This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
An object-oriented high-level language that evolved from the C language. C++ takes advantage of the benefits of object-oriented technology such as code modularity, portability, and reuse.
A level of security defined in the Trusted Computer System Evaluation Criteria (TCSEC) published by the United States Government. To meet C2 requirements, a system must perform discretionary access control, authentication and verification, object reuse protection, and auditing of security-relevant events.
A rule induction algorithm that builds either a decision tree or a rule set. The model works by splitting the sample based on the field that provides the maximum information gain at each level. See also rule induction.
A section of cable between components or devices on a network. A segment may consist of a single patch cable, multiple patch cables that are connected to one another, or a combination of building cable and patch cables that are connected to one another.
See certificate authority certificate.
- To place, hide, or store frequently used information locally for quick retrieval.
- To place a duplicate copy of a file on random access media when the server migrates a file to another storage pool in the hierarchy.
- Storage or memory that is used to improve access times to instructions, data, or both. For example, data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.
- A buffer that contains frequently accessed instructions and data; it is used to reduce access time.
Products that have their information, such as item attributes, inventory balance, or availability, stored in a local data cache. The consuming application, such as a web store, can access the information from the cache, reducing synchronous queries to the order management system.
A process by which data associated with a file is removed from the cache system. The data is removed either by using a Least Recently Used (LRU) algorithm when configured General Parallel File System (GPFS) hard or soft quota limits are exceeded or by issuing a command. When referenced again in the cache system, the data that is associated with the file is retrieved from the home system.
cache fast write
A storage control capability in which data is written directly to cache without using nonvolatile storage. Cache fast write is useful for temporary data or data that is readily re-created. See also DASD fast write.
A snapshot of a logical volume created by Logical Volume Snapshot Agent. Blocks are saved immediately before they are modified during the image backup and their logical extents are saved in the cache files.
- A processor storage reference that is satisfied by information from a cache.
- An event that satisfies a read operation by retrieving data from cache instead of retrieving it from the intended storage or a lower level of cache. See also cache miss.
- A record that contains relevant information about the user data that is currently in the subsystem cache memory. Examples of this information include the current state of the data and the intended location of the data on one or more disks.
- The cache component that is normally loaded, stored, and interrogated during cache lookup.
- An event that satisfies a read operation by retrieving data from the intended storage or a lower level of cache because the requested data is not available in the only level or a higher level of cache. See also cache hit.
- A delay that occurs when the processor references data or instructions that are not already in the data cache or instruction cache.
A coupling facility structure that stores data that can be available to all members of a Sysplex. A DB2 data sharing group uses cache structures as group buffer pools. See also group buffer pool.
In a federated system, a logical table object that is used to cache data from a data source table. A cache table comprises a nickname that identifies the data source table, one or more materialized query tables, and a schedule for replicating the data in each materialized query table.
The process of storing frequently used results from a request to memory for quick retrieval, until it is time to refresh the information. The DB2 database manager provides many forms of caching, such as directory caching, package caching, file system caching, and LDAP caching.
caching proxy server
A proxy server that stores the documents that it retrieves from other servers in a local cache. The caching proxy server can then respond to subsequent requests for these documents without retrieving them from the other servers. This can improve response time.
See client acceptor daemon.
See call attachment facility.
See I/O cage.
See command attention key.
See customer acceptance laboratory.
See calculation script.
An expression that is not constant, but whose value depends upon other values. To be evaluated, a calculated expression must obtain and compute values from other sources, normally in other fields or rows.
A member of a dimension whose measure values are not stored but are calculated at run time using an expression. See also input member.
A metric that can be defined using a formula that is constructed from one or more existing metrics, operators, or constants. For example, users can create a metric named Repeat Visitor % using a calculated metric of [(Unique Visitors –New Visitors)/Unique Visitors].
- An equation within a database outline, a calculation script, or a report script that is used to determine a value for a particular member or point in a report.
- The process used to transform a series of records into a new result. Typically a calculation is mathematical, but may also include sorting, shifting, or adding to a prior result. Calculations enable the model admin to select records from their source data, perform operations on the data, segment results, and begin another calculation based on those results.
A set of ranges that can be used by a calculation rule. For example, for shipping charges, there can be a set of weight ranges that each correspond to a particular cost. That is, a product that weighs between 0 to 5 kg might cost $10.00 to ship, while a product weighing 5 to 10 kg might cost $15.00 to ship.
An Internet standard allowing a client to access scheduling information on a remote server. It extends the WebDAV (HTTP-based protocol for data manipulation) specification and uses iCalendar format for the data. The access protocol is defined by RFC 4791.
- A list of scheduling dates. Calendars are defined in the database and are mostly assigned to run cycles. Calendars can be used either to identify the dates when job streams or jobs can be run (when used with inclusive run cycles), or when they cannot be run (when used with exclusive run cycles). A calendar can also be designated for use as a non-working days calendar in a job stream. See also exclusive run cycle, holidays calendar, iCalendar, inclusive run cycle, non-working days calendar, run cycle.
- A view in the Notes mail database that can be used to manage time and schedule meetings. Users can add appointments, meetings, reminders, events, and anniversaries to the Calendar view.
Software that provides users with the ability to schedule appointments and view contacts. Calendaring software generally works in accordance with other time management software and can be synchronized with additional devices (such as smartphones). See also synchronize.
A schedule that defines both the days and time that processing occurs. For example, one could use a calendar schedule to make sure that a process runs every Tuesday starting between 19:00 and 19:30 and ending between midnight and 00:30.
- In capacity planning, the process of refining a model so that it represents the system the user is modeling. The predicted and measured values should match as closely as possible, with no more than a 10% difference for resource utilization, and no more than a 20% difference for response times.
- The comparison and adjustment of an instrument to a standard of known accuracy.
- A physical or logical connection between one or more parties in a telephone call.
- A single runtime instance of a voice application.
- To start a program or procedure, usually by specifying the entry conditions and transferring control to an entry point.
- The application server to which the QMF session is currently connected. After the connection is made, this server processes all SQL statements.
- The name of the interface program, the definition of the arguments passed to the interface program, and the definition of the data structures passed to the interface program.
- In query management, the Common Programming Interface (CPI) that includes the definitions of the control blocks and constants used for the interface. See also command interface.
- A set of documented interfaces between the z/OS operating system and higher level applications that want to access functions specified in the Single UNIX Specification and earlier standards. See also system call.
- Services that are provided by IMS for use by IMS exit routines. These services provide clearly defined interfaces that allow exit routines to request various functions, such as acquiring storage or finding an IMS control block.
- A program service provided through a programming interface. See also action service.
A call supervision packet that a called data terminal equipment (DTE) transmits to indicate to the data circuit-terminating equipment (DCE) that it accepts the incoming call. See also call connected packet, call request packet.
call attachment facility (CAF)
A DB2 for z/OS attachment facility for application programs that run in TSO or z/OS batch. The CAF is an alternative to the DSN command processor and provides greater control over the execution environment. See also Resource Recovery Services attachment facility.
- In the AIX operating system, a procedure that is called if and when certain specified conditions are met.
- Pertaining to a characteristic that tells a remote system whether the local system it tries to access will verify its identity.
- A way for one thread to notify another application thread that an event has happened.
- A message consumer or an event handler routine.
A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the web service security run time for propagation in the web service security header.
A method for authentication of a voice user who is requesting a system API. This mechanism places a callback request to VoiceLogistics Pro (VLP) to verify whether the user is logged into VLP.
- A central point at which all inbound calls are handled by a group of individuals on a controlled sequential basis. Call centers are usually a front end to a business such as airline ticketing or mail order.
- A center that handles a large number of calls to either take orders or provide customer service.
call connected packet
In X.25 communications, a call supervision packet transmitted by a DCE to inform the calling DTE of the complete establishment of the call. See also call request packet, call-accepted packet.
call detail record (CDR)
In telephony, a unit of information containing data about a completed call, such as the time the call began, its duration and date, the originating extension, and the number called.
called DLS user
The data link service (DLS) user in connection mode that processes requests for connections from other DLS users. See also Data Link Service.
See dialed number identification service.
- Any person, device, or system that receives a telephone call. See also caller.
- On a switched line, the location to which a connection is established.
A segment that is called from another segment. It can be regarded as an extension of the calling segment, but some actions take place at the call and others at the return. Examples of actions are saving the addresses of the current position and the next order on the segment call stack at the call, and restoring those saved addressed at the return.
- The requester of a service.
- A function that calls another function.
- Any person, device, or system that makes a telephone call. See also called party.
A method for CSM code to request that an agent function is executed. The callgate request contains the function, along with an instruction on which nodes should execute the function. For example, a CSM callgate could request that the agent code checks a user privilege level, and that would only be executed on the active configuration node.
A communication link established between a product and a service provider. The product can use this link to place a call to IBM or to another service provider when it requires service. With access to the machine, service personnel can perform service tasks, such as viewing error and problem logs or initiating trace and dump retrievals.
See network user address.
A part of the external CICS interface (EXCI). The CALL interface consists of six commands that allow you to allocate and open sessions to a CICS system from non-CICS programs running under MVS; issue DPL requests on these sessions from the non-CICS programs; and close and deallocate the sessions on completion of the DPL requests.
- An API for database access that provides a standard set of functions to process SQL statements, XQuery expressions, and related services at run time. See also embedded SQL.
- A callable application programming interface (API) for database access, which is an alternative to using embedded SQL.
- A kernel parameter that establishes the maximum number of scheduled activities that can be pending simultaneously.
- An outbound message to request services or data from an enterprise application or web service.
- The action of bringing a computer program, a routine, or a subroutine into effect.
Software that provides basic computer-telephony integration (CTI) enablement and comprehensive CTI functionality. This includes access to, and management of, inbound and outbound telecommunications.
call progress signal
A call control signal transmitted from the data circuit-terminating equipment (DCE) to the calling data terminal equipment (DTE) to indicate the progress of the establishment of a call, the reason why the connection could not be established, or any other network condition.
call request packet
A call supervision packet that a data terminal equipment (DTE) transmits to ask that a connection for a call be established throughout the network. See also call connected packet, call-accepted packet.
call request signal
During the establishment of a connection for a call, a signal that informs the data circuit-terminating equipment (DCE) that a data terminal equipment (DTE) has asked to make a call.
- A list of data elements that is constructed and maintained by the Java virtual machine (JVM) for a program to successfully call and return from a method.
- The ordered list of all programs or procedures currently started for a job. The programs and procedures can be started explicitly with the CALL instruction, or implicitly from some other event.
In the Distributed Computing Environment (DCE), a thread created by a remote procedure call (RPC) server's run time to execute remote procedures. When engaged by an RPC, a call thread temporarily forms part of the RPC thread of the call.
A planned series of operations including advertisements and suggestive selling techniques, that are pursued to achieve a defined set of business objectives. In the WebSphere Commerce Accelerator, campaigns are used to coordinate and aggregate groups of campaign initiatives.
Canadian Standards Association (CSA)
A not-for-profit membership-based association dedicated to standards development for business, industry, government and consumers in Canada and the global marketplace. See also CSA International.
A closedown in which a program is abnormally terminated either because of an unexpected situation or as the result of an operator command. See also orderly closedown, quick closedown.
cancellation cleanup handler
A function that you can specify to perform an action, such as releasing resources, that occurs after the thread returns from the start routine and calls pthread_exit() or after a cancellation request is performed on the thread.
One of two values, which are either enabled or disabled, that describe whether cancellation requests in the current thread are acted on or held in a pending state. If the value is enabled, the cancellation request is acted on immediately and is based on the current cancellation type. If the value is disabled, the cancellation request is held in a pending state until it is enabled.
One of two values (deferred or asynchronous) that describe how cancellation requests in the current thread are acted on when the cancellation state is enabled. If the value is deferred, the cancellation request is held pending. If the value is asynchronous, the cancel request is acted on immediately, thus ending the thread with a status of PTHREAD_CANCELED.
- An individual who has applied to requisition. A candidate must have expressed an interest in the position using electronic means, must be considered by the potential employer, must have the basic qualifications for the job, and cannot withdraw before an offer is made. Unless a candidate meets each criterion, that candidate is not an internet applicant for record-keeping purposes.
- An applicant profile that has been submitted in response to either a contingent staff or hybrid request.
A known service endpoint that implements an interface for a particular request. The set of candidates is then filtered by the dynamic assembler to select the best endpoint out of all the candidates.
A short list of entities that are potential matches of the incoming identity because they share certain attributes. See also attribute.
A score based on the comparison of information in a candidate's resume to the job description. The score can be 1 to 1,000. The score can be used as a starting point in a search for qualified candidates, but is not a final indicator of qualifications.
The minimum score at which a particular attribute value must match between the incoming identity and an existing entity to satisfy the resolution rule. See also resolution rule.
In LANs, the IEEE 802.1 format for the transmission of medium access control (MAC) addresses for token-ring and Ethernet adapters. In canonical format, the least significant (rightmost) bit of each address byte is transmitted first. See also noncanonical address.
A format for storing hierarchical names that displays the hierarchical attribute of each component of the name. For example, the canonical format for the name Reuben D. Smith/Ottawa/Renovations/CA is: CN=Reuben D. Smith/OU=Ottawa/O=Renovations/C=CA where: CN is the common name, OU is the organizational unit, O is the organization, and C is the region or country code.
See line mode.
See Common Alerting Protocol.
- A group of functions and features that can be hidden or revealed to simplify the user interface. Capabilities can be enabled or disabled by changing preference settings, or they can be controlled through an administration interface.
- A function or feature that is made available by an application, tool, or product.
- Specific features or characteristics of a piece of software, such as the database version.
In OSI, a confirmed data transfer service provided by the session layer to transfer a limited amount of data outside of an activity. Capability data can be used by two peers to exchange information about their capability to start an activity.
A series of messages that pass between two CICS regions to establish if they can communicate using IP interconnectivity (IPIC). The capability exchange determines the security controls that are applied to the connection, the number of sessions to be made available, and resynchronizes any outstanding work if the connection has previously failed.
A category, such as "database" or "hardware" that is used to group characteristics of a piece of software. For example, the "hardware" capability type includes characteristics such the BIOS vendor and BIOS version.
- A measure of how much volume or revenue can be handled by a specific resource.
- The actual number of parallel servers and workstation resources available during a specified open interval.
A rule that governs the amount of items that can be awarded to a supplier. Using a capacity constraint, business can be awarded to a preferred supplier or the volume of business for a supplier can be limited.
A licensing model that licenses features with a price-per-terabyte model. Licensed features are FlashCopy, and Metro Mirror and Global Mirror, and virtualization. See also FlashCopy, Metro Mirror, virtualization.
A function that uses information about the system, such as a description of the system's workload, performance objectives, and configuration, to determine how the data processing needs of the system can best be met. The capacity planner then recommends, through the use of printed reports and graphs, ways to enhance performance, such as hardware upgrades, performance tuning, or system configuration changes.
- The process of determining the hardware and software configuration that is required to accommodate the anticipated workload on a system.
- The process of scheduling the resources required to perform project work.
capacity requirements planning (CRP)
The process of specifying the level of resources (facilities, equipment, and labor force size) that best supports the competitive strategy for production of the enterprise.
Capacity Upgrade on Demand (CUoD)
The capability to permanently activate one or more inactive processors without having to restart the server or interrupt the data flow of the business, through the purchase of a permanent processor activation. This capability adds significant value by enabling a fast and economical way to add capacity for new workloads, enabling the server to adapt to unexpected performance demands. See also activation code, application provisioning, dynamic LPAR, free pool, Hardware Management Console.
- See Coherent Accelerator Processor Interface.
- See computer assisted personal interviewing.
- See cryptographic application programming interface.
An uppercase letter. See also simple letter.
capital lock (caps lock)
The keyboard function that invokes the uppercase of alphabetic characters, but does not change the response of numeric and other keys. This function is convenient for combining uppercase letters with numbers as in the string “M3C 1H7”. Capital Lock is a toggle key.
capitals lock state
A state that, if activated, will result in the generation of the capital form of all graphic characters on the keyboard for which such a form exists. National standards or usage may determine which graphic characters are affected by this state (see ISO/IEC 9995-1).
See capital lock.
- A description associated with an identifier. The caption is often used in preference to the identifier in reports to make them more comprehensible.
- A National Language Support-enabled text string in a policy expression that describes the policy.
- Text associated with, and describing, a table or figure.
- The process by which some printers can save downloaded fonts as temporary printer-resident fonts.
- The process by which an acquirer receives payment from the customer's financial institution and remits the payment. A "capture" is the guarantee that the funds are available and that the transfer will take place.
- In SQL replication, event publishing, and Q replication, to gather changes from a source database. These changes can come from the DB2 log or journal or from source transactions in a relational database that is not a DB2 database.
- To digitize an image into the video memory of the M-Video Capture Adapter.
Capture control server
In SQL replication, a database or subsystem that contains the Capture control tables, which store information about registered replication source tables. The Capture program runs on the Capture control server.
See packet capture appliance.
A virtual window into the actual unit control block (UCB). Captured UCB resides in private storage below 16 MB. All the virtual windows on the actual UCB view the same data at the same time. Only actual UCBs above 16 MB are captured. See also actual UCB, unit control block.
In SQL replication, an approximate difference between the time that source data was changed and the time that the Capture program made the data available to the Apply program by committing the data to a CD table. Capture latency is a subset of the end-to-end latency in a replication configuration. See also Apply latency, end-to-end latency, latency, Q Apply latency, Q Capture latency.
In SQL replication, a program that reads database log or journal records to capture changes that are made to DB2 database source tables and store them in staging tables. See also Apply program, Capture trigger, Q Capture program.
A capture specification provides the information that CICS will use to detect an event within an application or in the system. The capture specification can include the capture point, capture data, and predicates for filtering and is defined in the event binding file.
In SQL replication, a mechanism that captures delete, update, or insert operations that are performed on source tables other than DB2 source tables. See also Apply program, Capture program.
A transferrable permit that allows an organization to release one ton of carbon dioxide into the environment. The implementation of carbon credits is an attempt to reduce the amount of greenhouse gases that are being produced.
The amount of greenhouse gas that a person or organization is responsible for producing. A smaller carbon footprint is associated with having less detrimental effect on the environment.
- In the Map Designer, a data object. There are two types of map cards: input and output.
- A record of information attached to an item. An item can have multiple cards.
- An electronic circuit board that is plugged into a slot in a system to give it added capabilities.
- A Wireless Markup Language (WML) document that provides user-interface and navigational settings to display content on mobile devices. See also deck.
See Card Distributed Authoring and Versioning protocol.
Card Distributed Authoring and Versioning protocol (CardDAV)
An address book client or server protocol designed to allow users to access and share contact data on a server. The CardDAV protocol was developed by the IETF and was published as RFC 6352 in August 2011. CardDAV is based on WebDAV, which is based on HTTP, and it uses vCard for contact data.
A one-to-one representation of the hole patterns of a punched card; for example, a card image might be a matrix in which a one represents a punch and a zero represents the absence of a punch.
- The number of rows in a database table or the number of elements in an array. See also associative array.
- In information analysis, a measure of the number of unique values in a column.
- For OLAP data sources, the number of members in a hierarchy. The cardinality property for a hierarchy is used to assign solve orders to expressions.
- The number of elements in a set.
- For relational data sources, a numerical indication of the relationship between two query subjects, query items, or other model objects.
card verification value authorization code (CVV auth code)
A separate authorization code that might be returned in addition to a credit card authorization code when a financial institution approves a credit card transaction.
care management platform
A software platform that is used to manage care across the care continuum. It can identify clients in need of care, assess their needs, establish the appropriate care plan to support their needs, and manage the care and monitor results and outcomes.
See Continuous Association Rule Mining Algorithm.
carriage control character
A character that is used to specify a write, space, or skip operation. See also control character.
- The action that indicates that printing is to be continued at the left margin of the next line. A carriage return is equivalent to the carriage return of a typewriter.
- The movement of the printing position or display position to the first position on the same line.
- A keystroke generally indicating the end of a command line.
- A transportation service provider that provides delivery and shipping services between buyers, sellers, and customers.
- A service provider that provides the telecom services to customers.
- A continuous frequency (a pulse train, or an electric or electromagnetic wave) that may be varied by a signal bearing information to be transmitted over a communication system.
- The backing material for labels. Labels consist of the printable medium, the adhesive, and the carrier.
One of many holes in the side margins on continuous-forms paper. When placed on the tractor pins, the holes maintain paper alignment and registration, and control the movement of the paper.
A code that identifies a carrier organization in regions outside North America, which do not use a SCAC as an identifier. See also Standard Carrier Alpha Code.
carrier management system
A network management product that a communication common carrier provides to a customer; this product monitors and manages the telecommunication equipment that the communication common carrier provides for the customer's network.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
An arbitration protocol in which multiple stations access the network without explicit coordination, avoiding contention by checking for other signals (sensing the carrier) and deferring if a signal is already present. Should two signals collide, each station detects the collision and transmits again after a random amount of time.
See command and response token.
carton flow rack
Storage rack consisting of multiple lanes of gravity fed carton flow conveyors. The lanes are replenished from the rear. The material flows through the rack and is picked from the front.
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the act of physically removing a tape cartridge, usually under robot control, by placing it in an output station. The software logically removes the cartridge by deleting or updating the tape volume record in the tape configuration database (TCDB). For a manual tape library, cartridge eject is the logical removal of a tape cartridge from the manual tape library by deleting or updating the tape volume record in the TCDB.
For an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the process of logically adding a tape cartridge to the library by creating or updating the tape volume record in the tape configuration database (TCDB). The cartridge entry process includes the assignment of the cartridge to the scratch or private category in the library.
- See channel associated signaling.
- See China Association for Standards.
- See common analysis structure.
- See configuration auditing system.
- To connect in a series or in a succession of stages so that each stage derives from or acts upon the product of the preceding stage. For instance, network controllers might be cascaded in a succession of levels in order to concentrate many more lines than a single level permits.
- In AIX, to arrange in a series.
- An operation that propagates the exact same operation to all dependant objects.
- In certain printers, the layout of procedure windows on the operator console. Each new procedure window overlays the previous one, with only the previous window's title bar in view.
A transaction that spans nodes and is coordinated by Resource Recovery Services (RRS). cascaded multisystem transaction. A transaction that spans systems in a sysplex and is coordinated by Resource Recovery Services (RRS).
The process of deleting rows from a child table when the foreign key is deleted from the parent table. When any rows are deleted from the primary key column of a table, cascading deletes, if enabled, delete identical information from any foreign-key column in a related table.
A replication topology in which there are multiple tiers of servers. A peer/master server replicates to a small set of read-only servers which in turn replicate to other servers. Such a topology off-loads replication work from the master servers.
A resource that can be taken over by more than one node. A takeover priority is assigned to each configured cluster resource group on a per-node basis. In the event of a takeover, the node with the highest priority acquires the resource group. If that node is unavailable, the node with the next-highest priority acquires the resource group, and so on.
- A group of related activities that address a specific business situation. The user or predefined conditions, instead of a defined flow, determines the sequence in which activities are performed. See also business process definition, case type.
- A container that holds a specified quantity of identical items (SKU) as packaged by a vendor. Cases are identified by license plate number and are generally put away into storage, in their original condition until picked.
- The basic unit of analysis. In a data set based on a simple survey, a case generally corresponds to a respondent.
- The information that is contained within a database that pertains to a particular investigation.
See Computer Assisted Software Engineering.
See factory carton code.
- In Pascal, a value or range of values that comes before a statement in a CASE statement branch. When the selector is evaluated to the value of a CASE label, the statement following the case label is processed.
- The word case followed by a constant expression and a colon. When the selector is evaluated to the value of the constant expression, the statements following the case label are processed.
The definition of the activities that must be completed to address a specific type of business situation. For each activity, the case type specifies the document types that are required to support the activity, the user interface in the activity, and the teams that must complete the activity. Case types make up a case. See also case.
case weight (CW)
In cultural sorting, the combined weight value of case, subscripting, superscripting, fractions, and other factors. For example, the lowercase letter a precedes the uppercase letter A, and middle Arabic shapes precede final Arabic shapes. See also alphanumeric weight, diacritical weight, indifferent weight, level 3, mark weight, special weight.
A service that provides customers with the ability to receive cash in addition to the goods that they purchased in a store using an alternate payment method. The total amount of the transaction, which includes the cost of the purchased goods and the amount of the cash received, is debited from the customer's account. For example, a customer might charge $37 to their credit card for a $17 item in order to get that item and $20 back from the store.
See computer assisted self-interviewing.
A certificate that is signed using a key maintained by a certificate authority. Before issuing a certificate, the certificate authority evaluates a certificate requestor to determine that the requestor is the certificate holder referenced in the certificate.
See common analysis structure processor.
- A software component which supports a particular payment protocol.
- In cut-sheet printers, a removable container for a supply of paper.
- A database object and an operator for converting data from one data type to another. Built-in data types have built-in casts to compatible data types within database server. See also explicit cast, implicit cast, user-defined cast.
- In programming languages, an expression that converts the value of its operand to a specified type.
A function that is used to convert instances of a source data type into instances of a different target data type. In general, a cast function has the name of the target data type and has one single argument whose type is the source data type. Its return type is the target data type.
See Customer Premise Equipment Alerting Signal tone.
- To enter information about a data set or a library into a catalog.
- The highest level of the category hierarchy. All of the groupings that exist below the catalog are referred to as categories.
- See process library.
- A container that, depending on the container type, holds processes, data, resources, organizations, or reports in the project tree.
- A collection of services.
- A data set that contains information about other data sets.
- A repository for storing specifications for builds, reference structures, connections, and other components.
- A selection of wireless devices and plans that are configured in the application and made available for purchase.
- A container that stores items. An item can belong to only one catalog. Each catalog must be associated with at least one hierarchy, the primary hierarchy, and can be associated with one or more secondary hierarchies. See also item.
- A container for one or more offerings that a user can request.
- A collection of tables and views that contains descriptions of objects such as tables, views, and indexes.
- To specify the record class and file plan location when declaring a record.
- A collection of apps.
- A directory of files and libraries, with reference to their locations.
A catalog entry, either a user catalog entry or a catalog connector entry, in the master catalog that points to a user catalog's volume (that is, it contains the volume serial number of the direct access volume that contains the user catalog).
An object in an online catalog. An entry has a name, description, list price, and other details. The entry can be as simple as a SKU; it may also be a product that is automatically broken down into its component items such as a bundle or package. See also list price.
A filter that controls product entitlement by dividing catalogs into subsets as defined by the business owner. Catalog filters can also be used as one of the price rules conditions when determining the prices for the set of catalog entries that a set of customers are entitled to.
See catalog partition.
In a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server. The catalog partition for a database is automatically created on the database partition server where the CREATE DATABASE command is run.
catalog recovery area (CRA)
An entry-sequenced data set (ESDS) that exists on each volume owned by a recoverable catalog, including the volume on which the catalog resides. The CRA contains copies of the catalog's records and can be used to recover a damaged catalog.
A table that is automatically created in the DB2 database catalog when a database is created. Catalog tables contain information about a database and its objects. See also catalog view.
- In DB2 for Linux, UNIX, and Windows, a SYSCAT or SYSSTAT view on the catalog table.
- One of a set of views automatically created when a database is created. Catalog views contain information about the database and the objects in that database. Examples of information about the database are definitions of database objects and information about the authority that users have on these objects. See also catalog table.
A block associated with a try block that receives control when an exception matching its argument is thrown. See also try block.
A server that service personnel use to collect and retain status data that other machines, such as the TotalStorage Enterprise Storage Server (ESS), send to it. See also catcher telephone number.
catcher telephone number
The telephone number that connects the ESS to the support-catcher server and enables the ESS to receive a trace or dump package. See also catcher, Remote Technical Assistance and Information Network.
catching message intermediate event
An intermediate event that is triggered when a specific message is received. See also intermediate event.
A local mount that z/OS UNIX automatically issues to every other system's physical file system that is running sysplex-aware for that mode (read-write or read-only) when a file system mount is successful on a system in a shared file system environment.
In an RSR environment, the process by which tracked log data is used to make all recoverable resources (for example, shadow databases) current with those resources on the active IMS.
In high availability disaster recovery, a state in which the standby database might not have applied all logged operations that occurred on the primary database. In this state, the standby database retrieves and applies previously generated log data to synchronize with the primary database. There are two types of catchup states: local and remote.
A variable that has a limited number of distinct values or categories, such as a variable that is based on a question that has a predefined set of answers. Categorical variables can be single response or multiple response.
- A classification of elements for documentation or analyses.
- A property that is set on an element of the business object model (BOM) and can be applied to business classes and filtered in business rules. This property allows the user to specify whether a business class and its members are visible in a rule.
- One possible answer in a set of answers that are defined in the category list of a categorical or grid question.
- A group within a system of classification whose contents share similar properties. See also category page.
- A set of catalog items in a number of different hierarchical and searchable groupings.
- A container that groups a set of related records within a file plan.
- A container used in a structure diagram to group elements based on a shared attribute or quality.
- An optional grouping of messages that are related in some way. For example, messages that relate to a particular application might be included in a single category. See also message.
- A word, phrase, or number used to group documents in a view.
- A type class that is used to organize types in a type tree in the Type Designer. Categories organize types that have common properties.
- A closed-ended response to a question or item in a shared list.
- A set of items that are grouped according to a specific description or classification. Categories can be different levels of information within a dimension. See also member.
- A classification of an item. Hierarchies are made up of categories and items. Items in a catalog can be associated to one or more categories from the specifications of the catalog. Items can also be unassigned, which is their default state, which means they are not in any category yet. Every hierarchy has exactly one root category. Every category can have any number of additional categories within it, called sub-categories. See also container, hierarchy.
- A logical subset of volumes in a tape library. A category can be assigned by the library manager (for example, the insert category) or by the software (such as, the private or scratch categories).
- The recommended security specifications needed for both the CICS transaction definitions and the corresponding RACF profiles.
- A word or phrase that classifies and organizes terms in the business glossary. A category can contain other categories, and it can also contain terms. In addition, a category can reference terms that it does not contain. See also business glossary.
category 1 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are never associated with a terminal: that is, they are for CICS internal use only and should not be invoked from a user terminal. For this reason, CICS does not perform any security checks when it initiates transactions in this category for its own use.
category 2 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either initiated by the terminal user or are associated with a terminal. You should restrict authorization to initiate these transactions to user IDs belonging to specific RACF groups.
category 3 transaction
A set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either invoked by the terminal user or associated with a terminal. All CICS users, whether they are signed on or not, require access to transactions in this category. For this reason, they are exempt from any security checks and CICS permits any terminal user to initiate these transactions. Examples of category 3 transactions are CESN and CESF, to sign on and off, respectively.
An attribute instance on a category. The attribute is defined in the specification of the owning hierarchy or by a secondary specification associated to that category. See also attribute instance.
A value that uniquely identifies every category within a dimension. See also member unique name.
An additional field that is created by a buyer user to gather more information about categories and items. A category property is specific to the category for which it is created and applies only to items of that category.
A list of predefined answers that are in a categorical or grid question. The respondent selects the answers to the question from this list. For example, a list of brand names is a category list.
A defined role in WebSphere Commerce that manages the category hierarchy by creating, modifying, and deleting categories. The category hierarchy organizes products or services offered by the store. The category manager also manages products, expected inventory records, vendor information, inventory, and return reasons.
A web page in an online store that displays product categories. Category pages connect customers to child category pages or to products that belong to the selected category. See also category, child category.
The answer portion of categorical, grid, and numeric grid Looks. The category replication controls which category rows in a Look are repeated when the Look is applied to a question.
A subset of the categories in a dimension, either from a single level or from different levels in the same dimension. See also set.
category-specific item attribute
An attribute instance that applies to an item because of the presence of that item in a given category. A secondary specification with additional attributes is applied to that category, and all items in that category gain those extra fields. See also attribute instance.
See computer assisted telephone interviewing.
See cipher block chaining.
See component-based development.
See control blocks in common.
See Class Broker for Java.
See Custom-built Product Delivery Option.
See composite business service.
See computerized branch exchange.
See change control.
See Common Cryptographic Architecture.
See C/370 common anchor area.
See concurrent copy-compatible snapshot.
See client channel definition table.
See consistent-change-data table.
See custom card identification number.
See common communication layer.
See change and configuration management.
See Clinical Context Object Workgroup.
See Configuration Control Program.
See channel command retry.
- See Common Communications Support.
- See coded character set.
- See console communication service.
- See common channel signaling.
See coded character set identifier.
See coded character set identifier 65534.
See coded character set identifier 65535.
See closed-circuit television.
See central control unit.
See channel command word.
See channel definition file.
See Channel Data Link Control protocol.
See Channel Data Link Control protocol.
See Common Data Link Interface.
See Case Data Model.
See code division multiple access.
See Commercial Data Masking Facility.
See cross-domain network manager session.
See cellular digital packet data.
See compact disc recordable.
See CD-ROM file system.
See cross-domain resource manager.
See compact-disc read-only memory.
See cross-domain resource.
- See control data set.
- See couple data set.
- See central directory server.
- See Cell Directory Service.
See CICS dynamic storage area.
See case data source component.
See CDS control program.
See connect data set to line.
See change-data table.
See conditional end bracket.
See central electronics complex.
See country extended code page.
A dump of the run-time environment for Language Environment and the member language libraries. Sections of the dump are selectively included, depending on options specified on the dump invocation. This is not a dump of the full address space, but a dump of storage and control blocks that Language Environment and its members control.
See Common Event Infrastructure.
See Command Execution Language.
- A logical grouping of users, computers, data, and other resources that share either a common purpose or a common level of trust.
- One or more processes that each host runtime components. Each has one or more named core groups.
- A single cartridge location within an Automated Tape Library Dataserver (ATLDS). See also rack number, slot.
- The rectangular juncture of a horizontal row and a vertical column. Examples include the cells of an electronic spreadsheet and the cells utilized by an XmRowColumn widget in an AIXwindows graphic interface.
