list of letters
This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See device adapter.
See designated approving authority.
See document access definition.
DADSM interrupt recording facility (DIRF)
A provision that ensures that an error is recorded if a system fails or a permanent I/O error occurs during allocation of space or during performance of a routine that updates the volume table of contents (VTOC). The DIRF turns on a bit in the VTOC upon entry to a direct access device space management (DADSM) function and, if no errors occur during processing, turns off that bit upon exiting from that function.
See document access definition extension.
DADX runtime environment
The DADX runtime environment provides information to the DADX web service, including the HTTP GET and POST bindings, the test page, WSDL generation, and the translation of DTD data into XML schema data.
See dump analysis and elimination.
daemon configuration file
In the Distributed Computing Environment (DCE), a file containing information about which daemons are configured on the host, including which environment variables are set, the parameters to pass to the process, the minimum restart interval, and the timeout period.
A process begun by the root user or the root shell that can be stopped only by the root user. Daemon processes generally provide services that must be available at all times, such as sending data to a printer.
See destination address field.
See Digital Aeronautical Flight Information File.
See directed acyclic graph.
In DSDM, a brief daily meeting to review progress and encourage communication. See also scrum.
- In CICS intercommunication, the chain of sessions that results when a system requests a resource in a remote system, but the remote system discovers that the resource is in a third system and has itself to make a remote request.
- See serial connection.
See directory access protocol.
See dynamic automatic reconfiguration.
See Defense Advanced Research Projects Agency.
See direct access storage device.
DASD conservation option
In Tivoli NetView for OS/390, an installation option that allows Tivoli NetView for OS/390 to be installed without the online help facility and hardware monitor data presentation panels.
DASD fast write (DFW)
A function in which data is written concurrently to cache and nonvolatile storage, and automatically scheduled for destaging to DASD. Both copies are retained in the storage control until the data is completely written to the DASD, providing data integrity equivalent to writing directly to the DASD. Use of DASD fast write for system-managed data sets is controlled by storage class attributes to improve performance. See also cache fast write, dynamic cache management.
See DASD volume authority.
A direct access storage device (DASD) space identified by a common label and accessed by a set of related addresses. See also primary storage.
- In IBM ILOG JViews Diagrammer, an instance of the class IlvDashboardDiagram. The dashboard is an extension of the diagram component that manages a collection of symbols and links. Dashboard API In IBM ILOG JViews Diagrammer, the ilog.views.dashboard package. This collection of classes is used to develop Dashboard Editor applications and add dashboards to Swing applications.
- A web user interface component that provides information about the project status at a glance. Users can view project summary information or more detailed information.
- An interface that integrates data from a variety of sources and provides a unified display of relevant and in-context information.
- A web page that can contain one or more widgets that graphically represent business data.
- In agile software development, a tool for tracking progress that displays metrics such as the number of total tasks, user stories and a burndown or velocity chart.
A representation of facts or instructions in a form suitable for communication, interpretation, or processing by human or automatic means. Data includes constants, variables, arrays, and character strings.
A data type with a private representation and a public set of operations (functions or operators) which restrict access to that data type to that set of operations. The C++ language uses the concept of classes to implement data abstraction.
data access control mode
A mode that controls whether a command can access a migrated file, see a migrated file as zero-length, or receive an input/output error if it attempts to access a migrated file. See also execution mode.
- In PL/I, an array or a structure.
- A logical collection of data elements that can be referred to either collectively or individually.
- An area of memory that contains specific control variables that are normally predefined in structures or vectors.
- An area of a predefined length and format on a panel in which data can be entered or displayed. A field can consist of one or more data areas.
- A memory area that is used by a program to hold information.
- A system object used to communicate data, such as CL variable values between the programs within a job and between jobs. The system-recognized identifier for the data area is *DTAARA.
- An IMS enhancement available with DBCTL. It allows PSB scheduling to complete successfully even if some of the full-function databases it requires are not available.
- The degree to which data is available when needed, typically measured as a percentage of time that the system would be capable of responding to any data request (for example, 99.999% available).
A container of object properties that the MQAI uses in administering queue managers. There are three types of data bag: user (for user data), administration (for administration with assumed options), and command (for administration with no options assumed).
A collection of interrelated or independent data items that are stored together to serve one or more applications. See also database server.
- The name of the target server if it is different from the location name. The database alias is used to provide the name of the database server as it is known to the network.
- A short name used to identify the parameters required to connect to a specific database.
An authority that authorizes the possessor to perform database-level tasks, such as connecting to the database or creating packages in the database. See also authority level, authorization.
database backup series
One full backup of the database, plus up to 32 incremental backups made since that full backup. Each full backup that is run starts a new database backup series. A number identifies each backup series. See also database snapshot, full backup.
database configuration file
The configuration file for an individual database. See also configuration file.
database configuration parameter
A parameter whose value limits the system resources that a database can use. See also configuration parameter.
database/data communication (DB/DC)
Program products that provide a method to separate the designer and programmer from the physical aspects and constraints of data storage and the physical characteristics of the terminal network, so that maximum effort can be placed on the applications.
database data set (DBDS)
A data set that contains some or all of the database records that are stored in a full-function database. Other types of data sets that are used in IMS databases include Fast Path area data sets, HALDB indirect list data sets, and HALDB primary index data sets.
database description (DBD)
The collection of macro parameter statements that define the characteristics of a database, such as the database's organization and access method, the segments and fields in a database record, and the relationship between types of segments.
database descriptor (DBD)
An internal representation of a DB2 for z/OS database definition, which reflects the data definition that is in the DB2 for z/OS catalog. The objects that are defined in a database descriptor are table spaces, tables, indexes, index spaces, relationships, check constraints, and triggers. A DBD also contains information about accessing tables in the database.
database event reader
An event reader that monitors an SQL database event source for new and modified events and triggers policies based on the event information. See also event reader.
A group of built-in database objects and supporting code that extends an Informix database server to manage specialized data or add new features. For example, the basic text search database extension enables searching for words and phrases in a document repository stored in a column of a table. See also DataBlade module.
One of several types of the system object type *FILE kept in the system that contains descriptions of how input data is to be presented to a program from internal storage and how output data is to be presented to internal storage from a program.
database global variable
A global variable whose value is shared across all sessions in a database. See also built-in global variable, global variable, session global variable, user-defined global variable.
Database Instance Manager
On Windows, a network server that supports the creation, maintenance, and deletion of databases used by brokers in all installations on a single computer. Database support is limited to Derby and DB2. The Database Instance Manager is associated with a Windows service.
The protection of data items in a database while they are available to any application program. This protection includes the isolation of effects of concurrent updates to a database by two or more application programs.
A kind of data sharing that enables application programs in one IMS to read data while another program in another IMS reads from the same database or updates it. See also block-level sharing.
In an RSR environment, a tracking subsystem that tracks the active subsystem's databases or areas. See also recovery-level tracking.
A set of primary and secondary log files consisting of log records that record all changes to a database. The database log is used to roll back changes for units of work that are not committed and to recover a database to a consistent state.
database-managed space table space (DMS table space)
A table space whose storage space is managed by the database manager. See also system-managed space table space.
- See database manager.
- A software system that controls the creation, organization, and modification of a database and the access to the data that is stored within it.
A program that manages data by providing centralized control, data independence, and complex physical structures for efficient access, integrity, recovery, concurrency control, privacy, and security. See also data server.
database manager configuration file
The configuration file for a DB2 instance. See also configuration file.
database manager configuration parameter
A configuration parameter whose value is set when an instance is created. Most database manager configuration parameters affect the amount of system resources that is allocated to a single instance of the database manager, or they configure the setup of the database manager and the different communications subsystems based on environmental considerations.
database monitor (DB monitor)
See IMS monitor.
See database partition.
- An object that a user creates in the database, such as a procedure, trigger, or any other object that can be created by issuing a CREATE statement.
- An object that exists in an installation of a database system, such as an instance, a database, a database partition group, a buffer pool, a table, or an index. See also object.
A portion of the database that contains user data and indexes. There can be multiple database partitions in a partitioned database environment. See also data partition, database partition group, database partitioning, distribution key, table-partitioning key.
database partition group
A named subset of database partitions that is grouped together with a common distribution map. All table spaces that are created under the same database partition group have data on the same set of database partitions. See also database partition.
A data organization scheme in which table data is divided across multiple database partitions based on the hash values in one or more distribution key columns of the table and based on the use of a distribution map of the database partitions. Data from a given table is distributed based on the specifications that are provided in the DISTRIBUTE BY clause of the CREATE TABLE statement. See also data partition, database partition, massively parallel processing, table partitioning.
database program communication block (DB PCB)
The PCB that describes an application program's interface to a database. One DB PCB is required for each database view that is used by the application program.
In an IMS database, a collection of segments that contains one occurrence of the root segment type and all of its dependents arranged in a hierarchic sequence. A database record can be a physical database record or a logical database record. See also logical database record, physical database record.
Database Recovery Control (DBRC)
A feature of the IMS Database Manager that facilitates easier recovery of IMS databases. DBRC maintains information that is required for database recoveries, generates recovery control statements, verifies recovery input, maintains a separate change log for database data sets, and supports sharing of IMS databases and areas by multiple IMS subsystems.
database recovery log
See database log.
database reference field
In the Data Description Specifications Design Utility (DSU), a field in a data description specifications (DDS) source file that is created by referring to the description of an existing field in a database file.
- An interface to IMS DB full-function databases and DEDBs. The DRA can be used by a coordinator controller (CCTL) or a z/OS application program that uses the ODBA interface.
- Component of the CICS-DBCTL interface in the CICS address space. Its functions include requesting connection and disconnection from DBCTL, telling CICS when a shutdown of DBCTL has been requested or if DBCTL has failed, managing threads, establishing contact with the DBCTL address space, and loading the DRA startup parameter table.
- A computer that hosts a database engine and database tables populated with metadata of an object store.
- A software program that uses a database manager to provide database services to other software programs or computers. See also database.
- The server on which the database application and database are installed.
A complete backup of the entire database to media that can be taken off-site. When a database snapshot is created, the current database backup series is not interrupted. A database snapshot cannot have incremental database backups associated with it. See also database backup series, full backup.
database storage area
A content storage area that retains document content in a database engine. The database storage area also retains all objects contained in the object store, such as class definition, property definition, containment, storage policy, and queue events. See also content storage area.
database system monitor
A collection of APIs that gathers information regarding the state of the database system at the instance, database, and application levels. This information is stored in data elements, which can be examined by taking point-in-time snapshots or by using the event monitor to log system activity over time.
- A mapping between data in one system, such as IMS, to another, such as Java data objects.
- A component that converts protocol-specific local data to and from a business object.
- A process that allows the user to represent some form of data as an object in memory.
A package of database objects and supporting code that extends an Informix database server to manage new kinds of data or add new features. A DataBlade module can include new data types, routines, casts, aggregates, access methods, SQL code, and client code. See also database extension.
data carrier detect
A signal defined in the EIA-232 standard that indicates to the data terminal equipment (DTE) that it is receiving a signal from the remote data circuit-terminating equipment (DCE).
A centralized repository of data and information relating to a particular field of knowledge. See also green data center.
data center device
See data center asset.
data center model (DCM)
A centralized repository, containing physical and logical assets, that Tivoli Intelligent Orchestrator manages, and their relationships. The data center model tracks data center devices, their configuration, and associated allocations to applications.
See input/output channel.
data character set
See character set.
- An operation used to verify data quality or data integrity.
- A synchronous or asynchronous indication of a condition caused by invalid data or incorrect positioning of data. Some data checks can be suppressed.
data circuit-terminating equipment (DCE)
The equipment that provides signal conversion and coding between the data terminal equipment (DTE) and the line. The DCE provides all the functions required to establish, maintain, and end a connection.
- A classification that designates the logical type of data in a data field. For example, the classification INDICATOR represents a binary value such as TRUE/FALSE or YES/NO.
- A group of data categories.
- An access bean that provides data storage and access methods for caching enterprise bean properties. Unlike copy helpers, data class access beans work with enterprise beans that have local client views as well as remote client views.
- A named list of allocation and space attributes that the system uses when creating a data set. The storage administrator uses the Interactive Storage Management Facility (ISMF) to define data classes, but the affected data sets are not required to be managed by the storage management subsystem (SMS). See also storage construct.
The process of obtaining performance and availability monitoring data and providing that data to a metric evaluator. Examples of data collectors include DNS probes, web page analyzers, or database analyzers.
data collection application
An Interactive Storage Management Facility (ISMF) application that allows the storage administrator interactively to submit IDCAMS DCOLLECT background jobs or to save job control language (JCL) for later use.
data communication program communication block (DC-PCB)
See telecommunication program PCB.
- The process of eliminating gaps, empty fields, redundancies, and unnecessary data to shorten the length of records or blocks.
- See compression.
- The reduction of data volume on the media when performing save operations.
In Performance Toolbox, a description of a program that receives statistics over the network from the xmservd daemon and prints, post-processes, or otherwise manipulates the raw statistics. See also data supplier.
A named area of storage, maintained by BTS, and used to pass data between activities, or between different invocations of the same activity. Each data container is associated with an activity; it is identified by its name and by the activity for which it is a container. An activity can have any number of containers, as long as they all have different names.
- The process of changing data from one form of representation to another.
- The process of changing from one coded character set identifier (CCSID) to another. A system does data conversion when exchanging data with another system that is using a different CCSID.
data-conversion interface (DCI)
The WebSphere MQ interface to which customer- or vendor-written programs that convert application data between different machine encodings and CCSIDs must conform. A part of the WebSphere MQ Framework.
data country code (DCC)
A 3-digit code, unique to each country or region, that specifies the X.21 call format used by a network in its International Data Number to call another station. See also data network identification code.
A method of breaking up (or decomposing) a program into smaller parts to take advantage of parallelism. Data decomposition divides the data (usually arrays) into smaller parts, each of which is operated on independently. See also functional decomposition.
A method of reducing storage needs by eliminating redundant data. Only one instance of the data is retained on storage media. Other instances of the same data are replaced with a pointer to the retained instance. See also compression, delta encoding, encryption.
- A program statement that describes the features of, specifies relationships of, or establishes the context of data. A data definition reserves storage and can provide an initial value.
- In IDDU, information that describes the contents and characteristics of a field, record, or file.
- A data object that defines a database or table.
Data Definition Language (DDL)
A language for describing data and its relationships in a database. See also Data Manipulation Language.
- A subset of SQL statements that can be used to create, alter, drop, and rename data objects, including databases, tables, views, synonyms, triggers, sequences, and user-defined routines. See also declaration statement.
- A job control statement that is used to define a data set for use by a batch job step, started task or job, or an online user.
Data Description Language
See Data Definition Language.
Data Description Specifications Design Utility (DSU)
A feature of the CoOperative Development Environment/400 licensed program that helps users develop and create display files, printer files, and database files.
- In IDDU, an object for storing field, record format, and file definitions. The system-recognized identifier for the object type is *DTADCT.
- A set of tables that keep track of the structure of both the database and the inventory of database objects.
- A repository of information about an organization's application programs, databases, logical data models, users, and authorizations.
- A grouping of logically related components of a particular syntax type, such as ROD dictionaries, EDI dictionaries, and XML dictionaries.
A mapping of the data values within a column into a set of categories that are equivalent to a histogram or to a frequency distribution. See also query optimizer.
One of the four main parts of a COBOL program. The data division describes the files to be used in the program and the records contained within the files. It also describes any internal working storage records that are needed.
data driven testing
A scripting technique that stores test input and expected results in a table or spreadsheet, so that a single control script can execute all of the tests in the table. Data driven testing is often used to support the application of test execution tools such as capture/playback tools. (ISTQB) See also keyword driven testing.
- The smallest unit of data that can be referred to.
- See monitor element.
- A unit of storage in a coupling facility list structure that makes up a data entry.
- A unit of data that, in certain context, is considered indivisible. An example is the data element "age of a person" with values consisting of all three-decimal digit combinations.
data element delimiter
A character, such as an asterisk (*), that follows the EDI segment identifier and separates each EDI data element in an EDI segment. See also segment ID separator.
data element separation
A delimiter sequence that defines how a TDS message is to be parsed. The following separation types are supported: data pattern separation, delimited separation, fixed length separation, and tagged separation.
- In computer security, a 64-bit block cipher that uses a 64-bit key, of which 56 bits are used to control the cryptographic process and 8 bits are used for parity checking to ensure that the key is transmitted properly.
- In Cryptographic Support, the equivalent to the Data Encryption Standard.
Data Encryption Standard (DES)
A cryptographic algorithm designed to encrypt and decrypt data using a private key. See also Triple Data Encryption Algorithm.
- Part of a coupling facility list structure list entry that is used to hold user-specified data.
- A mode that allows a user to navigate through the database and add or change stored data in the OLAP database.
- A catalog entry that describes the data component of a cluster, alternate index, page spaces, or catalog. A data entry contains the data component's attributes, allocation and extent information, and statistics. A data entry for a cluster's or catalog's data component can also contain the data component's passwords and protection attributes.
- The entry of characters into a computer system for processing, usually in predefined fields that are controlled by an application. See also text entry.
data entry database (DEDB)
A direct-access database that consists of one or more areas, with each area containing both root segments and dependent segments. DEDBs use a data structure that allows them to be used for both hierarchic processing and journaling. The database is accessed by using the VSAM Media Manager. See also Fast Path, sequential dependent segment.
data event control block
A control supplied by an application program to represent a read or write request for the basic direct access method (BDAM), basic partitioned access method (BPAM), or basic sequential access method (BSAM).
Data Exchange SPI architecture (DESPI)
The interface that resource adapters and runtime components use to exchange business object data. The Data Exchange SPI architecture, which is based on the concept of cursors and accessors, abstracts the data type so that an adapter can be written only once and then work on runtime environments that support different data types, such as data objects and JavaBeans.
Data Facility Sort (DFSORT)
An IBM licensed program that is a high-speed data-processing utility. DFSORT provides an efficient and flexible method for sorting, merging, and copying operations, as well as providing versatile data manipulation at the record, field, and bit level.
- A column or field containing a specific set of data values common to all records in a file or table.
- A user-defined workflow field.
- The optional third field of a count-key-data (CKD) record. The data field contains data that the program writes. The count field specifies the length of the data field.
- A flat file containing data to be loaded into the database.
- In RJE, a remote job input stream that can contain host system commands and job control language as well as data.
- A file that stores data for use by an application or system.
- A group of related data records organized in a specific order. A data file can be created by the specification of FILETYPE(*DATA) on the create commands. See also command file, source file.
data flow control (DFC)
In SNA, a request/response unit (RU) category used for requests and responses exchanged between the data flow control layer in one half-session and the data flow control layer in the session partner.
data flow control layer (DFC layer)
In SNA, the layer within a half-session that (a) controls whether the half-session can send or receive, or both send and receive request units (RUs) at the same time, (b) combines related RUs into RU chains, (c) defines the limits of transactions by using the bracket protocol, (d) controls the connection of requests and responses in accordance with control modes specified when the session is started, (e) creates sequence numbers, and (f) associates requests with responses.
data flow control protocol
In SNA, the sequencing rules for requests and responses by which network addressable units (NAUs) in a session coordinate and control data transfer and other operations, for example, bracket protocol.
See execution group.
- A self-contained packet, independent of other packets, that carries information sufficient for routing from the originating data terminal equipment (DTE) to the destination DTE without relying on earlier exchanges between the DTEs and the network.
- A form of asynchronous messaging in which an application sends a message, but does not require a response. See also request/reply.
In Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a datagram-based transport protocol, such as User Datagram Protocol (UDP), that provides a connectionless transport layer.
A part of a datagram that is transported through a network separately from other parts of the same datagram. A datagram can be segmented if it contains too many bytes of data to send at one time.
- In the GDDM function, a collection of data values displayed, for example, as a pie chart or as the plotted points on a line of a line chart. More than one data group may be displayed on a chart.
- In Business Graphics Utility, a collection of values that identify the comparisons in a chart. For example, the relative size of the slices in a pie chart or the relative height of the bars in a bar chart. See also data value.
A Java class or library of classes that a process uses to transform data into and from specific formats. In the business integration environment, data handlers transform text data of specified formats into business objects, and transform business objects into text data of specified formats.
See data host node.
data host node
In a communication management configuration, a type 5 host node that is dedicated to processing applications, and does not control network resources, except for its channel-attached or communication adapter-attached devices. See also communication management configuration host node.
The concept of separating the definitions of logical and physical data such that application programs do not depend on where or how physical units of data are stored; the reduction of application program modification in data storage structure and access strategy.
- The condition that exists as long as accidental or intentional destruction, alteration, or loss of data does not occur.
- The security service that detects whether there has been unauthorized modification of data, or tampering. The service detects only whether data has been modified; it does not restore data to its original state if it has been modified.
- The use of data by systems of different manufacture.
