This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See generic port.
- In the AIXwindows Toolkit, a windowless graphical object that looks like its equivalent like-named widget but does not support the translations, actions, or pop-up widget children supplied by that widget.
- A proprietary widget that works under specific conditions or that is designed to a certain standard, such as a dashboard widget based on the OpenSocial standard. See also widget.
- The relative difference between the integer solution found and the proven best possible objective solution value.
- Active-site log data that is not available to the tracking IMS. The log data might be missing either because it was not sent or because an I/O error occurred at the tracking site.
- In SQL replication, a range of log or journal records that the Capture program cannot read. The changed data in a gap can be lost.
- In source control management, a state in which a target workspace or stream is missing preceding change sets for a change set that is being accepted or delivered. When a gap occurs, the change set cannot be accepted or delivered; it must be applied as a patch, which creates a new resulting change set.
- Part of a language's runtime system or an add-on library that automatically determines the memory that a program no longer uses, and recycles it for other use. Garbage collection may be assisted by the compiler, the hardware, the operating system, or any combination of the three.
- A routine that searches memory to reclaim space from program segments or inactive data.
- A component of a Voice over Internet Protocol that provides services such as admission to the network and address translation.
- An entity with a high measure of betweenness that may control the flow of information among other entities on an association chart. See also betweenness.
- A middleware component that bridges Internet and intranet environments during web service invocations.
- An integration pattern that provides format-independent boundary functions that apply to all incoming messages.
- An extension of a web server program that transfers information from the web server to another server. Gateways are often CGI programs, but may follow other standards such as ISAPI and Apache modules.
- A device or program used to connect networks or systems with different network architectures.
- A software component that controls the transmission of messages between two parties. The gateway is responsible for using the correct protocols to transfer messages between the sender and receiver.
- An element that is used to control the divergence and convergence of sequence flow paths in a process and in a choreography.
- An element that controls the divergence and convergence of sequence lines and determines the branching, forking, merging, and joining of paths that a process can take during execution.
- An entity that operates above the link layer and converts, when required, the interface and protocol used by one network into those used by another distinct network.
- The runtime capability that hosts deployed APIs and their endpoints for access by applications.
- A component of a Voice over Internet Protocol that provides a bridge between VoIP and circuit-switched environments.
- Software that provides services between the endpoints and the rest of the Tivoli environment.
- See destination.
A host node that has a defined NETID and SSCPNAME but does not perform gateway control functions, such as cross-network session initiation and termination. See also gateway host.
The interface for Java Client applications to connect to the Gateway daemon. The Gateway classes, which are supplied with the CICS Transaction Gateway, must be in the classpath for Java Client applications to run.
gateway control function
A function that is performed by a gateway system services control point (SSCP) in conjunction with the gateway NCP. Such functions include assigning alias network address pairs for LU-LU sessions, assigning virtual routes for the LU-LU sessions in adjacent networks, and translating network names within BIND RUs.
Used only in remote mode, the Gateway daemon listens on protocols defined in CTG.INI for gateway requests from remote Java client applications. It issues these requests to the Client daemon on distributed platforms, and directly to CICS over the external CICS interface (EXCI) on z/OS. The Gateway daemon runs the protocol listener threads, the worker threads and the connection manager threads.
A type of service destination that receives messages for gateway services. Gateway destinations are divided into those that are used for request processing and those that are used for reply processing.
- In the AIX operating system, a host that connects independent networks. It has multiple interfaces, each with a different name and address.
- A host node that contains a gateway system services control point (SSCP). See also gateway-capable host.
A method that runs on behalf of an endpoint on the gateway to which the endpoint is assigned. The results of the method are forwarded to the managed resource that requested that the method be run.
See gateway NCP.
See designated gateway VTAM.
An SSCP that is capable of cross-network session initiation, termination, takedown, and session outage notification. A gateway VTAM is in session with the gateway NCP; it provides network name translation and assists the gateway NCP in setting up alias network addresses for cross-network sessions.
For input/output operations, to read data from noncontiguous memory locations to write to a device. See also scatter.
An indicator for the current value for an item. See also counter.
An iterative relaxation method for solving Laplace's equation. This method calculates the general solution by finding particular solutions to a set of discrete points distributed throughout the area in question. The values of the individual points are obtained by averaging the values of nearby points. See also chaotic relaxation.
See gigabit interface converter.
See group buffer pool.
The status of a page set or page set partition that is dependent on the group buffer pool. Either read/write interest is active among DB2 subsystems for this page set, or the page set has changed pages in the group buffer pool that are not yet cast out to disk.
See gigabits per second.
See global billing system.
See graphics context.
See GNU Compiler Collection.
See graphic character conversion selection table.
See global configuration database.
See Grande CICS dynamic storage area.
See graphic character global identifier.
See Global Commerce Initiative.
See graphics context.
See graphic character set global identifier.
See global directory agent.
See GNU Debugger.
See Graphical Data Display Manager.
See GDDM interface for X Window System.
See graphics data format file.
See generation data group.
See generic data link control.
- See Global Data Synchronization.
- See generalized data stream.
- See graphic data server.
- See generation data set.
- See general data stream.
- See Global Directory Service.
See Grande dynamic storage area.
See Global Data Synchronization Network.
GDS reclaim processing
An automatic process that the storage management subsystem (SMS) performs when a generation data set (GDS) exists in deferred roll-in state and a job attempts to create a (+1) generation. When the job begins, SMS reclaims the GDS and uses its data set name for the new (+1) generation. GDS reclaim processing can be disabled. See also generation number.
general data stream (GDS)
A structured field that precedes all mapped conversation user data in the communications data stream. It consists of a length (LL), which is defined as the first 2 bytes of the structured field, and a general data stream identifier (GDS ID), which is defined as the next 2 bytes following the length field that identifies the GDS-defined format of the data.
In DCF, a type of document whose description can apply to a variety of documents, from memoranda to technical manuals. It can be used as a catch-all category for documents that do not conform to any other type description.
generalized interactive executive (GIX)
A function of the NetView Distribution Manager licensed program that provides the host system user with interactive use of the NetView Distribution Manager program.
generalized path information unit trace (GPT)
A record of the flow of path information units (PIUs) exchanged between the network control program and its attached resources. PIU trace records consist of up to 44 bytes of transmission header (TH), request/response header (RH), and request/response unit (RU) data.
generalized sequential access method (GSAM)
A database access method that allows batch application programs to access a sequential data set record that is defined as a database record. This database record is handled as one unit, with no segments, fields, or hierarchical structure. Any records to be added are inserted at the end of the database. GSAM does not allow database records to be updated or deleted.
generalized sequential access method program communication block (GSAM PCB)
The PCB that describes an application program's interface to a GSAM data set. One GSAM PCB is required for each GSAM data set view used by the application program.
general job step
A method for running native operating system commands and executable programs on a host or a remote process server. General jobs have access to files stored within the repository and on the file system and can be used to control the input/output of analytical processing.
