list of letters
This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See Protocol 1.
See Protocol 2.
See Platform for Privacy Preferences.
P3P compact policy
See platform as a service.
See process anchor block.
See private automatic branch exchange.
In SNA, a technique by which the receiving system controls the rate of transmission of the sending system to prevent overrun. See also flow control.
See pacing window.
In SNA, an indicator that signifies the readiness of a receiving component to accept another pacing group. The indicator is carried in a response header (RH) for session-level pacing and in a transmission header (TH) for virtual route pacing. See also response header.
- The path information units (PIUs) that can be transmitted on a virtual route before a virtual-route pacing response is received, indicating that the virtual route receiver is ready to receive more PIUs on the route.
- The requests that can be transmitted on the normal flow in one direction on a session before a session-level pacing response is received, indicating that the receiver is ready to accept the next group of requests.
- A collection of components that extends IBM InfoSphere DataStage capabilities.
- A component (SPACK or VPACK) that fits in the 9295 Multiple Digital Trunk Processor, or one of four XPACKs on the DTXA.
- To store data in a compact form in such a way that the original form can be recovered.
packagable software entity
A software entity that may be packaged by zero or more software entities. See also packaging relationship.
- The wrapper around the document content that defines the format used to transmit a document over the Internet, for example, RNIF, AS1, and AS2.
- In PL/SQL programming, a collection of database objects that is defined by using a CREATE PACKAGE statement and represented as a module. See also module.
- A set of tasks that a person is allowed to perform.
- A subset of a model, which can be the whole model, to be made available to the Cognos server. See also metric package.
- An installable unit of a software product. Software product packages are separately installable units that can operate independently from other packages of that software product.
- A shipping unit that may be tracked by a shipping carrier.
- A collection of catalog entries that has a SKU and may be ordered as a single item. See also bundle, stock keeping unit.
- In Java programming, a group of types. Packages are declared with the package keyword. (Sun)
- A control-structure database object produced during program preparation that can contain both executable forms of static SQL statements or XQuery expressions and placement holders for executable forms of dynamic SQL statements.
- A collection of related classes and interfaces that provides access protection and namespace management.
- Any element in project work breakdown structure (WBS) that consists of lower-level elements, for example a deliverable or summary task with all its tasks.
- In Ada language, a type of program unit that groups logically related entities, such as types, objects of those types, and subprograms with parameters of those types.
- A product or component that is specifically designed for installation by IBM Installation Manager.
- To assemble components into modules and modules into enterprise applications.
- A container that organizes artifacts into groups.
- A subset of a project that is created to make metadata available to users. Different packages can be created so different user groups can create the reports they need.
- A function that allows an application programmer to collect all the parts of an application together for distribution.
- A collection of attributes, notifications, operations, or behaviors that are treated as a single module in the specification of a managed object class. Packages can be mandatory or conditional when referenced in a definition of a managed object class.
A cache that stores package, statement, and section information required for the execution of dynamic and static SQL statements. This cache improves overall system performance by reducing invocations of the SQL compiler and the need to access the system catalogs. See also statement cache.
The description of the physical aspects for the construction of an installable unit (IU). This description includes, but is not limited to, location, package-specific file-naming guidelines, and file format (for example, JAR files).
- A group of one or more packages that are designed to work together and can be installed to one directory.
- See integrated package.
The name of an object that is created by the BIND, PRECOMPILE, or REBIND command. The object is a bound version of a database request module (DBRM). The name consists of a location name, a collection ID, a package ID, and a version ID.
packager software entity
A software entity that may package zero or more software entities. See also packaging relationship.
Statistical details about a profiled application that are grouped by package. See also instance statistics.
A function of IBM Installation Manager that licensed administrators use to create customized, installable packages of other IBM applications for use by other licensed users in the administrator's organization.
packed decimal format
Representation of a decimal value in which each byte within a field represents two numeric digits except the far right byte, which contains one digit in bits 0 through 3 and the sign in bits 4 through 7. For all other bytes, bits 0 through 3 represent one digit; bits 4 through 7 represent one digit. See also zoned decimal format.
- A unit of data transmitted over a network. Large chunks of information are broken up into packets before they are sent across the Internet.
- In data communication, a sequence of binary digits, including data and control signals, that are transmitted and switched as a composite whole. See also frame.
- The field structure and format defined in the CCITT X.25 Recommendation.
- A functional unit that enables data terminal equipment (DTE) not equipped for packet switching to use a packet-switched network.
- In X.25 communications, equipment used for connecting asynchronous (start/stop) devices to an X.25 network.
packet internet groper (PING)
In Internet communications, a program that is used in TCP/IP networks to test the ability to reach destinations by sending the destinations an Internet Control Message Protocol (ICMP) echo request and waiting for a reply.
- The packet format and control procedures for exchange of packets containing control information and user data between data terminal equipment (DTE) and data circuit-terminating equipment (DCE).
- A part of X.25 communications that defines the protocol for building logical connections between two DTEs and for moving data on these connections. See also data link level, physical level.
packet level interface
In packet mode operation, the level of the interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) associated with the exchange of data and signals contained in packets.
packet major node
In VTAM, a set of minor nodes representing resources, such as switched virtual circuits and permanent virtual circuits, attached through an X.25 port. See also major node.
packet mode operation
See packet switching.
- An interconnecting set of switching nodes that enables subscribers to exchange data using standard protocol and packet-switching technology. This type of network carries messages divided into packets over circuits that are shared by many network users.
- A communications network that uses packets to send data.
packet-switched data transmission service
A user service that transmits and, if necessary, assembles and disassembles data in the form of packets. See also circuit-switched data transmission service.
packet switched public data network (PSPDN)
A public data network established and operated by network common carriers or telecommunication administrations for providing packet-switched data transmission.
- A specified number of packets that can be sent by the DTE before it receives an acknowledgment from the receiving station.
- The maximum number of consecutive data packets that are allowed to flow between a data terminal equipment (DTE) and a data circuit-terminating equipment (DCE) before an acknowledgment is received for a given logical channel.
In AIXwindows and Enhanced X-Windows, the grouping of child objects within a parent container object. If the child objects are closely packed, the common distance between their borders is minimal; if they are loosely packed, the common distance border-to-border is maximized.
A printed document containing a list of all the products in a given release. Typically, this document also contains the ship-to address, shipping carrier information, and sometimes pricing information. See also release.
See packet assembler/disassembler.
- A device used to introduce transmission loss into a circuit. It can be inserted to introduce loss or match impedances.
- To fill unused positions in a field with dummy data, usually zeros or blanks.
A character used to fill empty space. For example, in a database application, a field that is ten characters in length that has the word "file" in it contains four text characters and six pad characters
See process access group.
- A node in a portal that can contain content in addition to labels and other pages. Pages can contain child nodes, column containers, row containers, and portlets.
- A unit of storage equal to 512 bytes in complex instruction set computer (CISC) systems, and 4096 bytes in reduced instruction set computer (RISC) systems. A page can be moved between auxiliary storage and main storage.
- A fixed-length block of instructions, data, or both instructions and data that can be transferred between active physical memory and external page storage.
- In the graphical data display manager (GDDM) function, the picture or chart. All specified graphics are added to the current page. An output statement always sends the current page to the device.
- Part of an AFP document that is enclosed by a pair of Begin Page and End Page structured fields.
- To transfer instructions, data, or both between active physical memory and external page storage.
- In a graphical interface, a predefined display image that typically provides fields and controls that help users accomplish tasks.
- A defined unit of space on a storage medium or within a database volume.
- To move information up or down on the display.
- In Informix, the physical unit of disk storage and basic unit of memory storage that the database server uses to read from and write to a database. Page size is fixed for a particular operating system and platform.
- In a portal environment, the interface element that contains one or more portlets.
- In DB2 for Linux, UNIX, and Windows and DB2 for z/OS, a unit of storage within a table space, an index space, or virtual memory. In a table space, a page can contain one or more rows of a table. In an LOB table space, an LOB value can span more than one page, but no more than one LOB value is stored on a page.
- The information that can be displayed at one time on the screen of a display device or in a window. See also tab.
- In DB2 for IBM i, a block of storage within a table or an index.
pageable link pack area (PLPA)
An area of virtual storage containing supervisor call (SVC) routines, access methods, and other read-only system and user programs that can be shared among users of the system. See also extended pageable link pack area, modified link pack area, pageable region.
In MVS, a subdivision of the pageable dynamic area that is allocated to a job step or a system task that can be paged during execution. See also pageable link pack area.
The use of high-level builders to create page-oriented, data-driven applications easily and quickly. Web applications and portlets developed using page automation are very flexible and adapt easily to changes in data sources and data schemas.
A facility available under full-function BMS. The terminal operator invokes a transaction that communicates with the terminal in the normal way. This invoked transaction might, in turn, build pages that are (if the SEND PAGE command in the invoked transaction specified RETAIN or RELEASE) chained to the pages built by the original transaction. The operator can then retrieve pages for either transaction, for example, for comparison.
An Advanced Function Presentation (AFP) resource that defines the rules for transforming line data and XML data into Mixed Object Document Content Architecture-Presentation (MO:DCA-P) data and text controls.
To move to the information below the information currently shown on the display. See also page up.
See data map.
- A 512-byte block of main storage on a 512-byte boundary.
- In real storage, a storage location having the size of a page.
- A 4096-contiguous-byte portion of real memory that is used to hold a virtual-memory page.
In AFP Utilities, a printout format of a page in the printout format definition (PFD). By using the print format utility, the user can design the page layout by placing and repeating a predefined record layout with constant data.
An assembly property that specifies the location to forward a request, but automatically tailors that location, depending on the Multipurpose Internet Mail Extensions(MIME) type of the servlet.
The mode of operation in which a page printer can accept an entire page of data at a time from a host processor to be printed on an all-points-addressable (APA) output medium. A page can consist of text, images, overlays, and page segments. See also compatibility mode.
See logical page origin.
An electronic overlay that can be invoked for printing and positioned at any point on the page by an Invoke Page Overlay structured field in the print data. See also medium overlay.
The area in the shared memory segment from which buffers are allocated for data that is read from or written to disk. Page pool size is one of the file manager startup configuration parameters.
- In AFP support, any of a class of printers that accepts composed pages, constructed of composed text and images, among other things. See also line printer.
- A device that prints one page at a time
Page Printer Formatting Aid/370
An IBM licensed program with which to create and store form definitions and page definitions, which are resource objects used for print-job management. These stored objects are used to format printed output.
An AFP resource object containing text, image, graphics, or bar code data that can be positioned on any addressable point on a page or an electronic overlay. See also segment.
- A VSAM data set used when WebSphere MQ for z/OS moves data (for example, queues and messages) from buffers in main storage to permanent backing storage (DASD).
- In Report Studio, a set of one or more designed pages which repeat in the report output for each instance of a chosen query item. See also set.
- A table space or index space that consists of a collection of VSAM data sets. See also table space.
pages per side
See multiple up.
To move to the information above the information currently shown on the display. See also page down.
- The process of transferring instructions, data, or pages between real storage and external page storage.
- A technique in which blocks of data, or pages, are moved back and forth between main storage and auxiliary storage. Paging is the implementation of the virtual storage concept.
In capacity planning, a number that indicates the amount of paging performed by a transaction in a workload. The higher the number, the more page faults generated. This number is not the number of page faults, but a representation of the total amount of paging.
In capacity planning, a value used to determine the effects of pool size changes. The greater the paging exponent, the greater the change to synchronous reads (page faults) as memory size changes.
- Area of nonvolatile storage used to hold portions of the shared memory partition's logical memory that are not resident in the shared memory pool.
- Disk storage for information that is resident in virtual memory but is not currently being accessed.
In Business Graphics Utility and the GDDM function, data that is specified so that every X value has only one Y value associated with it. See also nonpaired data.
A movement of the tongue toward the roof of the mouth, producing a slight "y" sound. In Russian and many other Slavic languages, this process is represented with a "soft sign," which resembles a lowercase letter "b."
- The location for building customized components and parenting them with other components. Subsequently, components can be reused by copying and moving them to other interfaces.
- A range of graphically displayed choices, such as colors or collections of tools, that can be selected in an application.
A distributed print system developed by MIT's Project Athena with participation from Digital Equipment Corporation (DEC), International Business Machines (IBM), and Hewlett-Packard (HP). It is a reference implementation for the OSI Document Printing Application (DPA) standard (ISO/IEC 10175).
See personal area network.
Panel Definition Markup Language (PDML)
A tag language that defines a language for describing user interface elements and layouts. PDML is based on the Extensible Markup Language (XML). PDML files are used with the Graphical Toolbox components within the IBM Toolbox for Java licensed program to simplify the construction of user interfaces within Java.
- The action of progressively translating an entire display image to give the visual impression of lateral movement of the image.
- In computer graphics, the viewing of an image that is too large to fit on a single screen by moving from one part of the image to another.
See participant adapter parameter list.
In the Procedure Division of a COBOL program, a name followed by a period and a space and by zero, one, or more sentences. In the Identification and Environment Divisions, a header followed by zero, one, or more statements.
Pertaining to concurrent or simultaneous operation of two or more devices or to concurrent performance of two or more activities in a single device. See also serial.
parallel access volume (PAV)
In ESS, a function that enables z/OS systems to make multiple concurrent accesses to a single volume from a single host. See also I/O Priority Queueing, multiple allegiance.
An activity that is being executed at the same time as another, within the same process instance. During the time that the two activities are both running, they are said to be executing in parallel.
A channel having a System/360 and System/370 channel-to-control-unit I/O interface that uses bus-and-tag cables as a transmission medium. See also ESCON channel.
parallel database query (PDQ)
SQL queries made in parallel rather than sequential order. The tasks that a query requires are distributed across several processors. This type of distribution enhances database performance.
The component of the InfoSphere Information Server engine that runs parallel jobs. See also node.
In the context of MVS multitasking and the C Multitasking Facility, those portions of a program that can run independently of the main task program and each other. Subtasks run the parallel functions.
- A form of I/O processing in which DB2 for z/OS initiates multiple concurrent requests for a single user query and performs I/O processing concurrently (in parallel) on multiple data partitions.
- The process of reading from or writing to two or more I/O devices at the same time to reduce response time.
- The state of a computer program in which parts of the program can be concurrently executed.
- The ability to perform multiple database operations at the same time.
parallel processing platform
A parallel-processing platform is a set of independent computers that operate in parallel and communicate over a high-speed network, bus, or interconnect. See also symmetric multiprocessing system.
- In SNA, two or more concurrently active sessions between the same two logical units. Each session can have different session parameters.
- Two or more concurrently active sessions between the same two network addressable units using different pairs of network addresses or local-form session identifiers. Each session can have independent session parameters.
- A single intersystem link that can carry multiple independent sessions. Parallel sessions are supported by CICS intersystem communication (ISC).
In the context of MVS multitasking and the Fortran Multitasking Facility, those portions of a program that can run independently of the main task program and each other. The parallel subroutines run in MVS subtasks.
- A sysplex that uses one or more coupling facilities.
- A set of z/OS systems that communicate and cooperate with each other through multisystem hardware components and software services to process customer workloads.
The execution unit that is dynamically created to process a query in parallel. A parallel task is implemented by a z/OS service request block. See also originating task.
- A value or reference passed to a function, command, or program that serves as input or controls actions. The value is supplied by a user or by another program or process. See also configuration file, input parameter, keyword, operand, routine signature.
- An entity that enables job instance-specific values to be substituted in job and job stream scripts, either from values in the database or at run time. Parameters cannot be used when scripting extended agent jobs.
- In the Reusable Asset Specification (RAS), an extension point that is viewed on a collaboration. The parameter can have type and default value information as part of its description. See also parameterized collaboration.
- In UML modeling, a specific argument that passes information between behavioral features of models, such as operations.
A connection that satisfies a parameter of an action or method by supplying either a property's value or the return value of an action, method, or script. The parameter is always the source of the connection.
The description of a value that a function receives. A parameter declaration determines the storage class and the data type of the value. See also argument declaration.
A collaboration that has one or more parameters. See also parameter.
A cursor with a result set defined by a set of user-specified parameters and a query that references the parameters. When the cursor is opened, the parameter values and the query are used to generate the cursor result set. See also cursor.
A list of values that provide a means of associating addressability of data defined in a called program with data in the calling program. It contains parameter names and the order in which they are to be associated in the calling and called program.
parameter manager domain
Major component of CICS providing a facility to inform CICS domains of system parameters during CICS initialization. These parameters are specified in the system initialization table (SIT), as temporary override parameters read from the SYSIN data stream or specified interactively at the system console. It also provides an operator correction facility for incorrectly specified system initialization parameter keywords early in CICS initialization.
An interface map that is one level deeper than operation mappings because it maps the parameters in the source operation to the parameters in the target operation. There are five types of parameter mappings: move, map, extract, Java, and assign.
In the statement string of a dynamic SQL statement, a placeholder that represents a value that will be provided by the application program. The value of a parameter marker is provided on the EXECUTE or OPEN statement associated with the dynamic SQL statement. A parameter marker can be used where a host variable might be used if the statement string were a static SQL statement. A parameter marker is either a question mark (?) or a colon followed by a name (:name). See also host variable, typed parameter marker, untyped parameter marker.
In NetDA/2, the set of restrictions that affect only the output of a network design. A change in a parameter value does not change the input to the network design. See also constraint.
- In AIXwindows and Enhanced X-Windows, a graphical object that controls one or more smaller graphical objects attached to it. The smaller graphical objects are called children, and they are automatically deleted when their parent is deleted.
- In a hierarchy or auto-level hierarchy, a member that has one or more child members at the level immediately below.
- In Ada language, the associated specification of a package body or subprogram body. The parent of a subunit is the body in which it was declared.
- Pertaining to a secured resource, either a file or library, whose user list is shared with one or more files or libraries.
- A process that has spawned a child process using the fork primitive. See also child.
- An activity whose processing results in the launching of a child activity. For example, a procedure becomes a parent activity as it opens a cursor, which becomes the child activity. See also child activity.
- An activity that starts another activity, its child.
A category that contains other categories in a hierarchy. See also child category.
A schema that has a single table per dimension with each row in the table representing a member from the dimension, together with its parent. The table may or may not have a column that identifies the level of each member. A variant of this schema uses one table for all dimensions and has an additional column to identify the dimension. See also metadata schema.
A class from which another class inherits instance methods, attributes, and instance variables. See also abstract class.
The directory one level above the current directory. An object's parent directory is the directory that contains the names and controlling information for the object. If the object is named in more than one directory, it has multiple parent directories.
A list of columns in the parent table that relate to corresponding columns in the child table. See also child expression.
The file in a constraint relationship that contains the parent or primary key. See also dependent file.
- A primary key or unique key that is used in a referential constraint. The values of a parent key determine the valid values of the foreign key in the constraint.
- A field or set of fields in a database file that must be unique, ascending, and may or may not contain null values. The parent key may be the same as the primary or unique key.
For explicit hierarchical locking, a lock that is held on a resource that might have child locks that are lower in the hierarchy. A parent lock is usually the table space lock or the partition intent lock. See also child lock.
The node that contains the current node. See also child node.
For subscriptions or recurring orders a parent order contains one or more child orders. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues.
- A process that is created to carry out a request or set of requests. The parent process, in turn, can create child processes to process requests for the parent.
- A process that contains a subprocess.
parent process ID (PPID)
An attribute of a new process identifying the parent of the process. The parent process ID of a process is the process ID of its creator for the lifetime of the creator. After the creator's lifetime has ended, the parent process ID is the process ID of an implementation-dependent system process.
parent resource group
A resource group on which a child resource group depends for certain application services. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also child resource group, dependent resource groups.
A row that has at least one dependent row. See also dependent row.
In the software knowledge base, the product that contains a version, or the version that contains a release, or the release that contains a variation. See also software hierarchy, software knowledge base, variation, version.
parent table space
A table space that contains a parent table. A table space containing a dependent of that table is a dependent table space. See also dependent.
The state of being either even-numbered or odd-numbered. See also parity bit.
A binary digit added to a group of binary digits to make the sum of all the digits either always odd (odd parity) or always even (even parity). See also parity.
A transmission error that occurs when the received data does not have the parity expected by the receiving system. This error is usually caused by the sending and receiving systems having different parity settings.
- To break down a string of information, such as a command or file, into its constituent parts.
- To process an SQL statement to return the result set of columns as written in the SQL statement. See also prepare.
- A program that interprets user input and determines what to do with the input.
- A module used to break down a document into its component parts and to construct a document from its component parts.
- A program that interprets documents that are added to the enterprise search data store. The parser extracts information from the documents and prepares them for indexing, search, and retrieval.
In enterprise search, a service that feeds the parser service with documents. There is one parser driver for each collection. A collection¡¯s parser driver service corresponds to the collection's parser in the enterprise search administration console.