- The sharing of data between applications.
data interchange block (DIB)
A block created by the CICS data interchange program (DIP) to control input and output to SNA batch devices. The DIB is chained to the appropriate TCTTE for the batch device, and is released at the termination of the transaction.
A time period in minutes for the summary data record. See also summary data.
- In the MQAI, an item contained within a data bag. This can be an integer item or a character-string item, and a user item or a system item.
- In EGL, an area of memory that is not in a structure and is based either on a data item part or on an explicit primitive-type description such as CHAR(3).
- In COBOL, a character or a set of consecutive characters (excluding literals in either case) defined as a unit of data by the COBOL program.
- A unit of information to be processed.
Data Language/I (DL/I)
The IMS data manipulation language, which is a common high-level interface between a user application and IMS. DL/I calls are invoked from application programs that are written in languages such as Java, PL/I, COBOL, VS Pascal, C, and Ada. DL/I can also be invoked from assembler language application programs by subroutine calls. IMS lets the user define data structures, relate structures to the application, load structures, and reorganize structures.
- In Business Graphics Utility, a straight line drawn from either axis that shows the exact data values on the chart.
- In the GDDM function, a line drawn parallel to a chart axis, through a specified value along the other axis.
- The physical connection (communications lines, modems, controller, work stations, other communications equipment), and the rules (protocols) for sending and receiving data between two or more locations in a data network.
- See link.
- The field in a Q.922 frame that is used for frame relay routing. Each DLCI identifies a frame relay virtual circuit.
- The numeric identifier of a frame-relay subport or PVC segment in a frame-relay network. Each subport in a single frame-relay port has a unique DLCI.
data link control layer (DLC layer)
In communications, the layer that consists of the link stations that schedule data transfer over a link between two nodes and perform error control for the link. Examples of data link control are SDLC and HDLC. See also data flow control layer.
data link escape character (DLE, DLE character)
In binary synchronous communication (BSC), a transmission control character used to indicate that the next character is a control character, not a data character.
data link layer
In the Open Systems Interconnection reference model, the layer that provides services to transfer data between entities in the network layer over a communication link. The data link layer detects and possibly corrects errors that may occur in the physical layer.
data link level
In the hierarchical structure of a data station, the conceptual level of control or processing logic between high level logic and the data link that maintains control of the data link. The data link level performs such functions as inserting transmit bits and deleting receive bits; interpreting address and control fields; generating, transmitting, and interpreting commands and responses; and computing and interpreting frame check sequences. See also packet level, physical level.
- In SNA, a set of rules for data communication over a data link in terms of a transmission code, a transmission mode, and control and recovery procedures.
- The rules that govern control of the physical connection for sending and receiving data between two or more locations in a network. Examples of data link protocols include (a) asynchronous, (b) binary synchronous communications (BSC), (c) Ethernet, (d) synchronous data link control (SDLC), (e) token-ring network, and (f) X.25. See also communications line.
Data Link Service (DLS)
See also called DLS user.
data link switching (DLSw)
A method of transporting network protocols that use an IEEE 802.2 logical link control (LLC) type 2. SNA and NetBIOS are examples of protocols that use LLC type 2. See also encapsulation.
A memory-resident list of names that NameHunter constructs from an external data source. Search requests are performed against one or more data lists. See also data name.
A locale that governs the data manipulated or displayed by a program, which may be different than the UI locale. See also UI locale.
- The system lock that locks data segment into memory.
- The insurance of data availability to a single application program as a protection against conflicting updates to a data record.
Data Lookaside Facility
An MVS service that provides the capability for multiple jobs to share access to large data objects in storage. It enables QSAM and VSAM applications to minimize I/O operations.
- The part of the operating system that controls the storing and accessing of data to or from an application program. The data can be on internal storage (for example, database), on external media (diskette, tape, or printer), or on another system.
- The task of systematically identifying, organizing, storing, and cataloging data in an operating system.
data management application program interface (DMAPI)
The interfaces defined by the Open Group's Data Storage Management (XDSM) specification. These interfaces support the monitoring of events on files and the management and maintenance of the data in a file.
data management block (DMB)
An IMS control block in main storage that describes and controls a physical database. A DMB is constructed from information that is obtained from the ACB library or the DBD library.
data manager server
A server that collects metadata information for client inventory and manages transactions for the storage agent over the local area network. The data manager server informs the storage agent with applicable library attributes and the target volume identifier.
- A subset of SQL statements that is used to manipulate data. Most applications primarily use DML SQL statements, which are supported by the DB2 Connect program. SELECT, INSERT, UPDATE, and DELETE statements are similar across the IBM relational database products. See also Data Definition Language, Structured Query Language.
- A subset of SQL statements that is used to manipulate data. Most applications primarily use DML.
- The process of changing characters from one form of representation to another, such as from zoned decimal to packed decimal.
- A defined mapping between the data in a UMF file and the corresponding tables and table columns in the entity database. A data mapping must exist to successfully load data into the entity database.
A subset of a data warehouse that contains data that is tailored and optimized for the specific reporting needs of a department or team. A data mart can be a subset of a warehouse for an entire organization, such as data that is contained in online analytical processing (OLAP) tools.
data mart ETL
In Tivoli Enterprise Data Warehouse, the extract, transform, and load (ETL) process that extracts a subset of data from the central data warehouse, transforms it, and loads it into one or more star schemas. These schemas then can be included in data marts to answer specific business questions. See also central data warehouse ETL.
data mart model
See dimensional model.
In Q replication and event publishing, a message that contains all or part of a committed transaction that involves source tables, a committed operation on a single row in a source table (event publishing only), or all or part of a large object (LOB) value from a row operation within a transaction.
- The movement of data when the software is upgraded or the data is transferred to a different hardware server or model.
- The movement of data from one physical location to another without disruption of application I/O operations.
- A database-specific model that represents relational data objects (for example, tables, columns, primary keys, and foreign keys) and their relationships. A data model can be used to generate DDL statements which can then be deployed to a database server.
- A description of the organization of data in a manner that reflects the information structure of an enterprise.
- An abstract representation of the business data and metadata used in an installation. A data model contains data sources, data types, links, and event sources. See also company.
- A model defining the structure of business artifacts that are operated upon by business operations.
- The interface with which data must comply to be represented in a chart. The data model might make use of such data directly or might require a transformation of it.
- A logical view of the organization of data in a database.
- A common model that facilitates reporting of all types of data from multiple data sources.
- A template that is used to make a file plan object store compliant with certain records management standards. The data model can include metadata and security features.
A structured set of techniques for defining and recording business information requirements. It is a depiction of the user's view of the data needs of the organization in a consistent and rigorous fashion. The data model eventually serves as the basis for translation to computer system databases.
data movement operation
An operation that physically moves a row from one location to another location in a table. Examples of data movement operations are updating database partitioning keys and reorganizing tables.
- A device that moves data on behalf of the server. A network-attached storage (NAS) file server is a data mover.
- The program that copies data when a backup of the control data sets is being made.
See multiplexed device.
- A name that occurs in a data list and that is searched against. See also data list, query name.
- In COBOL, a user-defined word that names a data item. When used in the general formats, data name represents a word that cannot be subscripted, indexed, or qualified unless specifically permitted by the rules of that format. See also identifier.
data network identification code (DNIC)
A 4-digit code that specifies the X.21 call format used by a network in its International Data Number to call another station. The first three numbers are the data country or region code, and the last number is the country or region network identifier. See also data country code.
- A collection of data referred to by a single name.
- An object that provides information about required activities. Data objects can represent one object or a collection of objects.
- The data that is stored in an R-tree indexed column of a table and in the R-tree index itself.
- An element of data structure such as a file, an array, or an operand that is needed for the execution of an application.
- An object that is either specified within a page or overlay or is identified as a resource using the Map Data Resource (MDR) structured field and later included in a page or overlay. Examples include: PDF single-page objects, encapsulated PostScript objects, and IOCA images.
- A program variable that provides operational and possibly representational characteristics to byte strings in spaces.
- A portion of data in a data stream that can be recognized as belonging to a specific type.
- Any object (such as tables, views, indexes, functions, triggers, and packages) that can be created or manipulated using SQL statements. See also business object.
- A piece of client data that is placed on the coupling facility by CQS as a result of a CQSPUT request or a CQSUPD request. From an IMS shared queues point of view, a data object contains one part or all of an IMS message or an entire EMH message. From an IMS Resource Manager point of view, a data object contains information about an IMS resource such as a transaction or a user.
- An object that conveys information, such as text, graphics, audio, or video. See also machine object.
The message domain that includes all messages that are exchanged between the broker and enterprise information system applications such as SAP, PeopleSoft, and Siebel. Messages in this domain are processed by the DataObject parser. Create a message model for messages to process in this domain. See also BLOB domain, IDoc domain, JMS domain, MIME domain, MRM domain, SOAP domain, XML domain, XMLNS domain, XMLNSC domain.
A program that interprets a message that belongs to the DataObject domain, and generates the corresponding tree from the business object on input, or the business object from the tree on output.
data object resource
An object container resource or IOCA image resource that is either printer resident or downloaded. Data object resources can be used to prepare for the presentation of a data object, such as with a resident color profile resource object, included in a page or overlay through the Include Object (IOB) structured field; for example, PDF single-page objects, encapsulated PostScript objects, and IOCA images, or invoked from within a data object; for example, PDF resource objects.
- A VSAM data set that is contained within a partitioned table space.
- A set of table rows that is stored separately from other sets of rows. A data partition is grouped by the specifications that are provided in the PARTITION BY clause of the CREATE TABLE statement. See also database partition, database partitioning, table partitioning, table-partitioning key.
data-partitioned secondary index (DPSI)
A secondary index that is partitioned according to the underlying data. See also nonpartitioned secondary index.
data path device
A virtual device that represents a single ESS volume (hdisk device) that can be accessed using one or more disk adapters. The data path device manages the multiple connection paths to automatically provide load balancing and path fallover protection to its associated volume device.
A policy applied to XML or relational data that specifies how entities within a data source are to be masked for data privacy purposes. Data privacy policies mask data that is processed by a data management service.
data privacy template
data quality management (DQM)
A pipeline process that checks the data for required values, valid data types, and valid codes, and also corrects the data by providing default values, formatting numbers and dates, and adding new codes, if that has been configured. Data quality management includes address hygiene and name standardization processing. See also address hygiene, DQM rule, name standardization, pipeline.
data reference line
In the GDDM function, a data line that also acts as a shading boundary for the first data group of a surface chart, histogram, or composite bar chart, or for all the data groups of a multiple bar chart. If no data reference line is present, such data groups are shaded from the horizontal axis.
- A server that provides services for the secure and efficient management of information. See also database manager.
- A device on a local area network (LAN) that provides services, data, or facilities for other devices on the network.
data server client
See IBM data server client.
Data Server Client
See IBM Data Server Client.
data server driver copy
See IBM data server driver copy.
Data Server Provider for .NET
See IBM Data Server Provider for .NET.
data service unit (DSU)
A device that provides a digital data service interface directly to the data terminal equipment. The DSU provides loop equalization, remote and local testing capabilities, and a standard EIA/CCITT interface. See also channel service unit.
- The major unit of data storage and retrieval, consisting of a collection of data in one of several prescribed arrangements and described by control information to which the system has access.
- See file.
- A set of parallel data files and the descriptor file that refers to them. Data sets optimize the writing of data to disk by preserving the degree of partitioning.
data set concatenation
The allocation of two or more data sets such that the access method retrieves them as a single data set. The two types of data set concatenation are sequential and partitioned. See also partitioned concatenation, sequential concatenation.
data set definition
A Jazz model object that describes a partitioned data set (PDS) and is stored in the Rational Team Concert Jazz repository. If the PDS already exists, the data set definition must specify just the PDS name. If the PDS is new, the data set definition must specify both the name of the PDS, and the location where it should be stored. Every data set that a build process references must correspond to a data set definition.
- In DFSMShsm, the space management technique of deleting data sets, not managed by the storage management subsystem (SMS), that have not been used for a specified number of days and do not have expiration date protection.
- Removing a data set control block (DSCB) and releasing its space. A tape data set generally is considered to be deleted when its volume or volumes are made available for reuse or destruction. For both disk and tape, deletion generally also includes removing the data set's entry from the catalog DSCB.
data set group
An operating system data set that contains a subset of a database with one or more unique segment types. A database always consists of at least one data set group. See also primary data set group, secondary data set group.
data set prefix
An identifier that, together with the data set name (indicated in the data set definition), specifies a data set that is allocated to Rational Team Concert. A data set prefix can contain multiple segments, including a high-level qualifier (HLQ); for example, HLQ.PROD. With a prefix defined by a user, artifacts can be modified in isolation from other users.
data set profile
A profile that provides RACF protection for one or more data sets. The information in the profile can include data such as the profile owner, universal access authority, and access list. See also discrete profile, generic profile, profile.
- In the EIA 232 standard, a signal that indicates to the data terminal equipment (DTE) that the local data circuit-terminating equipment (DCE) is connected to the communication channel and is ready to send data.
- See DCE ready.
data set retirement
In DFSMShsm, the space management technique of deleting data sets, not managed by the storage management subsystem (SMS), that have not been referred to for a specified number of days and have a backup version.
data set stacking
A function that places several data sets on the same tape volume or set of tape volumes. Data set stacking increases the efficiency of tape media usage and reduces the overall number of tape volumes needed by allocation. It also allows an installation to group related data sets on a minimum number of tape volumes, which is useful when sending data off-site.
See DB2 pureCluster instance.
- A local or remote relational or nonrelational data manager that can support data access using an ODBC driver that supports the ODBC APIs.
- A DB2 subsystem that belongs to a data sharing group.
- The means by which an application accesses data from a database.
- An application, server, transaction, or other process from which raw data is gathered.
- A repository of data to which a federated server can connect and then retrieve data by using wrappers. A data source can contain relational databases, XML files, Excel spreadsheets, table-structured files, or other objects. In a federated system, data sources seem to be a single collective database.
- An object that retrieves business objects from a back-end application and transforms them into IlpObject instances. A data source is back-end specific, which means that there is a data source for each type of back end to be addressed.
- A local or remote data manager. In DB2 for z/OS, a data source must be capable of supporting data access through an ODBC, or JDBC driver that supports current APIs.
- A relational database or XML file that contains data to be processed in a data management service.
- Data that contains the identities that the user loads into the entity database. Data sources contain identifying data and non-identifying data. The identity records in the data source must be exported as Universal Message Format (UMF) before they can be loaded into the entity database. Examples of data sources include, but are not limited to, employee databases, watch lists, vendor lists, and customer lists.
- The source of data itself, such as a database or XML file, and the connection information necessary for accessing the data. See also integration adapter, mapping.
- In JDBC, an interface that provides a logical representation of a pool of connections to a physical data source. Data source objects provide application portability by making it unnecessary to supply information specific to a particular database driver.
data source object
In a federated system, an object at a remote data source on which operations can be performed. Examples of data source objects are tables, views, synonyms, table-structured files, and Excel spreadsheets. See also nickname.
data source record
data source reference
See external reference.
A separate area of addressable storage that contains only data. A data space can hold up to 2 gigabytes of data. See also address space.
data space index
A machine interface object that provides an ordering to all or part of the entries in one or more data spaces, provides keyed access to entries in the data spaces, and provides a mechanism for uniqueness in column and field values across data spaces.
data storage-management application-programming interface (DSMAPI)
A set of functions and semantics that can monitor events on files, and manage and maintain the data in a file. In an HSM environment, a DSMAPI uses events to notify data management applications about operations on files, stores arbitrary attribute information with a file, supports managed regions in a file, and uses DSMAPI access rights to control access to a file object.
- A place (such as a database system, file, or directory) where data is stored.
- The location where one or more Contributor applications are stored. A data store contains the information needed to connect to a database supporting the Contributor applications.
- A data structure where documents are kept in their parsed form.
- A component that manages the job runtime information at the tracked system. A data store is dedicated to the storing and possible retrieval of sysout data sets belonging to submitted jobs, to optimize the sysout availability.
- An object that represents an event.
- The commands, control codes, data, or structured fields that are transmitted between an application program and a device such as printer or nonprogrammable display station.
A Data Manager object that is required wherever mapping is performed. A DataStream item is used to map a data source column to a transformation model element in a fact build, or a level attribute in a reference structure.
- In Open Source Initiative (OSI), the syntactic structure of symbolic expressions and their storage allocation characteristics.
- An area of storage that defines the layout of the fields, called subfields, within the area. A data structure is program described.
- A structure that describes how data is organized, arranged, and represented, such as in a string or array of integers.
- The composition of the data, including repeating sub-structures, nested groupings, sequences, and choices.
A user-defined data class that is used to designate more specifically the type of data. For example, in the Quantity class category, the subclass 01 might stand for a data field that holds information about currency. The 01 subclass category might mean 1 dollar in this context.
In Performance Toolbox, a program that supplies statistics across a network. See also data consumer.
A user-defined numeric value that uniquely identifies a group of data. Data tags can be assigned to table spaces or storage groups and are used in DB2 workload management configurations to monitor and control activities based on which data the activities access.
- A communications device that is the source or destination of signals on a network. It is typically a terminal or computer.
- In OSI, a physical node on a network.
- A device on a data link that sends and receives data, and provides data communications control functions according to protocols.
data transfer rate
The average number of bits, characters, or blocks per unit time passing between corresponding equipment in a data transmission system. The rate is expressed in bits, characters, or blocks per second, minute, or hour. Corresponding equipment should be indicated; for example, modems, intermediate equipment, or source and sink.
Data Transformation Framework (DTF)
An infrastructure that includes data bindings and function selectors, which enables an adapter to convert native data formats to business objects and to convert business objects back to native data formats, such as XML.
data transformation map
A set of mapping instructions that describes how to translate data from a source document into a target document. Both the source and target documents can be one of several supported document types. A data transformation map is one of three supported map types.
Within a studio, a structure that contains objects such as query subjects, query items, dimensions, levels, and members. A data tree is used as a palette of the available data that can be inserted into calculations, filters, display areas, and other authoring gestures.
- In programming languages, a descriptor of a set of values together with a set of permitted operations. A data type determines the kind of value that a variable can assume or that a function can return.
- In OSI, a category of data clearly defined using a data declaration method, such as ASN.1 or Pascal.
- In Informix, a descriptor that is assigned to each column in a table, function argument, or function return type that indicates the type of data that can be held. See also built-in data type, complex data type, distinct data type, opaque data type, user-defined data type.
- An attribute that is used for defining data as either numeric or character or both.
- In CDE, a mechanism that associates particular data files with the appropriate applications and actions.
- A category that identifies the mathematical qualities and internal representation of data and functions. See also type.
- In SQL, a descriptor of a set of values and a set of permitted operations. A data type determines the kind of value that a column, literal, parameter, special register, or variable can have or that can be the result of an expression, a function, or a method.
- An element of a data model that represents a set of data stored in a data source, for example, a table or view in a relational database.
data type mapping
The mapping of a data type to another data type across products or languages. For example, the Oracle type FLOAT maps to the DB2 type DOUBLE. See also forward data type mapping, reverse data type mapping.
Data Universal Numbering System (DUNS)
A system in which internationally recognized nine-digit numbers are assigned and maintained by Dun & Bradstreet to uniquely identify worldwide businesses. See also partner profile.
In Business Graphics Utility, a single, numeric data item entered as a value for a horizontal line or vertical line. See also data group.
- A subject-oriented collection of data that is used to support strategic decision making. The warehouse is the central point of data integration for business intelligence. It is the source of data for data marts within an enterprise and delivers a common view of enterprise data.
- A central repository for all or significant parts of the data that an organization's business systems collect.
Data Warehouse Center
The component of DB2 that provides the graphical interface and the software behind it that enables you to work with the components of the warehouse. You can use the Data Warehouse Center to define and manage the warehouse data and the processes that create the data in the warehouse.
A set of hardware and software components that can be used to analyze large amounts of data for making effective business decisions. For example, data warehousing can be used to analyze daily sales information, customer orders, products, inventory, and schedules.
Data Window Services (DWS)
Services provided as part of the Callable Services Library that allow manipulation of data objects such as VSAM linear data sets and temporary data objects known as TEMPSPACE.
In Fibre Channel technology, a type of transmission word that occurs within frames. The frame header, data field, and cyclic redundancy check (CRC) all consist of data words. See also frame, ordered set, transmission word.
A three-part value that designates a day, month, and year: for example, YYYY-MM-DD. See also timestamp.
See direct access unmovable.
DB2 administration server
A control point that is used to assist with administration tasks on DB2 servers and to perform remote tasks on the server and the host system on behalf of a client request. The DB2 administration server is deprecated.
DB2 Call Level Interface
See call level interface.
See IBM data server client.
DB2 cluster services tiebreaker
A shared disk partition that helps determine which group of hosts in the DB2 pureCluster instance has the operational quorum and survives if the InfiniBand network encounters a split instance due to a communication failure.