A general purpose log stream used by CICS for any of the following: forward recovery logs, autojournals, or user journals. See also system log.
General Packet Radio Service (GPRS)
A packet data communications system that allows information to be sent and received across a mobile telephone network. GPRS permits faster Internet access and improved mobile technology through continuous connectivity.
General Parallel File System (GPFS)
A high-performance shared-disk file system that can provide data access from nodes in a clustered system environment. See also information lifecycle management.
In a DFSMShsm environment with JES3, the collection of all DFSMShsm primary volumes added to that processor that have a mount status of permanently resident or reserved, that have the automatic recall attribute specified, and that have a mount attribute of storage or private.
general purpose audience
Users whose primary domain of knowledge relates to tasks outside of information technology. See also specialized IT audience.
general purpose library (QGPL)
A library that contains IBM-provided objects that are required for many system functions, and user-created objects that are not explicitly placed in a different library when they are created.
In RACF, any system resource, other than an MVS data set, that is defined in the class descriptor table (CDT). In MVS, general resources include DASD volumes, tape volumes, load modules, terminals, IMS and CICS transactions and other CICS resources, and installation-defined resource classes.
general resource profile
In RACF, a profile that provides protection for one or more general resources. The information in the profile can include the general resource profile name, profile owner, universal access authority, access list, and other data. See also profile.
General System service
A service that is used to coordinate other services or to manipulate variable data. See also service.
general topology manager (GTM)
In Tivoli NetView, the component that accepts information about resources that are accessed through protocols other than the Internet Protocol, stores this information in a database, and displays it to the user.
General Use Programming Interface (GUPI)
An interface, with few restrictions, for use in customer-written programs. The majority of programming interfaces are general-use programming interfaces, and are appropriate in a wide variety of application programs.
A user who has limited RACF privileges, such as logging on, accessing resources, and creating data sets. General users typically use and create RACF-protected resources, but have no authority to administer resources other than their own.
A workstation where activities other than printing and processing are carried out. A general workstation reporting to Tivoli Workload Scheduler for z/OS is usually manual, but it can also be automatic. Manual activities can include data entry and job setup.
- To produce a computer program by selection of subsets from skeletal code under the control of parameters.
- In DB2 for i5/OS, to produce, through the actions performed by a precompiler. For example, the precompiler generates host language statements and declarations that are embedded into the input source, and this modified source is then used as input to a compiler.
A column for which the database manager assigns the value. An example of a generated column is an identity column, row change timestamp column, or row-begin column. See also generated expression column, row-begin column, row-end column, transaction-start-ID column.
A course that is created in a program other than LearningSpace - Virtual Classroom (for example, the Learning Management System), but is available in LearningSpace - Virtual Classroom.
generated expression column
A generated column that is defined using an expression. See also generated column.
- A means of referencing items in terms of time and ancestry so that an item without antecedents is designated as the first (n-th) generation and subsequent derivations are designated as n-1, n-2, and so on.
- In a database outline, the consolidation levels within each dimension. A series of generations begins at the root of an outline, then contains the branches, and ends at the leaf level. For example, in the time dimension, Year is generation 1, Quarter is generation 2 and Month is generation 3.
- For some remote systems, the translation of a configuration into machine language.
- The process of assembling and link editing definition statements so that resources can be identified to all the necessary programs in a network.
generation data group (GDG)
A chronological collection of historically related data sets that do not use the Virtual Storage Access Method (VSAM); each data set is called a generation data set. See also generation data set.
generation data group base entry
An entry that permits a data set that does not use the Virtual Storage Access Method (VSAM) to be associated as a generation data set (GDS) with other data sets not using VSAM .
generation data set (GDS)
One of the data sets in a generation data group (GDG); a GDS is historically related to the other data sets in the group. See also generation data group.
- A number used to differentiate between the uses of the same i-node for several files or for different versions of the same file. When a file is created, an i-node is allocated for the file, and a new generation number is stored in the i-node for that file. Any use of an i-node with the wrong generation number indicates that the user's view of the file is out-of-date, or "stale."
- The number of a generation within a generation data group (GDG). A zero represents the current generation of the group, a negative integer (-1) represents an older generation, and a positive integer (+1) represents a new generation that has not yet been cataloged. See also GDS reclaim processing.
- An alert that is broadcast by Tivoli Workload Scheduler for z/OS, and collected by NetView, when an operation ends in error. Generic alerts can be specified as an option when defining application descriptions.
- A Systems Network Architecture (SNA) Network Management Vector that enables a product to signal a problem to the network. CICSPlex SM uses generic alerts as part of its interface to NetView.
- Alert information that is provided as text or is encoded using a method in which code points provide an index into short units of stored text. The use of generic alerts prevents the receiver from having to recognize and understand each unique problem for which an alert is sent. See also nongeneric alert.
generic business object
A business object that generically represents a business entity across multiple applications or data sources. See also application-specific business object.
- A class with no special behavior built in. The administrator can customize, save, and query a generic class.
- See class template.
generic configuration item
An authorized configuration item that is automatically created during automated linking, whenever an authorized CI cannot be found, matched, and linked to an authorized asset.
generic controller description
An asynchronous controller description that is reserved for incoming calls on an X.25 packet-switching data network from a remote system or device that does not use SNA transmission protocols and whose location name and identifier are defined in configuration list QASYNCLOC in library QSYS.
generic data link control (GDLC)
A generic interface definition that provides application and kernel users a common set of commands to control DLC device managers within the operating system. Requirements for entry-point definitions, functions provided, and data structures for all DLC managers are specified. The following DLCs conform to this interface: IEEE 802.3 Ethernet, standard Ethernet, SDLC, and Token Ring.
In systems with VSAM, a leading portion of a key, containing characters that identify those records that are significant for a certain application. The key is one or more consecutive characters, taken from a data record, used to identify the record and establish its order with respect to other records.
- The characters common to object names that can be used to identify a group of objects. A generic name ends with an asterisk (*). For example, ORD* identifies all objects whose names begin with the characters ORD.
- In the hierarchical file system, a path name that contains one or more wildcard characters.
An object that is used in API calls and XPATH expressions to refer to concepts, custom entities, or collections. For example, the XPATH expression /WSRR/GenericObject will retrieve all concepts from WebSphere Service Registry and Repository.
A primitive operator that contains mixed-mode code, both C++ code and Perl code. The Perl code generates C++ code that augments the other C++ code and provides specific customization for that operator invocation. See also code generation template, non-generic operator, primitive operator.
generic port (G_port)
A port on a Fibre Channel switch that can function either as a fabric port (F_port) or as an expansion port (E_port). The functionality of a G_port is determined during port login: a G_port functions as an F_port when connected to a node port (N_port) and as an E_port when connected to an E_port.
A Resource Access Control Facility (RACF) profile that contains security information about multiple resources that have similar characteristics, similar naming conventions, and require a similar level of protection. See also data set profile, discrete profile, fully qualified generic profile, profile, resource profile.