- In a multidimensional clustering table, a unique combination of dimension values. Physically, a cell is made up of blocks of pages whose records all share the same values for each dimension column.
- In mobile computing, an area of radio coverage that is transmitted from a base station. See also base station, radio.
- In asynchronous transfer mode (ATM), a medium access control (MAC) protocol data unit (PDU) of fixed size.
- A group of managed processes that are federated to the same deployment manager and can include high-availability core groups.
- In a WebSphere Application Server distributed network, an arbitrary, logical grouping of one or more nodes that are managed together.
- A group of WebSphere Application Server nodes in a single administrative domain that is controlled by a deployment manager application.
Cell Directory Service (CDS)
A Distributed Computing Environment (DCE) component that manages a database of information about the resources within a cell. See also Global Directory Service.
A portable telephone that operates on a cellular radio network instead of a traditional wired network over a fiber optic network or the Internet. See also mobile phone.
See local name.
See base station.
cellular digital packet data (CDPD)
A standard for transmitting data over a cellular network that places the data in digital electronic envelopes and sends it at high speed through underused radio channels or during pauses in cellular phone conversations. See also packet switching.
See Central Europe, Middle East, and Africa.
central control unit (CCU)
The communication controller hardware unit that contains the circuits and data flow paths needed to execute instructions and to control controller storage and the attached adapters.
central data warehouse
The component of Tivoli Enterprise Data Warehouse that contains the cleansed historical data. Data in the central data warehouse is derived from operational data, although operational data is not stored directly in the central data warehouse.
central data warehouse ETL
In Tivoli Enterprise Data Warehouse, the extract, transform, and load (ETL) process that reads the data from the operational data stores of the application that collects it (for example, a log file, a Tivoli Inventory repository, or a Tivoli Enterprise Console database), verifies the data, makes the data conform to the Tivoli Enterprise Data Warehouse schema, and places the data into the central data warehouse. See also data mart ETL.
central directory server (CDS)
A network node that provides a repository for information on network resource locations. It also reduces the number of network searches by providing a focal point for queries and broadcast searches, and by storing the results of network searches to avoid later broadcasts for the same information.
central electronic complex
See central processor complex.
central electronics complex (CEC)
See central processor complex.
Central Europe, Middle East, and Africa (CEMA)
For organizational, legal, or administrative purposes, the region comprising Bulgaria, Croatia, Czech Republic, Egypt, Hungary, Pakistan, Poland, Romania, Russia, Serbia and Montenegro, Slovakia, Slovenia, and IBM Middle East. See also Northeast Europe.
Central File Management (CFM)
A central location that receives files for translation from development and, using Translation Workbench (TWB), creates project folders, performs English-to-English word count, and helps identify the appropriate TM translation memories.
The relative importance of one entity compared to other entities in social network analysis, as determined by its relationships. See also authority, betweenness, closeness, degree, eigenvector, hub, social network analysis.
A type of control in which in which all the primary station functions of the data link are centralized in one data station. See also independent control.
centralized directory service
In OSI, a method of organizing directory services so that one node provides directory service for other nodes. OSI Communications Subsystem supports only centralized directory service.
central office (CO)
A telephone switching system that connects customer-premise business and subscriber lines to other customer lines or trunks, both locally or remotely. A central office is located on the edge of the telephone service provider's network, rather than on a customer's premises.
A server's database that logs requests for licenses, upgrades for licenses, and journals all license activity in a tamper-proof auditable file. The central registry is a component of the License Use Management network topology.
A function that permits an administrator to schedule client operations and administrative commands. The operations can be scheduled to occur periodically or on a specific date. See also administrative command schedule, client schedule.
In a network of systems, the system licensed to receive program temporary fixes (PTFs) and distribution media from IBM. This system is also used to provide problem handling support to other systems in a network. In a distributed data processing network, the central site is usually defined as the focal point in a communications network for alerts, application design, and remote system management tasks such as problem management.
central site control facility (CSCF)
In Tivoli NetView for OS/390, NetView for VM, and NetView for VSE, a function that allows a network operator to run the test facilities of the IBM 3172 Nways Interconnect Controller and the IBM 3174 Establishment Controller remotely from the NetView console.
Storage that is an integral part of the processor unit. Central storage includes both main storage and the hardware system area. UNIX-experienced users refer to central storage as memory.
See complex event processing.
- See Conference Europeenne des Administrations des Postes et Telecommunications.
- See Commission of European Post and Telegraph.
See CERT Coordination Center.
CERT Coordination Center (CERT/CC)
A major reporting center for Internet security problems. Staff members provide technical advice and coordinate responses to security compromises, identify trends in intruder activity, work with other security experts to identify solutions to security problems, and disseminate information to the broad community. The CERT/CC also analyzes product vulnerabilities, publishes technical documents, and presents training courses.
In computer security, a digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. A certificate is issued by a certificate authority and is digitally signed by that authority. See also certificate authority, certificate signing request, SSL server authentication.
- A component that issues certificates to each computer on which components are installed.
- A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also certificate, Globus certificate service, intermediate certificate, Secure Sockets Layer, SSL server authentication, trusted root.
- A digital certificate that is issued by a certificate authority. The CA verifies trusted certificates for trusted roots.
- In computer security, a digital document that identifies an organization that issues certificates. See also digital certificate.
certificate name filter
A general resource profile that maps multiple user IDs to a digital certificate in order to simplify administration of certificates, conserve storage space in the RACF database, maintain accountability, or maintain access control granularity.
certificate revocation list (CRL)
A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.
certificate signing request (CSR)
An electronic message that an organization sends to a certificate authority (CA) to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key. See also certificate, keystore.
- A collection of certificates.
- The Windows name for a key repository.
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.
certifier ID file
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.
See connection event sequence.
CF cache structure
See coupling facility cache structure.
See combined function IOP.
See command function key.
CF lock structure
See coupling facility lock structure.
See coupling facility resource management.
See coupling facility resource management policy.
See continuous-forms stacker.
See coded graphic character set global identifier.
See Common Gateway Interface.
See CGI script.
A computer program that runs on a web server and uses the Common Gateway Interface (CGI) to perform tasks that are not usually done by a web server (for example, database access and form processing).
See Computer Graphics Metafile.
See character generator utility.
- A group of logically linked records that are transferred over a communications line.
- A set of enclosures that are attached to provide redundant access to the drives inside the enclosures. Each control enclosure can have one or more chains.
- In RPG, an operation code that reads input records identified by specified relative record numbers or keys.
- A group of request units delimited by begin-chain and end-chain. Responses are always single-unit chains.
- The name of a channel framework connection that contains an endpoint definition.
- In DFU, a way to change from one display format to another after the user signals that the first display format was completed.
In CICS intercommunication, a grouping of one or more request units to satisfy a single request. Instead of an input request being satisfied by one RU at a time until the chain is complete, the whole chain is assembled and sent to the CICS application satisfying just one request. This ensures that the integrity of the whole chain is known before it is presented to the application program.
An order that must finish its fulfillment process before its parent order can be considered fulfilled. An order is chained when a parent order must communicate some portion of the order fulfillment execution to a third party.
- A method of storing records in which each record belongs to a list or group of records and has a linking field for tracing the chain.
- In the Distributed Computing Environment (DCE), a mode of interaction optionally used by a directory system agent (DSA) that cannot perform an operation by itself. The DSA chains by invoking the operation in another DSA and then relaying the outcome to the original requester.
A client-side component that issues a sequence of challenges on the server side and responds on the client side. See also authenticator.
Challenge Handshake Authentication Protocol (CHAP)
An authentication protocol that protects against eavesdropping by encrypting the user name and password. See also Password Authentication Protocol.
An authentication method that requires users to respond to a prompt by providing information to verify their identity when they log in to the system. For example, when users forget their password, they are prompted (challenged) with a question to which they must provide an answer (response) in order to either receive a new password or receive a hint for specifying the correct password.
- An artifact that represents a generalized notion of a development work product, such as a task, defect report, or enhancement request. See also initiative.
- A function or mode that enables a user to modify a specified character string in previously entered text.
- The process of merging log data sets and reducing the information they contain to the minimum required to perform recovery on a particular database or group of databases.
- The process of creating a compacted version of one or more IMS log data sets by eliminating records not related to recovery, and by merging multiple changes to a single segment into a single change.
change aggregate table
In SQL replication, a type of replication target table that contains data aggregations that are based on the contents of a CD table. See also base aggregate table.
change and configuration management (CCM)
A systematic approach to establish and maintain the consistent performance of a system or product throughout its lifecycle, and to effectively manage changes in that product or system.
An object authority that allows a user to perform all operations on the object except those limited to the owner or controlled by object existence authority, object management authority, object alter authority, and object reference authority. The user can add, change, and delete entries in an object, or read the contents of an entry in the object. Change authority combines object operational authority and all the data authorities.
- A character used in the left margin to indicate that a document line is changed.
- An indicator that displays when an object was last changed.
The process of capturing changes that are made to a replication source table and applying them to a replication target table. See also full refresh.
change control client
A workstation that (a) receives software and data files from its change control server and (b) installs and removes software and data files as instructed by its change control server. See also change control single node.
change control server
A system that controls and tracks the distribution of software and data files to other workstations. See also change control single node.
change control single node
A workstation that controls, tracks, installs, and removes software and data files for itself. A CC single node can also prepare software for distribution. See also change control client, change control server.
change-data table (CD table)
In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. See also synchpoint.
In SNA, a data flow control protocol in which the sending logical unit (LU) stops sending normal-flow requests, signals this fact to the receiving LU using the change-direction indicator (in the request header of the last request of the last chain), and prepares to receive requests.
changed subfile record
A subfile record into which the work station user has entered data, or a subfile record for which a write or change operation was issued with the DDS keyword SFLNXTCHG or DSPATR(MDT) in effect.
change implementation schedule
A view in change management that shows the start and end dates for changes to selected configuration items in the environment, the RFC that defines the change, and other details.
- For directory shadowing, a record of changes made to directory entries, departments, and locations for the purpose of sending only the updates and not the entire directory to collecting systems.
- The area of the checkpoint data set that contains the specific control blocks changed by the last member of the multi-access spool configuration to own the checkpoint data set.
A relationship between two artifacts. A change to either artifact affects the relationship. See also suspect relationship state.
- The process of controlling and tracking modifications to artifacts.
- The process of planning (for example, scheduling) and controlling (for example, distributing, installing, and tracking) software changes over a network.
- The process of planning for and executing changes to configuration items in the information technology environment. The primary objective of change management is to enable beneficial changes to be made with minimum disruption to services.
- A record of the changes made during the course of a contract or project execution.
- An update to a purchase order that is already approved or printed and that changes information such as quantity or vendor.
A recorded instance that is created with each write action to the repository. The change record contains metadata about all repository changes (such as who was responsible for a commit action) and can be used as a version history view of the repository.
- In System Manager, an instance of a change request description that has been submitted to run or is running. A change request is uniquely identified by the change request name and a sequence number.
- A request to change some aspect of the project, project plan, activity definition, or document.
- A small, independent unit of work into which each change project is divided.
- A request created in the Telecom Portal application to replace a device, or change a rate plan.
- A request from a stakeholder to change an artifact or process. See also defect, enhancement request.
change request description (CRQD)
An i5/OS object that describes a change to be made to the computing environment. The object, which is maintained only at the central site system or systems, consists of a list of activities that describe the steps needed to make the change.
- A group of related changes to artifacts in a workspace or stream.
- A list of versions of elements that are associated with a Unified Change Management (UCM) activity.
- A cohesive unit consisting of a number of related changes that need to be made together.
- A collection of test environment properties that describes a delivery platform in your test effort.
- A communication path through a chain to an endpoint.
- In mainframe computing, the part of a channel subsystem that manages a single I/O interface between a channel subsystem and a set of control units.
- A WebSphere MQ object that defines a communication link between two queue managers (message channel) or between a client and a queue manager (MQI channel). See also message channel, MQI channel, queue manager.
- The means of distribution of a company's products. Examples are e-commerce and physical stores.
- A link along which signals can be sent, such as the channel that handles the transfer of data between processor storage and local peripheral equipment. See also trunk.
- A specialized web application within a portal to which a user can subscribe.
A business function that can be issued on a channel. Channel actions are role specific and an authorization policy makes it possible to control which role can perform which action in a channel.
channel associated signaling (CAS)
A method of communicating telephony supervisory or line signaling (on-hook and off-hook) and address signaling on T1 and E1 digital links. See also common channel signaling.
- Pertaining to devices attached to a controlling unit by cables, rather than by telecommunication lines. See also link-attached.
- Pertaining to the attachment of devices directly by input/output channels to a host processor.
channel-attachment major node
A major node that may include minor nodes that are resources (host processors, NCPs, line groups, lines, SNA physical units and logical units, cluster controllers, and terminals) attached through a communication adapter.
A mechanism that ensures that the channel connection is established to the correct machine. In a channel callback, a sender channel calls back the original requester channel using the sender's definition.
channel control function (CCF)
A program to move messages from a transmission queue to a communication link, and from a communication link to a local queue, together with an operator panel interface to allow the setup and control of channels.
An event reporting conditions detected during channel operations, such as when a channel instance is started or stopped. Channel events are generated on the queue managers at both ends of the channel.
A System/390 I/O channel-to-control-unit interface that has an SNA network address. A channel link can be a subarea link, a peripheral link, a LEN link, or an APPN link. See also subarea link.
A defined role in WebSphere Commerce that manages the channel hub, as well as the distributors and resellers associated with that hub, including creating and importing distributor and reseller contracts.
- A number that identifies the path by which data is transferred between a particular input or output device and the processor of the computer.
- The identifying number assigned to a licensed channel on the T1 or E1 trunk that connects DirectTalk to the switch, channel bank, or channel service unit.
- In mainframe computing, the interconnection between a channel and its associated control units.
- A single interface attaching one or more control units.
- A value assigned to each installed channel path of the system that uniquely identifies that path to the system.
- In a channel subsystem, a value that is assigned to each installed channel path of the system that uniquely identifies that path to the system.
- The AIX process that executes the logic of the state table; each active caller session has one active channel process.
- In WebSphere Voice Server, the system process that manages call flow.
- A device used to connect a digital phone line to a multiplexer, a channel bank, or directly to another device producing a digital signal. A CSU performs certain line-conditioning and equalization functions, and responds to loopback commands sent from the central office (CO). See also data service unit.
- An American Telephone and Telegraph (AT&T) unit that is part of the AT&T nonswitched digital data system.
channel subsystem (CSS)
A collection of subchannels that directs the flow of information between I/O devices and main storage, relieves the processor of communication tasks, and performs path management functions.
In mainframe computing, the logical functions that a system requires to perform the function of a channel subsystem. With ESCON multiple image facility (EMIF), one channel-subsystem image exists in the channel subsystem for each logical partition (LPAR). Each image appears to be an independent channel-subsystem program, but all images share a common set of hardware facilities.
An iterative relaxation method that uses a combination of the Gauss-Seidel and Jacobi-Seidel methods. The array of discrete values is divided into subregions that can be operated on in parallel. The subregion boundaries are calculated using the Jacobi-Seidel method, while the subregion interiors are calculated using the Gauss-Seidel method. See also Gauss-Seidel.
- Any symbol that can be entered on a keyboard, printed, or displayed. For example, letters, numbers, and punctuation marks are all characters.
- A sequence of one or more bytes representing a single graphic symbol or control code.
- In bar codes, a single group of bars and spaces that represent an individual number, letter, punctuation mark, or other symbol.
- In a computer system, a member of a set of elements that is used for the representation, organization, or control of data. See also glyph.
A code that defines a single property of a character or characters; for example, extended color, character set, or extended highlighting. A character can have more than one defined character attribute.
- The area that completely contains the character pattern.
- The maximum area in which a symbol and all associated elements, such as a cursor, an underline, or space surrounding the symbol to separate it from other symbols, can be printed or displayed.
- The imaginary parallelogram whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a graphics display device.
- See character box.
- In the GDDM function, the imaginary box whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a work station.
- The physical width and height in pels of a font.
- An addressable location on a display surface or printing medium. The character cell defines the placement of characters with respect to preceding and following characters.
- As defined in ISO/IEC 10646, the place within a row at which an individual graphic character may be allocated.
- The maximum physical boundary of a single character. For example on the IBM 3800 Printing Subsystem, a cell is made up of 24 rows with total height of 4.23 mm and 18 bit positions having a total width of 2.54 mm.
A named set of characters sharing an attribute associated with the name of the class. The classes and the characters that they contain are dependent on the value of the LC_CTYPE category in the current locale.
- In System i Access, an ASCII or EBCDIC value assigned to the symbols or functions that are used by a computer.
- An element of a code page or a cell in a code table to which a character can be assigned. The element is associated with a binary value.
- In the C language, a character or an escape sequence enclosed in quotation marks.
- The actual character value (a symbol, quantity, or constant) in a source program that is itself data, instead of a reference to a field that contains the data. See also numeric constant.
- Data that has an associated coding representation that defines how to interpret each specific pattern of bits that are grouped into one or more bytes.
- Data in the form of letters and special characters, such as punctuation marks.
Character Data Representation Architecture (CDRA)
An IBM architecture that defines a set of identifiers, resources, services, and conventions to achieve consistent representation, processing, and interchange of graphic character data in heterogeneous environments.
character data representation identifier
A tag that is used to achieve data integrity. The Character Data Representation Architecture specifies that you should tag all character data as it flows through the system. You can tag using a short-form or a long-form identifier. A coded character set identifier (CCSID) is an example of a character data representation identifier.
In Graphic Object Content Architecture, an attribute controlling the direction in which a character string grows relative to the inline direction. Values are left-to-right, right-to-left, top-to-bottom, and bottom-to-top. See also escapement direction.
A display that uses a character generator to display predefined character boxes of images (characters) on the screen. This kind of display cannot address the screen any less than one character box at a time.
- A character set consisting of a code that pairs a sequence of characters from a given set with something else, such as a sequence of natural numbers, octets or electrical pulses. Encoding facilitates the storage and transmission of text through telecommunication networks.
- The mapping from a character (a letter of the alphabet) to a numeric value in a character code set. For example, the ASCII character code set encodes the letter "A" as 65, while the EBCIDIC character set encodes this letter as 43. The character code set contains encodings for all characters in one or more language alphabets.
character entity reference
A character string of the form � or &#dddd, where dddd is the hexadecimal or decimal equivalent of the Unicode code point of a character. For example, > and > are both character entity references to the > (greater-than) sign.
A character constant, a simple character variable, an element of a character array, a character-valued function reference, a substring reference, or a sequence of the above separated by the concatenation operator and parentheses.
An area that is reserved for information that can contain any of the characters in the character set. See also numeric field.
- In word processing, the way to generate visual characters and symbols for coded data.
- In computer graphics, a function that converts the coded representation of a graphic character into the shape of the character for display or print.
- The visual representation of a character, defined by toned or untoned picture elements. See also graphic character, graphic character.
- An image that is composed of symbols printed in a monospace font. Some symbols are standalone; others are intended for assembling larger figures.
In Business Graphics Utility, an invisible network of uniformly spaced horizontal and vertical lines covering the chart area. Used by the Business Graphics Utility to determine the physical dimensions of the chart and the placement of the data on it.
See character identifier.
- On a system, a 4-byte binary value. The value is a concatenation of the graphic character set global identifier followed by the code page global identifier. For example, the character identifier for German (feature 2929) is 00697 00273.
- The standard identifier for a character, regardless of its style. For example, all uppercase A's have the same character identifier.
The distance from the character reference point to the character escapement point. Character increment is the sum of the A-space, B-space, and C-space. Usually the distance between the current print position and the next print position.
In a scaled font, an adjustment to character increment values. The adjustment value is derived from the kerning track values for the font used to present the characters.
A user-defined trait or property that is associated with an identity that is not commonly expressed as a name, number, address, or email. This attribute allows users to extend the product by defining customizable entity attributes that are meaningful to their data sources. See also attribute, identity.
- A data type whose value is a sequence of characters (single byte, multibyte, or both) that can range in size from 0 bytes to 2 gigabytes less 1 byte. In general, the CLOB data type is used whenever a character string might exceed the limits of the VARCHAR data type. See also large object.
- A character string that contains single-byte characters with an associated code page.
Measurement information that defines an individual character value such as height, width, or space. Character metrics may be expressed in specific fixed units, such as pels, or in relative units that are independent of both the resolution and size of the font. Often included as part of the general term font metrics. See also character set metric.
See character identifier.
See character raster pattern.
In architecture, information that the printer needs to separate font raster patterns. Each character pattern descriptor is 8 bytes long and specifies both the character box size and an offset value.
In architecture, the acceptable amount of variation in the appearance of a character on a physical medium from a specified ideal appearance, including no acceptable variation. Examples of appearance characteristics that can vary for a character are shape and position.
A device that prints a single character at a time. See also line printer.
Any detail about how a character is printed relative to the other characters around it. Character properties are box size, horizontal and vertical character cell size, character ID, center line, baseline, left space, right space, above space, and below space.
- The point along the character baseline within the character box that coincides with the current print position.
- The point that corresponds to the origin of the character coordinate system. The character reference point coincides with the presentation position when the character is formed in the presentation process. See also current print position.
The alignment of a character with respect to its character baseline, measured in degrees in a clockwise direction. See also orientation.
- A list of characters (letters, numbers, and symbols such as #, $, and &) that are recognized by computer hardware and software.
- A set of binary codes that represent specific text characters.
- A defined set of characters with no coded representation assumed that can be recognized by a configured hardware or software system. A character set can be defined by alphabet, language, script, or any combination of these items.
character set identifier 65534
The character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 ( FFFE ) is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs tagged for each individual field it contains. If the file is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.
character set metric
One of the measurements used to describe a characteristic of the all the characters in that font. Examples are height, width, and character increment for each character of the font. See also character metric, font metric, relative metrics.
See character increment.
character special file
An interface file that provides access to an input or output device, which uses character I/0 instead of block I/0. See also block special file.
- A contiguous sequence of characters that are treated as a unit.
- A contiguous sequence of characters terminated by and including the first null byte.
- A sequence of bytes that represents bit data, single-byte characters, or a mixture of single-byte and multibyte characters.
In CCP, the maximum number of times that the temporary text delay character can (a) be sent to a terminal before the operation stops; or (b) be sent between the end of a receive operation and the beginning of a transmit operation.
In international character support, the dd command and various conversion subroutines that translate between extended characters and ASCII escape strings to preserve unique character information.
- Character data with a value that is assigned or changed while the program is running.
- In the C language, a data object having a value that can be changed while a program is running and having a data type that is a signed or unsigned character.
A label, which is often tied to an algorithm or set of rules, that is not guaranteed to be unique, but is used to identify and distinguish a specific charge-back item or charge-back entity from others.
The sequence in which Sterling Selling and Fulfillment Foundation creates authorization or charge requests. For example, the charge sequence might specify that gift certificates are to be used before a credit card is charged.
- A picture defined in terms of graphics primitives and graphics attributes.
- A visual representation of real-world objects, such as organizations, people, events, or locations, and the relationships between them.
In Business Graphics Utility, an object containing chart characteristics, such as the chart type, chart heading, legend position, and so on. The chart format does not include the data values to be plotted. The system-recognized identifier for the object type is *CHTFMT.
A definition that describes how item data behaves when it is visualized on a chart. For example, how data is copied into chart item properties, the chart template and labeling scheme to use, and whether to display attributes and pictures. See also chart template.
A characteristic of a chart, such as its summary description, time zone, grid size, background color, or merge and paste rules. Chart properties are saved with the chart. See also chart template.
chassis detect-and-deploy profile
A profile that IBM Director automatically applies to all new BladeCenter chassis when they are discovered. The profile settings include management module name, network protocols, and static IP addresses. If Remote Deployment Manager (RDM) is installed on the management server, the chassis detect-and-deploy profile also can include deployment policies.
- A process for determining accuracy.
- In printers, an action message that instructs the printer operator to inspect a component. For example, the CHECK TONER COLLECTOR message means that the operator should look at the toner-collector bottle and make sure that it is physically present, in the proper place, and correctly installed.
- A periodic inspection of an aircraft after a specified amount of time in service.
- To look for a condition.
A square box with associated text that represents a choice. When a user selects the choice, the check box is filled to indicate that the choice is selected. The user can clear the check box by selecting the choice again, thereby deselecting the choice.
A user-defined constraint that specifies the values that specific columns of a base table can contain. See also constraint.
- A check key consisting of a single digit.
- The far right number of a self-check field that is used to verify the accuracy of the field.
A copy of a file that corresponds to a version of an element. See also version.
- In certain software configuration management (SCM) systems, to copy files back into the repository after changing them.
- To upload the language of a checked out draft authored/received contract or amendment contract into the application.
- To replace an inactive document, project WBS element, scope element, requirement or resource record (with its modifications) to its repository directory so that others can view it or modify it.
- To save local changes in a change set that is part of a repository workspace. A checked-in change set can later be shared with a team by delivering the change set.
The screen identifying the host screen that should be active for a connection to be considered ready to be returned to the connection pool. If the application is not on the screen specified by the check-in screen, the connection will be discarded or recycled in attempt to return the connection to the host screen specified by the check-in screen. The check-in screen is only meaningful if connection pooling is specified for a connection.
- To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may check out the same element at a time.
- To download the language of a draft authored/received contract or amendment contract from the application to modify it.
- In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified. See also reservation version status.
- A state that occurs when data for a constraint cannot be verified as valid. A constraint could be either a referential constraint or a check constraint.
- In DB2 for z/OS, a state into which a table can be put where only limited activity is allowed on the table and constraints are not checked when the table is updated. See also set integrity pending.
- A point at which the database manager records internal status information in the log; the recovery process uses this information if the subsystem abnormally terminates.
- A compressed file that contains configuration data from a specific point in time.
- A place in a program at which a check is made, or at which a recording of data is made to allow the program to be restarted in case of interruption.
The algorithm that determines when to commit all global transactions for the job steps in a batch application. See also results algorithm.
The periodic copying of processing information to the checkpoint data set. Checkpointing ensures that information about in-storage job and output queues is not lost in the event of a hardware or software error.
The process of resuming a job at a checkpoint within the job step that caused abnormal termination. The restart can be automatic or deferred. A deferred restart requires that the job be resubmitted. See also automatic restart, deferred restart, step restart.
A facility for restarting execution of a program at some point other than at the beginning, after the program was terminated due to a program or system failure. A restart can begin at a checkpoint or from the beginning of a job step, and uses checkpoint records to reinitialize the system.
In OSI X.400, the maximum amount of data (in units of 1024 bytes) that can be sent between two minor synchronization points. The checkpoint size is used by the X.400 reliable transfer server.
- On a diskette, data written in a section for error detection purposes.
- A small piece of data that is derived from an arbitrary block of digital data for the purpose of detecting errors that might have been introduced during its transmission or storage.
- The sum of a group of data that is associated with another group of data and that is used for error detection.
- A function that protects data stored in an auxiliary storage pool from being lost because of the failure of a single disk. When checksum protection is in effect and a disk failure occurs, the system automatically reconstructs the data when the system program is loaded after the device is repaired. See also device parity protection, mirrored protection.
- In TCP/IP, the sum of a group of data associated with the group and used for error checking purposes.
In agile development, the peripheral participants in scrum development. This includes the product manager, testers, customers, customer advocates, and other stakeholders. See also pig role, scrum.
- A node that is subordinate to another node in a tree structure. Only the root node is not a child.
- In a hierarchy or auto-level hierarchy, a member that has at least one parent.
- In a generalization relationship, the specialization of another element, the parent.
- Pertaining to a secured resource, either a file or library, that uses the user list of a parent resource. See also parent.
An activity that is launched during the processing of another activity, which becomes the parent activity. See also parent activity.
A class that inherits instance methods, attributes, and instance variables directly from the parent class (also known as the base class or superclass), or indirectly from an ancestor class.
A list of columns in a child table that relate to corresponding columns in a parent table. See also parent expression.
In explicit hierarchical locking, a lock that is held on a table, a page, a row, or a large object. Each child lock has a parent lock. See also parent lock.
A node within the scope of another node. See also parent node.
For subscriptions or recurring orders, the subordinate to the parent order. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues. See also parent order.
child resource group
A resource group that depends on certain application services that a parent resource group provides. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also dependent resource groups, parent resource group.
A table that has a referential constraint to a column in a different table; the referenced table is called a parent table. See also parent table.
In AIXwindows and Enhanced X-Windows, a widget that is managed by another widget, the parent. For example, Composite widgets typically manage the Primitive children widgets attached to them.
A window that appears within the border of its parent window (either a primary window or another child window). When the parent window is resized, moved, or destroyed, the child window also is resized, moved, or destroyed. However, the child window can be moved or resized independently from the parent window, within the boundaries of the parent window.
One of the Chinese characters that represent numbers. For example, the Chinese characters for 1, 2, and 3 are written with one, two, and three horizontal brush strokes, respectively. See also Arabic numeral, Hindi numeral, number, Roman numeral.
A test statistic used to indicate the probability that two fields are unrelated, in which case any differences between observed and expected frequencies are the result of chance alone. If this probability is very small (typically less than 5%) the relationship between the two fields is said to be significant.
Chi-squared Automatic Interaction Detector algorithm (CHAID)
A decision tree algorithm that uses chi-square statistics to identify optimal splits. Unlike the C & R tree and QUEST nodes, CHAID can generate nonbinary trees, meaning that some splits have more than two branches. See also decision tree algorithm, regression tree algorithm.
One of three types of complex BPML activities. A choice activity is used to make decisions in the business process model and runs only one of the child activities it contains. The choice activity makes it possible to model branch processing.
A point that is set automatically by CP Optimizer as it executes a goal during the search for a solution. At the choice point, the engine records the current state of constraints, variables, and domains, along with other goals not yet executed. If execution of the goal leads to failure, CP Optimizer backtracks to the choice point, restores the state recorded, and tries one of the stored goals.
A group type with a subclass equal to choice that is used to define a selection from a set of components. A choice type defines a choice group, which is valid when the data matches one of the components in the choice group.
- An ordered sequence of message exchanges between two or more participants. In a choreography there is no central controller, responsible entity, or observer of the process.
- An agreed upon sequence of business events that is allowed by a seller for each transaction.
See channel process.
See channel-path identifier.
See Simplified Chinese.
See Traditional Chinese.
See Compact Hypertext Markup Language.
- A group of archived business processes.
- A data storage location. For example, a raw disk device or a cooked file.
See business transaction services.
A set of XML files that defines or references the resources for a component of an application or a whole application, or another artifact relating to applications, such as a policy. A CICS bundle is installed in a CICS region. Multiple CICS bundles can be referenced by a management bundle. See also bundle, management bundle.
CICS dynamic storage area (CDSA)
A storage area allocated from CICS-key storage below the 16 MB line. The CDSA is used for all non-reentrant CICS-key RMODE(24) programs, all CICS-key task-lifetime storage in 24-bit storage, and CICS control blocks that reside in 24-bit storage.
CICS EJB server
One or more CICS regions that support enterprise beans. A logical CICS EJB server typically consists of multiple (cloned) CICS listener regions and multiple (cloned) CICS AORs. The listener regions and AORs may be combined into listener/AORs.
Storage protection key in which CICS is given control (key 8) when CICS storage protection is used. This key is for CICS code and control blocks. CICS-key storage can be accessed and modified by CICS. Application programs in user-key cannot modify CICS-key storage, but they can read it. CICS-key storage is obtained in MVS key-8 storage. See also user-key storage.
CICS-maintained data table
A type of CICS data table, for which CICS automatically maintains consistency between the table and its source data set. All changes to the data table are reflected in the source data set and all changes to the source data set are reflected in the data table.
CICS monitoring facility
The CICS component responsible for monitoring and producing task-related statistics information, such as task CPU usage and waits for I/O request units on an individual task basis. Reporting is divided into classes.
A set of CICS systems that are managed and manipulated as if they were a single entity. A CICSplex can be managed by CICSPlex SM. See also multiregion operation.
CICSPlex SM address space (CMAS)
A CICSPlex SM component that is responsible for managing CICSplexes. A CMAS provides the single-system image for a CICSplex by serving as the interface to other CICSplexes and external programs. There must be at least one CMAS in each MVS image on which you are running CICSPlex SM. A single CMAS can manage CICS systems within one or more CICSplexes.
CICS primary connection region
The web owning region (WOR) of the Multi-Region Option (MRO) connected regions in a CICS test environment. This is the region in which the CICS resource definition server for Application Deployment Manager runs.
CICS region user ID
The user ID assigned to a CICS region at CICS initialization. It is specified either in the RACF started procedures table when CICS is started as a started task, or on the USER parameter of the JOB statement when CICS is started as a job.
- The entire collection of hardware and software required by CICS.
- In CICSPlex SM topology, a definition referring to a CICS system that is to be managed by CICSPlex SM.
- In CICSPlex SM topology, the user-defined name, description, and content information for a CICS system group. A CICS system group can be made up of CICS systems or other CICS system groups.
- A set of CICS systems within a CICSplex that can be managed as a single entity.
- In CICS business transaction services (BTS), a BTS set, that is the set of CICS regions across which BTS processes and activities may execute.
CICS Transaction Affinities Utility
A utility designed to detect potential causes of inter-transaction affinity and transaction-system affinity for those users planning to use dynamic transaction routing.
CICS-value data area (CVDA)
An argument to which CICS has assigned a specific and limited set of meaningful values. When a CVDA is specified in an EXEC CICS command, CICS converts the CVDA value name to the corresponding numeric representation.
See control interval definition field.
An IBM-specified way to install and configure products on, or remove products from, remote workstations and hosts. Response files and redirected installation and configuration may be used by a CID-enabled product to eliminate or reduce user interaction with the CID-enabled product. See also response file.
See Classless Inter-Domain Routing.