An instruction to the operating system to access and maintain the database manager. For example, DB2 commands can be used to start or stop a database and to display information about current users and the status of databases.
DB2 control server
A DB2 database system that contains the satellite control database, SATCTLDB. See also satellite.
DB2 for i5/OS
The integrated relational database manager on the system. It provides access to and protection for data. It also provides advanced functions such as referential integrity and parallel database processing.
DB2 Geodetic Extender
Formerly a DB2 component that stores and manipulates spatial data using the round-Earth model that is a continuous, closed globe (unlike DB2 Spatial Extender, which treats the Earth as a flat map).
See DB2 Interactive.
DB2 notify log
See administration notification log.
DB2 Query Manager (Query Manager)
Part of the DB2 Query Manager and SQL Development Kit for i5/OS licensed program that is a collection of tools used to obtain information from the DB2 for i5/OS database. DB2 Query Manager can also be used to create query definitions, to run new or existing query definitions, or to format query information.
DB2 Spatial Extender
A DB2 component that stores and manipulates spatial data. DB2 Spatial Extender is used to generate and analyze spatial information about geographic features. See also geographic information system.
See DB2 workload manager.
DB2 workload manager (DB2 WLM)
The subset of DB2 workload management capability that can be used to create a DB2 workload, a DB2 service class, a DB2 threshold, or a DB2 work action set. This subset of capability is controlled by a separate license.
DB2 XML Extender
A program that is used to store and manage XML documents in DB2 tables. Well-formed and validated XML documents can be generated from existing relational data, stored as column data, and the content of XML elements and attributes can be stored in DB2 tables.
See database administrator.
See database access thread.
See database management batch.
See double-byte character large object.
See double-byte character set.
DBCS/EBCDIC mixed field
A field that contains both DBCS and EBCDIC data. The DBCS portions should always be enclosed with SO/SI control characters in both inbound and outbound data. In the case of inbound data, the control characters are automatically created by the terminal.
DBCS font file
A system-supplied file that holds the 24x24 character images of one of the following groups of commonly used characters: 1) Japanese non-Kanji and basic-Kanji, 2) Korean non-Hangeul/non-Hanja, Hangeul, and a subset of Hanja, 3) Traditional Chinese non-Chinese and a subset of primary Chinese characters, or 4) all IBM-defined Simplified Chinese characters.
DBCS font table
A system-supplied table that holds either 24x24 or 32x32 pel character images of a double-byte character set. A Japanese 24x24 DBCS font table holds Japanese extended Kanji and user-defined characters. A Korean 24x24 DBCS font table holds a subset of Hanja and user-defined characters. A Traditional Chinese 24x24 DBCS font table holds a subset of primary Traditional Chinese, all secondary Chinese, and user-defined characters. A Simplified Chinese 24x24 DBCS font table holds IBM-supplied Simplified Chinese characters as well as user-defined characters. A 32x32 DBCS font table holds 32x32 pel character images of a double-byte character set, including its user-defined characters. The system-recognized identifier for the object type is *IGCTBL.
Pertaining to a character string in which each character is represented by 2 bytes. Used only with the EBCDIC encoding scheme. The character string does not contain shift-out (SO) and shift-in (SI) characters. See also DBCS-either, DBCS-only, DBCS-open.
See Database Control.
See database control environment.
See database/data communication.
See database description generation.
See database data set.
See database identifier.
See delivery-confirmation bit.
See database monitor.
See database management system.
See database management system driver.
See DL/I backout table.
See database program communication block.
See Database Recovery Control.
In IMS Version 10, one or more DBRC instances that share a single RECON data set in an IMSplex environment. Each DBRC group has a group identifier (GROUP ID), which is unique for that group. DBRC groups are used by DBRC, whether or not parallel RECON access is enabled.
See database request module.
The logical unit of storage in an Informix database. For example, a table or table fragment is created in a dbspace. See also root dbspace.
See distribution center.
See Document Content Architecture.
See D-channel backup.
See data country code.
See Data Communications Control.
See default configuration directory.
- See Distributed Computing Environment.
- See data circuit-terminating equipment.
- See data communication equipment.
A group of Distributed Computing Environment (DCE) machines that work together and are administered as a unit. A cell represents a group of users, systems, and resources that typically have a common purpose and share common DCE services.
See DTE/DCE interface.
See Distributed Command Execution Manager.
In the EIA 232 standard, a signal that indicates to the data terminal equipment (DTE) that the local data circuit-terminating equipment (DCE) is connected to the communication channel and is ready to send data.
See delta channel.
D-channel backup (DCBU)
An ISDN NFAS configuration where two of the T1 facilities have a D-channel, one of which is used for signaling, and the other as a backup in case the other fails. See also non-facility-associated signaling.
See data-conversion interface.
See declare control block.
See declarations generator.
See distributed component object model.
See data communication program communication block.
See Database Connection Services directory.
See discontiguous shared segment.
See data cache unit.
A multi-page spreadsheet made up of two or more dimensions. See also cube.
See dynamic data exchange.
The computer, or an application running on it, that provides dynamic data exchange (DDE) data to another DDE-enabled application. In VisualAge RPG, all components provide DDE server functions.
See DL/I database directory.
See Data Definition Language.
See Distributed Data Management Architecture.
A system object with type *FILE, created by a user on the local (source) system, that identifies a data file that is kept on a remote (target) system. The DDM file provides the information needed for a local system to locate a remote system and to access the data in the remote data file.
See Defense Data Network.
See data definition name.
See Dynamic Domain Name System.
See dynamic data object.
See dynamic device reconfiguration.
See digital data service adapter.
See data definition statement.
See Data Encryption Algorithm.
To take a resource of a node out of service, rendering it inoperable, or to place it in a state in which it cannot perform the functions for which it was designed. See also activate.
In logistics, a distance or period during which a hire vehicle is traveling without generating revenue for its owner. For example, an empty backhaul would give rise to a deadhead distance. See also backhaul.
See nonescaping key.
dead-letter queue handler
A utility that monitors a dead-letter queue (DLQ) and processes messages on the queue in accordance with a user-written rules table. A sample dead letter queue handler is provided by WebSphere MQ.
deadline WTO message
An operator message (EQQW776I) that is issued when a started operation has not been marked as completed before the deadline time. In addition to the standard message, the user-defined text that describes the operation is issued as part of the WTO.
- A condition in which two independent threads of control are blocked, each waiting for the other to take some action. Deadlock often arises from adding synchronization mechanisms to avoid race conditions.
- A condition under which a transaction cannot proceed because it is dependent on exclusive resources that are locked by another transaction, which in turn is dependent on exclusive resources in use by the original transaction.
- Unresolved contention for the use of resources.
A process within the database manager that monitors the states of the locks to determine whether a deadlock condition exists. When a deadlock condition is detected, the detector stops one of the transactions involved in the deadlock. This transaction is rolled back, and the other transaction can proceed.
An action that occurs when Cluster Aware AIX (CAA) detects that a node has become isolated in a multinode environment. This setting occurs when nodes are not communicating with each other via the network and the repository disk.
deadman switch timer
A kernel timer that works on a node that has lost its disk lease and has outstanding I/O requests. By causing the kernel to panic, this timer ensures that the affected node cannot complete the outstanding I/O requests. If the node were able to complete outstanding I/O requests without a disk lease, file system corruption could result.
- In COBOL, any line with a D in the indicator area of the line.
- A COBOL statement run only when the WITH DEBUGGING MODE clause is specified. Debugging lines can help determine the cause of an error.
A special mode in which a program provides detailed output about its activities to aid a user in detecting and correcting errors in the program itself or in the configuration of the program or system.
- In DFSMShsm, the method of operation that projects the changes that would occur in normal operation but in which no user data is moved.
- An environment in which programs can be tested.
- A mode in which a program provides detailed output about its activities to aid a user in detecting and correcting errors in the program itself or in the configuration of the program or system.
A numerical data type used in standard arithmetic operations. Decimal constants can contain any digits 0 through 9. See also integer constant.
decimal floating-point number
A 64-bit or 128-bit representation of a number with a precision of 16 or 34 decimal digits and an exponent. Decimal floating-point numbers include normal numbers, subnormal numbers, and the special values of infinity, NaN, and sNaN. In IBM SQL, decimal floating-point numbers are not considered to be floating-point numbers. See also floating-point number, infinity, normal number, not-a-number, signaling NaN, subnormal number.
In Cryptographic Support, a table of 16 decimal characters that is used to convert a hexadecimal value to a decimal value. Each hexadecimal digit is used as an offset in the (decimalization) table and is replaced with the value found there.
- Numbers to the right of the decimal point. For example, 4.009 has three decimal positions.
- The location of the decimal point in a series of numbers.
- A specific location on an activity diagram or state chart diagram where the workflow may branch based upon guard conditions. See also business value.
- A gateway within a business process where the sequence flow can take one of several alternative paths.
- A gateway that routes an input to one of several alternative outgoing paths, depending on its condition. A decision is like a question that determines the exact set of activities during the execution of a process. Questions might include: What type of order? Or How will the order be shipped?
- The component of a policy expression that indicates the specific behavior or property that the policy affects. Types of decisions include actions, goals, results, and configurations. See also decision name.
In the IBM Integrated Project Development (IPD) project governance methodology, a point at which the team decides whether to commit to further work. Acronym: DCP. For example, the Plan DCP is the point at which a product team makes plan commitments to the business, including the feature-level requirements to be delivered.
decision federator (DF)
See policy editor storage.
In a policy-enabled system, a data value (along with its name and type) or sensor value that the managed resource provides to the autonomic manager and that the autonomic manager uses when making a decision.
An attribute that identifies a specific decision of a result-based policy or a configuration-profile-based policy that is used for solicited decision requests. All policies in a policy set have the same decision name and use the same collection of names and types of result values, which are returned by the autonomic manager during policy evaluation. See also decision, policy set.
In Policy Management for Autonomic Computing, the data value (along with its name and type) in a result-based policy or a configuration-profile-based policy that is used for solicited decision requests. A decision output is the data value that is returned by the autonomic manager that represents the decision in the policy.
A part of a program in a policy-enabled system that requests and accepts solicited decisions from an autonomic manager. A managed resource contains one or more decision points, which provide policy support for the managed resource. See also autonomic manager.
decision point pattern
A set of interfaces that are linked and that provide developers with a framework for implementing policy-based management in their applications. Each decision point pattern identifies where decision points are needed in the application to implement the operational flow. Policy Management for Autonomic Computing provides three decision point patters: an auditor pattern, which checks compliance with a specific set of policies; a planner pattern, which uses policies to design or configure a new system; and a virtualization pattern, which provides a virtualized interface to a physical system.
An application that provides information that is used for strategic planning, decision-making, and reporting. It typically executes in a batch environment in a sequential scan fashion and returns a large fraction of the rows scanned. Decision-support queries typically scan the entire database.
A query that a decision-support application generates. A decision support query often requires multiple joins, temporary tables, and extensive calculations, and can benefit significantly from PDQ
A form of business rule that captures multi-conditional decision-making business logic in a table where the rows and columns intersect to determine the appropriate action. See also rule set.
Decision Validation Services (DVS)
A set of testing and simulation capabilities with which business users and policy managers can verify the rules they have written, and determine if potential changes will have the intended outcome.
An XML document that contains a collection of WML cards. See also card.
- The elements that are included in the right side of a style rule. The declaration set is enclosed within braces. Each declaration is a property-value pair.
- In Java programming, a statement that establishes an identifier and associates attributes with it, without necessarily reserving its storage or providing the implementation. (Sun)
- In Ada language, a construct that associates an identifier (or some other notation) with an entity. This association is in effect within a region of text called the scope of the declaration. Within the scope of a declaration, there are places where it is possible to use the identifier to refer to the associated declared entity. At such places the identifier is said to be a simple name of the entity; the name is said to denote the associated entity.
- A statement that establishes the names and characteristics of data objects and functions used in a program.
- In the C and C++ languages, a description that makes an external object or function available to a function or a block statement.
declarations generator (DCLGEN)
A subcomponent of DB2 for z/OS that generates SQL table declarations and COBOL, C, or PL/I data structure declarations that conform to the table. The declarations are generated from DB2 system catalog information.
An identifier and optional symbols that declare a single function, object or data type within a declaration. See also function declarator.
- To assign the attributes of a variable.
- To create a record object.
declared temporary table
A table that holds temporary data and is defined by using the SQL statement DECLARE GLOBAL TEMPORARY TABLE. Information about declared temporary tables is not stored in the DB2 catalog, so this kind of table is not persistent and can be used only by the application process that issued the DECLARE statement. See also base table, created temporary table, temporary table.
A network architecture that defines the operation of a family of software modules, databases, and hardware components typically used to tie Digital Equipment Corporation systems together for resource sharing, distributed computation, or remote system configuration. DECnet network implementations follow the Digital Network Architecture (DNA) model.
- The process of breaking up an XML document for storage in database tables.
- The separation of a compound word into its constituents (or formation elements). Internally this consists of three distinct steps: segmentation, normalization, and annotation.
- The process of restoring compressed data to its original state, so that it can be used again.
- A function that expands data to the length that precedes data compression.
- A function that exchanges control characters for actual data.
In graphical user interfaces (GUIs), a glyph that annotates a resource with status information, for example to indicate that a file has changed since it was last saved or checked out of a repository.
- To decipher data.
- In Cryptographic Support, to convert ciphertext into plaintext. See also encrypt.
- The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.
- In computer security, the process of transforming encoded text or ciphertext into plaintext.
See data entry database.
dedicated save operation
An operation that the user runs to save objects when no other jobs are running. See also save-while-active operation.
dedicated service tools (DST)
Service functions that are available only from the console and that can run when the operating system is not available, as well as when the operating system is available.
To reduce storage needs by eliminating redundant data. Only one instance of the data is retained on storage media, such as disk or tape. Other instances of the same data are replaced with a pointer to the retained instance.
See data deduplication.
See deployment evaluation framework.
See default access control list.
default agent site
An agent site that is located on the same system as the control server. A remote agent site does not require the installation of IBM DB2 Warehouse Manager Standard Edition. See also agent site, remote agent site.
An argument that is declared with default values in a C++ function prototype or declaration. If a call to the function omits this argument, a default value is used. An arguments with a default value must be the trailing argument in a function prototype argument list.
In the C or C++ languages, within a switch statement, the keyword default followed by a colon, and one or more statements. When the conditions of the specified case labels in the switch statement do not hold, the default clause is chosen.
In OSI, the set of default configuration and initialization values supplied with OSI Communications Subsystem. The user can change the default configuration, which is provided by initial records supplied in the subsystem information base shipped with OSI Communications Subsystem.
default configuration directory (DCD)
The directory in which the default ODM object classes are stored, including application-specific object classes. See also active configuration directory, staging configuration directory.
default database client interface copy
See default IBM database client interface copy.
The method of delivering messages to a message queue without interrupting the job, and sending the system-assigned reply for any messages requiring a reply. Messages are placed on the message queue only if the message queue is QSYSOPR; otherwise, the messages are discarded by the system. For messages requiring a reply, replies are sent before the messages are discarded.
default device geometry
A part of the storage management subsystem (SMS) base configuration that identifies the number of bytes per track and the number of tracks per cylinder for the purpose of converting space requests made in tracks or cylinders into bytes. Default device geometry is used when no unit name has been specified.
Data file in which resource default values are stored in ASCII form to permit the assignment of alternative resource values at run time without need for rewriting or recompiling source code.
- In SNA, a network node that receives alerts from nodes that do not have defined focal points. See also primary focal point.
- A focal point that provides management services support for those nodes that have not been assigned a focal point. The set of nodes in the sphere of control (SOC) of a default focal point is not defined at either the focal point itself or the SOC nodes. A default focal point exchanges management services capabilities with all network nodes known to it; only those nodes that have not established a relationship with another focal point accept the request. See also assigned focal point.
- A temporary object that contains the description of the format of a printed or displayed report, which was built without explicitly specifying a form to be applied against it.
- A QMF form that is created when a saved form is not specified on the RUN QUERY command.
In RACF, the group specified in a user profile that is the default current connect group. See also current connect group.
default IBM database client interface copy (default database client interface copy)
The copy that applications requiring the use of the IBM Data Server Driver for ODBC and CLI and the IBM Data Server Provider for .NET use by default.
The initial value assigned to a data object by the compiler if no initial value is specified by the programmer. In C language, external and static variables receive a default initialization of zero, while the default initialization for auto and register variables is undefined.
- A part of the storage management subsystem (SMS) base configuration that identifies the management class for system-managed data sets that do not have a management class assigned.
- A management class that is assigned to a policy set. This class is used to govern backed up or archived files when a file is not explicitly associated with a specific management class through the include-exclude list.
The namespace that is applied if an XML element, type, or function has no namespace prefix. If the URI reference in a default namespace declaration is empty, unprefixed elements in the scope of the declaration are not considered to be in any namespace.
default network message queue
A message queue to which messages related to network activity are sent when either the user profile does not have a message queue specified or the message queue named in the user profile cannot be used.
A definition of an object (for example, a queue) with all attributes defined. If a user defines an object but does not specify all possible attributes for that object, the queue manager uses default attributes in place of any that were not specified.
A record that consists entirely of default values (numeric fields are filled with zeros; character fields are filled with blanks; and fields of either data type (numeric or character) can be filled with a value specified by the user with the DFT keyword in DDS).
default SSCP list
In VTAM, a list of system services control points (SSCPs) to which a session request can be routed when an LU's owning cross-domain resource manager (CDRM) is not specified. This list is filed as part of an adjacent SSCP table in the VTAM definition library.
default SSCP selection
A VTAM function that uses the default SSCP list to select a set of one or more system services control points (SSCPs) to which a session request can be routed when an LU's owning cross-domain resource manager (CDRM) is not specified.
default system control area (DSCA)
In MFS, part of the device output format (DOF) that causes specific terminal functions to be performed if the destination terminal has the required features. See also system control area.
A part of the storage management subsystem (SMS) base configuration that identifies an esoteric (such as SYSDA) or generic (such as 3390) device name. If a user omits the UNIT parameter in the job control language (JCL) or the dynamic allocation equivalent, SMS applies the default unit if the data set has a disposition of MOD or NEW and is not system-managed.
The user whose security attributes are used to protect CICS resources in the absence of other, more specific, user identification. For example, except in the case of terminals defined with preset security, the security attributes of the default user are assigned to terminal users who do not sign on.
default user pool
A storage pool that stores file data that SAN File System has not assigned (using the active policy set) to a user pool. There is only one default user pool; however, you can assign any user storage pool as the default pool. See also user pool.
- A value that is automatically assigned.
- A predetermined value, attribute, or option that is assumed when no other value is specified. A default value can be defined for column data in DB2 tables by specifying the DEFAULT keyword in an SQL statement that changes data (such as INSERT, UPDATE, and MERGE).
- A project element that allows a project manager to track bugs and bug fixes.
- A type of change request that identifies an anomaly or flaw in a work product. See also change request.
deferred embedded SQL
SQL statements that are neither fully static nor fully dynamic. Like static statements, they are embedded within an application, but like dynamic statements, they are prepared during the execution of an application. See also dynamic SQL, incremental bind statement, static SQL.
deferred index cleanup rollout
A rollout in which index cleanup is performed after the deletion of the portion of the MDC table is complete. Deferred index cleanup rollout is significantly faster than immediate index cleanup rollout, but rolled-out blocks are not available for immediate reuse. See also rollout.
deferred printing mode
A printing mode that spools output through JES to a data set instead of printing it immediately. Output is controlled using job control language (JCL) statements. See also direct printing mode.
A restart performed by the system when a user resubmits a job. The operator submits the restart deck to the system through a system input reader. See also automatic restart, checkpoint restart.
- The catalyst used to call event-driven services controlled within CICS. A DWE causes a unit of work to be scheduled later, normally at the end of the task or just before or after syncpoint.
- A work element created and placed on a chain (the DWE chain) to save information about an event that must be completed before task termination but that is not completed at the present time. DWEs are also used to save information about work to be backed out in case of an abend.
defined user ID
See defined user identifier.
defined user identifier (defined user ID)
A user identifier (user ID) named on a DEFINE PROCESS or DEFINE ACTIVITY command. It specifies the user ID under whose authority the process or activity will be run, if it is activated by a RUN command.
defined zone configuration
The complete set of all zone objects that are defined in the fabric. The defined zone configuration can include multiple zone configurations. See also enabled zone configuration, zone configuration.
define the file (DTF)
The DTF is a DAM control block that identifies to DAM the file associated with this DAM request. It is passed to DAM by DFHFCD to initiate a DAM request, and lasts for the lifetime of the CICS run. The DTF is included in the associated FCT entry, and is generated at FCT assembly time by the DTFDA macro. There is one DTF per DAM FCT entry.
definite response (DR)
In SNA, a value in the response-requested field of the request header that directs the receiver of the request to return a response unconditionally, whether positive or negative, to that request. See also exception response, no response.