- In VisualAge RPG, a self-contained software object consisting of a set of external features that allow the part to interact with other parts. The parts on the VRPG palette can be used a templates to create controls.
- See object.
partial-file recall mode
A recall mode that causes the hierarchical storage management (HSM) function to read just a portion of a migrated file from storage, as requested by the application accessing the file.
partially bound binding handle
In DCE Remote Procedure Call (RPC), a server binding handle that contains an incomplete server address lacking an endpoint. See also endpoint map service.
partially meshed network
A network in which some, but not all, routing and switching points are directly connected to every other routing or switching point. See also fully meshed network.
The matching of a credit payment with a credit advice while leaving open the possibility of matching additional credit payments with the same advice. See also full matching, matched credit.
A partial set of information about queue managers in a cluster. A partial repository is maintained by all cluster queue managers that do not host a full repository. See also full repository.
- An application that either initiates a transaction or receives a request on behalf of a transaction.
- A person who has the capability to participate in, or attend, a meeting or event.
- An entity other than the commit initiator that takes part in the commit process.
- A business entity (such as a company, company division, or a customer) or a business role (such as a buyer or a seller) that controls or is responsible for a business process.
- A member of a portal place who can visit and use the place. By default, all portal users are participants in public places. See also place designer, place manager.
- In Enterprise Replication, the data (database, table, and columns) to replicate and the database servers to which the data replicates.
- An individual who has an interest in the project but does not perform an active role, for example, a sponsor or a stakeholder.
- A user or group assigned to process work at one or more steps in a workflow.
A component of a relationship definition that describes an entity that participates in the relationship. This entity is either attributes in a business object or simple data. Participant definitions are stored in the repository.
In Fibre Channel technology, a mode in which a loop port (L_port) in a loop has a valid arbitrated loop physical address (AL_PA) and can arbitrate, send frames, and retransmit received transmissions. See also loop port, nonparticipating mode.
- On a personal computer hard disk, one of four possible storage areas of variable size; one may be accessed by DOS and each of the others may be assigned to another operating system.
- A logical division of storage on a fixed disk. See also subcapacity, virtualization.
- A subset of a HALDB that has the capacity of a non-HALDB database and that can be administered independently.
- A portion of a page set. Each partition corresponds to a single, independently extendable data set. Partitions can be extended to a maximum size of 1, 2, or 4 gigabytes, depending on the number of partitions in the partitioned page set. All partitions of a given page set have the same maximum size.
- In BMS, an addressable subset of a display device's internal resources, consisting of a fixed part of the device's screen, and a fixed part of its internal storage. See also presentation space, viewport.
- A named fragment of a table or index.
- In activity diagrams, a rectangular, uniquely named grouping that shows activity nodes and edges that have common characteristics. Partitions provide a view of the behaviors in an activity diagram, but do not affect the control flow or object flow.
- A group of cells in a decision table that are in the same condition column and have a common cell immediately to the left.
- A subset of the active cluster nodes that result from a network failure. Members of a partition maintain connectivity with each other.
- Part of a display used as the viewport, its associated window, and its display data buffer when in partitioned state.
- In basic N_UP printing, the division of the medium presentation space into a specified number of equal-sized areas in a manner determined by the current physical medium.
- A replicated part of a home database that contains modules that can be edited or viewed in any Rational DOORS database and then returned to the home database.
- To divide a type into subtypes that are mutually exclusive.
- In architecture, a subset of classifiers or packages at the same level of abstraction. A partition represents a vertical slice through an architecture, whereas a layer represents a horizontal slice.
partition-by-growth table space
A table space whose size can grow to accommodate data growth. DB2 for z/OS manages partition-by-growth table spaces by automatically adding new data sets when the database needs more space to satisfy an insert operation. See also range-partitioned table space, universal table space.
A join where all of the rows that are joined are in the same database partition. See also collocated join.
A specification of the modules to be included in a partition file. It defines the access that is allowed to each module in the partition, and the access that is allowed to the attributes and views in each of those modules.
partition descriptor block (PDB)
A collection of partition descriptor entries representing a partition set. An intermediate text block (ITB) for the PDB is created by the MFS Language Utility. This PDB ITB is used in creating a part of the device output format (DOF).
An unformatted dump of the entire CICS partition. It is produced by CICS from within the partition without operating system assistance. See also dump.
The allocation of partitioned data sets (PDSs), partitioned data sets extended (PDSEs), UNIX file directories, or any combination of these such that the basic partitioned access method (BPAM) retrieves them as a single data set. See also data set concatenation.
partitioned data set (PDS)
A data set on direct access storage that is divided into partitions, called members, each of which can contain a program, part of a program, or data. See also component PDSE, sequential data set.
partitioned data set extended (PDSE)
A data set that contains an indexed directory and members that are similar to the directory and members of partitioned data sets (PDSs). See also library.
partitioned emulation programming extension (PEP extension)
A function of a network control program that enables a communication controller to operate some telecommunication lines in network control mode while simultaneously operating others in emulation mode.
partitioned table space
A table space that is subdivided into parts (based on index key range), each of which can be processed independently by utilities. See also universal table space.
- The process of forming multiple physical partitions from one processor complex.
- The division of a machine's computing resources into independent subsystems with processor, memory, and I/O resources dedicated to the exclusive use of a subsystem. This division allows multiple operating systems to run concurrently in the subsystems.
- A technique whereby infrequently used columns can be stored in separate, but linked, tables.
- Dividing the resources in a tape library (tape drives and tape volumes) among multiple systems, sysplexes, or both, for their exclusive use. Each partition can be viewed as a logical library with each logical library (TCDBplex) represented by one tape configuration database (TCDB).
- See fragmentation.
See distribution key.
See distribution map.
- In BMS, a group of partitions designed to share the same screen. CICS must load the whole partition set onto a terminal before it can communicate with any of the partitions.
- All of the partitions which are defined in the partition descriptor block.
- In distributed processing, any one of the separate communicating parts of an application. In CICS intercommunication, a transaction communicating with a remote transaction or system. A CICS program using the SAA communications interface requires a local PARTNER resource definition for its remote partner.
- In data communications, the remote application program or the remote computer.
In WebSphere Commerce, a designation for business partners that assigns them a set of entitlements and privileges. For example, a manufacturer can assign resellers a designation of Gold, Silver, or Bronze, based on their success in selling the product line, or their volume of sales.
See partner logical unit.
For logical unit (LU) 6.2, a three-flow exchange between two LUs with each LU using an LU-LU password and the Data Encryption Standard (DES) algorithm. The three-flow exchange is the LU-LU verification.
A profile that includes information about the partner such as its name, its business identifier, such as a DUNS number, and a list of user IDs authorized to access the Community Console. See also Data Universal Numbering System.
partner queue manager
See remote queue manager.
In Metro Mirror or Global Mirror operations, the relationship between two clustered systems. In a clustered-system partnership, one system is defined as the local system and the other system as the remote system.
partner table (PT)
In MERVA Link, the table that defines how messages are processed. It consists of a header and different entries, such as entries to specify the message-processing parameters of an ASP or MTP.
See partner transaction program.
partner transaction program (partner TP)
The transaction program engaged in an APPC conversation with a local transaction program. See also local transaction program.
In VisualAge RPG, a collection of views and models used in building additional parts for an application. Application programmers can add parts to the palette for use in defining applications or other parts.
See program automatic storage area.
- A test is deemed to pass if its actual result matches its expected result. (ISTQB)
- The status of a test when the actual results match the expected result.
pass by reference
In programming languages, one of the basic argument passing semantics where the address of the object is passed. Any changes made by the callee to the argument value will be reflected in the calling routine at the time the change is made.
pass by value
In programming languages, one of the basic argument-passing semantics in which the value of the object is passed. Any changes made by the callee to the argument value will not be reflected in the calling routine.
In enterprise beans, the process of transferring an enterprise bean from memory to auxiliary storage. (Sun) See also activation.
A gateway that does not exchange routing information. Its routing information is contained indefinitely in the routing tables and is included in any routing information that is transmitted. See also active gateway.
In TCP/IP, the state of a connection that is prepared to provide a service on demand. See also active open.
Session-based information, stored and encrypted in Content Manager memory, regarding authenticated users. A passport is created the first time a user accesses Cognos 8, and it is retained until a session ends, either when the user logs off or after a specified period of inactivity.
See display station pass-through.
- A mode through which SQL statements can be submitted directly to a data source.
- The mode through which VM display station users interactively access a VM system, including the one to which the terminal is attached.
In RACF secured sign-on, a dynamically generated, random, one-time-use, password substitute that a workstation or other client can use to sign on to the host rather than sending a RACF password across the network.
In computer and network security, a specific string of characters used by a program, computer operator, or user to access the system and the information stored within it. See also authentication, compound password, simple password.
Password Authentication Protocol (PAP)
A type of authentication where the user name and password are transmitted in an unencrypted form. This is a more basic form of authentication than Challenge Handshake Authentication Protocol (CHAP). See also Challenge Handshake Authentication Protocol.
password phrase envelope
A policy that governs frequency of password change and password strength. See also application policy.
- The use of system definition macros and security maintenance utility control statements to restrict the use of IMS resources (databases, application programs, physical and logical terminals, transactions, and commands) to a person or persons who can supply the correct password.
- The process of requiring a user to enter a password to log in to a system.
An process that, when specified, automatically updates associated user IDs in a peer user ID association when a password is changed. See also automatic password direction.
- A parametric bicubic surface.
- A piece of code added to vendor software in order to fix a problem, as an immediate solution that is provided to users between two releases. Typically, patches can be downloaded over the Internet from vendors websites.
A length of cable with data connectors at both ends; it is normally used to interconnect two sections of building cable at a distribution panel or to connect a product to the building cable.
- In a network environment, the route between any two nodes.
- A route that the flow can take through the activities in a process. There may be several alternative paths.
- In OSI, a description of how a local line or line set can be used for outbound communications.
- The route through a file system to a specific file. See also explicit route, route extension, virtual route.
- A sequence of consecutive nodes leading from one node to another using the links of the graph.
- In VTAM, the intervening nodes and lines connected a terminal and an application program in the host processor.
- The series of transport network components (path control and data link control) that are traversed by the information exchanged between two network accessible units.
- In VSAM, a named logical entity that is composed of one or more clusters and provides access to the records of a base cluster either directly or through an alternate index.
- The part of the URL which points to the location of an Internet resource.
- In DL/I, the chain of segments within a record that leads to the currently-retrieved segment. The formal path contains only one segment occurrence from each level, from the root down to the segment for which the path exists.
- An object that defines a one-to-one relationship between a source and a destination. Using the path, the source accesses the destination. Data can flow from the source to the destination, and back. An example of a source is a data mover (such as a network-attached storage [NAS] file server), and an example of a destination is a tape drive.
- In the NetView/PC program, a complete line in a configuration that contains all of the resources in the service point command service (SPCS) query link configuration request list.
- In SNA, the set of data links, data link control layers, and path control layers that a path information unit travels through when sent from the transmission control layer of one half-session to the transmission control layer of another half-session.
path control network
See transport network.
- In ESA/390 architecture, a set of channel paths that are defined to a control unit as being associated with a single logical partition (LPAR). The channel paths are in a group state and are online with the host. See also logical partition.
- A collection of equivalent paths. Storage devices may have one - n path groups.
path group identifier
The ESA/390 term for the identifier that uniquely identifies a given logical partition (LPAR). The path-group identifier is used in communication between the LPAR program and a device. It associates the path-group identifier with one or more channel paths, thereby defining these paths to the control unit as being associated with the same LPAR.
- In SNA, the smallest amount of data that the system sends out on a communications line, consisting of a transmission header followed by a basic information unit or a basic information unit segment.
- In z/OS Communications Server, data sent by the host according to the definition of the VPACING parameter that determines how many messages can be sent in a session to the z/OS Communications Server application by another SNA logical unit without requiring that an acknowledgment be sent.
- The name of an object in the integrated file system. Protected objects have one or more path names.
- A name that specifies all directories leading to a file plus the file name itself.
In OSI, a set of paths grouped by the similarity of their requirements. OSI Communications Subsystem requires that each line be assigned to a line set. If the line is to be used for outbound communications, then its associated line set must be assigned to a path set. A line that is not assigned to a path set (through a line set) can be used only for inbound communications.
An attack technique that alters a document or resource location requested in a URL and forces access to files, directories, and commands that reside outside the web document root directory.
- A method of describing text to be identified, using one or more regular expressions.
- A reusable solution that encapsulates a tested approach to solving a common architecture, design, or deployment task in a particular context. See also micropattern.
- A process that is used to group data into manageable pieces.
- In REXX, the parts of a parsing template that allow a string to be split by literal pattern or positional pattern. Parentheses may be supplied to create a variable pattern.
- A sequence of characters used either with regular expression notation or for path name expansion, as a means of selecting various characters strings or path names, respectively. The syntaxes of the two patterns are similar, but not identical.
The implementation of a pattern, consisting of a pattern instance project and one or more regular WebSphere Message Broker projects that implement the pattern. A pattern instance is generated by providing appropriate customization values to the parameters available in the pattern.
pattern instance project
A project that contains project references to all other projects in the workspace, relating to a specific pattern instance. A pattern instance project also contains a pattern instance configuration file that stores the pattern parameter values.
A collection of interrelated patterns that combine to solve a problem and that, together, may be viewed as a single pattern. Specifically these contained patterns are templates, each of which share some of the same context as defined by the pattern language.
See wildcard character.
Groups of regular expressions that are composed of special pattern-matching characters. Pattern strings can be used in addresses to specify lines and, in some subcommands, portions of a line.
An abstract class in the content meta-model, which is a special kind of pattern that contains other reusable solutions. It is through the aggregation relationship between the pattern system and the pattern that the meta-model supports granularity, abstraction and scaling of asset size and complexity. A pattern system is a solution to a recurring problem in a given context that can contain other such solutions.
The mode of operation in which all host commands that require movement of cartridges are queued until the library is returned to automated mode. Paused mode allows the operator to enter the enclosure area while the robot is not operating to correct a problem, add cartridges to the bulk input station, or remove cartridges from the bulk output station.
See parallel access volume.
- The tongue of a ratchet.
- A pivoted tongue or sliding bolt adapted to fall into notches on a machine to permit motion in only one direction.
- In WebSphere Commerce Payments, a merchant's request of a financial institution to approve all or part of an order. In many cases, all the money authorized for collection by an order will be collected in a single payment. Some payment systems allow the money authorized in one order (that is, one set of payment instructions) to be collected in multiple payments, depending on the business model.
- A transfer of funds (credit or debit) between banks.
In WebSphere Commerce, a financial operation that is associated with a payment instruction. For example, approve (authorize), reverse approval, deposit (capture), reverse deposit, refund, and validate are payment actions.
payment action rule
See payment rule.
In WebSphere Commerce, the instance of a payment method with the details necessary to perform payment actions. For example, if a payment method name is CardBrandX, then the payment instruction consists of CardBrandX, plus the cardholder name, billing address, account number, and expiration date.
Payment Plug-in Controller
In WebSphere Commerce, the software layer that coordinates and delegates payment requests to the payment plug-ins. The Payment Plug-in Controller interacts with WebSphere Commerce Payments through the WCPayments plug-in.
In WebSphere Commerce, the conventions that govern the exchange of data between payment cassettes or plug-ins and the backend financial systems (payment service provider or payment processor). For example, VisaNet and Paymentech have different payment protocols.
In e-commerce, the electronic equivalent of a cash register that organizes and accepts payment for the goods and services selected for purchase. A payment server uses other components, such as a payment gateway and a payment management system, to complete the financial transactions.
See clearing channel.
See protected buffer pool.
See private branch exchange.
See page control area.
See purchasing card.
A proprietary transfer protocol of Tivoli Provisioning Manager for OS Deployment that delivers non-identical sets of files to several target computers using multicast. Contrast with MCAST and unicast. See also MCAST.
A data structure in an application program in which IMS puts the status of the application program's DL/I calls. See also status code.
See power control compartment.
PC double-byte encoding scheme
See IBM PC double-byte encoding scheme.
See programmable command format.
See physical channel ID.
A device that connects one or more subordinate PCI buses to a primary PCI bus. The PCI bus that is closest to the system processor is the primary PCI bus, and the subordinate buses are secondary PCI buses.
See procedure correlation identifier.
See PCI Express.
PCI Express (PCIe)
A local serial interface that provides a high-speed data path between the processor and attached devices. Unlike previous PCI implementations that used a parallel bus architecture, PCI Express uses point-to-point serial links called lanes. See also Peripheral Component Interconnect.
See Peripheral Component Interconnect-X.
A file format that is an adaptation of the Integration Exchange Format (IXF), which was specifically designed to enable the exchange of relational database structures and data. The PC/IXF file architecture maintains the independence of both the exporting and the importing database systems.
See printer control language.
See Program Call Markup Language.
See personal-computer NFS daemon.
See point of control and observation.
See program control program.
See peak cell rate.
See Perl-compatible regular expression.
See personal communication system.
PC single-byte encoding scheme
See IBM PC single-byte encoding scheme.
See program control table.
See picture exchange file.
See partition descriptor.
See personal digital assistant.
See partition descriptor block.
See possible duplicate emission.
See physical device.
The IPDS to PDF Transform function of IBM Infoprint Server for iSeries. One or more PDF files are generated from an Intelligent Printer Data Stream (IPDS), Advanced Function Presentation (AFP), or SNA character string (SCS) spooled file and then sent as email, spooled for printing, or stored in the integrated file system as a stream file. A mapping program can be used to implement intelligent routing of the PDF subsystem output. See also intelligent routing, mapping object, mapping program.
See primary delay interval.
See PSB directory.
See Programming Development Manager.
See Panel Definition Markup Language.
See public data network.
See policy decision point.
See parallel database query.
A measure of priority that determines the amount of resources that a database server allocates to process a query in parallel. These resources include memory, threads (such as scan threads), and sort space.
See partitioned data set.
See partitioned data set extended.
See protocol data unit.
See presentation data value.
See IBM product engineering.
peak cell rate (PCR)
The maximum rate at which an asynchronous transfer mode (ATM) endsystem can transmit cells into the network over the user-to-network interface (UNI). See also maximum burst size, sustainable cell rate.
- The maximum speed at which a device could operate under ideal conditions, if its designer were choosing the workload.
- The maximum rate encountered over a given period of time.
See processing engine archive.
- A general term for the corresponding node or entity with which one communicates.
- In network architecture, any functional unit that is in the same layer as another functional unit.
- A set of nodes configured for high availability. Such a domain has no distinguished or master node. All nodes are aware of all other nodes, and administrative commands can be issued from any node in the domain. All nodes also have a consistent view of the domain membership. See also management domain.
- A type of cluster domain that consists of two or more peer cluster domain nodes organized in such a way as to have one online (master) node, and one or more online or offline (standby) nodes. In a failover scenario, the peer domain cluster redistributes the workload from the failed master node to a standby node, to increase the availability. See also cluster domain node.
A requirement that is at the same hierarchical level as another requirement. Two requirements are peer requirements when they are children of the same parent. All requirements at the root level are peer requirements of one another.
In the IBM Realtime Interface Co-Processor device-driver application programming interface (API), the bus master services that are available through the IBM Realtime Interface Co-Processor Portmaster Adapter/A. These services transfer device-driver functions, such as the PeerClose function, between application programs running on the base operating system and application programs running on the IBM Realtime Interface Co-Processor adapter.
In high availability disaster recovery, the state during which the primary database ships new log pages from its in-memory log buffer to the standby database when the same log pages are written to the log disk of the primary database. See also asynchronous mode, near synchronous mode, remote catchup state, super asynchronous mode.
In a RACF data sharing group, any system to which RACF propagates a command entered by the system operator or administrator. See also coordinator system.
Peer-to-Peer Remote Copy (PPRC)
A remote-copy service that provides a synchronous copy of a volume or disk for disaster recovery, device migration, and workload migration. See also PPRC Extended Distance, remote copy, synchronous PPRC.
A replication configuration between logical tables in which updates to any table are replicated to the other tables and convergence is maintained. Peer-to-peer replication can involve two or more servers. See also multi-tier replication, update-anywhere replication.
Peer-to-Peer Virtual Tape Server (PtP VTS)
A virtual tape server (VTS) configuration in which copies of data in newly created or updated tape volumes are automatically created or updated in each of two interconnected VTSs. This dual-volume copy functionality improves data availability and data recovery, while being transparent to user applications and host processor resources.
Peer-to-Peer VTS data (PtP DATA)
A function that allows an installation or application to obtain operational mode settings and device-related information from the Peer-to-Peer Virtual Tape Server (PtP VTS) library.
See picture element.
See privacy enhanced mail.
A state between online and offline in which an object is making a transition from online to offline or from offline to online. The pend state is initiated when a pend event is sent by an online object or when an add event is sent by an offline object. See also un-pend.