Generic Security Services API
See Generic Security Services application programming interface.
A server or process, such as a Java server, a C or C++ server or process, a CORBA server, or a Remote Method Invocation (RMI) server, that is managed in the product administrative domain and supports the product environment.
A conjunction of expressions of the form p in S : condition where p is a parameter (or a tuple of parameters), S is a range, a string, or a finite set, and condition is an expression. These expressions are also used in forall statements and aggregate operators. They are often useful to transform a data structure, such as the data stored in a file, into a data structure more appropriate for stating the model effectively.
The number of times that a data value can occur in the database for multiple entities before that data value is considered a generic value. See also generic value.
generic unit name
A name assigned to a class of devices that share the same hardware characteristics. See also esoteric unit name.
A data value that occurred in the database for one or more entities a specific number of times. For example, a telephone number with a value of 555-555-5555 might be considered a generic value after it occurs in the database 10 times. See also generic threshold.
Generic Windows playback policy
A policy that collects performance data played back from a recorded sequence of actions in a Microsoft Windows application. Generic Windows uses the time measurement calls and threshold settings to detect performance problems and send violation events when threshold violations occur.
- See Geospatial Entity Object Code.
- To assign latitude and longitude values to an address in order to compute distances between sites.
In WebSphere Commerce, an application-specific code representing a geographical region. See also jurisdiction.
In DB2 Spatial Extender, a scalar function that translates existing data into data that can be understood in spatial terms. For example, a geocoder that is supplied by Spatial Extender translates United States addresses into instances of a spatial data type. Another geocoder might translate the identifier of a shelf in a warehouse into data that identifies the location of that shelf in the warehouse.
The process of identifying geocodes from more traditional geographic markers (addresses, postal codes, and so on). For example, a landmark can be located at the intersection of two streets, but the geocode of that landmark consists of a number sequence. See also geolocating, Geospatial Entity Object Code, geotagging, global positioning system, radiolocation, reverse geocoding.
A translation and an optional rotation adjustment of an ellipsoid that is relative to an arbitrary center of the earth. A geodetic datum is used in approximating the surface of the earth.
Geographically Dispersed Parallel Sysplex (GDPS)
An application that integrates Parallel Sysplex technology and remote copy technology to enhance application availability and improve disaster recovery. GDPS topology is a Parallel Sysplex cluster spread across two sites, with all critical data mirrored between the sites. GDPS manages the remote copy configuration and storage subsystems; automates Parallel Sysplex operational tasks; and automates failure recovery from a single point of control.
An object on the surface of the Earth (such as a city or river), a space (such as a safety zone around a hazardous site), or an event that occurs at a location (such as an auto accident that occurred at a particular intersection). See also geographic information system.
geographic information system (GIS)
A complex of objects, data, and applications that is used to create and analyze spatial information about geographic features. See also DB2 Spatial Extender, geographic feature.
A subfunction of cross-site mirroring (XSM) that generates a mirror image of an independent disk pool on a system, which is (optionally) geographically distant from the originating site for availability or protection purposes.
The process of pinpointing a location based on the assessment of various types of signals. In mobile computing, often WLAN access points and cell towers are used to approximate a location. See also geocoding, Geospatial Entity Object Code, geotagging, global positioning system, location services, radiolocation, reverse geocoding.
- The information available in a zoomed-in road link on a map.
- In Enhanced X-Windows, the size and position of a window on the screen. The size of a widget is changed using geometry management routines.
See geostationary Earth orbit system.
- Pertaining to the geographical characteristics of the Earth.
- Pertaining to the geographical characteristics of the Earth.
Geospatial Entity Object Code (geocode)
A standardized numeric representation of a specific geographical address that can include information about latitude, longitude, and altitude. Not every geographic location has a traditional address, but it does have a geocode. See also geocoding, geolocating, geotagging, global positioning system, radiolocation, reverse geocoding.
geospatial information system
See geographic information system.
The process of adding coordinate data to the metadata of something not directly related to that coordinate data (for example, photographs, pictures, or QR codes). See also geocoding, geolocating, Geospatial Entity Object Code, global positioning system, radiolocation, reverse geocoding.
A TIFF based interchange format for georeferenced raster imagery. See also Tagged Image File Format.
- A series of one or more events that is triggered by the user. See also touch event, touchscreen, touch-sensitive bezel.
- In mobile computing, a short, uni- or multi-directional input on a touchscreen. See also double-tap, drag, hold, multi-touch, pinch, pinch in, pinch out, press, slide, swipe, tap.
A method whose purpose is to get the value of an instance or class variable. This allows another object to find out the value of one of its variables. See also accessor method, setter method.
See grant functional transmission.
In the Performance Toolbox, an empty space in the console where an instrument used to be, usually caused when a console designed for one system contains instruments not available on the current system. Ghost instruments occupy a space and prevent a new instrument from being defined in that same space or other instruments from being moved or resized to use the space.
In digital information storage, a base-2 unit of measurement equal to 1,073,741,824 bytes (2 to the 30th power). See also gigabyte.
In data communications, 10 to the power of 9 or 1,000,000,000 bits. See also gigabyte.
A variation of the Ethernet protocol that is capable of transmitting data at one billion bits per second. Gigabit Ethernet on the System i family is supported only by TCP/IP in full-duplex mode.
gigabit interface converter (GBIC)
An encoding/decoding device that is a class-1 laser component assembly with transmitting and receiving receptacles that connect to fiber-optic cables. GBICs perform a serial optical-to-electrical and electrical-to-optical conversion of the signal. The GBICs in the switch can be hot-swapped.
gigabits per second (Gbps)
A measure of high speed bandwidth on a digital data transmission medium such as optical fiber. See also kilobits per second.
For processor storage, real and virtual storage, and channel volume, 10 to the power of nine or 1,073,741,824 bytes. For disk storage capacity and communications volume, 1,000,000,000 bytes. See also gibibyte, gigabit.
See General Inter-ORB Protocol.
See geographic information system.
The process by which an alternate subsystem releases itself from its extended recovery facility (XRF) sessions with terminal users and is replaced by the primary subsystem. See also takeover.
In architecture, the coordinate position at which drawing is to begin. A given position is specified in a drawing order. See also current position.
See generalized interactive executive.
An IBM keyboard for programmable workstations. It has 101 keys in the United States, 106 in Japan, 103 on the IBM 3270 and 3151 terminals, and 102 in all other versions. It also includes a numeric keypad. See also 1A keyboard.
See Graphics Library.
See general ledger account.
See Global Location Broker daemon.
See general ledger code.
See general ledger feed.
See global lock manager.
See Global Location Number.
- Pertaining to all places in a document or file.
- Pertaining to an element that is available to any process in the workspace. A global element appears in the project tree and can be used in multiple processes. Tasks, processes, repositories, and services can be either global (referenced by any process in the project) or local (specific to a single process). See also local.
- Pertaining to information available to more than one program or subroutine. See also local.
- A storage area used for communication between two or more main programs.