In a CICS resource, information about when, how, and by whom the resource was defined or last changed. See also resource signature.
In RPG, a specification used for data definitions. This specification includes defining the following: data structures, data-structure subfields, named constants, arrays, and stand-alone fields.
definitive media library (DML)
A logical representation of one or more locations where all quality controlled versions of all media configuration items (CIs) are held in their definitive form, together with any associated CIs such as license and other documentation.
The process of running a software utility to rewrite fragmented data to contiguous sectors of a computer storage medium to improve access and retrieval time. See also fragmentation.
The conversion of an imprecise representation to a precise one, for example, the conversion of a linguistic representation to a numeric one. See also fuzzification.
- In NetDA/2, the maximum number of attachments (such as links, Ethernet connections, or token-ring connections) that a node can have. For example, if a node can have six attachments, that node has a degree of 6.
- The attribute of a node that is the number of graph edges that connect that node to other nodes.
- The number of children of a node.
degrees of separation
A measurement of the relationship between two entities. The measurement is a positive integer greater than or equal to zero that defines the minimum number of entities involved in a chain of relationships not including the root entity. For example, if two entities are related, those entities are 1 degree separated, and have a 1-degree relationship. See also relationship.
See delete character.
delayed fallback timer
A timer that can be configured to let the resource group fall back to a higher-priority node at a specified date or on a recurring basis. The delayed fallback timer is an attribute of a resource group. See also resource group, resource group policies, settling time.
A method of logging changes to an access path for database files and applying the changes the next time the file is opened instead of rebuilding the access path completely or maintaining it immediately. See also immediate maintenance, rebuild maintenance.
A port that is enabled like a shared port except that the login herald is not displayed until you type one or more characters (usually carriage returns). A port directly connected to a remote system or intelligent modem is usually enabled as a delayed port.
In SNA, an operational mode in which the receiver of request units can return responses to the sender in a sequence different from that in which the units were sent. An exception is the response to a CHASE request, which is returned only after all responses to requests that were sent before the CHASE have been returned. See also immediate-response mode.
A procedure used with some channel associated signaling protocols to indicate when a switch or PABX is ready to accept address signaling. After seizure, the switch sends off-hook until it's ready to accept address signaling, at which time it sends on-hook. See also immediate start, wink start.
A general resource that is eligible to be accessed by specially programmed applications that request RACF to check the daemon or application's authority for a resource when the client's authority is insufficient. See also nested accessor environment element.
- The act of giving other users or groups the authority to perform operations.
- The process of propagating a security identity from a caller to a called object. According to the Java Platform, Enterprise Edition (Java EE) specification, a servlet and an enterprise bean can propagate either the client identity when invoking enterprise beans, or can use another specified identity as indicated in the corresponding deployment descriptor.
A data authority that allows the user to remove entries from an object; for example, delete messages from a message queue or delete records from a file. See also add authority.
A row in the result of a SELECT statement of a cursor that no longer has a corresponding row in the base table because that row was deleted. The row for the SELECT statement is no longer accessible though the cursor. See also hole, update hole.
A trigger that is activated by a delete operation on the table or view that is specified in the trigger definition. See also insert trigger, instead of trigger, trigger, update trigger.
A simple file format that consists of text separated into meaningful chunks by specific characters. The chunks of text are typically individual fields. The specific character is called a delimiter, and can be any character that is not found in the text. Comma and tab are common delimiters. If the delimiter is used as a character in the text, it must be enclosed by a pair of text qualifiers, usually double quotation marks.
- A character, such as comma or tab, used to group or separate units of text by marking the boundary between them.
- A flag that is formed by a character or a sequence of characters to group or separate items of data by marking the beginning and end of a unit of data. The delimiter is not a part of the flagged unit of data.
delivery-confirmation bit (D-bit)
In X.25 communications, the bit in a data packet or call-request packet that is set to 1 if end-to-end acknowledgment (delivery confirmation) is required from the recipient.
A ClearCase operation in which developers merge the work from their own development streams to the project's integration stream or to a feature-specific development stream. If required, the deliver operation invokes the Merge Manager to merge versions.
- Data or other content that has changed since a previous benchmark.
- A difference, or an incremental value, between two instances.
A copy of all database data that has changed since the last successful backup (full, incremental, or delta) of the table space in question. A delta backup is also known as a differential, or noncumulative, backup image. The predecessor of a delta backup image is the most recent successful backup that contains a copy of each of the table spaces in the delta backup image.
delta business object
A business object used in an update operation. Such a business object contains only key values and the values to be changed. See also after-image.
delta channel (D-channel)
In ISDN, a common channel used for signaling and management of the network. In a basic rate interface, the D-channel operates at 16 kilobits per second. In a primary rate interface, the D-channel operates at 64 kilobits per second. See also bearer channel.
See delta encoding.
Deployment of only that data that is required to transform a current runtime environment into a target runtime environment. See also full deployment.
A way of storing or transmitting data in the form of differences between sequential data rather than in the form of complete files. See also data deduplication.
delta index build
In an enterprise search system, the process of adding new information to an existing index. See also main index build.
The process of creating the software package that contains only the delta between the base software package and the software package to be installed. See also byte-level differencing.
A value chain that supports both direct sales channels and indirect sales channels. The Commerce Plaza sample site is an example of an indirect sales channel demand chain. See also supply chain, value chain business model.
The process that is used to respond to an out-of-space condition on a file system for which hierarchical storage management (HSM) is active. Files are migrated to server storage until space usage drops to the low threshold that was set for the file system. If the high threshold and low threshold are the same, one file is migrated. See also automatic migration, selective migration, threshold migration.
The conversion of mangled C++ names back to their original source code names to make program debugging easier. See also mangling.
- To move an object to an earlier state or version, for example, to demote a major version with the status "released" into a minor version with the status "in process." In this case, the status of the previous major version is changed from "superseded" to "released."
- To remove a logical data unit from cache memory. A storage server demotes a data unit to create space for other logical data units in the cache or because the logical data unit is not valid. The ESS must destage logical data units with active write units before they can be demoted.
denial-of-service attack (DoS)
In computer security, an assault on a network that brings down one or more hosts on a network such that the host is unable to perform its functions properly. Network service is interrupted for some period.
The intentional duplication of columns in multiple tables to increase data redundancy. Denormalization is sometimes used to improve performance. See also normalization.
See subnormal number.
dense wavelength division multiplexing (DWDM)
A technology that places many optical signals onto one single-mode fiber using slightly different optical frequencies. DWDM enables many data streams to be transferred in parallel.
- A contingency between groups, where one requires some form of support from the other to achieve a result. For example, a brand may have a dependency on information systems to provide the capability for the direct sales force to price and order a new offering if the brand's promise of value cannot be fulfilled without this support.
- A requirement that one managed resource has on another managed resource in order to operate correctly.
- A file, such as a copybook or an include file, that is required for a COBOL or PL/I program to compile properly.
- A relationship that allows a module to use artifacts from a library or that allows a process application to use artifacts from a toolkit. A toolkit can also have a dependency on another toolkit.
- A relationship between two operations in which the status or the return code of the first operation determines the starting of the second operation.
- A prerequisite that must be satisfied before a job or job stream can start.
- A link between interrelated projects activities. Activities with these links depend on the start and finish dates of at least one other element and therefore cannot be completed without taking the other into consideration.
A build definition that saves time and system resources by only building artifacts that need to be rebuilt based on what has changed since the last successful build. Changes to a program's source or dependencies, and deletion or modification of a program's output will be detected and cause the program to be rebuilt.
In UML modeling, a relationship in which changes to one model element (the supplier) impact another model element (the client). See also abstraction relationship, binding relationship, realization relationship, substitution relationship, usage relationship.
- In SQL, an object (row, table, or table space) that has at least one parent. See also parent table space.
- An Ada-language compilation unit that requires recompilation if another unit were to be recompiled because of the compilation order imposed by the Ada language.
The file in a constraint relationship that contains the foreign key. See also parent file.
dependent immediate materialized query table
A table whose definition is based on the result of a query and whose data is in the form of precomputed results. These results come from the tables or nicknames that are used in the definition of the materialized query table.
dependent logical unit (DLU)
A logical unit that requires assistance from a system services control point (SSCP) to instantiate an LU-to-LU session. See also independent logical unit.
dependent logical unit requester (DLUR)
An advanced program-to-program communications (APPC) application that allows dependent secondary logical units (LU 0, 1, 2, and 3) an entry point into the Advanced Peer-to-Peer Networking (APPN) network. DLUR support gives the appearance of having an adjacent connection to VTAM, but allows traversing the APPN network through intermediate nodes.
dependent LU requester (DLUR)
An APPN end node or network node that (a) owns dependent LUs in its local node or in adjacently attached nodes and (b) obtains SSCP services for these dependent LUs from a dependent LU server (DLUS) located elsewhere in an APPN network. The flows of SSCP services between DLUR and DLUS are encapsulated in APPN formats and carried over a special pair of LU 6.2 sessions (referred to as a CP-SVR pipe).
- In a multi-MVS configuration, a region that receives commands from a master or coordinator region at takeover time. It cannot initiate a takeover.
- An address space, managed by the IMS control region, where IMS application programs run. Dependent region types are MPP, BMP, IFP, JMP, and JBP.
dependent resource groups
A relationship between two or more resource groups that can be specified to control the timing of events or the location of the resource groups. Clusters with dependent resource groups allow multitiered applications to be included in resource groups. See also active configuration directory, child resource group, location dependency, multitiered application, parent resource group, resource group, resource group policies.
A row that contains a foreign key that matches the value of a parent key in the parent row. The foreign key value represents a reference from the dependent row to the parent row. See also parent row.
In a database, a segment that relies on a higher-level segment for its full hierarchic meaning. A child is a dependent segment of its parent. See also root segment.
dependent service element (DSE)
An element of the active IMS system that has a counterpart in the alternate IMS system, but cannot trigger a takeover on its own. z/OS, VTAM, IRLM, and the CPC are DSEs. A DSE depends on IMS to recognize a failure in its processing and request that the alternate take over its operation.
A table that is a dependent of an object. For example, a table with a foreign key is a dependent of the table containing the corresponding primary key. See also descendent table, parent table.
- To make operational the configuration and topology of the broker domain.
- To make a HATS application ready for use on the server, using functions in WebSphere Application Server, after transfer has taken place. See also transfer.
- To place files or install software into an operational environment. See also undeploy.
- To place or install an asset into an operational environment.
- To place files or install software into an operational environment. In Java Platform, Enterprise Edition (Java EE), this involves creating a deployment descriptor suitable to the type of application that is being deployed.
A manageable object that exists in an IT environment, such that its presence can be verified (for example, by using a discovery tool). See also authorized asset.
deployed JAR file
A generic term for a file produced from the EJB JAR file. It contains the XML deployment descriptor and enterprise bean classes from the EJB JAR file, plus additional classes generated to support the chosen EJB container.
deployed security role
A security role that is qualified with the display name specified in an enterprise bean's deployment descriptor, and the prefix specified in the EJBROLEPRFX system initialization parameter.
- The process of installing and configuring a software application and all its components.
- A process that installs an operating system, and possibly other applications and files, on a target computer. During a deployment, data previously stored on the hard drives of the target is deleted.
- The process of moving an application (such as a report or model) to a different instance. For example, reports are often created in a test environment and then deployed to production. When an application is deployed, it is exported, transferred, and imported.
- A multistage process that retrieves the output of a build, packages the output, and moves the package to another location so it can be tested or run.
- In AIX Profile Manager, the process of setting the parameters of the profile that are linked to the template on a target system.
- A discipline in the software-engineering process, whose purpose is to ensure a successful transition of the developed system to its users. Included are artifacts such as training materials and installation procedures.
- The process of transferring rules from a local development environment into an operational, or runtime, environment.
- The process of reconfiguring and reallocating resources in the managed environment. Deployment occurs in response to deployment requests, created manually by administrators or automatically by the system.
- The process of making WebSphere Commerce application code available for use. This process includes packaging customized commands, data beans, and enterprise beans into JAR files. The JAR files must then be installed and configured within a container.
- The act of packaging enterprise beans into a JAR file for distribution to a container on an enterprise bean server.
- In WebSphere InterChange Server, the process of taking generated components and making them available for use.
Additional code that enables bean implementation code written by an application developer to work in a particular EJB runtime environment. Deployment code can be generated by tools that the application server vendor supplies.
- An XML file that describes how to deploy a module or application by specifying configuration and container options. For example, an EJB deployment descriptor passes information to an EJB container about how to manage and control an enterprise bean.
- A file that defines the application behavior. The file is used to initialize an application context.
A UML diagram that models the physical architecture of a system by showing the relationships between the software and hardware components in the system and the physical distribution of the processing.
- The directory where the published server configuration and web application are located on the machine where the application server is installed.
- The directory containing the subdirectories and resource files created during customization.
- A collection of configured clusters, servers, and middleware that collaborate to provide an environment to host software modules. For example, a deployment environment might include a host for message destinations, a processor or sorter of business events, and administrative programs.
- A specific instance of a configuration of hardware and software established for the purpose of installing and running the developed software for its intended use. See also test environment.
deployment evaluation framework (DEF)
A customizable framework that includes a survey that helps a development team learn best practices, make mid-course decisions, and share experience reports, in an agile development project.
The Tivoli management discipline that addresses the automation of configuration and change management activities for the ever-evolving components of a network computing system. See also availability management, operations and administration, security management.
- A server that manages and configures operations for a logical group or cell of other servers. See also subprocess.
- A web server used to install components and to ensure that the components are configured to communicate correctly with one another.
A phase that includes a combination of creating the hosting environment for your applications and the deployment of those applications. This includes resolving the application¡¯s resource dependencies, operational conditions, capacity requirements, and integrity and access constraints.
- A policy that modifies the domain configuration at deployment time to accommodate the environment in which the device operates.
- An optional way to configure an eXtreme Scale environment based on various items, including: number of systems, servers, partitions, replicas (including type of replica), and heap sizes for each server.
- A policy that associates a specific bay in a BladeCenter chassis with a Remote Deployment Manager (RDM) noninteractive task. When a blade server is added to or replaced in the bay, IBM Director automatically runs the RDM task.
A specific type of task template that contains parameters for customizing a deployment on a target, and the target display screen layout. See also task template.
- In UML modeling, a configuration file, such as an XML document or text file, that defines how a node should operate.
- A definition of what packages to move (deploy) between source and target environments, the deployment preferences, and the archive name. Deployment specifications are used for import and export.
See deployment phase.
A component that stores files for distribution. Files are uploaded to a depot server using a client and stored in a directory that is specified when the depot server is installed. Depot servers can replicate files to other depot servers. Target computers can download files from depot servers or peers.
A term that is no longer approved for use. Typically, deprecated terms are replaced with a new term or a synonym. See also replacement term.
To remove a service or component. For example, to deprovision an account means to delete an account from a resource. See also provision.
- In Enhanced X-Windows, the number of bits per pixel for a window or pixmap.
- The number of clicks required for a user, or an automatic crawler, to get from a source page to a target page.
To remove items from a queue. See also enqueue.
See Distinguished Encoding Rules.
- In VisualAge RPG, to remove information specific to the System i platform from a control.
- In the C and C++ languages, to apply the unary operator * to a pointer to access the object the pointer points to. See also indirection.
In the hierarchical file system, to remove an underlying file system and the specific functions it supports from the application programming interface layer and to make it unavailable to user applications.
- In a data source or DataStream, a value that is calculated rather than obtained directly from the source data, using an expression defined by the user.
- In object-oriented programming, the refinement or extension of one class from another.
- The process of deriving a C++ class from an existing class, called a base class.
- A morphological process used to produce additional words from a canonical base form, for example: compute, computer, computerize, and recomputed.
See base class.
See synthetic event.
See Data Encryption Standard.
A type of encryption algorithm that requires a client to send credentials (name, conversation key, window key, and a time stamp) to the server. The server then returns a verifier to the client. Data Encryption Standard (DES) credentials are sometimes called secure credentials because they are based on a sender's ability to encrypt data using a common time reference; a randomly generated key is required to encrypt a common reference time that is then used to create a conversation key.
- A dependent foreign key table of a given table.
- A dependent foreign key table of a descendent foreign key table of a given table. See also dependent foreign key table.
- A dependent materialized query table of a given table.
- A dependent materialized query table of a descendent foreign key table of a given table.
- A dependent staging table of a given table.
- A dependent staging table of a descendent foreign key table of a given table.
A table that has a dependent relationship on a parent table or on another descendent table. See also dependent table.
The part of lowercase letters (such as y, p, and q) that descends below the baseline of the other lowercase letters. In some typefaces, the uppercase J and Q also descend below the baseline. See also ascender.
The values by which data is arranged from the highest value to the lowest value of the key field, in accordance with the rules for comparing data items. See also ascending key.
descending key sequence
The arrangement of data in order from the highest value of the key field to the lowest value of the key field. See also ascending key sequence.
The arrangement of data in order from the highest value to the lowest value, according to the rules for comparing data. See also ascending sequence.
An additional description for an item. Descriptive attributes are not used for SKU resolution. See also defining attribute.
User-written text that describes the operation. This text is also issued as part of the write-to-operator message if the operation has been started, exceeds its deadline, and has the deadline write-to-operator (WTO) option specified.
- A PL/I control block that holds information such as string lengths, array subscript bounds, and area sizes, and is passed from one PL/I routine to another during run time.
- A template from which an IMS control block is built.
- An XML file that describes the content of a component or resource. See also installable unit deployment descriptor, media descriptor.
- In Enterprise Service Tools, a property or characteristic of an instance of structured data that is a component of a screen description. At build time, these descriptors are used for screen matching. The descriptors are also used for screen recognition purposes in the deployed service.
- In the DCE X/Open Directory Service, a defined data structure that is used to represent an OM attribute type and a single value.
- In Informix, a quoted string or variable that identifies an allocated system-descriptor area or an SQLDA structure. See also identifier, system-descriptor area.
- See screen recognition criteria.
- In information retrieval, a parameter word used to categorize or index information.
- In DCE X/Open Object Management, the means by which the client and service exchange an attribute value and the integers that denote its representation, type, and syntax.
- A small, unsigned integer that a UNIX system uses to identify an object supported by the kernel. Descriptors can represent files, pipes, sockets, and other I/O streams.
- In ODM, a named and typed variable that defines a single characteristic of an object.
A method for converting a serialized variable into object data. See also serializer.
- In XDR, to change from XDR format to a particular machine representation.
- To change from serial-by-bit to parallel-by-byte.
- To construct an object from a de-marshaled state.
See directory entry service.
designated approving authority (DAA)
The official who has the authority to accept the security safeguards for an information system. The DAA may be responsible for issuing an accreditation statement that records the decision.
designated gateway SSCP
See designated gateway VTAM.
- In a multiaccess OSPF network that has at least two attached routers, a router that is responsible for generating link-state advertisements (LSAs) for the entire multiaccess network and determines which routers should become adjacent. A designated router is elected by other routers using the Hello Protocol. See also backup designated router.
- A router that informs end nodes of the existence and identity of other routers. The selection of the designated router is based upon the router with the highest priority. When several routers share the highest priority, the router with the highest station address is selected.
- One of several components that authorized users can run to create reusable, generally available searches, workflow definitions, workflow subscriptions, and templates for searching, publishing, and document entry. Site preferences control access to the designers.
- An IBM Process Designer interface where a user can create process models and supporting implementations.
A collection of classes, relationships, use-case realizations, diagrams, and other packages that is used to structure the design model by dividing it into smaller parts. See also design subsystem.
A scheme for refining the subsystems or components of a software system, or the relationships between them. A design pattern describes a commonly recurring structure of communicating components that solves a general design problem within a particular context.
A model element that has the semantics of a package (it can contain other model elements) and a class (it has behavior). See also design package.
The time period during a design phase of the software development process. See also modeling time.
Desktop Management Interface (DMI)
A protocol-independent set of application programming interfaces (APIs) that were defined by the Distributed Management Task Force (DMTF). These interfaces give management application programs standardized access to information about hardware and software in a system.
See Data Exchange SPI architecture.
See destination identifier.
- In JMS, an object that specifies where and how messages should be sent and received.
- A queue of data used with the CICS transient data facility.
- An exit point that is used to deliver documents to a back-end system or a trading partner.
- Any point or location, such as a program, node, station, printer, or a particular terminal, to which information is to be sent. See also origin.
- An end point to which messages are sent, such as a queue or topic.
- In IMS Transaction Manager (TM), an application program, a logical terminal, or an operator command that is associated with the control region.
- A copy group or management class attribute that specifies the primary storage pool to which a client file will be backed up, archived, or migrated. See also copy storage pool.
