encoding scheme identifiers, character set identifiers, code page identifiers, and other information that uniquely identifies the coded graphic-character representation. See also binary string.
coded character set identifier 65534 (CCSID 65534)
The coded character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 (X'FFFE') is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs that are tagged for each individual field it contains. If the field is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.
coded character set identifier 65535 (CCSID 65535)
An identifier that is used to show that the associated data should not be processed as coded-graphic-character data. CCSID 65535 ( FFFF ) cannot be represented in long form. Data that is associated with CCSID 65535 should be interpreted as actual representation is unknown as defined in Character Data Representation Architecture-Level 2, IBM Registry. You cannot convert data that is associated with CCSID 65535 from one CCSID to another. The coded character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.
coded font local identifier
A 1-byte identifier that the Map Coded Font structured field assigns to each coded font it selects. The identifier is then specified in the text-control sequence that precedes the string of text to be printed with the particular font. See also local identifier.
coded graphic character set global identifier (CGCSGID)
A 4-byte binary or a 10-digit decimal identifier consisting of the concatenation of a GCSGID and a CPGID. The CGCSGID identifies the code point assignments in the code page for a specific graphic character set, from among all the graphic characters that are assigned in the code page.
coded graphic character-set ID
A 10-digit identifier (two 5-digit identifiers separated by a space) that is the combination of a graphic character-set ID and a code-page ID. See also code page ID.
- A form of multiplexing where the transmitter encodes the signal using a pseudo-random sequence, which the receiver also knows and can use to decode the received signal. Each different random sequence corresponds to a different communication channel.
- The term that is generally used to reference a type of 2G cellular network (standardized by IS-95). See also 2G, Global System for Mobile Communications, IS-95.
An overlay loaded in a printer in a coded format, rather than as a raster pattern. See also raster pattern overlay.
code element set
The result of applying rules that map a numeric code value to each element of a character set. An element of a character set may be related to more than one numeric code value but the reverse is not true. However, for state-dependent encodings the relationship between numeric code values to elements of a character set may be further controlled by state information. The character set may contain fewer elements than the total number of possible numeric code values; that is, some code values may be unassigned. X/Open.
In Process Designer, the specification of an action through WebSphere business integration API methods or other Java code. A developer can add or customize default code fragments. Process Designer embeds each code fragment in the code it generates to produce a whole program. See also action, action node.
The process of initially generating code from model information or subsequently updating code with model changes. Code changes might be overwritten by changes in the model. See also round-trip engineering.
- A table, supplied by Data Interchange Services or defined by the user, that contains all acceptable values for a single data field.
- One or many dynamic pairs of code values that contains sender code and receiver code. Each code pair has one description and up to four additional codes relating to the pair.
In System Manager, the type of product load that contains all of the product code that does not require translation to other languages, such as the code for displays, menus, and messages. However, if a product is never going to be translated, the code may contain all the product code.
- A specification of code points from a defined encoding structure for each graphic character in a set or in a collection of graphic character sets. Within a code page, a code point can have only one specific meaning. See also invariant character set.
- An ordered set of up to 256 predefined display symbols. The first 32 code points of each code page are reserved for control codes and are the same for all code pages, leaving up to 224 distinct display symbols per page.
- A particular assignment of code points to graphic characters. Within a given code page, a code point can have only one specific meaning. A code page also identifies how undefined code points are handled. See also code point.
code page ID
A 5-digit registered identifier used to specify a particular assignment of code points to graphic characters. The code-page ID is the second part of the QCHRID system value or the CHRID parameter value. See also coded graphic character-set ID.
- For SNA alerts, a 1-or 2-byte hexadecimal code that designates a particular piece of text to be displayed at the focal point.
- An identifier in an alert description that represents a short unit of text. The code point is replaced with the text by an alert display program.
- A unique bit pattern that represents a character in a code page. See also code page.
- In QoS, pertaining to a specific value in the Differentiated Services field of a data packet that signals to a network the behavior that is assigned to that packet.
A project in a Visual Studio solution. One or more projects are contained in one solution. Most projects represent the collection of files that are used to build a component. A specific programming language is often used to code all project items throughout a project. It is possible to have multiple-language projects in VS.NET. Note that, you cannot use multiple languages within one project item. See also solution.
- A set of unambiguous rules that establish a character set and the one-to-one relationship between each character of the set and its bit representation.
- See code page.
A feature that enables merging of model and code changes. See also round-trip engineering.
A textual definition of the operation body code that is used when generating source code for a model element. This allows the source code to be reused and shared throughout a project or across projects. A code template consists of source code and embedded script logic, very much like an HTML page.
The fundamental binary width in a computer architecture that is used for representing character data, such as 7 bits, 8 bits, 16 bits, or 32 bits. Depending on the character encoding form that is used, each code point in a coded character set (CCS) can be represented by one or more code units.
See confirm-on-delivery report.
- The ability of two or more different versions of WebSphere MQ to function on the same computer.
- During migration, the state during which two releases exist in the same data sharing group.
- The state during which two QMF releases exist in the same database.
- The ability of two or more entities to function in the same system or network.
The union of components of the same kind that depend on one another. See also coupling.
See IBM Contracts OnLine.
For programs that are resident on backup systems, a configuration in which a copy of the program is installed for backup purposes, but has not been started. See also hot backup, warm backup.
- The start of a database management system without preprocessing before-images or after-images.
- The starting of IMS when it is initialized for the first time or when some error condition prevents a warm or emergency restart. See also emergency restart, normal restart.
- A method of starting CICS where all local resources are refreshed, but information relating to remote systems and resource managers is preserved.
- The process of starting a system or program using an initial program load procedure.
- A process in which the system is initialized. All jobs that were active or in the job queue at the time of the cold start are removed from the system. See also warm start.
- A process by which DB2 restarts without processing any log records. See also warm start.
- The process of starting an existing data replication configuration without regard for prior replication activity, causing reinitialization of all subscriptions.
- A WebSphere business integration system component that contains business logic describing a distributed business process. Collaborations are used to coordinate and extend the business processes of disparate enterprise software products and to facilitate meaningful data exchange between them. Collaborations use business objects to exchange and manipulate data. See also business logic.
- A conceptual collection or grouping of model elements, classifiers, or primitive types that are unified in accomplishing some objective within the context of the collaboration.
- A diagram that shows the exchange of messages between two or more participants in a BPMN model.
- The ability to connect customers, employees, or business partners to the people and processes in a business or organization, in order to facilitate improved decision-making. Collaboration involves two or more individuals with complementary skills interacting together to resolve a business problem.
A runtime instance of a workflow for a specific hierarchy or catalog. A collaboration area provides a staging area where entries from that container can be modified without affecting the original entry. These changes can be copied back to the original or discarded when the entry completes the workflow. Each collaboration area must be associated with a workflow (but not vice versa). See also container, workflow.
See communication diagram.
One of the pre-defined Sametime meetings that can be selected when scheduling a meeting. A collaboration meeting is a small, very interactive meeting in which all participants have data permission. If computer audio is being used, anyone can talk at any time.
An object created from a collaboration template that is executable after it is configured and bound. Each collaboration object is configured for a specific business environment to integrate specific applications or software products. See also binding, collaboration template.
An executable set of collaboration objects bound together to represent a combined business process. See also event isolation.
A configuration option that, with the full set of such options, enables an administrator to customize the business processing behavior of a specific collaboration object. Collaboration properties are set in System Manager. See also property.
The logic and framework of a collaboration that provides the definition of its actions. A collaboration template consists of Java code, which Process Designer generates and the developer can customize. The template consists of scenarios, which specify sets of actions. A collaboration template is not executable; it is a Java class used to instantiate executable collaboration objects. See also action, collaboration object.
Personalization technology that calculates the similarity between users based on the behaviors of a number of other people and uses that information to make recommendations for the current user.
Collaborative Lifecycle Management (CLM)
The integration of products on Jazz technology to connect the work of analysts with development and test teams. These integrations provide a common approach to artifact linking, dashboards, security, and user interface frameworks.
collaborative planning, forecasting, and replenishment (CPFR)
A concept that allows working together across the supply chain, using a set of process and technology models that are: open, yet allow secure communications; flexible across the industry; extensible to all supply chain processes; supportive of a broad set of requirements.
The configuration of the part of a deployment environment that delivers required behavior to an application module. For example, a messaging collaborative unit includes the host of the messaging engine and deployment targets of the application module, and provides messaging support to the application module.
collapsed data node
A parent data node that hides its child nodes. See also expanded data node.
