This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
An object-oriented high-level language that evolved from the C language. C++ takes advantage of the benefits of object-oriented technology such as code modularity, portability, and reuse.
A level of security defined in the Trusted Computer System Evaluation Criteria (TCSEC) published by the United States Government. To meet C2 requirements, a system must perform discretionary access control, authentication and verification, object reuse protection, and auditing of security-relevant events.
A rule induction algorithm that builds either a decision tree or a rule set. The model works by splitting the sample based on the field that provides the maximum information gain at each level. See also rule induction.
A section of cable between components or devices on a network. A segment may consist of a single patch cable, multiple patch cables that are connected to one another, or a combination of building cable and patch cables that are connected to one another.
See certificate authority certificate.
- A buffer that contains frequently accessed instructions and data; it is used to reduce access time.
- To place a duplicate copy of a file on random access media when the server migrates a file to another storage pool in the hierarchy.
- Storage used to improve access times to instructions, data, or both. For example, data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.
- To place, hide, or store frequently used information locally for quick retrieval.
- Memory used to improve access times to instructions, data, or both. Data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.
Products that have their information, such as item attributes, inventory balance, or availability, stored in a local data cache. The consuming application, such as a web store, can access the information from the cache, reducing synchronous queries to the order management system.
A process by which data associated with a file is removed from the cache system. The data is removed either by using a Least Recently Used (LRU) algorithm when configured General Parallel File System (GPFS) hard or soft quota limits are exceeded or by issuing a command. When referenced again in the cache system, the data that is associated with the file is retrieved from the home system.
cache fast write
A storage control capability in which data is written directly to cache without using nonvolatile storage. Cache fast write is useful for temporary data or data that is readily re-created. See also DASD fast write.
A snapshot of a logical volume created by Logical Volume Snapshot Agent. Blocks are saved immediately before they are modified during the image backup and their logical extents are saved in the cache files.
- A processor storage reference that is satisfied by information from a cache.
- An event that satisfies a read operation by retrieving data from cache instead of retrieving it from the intended storage or a lower level of cache. See also cache miss.
- A record that contains relevant information about the user data that is currently in the subsystem cache memory. Examples of this information include the current state of the data and the intended location of the data on one or more disks.
- The cache component that is normally loaded, stored, and interrogated during cache lookup.
- A delay that occurs when the processor references data or instructions that are not already in the data cache or instruction cache.
- An event that satisfies a read operation by retrieving data from the intended storage or a lower level of cache because the requested data is not available in the only level or a higher level of cache. See also cache hit.
A coupling facility structure that stores data that can be available to all members of a Sysplex. A DB2 data sharing group uses cache structures as group buffer pools. See also group buffer pool.
In a federated system, a logical table object that is used to cache data from a data source table. A cache table comprises a nickname that identifies the data source table, one or more materialized query tables, and a schedule for replicating the data in each materialized query table.
The process of storing frequently used results from a request to memory for quick retrieval, until it is time to refresh the information. The DB2 database manager provides many forms of caching, such as directory caching, package caching, file system caching, and LDAP caching.
caching proxy server
A proxy server that stores the documents that it retrieves from other servers in a local cache. The caching proxy server can then respond to subsequent requests for these documents without retrieving them from the other servers. This can improve response time.
See client acceptor daemon.
See call attachment facility.
See I/O cage.
See command attention key.
See customer acceptance laboratory.
See calculation script.
An expression that is not constant, but whose value depends upon other values. To be evaluated, a calculated expression must obtain and compute values from other sources, normally in other fields or rows.
A member of a dimension whose measure values are not stored but are calculated at run time using an expression. See also input member.
- The process used to transform a series of records into a new result. Typically a calculation is mathematical, but may also include sorting, shifting, or adding to a prior result. Calculations enable the model admin to select records from their source data, perform operations on the data, segment results, and begin another calculation based on those results.
- An equation within a database outline, a calculation script, or a report script that is used to determine a value for a particular member or point in a report.
A set of ranges that can be used by a calculation rule. For example, for shipping charges, there can be a set of weight ranges that each correspond to a particular cost. That is, a product that weighs between 0 to 5 kg might cost $10.00 to ship, while a product weighing 5 to 10 kg might cost $15.00 to ship.
- A view in the Notes mail database that can be used to manage time and schedule meetings. Users can add appointments, meetings, reminders, events, and anniversaries to the Calendar view.
- A list of scheduling dates. Calendars are defined in the database and are mostly assigned to run cycles. Calendars can be used either to identify the dates when job streams or jobs can be run (when used with inclusive run cycles), or when they cannot be run (when used with exclusive run cycles). A calendar can also be designated for use as a non-working days calendar in a job stream. See also exclusive run cycle, holidays calendar, iCalendar, inclusive run cycle, non-working days calendar.
Software that provides users with the ability to schedule appointments and view contacts. Calendaring software generally works in accordance with other time management software and can be synchronized with additional devices (such as smartphones). See also synchronize.
A schedule that defines both the days and time that processing occurs. For example, one could use a calendar schedule to make sure that a process runs every Tuesday starting between 19:00 and 19:30 and ending between midnight and 00:30.
- The comparison and adjustment of an instrument to a standard of known accuracy.
- In capacity planning, the process of refining a model so that it represents the system the user is modeling. The predicted and measured values should match as closely as possible, with no more than a 10% difference for resource utilization, and no more than a 20% difference for response times.
- To start a program or procedure, usually by specifying the entry conditions and transferring control to an entry point.
- A single runtime instance of a voice application.
- A physical or logical connection between one or more parties in a telephone call.
- The application server to which the QMF session is currently connected. After the connection is made, this server processes all SQL statements.
- The name of the interface program, the definition of the arguments passed to the interface program, and the definition of the data structures passed to the interface program.
- In query management, the Common Programming Interface (CPI) that includes the definitions of the control blocks and constants used for the interface. See also command interface.
- A set of documented interfaces between the z/OS operating system and higher level applications that want to access functions specified in the Single UNIX Specification and earlier standards. See also system call.
- A program service provided through a programming interface. See also action service.
- Services that are provided by IMS for use by IMS exit routines. These services provide clearly defined interfaces that allow exit routines to request various functions, such as acquiring storage or finding an IMS control block.
A call supervision packet that a called data terminal equipment (DTE) transmits to indicate to the data circuit-terminating equipment (DCE) that it accepts the incoming call. See also call connected packet, call request packet.
call attachment facility (CAF)
A DB2 for z/OS attachment facility for application programs that run in TSO or z/OS batch. The CAF is an alternative to the DSN command processor and provides greater control over the execution environment. See also Resource Recovery Services attachment facility.
- In the AIX operating system, a procedure that is called if and when certain specified conditions are met.
- A way for one thread to notify another application thread that an event has happened.
- A message consumer or an event handler routine.
- Pertaining to a characteristic that tells a remote system whether the local system it tries to access will verify its identity.
A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the web service security run time for propagation in the web service security header.
A method for authentication of a voice user who is requesting a system API. This mechanism places a callback request to VoiceLogistics Pro (VLP) to verify whether the user is logged into VLP.
- A central point at which all inbound calls are handled by a group of individuals on a controlled sequential basis. Call centers are usually a front end to a business such as airline ticketing or mail order.
- A center that handles a large number of calls to either take orders or provide customer service.
call connected packet
In X.25 communications, a call supervision packet transmitted by a DCE to inform the calling DTE of the complete establishment of the call. See also call request packet, call-accepted packet.
call detail record (CDR)
In telephony, a unit of information containing data about a completed call, such as the time the call began, its duration and date, the originating extension, and the number called.
called DLS user
The data link service (DLS) user in connection mode that processes requests for connections from other DLS users. See also Data Link Service.
See dialed number identification service.
- On a switched line, the location to which a connection is established.
- Any person, device, or system that receives a telephone call. See also caller.
A segment that is called from another segment. It can be regarded as an extension of the calling segment, but some actions take place at the call and others at the return. Examples of actions are saving the addresses of the current position and the next order on the segment call stack at the call, and restoring those saved addressed at the return.
- The requester of a service.
- A function that calls another function.
- Any person, device, or system that makes a telephone call. See also called party.
A communication link established between a product and a service provider. The product can use this link to place a call to IBM or to another service provider when it requires service. With access to the machine, service personnel can perform service tasks, such as viewing error and problem logs or initiating trace and dump retrievals.
See network user address.
A part of the external CICS interface (EXCI). The CALL interface consists of six commands that allow you to allocate and open sessions to a CICS system from non-CICS programs running under MVS; issue DPL requests on these sessions from the non-CICS programs; and close and deallocate the sessions on completion of the DPL requests.
- A callable application programming interface (API) for database access, which is an alternative to using embedded SQL.
- An API for database access that provides a standard set of functions to process SQL statements, XQuery expressions, and related services at run time. See also embedded SQL.
A Sametime Unified Telephony feature that allows a user who is on a call to accept a second call and merge it into the first, converting the two separate calls into a multi-person conference.
- An outbound message to request services or data from an enterprise application or web service.
- The action of bringing a computer program, a routine, or a subroutine into effect.
- A kernel parameter that establishes the maximum number of scheduled activities that can be pending simultaneously.
Software that provides basic computer-telephony integration (CTI) enablement and comprehensive CTI functionality. This includes access to, and management of, inbound and outbound telecommunications.
call progress signal
A call control signal transmitted from the data circuit-terminating equipment (DCE) to the calling data terminal equipment (DTE) to indicate the progress of the establishment of a call, the reason why the connection could not be established, or any other network condition.
call request packet
A call supervision packet that a data terminal equipment (DTE) transmits to ask that a connection for a call be established throughout the network. See also call connected packet, call-accepted packet.
call request signal
During the establishment of a connection for a call, a signal that informs the data circuit-terminating equipment (DCE) that a data terminal equipment (DTE) has asked to make a call.
- A list of data elements that is constructed and maintained by the Java virtual machine (JVM) for a program to successfully call and return from a method.
- The ordered list of all programs or procedures currently started for a job. The programs and procedures can be started explicitly with the CALL instruction, or implicitly from some other event.
In the Distributed Computing Environment (DCE), a thread created by a remote procedure call (RPC) server's run time to execute remote procedures. When engaged by an RPC, a call thread temporarily forms part of the RPC thread of the call.
A planned series of operations including advertisements and suggestive selling techniques, that are pursued to achieve a defined set of business objectives. In the WebSphere Commerce Accelerator, campaigns are used to coordinate and aggregate groups of campaign initiatives.
Canadian Standards Association (CSA)
A not-for-profit membership-based association dedicated to standards development for business, industry, government and consumers in Canada and the global marketplace. See also CSA International.
A closedown in which a program is abnormally terminated either because of an unexpected situation or as the result of an operator command. See also orderly closedown, quick closedown.
cancellation cleanup handler
A function that you can specify to perform an action, such as releasing resources, that occurs after the thread returns from the start routine and calls pthread_exit() or after a cancellation request is performed on the thread.
One of two values, which are either enabled or disabled, that describe whether cancellation requests in the current thread are acted on or held in a pending state. If the value is enabled, the cancellation request is acted on immediately and is based on the current cancellation type. If the value is disabled, the cancellation request is held in a pending state until it is enabled.
One of two values (deferred or asynchronous) that describe how cancellation requests in the current thread are acted on when the cancellation state is enabled. If the value is deferred, the cancellation request is held pending. If the value is asynchronous, the cancel request is acted on immediately, thus ending the thread with a status of PTHREAD_CANCELED.
A known service endpoint that implements an interface for a particular request. The set of candidates is then filtered by the dynamic assembler to select the best endpoint out of all the candidates.
A short list of entities that are potential matches of the incoming identity because they share certain attributes. See also attribute.
The minimum score at which a particular attribute value must match between the incoming identity and an existing entity to satisfy the resolution rule. See also resolution rule.
In LANs, the IEEE 802.1 format for the transmission of medium access control (MAC) addresses for token-ring and Ethernet adapters. In canonical format, the least significant (rightmost) bit of each address byte is transmitted first. See also noncanonical address.
A format for storing hierarchical names that displays the hierarchical attribute of each component of the name. For example, the canonical format for the name Reuben D. Smith/Ottawa/Acme/CA is: CN=Reuben D. Smith/OU=Ottawa/O=Acme/C=CA where: CN is the common name, OU is the organizational unit, O is the organization, and C is the region or country code.
See line mode.
See Common Alerting Protocol.
- Specific features or characteristics of a piece of software, such as the database version.
- A group of functions and features that can be hidden or revealed to simplify the user interface. Capabilities can be enabled or disabled by changing preference settings, or they can be controlled through an administration interface.
- A function or feature that is made available by an application, tool, or product.