- An uninitialized portion of a partition accessible by any program of a task set in the partition at a given time. The same area may be used by other task sets that run in the same partition.
A library item that is available to the entire process application in which it is located. For example, environment variables for a process application are global assets and can be called from any implementation.
- A generic attribute definition created at the installation level that can be copied to any module within the installation.
- In XML, an attribute that is declared as a child of the schema element rather than as part of a complex type definition. Global attributes can be referenced in one or more content models using the ref attribute.
In Java, an object that is often affected when any other system object changes. See also global butterfly.
In Java, an object that changes many other objects outside of its immediate relationships when it itself changes. See also global breakable.
- In a federated system, the database system catalog. The catalog contains information about objects in the federated database and at the data source. The catalog also contains information about the entire federated system. The information in the global catalog is used by the query optimizer to plan the best way to process SQL statements.
- A system data set in which CICS records CICS system information. See also local catalog.
- A table that contains a global inventory of enterprise replication configuration information.
global catalog domain
Together with the local catalog domain, a repository used by other CICS domains to hold information to allow an orderly restart. The two catalog domains enable CICS code to read, write, and purge records on the global and local catalog data sets so that a record of the CICS state can be maintained when CICS is not running.
See wildcard character.
Global Commerce Initiative (GCI)
A voluntary body that was created in October 1999 to improve the performance of the international supply chain for consumer goods through the collaborative development and endorsement of recommended standards and important business processes.
global configuration database (GCD)
The Content Platform Engine component that stores global data that defines the domain. Data includes information about object stores, file storage areas, content cache areas, index areas, and other domain resources. The global configuration database also stores and manages the security descriptors for all accounts provided by the authentication provider.
global configuration file
A configuration file that is distributed from the primary system in a push-to-client environment. See also push-to-client.
Data that can be addressed by any process while in kernel mode, for example, tables, such as the open file table and process table, and other data maintained by the kernel, such as buffer pointers.
Global Data Synchronization Network (GDSN)
A global network that facilitates the synchronization of item information between retailers and suppliers by using a single global registry, comprised of selected data pools.
Global Directory Service (GDS)
The DCE Directory Service component that locates other cells using global cell names. GDS can use an X.500-based directory service or the Internet distributed directory service called Domain Name Service (DNS). See also Cell Directory Service.
A group of Domino domains, such as Sales1, Sales2, and Marketing, under a single Internet domain, such as acme.com. All outbound SMTP mail, whether it originates from the Sales1 or Marketing domains, has the return address acme.com.
In XML, an element that is declared as a child of the schema element rather than as part of a complex type definition. Global elements can be referenced in one or more content models using the ref attribute.
global error table
A method employed by some high-level languages, such as C and Fortran, to determine actions for handling conditions. Whereas Language Environment condition handling actions are defined at the stack frame level, actions defined using the global error table apply to an entire application until explicitly changed.
global file system
A single file system that provides complete, shared access to both Windows and UNIX clients in the same environment. See also file-placement rule.
- The general process of worldwide economic, political, technological and social integration.
- In computing, the provision of a single software solution that has multicultural support, and a user interface and documentation that is available in one or more languages. See also multicultural support, multilingual computing.
A software development model for developing globalized products that includes a single executable for all languages, the use of Unicode for handling multilingual data, a locale model, localization packs, input and output of multilingual data, and a globalization programming model.
Globalization Architecture and Technology Team (GATT)
A group of globalization experts who represent the IBM product divisions. The GATT owns and maintains the Globalization Architecture Imperatives (GAI) and also provides implementation guidance to developers.
The process of modifying a program to make it globalized. See also globalized program.
globalization programming model
A programming model whereby the layers in the computer system -- platform, operating system, middleware, and application, can reuse the globalization features of the layer below it.
globalization verification test (GVT)
All testing necessary to provide adequate confidence that a software or hardware product will satisfy given requirements for language support, cultural support, and multilingual support and that the product's user interface and messages are translatable. See also translation verification test.
A program that is internationalized for multiple languages simultaneously. It uses a single, uniform character encoding (Unicode) in all of its internal processing, and allows for the installation of support for additional locales via localization packs. See also globalization process, internationalized program, localization pack, localized program.
Global Location Number (GLN)
A unique 13-digit number that is used to identify a trade location. The first seven digits represent the company prefix, the next five digits represent the trade location, and the last digit is the check digit.
- An IRLM lock that interests two IRLMs; both must coordinate to grant it.
- A lock that provides concurrency control within and among DB2 subsystems. The scope of the lock is across all DB2 subsystems of a data sharing group.
global lock manager (GLM)
A component that runs on a cluster caching facility and coordinates the lock requests made by the local lock manager running on each member. See also local lock manager.
globally defined object
On z/OS, an object whose definition is stored in the shared repository. The object is available to all queue managers in the queue-sharing group. See also locally defined object.
globally RACLISTed profile
An in-storage profile for RACF-defined resources that are shared across a system. See also locally RACLISTed profile.
The global address space that controls job scheduling and device allocation for a complex of JES3 processors. See also local main.
- An asynchronous copy service that enables host data on a volume to be mirrored over long distances to a volume in a remote location.
- A method of an asynchronous replication that maintains data consistency across multiple volumes within or across multiple systems. Global Mirror is generally used where distances between the source site and target site cause increased latency beyond what the application can accept.
- An optional capability of the remote mirror and copy feature that provides a two-site extended-distance remote copy. Data that is written by the host to the storage unit at the local site is automatically maintained at the remote site. See also Global Copy, Metro Mirror, remote mirror and copy.
- A hardware and software remote-copy service option that provides an asynchronous volume copy across storage subsystems for disaster recovery, device migration, and workload migration.
- In COBOL, a name that is declared in only one program but that may be referred to from that program and from any program contained within that program. Condition names, data names, file names, record names, and some special registers may be global names.
- In Managed System Services, the name by which an object is known to SNA File Services (SNA/FS). SNA/FS enables objects to be uniquely named in an SNA network with systems of different types.
global optimization guideline
An optimization guideline that applies to all DML statements for which an optimization profile is in effect. See also optimization guideline.
In a federated system, a feature of the DB2 SQL Compiler that analyzes distributed queries and determines the most efficient way to run them. The global optimizer evaluates queries based on resource cost.
Configuration options defined on the master domain manager using optman. These options apply to all workstations in the Tivoli Workload Scheduler network. See also local options.
global positioning system (GPS)
A worldwide radio-navigation system that is formed from a constellation of satellites and their ground stations. See also accelerometer, geocoding, geolocating, Geospatial Entity Object Code, geotagging, radiolocation, reverse geocoding.
- An incident or a problem with a root cause that is the cause of many other issues, or that affects many users.
- In SQL replication, the row in the register table that defines global replication characteristics for an instance of the Capture program.
A data pool that serves as the worldwide source for companies to store product data, ensuring that business partners have access to accurate, up-to-date, industry-compliant business information.
