This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
Please send any feedback about the terms and definitions on this site to firstname.lastname@example.org
A distributed, Internet-based Microsoft computing platform that consists of development tools, runtime services, operating system features, servers, and Internet protocols.
A Microsoft application development environment that consists of the common language runtime and .NET Framework class library that is designed to provide a consistent programming environment for developing and integrating code pieces. See also common language runtime.
See Tag Library Descriptor.
The IEEE 802.3 Ethernet standard that supports a transmission rate of 100 Mbps using two twisted-pair wires.
A format for diskette 2D diskettes with 1024 bytes per sector and 8 sectors per track.
The IEEE 802.3 Ethernet standard that supports a transmission rate of 10 Mbps using two twisted-pair wires.
A format for diskette 1 diskettes with 128 bytes per sector and 26 sectors per track.
16-bit code set
See double-byte character set.
See disk 16 pack.
1980 X.25 call
A call that conforms to the 1980 X.25 protocol specifications.
1984 X.25 call
A call that conforms to the 1984 X.25 protocol specifications.
1988 X.25 call
A call that conforms to the 1988 X.25 protocol specifications.
A keyboard for non-programmable workstations that is associated mostly with IBM terminals that are attached to IBM controllers such as the 3174, 3274, and 5294. It has 104 keys in all versions except Katakana, which has 106 keys. A numeric key pad option adds another 18 keys to the keyboard. See also G keyboard.
In mobile computing, the first generation of cellular networks. 1G networks were analog networks and are largely inactive.
A method of transaction processing where transactions are committed on the primary server and then propagated to the secondary server afterward. If the primary server fails before it sends the transactions to the secondary server, the transactions will not be visible on the secondary server. See also 2-safe algorithm.
A universal foundation for industry standards-based electronic commerce that enables data synchronization among trading partners, trade exchanges, and national data pools, by ensuring the use of identical, updated, standards-compliant data.
Virtual storage below the 16 MB address in a z/OS address space. Addresses below the 16 MB address are accessed by 24-bit addressing, and programs can use this storage when they run in AMODE 24 or higher.
A format for diskette 2D diskettes with 256 bytes per sector and 26 sectors per track.
2 B-channel transfer feature
See Integrated Services Digital Network two B-channel transfer.
See biconnected graph.
In mobile computing, the second generation of cellular networks. 2G networks operated on digital networks as opposed to analog networks and are still prevalent across the world. See also code division multiple access, Global System for Mobile Communications, IS-95.
See Two-Party Key Distribution Protocol.
A method of transaction processing where transactions are not considered committed on the primary server until the transaction is confirmed committed on the secondary server. All updates to the data are applied to both copies synchronously. The disadvantage of a 2-safe system is that if the secondary server fails, the primary server stops accepting transactions. See also 1-safe algorithm.
Virtual storage above the 16 MB address but below the 2 GB address in a z/OS address space. Addresses above the 16 MB address but below the 2 GB address are accessed by 31-bit addressing, and programs can use this storage when they run in AMODE 31 or higher.
31-bit storage addressing
An addressing structure introduced with the MVS/XA operating system that supports addressing up to 2 GB of real and virtual memory, in addition to the prior support for 24-bit addressing. The architecture has since been extended with 64-bit addressing.
3270 attention field
A field on a display screen that contains a null, a space, or an ampersand in the first position. The field can be selected using the Cursor Select key, which causes data to be sent to the host system.
3270 device emulation
The i5/OS support that allows a system to appear as a 3274 Control Unit in a BSC multipoint network or an SNA network.
3270 display emulation
The function of i5/OS 3270 device emulation support that converts 3270 data streams intended for a 3278 display station into data streams that can be recognized by a display station attached to the system.
The use of software that enables a client to emulate an IBM 3270 display station or printer, and to use the functions of an IBM host system.
3270 host application
An application on the IBM System/370, System/390, or iSeries that interacts with terminals supporting the 3270 data stream.
3270 Host Connection Program (HCON)
A program that allows a system unit to emulate a workstation or printer attached to a System/370 host.
3270 pass-through mode
A mode that lets a program running in a shell environment send and receive a data stream or issue TSO/E commands.
3270 printer emulation
The function of i5/OS 3270 device emulation support that converts 3270, DSC, and SCS data streams intended for a 328X printer into data streams that can be recognized by a printer attached to the system.
A function of WebSphere Voice Response that provides a software interface between DirectTalk and IBM System/370, System/390, or iSeries architecture business applications that interact with terminals supporting the 3270 data stream. See also custom server.
A mode of running the storage management subsystem (SMS) in which up to 32 names, representing systems, system groups, or both, are supported in the SMS configuration. When running in this mode, the system can share source control data sets (SCDSs), active control data sets (ACDSs), and communications data sets (COMMDSs) only with other systems running in 32-name mode. See also compatibility mode.
See Triple Data Encryption Algorithm.
In mobile computing, the third generation of wireless technology. Multimedia 3G networks transmit wireless data up to 2 megabits per second, making possible the integration of voice, data and video. See also Enhanced Data Rates for GSM Evolution, High-Speed Packet Access, streaming.
See third-generation language.
3-state check box
A square box with associated text that represents a choice. Unlike a regular check box, which has only two states (selected and deselected), a 3-state check box has three states (selected, deselected, and unavailable). The unavailable state is displayed as a halftone and denotes that the 3-state check box cannot be selected.
In mobile computing, the fourth generation of cellular networks. 4G networks are unique from 3G networks because they are required to have throughput rates up to a gigabit. See also Evolved High-Speed Packet Access, long-term evolution, Mobile Worldwide Interoperability for Microwave Access.
A format for diskette 1 diskettes with 512 bytes per sector and 8 sectors per track.
Any display device that uses the 5250 data stream. See also Programming Development Manager.
Any one of many licensed programs that allow a personal computer to perform like a 5250 display station or printer and to use the functions of an IBM i operating system.
Any display station from the 5290 Display System.
- The ISDN protocol implemented on the 5ESS switch, providing 23 B-channels and a D-channel over a T1 trunk.
- A Lucent Technologies switch.
Virtual storage above the 2 GB address in a z/OS address space. Addresses above the 2 GB address are accessed by 64-bit addressing, and programs can use this storage when they run in AMODE 64.
An algorithm for encoding data for transmission in which each 8-bit data byte is converted to a 10-bit transmission character. 8B/10B encoding supports continuous transmission with a balanced number of ones and zeros in the code stream and detects single bit transmission errors.
A single-byte character that consists of eight bits, which means that the code point is in the range 128 through 255. See also single-byte character.
Pertaining to software that can process character data that contains 8-bit characters. The operating system or the database server reads the eighth bit as part of the code value.
See compatibility mode.
See disk eight pack.