In OSI, a confirmed data transfer service provided by the session layer to transfer a limited amount of data outside of an activity. Capability data can be used by two peers to exchange information about their capability to start an activity.
A series of messages that pass between two CICS regions to establish if they can communicate using IP interconnectivity (IPIC). The capability exchange determines the security controls that are applied to the connection, the number of sessions to be made available, and resynchronizes any outstanding work if the connection has previously failed.
A category, such as "database" or "hardware" that is used to group characteristics of a piece of software. For example, the "hardware" capability type includes characteristics such the BIOS vendor and BIOS version.
- The actual number of parallel servers and workstation resources available during a specified open interval.
- A measure of how much volume or revenue can be handled by a specific resource.
A rule that governs the amount of items that can be awarded to a supplier. Using a capacity constraint, business can be awarded to a preferred supplier or the volume of business for a supplier can be limited.
A licensing model that licenses features with a price-per-terabyte model. Licensed features are FlashCopy, and Metro Mirror and Global Mirror, and virtualization. See also FlashCopy, Metro Mirror, virtualization.
A function that uses information about the system, such as a description of the system's workload, performance objectives, and configuration, to determine how the data processing needs of the system can best be met. The capacity planner then recommends, through the use of printed reports and graphs, ways to enhance performance, such as hardware upgrades, performance tuning, or system configuration changes.
- The process of scheduling the resources required to perform project work.
- The process of determining the hardware and software configuration that is required to accommodate the anticipated workload on a system.
capacity requirements planning (CRP)
The process of specifying the level of resources (facilities, equipment, and labor force size) that best supports the competitive strategy for production of the enterprise.
Capacity Upgrade on Demand (CUoD)
The capability to permanently activate one or more inactive processors without having to restart the server or interrupt the data flow of the business, through the purchase of a permanent processor activation. This capability adds significant value by enabling a fast and economical way to add capacity for new workloads, enabling the server to adapt to unexpected performance demands. See also activation code, application provisioning, dynamic LPAR, free pool, Hardware Management Console.
An uppercase letter. See also simple letter.
capital lock (caps lock)
The keyboard function that invokes the uppercase of alphabetic characters, but does not change the response of numeric and other keys. This function is convenient for combining uppercase letters with numbers as in the string “M3C 1H7”. Capital Lock is a toggle key.
capitals lock state
A state that, if activated, will result in the generation of the capital form of all graphic characters on the keyboard for which such a form exists. National standards or usage may determine which graphic characters are affected by this state (see ISO/IEC 9995-1).
See capital lock.
- A description associated with an identifier. The caption is often used in preference to the identifier in reports to make them more comprehensible.
- A National Language Support-enabled text string in a policy expression that describes the policy.
- Text associated with, and describing, a table or figure.
- In SQL replication, event publishing, and Q replication, to gather changes from a source database. These changes can come from the DB2 log or journal or from source transactions in a relational database that is not a DB2 database.
- The process by which an acquirer receives payment from the customer's financial institution and remits the payment. A "capture" is the guarantee that the funds are available and that the transfer will take place.
- The process by which some printers can save downloaded fonts as temporary printer-resident fonts.
- To digitize an image into the video memory of the M-Video Capture Adapter.
Capture control server
In SQL replication, a database or subsystem that contains the Capture control tables, which store information about registered replication source tables. The Capture program runs on the Capture control server.
A virtual window into the actual unit control block (UCB). Captured UCB resides in private storage below 16 MB. All the virtual windows on the actual UCB view the same data at the same time. Only actual UCBs above 16 MB are captured. See also actual UCB, unit control block.
In SQL replication, an approximate difference between the time that source data was changed and the time that the Capture program made the data available to the Apply program by committing the data to a CD table. Capture latency is a subset of the end-to-end latency in a replication configuration. See also Apply latency, end-to-end latency, latency, Q Apply latency, Q Capture latency.
In SQL replication, a program that reads database log or journal records to capture changes that are made to DB2 database source tables and store them in staging tables. See also Apply program, Capture trigger, Q Capture program.
A capture specification provides the information that CICS will use to detect an event within an application or in the system. The capture specification can include the capture point, capture data, and predicates for filtering and is defined in the event binding file.
In SQL replication, a mechanism that captures delete, update, or insert operations that are performed on source tables other than DB2 source tables. See also Apply program, Capture program.
A transferrable permit that allows an organization to release one ton of carbon dioxide into the environment. The implementation of carbon credits is an attempt to reduce the amount of greenhouse gases that are being produced.
The amount of greenhouse gas that a person or organization is responsible for producing. A smaller carbon footprint is associated with having less detrimental effect on the environment.
- A record of information attached to an item. An item can have multiple cards.
- An electronic circuit board that is plugged into a slot in a system to give it added capabilities.
- A Wireless Markup Language (WML) document that provides user-interface and navigational settings to display content on mobile devices. See also deck.
- An item of equipment that is inserted in a shelf. A card is a predefined business object.
- In the Map Designer, a data object. There are two types of map cards: input and output.
A one-to-one representation of the hole patterns of a punched card; for example, a card image might be a matrix in which a one represents a punch and a zero represents the absence of a punch.
- The number of elements in a set. See also multiplicity.
- For OLAP data sources, the number of members in a hierarchy. The cardinality property for a hierarchy is used to assign solve orders to expressions.
- For relational data sources, a numerical indication of the relationship between two query subjects, query items, or other model objects.
- The number of rows in a database table or the number of elements in an array. See also associative array.
- In information analysis, a measure of the number of unique values in a column.
card verification value authorization code (CVV auth code)
A separate authorization code that might be returned in addition to a credit card authorization code when a financial institution approves a credit card transaction.
See Continuous Association Rule Mining Algorithm.
carriage control character
A character that is used to specify a write, space, or skip operation. See also control character.
- A keystroke generally indicating the end of a command line.
- The movement of the printing position or display position to the first position on the same line.
- The action that indicates that printing is to be continued at the left margin of the next line. A carriage return is equivalent to the carriage return of a typewriter.
- The backing material for labels. Labels consist of the printable medium, the adhesive, and the carrier.
- A continuous frequency (a pulse train, or an electric or electromagnetic wave) that may be varied by a signal bearing information to be transmitted over a communication system.
- A service provider that provides the telecom services to customers.
- A transportation service provider that provides delivery and shipping services between buyers, sellers, and customers.
One of many holes in the side margins on continuous-forms paper. When placed on the tractor pins, the holes maintain paper alignment and registration, and control the movement of the paper.
A code that identifies a carrier organization in regions outside North America, which do not use a SCAC as an identifier. See also Standard Carrier Alpha Code.
carrier management system
A network management product that a communication common carrier provides to a customer; this product monitors and manages the telecommunication equipment that the communication common carrier provides for the customer's network.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
An arbitration protocol in which multiple stations access the network without explicit coordination, avoiding contention by checking for other signals (sensing the carrier) and deferring if a signal is already present. Should two signals collide, each station detects the collision and transmits again after a random amount of time.
See command and response token.
carton flow rack
Storage rack consisting of multiple lanes of gravity fed carton flow conveyors. The lanes are replenished from the rear. The material flows through the rack and is picked from the front.
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the act of physically removing a tape cartridge, usually under robot control, by placing it in an output station. The software logically removes the cartridge by deleting or updating the tape volume record in the tape configuration database (TCDB). For a manual tape library, cartridge eject is the logical removal of a tape cartridge from the manual tape library by deleting or updating the tape volume record in the TCDB.
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the process of logically adding a tape cartridge to the library by creating or updating the tape volume record in the tape configuration database (TCDB). The cartridge entry process includes the assignment of the cartridge to the scratch or private category in the library.
- See channel associated signaling.
- See China Association for Standards.
- See Common Analysis Structure.
- An operation that propagates the exact same operation to all dependant objects.
- In AIX, to arrange in a series.
- In certain printers, the layout of procedure windows on the operator console. Each new procedure window overlays the previous one, with only the previous window's title bar in view.
- To connect in a series or in a succession of stages so that each stage derives from or acts upon the product of the preceding stage. For instance, network controllers might be cascaded in a succession of levels in order to concentrate many more lines than a single level permits.
A transaction that spans nodes and is coordinated by Resource Recovery Services (RRS). cascaded multisystem transaction. A transaction that spans systems in a sysplex and is coordinated by Resource Recovery Services (RRS).
The process of deleting rows from a child table when the foreign key is deleted from the parent table. When any rows are deleted from the primary key column of a table, cascading deletes, if enabled, delete identical information from any foreign-key column in a related table.
A replication topology in which there are multiple tiers of servers. A peer/master server replicates to a small set of read-only servers which in turn replicate to other servers. Such a topology off-loads replication work from the master servers.
A resource that can be taken over by more than one node. A takeover priority is assigned to each configured cluster resource group on a per-node basis. In the event of a takeover, the node with the highest priority acquires the resource group. If that node is unavailable, the node with the next-highest priority acquires the resource group, and so on.
- The information that is contained within a database that pertains to a particular investigation.
- The basic unit of analysis. In a data set based on a simple survey, a case generally corresponds to a respondent.
- A container that holds a specified quantity of identical items (SKU) as packaged by a vendor. Cases are identified by license plate number and are generally put away into storage, in their original condition until picked.
- A group of related activities that address a specific business situation. The user or predefined conditions, instead of a defined flow, determines the sequence in which activities are performed. See also business process definition, case type.
See factory carton code.
- The word case followed by a constant expression and a colon. When the selector is evaluated to the value of the constant expression, the statements following the case label are processed.
- In Pascal, a value or range of values that comes before a statement in a CASE statement branch. When the selector is evaluated to the value of a CASE label, the statement following the case label is processed.
The definition of the activities that must be completed to address a specific type of business situation. For each activity, the case type specifies the document types that are required to support the activity, the user interface in the activity, and the teams that must complete the activity. Case types make up a case. See also case.
case weight (CW)
In cultural sorting, the combined weight value of case, subscripting, superscripting, fractions, and other factors. For example, the lowercase letter a precedes the uppercase letter A, and middle Arabic shapes precede final Arabic shapes. See also alphanumeric weight, diacritical weight, indifferent weight, level 3, mark weight, special weight.
A service that provides customers with the ability to receive cash in addition to the goods that they purchased in a store using an alternate payment method. The total amount of the transaction, which includes the cost of the purchased goods and the amount of the cash received, is debited from the customer's account. For example, a customer might charge $37 to their credit card for a $17 item in order to get that item and $20 back from the store.
See computer assisted self-interviewing.
A certificate that is signed using a key maintained by a certificate authority. Before issuing a certificate, the certificate authority evaluates a certificate requestor to determine that the requestor is the certificate holder referenced in the certificate.
See common analysis structure processor.
- A software component which supports a particular payment protocol.
- In cut-sheet printers, a removable container for a supply of paper.
- In programming languages, an expression that converts the value of its operand to a specified type.
- A database object and an operator for converting data from one data type to another. Built-in data types have built-in casts to compatible data types within database server. See also explicit cast, implicit cast, user-defined cast.
A function that is used to convert instances of a source data type into instances of a different target data type. In general, a cast function has the name of the target data type and has one single argument whose type is the source data type. Its return type is the target data type.
See Customer Premise Equipment Alerting Signal tone.
- A container that, depending on the container type, holds processes, data, resources, organizations, or reports in the project tree.
- A directory of files and libraries, with reference to their locations.
- To specify the record class and file plan location when declaring a record.
- A data set that contains information about other data sets.
- The highest level of the category hierarchy. All of the groupings that exist below the catalog are referred to as categories.
- A container that stores items. An item can belong to only one catalog. Each catalog must be associated with at least one hierarchy, the primary hierarchy, and can be associated with one or more secondary hierarchies. See also item.
- A container for one or more offerings that a user can request.
- A repository for storing specifications for builds, reference structures, connections, and other components.
- A collection of apps.
- To enter information about a data set or a library into a catalog.
- A selection of wireless devices and plans that are configured in the application and made available for purchase.
- A collection of tables and views that contains descriptions of objects such as tables, views, and indexes.
A catalog entry, either a user catalog entry or a catalog connector entry, in the master catalog that points to a user catalog's volume (that is, it contains the volume serial number of the direct access volume that contains the user catalog).
An object in an online catalog. An entry has a name, description, list price, and other details. The entry can be as simple as a SKU; it may also be a product that is automatically broken down into its component items such as a bundle or package. See also list price.
A filter that controls product entitlement by dividing catalogs into subsets as defined by the business owner. Catalog filters can also be used as one of the price rules conditions when determining the prices for the set of catalog entries that a set of customers are entitled to.
See catalog partition.
- In a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server. The catalog partition for a database is automatically created on the database partition server where the CREATE DATABASE command is run.
