This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See Remote To Local.
See Remote To Remote.
See resource allocation timeout value.
See receive-any control element.
A condition that occurs when two or more independent tasks simultaneously attempt to access and modify the same state information. This condition can lead to inconsistent behavior of the system and is a fundamental issue in concurrent system design.
See Resource Access Control Facility.
Pertaining to a data set for which the RACF indicator is set on. If a data set is RACF-indicated, a user can access the data set only if a RACF profile or an entry in the global access checking table exists for that data set.
RACF remove ID utility
A RACF utility that identifies references to residual or specified user IDs and group names in the RACF database that can be removed after review and possible modification. See also residual user ID.
RACF SMF data unload utility
A RACF utility that enables installations to create a sequential file from security-relevant audit data. The sequential file can be viewed directly, used as input for installation-written programs, and manipulated with sort-merge utilities. It can also be uploaded to a database manager to process complex inquiries and create installation-tailored reports. See also SMF record.
In RACF, the issuing of the RACHECK macro or the RACROUTE macro with REQUEST=AUTH specified. The primary function of a RACHECK request is to check a user's authorization to a RACF-protected resource or function. See also authorization checking, RACROUTE.
In RACF, the issuing of the RACINIT macro or the RACROUTE macro with REQUEST=VERIFY or REQUEST=VERIFYX specified. A RACINIT request is used to verify the authority of a user to enter work into the system. See also RACROUTE.
- A free-standing structure or frame that can hold multiple servers and expansion units.
- A free-standing structure that can hold multiple servers, storage systems, chassis, switches, and other devices.
- See enclosure.
In DFSMSrmm, a 6-character identifier that corresponds to a specific volume's shelf location in the installation's removable media library; the rack number is the identifier used on the external label of the volume to identify it. See also cell, shelf location.
See Random Automated Cartridge Loader.
A file containing deployment objects such as task templates, system profiles and software components used to archive data or to transfer data between two OS deployment servers. A RAD file has a .rad extension.
In mobile computing, the medium for transmitting a signal from a cell site to a mobile device. When a cellular device moves from one cell to another, the cell site transmits a radio signal that a device responds to by switching to the newest, closest cell. Cellular devices originally used FM signals to communicate with devices. See also base station, cell, radiolocation, transceiver.
In graphical user interfaces, a control that comprises a circle with text beside it, representing one of set of mutually exclusive choices. The circle is partially filled when a choice is selected.
radio data terminal (RDT)
A hand-held or truck mounted radio unit or PDA that provides operators permanent contact with a host system through radio. Data is entered by a bar code scanner and keypad and sent to the host computer to process.
radio frequency identification (RFID)
An automatic identification and data capture technology that identifies unique items and transmits data using radio waves. See also active radio frequency identification.
A primitive form of geolocation, most often using radio signals from cellular base stations to trilaterate the user's position based on radio signal. See also geocoding, geolocation, Geospatial Entity Object Code, geotagging, global positioning system, radio, reverse geocoding.
See remote authentication dial-in user service.
The positive integer by which the weight of the digit place is multiplied to obtain the weight of the digit place with the next higher weight; for example, in the decimal numeration system the radix of each digit place is 10, in a biquinary code the radix of each fives position is 2.
In DB2 for i5/OS, an object that provides random access to rows in a database table. See also encoded-vector index.
Pertaining to text that is not aligned to the left margin. See also ragged right.
Pertaining to text that is not aligned to the right margin. See also ragged left.
See remote alarm indication.
See receive-any input area.
See Redundant Array of Independent Disks.
A data striping technique, which is commonly called RAID Level 0 or RAID 0 because of its similarity to common, RAID, data-mapping techniques. It includes no data protection, however, so, strictly speaking, the appellation RAID is a misnomer. RAID 0 is also known as data striping.
- A combination of RAID 0 and RAID 1 in which two identical copies of striped data exist, but there is no parity.
- A collection of two or more physical drives that present to the host an image of one or more drives. In the event of a physical device failure, the data can be read or regenerated from the other drives in the RAID due to data redundancy.