A file created during a root installation of a DB2 product on a UNIX or Linux system. The file contains information such as service records, instance records (instance name, instance path), variable records (variable names, variable values), and DAS information.
- An 8-byte identifier that identifies a coded font resource. A GRID contains the following fields in the order listed: GCSGID of a minimum set of graphic characters required for presentation. It can be a character set that is associated with the code page, or with the font character set, or with both. CPGID of the associated code page. FGID of the associated font character set Font width in 1440ths of an inch.
- An identifier that indicates a global resource in the SAA network. This identifier is unique across all systems in the network.
global resource serialization complex
A group of systems that use global resource serialization (GRS) to serialize access to shared resources such as data sets on shared direct access storage device (DASD) volumes.
- The portion of namespace scope that is not contained in a namespace definition. See also namespace scope.
- The portion of a source program that is not contained within a class, function, or namespace definition.
Pertains to all applications running in the environment and determines whether security is used, the type of registry used for authentication, and other values, many of which act as defaults.
In the DCE Distributed Time Service (DTS), a server that provides its clock value to courier servers on other cells, or to DTS entities that have failed to obtain the specified number of servers locally.
global service group (GSG)
The collection of all IMS subsystems that can access a particular set of databases. A global service group can span several z/OS systems at more than one geographical location.
Global System for Mobile Communications (GSM)
The dominant 2G cellular network in the world. GSM was succeeded by 3G networks. To consumers, one of the big differences between GSM networks and CDMA networks is the use of SIM cards in GSM networks. See also 2G, code division multiple access, Enhanced Data Rates for GSM Evolution, phone locking, Subscriber Identity Module card.
Global Trade Item Number (GTIN)
A mechanism to cross-reference product identifiers. The GTIN is the identification number for uniquely identifying trade items (products and services) that are sold, delivered, warehoused, and billed throughout the retail and commercial distribution channels.
- A unit of work in a distributed transaction processing environment in which multiple resource managers are required.
- A recoverable unit of work performed by one or more resource managers in a distributed transaction environment and coordinated by an external transaction manager.
global transaction management (GTX)
The monitoring of transactions that can include operations on two or more different data sources. This feature enables databases or servers to be returned to a pre-transaction state if an error occurs. Either all databases and servers are updated or none are. The advantage of this strategy is that databases and servers remain synchronized and data remains consistent.
global user exit
A point in a CICS module at which CICS can pass control to a user-written program (known as an exit program), and then resume control when the program has finished. When an exit program is enabled for a particular exit point, the program is called every time the exit point is reached. See also task-related user exit.
- A variable or identifier whose scope of reference is all of the modules in a program. See also local variable, scope of reference.
- A variable used to contain information for the use of actions. The values of global variables can be extracted from a host screen or elsewhere, and can be used in templates, transformations, macros, Integration Objects, or business logic. A global variable can be a single value or an array, and it can be shared with other applications sharing the same session.
- A symbol defined in one program module that is used in other program modules that are independently compiled.
- A variable that is used to hold and manipulate values assigned to it during translation and that is shared across maps and across document translations. One of the three types of variables supported by the Data Interchange Services mapping command language.
- A variable that is available to all queries. For example, a date range can be defined as a global variable so that it does not have to be re-keyed for multiple queries.
- A representation of a value that can be accessed and sometimes modified by SQL statements that are running within the same scope. This scope can be either a session or a database, depending on how the global variable is defined. See also built-in global variable, database global variable, session global variable, special register, user-defined global variable, variable.
- A named entity within query management that can be assigned a value used for communications between an application program and query management. The entity is accessible from both the application program and query management. See also runtime variable.
global variable table
The JCL variable table that Tivoli Workload Scheduler for z/OS checks for a variable substitution value if no value is found in the specific JCL variable table associated with the operation.
- Logical division of the SMP/E consolidated software inventory (CSI).
- A zone that contains a fully functional installation of the Solaris operating system. Global zones control the installation, maintenance, operation, and destruction of non-global zones. See also non-global zone.
See file name substitution.
Globus certificate service
An online service that issues low-quality GSI certificates for people who want to experiment with Grid (or distributed) computing components that require certificates but have no other means to acquire certificates. The Globus certificate service is not a true CA. Certificates from the Globus certificate service are intended solely for experimentation. Use caution when using these certificates, for they are not intended for use in production systems. See also certificate authority.
A unit of information associated with a dictionary entry, such as lemma, part of speech, morphosyntactic category, frequency of usage, or synonym. Glosses can refer to other glosses, because common sets of information are often combined into a single instance of a gloss and then multiply referenced.
See group list table.
A segment of code that is used to connect two pre-existing pieces of code and retain full functionality. See also API stub.
See Geographic Logical Volume Manager.
- The actual shape (bit pattern, outline) of a character image. For example, italic A and roman A are two different glyphs representing the same underlying character. Strictly speaking, any two images which differ in shape constitute different glyphs. In this usage, glyph is a synonym for character image, or simply image (The Unicode Standard – Version 1.0).
- A graphic symbol whose appearance conveys information, for example, the vertical and horizontal arrows on cursor keys that indicate the directions in which they control cursor movement.
- A shape in a font that is used to represent a character code on screen or paper. The most common example of a glyph is a letter, but the symbols and shapes in a dingbats font are also glyphs.
- An image, usually of a character, in a font. See also character, graphic character.
See Generalized Markup Language.
See graduated monthly license charge.
The process of recognizing the start or end of an element (or an attribute label), associating it with an APF, and executing the APF. In SCRIPT/VS, interpretation is performed jointly by SCRIPT/VS and by APFs.
See generalized main scheduling.
See Greenwich mean time.
- The criteria on which ODM optimizes, either maximizing or minimizing a weighted sum.
- In a policy-enabled system, a type of unsolicited decision that defines an objective that a managed resource must meet. A goal consists of a logic expression that defines the constraint and evaluation strategy, which defines when to evaluate the constraint. Based on a goal, an autonomic manager attempts to manage the behavior of a managed resource. In Policy Management for Autonomic Computing, goals are not supported.
- The means by which an engine implements a search algorithm. See also search strategy.
- A workload management mode for an MVS image in a sysplex using an MVS workload management service definition to automatically and dynamically balance its system resources according to the active service policy for the sysplex.
- A mode of processing in which the active service policy determines system resource management.
See Graphic Object Content Architecture.
See Generalized Object File Format.
See garment on hanger.
An attribute that is maintained by the Emptoris Strategic Supply Management platform and is synchronized to the integrating applications. Each application decides which golden attribute to replicate.
In Internet communications, a distributed information service that makes available hierarchical collections of information. A single Gopher client can access information from any accessible Gopher server. The Gopher client provides the user with a menu-driven interface.
The national standards-setting organization of the former USSR. Since the fragmentation of the USSR, this organization has uncertain status. Some of the former republics such as Lithuania, Latvia, and Estonia now have their own independent standards-setting organizations.