- In a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server.
catalog recovery area (CRA)
An entry-sequenced data set (ESDS) that exists on each volume owned by a recoverable catalog, including the volume on which the catalog resides. The CRA contains copies of the catalog's records and can be used to recover a damaged catalog.
A table that is automatically created in the DB2 database catalog when a database is created. Catalog tables contain information about a database and its objects. See also catalog view.
- In DB2 for Linux, UNIX, and Windows, a SYSCAT or SYSSTAT view on the catalog table.
- One of a set of views automatically created when a database is created. Catalog views contain information about the database and the objects in that database. Examples of information about the database are definitions of database objects and information about the authority that users have on these objects. See also catalog table.
A block associated with a try block that receives control when an exception matching its argument is thrown. See also try block.
A server that service personnel use to collect and retain status data that other machines, such as the TotalStorage Enterprise Storage Server (ESS), send to it. See also catcher telephone number.
catcher telephone number
The telephone number that connects the ESS to the support-catcher server and enables the ESS to receive a trace or dump package. See also catcher, Remote Technical Assistance and Information Network.
catching message intermediate event
An intermediate event that is triggered when a specific message is received. See also intermediate event.
A local mount that z/OS UNIX automatically issues to every other system's physical file system that is running sysplex-aware for that mode (read-write or read-only) when a file system mount is successful on a system in a shared file system environment.
In an RSR environment, the process by which tracked log data is used to make all recoverable resources (for example, shadow databases) current with those resources on the active IMS.
In high availability disaster recovery, a state in which the standby database might not have applied all logged operations that occurred on the primary database. In this state, the standby database retrieves and applies previously generated log data to synchronize with the primary database. There are two types of catchup states: local and remote.
A variable that has a limited number of distinct values or categories, such as a variable that is based on a question that has a predefined set of answers. Categorical variables can be single response or multiple response.
- One possible answer in a set of answers that are defined in the category list of a categorical or grid question.
- A set of catalog items in a number of different hierarchical and searchable groupings.
- The recommended security specifications needed for both the CICS transaction definitions and the corresponding RACF profiles.
- A classification of elements for documentation or analyses.
- A group within a system of classification whose contents share similar properties. See also category page.
- A word or phrase that classifies and organizes terms in the business glossary. A category can contain other categories, and it can also contain terms. In addition, a category can reference terms that it does not contain. See also business glossary.
- A type class that is used to organize types in a type tree in the Type Designer. Categories organize types that have common properties.
- A closed-ended response to a question or item in a shared list.
- A container that groups a set of related records within a file plan.
- A logical subset of volumes in a tape library. A category can be assigned by the library manager (for example, the insert category) or by the software (such as, the private or scratch categories).
- An optional grouping of messages that are related in some way. For example, messages that relate to a particular application might be included in a single category. See also message.
- A set of items that are grouped according to a specific description or classification. Categories can be different levels of information within a dimension. See also member.
- A container used in a structure diagram to group elements based on a shared attribute or quality.
- A word, phrase, or number used to group documents in a view.
- A classification of an item. Hierarchies are made up of categories and items. Items in a catalog can be associated to one or more categories from the specifications of the catalog. Items can also be unassigned, which is their default state, which means they are not in any category yet. Every hierarchy has exactly one root category. Every category can have any number of additional categories within it, called sub-categories. See also container, hierarchy.
- A property that is set on an element of the business object model (BOM) and can be applied to business classes and filtered in business rules. This property allows the user to specify whether a business class and its members are visible in a rule.
category 1 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are never associated with a terminal: that is, they are for CICS internal use only and should not be invoked from a user terminal. For this reason, CICS does not perform any security checks when it initiates transactions in this category for its own use.
category 2 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either initiated by the terminal user or are associated with a terminal. You should restrict authorization to initiate these transactions to user IDs belonging to specific RACF groups.
category 3 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either invoked by the terminal user or associated with a terminal. All CICS users, whether they are signed on or not, require access to transactions in this category. For this reason, they are exempt from any security checks and CICS permits any terminal user to initiate these transactions. Examples of category 3 transactions are CESN and CESF, to sign on and off, respectively.
An attribute instance on a category. The attribute is defined in the specification of the owning hierarchy or by a secondary specification associated to that category. See also attribute instance.
A value that uniquely identifies every category within a dimension. See also member unique name.
category data set
A data set in which the user can specify whether x-values should be stored in memory or computed according to the indices of data points. The x-values correspond to a category number.
An additional field that is created by a buyer user to gather more information about categories and items. A category property is specific to the category for which it is created and applies only to items of that category.
A list of predefined answers that are in a categorical or grid question. The respondent selects the answers to the question from this list. For example, a list of brand names is a category list.
A defined role in WebSphere Commerce that manages the category hierarchy by creating, modifying, and deleting categories. The category hierarchy organizes products or services offered by the store. The category manager also manages products, expected inventory records, vendor information, inventory, and return reasons.
A web page in an online store that displays product categories. Category pages connect customers to child category pages or to products that belong to the selected category. See also category, child category.
The answer portion of categorical, grid, and numeric grid Looks. The category replication controls which category rows in a Look are repeated when the Look is applied to a question.
A subset of the categories in a dimension, either from a single level or from different levels in the same dimension. See also set.
category-specific item attribute
An attribute instance that applies to an item because of the presence of that item in a given category. A secondary specification with additional attributes is applied to that category, and all items in that category gain those extra fields. See also attribute instance.
See cipher block chaining.
See component-based development.
See control blocks in common.
See Class Broker for Java.
See Custom-built Product Delivery Option.
See composite business service.
See computerized branch exchange.
See C/370 common anchor area.
See concurrent copy-compatible snapshot.
See client channel definition table.
See consistent-change-data table.
See common client interface.
See custom card identification number.
See common communication layer.
See Clinical Context Object Workgroup.
See Configuration Control Program.
See channel command retry.
- See common channel signaling.
- See Common Communications Support.
- See coded character set.
- See console communication service.
See coded character set identifier.
See coded character set identifier 65534.
See coded character set identifier 65535.
See closed-circuit television.
See central control unit.
See channel command word.
See compact disc.
See channel definition file.
See connector development kit.
See Channel Data Link Control protocol.
See Channel Data Link Control protocol.
See Common Data Link Interface.
See Case Data Model.
See code division multiple access.
See Commercial Data Masking Facility.
See cross-domain network manager session.
See cellular digital packet data.
See call detail record.
See compact disc recordable.
See CD-ROM file system.
See cross-domain resource manager.
See compact-disc read-only memory.
See cross-domain resource.
- See central directory server.
- See Cell Directory Service.
- See couple data set.
- See control data set.
See CICS dynamic storage area.
See case data source component.
See CDS control program.
See connect data set to line.
See class descriptor table.
See change-data table.
See conditional end bracket.
See country extended code page.
A dump of the run-time environment for Language Environment and the member language libraries. Sections of the dump are selectively included, depending on options specified on the dump invocation. This is not a dump of the full address space, but a dump of storage and control blocks that Language Environment and its members control.
See Common Event Infrastructure.
See Command Execution Language.
- In mobile computing, an area of radio coverage that is transmitted from a base station. See also base station, radio.
- In a multidimensional clustering table, a unique combination of dimension values. Physically, a cell is made up of blocks of pages whose records all share the same values for each dimension column.
- A group of managed processes that are federated to the same deployment manager and can include high-availability core groups.
- In a WebSphere Application Server distributed network, an arbitrary, logical grouping of one or more nodes that are managed together.
- One or more processes that each host runtime components. Each has one or more named core groups.
- The rectangular juncture of a horizontal row and a vertical column. Examples include the cells of an electronic spreadsheet and the cells utilized by an XmRowColumn widget in an AIXwindows graphic interface.
- A group of WebSphere Application Server nodes in a single administrative domain that is controlled by a deployment manager application.
- In asynchronous transfer mode (ATM), a medium access control (MAC) protocol data unit (PDU) of fixed size.
- A logical grouping of users, computers, data, and other resources that share either a common purpose or a common level of trust.
- A single cartridge location within an Automated Tape Library Dataserver (ATLDS). See also rack number, slot.
Cell B.E. processor
See Cell Broadband Engine processor.
Cell Broadband Engine processor (Cell B.E. processor)
A single-chip multiprocessor consisting of one or more PowerPC Processor Elements (PPEs) and one or more (typically eight) Synergistic Processor Elements (SPEs). It is used for distributed processing and media-rich applications. See also PowerPC Processor Element, Synergistic Processor Element.
Cell Directory Service (CDS)
A Distributed Computing Environment (DCE) component that manages a database of information about the resources within a cell. See also Global Directory Service.
A portable telephone that operates on a cellular radio network instead of a traditional wired network over a fiber optic network or the Internet. See also mobile phone.
See local name.
See base station.
cellular digital packet data (CDPD)
A standard for transmitting data over a cellular network that places the data in digital electronic envelopes and sends it at high speed through underused radio channels or during pauses in cellular phone conversations. See also packet switching.
central control unit (CCU)
The communication controller hardware unit that contains the circuits and data flow paths needed to execute instructions and to control controller storage and the attached adapters.
central data warehouse
The component of Tivoli Enterprise Data Warehouse that contains the cleansed historical data. Data in the central data warehouse is derived from operational data, although operational data is not stored directly in the central data warehouse.
central data warehouse ETL
In Tivoli Enterprise Data Warehouse, the extract, transform, and load (ETL) process that reads the data from the operational data stores of the application that collects it (for example, a log file, a Tivoli Inventory repository, or a Tivoli Enterprise Console database), verifies the data, makes the data conform to the Tivoli Enterprise Data Warehouse schema, and places the data into the central data warehouse. See also data mart ETL.
central directory server (CDS)
A network node that provides a repository for information on network resource locations. It also reduces the number of network searches by providing a focal point for queries and broadcast searches, and by storing the results of network searches to avoid later broadcasts for the same information.
central electronic complex
See central processor complex.
Central Europe, Middle East, and Africa (CEMA)
For organizational, legal, or administrative purposes, the region comprising Bulgaria, Croatia, Czech Republic, Egypt, Hungary, Pakistan, Poland, Romania, Russia, Serbia and Montenegro, Slovakia, Slovenia, and IBM Middle East. See also Northeast Europe.
Central File Management (CFM)
A central location that receives files for translation from development and, using Translation Workbench (TWB), creates project folders, performs English-to-English word count, and helps identify the appropriate TM translation memories.
The relative importance of one entity compared to other entities in social network analysis, as determined by its relationships. See also authority, betweenness, closeness, degree, eigenvector, hub, social network analysis.
A type of control in which in which all the primary station functions of the data link are centralized in one data station. See also independent control.
centralized directory service
In OSI, a method of organizing directory services so that one node provides directory service for other nodes. OSI Communications Subsystem supports only centralized directory service.
central office (CO)
A telephone switching system that connects customer-premise business and subscriber lines to other customer lines or trunks, both locally or remotely. A central office is located on the edge of the telephone service provider's network, rather than on a customer's premises.
central processing unit (CPU)
A server's database that logs requests for licenses, upgrades for licenses, and journals all license activity in a tamper-proof auditable file. The central registry is a component of the License Use Management network topology.
A function that permits an administrator to schedule client operations and administrative commands. The operations can be scheduled to occur periodically or on a specific date. See also administrative command schedule, client schedule.
In a network of systems, the system licensed to receive program temporary fixes (PTFs) and distribution media from IBM. This system is also used to provide problem handling support to other systems in a network. In a distributed data processing network, the central site is usually defined as the focal point in a communications network for alerts, application design, and remote system management tasks such as problem management.
central site control facility (CSCF)
In Tivoli NetView for OS/390, NetView for VM, and NetView for VSE, a function that allows a network operator to run the test facilities of the IBM 3172 Nways Interconnect Controller and the IBM 3174 Establishment Controller remotely from the NetView console.
Storage that is an integral part of the processor unit. Central storage includes both main storage and the hardware system area. UNIX-experienced users refer to central storage as memory.
See complex event processing.
- See Commission of European Post and Telegraph.
- See Conference Europeenne des Administrations des Postes et Telecommunications.
See CERT Coordination Center.
CERT Coordination Center (CERT/CC)
A major reporting center for Internet security problems. Staff members provide technical advice and coordinate responses to security compromises, identify trends in intruder activity, work with other security experts to identify solutions to security problems, and disseminate information to the broad community. The CERT/CC also analyzes product vulnerabilities, publishes technical documents, and presents training courses.
In computer security, a digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. A certificate is issued by a certificate authority and is digitally signed by that authority. See also certificate authority, certificate signing request, SSL server authentication.