See node canister.
See RAID level.
Hardware attached inside a rack to hold devices that are designated as installable in a rack. See also slide.
See commercial processing workload.
A device, usually a basic traffic light or a two-section signal (red and green only, no yellow) light together with a signal controller, that regulates the flow of traffic entering freeways according to current traffic conditions.
- Pertaining to a computer's process of reading data from and writing data to storage in a nonsequential manner.
- In COBOL, an access method in which the program-specified value of a key data item identifies the logical record that is obtained from, deleted from, or placed into a relative or indexed file.
- An access mode in which records can be referred to, read from, written to, or removed from a file in any order.
random file access
The location of a record that matches a specific index key value. Random access of the records in a file requires that the file have a unique index and that each record have a unique index key value.
A method of processing in which records can be read from, written to, or deleted from a file order requested by the program that is using them. See also consecutive processing, sequential processing.
- The categorization of an attribute into different segments.
- The set of values that a quantity or function may take.
- In a spreadsheet, the scope that contains one cell or multiple cells.
- A contiguous set of values of a scalar type. A range is specified by giving the lower and upper bounds for the values. A value in the range is said to belong to the range.
- In architecture, a table heading for architecture syntax. The entries under this heading give numeric ranges applicable to a construct. The ranges can be expressed in binary, decimal, or hexadecimal. The range can consist of a single value.
- The number of consecutive occurrences of the component in the data stream. The range is composed of two numbers separated by a colon.
range-clustered table (RCT)
A table whose data is tightly clustered across one or more columns. Each record in the table has a predetermined offset from the logical start of the table, which allows rapid access to the data.
A distribution scheme that distributes data in table fragments that contain a specified key range. This technique can eliminate scans of table fragments that do not contain the required rows, making queries faster.
A user-defined algorithm for expression-based fragmentation. It defines the boundaries of each fragment in a table using SQL relational and logical operators. Expressions in a range rule can use the following restricted set of operators: >, <, >=, <=, and the logical operator AND. See also arbitrary rule.
- See array.
- A property that determines the order of a reason.
- An integer value that signifies the relevance of a given part to the results of a query. A higher rank signifies a closer match.
- The assignment of an integer value to each document in the search results from a query. The order of the documents in the search results is based on the relevance to the query. A higher rank signifies a closer match. See also dynamic ranking, static ranking.
- The process of sorting and prioritizing search results, by using techniques such as link analysis or relevance, so that the results that are most likely to be useful appear first in the list of results.
See root anchor point.
Rapidly Adaptive Visualization Engine (RAVE)
A system for the general visualization of all forms of data. RAVE is embedded within IBM Cognos Business Intelligence, and provides the ability for innovative and interactive visualizations.
Rapid Network Reconnect (RNR)
A function of IMS that automatically reconnects IMS VTAM terminal sessions across outages (IMS, z/OS, or VTAM) and subsequent IMS restarts on the same or different z/OS systems within a sysplex.
Rapid Transport Protocol (RTP)
A connection-oriented, full-duplex transport protocol for carrying session traffic over High-Performance Routing (HPR) routes. See also automatic network routing, Rapid Transport Protocol connection.
Rapid Transport Protocol connection (RTP connection)
A connection between two High-Performance Routing (HPR) nodes that may traverse one or more intermediate HPR nodes and links. The connection endpoints provide error recovery and adaptive rate-based flow control for the connection traffic, and nondisruptive switching of the underlying physical path in the case of route outage. The intermediate HPR nodes minimize their routing overhead using automatic network routing (ANR) protocols, which rely on header information to permit efficient source routing and prioritized transmission along the RTP connection. See also Rapid Transport Protocol.
See Reverse Address Resolution Protocol.
An attribute that the server applies to a request to control how the server processes that request. RAS attribute values can be defined with server-level, protocol-level, or request-level granularity. See also reliability, availability, and serviceability.