The location to which information is to be sent. See also source address.
destination address field (DAF)
In SNA, a field in a format identification 0 or format identification 1 transmission header that contains the network address of the destination. In a format identification 2 header, the field is called destination address field prime (DAF'). See also origin address field.
A numeric code used to categorize information that is sent from a user address space to the global address space, or between the global and a local address space. A destination code can correspond to either subsystem interface function codes or internal JES3 communication.
destination control table (DCT)
A table describing each of the transient data destinations used in CICS. This table contains an entry for each extrapartition, intrapartition, and indirect destination.
- An available disk to which data can be written.
- The disk to which a program is installed.
See destination identifier.
- The 8-character subscript on the DESTID initialization statement or command that corresponds to a combination of a first-level destination and a second-level destination that determines where data should be sent in a JES2 installation. A DESTID can be either a symbolic destination or an explicit destination. See also explicit destination, symbolic destination.
- The 3-byte destination ID of the destination device, in the 0xDomainAreaALPA format.
See local environment.
- In the OSI Communications Subsystem licensed program, a node that is the final recipient of data sent by the local node and the origin of data sent to the local node. A destination node may or may not be an adjacent node.
- The node to which a request or data is sent.
- In SNA and TCP/IP, a logical address that allows a system to route data from a remote device to the appropriate communications support. See also source service access point.
- In OSI, a service access point used to receive data.
- In an IMS multisystem environment, the system in which the logical destination resides.
- In SNADS, a system that can receive messages, documents or objects.
destructive data change
An event in which data is modified by a change operation in an application or by a trigger, and then the data is modified again by other trigger actions within the same trigger.
A special member function of a class with the same name as the class with a ~ (tilde) preceding the name. You cannot specify arguments or a return type for this function. A destructor "cleans up" after an object by doing such things as freeing any storage that was dynamically allocated when the object was created.
- In a multithreaded environment, to mark a thread so that the system reclaims the thread resources when the thread ends. If the thread is already ended, the resources are freed immediately.
- In cross-site mirroring, to disassociate a mirror copy from the production copy to use the mirror copy for a separate operation, such as to save data, to run reports, or to perform data mining. Detaching a mirror copy suspends geographic mirroring.
- To de-couple an inbound identity from an entity and verify again that it should still be associated with that entity.
detached data partition
A data partition that is detached from a table but remains part of the table pending the completion of asynchronous index cleanup or integrity processing on dependent tables. Data in detached data partitions is unavailable to SQL statements. See also visible data partition.
In a table with indexes, an index that uses a fragmentation strategy that is different from the table fragmentation. See also attached index.
- In RPG, an output record produced during the detail output operation of the RPG program cycle. See also total record.
- A record that contains the daily activities or transactions of a business. For example, the items on a customer order are typically stored in detail records. See also header record.
In Query, a report that contains all the information produced by a query. See also summary report.
A set based on an item and its immediate details. See also set.
A standard contents view in which a small icon is combined with text to provide descriptive information about an object. The text is arranged in rows and columns so one row is for each object and one column is for each type of descriptive information displayed.
That part of the RPG program cycle in which calculation and output operations are performed for each record read. See also total time.
detected access transmission error in (DTSE in)
In Performance Tools, the number of times the network termination 1 (NT1) notifies the terminal equipment (TE) of an error in data crossing the U interface of the integrated services digital network (ISDN) from the line transmission termination (LT) to the NT1. The NT1 reports the errors to the TE through the maintenance channel S1.
detected access transmission error out (DTSE out)
In Performance Tools, the number of times the network termination 1 (NT1) notifies the terminal equipment (TE) of an error in data crossing the U interface of the integrated services digital network (ISDN) from the NT1 to the line transmission termination (LT). The NT1 reports the errors to the TE through the maintenance channel S1.
A word that qualifies the noun with respect to its reference in context or the quantity. In English, determiners may include articles ('a'; 'the'), quantifiers ('all'; 'some'), demonstratives ('this'; 'that'), possessive pronouns ('my'; 'your'), and cardinal numbers ('one'; 'two').
A dictionary in which for a given input character you have only one transition path out of a node. Some languages require this capability to represent their vocabulary in a compact way. See also non-deterministic dictionary.
Deutsches Institut f¨¹r Normung (DIN)
The German national standards-setting organization. DIN sponsors and publishes standards deemed relevant to German interests, performs conformance tests, and certifies products. DIN is also very influential internationally, particularly in electrical and ergonomic standards.
See device description.
- A person who creates or modifies components of the WebSphere business integration system, such as connectors, collaborations, business objects, and maps. The developer typically uses IBM-provided templates or existing components as the basis for developing new ones.
- A decision management user role that is responsible for implementing the rule applications.
- A person responsible for developing the required software functions that conform to project standards and procedures. This work can include performing activities in any of the requirements, analysis and design, implementation, and test disciplines.
Developer Kit for Java
See IBM Developer Kit for Java.
An object that determines which versions of elements appear in a development view and maintains a list of a developer's activities. The development stream configures the development view to select the versions associated with the foundation baselines plus any activities and versions that developers create after they join the project or rebase their development stream.
A DirectTalk system that is not used to respond to or make 'live' calls; it is used only to develop and test applications. See also production system.
- In UML modeling, a type of node that represents a physical computational resource in a system, such as an application server.
- A component that is used for an event provider to provide location, notification, or telemetry data. Devices always belong to a hub and can be grouped in device groups.
- In the AIX operating system, a valuator, button, or the keyboard. Buttons have values of 0 or 1 (up or down); valuators return values in a range, and the keyboard returns ASCII values.
- A piece of equipment such as a workstation, printer, disk drive, tape unit, or remote system.
device adapter (DA)
A physical component of the ESS that provides communication between the clusters and the storage devices. Multiple DAs are connected to the clusters in such a way that any cluster can access storage device via multiple paths, providing fault tolerance and enhanced availability. See also loop, SSA adapter.
A storage device classification used by the storage management subsystem (SMS). The device categories are: SMS-managed direct access storage device (DASD), SMS-managed tape, DASD not managed by SMS, and tape not managed by SMS.
device characteristics table (DCT)
An MFS table that is generated for IBM 3270 or SLU type 2 devices with symbolic names. An entry is generated for each symbolic name and its associated screen size and physical terminal features. Different combinations of features for the same symbolic name cause separate entries in the table to be created.
- A named set of characteristics that are applied to a group of storage devices. Each device class has a unique name and represents a device type of disk, file, optical disk, or tape.
- The generic name for a group of device types. For example, all display stations belong to the same device class. See also device type.
device cluster resource group
A cluster resource group that contains a list of switchable devices, such as independent disk pools which reside on a switchable entity. See also switchable entity.
The physical placement of display stations, printers, and so forth; and the configuration descriptions that describe the physical configuration to the system and describe how the configuration will be used by the system.
- For a storage agent, a file that contains the name and password of the storage agent, and information about the server that is managing the SAN-attached libraries and drives that the storage agent uses.
- For a server, a file that contains information about defined device classes, and, on some servers, defined libraries and drives. The information is a copy of the device configuration information in the database.
A component of the configurable service for a MedicalDeviceInput node that defines the connection that is used by a medical device. The device connection specifies the connection parameters and measurement set that are used by the device, and the device type.
The reliance on the characteristics of particular types of devices used in writing and running programs or in performing functions. See also device independence.
Pertaining to a function that can be accomplished, or a program that can be run, only if particular types of devices are available. See also device-independent.
device description (DEVD)
An object that contains information describing a particular device or logical unit (LU) that is attached to the system. A device description is a description of the logical connection between two LUs (local and remote locations).
A collection of cluster nodes that share device resources, such as independent disk pools. For independent disk pools, the resources are: virtual addresses, disk pool numbers and disk unit numbers. An independent disk pool can only be accessed by the nodes in one device domain.
- A collection of workflows that implement logical device operations for a specific device or data center asset.
- A program that provides an interface between a specific device and the application program that uses the device.
See device pooling.
One of several types of the system object type *FILE. A device file contains a description of how data is to be presented to a program from a device or how data is to be presented to the device from the program. Devices can be display stations, printers, diskette units, tape units, or remote systems.
A group of devices that are interchangeable as far as z/OS allocation is concerned. Unless a request is made for a specific device name, any device in a given device group can satisfy a request if one device in that device group can satisfy that request.
The capability to write and run programs or perform functions without regard for the physical characteristics of devices. See also device dependence.
Pertaining to a function that can be accomplished, or a program that can be executed, without regard for the characteristics of particular types of devices. See also device-dependent.
- For complex interfaces, a collection of routines that acts as an intermediary between drivers and virtual machines. For example, supervisor calls from a virtual machine are examined by a device manager and routed to the appropriate subordinate device drivers.
- The subcomponent of PSF that manages the interface to the printer.
- In a Content Manager system, the interface between the resource manager and one or more physical devices.
- A name reserved by the system or a device driver that refers to a specific device. For example, the DOS device name for the parallel port is LPT1.
- The symbolic name of an individual device.
device parity protection
A function that protects data stored on a disk-unit subsystem from being lost because of the failure of a single disk unit in the subsystem. When a disk-unit subsystem has device parity protection and one of the disk units in the subsystem fails, the subsystem continues to run. The disk-unit subsystem reconstructs the data after the disk unit is repaired or replaced. See also checksum protection, mirrored protection, Redundant Array of Independent Disks.
A pool of devices (called a fence) that is used exclusively by a set of jobs in a specific job class. Using device partitioning, the device usage of an installation can be tailored to its anticipated workload.
Defines a device attached to a queue in the print spooling system. A device stanza contains all information pertaining to the device (usually a printer) and is found in the /etc/qconfig file.
A class that distinguishes devices within the same functional class. It is used to indicate different interfaces. For example, the printer class has three subclasses: rs232, rs422, and parallel.
The generic name for a group of devices. See also device class.
device-type logical unit
In VTAM, a logical unit that has a session limit of 1 and usually acts as the secondary end of a session. It is typically a logical unit (LU) in an SNA terminal, such as a 3270.
See decision federator.
See data flow control.
See data flow control layer.
See dump utility program.
See dynamic transaction routing program.
See field definition macro.
See map definition macro.
See map set definition macro.
See sample statistics program.
See CICS program library.
See system initialization program.
See statistics utility program.
See device field.
See Data Facility Product.
An operating environment that helps automate and centralize the management of storage. To manage storage, the storage management subsystem (SMS) provides the storage administrator with control over data class, storage class, management class, storage group, and automatic class selection (ACS) routine definitions.
See system-managed storage environment.
An IBM licensed program that provides the complementary functions of DFSMSdfp, DFSMSdss, DFSMShsm, and DFSMSrmm, which, together with the Resource Access Control Facility (RACF), provide a system-managed, administrator-controlled, storage environment. Functions of DFSMS/MVS are included in z/OS.
DFSMS Network File System
See z/OS Network File System.
See Data Facility Sort.
See distributed function terminal.
See data file utility.
See DASD fast write.
See distributed host command facility.
See Dynamic Host Configuration Protocol.
See Diffie-Hellman Group Exchange.
See Document Interchange Architecture.
diacritical weight (DW)
In cultural sort, the weight of a character that is due to its diacritic component. For example, in French, ¨¦ sorts before ¨¨. See also alphanumeric weight, case weight, indifferent weight, level 2, mark weight, special weight.
A special table that contains information about integrity violations that were caused by the rows of a violations table. See also violations table.
- A graphical presentation of a collection of model elements, most often rendered as a connected graph of arcs (relationships) and vertices (other model elements).
- A graphical representation of the logical data model or a subject area.
In IBM ILOG JViews Diagrammer, an instance of the class IlvDiagrammer. This is a Swing component that is used to manage a diagram. It contains a grapher that manages a collection of nodes and links, and a view to display the diagram. The nodes in a diagram are represented by symbols.
- To initiate a telephone call. In telecommunication, this action is performed to establish a connection between a terminal and a telecommunication device over a switched line.
- An input/output device that is used to input variables by way of thumbwheels.
- A computer input device that allows a user to set parameter values.
- A distinct variety of a language that is used in a particular region or by a particular social group. British and American English are dialects of the English language.
- See local language.
dialed number identification service (DNIS)
In telephony, a number supplied by the public telephone network to identify a logical called party. For example, two 800 numbers might both be translated to a single real telephone number. The DNIS is sent when the real telephone number is called to allow end users to distinguish which service is being called when a call arrives to the real number.
- In AIXwindows, a two-way text interface between an application and its user. The interface takes the form of a collection of widgets and gadgets, including a DialogShell widget, a BulletinBoard widget (or a subclass of a BulletinBoard widget or some other container widget), plus various children, including Label, PushButton, and Text widgets.
- A series of related inquiries and responses between a user and an application, similar to a conversation between two people.
- The recorded interaction between a user and the 3270 application that the user accesses. Users can record a dialog using the Record Dialog function in the 3270 terminal service recorder. A recorded dialog includes the keystrokes, inputs and outputs that move the user from one screen to another in the 3270 application.
A secondary window that solicits user input for a specific task or subtask. Common examples are the Print and Save As dialog boxes. Dialog boxes are modal; that is, they must be closed before the user can continue working in the window that launched the dialog box.
In the user interface manager (UIM), an element in a panel group that is used to pass data values between two programs or between a program and a user. The values for all dialog variables in a panel group are stored in a variable pool.
- In data compression, a table that associates words, phrases, or data patterns with shorter tokens. The tokens replace the associated words, phrases, or data patterns when a data set is compressed.
- A grouping of logically related components of a particular syntax type, such as ROD dictionaries, EDI dictionaries, and XML dictionaries.
dictionary data section
One of the data sections of a CICS monitoring record written to SMF. The dictionary data section defines all the performance data that is being gathered or can be gathered during this CICS run.
A set of predefined visuals that graphically represent state and alarm dictionaries based on telecommunication standards. The visuals are associated with predefined styles and rendering policies.
See change-capture replication.
Differentiated Services domain
A contiguous portion of the Internet over which a consistent set of Differentiated Services policies are administered. A Differentiated Services domain can represent different trust regions, different network technologies (such as cells or frames), different hosts, or even different routers.
Differentiated Services field
A six-bit field in the Internet Protocol (IP) header of a data packet that encodes the Differentiated Services code point. The field replaces the IPv4 IP header field, which is called type of service (ToS).
- A symbol that represents one of the nonnegative integers smaller than the radix.
- Any of the numerals from 0 through 9.
Pertaining to data in the form of digits. See also analog.
An electronic document used to identify an individual, a system, a server, a company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certification authority and is digitally signed by that authority. See also certificate authority certificate, user certificate.
- On i5/OS systems, the method of managing digital certificates and using them in secure applications on the iSeries server. Digital Certificate Manager requests and processes digital certificates from certification authorities (CAs) or other third-parties.
- An i5/OS option that registers certificates that are created on the system when it is acting as a certificate authority (CA). DCM can also be used to register certificates that other certificate authorities issue. DCM allows you to choose to associate a user's certificate with its user profile. DCM is also used to associate digital certificates with various applications so that these applications can use the Secure Sockets Layer (SSL) for secure communications.
- An i5/OS component that allows i5/OS to be a local Certificate Authority (CA) to create digital certificates that are used to ensure secure communications.
digital signal processing (DSP)
A set of algorithms and procedures used to process electronic signals after their conversion to digital format. Due to the specific mathematical models required to perform this processing, specialized processors are generally used.
Information that is encrypted with a private key and is appended to a message or object to assure the recipient of the authenticity and integrity of the message or object. The digital signature proves that the message or object was signed by the entity that owns, or has access to, the private key or shared-secret symmetric key.
digital signature algorithm (DSA)
A security protocol that uses a pair of keys (one public and one private) and a one-way encryption algorithm to provide a robust way of authenticating users and systems. If a public key can successfully decrypt a digital signature, a user can be sure that the signature was encrypted using the private key.
Digital Subscriber signaling System Number 1 (DDS1)
A signaling protocol used between ISDN subscriber equipment and the network. Carried on the ISDN D-channel. ITU-T recommendations Q.920 to Q.940 describe this protocol.
digital versatile disc (DVD)
An optical disc that has the same overall dimensions of a CD-ROM, but has significantly higher capacities than a CD-ROM. DVDs are also double sided, whereas CD-ROMs are single sided.
digital video disc
See digital versatile disc.
Digital Video Interactive (DVI)
An integrated video, audio, and graphics technology allowing all forms of data (full motion video, still images, graphics, and text) to be displayed from any digital source. DVI allows real-time compression and decompression as well as display of digital graphics and full-motion video with audio.
In COBOL, the amount of physical storage required to store a single digit. This amount can vary depending on the usage specified in the data description entry that defines the data item. If the data description entry specifies that the USAGE IS DISPLAY, then a digit position is synonymous with a character position.
See Domino Internet Inter-ORB Protocol.
See Shortest Path First.
- A finishing item that consists of multiple lines and a piece of text. The lines indicate the distance or angle that is being dimensioned, and the text contains the computed entry of the lengths, angles, or radiuses of elements on a drawing.
- To compute the length, angle, or radius of elements on a drawing.
- A broad grouping of descriptive data about a major aspect of a business, such as products, dates, or locations. Each dimension may include different levels of members in one or more hierarchies and an optional set of calculated members or special categories.
- The attribute of size given to arrays and tables.
- In Cognos Planning, a list of related items such as Profit and Loss items, months, products, customers, and cost centers, including calculations. The rows, columns, and pages of a cube are created from dimensions.
- In System Manager, the interfaces that define guidelines, standards, services, and other interfaces for integrating systems management applications.
- A broad grouping of descriptive data about a major aspect of a business, such as products, dates, or locations. Each dimension includes different levels of members in one or more hierarchies and an optional set of calculated members or special categories.
- In multidimensional data, a structural attribute of a cube that organizes data to enable in-depth business analysis.
- A data category that is used to organize and select monitoring context instances for reporting and analysis. Examples of dimensions are time, accounts, products, and markets. See also member.
- A measure of spatial extent such as height, width or breadth, or depth. See also dimension line.
See level attribute.
dimension block index
In multidimensional clustering, a block index that is automatically created for a particular dimension when the dimension is defined on an MDC table. This index is used to maintain the clustering of data along that dimension, together with the other dimensions defined on the table. See also composite block index.
A build that delivers data to describe a single business dimension, such as a product or a customer. A dimension build has a source dimension table, a hierarchy for the data, a target database, and a target table. See also build.
dimension delivery module
A delivery module used to deliver data, describing a single dimension, to a target data mart. See also delivery module.
An element in the transformation model that is used to give context to a measure element. For example, a Product_Number dimension element, gives context to a Quantity measure element.
One value in a dimension. See also member.
- A row of dimension names that appears either along the top of the dimension map window or just below the Measures and Data Sources option buttons in the Show Scope window. See also dimension.
- A solid line with arrows at both ends and a dimension in the center that is used to define the measurement of a part feature.
A table that shows the Transformer model in rows and columns. The columns in a dimension map are, for example, the dimensions representing Dates, Products, and Sales Regions. The rows in a dimension map are the levels within the dimensions, for example, year, month, and day (for a time dimension) or continent, region, state, and city (for a geographical dimension).
- A table that contains attributes used to constrain and group data when performing data warehousing queries.
- The representation of a dimension in a star schema. Each row in a dimension table represents all of the attributes for a particular member of the dimension. See also star join, star schema.
A subset of a dimension used to create cubes that contain only selected aspects of the data represented by the complete model. For example, views based on specific countries or regions are a useful way of ensuring that users see only the data that is most relevant to them.
See dual inline memory module.
See Deutsches Institut f¨¹r Normung.
See data interchange program.
direct access storage
A type of storage where information is stored or retrieved directly, without prior sequential searching. See also random access memory.
direct access storage device (DASD)
A device that allows storage to be directly accessed, such as a disk drive. See also random access memory.
In VTAM, the activation of a resource as a result of an activation command that specifically names the resource. See also automatic activation.
direct argument passing
A method of passing arguments in which the value of the argument is included directly in the parameter list See also indirect argument passing.
A type of binding between network license servers and clients in which client applications locate license servers by means of a local text file that contains network addresses of the license servers.
direct call facility
A facility that permits calling without requiring the user to provide address selection signals; the network interprets the call request signal as an instruction to establish a connection to one or more predetermined data stations.
In Enhanced X-Windows, a class of color map in which a pixel value is decomposed into three separate subfields for indexing. One subfield indexes an array to produce red intensity values, the second indexes another array for blue intensity values, and the third for green intensity values. The RGB values can be changed dynamically. This is mutually exclusive to the Pseudocolor color map color.
An XQuery constructor that contains XML-like notation to construct element, attribute, document, text, processing-instruction, or comment nodes. See also computed constructor, constructor.
direct data set
A data set that has records in random order on a direct access volume. Each record is stored or retrieved according to its actual address or its address relative to the beginning of the data set. See also sequential data set.