- A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also certificate, Globus certificate service, Secure Sockets Layer, SSL server authentication.
- A component that issues certificates to each computer on which components are installed.
- In computer security, a digital document that identifies an organization that issues certificates. See also digital certificate.
- A digital certificate that is issued by a certificate authority. The CA verifies trusted certificates for trusted roots.
certificate name filter
A general resource profile that maps multiple user IDs to a digital certificate in order to simplify administration of certificates, conserve storage space in the RACF database, maintain accountability, or maintain access control granularity.
certificate revocation list (CRL)
A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.
certificate signing request (CSR)
An electronic message that an organization sends to a certificate authority (CA) to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key. See also certificate, keystore.
- The Windows name for a key repository.
- A collection of certificates.
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.
See connection event sequence.
CF cache structure
See coupling facility cache structure.
See combined function IOP.
See command function key.
CF lock structure
See coupling facility lock structure.
See confirmed message.
See coupling facility resource management policy.
See continuous-forms stacker.
See coded graphic character set global identifier.
See Common Gateway Interface.
See CGI script.
A computer program that runs on a web server and uses the Common Gateway Interface (CGI) to perform tasks that are not usually done by a web server (for example, database access and form processing).
See Computer Graphics Metafile.
See character generator utility.
- In DFU, a way to change from one display format to another after the user signals that the first display format was completed.
- A set of enclosures that are attached to provide redundant access to the drives inside the enclosures. Each control enclosure can have one or more chains.
- In RPG, an operation code that reads input records identified by specified relative record numbers or keys.
- The name of a channel framework connection that contains an endpoint definition.
- A group of logically linked records that are transferred over a communications line.
- A group of request units delimited by begin-chain and end-chain. Responses are always single-unit chains.
In CICS intercommunication, a grouping of one or more request units to satisfy a single request. Instead of an input request being satisfied by one RU at a time until the chain is complete, the whole chain is assembled and sent to the CICS application satisfying just one request. This ensures that the integrity of the whole chain is known before it is presented to the application program.
An order that must finish its fulfillment process before its parent order can be considered fulfilled. An order is chained when a parent order must communicate some portion of the order fulfillment execution to a third party.
- In the Distributed Computing Environment (DCE), a mode of interaction optionally used by a directory system agent (DSA) that cannot perform an operation by itself. The DSA chains by invoking the operation in another DSA and then relaying the outcome to the original requester.
- A method of storing records in which each record belongs to a list or group of records and has a linking field for tracing the chain.
A client-side component that issues a sequence of challenges on the server side and responds on the client side. See also authenticator.
Challenge Handshake Authentication Protocol (CHAP)
An authentication protocol that protects against eavesdropping by encrypting the user name and password. See also Password Authentication Protocol.
An authentication method that requires users to respond to a prompt by providing information to verify their identity when they log in to the system. For example, when users forget their password, they are prompted (challenged) with a question to which they must provide an answer (response) in order to either receive a new password or receive a hint for specifying the correct password.
- The process of creating a compacted version of one or more IMS log data sets by eliminating records not related to recovery, and by merging multiple changes to a single segment into a single change.
- The process of merging log data sets and reducing the information they contain to the minimum required to perform recovery on a particular database or group of databases.
change aggregate table
In SQL replication, a type of replication target table that contains data aggregations that are based on the contents of a CD table. See also base aggregate table.
change and configuration management (CCM)
A systematic approach to establish and maintain the consistent performance of a system or product throughout its lifecycle, and to effectively manage changes in that product or system.
An object authority that allows a user to perform all operations on the object except those limited to the owner or controlled by object existence authority, object management authority, object alter authority, and object reference authority. The user can add, change, and delete entries in an object, or read the contents of an entry in the object. Change authority combines object operational authority and all the data authorities.
- A character used in the left margin to indicate that a document line is changed.
- An indicator that displays when an object was last changed.
The process of capturing changes that are made to a replication source table and applying them to a replication target table. See also full refresh.
change control client
A workstation that (a) receives software and data files from its change control server and (b) installs and removes software and data files as instructed by its change control server. See also change control single node.
change control server
A system that controls and tracks the distribution of software and data files to other workstations. See also change control single node.
change control single node
A workstation that controls, tracks, installs, and removes software and data files for itself. A CC single node can also prepare software for distribution. See also change control client, change control server.
change-data table (CD table)
In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. See also synchpoint.
In SNA, a data flow control protocol in which the sending logical unit (LU) stops sending normal-flow requests, signals this fact to the receiving LU using the change-direction indicator (in the request header of the last request of the last chain), and prepares to receive requests.
changed subfile record
A subfile record into which the work station user has entered data, or a subfile record for which a write or change operation was issued with the DDS keyword SFLNXTCHG or DSPATR(MDT) in effect.
- A section that displays modifications in the data records, such as supplier records and organization records.
- The list of audit entries recorded for a resource.
change implementation schedule
A view in change management that shows the start and end dates for changes to selected configuration items in the environment, the RFC that defines the change, and other details.
- The area of the checkpoint data set that contains the specific control blocks changed by the last member of the multi-access spool configuration to own the checkpoint data set.
- For directory shadowing, a record of changes made to directory entries, departments, and locations for the purpose of sending only the updates and not the entire directory to collecting systems.
A relationship between two artifacts. A change to either artifact affects the relationship. See also suspect relationship state.
- The process of planning (for example, scheduling) and controlling (for example, distributing, installing, and tracking) software changes over a network.
- The process of planning for and executing changes to configuration items in the information technology environment. The primary objective of change management is to enable beneficial changes to be made with minimum disruption to services.
- The process of controlling and tracking modifications to artifacts.
The deployment management component that decomposes aggregated installable unit (IUs) and coordinates the change management operations across the hosting environments. See also aggregated installable unit, hosting environment.
- A record of the changes made during the course of a contract or project execution.
- An update to a purchase order that is already approved or printed and that changes information such as quantity or vendor.
A recorded instance that is created with each write action to the repository. The change record contains metadata about all repository changes (such as who was responsible for a commit action) and can be used as a version history view of the repository.
- A request from a stakeholder to change an artifact or process. See also defect, enhancement request.
- A request to change some aspect of the project, project plan, activity definition, or document.
- In System Manager, an instance of a change request description that has been submitted to run or is running. A change request is uniquely identified by the change request name and a sequence number.
- A request created in the Telecom Portal application to replace a device, or change a rate plan.
- A small, independent unit of work into which each change project is divided.
change request description (CRQD)
An i5/OS object that describes a change to be made to the computing environment. The object, which is maintained only at the central site system or systems, consists of a list of activities that describe the steps needed to make the change.
- A group of related changes to files, folders, or symbolic links in a workspace or stream.
- A cohesive unit consisting of a number of related changes that need to be made together.
- A list of versions of elements that are associated with a Unified Change Management (UCM) activity.
- A specialized web application within a portal to which a user can subscribe.
- A communication path through a chain to an endpoint.
- In mainframe computing, the part of a channel subsystem that manages a single I/O interface between a channel subsystem and a set of control units.
- The means of distribution of a company's products. Examples are e-commerce and physical stores.
- A link along which signals can be sent, such as the channel that handles the transfer of data between processor storage and local peripheral equipment. See also trunk.
- A collection of test environment properties that describes a delivery platform in your test effort.
- A WebSphere MQ object that defines a communication link between two queue managers (message channel) or between a client and a queue manager (MQI channel). See also message channel, MQI channel, queue manager.
A business function that can be issued on a channel. Channel actions are role specific and an authorization policy makes it possible to control which role can perform which action in a channel.
channel associated signaling (CAS)
A method of communicating telephony supervisory or line signaling (on-hook and off-hook) and address signaling on T1 and E1 digital links. See also common channel signaling.
- Pertaining to devices attached to a controlling unit by cables, rather than by telecommunication lines. See also link-attached.
- Pertaining to the attachment of devices directly by input/output channels to a host processor.
channel-attachment major node
A major node that may include minor nodes that are resources (host processors, NCPs, line groups, lines, SNA physical units and logical units, cluster controllers, and terminals) attached through a communication adapter.
A mechanism that ensures that the channel connection is established to the correct machine. In a channel callback, a sender channel calls back the original requester channel using the sender's definition.
channel control function (CCF)
A program to move messages from a transmission queue to a communication link, and from a communication link to a local queue, together with an operator panel interface to allow the setup and control of channels.
An event reporting conditions detected during channel operations, such as when a channel instance is started or stopped. Channel events are generated on the queue managers at both ends of the channel.
A System/390 I/O channel-to-control-unit interface that has an SNA network address. A channel link can be a subarea link, a peripheral link, a LEN link, or an APPN link. See also subarea link.
A defined role in WebSphere Commerce that manages the channel hub, as well as the distributors and resellers associated with that hub, including creating and importing distributor and reseller contracts.
- The identifying number assigned to a licensed channel on the T1 or E1 trunk that connects DirectTalk to the switch, channel bank, or channel service unit.
- A number that identifies the path by which data is transferred between a particular input or output device and the processor of the computer.
- In mainframe computing, the interconnection between a channel and its associated control units.
- A single interface attaching one or more control units.
- In WebSphere Voice Server, the system process that manages call flow.
- The AIX process that executes the logic of the state table; each active caller session has one active channel process.
- A device used to connect a digital phone line to a multiplexer, a channel bank, or directly to another device producing a digital signal. A CSU performs certain line-conditioning and equalization functions, and responds to loopback commands sent from the central office (CO). See also data service unit.
- An American Telephone and Telegraph (AT&T) unit that is part of the AT&T nonswitched digital data system.
channel subsystem (CSS)
A collection of subchannels that directs the flow of information between I/O devices and main storage, relieves the processor of communication tasks, and performs path management functions.
In mainframe computing, the logical functions that a system requires to perform the function of a channel subsystem. With ESCON multiple image facility (EMIF), one channel-subsystem image exists in the channel subsystem for each logical partition (LPAR). Each image appears to be an independent channel-subsystem program, but all images share a common set of hardware facilities.
An iterative relaxation method that uses a combination of the Gauss-Seidel and Jacobi-Seidel methods. The array of discrete values is divided into subregions that can be operated on in parallel. The subregion boundaries are calculated using the Jacobi-Seidel method, while the subregion interiors are calculated using the Gauss-Seidel method. See also Gauss-Seidel.
See Clearing House Automated Payment System.
The Euro-denominated RTGS payment system operated by the CHAPS Clearing Company Ltd. and comprising a network, central message handling software, elements of members' interfaces to the network, and the Bank of England's central interface.
- In bar codes, a single group of bars and spaces that represent an individual number, letter, punctuation mark, or other symbol.
- A sequence of one or more bytes representing a single graphic symbol or control code.
- Any symbol that can be entered on a keyboard, printed, or displayed. For example, letters, numbers, and punctuation marks are all characters.
- In a computer system, a member of a set of elements that is used for the representation, organization, or control of data. See also glyph.
A code that defines a single property of a character or characters; for example, extended color, character set, or extended highlighting. A character can have more than one defined character attribute.
- The area that completely contains the character pattern.
- The maximum area in which a symbol and all associated elements, such as a cursor, an underline, or space surrounding the symbol to separate it from other symbols, can be printed or displayed.
- The imaginary parallelogram whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a graphics display device.
- An addressable location on a display surface or printing medium. The character cell defines the placement of characters with respect to preceding and following characters.
- The physical width and height in pels of a font.
- The maximum physical boundary of a single character. For example on the IBM 3800 Printing Subsystem, a cell is made up of 24 rows with total height of 4.23 mm and 18 bit positions having a total width of 2.54 mm.
- See character box.
- As defined in ISO/IEC 10646, the place within a row at which an individual graphic character may be allocated.
- In the GDDM function, the imaginary box whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a work station.
A named set of characters sharing an attribute associated with the name of the class. The classes and the characters that they contain are dependent on the value of the LC_CTYPE category in the current locale.
- In System i Access, an ASCII or EBCDIC value assigned to the symbols or functions that are used by a computer.
- An element of a code page or a cell in a code table to which a character can be assigned. The element is associated with a binary value.
- The actual character value (a symbol, quantity, or constant) in a source program that is itself data, instead of a reference to a field that contains the data. See also numeric constant.
- In the C language, a character or an escape sequence enclosed in quotation marks.
- Data that has an associated coding representation that defines how to interpret each specific pattern of bits that are grouped into one or more bytes.
- Data in the form of letters and special characters, such as punctuation marks.
Character Data Representation Architecture (CDRA)
An IBM architecture that defines a set of identifiers, resources, services, and conventions to achieve consistent representation, processing, and interchange of graphic character data in heterogeneous environments.
character data representation identifier
A tag that is used to achieve data integrity. The Character Data Representation Architecture specifies that you should tag all character data as it flows through the system. You can tag using a short-form or a long-form identifier. A coded character set identifier (CCSID) is an example of a character data representation identifier.