A subprocess that hides its flow details. The collapsed subprocess object has a marker that distinguishes it as a subprocess, rather than a task. The marker is a small square with a plus sign inside.
- To combine and arrange in order.
- To determine the sorting order of strings of characters.
- One or more characters that match a sequence in a regular expression.
- The smallest entity used to determine the logical ordering of strings. A collating element consists of either a single character, or two or more characters collating as a single entity. The value of the LC_COLLATE category in the current locale determines the current set of collating elements. See also collating sequence.
- The sequence in which the characters are ordered for the purpose of sorting, merging, comparing, and processing indexed data sequentially.
- An ordering assigned to a set of items, such that any two sets in that assigned order can be collated.
- A specified arrangement used in sequencing. See also collating element.
- The relative ordering of collating elements as determined by the setting of the LC_COLLATE category in the current locale. The character order, as defined for the LC_COLLATE category in the current locale, defines the relative order of all collating elements, such that each element occupies a unique position in the order.
- The logical ordering of characters and strings according to defined rules.
- The separation of storage types into general categories (i.e. pallet, case, and single unit) that require very different means of handling.
- A group of objects with a similar set of management rules.
- A logical container for storing archived documents, as well as the retention and access policies that specify how the documents are managed. Each collection is represented by a separate file system. See also file archive collection, System Storage Archive Manager collection.
- In Ada language, the entire set of objects created by evaluation of allocators for an access type.
- An instance of a collection data type; a group of elements of the same data type stored in a SET, MULTISET, or LIST data type.
- A group of packages that have the same qualifier.
- A group of objects that typically have similar performance, availability, backup, retention, and class transition characteristics. A collection is used to catalog a large number of objects which, if cataloged separately, could require an extremely large catalog.
- Data obtained by a collector that represents the system status at a given point in time. Collections are timestamped and stored in a management collection object. See also schema.
- An abstract class without any ordering, element properties, or key properties.
- The process of monitoring and storing application performance data, aggregating it to a time interval, and saving it into data files on the endpoint.
- A set of data sources and options for crawling, parsing, indexing, and searching those data sources.
- In a Tivoli environment, a container that provides a single view of related resources.
A database cursor that has an IBM Informix ESQL/C collection variable associated with it and provides access to the individual elements of a column whose data type is a collection data type.
collection data type
A complex data type whose instances are groups of elements of the same data type, which can be any opaque data type, distinct data type, built-in data type, collection data type, or row data type. See also complex data type.
A type of page in the administrative console that displays a collection list of administrative objects. From this type of page, you can typically select objects to act on or to display other pages for.
collection processing engine (CPE)
An engine that performs collection processing through the combination of a collection reader, an optional CAS Initializer, an analysis engine, and one or more CAS Consumers.
collection processing manager (CPM)
A module in the framework that manages the execution of collection processing, routing CASs from the collection reader to an analysis engine, and then to the CAS Consumers. The CPM provides feedback such as performance statistics and error reporting, and may implement features such as parallelization.
A System i Navigator tool that collects performance data independent of the system monitors in System i Navigator. This function is intended for subsequent analysis by performance personnel either by writing queries against the collected data or by reviewing reports produced by the Performance Tools for i5/OS licensed program.
An IBM Informix ESQL/C host variable or SPL variable that holds an entire collection and provides access, through a collection cursor, to the individual elements of the collection.
- A set of WebSphere DataPower XC10 appliances that are grouped together for scalability and management purposes.
- A set of Liberty servers in one management domain that has at least one server with the collective-controller feature enabled.
A communication operation that involves more than two processes or tasks. Broadcasts and reductions are examples of collective communication operations. All tasks in a communicator must participate.
A centralized administrative control point where operations such as MBean routing, file transfer, and cluster management in a collective are performed. A core role of the collective controller is to receive information from the members within the collective so that the data can be retrieved readily without having to invoke an operation on each individual member.
- In an AIX PowerSC environment, an AIX logical partition or a virtual machine that has VTPM enabled and has the OpenPTS.collector fileset installed.
- An object that determines what information is collected from, or assigned to, server resources. The information is specified through properties in the collector. The collector, assigned to a server, serves as a specification for the server's manifest.
- A generic name for a program that at regular intervals collects data about the status of the system.
For directory shadowing, a system that receives initial or changed Enterprise Address Book (EAB) data from a supplier system in a network. See also supplier system.
- In X.25 communication, a condition that occurs when data terminal equipment (DTE) and data circuit-terminating equipment (DCE) simultaneously transmit packets (for instance, a clear request packet and a clear indication packet) over the same logical channel. The types of collision are clear collision, call collision, or reset collision.
- An unwanted condition that results from concurrent transmissions on a channel, causing the transmissions to be unintelligible.
In carrier sense multiple access with collision avoidance (CSMA/CA), the process of sending a jam signal and waiting for a variable time before transmitting data. The process is designed to avoid two or more simultaneous transmissions.
In Performance Tools, a counter that counts the total number of times the terminal equipment (TE) detected that the frames it transmitted were damaged by another TE trying to use the same bus.
The result of two tables being joined under one of two conditions. The first condition is where the tables are located in a single-partition database partition group in the same database partition. The second condition is where the tables are in the same database partition group, the number of partitioning columns is the same, the columns are partition compatible, both tables use the same partitioning function, and pairs of the corresponding partitioning key columns participate in the equijoin predicates. See also partition-compatible join.
The process of keeping all data belonging to a single-client file space, a single client node, or a group of client nodes on a minimal number of sequential-access volumes within a storage pool. Collocation can reduce the number of volumes that must be accessed when a large amount of data must be restored. See also anti-collocation, distribution preference.
See primary key prefix.
In computer systems, a color is usually represented by a triplet called RGB (red, green, and blue) signals. Most computer monitors require RGB signals to drive the 3-colored phosphors of a color monitor.
In Enhanced X-Windows, an entry in a color map that consists of three values based on red, green, and blue intensities. The values are 16-bit, unsigned numbers. Zero represents the minimum intensity. The values are scaled by the server to match the particular display in use.
color lookup table (CLUT)
See color map.
- A set of color cells. A pixel value indexes the color map to produce RGB-intensities. A color map consists of a set of entries defining color values that, when associated with a window, is used to display the contents of the window.
- A lookup table in which each index is associated with a red, green, and blue value.
color mapping table
An architected MO:DCA object that is used to map color values specified in a source color space to color values specified in a target color space. This object is loaded into printers that support the color mapping table.
- A set of colors that can be displayed on the display at one time. This can be standard set used for all images or a set that can be customized for each image.
- See color map.
- In Business Graphics Utility, the range of colors defined by hue, lightness, and saturation to be used when a chart is displayed on a graphics-capable display.
A progression of colors in a color map. Most color ramps are smooth and have only a small number, if any, of discontinuities. For instance, if the full set of colors of the rainbow were loaded into the color map, that would constitute a color ramp.
The ability to specify a color other than black to print data in more than one color. Some printers support selection of several colors, depending upon the color of ribbon installed in the printer. Other printers support the selection of black or "color of media," which can cause white lettering on a background that has been shaded black, for example.
See color map.
- In a relational database, a field defined for a given record or row.
- The vertical component of a database table. A column has a name and a particular data type (for example, character, decimal, or integer).
- A subdivision of a band, such as baseline or actual.
- A character position within a print line or on a display. The positions are numbered consecutively from 1, starting at the leftmost character position and extending to the rightmost position.
See page display.
column distribution value
See data distribution.
See aggregate function.
In a federated system, a parameter of the CREATE NICKNAME and ALTER NICKNAME statements that describes the values in certain columns of the data source object that a nickname references. This information is added to the global catalog and used by the query optimizer to develop better access plans.
A unit of horizontal measure related to characters in a line. It is assumed that each character in a character set has an intrinsic column width independent of any output device. Each printable character in the portable character set has a column width of one. The standard utilities, when used as described in this document set, assume that all characters have integral column widths. The column width of a character is not necessarily related to the internal representation of the character (numbers of bits or bytes). The column position of a character in a line is defined as one plus the sum of the column widths of the preceding characters in the line. Column positions are numbered starting from 1. X/Open.
A level attribute that has certain properties, irrespective of the reference structure level. For example, the level attribute that provides the identifier for each row of data is represented by the $ID column token.