The extent to which a user can assign different RAS attribute values to different sets of requests within the same application server. The user can define RAS attribute values on a per-server, per-protocol, or per-request basis. See also protocol-level RAS granularity, reliability, availability, and serviceability, request-level RAS granularity, server-level RAS granularity.
- The area of the video display that is covered by sweeping the electron beam of the display horizontally and vertically. Normally the electronics of the display sweep each line horizontally from top to bottom and return to the top during the vertical retrace interval.
- In computer graphics, a predetermined pattern of lines that provides uniform coverage of a display space.
- In nonimpact printers, an on-or-off pattern of electrostatic images produced by the laser print head under control of the character generator.
A font in which the characters are defined directly by the raster bit map. See also outline font.
A computer graphic in which a display image is composed of an array of pixels arranged in rows and columns. See also coordinate graphic.
See raster pattern overlay.
raster pattern overlay
An overlay loaded in a printer as a raster pattern, rather than as a sequence of commands. See also coded overlay.
A technique of generating or recording the elements of an image by a line-by-line sweep across the entire output medium. A raster scan may be directed by a program, in which case it may also be considered a directed-beam scan.
A price increase or reduction that is based on criteria such as the number of stops or the distance of a route. See also break schedule.
See rate identifier.
See Rapidly Adaptive Visualization Engine.
- Data that has not been processed or reduced.
- Unprocessed data that contains information about software items and manufacturers, obtained through software scans.
raw data set
A file that contains unfiltered data about software items and manufacturers, obtained through software scans. A knowledge base analyst can use the raw data set as a basis for defining unique software items and signatures in the knowledge base. See also expectation list, signature candidate.
raw logical volume
A portion of a physical volume that is comprised of unallocated blocks and has no journaled file system (JFS) definition. A logical volume is read/write accessible only through low-level I/O functions.
A nonlogged permanent table that uses light appends. See also light append.
See relative byte address.
See role-based access control.
See rule-based break iterator.
See role-based management.
See rollback required.
See robbed-bit signaling.
See read cache device.
See real-time control microcode.
See remote change management server.
See rich client platform.
See Revision Control System.
See relational database.
The directory where remote databases in the network are registered. Information in a directory tells the system which communications parameters to use to connect to a remote database. The RDB directory also contains the name of the local database.
See relational database management system.
See resource definition data set.
See resource definition macro.
See Remote Direct Memory Access.
RDMA over Ethernet
See Internet Wide Area RDMA Protocol.
See relational database management system.
See relative distinguished name.
See resource definition online.
See Remote Desktop Protocol.
See read-only dynamic storage area.
See record descriptor word.
See remote extension.
A means of extending the data accessible to the end user beyond that which is stored in the OLAP Server. A reach through is performed when the OLAP Server recognizes that it needs additional data and automatically queries and retrieves the data from a data warehouse or OLTP system.
See corrective maintenance.
The quality in type and its spacing and composition that affects how comfortably printed matter can be read over a sustained period. Examples of characteristics that influence readability are type quality, spacing, and composition.
- An access intent that establishes the intent of an application to read the database (without making modifications) and to be protected from an updater's incomplete changes. It allows other applications to share the database. See also scheduling intent.
- In computer security, permission to read information.
- A data authority that allows the user to look at the contents of an entry in an object.
- An authority subset that allows the user to read entries in an object. The system-recognized identifier is *R. *R authority combines object operational authority and read authority.
An ANSI compliant level of isolation that the SET TRANSACTION statement can specify, in which a user can view rows that are currently committed at the moment of the query request, but cannot view rows that were changed as part of a currently uncommitted transaction. This is the default isolation level for databases that are not ANSI compliant. See also committed read.
- In RJE, a program that reads jobs from a database file or interactive display station and sends them to the host system.
- In micrographics, a device that enlarges microimages for viewing.
- An internal program that reads jobs from an input device or a database file and places them on a job queue.
- A program that formats data so that the user can explore and work with the data. Developers create customized readers for the more complicated and structured data.