A method of shading polygons smoothly based on the intensities at their vertices. The color is uniformly interpolated along each edge, and then the edge values are uniformly interpolated along each scan line. For realistic shading, colors should be gamma corrected.
The decision-making processes in the administration of an organization. The rights and responsibilities of these processes are typically shared among the organization's participants, especially the management and stakeholders.
governance policy validator (GPV)
A sample validator that enables the user to control the operations that can be performed on specific entities based on the metadata that is attached to those entities.
A process that ensures that compliance and operational polices are enforced, and that change occurs in a controlled fashion and with appropriate authority as envisioned by the business design.
- A set of rules to limit user activities, such as the execution of reports, that either take too long or consume too many resources.
- See resource limit facility.
See Global Product Classification.
See General Parallel File System.
GPFS recovery log
A file that contains a record of metadata activity and that exists for each node of a cluster. In the event of a node failure, the recovery log for the failed node is replayed, restoring the file system to a consistent state and allowing other nodes to continue working.
See Graphical Process Modeler.
See guest platform management provider.
See group policy object.
See general purpose register.
See General Packet Radio Service.
See global positioning system.
See governance policy validator.
See Guaranteed Resource Allocation.
- A procedure by which a window acts upon a key or button event that occurs for it or any of its descendents. This precludes the necessity of setting up translations for all windows.
- The act of selecting keyboard keys, the keyboard, pointer buttons, the pointer, and the server for exclusive use by a client. In general, these facilities are not intended to be used by normal applications, but are intended for various input and window managers to implement various styles of user interfaces. See also active grab, passive grab.
See graceful stop.
graceful stop with takeover
A function that stops PowerHA SystemMirror cluster services on a cluster node and moves any applications that were under the control of PowerHA SystemMirror to an available backup node.
- A time during which a customer might be entitled to use more than one version of a licensed product on the same machine, without paying two license fees.
- The time period during a cluster event when interface reconfiguration might be in progress and networks are not monitored.
- A structured collection of words and phrases bound together by rules. A grammar defines the set of all words, phrases and sentences that might be spoken by a caller and are recognized by the engine. A grammar differs from a vocabulary in that it provides rules that govern the order in which words and phrases can be joined together.
- A document type definition (DTD) or schema providing a structured format used for successful processing by the trace service.
Grande CICS dynamic storage area (GCDSA)
See Grande dynamic storage area.
grant functional transmission (GFT)
In MTAM, a control character indicating that the host system gives permission to i5/OS to send data or that i5/OS gives permission to the host system to send data. See also request functional transmission.
A measure of the rights that a user has to change the security permissions of an item. Grant levels are calculated separately for every user and every item. See also access level, security dimension.
- The displayed, printed, or plotted output that represents one, two, or three axis variables specified by the user for a collection of data. Examples of graphs are scatterplots, bar charts, and histograms.
- A finite set of nodes that are connected by a finite set of links.
- See chart.
- A Java object that is used to manage a collection of nodes and links.
- A high-level IBM ILOG JViews functionality that can be used to create programs that both include and represent hierarchical information with graphic objects.
- A symbol produced by a process such as handwriting, drawing, or printing.
- Image, text, or a combination of both that can be placed in a document. See also coordinate graphic.
- Any raster pattern representation, for example, of a character or a line drawing.
graphical identification and authentication (GINA)
A dynamic link library that provides a user interface that is tightly integrated with authentication factors and provides password resets and second factor bypass options.
Graphical Process Modeler (GPM)
A stand-alone graphical interface tool that is used in Sterling B2B Integrator to create and modify business processes. The GPM converts the graphical representation of business processes to well-formed BPML (source code) and saves the effort of writing code.
graphical user interface (GUI)
A computer interface that presents a visual metaphor of a real-world scene, often of a desktop, by combining high-resolution graphics, pointing devices, menu bars and other menus, overlapping windows, icons and the object-action relationship. See also graphical user interface server.
graphical user interface server (GUI server)
A component that serves the web-based graphical user interface to web browsers through HTTP. See also graphical user interface.
An interface that describes the methods to be implemented by a class that contains several graphic objects. An example of a graphic bag is the class IlvManager, which manages a large number of graphic objects.
- A visual representation of a character, other than a control character, that is normally produced by writing, printing, or displaying. See also character graphic, glyph.
- A member of a set of symbols that represent data. Graphic characters can be letters, digits, punctuation marks, or other symbols. See also character graphic.
- A graphic symbol, such as a numeric, alphabetic, or special character (see C-S 3-3220-019 Corporate Standard).
- A DBCS character.
graphic character conversion alternative selection number (GCCASN)
A parameter of a function call to a graphic character data conversion process that facilitates selecting a specific conversion method and associated conversion tables from different alternatives.
graphic character conversion selection table (GCCST)
A table used in the graphic character data conversion process to manage the access to the various conversion methods and associated conversion tables under its sphere of control.
- A 4- to 8-character alphanumeric identifier assigned to a registered graphic character. Each graphic character that is to be assigned a code point must have a GCGID. Each GCGID is unique.
- An identifier with up to 8 alphanumeric characters that is uniquely assigned to a graphic character in IBM standards. The GCGID specification also provides a short description for each GCGID (see C-H 3-3220-055 Corporate Standard).
graphic character modification
A process in which graphic characters are substituted or extended in a previously defined character arrangement. See also graphic character modification module.
graphic character modification module (GRAPHMOD)
A program module that defines a graphic character modification with scan patterns of IBM-supplied character sets, user-defined character sets, or both. See also graphic character modification.
graphic character name
See character identifier.
graphic character pattern
See character raster pattern.
graphic character raster pattern
See character raster pattern.
- A defined set of graphic characters treated as an entity. No coded representation is assumed.
- A set of graphic characters in a code page.
- A unique graphic character set identifier that can be expressed as either a 2-byte binary value or a 5-digit decimal value.
- A unique five-digit decimal number assigned to a graphic character set in IBM standards. The range of GCSGID values is 00001 to 65534 or x’0001’ to x’FFFE’ (see C-S 3-3220-019 Corporate Standard).
- A number between 00001 and 65534 that is assigned to identify a graphic character set. For i5/OS, the graphic character set global identifier is expressed as a 5-digit decimal number. For example, the invariant character set has the GCSGID of 00640.
graphic character-set ID
A 5-digit registered identifier used to specify a graphic character set. The graphic character-set ID is the first part of the QCHRID system value or the CHRID parameter value.
graphic communication server (GCS)
The part of the NetView Graphic Monitor Facility that uses LU 6.2 to transport data between the NetView program and the server workstation and between the server workstation and its client workstations.
An object that encapsulate the MVC triad that clearly separates data from its graphic representation. IBM ILOG JViews TGO provides four main graphic components: the table component, the tree component, the network component, and the equipment component. See also controller, representation model, view.
graphic data server (GDS)
The part of the NetView management console that receives network management data from Tivoli NetView for OS/390, maintains this data (except for dynamically created view information), and correlates this data with views.
graphic data type
A character string in which each character is represented by 2 bytes. The character string does not contain shift-in (SI) and shift-out (SO) characters. See also DBCS-only.