- The initial state of a defined volume pair before it becomes a duplex pair. During this state, the contents of the primary volume are copied to the secondary volume.
- Pertaining to a submitted request that is awaiting processing.
pending active session
In VTAM, the state of an LU-LU session recorded by the system services control point (SSCP) when it finds both logical units (LUs) available and has sent a CINIT request to the primary logical unit (PLU) of the requested session. See also active.
pending application description
An application description that is incomplete and not ready for use in planning or scheduling. See also active application description.
The dummy occurrence created by the daily planning process to honor a dependency that has been resolved in the long-term plan, but cannot be resolved in the current plan because the input arrival time of the predecessor is not within the current plan end time.
pending tag number
A tag number for a newly created requirement in a document. See also requirement tag.
The collaboration feature that provides access to people from various contexts. People awareness lets you see references to people and contact people by name through the Sametime online status indicator. Throughout the portal, wherever you see the name of a person, you can view the online status of the person, send email, initiate a chat, or share an application via an electronic meeting. See also person link.
See partitioned emulation programming extension.
The extent of completion of a specific project activity, expressed as a percentage of the estimated total effort of duration for the activity, and entered by a team member or project manager, according to their judgment.
A description of an objective or commitment of performance. It consists of a performance class name, boundary definitions, response time definition, response time ranges, and response time percentage objectives. Sessions can be assigned performance classes.
performance class data
Detailed transaction-level monitoring data, which includes task identification information, resource request counts, CPU and dispatch times, and time spent waiting for I/O. Monitoring of performance (that is, the collection of performance class data) is activated by the MNPER system initialization parameter. See also monitoring record.
Information about the operation of a system or a network of systems that can be used to understand response times and throughputs and to predict the effects of certain system operational changes or programming changes.
See temporary error.
The determination of how well a specific system is meeting or may be expected to meet specific processing requirements at specific interfaces. Performance evaluation, by determining such factors as throughput rate, turnaround time, and constrained resources, can provide important inputs and data for the performance improvement process.
Performance Management Agent (PM Agent)
A function of the operating system that takes data collected by Collection Services, reduces the data, and sends that data to IBM for analysis. This was formerly called Performance Management for eServer iSeries.
Performance Management for System i5 (PM for System i5)
An IBM offering that takes customer system data and sends that data to IBM for analysis. IBM then returns capacity planning and performance analysis reports and graphs.
- A set of software tools used to track minute-by-minute statistics on clients, cubes, and servers.
- A function of the operating system that observes system and device activity, and records these observations in a database file.
performance monitor interface (PMI)
In VTAM, an interface that enables the collection of information about VTAM's performance and resource utilization, which, in turn, allows for an early diagnosis of problems and more efficient tuning and debugging of VTAM.
Performance data for a set of database objects that is retrieved from the database manager at a point in time. See also explain snapshot.
The established response time for transactions. See also threshold.
A description of an external and observable forwarding treatment. Routers use the per-hop behavior code points to give network traffic a certain priority. A per-hop behavior is applied to each Internet Protocol (IP) packet when differentiated services is designated. The six bits of the differentiated services code-point field designate the per-hop behavior.
- A date interval reported values are saved in, for example December 2000" to "A date interval that reported values are saved in. An example of a period is December 2000.
- A time period defined in the Tivoli Workload Scheduler for z/OS calendar.
- In a table, an interval of time that is defined by two datetime columns. A period contains a begin column and an end column. See also begin column, end column.
- The symbol ".". The term dot is used for the same symbol when referring to a web address or file extension. This character is named <period> in the portable character set. See also dot.
- A component of a schedule that divides the timeline into named intervals, such as peak, off-peak, and no service.
peripheral border node
A border node that interconnects adjacent APPN networks having different network identifiers in order to support LU-LU sessions that have one partner LU in its native network. See also extended border node.
Peripheral Component Interconnect-X (PCI-X)
An enhancement to the Peripheral Component Interconnect (PCI) architecture. PCI-X enhances the Peripheral Component Interconnect (PCI) standard by doubling the throughput capability and providing additional adapter-performance options while maintaining backward compatibility with PCI adapters. See also Peripheral Component Interconnect.
peripheral host node
A node that provides an application programming interface (API) for running application programs but does not provide SSCP functions and is not aware of the network configuration. The peripheral host node does not provide subarea node services. It has boundary function provided by its adjacent subarea.
In SNA, a link that connects a peripheral node to a subarea link. See also route extension.
In SNA, a location that uses local addresses for routing and, therefore, is not affected by changes in network addresses. A peripheral node requires boundary function assistance from an adjacent subarea node.
A scripting language that was originally designed as a tool for writing programs in the UNIX environment but has evolved to include the power and flexibility of a high-level programming language such as C. Perl is an open-source language.
Perl-compatible regular expression (PCRE)
A regular expression C library that is much richer than classic regular expression libraries. See also regular expression.
A URL that points to the same information permanently. See also hyperlink.
A basic property of transaction processing systems whereby the modifications made to data by a committed transaction must be permanent. Subsequent transactions requesting the data modified by a previous transaction must always see the new data. These changes must be preservable even in the event of a system failure.
permanent data set
A user-named data set that is normally retained for a longer period than the duration of a job or interactive session. See also temporary data set.
permanent dynamic queue
A dynamic queue that is deleted when it is closed only if deletion is explicitly requested. Permanent dynamic queues are recovered if the queue manager fails, so they can contain persistent messages. See also temporary dynamic queue.
- An error--for example, a hardware component failure--that can be corrected only by external intervention. See also temporary error, transient error.
- An error that cannot be eliminated by retrying an operation.
In OSI, an event that indicates the occurrence of an irrecoverable error--one that makes a resource unavailable or causes OSI Communications Subsystem to stop. Permanent events are logged and generate a message to the operator. See also transient event.
permanent license key
A license key that IBM issues when clients purchase an application that requires such a key. See also trial license.
A record that has been identified as having sufficient historical or other value to warrant continued preservation by the organization beyond the time normally required for administrative, legal, or fiscal purposes.
permanent virtual channel (PVC)
In asynchronous transfer mode (ATM), a predefined connection between two users that is similar to a leased line. Call setup and disconnection are unnecessary for a PVC. See also switched virtual channel.
permanent virtual circuit (PVC)
A virtual circuit that has a logical channel permanently assigned to it at each data terminal equipment (DTE). A call establishment protocol is not required. The permanent virtual circuit establishes the identity of the called party within the network services contract.
- The ability to access a protected object, such as a file or directory. The number and meaning of permissions for an object are defined by the access control list.
- Authorization to perform activities, such as reading and writing local files, creating network connections, and loading native code.
- An entitlement or privilege that governs how a user interacts with the repository, specified by role, not the individual user.
In z/OS UNIX, part of security controls for directories and files stored in the z/OS UNIX file system. Permission bits are used to grant read, write, search (just directories), or execute (just files) access to owners, or file or directory owning groups.
A 3-digit octal code or a nine-letter alphabetic code that indicates the access permission for a UNIX file. The access permissions are read, write, and execute. See also access permission.
One of the 3-character fields within the permissions column of a UNIX directory listing. The permission field indicates the read, write, and run permissions for the file or directory owner and for the group. It is used by file systems to control access.
- In Java EE, the protocol for transferring the state of an entity bean between its instance variables and an underlying database. (Sun)
- A characteristic of data that is maintained across session boundaries, or of an object that continues to exist after the execution of the program or process that created it, typically in nonvolatile storage such as a database system.
A data field that an object uses to write data to a database table after processing. See also nonpersistent column.
A cookie that is stored on a user¡¯s computer until it expires or until the user deletes the cookie. Persistent cookies are used to collect identifying information about the user, such as web surfing behavior or user preferences for a specific website.
persistent data store
A nonvolatile storage for event data, such as a database system, that is maintained across session boundaries and that continues to exist after the execution of the program or process that created it.
An environment that once created by the user may be used repeatedly without incurring the overhead of initialization and termination for each call. The environment remains available until explicitly terminated by the user.
persistent LU-LU session
See persistent session.
A message that survives a restart of the queue manager. See also nonpersistent message.
persistent node IP label
An IP alias that can be assigned to a service interface on a specified node. By assigning a persistent node IP label to a node on a network, a user has a node-bound address on a cluster network that can be used to access a specific node in the cluster for administrative purposes.
- An object that exists after the process or thread that created it has ceased to exist.
- An object whose state can be preserved beyond the ending of the process that created it. Typically, persistent objects are stored in files.
See attribute alert generator.
- An LU-LU session that z/OS Communications Server retains after the failure of a z/OS Communications Server application program. Following the application program's recovery, the application program restores or terminates the session. See also multinode persistent session.
- A session that remains active even though there is no activity on the session for a specified period of time.
- A VTAM security option for conversation-level security between two logical units (LUs) that provides a way of reducing the number of password transmissions by eliminating the need to provide a user ID and password on each attach (allocate) during multiple conversations between a user and a partner LU. The user is verified during the sign-on process and remains verified until the user has been signed off the partner LU.
- An application security mechanism that maintains lists of verified user IDs and passwords so that they do not need to be resubmitted with each access request to secure resources.
An individual authenticated by the portal and having a person record in one or more corporate directories. Persons can be members of places, public groups within the organization corporate directory, or personal groups that a user defines. See also public group.
personal area network (PAN)
Experimental IBM technology that allows information devices to communicate discreetly and synchronize with one another when in close proximity, using the human body as an antenna.
The digital certificate that a client or server gives to other clients or servers as a means of authentication. A personal certificate is usually obtained from a certificate authority.
personal communication system (PCS)
A Federal Communications Commission classification for digital wireless communication systems based on the same principles as cellular systems, but usually operating in a different frequency range and with smaller cell sizes than cellular systems.
Personal Computer Memory Card International Association (PCMCIA)
An international standards body and trade association founded in 1989 to establish a standard for connecting peripherals to portable computers.
In voice mail, a greeting recorded by a subscriber. See also system greeting.
In Sametime Connect, a group of people designated by the user as a group. A user can choose individuals from the public Directory (public group) and create personal groups, which are then stored locally. Users can add and remove people from a personal group, whereas the membership of the public group is defined by the owner of the public Directory. See also public group.
personal health record (PHR)
An electronic, universally available, lifelong resource of health information that is used by individuals to make health decisions. People own and manage their information in the PHR, which comes from healthcare providers and the individual. See also electronic health record.
personal identification number (PIN)
In Cryptographic Support, a unique number assigned by an organization to an individual and used as proof of identity. PINs are commonly assigned by financial institutions to their customers.
The process of enabling information to be targeted to specific users based on business rules and user profile information. See also customization.
In the RFQ trading mechanism, a list of attributes created by a selling organization that a buyer must use when sending an RFQ to that organization. In addition to the predefined attributes provided by the seller, buyers can specify unique attributes in designated attribute fields.
A choice that allows a user to display or change the characteristics or properties of an object. For example, a user can customize the interface by specifying how the menu bar, status area, and information area are displayed.
A reference to a person name or a group name that appears with the Sametime online status indicator. The reference lets you view the online status the person, send an email, start a chat, or share an application using an electronic meeting, among other actions shown on the person link menu. See also people awareness.
A document that contains personal information about a worker and other general information such as workflow and purchasing information. See also labor record.
A technique used to achieve realism when drawing primitives. In a perspective projection, the lines of projection meet at the viewpoint; thus, the size of a primitive varies inversely with its distance from the source projection. The farther a primitive or part of a primitive is from the viewer, the smaller it will be drawn. This effect, known as perspective foreshortening, is similar to the effect achieved by photography and by the human visual system. See also orthographic projection.
A time and activity chart that is used to plan, analyze, and monitor large programs. The chart denotes when events will happen and the relationships between activities. The chart shows all the interdependencies.
The use of a computing infrastructure that supports information appliances from which users can access a broad range of network-based services, including Internet-based e-commerce services.
A generally small and often wireless device that allows users to access information on demand from many locations. Mobile pervasive devices include personal digital assistants, smartcards, digital wireless telephones, handheld computers, and digital watches. Fixed devices such as point of sale terminals, bank machines, home entertainment centers, and airport check-in terminals can also be considered pervasive devices when they can be used to deliver a range of network-based information.
A locking strategy whereby a lock is held between the time that a row is selected and the time that a searched update or delete operation is attempted on that row. See also currently committed, optimistic locking.
- For disk storage capacity and communications volume, 1 000 000 000 000 000 bytes.
- A measure of memory or storage capacity that is 2 to the 50th power bytes or approximately a thousand terabytes.
See Predictive Failure Analysis.
See printout format definition.
See program function key.
See program function key.
See program fault management.
See physical file system.
See print format utility.
See physical general availability.
See presentation graphics feature.
See process group ID.
See Pragmatic General Multicast.
See Pretty Good Privacy.
See presentation graphics routines.
See phantom address.
See soft hyphen.
- A table row that can be read by application processes that are executing with any isolation level except repeatable read. When an application process issues the same query multiple times within a single unit of work, additional rows can appear between queries because of the data being inserted and committed by application processes that are running concurrently.
- A row of a table that is initially modified or inserted during a transaction but is subsequently rolled back.
A sound that is produced by pulling the tongue root toward the back wall of the pharynx (the back of the throat, just above the larynx, or voice box), producing a sound common in some Arabic dialects. English does not use these sounds.
- A distinct part of a process in which related operations are performed.
- A process that includes the Explore stage followed by the Test stage of a scan. See also multiphase scan.
phase alternation line (PAL)
The television broadcast standard for European video outside of France and the countries of the former Soviet Union. See also National Television Standard Committee, NTSC format.
A magnetic recording method in which each storage cell is divided into two regions that are magnetized in opposite directions; the sequence of the magnetic direction indicates whether the binary character represented is 0 or 1.
Phase I negotiation
A negotiation that establishes the protection suite for the Internet Key Exchange (IKE) messages themselves. A Phase I negotiation determines how to protect a Phase II negotiation. A Phase I negotiation is governed by key policies.
See PCI host bridge.
See partitioned HDAM.
See partitioned HIDAM.
A person who engages in a type of email fraud called phishing. See also phishing.
Email fraud in which a perpetrator sends legitimate-looking email in an attempt to gather personal and financial information from recipients. See also phisher.
A written language in which separate symbols represent vowels and consonants. Examples of phonetic languages are English, Greek, and Russian. Contrast with ideographic language. See also ideographic language.
See personal health record.
- One or more words that together form a unit that is to be searched for in the content of a document.
- An ordered set of one or more consecutive COBOL character strings that forms part of a clause or a Procedure Division statement.
See phonetic spelling.
See Personal Handy Phone System.
The embodiment of the physical arrangement of nodes in a system, the artifacts that are stored on each node, and the components and other elements that the artifacts implement. Nodes represent hardware devices such as computers, sensors, and printers, as well as other devices that support the runtime environment of a system. Communication paths and deploy relationships model the connections in the system.
In a database, a segment type that is dependent on a segment type defined at the next higher level in the database hierarchy. All segment types in a database, except the root, are physical children since each is dependent on at least the root.
- A connection that establishes an electrical circuit.
- See connection.
An ordered set of physical database records. See also logical database.
physical database record
In databases, a physical set of hierarchically related segments of one or more segment types. See also database record.
- The data model that represents the design schema for the information assets by using the relational model approach. The physical data model is typically generated from the logical data model by using the same modeling tools, although it can be reverse engineered from an existing database. A physical data model can be implemented many times. The physical data model contains design tables, design stored procedures, and physical domains.
- In DB2 data warehousing, a metadata model that represents the tables and other objects in a database.
physical data resource (PDR)
See implemented data resource.
- A file that is stored in one or more storage pools, consisting of either a single logical file, or a group of logical files that are packaged together as an aggregate. See also aggregate, logical file, physical occupancy.
- A database file that describes how data is to be presented or received from a program and how data is actually stored in the database. A physical file contains one record format and one or more members. See also logical file.
- An indexed file containing data for which one or more alternative indexes have been created.
physical general availability (pGA)
See also electronic general availability.
A component of a user-defined index over XML data. A physical index contains generated columns, which are keys that support the logical index, and it also contains the indexed document values. See also logical index.
- The lowest layer of network design as specified by the ISO Open System Interconnection (OSI) reference model. This layer is responsible for interfacing with the medium, detecting and generating signals on the medium, and converting and processing signals received from the medium and from the data link layer.
- The OSI layer that provides the mechanical, electrical, functional, and procedural means to start, maintain, and deactivate physical connections for transmissions between data-link entities.
In X.25, a standard that defines the electrical, physical, functional, and procedural methods used to control the physical connection between the data terminal equipment (DTE) and the data circuit-terminating equipment (DCE). See also data link level, packet level.
In relationship to a virtual tape server (VTS), a hardware enclosure consisting of one or more VTS libraries with each VTS being identified to the host as a separate library. Restrictions by the library manager may be set on an individual library basis or on a physical library basis, as is the case with import.
In NCP, the physical connection between NCP and an adjacent device or local area network (LAN). A single physical line, such as token-ring or frame-relay, can support multiple logical lines. See also logical line.
The actual hardware connection between two systems. See also logical link.
physical lock (P-lock)
A type of lock that DB2 acquires to provide consistency of data that is cached in different DB2 subsystems. Physical locks are used only in data sharing environments. See also logical lock.
The process of writing log records from the log buffers to the system log. See also logical logging.
physical metadata layer
In the operational metadata model, a layer that contains metadata information from the data source. It also contains query subjects that represent the imported tables and relationships between them.
The amount of space that is used by physical files in a storage pool. This space includes the unused space that is created when logical files are deleted from aggregates. See also logical file, logical occupancy, physical file.
- In COBOL, a device-dependent concept defined by the action taken by a printer when a new page is requested.
- In MFS, all or part of a logical page that is defined to be entered (input) or displayed (output) at one time. See also logical page.
- In printing, a single surface (front or back) of a form.
- A set of hardware resources, formed by partitioning, that can support a single operating system.
- The smallest unit of disk-space allocation for a logical volume. The physical partition is contiguous space on a physical volume. A fixed-size portion of a physical volume. One or more physical partitions constitute the underlying physical storage medium for a logical partition.
- Part of a central processing complex (CPC) that operates as a CPC in its own right, with its own copy of the operating system.
A single path through the I/O interconnection fabric that attaches two units. For Copy Services, this is the path from a host adapter on one ESS (through cabling and switches) to a host adapter on another ESS.
In OSI, any resource of a computer available to do work, such as the processor, main storage, or a line. See also logical resource.
See sequential data set.
physical services header (PSH)
An X.25 protocol used by IBM Systems Network Architecture (SNA) data terminal equipment (DTE). Physical services header provides address services for physically connected systems or devices. The System i family does not support PSH. See also enhanced logical link control, Qualified Logical Link Control.
With respect to data, the actual space on a storage device that is to contain data. See also logical storage.
- The component that manages and monitors the resources (such as attached links and adjacent link stations) associated with a node, as requested by an SSCP via an SSCP-PU session. An SSCP activates a session with the physical unit in order to indirectly manage, through the PU, resources of the node such as attached links. This term applies to type 2.0, type 4, and type 5 nodes only.
- In SNA, one of three types of network addressable units (NAUs). A PU exists in each node of an SNA network to manage and monitor, at the request of a system services control point logical unit (SSCP-LU) session, the resources (such as attached links and adjacent link stations) of a node. See also control point.
physical unit type (PU type)
In SNA, the classification of a physical unit according to the type of node in which it resides. The physical unit type is the same as its node type; that is, a type 1 physical unit resides in a type 1 node, and so on.
- The portion of a single unit of storage accessible to a single read/write mechanism, for example, a drum, a disk pack, or part of a disk storage module.
- A volume that has a one-to-one association with physical tape media and is used directly by z/OS applications. Physical volumes may reside in an Automated Tape Library Dataserver (ATLDS) or be kept on shelf storage either at vault sites or within the data center where they can be mounted on stand-alone tape drives.
physical volume status
A relationship between a volume and the storage management subsystem (SMS) that indicates whether a volume is managed by SMS, whether all of its data sets have an associated storage class, and whether all of its data sets are cataloged in an integrated catalog facility (ICF) catalog. A volume can be in one of three states: fully converted, partially converted, or unconverted. See also volume status.
See program isolation.
A rectangular volume around the cursor that is sensitive to picking events. If a drawing primitive draws within this volume, a pick event is reported. The width and height of the region can be set by the user. If the z-buffer is enabled, the depth of the region is the entire z-buffer.
A defined role in WebSphere Commerce that picks products from fulfillment centers and packs the products for shipping to customers. The pick packer also manages pick tickets and packing slips which are used to confirm shipment of products during order fulfillment. See also logistics manager.
A printed document containing a list of all the products required to fulfill the releases in a given pick batch. This document is used by pickers to gather the products that must be packaged and shipped for all of the releases included in the pick batch.