The formatting of values in a report so that the values occupy several lines within a column. Column wrapping is often used when a column contains a value with a length that exceeds the column width.
combination pricing rule
A pricing rule that changes the price of an item based on the combination of items being ordered. For example, an organization can create a pricing rule under which, for every home theatre system a customer buys, the customer gets a free DVD player.
A mathematical science about countable elements. Typical results of combinatorics are formulas to compute how often certain combinations of distinguishable objects occur. The results from combinatorics are often used to analyze the run time (speed) of an algorithm.
combined code page
See mixed code page.
combined function IOP (CFIOP)
A type of IOP that can connect to a variety of different input/output adapters to support disk units, a console, and communications hardware. It contains some multifunction IOP (MFIOP) capabilities as well as Ethernet and token-ring controllers. This processor does not contain server processor functions. See also multifunction IOP.
combined sewer overflow (CSO)
A discharge of untreated waste water from a combined sewer system at a point prior to the headworks of a publicly owned treatment works. CSOs generally occur during wet weather (rainfall or snowmelt). During periods of wet weather, these systems become overloaded, bypass treatment works, and discharge directly to receiving waters.
combined sewer system (CSS)
A waste water collection system which conveys sanitary waste waters (domestic, commercial and industrial waste waters) and stormwater through a single pipe to a publicly owned treatment works for treatment prior to discharge to surface waters.
In high-level data link control (HDLC), the part of a data station that supports the combined control functions of the data link, generates commands and responses for transmission, and interprets received commands and responses.
A binary file, such as .dll, .ocx, and some .exe files, that supports the COM standard for providing objects. COM components contain code for one or more class factories, COM classes, registry-entry mechanisms, loading code, and so on.
See microfilm device.
Comité consultatif international télégraphique et téléphonique (CCITT)
See International Telecommunication Union Telecommunication Standardization Sector.
- A unique pattern (either binary 1100000 or binary 0011111) used in 8B/10B encoding to specify character alignment within a data stream. See also K28.5.
- In REXX, a token that represents the continuation character, a separator of arguments in an argument list, or a separator in a parsing template.
An expression that contains two operands separated by a comma. Although the compiler evaluates both operands, the value of the right operand is the value of the expression. If the left operand produces a value, the compiler discards this value.
- In SDLC, a frame transmitted by a primary station. Asynchronous balanced mode stations send both commands and responses. See also response.
- A request to perform an operation or run a program. When parameters, arguments, flags, or other operands are associated with a command, the resulting character string is a single command.
- In SNA, any field set in the transmission header (TH), request header (RH), or request unit (RU) that states an action or that starts a protocol. See also data traffic reset state.
- A request from a terminal or automated operator for the performance of an operation or service, or for the execution of a particular program. See also response.
- In data communication, an instruction represented in the control files of a frame and transmitted by a primary or combined station. It causes the addressed station to run a data link control function.
- A statement used to initiate an action or start a service. A command consists of the command name abbreviation, and its parameters and flags if applicable.
command attention key (CA key)
In DDS, a keyboard key that can be specified with the CA keyword to request the function specified by the keyword. Data is not returned to the system. See also command function key.
The process of authorizing a network operator to use various commands. See also NetView command authorization table, Resource Access Control Facility, System Authorization Facility.
- A proxy that can invoke a single operation using an execute() method.
- A bean that contains the programming logic to handle a particular request.
The portion of the segment search argument that enables an application program to access a database segment based on some variation in either the call function, the segment qualification, or the setting of parentage.
An object that contains the definition of a command (including the command name, parameter descriptions, and validity-checking information) and identifies the program that performs the function requested by the command. The system-recognized identifier for the object type is *CMD.
command definition statement
A source statement that defines keywords and parameter values, qualified names, elements in a list, parameter requirements and interrelationships, and prompt text for a command. Command definition statements are used to create a CL command.
An RRSF function that allows a user to issue a command from one user ID and direct that command to run in the RACF address space on the same system or on a different RRSF node, using the same or a different user ID. See also automatic command direction, directed command.
- A system file that contains one or more statements or commands.
- In PC operating systems, a file with a file name extension of .CMD that functions like a batch file in DOS.
- In RJE, a remote job input stream that can contain host system commands and job control language (JCL), data, and RJE control statements (READFILE or EOF). See also data file.
command function key (CF key)
In DDS, a keyboard key that can be specified with the CF keyword to request the function specified by the keyword. Data is returned to the system. See also command attention key.
In the NetView Graphic Monitor Facility, a numeric identifier that is assigned to a network resource by its controlling resource manager. Each resource manager is assigned a range of values that can be defined.
An interface for running QMF commands. The QMF commands can only be issued from within an active QMF session. See also callable interface.
See command language interpreter.
command language translator
A batch program (part of CICS program preparation utilities) that prepares a source application program that includes EXEC CICS or EXEC DLI commands. The translator program translates the EXEC commands into CALL statements in the language of the application program. The translator output can be compiled or assembled in the usual way.
Pertaining to an operation that is performed for a specific command in a program. For example, a Monitor Message (MONMSG) command that immediately follows a specific command in a CL program is a command-level MONMSG command. See also program level.
See application programming interface.
A transaction that enables CICS commands to be entered, syntax-checked, and executed interactively at a 3270 screen. It provides a reference to the syntax of the whole of the CICS command-level application programming and system programming interface.
A part of a command line, delimited by white space. Arguments are used to specify detailed behavior to a program. They are usually either command line options selecting variations in program operation, or path names of files to be processed.
A component used to run selected Tivoli Workload Scheduler master domain manager commands from any workstation where it is installed. The command-line client does not need to be installed on the master domain manager and is a selectable option for installation on other nodes in the network. See also master domain manager.
command-line interface (CLI)
A computer interface in which the input and output are text based. See also Copy Services command-line interface.
- A list of commands and statements designed to perform a specific function for the user.
- A language for performing TSO tasks.
In an IMSplex, the IMS that Operations Manager (OM) designates to process a command when a command is issued through the OM API. Commands are routed to all IMS systems that are registered for the command and, if the command requires only one IMS to process it, the command master processes the command.
- In WebSphere MQ for z/OS, a character string that identifies the queue manager to which WebSphere MQ for z/OS commands are directed, and from which WebSphere MQ for z/OS operator messages are received.
- A 1-character to 8-character command identifier. The command prefix distinguishes the command as belonging to an application or subsystem rather than to z/OS.
command prefix facility (CPF)
An z/OS facility that provides a registry for command prefixes. CPF ensures that two or more subsystems do not have the same or overlapping command prefixes for operator commands.
A module designed to perform a specific function for the user. Users can write command processors in assembler language or in a high-level language. Command processors are started as commands.
- In MVS, a character that denotes an operator command.
- A character that permits a z/OS console operator or an IMS subsystem user to route DB2 commands to specific DB2 for z/OS subsystems.
A form of security checking that can be specified for the PERFORM, COLLECT, DISCARD, INQUIRE, and SET commands. Command security operates in addition to any transaction security or resource security specified for a transaction. For example if a terminal invokes a transaction that the user is authorized to use, and the transaction issues a command that the user is not authorized to use, the command fails with the NOTAUTH condition.
command significant status
The command status that is associated with a resource, for example, the status of STOP, TRACE, and MFSTEST commands. If a resource structure is defined, the recovery of command significant status is always maintained globally by the Resource Manager (RM) in the resource structure. See also end-user significant status.
- A request to perform an operation, along with the operands that provide all instructions needed for running the operation.
- In query management, a character string that contains a query command.
The verb or verb/object portion of a site-defined command. After command synonyms are defined and activated in the QMF profile, users can enter the synonyms on the QMF command line as they do with regular QMF commands.
See communication area.
See communications data set.
- An annotation attached to an artifact, element, or a collection of elements. See also constraint.
- Text that is included within a contract for communication with other users.
- Explanatory text in a program or file that is not translated by the compiler.
In COBOL, an entry in the Identification Division of the source program that may be any combination of characters from the character set of the computer. The comment-entry is written in area B on one or more lines. Comment-entries serve only as documentation and are not translated by the compiler.
In COBOL, a source program line represented by an asterisk (*) in the indicator area of the line and any characters from the computer's character set in area A and area B of that line. The comment line serves only for documentation in a program.
A list of the pertinent information about a shipment, such as shipper, consignee, third party (if present), the goods being shipped, their cost and value for customs (and for the transaction), and so on.
commercial processing workload (CPW)
An application that is run on System i models and processors to determine processor performance. The CPW workload is representative of commercial applications, particularly those that do significant database processing in conjunction with journaling and commitment control.