A key in a keyboard whose primary purpose is the input of a graphic character or of an element of a graphic character. Some of these keys may also have a secondary purpose for input of a control function (see ISO/IEC 9995-1). See also function key.
A graphic representation of associated representation objects in a graphic view. Graphic objects are generally used to draw complex composite objects. Graphic objects are specific to a graphic view, but certain graphic object classes can be shared across graphic components. See also graphic view, representation object.
See graphics primitive.
- Charts, pictures, illustrations, and tables created from fundamental drawing units such as lines, curves, and polygons.
- Pictures and illustrations.
graphics context (GC, GContext)
In the Enhanced X-Windows Toolkit, the storage area for various kinds of graphics output, such as foreground pixels, background pixels, line widths, and clipping regions. A graphics context can be used only with drawables that have the same root and the same depth as the graphics context.
graphics data file (GDF)
A picture definition in a coded format that is used by the Graphical Data Display Manager (GDDM) to optionally provide the user with a lower-level program interface than the GDDM application program interface (API).
graphics data format file (GDF file)
A picture definition in a coded order format used internally by the GDDM function and, optionally, providing the user with a lower-level programming interface than the GDDM application programming interface.
graphics model space
A 2-dimensional conceptual space in which a picture is constructed. All model transforms are completed before a picture is constructed in a graphics model space. See also graphics presentation space.
graphics presentation space
A two-dimensional conceptual space in which a picture is constructed. In this space graphics drawing orders are defined. The picture can then be mapped onto an output medium. All viewing transforms are completed before the picture is generated for presentation on an output medium. An example of a graphics presentation space is the abstract space containing graphics pictures defined in an IPDS Write Graphics Control command. See also graphics model space.
- In the GDDM function, a single item of graphics information, such as a line or a string of graphics text.
- A basic construct used by an output device to draw a picture; for example, an arc, line, fillet, character string, and marker.
The processing capability required to interpret a GOCA object, that is, to present the picture represented by the object. It includes the environment interface, which interprets commands and instructions, and the drawing processor, which interprets the drawing orders.
In the GDDM function, a group of graphics primitives (lines, arcs, and text) that are operated as a common set. The graphics primitives inside a graphics segment share characteristics, such as visibility and angle of rotation, but keep their individual characteristics, such as color and line width.
- A set of algorithms that optimize the display of nodes and links with respect to each other in graphs such as network topologies for telecommunications networks and systems management applications.
- The process that applies a layout algorithm to a graph.
See graphic character modification module.
A graphical view in the Job Scheduling Console used to modify and maintain job streams in the database and the plan. See also plan.
An ARP reply when there was no ARP request that recommends that all hosts on the network receive the ARP reply and refresh their ARP cache. For IP address takeover via IP aliases to be successful, systems and devices connected to the network must be configured to support gratuitous ARP. See also Address Resolution Protocol, IP address takeover via IP aliases.
- In a grayscale adapter, the different levels of intensity corresponding to the shades of gray produced.
- In Enhanced X-Windows, a type of degenerate pseudocolor where the red, green, and blue values in any given color map entry are equal, thus producing shades of gray. The gray values can be changed dynamically.
- A scale that indicates the shades of gray between black and white that can be presented on a display device.
greatest lower bound (GLB)
On a decision variable, the largest number that is less than the variable. Greatest lower bounds are important in mathematical programming and constraint programming in the context of setting bounds on variables as tightly as possible. See also least upper bound, lower bound.
See group buffer pool recovery pending.
An approach to banking that endorses environmental reforms by both the bank and its clients. For example, environmental reforms can include the use of eco-efficient office buildings or loans for energy efficient home renovations.
green data center
A data center that uses energy-efficient computer services and is housed in an energy-efficient building. See also data center.
Green Sigma (GS)
An IBM initiative that combines the principles of Six Sigma and energy efficiency. See also Six Sigma.
In voice mail, the recording heard by a caller on reaching subscriber's mailbox. See also voice message.
A UNIX utility that allows the user to search one or more files for a specific string of text and outputs all the lines that contain the string. The user also has the option to replace the string with another.
See global resource identifier.
- A tabular form for viewing and entering data.
- In Business Graphics Utility and the GDDM function, uniformly spaced horizontal and vertical lines on a chart.
- In AFP Utilities, horizontal and vertical lines printed on an AFP resource, such as an electronic overlay, to help in the design of the AFP resource.
- A named set of interconnected replication servers for propagating commands from an authorized server to the rest of the servers in the set.
- Two physically separate clusters connected by means of a TCP/IP network.
The ability, using a set of open standards and protocols, to gain access to applications and data, processing power, storage capacity and a vast array of other computing resources over the Internet. Grid computing uses a type of parallel and distributed system that enables the sharing, selection, and aggregation of resources distributed across multiple administrative domains based on their availability, capability, performance, cost, and users' quality-of-service requirements. See also virtualized.
A special categorical question that consists of several subquestions that share a category list. Grid questions often ask respondents to choose a rating on a predefined scale for a number of products in a list.
Pertaining to an expression that does not contain decision variables, since the variables have no value at their stage of the computation and are subject to almost no restrictions. Breakpoints and slopes in a piecewise linear function must always be ground.
- A logical state of a keyboard providing access to a collection of graphic characters or elements of graphic characters. Usually these graphic characters or elements of graphic characters logically belong together and may be arranged on several levels within a group. The input of certain graphic characters, such as accented letters, may require access to more than one group (see ISO/IEC 9995-1). See also level.
- A logical set of managed objects. Groups can be dynamic, static, or task-based.
- In places, two or more people who are grouped for membership in a place.
- A series of records logically joined together or having the same value for a particular field in all records.
- With respect to partitioned data sets (PDSs), a member and the member's aliases that exist in a PDS or partitioned data set extended (PDSE), or in an unloaded PDSE.
- A looping structure that contains related records or segments that repeat in sequence until either the data ends or the maximum number of times that the loop is allowed to repeat is exhausted.
- A named list of users and servers. It can be used in contact lists, access control lists, and so on.
- A set of elements that is associated with the same category.
- A list of elements with information about how those elements can appear in a message. Groups can be ordered, unordered, or selective.
- A logical organization of users whose membership allows them to perform the same activities or provide the same authority to access resources.
- In resource definition online, a collection of related resources. The main purpose of an RDO group is convenience in storing definitions in the CSD.
- A container that holds a set of network elements or links. Groups are used to present a set of network resources grouped logically or geographically. Groups are predefined business objects.
- A collection of organizing computers independent of any resource pool or application tier association. Groups can be static or dynamic.
- A company type to which subordinate companies are connected; for example, subsidiaries, group companies, group adjustment companies, or legal units.
- A collection of users who can share access authorities for protected resources.
- In a satellite environment, a collection of satellites that share characteristics such as the database configuration and the application that runs on the satellites.