See Platform for Internet Content Selection.
- The smallest printable or displayable unit that can be displayed. A common measurement of device resolution is picture elements per inch.
- An element of a raster pattern about which a toned area on a photoconductor can appear.
- See process ID.
- See product identifier.
- See process identification number.
- See persistent identifier.
See Printer Inventory Definition Utility.
See program interface.
See program integrated information.
See product information management.
See personal identification number.
- One of the connectors in an adapter plug.
- An area of memory reserved for certain functions.
- Part of an electrical connection.
See packet internet groper.
A job that tracks the availability of assets and that is performed by an agent. Several ping jobs can be used to monitor the availability of any computer or subset of computers in the network.
Data that is held in cached storage control, due to a permanent error condition, until it can be destaged to a direct access storage device (DASD) or until it is explicitly discarded by a host command. Pinned data exists only when using fast write, dual copy, or remote copy functions.
- See prepare in progress.
- See RosettaNet Partner Interface Process.
- See problem isolation procedure.
- See program initialization parameter.
PIP data area
A 2000-byte data area that is associated with each prestart job. The PIP data area is used to hold program initialization parameters that are passed on the program start request to the prestart job.
- To direct the data so that the output from one process becomes the input to another process. The standard output of one command can be connected to the standard input of another with the pipe operator. Two commands connected in this way constitute a pipeline.
- An interprocess communication mechanism that connects an output file descriptor to an input file descriptor. Usually the standard output of one process is connected to the standard input of another, forming a pipeline.
- A one-way communication path between a sending process and a receiving process.
- In UNIX-based operating systems, a connective symbol used between two commands on a command line, indicating that the output from the preceding command is to be used as the input for the following command.
- A serial arrangement of processors or a serial arrangement of registers within a processor. Each processor or register performs part of a task and passes results to the next processor; several parts of different tasks can be performed at the same time.
- To start execution of an instruction sequence before the previous instruction sequence is completed to increase processing speed.
- In printers, the hardware path between the channel station or received-page station and the stacker.
- A direct, one-way connection between two or more processes.
- The component that performs name standardization, data quality management, address hygiene, and entity resolution. The pipeline also generates alerts, based on the system configurations. See also address hygiene, data quality management, entity resolution, name standardization, pipeline node.
- To perform processes in series.
- A message processing procedure that consists of one or more programs known as stages.
The physical machine that contains one or more running pipeline processes. See also pipeline.
- A unit of measurement for the width of type (or a printed character), based on the number of characters that can be set (or printed) in one linear inch; for example, 10-pitch has 10 characters per inch. Uniformly spaced fonts are measured in pitch. See also point.
- The number of characters printed per inch.
See path information unit.
- A data array in which the various elements can be moved along the X and Y axes to produce a different aggregate view.
- A table characterized by having one metric as a column dimension and all the rest of the metrics represented as row dimensions.
See picture element.
- In the X Window System, a data type to which icons, originally created as bitmaps, are converted.
- A three-dimensional array of bits. A pixel map can be thought of as a two-dimensional array of pixels, with each pixel being a value from zero to 2 to the power N -1, where N is the depth of the pixel map.
In Enhanced X-Windows, the number of bit planes used in a particular window or pixmap. For a window, a pixel value indexes a color map and derives an actual color to be displayed. A pixel is an N-bit value, where N is the number of bit planes (the depth) used in a particular window or pixmap.
See pixel map.
See public key algorithm.
See public key infrastructure.
- A virtual location that is visible in the portal where individuals and groups meet to collaborate. In a portal, each user has a personal place for private work, and individuals and groups have access to a variety of shared places, which can be either public places or restricted places. See also Lotus QuickPlace place.
- In Lotus QuickR, a space on a server in which teams can work collaboratively. Places include wikis, blogs, and functions such as calendaring, chats, discussion forums, task tracking, and so forth. See also group.
- An object, component or file that only exists to mark the position of an intended entity.
- The symbol, consisting of a single period in a REXX parsing template, that can be replaced by a value while running a REXX program. A placeholder has the same effect as a variable name, except that no variable is set.
- A variable that is replaced with a value.
A format for use in creating a place. The portal provides a set of default templates for creating various types of places. Portal administrators may allow users to create, modify, and delete new templates.
- In cryptography, any message that is not encrypted.
- See cleartext.
The autonomic manager component that structures the actions needed to achieve goals. See also autonomic manager.
planned remote takeover
In an RSR environment, a remote takeover initiated by the IMS operator as part of shutting down the IMSs at the active site in order to transfer the active IMS workload to the remote site. See also remote takeover.
planned start time
The time at which Tivoli Workload Scheduler estimates a job instance will start. This estimate is based on start times of previous instances of the job. See also earliest start time, latest start time, scheduled time.
- The combination of an operating system and hardware that makes up the operating environment in which a program runs.
- Any base of software technologies on which applications or services can be provided; for example, the Eclipse platform.
platform as a service (PaaS)
The delivery of a computing platform, including applications, optimized middleware, development tools, and Java and Web 2.0 runtime environments, as a service over the Internet.
Platform for Internet Content Selection (PICS)
A specification that enables Internet users to filter the material they encounter when they surf the web. Users can accept or reject the material according to its ratings. This specification enables parents, businesses, schools, or discerning individuals to block access to inappropriate and objectionable material.
Platform for Privacy Preferences (P3P)
The World Wide Web Consortium (W3C) specification that enables websites to define their privacy practices in a standard format. For more information, see the P3P project website (http://www.w3.org/P3P/). See also P3P compact policy.
A technique in which a history of all or part of a program is recorded. The recording allows the user to regenerate the input and output in either the forward or backward direction. This technique is used in debugging.
A policy that consists of instructions to play back a recorded transaction and collect performance data. See also record and playback.
See private loop direct attach.
A cable that is listed by the Underwriters Laboratory (UL) as having adequate fire resistance and low smoke-producing characteristics for installation without conduit in ducts, plenums, and other spaces used for environmental air, as permitted by National Electrical Code Articles 725-2(b) and 800-3(d).
A Printing Systems Manager (PSM) attribute that is used for defining the capability of a printer to support different placements of output images on a medium. For example, the plex attribute could specify whether the printer is to support simplex or tumble mode.
A service utility that can be used to manage the communication connections between multiple coordinating address spaces (CASs) and between a CAS and associated CICSPlex SM address spaces (CMASs) and CICSPlexes.
PL/I for System i
An IBM PRPQ that is a high-level language available on the server. The PL/I for System i PRPQ is capable of handling a large variety of data structures and easily allows variation of precision in numeric computation.
See physical lock.
See port login.
See pageable link pack area.
See priority level resource.
See Procedural Language SQL.
See program list table.
See primary logical unit.
Pluggable Authentication Module (PAM)
A programming interface that enables third-party security methods to be used. PAM enables multiple types of authentication, such as Kerberos and the Rivest-Shamir-Adleman (RSA) algorithm, to be used without changing login services.
- A dynamically loadable library that a DB2 database management system uses to carry out user-written actions that involve the database.
- A stage that is used to connect to data sources but that does not support parallel processing capabilities.
- A separately installable software module that adds function to an existing program, application, or interface.
A lightweight, easy-to-implement plug-in that is written in the Java (TM) programming language. Pluglets allow users to add their own specialized functionality to a product in a straightforward and simple way. The set of extensions that can be added to a product through the use of a pluglet is smaller than what can be accomplished with a plug-in. See also Core Pluglet Framework.
A prescriptive methodology for constructing, selling and deploying cross-brand software solutions that address customer business requirements incrementally using proven collateral. The collateral comprises a collection of Web-based resources including diagrams, install guides, download links, and information about prerequisites and supported product levels. This collateral is customized according to solution-specific scenarios and adoption roadmaps.
See Performance Management Agent.
A message that indicates that a preventive maintenance work order is about to become due for an asset or location. See also preventive maintenance record.
PM for System i5
See Performance Management for System i5.
See protocol-specific MPTN manager.
See Predictive Model Markup Language.
See preventive maintenance package.
See problem management record.
See purchase order.
See USB flash drive.
- A digital recording of a radio broadcast or similar program, made available on the Internet for downloading to a personal audio player. See also podcatcher, streaming.
- To publish audio files, typically in MP3 or WMA format, along with news feeds so that listeners can download them and listen to them on their computer or portable digital audio player. See also streaming.
A program used to subscribe to and download podcasts. See also podcast.
See program operator interface.
- A unit of measurement used mainly for describing type sizes. Each pica has 12 points, and an inch has approximately 72 points. See also point size.
- The second byte of a DBCS code, which uniquely identifies double-byte characters in the same ward. See also ward.
An asset whose length or measure is not integral to its maintenance, such as an airplane or a train car. See also linear asset.
The upper limit in a given interval for an attribute that is ultimately used to determine reason code assignment. Typically, this limit is used for linear and logistic models where the interaction of variables is controlled.
- A data element or variable that holds the address of a data object or a function. See also scalar.
- See reference.
- The symbol shown on a display or window that a user can move with a pointing device, such as a mouse.
- The action of lining up the mouse pointer so that the pointer lies on top of something.
- The action of positioning the pointing cursor on a displayed object.
The instantaneous copy that the FlashCopy service makes of the source volume. See also FlashCopy service.
In SQL replication, a type of replication target table whose content matches all or part of a source table, with an added column that identifies the approximate time when a particular row was inserted or updated at the source system.
point of consistency
A time when all of the recoverable data that a program accesses is consistent. The point of consistency occurs when updates, insertions, and deletions are either committed to a physical database or rolled back. See also roll back.
point of control and observation (PCO)
A specific point in the procedural flow of a test at which either an observation is recorded of the test environment, or a decision is made regarding the test's flow of control. Closely related concepts, a point of control usually requires the details of one or more points of observations to make the necessary control decision.
point of recovery
In WebSphere MQ for z/OS, a set of backup copies of WebSphere MQ for z/OS page sets and the corresponding log data sets required to recover these page sets. These backup copies provide a potential restart point in the event of page set loss (for example, page set I/O error).
In retail communications and Point-of-Sale Utility, pertaining to a method of providing information to support sales and of collecting the resulting sales information from retail devices located in stores.
In retail communications and Point-of-Sale Utility, a device that, together with the store controller, provides retail transaction, data collection, credit authorization, price information, and other inquiry and data entry functions.
The IBM licensed program that provides connectivity between the system and retail controllers. In addition, the licensed program provides file conversion capabilities through the retail file conversion system.
The height of a font in points. See also point.
- Pertaining to data transmission between two locations without the use of any intermediate display station or computer.
- Pertaining to a style of messaging application in which the sending application knows the destination of the message.
- A Fibre Channel topology that employs direct links between each pair of communicating entities. See also switched fabric.
A communication operation that involves exactly two processes or tasks. One process initiates the communication through a send operation. The partner process issues a receive operation to accept the data being sent.
A communications line that connects a single remote station to a computer. See also multipoint line.
- A network arrangement made up of point-to-point links.
- An arrangement where two devices share the same transmission line at the same time. See also multipoint line, multipoint network.
Point-to-Point Protocol over Ethernet (PPPoE)
A network protocol used to connect one or more computers to the Internet through a shared modem. The protocol is based on the common standards PPP and Ethernet.
Point-to-Point Tunneling Protocol (PPTP)
A protocol that allows for the encapsulation of data packets for one network protocol in packets used by another protocol. As a result, TCP/IP data can be transmitted over a non-TCP/IP network, which allows for secure communications over virtual private networks.
In a queue, an incorrectly formatted message that the receiving application cannot process. The message can be repeatedly delivered to the input queue and repeatedly backed out by the application.
See plain old Java object.
- A set of rules and actions that are required to be performed when certain events or status conditions occur in an environment.
- In the Backup, Recovery, and Media Services licensed program, a named or otherwise identifiable set of controls used by Backup, Recovery, and Media Services to manage and control specific operations. A policy is an overriding value that is carried in tables for use as a default in processing backup, recovery, archive, and media management operations.
- A document that sets forth high-level statements of how changes, releases, or other processes are to be managed, organized, and performed.
- A set of considerations that influence the behavior of a managed resource or a user. See also policy expression.
- A list of file-placement and service-class rules that define characteristics and placement of files. Several policies can be defined within the configuration, but only one policy set is active at one time. See also file-management policy, file-placement policy, file-placement rule.
- A set of conditions that, after they have been evaluated, determine access decisions. See also authorization policy, message protection policy.
- In QoS, the combination of rules and services. The rules define the criteria for traffic treatment, network resource access, and use.
policy administration point (PAP)
A capability that provides enterprise service-oriented architecture (SOA) policy administration capabilities, such as policy creation, modification, storage, and distribution.
A requirement, preference, or capability of a managed resource. See also Web Services Policy Framework.
A core capability of the IBM Autonomic Computing Initiative that addresses the need to simplify the management of products and complex systems. See also Policy Management for Autonomic Computing.
Policy Core Information Model
An extensible information model and XML schema that represents policy information in a vendor-independent, interoperable, and scalable manner according to the Internet Engineering Task Force (IETF) policy framework.
- A policy decision component that evaluates and determines the results an access request.
- A capability that decides, based on environmental conditions, which predefined policies in the environment should be enforced. For example, a policy decision point might use a requester identity to determine whether to limit access to a resource.
- A grouping of policy users with one or more policy sets, which manage data or storage resources for the users. The users are client nodes that are associated with the policy domain. See also active policy set, domain.
- For System Storage Archive Manager collections, a grouping of rules for the management of security, retention, and storage.
The Policy Management for Autonomic Computing graphical user interface (GUI) that is used to create, deploy, and otherwise manage policies. The Policy Editor is implemented using the Integrated Solutions Console.
- A policy decision component that receives a request, notifies the policy decision point of the request, receives a decision, and enforces the decision.
- A capability that enforces policy decisions maybe by a policy decision point. For example, a policy enforcement point would permit or deny a requester access to a resource depending on what the policy decision point determined is the correct action.
- A feature that automates the tasks that the user specifies in the policy scripting language.
- A component of Tivoli Intelligent Orchestrator that collects data and makes decisions on when to deploy servers based on defined thresholds.
policy evaluation engine
The component of a autonomic manager that selects policies, evaluates policies, and returns the decisions that are contained within policies. Because different autonomic managers can have different policy evaluation engines, more than one policy evaluation engine can exist within a policy-enabled system.
A representation of a policy. See also policy.
See policy grammar.
Policy Management for Autonomic Computing (PMAC)
The core technology of the IBM Autonomic Computing initiative that provides a standard policy definition and management infrastructure, which enables self-management capabilities and dynamic configuration of systems in an on demand environment. See also Policy-based Management.
policy privilege class
A privilege class that gives an administrator the authority to manage policy objects, register client nodes, and schedule client operations for client nodes. Authority can be restricted to certain policy domains. See also privilege class.
A group of managed resources that share one or more common policies and which model the management or organizational structure of a network computing environment. Administrators use policy regions to group similar resources, to define access to the resources, to control the resources, and to associate rules for governing the resources.
- A programming statement within a policy that defines a specific action to be performed.
- A declarative, IF-THEN statement containing the precondition, which can consist of multiple Boolean clauses, and the decision for a policy.
- A collection of assertions about how services are defined, which can be used to simplify security configurations.
- The collection of policies within a policy group that share the same decision name. See also decision name.
- A group of rules in a policy domain. The rules specify how data or storage resources are automatically managed for client nodes in the policy domain. Rules can be contained in management classes. See also active policy set, management class.
In a Tivoli environment, a policy region created or residing in another policy region. When a policy subregion is created, it initially uses the resource and policy properties of the parent policy region. The Tivoli administrator can later change or customize these properties to reflect the specific needs and differences of the subregion.
The process of ensuring that each individual policy is valid. In Policy Management for Autonomic Computing, each policy is checked to ensure that it is syntactically correct and that it references only valid sensors and effectors.
- To run a polling sequence.
- In Managed System Services, to query devices to determine operational status and to collect system data.
- To determine if any remote device on a communications line is ready to send data.
- In data communications, an interrogation that determines whether a station is ready to transmit information.
- The process whereby stations are invited, one at a time, to transmit.
- A feature that allows the Sametime Moderator to send a question to the meeting participants. The Moderator can view the results of the poll and show the results to everyone else in the meeting.
- Interrogation of devices for such purposes as avoiding contention, determining operational status, or determining readiness to send or receive data.
A list of addresses that the host system uses to control the polling of control units or devices on a BSC or SDLC multipoint line. A general polling list contains the addresses of the control units only; a specific polling list contains the addresses of the devices, which include the addresses of the control units.
In the GDDM function, a curve based on a sequence of lines. A polyfillet is a curved line that is tangent to the end points of the first and last lines and tangent to the midpoints of all other lines.
- A continuous set of lines that are created sequentially.
- In computer graphics, a sequence of adjoining lines.
An object-oriented programming characteristic that allows a method to perform differently, depending on the class that implements it. Polymorphism allows a subclass to override an inherited method without affecting the parent class's method. Polymorphism also enables a client to access two or more implementations of an object from a single interface.
- The graphical representation of a participant in a collaboration.
- In DFSMSrmm, a group of shelf locations in the removable media library whose rack numbers share a common prefix. The shelf locations are logically grouped for easier access to volumes.
- A division of main or auxiliary storage.
- A group of resources with similar characteristics and attributes.
- A container for user-defined lanes. See also lane.
- A graphical container that represents the different business entities or roles that participate in a process.
pool nondatabase faults
In Performance Tools, the total number of interruptions to jobs (not necessarily assigned to this pool) that were required to transfer data into the pool to permit the machine interface instruction to access the nondatabase data.
pool storage group
A type of storage group that contains system-managed direct access storage device (DASD) volumes. Pool storage groups allow groups of volumes to be managed as a single entity. See also storage group.
- To remove an item from the top of a pushdown list. See also push.
- The removal of a module that is immediately below the stream head.
See Post Office Protocol.
See Post Office Protocol Version 3.
See power-on reset.
- An object that connects a card to an external device.
- To modify a computer program that runs on a given system to enable it to run on a different system.
- In the Internet suite of protocols, a specific logical connector between the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP) and a higher level protocol or application.
- An end point for communication between applications, generally referring to a logical connection. A port provides queues for sending and receiving data. Each port has a port number for identification. See also node.
- The interface between a collaboration and other objects in the WebSphere business integration system. It is through a port that a collaboration object binds with a connector or with another collaboration object. See also binding.
- An access point for data entry or exit.
- A distinct interaction point between a class and its environment or between the behaviour of a class and its internal parts.
- A specific communications end point within a host. A port is identified by a port number.
- In time-slot management, one end of a 64 kbps unidirectional stream which can be attached to the SCBus.
- A hardware interface to which an I/O device is attached for the purpose of sending and receiving data.
- An abstraction that is used by transport protocols to distinguish among multiple destinations within a host machine.
- The physical entity within a host, system, or storage system that performs the data communication (transmitting and receiving) over the Fibre Channel.
- As defined in a Web Services Description Language (WSDL) document, a single endpoint that is defined as a combination of a binding and a network address.
- The ability to use Virtual Storage Access Method (VSAM) data sets with different operating systems. Volumes whose data sets are cataloged in a user catalog can be removed from storage devices of one system, moved to another system, and mounted on storage devices of that system. Individual data sets can be transported between operating systems using access method services (AMS).
- The ability of equipment to be transported manually.
- The ability of a programming language to compile successfully on different operating systems without requiring changes to the source code.
- The ability of a program to run on more than one type of computer system without modification.
Portable Application Solutions Environment
A feature of the i5/OS operating system that provides the ability to run certain UNIX applications. Programs that run in i5/OS PASE have direct access to PowerPC instructions and access to i5/OS services such as file system support and sockets support.
Portable Document Format (PDF)
A standard specified by Adobe Systems, Incorporated, for the electronic distribution of documents. PDF files are compact; can be distributed globally via email, the web, intranets, or CD-ROM; and can be viewed with the Acrobat Reader.
portable file name character set
The set of characters from which portable file names must be constructed to be portable across implementations conforming to the ISO POSIX-1 standard and to ISO/IEC 9945.
Portable Operating System Interface (POSIX)
An IEEE family of standards designed to provide portability between operating systems that are based on UNIX. POSIX describes a wide spectrum of operating-system components ranging from C language and shell interfaces to system administration.
Portable Operating System Interface for Computer Environments
See Portable Operating System Interface.
The place where portal administrators set and maintain basic collaboration permissions, place records, place membership records, and server settings for companion products for advanced collaboration.
The specialization of a service integration bus destination. Each port destination represents a particular message format and transport protocol that you can use to pass messages to an externally-hosted service.
- A container for the tasks that apply to each role that the user is assigned. The portfolio is the primary way in which a user's work is organized in the interface.
- The complete inventory of an organization's programs and projects, or both.