Commission of European Post and Telegraph (CEPT)
A European standards-setting organization replaced by the European Telecommunications Standards Institute (ETSI). See also European Telecommunications Standards Institute.
- To move managed assets from a task group in a workspace to the production-ready data on the authoring server. See also authoring server, production-ready data, quick publish, task group, workspace, workspace task group approver.
- To apply all the changes made during the current unit of recovery (UR) or unit of work (UOW). After the operation is complete, a new UR or UOW can begin.
- To transfer to a specific version of the software product. When committing, the saved files from all previous versions are removed from the system, thereby making it impossible to return to a previous version without reinstallation. Committing does not change the currently active version of the software product. See also reject.
- To end a unit of work by releasing locks so that the database changes made by that unit of work can be perceived by other processes. This operation makes the data changes permanent. See also atomic, recoverable data set.
- To make a document immutable.
See sync point manager.
The information that associates the commit operation with a specific set of committable resource changes. The commit ID is placed in the notify object if a system or routing step failure occurs, or if uncommitted changes exist when a routing step ends normally. The commit ID contains information (supplied on the commit statement) about the last successful transaction (group of changes that appear as a single change); for example, the transfer of funds from savings to a checking account.
commit in progress (CIP)
The commit in progress logical unit of work (LUW) state indicates that all the resources associated with this logical unit of work have been prepared after a unanimous vote to commit. The protected resource managers are in the process of committing.
- A point at which there are no changes to a database file pending within a job. See also roll back.
- In a commitment controlled environment, any time there are no outstanding changes for a committable resource existing within a job.
- A means of grouping committable resource operations to allow either the processing of a group of committable resource changes as a single unit through the Commit command, or the removing of a group of committable resource changes as a single unit through the Rollback command.
- A way of grouping file operations that allows the processing of a group of database changes as a unit or the removal of a group of database changes as a unit. See also roll back.
Information used by the system to maintain the commitment control environment throughout a routing step and, in the case of a system failure, throughout an IPL (initial program load). This information is obtained from the Start Commitment Control (STRCMTCTL) command, which establishes the commitment control environment, and the file open information in a routing step. The commitment definition has a scope either to the job or to a particular activation group within the job.
- An operation that saves a file to permanent storage.
- A change management operation that causes all the updates prepared in the preparation phase to take effect. See also transactional mode.
The second phase in a XA process. If all participants acknowledge that they are prepared to commit, the transaction manager issues the commit request. If any participant is not prepared to commit, the transaction manager issues a back-out request to all participants.
A point in time when data is considered to be consistent. See also synchronization point.
In Informix, an isolation level under which a query in a transaction can read only rows that are committed at the moment when the query is requested. The user cannot view rows that were changed as a part of a currently uncommitted transaction. Committed read is available through a database server and set with the SET ISOLATION statement. It is the default level of isolation for databases that are not ANSI compliant. See also read committed, uncommitted read.
The process by which goods and services that were once unique offerings become more generic in the marketplace. Commoditization occurs when the goods or services can be produced on a larger scale by more companies.
The phase of the offering life cycle where the market is mature and customers are generally less willing to take risks, slower to adopt technology and are interested in an offering that has an established track record.
An agent that provides shared infrastructure for management applications. The common agent is self-monitoring and self-starting, and provides remote deployment capability, shared machine resources, secure connectivity, and a single entry point. See also agent, subagent.
Common Analysis Structure (CAS)
A structure that stores the content and metadata of a document, and all analysis results that are produced by a text analysis engine. All data exchange during document analysis is handled by using the common analysis structure. See also annotation, common analysis structure consumer, common analysis structure initializer, common analysis structure processor, Java common analysis structure, text analysis engine, XML common analysis structure.
common analysis structure consumer
A consumer that does the final processing on the analysis results that are stored in the common analysis structure. For example, a consumer indexes the contents of the common analysis structure in a search engine or it populates a relational database with specific analysis results. See also Common Analysis Structure.
common analysis structure initializer
A component that populates a Common Analysis Structure from a raw document. For example, if the document is HTML, a CAS Initializer might store a detagged version of the document in the CAS and also create inline annotations derived from the tags. See also Common Analysis Structure.
common analysis structure processor (CAS processor)
A component that takes a common analysis structure as input and returns a CAS as output. See also Common Analysis Structure.
common anchor area (CAA)
Dynamically acquired storage that represents a z/OS thread. This area acts as a central communications area for the program, holding control blocks and addresses of various storage and error-handling routines, and control blocks.
- A control section used to reserve a virtual storage area to which other modules can refer.
- In a web page that is based on a page template, the fixed region of the page.
Common Base Event
A specification based on XML that defines a mechanism for managing events, such as logging, tracing, management, and business events, in business enterprise applications. See also situation.
common channel signaling (CCS)
A method of communicating telephony information and line signaling events (for example, call setup and call clearing) on a dedicated signaling channel. See also channel associated signaling.
common client interface (CCI)
A standard interface that allows developers to communicate with enterprise information systems (EISs) through specific resource adapters, using a generic programming style. The generic CCI classes define the environment in which a J2EE component can send and receive data from an EIS.
common communication layer (CCL)
The communication infrastructure that unites the various components, such as controller, parser, crawler, and index server, of WebSphere Information Integrator OmniFind Edition.
Common Communications Support (CCS)
The Systems Application Architecture (SAA) component that defines architectures and protocols that interconnect systems and devices in an SAA environment and allow data to be interchanged among them.
Common Connector Framework (CCF)
A product offering interface and class definitions that provide a consistent means of interacting with enterprise resources (for example, CICS and Encina transactions) from any Java execution environment.
Common Console Interface (CCI)
The interface definition that enables console components to run either in a previously installed console or in a web console, such as the Integrated Solutions Console (ISC).
Common Cryptographic Architecture (CCA)
IBM software that enables a consistent approach to cryptography on major IBM computing platforms. It supports application software that is written in a variety of programming languages. Application software can call on CCA services to perform a broad range of cryptographic functions, including DES and RSA encryption.
Common Data Model
A logical data model that defines the standard representation of resources and how those resources are associated to each other. The Common Data Model uses influences from various standards bodies in the industry and serves as a best practice conglomeration of all standards.
common error bucket
An additional error status element (ESE) generated for each terminal error block (TEB), if fewer ESEs than the maximum number of error types recognized by the CICS terminal abnormal condition program are specified when the terminal error program (TEP) tables are generated.
Common Event Infrastructure (CEI)
The implementation of a set of APIs and infrastructure for the creation, transmission, persistence, and distribution of business, system, and network Common Base Events. See also event emitter, event server.
Common Information Model (CIM)
An implementation-neutral, object-oriented schema for describing network management or systems management information. The Distributed Management Task Force (DMTF) develops and maintains CIM specifications. See also common management model.
common interchange unit (CIU)
The independent unit of transfer for a common interchange file (CIF). It is the part of the CIF that identifies the relationship to the receiving database. A CIF can contain multiple CIUs.
- A protocol that enables collaboration on the Internet by defining a remote file-access protocol that is compatible with the way applications already share data on local disks and network file servers. See also Server Message Block 2.0, Server Message Block.
- A protocol that manages shared, remote file access for applications to files, printers, serial ports, and so on over a TCP/IP network.
In COBOL, the key fields that are common to all record formats in the file starting with the first key field (the most significant) and ending with the last key field (the least significant).
Common Language for Expression Manipulation (CLEM)
A powerful language for analyzing and manipulating the data that flows along SPSS Modeler streams. A subset of the CLEM language can be used when scripting in the user interface, allowing many of the same data manipulations to be automated.
common language runtime (CLR)
The runtime interpreter for all .NET Framework applications. See also .NET Framework.
- A continuously executing program designed to minimize host interrupts while maximizing channel utilization.
- The architecture that defines the channel commands used between the host and the channel attachment adapter.
common management information service (CMIS)
In OSI, the set of services defined by ISO 9595. The common management information service is used by agent processes and managing processes to communicate.
common management model (CMM)
A model that describes how to represent IT entities as managed resources and services. See also Common Information Model.
common message log
A log that contains messages from several Infoprint Server components, including Print Interface, NetSpool, and IP PrintWay extended mode. Infoprint Central and the aoplogu command can display messages in the common message log.
common MPTN manager (CMM)
The component of the MPTN architecture that provides services independent of any transport protocol. Examples include registering transport users with the MPTN address-mapper component, selecting a transport provider, and establishing MPTN connections.