- A complex data object that consists of components.
In communications, a multidestination address associated with one or more stations on a given network. See also individual address.
- A system-level authority such as OPERATIONS, AUDITOR, or SPECIAL, which is assigned to a user at the group level. See also authority.
- Authority to use objects, resources, or functions from a group profile.
- A DB2 for z/OS coupling facility cache structure that is used by a data sharing group to cache data and to ensure that the data is consistent for all members. See also cache structure.
- A group cache structure that is used by a DB2 pureScale environment to cache data and to ensure that all members read the most recently committed version of a page. See also local buffer pool.
group buffer pool recovery pending (GRECP)
Pertaining to the state that exists after the buffer pool for a data sharing group is lost. When a page set is in this state, changes that are recorded in the log must be applied to the affected page set before the page set can be used.
group crash recovery
The portion of the group restart process where a specific database is brought back to a transactionally consistent state after a failure in a DB2 pureScale instance. Either the primary and secondary cluster caching facilities both failed, or the primary cluster caching facility failed when the secondary cluster caching facility was not in peer state. See also member crash recovery.
group data set
In z/OS, a RACF-protected data set in which either the high-level qualifier of the data set name or the qualifier supplied by an installation exit routine is a RACF group name. See also user data set.
A layout in which entities are arranged to show groups of interconnected entities. See also layout.
- In the UNIX operating system, an integer that uniquely identifies each group of users to the operating system.
- In the AIX operating system, a number that corresponds to a specific group name. The group ID can often be substituted in commands that take a group name as a value.
- In Resource Access Control Facility (RACF), a string of one to eight characters that identifies a group. The first character must be A through Z, #, $, or @. The rest can be A through Z, #, $, @, or 0 through 9.
group identification number (GID)
A 4 byte, unsigned integer (GID) that is used to identify a group profile. See also user identification number.
- A numeric value associated with a group name that represents a specific group of users.
- A number between 0 and 2147483647 that identifies a group of users to z/OS UNIX. The GID is associated with a RACF group name when it is specified in the OMVS segment of the group profile. See also effective group identifier, real group ID.
- In reporting, the process of organizing common values of query items together and only displaying the value once.
- A characteristic of objects of a certain type on the basis of which they can be divided into sets. See also set.
- A user profile that is a member of a group profile.
- The name of an entity that joins an XCF group and communicates with IMS using the OTMA protocol. A member can be either a server (IMS) or a client.
group message queue
A message queue that is associated with a group of jobs. When the message queue is set either to break mode or notify mode in the active group job, the mode is the same for any job in the group that becomes the active job.
- A name that uniquely identifies a group, such as a group of users, devices, or objects.
- The z/OS XCF identifier for a data sharing group.
- A name that uniquely identifies a group of users to the system.
group policy object (GPO)
A collection of group policy settings. Group policy objects are the documents created by the group policy snap-in. Group policy objects are stored at the domain level, and they affect users and computers contained in sites, domains, and organizational units.
group-related user attribute
In RACF, a user attribute assigned at the group level that allows the user to control the resource, group, and user profiles associated with the group and its subgroups. See also user attribute.
- The act of restarting a complete DB2 pureScale instance (cluster caching facilities and members) and performing group crash recovery on each database. See also member restart.
- A restart of at least one member of a data sharing group after the loss of either locks or the shared communications area.
The selection of a sample set of rows to extract from a start table. The user can specify a maximum number of rows for a number of unique values based on a selected column in the start table.
A subsystem that provides client subsystems, such as Resource Monitoring and Control, with a distributed coordination and synchronization service. Each client subsystem forms one or more groups by having its processes (group services clients, such as the RMC daemon on each node) connect to the group services subsystem and use the various group services interfaces.
See global resource serialization.
See GRS complex.
See Green Sigma.
See generalized sequential access method.
See global service group.
See Global Standards Management Process.
See global shared resource.
See generalized trace facility.
See Global Trade Item Number.
See general topology manager.
A global digital elevation model (DEM) with a horizontal grid spacing of 30 arc seconds (approximately 1 kilometer). It covers the full extent of latitude from 90 degrees south to 90 degrees north and the full extent of longitude from 180 degrees west to 180 degrees east. The vertical units represent elevation in meters above mean sea level.
See go to production.
See global transaction identifier.
See global transaction management.
guaranteed print labeling
A method of print labeling that ensures the integrity of the identification label by preventing the user from changing the label. If attempts are made to override print labeling, printing is stopped, and an audit record is written. See also non-guaranteed print labeling.
Guaranteed Resource Allocation (GRA)
A resource allocation policy that limits users or groups to use a percentage of the system resources. When there is contention for resources, the system uses the GRA settings to enforce resource ceilings and to allocate the system resources among the groups using the system.
A type of service class that ensures bandwidth availability and provides information on queuing delays. Guaranteed service is the most reliable of the service classes. It is commonly used for applications that cannot tolerate network delays or performance variations. For example, applications such as Internet Protocol (IP) telephony and other real-time applications have specific timing needs that require guaranteed service.
A storage class attribute indicating that space is to be allocated when a data set is created. If you specify explicit, volume, serial numbers, the storage management subsystem (SMS) honors them. If space to satisfy the allocation is not available on the user-specified volumes, the allocation fails.
- An account that provides read-only access. To log on, the account requires credentials.
- An optional account for anonymous logons.
- An operating system that runs in a virtual machine managed by the z/VM Control Program (CP ).
A secondary partition that runs an operating system other than i5/OS. The guest partition requires another partition to host it. The purpose of the hosting partition is to supply paths from virtual I/O in the guest partition's operating system to real I/O hardware drivers in the hosting partition.
guest platform management provider (GPMP)
An optional suite of applications that is installed in specific z/OS, Linux, and AIX operating system images to support platform management functions. For example, the guest platform management provider collects and aggregates performance data for virtual servers and workloads.
guest virtual machine (GVM)
In z/VM, the functional equivalent of a System z9 or zSeries system, including the virtual processors, virtual storage, virtual devices, and virtual channel subsystem allocated to a single user. Each guest virtual machine can be controlled by an operating system, such as CMS, z/VSE, z/OS, or Linux.
See graphical user interface.
See Globally Unique Identifier.
guided node discovery
In Sterling Control Center, a feature that locates other Sterling Connect:Direct servers that communicate with the Sterling Connect:Direct server. See also network map.
guided sell metaphor
A metaphor that presents customers with a series of multiple-choice questions, where each answer determines the next question and eventually refines the search to a smaller list of products. The guided sell metaphor is intended for customers who are not sure where to start.
In capacity planning, a value used as a general guide for optimal resource utilization. If resource utilization is above the guideline value, the resource may be approaching a problem area or a threshold value. Guideline values are also available for the rate of synchronous reads in the machine pool and for the sum of all pools. See also threshold value.
See graphical user interface server.
See General Use Programming Interface.
See guest virtual machine.
See globalization verification test.
See global work area.
See global warming potential.