See customer impact event.
See Common Internet File System.
CII data format
See Center for the Information of Industry data format.
See Common Information Model.
The code that consists of common building blocks that can be used instead of proprietary software or device-specific programming interfaces to manage devices that are compliant with the Common Information Model (CIM).
CIM object manager (CIMOM)
The common conceptual framework for data management that receives, validates, and authenticates the CIM requests from the client application. It then directs the requests to the appropriate component or service provider.
See CIM object manager.
See Common INET.
See control initiate.
See Chief Information Officer.
cipher block chaining (CBC)
A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted.
See cipher specification.
Data that is encrypted. Ciphertext is unreadable until it is converted into plaintext (decrypted) with a key. See also cleartext.
- In fibre-channel technology, an established communication path between two ports, which consists of two virtual circuits capable of transmitting in opposite directions. See also link.
- One or more conductors through which an electric current can flow. See also link, packet switching.
- A telecommunication circuit such as a line, conductor, or conduit through which information is transmitted.
circuit-switched data transmission service
A service that uses circuit switching to establish and maintain a connection before data can be transferred between data terminal equipment (DTE). See also packet-switched data transmission service.
A process that, on demand, connects two or more data terminal equipment (DTEs) and permits the exclusive use of a data circuit between them until the connection is released. See also message switching, packet switching.
A layout in which entities are arranged by type around the circumference of a circle. See also layout.
A database log in which records are overwritten if they are no longer needed by an active database. See also archive log.
In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, the process of keeping all restart data in a ring of log files. See also linear logging.
circular traceability relationship
A relationship between a requirement and itself, or an indirect relationship that leads back to a previously traced-from node. Traceability relationships cannot have circular references.
See complex instruction set computer.
See chief information security officer.
See common interchange unit.
See count-key-data record.
- A request for reimbursement, replacement, or repair for an item or an asset that is under warranty.
- A notification to DB2 for z/OS that an object is being accessed. A claim prevents a drain from occurring until the claim is released, which usually occurs at a commit point. See also drain, logical claim.
- A description of a set of objects that share the same attributes, operations, methods, relationships, and semantics. A class can use a set of interfaces to specify collections of operations that it provides to its environment. See also interface.
- An attribute that is related to a transaction code and a message region that is used to determine scheduling. See also message class, region class.
- An object that contains specifications, such as priority, maximum processing time, and maximum storage, to control the run-time environment of a job. The system-recognized identifier for the object type is *CLS.
- A grouping of projects that has global properties. The properties are used to manage completed jobs, typically deleting them periodically or starting another job that performs specific cleanup tasks.
- In C++, a user-defined data type. A class data type can contain both data representations (data members) and functions (member functions).
- In the Distributed Computing Environment (DCE), a category into which objects are placed based on their purpose and internal structure.
- In RACF, a collection of defined entities (users, groups, and resources) with similar characteristics.
- A basic unit of the classification hierarchy used in the Type Designer. There are three classes: item, group, and category.
- A collection of processes (and their associated threads) that have a single set of resource limitation values and target shares applied to them.
- A section of a module. A class can represent program text, that is, the instructions and data that are loaded into virtual storage during execution. Other classes, such as an external symbol dictionary (ESD) and a relocation dictionary (RLD), are required for binding and loading the program.
- The set of all members of a type of object, such as all contracts, term definitions, organizations, and so on.
- A subdivision of a classification comprising of a group of suppliers that have common attributes or characteristics.
- In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.
- In printing, a single alphanumeric character assigned to a print job.
- The syntactic category for a group of related values. A value can be assigned to different classes in different contexts or scenarios. See also classification, classification, pattern, value.
- The definition of an object within a specific hierarchy. A class can have properties and methods and can serve as the target of an association.
See transport class 0.
- See transport class 2.
- Connectionless service between ports with notification of delivery or nondelivery.
In fibre-channel technology, connectionless service between ports without notification of delivery. Other than notification, the transmission and routing of class 3 frames is identical to that of class 2 frames.
See transport class 4.
A value in a class object that controls the processing of routing steps in a job. These values include the run priority, time slice, eligibility for purge, default wait time, maximum processing unit time, and maximum temporary storage parameters.
class authority (CLAUTH)
An attribute that allows a user to define RACF profiles in a class defined in the class descriptor table. A user can have class authority to zero or more classes. See also authority.
class binding signature
A hexadecimal value that contains the class signature (obtained from the signature bank) and the inheritance level. The class binding signature is added to the Interface Definition Language (IDL) source file by the signature emitter.
class B network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are set to 1 and 0, respectively, and the host ID occupies the two low-order octets.
Class Broker for Java (CBJ)
A Java tool that allows Java applications to run on a host system that does not have a graphical user interface (GUI). Because the IBM Developer Kit for Java Remote Abstract Window Toolkit is not recommended for complex graphics or highly interactive operations, CBJ for high-performance GUI services can be used.
class C network
In Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are both set to 1 and the next high-order bit is set to 0. The host ID occupies the low-order octet.
classic row compression
Data row compression that is provided by static, table-level compression dictionaries. See also adaptive compression.
- A process for automatically acquiring document properties from the document content or another source.
- The system that defines classes and the relationships among those classes. See also class.
- The process of grouping values into specific classes. See also class.
classification and regression tree algorithm
A decision tree algorithm that uses recursive partitioning to split the training records into segments by minimizing the impurity at each step. See also Quick, Unbiased, Efficient Statistical Tree algorithm.
The hierarchy of a type tree in the Type Designer. The deeper the subtype, the more specific the data characteristics are. See also compositional hierarchy.
See file plan.
- A specialized attribute used for grouping and color-coding process elements.
- In QoS, a control function that selects packets according to the content within the packet headers.
- An XPath expression that determines the transformation to apply to an inbound event.
Classless Inter-Domain Routing (CIDR)
A method for adding class C Internet Protocol (IP) addresses. The addresses are given to Internet Service Providers (ISPs) for use by their customers. CIDR addresses reduce the size of routing tables and make more IP addresses available within organizations.
Part of the Java virtual machine (JVM) that is responsible for finding and loading class files. A class loader affects the packaging of applications and the runtime behavior of packaged applications deployed on application servers.
- A method that creates class instances.
- In Java, a method that is called without referring to a particular object. Class methods affect the class as a whole, not a particular instance of the class. See also instance method.
- A unique identifier of a class type that becomes a reserved word within its scope.
- In the X Window System, the name of a class of resources, widgets, or clients. Resource and widget class names are typically defined in the programming libraries used to create the client.
In COBOL, a user-defined word defined in the SPECIAL-NAMES paragraph of the Environment Division that assigns a name to the proposition, for which a truth value can be defined, to verify that the content of a data item consists exclusively of those characters listed in the definition of the class-name.
- A set of characteristics (such as route security, transmission priority, and bandwidth) used to construct a route between session partners. The class of service is derived from a mode name specified by the initiator of a session.
- A VTAM term for a list of routes through a network, arranged in an order of preference for their use.
- In fibre-channel technology, a specified set of delivery characteristics and attributes for frame delivery.
- A set of link and node characteristics, associated with a session or a set of sessions, that determine the route that is selected for the sessions through an APPN network.
A database that is maintained independently by each network node, and optionally by APPN end nodes. The database contains one entry per class-of-service name. Each database entry contains: (a) A definition of the acceptable values for transmission group (TG) and node characteristics for routes described by that class-of-service name and the weight function to be used to compute the weights of nodes and TGs that meet the acceptable values; (b)The transmission priority to be used for traffic that flows on routes described by that class-of-service name.
A system object created for Advanced Peer-to-Peer Networking (APPN) support that provides the information required to assign relative priority to the transmission groups and intermediate routing nodes for an APPN session. The system-recognized identifier for the object type is *COSD.
The scope of C++ class members. See also namespace scope.
A hexadecimal value obtained from a server and placed in a signature bank on the workstation. The signature bank uniquely identifies an Interface Definition Language (IDL) interface. Class signatures are added to the IDL source file by the signature emitter.
Statistical information that includes information such as the number of instances of the class in the application, the CPU time spent in that class, the number of calls made to the class, and so on.
class template declaration
A class template declaration introduces the name of a class template and specifies its template parameter list. A class template declaration may optionally include a class template definition.
class template definition
A definition that describes various characteristics of the class types that are its specializations. These characteristics include the names and types of data members of specializations, the signatures and definitions of member functions, accessibility of members, and base classes. See also base class.
A change in an object's management class or storage class when an event occurs that brings about a change in an object's service level or management criteria. Class transition occurs during a storage management cycle.
- A set of conditions and variable expressions that represent specific layers in a protocol stack.
- A building block of the contract language that may contain legal language or line data.
- A set of consecutive character strings that specify a characteristic of an entry. There are three types of clauses: data, environment, and file.
- In SQL, a distinct part of a statement in the language structure, such as a SELECT clause or a WHERE clause.
- The fundamental grouping of REXX syntax. A clause is composed of zero or more blanks, a sequence of tokens, zero or more blanks, and the semicolon delimiter.
A template that contains the standard language of a clause and includes the legal language, terms, and other properties. See also template.
See class authority.
See Common Link Access to Workstation.
See communication line block.
See Common Locale Data Repository.
- To transform the data extracted from operational systems to make it usable by a data warehouse.
- To ensure that all values in a data set are consistent and correctly recorded.
In SNA products, a network services request, sent by a system services control point (SSCP) to a logical unit (LU), that causes a particular LU-LU session with that LU to be ended immediately without requiring the participation of either the other LU or its SSCP.
The time period during which a database record that has reached its final state or condition is to remain in the database. After the cleanup period expires for such a record, database cleanup causes the record to be deleted from the database.
A procedure that instructs the system to attempt to remove software products that were partially installed and to revert to the previous version of the product. If the system successfully reverts to the previous version, it becomes the currently active version; otherwise, the software product is marked as broken.
In character recognition, a specified area that is to be kept free of printing or any other markings not related to machine reading. See also intercharacter gap.
See cause code.
See plain text.
See diagnostic code.
clear indication packet
In X.25 communications, a call supervision packet that a data circuit-terminating equipment (DCE) transmits to inform a data terminal equipment (DTE) that a call has been cleared.
- A central registry that connects users from multiple instant messaging communities.
- In the Distributed Computing Environment (DCE), a collection of directory replicas on one Cell Directory Service (CDS) server. A clearinghouse takes the form of a database file. See also control access.
A string of characters sent over a network in readable form. It might be encoded for the purposes of compression, but it can easily be decoded. See also ciphertext.
clear to send (CTS)
In data communication, a signal raised by data circuit-terminating equipment (DCE) when it is ready to accept data, usually in response to request to send (RTS) being raised. See also request to send.
A record for which the matching process cannot definitively determine if the record is a duplicate record or a nonmatched record or if the record is a matched record or a nonmatched record. See also duplicate record, matched record, nonmatched record.
- In the DCE Cell Directory Service (CDS), a software component that receives CDS requests from a client application, ascertains an appropriate CDS server to process the requests, and returns the results of the requests to the client application.
- In the DCE Distributed Time Service (DTS), a software component that synchronizes the clock for its client system by requesting time values from servers, computing a new time from the values, and supplying the computed time to client applications.
The Macromedia LikeMinds Personalization Server component that accesses transaction information and generates recommendations based on users' shopping behavior as they navigate a website. WebSphere Commerce generates events based on shopping behavior, including viewing a product detail page and adding items to a shopping cart or wish list. These events are forwarded to the Clickstream Engine.
In web advertising, the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page. See also impression.
A method for implementing cooperative portlets, whereby users can click an icon on a source portlet to transfer data to one or more target portlets. See also cooperative portlets, wire.
- A person or organization that receives a deliverable or work product. See also interprocess communication.
- A software program or computer that requests services from a server. See also host, server.
- A runtime component that provides access to queuing services on a server for local user applications. The queues used by the applications reside on the server. See also WebSphere MQ fully managed .NET client, WebSphere MQ Java client, WebSphere MQ MQI client.
A service that serves the Java applet for the web client to web browsers. On Windows systems, the client acceptor is installed and run as a service. On AIX, UNIX, and Linux systems, the client acceptor is run as a daemon.
client acceptor daemon (CAD)
See client acceptor.
- An application written with object-oriented or Internet APIs to access content servers from Information Integrator for Content.
- A storage management program that initiates Common Information Model (CIM) requests to the CIM agent for the device.
- An application that users the services of the database services by direct connection or via application servers. See also client/server architecture.
- An application, running on a workstation and linked to a client, that gives the application access to queuing services on a server.
- An application written with the Content Manager APIs to customize a user interface.
- A user application, written in a supported programming language other than Java, that communicates directly with the Client daemon.
Client Application for Windows
A complete object management system provided with Content Manager and written with Content Manager APIs. It supports document and folder creation, storage, and presentation, processing, and access control.
client-connection channel type
The type of MQI channel definition associated with a WebSphere MQ client. See also server-connection channel type.
In the Distributed Computing Environment (DCE), the state within a Remote Procedure Call (RPC) server generated by a set of remote procedures and maintained across a series of calls for a particular client.
A daemon that manages network connections to CICS servers. It processes ECI, EPI, and ESI requests, sending and receiving the appropriate flows from the CICS server to satisfy the application requests. The Client daemon (process cclclnt) exists only on distributed platforms.
A set of scripts that are deployed with a web application or mobile native application to capture user interactions on the client that would not otherwise require a server interaction. By capturing these user interface events, a client framework can provide unique insight into the activities of visitors within their browsing devices.
See client identifier.
client identifier (client ID)
A piece of information that identifies an individual application. An application can invoke an API only if it passes an application key that is recognized by the IBM API Management system and is granted access to the API. The application key is passed by the client by using an HTTP query parameter.
client logical partition
A logical partition that uses the I/O resources of another logical partition, for example, a logical partition that uses the resources of a Virtual I/O Server logical partition.
A message from a client application that is to be sent by means of a network to its destination, or a message that is routed to a client application to acknowledge the receipt of a client message by a network.
- In a single system image (SSI), a WebSphere Voice Response system that handles interactions with callers. A client node must have a telephony connection. It does not store application or voice data; it gets data from the server node of the SSI.
- A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.
client node session
A session in which a client node communicates with a server to perform backup, restore, archive, retrieve, migrate, or recall requests. See also administrative session.
client-polling scheduling mode
A method of operation in which the client queries the server for work. See also server-prompted scheduling mode.
A process that requests services from a server process. See also server process.
- In dynamic routing the application program, running in the requesting region, that issues a remote link request.
- A program that uses a C++ class.
- In the client/server model, the front-end transaction.
A method that allows a client application, upon the loss of communication with a database server and the predefinition of an alternative server, to continue working with the original database server or the alternative server with only minimal interruption of the work.
A database record that describes the planned processing of a client operation during a specific time period. The client operation can be a backup, archive, restore, or retrieve operation, a client operating system command, or a macro. See also administrative command schedule, central scheduler, schedule.
A piece of information that is used with an application key to verify the identity of an application. An API can be configured to require that client applications supply their application secret with their application key. The application secret functions effectively as a password known only to the application. The application secret is passed by the client using an HTTP query parameter.
Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server. See also distributed application.
A hardware and software design that allows the user interface and database server to reside on separate nodes or platforms on a single computer or over a network. See also client application, server-processing locale.
client-side human service
A human service that runs in the web browser and can call the server to obtain data. A client-side human service can be used to implement an interactive task, a dashboard, or a user interface for a case or process instance that users can use to manage cases or processes in an application. See also heritage human service, human service.
- A station that consists of a control unit (a cluster controller) and the terminals attached to it.
- A component of the client kernel that provides protocol support for the client.
In the Distributed Computing Environment (DCE), the surrogate code for a remote procedure call (RPC) interface that is linked with and called by the client application code. In addition to general operations such as marshaling data, a client stub calls the RPC runtime library to perform remote procedure calls and, optionally, to manage bindings.
client system-options file
A file, used on AIX, UNIX, or Linux system clients, containing a set of processing options that identify the servers to be contacted for services. This file also specifies communication methods and options for backup, archive, hierarchical storage management, and scheduling. See also client user-options file, options file.
The client programs and consoles that are used for development, administration, and other tasks for the InfoSphere Information Server suite and product modules and the computers where they are installed.
client user-options file
A file that contains the set of processing options that the clients on the system use. The set can include options that determine the server that the client contacts, and options that affect backup operations, archive operations, hierarchical storage management operations, and scheduled operations. This file is also called the dsm.opt file. For AIX, UNIX, or Linux systems, see also client system-options file. See also client system-options file, options file.
In the NetView Graphic Monitor Facility, a workstation that depends on a server workstation to provide it with views and status information. A client workstation receives status information from the server workstation over an LU 6.2 session.
See Client Input Output Sockets.
See calling line identification presentation.
- In the GDDM function, the process of cutting off the image at the border of the display but allowing the coordinates of the lines to extend beyond.
- In computer graphics, removing those parts of display elements that lie outside of a given boundary.
In GL, primitive space that is mapped to normalized device coordinates before clipping occurs. The clipping planes x=+/-w; y=+/-w; or z=+/-w correspond to the left, right, top, bottom, near, and far planes bounding the viewing frustum.
See command list.
A word that syntactically functions separately but is phonetically connected to another word. A clitic can be written as connected or separate from the word it is bound to. Common examples of clitics include the last part of a contraction in English 'wouldn't' or 'you're'.
The process by which a complex word or expression is formed by attaching a clitic to another word. A common example of cliticization includes attaching a clitic to a verb, for example: "je t'aime" in French.
See Collaborative Lifecycle Management.
See control language module.
See connectionless-mode network protocol.
See connectionless-mode network service.
CLNS path maintenance
In OSI, an option of whether or not to maintain a CLNS path to an adjacent node permanently (until OSI Communications Subsystem is restarted), or release the path when no active CLNS connection uses it. These connections include both network management and directory service connections and connections between customer programs.
A customization option that restricts access to selected information in the cube. The cloak option removes a category and its descendants from a dimension, but summarizes the values in the ancestor categories.
See character large object.
- In data communication, equipment that provides a time base used in a transmission system to control the timing of certain functions, such as sampling, and to control the duration of signal elements.
- A device that generates periodic signals used for synchronization.
- In binary synchronous communication, the use of clock pulses to control synchronization of data and control characters.
- In communications, a method of controlling the number of data bits sent on a communications line in a specified time.
The elapsed time in real time. Clock time differs from CPU time as thread switches and process context switches introduce uncertainty in performance calculation; clock time does not account for this execution behavior.
- To prepare a reference computer and create a system profile ready for deployment. See also unattended setup.
- To preserve the characteristics of the original but personalize instance-specific data. The result is a new instance of an entity (for example, of a virtual disk, a virtual computer system, or an operating system) rather than a backup of the original.
- An identical copy of the latest approved version of a component, with a new unique component ID.
- A copy of a volume on a server at a particular point in time. The contents of the copy can be customized while the contents of the original volume are preserved.
- A copy of an application, created so that it can be customized while the original is retained.
- An operation that enables an administrator to replicate profiles. This capability simplifies the task of creating multiple profiles with similar properties.
- An identical copy of the data and configuration of a server at a particular point in time.
A table that is structurally identical to a base table. The base and clone table each have separate underlying VSAM data sets, which are identified by their data set instance numbers. See also base table.
- To end an activity and remove that window from the display.
- To end processing by ending the connection between the file and a program.
A registration process in which only an administrator can register workstations as client nodes with the server. See also open registration.
closed user group (CUG)
In data communication, a group of users who can communicate with other users in the group, but not with users outside the group. A data terminal equipment (DTE) may belong to more than one closed user group. See also bilateral closed user group.
A measure of how quickly an entity can use links to get access to other entities on an association chart. Closeness is one of the centrality measures used in social network analysis. See also centrality.
In the GDDM function, a line added by the system to enclose an area being filled with a pattern, in instances when the routines that precede the GSENDA routine fail to form an enclosed area.
A computing platform where users can have access to applications or computing resources, as services, from anywhere through their connected devices. A simplified user interface or application programming interface (API), or both, makes the infrastructure supporting such services transparent to users. See also off-premises.
The process of installing and configuring a software application and all of its components onto a virtual server. See also deployment.
See infrastructure as a service.
A description of resources to be provided by a cloud. Typically, a cloud request consists of a list of cloud images to be provided by the cloud and information about how those cloud instances are to be configured.
- See command line processor.
- See communication line processor.
- See container load plan.
- See current line pointer.
See create link pack area.
See control language procedure.
See control language program.
See common language runtime.
See class identifier.
See control logical unit.
See cluster-receiver channel.
See cluster-sender channel.
- A set of independent systems or logical partitions (called nodes) that are organized into a network for the purpose of sharing resources and communicating with each other.
- In WebSphere MQ, a group of two or more queue managers on one or more computers, providing automatic interconnection, and allowing queues to be advertised among them for load balancing and redundancy.
- A group of appliances in which one appliance acts as the central appliance, and the other appliances act as its clients.
- A collection of one or more servers within a cloud that provide a specific function.
- A group of entities that have more connections to each other than to entities outside the group.
- A group of two or more Domino servers that provides users with constant access to data, balances the workload among servers, improves server performance, and maintains performance when the size of an enterprise increases.
- In IBM System Storage DS8000, a partition capable of performing all DS8000 series functions. With two clusters in the DS8000 storage unit, any operational cluster can take over the processing of a failing cluster.
- Two or more connected copies of Sterling B2B Integrator that share a database.
- A group of application servers that collaborate for the purposes of workload balancing and failover.
- A loosely coupled collection of independent systems (or nodes) organized into a network for the purpose of sharing resources and communicating with each other. See also GPFS cluster.
- A set of independent systems or nodes that are organized into a network. The purpose of the cluster is to define a set of resources, nodes, networks, and storage devices that will keep applications highly available.
- A group of computers and other resources that operate together as a single system. See also clustered system, GPFS cluster.
- See clustered system.
- In SNA, a group of stations that consist of a controller (cluster controller) and the workstations attached to it.
- A group of servers connected by a network and configured in such a way that if the primary server fails, a secondary server takes over.
- In Microsoft Cluster Server, a group of computers, connected together and configured in such a way that, if one fails, MSCS performs a failover, transferring the state data of applications from the failing computer to another computer in the cluster and reinitiating their operation there.
- In Storwize® V7000, a pair of nodes that provides a single configuration and service interface.
- A collection of complete systems that work together to provide a single, unified computing capability.
- A data set defined to VSAM. A cluster can be a key-sequenced data set, an entry-sequenced data set, or a relative record data set.
- A related set of search results and their associated online resources that is automatically created.
Cluster Aware AIX (CAA)
A technology that builds clustering capabilities into the AIX operating system. This built-in clustering support provides commands and programming APIs to create a cluster from a group of AIX instances. CAA provides kernel-based heartbeat, monitoring, and event infrastructure.
cluster caching facility (CF)
A subsystem, typically on a dedicated computer or LPAR, that assists in global locking and group buffer pool management for a DB2 pureScale instance on Linux and AIX operating systems. See also preferred primary cluster caching facility, primary cluster caching facility, secondary cluster caching facility.
A user definition of all cluster components. Component information is stored in the ODM. Components include cluster name and ID, and information about member nodes, network interface, and network modules. See also dynamic automatic reconfiguration.
cluster configuration database
See Object Data Manager.
A virtual collection of physical elements such as computer systems and logical elements such as software instances that can provide services to a client as a single unit. See also cluster domain node.
An index whose sequence of key values closely corresponds to the sequence of rows stored in a table. The degree of correspondence is measured by statistics that are used by the optimizer.
A catalog entry that contains the following information about a key-sequenced or entry-sequenced Virtual Storage Access Method (VSAM) cluster: ownership, cluster attributes, and the cluster's passwords and protection attributes. A key-sequenced cluster entry points to both a data entry and an index entry; an entry-sequenced cluster entry points to a data entry only. See also alternate-index entry.
- See cluster configuration.
- A topology in which an application server is defined over several machines or CPUs. See also horizontal clustering, vertical clustering.
Any state change in a resource that is defined to a cluster. A cluster event can be informational, such as a join adapter event which indicates that a failed adapter is now functional, or the event can be part of a recovery process, such as a node down event which includes the takeover of resources by a backup node. See also node down, node up.
cluster information base (CIB)
A replicated store of cluster-related information. It typically includes static configuration data which defines the resources, cluster nodes, and constraints (or dependencies) in the cluster, as well as information about the current state of the cluster.
- The process of grouping records together based on similarity. Similar records are labeled according to their group, so there is no predefined target field for the model to predict.
- The ability to group independent systems to work together as a single system.
clustering block index
See dimension block index.
An index that determines how rows are physically ordered (clustered) in a table space. If a clustering index on a partitioned table is not a partitioning index, the rows are ordered in cluster sequence within each data partition instead of spanning the partitions.
- A software daemon that runs on every node in the cluster and is responsible for responding to failures and coordinating recovery actions.
- The node that monitors node status using disk leases, detects failures, drives recovery, and selects file system managers. The cluster manager is the node with the lowest node number among the quorum nodes that are operating at a particular time.
An identically configured copy of an object, such as an application server. Cluster members can be used for workload management purposes, for example, to support horizontal scaling and vertical scaling.
An IBM designation that defines certain high-availability requirements that are applied to a software product either by itself or in combination with other software products. A solution that satisfies the technical criteria of these requirements can be validated with IBM and licensed to be marketed with IBM's ClusterProven trademark.
A local queue that is hosted by a cluster queue manager, and defined as a target for messages being put from an application connected to any queue manager within the cluster. All applications retrieving messages must be locally connected.
cluster-receiver channel (CLUSRCVR)
A channel on which a cluster queue manager can receive messages from other queue managers in the cluster, and cluster information from the repository queue managers.
Any part of the system that is available across multiple cluster nodes. The two types of system resources that can be resilient are the following: Objects that are kept up to date by using replication. A resilient application and its associated IP address, which can be switched.
cluster resource group (CRG)
A collection of related cluster resources that defines actions to be taken during a switchover or failover operation of the access point of resilient resources. The group describes a recovery domain and supplies the name of the cluster resource group exit program that manages the movement of an access point.
A Windows (TM) service that manages the cluster specific activities and is installed on each node of the cluster. The components of the Cluster service provide high availability, easy management and enhanced scalability for Windows.
The high availability services, such as the cluster manager and other services running on the nodes, that monitor the cluster resources. The resources and data maintained on the cluster for access by clients and their applications are cluster services.
A template that defines the tiers for a cluster in a system. Tiers work together to create a cluster for a specific application environment, for example a GPFS application environment.
cluster transmission queue
A transmission queue that holds all messages from a queue manager destined for another queue manager that is in the same cluster. The queue is called SYSTEM.CLUSTER.TRANSMIT.QUEUE.
See color lookup table.
See customer lifetime value.
See control language variable.
See CICSPlex SM address space.
A communications link between one CICSPlex SM address space (CMAS) and another CMAS or a remote managed application system (remote MAS). CMAS links are defined when CICSPlex SM is configured.
See Configuration Management Database.
See control message interface.
See Common Management Information Protocol.
The VTAM implementation of the Common Management Information Protocol (CMIP), which provides a common set of program services for application programmers to use in writing CMIP application programs. These services include controlling associations, converting basic encoding rules (BER) syntax, and validating protocols.
See configuration-managed item.
See complementary metal-oxide semiconductor.
See container-managed persistence.
See cross-memory resource-owning task.
CMS extended parameter list
A type of parameter list available in the CMS environment consisting of a string composed exactly as the user typed it at the terminal. There is no tokenization performed on the string.
See communication network management.
See composite network node.
See change number of sessions.
See communication name table.
The interval at which events are bundled. Event bundling occurs in 10 second intervals and begins with the first event that does not match any currently coalescing events. Within the coalescing interval, the first three matching events are bundled and sent to the event processor.
See confirm-on-arrival report.
Pertaining to viewing a group of objects from an abstract or high level. See also fine-grained.
The concept of VTAM's writing PIUs to NCP and reading PIUs from NCP with a single channel program. The values coded for the DELAY keywords on the VTAM PCCU definition statement and the NCP LINE definition statement affect the degree of coattailing. A user can increase the probability of VTAM's writing and reading PIUs with a single channel program by adjusting these DELAY keywords. An increase in the degree of coattailing improves channel efficiency but may increase response time.
See Common Business Oriented Language.
The interaction of multiple users sharing information about their individual web interactions. With this interaction users can share a view of the same web page simultaneously and share further interactions with the web page they are jointly viewing.
See center of competency.
See capacity on demand.
See confirmation of delivery.
See Conference on Data Systems languages.
- A set of instructions for a computer.
- A system of bit patterns to which a specific graphic or a control meaning has been assigned.
- To write instructions for the computer; to program.
- A number that uniquely identifies a catalog entry in the WebSphere Commerce system. A product code is used as the prefix for creating individual SKU codes.
- A representation of a condition, such as an error code.
A bar code symbology characterized by a variable-length, bidirectional, discrete, self-checking, alphanumeric code. Three of the nine elements are wide and six are narrow. It is the standard for LOGMARS (the U.S. Department of Defense) and the AIAG.
See content assist.
Works together with the code attribute in the APPLET tag to give a complete specification of where to find the main applet class file: code specifies the name of the file, and codebase specifies the URL of the directory containing the file.(Sun)
- A technology that compresses and decompresses data for the purpose of reducing the bandwidth required to send streaming data.
- A program that can encode and decode a digital data stream or signal. In mobile computing, there are separate codecs for multimedia processing and voice processing.
coded character set (CCS)
A set of unambiguous rules that establishes a character set and the one-to-one relationships between the characters of the set and their coded representations. See also invariant character set.
coded character set identifier (CCSID)
A 16-bit number that includes a specific set of encoding scheme identifiers, character set identifiers, code page identifiers, and other information that uniquely identifies the coded graphic-character representation. See also binary string.
coded character set identifier 65534 (CCSID 65534)
The coded character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 (X'FFFE') is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs that are tagged for each individual field it contains. If the field is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.
coded character set identifier 65535 (CCSID 65535)
An identifier that is used to show that the associated data should not be processed as coded-graphic-character data. CCSID 65535 ( FFFF ) cannot be represented in long form. Data that is associated with CCSID 65535 should be interpreted as actual representation is unknown as defined in Character Data Representation Architecture-Level 2, IBM Registry. You cannot convert data that is associated with CCSID 65535 from one CCSID to another. The coded character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.
coded font local identifier
A 1-byte identifier that the Map Coded Font structured field assigns to each coded font it selects. The identifier is then specified in the text-control sequence that precedes the string of text to be printed with the particular font. See also local identifier.
coded graphic character set global identifier (CGCSGID)
A 4-byte binary or a 10-digit decimal identifier consisting of the concatenation of a GCSGID and a CPGID. The CGCSGID identifies the code point assignments in the code page for a specific graphic character set, from among all the graphic characters that are assigned in the code page.
coded graphic character-set ID
A 10-digit identifier (two 5-digit identifiers separated by a space) that is the combination of a graphic character-set ID and a code-page ID. See also code page ID.
An overlay loaded in a printer in a coded format, rather than as a raster pattern. See also raster pattern overlay.
code element set
The result of applying rules that map a numeric code value to each element of a character set. An element of a character set may be related to more than one numeric code value but the reverse is not true. However, for state-dependent encodings the relationship between numeric code values to elements of a character set may be further controlled by state information. The character set may contain fewer elements than the total number of possible numeric code values; that is, some code values may be unassigned. X/Open.
code extension method
A method prescribed in an encoding scheme for representing characters that cannot be accommodated within the limits of the basic structure of the code. It prescribes a method to alter the interpretation of one or more code points that follow a prescribed single control character or a control sequence.
code generation template
The mixed-mode source file that is used by a generic operator to generate specific customizations. See also generic operator.
- One or many dynamic pairs of code values that contains sender code and receiver code. Each code pair has one description and up to four additional codes relating to the pair.
- A list that contains codes corresponding to the services provided by service providers.
In System Manager, the type of product load that contains all of the product code that does not require translation to other languages, such as the code for displays, menus, and messages. However, if a product is never going to be translated, the code may contain all the product code.
- An ordered set of up to 256 predefined display symbols. The first 32 code points of each code page are reserved for control codes and are the same for all code pages, leaving up to 224 distinct display symbols per page.
- A specification of code points from a defined encoding structure for each graphic character in a set or in a collection of graphic character sets. Within a code page, a code point can have only one specific meaning. See also invariant character set.
- A particular assignment of code points to graphic characters. Within a given code page, a code point can have only one specific meaning. A code page also identifies how undefined code points are handled. See also code point.
code page ID
A 5-digit registered identifier used to specify a particular assignment of code points to graphic characters. The code-page ID is the second part of the QCHRID system value or the CHRID parameter value. See also coded graphic character-set ID.
- A unique bit pattern that represents a character in a code page. See also code page.
- In QoS, pertaining to a specific value in the Differentiated Services field of a data packet that signals to a network the behavior that is assigned to that packet.
- For SNA alerts, a 1-or 2-byte hexadecimal code that designates a particular piece of text to be displayed at the focal point.
- An identifier in an alert description that represents a short unit of text. The code point is replaced with the text by an alert display program.
- A unique bit pattern defined in a code. Depending on the code, a code point can be 7-bits, 8-bits, 16-bits, or other. Code points are assigned graphic characters in a code page.
- See code page.
- A set of unambiguous rules that establish a character set and the one-to-one relationship between each character of the set and its bit representation.
The fundamental binary width in a computer architecture that is used for representing character data, such as 7 bits, 8 bits, 16 bits, or 32 bits. Depending on the character encoding form that is used, each code point in a coded character set (CCS) can be represented by one or more code units.
See confirm-on-delivery report.
- During migration, the state during which two releases exist in the same data sharing group.
- The ability of two or more different versions of WebSphere MQ to function on the same computer.
- The ability of two or more entities to function in the same system or network.
- The state during which two QMF releases exist in the same database.