- A logical name used to group one or more ports (network devices or interfaces) of the same network type that can be used to reach a given end-user destination. For example, if multiple ATM adapters in the IBM Content Manager VideoCharger Server complex are connected to the same ATM networks, these adapters can be configured under the same port group. The controller selects ports as necessary to balance the load.
- A group of ports identified by the common carrier with a single DTE address. The network directs incoming calls to the first available port, using a sequential search (rotary) technique.
port login (PLOGI)
The port-to-port login process by which initiators establish sessions with targets. See also fabric login.
The process by which InterChange Server determines at runtime whether to isolate the currently running events. In its analysis, the server checks whether, among any of the collaborations, the ports are bound to the same set of connectors. If ports are bound to the same set of connectors, the server checks whether the ports bound to the same connector have the same business object type. If they do, the ports are considered to match and event isolation is required. See also event isolation.
- The part of a socket address that identifies a port within a host.
- In Internet communications, the identifier for a logical connector between an application entity and the transport service.
portrait page presentation
The position of a printed sheet that has its short edges as the top and bottom and its long edges as the sides. See also landscape page presentation.
Software that searches systems in a network for open ports. A port scan is used by administrators to check the security of a network, and by hackers or crackers to gain entry to the network.
- In time-slot management, a collection of ports that can be connected using a single CA_TDM_Connect() API call to a complementary collection of ports. An example of a port set is the transmit-receive pair corresponding to one telephony channel on a Digital Trunk Quad Adapter (DTQA).
- A set of ports on a remote target that are connected to the same switching fabric.
An element in a Web Services Description Language (WSDL) document that comprises a set of abstract operations, each of which refers to input and output messages that are supported by the web service. See also interface.
- Within a string, the ordinal position of one element of a string relative to another.
- Within an attribute, the ordinal position of one value relative to another.
- Any location in a string that may be occupied by an element and that is identified by a serial number.
- A parameter that must appear in a specified location, relative to other parameters. See also keyword parameter.
- A variable within a shell program. Positional parameters are assigned from the shell's arguments when the shell is invoked
See Portable Operating System Interface.
POSIX open system environment (POSIX OSE)
The open system environment in which the standards included are not in conflict with ISO/IEC and consist of: International Standards and Profiles, developed by ISO, IEC, or CCITT; Regional Standards and Profiles, developed by a group recognized as an official body by a regional governmental entity, such as the European Community; and National Information Technology Standards and Profiles, developed by a national standards body recognized as such by ISO, IEC, or CCITT, as appropriate.
See POSIX open system environment.
A mechanism by which a process may be notified of, or affected by, an event occurring in the system. Examples of such events include hardware exceptions and specific actions by processes. POSIX signal is also used to refer to the event itself.
possible duplicate emission (PDE)
A payment that has been identified as a possible duplicate of another payment, because the contents of certain fields or combinations of fields in both payments are identical or similar.
- See Program Operations Support Tool.
- See power-on self-test.
- In HTTP, a parameter on the METHOD attribute of the FORM tag that specifies that a browser will send form data to a server in an HTTP transaction separate from that of the associated URL.
- To add information in a record to keep that record current.
- To note the occurrence of an event.
- A message that is published in an online forum or newsgroup.
- To send a message to an online forum or newsgroup.
- In the AIX operating system, the action required to make a pop-up or pull-down menu appear. This action is normally a click or a button press on one of the mouse buttons.
- A constraint that must be true at the completion of an operation.
- Environmental and state conditions that must be fulfilled after the execution of a test or test procedure. (ISTQB) See also precondition.
- A textual description defining a constraint on the system when a use case has terminated.
One or more commands specified by the system administrator that run after the cluster manager runs a particular event script. Post-events are usually site-specific scripts integrated into the system when it is installed.
In Tivoli NetView, a daemon that directs network management information between multiple application programs and agents that are running concurrently. The postmaster determines the route by using specified addresses or a routing table that is configured in the object registration service.
Post Telephone and Telegraph Administration (PTT)
An organization, usually a government department, that provides data communication services in countries or regions other than the USA. Examples of PTTs are the Bundespost in Germany and the Nippon Telephone and Telegraph Public Corporation in Japan.
A family of IBM systems distinguished by their object-oriented architecture, integrated relational database, and high-level machine interface. Power Systems solutions support the IBM i, i5/OS, Operating System/400, AIX, and Linux operating systems. See also IBM i.
PowerHA SystemMirror configuration database
See Object Data Manager.
- A key sequence that restarts the operating system (or other program) without turning off the electrical power of the system.
- See initial microprogram load.
PowerPC Processor Element (PPE)
In the Cell Broadband Engine architecture, a grouping of multiple PowerPC Processor Units (PPUs). The PPEs perform general processing and system management tasks, such as running the operating system and applications. See also Cell Broadband Engine processor, PowerPC Processor Unit.
PowerPC Processor Unit (PPU)
A 64-bit PowerPC core processor located at the heart of the Cell Broadband Engine multiprocessor, with associated cache, and a Vector Multimedia Extensions (VMX) unit. The PPUs use the standard PowerPC instruction set. Multiple PPUs make up a PowerPC Processing Element (PPE). See also PowerPC Processor Element.
power sequence cable
A signal cable that connects the secondary racks to each other and to the primary rack in a system with more than one rack, and allow complete control of the power from the primary rack.
power system control network (PSCN)
The power subsystem of the System z servers that is controlled by a fully redundant dual-Ethernet communications network. This network provides communication to all field-replaceable units (FRUs) and hierarchical control through a mirrored system of control cards and IP addresses. The PSCN provides a means for subsystems to communicate and control the dynamic parameters of system operation. The PSCN also supports error reporting, failure data collection and recovery detection, and correction of both the internal hardware and firmware of the System z servers.
See physical partition.
See physical point of attachment.
See Page Printer Communication Component.
See presentation-layer protocol data unit.
See PowerPC Processor Element.
See program-to-program interface.
See parent process ID.
See Point-to-Point Protocol.
PPP filter identifier
A filter identifier that allows you to apply filter rules to an interface that has been defined in a point-to-point profile. The PPP filter identifier also links the filter rules to groups of users in a point-to-point profile. Because the point-to-point profile is associated with a specific IP address, the filter identifier implicitly defines the interface to which the rules apply.
See Point-to-Point Protocol over Ethernet.
See pending page queue.
See partial page rendering.
See Peer-to-Peer Remote Copy.
PPRC Extended Distance (PPRC-XD)
An optional feature for the ESS that maintains a fuzzy copy of a logical volume (LVOL) on the same ESS or on another TESS. PPRC-XD ensures that all modifications that any attached host performs on the primary LVOL are also performed on the secondary LVOL at a later time. The original order of update is not strictly maintained. See also Peer-to-Peer Remote Copy, synchronous PPRC.
See PPRC Extended Distance.
See primary power supply.
See primary POI task.
See Point-to-Point Tunneling Protocol.
See PowerPC Processor Unit.
See purchase requisition.
Practitioner Support Network (PSN)
A single point of contact in IBM for finding assets, experts, information and analyst reports, business research, project delivery issue resolution, and technical expertise and software integration support.
- A preprocessor directive that is not specified by the ISO standard. Pragmas often control actions of the compiler and linker. A pragma always begins with a number sign (#).
- A standardized form of comment which has meaning to a compiler. A pragma usually conveys non-essential information, often intended to help the compiler to optimize the program. See also directive.
See People's Republic of China.
See product requirements document.
See Preboot Dynamic System Analysis.
Preboot Dynamic System Analysis (Preboot DSA)
A system information collection, analysis, and diagnostics tool that is used by IBM service and support personnel to aid in the diagnosis of system problems.
Preboot Execution Environment (PXE)
An industry standard target/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely. PXE is based on Dynamic Host Configuration Protocol (DHCP).
- An attribute of a timestamp that describes the total number of decimal digits in the fractional seconds part of the value.
- In GL, the number of digits that are printed or displayed.
- A measure of the ability to distinguish between nearly equal values.
- An information retrieval measurement that specifies the proportion of relevant data to all retrieved data. Precision is a positive predictive value. Information retrieval is best measured by using both precision and recall. See also recall.
- An attribute of a number that describes the total number of binary or decimal digits.
- The degree of discrimination with which a quantity is stated. For example, a three-digit numeral discriminates among 1000 possibilities.
- The number of straight line segments used to approximate one segment of a spline.
To process programs that contain SQL statements before they are compiled. SQL statements are replaced with statements that will be recognized by the host language compiler. The output from a precompile process includes source code that can be submitted to the compiler and used in the bind process.
- Environmental and state conditions that must be fulfilled before the component or system can be executed with a particular test or test procedure. (ISTQB) See also postcondition.
- A constraint that must be true when an operation is invoked.
- A textual description defining a constraint on the system when a use case may start.
- A definition of what must be true when a task or process starts.
- A group of rule statements in which the user defines global variables for a decision table or decision tree and conditions that must be met before any rows or branches in the decision table or tree can be executed.
- A job or job stream that must complete successfully before successor jobs or job streams can be started. See also successor.
- An activity in a dependency relationship that logically precedes another.
Predefined Devices Object Class
Represents each device type, as determined by class, subclass, and type. The Predefined Devices Object Class contains basic information about the devices, such as device method names and how to access the information contained in the other object classes.
An element for which a matching definition exists in the message model with an appropriate set of properties and in the correct context. See also predefined message, self-defining element.
- A message for which a matching definition exists in the message model with an appropriate set of properties and in the correct context. See also predefined element, self-defining message.
- A message with a description that is created and stored in a message file before it is sent by the program. See also immediate message.
predefined prompt dependency
A prompt dependency that is defined in the database and can be associated to any job or job stream. See also prompt dependency.
A fixed value defined by IBM that has a special use in the control language and is reserved in the operating system. A predefined value usually has an asterisk (*) as the first character in the value.
- An expression used as part of a filter, consisting of a data item, an operator, and a value. A predicate is used to restrict the occasions when an event is emitted.
- A Boolean logic term denoting a logical expression that determines the state of a variable.
- An element of a search condition that expresses or implies a comparison operation.
- The part of a node test that attempts to identify a node in a path.
A lock held on index keys that qualifies for a predicate. In a predicate lock, exclusive predicates consist of a single key value, and shared predicates consist of a query rectangle and a scan operation such as inclusion or overlap.
Predictable Resource Location
An attack technique used to uncover hidden website content and functionality. The attack searches for content in standard locations that is not intended for public viewing, such as temporary files, backup files, configuration files or sample files.
A write operation that can perform a cache operation without knowledge of the existing format on the medium. All write operations on fixed-block architecture (FBA) direct access storage devices (DASDs) are predictable. On count-key-data (CKD) DASD devices, a write operation is predictable if it performs a format write operation for the first data record on the track.
- A component of z/OS that detects abnormal behavior before it results in a soft failure.
- A scheduled evaluation of system data that detects and signals parametric degradation which might lead to functional failures.
Predictive Model Markup Language (PMML)
An XML-based language defined by the Data Mining Group that provides a way for companies to define predictive models and share models between compliant vendors' applications.
In WebSphere MQ, a shutdown of a queue manager that does not wait for connected applications to disconnect, or for current MQI calls to complete. See also immediate shutdown, quiesced shutdown.
One or more commands specified by the system administrator that run before the cluster manager runs a particular event script. Pre-events are usually site-specific scripts integrated into the system after it is installed.
A set of console user preferences that can be assigned to roles. A preference profile contains settings that determine the state of the navigation area and the views available for members of the role.
See preferential closed user group.
The primary computer used by an application running under Microsoft Cluster Server control. After a failover to another computer, MSCS monitors the preferred computer until it is repaired, and as soon as it is running correctly again, moves the application back to it.
The currency indicated by a customer as the one in which he or she would prefer to see prices. The preferred currency is indicated in the customer profile. See also shopping currency, supported currency.
The language indicated by a customer as being the one in which he or she would like to conduct transactions. The preferred language is indicated either in the customer profile or by use of the langId parameter, which is available from the URL-based controller commands. See also shopping language.
preferred primary cluster caching facility
The cluster caching facility that the cluster manager attempts to start as the primary cluster caching facility when a DB2 pureCluster instance is started. See also cluster caching facility, primary cluster caching facility.
preferred transport class
In OSI, a transport class that an application entity initially requests during association establishment. See also alternative transport class.
- An affix that appears at the beginning of a name. For example, in the family name "de Rosa," the affix "de" is a prefix.
- A code at the beginning of a message or record.
A process by which an environment or library is initialized once and can then be used repeatedly to avoid the inefficiency of initializing the environment or library each time it is needed.
A utility that preprocesses an object for certain programs. See also binder.
A file that has been copied to storage, but has not been replaced with a stub file on the local file system. An identical copy of the file resides both on the local file system and in storage. Premigrated files occur on UNIX and Linux file systems to which space management has been added. See also file state, migrated file.
premigrated files database
A database that contains information about each file that has been premigrated to storage. The database is stored in a hidden directory named .SpaceMan in each file system to which space management has been added.
To open a DEDB area after the first checkpoint following IMS control region initialization or during /START AREA command processing. If an area is not preopened, it will be opened during the first read request for the area.
- To convert EGL-generated source code into an executable program.
- To convert an SQL statement or XQuery expression from text form to an executable form, by submitting it to the SQL and XQuery compiler.
- To send an SQL query to the database, to verify that it is syntactically correct, and return the result set columns. See also parse.
- To convert an SQL statement from text form to an executable form. See also program preparation.
prepare in progress (PIP)
The prepare in progress logical unit of work (LUW) state indicates that the current LUW is preparing its resources to commit. A failure during PIP state results in a rollback.
preprocessing exit program
An exit program that performs preprocessing when an operation is requested against an exit point. An example of a preprocessing exit program is the Preprocessing Exit Program for Add.
- A routine that processes source code before the code is compiled, resulting in altered source code.
- In emulation, a program that converts data from the format of an emulated system to the format accepted by an emulator.
- A routine that performs initial processing and translation of source code or data prior to compiling the source code or processing the data in another program such as an emulator.
A high-level plan of system activity containing job streams and dependencies. It is created automatically when the production plan is created for the first time. It is extended if the production plan is extended.
- A component or service that is needed before a component can be installed. In other words, the components, resources, or services listed as prerequisites of a component must be installed before the component can be installed.
- A condition that must be fulfilled before an event takes place.
A temporary solution to or a bypass of a problem that is necessary to provide a complete solution to correct a problem. The system requires that you apply the prerequisite fix either before the PTF that needs it or with the PTF that needs it. See also corequisite fix, distribution requisite fix.
In RPG, a table that is loaded at the same time as the source program, before the program actually begins to run. See also runtime table.
- In OSI, an address that uniquely identifies an application entity. The presentation address consists of one or more NSAP addresses, a TSAP selector, an SSAP selector, and a PSAP selector.
- In the Distributed Computing Environment (DCE), an unambiguous name that is used to identify a set of access points.
presentation control information (PCI)
The invisible set of controls that determine the presentation attributes of information such as color, intensity, loudness, and window size. See also machine readable information.
presentation graphics feature (PGF)
In the Tivoli NetView Performance Monitor, a feature used with the Graphical Data Display Manager to generate online graphs in the NetView Performance Monitor graphic subsystem.
presentation graphics routines (PGR)
A group of routines within the operating system that allows business charts to be defined and displayed procedurally through function routines. See also Graphical Data Display Manager.
In OSI architecture, the layer that provides services that enable functional units in the application layer to select a common syntax in order to define data and operations to be performed on the data.
The part of a distributed application that is concerned with the user interface of the application. See also business logic.
- An array that contains the data and attributes associated with a window.
- The space that contains the device-independent definition of a picture.
- A conceptual two-dimensional surface in storage on which data for a portion of the display surface is represented.
- The display data buffer associated with a partition. The size of the presentation space is defined as equal to, or larger than, the size of the viewport. When the presentation space is equal to the viewport size, all the data in the presentation space is displayed. When the presentation space is larger than the viewport, the user must move the scrolling window within the presentation space to display the data within the viewport. See also scrolling window, viewport.
- In the context of the Emulator High-Level Language Application Programming Interface (EHLLAPI), the area in computer memory that corresponds to the user's screen image.
- A portion of the device's buffer storage, allocated to a partition, that contains only display data that CICS sends to that partition. See also partition.
See composed text.
Presentation Text Object Content Architecture (PTOCA)
An architecture that provides a collection of constructs used to interchange and present presentation text data, such as printing text data on a page, page segment, or overlay.
An installation method used when a previous version of BOS is installed on your system and you want to preserve the user data in the root volume group. However, this method overwrites the /usr, /tmp, /var,and /(root) file systems, so any user data in these directories is lost. System configuration must be done after doing a preservation installation.
preset terminal security
When a CICS region is started, the signing on of selected terminals as users whose user IDs are the terminal identifiers. Persons using these terminals have the authorizations given to the terminals.
A phase of the IPL sequence that takes place prior to static paging, where normal Licensed Internal Code functions cannot access data from any disk (neither load-source nor non-load-source disk units). See also full paging, limited paging, static paging.
A type of identity assertion where trust is presumed and additional trust validation is not performed. Use this mode only in an environment where trust is established with some other mechanism.
preventive maintenance package (PMP)
A maintenance level update for a system. A PMP includes updates for the Base Operating System (BOS) and for each optional software product that is installed on a system.
preventive maintenance record (PM)
A template for scheduled preventive maintenance work. PMs can contain job plan and corresponding safety plan information that the system copies to work orders. See also PM alert.
previous hop data
A set of information that identifies the remote sender of a request to attach a task and creates a trail to be followed back into the previous system. This process enables data gathering and monitoring to continue in the region that sent the request. Previous hop data is created for a task when it has been initiated by a task in another CICS system.
The last required release of the system (such as Release 1.0) prior to the current release (such as Release 2.0), including any modification levels (such as Release 1.0 Modification Level 1 or Modification Level 2) that were not required.
A measurement that defines how capacity is counted and applied against the customer's entitlement. See also entitlement.
- Pertaining to an irreducible unit of data, such as a single constant, variable, or array element.
- Pertaining to an object that is in the object storage hierarchy and can be retrieved. The last time the object was used or its actual or expected frequency of use is not of consequence in this process.
primary administrative server
The administrative server that runs on the same engine as the master metadata server and processes all administrative requests that are initiated from the SAN File System console and those requests initiated from the administrative command-line interface (ACLI) that is logged into the master metadata server.
primary authorization ID
The authorization identifier used to identify an application process to DB2 for z/OS. See also secondary authorization ID.
In the GDDM function, the axis used to plot data in a business chart. See also secondary axis.
primary cluster caching facility
The cluster caching facility that is currently handling requests from the members in an instance. See also cluster caching facility, preferred primary cluster caching facility, secondary cluster caching facility.
primary Copy Services server
One of two Copy Services servers in a Copy Services server group. The primary Copy Services server is the active Copy Services server until it fails; it is then replaced by the backup Copy Services server. See also backup Copy Services server, Copy Services client, Copy Services server, Copy Services server group.
In high availability disaster recovery, the main database, which is accessed by applications. Applications apply updates to the primary database, and those updates are propagated on the standby database by using log shipping.
primary data set
When referring to a data set collection, the first data set allocated. For individual data sets being stacked, the primary data set precedes the data set being stacked and is allocated closest to it. See also master primary data set.
primary delay interval (PDI)
The interval that must elapse between the apparent loss of surveillance signal from the alternate system and any reaction by the active system. This interval is set by the PDI system initialization parameter.
One device of a dual-copy or remote-copy volume pair. All channel commands to the copy logical volume (LVOL) are directed to the primary device. The data on the primary device is duplicated on the secondary device. See also secondary device.
primary disk pool
An independent disk pool that defines a collection of directories and libraries and may have other secondary disk pools associated with it. A primary disk pool also defines a database for itself and other disk pools that may be added in its disk pool group.
primary domain controller (PDC)
See domain controller.
primary end of a session
The end of a session that uses primary protocols. The primary end establishes the session. For an LU-LU session, the primary end of the session is the primary logical unit. See also half-session, secondary end of a session.
primary entry point
The location that receives control when the module is invoked by its primary, or member, name. alternate entry point. The location, other than the primary entry point, that can receive control from, or be referenced by, another module. See also alternate entry point.
- The basic primitive structure of the XQuery language. Primary expressions include literals, variable references, context item expressions, constructors, and function calls. A primary expression can also be created by enclosing any expression in parentheses, which can help to control the precedence of operators.
- Literals, names, and names qualified by the :: (scope resolution) operator.
- Any of the following types of expressions: a) identifiers, b) parenthesized expressions, c) function calls, d) array element specifications, e) structure member specifications, or f) union member specifications.
- In RPG, if specified, the first file from which RPG reads a record. In multifile processing, the primary file is used to determine whether the MR indicator is set on. See also full procedural file.
- In the DDS for a join logical file, the first physical file specified on the JFILE keyword. See also secondary file.