In VTAM, the deactivation of a resource as a result of a deactivation command that specifically names the resource. See also automatic deactivation.
direct dependent segment
In a data entry database (DEDB), a segment that is chained from a root segment. A direct dependent segment is stored in either the root addressable portion or the overflow portion of a DEDB area.
direct dial in (DDI)
See direct inward dialing.
directed association relationship
In UML modeling, an association relationship that is navigable in only one direction and in which the control flows from one classifier to another. See also association relationship.
A RACF command that is issued from a user ID on an RRSF node. It runs in the RACF subsystem address space on the same or a different RRSF node under the authority of the same or a different user ID. See also automatic command direction, command direction.
A graph in which every edge is associated with an ordered pair of nodes. See also directed link.
A relational operation in which all of the rows in one or both of the joined tables are rehashed and directed to new database partitions based on the join predicate. If all of the partitioning key columns in one table participate in the equijoin predicates, the other table is rehashed; otherwise (if there is at least one equijoin predicate), both tables are rehashed.
A link with a direction that starts at one of its incident nodes and ends at the other incident node. Directed links are usually drawn with arrowheads that indicate the direction. See also directed graph, undirected link.
directed maintenance procedure
See fix procedure.
See assisted modeling.
A search request that is sent to a specific destination node. A directed search is used to verify the continued existence of the resource, and to obtain the routing information specific to the node.
A connected directed graph where each node has exactly one incoming link except the root node, which has no incoming links. See also tree.
- A control statement that directs the operation of a feature and is recognized by a preprocessor or other tool. See also pragma.
- An instruction in a source program that guides the compiler in making the translation to machine language but is not itself translated into instructions in the object program.
- A first-failure data capture (FFDC) construct that provides information and suggested actions to assist a diagnostic module in customizing the logged data.
- A statement that is used in an application configuration file to define a particular setting for the application.
direct managed resource
A managed resource that is not enclosed in a hosting domain. A direct managed resource must be registered independently when it is installed. The root managed resource of a hosting domain is a direct managed resource. See also hosting domain, indirect managed resource.
direct monitor handler
An exception handler that allows the application programmer to directly declare an exception monitor around limited high-level language source statements. For ILE C, this capability is enabled through the #pragma statement.
See IBM Director Agent.
See IBM Director Console.
Director Core Services
See IBM Director Core Services.
See IBM Director database.
See IBM Director environment.
See IBM Director extension.
See IBM Director Server.
Director Server service
See IBM Director Server service.
Director service account
See IBM Director service account.
- A table of identifiers and references to the corresponding items of data.
- In OSI, a repository of information about objects. As defined in the X.500 directory standards, a directory is both a repository of information and the set of services provided to enable its users to access the information in the repository.
- In VM, a Control Program (CP) disk file that defines each virtual machine's typical configuration, including the user ID, password, dispatching priority, and other information.
- The DB2 for z/OS system database that contains internal objects such as database descriptors and skeleton cursor tables.
- A file containing a set of tables that store all product-specific object definitions created by the user for a site.
- A collection of open systems that cooperate to hold a logical database of information about a set of objects in the real world.
- A file that contains the names and controlling information for objects or other directories.
- In a hierarchical file system, a grouping of related files.
- The part of a partitioned data set that describes the members in the data set.
- A logical record in a program library directory that contains a member or alias name, a pointer to that member, and attributes of that member.
- An entry in the system distribution directory. A directory entry contains information about the user, such as user ID and address, system name, profile name, mailing address, and telephone number.
directory entry name
A means of identifying the directory entry of a named object to the coupling facility. The directory, all of its entries, and all of the objects associated with those entries are contained in a single structure.
directory entry service (DE service)
A function that manages directory entries in partitioned data sets (PDSs) and partitioned data sets extended (PDSEs). DE services can be used by unauthorized as well as authorized programs.
directory manager domain
A CICS domain that provides resource-table lookup services for CICS Transaction Server for z/OS components such as transaction manager, program manager, and user domains. The resource definitions for which the directory manager domain provides services are transaction definitions, remote transaction definitions, transaction classes, TPNames, user attributes, programs, BMS mapsets, and BMS partition sets.
directory model ACL
See directory default ACL.
The valid attribute types and object classes that can appear in a directory. The attribute types and object classes define the syntax of the attribute values, which attributes must be present, and which attributes may be present for the directory.
See IBM Tivoli Directory Server for i5/OS.
- A component that provides naming, object storage, and lookup capabilities to other components.
- A facility such as Lightweight Directory Access Protocol (LDAP) or Microsoft Active Directory that provides information about users and groups in an organization.
- In OSI, the service by which an open system can access directory information. Directory service can be provided locally within an open system, or it can be obtained from another open system using the directory service protocols defined by ISO/CCITT. In OSI Communications Subsystem, directory service is used to obtain the presentation address and other attributes of application entities.
The capability of a system to duplicate Enterprise Address Book (EAB) data from one installation of the EAB to another, such that whenever an addition, change, or deletion is made to the EAB on a given system, it is available to all EAB installations within the network.
directory user agent (DUA)
In OSI, an application process residing in an open system that serves as the agent that obtains directory services for that open system. The agent can obtain the services either locally or from a remote directory system agent.
Direct Printer Services Subsystem (DPSS)
The PSF subcomponent that acts as the interface between PSF and an application program when the job entry subsystem is not spooling jobs for a printer. DPSS attaches PSF as a subtask for use in the direct-printing mode.
direct printing mode
A printing mode that gives PSF exclusive use of a channel-attached printer. Output is printed immediately and is not spooled through JES. See also deferred printing mode.
direct sales business model
A business model that supports commerce transactions involving products, services, or information directly between businesses and consumers or between two businesses or parties. WebSphere Commerce supports the following types of direct sales business models: consumer direct and B2B direct. See also B2B direct business model, consumer direct.
direct sales store
A customer-facing store that supports the exchange of products, services, or information directly between businesses and consumers, or between two businesses or parties. See also extended site store.
direct search list (DSRLST)
A message unit that contains a search request that is sent throughout subarea networks to obtain information about a network resource (such as its name, routing information, and status information).
direct speech recognition
Identification of words from spoken input read directly from the telephony channel. See also indirect speech recognition.
One of the DirectTalk Beans that provides access from a voice application to simple call control functions: waiting for a call, making an outgoing call, handing a call over to another application, and returning a call when finished.
See Message Center.
See DADSM interrupt recording facility.
dirty address space
An address space requiring daemon authority that has had an uncontrolled program loaded into it. A dirty address space cannot perform daemon activities. See also controlled program.
A read request that does not involve any locking mechanism. This means that data can be read that might later be rolled back resulting in an inconsistency between what was read and what is in the database. See also read integrity, read uncommitted.
- Pertaining to an object that is not accepting new data. Disabling an object does not affect the definition or existence of that object, rather, disabling an object keeps new data from flowing into the object and to all objects that rely on the target object.
- In VTAM, pertaining to a logical unit (LU) that has indicated to its system services control point (SSCP) that it is temporarily not ready to establish LU-LU sessions. An initiate request for a session with a disabled logical unit (LU) can specify that the session be queued by the SSCP until the LU becomes enabled. The LU can separately indicate whether this applies to its ability to act as a primary logical unit (PLU) or a secondary logical unit (SLU). See also enabled, inhibited.
- Pertaining to a state of a processing unit that prevents the occurrence of certain types of interruptions. See also enabled.
- Pertaining to the state in which a transmission control unit or audio response unit cannot accept incoming calls on a line.
The object mode in which a database object is disabled. When a constraint, index, or trigger is in the disabled mode, the database server acts as if the object does not exist and does not take it into consideration during the execution of data manipulation statements.
- The process of restoring a database, system, policies after a partial or complete site failure that was caused by a catastrophic event such as an earthquake or fire. Typically, disaster recovery requires a full backup at another location.
- The process of restoring a database after a partial or complete site failure that was caused by a catastrophic event such as an earthquake or fire. Typically, disaster recovery requires a full database backup at another location.
- A procedure for copying and storing an installation's essential data in a secure location, and for recovering that data in the event of a catastrophic problem. See also vital records.
disaster recovery plan
A file that is created by the disaster recover manager (DRM) that contains information about how to recover computer systems if a disaster occurs and scripts that can be run to perform some recovery tasks. The file includes information about the software and hardware that is used by the server, and the location of recovery media.
- A collection of related activities that are related to a major task in the development process. The disciplines in RUP include: Business Modeling, Requirements, Analysis and Design, Implementation, Test, Deployment, Configuration and Change Management, Project Management, Environment.
- In System Manager, a grouping of systems management tasks that support an enterprise's information system environment. Examples of disciplines are change management and problem management.
- An ordering method used to line up jobs for printing.
See Data Interchange Services client.
- In communications, the transmission control character that is part of the sequence for disconnecting a switched line.
- To break the connection between an application and a queue manager.
A graph that contains at least two nodes that are not linked by a path. See also connected graph.
discontiguous shared segment (DCSS)
An area of virtual storage outside the address range of a virtual machine. It can contain read-only data or reentrant code. It connects discontiguous segments to a virtual machine's address space so programs can be fetched.
- To identify resources within a network environment.
- In UDDI, to browse the business registry to locate existing web services for integration.
A server that runs the middleware agent and is found outside of the administrative environment but has a server representation automatically created within the administrative environment. The representation that is created is an assisted life-cycle server.
- In law, the pretrial phase in a lawsuit in which each party can request documents and other evidence from other parties or compel the production of documents and other evidence using the legal system.
- The process of finding resources within an enterprise, including finding the new location of monitored resources that were moved.
- The automatic detection of a network topology change, for example, new and deleted nodes or links.
- The process of identifying the configuration items present in an IT environment.
The relationship created with the method or application used to discover a device. An existing device in the data center model must have a discovery association in order to perform discovery.
The frequency with which topology and attribute information is gathered. The discovery interval is set by a schedule to occur either periodically or at specific times. Discovery can also occur at other times, such as when it is triggered by an event from a storage area network (SAN) switch.
A job that finds new Windows machines that have been introduced into the environment, identifies the servers and volumes within NetWare trees (NDS trees), discovers the file systems within network-attached storage (NAS) filers, and discovers the CIM object managers (CIMOMs) in the environment and the storage subsystems managed by those CIMOMs.
- A component of an IBM product that captures discovery information.
- A program that copies data from a management software system, converts it to IDML, and stores it in books in the discovery library.
- A policy that defines an area of the web environment to investigate and sample the transaction activity of real customers and average performance times for Uniform Resource Indicator (URI) requests during a specified time period to set a baseline of performance.
- The actions that an administrator or Tivoli Intelligent Orchestrator is to take if a certain new item or if a difference in the data model is discovered.
A Resource Access Control Facility (RACF) profile that contains security information about a single data set, user, or resource. See also data set profile, fully qualified generic profile, generic profile, profile, resource profile.
discrete word recognition
Identification of spoken words separated by periods of silence, or input one at a time. See also continuous speech recognition.
discretionary access control
A security mechanism that protects information from unauthorized disclosure or modification through owner-controlled access to files. See also mandatory access control.
See soft hyphen.
In Ada language, a distinguished component of an object or value of a record type. The subtypes of other components, or even their presence or absence, may depend on the value of the discriminant.
In XDR, a C language union that holds several data types, with one arm of the union being an enumeration value, or discriminant, which holds a specific object to be processed over the system first.
An object that enables a system to select operations and event reports related to other managed objects. See also event forwarding discriminator.
- Pertaining to a security label relationship where two security labels must not be equivalent and neither one can dominate the other. See also dominant, equivalent.
- See node disjoint.
- See drive.
- A storage device that includes one or more flat, circular plates with magnetic or optical surfaces on which information is stored.
The hardware used by a computer to access and control disk drives. On POWERstations and POWERservers, disk adapters each fit into a single Micro Channel slot, and each are controlled by software device drivers.
disk array controller
The device, such as a Redundant Array of Independent Disks (RAID), that manages one or more disk arrays and provides functions. See also disk array router.
disk array router
A router that represents an entire array, including current and deferred paths to all logical unit numbers (LUNs). See also disk array controller.
disk-based table (D-table)
A table whose contents are stored primarily on disk such that the server copies only small amounts of data at a time into memory. See also in-memory table.
A definition of the type of data that the disk contains and the failure group to which this disk belongs. See also failure group.
disk drive module group
See disk 16 pack.
- A sealed container that holds the read/write head and disk assembly within a disk unit.
- The part of a disk unit that contains the read and write heads, the magnetic disks, and the actuators.
The failure of a disk or disk adapter. Disk events are handled by the AIX operating system through LVM mirroring on SCSI disk devices and by internal data redundancy on RAID device disk arrays.
A collection of disk drives in the same loop configured by the ESS to be available for assignment as a Redundant Array of Independent Disks (RAID). A disk group can be formatted as count key data (CKD) or fixed block, formatted as RAID, or left unformatted. A disk group is a logical assemblage of multiple disk drives, in contrast to a disk eight pack or disk 16 pack.
Fixed-disk input and output. See also buffered disk I/O.
A method for controlling access to storage devices from multiple host systems. Any host that wants to access a storage device configured to use disk leasing registers for a lease; in the event of a perceived failure, a host system can deny access, preventing I/O operations with the storage device until the preempted system has reregistered.
The property of a workstation that has no local file systems or local boot images to access some of its resources remotely. Diskless clients boot remotely from a diskless server and use the server for remote paging.
Disk on Module (DOM)
A USB flash drive that can be used in place of a hard disk drive. Disk on Modules (DOMs) are used particularly in embedded systems where they can be deployed in an environment that mechanical hard disk drives fail to operate. DOMs can also be deployed in thin clients because of their relatively small size, low power consumption (and low heat output), and silent operation.
- In z/VM Center, a logical grouping of contiguous disk spaces. A disk pool can include disk spaces from multiple physical disks. A disk pool corresponds to a z/VM Directory Maintenance Facility allocation group.
- An auxiliary storage pool that contains only disk units.
An event in which a surviving node assumes control of a shared disk so that the disk remains available when the node that currently owns the disk fails (for nonconcurrent access configurations). See also fast disk takeover.
A sealed container that holds the read and write heads, the magnetic disks, and the actuators. See also random access memory.
See Distributed Office Support System.
The relationship of ones and zeros in an encoded character. Neutral disparity indicates an equal number of ones and zeros, positive disparity indicates a majority of ones, and negative disparity indicates a majority of zeros.
- In CICS, to schedule a task for execution. Dispatching is done by CICS task control. See also service request block.
- To allocate processing time on a specific device for a job that is ready to run.
- A standalone application that acts as an intermediary between one or more devices and large event providers. The dispatcher retrieves all location messages from the event providers it is connected to and distributes them to one or more devices.
- In XOM, the software that implements the service interface functions using workspace interface functions.
Major component of CICS concerned with attaching, running, and detaching tasks and scheduling task control blocks for the various modes: quasi reentrant, resource-owning, or concurrent.
- A positive or negative number that can be added to the contents of a base register to calculate an effective address.
- The distance from the beginning of a record, block, or segment to the beginning of a particular field.
- To present data visually.
- To direct the output to the user's terminal. If the output is not directed to the terminal, the results are undefined.
- A visual presentation of data.
- In computer graphics, a property that is assigned to a display element, to a display segment, or to the complete display image; for example, a bright intensity or particular color.
- In XGSL, any one of the following characteristics associated with displays: (a) blink supported or not supported, (b) color or monochrome, (c) changeable color palette or fixed color palette, and (d) APA (all points addressable) or character. An APA display can address each pixel, while a character display addresses character-sized blocks of pixels.
A set of display preferences that a customer at a multicultural store can select, depending on their language and locale. For example, a multicultural commerce site may have different formats for United States English and Japanese. These display formats would differ in the language of the text as well as such features as currency, units of measure, and data formats.
In 3270 emulation, the x-character block (where x is the maximum number of characters that can fit on the display screen, or 1920 for printers) that contains data in the sequence in which it would appear on the display screen or the printer. When creating the display, the user can specify the display image with or without field definitions, such as position, length, and other attributes.
See display type.
In GL, a sequence of drawing commands that have been compiled into a unit and perform like a macro; an object can be invoked multiple times simply by referring to its name. The object can be instantiated at different locations, sizes, and orientations by appropriate use of the transformation matrices.
- A page in an online store that is generated in response to a command.
- A page in a catalog that displays category and product information.
A device, usually equipped with a keyboard and a display device, capable of sending and receiving information over a communications line. See also workstation.
display station pass-through (DSPT)
A communications function that allows a user to sign on to one system (such as a System i, a System/38, or a System 36 system) from another system (such as a System i, a System/38, or a System 36 system) and use that system's programs and data.
In Tivoli NetView for OS/390, one of the three elements, which also include data type and resource type, that are used to describe the organization of panels. Display types include total, most recent, user action, and detail. See also resource type.
- The state of a record after cutoff is applied through created disposition schedules and associated with containers.
- In WebSphere Commerce, disposing of or transferring inventory that has been returned to the Seller's fulfillment center by a customer. See also fulfillment center.
- The session to which a data management event is delivered. An individual disposition is set for each type of event from each file system.
- A means of indicating to VSE/POWER how job input and output is to be handled. A job may, for example, be deleted or kept after processing.
An action that is performed on entities after the cutoff is reached or when their retention period in a disposal phase is over. For vital records, the disposition action is a periodic review.
A function performed on data sets at the end of a job step to keep, delete, catalog, remove from a catalog, or pass them to a subsequent job step, depending on the data set status of the disposition specified in the data definition (DD) statement.
distance-vector routing protocol
A type of routing protocol in which each router uses the number of hops in a route to find the shortest-path spanning tree and periodically sends its entire routing table to its neighbors. See also link-state routing protocol.
distinct data type
In SQL, a data type derived from another data type. A distinct type always has the same internal storage representation as its source type (such as an existing opaque data type, built-in data type, named row type, or distinct data type). It might have the same casts and routines as its source type, however it must have a unique name. See also data type.
Distinguished Encoding Rules (DER)
A standard, based on the Basic Encoding Rules, that is designed to ensure a unique encoding of each ASN.1 value, defined in ITU-T X.690. See also Basic Encoding Rules.
- The name that uniquely identifies an entry in a directory. A distinguished name is made up of attribute:value pairs, separated by commas.
- A set of name-value pairs (such as CN=person name and C=country or region) that uniquely identifies an entity in a digital certificate.
- In Open System Interface (OSI), a multipart hierarchical name that can be used to identify OSI objects globally. The distinguished name of an object is formed from the sequence of its relative distinguished names (RDNs) and the name of its superior object.
In data communications, an undesirable change in a wave form that can occur between two points in a transmission system. The six major forms of distortion are: (a) bias, (b) characteristic, (c) delay, (d) end, (e) fortuitous, and (f) harmonic.
- Pertains to non-mainframe hardware platforms, including personal computers and workstations. See also distributed software.
- Pertaining to programs and computerized sources of information of a computing environment that are physically located on different computer systems, while still working together as a single logical unit. Transaction processing systems are easily moved to a distributed computing environment, because these systems traditionally involve modifying a centralized source of information by submitting modification or information requests from remote terminals.
The software running on a computer that is part of a Tivoli Workload Scheduler domain, on which you can schedule jobs from Tivoli Workload Scheduler for z/OS. Examples of distributed agents are the following: standard agents, extended agents, fault-tolerant agents, and domain managers. See also fault-tolerant workstation.
- In message queuing, a set of application programs that can each be connected to a different queue manager, but that collectively comprise a single application.
- An application made up of distinct components that are located on different computer systems, connected by a network. See also client/server.
The process of moving generated parts from the generation environment to an environment where they are prepared for execution. Preparation includes compiling, link-editing, and binding with a database as necessary.
A method of computing in which large problems are divided into small tasks that are distributed across a network for simultaneous processing. Individual results are then brought together to form the total solution.
Distributed Computing Environment (DCE)
In network computing, a set of services and tools that supports the creation, use, and maintenance of distributed applications across heterogeneous operating systems and networks.
A database that appears to users as a logical whole, locally accessible database, but consists of databases in multiple locations that are connected by a data communications network. See also distributed file management.
distributed data interface (DDI)
An optical fiber-based LAN using the ANSI X3T9.5 standard for a token-passing ring MAC protocol and its physical attachments. Stations, concentrators, and bridges in a DDI network are physically connected to one or both of a pair of counter-rotating rings operating at 100Mbps. The term DDI is used to represent all LAN types based on the fiber distributed data interface (FDDI) specifications, regardless of the media used (optical fiber, copper, or shielded twisted pair).
distributed data management (DDM)
A function of the operating system that allows an application program or user on one system to use database files stored on remote systems. The systems must be connected by a communications network, and the remote systems must also be using DDM.