Common Object Request Broker Architecture (CORBA)
An architecture and a specification for distributed object-oriented computing that separates client and server programs with a formal interface definition. See also Internet Inter-ORB Protocol.
Common Programming Interface (CPI)
In Systems Application Architecture (SAA), a set of software interfaces, conventions, languages, and protocols that provide a framework for writing applications with cross-system consistency.
Common Programming Interface for Communications (CPI-C)
A call-level interface that provides a consistent application programming interface (API) for applications that use program-to-program communications. CPI-C uses LU 6.2 architecture to create a set of interprogram services that can establish and end a conversation, send and receive data, exchange control information, and notify a partner program of errors.
See common area.
A function available to applications on a variety of operating system platforms, accessible through any supported programming language. A common service can include support for character classification, collation, case conversion, data formatting, and so on.
common service area (CSA)
In a z/OS operating system, a part of the common area that contains data areas that can be addressed by all address spaces but is protected during its use by the key of the requester.
Common Service Layer (CSL)
A collection of IMS manager address spaces that provide the infrastructure that is needed for systems management tasks. The CSL address spaces include Open Database Manager (ODBM), Operations Manager (OM), Resource Manager (RM), and Structured Call Interface (SCI). The CSL is built on the Base Primitive Environment (BPE) layer.
- In MVS, an area that contains system control programs and control blocks.
- A major CICS storage control block that contains areas and data required for the operation of CICS.
common table expression
An expression that defines a result table with a name (a qualified SQL identifier). The expression can be specified as a table name in any FROM clause in the fullselect that follows the WITH clause.
common user ID
See common user identification.
common user identification (common user ID)
In System i Access, the user identification of a System i Access user that is used by the router when establishing a communications connection with a host system if a user ID is not specified in either the CONFIG.PCS file or in an alternative configuration file. The router uses this common user ID when connecting the personal computer to each additional host system. See also user identification.
A widget provided by IBM that is not associated with a particular product. See also widget.
- An area within the CSA that can be used by application programs for user data that needs to be accessed by any task in the system. See also transaction work area.
- A work area that can be accessed by any transaction in the CICS system.
An association between an actor class and a use case class, indicating that their instances interact. The direction of the association indicates the initiator of the communication (Unified Process convention).
- An optional hardware feature, available on certain processors, that permits communications facilities to be attached to the processors.
- A device that allows network communication.
communication buffer exit library
A dynamically loaded, shared library that interacts with the DB2 communication layer and has access to the contents of the unencrypted communication buffers that are received at the server from clients and sent from the server to clients.
A conversation statement that transaction programs can issue to communicate through the LU 6.2 protocol boundary. The specific calls that a transaction program can issue are determined by the program's current conversation state.
communication control character
See transmission control character.
A controller that regulates the exchange of data between Gentran Server for Windows and its organizations (value-added networks (VANs) or trading partners). Through the Gentran Server for Windows file interface, the communication controller can support leased or dialed connections, as well as interaction with third-party communications packages. To be a communications controller, a machine must be capable of sending and receiving files via a modem or other communications device. In a single workstation system, all three controllers (communications controller, process controller, and the Gentran Server for Windows Primary System Controller) all reside on the same machine.
- A controller that regulates the exchange of data between Gentran Server for Windows and its organizations (value-added networks (VANs) or trading partners). Through the Gentran Server for Windows file interface, the communication controller can support leased or dialed connections, as well as interaction with third-party communications packages. To be a communications controller, a machine must be capable of sending and receiving files via a modem or other communications device. In a single workstation system, all three controllers (communications controller, process controller, and the Gentran Server for Windows Primary System Controller) all reside on the same machine.
- A device that directs the transmission of data over the data links of a network; its operation may be controlled by a program executed in a processor to which the controller is connected or it may be controlled by a program executed within the device. (T)
- A type of communication control unit whose operations are controlled by one or more programs stored and executed in the unit. It manages the details of line control and the routing of data through a network. See also transmission control unit.
Communication Control Program (CCP)
A portion of the network control program communication interrupt control program (CICP) that initiates and ends I/O line operations, handles first-level line error recovery and recording, and administers commands issued by background programs.
In UML, an interaction diagram that shows the structure of interactions and messages that pass between lifelines, which can be used to explore the dynamic behavior of a system. See also object diagram, sequence diagram.
The relationship between a network interface and the associated IP label or address, function, and other parameters necessary for the application. See also network interface.
communication management configuration (CMC)
In VTAM, a technique for configuring a network that allows for the consolidation of many network management functions for the entire network in a single host processor.
communication management configuration host node
The type 5 host processor in a communication management configuration that does all network-control functions in the network except for controlling devices that are channel-attached to data hosts. See also data host node.
communication management host
See communication management configuration host node.
The method by which a client and server exchange information. See also Transmission Control Protocol/Internet Protocol.
communication network management application program
A VTAM application program that issues and receives formatted management service request units for physical units. The NetView program is an example of a CNM application program.
communication network management interface (CNMI)
An interface that the access method provides to an application program for handling data and commands that are associated with communication systems management. CNM data and commands are handled across this interface.
- The IP label or address or a fully qualified domain name that can be used to communicate with the remote node. The communication path allows the cluster configuration to be discovered from a single node.
- In UML modeling, a type of association that occurs between nodes in deployment diagrams to show how the nodes communicate.
- On a personal computer, a serial port to which a stand-alone modem can be attached.
- An access point for data entry or exit to or from a communication device such as a workstation.
communication scanner processor (CSP)
A processor in the 3725 Communication Controller that contains a microprocessor with a control code. The code controls transmission of data over links attached to the CSP.
The physical placement of communications controllers, the attachment of communications lines, and so forth; and the configuration descriptions that describe the physical configuration to the system and describe how the configuration will be used by the system.
communications data set (COMMDS)
The primary means of communication among systems governed by a single storage management subsystem (SMS) configuration. The COMMDS is a linear data set (LDS) that contains the name of the active control data set (ACDS) and current usage statistics for each system-managed volume, which helps balance space among systems running SMS. See also active control data set, control data set, source control data set.
Part of the task control area (TCA) that is used by CICS and by user-written application programs for communication between the application program and CICS management and service programs.
communications enabled application
A software application that uses an IP network and communications technology to accomplish business objectives. Enterprise applications can be communications enabled with web telephony components and collaborative web services that allow users to dynamically interact through shared browser sessions over a secure network.
In the AIX operating system, a framework of communication that consists of a postmaster, an object registration service, a startup file, communication protocols, and application programming interfaces.
- The physical link (such as a wire or a telephone circuit) that connects one or more work stations to a communications controller, or connects one controller to another. See also data link protocol.
- The line over which data communications take place; for example, a telephone line.
See data link.
IBM SecureWay Software that supports (a) the development and use of application programs across two or more connected systems or workstations, (b) multiple concurrent connections that use a wide range of protocols, and (c) several application programming interfaces (APIs) that may be called concurrently and that are designed for client/server and distributed application programs.
Everything sent and received to/from one telephone number in one continuous period of connection. This could include sending two or three interchange envelopes to a network, each for a different trading partner.
communications side information
In CPI Communications, an object that contains initialization parameters, such as the name of the partner program with which a program can establish a conversation and the name of the logical unit (LU) at the partner program's node, which CPI Communications requires to establish a conversation. The system-recognized identifier for the object type is *CSI.
Software that enables a computer to connect with another computer and to exchange information. Communications software can maintain settings for the connection, coordinate transmission of data and messages, as well as other tasks relating to the connection between the computer systems.
communications storage manager (CSM)
In VTAM, a buffer management technology that reduces performance overhead resulting from the movement of large amounts of data. CSM enables authorized host application programs to put data in buffers that can be addressed and accessed by other authorized host application programs without any need to copy the data.
A method for application programs to communicate on a local system, or between a local system and a remote system using the intersystem communications function (ICF). Examples of these communications methods include (a) asynchronous communications, (b) binary synchronous communications (BSC), (c) intrasystem communications, or (d) Systems Network Architecture (SNA), such as advanced program-to-program communications (APPC) and SNA upline facility (SNUF).
The IBM licensed program that contains the VM/MVS bridge and the remote job entry function. Communications Utilities provides a method of exchanging mail or files and submitting or receiving jobs between connected systems.