In Graphic Object Content Architecture, an attribute controlling the direction in which a character string grows relative to the inline direction. Values are left-to-right, right-to-left, top-to-bottom, and bottom-to-top. See also escapement direction.
A display that uses a character generator to display predefined character boxes of images (characters) on the screen. This kind of display cannot address the screen any less than one character box at a time.
- A character set consisting of a code that pairs a sequence of characters from a given set with something else, such as a sequence of natural numbers, octets or electrical pulses. Encoding facilitates the storage and transmission of text through telecommunication networks.
- The mapping from a character (a letter of the alphabet) to a numeric value in a character code set. For example, the ASCII character code set encodes the letter "A" as 65, while the EBCIDIC character set encodes this letter as 43. The character code set contains encodings for all characters in one or more language alphabets.
character entity reference
A character string of the form � or &#dddd, where dddd is the hexadecimal or decimal equivalent of the Unicode code point of a character. For example, > and > are both character entity references to the > (greater-than) sign.
A character constant, a simple character variable, an element of a character array, a character-valued function reference, a substring reference, or a sequence of the above separated by the concatenation operator and parentheses.
An area that is reserved for information that can contain any of the characters in the character set. See also numeric field.
- In word processing, the way to generate visual characters and symbols for coded data.
- In computer graphics, a function that converts the coded representation of a graphic character into the shape of the character for display or print.
- An image that is composed of symbols printed in a monospace font. Some symbols are standalone; others are intended for assembling larger figures.
- The visual representation of a character, defined by toned or untoned picture elements. See also graphic character, graphic character.
In Business Graphics Utility, an invisible network of uniformly spaced horizontal and vertical lines covering the chart area. Used by the Business Graphics Utility to determine the physical dimensions of the chart and the placement of the data on it.
See character identifier.
- The standard identifier for a character, regardless of its style. For example, all uppercase A's have the same character identifier.
- On a system, a 4-byte binary value. The value is a concatenation of the graphic character set global identifier followed by the code page global identifier. For example, the character identifier for German (feature 2929) is 00697 00273.
The distance from the character reference point to the character escapement point. Character increment is the sum of the A-space, B-space, and C-space. Usually the distance between the current print position and the next print position.
A user-defined trait or property that is associated with an identity that is not commonly expressed as a name, number, address, or email. This attribute allows users to extend the product by defining customizable entity attributes that are meaningful to their data sources. See also attribute, identity.
- A character string that contains single-byte characters with an associated code page.
- A data type whose value is a sequence of characters (single byte, multibyte, or both) that can range in size from 0 bytes to 2 gigabytes less 1 byte. In general, the CLOB data type is used whenever a character string might exceed the limits of the VARCHAR data type. See also large object.
Measurement information that defines an individual character value such as height, width, or space. Character metrics may be expressed in specific fixed units, such as pels, or in relative units that are independent of both the resolution and size of the font. Often included as part of the general term font metrics. See also character set metric.
See character identifier.
See character raster pattern.
In architecture, information that the printer needs to separate font raster patterns. Each character pattern descriptor is 8 bytes long and specifies both the character box size and an offset value.
In architecture, the acceptable amount of variation in the appearance of a character on a physical medium from a specified ideal appearance, including no acceptable variation. Examples of appearance characteristics that can vary for a character are shape and position.
A device that prints a single character at a time. See also line printer.
Any detail about how a character is printed relative to the other characters around it. Character properties are box size, horizontal and vertical character cell size, character ID, center line, baseline, left space, right space, above space, and below space.
- The point along the character baseline within the character box that coincides with the current print position.
- The point that corresponds to the origin of the character coordinate system. The character reference point coincides with the presentation position when the character is formed in the presentation process. See also current print position.
The alignment of a character with respect to its character baseline, measured in degrees in a clockwise direction. See also orientation.
- A list of characters (letters, numbers, and symbols such as #, $, and &) that are recognized by computer hardware and software.
- A defined set of characters with no coded representation assumed that can be recognized by a configured hardware or software system. A character set can be defined by alphabet, language, script, or any combination of these items.
- A set of binary codes that represent specific text characters.
character set identifier 65534
The character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 ( FFFE ) is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs tagged for each individual field it contains. If the file is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.
character set metric
One of the measurements used to describe a characteristic of the all the characters in that font. Examples are height, width, and character increment for each character of the font. See also character metric, font metric, relative metrics.
See character increment.
character special file
An interface file that provides access to an input or output device, which uses character I/0 instead of block I/0. See also block special file.
- A contiguous sequence of characters that are treated as a unit.
- A sequence of bytes that represents bit data, single-byte characters, or a mixture of single-byte and multibyte characters.
- A contiguous sequence of characters terminated by and including the first null byte.
In CCP, the maximum number of times that the temporary text delay character can (a) be sent to a terminal before the operation stops; or (b) be sent between the end of a receive operation and the beginning of a transmit operation.
In international character support, the dd command and various conversion subroutines that translate between extended characters and ASCII escape strings to preserve unique character information.
- In the C language, a data object having a value that can be changed while a program is running and having a data type that is a signed or unsigned character.
- Character data with a valuethat is assigned or changed while the program is running.
A label, which is often tied to an algorithm or set of rules, that is not guaranteed to be unique, but is used to identify and distinguish a specific charge-back item or charge-back entity from others.
The sequence in which Sterling Selling and Fulfillment Foundation creates authorization or charge requests. For example, the charge sequence might specify that gift certificates are to be used before a credit card is charged.
- A picture defined in terms of graphics primitives and graphics attributes.
- A visual representation of real-world objects, such as organizations, people, events, or locations, and the relationships between them.
In Business Graphics Utility, an object containing chart characteristics, such as the chart type, chart heading, legend position, and so on. The chart format does not include the data values to be plotted. The system-recognized identifier for the object type is *CHTFMT.
A definition that describes how item data behaves when it is visualized on a chart. For example, how data is copied into chart item properties, the chart template and labeling scheme to use, and whether to display attributes and pictures. See also chart template.
A characteristic of a chart, such as its summary description, time zone, grid size, background color, or merge and paste rules. Chart properties are saved with the chart. See also chart template.
chassis detect-and-deploy profile
A profile that IBM Director automatically applies to all new BladeCenter chassis when they are discovered. The profile settings include management module name, network protocols, and static IP addresses. If Remote Deployment Manager (RDM) is installed on the management server, the chassis detect-and-deploy profile also can include deployment policies.
The sending of typed messages between online participants. See also instant message.
- To look for a condition.
- In printers, an action message that instructs the printer operator to inspect a component. For example, the CHECK TONER COLLECTOR message means that the operator should look at the toner-collector bottle and make sure that it is physically present, in the proper place, and correctly installed.
- The process of determining whether a component is appropriate or meets the necessary requirements. For example, an environment check verifies that the target systems contain the appropriate operating systems and software for an operation.
- To determine whether a component is appropriate or meets the necessary requirements.
- A process for determining accuracy.
A square box with associated text that represents a choice. When a user selects the choice, the check box is filled to indicate that the choice is selected. The user can clear the check box by selecting the choice again, thereby deselecting the choice.
A user-defined constraint that specifies the values that specific columns of a base table can contain. See also constraint.
- The far right number of a self-check field that is used to verify the accuracy of the field.
- A check key consisting of a single digit.
A copy of a file that corresponds to a version of an element. See also version.
- To save local changes in a change set that is part of a repository workspace. A checked-in change set can later be shared with a team by delivering the change set.
- In certain software configuration management (SCM) systems, to copy files back into the repository after changing them.
- To replace an inactive document, project WBS element, scope element, requirement or resource record (with its modifications) to its repository directory so that others can view it or modify it.
- To upload the language of a checked out draft authored/received contract or amendment contract into the application.
The screen identifying the host screen that should be active for a connection to be considered ready to be returned to the connection pool. If the application is not on the screen specified by the check-in screen, the connection will be discarded or recycled in attempt to return the connection to the host screen specified by the check-in screen. The check-in screen is only meaningful if connection pooling is specified for a connection.
- To download the language of a draft authored/received contract or amendment contract from the application to modify it.
- In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified. See also reservation version status.
- To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may check out the same element at a time.
- In DB2 for z/OS, a state into which a table can be put where only limited activity is allowed on the table and constraints are not checked when the table is updated. See also set integrity pending.
- A state that occurs when data for a constraint cannot be verified as valid. A constraint could be either a referential constraint or a check constraint.
- A point at which the database manager records internal status information in the log; the recovery process uses this information if the subsystem abnormally terminates.
- A place in a program at which a check is made, or at which a recording of data is made to allow the program to be restarted in case of interruption.
- A compressed file that contains configuration data from a specific point in time.
The algorithm that determines when to commit all global transactions for the job steps in a batch application. See also results algorithm.
The periodic copying of processing information to the checkpoint data set. Checkpointing ensures that information about in-storage job and output queues is not lost in the event of a hardware or software error.
The process of resuming a job at a checkpoint within the job step that caused abnormal termination. The restart can be automatic or deferred. A deferred restart requires that the job be resubmitted. See also automatic restart, deferred restart, step restart.
A facility for restarting execution of a program at some point other than at the beginning, after the program was terminated due to a program or system failure. A restart can begin at a checkpoint or from the beginning of a job step, and uses checkpoint records to reinitialize the system.
In OSI X.400, the maximum amount of data (in units of 1024 bytes) that can be sent between two minor synchronization points. The checkpoint size is used by the X.400 reliable transfer server.
- The sum of a group of data that is associated with a group of data and that is used for error detection.
- On a diskette, data written in a section for error detection purposes.
- A function that protects data stored in an auxiliary storage pool from being lost because of the failure of a single disk. When checksum protection is in effect and a disk failure occurs, the system automatically reconstructs the data when the system program is loaded after the device is repaired. See also device parity protection, mirrored protection.
- In TCP/IP, the sum of a group of data associated with the group and used for error checking purposes.
In agile development, the peripheral participants in scrum development. This includes the product manager, testers, customers, customer advocates, and other stakeholders. See also pig role, scrum.
- In a generalization relationship, the specialization of another element, the parent. See also parent.
- In a hierarchy or auto-level hierarchy, a member that has at least one parent.
- Pertaining to a secured resource, either a file or library, that uses the user list of a parent resource. See also parent.
- A node that is subordinate to another node in a tree structure. Only the root node is not a child.
An activity that is launched during the processing of another activity, which becomes the parent activity. See also parent activity.
child business object
A business object that is contained or referenced by another business object. When the full child business object is part of its parent hierarchy, the child is contained by the parent. See also array attribute, foreign key attribute, single-cardinality attribute.
A class that inherits instance methods, attributes, and instance variables directly from the parent class (also known as the base class or superclass), or indirectly from an ancestor class.
A list of columns in a child table that relate to corresponding columns in a parent table. See also parent expression.
In explicit hierarchical locking, a lock that is held on a table, a page, a row, or a large object. Each child lock has a parent lock. See also parent lock.
A node within the scope of another node. See also parent node.
For subscriptions or recurring orders, the subordinate to the parent order. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues.
child resource group
A resource group that depends on certain application services that a parent resource group provides. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also dependent resource groups, parent resource group.
A table that has a referential constraint to a column in a different table; the referenced table is called a parent table. See also parent table.
In AIXwindows and Enhanced X-Windows, a widget that is managed by another widget, the parent. For example, Composite widgets typically manage the Primitive children widgets attached to them.
A window that appears within the border of its parent window (either a primary window or another child window). When the parent window is resized, moved, or destroyed, the child window also is resized, moved, or destroyed. However, the child window can be moved or resized independently from the parent window, within the boundaries of the parent window.
One of the Chinese characters that represent numbers. For example, the Chinese characters for 1, 2, and 3 are written with one, two, and three horizontal brush strokes, respectively. See also Arabic numeral, Hindi numeral, number, Roman numeral.
A test statistic used to indicate the probability that two fields are unrelated, in which case any differences between observed and expected frequencies are the result of chance alone. If this probability is very small (typically less than 5%) the relationship between the two fields is said to be significant.
Chi-squared Automatic Interaction Detector algorithm (CHAID)
A decision tree algorithm that uses chi-square statistics to identify optimal splits. Unlike the C & R tree and QUEST nodes, CHAID can generate nonbinary trees, meaning that some splits have more than two branches. See also decision tree algorithm, regression tree algorithm.
One of three types of complex BPML activities. A choice activity is used to make decisions in the business process model and runs only one of the child activities it contains. The choice activity makes it possible to model branch processing.