- In bar code systems, the scanner or combination of scanner and decoder.
- In Connections Files, an access level that allows a user to read, comment on, download, and recommend a file. A user with this access cannot upload new versions of the file.
- An access level with which users can only read documents.
An object authority that allows the user to read entries in an object, run a program, and search a library or directory. Read/execute authority combines object operational authority, read authority, and execute authority. The system-recognized identifier is *RX.
An input operation that waits for input from any one of the invited program devices for a user-specified time. See also read-from-one-program-device operation.
An input operation that will not complete until the specified device has responded with input. See also read-from-invited-program-devices operation.
For an RSR database-level tracker, the level that determines whether a shadow database is ready to apply database changes as they are received from the active IMS. See also recovery-readiness-level database.
An attribute of a read request, which ensures the integrity of the data passed to a program that issues a read-only request. CICS recognizes two forms of read integrity: consistent and repeatable. See also consistent, dirty read, repeatable.
A lock that prevents any other process from setting a write lock on any part of the protected area. See also write lock.
An access level that permits a user or an application to read a document or record but not to update it. See also scheduling intent.
A recovery mode of operation employed when RACF is enabled for sysplex communication. Read-only mode does not allow updates to be made to the RACF database except for statistics generated during logon and job initiation.
read stability (RS)
An isolation level under which a query that is issued more than once in a transaction is guaranteed to read the same rows for each subsequent execution. However, in subsequent executions, the query might read additional (phantom) rows that were inserted or updated and then committed by statements in concurrently running transactions. A query in a transaction using RS is prevented from reading any rows changed by statements in other transactions until the changes have been committed. Also, until the transaction using RS has been committed, any rows that a query in that transaction reads cannot be changed by statements in other transactions. See also cursor stability, isolation level, repeatable read, uncommitted read.
A sparse cache that loads data entries by key as they are requested. When data cannot be found in the cache, the missing data is retrieved with the loader, which loads the data from the back-end data repository and inserts the data into the cache.
An ANSI-compliant level of isolation, set with the SET TRANSACTION statement, that does not account for locks. This allows a user to view any existing rows, even rows that can be altered within currently uncommitted transactions. Read uncommitted is the lowest level of isolation (no isolation at all), and is thus the most efficient. See also dirty read.
read with integrity
See read access.
read without integrity
See read-only access.
An object authority that allows the user to add, change, delete, and read entries in an object. Read/write authority combines object operational authority, read authority, add authority, update authority, and delete authority. The system-recognized identifier is *RW.
An object authority that allows the user to add, change, delete, and read execute entries in an object, run a program, and search a library or directory. Read/write/execute authority combines object operational authority, read authority, add authority, update authority, delete authority, and execute authority. The system-recognized identifier is *RWX.
An automatic class selection (ACS) language variable that is assigned a value within an ACS routine. It can be referenced, and each ACS routine assigns a value to its own, unique, read/write variable.
- Pertaining to a state in which a device or program is prepared to accept further commands.
- Pertaining to a status where all the loaded and mounted image catalog entries are available for use by the active virtual optical device. Any image catalog entry with a status of unloaded is not available for use by the virtual optical device. The image catalog can be made ready by using the LODIMGCLG (Load Image Catalog) command with OPTION(*LOAD).
The address by which a logical unit (LU) is known within the SNA network in which it resides. See also network address translation.
An attribute that must have a value. See also pseudoattribute.
In Digital Analytics, a region or an amount of space on a web page. Real estate is used to analyze the performance of particular pages, different versions of a page (for example, in an A/B test), sub-sections of a page, and individual links within a page. Real estate values are collected using cm_re= parameters.
See real group ID.
- The attribute of a process that, at the time of process creation, identifies the group of the user who created the process. This value is subject to change during the process lifetime. See also effective group identifier, group identifier.
- For each user, the group ID defined in the password file.
In UML, a dependency relationship in which one class implements the behavior that another class specifies. See also dependency relationship.
In the web diagram editor, to associate a node with an actual resource by creating that resource or by editing the node path so that it points to an existing resource. See also unrealized.