- For certain types of join operations using Query, the first of all files that are joined in a query definition. The data from this file is used in every record formed by a join specification.
- A focal point that is understood to be the preferred source of management services support for a particular category. See also backup focal point.
- A network node that receives alerts from nodes that the user has defined in a sphere of control. See also backup focal point, default focal point.
In System Manager, the folder into which the documentation of the corresponding development folder is stored if dynamic naming is not allowed for the option or if no override folder name is specified at install time.
- A group profile whose authority to an object is stored with that object. Primary group authority may provide better performance than private group authority.
- In concurrent groups, the group that is assigned to all files that a user creates.
primary group buffer pool
For a duplexed group buffer pool, the structure that is used to maintain the coherency of cached data. This structure is used for page registration and cross-invalidation. The z/OS equivalent is old structure. See also secondary group buffer pool.
primary group layout
The allocation of the graphic characters of group 1 to the keys of a particular keyboard, defined by a national standard or established by common usage in a particular country or group of countries (see ISO/IEC 9995-1). See also primary layer.
primary Hardware Management Console (primary HMC)
The System z Hardware Management Console (HMC) through which data personnel create and manage an ensemble. This HMC owns configuration and policy information that the zManager uses to monitor, manage, and adjust resources for all members of this ensemble. See also alternate Hardware Management Console, Hardware Management Console.
See primary Hardware Management Console.
- In VSAM, the set of primary keys that provide the standard path for access to the data set.
- An index that enforces the uniqueness of a primary key.
The online instance of a replicated resource group. The node that has a resource group in the online state activates all the resources in the resource group. See also replicated resource group.
The person who has control of a LearningSpace - Virtual Classroom session when it begins. The primary instructor comes from the list of instructors specified when a course is created. By default, the person who schedules a session becomes the primary instructor for that session. The primary instructor can also promote one of the other listed instructors as the primary instructor instead.
- In a relational database, a key that uniquely identifies one row of a database table. See also constraint, foreign key, unique key.
- In each record of a VSAM KSDS, an identifying field. The key of each record is a field in a predefined position within the record. Each key must be unique in the data set.
- An object that uniquely identifies an entity bean of a particular type.
The national language installed on the system as the default language used to display and print information. The primary language is also used to service the system. See also secondary language.
In System Manager, for a code load, the library in which the code load is stored if dynamic naming is not allowed for the option or no override library names are specified at install time. For language loads, the library in which the language load is stored if the language load identification matches the primary language of the system and either dynamic naming is not allowed for the option or no override library names are specified at install time.
A set of one or more log files that are used to record changes to a database and for which storage is allocated in advance. See also secondary log.
primary logical unit (PLU)
In SNA, the logical unit that contains the primary half-session for a particular logical unit-to-logical unit (LU-to-LU) session. See also primary half-session, secondary logical unit.
See candidate builder.
The name contained in the primary directory entry for a library memory, which is used for creating, copying, and deleting the member. A library member always has one primary name and possibly one or more aliases.
- A cluster node that currently has the principle copy of a cluster resource. All replications of a resilient resource originate from the primary copy of the resource.
- A device that runs a workload. See also standby node.
- See home node.
primary optical link
A connection between the system and an expansion unit. The hardware that creates this link is the local optical link card, the remote bus adapter, and the optical cables that connect the two.
A logical partition that provides certain general functions on which all logical partitions are dependent. The primary partition is the only partition that is active in a system that has a single partition. All partition management functions are performed from this partition. If this partition is powered off or restarted, for example, the entire system is powered off or restarted.
- In CCP, one of two paths defined for information flow to and from the physical units attached to the network by means of an IBM 3710 Network Controller. The primary path is the path that is normally used.
- The channel that an operation first uses. See also alternate path.
primary POI task (PPT)
In Tivoli NetView for OS/390, the subtask that processes all unsolicited messages that are received from the VTAM program operator interface (POI) and delivers them to the controlling operator or to the command processor. The PPT also processes (a) the initial command that is specified to execute when Tivoli NetView for OS/390 is initialized and (b) timer request commands that are scheduled to execute under the PPT.
primary program operator application program (PPO)
A program operator application program that is authorized to receive unsolicited messages. When the PPO is active, all unsolicited messages go to the PPO. Conversely, when the PPO is inactive, unsolicited messages go to the system console. There can be only one PPO in any domain. See also secondary program operator application program.
primary RACF database
The RACF database designated in a data set name table that contains the RACF profiles used for authorization checking. The primary RACF database can consist of up to 90 data sets. See also backup RACF database.
primary rate access (PRA)
See primary rate interface.
primary rate interface (PRI)
An ISDN interface normally used by large sites, providing 30 (E1) or 23 (T1) B-channels of 64 kbits per second and one D-channel for signaling. This is often known as 30B+D or 23B+D. See also basic rate interface.
primary rate ISDN (PRI)
See primary rate interface.
The process in which the original primary database can rejoin a high availability disaster recovery pair after a failover. The original primary database can rejoin only as the new secondary database in the HADR pair.
- A database server participating in a high-availability configuration. A primary server permits read and write access from client applications and owns the logical logs that are sent to secondary servers.
- The server on which all resources that are to be deployed exactly once per instance or once per organization unit (OU) are deployed.
- The session between a class 1 terminal and the active IMS.
- An extended recovery facility (XRF) session between the active application subsystem and a terminal user.
The highest priority site for a resource group. A resource group might have a backup site (secondary site). See also replicated resource group.
primary space allocation
The amount of space requested by a user for a data set when it is created. See also secondary space allocation.
- In high-level data link control (HDLC), the part of a data station that supports the primary control functions of the data link, generates commands for transmission, and interprets received responses.
- On a point-to-point channel, the station that gains control of the channel first. On a multipoint channel, the station controlling communications.
- In SNA, the station on an SDLC data link that is responsible for the control of the data link. There must be only one primary station on a data link. All traffic over the data link is between the primary station and a secondary station. Specific responsibilities assigned to the primary station include initialization of control signal interchange, organization of data flow, and actions to perform error control and error recovery functions. See also secondary station.
A direct access storage device (DASD) volume available to users for data allocation. The volumes in primary storage are called primary volumes. See also DASD volume, migration level 1, migration level 2, primary volume, storage hierarchy.
primary storage pool
A named set of volumes that the server uses to store backup versions of files, archive copies of files, and files migrated from client nodes. See also copy storage pool, server storage, storage pool volume.
A coupling facility list structure that contains shared queues or shared resources. See also overflow structure.
primary system console
A workstation that is attached to the first input/output processor that is capable of supporting workstations. If Operations Console has been configured, a personal computer (either at a local location or a remote location) becomes the primary system console.
primary system name
In SNADS, the system name of the highest logical unit in the network. See also secondary system name.
See initial thread.
primary vital-record specification
The first retention and movement policy that DFSMSrmm matches to a data set and volume used for disaster recovery and vital record purposes. See also secondary vital-record specification, vital record specification.
- In a stand-alone Metro Mirror or Global Mirror relationship, the target of write operations issued by the host application. See also relationship.
- A volume managed by DFSMShsm containing data sets that are directly accessible to the user. See also primary storage.
- A volume that is mirrored for backup on a remote storage system.
- A simple and fundamental data structure, API, algorithm, or system service that serves as a building block for more complex solutions, applications, or environments.
- The figures created by drawing commands.
- A message sent from one process to another.
- A message processing node that cannot be further subdivided. See also subflow node.
- A drawing command that is made up of the smallest possible parts and is the basis for more complex scenes. Examples of primitives include arc, line, circle, polygon, and charstr.
primitive analysis engine
An analysis engine that is composed of a single annotator, but does not contain component analysis engines. See also analysis engine.
- A predefined basic data type without any substructure, such as an integer or a string.
- In Java, a category of data type that describes a variable that contains a single value of the appropriate size and format for its type: a number, a character, or a Boolean value. Examples of primitive types include byte, short, int, long, float, double, char, boolean.
In Enhanced X-Windows, a widget that instantiates its own children of a known class and does not expect external clients to do so. Primitive widgets do not have general geometry management methods. Primitive widgets that instantiate children are responsible for all operations requiring downward traversal below themselves.
The terminal or logical unit that is connected to a transaction at its initiation. See also alternate facility.
principal HADR standby database
In an HADR multiple standby system, the standby database that allows any synchronization mode. Only one principal HADR standby database can be defined in a multiple standby system. See also auxiliary HADR standby database, standby database.
- The name by which a principal is known to the Distributed Computing Environment (DCE) security services.
- In the Kerberos protocol, the name by which the Kerberos principal is identified. The principal name usually consists of either a) a user name and a realm name or b) a service name, host name, and a realm name. See also Kerberos principal.
principal primary library
In System Manager, a primary library into which the objects that were created in the principal development library are stored when no overriding library name is specified at installation time.
principal standby database
See principal HADR standby database.
print data set
A data set created by an application program that contains the actual information to be printed and, optionally, some of the data that controls the format of the printing. The types of print data sets are composed text, line format, and mixed format. See also auxiliary data set, print file.
An object used to manage printing that is created and maintained by the PrintManager program. Print descriptors describe where a print job is printed, how a print job is processed, and how output appears. The print descriptors contain capabilities and defaults of options used for printing. The system-recognized identifier for the object type is *PDG.
In CDE, the Front Panel control used to start the Printer software application. Dropping a file on the control displays a dialog box you can use to print the file to the default printer.
An object in the Printer Inventory that contains information about a printer or set of printers that share the same characteristics. A printer definition contains information that is used to print files.
In Infoprint Server, a set of files that contain information about printers. The Printer Inventory includes such objects as printer definitions, functional subsystem (FSS) definitions, and job selection rules for IP PrintWay.
- A 3270 Host Connection Program 2.1 and 1.3.3 for AIX (HCON) mode of operation during interaction with a host computer that emulates a 3286/87 printer.
- A PC program that allows a personal printer to emulate a host system printer.
A file that is created for the purpose of printing data. A print file includes information to be printed and, optionally, some of the data. See also print data set.
print file document
A Printing Systems Manager (PSM) object that represents text or data to be printed by a job. See also print resource document.
Printing Systems Manager (PSM)
An IBM licensed program that applies print administration and management technology to a cross-platform, client/server print system. PSM provides a set of (a) printing functions for submitting and controlling print jobs and (b) systems management and operator functions to control print spoolers and print supervisors. PSM is based on the Palladium distributed print system.
printout format definition (PFD)
In AFP Utilities, a file member that contains information about the record layout, page layout, record selection, and database file name. A PFD is used to print the records of a database file member in various formats.
Any location on a medium where a character can be printed. See also addressable point.
A set of ODF programs that perform the tasks of fetching report text from the OnDemand base system, formatting it as specified in the PPT row, and outputting it to the appropriate device with the appropriate delivery information. Parameters for formatting and outputting are maintained by using the DM, BM, and B3 panels. Delivery information is maintained by using the UM panel.
print resource document
A Printing Systems Manager (PSM) object that represents a resource, such as a graphic or font, that is used by a job to print a print file document. See also print file document.
- A feature of i5/OS that provides AFP system management and IPDS print management to IPDS printers that are connected to System i systems.
- An IBM licensed program that manages and controls the input data stream and output data stream required by supported IBM page printers.
See IP PrintWay.
- A way of determining the order in which jobs and job streams start.
- A rank assigned to a task that determines its precedence in receiving system resources.
- A property that determines the order in which business rules are executed in an application.
priority level resource (PLR)
A marked resource known to PSF and deleted according to a modified deletion algorithm. When resources according to reasonable resource loaded value, PSF deletes all non-PLR resources before deleting any PLR resources. A frequently used resource can be marked as PLR with the Resource Exit; this improves its chances of being retained at the data set end.
In SNADS, a queue that contains distribution queue entries for distributions with a service level of fast, status, or data high. When send times and queue depths are satisfied for both the priority and normal queues, the priority queue is serviced first. See also normal queue.
A web-based tool available via the IBM Intranet that consolidates Incident, Problem and Change (IPC) information from across the IBM enterprise and stores that information in a central repository.
See Proactive Service Management Dashboard.
A policy that defines when and what type of information is captured and backed-up in the wallet. See also application policy.
- Property of a software entity that is visible only to other software entities which share the same owner. See also owner.
- Pertaining to a member of a class that is accessible only to member functions and friends of that class.
In CICS Transaction Server, an element of MVS virtual storage below the 16 MB line. It contains the local system queue area (LSQA), scheduler work area, subpools 229 and 230, a 16 KB system region area, and a private user region for running programs and storing data.
The authority specifically given to a user for an object that overrides any other authorities, such as the authority of a user's group profile or an authorization list. See also owner authority, primary group authority, public authority.
private automatic branch exchange (PABX)
An automatic private switching system that services an organization and is usually located on a customer's premises. Often used synonymously with private branch exchange.
private branch exchange (PBX)
A switching system located on a customer's premises that consolidates the number of inside lines (extensions) into a smaller number of outside lines (trunks). Many PBXs also provide advanced voice and data communications features.
- A business object that is contained within other business objects. Private business objects are visible only to the containing business object, thereby making them private. See also business object.
- In XSD, a business object attribute that defines an anonymous complex type instead of referencing a named complex type.
- In secure communication, an algorithmic pattern used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user system and is protected by a password. See also key, public key.
- In computer security, the secret half of a cryptographic key pair that is used with a public key algorithm. The private key is known only to its owner. Private keys are typically used to digitally sign data and to decrypt data that has been encrypted with the corresponding public key. See also public key.
privately defined object
See locally defined object.
privately managed context
A work context that can be switched from one task to another. A privately-managed context is generally used by a work manager, such as the Information Management System (IMS).
In the Simple Network Management Protocol (SNMP), a MIB module that is located under the private branch of the Structure of Management Information (SMI) and that is specified exclusively by a specific enterprise (a corporation or university, for example).
- In DCE X/Open Object Management (XOM), an object that is represented in an unspecified fashion.
- In the DCE X/Open Directory Service (XDS), an object management (OM) object created in the workspace using the OM functions.
In VSE, a partition allocated for the execution of a specific program or application program. Storage in a private partition is not addressable by programs running in other virtual address spaces.
private service bundle
A service bundle that is not explicitly mentioned in the customization definition document (CDD), but that is included in a service bundle set and provides resources required by another service bundle. In a customization definition report, private service bundles are listed, and their names are followed by the string [private].
A sort that takes place in the agent private memory of a database agent. See also agent private memory.
private storage pool
A storage pool containing a specified amount of storage that can be used by only one subsystem. See also shared storage pool.
- The right to access a specific database object in a specific way. A privilege is controlled by users with access control (ACCESSCTRL) or security administrator (SECADM) authority or by users who have the privilege and the ability to grant it to others. Privileges can include rights to create, delete, and retrieve data from tables.
- In SQL, a capability given to a user by the processing of a GRANT statement.
- The capability of performing a specific function, sometimes on a specific object. See also authority level, authorization, supervisor.
- The right to use or change the contents of a database, table, table fragment, or column.
A level of authority that is granted to an administrator. The privilege class determines which administrative tasks the administrator can perform. See also authority, node privilege class, operator privilege class, policy privilege class, storage privilege class, system privilege class.
privileged attribute certificate (PAC)
A privileged document that contains such information as the client's name and the groups to which it belongs. Its format is dependent on the underlying security mechanism.
System control instructions that can only run in the processor's privileged, or supervisor, state. Privileged instructions generally manipulate virtual machines or the memory manager and are not used ordinarily by application programmers.
A hardware protection state in which the processor can run privileged instructions. See also unprivileged state.
- In Informix, a user who was granted one or more administrator roles.
- A user logged into an account with root user authority.
The process of referring to scans that were run using different user privileges, in order to test whether privileged resources are accessible to users with insufficient access permissions.
- A collection of privileges for working with system components and functions. The administrator assigns privilege sets to users (user IDs) and user groups.
- For the predefined SYSADM ID, the set of all possible privileges. For any other authorization identifier, the set of all privileges that are recorded for that identifier in the DB2 for z/OS catalog.
See private management domain.
- A reusable set of Java code fragments and supporting attributes for collecting detailed runtime information about objects, arguments, and exceptions. See also Probekit.
- A type of message that determines if a message with certain characteristics can be delivered to a specific recipient. This type of message is treated like a user message by the message transfer agent (MTA), except that it is never delivered to the recipient.
- Program code that collects troubleshooting information in the event of an error condition. This information is sent to First Failure Support Technology (FFST) or otherwise used in problem solving.
- A monitor that tests a transaction and then detects and reports any errors that were generated during that test.
A scriptable framework for doing byte-code insertion to probe the workings of a target program. See also probe.
- The process of determining the source of a problem. Sources of a problem can include a program component, machine failure, telecommunication facilities, user or contractor-installed programs or equipment, or environmental failure such as a power loss, or user error.
- A core capability of the IBM Autonomic Computing Initiative that facilitates problem analysis in complex systems using standard situations in the Common Base Event. See also Log and Trace Analyzer tool.
problem isolation procedure (PIP)
Written information used by service representatives to repair IBM equipment. A PIP contains yes/no questions and procedures that direct the user to the failing part of the equipment.
problem management focal point
The management services responsible for the problem analysis and diagnosis for a sphere of control. An alert focal point is a subset of a problem management focal point.
A state during which the processing unit cannot handle input, output, and other privileged instructions. See also supervisor state.
Procedural Language SQL (PL/SQL)
The Oracle implementation of a language that provides procedural constructs for implementing control flow logic around traditional SQL queries and operations. See also SQL Procedural Language.
- A sequenced set of statements that may be used at one or more points in one or more computer programs, and that usually has one or more input parameters and yields one or more output parameters.
- In COBOL, one or more successive paragraphs or sections, within the Procedure Division, that direct the computer to perform some action or series of related actions.
- In the Integrated Language Environment (ILE) model, a set of self-contained high-level language (HLL) statements that performs a particular task and returns to the caller. Individual languages have different names for this concept of a procedure. In C, a procedure is called a function.
- In a programming language, a block, with or without formal parameters, that is initiated by means of a procedure call.
- A routine that can be invoked using the SQL CALL statement to perform operations that can include both host language statements and SQL statements. See also built-in procedure, external procedure, routine, SQL procedure, user-defined procedure.
- The description of the course of action taken to solve of a problem.
- A routine that does not return any value. See also declaration statement, user-defined procedure.
The implementation of the logic of a procedure. See also routine body.
- In programming languages, a language construct for invoking execution of a procedure.
- A call made to a procedure within a module in a bound program. See also program call.
procedure correlation identifier (PCID)
An identifier generated by an SNA control point (CP) to (a) correlate search, activation, and deactivation requests and responses related to a specific session between logical units (LUs), and (b) identify this session for such purposes as problem determination, accounting, and performance monitoring. The PCID and the network-qualified name of the CP generating the PCID constitute the fully qualified procedure correlation identifier (FQPCID), which is unique across the network in which it is used.
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), the syntax for an operation, including its name, the data type of any value it returns, and the number, order, and data types of any parameters.
One of the four main parts of a COBOL program. The Procedure Division contains instructions for solving a problem. The Procedure Division may contain imperative statements, conditional statements, paragraphs, procedures and sections.
procedure library (PROCLIB)
A program library in direct access storage with job definitions. The reader/interpreter can be directed to read and interpret a particular job definition by an execute statement in the input stream.
procedure order profiling data
A portion of observability that is stored with a program that is produced by Integrated Language Environment (ILE) application profiling. The data lists the order in which the program's procedures were packaged and also indicates how the procedures should be packaged in the future if the program is rebuilt in some way. For example, if procedure A calls procedure B very often, then it is advantageous to package procedures A and B close together.
See routine overloading.
procedure pointer call
A high-level language call mechanism for specifying the address of a procedure to be called. The procedure pointer call provides a way to call a procedure dynamically. For example, by manipulating arrays or tables of procedure names or addresses, the application programmer can dynamically route a procedure call to different procedures. See also static procedure call.
procedure with logic
Any QMF procedure beginning with a REXX comment. In a procedure with logic, it is possible to perform conditional logic, make calculations, build strings, and pass commands back to the TSO environment. See also linear procedure.
- An instance of a program running on a system and the resources that it uses.
- See job.
- In Business Transaction Services (BTS), a collection of one or more activities. A process is the largest unit that CICS business transaction services can work with, and has a unique name by which it can be referenced and invoked. Typically, a process is an instance of a business transaction.
- The sequence of documents or messages to be exchanged between the Community Managers and participants to run a business transaction.
- For Common Programming APIs ToolKit, the collection of all i5/OS jobs sharing an activation group.
- An address space and single thread of control that executes within that address space, and its required system resources. A process is created by another process issuing the fork() function. The process that issues the fork() function is known as the parent process, and the new process created by the fork() function is known as the child process.
- A progressively continuing procedure consisting of a series of controlled activities that are systematically directed toward a particular result or end.