A category of technologies that uses natural language processing and machine learning to enable people and machines to interact more naturally to extend and magnify human expertise and cognition.
For programs that are resident on backup systems, a configuration in which a copy of the program is installed for backup purposes, but has not been started. See also hot backup, warm backup.
- The starting of IMS when it is initialized for the first time or when some error condition prevents a warm or emergency restart. See also emergency restart, normal restart.
- A method of starting CICS where all local resources are refreshed, but information relating to remote systems and resource managers is preserved.
- A process by which DB2 restarts without processing any log records. See also warm start.
- A process in which the system is initialized. All jobs that were active or in the job queue at the time of the cold start are removed from the system. See also warm start.
- The process of starting a system or program using an initial program load procedure.
- The process of starting an existing data replication configuration without regard for prior replication activity, causing reinitialization of all subscriptions.
- A diagram that shows the exchange of messages between two or more participants in a BPMN model.
- The ability to connect customers, employees, or business partners to the people and processes in a business or organization, in order to facilitate improved decision-making. Collaboration involves two or more individuals with complementary skills interacting together to resolve a business problem. See also web-based editor.
A runtime instance of a workflow for a specific hierarchy or catalog. A collaboration area provides a staging area where entries from that container can be modified without affecting the original entry. These changes can be copied back to the original or discarded when the entry completes the workflow. Each collaboration area must be associated with a workflow (but not vice versa). See also container, workflow.
The set of collaboration-based offerings and solutions within a brand unit or business unit. For example, IBM's collaboration portfolio includes IBM Connections, IBM Lotus Sametime Connect, and IBM SmartCloud and other applications.
Personalization technology that calculates the similarity between users based on the behaviors of a number of other people and uses that information to make recommendations for the current user.
Collaborative Lifecycle Management (CLM)
The integration of products on Jazz technology to connect the work of analysts with development and test teams. These integrations provide a common approach to artifact linking, dashboards, security, and user interface frameworks.
collaborative planning, forecasting, and replenishment (CPFR)
A concept that allows working together across the supply chain, using a set of process and technology models that are: open, yet allow secure communications; flexible across the industry; extensible to all supply chain processes; supportive of a broad set of requirements.
The configuration of the part of a deployment environment that delivers required behavior to an application module. For example, a messaging collaborative unit includes the host of the messaging engine and deployment targets of the application module, and provides messaging support to the application module.
A subprocess that hides its flow details. The collapsed subprocess object has a marker that distinguishes it as a subprocess, rather than a task. The marker is a small square with a plus sign inside.
- To combine and arrange in order.
- To determine the sorting order of strings of characters.
- The smallest entity used to determine the logical ordering of strings. A collating element consists of either a single character, or two or more characters collating as a single entity. The value of the LC_COLLATE category in the current locale determines the current set of collating elements. See also collating sequence.
- One or more characters that match a sequence in a regular expression.
- The sequence in which the characters are ordered for the purpose of sorting, merging, comparing, and processing indexed data sequentially.
- A specified arrangement used in sequencing. See also collating element.
- The relative ordering of collating elements as determined by the setting of the LC_COLLATE category in the current locale. The character order, as defined for the LC_COLLATE category in the current locale, defines the relative order of all collating elements, such that each element occupies a unique position in the order.
- An ordering assigned to a set of items, such that any two sets in that assigned order can be collated.
- The separation of storage types into general categories (i.e. pallet, case, and single unit) that require very different means of handling.
- The logical ordering of characters and strings according to defined rules.
- A container that provides a single view of related resources.
- An instance of a collection data type; a group of elements of the same data type stored in a SET, MULTISET, or LIST data type.
- An abstract class without any ordering, element properties, or key properties.
- A set of data sources and options for crawling, parsing, indexing, and searching those data sources.
- Data obtained by a collector that represents the system status at a given point in time. Collections are timestamped and stored in a management collection object. See also schema.
- In Ada language, the entire set of objects created by evaluation of allocators for an access type.
- A group of objects that typically have similar performance, availability, backup, retention, and class transition characteristics. A collection is used to catalog a large number of objects which, if cataloged separately, could require an extremely large catalog.
- A distinct named set of data that is associated with a case. For example, an ordered set of captured network packets.
- The process of monitoring and storing application performance data, aggregating it to a time interval, and saving it into data files on the endpoint.
- A logical container for storing archived documents, as well as the retention and access policies that specify how the documents are managed. Each collection is represented by a separate file system. See also file archive collection, System Storage Archive Manager collection.
- A group of packages that have the same qualifier.
- A group of objects with a similar set of management rules.
- A data type. The three types of collections are a list, set, or map.
A database cursor that has an IBM Informix ESQL/C collection variable associated with it and provides access to the individual elements of a column whose data type is a collection data type.
collection data type
A complex data type whose instances are groups of elements of the same data type, which can be any opaque data type, distinct data type, built-in data type, collection data type, or row data type. See also complex data type.
A type of page in the administrative console that displays a collection list of administrative objects. From this type of page, you can typically select objects to act on or to display other pages for.
collection processing engine (CPE)
An engine that performs collection processing through the combination of a collection reader, an optional CAS Initializer, an analysis engine, and one or more CAS Consumers.
collection processing manager (CPM)
A module in the framework that manages the execution of collection processing, routing CASs from the collection reader to an analysis engine, and then to the CAS Consumers. The CPM provides feedback such as performance statistics and error reporting, and may implement features such as parallelization.
A System i Navigator tool that collects performance data independent of the system monitors in System i Navigator. This function is intended for subsequent analysis by performance personnel either by writing queries against the collected data or by reviewing reports produced by the Performance Tools for i5/OS licensed program.
An IBM Informix ESQL/C host variable or SPL variable that holds an entire collection and provides access, through a collection cursor, to the individual elements of the collection.
- A set of Liberty servers in one management domain that has at least one server with the collective-controller feature enabled.
- A set of appliances that are grouped together for scalability and management purposes.
A communication operation that involves more than two processes or tasks. Broadcasts and reductions are examples of collective communication operations. All tasks in a communicator must participate.
A centralized administrative control point where operations such as MBean routing, file transfer, and cluster management in a collective are performed. A core role of the collective controller is to receive information from the members within the collective so that the data can be retrieved readily without having to invoke an operation on each individual member.
- An object that determines what information is collected from, or assigned to, server resources. The information is specified through properties in the collector. The collector, assigned to a server, serves as a specification for the server’s manifest.
- A web service that accepts uploads of recordings and stores them into a permanent storage medium. This web service is a component of the session recording server.
- A generic name for a program that at regular intervals collects data about the status of the system.
- In an AIX PowerSC environment, an AIX logical partition or a virtual machine that has VTPM enabled and has the OpenPTS.collector fileset installed.
For directory shadowing, a system that receives initial or changed Enterprise Address Book (EAB) data from a supplier system in a network. See also supplier system.
- In X.25 communication, a condition that occurs when data terminal equipment (DTE) and data circuit-terminating equipment (DCE) simultaneously transmit packets (for instance, a clear request packet and a clear indication packet) over the same logical channel. The types of collision are clear collision, call collision, or reset collision.
- An unwanted condition that results from concurrent transmissions on a channel, causing the transmissions to be unintelligible.
In carrier sense multiple access with collision avoidance (CSMA/CA), the process of sending a jam signal and waiting for a variable time before transmitting data. The process is designed to avoid two or more simultaneous transmissions.
In Performance Tools, a counter that counts the total number of times the terminal equipment (TE) detected that the frames it transmitted were damaged by another TE trying to use the same bus.
The result of two tables being joined under one of two conditions. The first condition is where the tables are located in a single-partition database partition group in the same database partition. The second condition is where the tables are in the same database partition group, the number of partitioning columns is the same, the columns are partition compatible, both tables use the same partitioning function, and pairs of the corresponding partitioning key columns participate in the equijoin predicates. See also partition-compatible join.
- The process of keeping all data belonging to a single-client file space, a single client node, or a group of client nodes on a minimal number of sequential-access volumes within a storage pool. Collocation can reduce the number of volumes that must be accessed when a large amount of data must be restored. See also anti-collocation, distribution preference.
- An optional policy which can be applied to certain cluster resources such as persistent IP addresses and resource groups. Collocation specifies that, whenever possible, the entity will be brought online using the same resources as another cluster entity. For example, if a persistent IP address is configured to collocate with a service IP address, the persistent and service IP addresses will both be placed on the same network interface. See also anti-collocation, distribution preference.
See primary key prefix.
In computer systems, a color is usually represented by a triplet called RGB (red, green, and blue) signals. Most computer monitors require RGB signals to drive the 3-colored phosphors of a color monitor.
In Enhanced X-Windows, an entry in a color map that consists of three values based on red, green, and blue intensities. The values are 16-bit, unsigned numbers. Zero represents the minimum intensity. The values are scaled by the server to match the particular display in use.
In architecture, images whose image data elements are represented by multiple bits or whose image data element values are mapped to color values. Constructs that map image-data-element values to color values are look-up tables and image-data-element structure parameters.
color lookup table (CLUT)
See color map.
- A set of color cells. A pixel value indexes the color map to produce RGB-intensities. A color map consists of a set of entries defining color values that, when associated with a window, is used to display the contents of the window.
- A lookup table in which each index is associated with a red, green, and blue value.
color mapping table
An architected MO:DCA object that is used to map color values specified in a source color space to color values specified in a target color space. This object is loaded into printers that support the color mapping table.
- A set of colors that can be displayed on the display at one time. This can be standard set used for all images or a set that can be customized for each image.
- In Business Graphics Utility, the range of colors defined by hue, lightness, and saturation to be used when a chart is displayed on a graphics-capable display.
- See color map.
A progression of colors in a color map. Most color ramps are smooth and have only a small number, if any, of discontinuities. For instance, if the full set of colors of the rainbow were loaded into the color map, that would constitute a color ramp.
The ability to specify a color other than black to print data in more than one color. Some printers support selection of several colors, depending upon the color of ribbon installed in the printer. Other printers support the selection of black or "color of media," which can cause white lettering on a background that has been shaded black, for example.
- See color map.
- In AFP architecture, a collection of color element sets. The table can also specify the method used to combine the intensity levels of each element in an element set to produce a specific color. Examples of methods used to combine intensity levels are the additive method and the subtractive method. See also lookup table.
- In a relational database, a field defined for a given record or row.
- A subdivision of a band, such as baseline or actual.
- A character position within a print line or on a display. The positions are numbered consecutively from 1, starting at the leftmost character position and extending to the rightmost position.
- The vertical component of a database table. A column has a name and a particular data type (for example, character, decimal, or integer).
- In FD:OCA, a subarray consisting of all elements that have an identical position within the low dimension of a regular two-dimensional array. See also row.
column distribution value
See data distribution.
See aggregate function.
In a federated system, a parameter of the CREATE NICKNAME and ALTER NICKNAME statements that describes the values in certain columns of the data source object that a nickname references. This information is added to the global catalog and used by the query optimizer to develop better access plans.
A table where the data pages contain column data instead of row data. See also row-organized table.
A unit of horizontal measure related to characters in a line. It is assumed that each character in a character set has an intrinsic column width independent of any output device. Each printable character in the portable character set has a column width of one. The standard utilities, when used as described in this document set, assume that all characters have integral column widths. The column width of a character is not necessarily related to the internal representation of the character (numbers of bits or bytes). The column position of a character in a line is defined as one plus the sum of the column widths of the preceding characters in the line. Column positions are numbered starting from 1. X/Open.
A level attribute that has certain properties, irrespective of the reference structure level. For example, the level attribute that provides the identifier for each row of data is represented by the $ID column token.
The formatting of values in a report so that the values occupy several lines within a column. Column wrapping is often used when a column contains a value with a length that exceeds the column width.
combination pricing rule
A pricing rule that changes the price of an item based on the combination of items being ordered. For example, an organization can create a pricing rule under which, for every home theatre system a customer buys, the customer gets a free DVD player.
combined code page
See mixed code page.
combined function IOP (CFIOP)
A type of IOP that can connect to a variety of different input/output adapters to support disk units, a console, and communications hardware. It contains some multifunction IOP (MFIOP) capabilities as well as Ethernet and token-ring controllers. This processor does not contain server processor functions. See also multifunction IOP.
combined sewer overflow (CSO)
A discharge of untreated waste water from a combined sewer system at a point prior to the headworks of a publicly owned treatment works. CSOs generally occur during wet weather (rainfall or snowmelt). During periods of wet weather, these systems become overloaded, bypass treatment works, and discharge directly to receiving waters.
combined sewer system (CSS)
A waste water collection system which conveys sanitary waste waters (domestic, commercial and industrial waste waters) and stormwater through a single pipe to a publicly owned treatment works for treatment prior to discharge to surface waters.
In high-level data link control (HDLC), the part of a data station that supports the combined control functions of the data link, generates commands and responses for transmission, and interprets received commands and responses.
A binary file, such as .dll, .ocx, and some .exe files, that supports the COM standard for providing objects. COM components contain code for one or more class factories, COM classes, registry-entry mechanisms, loading code, and so on.
See microfilm device.
Comité consultatif international télégraphique et téléphonique (CCITT)
See International Telecommunication Union Telecommunication Standardization Sector.
- A token that represents a separator of arguments in an argument list or decimal separator.
- A unique pattern (either binary 1100000 or binary 0011111) used in 8B/10B encoding to specify character alignment within a data stream. See also K28.5.
An expression that contains two operands separated by a comma. Although the compiler evaluates both operands, the value of the right operand is the value of the expression. If the left operand produces a value, the compiler discards this value.
- A statement used to initiate an action or start a service. A command consists of the command name abbreviation, and its parameters and flags if applicable.
- In SNA, any field set in the transmission header (TH), request header (RH), or request unit (RU) that states an action or that starts a protocol. See also data traffic reset state.
- A request to perform an operation or run a program. When parameters, arguments, flags, or other operands are associated with a command, the resulting character string is a single command.
- In SDLC, a frame transmitted by a primary station. Asynchronous balanced mode stations send both commands and responses. See also response.
- A request from a terminal or automated operator for the performance of an operation or service, or for the execution of a particular program. See also response.
- In data communication, an instruction represented in the control files of a frame and transmitted by a primary or combined station. It causes the addressed station to run a data link control function.
command attention key (CA key)
In DDS, a keyboard key that can be specified with the CA keyword to request the function specified by the keyword. Data is not returned to the system. See also command function key.
The process of authorizing a network operator to use various commands. See also NetView command authorization table, Resource Access Control Facility, System Authorization Facility.
- A bean that contains the programming logic to handle a particular request.
- A proxy that can invoke a single operation using an execute() method.
- A menu from which a user can carry out tasks and monitor the status for companies and groups.
- A component of the Control Center for IMS that is used to issue IMSplex commands from both a workstation or multiple IMS systems.
The portion of the segment search argument that enables an application program to access a database segment based on some variation in either the call function, the segment qualification, or the setting of parentage.
An object that contains the definition of a command (including the command name, parameter descriptions, and validity-checking information) and identifies the program that performs the function requested by the command. The system-recognized identifier for the object type is *CMD.
command definition statement
A source statement that defines keywords and parameter values, qualified names, elements in a list, parameter requirements and interrelationships, and prompt text for a command. Command definition statements are used to create a CL command.
An RRSF function that allows a user to issue a command from one user ID and direct that command to run in the RACF address space on the same system or on a different RRSF node, using the same or a different user ID. See also automatic command direction, directed command.
- In PC operating systems, a file with a file name extension of .CMD that functions like a batch file in DOS.
- In RJE, a remote job input stream that can contain host system commands and job control language (JCL), data, and RJE control statements (READFILE or EOF). See also data file.
- A system file that contains one or more statements or commands.
command function key (CF key)
In DDS, a keyboard key that can be specified with the CF keyword to request the function specified by the keyword. Data is returned to the system. See also command attention key.
In the NetView Graphic Monitor Facility, a numeric identifier that is assigned to a network resource by its controlling resource manager. Each resource manager is assigned a range of values that can be defined.
An interface for running QMF commands. The QMF commands can only be issued from within an active QMF session. See also callable interface.
See command language interpreter.
command language translator
A batch program (part of CICS program preparation utilities) that prepares a source application program that includes EXEC CICS or EXEC DLI commands. The translator program translates the EXEC commands into CALL statements in the language of the application program. The translator output can be compiled or assembled in the usual way.
Pertaining to an operation that is performed for a specific command in a program. For example, a Monitor Message (MONMSG) command that immediately follows a specific command in a CL program is a command-level MONMSG command. See also program level.
See application programming interface.
A transaction that enables CICS commands to be entered, syntax-checked, and executed interactively at a 3270 screen. It provides a reference to the syntax of the whole of the CICS command-level application programming and system programming interface.
A part of a command line, delimited by white space. Arguments are used to specify detailed behavior to a program. They are usually either command line options selecting variations in program operation, or path names of files to be processed.
A component used to run selected Tivoli Workload Scheduler master domain manager commands from any workstation where it is installed. The command-line client does not need to be installed on the master domain manager and is a selectable option for installation on other nodes in the network. See also master domain manager.
command-line interface (CLI)
A computer interface in which the input and output are text based. See also Copy Services command-line interface.
- A list of commands and statements designed to perform a specific function for the user.
- A language for performing TSO tasks.
In an IMSplex, the IMS that Operations Manager (OM) designates to process a command when a command is issued through the OM API. Commands are routed to all IMS systems that are registered for the command and, if the command requires only one IMS to process it, the command master processes the command.
- A 1-character to 8-character command identifier. The command prefix distinguishes the command as belonging to an application or subsystem rather than to z/OS.
- In WebSphere MQ for z/OS, a character string that identifies the queue manager to which WebSphere MQ for z/OS commands are directed, and from which WebSphere MQ for z/OS operator messages are received.
command prefix facility (CPF)
A z/OS facility that provides a registry for command prefixes. CPF ensures that two or more subsystems do not have the same or overlapping command prefixes for operator commands.
A module designed to perform a specific function for the user. Users can write command processors in assembler language or in a high-level language. Command processors are started as commands.
- In MVS, a character that denotes an operator command.
- A character that permits a z/OS console operator or an IMS subsystem user to route DB2 commands to specific DB2 for z/OS subsystems.
A form of security checking that can be specified for the PERFORM, COLLECT, DISCARD, INQUIRE, and SET commands. Command security operates in addition to any transaction security or resource security specified for a transaction. For example if a terminal invokes a transaction that the user is authorized to use, and the transaction issues a command that the user is not authorized to use, the command fails with the NOTAUTH condition.
In architecture, information that identifies an IPDS command set and data level supported by a printer. Command-set vectors are returned with an Acknowledge Reply to an IPDS Sense Type and Model command.
command significant status
The command status that is associated with a resource, for example, the status of STOP, TRACE, and MFSTEST commands. If a resource structure is defined, the recovery of command significant status is always maintained globally by the Resource Manager (RM) in the resource structure. See also end-user significant status.
- In query management, a character string that contains a query command.
- A request to perform an operation, along with the operands that provide all instructions needed for running the operation.
The verb or verb/object portion of a site-defined command. After command synonyms are defined and activated in the QMF profile, users can enter the synonyms on the QMF command line as they do with regular QMF commands.
See communication area.
See communications data set.
- An annotation attached to an artifact, element, or a collection of elements.
- Explanatory text in a program or file that is not translated by the compiler.
- Text that is included within a contract for communication with other users.
In COBOL, an entry in the Identification Division of the source program that may be any combination of characters from the character set of the computer. The comment-entry is written in area B on one or more lines. Comment-entries serve only as documentation and are not translated by the compiler.
In COBOL, a source program line represented by an asterisk (*) in the indicator area of the line and any characters from the computer's character set in area A and area B of that line. The comment line serves only for documentation in a program.
Commerce Composer tool
A Management Center feature that business users can use to create pages and build page layouts for an e-commerce store without involving IT. The Commerce Composer tool provides a library of prebuilt layout templates and widgets to give business users greater control over page design.
Commerce Composer widget
A small application that retrieves and displays a specific type of content on a page of an e-commerce store. Examples of content are ads, product recommendations, and navigational links. In the Commerce Composer tool in Management Center, business users can design store pages by adding widgets to page layouts.
A list of the pertinent information about a shipment, such as shipper, consignee, third party (if present), the goods being shipped, their cost and value for customs (and for the transaction), and so on.
commercial processing workload (CPW)
An application that is run on System i models and processors to determine processor performance. The CPW workload is representative of commercial applications, particularly those that do significant database processing in conjunction with journaling and commitment control.
Commission of European Post and Telegraph (CEPT)
A European standards-setting organization replaced by the European Telecommunications Standards Institute (ETSI). See also European Telecommunications Standards Institute.
- To transfer to a specific version of the software product. When committing, the saved files from all previous versions are removed from the system, thereby making it impossible to return to a previous version without reinstallation. Committing does not change the currently active version of the software product.
- To store a snapshot of the current state of a project.
- To move managed assets from a task group in a workspace to the production-ready data on the authoring server. See also authoring server, production-ready data, quick publish, task group, workspace, workspace task group approver.
- To apply all the changes made during the current unit of recovery (UR) or unit of work (UOW). After the operation is complete, a new UR or UOW can begin.
- A snapshot of the current state of a project in a repository. A project's history is defined by a series of commits.
- To make a document immutable.
- To end a unit of work by releasing locks so that the database changes made by that unit of work can be perceived by other processes. This operation makes the data changes permanent. See also atomic, recoverable data set.
See sync point manager.
The information that associates the commit operation with a specific set of committable resource changes. The commit ID is placed in the notify object if a system or routing step failure occurs, or if uncommitted changes exist when a routing step ends normally. The commit ID contains information (supplied on the commit statement) about the last successful transaction (group of changes that appear as a single change); for example, the transfer of funds from savings to a checking account.
commit in progress (CIP)
The commit in progress logical unit of work (LUW) state indicates that all the resources associated with this logical unit of work have been prepared after a unanimous vote to commit. The protected resource managers are in the process of committing.
- In a commitment controlled environment, any time there are no outstanding changes for a committable resource existing within a job.
- A point at which there are no changes to a database file pending within a job. See also roll back.
- A way of grouping file operations that allows the processing of a group of database changes as a unit or the removal of a group of database changes as a unit. See also roll back.
- A means of grouping committable resource operations to allow either the processing of a group of committable resource changes as a single unit through the Commit command, or the removing of a group of committable resource changes as a single unit through the Rollback command.
Information used by the system to maintain the commitment control environment throughout a routing step and, in the case of a system failure, throughout an IPL (initial program load). This information is obtained from the Start Commitment Control (STRCMTCTL) command, which establishes the commitment control environment, and the file open information in a routing step. The commitment definition has a scope either to the job or to a particular activation group within the job.
- An operation that saves a file to permanent storage.
- A change management operation that causes all the updates prepared in the preparation phase to take effect. See also transactional mode.
The second phase in a XA process. If all participants acknowledge that they are prepared to commit, the transaction manager issues the commit request. If any participant is not prepared to commit, the transaction manager issues a back-out request to all participants.
In Informix, an isolation level under which a query in a transaction can read only rows that are committed at the moment when the query is requested. The user cannot view rows that were changed as a part of a currently uncommitted transaction. Committed read is available through a database server and set with the SET ISOLATION statement. It is the default level of isolation for databases that are not ANSI compliant. See also read committed, uncommitted read.
The process by which goods and services that were once unique offerings become more generic in the marketplace. Commoditization occurs when the goods or services can be produced on a larger scale by more companies.
An agent that provides shared infrastructure for management applications. The common agent is self-monitoring and self-starting, and provides remote deployment capability, shared machine resources, secure connectivity, and a single entry point. See also agent, subagent.
common analysis structure (CAS)
A structure that stores the content and metadata of a document, and all analysis results that are produced by an analysis engine. All data exchange during document analysis is handled by using the common analysis structure. See also annotation, common analysis structure consumer, common analysis structure initializer, common analysis structure processor, Java common analysis structure, text analysis engine, XML common analysis structure.
common analysis structure consumer
A consumer that does the final processing on the analysis results that are stored in the common analysis structure. For example, a consumer indexes the contents of the common analysis structure in a search engine or it populates a relational database with specific analysis results. See also common analysis structure.
common analysis structure initializer
A component that populates a Common Analysis Structure from a raw document. For example, if the document is HTML, a CAS Initializer might store a detagged version of the document in the CAS and also create inline annotations derived from the tags. See also common analysis structure.
common analysis structure processor (CAS processor)
A component that takes a common analysis structure as input and returns a CAS as output. See also common analysis structure.
common anchor area (CAA)
Dynamically acquired storage that represents a z/OS thread. This area acts as a central communications area for the program, holding control blocks and addresses of various storage and error-handling routines, and control blocks.
- A control section used to reserve a virtual storage area to which other modules can refer.
- In a web page that is based on a page template, the fixed region of the page.
Common Base Event
A specification based on XML that defines a mechanism for managing events, such as logging, tracing, management, and business events, in business enterprise applications. See also situation.
common channel signaling (CCS)
A method of communicating telephony information and line signaling events (for example, call setup and call clearing) on a dedicated signaling channel. See also channel associated signaling.
common client interface (CCI)
A standard interface that allows developers to communicate with enterprise information systems (EISs) through specific resource adapters, using a generic programming style. The generic CCI classes define the environment in which a J2EE component can send and receive data from an EIS.
common communication layer (CCL)
The communication infrastructure that unites the various components, such as controller, parser, crawler, and index server, of WebSphere Information Integrator OmniFind Edition.
Common Communications Support (CCS)
The Systems Application Architecture (SAA) component that defines architectures and protocols that interconnect systems and devices in an SAA environment and allow data to be interchanged among them.
A component that is intended to be used in more than one product. See also assembly.
Common Connector Framework (CCF)
A product offering interface and class definitions that provide a consistent means of interacting with enterprise resources (for example, CICS and Encina transactions) from any Java execution environment.
Common Console Interface (CCI)
The interface definition that enables console components to run either in a previously installed console or in a web console, such as the Integrated Solutions Console (ISC).
Common Cryptographic Architecture (CCA)
IBM software that enables a consistent approach to cryptography on major IBM computing platforms. It supports application software that is written in a variety of programming languages. Application software can call on CCA services to perform a broad range of cryptographic functions, including DES and RSA encryption.
Common Data Model
A logical data model that defines the standard representation of resources and how those resources are associated to each other. The Common Data Model uses influences from various standards bodies in the industry and serves as a best practice conglomeration of all standards.
common error bucket
An additional error status element (ESE) generated for each terminal error block (TEB), if fewer ESEs than the maximum number of error types recognized by the CICS terminal abnormal condition program are specified when the terminal error program (TEP) tables are generated.
Common Event Infrastructure (CEI)
The implementation of a set of APIs and infrastructure for the creation, transmission, persistence, and distribution of business, system, and network Common Base Events. See also event emitter.
Common Information Model (CIM)
An implementation-neutral, object-oriented schema for describing network management or systems management information. The Distributed Management Task Force (DMTF) develops and maintains CIM specifications. See also common management model.
common interchange unit (CIU)
The independent unit of transfer for a common interchange file (CIF). It is the part of the CIF that identifies the relationship to the receiving database. A CIF can contain multiple CIUs.
- A protocol that manages shared, remote file access for applications to files, printers, serial ports, and so on over a TCP/IP network.
- A protocol that enables collaboration on the Internet by defining a remote file-access protocol that is compatible with the way applications already share data on local disks and network file servers. See also Server Message Block 2.0, Server Message Block.
In COBOL, the key fields that are common to all record formats in the file starting with the first key field (the most significant) and ending with the last key field (the least significant).
Common Language for Expression Manipulation (CLEM)
A powerful language for analyzing and manipulating the data that flows along SPSS Modeler streams. A subset of the CLEM language can be used when scripting in the user interface, allowing many of the same data manipulations to be automated.
common language runtime (CLR)
The runtime interpreter for all .NET Framework applications. See also .NET Framework.
- A continuously executing program designed to minimize host interrupts while maximizing channel utilization.
- The architecture that defines the channel commands used between the host and the channel attachment adapter.
common management information service (CMIS)
In OSI, the set of services defined by ISO 9595. The common management information service is used by agent processes and managing processes to communicate.
common management model (CMM)
A model that describes how to represent IT entities as managed resources and services. See also Common Information Model.
common message log
A log that contains messages from several Infoprint Server components, including Print Interface, NetSpool, and IP PrintWay extended mode. Infoprint Central and the aoplogu command can display messages in the common message log.
common MPTN manager (CMM)
The component of the MPTN architecture that provides services independent of any transport protocol. Examples include registering transport users with the MPTN address-mapper component, selecting a transport provider, and establishing MPTN connections.
An entity that is directly connected to at least two other entities. For example, if C is connected to A and B, then C is a common neighbor of A and B. See also binding strength, connection.
Common Object Request Broker Architecture (CORBA)
An architecture and a specification for distributed object-oriented computing that separates client and server programs with a formal interface definition. See also Internet Inter-ORB Protocol.
Common Programming Interface (CPI)
In Systems Application Architecture (SAA), a set of software interfaces, conventions, languages, and protocols that provide a framework for writing applications with cross-system consistency.
Common Programming Interface for Communications (CPI-C)
A call-level interface that provides a consistent application programming interface (API) for applications that use program-to-program communications. CPI-C uses LU 6.2 architecture to create a set of interprogram services that can establish and end a conversation, send and receive data, exchange control information, and notify a partner program of errors.
See common area.
A function available to applications on a variety of operating system platforms, accessible through any supported programming language. A common service can include support for character classification, collation, case conversion, data formatting, and so on.
common service area (CSA)
In a z/OS operating system, a part of the common area that contains data areas that can be addressed by all address spaces but is protected during its use by the key of the requester.
Common Service Layer (CSL)
A collection of IMS manager address spaces that provide the infrastructure that is needed for systems management tasks. The CSL address spaces include Open Database Manager (ODBM), Operations Manager (OM), Resource Manager (RM), and Structured Call Interface (SCI). The CSL is built on the Base Primitive Environment (BPE) layer.
- In MVS, an area that contains system control programs and control blocks.
- A major CICS storage control block that contains areas and data required for the operation of CICS.
common table expression
An expression that defines a result table with a name (a qualified SQL identifier). The expression can be specified as a table name in any FROM clause in the fullselect that follows the WITH clause.
common user ID
See common user identification.
common user identification (common user ID)
In System i Access, the user identification of a System i Access user that is used by the router when establishing a communications connection with a host system if a user ID is not specified in either the CONFIG.PCS file or in an alternative configuration file. The router uses this common user ID when connecting the personal computer to each additional host system. See also user identification.
A widget provided by IBM that is not associated with a particular product. See also widget.
- A work area that can be accessed by any transaction in the CICS system.
- An area within the CSA that can be used by application programs for user data that needs to be accessed by any task in the system. See also transaction work area.
- An optional hardware feature, available on certain processors, that permits communications facilities to be attached to the processors.
- A device that allows network communication.
communication buffer exit library
A dynamically loaded, shared library that interacts with the DB2 communication layer and has access to the contents of the unencrypted communication buffers that are received at the server from clients and sent from the server to clients.
A conversation statement that transaction programs can issue to communicate through the LU 6.2 protocol boundary. The specific calls that a transaction program can issue are determined by the program's current conversation state.
communication control character
See transmission control character.
- A controller that regulates the exchange of data between Gentran Server for Windows and its organizations (value-added networks (VANs) or trading partners). Through the Gentran Server for Windows file interface, the communication controller can support leased or dialed connections, as well as interaction with third-party communications packages. To be a communications controller, a machine must be capable of sending and receiving files via a modem or other communications device. In a single workstation system, all three controllers (communications controller, process controller, and the Gentran Server for Windows Primary System Controller) all reside on the same machine.
- A device that directs the transmission of data over the data links of a network; its operation may be controlled by a program executed in a processor to which the controller is connected or it may be controlled by a program executed within the device. (T)
- A type of communication control unit whose operations are controlled by one or more programs stored and executed in the unit. It manages the details of line control and the routing of data through a network. See also transmission control unit.
Communication Controller for Linux on System z
The replacement for the 3745/6 Communication Controller. Using the Communication Controller for Linux on System z enables the Network Control Program (NCP) software to continue to provide the following functions: SNI, XRF, BNN, INN, and SSCP takeover.
See network interface.
communication management configuration (CMC)
In VTAM, a technique for configuring a network that allows for the consolidation of many network management functions for the entire network in a single host processor.
communication management configuration host node
The type 5 host processor in a communication management configuration that does all network-control functions in the network except for controlling devices that are channel-attached to data hosts. See also data host node.
communication management host
See communication management configuration host node.
The method by which a client and server exchange information. See also Transmission Control Protocol/Internet Protocol.
communication network management application program
A VTAM application program that issues and receives formatted management service request units for physical units. The NetView program is an example of a CNM application program.
communication network management interface (CNMI)
An interface that the access method provides to an application program for handling data and commands that are associated with communication systems management. CNM data and commands are handled across this interface.
An IP label or address or a fully qualified domain name that corresponds to the host name of the cluster node. The communication path is used for communication with remote nodes during the cluster configuration process.
- On a personal computer, a serial port to which a stand-alone modem can be attached.
- An access point for data entry or exit to or from a communication device such as a workstation.
communication scanner processor (CSP)
A processor in the 3725 Communication Controller that contains a microprocessor with a control code. The code controls transmission of data over links attached to the CSP.
The physical placement of communications controllers, the attachment of communications lines, and so forth; and the configuration descriptions that describe the physical configuration to the system and describe how the configuration will be used by the system.
communications data set (COMMDS)
The primary means of communication among systems governed by a single storage management subsystem (SMS) configuration. The COMMDS is a linear data set (LDS) that contains the name of the active control data set (ACDS) and current usage statistics for each system-managed volume, which helps balance space among systems running SMS. See also active control data set, control data set, source control data set.