A point that is set automatically by CP Optimizer as it executes a goal during the search for a solution. At the choice point, the engine records the current state of constraints, variables, and domains, along with other goals not yet executed. If execution of the goal leads to failure, CP Optimizer backtracks to the choice point, restores the state recorded, and tries one of the stored goals.
A group type with a subclass equal to choice that is used to define a selection from a set of components. A choice type defines a choice group, which is valid when the data matches one of the components in the choice group.
- An agreed upon sequence of business events that is allowed by a seller for each transaction.
- An ordered sequence of message exchanges between two or more participants. In a choreography there is no central controller, responsible entity, or observer of the process.
See channel process.
See channel-path identifier.
See Simplified Chinese.
See Traditional Chinese.
See Compact Hypertext Markup Language.
- A group of archived business processes.
- A data storage location. For example, a raw disk device or a cooked file.
See business transaction services.
A set of XML files that defines or references the resources for a component of an application or a whole application, or another artifact relating to applications, such as a policy. A CICS bundle is installed in a CICS region. Multiple CICS bundles can be referenced by a management bundle. See also bundle, management bundle.
CICS dynamic storage area (CDSA)
A storage area allocated from CICS-key storage below the 16 MB line. The CDSA is used for all non-reentrant CICS-key RMODE(24) programs, all CICS-key task-lifetime storage in 24-bit storage, and CICS control blocks that reside in 24-bit storage.
CICS EJB server
One or more CICS regions that support enterprise beans. A logical CICS EJB server typically consists of multiple (cloned) CICS listener regions and multiple (cloned) CICS AORs. The listener regions and AORs may be combined into listener/AORs.
Storage protection key in which CICS is given control (key 8) when CICS storage protection is used. This key is for CICS code and control blocks. CICS-key storage can be accessed and modified by CICS. Application programs in user-key cannot modify CICS-key storage, but they can read it. CICS-key storage is obtained in MVS key-8 storage. See also user-key storage.
CICS-maintained data table
A type of CICS data table, for which CICS automatically maintains consistency between the table and its source data set. All changes to the data table are reflected in the source data set and all changes to the source data set are reflected in the data table.
CICS monitoring facility
The CICS component responsible for monitoring and producing task-related statistics information, such as task CPU usage and waits for I/O request units on an individual task basis. Reporting is divided into classes.
A set of CICS systems that are managed and manipulated as if they were a single entity. A CICSplex can be managed by CICSPlex SM. See also multiregion operation.
CICSPlex SM address space (CMAS)
A CICSPlex SM component that is responsible for managing CICSplexes. A CMAS provides the single-system image for a CICSplex by serving as the interface to other CICSplexes and external programs. There must be at least one CMAS in each MVS image on which you are running CICSPlex SM. A single CMAS can manage CICS systems within one or more CICSplexes.
CICS primary connection region
The web owning region (WOR) of the Multi-Region Option (MRO) connected regions in a CICS test environment. This is the region in which the CICS resource definition server for Application Deployment Manager runs.
CICS region user ID
The user ID assigned to a CICS region at CICS initialization. It is specified either in the RACF started procedures table when CICS is started as a started task, or on the USER parameter of the JOB statement when CICS is started as a job.
- In CICSPlex SM topology, a definition referring to a CICS system that is to be managed by CICSPlex SM.
- The entire collection of hardware and software required by CICS.
- In CICS business transaction services (BTS), a BTS set, that is the set of CICS regions across which BTS processes and activities may execute.
- A set of CICS systems within a CICSplex that can be managed as a single entity.
- In CICSPlex SM topology, the user-defined name, description, and content information for a CICS system group. A CICS system group can be made up of CICS systems or other CICS system groups.
CICS Transaction Affinities Utility
A utility designed to detect potential causes of inter-transaction affinity and transaction-system affinity for those users planning to use dynamic transaction routing.
CICS-value data area (CVDA)
An argument to which CICS has assigned a specific and limited set of meaningful values. When a CVDA is specified in an EXEC CICS command, CICS converts the CVDA value name to the corresponding numeric representation.
See control interval definition field.
An IBM-specified way to install and configure products on, or remove products from, remote workstations and hosts. Response files and redirected installation and configuration may be used by a CID-enabled product to eliminate or reduce user interaction with the CID-enabled product. See also response file.
See Classless Inter-Domain Routing.
See Common Internet File System.
CII data format
See Center for the Information of Industry data format.
See Common Information Model.
The code that consists of common building blocks that can be used instead of proprietary software or device-specific programming interfaces to manage devices that are compliant with the Common Information Model (CIM).
CIM object manager (CIMOM)
The common conceptual framework for data management that receives, validates, and authenticates the CIM requests from the client application. It then directs the requests to the appropriate component or service provider.
See CIM object manager.
See Common INET.
See control initiate.
cipher block chaining (CBC)
A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted.
See cipher specifications.
Data that is encrypted. Ciphertext is unreadable until it is converted into plaintext (decrypted) with a key. See also cleartext.
- One or more conductors through which an electric current can flow. See also link, packet switching.
- A telecommunication circuit such as a line, conductor, or conduit through which information is transmitted.
- In fibre-channel technology, an established communication path between two ports, which consists of two virtual circuits capable of transmitting in opposite directions. See also link.
circuit-switched data transmission service
A service that uses circuit switching to establish and maintain a connection before data can be transferred between data terminal equipment (DTE). See also packet-switched data transmission service.
A process that, on demand, connects two or more data terminal equipment (DTEs) and permits the exclusive use of a data circuit between them until the connection is released. See also message switching, packet switching.
A layout in which entities are arranged by type around the circumference of a circle. See also layout.
A database log in which records are overwritten if they are no longer needed by an active database. See also archive log.
In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, the process of keeping all restart data in a ring of log files. See also linear logging.
circular traceability relationship
A relationship between a requirement and itself, or an indirect relationship that leads back to a previously traced-from node. Traceability relationships cannot have circular references.
See complex instruction set computer.
See chief information security officer.
- A notification to DB2 for z/OS that an object is being accessed. A claim prevents a drain from occurring until the claim is released, which usually occurs at a commit point. See also drain, logical claim.
- A request for reimbursement, replacement, or repair for an item or an asset that is under warranty.
- A grouping of projects that has global properties. The properties are used to manage completed jobs, typically deleting them periodically or starting another job that performs specific cleanup tasks.
- An attribute that is related to a transaction code and a message region that is used to determine scheduling. See also message class, region class.
- A description of a set of objects that share the same attributes, operations, methods, relationships, and semantics. A class can use a set of interfaces to specify collections of operations that it provides to its environment. See also interface, object.
- The syntactic category for a group of related values. A value can be assigned to different classes in different contexts or scenarios. See also classification, classification, pattern, value.
- In RACF, a collection of defined entities (users, groups, and resources) with similar characteristics.
- An object that contains specifications, such as priority, maximum processing time, and maximum storage, to control the run-time environment of a job. The system-recognized identifier for the object type is *CLS.
- A section of a module. A class can represent program text, that is, the instructions and data that are loaded into virtual storage during execution. Other classes, such as an external symbol dictionary (ESD) and a relocation dictionary (RLD), are required for binding and loading the program.
- In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.
- In C++, a user-defined data type. A class data type can contain both data representations (data members) and functions (member functions).
- In the Distributed Computing Environment (DCE), a category into which objects are placed based on their purpose and internal structure.
- A collection of processes (and their associated threads) that have a single set of resource limitation values and target shares applied to them.
- The set of all members of a type of object, such as all contracts, term definitions, organizations, and so on.
- In printing, a single alphanumeric character assigned to a print job.
- A subdivision of a classification comprising of a group of suppliers that have common attributes or characteristics.
- The definition of an object within a specific hierarchy. A class can have properties and methods and can serve as the target of an association.
- A basic unit of the classification hierarchy used in the Type Designer. There are three classes: item, group, and category.
See transport class 0.
- Connectionless service between ports with notification of delivery or nondelivery.
- See transport class 2.
In fibre-channel technology, connectionless service between ports without notification of delivery. Other than notification, the transmission and routing of class 3 frames is identical to that of class 2 frames.
See transport class 4.
A value in a class object that controls the processing of routing steps in a job. These values include the run priority, time slice, eligibility for purge, default wait time, maximum processing unit time, and maximum temporary storage parameters.
country extended code page (CECP)
A single-byte EBCDIC code page in the IBM corporate registry that contains the 190 characters found in character set 00697. While each CECP contains the same set of characters (allowing for conversion of data without loss), the code point allocation of the characters is not identical. For example, all CECPs contain the character backwards slash, however in code page 500 it is located at code point x'E0' and in code page 280 it is located at code point x'48'.
See country identifier.
See territory code.
couple data set (CDS)
A data set that contains information related to a sysplex, its systems, cross-system coupling facility (XCF) groups, and their members. See also sysplex couple data set.
coupled extended remote copy (CXRC)
In z/OS or S/390 environments, a technique that supports synchronous copy operations in large environments that have an expanded number of primary-storage controls and direct access storage device (DASD) volumes; this number is in excess of those supported by a single data-mover configuration. Installations can have configurations consisting of thousands of volumes in multiple extended remote copy (XRC) sessions; coordination among the sessions ensures that all volumes will be recovered to a consistent time. CXRC greatly expands upon the ability of XRC to provide remote disaster-recovery protection across a sysplex.
- A process that adds an already existing EDI to another node within the network.
- The dependency that components have on one another.
- Two volumes that are paired for a remote mirroring purpose.
coupling facility channel
A high-bandwidth fiber-optic channel that provides the high-speed connectivity required for data sharing between a coupling facility and the central processor complexes (CPCs) directly attached to it.
coupling facility resource management (CFRM)
A component of z/OS that provides the services to manage coupling facility resources in a Parallel Sysplex. This management includes the enforcement of CFRM policies to ensure that the coupling facility and structure requirements are satisfied.
A function of the cross-system coupling facility (XCF) that transfers data and status information among the members of a group that reside in one or more of the MVS systems in a sysplex.
In the DCE Distributed Time Service, a local server that requests a time value from a randomly selected global server. The time value returned is used to synchronize a local access network (LAN) with all other parts of the network.
- The body of content that is taught, including general information such as the course description for the course catalog, an outline of materials covered, a schedule of sessions, and, optionally, assessments such as tests or evaluations. More than one person can be listed as an instructor for each course.
- A set of learning activities designed to meet one or more specific objectives. A course is stored in the LMS as a master. from which multiple offerings can be created.
A compressed package interchange file (PIF) containing course structure and metadata, and possibly course content. This is the form in which courses are imported into the Lotus Learning Management System.
- The network area covered by the service provider.
- The range of a received radio signal and its boundary. The coverage area of a cellular device is limited by the range of the radio network relative to its base station. The coverage area of a satellite phone is the entire earth because the radio signal is transmitted by satellites. See also base station.
A database or area in an RSR environment that is tracked by a tracking subsystem. Recovery information is not maintained by the tracking subsystem for databases or areas that are not covered.
Cox regression algorithm
An algorithm that produces a survival function that predicts the probability that the event of interest has occurred at a given time for given values of the predictor variables.
See collection point block.
The level of network services provided by the control point (CP) in an APPN end node or network node. CP capabilities information is exchanged during the activation of CP-CP sessions between two nodes. A node's CP capabilities are encoded in the CP capabilities (X'12C1') GDS variable.
CPCB operation code
See control point control block operation code.
In SNA, one of the parallel sessions between two control points, using LU 6.2 protocols and a mode name of CPSVCMG, on which network services requests and replies are exchanged. Each CP of a given pair has one contention-winner session and one contention-loser session with the other.
See consumer packaged goods.
See code page global identifier.
See characters per inch.
See control point management services.
See control point management services unit.
See command processing program.
See command processor parameter list.
See cluster profile record.
See characters per second.
See compressed-pattern storage.
See control point server.
A pair of LU 6.2 sessions, between the control points in dependent-LU-requester (DLUR) and dependent-LU-server (DLUS) nodes, that carry the flows of SSCP services, which are encapsulated in APPN formats.
See central processing unit.
The maximum percentage of CPU resources that can be consumed by work executing in a specified service class, regardless of relinquished CPU resources becoming available. This percentage is allocated to each LPAR or physical host where the DB2 database manager is running.
- The processor time used by a job. See also duration.
- The amount of time a program is running in the CPU or is being serviced by the operating system. Does not include time associated with the program's I/O or time in which other processes preempt the program's use of the CPU.
See commercial processing workload.
See Common Queue Server.
See catalog recovery area.
Someone, usually with malicious intent, who tries to circumvent or subvert system protection mechanisms. See also hacker.
To search for information across various web pages on the Internet or on an intranet. See also crawler.