Really Simple Syndication (RSS)
An XML file format for syndicated web content that is based on the Really Simple Syndication specification (RSS 2.0). The RSS XML file formats are used by Internet users to subscribe to websites that have provided RSS feeds. See also Atom, feed, Rich Site Summary.
- A grouping of customers, organized by division, region, or company, which is used to separate customer data.
- A collection of resource managers that honor a common set of user credentials and authorizations.
- A named collection of users and groups that can be used in a specific security context.
- In the Kerberos protocol, the set of principals for which a specific key distribution center (KDC) is the authenticating authority.
The Kerberos protocol either searches the configuration file to determine realm trust or by default looks for trust relationships within the realm hierarchy. Using Trusted realms in network authentication service allows you to bypass this process and creates a shortcut for authentication. Realm trust can be used in networks where realms are in different domains. For example, if a company has one realm at NY.myco.com and another at LA.myco.com, then you can establish trust between these two realms. If two realms trust each other their associated KDCs must share a key. Before creating a shortcut, you must set up the KDCs to trust each other.
- A number that can be represented by a finite or infinite numeral in a fixed-radix numeration system.
- A number that contains a decimal point and is stored in fixed-point or floating-point format.
- See R-formatted number.
An object that represents an actual resource. See also aggregate object.
real optical library
A physical storage device that houses optical disk drives and optical cartridges, and contains a mechanism for moving optical disks between a cartridge storage area and optical disk drives. See also pseudooptical library.
- In the NetView Graphic Monitor Facility, an individual network resource represented by a real object.
- In VTAM, a resource identified by its real name and its real network identifier.
- The main storage in a virtual storage system. Physically, real storage and main storage are identical. Conceptually, however, real storage represents only part of the range of addresses available to the user of a virtual storage system.
- Storage directly accessible to the processor from which instructions can be run and from which instructions can fetch data.
- In Open Systems Interconnection architecture, pertaining to an application such as a process control system or a computer-assisted instruction system in which response to input is fast enough to affect subsequent input.
- Pertaining to a process in which output data is available at the same rate at which input data is processed.
See synchronous replication.
Real-Time Transport Protocol (RTP)
A protocol that provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services.
See real user ID.
- For each user, the user ID that is specified in the /etc/passwd file.
- An identifier that is associated with the user who initiates a session or who becomes the owner of one.
- The attribute of a process that, at the time a process is created, identifies the user who created the process. See also effective user identifier, user identifier.
To resubmit an application. A candidate can resubmit an application if they have been rejected for a position and have additional information to supply that may result in the rejection being overturned.
An expression that generates an event that alternates with an original event in the following way: the event expression is used until it is true; then, the rearm expression is used until it is true; then, the event expression is used. The rearm expression is commonly the inverse of the event expression. It can also be used with the event expression to define an upper and lower boundary for a condition of interest.
See rearm expression.
reasonable resource loaded value (RRLV)
A value used by PSF to keep the number of resources loaded at a manageable level. At data set end, PSF deletes resources for a particular resource type until this value is reached.
- A return code that describes the reason for the failure or partial success of a Message Queue Interface (MQI) call.
- A code assigned to identify a reason. Each scorecard can have multiple reasons.
- A value used to indicate the specific reason for an event or condition.
- An industry-standard code that shippers and carriers can use to identify a change to a shipment. For example, a reason code can be specified if a dock appointment, shipment status, or estimated time of arrival (ETA) is updated.
- In OSI, a function performed by an (N)-entity to map multiple (N)-protocol-data-units into one (N)-service-data-unit. Reassembly is the opposite of segmenting.
- In communications, the process of putting segmented packets back together after they have been received.
In cross-site mirroring, to reassociate the mirror copy with its production copy after user operations on the mirror copy are complete. When the mirror copy is reattached, it is automatically synchronized to match the production copy again. All data on the mirror copy prior to when it is reattached to the production copy is cleared.