Part of the task control area (TCA) that is used by CICS and by user-written application programs for communication between the application program and CICS management and service programs.
communications enabled application
A software application that uses an IP network and communications technology to accomplish business objectives. Enterprise applications can be communications enabled with web telephony components and collaborative web services that allow users to dynamically interact through shared browser sessions over a secure network.
In the AIX operating system, a framework of communication that consists of a postmaster, an object registration service, a startup file, communication protocols, and application programming interfaces.
- The physical link (such as a wire or a telephone circuit) that connects one or more work stations to a communications controller, or connects one controller to another. See also data link protocol.
- The line over which data communications take place; for example, a telephone line.
See data link.
IBM SecureWay Software that supports (a) the development and use of application programs across two or more connected systems or workstations, (b) multiple concurrent connections that use a wide range of protocols, and (c) several application programming interfaces (APIs) that may be called concurrently and that are designed for client/server and distributed application programs.
Everything sent and received to/from one telephone number in one continuous period of connection. This could include sending two or three interchange envelopes to a network, each for a different trading partner.
communications side information
In CPI Communications, an object that contains initialization parameters, such as the name of the partner program with which a program can establish a conversation and the name of the logical unit (LU) at the partner program's node, which CPI Communications requires to establish a conversation. The system-recognized identifier for the object type is *CSI.
Software that enables a computer to connect with another computer and to exchange information. Communications software can maintain settings for the connection, coordinate transmission of data and messages, as well as other tasks relating to the connection between the computer systems.
communications storage manager (CSM)
In VTAM, a buffer management technology that reduces performance overhead resulting from the movement of large amounts of data. CSM enables authorized host application programs to put data in buffers that can be addressed and accessed by other authorized host application programs without any need to copy the data.
A method for application programs to communicate on a local system, or between a local system and a remote system using the intersystem communications function (ICF). Examples of these communications methods include (a) asynchronous communications, (b) binary synchronous communications (BSC), (c) intrasystem communications, or (d) Systems Network Architecture (SNA), such as advanced program-to-program communications (APPC) and SNA upline facility (SNUF).
The IBM licensed program that contains the VM/MVS bridge and the remote job entry function. Communications Utilities provides a method of exchanging mail or files and submitting or receiving jobs between connected systems.
- A collection or grouping of trading partners for the purpose of achieving a common goal.
- An online resource where groups of people with a common interest can interact with each other.
- A collection of consumer organizations. It is used as a grouping construct when publishing APIs. Communities are used to restrict the visibility and accessibility of APIs.
- In SNMP, the relationship between an agent and one or more managers. The community describes which SNMP manager requests the SNMP agent should honor.
- A group of users whose accounts are stored in the same user registry.
- A repository area where an assigned group of users can work together.
- An online resource where groups of people with a common interest can interact with each other.
- A web trading group that enables buyers and sellers to conduct business. Partners receive invitations from the sponsor to join their community. See also partner.
A library created directly in a community using the Library widget that provides community members with content management capabilities such as check-in/check-out, version control, and enhanced social features such as tagging and liking. See also linked library.
Combining mathematical elements or having elements that combine in a way that the result is independent of the order in which they are processed. For example, such that a + b = b + a and a x b = b x a.
A Boolean function whose arguments are the reverse of, and evaluates to the same result as another Boolean function. Commutator functions might execute quicker depending on the nature of the query.
- To compress a database, in order to reclaim space freed by the deletion of documents and attachments.
- To replace repetitive bits in a file or folder with control bits so that the file or folder takes up less space when saved.
compact peacock layout
A layout in which complex groups of linked entities are arranged to highlight the structure of associations. It is most suitable for charts with many linked entities. See also layout.
The data model and content for a particular business unit or enterprise that can be used to manage, link, and synchronize product information both internally and externally. See also data model.
An application that can distribute other specified applications to be installed on a mobile device. For example, Application Center is a Company Hub. See also Application Center.
- A built-in function that is used to compare two values and is based on the selected term data type.
- In SQL, a symbol used in comparison expressions to specify a relationship between two values. Comparison operators are = (equal to), <> (not equal to), < (less than), > (greater than), <= (less than or equal to), and >= (greater than or equal to).
- A built-in function that is used to compare two values. The comparison operators are ==, !=, <, >, <= and >=. See also operator.
- In REXX, an operator that compares two terms and returns the value 1 if the result of the comparison is true, or 0 if it is not true.
- A mode of operation in which a device can simulate the function of another device or model. The device will function like a different device of the same type, ignoring some or all of the additional features that the device might possess. Compatibility mode permits a migration between devices with minimal impact on programs that have device dependencies. See also 32-name mode, page mode.
- A mode of processing in which the IEAIPSxx and IEAICSxx parmlib members determine system resource management.
- See conversion mode.
See conversion mode*.
Table reference characters acceptable for print jobs printed on the IBM 3800 Printing Subsystem Model 1 that can be used when printing on a page printer with little or no change to the application or to the job control statements.
compatible data types
Two different data types that can be cast to one another in the database. See also implicit cast.
compatible disk layout
A disk structure for Linux on System z that permits access from other System z operating systems. See also Linux disk layout.
Offerings that have identical sets of base offering components such as resource type and measurement source. The corresponding offering components in each compatible offering can have different sets of metrics.
compatible query mode (CQM)
The query processing mode that is consistent with version 8.4.1 of Cognos Business Intelligence, and that is maintained for upgrade success. See also dynamic query mode.
In the Distributed Computing Environment (DCE), a server that offers the requested Remote Procedure Call (RPC) interface and RPC object and that is accessible over a valid combination of network and transport protocols.
compatible unit (CU)
A construction template that defines labor, materials, services, and tools resources that are required to perform construction work, such as installing a utility pole. Compatible units are used as the basis for estimating the costs and resource requirements that are associated with construction work orders.
- On a federated system, the ability to process a portion of an SQL statement that is not supported by a data source. See also pushdown, query optimizer.
- The means by which operations in a process that have successfully completed can be undone if an error occurs, to return the system to a consistent state.
- In MPTN architecture, the action of making up for differences in functions that are requested by the transport user and those provided by the transport provider.
Flow that defines the set of activities that are performed while the transaction is being rolled back to compensate for activities that were performed during the normal flow of the process. A compensation flow can also be called from a compensate end or intermediate event.
The distinct way in which a business entity is positioned in the market to obtain leadership over competitors, providing the ability to maintain sustained levels of profitability above the industry average.
An association between similar items from different manufacturers. For example, if a store sells a basketball shoe made by Company X, the store might also offer buyers a similar basketball shoe made by Company Y.
- In Ada language, the translation of an Ada source program into an executable object module.
- Translation of a source program (such as RPG or COBOL specifications) into a program in machine language. In Integrated Language Environment (ILE) languages, compilation translates source statements into modules, which then can be bound into programs or service programs.
See compile time.
- In Integrated Language Environment (ILE) languages, to translate source statements into modules that then can be bound into programs or service programs.
- To translate all or part of a program expressed in a high-level language into a computer program expressed in an intermediate language, an assembly language, or a machine language.
In the original program model (OPM), the set of machine-language instructions that is the output from the compilation of a source program. The actual processing of data is done by the machine-language program. The system-recognized identifier for the object type is *PGM.
compiled SQL PL
SQL procedure language statements that are compiled into sections within a package. See also inline SQL PL.
- In RPG, an instruction that controls a compilation listing or causes records to be inserted. The four compiler directives are /TITLE, /EJECT, /SPACE, and /COPY.
- In COBOL, a statement, beginning with a compiler-directing verb, that causes the compiler to take a specific action during compilation. The compiler-directing statements are the COPY, ENTER, REPLACE, and USE statements.
- A statement that controls what the compiler does rather than what the compiled program does.
A printout that is produced by compiling a program or creating a file and that optionally includes, for example, a line-by-line list of the high-level language source, a cross-reference list, diagnostic information; and for programs, the description of the externally described files.
A keyword that can be specified to control certain aspects of compilation. Compiler options can control the nature of the load module generated by the compiler, the types of printed output to be produced, the efficient use of the compiler, and the destination of error messages.
A keyword that can be specified to control certain aspects of compilation. Compiler options can control the nature of the load module generated by the compiler, the types of printed output to be produced, the efficient use of the compiler, the destination of error messages, and other things.
In RPG, a table that is built into the source program and that becomes a permanent part of the compiled program. See also runtime table.
- The value that can be added to the number to equal a given value.
- In Cryptographic Support, a binary value that, in an exclusive-OR operation with a given binary value of the same length, produces a binary value of all ones.
- A table attribute that indicates that the table contains a row for every primary key value of interest. As a result, a complete source table can be used to perform a refresh of a target table.
- A property of a search algorithm such that, when it returns failure in a search, it has proved that no solution exists satisfying the constraints that governed the search, and when it returns success, it is capable of finding all the possible solutions satisfying the constraints of the problem.
complete CCD table
In data replication, a CCD table that initially contains all of the rows from the replication source table or view and any predicates from the source table or view. See also noncomplete CCD table.
complete packet sequence
Either an individual X.25 data packet or a sequence of packets with the more-data bit (M-bit) set to 1 and the delivery-confirmation bit (D-bit) set to 0, followed by a further data packet with the M-bit set to 0 and the D-bit set as required.
- An indicator that reflects the status of a task set at the time of its completion.
- A return code indicating how a message queue interface (MQI) call has ended.
- In Tivoli Workload Scheduler for z/OS, a system code that indicates how the processing of an operation ended at a workstation. See also error code.
- A message the storage system sends as a result of running a command-line interface (CLI) command.
- The maximum set of hardware and software resources that support one or more images of a single operating system.
- In data processing or software engineering, pertaining to an application that may have many components, such as a graphic user interface, a client-server architecture, an engine, a database connection, an output device, input facilities, and so forth.
A step in a business process that provides direction for how the next step should be executed. There are three kinds of complex activities: sequence (serial), choice (conditional), and all (parallel).
A single operation that impacts one or more ontologies and spans multiple repository versions. Examples of a complex change are ontology content pack (OCP) imports and ontology deletions.
In COBOL, a condition in which one or more logical operators (AND, OR or NOT) act on one or more conditions. Complex conditions include negated simple conditions, combined conditions, and negated combined conditions. See also simple condition.
In FORTRAN, an ordered pair of real or integer constants separated by a comma and enclosed in parentheses. The first constant of the ordered pair represents the real part of a complex number; the second represents the imaginary part.
complex data type
A data type that is built from a combination of other data types by using an SQL type constructor and whose components can be accessed through SQL statements. See also collection data type, data type, row data type.
A named structure that contains simple elements within the message. Complex elements can contain other complex elements, and can also contain groups. The content of a complex element is defined by a complex type. See also element.
- The processing of events that have rules that rely on the data and timing of more than one event.
- A set of tools that processes event transactions and generates event alerts based on configured business rules.
An image divided into regions called image cells. See also simple image.
complex instruction set computer (CISC)
A computer that uses the traditional processor architecture to process instructions. See also reduced instruction set computer.
A measurement of how many more computing resources the solution of a problem requires as the problem grows in number of variables. Complexity is expressed in notation known informally as Big O notation or more formally as Omega notation.
A collection of multiple scorecards within one rule flow. The rule flow is used to identify the dependency, the flow and the order in which the score from each of the scorecards will be included in the overall score.
complex text language (CTL)
A language that has the properties of a simple text language but also additional characteristics of bidirectionality, automatic character shaping, or combining sequences. They use typically small character sets. Combining sequences include characters combined to form new characters, and characters combined with tone marks. In languages that are written in a bidirectional manner, the native words are written from right to left (as in Hebrew and Arabic), while numbers and borrowed words are written from left to right. Arabic and similar scripts use cursive writing and require automatic shaping of characters for rendering. See also ideographic language, simple text language.
- In Enterprise Service Tools, a structure within a message. A complex type contains elements, attributes, and groups organized into a hierarchy.
- A type that contains elements and can include attributes. See also simple type.
- In Fortran, a data type that represents values of complex numbers. A value is expressed as an ordered pair of real data items separated by a comma and enclosed in parentheses. The first item represents the real part of the complex number, and the second item represents the imaginary part.
- A type definition for an XML element that contains nested structures.
complex word processing
In lexical analysis, the process in which algorithmic processing is used to determine the boundaries of words. In the case of Indo-European languages, the LanguageWare algorithm uses constraints in order to determine optimal boundaries. For Chinese, LanguageWare uses statistical processing - word frequencies and collocation frequencies. For Japanese LanguageWare uses a combination of statistical and grammatical processing.
- The state of being in accordance with regulated standards
- The state of an implementation that fully meets each and every requirement of the standards specification. Specifically, each transaction, action, or data element produced by the implementation must be valid as defined by the standard.
- A state of being in accordance with established software and security specifications on target computers, or the process of becoming so.
A service that allows the buyer to customize products for their customers. For example, a compliance service might be configured for an item so that the item is shipped to the buyer with the buyer’s brand label.
In i5/OS licensed management, the value that determines the action the product must take when the authorized usage limit is reached or exceeded. The warning compliance type indicates users are never denied access to a product. The operation action compliance type means that new users are denied access to the product once the usage limit is reached, but users that are currently using the product still have access.
- An element of the system under test. A component can include service providers and infrastructure elements.
- In Eclipse, one or more plug-ins that work together to deliver a discrete set of functions.
- A grouping of related artifacts in a stream or repository workspace. A component can contain any number of folders and files.
- A reusable object or program that performs a specific function and works with other components and applications.
- A ClearCase object that is used to group a set of related directory and file elements within a Unified Change Management (UCM) project. Typically, the elements that make up a component are developed, integrated, and released together. A project must contain at least one component, and it can contain multiple components. Projects can share components.
- A part of a structured type or value, such as an array element or a record field.
- A software item that is part of a software product, and might be separately identified, but is not individually licensed.
- A connection, build, reference dimension, reference structure, template, JobStream, user-defined function, metadata dimension, or metadata collection in a catalog.
- A representation of deployable items and the user-defined processes that operate on them, usually by deploying them.
- A visual element of a host screen, such as a command line, function key, or selection list. HATS applications transform host components into widgets.
- The main building block that is used to define trigger events in a trigger system.
- A hardware or software entity forming part of a system, or a piece of logic that controls the operation of a device, modifies, or stops a control function.
- A unit of organization consisting of a reusable set of engineering artifacts. See also artifact, stream.
- A container that is used to organize a model. When creating a new model, components should be created first, in order to give the model a framework and ensure that it is easy to navigate. Once components have been created, model elements, such as tables, calculations, and plans can be built. See also baseline, stream.
- A named, cataloged collection of stored records, such as the data component or index component of a key-sequenced file or alternate index. A component contains no named subsets.
- In VisualAge RPG, a functional grouping of classes and related files within a product.
- A part of a specified source that generates an audit message (such as the Gentran Server for Windows Unattended program).
- An entity about which measurements are collected for reporting purposes. Sample components include a specific network storage device; the web address http://www.ibm.com; and a person with whom one has a customer relationship. Each component type in the data model has a set of metrics and attributes that apply to all components of that type.
- A set of modules that performs a major function within a system.
In the IBM Director Rack Manager task, a function that can make a managed system or device rack-mountable when the inventory collection feature of IBM Director does not recognize the managed system or device. The function associates the system or device with a predefined component.
A software development model that provides for consistent packaging of software components; the ability to upgrade part of a system as it is executing; the ability to control, monitor, and deploy software across global networks; and the ability to locate and implement services on a global scale. When developed according to the component model, components have interfaces that are rigorously implemented, are packaged into JAR files, and have dynamic execution environments.
A utility that allows the import and export of components between catalogs. See also multi-developer support.
A queue holding work items that can be completed by an external entity that interacts with the workflow. See also queue.
An expression about one or more components, which is defined in the Type Designer. A component rule is used for validating data and specifies what must be true for the data that is defined by that component to be valid.
component store archive
A starter store archive for a component of a composite store archive. Component store archives are available for each business model. See also composite store archive.
See composed-text page.
composed-text print job
In VSE, a print job that has been composed into pages. The composed-text print job is usually the output of a text formatting program such as DCF and is composed entirely of AFP structured fields.
- A group of related data elements used in EDI transactions.
- In multimedia applications, the combination of two or more film, video, or electronic images into a single frame or display.
- A Service Component Architecture (SCA) element that contains components, services, references, and wires that connect them.
- A class that is related to one or more classes by a composition relationship.
composite bar chart
In the GDDM function, a bar chart in which multiple vertical axis values for the same horizontal axis value are stacked one on top of another. See also floating bar chart, multiple bar chart.
composite bar graph
In Performance Tools, a bar graph in which multiple vertical axis values for the same horizontal axis value are stacked one on top of another. See also floating bar graph.
composite block index
An index that contains only dimension key columns and is used to maintain the clustering of data during insert and update activity in a multidimensional clustering (MDC) or insert time clustering (ITC) table. See also dimension block index.
composite catalog entry
A collection of catalog entries that breaks down to its separate components when ordered. See also dynamic kit.
composite data element
A data element that contains two or more component data elements or subelements. Composites are defined by the EDI standards that use them (EDIFACT, TRADACOMS, and certain ANSI X12 standards).
composite data type
See row data type.
A "high-level" event, typically formed from the combination of two or more atomic events. However, composite events can be "empty" - that is, they may contain no sub-events. See also atomic event, user-defined event.
In Q Language, a large expression that has been created from a series of smaller expressions. See also arithmetic operator.
An index constructed on two or more columns of a table. The order imposed by the composite index varies least frequently on the first-named column and most frequently on the last-named column.
- An ordered set of key columns of the same table.
- An ordered set of key columns or expressions where the referenced column names are from the same table. See also key.
- A key for a file or record format that is composed of more than one key field.
The host's virtual view of the Peer-to-Peer Virtual Tape Server (PtP VTS) subsystem. In general, host communication with a library will occur at the composite level with the virtual volumes and drives being defined to the composite library.
An object that contains other objects. For example a document object that contains not only text, but also graphics, audio, image, and video objects, each of which can be manipulated separately as an individual object.
An operator that is implemented in the Streams Processing Language (SPL) that encapsulates a subgraph of a data flow graph that can be parameterized to make it reusable in multiple streams processing applications. See also data flow graph, main composite operator, operator, streams processing application, subgraph.
composite store archive
A compressed file that contains the organization structure, predefined user roles, and necessary access control policies to create the appropriate store environment, plus a working starter store or site. Each of the parts that make up the composite store archive are also available as separate store archives. See also component store archive, store archive.
A hierarchy in which the composition of the data is reflected in the structure of the group type in the group window. See also classification hierarchy.
An activity that has detail that is defined as a flow of other activities. A compound activity is a branch (or trunk) in the tree-structure hierarchy of process activities. Graphically, a compound activity is a process or subprocess.
In License Use Management, a type of license that allows a system administrator to generate license passwords for a given number of licenses. Such a license is valuable when an administrator needs a certain number of licenses, but does not yet know what machines or who will use them.
A type of string designed to simplify foreign language support by allowing text to be displayed without hard-coding the language-dependent attributes (character set, text, and direction).
In REXX, a symbol that permits the substitution of variables within its name, when referred to. A compound symbol contains at least one period and at least two other characters. It cannot start with a digit or a period, and if there is only one period in the compound symbol, it cannot be the last character. The compound symbol begins with a stem (that part of the symbol up to and including the first period). The stem is followed by the tail (the parts of the name, delimited by periods, that are constant symbols, simple symbols, or null). Compound symbols allow the construction of arrays, associative tables, lists, and so on.
- To reduce the size of a set of data, such as a file, to save space or transmission time. See also compressed format.
- To hide objects within a data hierarchy. A plus sign is used in a compressed section to indicate that objects are hidden.
A method of digitally encoding and decoding several seconds of voice quality audio per single videodisc frame. This increases the storage capability to several hours of audio per videodisc. Sometimes referred to as still frame audio or sound over still.
A type of extended-format data set. In the Virtual Storage Access Method (VSAM), individual records are put in a compressed-format data set; in the sequential access method (SAM), individual records or blocks are put in a compressed-format data set. See also compress, extended format.
In CoOperative Development Environment/400, a graphical representation of the listing of the program currently being debugged. See also compressed source.
In CoOperative Development Environment/400, a graphical representation of the source of the program currently being debugged. See also compressed listing.
Video resulting from the process of digitally encoding and decoding a video image or segment using a variety of computer techniques to reduce the amount of data required to represent the content accurately.
- In SNA, the replacement of a string of up to 64 characters by an encoded control byte to reduce the length of the data stream sent to the LU-LU session partner.
- The act of hiding child items of a selected object when the outline view is selected.
- A function that removes repetitive characters, spaces, strings of characters, or binary data from the data being processed and replaces characters with control characters. Compression reduces the amount of storage space that is required for data.
The dictionary that is referred to during the process of compression and decompression. In DB2 for z/OS, this dictionary is created from the data in a table space or table space partition. In DB2 for Linux, UNIX, and Windows, this dictionary is created from data in each table partition, data in each table in a database partition, or XML data stored in the XML storage object of a table. A compression dictionary is specific to the table space, table space partition, table, or XML storage object from which it was created. See also automatic dictionary creation.
A constructor that creates element, attribute, document, text, processing-instruction, or comment nodes in which the content of the node is based on enclosed expressions. See also constructor, direct constructor.
In the Distributed Computing Environment (DCE), the resulting time after a Distributed Time Service (DTS) clock synchronization. Computed time is the value that the clerk or server process computes according to the values it receives from several servers.
- A Blue Gene core node on which user applications run.
- A node that runs a virtual machine instance, which provides a wide range of services, such as providing a development environment or performing analytics.
- An independent machine that contains one or more microprocessors, memory, storage, and network controllers and runs its own operating system and applications. See also integrated technology element.
- A processing node in a parallel processing environment that handles elements of the job logic. Any processing node that is not a conductor node is a compute node. See also processing node.
An instruction that can be recognized by the processing unit of the computer for which it is designed. See also computer language.
- An exchange in which a central node acts as a high-speed switch to establish direct connections between pairs of attached nodes.
- A computer-driven, digital communications controller providing telephone communication between internal stations and external networks.
A language that can be used directly by a computer without intermediate processing. See also computer instruction.
Computer Science Network (CSNET)
A large computer network, mostly in the United States but with international connections. CSNET sites include universities, research labs, and some commercial companies. CSNET has merged with the Because It's Time Network (BITNET) to form the Consortium for Research and Education Network (CREN).
computing system RPQ
A customer request for a price quotation on alterations or additions to the functional capabilities of a computing system, hardware product, or device. The RPQ can be used in conjunction with programming RPQs to solve unique data processing problems. See also programming request for price quotation.
COM setup data
Data that enables the PSF user to designate unique microfilm printing functions for AFP print jobs. The parameter values, structure, syntax, and semantics are defined by the COM manufacturer, not by IBM-controlled architectures.
- To join two character strings.
- To link together.
The key that is constructed to access a particular segment. A concatenated key consists of the key fields, including that of the root segment and successive children, down to the accessed segment.
- In REXX, an operator used to combine two strings into one by adding the second string to the right end of the first string. The concatenation operators for REXX are a double vertical bar (which concatenates without a blank) and the blank (which concatenates with a blank).
- The symbol used to join two character data items. The concatenation operator is often represented as two vertical bars (||).
- Any device that combines incoming messages into a single message (concentration) or extracts individual messages from the data sent in a single transmission sequence (deconcentration).
- In data transmission, a functional unit that permits a common transmission medium to serve more data sources than there are channels currently available within the transmission medium.
- An FDDI node that has additional parts beyond those required for its own attachment to a FDDI network. These additional parts (type M) are for attaching other FDDI nodes (type S) in a tree topology. Primarily, a concentrator is used to allow more than two single attachment stations (SAS) to communicate. It can also connect multiple SAS to a dual attachment station (DAS) ring.
- A description of information in XBRL. See also fact.
- A class of objects and terms in a domain. For example, in a health care domain, concepts can include doctor, patient, symptom, and disease.
- A class of entities that are represented by general metadata definitions rather than physical document standards.
A text analysis function that identifies significant vocabulary items, such as people, places, or products, in text documents and produces a list of those items. See also theme extraction.
Business transformation operations process (BTOP) phase in which the PDT understands requirements and develops concepts, confirms need and ability to develop a solution, develops initial project proposal including templates, determines funds for next phase.
The most abstract form of specialization of an architecture, favoring coverage over precision, and specifying a finite set of types for components and for relationships in the system.
A representation of the key elements of an offering and their relationships. For systems, such as computers and computer software, the conceptual model conveys a user’s perspective of the system, including the elements of the system as perceived by users and what users can do with them.
- In DCE X/Open Object Management, an OM class that permits instances.
- A class defining objects that can be created.
- A class that is not abstract.
- A class that can be directly instantiated. See also abstract class.
An element for which the attribute abstract in its XML schema declaration has the value of false and which therefore might appear in an instance document. See also abstract element.
In object-oriented programming, a class that is used to create instances of another class. A concrete factory isolates the creation of objects of a particular class into one place so that new functions can be provided without widespread code changes.
- The management of contention for data resources.
- In a multi-user environment, a system of controls that ensure that modifications made by one person do not adversely affect another concurrent user.
- Pertaining to the occurrence of two or more activities within a given interval of time. Concurrent processes can alternately use shared common resources.
- Pertaining to the shared use of resources by multiple interactive users or application programs at the same time.
Simultaneous access to a shared volume group or a raw disk by two or more nodes. In this configuration, all the nodes defined for concurrent access to a shared volume group are owners of the shared resources associated with the volume group or raw disk.
concurrent cold repair
Repair to hardware that is electrically isolated from the running system. The hardware that is isolated has no resources that are being used by the system when the repair is started.
- A function that increases the accessibility of data by creating a consistent copy of the data concurrent with regular processing.
- A function of the DFSMSdss component that is used to back up any collection of data at a point in time with minimum down time for the database or application that uses the collection of data.
concurrent copy-compatible snapshot (CC-compatible SnapShot)
See virtual concurrent copy.
concurrent image copy (CIC)
A batch utility program that is used to make a copy of OSAM data sets and VSAM entry-sequenced database data sets (DBDSs), whether or not IMS is running and the database is online.
A type of license, administered by the network license server, that can be used by different users from any node that is connected to a network license server. Concurrent licenses enable as many users to use a particular software product concurrently as there are licenses. See also concurrent offline license.
A login that occurs simultaneously with other logins. See also login.
concurrent offline license
A type of license that allows authorized users to reserve a concurrent license for a certain number of days and to use it on a portable computer that is disconnected from the network. See also concurrent license.
concurrent resource group
A resource group that attempts to become activated on all the nodes in the node list with no priority among the owner nodes. If one node fails, the other nodes continue to offer the service. See also nonconcurrent resource group, resource group, resource group policies.
A server that can handle many connections at the same time. It can accept new connection requests while still processing the transactions started by previous requests. See also iterative server.
In SQL replication, a table attribute that indicates that the table contains current data rather than a history of changes to the data. A condensed table includes no more than one row for each primary key value in the table. As a result, a condensed table can be used to supply current information for a refresh.
condensed CCD table
In data replication, a CCD table that contains only the most current value for a row and has only one row for each key value. See also consistent-change-data table, noncondensed CCD table.
A typeface in which all characters are narrowed, making them appear taller. See also expanded type.
- A specified term, its value, and an operator that are used for comparison with a contract. One or more conditions may be used to select an approval rule.
- A database object that names an SQL exception or warning, optionally with an associated SQLSTATE, that can be signaled or referenced by a handler in SQL PL. See also module object.
- An exception that has been enabled, or recognized, by the Language Environment and thus is eligible to activate user and language condition handlers. Conditions can be detected by the hardware/operating system and result in an interrupt. They can also be detected by language-specific generated code or language library code.
- In a business state machine, an expression that guards the transition and allows transition to the next state only when and if the incoming operation evaluates to 'True'. Otherwise, the current state is maintained.
- The state of an event, which might trigger a response.
- In the Integrated Language Environment (ILE) model, a system-independent representation of an error condition within a high-level language (HLL). For an i5/OS program, each ILE condition has a corresponding exception message.
- A test of a situation or state that must be in place for a specific action to occur.
- A specified property, a value, and an operator that defines a comparison relationship between them. One or more conditions can be used to create a query or a conditional formatting specification. See also parameterized query.
- An expression that can be evaluated as true, false, or unknown. It can be expressed in natural language text, in mathematically formal notation, or in a machine-readable language. See also selection.
- The component of a policy expression that specifies the states for which a policy is relevant.
- In REXX, a specific event, or state, that can be trapped by the REXX CALL ON or SIGNAL ON instruction.
- The part of a standardization rule that defines the requirements that the record must meet for the rule to apply to that record. A pattern is a type of condition. See also action, pattern, standardization rule.
- An expression that consists of an agent attribute, an operator such as greater than or equal to, and a value. It can be read as "If - system condition - compared to - value - is true". See also situation.
- In an event definition, one or more criteria that must be true in order for the event to be executed. Any or all of the conditions may be configured as the requirement for event execution.
- A situation that matches document attributes against decision points and routes the documents to different paths based on the specified attribute and value combinations.
- The circumstances or state information of a managed resource that are examined during policy evaluation.
conditional access list
In RACF, an access list within a resource profile that associates a condition with a user ID or group ID and the corresponding access authority, allowing otherwise unauthorized access if the specified condition is true. See also access list.
A breakpoint where processing is suspended when a specified condition evaluates to TRUE. See also unconditional breakpoint.
- An SNA indicator in the request header, FMH5, denoting the end of a conversation between two transactions. See also begin bracket.
- In SNA, the value (binary 1) of the conditional end bracket indicator in the request header (RH) of the last request of the last chain of a bracket; the value denotes the end of the bracket. See also end bracket.
- A statement that compares the relationship (such as greater than or equal) of two items.
- A compound expression that contains a condition (the first expression), an expression to be evaluated if the condition has a nonzero value (the second expression), and an expression to be evaluated if the condition has the value zero (the third expression).
- In COBOL, a simple condition or a complex condition specified in an IF, a PERFORM, or a SEARCH statement.
The process of defining and applying rules to change the appearance of chart items automatically, based on their properties. See also conditional formatting specification.
conditional formatting specification
A collection of conditional formatting rules. See also conditional formatting.
See dynamic hold.
An alternative method for choosing a reason code assignment. It is a reasoning strategy that the user specifies in the scorecard requirements, which evaluates every attribute’s possible value ranges. The reason codes are determined based on the expected value of the attributes and rank order. Typically, the four lowest expected and their corresponding reason codes are chosen. A conditional mean can be used in neural nets and fused scorecards.
- In REXX, a phrase in a DO instruction, introduced by the subkeyword WHILE or UNTIL, that is used to change the iteration of a repetitive DO loop.
- In COBOL, a phrase that specifies the action to be taken on the determination of the truth value of a condition resulting from the running of a conditional statement.
A type of prompting that is provided by the system depending on the values selected by the user for other parameters. See also selective prompting.
conditional restart control record (CRCR)
A queue of records in the bootstrap data set (BSDS) that is associated with a conditional restart of DB2 for z/OS. Each element in the queue indicates the choices that were made when the record was created and the progress of the restart operation it controls.
- In COBOL, a statement that controls program flow based on the result of the evaluation of a condition.
- A statement that permits execution of one of a number of possible operations, with or without a transfer of control.
- A statement used to express an assignment or branch based on specified criteria.
- A statement that runs if a specified expression evaluates to a nonzero value.
A user-written routine or language-specific routine (such as a PL/ION-unit or C signal() function call) invoked by the Language Environment condition manager to respond to conditions.
condition information block (CIB)
The platform-specific data block used by the Language Environment condition manager as a repository for data about conditions raised in the Language Environment run-time environment.
- In data communications, the addition of equipment to a nonswitched voice-graded channel to provide minimum values of line characteristics required for data transmission.
- The use of indicators to control when calculations or output operations are to be performed.
- The use of indicators in a program to control when calculations or output operations are done, or in a file, the use of indicators or condition names to control when certain functions or operations are done.
- In COBOL, a name assigned to a specific value, set of values, or range of values within the complete set of values that a conditional variable can have.
- For display files, a name used to control the selection of DDS keywords and display locations based on the model of the display station.
- The name assigned to a status of a user-defined switch.
The step of the Language Environment condition handling model that follows the enablement step. In the condition step, user-written condition handlers, C signal handlers, and PL/I ON-units are first given a chance to handle a condition. See also enablement step, termination imminent step.
- A 12-byte data structure, which is consistent across multiple Systems Application Architecture (SAA) participating systems, that allows the application programmer to associate the condition with the underlying exception message.
- In Language Environment, a data type consisting of 96 bits (12 bytes). The condition token contains structured fields that indicate various aspects of a condition including the severity, the associated message number, and information that is specific to a given instance of the condition.
In REXX, the method by which the explicit flow of processing in a REXX program can be changed. Condition traps are enabled or disabled using the ON or OFF subkeywords of the CALL and SIGNAL instructions.
The processing node that initiates the job run. See also processing node.
Conference on Data Systems languages (CODASYL)
An organization founded in 1959 by the U.S. Department of Defense. CODASYL was known for its definition of COBOL, but it was also involved with the network database model and the data description language (DDL) for defining database schemas.
The predicted probability of an answer being correct. Precision and accuracy are both related to the confidence metric produced by Watson for each possible answer it returns. Candidate answers are ranked by confidence; if the customized pipeline is providing high-quality answers, confidence should show a strong correlation with answer quality.
A number between 0 and 100 indicating the level of accuracy of the trended value. The number 0 indicates no confidence. The number 100 indicates a perfect correlation between trended and actual measured values.
- In computer security, assurance that sensitive information is not visible to an eavesdropper.
- The security service that protects sensitive information from unauthorized disclosure. Encryption is a common mechanism for implementing this service.
See configuration specification.
A product or item that offers different options from which a customer can select before purchasing that item. The choice of options or available combinations of options may be constrained so that customers can only choose certain combinations of options for their purchase.