A software program that retrieves documents from data sources and gathers information that can be used to create search indexes. See also crawl.
A set of sources that match specified patterns, such as database names, file system paths, domain names, IP addresses, and Uniform Resource Locators (URLs), that a crawler reads from to retrieve items for indexing.
See conditional restart control record.
- In DFSMSrmm, the date that a data set is written to tape.
- The date that a data set was read if it was created before DFSMSrmm was in use. The create date is updated each time a data set is replaced and not extended.
- The date that volumes and other resources are defined to DFSMSrmm or the date specified on the command as the create date.
created region type
A container for CICS regions that are defined for use in a platform, enabling the regions to be managed as a unit in the platform. See also adopted region, adopted region type, created region.
created temporary table
A table whose definition is persistent and shared between sessions but whose data is deleted when the session in which the table was instantiated ends. The data in the table is available only within the session in which the table was instantiated. The table is defined by using the SQL statement CREATE GLOBAL TEMPORARY TABLE. See also base table, declared temporary table, temporary table.
creation time stamp (CTS)
In the Distributed Computing Environment (DCE), an attribute of all Cell Directory Service clearinghouses, directories, soft links, child pointers, and object entries that contains a unique value reflecting the date and time the name was created.
See creator identifier.
- A set of information that grants a user or process certain access rights.
- Information acquired during authentication that describes a user, group associations, or other security-related identity attributes, and that is used to perform services such as authorization, auditing, or delegation. For example, a user ID and password are credentials that allow access to network and system resources. See also shared access.
- A course, certificate, or regulatory license that is required by either the insurance carrier or a government regulator to sell an insurance product.
- In the Java Authentication and Authorization Service (JAAS) framework, a subject class that owns security-related attributes. These attributes can contain information used to authenticate the subject to new services.
The component of Web Express Logon that handles requests for host credentials, which have been previously authenticated by a network security layer. See also network security layer.
In Fibre Channel technology, the number of receive buffers allocated to a transmitting node port (N_port), node loop port (NL_port), or fabric port (F_port). The credit is the maximum number of outstanding frames that can be transmitted by that N_port, NL_port, or F_port without causing a buffer overrun condition at the receiver.
- One or more workers with the appropriate skills and tools to perform the work required to resolve work order.
- A collection of resources that work together to perform a specific type of work. For example, an OHLINE crew might consist of 3 people and a bucket truck (a tool) that work together to build or repair overhead electrical power lines.
See Carbon Responsibility Factor.
See cluster resource group.
See cluster resource group manager.
See cluster-ready hardware server.
- A standard on which a judgment or decision may be based.
- A statement or a question against which an evaluator analyzes the strategic importance of a supplier.
- The processing path that takes the longest time to complete of all parallel paths in a process instance, where each path considered begins at a start node or an input to the process and ends at a terminate node.
- A series of activities that determines the earliest completion of a project; the critical path changes as activities or tasks are completed ahead or behind the original schedule estimates.
See certificate revocation list.
See customer relationship management.
A stopping point during the delivery. When orders are unloaded and loaded at a cross-dock facility, the freight is not taken into the inventory. The shipper manages all legs of the shipment. See also pool point.
Pertaining to control or resources involving more than one domain. See also same-domain.
- In SNA, a pair of cryptographic keys that are used by a system services control point (SSCP) during the initiation of cross-domain LU-LU sessions that use session-level cryptography. The keys are used to encipher the session cryptography key that is sent to another SSCP and to decipher the session cryptography key that is received from the other SSCP.
- In Cryptographic Support, a type of key-encrypting key used to encrypt a data-encrypting key that is being sent across a data line or being stored in a file.
cross-domain key table
In Cryptographic Support, a table in the system-supplied physical file QACRKTBL in library QUSRSYS used to store all key-encrypting keys other than the host master key and its variants. Each record of the file contains the name of the key, its use, and its value. The three types of uses are sending, receiving, and personal identification numbers (PINs).
- A link physically connecting two domains.
- A subarea link connecting two subareas that are in different domains.
Cross-Industry Standard Process for Data Mining
A process model for data mining that identifies six phases in the lifecycle of a data mining project: business understanding, data understanding, data preparation, modeling, evaluation, and deployment.
See Cartesian product.
The organization responsible for defining or maintaining items in multiple catalogs that are supported (referenced) through a single mechanism, such as a Global Trade Item Number (GTIN).
A table that is created in Partner Editor and is used to convert the user's values to a trading partner's values during outbound processing, or a partner's values to the user's values during inbound processing.
The process of migrating an existing product installation to a new version by installing the product on a new server, transferring data to the new installation, and converting the data to the new version.
See distributed query.
cross-site mirroring (XSM)
A function of i5/OS High Available Switchable Resources, Option 41, that provides geographic mirroring and the services to switch over or automatically cause a failover to a secondary copy, potentially at another location, in the event of an outage at the primary location.
cross-system extended services (XES)
A set of z/OS services with which multiple instances of an application or subsystem, running on different systems in a sysplex environment, can implement high-performance, high-availability data sharing by using a coupling facility.
See cross tabulation.
A data analysis that combines foreign key analysis and cross-domain analysis. Foreign keys reference primary keys that are already defined or identified during primary key analysis.
A technique for testing how well a model generalizes in the absence of a holdout test sample. Cross-validation divides the training data into a number of subsets, and then builds the same number of models, with each subset held out in turn. Each of those models is tested on the holdout sample, and the average accuracy of the models on those holdout samples is used to estimate the accuracy of the model when applied to new data. See also overfitting.
See change request.
See change request description.
See configuration report server.
See cathode ray tube.
See customer-replaceable unit.
The process of compressing a problem to make it manageable at intermediate steps in an algorithm. See also uncrush.
cryptographic application programming interface (CAPI)
An application programming interface that provides services to enable developers to secure applications using cryptography. It is a set of dynamically-linked libraries that provides an abstraction layer which isolates programmers from the code used to encrypt the data.
In SNA products, an LU-LU session in which a function management data (FMD) request can be enciphered before it is transmitted, and then deciphered after it is received. See also clear session, required cryptographic session, selective cryptographic session.
The IBM licensed program that provides support for the encryption and decryption of data, according to the Data Encryption Algorithm, and for the management of cryptographic keys and personal identification numbers (PINs).
- The transformation of data to conceal its information content and to prevent its unauthorized use or undetected modification.
- A method for protecting information by transforming it (encrypting it) into an unreadable format, called ciphertext. Only users who possess a secret key can decipher (or decrypt) the message into plaintext.
cryptography verification request
A request unit that is sent by the primary logical unit (PLU) to the secondary logical unit (SLU) as part of cryptographic session establishment. The request unit allows the SLU to verify that the PLU is using the correct session cryptography key and initialization vector (IV).
See cursor stability.
- See common storage area.
- See common system area.
- See Canadian Standards Association.
- See common service area.
A leading provider of product testing and certification services for products sold in the U.S., Canada and around the world. See also Canadian Standards Association.
See central site control facility.
See CICS system definition data set.
See control section.
See consolidated software inventory.
See Common Service Layer.
See Common Service Layer client.
The process of installing only Cluster Systems Management (CSM) on the nodes, as opposed to a full installation, which involves installing both CSM and the operating system on the nodes.
See Card Serial Number.
See Computer Science Network.
See combined sewer overflow.
- In architecture, the distance from the most positive character coordinate system X-axis value of a character shape to the character's escapement point. C-space can be positive, zero, or negative.
- In font design, the distance in pels, measured in the inline (print) direction, between the toned pel furthest from the character reference point and the escapement point.
- See combined sewer system.
- See channel subsystem.
- See connectivity subsystem.
- See Cascading Style Sheets.
See Cascading Style Sheets positioning.
See channel status word.
See channel-to-channel adapter.
See clustered trivial database.
See computer-telephony integration.
See complex text language.
See controller description.
See capable to promise.
See component trace.
See Common User Access.
- A multidimensional representation of data needed for online analytical processing, multidimensional reporting, or multidimensional planning applications. See also D-cube.
- See multidimensional array.
The volume calculation used to determine the amount of space required to store or ship material as well as the amount of space that can be accommodated by storage units or shipping modes. Used in capacity planning.
See call user data.
See closed user group.
See control-unit initiated reconfiguration.
Sorting of words or strings as a unit, rather than as individual characters. Cultural (or lexical) sort is the type used to order words in dictionaries, glossaries, indexes, and so on. See also sorting.
- The process of copying only data sets that have changed since the last backup of any type. See also full backup, incremental backup.
- A type of backup that includes the changes since the most recent full backup. The cumulative backup consolidates and replaces all previous differential backups.
A function that is used to model a quantity that varies over time and whose value depends on other decision variables of the problem. For example, a given capacity or physical resource can be modeled with a cumul function, and the cumulated contribution of intervals (activities) on the resource is represented by a function of time. cumulFunction is a CP keyword but is accepted as a CPLEX identifier.
cumulative PTF package
Media containing the program temporary fixes (PTFs) for i5/OS that have been accumulated from the start of the current release. PTFs requiring special handling are not included in a cumulative PTF package.
See Capacity Upgrade on Demand.
For an Ada-language compilation unit, the state where none of that unit's supporters has been recompiled since the unit itself was compiled. This implies that all of the supporters exist, since the Ada language requires this in order for the program to be compiled. Currency implies that all supporters of a unit were compiled in the correct order, as defined by Ada language rules.
- A factor that converts monetary values in a database from one country's monetary system into another without altering the original data.
- A process used to configure conversion rates between the currencies used by organizations in their respective locales.
A dimension type that separates local currency members for a base currency defined in an application. A currency partition also identifies currency types such as actual, budget, and forecast.
- A character such as the dollar sign ($) used to identify monetary values.
- In COBOL, the character defined by the CURRENCY SIGN clause in the SPECIAL-NAMES paragraph. If no CURRENCY SIGN clause is present in a COBOL source program, the currency symbol is identical to the currency sign.
current baseline print coordinate (bc)
In IPDS architecture, the baseline coordinate corresponding to the current print position on a logical page. The current baseline print coordinate is a coordinate in an I,B coordinate system.
In an advanced order, the set of charges a customer incurs for order items that can be shipped at once. See also total charge.
current connect group
In RACF, during a terminal session or batch job, the group with which a user is associated for access checking purposes. On MVS, if a user does not specify the current connect group on the LOGON command or batch JOB statement, the current connect group is the user's default group. On CICS, users cannot specify a group other than their default group. If list-of-groups processing is in effect, users are associated with all the groups to which they are connected. See also default group.
See working directory.
current drawing attribute
In architecture, an attribute used at the present time to direct a drawing process. See also default drawing attribute.
current drawing control
In architecture, a drawing control used at the present time to direct a drawing process. See also default drawing control.
- In the make command, the file that the make command is working with at a given moment. The make command replaces the $* macro with the name of the current file.
- The file being edited. If multiple windows are in use, the current file is the file containing the cursor.
See local host.
current inline coordinate
See current inline presentation coordinate.
current inline presentation coordinate
The inline presentation position at the present time. This inline presentation position is the summation of the increments of all inline controls since the inline coordinate was established in the presentation space. An inline presentation position is established in a presentation space either as part of the initialization procedures for processing an object or by an Absolute Move Inline control sequence.
current inline print coordinate
In IPDS architecture, the inline coordinate corresponding to the current print position on a logical page. The current inline print coordinate is a coordinate in an I,B coordinate system.
current interrupted job
When a job is interrupted by pressing the Attn key, another job can be started from a command line. This job can also be interrupted by pressing the Attn key again. The current interrupted job is the most recently interrupted. The job name for the current interrupted job is displayed at the top of the Inquiry Options menu.
The library that is specified to be the first user library searched for objects requested by a user. The name for the current library can be specified on the Sign-On display or in a user profile. When you specify an object name (such as the name of a file or program) on a command, but do not specify a library name, the system searches the libraries in the system part of the library list, then searches the current library before searching the user part of the library list. The current library is also the library that the system uses when you create a new object, if you do not specify a library name.
A state that increases the concurrency of read-only data access by allowing the committed version of a row to be processed when a lock is encountered instead of requiring the query to wait for the lock to be released. See also optimistic locking, pessimistic locking.
See SQL path.
- In computer graphics, the position, in user coordinates, that becomes the starting point for the next graphics routine, if that routine does not explicitly specify a starting point.
- In architecture, the position identified by the current presentation space coordinates; for example, the coordinate position reached after the execution of a drawing order. See also given position.
- In an IMS database, the place immediately preceding the segment occurrence that IMS retrieves if the user immediately issues an unqualified retrieval call.
- The picture element that defines the character reference point or the upper-left corner of an image.