Distributed Data Management Architecture (DDM Architecture)
A connection protocol that enables communication between a system that uses distributed file management and a system that uses distributed relational database architecture.
distributed data management attribute
An attribute that is used in addition to those required for local z/OS data access. Some examples of associated DDM attributes are file size, hidden file, and lock options.
distributed directory database
The complete listing of all the resources in the network as maintained in the individual directories scattered throughout an APPN network. Each node has a piece of the complete directory, but it is not necessary for any one node to have the entire list. Entries are created, modified, and deleted through system definition, operator action, automatic registration, and ongoing network search procedures.
- A file that physically resides on more than one computer in a network.
- A file that can be accessed by remote applications or remote users.
distributed file management
A function of the operating system that allows an application program or user on one system to use database files stored on remote systems. The systems must be connected by a communications network, and the remote systems must also be using distributed file management. See also distributed database.
An implementation of target (server) support as defined by distributed data management (DDM). DDM permits systems in an extended enterprise that have DDM source (client) capability to access file data on a target MVS system. See also extended enterprise, source, target.
- A base element of z/OS that allows users to access and share data in a distributed environment across a wide range of IBM and non-IBM platforms.
- A component of a Distributed Computing Environment (DCE) that enables a single, integrated file system to be shared among all DCE users and host computers in a DCE cell. DFS prevents DCE users from simultaneously modifying the same information.
- A service that provides data access over IP networks.
distributed function mode
See distributed function terminal.
- A protocol used for communication between a terminal and an IBM control unit that supports multiple, concurrent, logical, terminal sessions.
- A workstation that performs operations previously accomplished by the processing unit, such as managing data links, controlling devices, and formatting data.
distributed host command facility (DHCF)
A function of the operating system that supports the data link between a System/370 terminal using a System i application in an HCF (Host Command Facility) environment.
distributed identity filter
A mapping association between a RACF user ID and one or more distributed user identities which is stored in a general resource profile. A distributed identity filter consists of one or more components of a distributed user's name and the name of the registry where the user is defined.
distributed network directory
See distributed directory database.
distributed presentation management (DPM)
An MFS option that allows programs to communicate with device independence by sharing message formatting functions between MFS and a user-written remote program. The user-written remote program performs device-dependent formatting.
distributed print system
A computer system that interchanges print data across different computing environments, allowing data to be printed on a system other than the one that the print request was generated. For example, in host-to-LAN distributed printing, data that resides on the host is printed on printers attached to a local area network (LAN).
Distributed Protocol Interface (DPI)
An extension to the Simple Network Management Protocol (SNMP) agent that permits users to dynamically add, delete, or replace management variables in the local Management Information Base (MIB) without requiring recompilation of the SNMP agent.
Distributed protocol interface API (DPI API)
In the Simple Network Management Protocol (SNMP), a program interface for a subagent that provides an extension to the function provided by the SNMP agent.
A query that accesses data from a database other than the current database. See also coordinating server.
Distributed Relational Database Architecture (DRDA)
The architecture that defines formats and protocols for providing transparent access to remote data. DRDA defines two types of functions: the application requester function and the application server function.
distributed routing model
A "peer-to-peer" dynamic routing system, in which each of the participating CICS regions can be both a routing region and a target region. The distributed routing model is implemented by the distributed routing program.
distributed software (DSW)
Software that runs on personal computers, workstations, or servers, rather than on mainframes. See also distributed.
Distributed System License Option (DSLO)
An option available to IBM customers with a basic license that permits them to copy certain IBM-licensed materials for the purpose of installing multiple systems.
distributed systems node executive (DSNX)
A function of the operating system that receives and analyzes requests from the NetView Distribution Manager licensed program on a host system. If the request is directed to the system that receives it, the request is processed on that system or on a personal computer directly attached to that system. If the request is intended for a different system, it is routed toward its destination.
- A transaction that updates data in more than one database, user process, or machine. See also two-phase commit, XA.
- A transaction that affects data on multiple nodes. The nodes can be on one system or across multiple systems.
- In a distributed process, all processing between two sync points taken by two or more intercommunicating transactions using a two-phase commit protocol. A DUW is a distributed LUW.
- A unit of work that allows SQL statements to be submitted to multiple relational database management systems, but no more than one system per SQL statement.
Distributed Voice Technologies (DVT)
A component of DirectTalk that provides an interface to allow you to integrate your own voice technology (such as a speech recognizer) with your DirectTalk system.
The designated contact (point of entry) for a sysplex. The distributing host is the normal owner of the IP address that clients in the network use to connect to the sysplex. See also backup host.
- The target for a notification of events that are generated by the system. For example, a distribution can be email addresses, FTP sites, or other customized locations.
- A software package that is ready to install. A distribution often refers to a Linux package that contains the Linux operating system, an installation program, utilities, and documentation.
- A set of reports contained in a bundle and have the same recipient list.
An arrangement of entries that indicates the number of records that are hashed into a hash index. See also distribution file.
A file that stores a distribution array. See also distribution array.
A unique identifier for each distribution. A distribution ID has two components: the distribution name, a 1- to 8- character alphanumeric string and the distribution description, a one to 55-character string.
An ordered set of one or more columns in a table. The values in the distribution key columns are used to determine the database partition to which each table row belongs. See also database partition, table-partitioning key.
- A list of queues to which a message can be put with a single statement.
- A list of system distribution directory entries, which allows users to send messages, notes, and documents to a group of users in one step.
- In voice mail, a list of subscribers to whom the same message can be sent.
A map that specifies an array of database partition numbers that is used to distribute data among the database partitions of a database partition group. The array of database partition numbers distributes the data by using a hashing algorithm.
- The media that a central site creates and distributes to target systems. See also installation media.
- The medium on which the operating system software, a licensed program, or an application program is distributed to the user. The distribution medium can be any of several different media supported by the hardware, such as streaming cartridge tape, 9-track tape, or 3.5-inch diskette.
A load-balancing policy that can be specified for a resource group and that the application uses to place resource groups on a node when a node joins a cluster. See also resource group, resource group policies, startup.
A network-wide attribute that controls the placement of the service IP label aliases on the physical network interface cards on the nodes in the cluster. Configuring a distribution preference customizes the load balancing for service IP labels in the cluster, taking into account the persistent IP labels previously assigned on the nodes. See also anti-collocation, collocation.
A set of ODF programs that perform the task of initiating print processing based on the criteria of the distribution method and the settings of the wait/ignore indicator for bundle components.
distribution recipient index
See distribution recipient queue.
distribution recipient queue
An internal object that contains entries for incoming object distributions; incoming document distributions, such as files, notes, or messages; outgoing document distributions; and error distributions.
In Managed System Services, a staging area for objects that are to be sent or have been received. Objects are loaded into the repository to be sent to managed systems at a later time.
distribution requisite fix
A temporary solution to or a bypass of a problem that is necessary to provide a complete solution to correct a problem. The system allows you to apply the distribution requisite fix either before the PTF that needs it, with the PTF that needs it, or after the PTF that needs it. See also corequisite fix, prerequisite fix.
distribution service level
In SNADS, the combination of priority, capacity, and protection requirements that must be satisfied to receive or send a distribution. SNADS has service levels of fast, status, data high, and data low. Items with a service level of fast, status, or data high are put on the priority queue. Items with a service level of data low are put on the normal queue.
In WebSphere Commerce, an indirect seller of products, in the context of the demand chain business model. A distributor does not sell directly to end users of the product, but only to other sellers, such as resellers.
distributor proxy store
A store that acts as a placeholder for an external distributor store, allowing resellers to conduct business indirectly by way of the proxy store. See also proxy store.
See Darwin Information Typing Architecture.
See Data Interfile Transfer, Testing and Operations utility.
See Digital Intel Xerox protocol.
See dependent job control.
See dependent job control network.
See dump job facility.
See discovery library adapter.
See data link connection identifier.
See data link control layer.
See data link escape character.
See data link escape character.
See Data Language/I.
DL/I address space
An address space that is used by the online IMS control program to contain most of the DL/I code and control blocks. This option can be selected for the online IMS environment to provide an alternative virtual storage configuration.
See distribution library.
DL/I backout table (DBO)
In the restart data set, a summary table that contains an entry for each in-flight task that was scheduled to alter a local DL/I database. Data in this table is available to user-written exit programs.
DL/I interface block (DIB)
A block containing variables automatically defined in an application program using HLPI to receive information passed to the program by DL/I during execution. A block automatically inserted into a program by the DLI command translator. Whenever a program issues an EXEC DLI request, DLI responds by storing information in the DIB.
See DLI separate address space.
DLI separate address space (DLISAS)
A component of DBCTL that resides in the IMS address space. It is a separate address space that contains DL/I code, control blocks, buffers for DL/I databases and program isolation.
A format that allows the user to enter text from another D-list in a row or a column. The format may be used in database-type functions to consolidate data in a similar manner to query-style reports.
See dynamic link library.
A filter that resides in a dynamic link library (DLL) and that can inspect input data and perform various functions, such as convert data formats, add header pages, and specify job attributes. See also filter, UNIX filter.
See document library object.
See dynamic LPAR.
See dead-letter queue.
See Data Link Service access point.
See data link switching.
See direct memory access.
A device on the Micro Channel bus that uses the system-provided DMA facilities instead of having a built-in controller. See also bus master.
See data management block.
See distributed management environment.
See Desktop Management Interface.
See Device-Mapper Multipathing.
- A Northern Telecom switch.
- The custom ISDN protocol implemented on the DMS100 switch, providing 23 B-channels and a D-channel over a T1 trunk.
DMS table space
See database-managed space table space.
See Distributed Management Task Force.
See demilitarized zone.
See distinguished name.
See Digital Network Architecture.
See data network identification code.
See dialed number identification service.
See DNS Blackhole list.
See Domain Name System server.
See derived object.
See document ID.
An annotation tag that is inserted in the Java source as a Javadoc style comment and generates extensible application artifacts that are ready to be deployed. See also annotation tag.
See document store.
- An object saved in an object store or library. Documents have properties and security, and may additionally have content, versions, life cycles, and subscriptions.
- An item that can be stored, retrieved, and exchanged among Content Manager systems and users as a separate unit. It can be any multimedia digital object. A single document can include varied types of content, including for example, text, images, and embedded artifacts. See also work basket, workflow.
- A business document, such as a purchase order or invoice, that can be represented in any supported format. For example, an XML purchase order and an EDI purchase order are both documents, but each uses a different format.
- A machine-readable collection of one or more objects that represent a composition, a work, or a collection of data.
- A logical structure that a CICS transaction can use to manipulate text or other structured information. See also document template.
- An archived file and its accompanying metadata.
- An attachment of any medium such as a text file, a spreadsheet, graphics, videos, or a URL that can be appended to an element in the work breakdown structure (WBS), a resource record, scope element or requirement.
- Any collection of data stored in a document object. A document can contain any type of data. For example, the System i Access shared folders function can store any data that could otherwise be stored in a PC file; a server application can store any data into a document by using CL commands, such as FILDOC and RPLDOC. The system-recognized identifier for the document object type is *DOC. See also document library object.
- A category for documents in an object store or library. Every document belongs to a document class, such as Purchase Orders. The document class determines the properties, storage location, security, life cycle, and versioning of the document. See also desktop form template document class, form data document class, form policy specification document class, form proxy custom object class, form template, form template document class, root class.
- A user-defined character string, 1 through 16 characters long, that characterizes a document. It can be used to search for a filed document. For example, a document that is a memo could have a document class of MEMO; a document that is a report, REPORT.
Document Content Architecture (DCA)
An architecture that guarantees information integrity for a document being interchanged in an office system network. DCA provides the rule for specifying form and meaning of a document. It defines revisable form text (changeable) and final form text (unchangeable).
A description of a document layout that is used to identify the format of a document. Examples include record oriented data document definitions, EDI document definitions, XML schema document definitions, and XML DTD document definitions.
document flow definition
A collection of information specified for each type of document that tells the hub how to process that particular type of document. Each document to be exchanged between the internal partner and a participant must have a document flow definition.
- A value that uniquely identifies a row that contains an XML column. This value is stored with the row and never changes.
- A unique identifier for a document.
Document Interchange Architecture (DIA)
The rules and structure for the exchange of information between office applications. Document Interchange Architecture includes document library services and document distribution services.
document library object (DLO)
Any system object that resides in the document library, such as RFT and FFT documents, folders, and PC files. See also document.
document library services
The services defined by the Document Interchange Architecture (DIA) to work with objects filed in the DIA document library. On the system, it is the support that lets users work with the contents of the document library.
The 1- through 12-character name for documents in folders, assigned by the user when creating the document. See also document object name.
The number assigned to a printed document when a user files that document. The first two digits of the document number are the year, and the last five are in sequence, with the most recent documents having the highest number. For example, the fifth printed document filed in 1989 would have the number 89-00005.
Document Object Model (DOM)
A system in which a structured document, for example an XML file, is viewed as a tree of objects that can be programmatically accessed and updated. See also Simple API for XML.
document object name
The 10-character name of a document assigned by the system when a user files the document. See also document name.
A reference document or template used to create new documents. See also document type.
A specification that indicates which form template and form data entry template are used for the policy, how mapping is configured between form template fields and document class properties, and any special property settings or security features. See also form policy, form policy specification document class, form template, form template document class.
Document Printing Application (DPA)
An OSI standard (ISO/IEC 10175) that addresses those aspects of document processing that enable users in a distributed open systems environment to send electronic documents to shared, possibly geographically-dispersed, printers.
document root directory
The primary directory in which a web server stores accessible documents. When the server receives requests that do not point to a specific directory, it tries to serve the requests from this directory.
document routing process
In Content Manager a sequence of work steps, and the rules governing those steps, through which a document or folder travels while it is being processed. See also work step.
A unit of information that is used to construct a document. A document template can contain fixed text, and symbols that represent text whose value is supplied by an application program. See also document.
- A template for a specific type of requirements document. The document type uses the document outline and specifies the filename extension. See also document outline.
- A classification that helps to organize and classify documents that belong to a specific case. Properties can be assigned to a document type to provide additional information about the documents. An example of a document type is a job application form. See also case property.
- See UMF input document.
- The type of data in a particular Printing Systems Manager (PSM) document. For example, a print file document contains only printable data, and a print resource document contains only data such as fonts or form definitions that are not printable.
- The definition of a non-Document Interchange Architecture (DIA) document user type that identifies the document type number, name, and text associated with the document.
- The rules that specify the structure for a particular class of SGML or XML documents. The DTD defines the structure with elements, attributes, and notations, and it establishes constraints for how each element, attribute, and notation can be used within the particular class of documents.
document type set
A value that allows a logical grouping of document type definitions. Document type sets include the name and the description. A set can contain one or more document types or it can be empty.
See device output format.
A social bookmarking service that allows users to centrally store, categorize, and share a set of personal bookmarks. Users can assign multiple tags to organize their bookmarks. See also folksonomy, social bookmarking, tag.
- A set of commands in a control language program defined by a DO command and an ENDDO command that is conditionally processed as a group.
- In RPG, a group of calculations done one or more times based on the results of comparing factor 1 and factor 2 of certain calculation operations (for example, DOUxx). A DO operation and an END operation are the delimiters for a do group.
See Domain of Interpretation.
- An object, icon, or container that contains other objects representing the resources of a domain. The domain object can be used to manage those resources.
- A part of a network that is administered as a unit with a common protocol.
- A logical grouping of resources in a network for the purpose of common management and administration. See also federation domain.
- A set of systems that allocate shared network resources within a single logical system.
- A partition of the management space of a device.
- A named group of workstations in a distributed Tivoli Workload Scheduler network, consisting of one or more agents and a domain manager acting as the management hub. All domains have a parent domain except for the master domain. See also domain manager, full status, master domain manager.
- In communications, the network resources under control of a particular system services control point (SSCP).
- A functionally isolated area of the CICS system that owns resources to which it has sole access and that communicates with other parts of CICS through strictly defined interfaces called gates.
- A characteristic of an object that controls which programs can access the object. See also system domain object, user domain object.
- A grouping of client nodes with one or more policy sets, which manage data or storage resources for the client nodes. See also client domain, policy domain.
- A list of defined values from which users choose an appropriate value.
- The set of data in a column.
- In the Internet, a part of a naming hierarchy in which the domain name consists of a sequence of names (labels) separated by periods (dots).
- An area of knowledge or activity characterized by a family of related values.
- A subnetwork of clients and servers under the control of one security database.
- In a database, the set of valid values for an attribute.
- In TCP/IP, a named set of hosts. Each domain has authority for the machines within that domain, but not for machines in other domains.
For a Windows NT Server or Windows 2000 Server domain, the server that authenticates domain logons and maintains the security policy and the security accounts master database for a domain. Domain controllers manage user access to a network, which includes logging on, authentication, and access to the directory and shared resources.
In OSI X.400, an attribute of the X.400 originator/recipient name that permits a System i product to keep existing addressing conventions. The System i product uses the domain-defined attributes to carry the user ID and address (the two-part network name used in SNADS).
A role in the pre-defined workflow process shipped with WebSphere Portal content publishing. Users assigned to the role of Domain Expert are responsible for providing editorial approval of content before publishing to the web.
See services tier.
An installed component in a distributed Tivoli Workload Scheduler network that is the management hub in a domain. All communication to and from the agents in the domain is routed through the domain manager. See also backup domain manager, domain, workstation.
A model that captures the most important types of objects in the context of the domain. The domain objects represent the entities that exist or events that transpire in the environment in which the system works. The domain model is a subset of the business analysis model.
In Internet communications, a name of a host system. A domain name consists of a sequence of subnames that are separated by a delimiter character, for example, www.ibm.com. See also Domain Name System.
- An Internet service that translates domain names into IP addresses.
- A server program that supplies name-to-address conversion by mapping domain names to IP addresses.
Domain of Interpretation (DOI)
A group of related protocols that uses the Internet Security Association and Key Management Protocol (ISAKMP) to negotiate Security Associations (SAs). A DOI defines payload formats, exchange types, and conventions for naming security-relevant information such as security policies and cryptographic algorithms and modes.
In a multiple-domain network, the person or program that controls operation of resources controlled by one system services control point (SSCP). See also network operator.
A group of usually consecutive subject-specific terms that can be mechanically recognized and annotated by the text analyzer without the context of the sentence structure. Domain terms can be built into two types of dictionaries, one being a standard format lexical dictionary, another being multiword format dictionary.
Pertaining to a security label relationship in which the security level and set of security categories of one label is equal to or greater than the security level of the second. See also disjoint, equivalent.
A function of the HTTP Server for i5/OS licensed program that enables Lotus Notes users to access the Internet and to use all of the HTTP Server functions. Specifically, a Domino connector enables Lotus Notes users to combine Notes with e-business applications.
A database that provides a domain-wide directory of Domino servers, users, certifiers, foreign domains, and groups. It also contains documents that manage server-to-server communication and server programs.
Domino for i5/OS
See Lotus Domino for i5/OS.
Domino Internet Inter-ORB Protocol (DIIOP)
A server task that runs on the server and works with the Domino Object Request Broker to allow communication between Java applets created with the Notes Java classes and the Domino server. Browser users and Domino servers use IIOP to communicate and to exchange object data.
See data-owning region.
A connection that is suspended and that is not used by SQL statements. See also SQL connection.
In DB2 for i5/OS, the state of a connection when the connection is suspended. While in the dormant state, no SQL statements use the connection except for commits and rollbacks. See also current state.
See denial-of-service attack.
See disk operating system.
A symbol (.) that indicates the current directory in a relative path name. See also period.
- In word processing, a pattern of dots used to form characters.
- In computer graphics, a two-dimensional pattern of dots that are used for designing an image on the display.
dotted decimal notation
The syntactical representation for a 32-bit integer that consists of four 8-bit numbers written in base 10 and separated by dots. IP addresses are represented in dotted decimal notation. See also octet.
The rendering technique of first drawing to an offscreen image (back buffer), and when the image is complete, copying the offscreen image to the screen (front buffer). In applets, drawing is almost always done with double buffering to reduce flickering. See also triple buffering.
double buffer mode
In GL, a mode in which two buffers are alternately displayed and updated. A new image can be drawn into the back buffer while the front buffer (containing the previous image) is displayed.
double-byte character large object (DBCLOB)
A data type whose value is a sequence of double-byte characters that can range in size from 0 bytes to 2 gigabytes less 2 bytes. In general, the DBCLOB data type is used whenever a graphic string might exceed the limits of the VARGRAPHIC data type. See also large object.
double-byte character set (DBCS)
A set of characters in which each character is represented by 2 bytes. These character sets are commonly used by national languages, such as Japanese and Chinese, that have more symbols than can be represented by a single byte. See also multibyte character set, single-byte character set.
double-byte coded font (double-byte font)
A font in which the characters are defined by 2 bytes. The first byte defines the coded font section; the second byte defines the code point in the code page specified for that section.
See double-byte coded font.