- A type of decision, for both solicited and unsolicited interactions, that controls the properties of a managed resource.
- The manner in which the hardware and software of a system, subsystem, or network are organized and interconnected.
- The process of describing to a system the devices, optional features, and program products that have been installed so that these features can be used. See also customization, system customization.
- See topology.
- In a broker domain, the brokers, execution groups, deployed message sets, and deployed message flows, and the defined topics and access control lists.
- The machines, devices, and programs that make up a system, subsystem, or network.
- A modification of an existing model, such as a new derivative of an existing engine.
- The operating system parameters of a system profile.
- A unique set of versions of artifacts. Configurations commonly identify one version of each artifact in the set. The artifacts can be unchanging (from a baseline) or open to change (in development). In some systems, configurations can be hierarchical, so that they contain other configurations. See also artifact, baseline, configuration provider, configuration specification, global configuration provider, version.
- The set of attributes that define how a program is run.
The administration of the configuration object types (CTs), configuration objects (COs), and configuration object sets (COSs) that comprise the configuration data of organizational units (OUs). This is carried out after the product has been installed and customized.
A Systems Monitor feature that is used (a) to configure the Mid-Level Manager (MLM), the System-Level Manager (SLM), and the System Information Agent (SIA), (b) to reinitialize daemons, and (c) to control data retrieval and collection from remote nodes.
Entities used to model an organization and to specify how messages are processed. These entities include configuration object types (CTs), organizational units (OUs), configuration object sets (COSs), configuration objects (COs).
- In performance, a file that contains information about a collection as well as certain system attributes.
- A file read during database server disk or shared-memory initialization that contains the parameters that specify values for configurable behavior. A database server and its archiving tool use configuration files. See also parameter.
- A Struts file that contains information about data sources, form beans, global forwards, and action mappings.
- A file that contains the values of configuration parameters. See also database configuration file, database manager configuration file.
- A file that specifies the characteristics of a program, system device, system, or network.
- See parameter file.
configuration item (CI)
Any component of an information technology infrastructure that is under the control of configuration management. See also asset.
A list of local or remote locations, network addresses, or pass-through device descriptions used by some types of communications descriptions. The system-recognized identifier for the object type is *CFGL.
- The control of information necessary to identify both physical and logical information systems and their relationship to one another.
- The process of planning for, identifying, controlling, and verifying the configuration items within a service, recording and reporting their status and, in support of change management, assessing the potential impact of changing those items.
Configuration Management Database (CMDB)
A database that contains details about the attributes and history of each configuration item and the details about the relationships between configuration items.
configuration management system (CMS)
A set of databases and tools that are used to manage configuration data. A CMS can include one or more CMDBs, plus data about changes, incidents, and other artifacts and processes. The CMS is maintained by the configuration management process and used by all service management processes.
The component that provides an interface between the workbench and a set of runtime brokers. It provides brokers with their initial configuration, and updates them with any subsequent changes. It maintains the broker domain configuration.
- A server that distributes configuration information, such as policies and schedules, to managed servers according to their profiles. Configuration information can include policy and schedules. See also enterprise configuration, managed server, profile.
- A program to supervise device configuration during initial program load (IPL).
configuration object (CO)
An instance of a configuration object type (CT) that represents an object in an organizational unit (OU). Which attributes can be added to a CO is determined by the definition of the CT on which the CO is based.
- A variable that controls the behavior of the system or the behavior of all applications running on the system.
- A parameter whose value limits or defines the resources that can be used by the database manager or a database. Some configuration parameters are informational and define characteristics about the environment that cannot be changed. See also database configuration parameter.
A WebSphere Application Server container for runtime configurations that administer a particular set of services; for example, the deployment manager configuration profile administers a cell.
configuration report server (CRS)
A function that resides on each ring in an environment of multiple token-ring networks in which configuration is being monitored. This function receives notifications about inserting and removing stations and notifications about active monitor failures.
- A RIM repository that contains information stored by inventory scans and software distributions.
- A storage area of configuration data that is typically located in a subdirectory of the product installation root directory.
Service activating, deactivating, and maintaining the status of physical units, links, and link stations. See also session services.
In a sharded deployment, a database shard that contains configuration data. It is shared by all the colonies that exist within an application version, and stores sourcing rules, routing guides, shipping preferences, and other business rules.
configuration specification (config spec)
A set of rules that specify versions of artifacts. Commonly a configuration specification identifies at most one version of a given versioned artifact. See also artifact, configuration, version.
Software that provides a dynamic rules-based kit (bundling) capability to determine a group of items that may be sold together. The configurator may also supply a price for the configuration. This grouping is based on pre-defined rules in addition to user interaction with the configurator. See also dynamic kit.
- To describe the interconnected arrangement of the devices, programs, communications, and optional features installed on a system.
- To describe setting up auxiliary storage pools and checksum protection.
- In storage, to define the logical and physical configuration of the I/O subsystem through the user interface that the storage facility provides for this function.
Takes a device from the defined state to the available state. If a device has a device driver, the configure method is responsible for loading and binding the driver into the kernel. If the device supports the optional stopped state, the configure method takes the device from the defined state to the stopped state.
- In X.25 communications, to respond to the arrival of a clear-indication or reset-indication packet.
- In OSI, a service primitive issued by a service provider to complete the procedures associated with a confirmed service.
confirmation of delivery (COD)
The automatic notification to the sender of a message, note, or document as to when action is taken on the message, note, or document. Confirmation of delivery must be requested by the sender.
In DFSMSrmm, a panel that signals DFSMSrmm whether to continue or stop a delete or release action. Confirmation of delete or release requests is specified in the dialog user options.
In OSI, a service that indicates to the sender whether or not data or control information was properly received. A confirmed service involves a request, indication, response, and confirm service primitive. See also unconfirmed service.
confirm-on-delivery report (COD report)
A WebSphere MQ report message type created when an application retrieves a message from the queue in a way that causes the message to be deleted from the queue. It is created by the queue manager.
- In an infeasible model, a set of constraints that cannot all be true at the same time. See also relaxation.
- See role alert.
- A result that occurs when two simultaneous edit submissions are processed for the same object and where the intended outcome of the edit is unclear.
- A situation in which two or more change sets independently modify the same item in a repository workspace.
The process of determining whether a replicated change (an insert, an update, or a delete) is incompatible with some characteristic of a target. An incompatibility exists, for example, if changes were made to both a source and a target before replication occurred. See also master table, replica table.
An external reference from a Fortran or assembler language routine to a Fortran library routine with a name that is the same as the name of a C/C++ library routine. The reference is considered to be a conflicting reference only when the intended resolution is to the Fortran library routine rather than to the corresponding C/C++ library routine.
See role alert rule.
A subset of the ebMS specification that provides guidelines for secure and payload-agnostic exchange of B2B documents using web services. A conformance policy defines which profiles to use to validate whether received messages conform to the specified profiles.
- A situation that occurs when network traffic exceeds a connection's bandwidth.
- See network congestion.
- A network condition that occurs when a link or node is carrying so much data that the quality of service is degraded. Typical effects include queueing delay, packet loss, or the blocking of new connections.
A transportation fee that is charged to drivers for using roads during peak periods, encouraging drivers to use public transportation, reduce emissions, and lighten traffic congestion.
A grouping of name segments that contains two or more given names, two or more titles, pairs of titles and given names, two or more entire names, or any combination of these name elements. For example, "Mr. and Mrs. John Smith" contains conjoined titles and "Mr. and Mrs. John and Mary Smith" contains conjoined titles and conjoined given names in the same construction.
connect data set to line (CDSTL)
In SNA, an option that determines how the data terminal ready (DTR) signal to the modem operates. It is used if a DTR indicates an unconditional command from the data terminal equipment (DTE) to the attached data circuit-terminating equipment (DCE) to connect to or remove itself from the network.
In VTAM, pertaining to the state of a physical unit (PU) or a logical unit (LU) that has an active physical path to the host processor containing the system services control point (SSCP) that controls the respective PU or LU.
- A set of parameters used by HATS to connect to a host application, stored in an .hco file. See also background connection, default connection.
- A direct relationship between a pair of entities on a chart, represented by one or more links. See also common neighbor, connection multiplicity, directed connection.
- A link between two process elements. Connections can be used to specify the chronological sequence of activities in a process.
- A relationship between nodes in an Application Diagram.
- A set of properties, such as host name, server launcher settings, and security settings that is required to communicate with a specific remote system.
- The information required to connect to a database. The actual information required varies according to the DBMS and connection method.
- A combination of two endpoints that the virtual private network (VPN) protects and a security policy. Such a connection can exist between any combination of a host and a gateway.
- In Open Systems Interconnection architecture, an association established by a given layer between two or more entities of the next higher layer for the purpose of data transfer.
- A feature that allows the question to connect to a business object within the application for pre-filling of answers and configure if a supplier or person master data should be updated upon submission of answer sheet by the respondent user.
- In data communication, an association established between entities for conveying information. See also SQL connection.
A mechanism that allows applications to stay connected without any resources being used on the DB2 host server. Thousands of connections can be active while only a few agents are active on the DB2 host server.
connection event sequence (CES)
This value is copied to full name (NCC) records and used by the path manager to determine the most current record pertinent to the tracking of full name (NKJE) connections.
A set of configuration values that produces connections that enable a Java EE component to access a resource. Connection factories provide on-demand connections from an application to an enterprise information system (EIS) and allow an application server to enroll the EIS in a distributed transaction.
- The identifier or token by which a program accesses the queue manager to which it is connected.
- A representation of a connection to a server resource.
- The data object containing information that is associated with a connection that DB2 ODBC manages. This information includes general status information, transaction status information, and diagnostic information. See also handle, statement handle.
See connection identifier.
- A value used to identify a resource. The value is returned to the connecting program after connect processing has established a session and must be used on subsequent requests to the resource.
- A DB2 for z/OS identifier that is supplied by the attachment facility and that is associated with a specific address space connection.
connectionless-mode network service (CLNS)
In OSI, an unacknowledged network service that enables an entity to send a unit of data from a source service access point to one or more destination service access points without establishing a connection. The OSI protocol that provides this service in the Network Layer is defined by ISO 8473 (internet protocol, or IP).
A network in which the sending logical node must have the address of the receiving logical node before information interchange can begin. The unit is routed through nodes in the network based on the destination address in the unit. The sending node does not receive an acknowledgement that the packet was received at the destination.
In the Distributed Computing Environment (DCE), a remote procedure call (RPC) transport protocol, such as User Datagram Protocol (UDP), that does not require a connection to be established prior to data transfer. See also connection-oriented protocol.
- See unacknowledged service.
- A network service that treats each packet or datagram as a separate entity that contains the source address and destination address and for which no acknowledgment is returned to the originating source. Connectionless services are on a best-effort basis and do not guarantee reliable or in-sequence delivery. See also connection-oriented network service, connection-oriented service.
A communications object for ISDN that provides a list of information used to determine when to accept incoming calls and what information to send with outgoing calls. The system-recognized identifier for the object type is *CNNL.
connection management stream
In X.25, a special stream that receives all incoming connect indications destined for DLSAP addresses that are not bound to any other streams associated with a particular PPA.
A Content Manager component that helps maintain connections to the library server, rather than starting a new connection for each query. The connection manager has an application programming interface.
connection-mode network service
In OSI, an acknowledged network service that enables an entity to send a unit of data from a source service access point to a destination service access point by establishing, maintaining, and disconnecting a connection. The OSI protocol that provides this service in the network layer is defined by the X.25 Packet-Level Protocol defined by CCITT 1980 and 1984.
A setting that controls whether multiple links between the same items are displayed as a single line, as directed lines, or as multiple lines. See also connection.
A switched network (such as a local area network, X.25, or public-switched dial network) that allows a local node to establish APPN connections to more than one undefined adjacent node.
connection-oriented network service (CONS)
A type of networked data communication in which a dedicated connection between two peer entities is established before data is transferred. A connection-oriented service consists of three phases: establishment, data transfer, and release. The two networks exchange address information only while the connection is being established. See also connectionless service.
In the Distributed Computing Environment (DCE), a Remote Procedure Call (RPC) protocol that runs over a connection-based transport protocol. It is a reliable, virtual-circuit transport protocol, such as TCP. See also connectionless protocol.
A service that establishes a logical connection between two partners for the duration that they want to communicate. Data transfer takes place in a reliable, sequenced manner. See also connectionless service.
connection point manager
In SNA, a component of the transmission control layer that (a) performs session-level pacing of normal-flow requests, (b) checks sequence numbers of received request units, (c) verifies that request units do not exceed the maximum permissible size, (d) routes incoming request units to their destinations in the half-session, and enciphers and deciphers FMD request units when cryptography is selected.
- A technique used for establishing a pool of resource connections that applications can share on an application server.
- A process in which an application server or any product that interacts with a database on behalf of applications establishes a finite set of connections to the database and maps requests from the applications to this set of connections. Using these connections reduces the overall connection time for these applications and removes the cost of establishing a database connection from the host.
- A set of data that is used to establish a connection.
- A data management file that contains parameters that associate other defined profiles to the connection of two logical units.
In COBOL, a word or a punctuation character that associates a data name, paragraph name, condition name, or text name with its qualifier; links two or more values in a series; or forms a conditional expression.
- The capability of a system or device to be attached to other systems or devices without modification.
- An object class that is used for objects that connect different parts of the network and route or switch traffic between these parts. This class includes gateways, repeaters (including multiport repeaters), and bridges.
- The degree to which storage controls are joined to a direct access storage device (DASD) and processors to achieve adequate data paths (and alternative data paths) to meet data availability needs.
- An algorithm that determines if two machines on different networks can communicate. If the machines can communicate, connectivity also determines which host names should be used and which TCP/IP routing information must be added.
- In Enterprise Service Tools, a well-defined, durable communication or programming interface to an enterprise information system. A connector provides a means of accepting data in a definable format, invoking an operation, and receiving results in a definable format.
- A component that provides data connectivity and extraction capabilities for external data sources, such as relational databases or messaging software.
- A servlet that provides a portlet access to external sources of content, for example, a news feed from a website of a local television station.
- A plug-in that is used to access and update data sources. A connector accesses the data and separates out the details of data manipulations and relationships.
- A component that provides data connectivity and metadata integration for external data sources, such as relational databases or messaging software. A connector typically includes a stage that is specific to the external data source. See also bridge, operator, plug-in.
- An arrow that connects activities in a process diagram.
- In a query management command, the TO word in the EXPORT command, the FROM word in the IMPORT command, or the AS word in the SAVE DATA command.
- See desktop plug-in.
- An electrical part used to join two other electrical parts.
- In Java EE, a standard extension mechanism for containers to provide connectivity to enterprise information systems (EISs). A connector consists of a resource adapter and application development tools (Sun). See also container.
- An installed component that provides the interface between the engine and the Tivoli Dynamic Workload Console and the Job Scheduling Console. See also engine, job scheduling console.
- Object-oriented programming class that provides standard access to APIs that are native to specific content servers.
- An object class that is used for objects that connect different parts of the network and route or switch traffic between these parts. This class includes gateways, repeaters (including multiport repeaters), and bridges. See also network class.
An optional phase of link activation during which initial communication is established. It includes dialing and answering on switched links and can include modem equalization. The connect phase is followed by the optional prenegotiation phase or by the contact phase. See also prenegotiation phase.
See connection-oriented network service.
A method of processing in which the records in the file are read, written to, or deleted in the order in which they exist in a file. See also random processing, sequential processing.
The company that receives the delivered goods from the shipper, which is known as the consignor. For example, the consignee might be a retailer or distribution center that receives deliveries from the manufacturing plant of the shipper.
A classification type for inventory materials that are stored on-site but that are owned by an external vendor. The vendor retains ownership of the consignment items until they are used and paid for by the organization that is storing them.
A state of data. A transaction updates the data and checks its state. If the transaction detects any inconsistency, the change is rolled back and the data is returned to its previous consistent state. See also ACID property, ACID transaction.
- A group of copy relationships between virtual volumes or data sets that are maintained with the same time reference so that all copies are consistent in time.
- A group of volumes whose snapshots are taken at the same point in time. See also snapshot set, unassociated volume.
A unique identifier that is generated during precompilation, stored in the application source, and sent to the database when the package is bound. The consistency token is used to ensure the integrity of the shared application information that is stored in the database as a package.
- A type of read integrity in which a program is permitted to read only committed data - data that cannot be backed out after it has been passed to the program issuing the read request. Therefore, a consistent read request can succeed only when the data is free from all locks. See also read integrity, repeatable.
- Pertaining to a file system with no internal discrepancies.
consistent-change-data table (CCD table)
In data replication, a type of replication target table that is used for storing history, auditing data, or staging data. A CCD table can also be a replication source. See also condensed CCD table, external CCD table, internal CCD table, noncondensed CCD table, staging table.
An integrity option that Virtual Storage Access Method record-level sharing (VSAM RLS) obtains for a share lock on a record. Consistent read ensures that the reader does not see an uncommitted change made by another transaction.
consistent read explicit
An integrity option that Virtual Storage Access Method record-level sharing (VSAM RLS) obtains for a share lock on a record; VSAM RLS then keeps the share lock on the record until the end of transaction. This option is available only to Customer Information Control System (CICS) transactions because VSAM does not recognize the end of transaction for non-CICS usage. This capability is also referred to as repeatable read.
- In Linux, an output device for kernel messages.
- A graphical user interface that simplifies the tasks for managing network security, such as monitoring events and scheduling scans.
- A user interface that can be used to list and manage objects or entities, such as catalogs, hierarchies, and items. See also module.
- A display station from which an operator can control and observe the system operation.
- In COBOL, a function name associated with the operator's display station.
- A user interface to a server, such as can be provided by a personal computer.
- A user interface for one or more administrative tasks. For example, the Integrated Solutions Console integrates the administrative tasks for multiple products and solutions into a single console.
console destination class
One of a set of named classes used to direct messages to certain consoles. Console destination classes also are used in specifying the messages to be received at a remote job processing (RJP) console.
A package of web-based applications, developed as standard portlets, that are installed into Integrated Solutions Console and displayed by the console to provide an interface for administering software and computer networks and resources.
console module deployment descriptor
An XML file that describes the following elements that need to be known when a console module is included in the Integrated Solutions Console framework: navigation tree contributions, page layout definitions, access control information, prerequisite portlet or console modules, and extension points.
To compute a relationship for one or more hierarchies of data. For example, consolidating the total sales for January, February, and March by adding them together results in the total sales for Quarter 1.
- In a data tree, an entry that has one or more children.
- A process that is used to group similar database objects from disparate sources or the same source into a common record.
- The process of manually combining orders and shipments into larger loads.
- The process of combining two or more duplicate records from a structural data source into a single record in the cube. See also duplicate record.
In OSI, a path that indicates both quality-of-service values through a network QOS mode and values to indicate how splitting and multiplexing is to be accomplished. A CONS path can optionally be reserved for outbound communications to a specific DTE at an adjacent node.
- A language element that specifies an unchanging value. Constants are classified as string constants or numeric constants.
- A standard rule that enables the movement of a literal constant value to a specified element or field, to indicate a qualifying relationship with another element or field, and map the current date or time to the specified element or field.
- In a business object model (BOM), a vocabulary element that verbalizes the public static final attribute of a class with the same type as the BOM class. See also verbalization.
- Data that has an unchanging, predefined value to be used in processing.
In printers, data that does not change; for example, the company letterhead and standard text in form letters, or the headings and boxes on a preprinted form. See also variable data.
- A field defined by a display format to contain a value that does not change.
- In an externally described display or printer file, an unnamed field that contains actual data that is passed to the display or printer but is unknown to the program passing it.
An optimization technique where constants used in an expression are combined and new ones are generated. Mode conversions are done to allow some intrinsic functions to be evaluated at compile time.
constant spaced font
See uniformly spaced font.
constant standard rule
A rule that enables the user to move a constant value to the specified field, indicate a qualifying relationship with another field, and map the current date or time to the specified field.
In AIXwindows, a class of objects from which a unique resource set can be inherited. For example, a PanedWindow widget can specify the size of its children by using the inherited XtNmin and XtNmax Constraint resources. The reference material associated with each widget specifies those that inherit resources from the Constraint class.
- A place in the system where contention for a resource is affecting performance.
- In lexical analysis, a morphotactics rule that accurately processes compound words using dictionaries of word formation elements.
- In NetDA/2, the set of essential requirements that are specified with the node, connection, or application definitions. A change in a constraint value changes the input to the network design. See also parameters.
- A rule that limits the values that can be inserted, deleted, or updated in a table. See also check constraint, foreign key, informational constraint, primary key, referential constraint, unique constraint, unique key.
- A restriction on the possible values that users can enter in a field.
- A security specification that denies one or more users the ability to access a model component or to perform a modeling or authoring task.
- A limit to set controls on the start and finish dates for project tasks, such as start-no-earlier-than or finish-no-later-than.
- A condition that must be satisfied by the solution of a problem. A constraint may be arithmetic, requiring that a solution satisfy certain numeric properties, or symbolic, requiring that a solution meet other properties, such as membership of a collection, uniqueness, or cardinality. See also requirement.
constraint programming (CP)
A nondeterministic method of computer programming that is based on logic and symbolic reasoning to solve intractable problems. It offers a technique for solving combinatorial problems based on applying constraint propagation on the domains of decision variables. Commercially, it offers a means of representing business rules as constraints, goals, wishes, preferences, strategies, and criteria. See also mathematical programming.
A process that dynamically reduces the domain of each variable in a problem. Modifications in the domain of one constrained variable may have implications for the domains of other constrained variables. Constraint propagation involves transmitting these implications and carrying out their effects.
- A detailed record of a request from a data repository.
- In architecture, an architected set of data such as a structured field or a triplet.
- One of the following collective concepts: data class, storage class, management class, storage group, aggregate group, and base configuration.
The attribute of applications that contain external data and require additional processing to make them reentrant. See also natural reentrancy.
- A special C++ class member function that has the same name as the class and is used to create an object of that class.
- An XQuery expression that creates XML structures within a query. See also computed constructor, constructor function, direct constructor.
- In object-oriented programming, a special method used to initialize an object.
In XQuery, a constructor where the expression is a function invocation that creates a typed atomic value. See also constructor.
- An entity that receives data from another entity.
- An application that receives and processes messages. See also message consumer.
- An individual who purchases products or services from an enterprise.
- In the context of OSLC, an application that can retrieve and process the resource data that is shared by a provider application.
- An application that uses the data in the central data warehouse for a specific business need. Consumer applications use reporting and third-party online analytical processing (OLAP) tools as well as planning, trend-tracking, analysis, accounting, and data mining tools. See also source application.
A Business-to-Customer business scenario, where the customer is an individual or group of individuals and are modeled in Sterling Field Sales or Sterling Business Center as a contact and do not have any buyer organizations associated with them.
The consumer direct business model supports commerce transactions involving products, services, or information between businesses and consumers. Consumers typically purchase goods or services directly from a business in a consumer direct scenario. The Madisons starter store is an example of a consumer direct business. See also B2B direct business model, direct sales business model.
consumer packaged goods (CPG)
Consumable goods such as food and beverages, apparel and footwear, cleaning products, and tobacco related products. Consumer goods are products that are used regularly and need to be replaced frequently.
The usage of a resource. See also saturation.
- An individual in the Emptoris suite of applications who is associated with an organization. In Emptoris Contract Management, a contact is also associated with a contract for administration purposes within the contract and can receive notifications.
- A person whose ID is configured to receive email or pager notifications of DB2 administration messages that are written to the administration notification log. The definition for each contact contains the name and the email or pager address of the person to receive notifications and is stored in the contact list of the system that is specified by the CONTACT_HOST configuration parameter of the DB2 administration server. See also administration notification log, administration notification message, orphaned contact.
- A named email address to which reports and agent e-mails can be sent. Contacts are never authenticated.
A complete historical view of a company’s marketing communications. The contact history includes targets that are contacted through campaigns; hold-out controls who do not receive a communication but are measured for comparison purposes against the target group, and the exact version offer that is given to each ID, including the values of personalized offer attributes.
A phase of link activation during which negotiation-proceeding XID3s are exchanged between the connected link stations to establish the primary and secondary roles of the link stations, the TG number to be used, and other characteristics of the link, and during which the mode-setting command is sent and acknowledged after the primary and the secondary roles are established. Link activation may consist only of the contact phase, or it may also have either a connect phase or a prenegotiation phase or both preceding the contact phase. See also prenegotiation phase.
- A data storage location, for example, a file, directory, or device. See also table space.
- A specialized logical storage space that resides in a dbspace and stores time series data for the TimeSeries data type.
- A virtual software object that encompasses all of the elements that are needed for an application to run within an operating system. See also image, registry.
- A software object that holds or organizes other software objects or entities.
- An entity that provides life-cycle management, security, deployment, and runtime services to components. (Sun) See also connector, resource adapter.
- An object that holds entries. A container can be a catalog, containing items, a hierarchy, containing categories, or a collaboration area, which will hold items or categories only (depending on the type of the container with which it is associated). See also category, collaboration area, hierarchy, item.
- An item that can contain other items. Tags that are added to a container inherit the position of the container.
- A worldwide dimensional standard for a reusable transportation vessel that can be hauled like a trailer, loaded onto a container ship, or loaded onto a freight train for transportation. The container can be loaded with cartons and sealed at the shipping dock for protection during transport.
- A column or row that is used to arrange the layout of a portlet or other container on a page.
- In a virtual tape server (VTS), a receptacle in which one or more exported logical volumes (LVOLs) can be stored. A stacked volume containing one or more LVOLs and residing outside a VTS library is considered to be the container for those volumes. See also stacked volume.
- In CoOperative Development Environment/400, a system object that contains and organizes source files. An i5/OS library or an MVS-partitioned data set are examples of a container.
In Backup, Recovery, and Media Services, an object that defines the types of physical containers that are used to store and transport removable media. Container classes are distinguished by attributes such as capacity and media class.
container-managed persistence (CMP)
The mechanism whereby data transfer between an entity bean's variables and a resource manager is managed by the entity bean's container. (Sun) See also bean-managed persistence.
A server instance or Java virtual machine (JVM) that hosts one or more shard containers. See also shard.
See container-managed transaction.
- Solution-related information or a product produced by a variety of organizations within IBM.
- The data portion of a document, as opposed to the properties that identify and describe the document. See also form data.
- See corpus.
- The data semantics of a message that is received by the dynamic assembler.
- In a web page that is based on a page template, the editable region of the page.
- In an editor, the working area that can be used to create or edit source.
content based routing (CBR)
An optional feature of the caching proxy that provides intelligent routing to back-end application servers. This routing is based on HTTP session affinity and a weighted round-robin algorithm.
content cache area
A storage area that holds temporary copies of files retrieved from remote file storage areas, as well as content retrieved from local or remote database storage areas. See also content storage area.
- See MIME type.
- A collection of subjects that users need to complete a universal task. Examples include planning, installing, administering and problem determination.
A unit of information that is a semantic representation of the subject and that is used in building the structure of an information type. Each information type defines a standard set of content elements. Content elements are defined by a schema or document type definition (DTD), which include required and optional properties that define the content element and which are used to structure the information types.
An event that responds to document or folder changes on an Enterprise Content Management (ECM) system. See also event.
- A condition on a session when two programs try to start a conversation at the same time. See also control operator.
- A situation in which a transaction attempts to lock a row or table that is already locked.
- In a local area network, a condition on a communications channel when two or more stations are allowed by the protocol to start transmitting concurrently and thus risk collision.
To a network accessible unit (NAU), a session for which it was defined during session initiation to be the contention loser. See also contention-winner session.
In data communication, a mode of transmission in which any station may transmit whenever the line is available, This occurs when a session is between brackets. If stations transmit simultaneously, protocols determine who wins the contention.
The group of threads against which a given thread must compete for the CPU. If local, the thread competes against other threads in the same process. If global, the thread competes against all other threads in the system.
In data communications, a type of half-duplex line or data link control in which either user may transmit any time the line or link is available. If both users attempt to transmit at the same time, the protocols or the hardware determines who goes first.
To a network accessible unit (NAU), a session for which it was defined during session initiation to be the contention winner. See also contention-loser session.
A simple hypertext link in rich text or graphical artifacts that provides navigation only. See also trace link.
A code that is used to set the language or dialect used for browsers and report text, and the regional preferences, such as formats for time, date, money, money expressions, and time of day.
- Software designed to help businesses manage and distribute content from diverse sources.
- The process of managing, organizing, storing, tracking ownership of, and distributing information that was created for a common purpose.
An interactive pane in the contract language view that lists the clauses of a contract, in sequence, along with indicators of required actions, and other clause properties. It is used to navigate to a particular component of the contract and allows mapping of text from the contract language to clause templates and term definitions in the contract template. See also outline.
An element type that defines a choice, sequence, or activity. A content particle can only contain one pcdata. These objects can repeat in sequence until the content particle data ends or the maximum number of times the loop is allowed to repeat is exhausted. A content particle can not be referenced by standard rules or links.
- An individual or team who produces content, for example: ITSO representatives, developerWorks brand content teams, and information development teams.
- A source for content that can be incorporated into a portal page as a portlet.
A centralized location for storing analytical assets, such as models and data. Content repository includes facilities for security and access control, content management, and process automation.
A software system that stores multimedia and business data and the related metadata required for users to work with that data. Content Manager and Content Manager ImagePlus for OS/390 are examples of content servers.
content storage area
A physical storage area, such as a file storage area, database storage area, or content cache area, used for content. See also content cache area, database storage area, file storage area.
- The database that contains the data needed to operate, such as report specifications, published models, and security rights.
- A repository that is used to hold specifications of reports, models, and data sources.
- A database that is used to store files and other content that users add to their activities.
A view of an object that shows the contents of the object in list form. Container views are provided for containers, and for any object that has container behavior, for example, a device object such as a printer. Icons view and details view are examples of contents views.
- A named part of the CICSPlex SM environment that is currently being acted upon by CICSPlex SM. For configuration tasks, the context is a CICSPlex SM address space (CMAS); for all other tasks, it is a CICSplex. See also scope.
- A set of one or more grammars that are enabled and used during a recognition action.
- An element in an XBRL instance document that defines the entity, period, and scenario that provide understanding for the values of items.
- The address space for a process, hardware registers, and related kernel data structures.
- The means that are used to group tracking data as part of a transaction flow.
- An object created for a service request in the business service model. The object contains one or more of the following details of information captured from the metadata: a business process, organization, role, channel, and domain specific information. See also context propagation.
- An application's logical connection to the data source and associated DB2 ODBC connection information that allows the application to direct its operations to a data source. A DB2 ODBC context represents a DB2 thread.
- The hierarchy of elements within which an element exists. For example, the context of a term in a business glossary is the hierarchy of categories in which the term is contained.
- One or more units of recovery, with the associated application programs, resource managers, and protected resources. A context represents a work request in an application, and the life of a context consists of a series of units of recovery.
- The information about an issue that is captured during a scan.
A search function that uses natural language terms to search for work items and source code in Java, C, C++, and COBOL. Regular expressions and wildcard characters are not required.
- A set of data values describing the context at the capture point in a running system; for example, the transaction ID, the user ID, and the current program.
- Input data that is passed with a scoring request in real time. For example, when a score is requested for a customer based on credit rating and geocode, the credit score and geocode will be the context data for the request.
A set of events, each with an associated context ID, that is used as a group for complex event processing. Rules that are associated with the events can be part of the context definition. Actions that are fired by the rules are also part of the context definition. See also context instance.
Context Dependent Scoring analysis engine
An analysis engine or annotator that creates machine learning features based on the question text, the answer, and the context in which the answer appeared, such as a passage.
See context identifier.
- A common data value that is used to group events into a context instance.
- A value that identifies the default values, such as the process instance ID or the activity instance ID, that a task depends on.
Context Independent Scoring analysis engine
An analysis engine or annotator that creates machine learning features based on the question text and the answer without regard to the context of the answer.
A group of events, actions, and context-scoped business objects that occur within the same context definition and have matching context ID values. See also context definition.
In the Performance Toolbox, menu items ending in a slash and three dots (/...). The slash and three dots signify that the line itself represents a list at the next hierarchical level. See also statistic line.
A context item that is a node. See also context item.
The position of the context item within the sequence of items. See also context item.
Describes to the WebSphere Voice Server process which contexts should be loaded into an engine. A DirectTalk for Windows application specifies which context profiles to load into the engine it has reserved.
In a multiple service transaction, the information about the details of a service request that passes from one invocation to another via the message header. See also context.
On z/OS, the authority checks that are performed when an application opens a queue and specifies that it will set the context in messages that it puts on the queue, or pass the context from messages that it has received to messages that it puts on the queue.
Help information about the specific choice or object that the cursor is on. The help is contextual because it provides information about the item in its current context. See also extended help.
The number of items in the sequence of items that is currently being processed. See also focus.
The activation of a process or activity either in a separate unit of work from the requestor or with the transaction attributes specified on the DEFINE PROCESS or DEFINE ACTIVITY command, rather than with those of the requesting transaction. The relationship of the process or activity to the requestor is as between separate transactions, except that data can be passed between the two units of work. A context switch occurs when a process or activity is activated by a RUN command, but not when it is activated by a LINK command.
The type of user assistance that is readily accessible from the product and that provides information about the user interface element with which the user is interacting. A context-sensitive help system is one implementation of contextual assistance, but contextual assistance can be provided in a variety of ways. For example, contextual assistance includes hover help, field-level help, and other user interface topics.
For thin-provisioned volumes that are configured to automatically expand, the unused real capacity that is maintained. For thin-provisioned volumes that are not configured to automatically expand, the difference between the used capacity and the new real capacity.
In mainframe computing, a relationship that is created in a control unit between a device and a channel when the channel accepts unit-check status. Contingent allegiance causes the control unit to guarantee access; that is, the control unit does not present the busy status to the device. It also enables the channel to retrieve sense data that is associated with the unit-check status on the channel path associated with the allegiance. See also implicit allegiance, reserved allegiance.