- To perform operations on data.
- In System Manager, a combination of systems management applications that accomplishes one or more customer tasks or a part of a task. A process can contain other processes.
- A series of related activities aimed at achieving a set of objectives in a measurable, usually repeatable manner. A process can specify any of the roles, responsibilities, tools, and management controls required to reliably deliver its outputs.
- An object that contains a user-created script of TurboIntegrator functions and commands to programmatically import data as well as create and modify TM1 objects, such as cubes and dimensions. A process can be run manually or contained in a chore to run at a scheduled time.
- A separately executable unit of work.
- A sequence or flow of activities in an organization with the objective of carrying out work. In BPMN, a process is depicted as a graph of flow elements, which are a set of activities, events, gateways, and sequence flow paths that adhere to BPMN execution semantics.
A container in the Process Center repository for process models and supporting implementations. A process application typically includes business process definitions (BPDs), the services to handle implementation of activities and integration with other systems, and any other items that are required to run the processes. Each process application can include one or more tracks.
Process Center Console
An interface to the Process Center repository where administrators can create and manage process applications, manage user access to library items, install snapshots on test or production servers, and perform other tasks.
A data-container associated with a process. Process containers can be read by all the activities that make up the process. Note that they are not the same as the root activity's containers.
process group ID (PGID)
The unique identifier representing a process group during its lifetime. A process group ID is a positive integer that is not reused by the system until the process group lifetime ends.
process group lifetime
A period of time that begins when a process group is created and ends when the last remaining process in the group leaves the group because either it is the end of the last process' lifetime or the last remaining process is calling the setsid() or setpgid() functions. X/Open. ISO.1.
- See process identification number.
- The unique identifier that represents a process. A process ID is a positive integer and is not reused until the process lifetime ends.
processing engine archive (PEAR)
A .pear zip archive file that includes a Unstructured Information Management Architecture (UIMA) analysis engine and all of the resources required to use it for custom analysis in enterprise search.
An embedded directive within an XML instance document that is passed to an application when the document is parsed. The processing instruction node is one of the kinds of nodes that are defined in the XQuery and XPath data model. See also node kind.
The logical nodes in the system where jobs are run. The configuration file can define one processing node for each physical node in the system or multiple processing nodes for each physical node. See also compute node.
A connection between an application program and the CICSPlex SM API. A program can establish multiple processing threads, but each one is considered a unique API user; no resources can be shared across the boundary of a thread.
- A functional unit within a computer that is responsible for a certain aspect of processing.
- See processor.
- A unit of measure for shared processing power across one or more virtual processors. One shared processing unit on one virtual processor accomplishes approximately the same work as one dedicated processor. A processing unit is equal to one dedicated processor on configurations that do not support virtual processors.
The period of time that begins when a process is created and ends when the process ID is returned to the system. X/Open. ISO.1. After a process is created with a fork() function, it is considered active. Its thread of control and address space exist until it terminates. It then enters an inactive state where certain resources may be returned to the system, although some resources, such as the process ID, are still in use. When another process executes a wait() or waitpid() function for an inactive process, the remaining resources are returned to the system. The last resource to be returned to the system is the process ID. At this time, the lifetime of the process ends.
In WebSphere Voice Server, the process that manages the interaction of all telephony system processes, for example, starting and stopping text-to-speech or speech recognition sessions.
A system of managing the execution of a process. A process manager operates the defined and agreed process, ensuring that it interfaces with all other relevant processes, target setting, process audits, effectiveness and efficiency reviews, and managing the process improvement cycle.
A representation of a real-time business process. A business process model is composed of the individual steps or activities that make up the process, contains the conditions that dictate when the steps or activities occur, and identifies the resources that are required to run the business process.
The logical representation of a Java process. A process object is identified both by name and a process ID number (PID), and appears in the Monitors view along with the associated agents whenever a Java process is launched or attached to.
- A device for processing data from programmed instructions. It may be part of another unit.
- A Java function that accepts arguments as input. It operates on the value of the component to which it is connected when it is rendered, or to subcomponents being assembled into the component for rendering.
- In a computer, the part that interprets and executes instructions. Two typical components of a processor are a control unit and an arithmetic logic unit.
- One or more integrated circuits that process coded instructions and perform a task.
See central storage.
processor value unit (PVU)
A unit of measure that is assigned to each processor core for software licensing purposes. PVUs vary according to chip architecture. See also core, full-capacity, subcapacity.
A structured collection of activities and tasks that can be reused for specific process workflows. Process templates can be edited, created, cloned, and removed. Users typically apply and modify a process template when they design a workflow for a specific process.
The category to which a process belongs. All the activities in a process inherit the same process-type attribute. Categorizing processes makes it easier to find a particular process or activity - the BTS browsing commands allow filtering by process-type.
See procedure library.
A defined role in WebSphere Commerce that uses the account belonging to the buyer organization to make purchases from the seller and sends pending orders to the procurement system for approval.
procurement buyer administrator
A defined role in WebSphere Commerce that registers and approves users as procurement buyers (buy-side). The procurement buyer administrator manages the various users and creates and administers the suborganizations within the buying organization.
See purchasing card.
PRO data model
See Public Record Office data model.
A set of interfaces that are defined for the producer portal. The producer definition can include the producer service description, the producer portal URL, and the security setup. See also consumer portal, producer portal.
A portal that provides portlets as a service so that other portals, called consumer portals, can use the portlets and make the portlets available to their users. See also consumer portal, producer definition.
- In System Manager, a program or application that is identified as a product to the i5/OS operating system by a product identifier and a product definition.
- A catalog entity that can be viewed as a group of items that share attributes. All items that are related to a particular product exhibit the same set of attributes and are distinguished by their attribute values.
- A separately sold software application that might contain other products that are sold separately. A product has its own product identifier (PID).
- A single item or a family of similar items sold to a customer. See also stock keeping unit.
The three-character code that uniquely identifies a warehouse enablement pack and keeps the data and schema of one warehouse enablement pack separate from other warehouse enablement packs.
In System Manager, an object that contains the information about a product. The object type is *PRDDFN. A product definition is identified as belonging to a product (PRDID) and a release (RLS). A given product and release can have only one product definition.
product exploration metaphor
A metaphor in which customers initiate a parametric search of the product data. This metaphor is intended for customers who are familiar with the features of a given category of products.
See product identifier.
product information management (PIM)
The process of collecting, adding, updating, and maintaining product information in a central repository in order to provide consistent, accurate, and current product information to other systems or outputs, such as websites or catalogs.
In OSI, a part of the formal notation used to specify ASN.1, in which allowed sequences of items are associated with a name that can be used to refer to those sequences in the definition of new sets of allowed sequences.
In cross-site mirroring, the independent disk pool to which all production operations are directed. All disk write operations are directed here first and are then replicated to the mirror copy of the independent disk pool. The production copy always has current data.
A library containing objects needed for normal processing. See also test library.
A plan that contains all job scheduling activity planned for a period. The plan is created or extended by the Jnextplan job or by planman. It is stored in the Symphony file, and consists of all the jobs, job streams, and dependency objects that are scheduled to run for that period, including any jobs or job streams carried forward from the previous plan. See also final job stream, production period.
Data that is ready to be published from a staging server or an authoring server to a production server. See also authoring server, commit, production server, quick publish, staging server, task group, workspace task group approver.
- A system on which application programs that are already developed and tested run on a regular basis.
- A WebSphere Voice Response system that is used to respond to or make 'live' calls. A production system can also be used to develop new applications. See also development system.
- In System Manager, an object that contains the control information about an option. The object type is *PRODLOD. A product load is identified by the product identifier (PRDID), release (RLS), option (OPTION), and load identifier (LODID) parameters.
- The smallest logical collection of objects that can make a product option.
A defined role in WebSphere Commerce that is responsible for determining the best way to display, price, and sell products in the online store. The product manager role is equivalent to a merchandising manager.
product-sensitive programming interface (PSPI)
A special interface that is intended to be used only for a specialized task, such as diagnosis, modification, monitoring, repairing, tailoring, or tuning.
The operating systems, subsystems, or products that can be installed, maintained, and migrated as a group. See also software instance.
Professional Office Systems (PROFS)
See OfficeVision Series.
- An object that contains information about the characteristics of the user's session.
- A set of behaviors, privileges, or capabilities that determine how database objects interact with resources.
- A named group of configuration information that can be distributed from a configuration manager when a managed server subscribes. Configuration information can include registered administrator IDs, policies, client schedules, client option sets, administrative schedules, storage manager command scripts, server definitions, and server group definitions. See also configuration manager, enterprise configuration, managed server.
- A container for application-specific information about a particular type of resource. A Tivoli application specifies the template for its profiles, which includes information about the resources that the Tivoli application can manage.
- An XML-formatted file that contains a set of runtime properties for a given domain of activity, such as user or TCP/IP.
- In CICS, a set of options specified in a resource definition that can be invoked by a transaction definition. Profiles control the interactions between the transaction and terminals or logical units.
- A set of attributes, such as skills and competencies that serves as a template for project profiles.
- Data that describes the characteristics of a user, group, resource, program, device, or remote location. See also data set profile, discrete profile, general resource profile, generic profile, user profile.
- A description of the control available to a particular network operator.
- A file containing customized settings for a system or user.
- In security, a description of the characteristics of an entity to which access is controlled.
- In the Remote System Explorer, a container for a particular user's filter, connection, IBM i command, and user-defined action information. A profile can also be used to partition data if the number of remote server connections is high.
On a configuration manager, the defined relationship between a profile and an object such as a policy domain. Profile associations define the configuration information that is distributed to a managed server when it subscribes to the profile.
A two-stage compilation process that first compiles and runs a program to analyze its behavior and then recompiles the program to optimize its execution. The results of the analysis stage are saved in a profile data file that is input to the second, optimization stage.
- In DCE Remote Procedure Call (RPC), a record in an RPC profile that maps an RPC interface identifier to a profile member (a server entry, group, or profile in a name service database).
- An element or monitoring task belonging to a user profile. The element defines what is to be monitored and when.
In VM, a special EXEC procedure with a filename of PROFILE. The procedure is normally executed immediately after CMS is loaded into a virtual machine. It contains CP and CMS commands that are to be issued at the start of every terminal session.
A value created by the system from the Get Profile Handle API that is used to identify a valid user ID and password. This value is used as input to switch the controlling user profile in a job to another user profile without changing the name of the job.
- In a Tivoli environment, a container for profiles that links the profiles to a set of resources, called subscribers. Tivoli administrators use profile managers to organize and distribute profiles. A profile manager can operate in the dataless mode or database mode.
- See computer group.
The ability for a user or an installation to copy information (such as universal access authority or access lists) from an existing resource profile when defining a new resource profile.
See Professional Office Systems.
See VM/MVS bridge.
See program identifier.
- A single, compilable collection of executable statements in a programming language.
- To design, write, and test computer programs.
- A prepared sequence of instructions to the system to accomplish a defined task. In POSIX.2, a program encompasses applications written in the shell command language, complex utility input languages, and high-level languages (HLLs).
- A file containing a set of instructions that conform to a particular programming language syntax.
- A sequence of instructions that a computer can interpret and run without a user's intervention.
- A group of related projects managed in a coordinated way. Programs usually include an element of ongoing activity.
- In the Integrated Language Environment (ILE) model, the executable object that results from binding modules together.
program access to data sets
A RACF function that enables an authorized user or group of users to access one or more data sets at a specified access authority only while running a specified RACF-controlled program. See also program control.
program automatic storage area (PASA)
A system object that contains call level information for each program on the call stack. The PASA can also contain space (allocated when the program object is called) for program variables.
- A call to an IBM i program or service program procedure.
- A call made to an ILE program or to an OPM program. See also procedure call.
Program Call Markup Language (PCML)
A tag language that is used to describe the input and output parameters for programs running on System i models. PCML is based on the Extensible Markup Language (XML). PCML files are used with the ProgramCallDocument class in the IBM Toolbox for Java to automate parameter handling and calls of ILE programs from Java.
program communication block (PCB)
A control block that contains pointers to Information Management System (IMS) databases. See also program specification block.
An operation performed by program control to relieve space in the DSA during a short-on-storage condition. The list of program definitions is searched to identify programs that have been dynamically loaded and are currently not in use. If a program is not in use, the space it occupied is reclaimed. See also short-on-storage.
- An RACF function with which an installation can control who runs RACF-controlled programs. See also program access to data sets.
- A CICS facility that handles the flow of control among application programs.
program control table (PCT)
A CICS table defining the transactions that can be processed by the system. Each transaction is paired with the name of the program that CICS runs when the transaction is called.
See instruction address register.
Application-specific data that can be associated with a call transfer from Callpath to DirectTalk, or in the opposite direction. This is equivalent to Callpath program data, but DirectTalk imposes the restriction that the data must be a printable ASCII character string, with a maximum length of 512 bytes.
Data contained in a file for which the fields in the records are described in the program that processes the file. See also externally described file.
A file for which the fields in the records are described only in the programs that process the file. To the operating system, the record appears as a character string. See also externally described file.
Program Development Facility (PDF)
An IBM licensed program used with the Interactive System Productivity Facility (ISPF) to provide a work environment for the development of programs and the use of functions, such as edit and browse.
A symbolic device that a program uses instead of a real device (identified by the device name). When the program uses a program device, the system redirects the operation to the appropriate real device.
program entry procedure (PEP)
A procedure provided by the compiler that is the entry point for an ILE program on a dynamic program call. See also user entry procedure.
program error program (PEP)
A user-replaceable program containing code to obtain program addressability, access the COMMAREA, and return control to the CICS abnormal condition program (DFHACP) through an EXEC CICS RETURN command.
In EGL, a file that is in EGL source format and that contains a single program part. The program part may embed functions and data parts and may import definitions files. The file name extension is .eglpgm.
- A key on a computer that can be programmed to perform a particular operation.
- See function key.
A 1- to 8-character string entered from a finance device and associated with a server finance transaction program. Lists of valid program IDs and their associated application programs are maintained in program tables.
program identification entry
In COBOL, an entry in the PROGRAM-ID paragraph of the Identification Division that contains clauses that specify the program-name and assign selected program attributes to the program.
program isolation (PI)
A DL/I or IMS facility that separates all the activity of an application program from any other active application program until that application program indicates, via a synchronization point, that the data it has modified or created is consistent and complete.
program isolation lock manager
A facility for local locking in systems for which no internal resource lock manager (IRLM) has been defined. Otherwise, the IRLM is used for all lock management, including local lock management.
- The version of a program that is composed of the following levels: the version number, the release number, the modification number, and the fix number.
- Pertaining to an operation that is performed for an entire program. See also command-level.
A type of partitioned data set extended (PDSE) that contains program objects only. A program library is a PDSE from which programs are loaded into memory for execution by the operating system.
program list table (PLT)
A CICS control table that contains a list of programs that can run as a group during CICS startup or shutdown and can be enabled and disabled as a group by a single CEMT transaction.
programmable command format (PCF)
A type of WebSphere MQ message used by the following applications: user administration applications, to put PCF commands onto the system command input queue of a specified queue manager, user administration applications, to get the results of a PCF command from a specified queue manager, and a queue manager, as a notification that an event has occurred. See also WebSphere MQ script commands.
- The functions within the system that establish the necessary activation and invocation for a program so that it can run when it is called.
- The task of preparing programs for execution, storing the load modules or program objects in program libraries, and executing them on the operating system.
program manager domain
A CICS domain that provides support for the following: program control functions; transaction ABEND and condition handling; related functions such as invoking user-replaceable modules, global user exits, and task-related user exits; autoinstallation for programs, map sets, and partition sets.
In bits 20 through 23 of the program status word (PSW), a 4-bit structure that controls whether each of the fixed-point overflow, decimal overflow, exponent-overflow, and significance exceptions should cause a program interruption. The bits of the program mask can be manipulated to enable or disable the occurrence of a program interruption.
- Security model using Java enterprise-bean client applications that require the user to provide identifying information. The application must collect that information and authenticate the user.
- A collection of methods used by applications when declarative security is not sufficient to express the security model of the application.
programmer user profile
The system-supplied user profile that has the authority necessary for system and application programmers and the special authorities of save system authority and job control authority. Named QPGMR.
Programming Development Manager (PDM)
An application that is used in a 5250 emulator to query an IBM i host and perform actions against objects. See also 5250 display.
programming interface for customers
The supported method through which customer programs request software services. The programming interface consists of a set of callable services provided with a product.
- A customer request for a price quotation on alterations or additions to the functional capabilities of system control programming or licensed programs. The PRPQ may be used in conjunction with computing system RPQs to solve unique data processing problems. See also computing system RPQ.
- A customer request for a price quotation for a licensed program to be designed especially for a particular group of customers or an application. Documentation for the program is provided only to those customers who order the PRPQ. See also request for price quotation.
See programming request for price quotation.
program module attribute
A characteristic of a program module that is stored in directory entry of a program module. The program module attribute controls the loading rebinding and other processing of the module.
- All or part of a computer program in a form suitable for loading into virtual storage for execution. Program objects are stored in partitioned data set extended (PDSE) program libraries and have fewer restrictions than load modules. Program objects are produced by the binder.
- One of two machine object classifications. It includes those objects used in programs that get their definition from an object definition table. Program objects are used as the parameter or values of machine instructions. See also system object.
The process of producing a program. The process includes precompilation, compilation, and bind. See also prepare.
program resolution monitor (PRM)
In the original program model (OPM), a program that translates the intermediate representation of a program into the machine language for use by the computer. The program resolution monitor is used by the programming language compilers to complete the translation of a source program into machine language instructions.
program specification block (PSB)
In DL/I and IMS, a control block that describes the databases and logical message destinations that are used by an application program. A PSB consists of one or more program communication blocks (PCBs). See also program communication block.
program static storage area (PSSA)
A system object that contains static variable data for programs on the call stack. The PSSA contains space for program variables that is activated when the program object is activated. The PSSA is contained in the process access group (PAG).
program structure view
A display of the nodes in the Application Diagram which represent programs and service programs. For ILE programs and service programs the nodes contain a list of the bound modules. The connections in a Program Structure Diagram represent binding relationships between objects.
A list of the i5/OS finance applications for use in an i5/OS finance job. Each table entry consists of a program ID and the program name and library associated with that ID. Program IDs received in data streams from finance devices are located in the program table to determine the i5/OS application that should be called.
program temporary fix (PTF)
For System i, System p, and System z products, a package containing individual or multiple fixes that is made available to all licensed customers. A PTF resolves defects and might provide enhancements. See also fix pack, maintenance change level.
program-to-program interface (PPI)
In Tivoli NetView for OS/390, a facility that allows user programs to send data buffers to or receive data buffers from other user programs. It also enables system and application programs to send alerts to the Tivoli NetView for OS/390 hardware monitor.
program-to-program message switch
An IMS output message sent by one application program to another application program. See also message switch.
- See compilation unit.
- In Ada programming, a discrete unit that performs a specific task or set of tasks. Program units are subroutines and calling programs that are assembled separately and then linked to make a complete program.
program update tape (PUT)
A code release to Transaction Processing Facility customers containing maintenance (program fixes) and new function. See also Transaction Processing Facility.
The user interface design methodology that limits the amount of information that is presented to the user to what is necessary or required at any given time, so that the user has less information with which to initially interact but can access additional information.
A method of retrieving a LOB or an XML value from a database server in the most optimal manner by using Dynamic Data Format. See also Dynamic Data Format.
- In Framework Manager, a set of models, packages, and related information for administration, and for sharing model information.
- A temporary endeavor or initiative created and managed to achieve an organization's objectives.
- A container for resources.
- A specific organization of rules and other elements that facilitates the authoring and management of a logical grouping of rules.
- In Metric Designer, a group of extracts. Each extract contains the metadata that is used to populate the Metric Studio data store or to create applications.
- The combination of a style sheet and a data source that is identified in a project file (.idpr file) in XML format.
- A container that organizes and provides security for objects that are supplied, created, or maintained for data integration, data profiling, quality monitoring, and so on.
- In Eclipse, a unit of organization used to group folders or packages. Projects are used for building, version management, sharing, and organizing resources.
- In Metric Studio, a task or set of tasks undertaken by a team and monitored on a scorecard. A project tracks dates, resources, and status.
- An object that includes a database, documents, document types, requirements and their attributes, requirement types, requirement traceability, discussions, and user and group security.
- An object that contains configuration information, activities, and policies required to manage a development effort.
- An organized collection used to group folders or packages. Projects are used for building, version management, sharing, and organizing resources related to a single work effort. See also library, module.
- An executable definition of work that is made up of steps. Its behaviour is controlled through project properties and has an associated selector that determines what server (or servers) it can be run on. A project can be assigned its own environment.
- A self-contained data set in a data file that can be opened in the application, containing data on multiple scenarios.