The specification that causes a floating-point value to be stored (internally) in the long format (two computer words). See also single precision.
double-precision floating-point number
A 64-bit approximate representation of a real number. See also floating-point number.
A storage location whose address is evenly divisible by 8. See also word boundary.
A loop that repeats the same sequence of activities as long as some condition is satisfied. Unlike a while loop, a do-while loop tests its condition at the end of the loop. This means that its sequence of activities always runs at least once.
Pertaining to devices that are below a controller, and controllers that are below a communications line in a communications configuration. See also upline.
- Pertaining to the direction of the flow, which is from the first node in the process (upstream) toward the last node in the process (downstream).
- Pertaining to the direction of data flow, which is toward the destination of a transmission. See also upstream.
Downstream Load Utility (DSLU)
A licensed program that uses the communication network management (CNM) interface to support the load requirements of certain type 2 physical units, such as the IBM 3644 Automatic Data Unit and the IBM 8775 Display Terminal.
See mean time to recovery.
See Document Printing Application.
See device page.
See destination point code.
See Distributed Print Function.
See Distributed Protocol Interface.
See Distributed protocol interface API.
See distributed program link.
See distributed presentation management.
See Display PostScript.
See data-partitioned secondary index.
See Direct Printer Services Subsystem.
See data quality management.
A rule that defines how data is processed by the data quality management (DQM) processes and DQM functions. DQM rules apply to specific UMF segments. When you define a DQM rule, you define the DQM function, the specific parameters, and the order in which the rule is processed. See also data quality management, UMF segment.
See database resource adapter.
- The act of acquiring a locked resource by quiescing access to that object. See also claim, logical drain.
- To honor pending allocation requests before deactivating sessions with a partner logical unit. This applies to LU 6.2 only.
- An operator action to halt the flow of jobs to a printer, usually to stop the printer or to change print options.
See dynamic random access memory.
In Enhanced X-Windows, a property of windows and pixmaps when used as destinations in graphics operations. An InputOnly window cannot be used as a source or destination drawable in a graphics operation.
See dynamic resource definition.
See dynamic reconfiguration data set.
In a multidimensional representation of data, to access information by starting with a general category and moving downwards through the hierarchy of information, for example from Years to Quarters to Months.
- A path used to view details linked to the data in a report, cube, or macro.
- To view the details linked to the data in a report, cube, or macro. For example, the user can drill through a value to view the detailed sales transactions for a particular customer. Any filtering of information in the original object is automatically applied.
- A method of examination used to reveal detail or context information about a cell's contents.
- A data storage device. A drive can be either a magnetic disk drive or a solid-state drive (SSD).
- The mechanism used to seek, read, and write information on a storage medium.
- The end of a stream that is closest to an external interface. The principal functions of the driver are to handle any associated device, and transform data and information between the external device and stream.
- A circuit that increases the signal current for sending data over long cables or to many other circuits.
- A circuit that sends small electronic signals to a device.
- The queue pairs at the end of the stream closest to an external interface. The principal functions of the driver are handling any associated device and transforming data and information between the external interface and the stream.
See disaster recovery manager.
- A partition configured at the time of program execution according to the storage requirements of the application program or program to which the partition is allocated.?
- In CDE, to release the mouse button after dragging an object. If the object is dropped in an appropriate area, an action is initiated.
- The delayed connection of a program to a routine until load time or run time.
See directory service.
- See digital signature algorithm.
- See directory system agent.
- See dynamic storage area.
- See data source adapter.
See destination service access point.
See default system control area.
See data set control block.
See Dedicated Server for Domino.
See dummy control section.
See distributed shell.
See digital subscriber line.
See Distributed System License Option.
See Downstream Load Utility.
See data security monitor.
See default subsystem name.
See data set name block.
See data set name block.
See distributed systems node executive.
See dynamic shared object.
See data set organization.
See display station pass-through.
See downstream physical unit.
See destination queue.
See data set ready.
See direct search list.
See distributed sync point resource manager.
See data set sequence number.
The status of the system before an initial program load (IPL) of the operating system is performed. Only dedicated service tools functions are allowed when the system is in the DST-restricted state.
See data service unit/channel service unit.
See distributed software.
See disk-based table.
See dynamic transaction backout.
See document type definition.
See data terminal equipment.
See dual-tone multifrequency.
See Digital Trunk Quad Adapter.
See Distributed Time Service.
See detected access transmission error in.
See detected access transmission error out.
See directory user agent.
A setting requiring that an action carried out by one person be confirmed by a second person. This prevents a single person from being able to carry out actions requiring a high level of security, for example the distribution of funds or the granting of access rights. See also single authorization.
A high availability function that maintains two functionally identical copies of designated direct access storage device (DASD) volumes and automatically updates both copies every time a write operation is issued to the dual-copy logical volume (LVOL).
See multihomed host.
dual inline memory module (DIMM)
A small circuit board with memory-integrated circuits containing signal and power pins on both sides of the board. See also single inline memory module.
- A call transfer method in which the primary and secondary lines remain bridged until a call is completed.
- See trombone.
- A method of recording WebSphere MQ for z/OS activity, where each change is recorded on two data sets, so that if a restart is necessary and one data set is unreadable, the other can be used. See also single logging.
- An optional facility that produces a duplicate copy of log data.
A checkpointing mode that provides the alternate use of two primary checkpoint data sets (CKPT1 and CKPT2). The datasets are referred to as the to-be-read-from and to-be-written-to data sets.
See dual logging.
A TCP/IP environment that supports both IPv4 and IPv6 addressing. See also single-mode environment.
To make an MVS address space known to z/OS UNIX. See also undub.
In Fortran, a variable within a subprogram or statement function definition with which actual arguments from the calling program or function reference are positionally associated. See also actual argument.
dummy storage group
A type of storage group that contains the serial numbers of volumes no longer connected to a system. Dummy storage groups allow existing job control language (JCL) code to function without having to be changed.
- Data that is copied in a readable format from main or auxiliary storage to an external medium such as tape, diskette, or printer.
- To record or copy, at a particular instant, data from one storage device onto another storage device to protect the data and debug the program.
- A capture of storage information at the time of an error.
- To copy the contents of all or part of visual storage for the purpose of collecting error information.
- A representation of the contents of selected areas of main storage used to find out whether a program is functioning as intended and to analyze problems. Dumps may be recorded by CICS either as a consequence of failure detected during CICS execution, or upon explicit request. See also partition dump.
In CICS Transaction Server, a predefined name by which a dump is known. There are two types of dump code, transaction dump codes and system dump codes. See also system dump code, system dump table, transaction dump code, transaction dump table.
dump data set
A sequential data set (optional) used to record dumps of transactions (tasks) within the system. It can be formatted and printed by the CICS dump utility program (DFHDUP). If required, the user can define two dump data sets (DFHDMPA and DFHDMPB), switching between them during online execution of CICS.
- A file containing data copied from main or auxiliary storage.
- The contents of memory without any report formatting.
dump table entry
A record in the master dump table that identifies the location of a component dump table. All kernel components that need to have special data collected by the dump program need to generate a dump table entry.
dump utility program (DFHDUP)
An offline utility program that formats and prints the output from formatted dump, and prints transaction dumps. It operates in batch mode and, for formatted dumps, identifies each storage area, program, and table entry, and prints them separately, with actual and relative addresses.
dump VTOC copy data set
A copy of the volume table of contents (VTOC) of a volume dumped by DFSMShsm. The dump VTOC copy data set contains only part of the data-set VTOC entry for each data set from the original data set. This data set is written on a migration-level-1 volume.
See Data Universal Numbering System.
See distributed unit of work.
- In ESS Copy Services, the state of a volume pair after Peer-to-Peer Remote Copy (PPRC) has completed the copy operation and the volume pair is synchronized.
- Pertaining to printing on both sides of a sheet of paper.
- Pertaining to communication in which data can be sent and received at the same time. See also half-duplex.
- Pertaining to the process of writing two sets of identical records in order to create a second copy of data.
A volume comprised of two physical devices within the same or different storage subsystems that are defined as a pair by a dual copy, Peer-to-Peer Remote Copy (PPRC) or extended remote copy (XRC) operation. A duplex pair is in neither suspended nor pending state. The operation records the same data onto each volume.
A record with categories having identical non-measure values. See also consolidation.
- A subscription that is retained when a subscribing application's connection to the queue manager is closed. When the subscribing application disconnects, the durable subscription remains in place and publications continue to be delivered. When the application reconnects, it can use the same subscription by specifying the unique subscription name. See also nondurable subscription.
- A Java Message Service (JMS) subscription that persists and stores subscribed messages even when the client is not connected.
- In Backup, Recovery, and Media Services, the length of time that the designated media is to reside at a location before moving to the next location or returning to the home location. A duration is specified in the move policy.
- In SQL, a number that represents an interval of time.
- The elapsed time that a job is expected to take to complete (estimated duration) and actually takes (actual duration). See also CPU time.
- A period of time during which a project element continues. It is calculated as the finish time minus the start time.
See distributed unit of work.
See digital versatile disc.
See Digital Video Interactive.
See dynamic VIPA.
See Decision Validation Services.
See Distributed Voice Technologies.
A DirectTalk programming interface used by a DVT bridge that enables integration of voice applications with Distributed Voice Technologies to provide functions such as speech recognition.
See diacritical weight.
See dense wavelength division multiplexing.
See deferred work element.
See Data Window Services.
See DOORS extension language.
A library of DXL programs that can be used to manipulate and manage Rational DOORS data. The library includes example programs and templates. User-defined DXL programs can also be stored in the DXL library.
- In programming languages, pertaining to properties that can only be established during the execution of a program; for example, the length of a variable-length data object is dynamic.
- Pertaining to an operation that occurs at the time it is needed rather than at a predetermined or fixed time. See also static.
- Pertaining to events that occur at run time or during processing.
- In COBOL, an access method in which specific logical records can be obtained from or placed into a mass storage file in a nonsequential manner and obtained from a file in a sequential manner during the scope of the same OPEN statement.
- A process where records can be accessed sequentially or randomly, depending on the form of the input/output request. See also access mode.
Assignment of system resources to a program when the program is executed rather than when it is loaded into main storage. See also step allocation.
The process of extracting targeted types of information based on the results of process simulations. This differs from static analysis, which extracts information from model elements in their static form.
dynamic application program
See replicated application program.
dynamic attribute model
A model that is used to define the attributes that are carried by an object at run time. See also static class.
dynamic automatic reconfiguration (DARE)
Changes in the cluster configuration that can be made dynamically without stopping the cluster services. The changes take effect upon the next cluster synchronization. See also cluster configuration, reconfiguration.
A process that automatically cancels all activities performed by an application program that terminates abnormally. See also backout.
Used to store backout information in the dynamic log for dynamic transaction backout (DTB) purposes. The dynamic buffer is not acquired until a recoverable resource has been modified. If dynamic backout is not defined for a transaction, the dynamic buffer is not used.
A consolidation of several caching activities, including servlets, web services, and commands into one service where these activities share configuration parameters and work together to improve performance.
dynamic cache management (DCM)
A function that automatically determines which data sets will be cached based on the system load, the characteristics of the data set, and the performance requirements defined by the storage administrator. See also DASD fast write.
A type of call that locates a specified routine during run time. The routine is loaded into virtual storage. See also static call.
See dynamic class descriptor table.
dynamic class descriptor table (dynamic CDT)
A portion of the class descriptor table that can be created with RACF commands. See also static class descriptor table.
dynamic cluster isolation
The ability to specify whether the dynamic cluster runs on the same nodes as other instances of dynamic clusters, or if the dynamic cluster is the only dynamic cluster that runs on a single node.
- A connection created at the time of sign-on or using the network connection control (NCC) record sent from another node.
- A virtual private network (VPN) connection that automatically refreshes the keys that keep data secure. A dynamic connection also contains proposals that allow the key server to negotiate which parameters to use with the remote key server. See also manual connection.
The information that is available at the time that an XQuery expression is evaluated. The dynamic context consists of all of the components of the static context, plus additional components such as the context item, context position, and context size. See also expression context, static context.
dynamic data exchange (DDE)
The exchange of data between programs or between a program and a data-file object. Any change the user makes to information in one program or session is applied to the identical data created by the other program. For example, with the DDE feature enabled, the user can select the copy of a spreadsheet that is embedded in a report. If the user makes changes to the copy of the spreadsheet in the report, the changes are made to the original spreadsheet file.
Dynamic Data Format (DDF)
A format used to package LOB or XML values sent by a database server, capable of holding the actual value, a reference to the value following later in the stream of data, or a token representing the value for later retrieval. See also progressive streaming.
dynamic device reconfiguration (DDR)
A facility that allows a demountable volume to be moved, and repositioned if necessary, without abnormally terminating the job or repeating the initial program load procedure.
See MFS dynamic directory.
See Dynamic Domain Name System.
- A dimension in which the set of members is constructed from data sources as rows are processed.
- A domain in which the set of possible values for a type is defined. With a dynamic domain, the set of values is stored and managed outside the business object model (BOM), and changes to the set of values are automatically reflected in the business object model. When rule authors write business rules using the type, they choose from a list of values that is created dynamically and is always up-to-date.
Dynamic Domain Name System (DDNS, Dynamic DNS)
A system that automatically updates DNS information when a new IP address is assigned to a network. It allows a domain name to stay linked to changing IP address, so users do not have to know the changed IP address in order to connect with another computer.
Dynamic Host Configuration Protocol (DHCP)
A communications protocol that is used to centrally manage configuration information. For example, DHCP automatically assigns IP addresses to computers in a network.
An IT infrastructure that transforms physical and digital assets into valued services. It addresses three imperatives: improve service, reduce costs, and manage risk. It focuses on seven initiatives: service management, asset management, virtualization, energy efficiency, business resiliency, security, and information infrastructure. IBM¡¯s strategy for a dynamic infrastructure is aligned to the Smarter Planet agenda.
A method of Internet Protocol (IP) address management in which Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts and updates the host IP records in the Domain Name System (DNS). This method keeps DNS records current as IP address assignments change.
dynamic IP address
A temporary IP address for a transient device or logical unit on a network: for example, a personal computer. See also IP address.
- A group of products that are ordered as a unit and must be fulfilled together. The information about the products contained in a dynamic kit is controlled by an external configurator and supplied at order entry time. See also bundle, composite catalog entry, configurator.
- With Sterling Configurator dynamic kit integration, a group of SKUs that are ordered as a unit. The information about the SKUs contained in a dynamic kit is controlled by a model. The component selection is supplied by the shopper supplied at order entry time.
An element of a data model that represents a dynamic relationship between data items in data types. See also link.
- The process of linking a program in which library procedures are not incorporated into the load module but are dynamically loaded from their library each time the program is loaded.
- The delayed connection of a program to a routine until load time or run time.
- Linking on demand at run time. See also static linking.
dynamic link library (DLL)
A file containing executable code and data bound to a program at load time or run time, rather than during linking. The code and data in a DLL can be shared by several applications simultaneously. See also library, shared-object file.
dynamic link pack area (dynamic LPA)
A facility for adding additional modules to the to the link pack area (LPA) after the LPA has been created. See also link pack area.
An area in main storage used (by the journal control program) for storing copies of all changes to recoverable resources that might be required for dynamic backout of an LUW. Every execution of a transaction that has dynamic transaction backout specified has an associated dynamic log area.
See dynamic link pack area.
dynamic LPAR (DLPAR)
The ability to move processors, memory, and interactive performance between logical partitions without restarting a logical partition or the server. See also application provisioning, Capacity Upgrade on Demand, free pool, logical partition, managed system.
In System Manager, the attribute of an application option that specifies whether the option can be stored in libraries and folders named at the time the installation is performed. This attribute allows an application program to be stored even if a library or folder with the same name as one of the application program's primary libraries or folders is already on the customer's system, but is used by an application program with a different registration identifier.
A VTAM node created dynamically. See also dynamic terminal.
dynamic node priority policy
A user-defined method for the cluster manager to select takeover nodes that receive a resource group. Dynamic node priority policies are based on the value of an RSCT Resource Monitoring and Control resource attribute, such as most available disk space. See also resource group policies.
dynamic organizational role
An organizational role that is assigned to a person by using an LDAP filter. When a user is added to the system and the LDAP filter parameters are met, the user is automatically added to the dynamic organizational role.
A partition configured at the time of program execution according to the storage requirements of the application program or program to which the partition is allocated. See also static partition.
A method of reading from or writing to a file in a nonsequential order (see random processing) and reading from a file in a sequential order (see sequential processing) with the same OPEN statement.
dynamic program call
A transfer of control from one program or procedure to another program (*PGM) at run time. A dynamic program call is the only way that an original program model (OPM) program can connect to another OPM program. See also static program call.
A type of ranking in which the terms in the query are analyzed with respect to the documents that are being searched to determine the rank of results. See also ranking, static ranking, text-based scoring.
dynamic reconfiguration (DR)
The process of changing the network configuration (peripheral PUs and LUs) without regenerating complete configuration tables or deactivating the affected major node. See also dynamic reconfiguration data set.
dynamic reconfiguration data set (DRDS)
In VTAM, a data set used for storing definition data that can be applied to a generated communication controller configuration at the operator's request, or can be used to accomplish dynamic reconfiguration of NCP, local SNA, and packet major nodes. A dynamic reconfiguration data set can be used to dynamically add PUs and LUs, delete PUs and LUs, and move PUs. It is activated with the VARY DRDS operator command. See also dynamic reconfiguration.
The ability to change an existing component without restarting the server for the changes to become effective. See also hot deployment.
dynamic resource definition (DRD)
An IMS function that enables users to create, update, query, and delete the following IMS resources and their descriptors dynamically, without using the batch system definition or online change processes: application programs; databases; Fast Path routing codes; transactions.
dynamic routine-name specification
The execution of a user-defined routine whose name is determined at run time through an SPL variable in the EXECUTE PROCEDURE, EXECUTE ROUTINE, or EXECUTE FUNCTION statement.
- A method of setting paths between hosts, networks, or both by using daemons that update the routing table as needed.
- The automatic routing of a service request, a message, or an event that is based on conditions at the time of the routing.
dynamic routing model
The "traditional", hierarchical CICS dynamic routing system, in which a single terminal-owning region (the routing region) routes transactions between several application-owning regions (the target regions). The dynamic routing model is implemented by the dynamic routing program.
dynamic routing program
A user-replaceable CICS program that selects dynamically both the system to which a routing request is to be sent and the transaction's remote name. The alternative to using this program is to make these selections when a remote transaction is defined to CICS (static routing).
Selection and omission of logical file records performed during processing, instead of when the access path (if any) is maintained. Dynamic select/omit may also be used when no keyed access path exists.
Copy serialization in which a file or folder is backed up or archived on the first attempt regardless of whether it changes during a backup or archive. See also shared dynamic serialization, shared static serialization, static serialization.
dynamic shared object (DSO)
A mechanism that provides a way to build a piece of program code in a special format for loading into the address space of an executable program at run time. The DSO gets knowledge of the executable program symbol set as if it had been statically linked with it in the first place.
An SQL statement that is prepared and executed at run time. In dynamic SQL, the SQL statement is contained as a character string in a host variable and is not precompiled. See also deferred embedded SQL, incremental bind statement, static SQL.
A type of summarization in which the search terms are highlighted and the search results contain phrases that best represent the concepts of the document that the user is searching for. See also static summarization, summarization.
dynamic support program (DSP)
Multiprogrammed system components that are scheduled by the job segment scheduler (JSS) and implement a specified function. A DSP can be related to job execution, such as main service or output service, or it can be a background utility, such as the dump job facility.
An installation-defined table that is used to extend, modify, or delete the default processing specifications. See also table pair.
A terminal created through the Extended Terminal Option (ETO). This is a terminal that has not been defined within the IMS system definition, and for which no control blocks exist at IMS initialization time. See also dynamic node, static terminal.
dynamic threshold alteration
The process that enables a network operator to dynamically change the traffic count and temporary error threshold values associated with SDLC and BSC devices in communication controllers and network controllers.
dynamic threshold query
The process that enables a network operator to query the current settings of a traffic count or temporary error threshold value associated with an SDLC or BSC device in a communication controller or network controller.
dynamic transaction routing program (DFHDYP)
A user-replaceable CICS program that selects dynamically both the system to which a transaction routing request is to be sent and the transaction's remote name. The alternative to using this program is to make these selections when a remote transaction is defined to CICS (static transaction routing).
dynamic web project
A project that contains resources for a web application with dynamic content such as servlets or JavaServer Pages (JSP) files. The structure of a dynamic web project reflects the Java EE standard for web content, classes, class paths, the deployment descriptor, and so on.
dynamic workload manager
A feature of the on demand router that routes workload based on a weight system, which establishes a prioritized routing system. The dynamic workload manager dynamically modifies the weights to stay current with the business goals.
An output service function that controls printing or punching of data sets with characteristics that are not assigned to a specific device but are assigned to appropriate devices as they become available.