- A character represented by a plus sign (+) that lets a command be extended to more than one line.
- In REXX, a character represented by a comma that lets a clause be extended to more than one line. This character is functionally replaced by a blank and cannot be used in the middle of a string or comment.
- In RPG, additional lines specified on the file description specifications to provide more information about the file being defined.
- In RLU, a report line or sample line that is part of a record format or a group of sample lines excluding the first line in the record format or group of sample lines.
- A line of a source statement where characters are entered when the source statement cannot be contained on the previous line or lines.
- An additional line (or lines) required to continue the coding of a CL command or a DDS keyword and its value.
A set of ODF programs that search the DST for reports that are ready to print when the continuation/wait indicator for a distribution is C (continued) or the DRT status has been changed to continued by an initiate transaction from the RL panel.
A state into which a session is placed that allows its input to satisfy a request issued in any-mode or specific mode. See also any-mode.
Continuous Association Rule Mining Algorithm (CARMA)
An association algorithm that extracts a set of rules from the data without requiring input or target fields to be specified. See also antecedent, consequent.
In architecture, a bar code symbology characterized by designating all spaces within the symbol as parts of characters, for example, Interleaved 2 of 5. There is no intercharacter gap in a continuous code. See also discrete code.
continuous delivery (CD)
A software development practice that employs techniques such as continuous testing, continuous integration, and continuous deployment so that new features and fixes are packaged and deployed rapidly and at low risk to test environments and then to customers.
In architecture, connected sheets; for example, sheets of paper connected by a perforated tear strip. See also cut-sheet media.
A series of connected forms that feed continuously through a printing device. The connection between the forms is perforated so that the user can tear them apart. Before printing, the forms are folded in a stack, with the folds along the perforations. See also cut form, cut-sheet paper.
See continuous forms.
A printer that requires continuous-forms paper. See also cut-sheet printer.
continuous integration (CI)
A software development practice where members of a team integrate their work frequently so that there are multiple integrations each day. Integrations are verified by an automated build to detect integration errors as quickly as possible.
continuously powered main storage (CPM)
The function of supplying power only to main storage (cards) for a varied amount of time (for example, one day) when utility power is lost on systems that have a system power control network (SPCN).
Two or more shipments that shippers string together to obtain a discount from a carrier. See also round trip.
A strategy of replenishment that monitors the physical inventory in the reserved location, and based on the minimum and maximum configuration, releases replenishment tasks for execution when inventory falls below the minimum (trigger) level.
continuous speech recognition
Recognition of words spoken in a continuous stream. Unlike isolated or discrete word recognition, users do not have to pause between words. See also discrete word recognition.
continuum of care
An integrated system of healthcare that guides and tracks patients over time through a comprehensive array of health services that spans all levels of intensity of care including wellness, episodic care, chronic care, care management, and end-of-life care.
- In WebSphere Commerce, an agreement representing the terms and conditions that apply to a transaction.
- A legal document that is created based on the mutual understanding of the organization and the service provider for availing telecom services.
- The set of business policy assertions that have to be met by service provider at run time based on the context and content.
- A legal agreement between two parties. The common representation of an authored contract, filed contract, quote contract, or authored amendment contract. A contract begins as a draft version, and is either withdrawn or is executed. See also amendment contract, executed contract.
- A set of information about a software license for a product or products, its cost and entitlement period. When a contract is assigned to a computer group, it indicates which computers are entitled to the licenses described by that contract.
- An agreement that contains all of the essential pricing and rating information for a specific carrier. A shipper can define one or more contracts for each carrier.
In the Integration Flow Designer, a component that does not display the sources and targets associated with it. See also expanded component.
A generic occasion of significance that occurs within a contract and that can be identified. It can be based on a contract date or other dates. See also notification.
A process that occurs when the length of a converted string is smaller than that of the source string. See also expanding conversion.
The basis for an authored contract or authored amendment. It may contain contract clauses, contract folders, events, security lists, terms, a contract class, a contract category, line definitions, approvals list, and other information. See also template.
- Data that is entered into an e.List in the Contributor application.
- The primary asset that can contain Service Component Definition Language (SCDL) with composite definitions, as well as artifacts such as Java classes and Web Services Description Language (WSDL) and XML Schema Definitions (XSD).
Contributor Administration Console
A tool that enables administrators to publish an Analyst business model to the Web, manage access settings and model distribution, and configure the user's view of the model.
- In WebSphere MQ and VisualAge RPG, the result of selecting a part from the parts palette and placing it on the design window. An example of a control is an entry field.
- See widget.
- A component of a graphic interface that allows a user to select choices or type information. For example, list boxes, check boxes, push buttons, and entry fields.
In the Distributed Computing Environment (DCE) Cell Directory Service (CDS), an access right that grants users the ability to change the access control on a name and to perform other management tasks, such as replicate a directory or move a clearinghouse. See also clearinghouse.
A type of analysis that displays variations in values of the business measures over a specific period of time. This type of analysis reduces data variation, and is often used for quality control. Allowable variation is three times the standard deviation of the data.
- In the Virtual Storage Access Method (VSAM), a group of control intervals used as a unit for formatting a data set before adding records to it. In a key-sequenced data set (KSDS), each CA is pointed to by a sequence-set index record, and used by VSAM for distributing free space and for placing a sequence-set index record adjacent to its data. See also control block.
- See control block.
- A storage area used by a program to hold control information.
- In CICS, a storage area used to hold dynamic data during the execution of control programs and application programs. See also control area, control table.
- In the IBM Token-Ring Network, a specifically formatted block of information provided from the application program to the Adapter Support Interface to request an operation.
control blocks in common (CBIC)
A facility with which a user can open a Virtual Storage Access Method (VSAM) data set so that the VSAM control blocks are placed in the common service area (CSA) of the MVS operating system. CBIC provides the capability for multiple memory accesses to a single, VSAM, control structure for the same VSAM data set.
A call stack entry used as the point to which control is transferred when an unmonitored error occurs or a high-level language termination verb is used. A control boundary can be either of the following: a) any Integrated Language Environment (ILE) call stack entry for which the immediately preceding call stack entry is in a different activation group, or b) any ILE call stack entry for which the immediately preceding call stack entry is an original program model (OPM) program.
- A character whose occurrence in a particular context initiates, modifies, or stops a control function. See also carriage control character.
- A character that by itself or as the start of a sequence is a representation of a control function in a particular context. The coded representation of a control character consists of a single bit combination.
- In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, a command that can be entered interactively from the operating system command line. Such a command requires only that the WebSphere MQ product be installed; it does not require a special utility or program to run it.
- A command that allows conditional or looping logic flow in shell procedures.
In Tivoli Enterprise Data Warehouse, the component that contains the metadata that describes the data in the warehouse, including the source of the data, how the data was transformed before being placed in the warehouse, when the data was collected, and the formats used to publish the data (for example, the star schemas used to create Tivoli Enterprise Data Warehouse data marts).
control data set (CDS)
A data set containing configurational, operational, and communication information. The z/OS storage management subsystem (SMS), DFSMSrmm, and DFSMShsm use control data sets. See also active control data set, backup control data set, communications data set, migration control data set, offline control data set, source control data set.
control data set ID
In DFSMSrmm, a 1 - 8 character identifier for the DFSMSrmm control data set (CDS) used to ensure that, in a multi-system, multi-complex environment, the correct management functions are performed.
control data structures
Data structures needed to manage file data and metadata cached in memory. Control data structures include hash tables and link pointers for finding cached data; lock states and tokens to implement distributed locking; and various flags and sequence numbers to monitor updates to the cached data.
- In AFP Utilities, an input field on the screen view that is used to move the image area up, down, left, or right.
- In Application Development ToolSet, one or more specified fields that are compared to determine the record sequence in the output file.
- In RPG, one or more fields that are compared from record to record to determine when the information in the fields changes. When the information changes, the control level indicator (L1 through L9) assigned to a control field is set on.
- In data communications, a field within a frame that contains the commands, responses, sequence numbers, and poll or final bit for data link control.
- An automatically generated file that records process specifications and the success or failure of processing.
- A file that is used to specify additional options that the command line does not support.
- In DFSMShsm aggregate backup and recovery processing, one of three aggregate files generated by the aggregate backup process. It contains the catalog, allocation, volume, and related information necessary to perform aggregate recovery.
- In DB2 data warehousing, a graphical model that sequences data flows and mining flows, integrates external commands, programs, and stored procedures, and provides conditional processing logic for a data warehouse application.
- Transmission of control indicators over a link when there is no user data available to send. This is often necessary during complex procedures, such as establishing synchronization points.
- In TELNET, the standard representation for interconnection functions. The i5/OS implementation of these functions includes IP, AO, AYT, and SYNCH.
- A command to a processing component represented by a single bit combination (a control character) or a sequence starting with a control character followed by the parameter values for the command. Some examples of such functions are: Horizontal Tabulation, nul-terminated text strings in C, End of File, or ESCape sequence indicating change in Colour for the following text.
- A function that identifies how tasks are managed and how resources are allocated by defining default options once.
- An element of a character set that affects the recording, processing, transmission, or interpretation of data, and that has a coded representation of one or more bit combinations (see ISO/IEC 6429).
In Backup, Recovery, and Media Services, a group of libraries, special values, special operations, and lists that share common characteristics and are processed together due to their similar process cycles. The control groups used are backup control groups and archive control groups.
control initiate (CINIT)
A network services request sent from a system services control point (SSCP) to a logical unit (LU) asking that LU to establish a session with another LU and to act as the primary end of the session.
- A fixed-length area of direct access storage in which VSAM stores records and creates distributed free space. The control interval is the unit of information that VSAM transmits to or from direct-access storage. A control interval always includes an integral number of physical records.
- In a key-sequenced data set or file, the set of records that an entry in the sequence-set index record points to.
control interval definition field (CIDF)
In VSAM, a field located in the 4 bytes at the end of each control interval; it describes the free space, if any, in the control interval. See also record definition field.
control interval update sequence number (CUSN)
An indicator used in a data-sharing environment to determine which sharing partner last read a control interval (CI). IMS compares the value of the CUSN for each CI to determine whether a CI should be updated during area restart or recovery.
- A key combination, made by pressing the Ctrl key followed by another key on the keyboard, that performs a function or makes a special character.
- The keyboard key labeled Ctrl.
control language procedure (CL procedure)
The single Integrated Language Environment (ILE) procedure that is contained within a CL module. A CL procedure can be called by other ILE procedures when the CL module is bound with other ILE modules to create a program object (*PGM) or service program object (*SRVPGM).
control language source program
A set of control language (CL) source statements that can be compiled into either an original program model (OPM) program or an Integrated Language Environment (ILE) module.
A flow that proceeds from one flow object to another through a sequence flow link but is subject to either conditions or dependencies from another flow as defined by a gateway. Typically, a controlled flow is a sequence flow between two activities, with a conditional indicator or a sequence flow that is connected to a gateway.
controlled load service
In QoS, a level of service that supports the class of applications that are highly sensitive to overloaded networks. This service emulates a lightly loaded network in congested environments. For example, audio and videoconferencing would work well using controlled load service.
A RACF function with which an installation can control who can run RACF-controlled programs. See also dirty address space.
controlled repetitive loop
In REXX, a repetitive DO loop in which the repetitive phrase specifies a control variable. The variable is given an initial value before the first run of the instruction list and is then stepped (by adding the result of an optional expression) before the second and subsequent times that the instruction list is run.
See quiesced shutdown.
- In Tivoli Workload Scheduler for z/OS, the component that runs on the controlling system and contains the tasks that manage the plans and databases.
- See node canister.
- A component or a set of virtual storage processes that schedules or manages shared resources.
- See control unit.
- The functional component responsible for resource management (load balancing and admission control). The controller communicates with one or more data pumps to initiate and terminate connections to clients.
- A device that coordinates and controls the operation of one or more input/output devices (such as workstations) and synchronizes the operation of such devices with the operation of the system as a whole.
A command that interacts with a web controller directly. On completion, a controller command returns the name of a view task to be executed. The web controller determines the correct implementation class of the view command and then invokes it. See also task command.
The process of creating configuration descriptions for the local (device configuration) and remote (communications configuration) controllers that make up a data processing system.
controller description (CTLD)
An object that contains a description of the characteristics of a controller that is either directly attached to the system or attached to a communications line. The system-recognized identifier for the object type is *CTLD.
See control enclosure.
In RPG, an indicator (L1 through L9) used to specify certain fields as control fields and to control the operations that are performed at total and detail time in the RPG program cycle.
controlling application program
In VTAM, an application program with which a secondary logical unit (other than an application program) is automatically put in session whenever the secondary logical unit is available. See also controlling logical unit.
controlling logical unit
In VTAM, a logical unit with which a secondary logical unit (other than an application program) is automatically put in session whenever the secondary logical unit is available. A controlling logical unit can be either an application program or a device-type logical unit. See also automatic logon, control logical unit, controlling application program.
The active workstation from which the process group for that process was started. Each session may have at most one controlling terminal associated with it, and a controlling terminal is associated with exactly one session.
control logical unit (CLU)
A logical unit that resides in a Transaction Processing Facility (TPF) type 2.1 node and that is used to pass private protocol request units between this TPF type 2.1 node and the logon manager (a VTAM application program). The communication flow between the control logical unit and the logon manager enables a logical unit controlled by VTAM to establish a session with TPF. See also controlling logical unit.
See system menu.
- In Internet communications, a message that governs the aspects of a tunnel and sessions within a tunnel.
- In Q replication, a message from a Q Apply program or a user application that requests a Q Capture program to activate or deactivate a Q subscription or a publication, invalidate a send queue, or confirm that a target table has been loaded.
An action that affects the recording, processing, transmission, or interpretation of data; for example, starting or stopping a process, carriage return, font change, rewind and end of transmission. (I) (A)
- For logical unit (LU) 6.2, a service transaction program that describes and controls the availability of certain resources. For example, it describes network resources accessed by the local LU, and it controls session limits between the LU and its partners. See also contention.
- A token that performs a control function such as the symbols ().
- In computer graphics, a point in real space that controls the shape of a spline curve. The system provides hardware support for wire frame rational cubic splines, and for NURBS surfaces, the specifications of which require four control points.
- In APPN, a component of a node that manages resources of that node and optionally provides services to other nodes in the network. Examples are a system services control point (SSCP) in a type 5 node, a physical unit control point (PUCP) in a type 4 node, a network node control point (NNCP) in a type 2.1 (T2.1) network node, and an end node control point (ENCP) in a T2.1 end node. See also physical unit.
control point management services (CPMS)
A component of a control point, consisting of management services function sets, that provides facilities to assist in performing problem management, performance and accounting management, change management, and configuration management.
control point management services unit (CP-MSU)
The message unit that contains management services data and flows between management services function sets. This message unit is in general data stream (GDS) format. See also management services unit, multiple-domain support message unit, network management vector transport.
The authority to completely control an object, which includes the authority to access, drop, or alter an object and the authority to extend privileges on the object to other users or to revoke their privileges on the object.
- A checkpoint record containing data used to initiate, modify, or stop a control operation or determine the manner in which data are processed.
- In AFP, a subset of structured fields that can be intermixed with line data records in a print data set.
control sequence class
In architecture, an assigned coded character that identifies a control sequence's syntax and how that syntax is to be interpreted. An example of a control sequence class is X'D3', which identifies presentation text object control sequences.
control sequence function type
In architecture, the coded character occupying the fourth byte of an unchained control sequence introducer. This code defines the function whose semantics can be prescribed by succeeding control sequence parameters.
control sequence introducer
In architecture, the information at the beginning of a control sequence. An unchained control sequence introducer consists of a control sequence prefix, a class, a length, and a function type. A chained control sequence introducer consists of a length and a function type.
- In SQL replication, a database server that contains replication control tables for the Capture program, Apply program, or Replication Alert Monitor. See also Apply control server, Apply server, Monitor control server, Q Capture server.
- In database replication, the database location of the applicable subscription definitions and Apply program control tables.
- A statement placed into an input stream to identify special processing options for jobs
- In programming languages, a statement that is used to interrupt the continuous sequential processing of programming statements. Conditional statements such as IF, PAUSE, and STOP are examples of control statements.
- In RPG, an entry on a control specification.
- Printer storage in which data can be entered, held, and retrieved. Control storage contains microcode instructions and other control information; for example, the print buffer.
- High-speed memory, containing microcode, that can be implemented as read only or direct access.
- Computer storage that contains the programs used to control input and output operations and the use of main storage.
A CICS area that holds the dispatch control area (DCA), interval control elements (ICEs), automatic initiate descriptors (AIDs), queue element areas (QEAs), and other control information. Generally, the control subpool occupies only one page.
- In CICS, a storage area used to define or describe the configuration or operation of the system. See also control block.
- A pre-defined table used by automatic journals to eliminate acquisitions, intercompany balances and intercompany profit.
- A device that coordinates and controls the operation of one or more input/output devices, and synchronizes the operation of such devices with the operation of the system as a whole.
- In printers, the electronics and code that control the printer and the communication attachment.
In mainframe computing, a logical subsystem that is accessed through an ESCON or FICON I/O interface. One or more control-unit images exist in each control unit. Each image appears as an independent control unit, but all control-unit images share a common set of hardware facilities.
- An automation of the process used by service representatives to vary off and vary on subsystem resources for maintenance.
- A software mechanism that the ESS uses to request that an operating system of a zSeries or S/390 host verify that one or more subsystem resources can be taken offline for service. The ESS can use this process to automatically vary channel paths offline and online to facilitate bay service or concurrent code installation. Depending on the operating system, support for this process might be model-dependent, might depend on the IBM TotalStorage Enterprise Storage Server Subsystem Device Driver, or might not exist.
control unit terminal mode (CUT mode)
An IBM protocol used for communications with an IBM 3174 or 3274 Control Unit or other appropriate interface unit. In this protocol, a program in the workstation emulates a 3278 or 3879 terminal for a user at a virtual terminal, and the interface unit is responsible for enforcing the protocol. See also distributed function terminal.
- All control fields used to sort or merge a particular group of records. The major field appears first and other fields follow in descending order of importance.
- An instruction within a document that identifies its parts or indicates how to format the document.
A function that performs a frequently needed series of tasks automatically to create or manage widgets or other code structures. Convenience functions are included in the AIXwindows Toolkit.
The process of adding a small number of cartridges to an Automated Tape Library Dataserver (ATLDS) without interrupting automated operations. The cartridges are added by inserting them directly into cells in a convenience input station.
Personal computer memory that is addressed by DOS from 0 KB to 640 KB. See also expanded memory.
See 1A keyboard.
- In the Distributed Computing Environment (DCE), the degree to which the Cell Directory Service (CDS) attempts to keep all replicas of a directory consistent.
- The idea that all platforms are merging into a single presence. The implication of convergence on the software industry is an increased importance on aligning and enforcing consistency across product UIs, devices, and deployments.
- In an algorithm, the process of repeated iterations moving closer and closer to an optimal feasible solution, as opposed to sometimes moving closer and sometimes moving further away.
- A dialog between a terminal and a message processing program using IMS conversational processing facilities. Also, a dialog between an LU 6.2 program and an IMS application program. A conversation between a terminal and a message processing program is significant status that is kept in RM, if RM is used. Status for a held conversation is not kept in RM. The IMS conversation is represented by a CCB. See also conversational processing.
- A connection between two programs over a session that allows them to communicate with each other while processing a transaction. See also session, SQL processing conversation, transaction.
- Interaction between a computer and a user.
- A forensically reconstructed flow of data between two or more network endpoints. For example, a social network conversation.
- A series of related messages between client and server components of a system, such as the request/response exchange between a browser and a server.
- See speech recognition session.
- Pertaining to a program or a system that conducts a dialog with a terminal user, alternately receiving and transmitting data.
- Pertaining to an SNA conversation or a dialog between two programs.
An optional IMS facility with which an application program can accumulate information acquired through multiple interchanges with a terminal, even if the program stops between interchanges. See also conversation, IMS conversation.
The field values of a session bean plus the transitive closure of the objects reachable from the bean's fields. The transitive closure of a bean is defined in terms of the serialization protocol for the Java programming language, that is, the fields that would be stored by serializing the bean instance. (Sun)
See session key.
See end-user verification.
The condition of a conversation, such as send or receive state. The conversation state reflects the actions that have been taken pertinent to that conversation and determines what the next set of actions may be.
- In programming languages, the transformation between values that represent the same data item but belong to different data types. Information may be lost because of conversion since accuracy of data representation varies among different data types.
- In DFSMSrmm, the process of moving removable-media-library inventory from another media management system to DFSMSrmm. DFSMSrmm manages the inventory and policies after conversion.
- The process of changing from one form of representation to another. Changing a code point that is assigned to a character in one code page to its corresponding code point in another code page is an example of conversion.
- The process of replacing a code point that is assigned to a character in one code with its corresponding code point assigned in another code.
An algorithm used during conversion. It includes the necessary logic to separate the input code point string into appropriate substrings, converting the substrings and assembling the resultant substrings, for a particular set of criteria to be used during conversion. A conversion method may use associated conversion tables as resources during the conversion.
conversion mode (CM, CM*)
The first stage of the version-to-version migration process. In a DB2 data sharing group, members in conversion mode can coexist with members that are still at the prior version level. Fallback to the prior version is also supported. When in conversion mode, the DB2 subsystem cannot use most new functions of the new version. See also conversion mode*, enabling-new-function mode, enabling-new-function mode*, new function mode.
conversion mode* (CM*)
A stage of the version-to-version migration process that applies to a DB2 subsystem or data sharing group that was in enabling-new-function mode (ENFM), enabling-new-function mode* (ENFM*), or new-function mode (NFM) at one time. Fallback to a prior version is not supported. When in conversion mode*, a DB2 data sharing group cannot coexist with members that are still at the prior version level. See also conversion mode, enabling-new-function mode, enabling-new-function mode*, new function mode.
In a print function call, a specification of how the system is to place the value of zero or more format parameters in the output stream. Each conversion specification contains a % (percent) symbol that is followed by conversion modifiers and a conversion code.
- A resource used with a conversion method to perform conversion. Typically, a conversion table contains a set of input code point values corresponding to a given set of output code point values. Its structure and contents are designed to suit the conversion algorithm with which it is to be used.
- A table that contains a set of characters that can be replaced with alternative characters.
- An object that contains a set of hexadecimal characters used to convert one or more characters of data. The table can be used for the conversion of data being moved between the system and a device. For example, data stored in one coded character set may need to be displayed or entered on display devices that support a different coded character set. The table can also be used to specify an alternative collating sequence or field conversion functions. The system-recognized identifier for the object type is *TBL.
An intermediate form of a character-coded command that is produced by VTAM through use of an unformatted system services definition table. The format of a converted command is fixed; the unformatted system services definition table must be constructed in such a manner that the character-coded command (as entered by a logical unit) is converted into the predefined, converted command format. See also unformatted.
- In Enterprise JavaBeans (EJB) programming, a class that translates a database representation to an object type and back.
- A device that converts data from one form to another without altering the underlying information.
convert in place
See in-place conversion.
Pertaining to a set of points in which every possible line between any two points in the set contains only points that are also in the set. See also convex hull.
The minimal set of points that is both convex and fully contains the original set of points. See also convex.
See cookie identifier.
A technique used for conducting identity theft or session hijacking. By manipulating the information stored in a browser cookie, hackers assume the user’s identity and have access to that user’s information for malicious purposes.
In the Systems Application Architecture (SAA) environment, a type of distributed application in which the user interface portion of the application runs on a programmable work station while some or all of the remaining code runs on one or more linked systems.
CoOperative Development Environment/400
A feature of the WebSphere Development Studio Client licensed program that provides System i application development and maintenance tools for editing, compiling, and debugging third-generation programming languages.
Distributed processing in which processors, typically a programmable workstation and a host computer, accomplish the work of an application by means of coordinated or synchronized use of processing functions and system resources.
- A member of an ordered set of N numbers that identifies a position in N-dimensional space. For example, in a two-dimensional map of the Earth, a position can be referenced by two coordinates. The first coordinate identifies the latitude value of the position, and the second coordinate identifies the longitude value of the position.
- In architecture, one of a pair of values that specify a position in a coordinate space.
- To bring into a common action, movement, or condition.
coordinated online change
See global online change.
- In Advanced Function Presentation (AFP), a Cartesian coordinate system. An example is the image coordinate system that uses the fourth quadrant with positive values for the Y-axis. The origin is the upper-left corner of the fourth quadrant. A pair of (x,y) values corresponds to one image point. Each image point is described by an image data element.
- A reference framework that is used to define the positions of points in space in two or three dimensions.
- A given convention for locating pixels on a given display or window, where, in AIXwindows, X is the horizontal axis and Y is the vertical axis. The origin is [0,0] at the upper-left or lower-left corner, depending on the convention in use. For a window, the origin is at the upper left or lower left (depending on the convention in use), inside the border. Coordinates are discrete and specified in pixels. Each window and pixmap has its own coordinate system.
The agent that is directly responsible for processing requests from and responding to an application. If the connection concentrator is not used, the agent remains associated with the application during the life of the application and initiates subagents that work for the application. See also subagent.
In a query that spans multiple database servers, the server in which the query is initiated. To respond to the query, the coordinating server starts sessions on the other servers involved in the query. See also distributed query, remote table, subordinate server.
- In a multi-MVS configuration, a region that receives requests from master regions to initiate a takeover. It then instructs all the alternate regions to take over. See also master, subordinate.
- A user role that is responsible for managing one or more criteria of the scorecard and assigning corresponding evaluators to the scorecard.
- The system component that coordinates the commit or rollback of a unit of work that includes work that is done on one or more other systems.
coordinator control subsystem (CCTL)
In IMS, the transaction management subsystem that communicates with the DRA, which in turn communicates with DBCTL. In a CICS-DBCTL environment, the CCTL is CICS. The term is used in a number of IMS operator commands that apply to DBCTL, and in the IMS manuals.
See coordinator partition.
In a RACF data sharing group, the system on which the system operator or administrator enters a RACF command that is propagated throughout the group. See also peer system.
- A supplementary processor that performs operations in conjunction with another processor.
- In personal computers, a microprocessor on an expansion board that extends the address range of the processor in the system unit or adds specialized instructions to handle a particular category of operations.
- A product of a document copying process.
- To read data from a source, leaving the source data unchanged, and to write the same data elsewhere.
- In Enterprise Service Tools, a COBOL header file that describes all the columns in an underlying data file.
- A piece of source code that is designed to be copied into many source programs.
- An internal object in a form definition or a print data set that controls such items as modifications to a form, page placement, and overlays.
- One or more copies of a sheet of paper or form. Each copy can have modifications, such as text suppression, page position, forms flash, overlays, paper-source, and duplex printing.
- A policy object containing attributes that control how backup versions or archive copies are generated, where backup versions or archive copies are initially located, and when backup versions or archive copies expire. A copy group belongs to a management class. See also archive copy group, backup copy group, backup version, management class.
- See medium map.
copy modification segment
In the IBM 3800 Printing Subsystem, the portion of copy change that has the six control bytes and a maximum of 204 text bytes. When transferred to a printer, these bytes alter specific copies of a data set.
The method or printer mechanism for distinguishing consecutive copies of a single data set or print file. In the continuous-forms stacker, the method consists of the alternation between one, two, or three vertical bars placed on the left carrier strip between forms. In the burster-trimmer-stacker or for cut-sheet paper, the mechanism consists of offset stacking.
Copy Services CLI
See Copy Services command-line interface.
Copy Services client
Software that runs on each ESS cluster (or, optionally, in an external cluster) in the Copy Services server group and that performs the following functions: communicates configuration, status, and connectivity information to the Copy Services server; and performs data-copy functions on behalf of the Copy Services server. See also backup Copy Services server, primary Copy Services server.
Copy Services command-line interface (Copy Services CLI)
Software that invokes ESS Copy Services functions from the command-line interface (CLI) of hosts that are attached to the ESS. See also command-line interface.
Copy Services domain
See Copy Services server group.
Copy Services server
An ESS cluster (or, optionally, in an external cluster) designated by the copy services administrator to perform the ESS Copy Services functions. See also backup Copy Services server, primary Copy Services server.
Copy Services server group
A collection of user-designated ESS clusters participating in Copy Services functions managed by a designated, active, Copy Services server. See also backup Copy Services server, primary Copy Services server.
copy storage pool
A named set of volumes that contain copies of files that reside in primary storage pools. Copy storage pools are used only to back up the data that is stored in primary storage pools. A copy storage pool cannot be a destination for a backup copy group, an archive copy group, or a management class (for space-managed files). See also destination, primary storage pool, server storage, storage pool, storage pool volume.
In architecture, a part of a copy group that specifies a number of identical copies of a sheet and all modifications to those copies. Modifications include the media source, medium overlays to be presented on the sheet, text suppressions, the number of pages on the sheet, and either simplex or duplex presentation.
A named set of SMS storage groups that are to be used as containers for copy pool volume copies. A copy target is an SMS construct that lets you define which storage groups are to be used as containers for volumes that are copied by using FlashCopy functions.
A point-in-time FlashCopy copy that is managed by hierarchical storage management (HSM.) Each copy pool has a version parameter that specifies the number of copy versions to be maintained on disk.
See confirmation of receipt.
See Common Object Request Broker Architecture.
A single chip that houses a central processing unit (CPU) and is a component in the larger circuit design of a computer. A single chip can only contain one CPU, but a processor can contain multiple cores. See also dual-core, multi-core, processor value unit.
In AIXwindows, the top-level superclass from which all widgets and gadgets are derived. Core consists of three subclasses (Object, RectObject, and WindowObj) that collectively provide the appearance resources and behavioral resources required by all widgets and gadgets in the AIXwindows toolkit.
core attribute collection
A system-defined attribute collection that groups all mandatory, primary key, or path attributes for a given specification. Core attribute collections are used in the user interface to give users access to the required fields when no view has been defined. See also attribute, attribute collection, view.
A process by which the current state of a program is preserved in a file. Core dumps are usually associated with programs that have encountered an unexpected, system-detected fault, such as a segmentation fault or a severe user error. A programmer can use the core dump to diagnose and correct the problem. See also core file.
A file that preserves the state of a program, usually just before a program is terminated because of an unexpected error. See also core dump.
See storage image.
A component, resource, or service that is needed in parallel with a component. In other words, the components, resources, or services listed as corequisites of a component must be installed and configured in conjunction with the component. See also requisite.
A temporary solution to or a bypass of a problem that is necessary to provide a complete solution to correct a problem. The system requires that you apply the corequisite fix with the PTF that needs it. See also distribution requisite fix, prerequisite fix.
A resource that is provided by the console and is required for basic operation. See also resource type.
In printers, a small diameter wire (or wires, depending on the function) to which a high voltage is applied, causing ionization of the air. The ionization creates an electrical charge to perform various functions during the printing process.
The set of source documents that have been ingested into a IBM Watson system. This content can come from a variety of unstructured sources, such as wiki pages, industry journals, websites, forums, and more. These ingested resources are used to understand the question, determine hypotheses, find supporting evidence, and rank candidate answers. The term content is sometimes used to distinguish the source corpora from the terms data or training data, which describe assets that are used to train and test the system.
corrective service diskette
A diskette provided by IBM to registered service coordinators for resolving user-identified problems with previously installed software. This diskette includes program updates designed to resolve problems.
A reference to a column of a table or view that is outside a subquery. See also correlated subquery.
A subquery that contains a correlated reference. See also correlated reference.
- A statistical measure of the association between two numeric fields. Values range from -1 to +1. A correlation of 0 means that there is no relationship between the two fields.
- The relationship, captured in a correlation expression, that describes how an incoming event is matched with one or more monitoring context instances to which it will be delivered.
- In transaction monitoring, the process of tracking hierarchical relationships among transactions and associating transactions with their nested subtransactions.
- Data that enables a user to record document-specific correlation parameters generated during translation, by the correlation service, or by document tracking functions.
- A mechanism that bridges a point in a process flow between two or more process instances.
- A record used with business processes and state machines to allow two partners to initialize a transaction, temporarily suspend an activity, and then recognize each other again when that activity resumes.
See event correlation.
See correlation identifier.
- A 2-byte value that specifies an identifier of an Intelligent Printer Data Stream (IPDS) command. The correlation ID is optional and is present only if bit one of the command's flag byte is 1.
- A field in a message that provides a means of identifying related messages. Correlation identifiers are used, for example, to match request messages with their corresponding reply message.
- An application-defined identifier assigned to distributions for the user's information.
- In DB2 for z/OS, an identifier that is associated with a specific thread. In TSO, the correlation ID is either an authorization identifier or the job name.
An identifier that is specified and used within a single SQL statement as the exposed name for objects such as a table, view, table function reference, nested table expression, or data change table reference. Correlation names are useful in an SQL statement to allow two distinct references to the same base table and to allow an alternative name to be used to represent an object.
In OSI X.400, a table that records details of distributions sent and received across a gateway (such as VM/MVS bridge or X.400). A correlation table is used by a gateway to forward acknowledgments, as appropriate, after they are received.
- In Sterling Control Center, a feature that associates multiple milestones within a workflow.
- A value passed between two or more programs that allows correlation or identification of mutual resources.
- Information that identifies a relation among things. An example is a variable field of a response that identifies the corresponding request.
A starter store enhancement that enables two shoppers to explore a store, view products, and chat about products. Coshopping provides real-time synchronization of the web browsers of two users to create a single collaborative shopping session controlled by a single user.
COS Naming Directory
See CORBA Object Services Naming Directory.
- The estimated total resource usage that is necessary to run the access plan for a statement (or the elements of a statement). Cost is derived from a combination of processor cost (in number of instructions) and I/O cost (in numbers of seeks and page transfers).
- The sum of the labor and non-labor capital outlay that is required to perform a project.