A calendar selected from the base calendars and associated to a project during project creation. The project calendar is the reference for all time-based aspects of the project, including the schedule, timesheets, and resource allocation. The project calendar includes all the information of the base calendar, and it can be further customized to meet project-specific requirements, such as adding additional non-working days. See also base calendar.
project development team (PDT)
A multi-functional team with the responsibility for responding to an IPMT-provided set of prioritized customer requirements. The PDT is responsible for defining, developing, qualifying, marketing, delivering and supporting an offering over its life cycle. The PDT may include worldwide representatives from business planning, production, marketing, service, development, programming, project management and others as appropriate. The PDT interacts with the IPMT primarily through the structured Decision Checkpoint (DCP) activities.
A specific unit of function that can be added to a project when that functionality is required. When a facet is added to a project, it can add natures, builders, classpath entries, and resources to a project, depending on the characteristics of the particular project. See also facet.
- A type of Rational DOORS user who can perform a limited set of management tasks.
- The role with overall responsibility for the project. The project manager needs to ensure tasks are scheduled, allocated and completed in accordance with project schedules, budgets and quantity requirements.
Project Review Authority (PRA)
The organizational entity to which the Project Manager reports. The PRA is responsible for ensuring that a software project complies with policies, practices and standards.
See source root.
A lock that can be changed from a shared lock to an exclusive lock. See also update lock.
- To add a logical data unit to cache memory.
- In application development, to move a part up one level in the project hierarchy.
- To change a condition to a different one using a condition handler. A condition handler routine promotes a condition because the error needs to be handled in a way other than that suggested by the original condition.
- To move an object forward to a later state or version, for example, to promote a minor version into a major version and set its status to "released." Promotion sets the previous status of the major version to "superseded."
- To copy replication definitions for subscription sets or registered sources from one database to another database, without registering the sources again or creating the subscription sets again.
- In ILE, to convert an unhandled exception into a new exception with a different meaning. The new exception is passed on to the next exception handler.
- The process of creating an authorized configuration item from an actual configuration item.
- The process of one host taking over level functions for another. See also demotion, level function.
- Business logic that offers incentives to customers when certain conditions have been satisfied.
- In JavaBeans technology, the process of making features of a contained bean available to be used for making connections. For example, if a bean consisting of three push buttons on a panel is placed in a frame, the features of the push buttons have to be promoted to make them available from within the frame.
- A mechanism for moving binaries, source code, source code data, build maps, output, Partitioned Data Sets (PDS) on z/OS or libraries on IBM i, and other build artifacts up the development-test-production hierarchy on a z/OS or IBM i system.
A transient object that only exists when the promotion engine is called to evaluate whether promotions are applicable to an order. It captures the state of the promotion engine during the process.
A template containing a mapping of classifications between actual configuration items (CIs) and the corresponding authorized CIs, used to promote an actual CI in order to create an authorized CI.
- A program that uses logic to determine dynamically the voice segments to be played as a voice prompt.
- A component of an action that indicates that user input is required for a field before making a transition to an output screen.
- A report element that asks for parameter values before the report is run.
- A message or a displayed symbol that requests information or user action. The user must respond to allow the program to proceed.
A dependency where an operator must respond affirmatively to a prompt in order for the dependent job or job stream can run. See also ad hoc prompt dependency, predefined prompt dependency.
One of two ways to display a message panel. PROMPT mode is intended for SWIFT Link users who are unfamiliar with the structure of SWIFT messages. With PROMPT mode, all the fields and tags are displayed for the SWIFT message. See also NOPROMPT mode.
See programmable operator facility.
- A process in which groups of configuration parameters are updated and take effect at different rates.
- The point at which the properties of a type are inherited by its subtypes.
Within a studio, a pane that provides an overview of the properties for selected data. The properties pane can also be used to make several changes and apply them at the same time, instead of repeating several different commands.
- A characteristic or attribute that describes a unit of information.
- Public information (that is, information available to any client) that is associated with a window.
- A characteristic of an entity that consists of a parameter and its value and that is used by the application, such as the configuration properties in the common.properties file, or by the application object that can accept property settings.
- A stylistic parameter that can be implemented through CSS.
- A characteristic of an object that describes the object. A property can be changed or modified. Properties can describe an object name, type, value, or behavior, among other things. See also custom property, property tag, property template.
- Any configurable information about a WebSphere business integration component. A component typically has properties that are common to all components of that type (for example, standard connector properties) as well as properties that are specific to that component (for example, connector-specific properties). See also business object property, collaboration property, standard property.
- In the Common Information Model (CIM), an attribute that is used to characterize instances of a class.
A WebSphere Portal interface that negotiates the relationship between cooperative source and target portlets and delivers data to the target in the form of the corresponding portlet action. See also cooperative portlets.
A property available through the Workflow tab on the properties sheet for an event subscription. This identifies the workflow data fields designated as launch step parameters in the workflow definition.
See tabbed page.
A shorthand way to identify a component by a keyword. See also property.
proportionally spaced font
A font in which the character increment for each graphic character varies. Proportionally spaced fonts provide the appearance of even spacing between presented characters and eliminate excess blank space around narrow characters, such as the letter i. See also uniformly spaced font.
- The spacing of characters in a printed line so that each character is allotted a space based on the character's width defined in a given font. See also monospacing.
- The spacing of characters according to their relative width.
- An item that suggests a change to an object in a module.
- A proposal is a collection of protocols that the initiating and responding key servers use to establish a dynamic virtual private network (VPN) connection between two endpoints.
Automatically determining whether each incoming credit payment corresponds to a received advice and, if so, and if the amount of the payment is high enough, proposing that the payment might be a match for the advice. Such proposed matches must be confirmed manually by the user to be effective. Matched advices are disregarded when calculating expected end-of-day-positions.
See protected logical unit of work.
See protected logical unit of work identifier.
In APPC, a string of bytes that is substituted for a user password. The protected password is sent instead of the user password and can be used to verify the identity of the user but only under specific and controlled circumstances. The LU type 6.2 architecture refers to the protected password as a password substitute.
- A resource for which there is either a RACF profile or a RACF option which is controlling access.
- A resource that is updated in a synchronized manner during resource recovery processing.
- A resource that is updated only in accordance with the two-phase commit process.
- All auxiliary storage in an auxiliary storage pool (ASP) when mirrored protection is in effect.
- The part of the auxiliary storage pool (ASP) that is reserved for the creation of permanent objects, such as libraries and files, when checksum protection is in effect.
protected user ID
See protected user identifier.
protected user identifier (protected user ID)
A user ID that cannot enter the system by any means that requires a password or password phrase, and cannot be revoked by incorrect password and password phrase attempts.
In iSeries, a disk storage device that is protected from data loss by the use of a Redundant Array of Independent Disks (RAID). An iSeries host does not mirror a volume configured as a protected volume, while it does mirror all volumes configured as unprotected volumes. The ESS, however, can be configured to indicate that an iSeries volume is protected or unprotected and provide it with RAID protection in either case.
An indicator that appears in the current program status word whenever an associated task has control of the system. This indicator must match the storage keys of all main storage blocks that the task is to use.
- A set of rules controlling the communication and transfer of data between two or more devices or systems in a communication network. See also bracket protocol, link protocol.
- In OSI, a specification of the format and relative timing of information exchanged between peer entities within a layer.
- The message transfer protocol used to relay X.400 messages between message transfer agents (MTAs).
- In MERVA Link, a peer-to-peer protocol used by cooperating message transfer processes (MTPs).
- In MERVA Link, a peer-to-peer protocol used by cooperating application support processes (ASPs).
- The message protocol used between user agents to convey the syntax and structure of an X.400 message and to specify what a recipient user agent does with the message.
- A unit of data that is specified in a protocol of a given layer, and that consists of protocol control information of this layer, and possibly user data of this layer.
- In OSI, a unit of data exchanged between peer entities.
- A unit of data exchanged between peer systems.
- In MERVA Link. a structured sequence of implicit and explicit data elements: Implicit data elements contain other data elements, and explicit data elements cannot contain any other data elements.
See address family.
In the WebSphere business integration system, protocol handlers receive and send messages in specific communication protocols--such as HTTP and HTTPS--and call data handlers to extract the data contained in the messages.
protocol-level RAS granularity
The level of RAS granularity at which RAS attribute values are assigned on a protocol-wide basis. RAS attribute values defined at the protocol-level are assigned to all requests for a particular protocol, such as the HTTP protocol or IIOP protocol. See also RAS granularity.
protocol-specific MPTN manager (PMM)
A component of the MPTN architecture that performs management, routing, and binding functions that are performed differently for the different transport providers.
To provide, deploy, and track a service, component, application, or resource. See also deprovision.
- The process of configuring servers, software, networks, and storage resources.
- The process of making computing resources available to users.
A group of related computers. An administrator can create provisioning groups to organize systems into meaningful categories, and to facilitate deployment of software to multiple computers.
A policy that defines the access to various managed resources, such as applications or operating systems. Access is granted to all users, users with a specific role, or users who are not members of a specific role.
A reserved application that is set up for a specific business requirement and is made available to a user. Users with restricted access in the data center model can subscribe to provisioning services that they require.
A ticket that allows a key distribution center (KDC) server to issue a service ticket for a specific task or tasks on a network or for an IP address that is different from the address in the original ticket granting ticket (TGT).
See radio frequency identification.
An application gateway from one network to another for a specific network application such as Telnet or FTP, for example, where a firewall proxy Telnet server performs authentication of the user and then lets the traffic flow through the proxy as if it were not there. Function is performed in the firewall and not in the client workstation, causing more load in the firewall.
A process or entity that is both an agent to its manager and a manager for one or more objects. It satisfies requests from its manager by relaying those requests and translating them for the objects that it manages.
- A server that receives requests intended for another server and that acts on behalf of the client (as the client's proxy) to obtain the requested service. A proxy server is often used when the client and the server are incompatible for direct connection. For example, the client is unable to meet the security authentication requirements of the server but should be permitted some services.
- A server that acts as an intermediary for HTTP Web requests that are hosted by an application or a web server. A proxy server acts as a surrogate for the content servers in the enterprise.
A store that represents a business partner's operational assets and handles the business logic that allows a WebSphere Commerce site to interact with an external business partner. A proxy store does not include a storefront and cannot be accessed by users. See also distributor proxy store.
See programming request for price quotation.
See Processor Resource/Systems Manager.
- In GL, eliminating the drawing of parts of the display list because a bounding box test shows that they are not visible.
- In data replication, the process of removing obsolete data from objects such as control tables, staging tables, or queues.
See prefixed save area.
See presentation-layer service access point.
See program specification block.
PSB directory (PDIR)
A list or directory of program specification blocks (PSBs) that define the use of databases by application programs for DL/I. It contains one entry for each PSB to be used during CICS execution, and is loaded during initialization.
See program specification block generation.
See Personal System Communications Adapter.
See power system control network.
See presentation services command processor.
See packet-switched data network.
See presentation-layer service data unit.
An attribute that cannot have a value, and is used to indicate a binary state, such as yes/no or on/off. For example, the attribute local might be present for some resources and absent for others, indicating whether the resource is local. Pseudo attributes are especially useful for implementing access rights, such as read, update, or delete. See also real attribute.
In REXX, a variable used in CL commands, whose name conforms to the CL programming rules for variables but actually refers to a REXX variable. The name must begin with an ampersand, but it is stripped off when determining the name of the actual REXX variable that is to be used. Pseudo-CL variables must be valid REXX variable names and valid CL variable names.
In Enhanced X-Windows, a class of color map in which a pixel value indexes the color map entry to produce independent red, green, and blue values. The color map is viewed as an array of triples (RGB values) that can be changed dynamically, and is mutually exclusive to the direct color map class.
In BTS, property of a task can be reattached ("reactivated") when a predefined event occurs, in order to take the next in a set of processing steps. See also activation.
A type of CICS application design that appears to the user as a continuous conversation, but that consists internally of multiple tasks. See also conversational.
Pertaining to a key that is marked as deleted but has not yet been physically removed from the index page. See also pseudoempty.
Pertaining to an index page on which all the keys are marked as pseudo deleted. See also pseudodeleted.
An IMS in a multisystem environment in which all terminals are handled and a small number of time-consuming transactions are routed to a transaction processing system. See also front-end system, transaction processing system.
A host connection that is not explicitly defined to the ESS and that has access to at least one volume that is configured on the ESS. For example, the FiconNet pseudo-host icon represents the FICON protocol. See also access-any mode, EsconNet, FiconNet.
In the Integration Flow Designer, dotted lines manually drawn in a system definition diagram that visually represent a data flow relationship between two map components that has not yet been determined precisely.
A set of shelf-resident optical volumes associated with stand-alone, operator-accessible, or both stand-alone and operator-accessible optical disk drives. See also real optical library.
A token consisting of eight decimal characters, which can be used in place of the recovery token in certain circumstances. For example, a pseudorecovery token is displayed when the status of an application thread is in-doubt. It is made shorter so that it is easier to note and enter, for example, in certain DBCTL commands. See also recovery token.
A special file in the /dev directory that effectively functions as a keyboard and a display device for software that uses the Berkeley line discipline. A pseudo terminal consists of a pair of character devices: a) the slave device (/dev/pts), and b) the master device (/dev/ptc).
In COBOL, a sequence of character-strings and/or separators bounded by, but not including, pseudo-text delimiters. Pseudo-text is used in the COPY REPLACING statement for replacing text strings.
See Print Services Facility.
See physical services header.
See product-set identification.
See partitioned secondary index.
See Parallel Sysplex license charge.
See Printing Systems Manager.
See Practitioner Support Network.
See packet switched public data network.
See product-sensitive programming interface.
See page set recovery pending.
See program static storage area.
See public switched telephone network.
See power-supply unit.
See program status word.
See partner table.
See physical terminal.
See program temporary fix.
A single, orderable PTF (program temporary fix or simply, fix) that provides a logical set of PTFs for a specific function such as database or Java. PTF groups are dynamically updated when new PTFs for the same function become available.
See Peer-to-Peer VTS data.
See Peer-to-Peer VTS mode control.
See Peer-to-Peer Virtual Tape Server.
See physical unit.
- In the Java programming language, pertains to a method or variable that can be accessed by elements residing in other classes. (Sun)
- In object-oriented programming, pertaining to a class member that is accessible to all classes.
Public Address Book
See Domino directory.
An alias defined in the SYSPUBLIC schema that can always be referenced by its unqualified name without any impact from the current default schema name. See also alias.
- In publish/subscribe messaging, a piece of information about a specified topic that is available to a queue manager, for delivery to subscribed applications.
- The process of sending a set of data that is downloaded from a master database to a subscribing replica database. See also incremental publication.
- In event publishing, an object that identifies what changes are published from a source table to a user application. The Q Capture program publishes changes from a source table and puts those changes on a send queue in XML or delimited format. See also Q subscription, replication source.
The authority given to users who do not have any specific (private) authority to an object, who are not on the authorization list (if one is specified for the object), and whose group profile has no specific authority to the object. See also owner authority, primary group authority, private authority.
- A network operated by a government or private organization to provide computer communications to the public, usually for a fee. With a PDN, a small organization can create a WAN without incurring the equipment costs of long-distance circuits.
- A communications common carrier network that provides data communications services over switched or nonswitched lines. See also private network.
In UNIX-based operating systems, a directory that can be used by anyone on the system. Typically /tmp and /usr/tmp are public directories used for temporary file storage. The UUCP system provides a public directory named /usr/spool/uucppublic, where users from remote systems can deposit files.
A group of individuals, known to all portal users, that the administrator has created or that exists in the organization's corporate directory. Only administrators can modify and manage public groups. See also person.
- The non-secret half of a cryptographic key pair that is used with a public key algorithm. The public key is made available to everyone. Public keys are typically used to verify digital signatures or decrypt data that has been encrypted with the corresponding private key. See also private key, public key infrastructure.
- In secure communication, an algorithmic pattern used to decrypt messages that were encrypted by the corresponding private key. A public key is also used to encrypt messages that can be decrypted only by the corresponding private key. Users broadcast their public keys to everyone with whom they must exchange encrypted messages. See also key, private key.
public key algorithm (PKA)
An algorithm designed so that the key used for encryption is different from the key used for decryption. The decryption key cannot be derived, at least not in any reasonable amount of time, from the encryption key.
public key cryptography
A cryptography system that uses two keys: a public key known to everyone and a private or secret key known only to the recipient of the message. The public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them.
Public Key Cryptography Standards (PKCS)
A set of industry-standard protocols used for secure information exchange on the Internet. Domino Certificate Authority and Server Certificate Administration applications can accept certificates in PKCS format.
public key exponent
One of the two components of an RSA public key. By convention, it is normally set to either a value of 3 or 65537. The combination of the public key exponent and the modulus (the other component of a public key) is mathematically derived with the corresponding RSA private key.
public key infrastructure (PKI)
A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in a network transaction. See also public key, SWIFTNet public key infrastructure.
See public data network.
A shared place that is open to all portal users. The person who creates the place (and who automatically becomes the place manager) designates it as a public place during place creation. See also restricted place.
public-private key cryptography
See public key cryptography.
See public alias.
The virtual local area network (VLAN) that connects the cluster nodes and management server to the site network. Applications are accessed and run on cluster nodes over the public VLAN. The public VLAN can be connected to nodes through a second Ethernet adapter in each node, or by routing to each node through the Ethernet switch.
- To send a rule to a server for storage and management.
- To make data available to another application or system. See also subscribe.
- To make a web site public, for example by putting files in a path known to the HTTP server.
- To bind a reference to the home of an enterprise bean in a namespace.
- To make a project, tasks and templates visible to the required resources.
- To make information about a specified topic available to a queue manager in a publish/subscribe system.
- In Cognos BI, to expose all or part of a Framework Manager model or Transformer PowerCube, through a package, to the Cognos server, so that the data can be used to create reports and other content.
- In UDDI, to advertise a web service so that other businesses can find it and bind with it. Service providers publish the availability of their services through a registry.
- To create a read-only copy of a document in an object store. Publishing makes the publication document available to a different audience and may translate the content to a different format.
- In Cognos Planning, to copy the data from Contributor or Analyst to a data store, typically so that the data can be used for reporting purposes.
A type of interaction used for moving information about application events into the WebSphere business integration system for processing. Collaborations subscribe to events, and connectors publish events to subscribed collaborations.
published module object
A database object defined in a module that can be referenced from outside the module. See also module object.
An application that makes information about a specified topic available to a broker in a publish/subscribe system. See also producer.
publishing queue map
In event publishing, an object that contains the settings for how a Q Capture program processes transactions and identifies the WebSphere MQ queue that is used to send transactional data. See also event publishing, queue map, replication queue map.
publishing style template
A set of translation and formatting rules applied when a document is published. See also template.
A type of messaging interaction in which information, provided by publishing applications, is delivered by an infrastructure to all subscribing applications that have expressed interest in that type of information.
A template that determines the properties, format (such as HTML), and storage location of the publication document. The also template determines whether the publication document is replaced or versioned when it is republished. See also template.
A network operation that initiates an action by requesting the action from a resource. See also push.
In SQL replication, a configuration in which the Apply program runs on the target server. The Apply program pulls updates from the source server to apply them to the target. See also push configuration.
- In AIXwindows, a type of MenuPane widget that gives the appearance of being pulled down from a MenuBar widget as the result of a user action, usually, clicking a mouse button.
- In a character-based interface, a menu that emerges in a downward direction from a point or line at or near the top of the screen; for example, a menu that appears when the user selects a particular display element or points to a line in another menu by using a device such as a mouse.
- See menu.
- In WebSphere Commerce Payments, to remove all associated payments and credits from a batch object, treating it as if it had just been created.
- The abnormal end of a task by task control to alleviate a short-on-storage condition.
- In Performance Tools, a job attribute that specifies whether a job is to be marked eligible to be moved out of main storage to auxiliary storage when entering a long wait or leaving the activity level.
- To permanently delete an item from a database.
See Persistent Uniform Resource Locator.
- To add an item to the top of a pushdown list. See also pop.
- The insertion of a module in a stream immediately below the stream head.
- A network operation that sends information to resources. See also pull.
- To upload or export to a server.
- In a window or dialog box, a rectangular control that, when clicked, immediately causes an action to be performed. Push buttons can be labeled with text, graphics, or both. The most familiar push buttons are OK and Cancel.
- A key on a telephone key pad.
In SQL replication, a configuration in which the Apply program runs on the source server or a replication server other than the target server. The Apply program pushes updates from the source server to apply them to the target. See also pull configuration.
In a federated system, the processing of fragments of a query at a data source instead of at the federated system. See also compensation.
A list that is constructed and maintained so that the next data element to be retrieved is the most recently stored. See also last-in first-out.
See program update tape.
See physical unit type.
See project VOB.
See processor value unit.
See Preboot Execution Environment.
See parallel engine.