A list of the reattachment events that have caused a particular activity to be activated. Each activity has a reattachment queue associated with it. The queue may be empty. Events remain on the reattachment queue until they are retrieved by the activity, or until a sync point occurs.
A ClearCase operation that makes a development work area current with the set of versions represented by a more recent baseline in another stream, usually the project's integration stream or a feature-specific development stream.
- To create a package for an application program by using information from the previously bound package. For example, in DB2 for Linux, UNIX, and Windows and DB2 for z/OS, if an index is added for a table that is accessed by a program, the package must be rebound for it to take advantage of the new index. See also automatic rebind, explicit rebind, implicit rebind, recompile.
- To associate all backed-up versions of a file with a new management class name. For example, a file that has an active backup version is rebound when a later version of the file is backed up with a different management class association. See also bind, management class.
- To reestablish a communications channel for making remote procedure calls after that channel has been closed.
- To request renewal of a lease from a system on a particular network.
A method of maintaining keyed access paths for database files. This method updates the access path only while the file is open, not when the file is closed; the access path is rebuilt when the file is opened. See also delayed maintenance, immediate maintenance.
The stage that a database is in from the time that the database successfully completes a rebuild restore operation until the first time that the database is rolled forward and log records start being processed.
- The process of moving a migrated data set from a level 1 or level 2 volume to a volume that is or is not managed by DFSMShsm. See also hierarchical storage management.
- To break and transfer the user lock and party lock of a presented contract from the external party to the internal party.
- To copy a migrated file from server storage back to its originating file system using the hierarchical storage management client. See also selective recall.
- An information retrieval measurement that specifies the percentage of relevant data that is retrieved, out of all available relevant data. Recall is a measure of sensitivity. Information retrieval is best measured by using both precision and recall. See also precision.
An electronic document that verifies or acknowledges a trading partner agreement. See also Message Disposition Notification.
A positive business signal that acknowledges receipt of a message. The receipt acknowledgment is sent from the receiver of a valid business action message back to the sender. Validity of the message is determined by RNIF base-level validation or by additional validation requirements negotiated between trading partners.
receive-any control element (RACE)
Type of control field held in the CICS receive-any pool set aside for VTAM receive-any operations. The number of RACEs maintained depends on the RAPOOL and MXT system initialization parameters and on the number of active tasks.
receive-any input area (RAIA)
Type of input area held in the CICS receive-any pool set aside for VTAM receive-any operations. The number of RACEs maintained depends on the RAPOOL and MXT system initialization parameters and on the number of active tasks.
received page counter
See channel counter.
A type of channel exit program that is called just after the message channel agent (MCA) has regained control following a communications receive and has received a unit of data from a communications connection. See also send exit.
In SNA, the pacing of message units that a component is receiving. See also send pacing.
- In hardware, a functional unit that converts small electronic signals to signals that control a device.
- The object handling a stimulus passed from a sender object. See also sender.
- A defined role in WebSphere Commerce that receives inventory at the fulfillment center, tracks expected inventory records and ad hoc receipts for ordered products, and receives returned products as a result of customer returns. See also logistics manager.
- A server repository that contains a log of server and client messages as events. For example, a receiver can be a file exit, a user exit, or the server console and activity log. See also event.
In extended messaging, a message-driven bean or a session bean. A message-driven bean is invoked when a message arrives at a JMS destination for which a listener is active. A session bean polls a JMS destination until a message arrives, gets the parsed message as an object, and can use methods to retrieve the message data.
The journal receivers presently or previously attached to the same journal. Each journal receiver, except the first one, has a previous receiver that was attached before the current receiver. Each journal receiver, except the currently attached receiver, has a next receiver.
receive ready (RR)
In communications, pertaining to a data link command or response that indicates that a station is ready to receive protocol data units. Receive ready also acknowledges receipt of protocol data units.
See receiver number.
recency, frequency, monetary (RFM)
A technique used to determine which customers are the best ones by examining how recently a customer has purchased (recency), how often they purchase (frequency), and how much the customer spends (monetary).