- A number that is used as a weighting mechanism to differentiate one resource from another where a smaller value is always preferred.
A category into which DB2 for z/OS places cost estimates for SQL statements at the time the statement is bound. The cost category is externalized in the COST_CATEGORY column of the DSN_STATEMNT_TABLE when a statement is explained.
A parameter used to calculate the cost of inventory. Cost factors represent value modifiers that are an additional function or component from a base cost to give a new unit cost. Examples of cost factors include insurance, freight, material handling, and packaging.
A function in the simplex algorithm that associates a price or cost with a variable as variables move into or out of the basis. See also pseudocost.
cost variance at completion (CVAC)
See variance at completion.
The process of combining the lines of two or more existing contracts that are about to expire into a single renewal quote contract, calculated on a prorated basis, or according to customization.
- An aggregate function which returns the number of rows of a query or some part of a query.
- A measure that indicates the number of transactions that comprise a spend.
- An inventory control activity done to physically count and compare the physical quantity of an item in a warehouse location to the system quantity.
- The number of cases that satisfy the row and column conditions for each cell. If the table is weighted, the counts are also weighted.
- A specialized metric used to keep track of the number of occurrences or the duration of a specific situation or event. For example, you can use a counter to track the number of times that a task is started within a process, where that task is contained in a loop.
- A representation of information that is cumulative up until the sample is taken. The counter counts values that increase, such as the number of deadlocks. Counters are reset when an instance or a database is stopped and restarted. See also gauge.
- In the X.25 API, a variable that is increased by one when a packet arrives and is decreased by one when a packet is received; it can be used to notify the application program of incoming packets.
- A data item used for storing numbers or number representations in a manner that permits these numbers to be increased or decreased by the value of another number or to be set to an arbitrary value.
- A binary string that is used by some block cipher modes in an exclusive-OR (XOR) operation. It is incremented and then applied in the encryption or decryption of each block of data. For a given key, a counter should never be repeated.
- A register or storage location used to accumulate the number of occurrences of an event.
A non-redundant portion of a redundant storage area network (SAN). A counterpart SAN provides all the connectivity of the redundant SAN but without the redundancy. Each counterpart SAN provides an alternate path for each SAN-attached device. See also redundant SAN.
The first field of a count-key-data (CKD) record. This field contains eight bytes: the first four bytes identify the track address, which includes the cylinder and head that are associated with the track; the fifth byte identifies the record on the track; the sixth byte identifies the length of the record's key field; the last two bytes identify the length of the record's data field.
- An ESA/390 architecture for a direct access storage device (DASD) logical device that specifies the format of and access mechanisms for the logical data units on the device. The logical data unit is a track that can contain one or more records, each consisting of a count field, an optional key field, and an optional data field. See also custom volume.
- An architecture for a direct access storage device (DASD) device or logical device that specifies the access mechanisms for the logical data units on the device through a specific set of supported channel commands. Extensions to the CKD command set form the basis of Extended CKD.
- A data recording format that uses self-defining record formats in which each record on a volume is represented by up to three fields: a count field identifying the record and specifying its format, an optional key field that can be used to identify the data area contents, and an optional data field that typically contains the user data. See also data record, storage architecture type.
count-key-data device (CKD)
A disk storage device for storing data in the format: count field normally followed by a key field followed by the actual data of a record. The count field contains, in addition to other information, the address of the record in the format: CCHHR (where CC is the two-digit cylinder number, HH is the two-digit head number, and R is the record number) and the length of the data. The key field contains the record's key (search argument).
count-key-data record (CKD record)
See data record.
See S/390 storage.
- From the ISO standard, a 2-character abbreviation for a country, for example "CN" for China and "BE" for Belgium. Country codes and language codes together form the basis for local names. See also language code.
- In X.25 communications, the 3-digit number that precedes the national terminal number in the network user address for public networks.
country extended code page (CECP)
A single-byte EBCDIC code page in the IBM corporate registry that contains the 190 characters found in character set 00697. While each CECP contains the same set of characters (allowing for conversion of data without loss), the code point allocation of the characters is not identical. For example, all CECPs contain the character backwards slash, however in code page 500 it is located at code point x'E0' and in code page 280 it is located at code point x'48'.
See country identifier.
See territory code.
couple data set (CDS)
A data set that contains information related to a sysplex, its systems, cross-system coupling facility (XCF) groups, and their members. See also sysplex couple data set.
coupled extended remote copy (CXRC)
In z/OS or S/390 environments, a technique that supports synchronous copy operations in large environments that have an expanded number of primary-storage controls and direct access storage device (DASD) volumes; this number is in excess of those supported by a single data-mover configuration. Installations can have configurations consisting of thousands of volumes in multiple extended remote copy (XRC) sessions; coordination among the sessions ensures that all volumes will be recovered to a consistent time. CXRC greatly expands upon the ability of XRC to provide remote disaster-recovery protection across a sysplex.
- Two volumes that are paired for a remote mirroring purpose.
- A process that adds an already existing EDI to another node within the network.
- The dependency that components have on one another.
coupling facility channel
A high-bandwidth fiber-optic channel that provides the high-speed connectivity required for data sharing between a coupling facility and the central processor complexes (CPCs) directly attached to it.
coupling facility resource management (CFRM)
A component of z/OS that provides the services to manage coupling facility resources in a Parallel Sysplex. This management includes the enforcement of CFRM policies to ensure that the coupling facility and structure requirements are satisfied.
A function of the cross-system coupling facility (XCF) that transfers data and status information among the members of a group that reside in one or more of the MVS systems in a sysplex.
In the DCE Distributed Time Service, a local server that requests a time value from a randomly selected global server. The time value returned is used to synchronize a local access network (LAN) with all other parts of the network.
- The range of a received radio signal and its boundary. The coverage area of a cellular device is limited by the range of the radio network relative to its base station. The coverage area of a satellite phone is the entire earth because the radio signal is transmitted by satellites. See also base station.
- The network area covered by the service provider.
A database or area in an RSR environment that is tracked by a tracking subsystem. Recovery information is not maintained by the tracking subsystem for databases or areas that are not covered.
Cox regression algorithm
An algorithm that produces a survival function that predicts the probability that the event of interest has occurred at a given time for given values of the predictor variables.
See collection point block.
The level of network services provided by the control point (CP) in an APPN end node or network node. CP capabilities information is exchanged during the activation of CP-CP sessions between two nodes. A node's CP capabilities are encoded in the CP capabilities (X'12C1') GDS variable.
CPCB operation code
See control point control block operation code.
In SNA, one of the parallel sessions between two control points, using LU 6.2 protocols and a mode name of CPSVCMG, on which network services requests and replies are exchanged. Each CP of a given pair has one contention-winner session and one contention-loser session with the other.
See consumer packaged goods.
See code page global identifier.
See characters per inch.
See control point management services.
See control point management services unit.
See command processing program.
See command processor parameter list.
See cluster profile record.
See characters per second.
See compressed-pattern storage.
See control point server.
A pair of LU 6.2 sessions, between the control points in dependent-LU-requester (DLUR) and dependent-LU-server (DLUS) nodes, that carry the flows of SSCP services, which are encapsulated in APPN formats.
See central processing unit.
The maximum percentage of CPU resources that can be consumed by work executing in a specified service class, regardless of relinquished CPU resources becoming available. This percentage is allocated to each LPAR or physical host where the DB2 database manager is running.
- The amount of time a program is running in the CPU or is being serviced by the operating system. Does not include time associated with the program's I/O or time in which other processes preempt the program's use of the CPU.
- The processor time used by a job. See also duration.
See commercial processing workload.
See compatible query mode.
See Common Queue Server.
See catalog recovery area.
Someone, usually with malicious intent, who tries to circumvent or subvert system protection mechanisms. See also hacker.
To search for information across various web pages on the Internet or on an intranet. See also crawler.
A software program that retrieves documents from data sources and gathers information that can be used to create search indexes. See also crawl.
A set of sources that match specified patterns, such as database names, file system paths, domain names, IP addresses, and Uniform Resource Locators (URLs), that a crawler reads from to retrieve items for indexing.
See conditional restart control record.
- In DFSMSrmm, the date that a data set is written to tape.
- The date that a data set was read if it was created before DFSMSrmm was in use. The create date is updated each time a data set is replaced and not extended.
- The date that volumes and other resources are defined to DFSMSrmm or the date specified on the command as the create date.
created region type
A container for CICS regions that are defined for use in a platform, enabling the regions to be managed as a unit in the platform. See also adopted region, adopted region type, created region.
created temporary table
A table whose definition is persistent and shared between sessions but whose data is deleted when the session in which the table was instantiated ends. The data in the table is available only within the session in which the table was instantiated. The table is defined by using the SQL statement CREATE GLOBAL TEMPORARY TABLE. See also base table, declared temporary table, temporary table.
creation time stamp (CTS)
In the Distributed Computing Environment (DCE), an attribute of all Cell Directory Service clearinghouses, directories, soft links, child pointers, and object entries that contains a unique value reflecting the date and time the name was created.
See creator identifier.
- In the Java Authentication and Authorization Service (JAAS) framework, a subject class that owns security-related attributes. These attributes can contain information used to authenticate the subject to new services.
- A set of information that grants a user or process certain access rights.
- Information acquired during authentication that describes a user, group associations, or other security-related identity attributes, and that is used to perform services such as authorization, auditing, or delegation. For example, a user ID and password are credentials that allow access to network and system resources. See also shared access.
- A declaration of authorization or other security attributes of a subject that is typically validated and signed by a trusted third party. See also authentication, principal.
- A course, certificate, or regulatory license that is required by either the insurance carrier or a government regulator to sell an insurance product.
The component of Web Express Logon that handles requests for host credentials, which have been previously authenticated by a network security layer. See also network security layer.
In Fibre Channel technology, the number of receive buffers allocated to a transmitting node port (N_port), node loop port (NL_port), or fabric port (F_port). The credit is the maximum number of outstanding frames that can be transmitted by that N_port, NL_port, or F_port without causing a buffer overrun condition at the receiver.
- One or more workers with the appropriate skills and tools to perform the work required to resolve work order.
- A collection of resources that work together to perform a specific type of work. For example, an OHLINE crew might consist of 3 people and a bucket truck (a tool) that work together to build or repair overhead electrical power lines.
See Carbon Responsibility Factor.
See cluster resource group.
See cluster resource group manager.
See cluster-ready hardware server.
- A statement or a question against which an evaluator analyzes the strategic importance of a supplier.
- A standard on which a judgment or decision may be based.
Any structure, building, or area that is deemed critical to the government or to the general population. Examples of critical infrastructure are gas pipelines, medical facilities, and military bases.
- A series of activities that determines the earliest completion of a project; the critical path changes as activities or tasks are completed ahead or behind the original schedule estimates.
- The processing path that takes the longest time to complete of all parallel paths in a process instance, where each path considered begins at a start node or an input to the process and ends at a terminate node.
See certificate revocation list.
See customer relationship management.
cross-application performance reliability stress test (XPRS test)
Provides performance and stress test baseline certification for identified NOTES and WEB applications to be deployed on IBM platforms.
A stopping point during the delivery. When orders are unloaded and loaded at a cross-dock facility, the freight is not taken into the inventory. The shipper manages all legs of the shipment. See also pool point.
Pertaining to control or resources involving more than one domain. See also same-domain.
- In SNA, a pair of cryptographic keys that are used by a system services control point (SSCP) during the initiation of cross-domain LU-LU sessions that use session-level cryptography. The keys are used to encipher the session cryptography key that is sent to another SSCP and to decipher the session cryptography key that is received from the other SSCP.
- In Cryptographic Support, a type of key-encrypting key used to encrypt a data-encrypting key that is being sent across a data line or being stored in a file.
cross-domain key table
In Cryptographic Support, a table in the system-supplied physical file QACRKTBL in library QUSRSYS used to store all key-encrypting keys other than the host master key and its variants. Each record of the file contains the name of the key, its use, and its value. The three types of uses are sending, receiving, and personal identification numbers (PINs).
- A link physically connecting two domains.
- A subarea link connecting two subareas that are in different domains.
Cross-Industry Standard Process for Data Mining
A process model for data mining that identifies six phases in the lifecycle of a data mining project: business understanding, data understanding, data preparation, modeling, evaluation, and deployment.
See Cartesian product.
A program or project that benefits from input provided by other involved business units and which provides return information back to them. The components of the program/project may be developed and managed by one or more organizations.
The organization responsible for defining or maintaining items in multiple catalogs that are supported (referenced) through a single mechanism, such as a Global Trade Item Number (GTIN).
A table that is created in Partner Editor and is used to convert the user's values to a trading partner's values during outbound processing, or a partner's values to the user's values during inbound processing.
The process of migrating an existing product installation to a new version by installing the product on a new server, transferring data to the new installation, and converting the data to the new version.
See distributed query.
cross-site mirroring (XSM)
A function of i5/OS High Available Switchable Resources, Option 41, that provides geographic mirroring and the services to switch over or automatically cause a failover to a secondary copy, potentially at another location, in the event of an outage at the primary location.
cross-system extended services (XES)
A set of z/OS services with which multiple instances of an application or subsystem, running on different systems in a sysplex environment, can implement high-performance, high-availability data sharing by using a coupling facility.
See cross tabulation.
A data analysis that combines foreign key analysis and cross-domain analysis. Foreign keys reference primary keys that are already defined or identified during primary key analysis.
A technique for testing how well a model generalizes in the absence of a holdout test sample. Cross-validation divides the training data into a number of subsets, and then builds the same number of models, with each subset held out in turn. Each of those models is tested on the holdout sample, and the average accuracy of the models on those holdout samples is used to estimate the accuracy of the model when applied to new data. See also overfitting.
See change request.
See change request description.
See configuration report server.
See cathode ray tube.
See customer-replaceable unit.
The process of compressing a problem to make it manageable at intermediate steps in an algorithm. See also uncrush.
cryptographic application programming interface (CAPI)
An application programming interface that provides services to enable developers to secure applications using cryptography. It is a set of dynamically-linked libraries that provides an abstraction layer which isolates programmers from the code used to encrypt the data.
In SNA products, an LU-LU session in which a function management data (FMD) request can be enciphered before it is transmitted, and then deciphered after it is received. See also clear session, required cryptographic session, selective cryptographic session.
The IBM licensed program that provides support for the encryption and decryption of data, according to the Data Encryption Algorithm, and for the management of cryptographic keys and personal identification numbers (PINs).
- The transformation of data to conceal its information content and to prevent its unauthorized use or undetected modification.
- A method for protecting information by transforming it (encrypting it) into an unreadable format, called ciphertext. Only users who possess a secret key can decipher (or decrypt) the message into plaintext.
cryptography verification request
A request unit that is sent by the primary logical unit (PLU) to the secondary logical unit (SLU) as part of cryptographic session establishment. The request unit allows the SLU to verify that the PLU is using the correct session cryptography key and initialization vector (IV).
See cursor stability.
- See common storage area.
- See Canadian Standards Association.
- See common service area.
- See common system area.
A leading provider of product testing and certification services for products sold in the U.S., Canada and around the world. See also Canadian Standards Association.
See central site control facility.
See CICS system definition data set.
See control section.
See consolidated software inventory.
See constant special item ID list.
See Common Service Layer.
See Common Service Layer client.
The process of installing only Cluster Systems Management (CSM) on the nodes, as opposed to a full installation, which involves installing both CSM and the operating system on the nodes.
See Card Serial Number.
See Computer Science Network.
See combined sewer overflow.
- See communication scanner processor.
- See Cryptographic Service Provider.
- See cloud service provider.
- In font design, the distance in pels, measured in the inline (print) direction, between the toned pel furthest from the character reference point and the escapement point.
- In architecture, the distance from the most positive character coordinate system X-axis value of a character shape to the character's escapement point. C-space can be positive, zero, or negative.
- See channel subsystem.
- See Cascading Style Sheets.
- See combined sewer system.
- See connectivity subsystem.
See Cascading Style Sheets positioning.
See channel status word.
See channel-to-channel adapter.
See clustered trivial database.
See computer-telephony integration.
See complex text language.
See controller description.
See component trace.
See Common User Access.
- A multidimensional representation of data needed for online analytical processing, multidimensional reporting, or multidimensional planning applications. See also D-cube.
- See multidimensional array.
The volume calculation used to determine the amount of space required to store or ship material as well as the amount of space that can be accommodated by storage units or shipping modes. Used in capacity planning.
See call user data.
See closed user group.
Sorting of words or strings as a unit, rather than as individual characters. Cultural (or lexical) sort is the type used to order words in dictionaries, glossaries, indexes, and so on. See also sorting.
- A type of backup that includes the changes since the most recent full backup. The cumulative backup consolidates and replaces all previous differential backups.
- The process of copying only data sets that have changed since the last backup of any type. See also full backup, incremental backup.
A function that is used to model a quantity that varies over time and whose value depends on other decision variables of the problem. For example, a given capacity or physical resource can be modeled with a cumul function, and the cumulated contribution of intervals (activities) on the resource is represented by a function of time. cumulFunction is a CP keyword but is accepted as a CPLEX identifier.
cumulative PTF package
Media containing the program temporary fixes (PTFs) for i5/OS that have been accumulated from the start of the current release. PTFs requiring special handling are not included in a cumulative PTF package.
See Capacity Upgrade on Demand.
To select, collect, preserve, and maintain content relevant to a specific topic. Curation establishes, maintains, and adds value to data; it transforms data into trusted information and knowledge.
For an Ada-language compilation unit, the state where none of that unit's supporters has been recompiled since the unit itself was compiled. This implies that all of the supporters exist, since the Ada language requires this in order for the program to be compiled. Currency implies that all supporters of a unit were compiled in the correct order, as defined by Ada language rules.
- A process used to configure conversion rates between the currencies used by organizations in their respective locales.
- A factor that converts monetary values in a database from one country's monetary system into another without altering the original data.
A dimension type that separates local currency members for a base currency defined in an application. A currency partition also identifies currency types such as actual, budget, and forecast.
- In COBOL, the character defined by the CURRENCY SIGN clause in the SPECIAL-NAMES paragraph. If no CURRENCY SIGN clause is present in a COBOL source program, the currency symbol is identical to the currency sign.
- A character such as the dollar sign ($) used to identify monetary values.
current baseline print coordinate (bc)
In IPDS architecture, the baseline coordinate corresponding to the current print position on a logical page. The current baseline print coordinate is a coordinate in an I,B coordinate system.
In an advanced order, the set of charges a customer incurs for order items that can be shipped at once. See also total charge.
current connect group
In RACF, during a terminal session or batch job, the group with which a user is associated for access checking purposes. On MVS, if a user does not specify the current connect group on the LOGON command or batch JOB statement, the current connect group is the user's default group. On CICS, users cannot specify a group other than their default group. If list-of-groups processing is in effect, users are associated with all the groups to which they are connected. See also default group.
See working directory.
current drawing attribute
In architecture, an attribute used at the present time to direct a drawing process. See also default drawing attribute.
current drawing control
In architecture, a drawing control used at the present time to direct a drawing process. See also default drawing control.
- In the make command, the file that the make command is working with at a given moment. The make command replaces the $* macro with the name of the current file.
- The file being edited. If multiple windows are in use, the current file is the file containing the cursor.
See local host.
current inline coordinate
See current inline presentation coordinate.
current inline presentation coordinate
The inline presentation position at the present time. This inline presentation position is the summation of the increments of all inline controls since the inline coordinate was established in the presentation space. An inline presentation position is established in a presentation space either as part of the initialization procedures for processing an object or by an Absolute Move Inline control sequence.
current inline print coordinate
In IPDS architecture, the inline coordinate corresponding to the current print position on a logical page. The current inline print coordinate is a coordinate in an I,B coordinate system.
current interrupted job
When a job is interrupted by pressing the Attn key, another job can be started from a command line. This job can also be interrupted by pressing the Attn key again. The current interrupted job is the most recently interrupted. The job name for the current interrupted job is displayed at the top of the Inquiry Options menu.
The library that is specified to be the first user library searched for objects requested by a user. The name for the current library can be specified on the Sign-On display or in a user profile. When you specify an object name (such as the name of a file or program) on a command, but do not specify a library name, the system searches the libraries in the system part of the library list, then searches the current library before searching the user part of the library list. The current library is also the library that the system uses when you create a new object, if you do not specify a library name.
A state that increases the concurrency of read-only data access by allowing the committed version of a row to be processed when a lock is encountered instead of requiring the query to wait for the lock to be released. See also optimistic locking, pessimistic locking.
See SQL path.
- In computer graphics, the position, in user coordinates, that becomes the starting point for the next graphics routine, if that routine does not explicitly specify a starting point.
- In architecture, the position identified by the current presentation space coordinates; for example, the coordinate position reached after the execution of a drawing order. See also given position.
- In an IMS database, the place immediately preceding the segment occurrence that IMS retrieves if the user immediately issues an unqualified retrieval call.
- The point on the page where the printer is currently logically positioned; the position were the next pel will be printed if no move text controls are executed. When the character is placed on the page, the character reference point coincides with the current print position. See also character reference point.
- The picture element that defines the character reference point or the upper-left corner of an image.
- The record pointed to by the current line pointer.
- In COBOL, the record that is available in the record area associated with the file.
In CDE, the session saved by Session Manager when you log off. At the next login, unless you specify otherwise, this session automatically opens, enabling work to continue where you left off. See also home session.
current SQL ID
In DB2 for z/OS, an identifier that, at a single point in time, holds the privileges that are exercised when certain dynamic SQL statements run. The current SQL ID can be a primary authorization ID or a secondary authorization ID.
In DB2 for i5/OS, the state of a connection when it is the one used for SQL statements that are executed. See also dormant state.
current working directory
See working directory.
- A movable symbol on a display, often a blinking or solid block of light, that identifies a choice to select, indicates where user interaction with the keyboard will appear, or indicates a position of interest on the display surface.
- In SQL, an identifier associated with a group of rows or with a collection.
- During a HALDB online reorganization, a marker in a database partition that separates the copied database records from the records that have not been copied. The cursor indicates the progress of the reorganization through the HALDB partition.
- A named control structure used by an application program to point to and select a row of data from a set. See also asensitive cursor, cursor sensitivity, dynamic cursor, insensitive cursor, parameterized cursor, sensitive cursor, static cursor.
- A reference to an element at a specific position in a data structure.
- A displayed symbol that acts as a marker to help the user locate a point in text, in a system command, or in storage. Cursors mark file position and access information in distributed data management (DDM) architecture.
For high availability large database (HALDB) online reorganization, the status in the recovery control data set (RECON data set) that alerts Database Recovery Control (DBRC) that an online reorganization has started.
cursor operation record
A record that contains instructions for the translator on moving through the result set returned by a query to a new record. Each operation record is associated with a single SQL statement record that returns a result set. The translator performs cursor operations as it encounters them while processing the map.
The degree to which database updates made by the same application process or another application process are incorporated in the data returned by FETCH statements for a cursor after the database updates. See also asensitive cursor, cursor, insensitive cursor, sensitive cursor.
- An isolation level under which a query in a transaction is prevented from reading any changes made to rows by statements in other transactions until the changes have been committed. A transaction using CS with an updatable cursor prevents statements in other transactions from changing and possibly reading a row until the cursor has moved from that row. See also isolation level, read stability, repeatable read, uncommitted read.
- An isolation level that locks any row accessed by a transaction of an application while the cursor is positioned on the row. The lock remains in effect until the next row is fetched or the transaction is terminated. If any data is changed in a row, the lock is held until the change is committed to the database.
See smoothness of curve.
- An action for a file or project that is created using the Menu Manager preferences pages and is displayed on pop-up menus.
- In JSP programming, an action described in a portable manner by a tag library descriptor and a collection of Java classes and imported into a JSP page by a taglib directive. (Sun)
- An action on a business object that runs code for specific state transitions. This action can be a Java class method or an EJB name.
- A Java or non-Java process definition that a user can define as a part of a health policy action plan or elasticity operation.
An adapter that is created by users or consultants and is not shipped with Sterling B2B Integrator. Custom adapters can integrate custom applications and legacy systems with Sterling B2B Integrator.
A user-specific or user-defined process that performs an action on behalf of a user or other program without user intervention or on a regular schedule, and reports the results back to the user or program.
- User-defined characteristics of an asset, for example: support contact and confidential.
- A user-defined property for an asset that further describes assets of that type. For example, a custom attribute for database tables might be "Expected maximum row count." The custom attribute would be available for every database table, and might contain different values for different database tables.
Custom-built Product Delivery Option (CBPDO)
A software delivery package consisting of uninstalled products and unintegrated service. Installation requires the use of SMP/E. CBPDO is one of the two entitled methods for installing z/OS; the other method is ServerPac.
A selected combination of products tailored by a vendor to the needs of one or more users. Each custom configuration is identified by unique serial number, which is incorporated into the custom configuration.
A dashboard that is created by the user from widgets and various data sources to meet specific requirements. It is not supplied with the application. See also fixed dashboard.
The customized portion of the URL selected by the user to direct requests to the application. A custom domain makes up part of the route. A custom domain can be a shared domain, a shared subdomain, or a shared domain and host. See also domain, host, route, subdomain.
- A group or organization that is associated with one or more applications. A customer can be an external organization that accesses a data center or an internal department within a company.
- A user of an online store.
The proportion of contractual customers or subscribers who leave a supplier during a given time period. Churn rate is a possible indicator of customer dissatisfaction, cheaper and/or better offers from the competition, more successful sales and/or marketing by the competition, or reasons having to do with the customer life cycle. Churn rate can be thought of as the inverse of retention rate.
An online site where users may obtain information regarding products and conduct business transactions regarding these products. WebSphere Commerce supports the following customer-facing stores: hub store, direct sales store, and extended site store.
A grade that is assigned to a customer, based on the customer's rating within the organization. For example, a customer may be assigned a grade of A, indicating that the customer is an excellent customer, or B, indicating that the customer is an average customer. These grades determine how approval rules for quotes can be applied.
A type of member group consisting of a collection of customers who have been grouped by a site administrator because they share similar shopping patterns or characteristics. See also site administrator.
customer-managed use control
A level of password use control in which the customer manages compliance with the terms of the software product acquisition. See also password use control level, vendor-managed use control.
A list of items being purchased by a customer. The customer order contains customer data, ship-to information, bill-to information, delivery dates, and line items that list SKUs being purchased.
customer relationship management (CRM)
One of two major corporate business processes (with Integrated Product Development) within IBM. CRM defines standards for responding to customers, particularly in the delivery of services engagements.
All information about the customer that is held by the seller. This can include basic demographics, order history, or operational data such as the user ID and shipping address. Customer segments are dynamic; marketing managers define the criteria for including a customer in a customer segment. Customer segments can be the targets of campaigns.
customer service optimization
The practice of improving customer service operations, which is often measured by first call resolution rates, average call time, customer satisfaction with service, and other factors.
- A person who processes customer purchases, orders, returns, inquiries, and store registration.
- A defined role in WebSphere Commerce that manages customer inquiries. The customer service representative also processes customer registration, orders, and returns. See also customer service supervisor, script.
- An IBM employee who assists a customer with aspects of service configuration.
customer service supervisor
A defined role in WebSphere Commerce that has access to all customer service tasks. The customer service supervisor manages customer inquiries (such as customer registration, orders, returns, and auctions) and has authority to complete tasks that cannot be accessed by a customer service representative, such as approving system-denied returns records, and contacting customers regarding payment exceptions (such as credit card authorization failures). See also customer service representative.
customer setup (CSU)
The unpacking, setup, and checkout of machines by customer personnel, according to a sequence of instructions provided by the manufacturers, without the use of tools or the assistance of trained service personnel.
See finder method.
- An advanced XML condition that supplements the set of defined functions that are provided in the Greex library and are used to evaluate conditions on input data.
- An advanced XML condition that is configurable to meet specific validation scenarios.
- The modification of a portal page or portlet by a user. WebSphere Portal enables a user to customize a portal page by modifying the page layout and by selecting which portlets will display per device. See also personalization.
- The process of describing optional changes to defaults of a software program that is already installed on the system and configured so that it can be used. See also configuration.
- The ability to change how objects on a personal computer look and work. For example, a user can tailor what objects are in a work area by creating, moving, or copying objects to the work area.
- The process of designing a data processing installation or network to meet the requirements of particular users. Activities can include installing additional products, taking advantage of new software features and functions, and enabling or disabling optional features.
customization definition document (CDD)
An XML document that describes the layout of an instance (that is, its organizational units (OUs) and servers, and which service bundles are assigned to each server-OU combination). The Customization Definition Program (CDP) uses a CDD to determine which deployment data to produce for an instance.
One of two modes in which the IBM Watson system can be run. The system can be run in customization mode when the annotators, services, and components that make up the system are being adapted for a new domain or data set. See also production mode.
- To describe optional preferences or changes to defaults in a software program that is already installed and configured.
- To describe to the system the devices, programs, users, and user defaults for a particular data processing system or network.
Customized Devices Object Class
A representation within the Object Data Manager (ODM) of each device instance as distinguished by a unique logical name. The Customized Devices Object Class contains basic information about the device such as device status and how to access the information contained in other object classes.
customized installation package (CIP)
A customized installation image that can include one or more maintenance packages, a configuration archive file from a stand-alone server profile, one or more enterprise archive files, scripts, and other files that help customize the resulting installation.
- A property that consists of a name and value and applies to an organization, product, or contract for informational and search purposes.
- A user-defined property, as opposed to a system-defined property. The user can assign custom properties to a class. See also property.
A resource that is created by a console administrator and can be customized and deleted. See also resource type.
A C language or C++ language program that provides data manipulation and local or remote data stream, database, or other services beyond those provided by the state table interface. Custom servers provide an interface between DirectTalk and business applications, functions, or other processes to give callers access to business information and voice processing functions such as speech recognition. See also 3270 server.
In Analysis Studio, a named object which can include filter rules, calculations, and sort rules. Custom sets can define a set of members that is different from any set originally defined in the cube model. See also predefined set, set.
An extension to the JavaServer Pages (JSP) language that performs a specialized task. Custom tags are typically distributed in the form of a tag library, which also contains the Java classes that implement the tags.
custom text analysis engine
A text analysis engine that is created using the Unstructured Information Management Architecture (UIMA) SDK and can be added to the set of standard enterprise search text analysis engines. See also analysis engine, enterprise search base annotator.
custom user registry
A customer-implemented user registry that implements the UserRegistry Java interface. This registry type can support virtually any kind of accounts repository from a relational database and can provide flexibility in adapting product security to various environments.
A view that uses actions such as summarize, cloak, exclude, and apex to limit access to information in a cube to members of a given user class. User class views are replaced by custom views associated with the users, groups, or roles in a configured namespace.
A volume in count-key-data (CKD) format that is not a standard volume, which means that it does not necessarily present the same number of cylinders and capacity to its assigned logical control unit as provided by one of the standard S/390 volume types. See also count key data, interleave, standard volume.
Custom Wire Format (CWF)
The physical representation of a message in the MRM domain that is composed of a number of fixed format data structures or elements, which are not separated by delimiter characters.
- In multimedia applications, the process of instantly replacing a picture from one source with a picture from another. This is the most common form of editing scene to scene.
- A way of eliminating part of the search space without losing any feasible or optimal solutions.
- The severed part of a perforation. Cuts are separated by ties.
- An action that identifies a page, object, or picture that is to be deleted or moved to another place in the same or different document or file
A single form not connected to other forms. The form may have an original and one or more copies. Cut forms are fed separately into a printer. See also continuous forms.
See control unit terminal mode.
In architecture, unconnected sheets. See also continuous-form media.
Paper that is cut into uniform-size sheets before being loaded into the printer. See also continuous forms.
A printer that requires cut-sheet paper. See also continuous-forms printer.
In fibre-channel technology, a switching technique that allows a routing decision to be made and acted upon as soon as the destination address of a frame is received. See also route.
A channel of voice data which has been passed through echo cancellation algorithms. The channel provides echo-cancelled voice data which can then be used by the engine in a recognition attempt.
See cost variance.
See cost variance at completion.
See common VTOC access facility.
See CICS-value data area.
See Concurrent Versions System.
See Common Vulnerability Scoring System.
See communication vector table.
CVV auth code
See card verification value authorization code.
See case weight.
See common work area.
See Custom Wire Format.
See common warehouse metamodel.
See coupled extended remote copy.
A color model used by the printing industry based on mixing cyan, magenta, and yellow. See also cyan/magenta/yellow/black.
A color model used by the printing industry based on mixing cyan, magenta, yellow, and black. CMYK is an enhancement of the cyan/magenta/yellow (CMY) model, created after printers discovered they could obtain a darker black using special black colorants rather than by combining cyan, magenta, and yellow alone. See also cyan/magenta/yellow.
- To end a management collection object that is currently in use and to open a new object for storing future collections. This process prevents collection objects from becoming too large.
- A set of tables that can be ordered so that each table is a descendent of the one before it, and the first table is a descendent of the last table. A self-referencing table is a cycle with a single member. See also referential cycle.
- The time required for a process instance in a process simulation run to finish processing its inputs. Cycle time includes idle time when an activity in the process is waiting for a resource to become available.
- The minimum time interval between starts of successive read/write cycles of a storage device.
- The time elapsed during one cycle of the processor. Cycle time varies from one type of processor to another.
A period that represents a constant number of days. There are two types of cyclic periods: Work-days-only cyclic period, where only the work days are counted when calculating the number of days in the period and All-days cyclic period, where all days are counted.
- A system of error checking performed at both the sending and receiving station after a block-check character has been accumulated.
- A redundancy check in which the check key is generated by a cyclic algorithm
- On a magnetic disk or in an assembly of disks, the set of all tracks that can be accessed by all the magnetic heads of a comb in a given position, without repositioning the access mechanism.
- A unit of storage on a count-key-data (CKD) device with a fixed number of tracks.
See Complete Zip Auditing and Rating.