- A web trading group that enables buyers and sellers to conduct business. Partners receive invitations from the sponsor to join their community. See also partner.
- In SNMP, the relationship between an agent and one or more managers. The community describes which SNMP manager requests the SNMP agent should honor.
- In the Simple Network Management Protocol (SNMP), an administrative relationship between entities.
- A repository area where an assigned group of users can work together.
- A collection or grouping of trading partners for the purpose of achieving a common goal.
See internal partner.
Combining mathematical elements or having elements that combine in a way that the result is independent of the order in which they are processed. For example, such that a + b = b + a and a x b = b x a.
A Boolean function whose arguments are the reverse of, and evaluates to the same result as another Boolean function. Commutator functions might execute quicker depending on the nature of the query.
See IBM Competitive Intelligence.
- To compress a database, in order to reclaim space freed by the deletion of documents and attachments.
- To replace repetitive bits in a file or folder with control bits so that the file or folder takes up less space when saved.
The data model and content for a particular business unit or enterprise that can be used to manage, link, and synchronize product information both internally and externally. See also data model.
- A built-in function that is used to compare two values. The comparison operators are ==, !=, <, >, <= and >=. See also operator.
- In SQL, a symbol used in comparison expressions to specify a relationship between two values. Comparison operators are = (equal to), <> (not equal to), < (less than), > (greater than), <= (less than or equal to), and >= (greater than or equal to).
- In REXX, an operator that compares two terms and returns the value 1 if the result of the comparison is true, or 0 if it is not true.
- A built-in function that is used to compare two values and is based on the selected term data type.
- A mode of operation in which a device can simulate the function of another device or model. The device will function like a different device of the same type, ignoring some or all of the additional features that the device might possess. Compatibility mode permits a migration between devices with minimal impact on programs that have device dependencies. See also 32-name mode, page mode.
- See conversion mode.
- A mode of processing in which the IEAIPSxx and IEAICSxx parmlib members determine system resource management.
See conversion mode*.
compatible data types
Two different data types that can be cast to one another in the database. See also implicit cast.
Offerings that have identical sets of base offering components such as resource type and measurement source. The corresponding offering components in each compatible offering can have different sets of metrics.
In the Distributed Computing Environment (DCE), a server that offers the requested Remote Procedure Call (RPC) interface and RPC object and that is accessible over a valid combination of network and transport protocols.
compatible unit (CU)
A construction template that defines labor, materials, services, and tools resources that are required to perform construction work, such as installing a utility pole. Compatible units are used as the basis for estimating the costs and resource requirements that are associated with construction work orders.
- The means by which operations in a process that have successfully completed can be undone if an error occurs, to return the system to a consistent state.
- On a federated system, the ability to process a portion of an SQL statement that is not supported by a data source. See also pushdown, query optimizer.
- In MPTN architecture, the action of making up for differences in functions that are requested by the transport user and those provided by the transport provider.
- The action that a collaboration takes during rollback of a transaction to undo a previously executed service call. Such an action semantically negates the action taken by a corresponding step in the service call, which has already been executed. For example, the compensation step for a Create action might involve deleting the object just created. See also isolation checking, minimum transaction level, transactional collaboration.
Flow that defines the set of activities that are performed while the transaction is being rolled back to compensate for activities that were performed during the normal flow of the process. A compensation flow can also be called from a compensate end or intermediate event.
The distinct way in which a business entity is positioned in the market to obtain leadership over competitors, providing the ability to maintain sustained levels of profitability above the industry average.
An association between similar items from different manufacturers. For example, if a store sells a basketball shoe made by Company X, the store might also offer buyers a similar basketball shoe made by Company Y.
A license for a program that replaces a qualifying non-IBM program that is obtained for a reduced charge. See also IBM trade-up.
- In Ada language, the translation of an Ada source program into an executable object module.
- Translation of a source program (such as RPG or COBOL specifications) into a program in machine language. In Integrated Language Environment (ILE) languages, compilation translates source statements into modules, which then can be bound into programs or service programs.
In a cross-compilation environment, the machine on which compilation takes place. See also execution host.
See compile time.
- To translate all or part of a program expressed in a high-level language into a computer program expressed in an intermediate language, an assembly language, or a machine language.
- In Integrated Language Environment (ILE) languages, to translate source statements into modules that then can be bound into programs or service programs.
In the original program model (OPM), the set of machine-language instructions that is the output from the compilation of a source program. The actual processing of data is done by the machine-language program. The system-recognized identifier for the object type is *PGM.
compiled SQL PL
SQL procedure language statements that are compiled into sections within a package. See also inline SQL PL.
- A statement that controls what the compiler does rather than what the compiled program does.
- In COBOL, a statement, beginning with a compiler-directing verb, that causes the compiler to take a specific action during compilation. The compiler-directing statements are the COPY, ENTER, REPLACE, and USE statements.
- In RPG, an instruction that controls a compilation listing or causes records to be inserted. The four compiler directives are /TITLE, /EJECT, /SPACE, and /COPY.
A printout that is produced by compiling a program or creating a file and that optionally includes, for example, a line-by-line list of the high-level language source, a cross-reference list, diagnostic information; and for programs, the description of the externally described files.
A keyword that can be specified to control certain aspects of compilation. Compiler options can control the nature of the load module generated by the compiler, the types of printed output to be produced, the efficient use of the compiler, and the destination of error messages.
A keyword that can be specified to control certain aspects of compilation. Compiler options can control the nature of the load module generated by the compiler, the types of printed output to be produced, the efficient use of the compiler, the destination of error messages, and other things.
In RPG, a table that is built into the source program and that becomes a permanent part of the compiled program. See also runtime table.
- The value that can be added to the number to equal a given value.
- In Cryptographic Support, a binary value that, in an exclusive-OR operation with a given binary value of the same length, produces a binary value of all ones.
- A table attribute that indicates that the table contains a row for every primary key value of interest. As a result, a complete source table can be used to perform a refresh of a target table.
- A property of a search algorithm such that, when it returns failure in a search, it has proved that no solution exists satisfying the constraints that governed the search, and when it returns success, it is capable of finding all the possible solutions satisfying the constraints of the problem.
complete CCD table
In data replication, a CCD table that initially contains all of the rows from the replication source table or view and any predicates from the source table or view. See also noncomplete CCD table.
complete packet sequence
Either an individual X.25 data packet or a sequence of packets with the more-data bit (M-bit) set to 1 and the delivery-confirmation bit (D-bit) set to 0, followed by a further data packet with the M-bit set to 0 and the D-bit set as required.
- An indicator that reflects the status of a task set at the time of its completion.
- A message the storage system sends as a result of running a command-line interface (CLI) command.
- A return code indicating how a message queue interface (MQI) call has ended.
- In Tivoli Workload Scheduler for z/OS, a system code that indicates how the processing of an operation ended at a workstation. See also error code.
- In data processing or software engineering, pertaining to an application that may have many components, such as a graphic user interface, a client-server architecture, an engine, a database connection, an output device, input facilities, and so forth.
- The maximum set of hardware and software resources that support one or more images of a single operating system.
A step in a business process that provides direction for how the next step should be executed. There are three kinds of complex activities: sequence (serial), choice (conditional), and all (parallel).
A single operation that impacts one or more ontologies and spans multiple repository versions. Examples of a complex change are ontology content pack (OCP) imports and ontology deletions.
In COBOL, a condition in which one or more logical operators (AND, OR or NOT) act on one or more conditions. Complex conditions include negated simple conditions, combined conditions, and negated combined conditions. See also simple condition.
In FORTRAN, an ordered pair of real or integer constants separated by a comma and enclosed in parentheses. The first constant of the ordered pair represents the real part of a complex number; the second represents the imaginary part.
complex data type
A data type that is built from a combination of other data types by using an SQL type constructor and whose components can be accessed through SQL statements. See also collection data type, data type, row data type.
A named structure that contains simple elements within the message. Complex elements can contain other complex elements, and can also contain groups. The content of a complex element is defined by a complex type. See also element, simple element.
- The processing of events that have rules that rely on the data and timing of more than one event.
- A set of tools that processes event transactions and generates event alerts based on configured business rules.
complex instruction set computer (CISC)
A computer that uses the traditional processor architecture to process instructions. See also reduced instruction set computer.
A measurement of how many more computing resources the solution of a problem requires as the problem grows in number of variables. Complexity is expressed in notation known informally as Big O notation or more formally as Omega notation.