Recent File Transfer Activity widget
A widget that provides a graph that depicts volume of file transfers over time for each type of monitored server. From the widget, a list of transfers for each server type can be accessed to troubleshoot server issues.
See record formatted maintenance statistics.
A string of data that represents the address associated with the recipient of the message. The contents and format of the string are not defined by the mail server framework. The address type associated with the recipient address is assumed to define the contents of the recipient address field.
recipient history tree
A structure that represents the changes to the recipient list, so that a recipient can be traced back to the recipient entry in the original recipient list passed using the Create Mail Message application program interface (API).
The percentage of space that a sequential-access media volume must have before the server can reclaim the volume. Space becomes reclaimable when files are expired or are deleted.
See record maintenance statistics.
Recognition Engine server
In WebSphere Voice Server, the software that carries out the speech recognition and forwards the results to the client. This consists of one 'Tsm router' and at least one 'tsmp' and one 'engine'.
In the 3270 Terminal Services tool, a list of the identifiers that uniquely identify the state of a screen, that is, the set of conditions that apply to the screen at the time the screen was imported from the host. Each screen state needs to be uniquely defined in its own recognition profile.
In the 3270 terminal services development tool, the table that appears in the screen editor and provides a screen definition view and a recognition profile view of the screen that was imported.
- Any individual, company, or corporation, other than a government department or service, that operates a telecommunication service and is subject to the obligations undertaken in the Convention of the International Telecommunication Union and in the Regulations; for example, a communication common carrier.
- A private X.25 network that can optionally be selected by the user at call setup time to carry the X.25 traffic.
Recommendation X.21 (X.21)
A document, CCITT Recommendation X.21, that outlines standards for a general-purpose interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) for synchronous operations on a public data network.
Recommendation X.21 bis
A document, CCITT Recommendation X.21 bis, that outlines standards for the interface between data terminal equipment (DTE) and V-series data circuit-terminating equipment (DCE) for synchronous operations on a public data network.
Recommended Communities widget
A widget that can be used to find communities that might be worth joining. The information provided by the widget can be used to help in deciding whether to join a recommended community.
To re-create a package for an application program by using information in the application program code. See also rebind.
To compare and optionally update the links in an artifact that point to other artifacts. When a source artifact is reconciled, its links are compared with the states of its associated target artifacts in another application. After reconciliation, the changes can be synchronized or ignored, or the associated artifacts can be updated. See also synchronize.
- The process of comparing the actual and authorized versions of a set of configuration items and resolving variances between the two versions.
- A transaction that compares discovered assets to authorized assets.
- The process of synchronizing a file system with the server, and then removing old and obsolete objects from the server.
- The process of ensuring consistency between the original data repository and the larger system where the data is stored for backup. Examples of larger systems where the data is stored for backup are storage servers or other storage systems. During the reconciliation process, data that is identified as no longer needed is removed.
RECON data sets
See recovery control data set.
- The process whereby the cluster adjusts to changes in membership. See also dynamic automatic reconfiguration.
- The process of adding hardware units to, or removing hardware units from, a configuration.
A method by which information pertaining to the identity of network resources is gathered. Network scanning and other techniques are used to compile a list of network resource events which are then assigned a severity level.
See fast subsequent migration reconnect.
- In Enterprise Service Tools, a schema or message that corresponds to a known COBOL COMMAREA data structure and that describes the states of the schema or message in a set of record descriptions.
- In programming languages, an aggregate that consists of data objects, possibly with different attributes, that usually have identifiers attached to them. In some programming languages, records are called structures.
- A set of one or more related data items grouped for processing.
- In VTAM, the unit of data transmission for record mode. A record represents whatever amount of data the transmitting node chooses to send.
- A group of related data, words, or fields treated as a unit, such as one name, address, and telephone number.
- See row.
- The storage representation of a row or other data. See also row.
- Any form of recorded information that is under records management control.
record and playback
A performance monitoring function that is used to record web transactions and Microsoft Windows applications, and then play back the recordings to assess transaction performance and availability. See also playback policy.