- The point on the page where the printer is currently logically positioned; the position were the next pel will be printed if no move text controls are executed. When the character is placed on the page, the character reference point coincides with the current print position. See also character reference point.
- In COBOL, the record that is available in the record area associated with the file.
- The record pointed to by the current line pointer.
In CDE, the session saved by Session Manager when you log off. At the next login, unless you specify otherwise, this session automatically opens, enabling work to continue where you left off. See also home session.
current SQL ID
In DB2 for z/OS, an identifier that, at a single point in time, holds the privileges that are exercised when certain dynamic SQL statements run. The current SQL ID can be a primary authorization ID or a secondary authorization ID.
In DB2 for i5/OS, the state of a connection when it is the one used for SQL statements that are executed. See also dormant state.
current working directory
See working directory.
A series of courses that together satisfy a specific set of learning objectives. A student can enroll in a curriculum rather than each of the individual courses it contains, and progress can be tracked over the curriculum as a whole.
- A reference to an element at a specific position in a data structure.
- A named control structure used by an application program to point to and select a row of data from a set. See also asensitive cursor, cursor sensitivity, dynamic cursor, insensitive cursor, parameterized cursor, sensitive cursor, static cursor.
- During a HALDB online reorganization, a marker in a database partition that separates the copied database records from the records that have not been copied. The cursor indicates the progress of the reorganization through the HALDB partition.
- A movable symbol on a display, often a blinking or solid block of light, that identifies a choice to select, indicates where user interaction with the keyboard will appear, or indicates a position of interest on the display surface.
- A displayed symbol that acts as a marker to help the user locate a point in text, in a system command, or in storage. Cursors mark file position and access information in distributed data management (DDM) architecture.
- In SQL, an identifier associated with a group of rows or with a collection.
For high availability large database (HALDB) online reorganization, the status in the recovery control data set (RECON data set) that alerts Database Recovery Control (DBRC) that an online reorganization has started.
cursor operation record
A record that contains instructions for the translator on moving through the result set returned by a query to a new record. Each operation record is associated with a single SQL statement record that returns a result set. The translator performs cursor operations as it encounters them while processing the map.
The degree to which database updates made by the same application process or another application process are incorporated in the data returned by FETCH statements for a cursor after the database updates. See also asensitive cursor, cursor, insensitive cursor, sensitive cursor.
- An isolation level under which a query in a transaction is prevented from reading any changes made to rows by statements in other transactions until the changes have been committed. A transaction using CS with an updatable cursor prevents statements in other transactions from changing and possibly reading a row until the cursor has moved from that row. See also isolation level, read stability, repeatable read, uncommitted read.
- An isolation level that locks any row accessed by a transaction of an application while the cursor is positioned on the row. The lock remains in effect until the next row is fetched or the transaction is terminated. If any data is changed in a row, the lock is held until the change is committed to the database.
See smoothness of curve.
See control interval update sequence number.
- An action for a file or project that is created using the Menu Manager preferences pages and is displayed on pop-up menus.
- An action on a business object that runs code for specific state transitions. This action can be a Java class method or an EJB name.
- In JSP programming, an action described in a portable manner by a tag library descriptor and a collection of Java classes and imported into a JSP page by a taglib directive. (Sun)
- A Java or non-Java process definition that a user can define as a part of a health policy action plan or elasticity operation.
An adapter that is created by users or consultants and is not shipped with Sterling B2B Integrator. Custom adapters can integrate custom applications and legacy systems with Sterling B2B Integrator.
- A user-defined property for an asset that further describes assets of that type. For example, a custom attribute for database tables might be "Expected maximum row count." The custom attribute would be available for every database table, and might contain different values for different database tables.
- User-defined characteristics of an asset, for example: support contact and confidential.
Custom-built Product Delivery Option (CBPDO)
A software delivery package consisting of uninstalled products and unintegrated service. Installation requires the use of SMP/E. CBPDO is one of the two entitled methods for installing z/OS; the other method is ServerPac.
A selected combination of products tailored by a vendor to the needs of one or more users. Each custom configuration is identified by unique serial number, which is incorporated into the custom configuration.
A dashboard that is created by the user from widgets and various data sources to meet specific requirements. It is not supplied with the application. See also fixed dashboard.
- A user of an online store.
- A group or organization that is associated with one or more applications. A customer can be an external organization that accesses a data center or an internal department within a company.
The proportion of contractual customers or subscribers who leave a supplier during a given time period. Churn rate is a possible indicator of customer dissatisfaction, cheaper and/or better offers from the competition, more successful sales and/or marketing by the competition, or reasons having to do with the customer life cycle. Churn rate can be thought of as the inverse of retention rate.
An online site where users may obtain information regarding products and conduct business transactions regarding these products. WebSphere Commerce supports the following customer-facing stores: hub store, direct sales store, and extended site store.
A grade that is assigned to a customer, based on the customer's rating within the organization. For example, a customer may be assigned a grade of A, indicating that the customer is an excellent customer, or B, indicating that the customer is an average customer. These grades determine how approval rules for quotes can be applied.
A type of member group consisting of a collection of customers who have been grouped by a site administrator because they share similar shopping patterns or characteristics. See also site administrator.
customer-managed use control
A level of password use control in which the customer manages compliance with the terms of the software product acquisition. See also password use control level, vendor-managed use control.
A list of items being purchased by a customer. The customer order contains customer data, ship-to information, bill-to information, delivery dates, and line items that list SKUs being purchased.
customer relationship management (CRM)
One of two major corporate business processes (with Integrated Product Development) within IBM. CRM defines standards for responding to customers, particularly in the delivery of services engagements.
All information about the customer that is held by the seller. This can include basic demographics, order history, or operational data such as the user ID and shipping address. Customer segments are dynamic; marketing managers define the criteria for including a customer in a customer segment. Customer segments can be the targets of campaigns.
customer service optimization
The practice of improving customer service operations, which is often measured by first call resolution rates, average call time, customer satisfaction with service, and other factors.
- A defined role in WebSphere Commerce that manages customer inquiries. The customer service representative also processes customer registration, orders, and returns. See also customer service supervisor, order, script.
- A person who processes customer purchases, orders, returns, inquiries, and store registration.
customer service supervisor
A defined role in WebSphere Commerce that has access to all customer service tasks. The customer service supervisor manages customer inquiries (such as customer registration, orders, returns, and auctions) and has authority to complete tasks that cannot be accessed by a customer service representative, such as approving system-denied returns records, and contacting customers regarding payment exceptions (such as credit card authorization failures). See also customer service representative.
customer setup (CSU)
The unpacking, setup, and checkout of machines by customer personnel, according to a sequence of instructions provided by the manufacturers, without the use of tools or the assistance of trained service personnel.
See finder method.
- An advanced XML condition that supplements the set of defined functions that are provided in the Greex library and are used to evaluate conditions on input data.
- An advanced XML condition that is configurable to meet specific validation scenarios.
- The ability to change how objects on a personal computer look and work. For example, a user can tailor what objects are in a work area by creating, moving, or copying objects to the work area.
- The modification of a portal page or portlet by a user. WebSphere Portal enables a user to customize a portal page by modifying the page layout and by selecting which portlets will display per device. See also personalization.
- The process of describing optional changes to defaults of a software program that is already installed on the system and configured so that it can be used. See also configuration.
- The process of designing a data processing installation or network to meet the requirements of particular users. Activities can include installing additional products, taking advantage of new software features and functions, and enabling or disabling optional features.
customization definition document (CDD)
An XML document that describes the layout of an instance (that is, its organizational units (OUs) and servers, and which service bundles are assigned to each server-OU combination). The Customization Definition Program (CDP) uses a CDD to determine which deployment data to produce for an instance.
customization time data
See build time data.
- To describe optional preferences or changes to defaults in a software program that is already installed and configured.
- To describe to the system the devices, programs, users, and user defaults for a particular data processing system or network.
Customized Devices Object Class
A representation within the Object Data Manager (ODM) of each device instance as distinguished by a unique logical name. The Customized Devices Object Class contains basic information about the device such as device status and how to access the information contained in other object classes.
customized installation package (CIP)
A customized installation image that can include one or more maintenance packages, a configuration archive file from a stand-alone server profile, one or more enterprise archive files, scripts, and other files that help customize the resulting installation.
- A property that consists of a name and value and applies to an organization, product, or contract for informational and search puropses.
- A user-defined property, as opposed to a system-defined property. The user can assign custom properties to a class. See also property.
A C language or C++ language program that provides data manipulation and local or remote data stream, database, or other services beyond those provided by the state table interface. Custom servers provide an interface between DirectTalk and business applications, functions, or other processes to give callers access to business information and voice processing functions such as speech recognition. See also 3270 server.
In Analysis Studio, a named object which can include filter rules, calculations, and sort rules. Custom sets can define a set of members that is different from any set originally defined in the cube model. See also predefined set, set.
An extension to the JavaServer Pages (JSP) language that performs a specialized task. Custom tags are typically distributed in the form of a tag library, which also contains the Java classes that implement the tags.
custom text analysis engine
A text analysis engine that is created using the Unstructured Information Management Architecture (UIMA) SDK and can be added to the set of standard enterprise search text analysis engines. See also analysis engine, enterprise search base annotator.
custom user registry
A customer-implemented user registry that implements the UserRegistry Java interface. This registry type can support virtually any kind of accounts repository from a relational database and can provide flexibility in adapting product security to various environments.
A view that uses actions such as summarize, cloak, exclude, and apex to limit access to information in a cube to members of a given user class. User class views are replaced by custom views associated with the users, groups, or roles in a configured namespace.
A volume in count-key-data (CKD) format that is not a standard volume, which means that it does not necessarily present the same number of cylinders and capacity to its assigned logical control unit as provided by one of the standard S/390 volume types. See also count key data, interleave, standard volume.
Custom Wire Format (CWF)
The physical representation of a message in the MRM domain that is composed of a number of fixed format data structures or elements, which are not separated by delimiter characters.
- A way of eliminating part of the search space without losing any feasible or optimal solutions.
- An action that identifies a page, object, or picture that is to be deleted or moved to another place in the same or different document or file
- In multimedia applications, the process of instantly replacing a picture from one source with a picture from another. This is the most common form of editing scene to scene.
- The severed part of a perforation. Cuts are separated by ties.
A single form not connected to other forms. The form may have an original and one or more copies. Cut forms are fed separately into a printer. See also continuous forms.
See control unit terminal mode.
In architecture, unconnected sheets. See also continuous-form media.
Paper that is cut into uniform-size sheets before being loaded into the printer. See also continuous forms.
A printer that requires cut-sheet paper. See also continuous-forms printer.
In fibre-channel technology, a switching technique that allows a routing decision to be made and acted upon as soon as the destination address of a frame is received. See also route.
A channel of voice data which has been passed through echo cancellation algorithms. The channel provides echo-cancelled voice data which can then be used by the engine in a recognition attempt.
See cost variance.
See cost variance at completion.
See common VTOC access facility.
See CICS-value data area.
See Concurrent Versions System.
See Common Vulnerability Scoring System.
See communication vector table.
CVV auth code
See card verification value authorization code.
See case weight.
See common work area.
See Custom Wire Format.
See common warehouse metamodel.
See coupled extended remote copy.
A color model used by the printing industry based on mixing cyan, magenta, and yellow. See also cyan/magenta/yellow/black.
A color model used by the printing industry based on mixing cyan, magenta, yellow, and black. CMYK is an enhancement of the cyan/magenta/yellow (CMY) model, created after printers discovered they could obtain a darker black using special black colorants rather than by combining cyan, magenta, and yellow alone. See also cyan/magenta/yellow.
- A path of a graph that begins and ends on the same node.
- A set of tables that can be ordered so that each table is a descendent of the one before it, and the first table is a descendent of the last table. A self-referencing table is a cycle with a single member. See also referential cycle.
- To end a management collection object that is currently in use and to open a new object for storing future collections. This process prevents collection objects from becoming too large.
- The time required for a process instance in a process simulation run to finish processing its inputs. Cycle time includes idle time when an activity in the process is waiting for a resource to become available.
- The time elapsed during one cycle of the processor. Cycle time varies from one type of processor to another.
- The minimum time interval between starts of successive read/write cycles of a storage device.
A period that represents a constant number of days. There are two types of cyclic periods: Work-days-only cyclic period, where only the work days are counted when calculating the number of days in the period and All-days cyclic period, where all days are counted.
- A unit of storage on a count-key-data (CKD) device with a fixed number of tracks.
- On a magnetic disk or in an assembly of disks, the set of all tracks that can be accessed by all the magnetic heads of a comb in a given position, without repositioning the access mechanism.
See Complete Zip Auditing and Rating.