A collection of multiple scorecards within one rule flow. The rule flow is used to identify the dependency, the flow and the order in which the score from each of the scorecards will be included in the overall score.
complex text language (CTL)
A language that has the properties of a simple text language but also additional characteristics of bidirectionality, automatic character shaping, or combining sequences. They use typically small character sets. Combining sequences include characters combined to form new characters, and characters combined with tone marks. In languages that are written in a bidirectional manner, the native words are written from right to left (as in Hebrew and Arabic), while numbers and borrowed words are written from left to right. Arabic and similar scripts use cursive writing and require automatic shaping of characters for rendering. See also ideographic language, simple text language.
- A type that contains elements and can include attributes. See also simple type.
- In Enterprise Service Tools, a structure within a message. A complex type contains elements, attributes, and groups organized into a hierarchy.
- In Fortran, a data type that represents values of complex numbers. A value is expressed as an ordered pair of real data items separated by a comma and enclosed in parentheses. The first item represents the real part of the complex number, and the second item represents the imaginary part.
complex word processing
In lexical analysis, the process in which algorithmic processing is used to determine the boundaries of words. In the case of Indo-European languages, the LanguageWare algorithm uses constraints in order to determine optimal boundaries. For Chinese, LanguageWare uses statistical processing - word frequencies and collocation frequencies. For Japanese LanguageWare uses a combination of statistical and grammatical processing.
- The state of an implementation that fully meets each and every requirement of the standards specification. Specifically, each transaction, action, or data element produced by the implementation must be valid as defined by the standard.
- A state of being in accordance with established software and security specifications on target computers, or the process of becoming so.
A service that allows the buyer to customize products for their customers. For example, a compliance service might be configured for an item so that the item is shipped to the buyer with the buyer's brand label.
In i5/OS licensed management, the value that determines the action the product must take when the authorized usage limit is reached or exceeded. The warning compliance type indicates users are never denied access to a product. The operation action compliance type means that new users are denied access to the product once the usage limit is reached, but users that are currently using the product still have access.
- In Eclipse, one or more plug-ins that work together to deliver a discrete set of functions.
- In UML modeling, a model element that represents an autonomous, replaceable part of a system.
- A connection, build, reference dimension, reference structure, template, JobStream, user-defined function, metadata dimension, or metadata collection in a catalog.
- In VisualAge RPG, a functional grouping of classes and related files within a product.
- A named, cataloged collection of stored records, such as the data component or index component of a key-sequenced file or alternate index. A component contains no named subsets.
- A software item that is part of a software product, and might be separately identified, but is not individually licensed.
- A ClearCase object that is used to group a set of related directory and file elements within a Unified Change Management (UCM) project. Typically, the elements that make up a component are developed, integrated, and released together. A project must contain at least one component, and it can contain multiple components. Projects can share components.
- A visual element of a host screen, such as a command line, function key, or selection list. HATS applications transform host components into widgets.
- An entity about which measurements are collected for reporting purposes. Sample components include a specific network storage device; the web address http://www.ibm.com; and a person with whom one has a customer relationship. Each component type in the data model has a set of metrics and attributes that apply to all components of that type.
- A part of a structured type or value, such as an array element or a record field.
- A grouping of related artifacts in a stream or repository workspace. A component can contain any number of folders and files.
- A common component or an assembly. See also assembly, common component.
- A set of modules that performs a major function within a system.
- A reusable object or program that performs a specific function and works with other components and applications.
- A part of a specified source that generates an audit message (such as the Gentran Server for Windows Unattended program).
In the IBM Director Rack Manager task, a function that can make a managed system or device rack-mountable when the inventory collection feature of IBM Director does not recognize the managed system or device. The function associates the system or device with a predefined component.
In the Reusable Asset Specification (RAS), a collaboration in which all the components are specified with type models; some of them may come with their own implementations. To use the framework, plug in components that fulfill the specifications.
- A UML model element that represents an actual entity in a system.
- A running component that can be running in parallel with other instances of the same component.
A re-engineering and transformation of the SWG development model. This transformation is a key part of the IBM On Demand strategy. Its fundamental goals are to make our software business more responsive to customer demands, and to improve development efficiency and effectiveness. Specifically, software componentization is the movement of IBM software development from a monolithic, product-oriented development model to one based on the concept of software offerings composed from the sharing of reusable software components. See also consumability.
A characteristic of software componentization that impacts the various aspects of IBM's software business. The SPX reference architecture takes an inherently evolutionary, iterative, and incremental approach to defining software component characteristics, with each reference architecture release focusing on one or more componentization facets.
- An architecture and an API that allows developers to define reusable segments of code that can be combined to create a program.
- A software development model that provides for consistent packaging of software components; the ability to upgrade part of a system as it is executing; the ability to control, monitor, and deploy software across global networks; and the ability to locate and implement services on a global scale. When developed according to the component model, components have interfaces that are rigorously implemented, are packaged into JAR files, and have dynamic execution environments.
Component Object Model (COM)
A software architecture from DEC and Microsoft, allowing interoperation between ObjectBroker and OLE (Object Linking and Embedding). Microsoft later evolved COM into DCOM.
A utility that allows the import and export of components between catalogs. See also multi-developer support.
In a z/OS environment, a PDSE that contains jobs to define resources to DB2, WebSphere MQ, and the WebSphere Message Broker started task. See also partitioned data set.
A queue holding work items that can be completed by an external entity that interacts with the workflow. See also queue.
An expression about one or more components, which is defined in the Type Designer. A component rule is used for validating data and specifies what must be true for the data that is defined by that component to be valid.
component store archive
A starter store archive for a component of a composite store archive. Component store archives are available for each business model. See also composite store archive.
See composed-text page.
- A class that is related to one or more classes by a composition relationship.
- A Service Component Architecture (SCA) element that contains components, services, references, and wires that connect them.
- A group of related data elements used in EDI transactions.
composite bar chart
In the GDDM function, a bar chart in which multiple vertical axis values for the same horizontal axis value are stacked one on top of another. See also floating bar chart, multiple bar chart.
composite bar graph
In Performance Tools, a bar graph in which multiple vertical axis values for the same horizontal axis value are stacked one on top of another. See also floating bar graph.
composite block index
An index that contains only dimension key columns and is used to maintain the clustering of data during insert and update activity in a multidimensional clustering (MDC) or insert time clustering (ITC) table. See also dimension block index.
composite catalog entry
A collection of catalog entries that breaks down to its separate components when ordered. See also dynamic kit.
composite data element
A data element that contains two or more component data elements or subelements. Composites are defined by the EDI standards that use them (EDIFACT, TRADACOMS, and certain ANSI X12 standards).
composite data type
See row data type.
A "high-level" event, typically formed from the combination of two or more atomic events. However, composite events can be "empty" - that is, they may contain no sub-events. See also atomic event, user-defined event.
In Q Language, a large expression that has been created from a series of smaller expressions. See also arithmetic operator.
composite identity relationship
An identity relationship that relates two business objects through a composite key. The composite key consists of a unique key from a parent business object and a key, which is not unique, from a child business object.
An index constructed on two or more columns of a table. The order imposed by the composite index varies least frequently on the first-named column and most frequently on the last-named column.
- An ordered set of key columns of the same table.
- A key for a file or record format that is composed of more than one key field.
The host's virtual view of the Peer-to-Peer Virtual Tape Server (PtP VTS) subsystem. In general, host communication with a library will occur at the composite level with the virtual volumes and drives being defined to the composite library.
An object that contains other objects. For example a document object that contains not only text, but also graphics, audio, image, and video objects, each of which can be manipulated separately as an individual object.
- A state that consists of either concurrent substates or sequential substates. See also disjoint substate.
- In a business state machine, an aggregate of one or more states that is used to decompose a complex state machine diagram into a simple hierarchy of state machines.
composite store archive
A compressed file that contains the organization structure, predefined user roles, and necessary access control policies to create the appropriate store environment, plus a working starter store or site. Each of the parts that make up the composite store archive are also available as separate store archives. See also component store archive, store archive.
A hierarchy in which the composition of the data is reflected in the structure of the group type in the group window. See also classification hierarchy.
In UML modeling, an aggregation relationship that specifies that the lifetime of the part classifier depends on the lifetime of the whole classifier. See also aggregation relationship.
An activity that has detail that is defined as a flow of other activities. A compound activity is a branch (or trunk) in the tree-structure hierarchy of process activities. Graphically, a compound activity is a process or subprocess.
An item in the source or target document that contains child items, such as EDI Segments and EDI composite data elements, ROD records and ROD structures in record oriented data, and XML elements.
In License Use Management, a type of license that allows a system administrator to generate license passwords for a given number of licenses. Such a license is valuable when an administrator needs a certain number of licenses, but does not yet know what machines or who will use them.
A type of string designed to simplify foreign language support by allowing text to be displayed without hard-coding the language-dependent attributes (character set, text, and direction).
In REXX, a symbol that permits the substitution of variables within its name, when referred to. A compound symbol contains at least one period and at least two other characters. It cannot start with a digit or a period, and if there is only one period in the compound symbol, it cannot be the last character. The compound symbol begins with a stem (that part of the symbol up to and including the first period). The stem is followed by the tail (the parts of the name, delimited by periods, that are constant symbols, simple symbols, or null). Compound symbols allow the construction of arrays, associative tables, lists, and so on.
- To hide objects within a data hierarchy. A plus sign is used in a compressed section to indicate that objects are hidden.
- To reduce the size of a set of data, such as a file, to save space or transmission time. See also compressed format.
A method of digitally encoding and decoding several seconds of voice quality audio per single videodisc frame. This increases the storage capability to several hours of audio per videodisc. Sometimes referred to as still frame audio or sound over still.
A type of extended-format data set. In the Virtual Storage Access Method (VSAM), individual records are put in a compressed-format data set; in the sequential access method (SAM), individual records or blocks are put in a compressed-format data set. See also compress, extended format.
In CoOperative Development Environment/400, a graphical representation of the listing of the program currently being debugged. See also compressed source.
In CoOperative Development Environment/400, a graphical representation of the source of the program currently being debugged. See also compressed listing.
Video resulting from the process of digitally encoding and decoding a video image or segment using a variety of computer techniques to reduce the amount of data required to represent the content accurately.
- In SNA, the replacement of a string of up to 64 characters by an encoded control byte to reduce the length of the data stream sent to the LU-LU session partner. See also string control byte.
- The act of hiding child items of a selected object when the outline view is selected.
- A function that removes repetitive characters, spaces, strings of characters, or binary data from the data being processed and replaces characters with control characters. Compression reduces the amount of storage space that is required for data.
The dictionary that is referred to during the process of compression and decompression. In DB2 for z/OS, this dictionary is created from the data in a table space or table space partition. In DB2 for Linux, UNIX, and Windows, this dictionary is created from data in each table partition, data in each table in a database partition, or XML data stored in the XML storage object of a table. A compression dictionary is specific to the table space, table space partition, table, or XML storage object from which it was created. See also automatic dictionary creation.
- An attribute type that is specific to the pricing administration.
- An attribute value that is derived from the value of other attributes. For example, given a start and a finish date, it is possible to calculate a duration.
A constructor that creates element, attribute, document, text, processing-instruction, or comment nodes in which the content of the node is based on enclosed expressions. See also constructor, direct constructor.
In the Distributed Computing Environment (DCE), the resulting time after a Distributed Time Service (DTS) clock synchronization. Computed time is the value that the clerk or server process computes according to the values it receives from several servers.
- A Blue Gene core node on which user applications run.
- A processing node in a parallel processing environment that handles elements of the job logic. Any processing node that is not a conductor node is a compute node. See also processing node.
- An independent server that contains one or more microprocessors, memory, storage, and network controllers and runs its own operating system and applications.
An instruction that can be recognized by the processing unit of the computer for which it is designed. See also computer language.
- An exchange in which a central node acts as a high-speed switch to establish direct connections between pairs of attached nodes.
- A computer-driven, digital communications controller providing telephone communication between internal stations and external networks.
A language that can be used directly by a computer without intermediate processing. See also computer instruction.
Computer Science Network (CSNET)
A large computer network, mostly in the United States but with international connections. CSNET sites include universities, research labs, and some commercial companies. CSNET has merged with the Because It's Time Network (BITNET) to form the Consortium for Research and Education Network (CREN).
computer-telephony integration (CTI)
The use of a general-purpose computer to issue commands to a telephone switch to transfer calls and provide other services. Typically, CTI is used in call centers.
computing system RPQ
A customer request for a price quotation on alterations or additions to the functional capabilities of a computing system, hardware product, or device. The RPQ can be used in conjunction with programming RPQs to solve unique data processing problems. See also programming request for price quotation.
COM setup data
Data that enables the PSF user to designate unique microfilm printing functions for AFP print jobs. The parameter values, structure, syntax, and semantics are defined by the COM manufacturer, not by IBM-controlled architectures.
- To link together.
- To join two character strings.
The key that is constructed to access a particular segment. A concatenated key consists of the key fields, including that of the root segment and successive children, down to the accessed segment.
- The symbol used to join two character data items. The concatenation operator is often represented as two vertical bars (||).
- In REXX, an operator used to combine two strings into one by adding the second string to the right end of the first string. The concatenation operators for REXX are a double vertical bar (which concatenates without a blank) and the blank (which concatenates with a blank).
- In data transmission, a functional unit that permits a common transmission medium to serve more data sources than there are channels currently available within the transmission medium.
- An FDDI node that has additional parts beyond those required for its own attachment to a FDDI network. These additional parts (type M) are for attaching other FDDI nodes (type S) in a tree topology. Primarily, a concentrator is used to allow more than two single attachment stations (SAS) to communicate. It can also connect multiple SAS to a dual attachment station (DAS) ring.
- Any device that combines incoming messages into a single message (concentration) or extracts individual messages from the data sent in a single transmission sequence (deconcentration).
A text analysis function that identifies significant vocabulary items, such as people, places, or products, in text documents and produces a list of those items. See also theme extraction.
Business transformation operations process (BTOP) phase in which the PDT understands requirements and develops concepts, confirms need and ability to develop a solution, develops initial project proposal including templates, determines funds for next phase.
The most abstract form of specialization of an architecture, favoring coverage over precision, and specifying a finite set of types for components and for relationships in the system.
- In DCE X/Open Object Management, an OM class that permits instances.
- A class that can be directly instantiated. See also abstract class.
- A class defining objects that can be created.
- A class that is not abstract.
In object-oriented programming, a class that is used to create instances of another class. A concrete factory isolates the creation of objects of a particular class into one place so that new functions can be provided without widespread code changes.
The shared use of resources by multiple interactive users or application processes at the same time. See also lost update.
- Pertaining to the shared use of resources by multiple interactive users or application programs at the same time.
- Pertaining to the occurrence of two or more activities within a given interval of time. Concurrent processes can alternately use shared common resources.
Simultaneous access to a shared volume group or a raw disk by two or more nodes. In this configuration, all the nodes defined for concurrent access to a shared volume group are owners of the shared resources associated with the volume group or raw disk.
concurrent cold repair
Repair to hardware that is electrically isolated from the running system. The hardware that is isolated has no resources that are being used by the system when the repair is started.
- A function that increases the accessibility of data by creating a consistent copy of the data concurrent with regular processing.
- A function of the DFSMSdss component that is used to back up any collection of data at a point in time with minimum down time for the database or application that uses the collection of data.
concurrent copy-compatible snapshot (CC-compatible SnapShot)
See virtual concurrent copy.
concurrent image copy (CIC)
A batch utility program that is used to make a copy of OSAM data sets and VSAM entry-sequenced database data sets (DBDSs), whether or not IMS is running and the database is online.
A type of license, administered by the network license server, that can be used by different users from any node that is connected to a network license server. Concurrent licenses enable as many users to use a particular software product concurrently as there are licenses. See also concurrent offline license.
A login that occurs simultaneously with other logins. See also login.
concurrent offline license
A type of license that allows authorized users to reserve a concurrent license for a certain number of days and to use it on a portable computer that is disconnected from the network. See also concurrent license.
concurrent resource group
A resource group that attempts to become activated on all the nodes in the node list with no priority among the owner nodes. If one node fails, the other nodes continue to offer the service. See also nonconcurrent resource group, resource group, resource group policies.
A server that can handle many connections at the same time. It can accept new connection requests while still processing the transactions started by previous requests. See also iterative server.
In SQL replication, a table attribute that indicates that the table contains current data rather than a history of changes to the data. A condensed table includes no more than one row for each primary key value in the table. As a result, a condensed table can be used to supply current information for a refresh.