Data sets with a record-oriented structure that are accessed record by record. This data set structure is typical of data sets on VM, MVS, and OS/400 systems. See also byte stream.
record definition field (RDF)
In the Virtual Storage Access Method (VSAM), a field stored as part of a stored record segment; it contains the control information required to manage stored record segments within a control interval. See also control interval definition field.
- Data preceding each structured field that specifies the length of the entire record including the RDW. A field preceding each record and specifying the length of the entire record including the RDW itself.
- Data preceding a variable record that specifies the length of the entire record including the RDW.
record format line data
A form of line data where each record is preceded by a 10-byte identifier. See also line data.
record ID code
See record identification code.
record identifier (RID)
A unique identifier that the DB2 database manager uses internally to identify a row of data in a table. See also row identifier.
- A collection of information about user actions performed on a monitored application for some time.
- The information from performance snapshots that can be viewed at a later time.
In Tivoli NetView for OS/390, the function that determines which events, statistics, and alerts are stored in a database. See also filter.
- In RPG, all the key fields defined for the record type.
- In COBOL, a key field whose contents identify a record within an indexed file.
- The total length of all the columns in a table. The record length is the length of the data as physically stored in the database. Records can be fixed or variable in length, depending on how the columns are defined. If all columns are fixed-length columns, the record is a fixed-length record. If one or more columns are varying-length columns, the record is a varying-length record.
- The length of storage that represents a database row or other data.
A means of supporting distributed files. Record-level access enables an application or user to read and update individual records of files on a remote system without specifying the data's location.
record-level sharing (RLS)
See VSAM record-level sharing.
A file with a record-oriented structure that is accessed record by record. This file structure is typical of data sets on VM, MVS, and OS/400 systems. See also stream data file.
record processing pattern
A job step pattern that reads and applies business logic to one record at a time from an input data source. The job step writes the results to an output data source and repeats the steps until all input records are processed.
records management system
Any system for managing records which includes the file plan, disposition schedules, naming patterns, record classes and properties, locations, workflows, and anything else that can be created for records management.
A specific security role, the duties of which include reviewing entities that are ready for disposition, declaring records, and performing basic record-related operations, such as filing or copying records.
- A categorization of records that has a disposition schedule that is different from the one currently associated with the container.
- The classification of records in a file. Records of the same type have the same fields in the same order. For program-described files, these records have record identification codes; for externally described files, the records have the same record format name.
- The ability of a system to continue processing without loss of data when an unplanned interruption occurs.
- The degree or extent to which the system can be restored to an operational condition after a system failure.
An error condition that can be automatically corrected (for example, by retry operation) and, when corrected, allows continued processing of a job, a program, or a hardware function.
recoverable indoubt structure (RIS)
In DBCTL, an area constructed for each unit of recovery when a failure occurs. Each RIS is written to the IMS log. RIS contents include the recovery token, the changed data records, and the identity of the data block that cannot be accessed because of unresolved in-doubts.
- See protected resource.
- A resource that can be modified only in accordance with sync point protocols.
recoverable resource management services (RRMS)
The set of three system components that provide resource recovery services in z/OS: resource recovery services (RRS), context services, and registration services.
Recoverable Resource Manager Services attachment facility
A DB2 subcomponent that uses Resource Recovery Services to coordinate resource commitments between DB2 and all other resource managers that also use RRS in a z/OS system.
- A set of DBCTL subsystem identifiers of equivalent DBCTL subsystems, their associated job names, and the specific APPLIDs of the CICS systems that will use them. RSEs are defined by CICS resource definition macros and are held in the recoverable service table (RST).
- A service element (IMS) that is backed up and that can initiate a takeover.
- In Backup, Recovery, and Media Services, the process of locating and restoring data in the event of partial or total data destruction. The recovery service automatically locates the correct media to be restored based on user-defined media management and recovery requirements.
- The process of rebuilding data after it has been damaged or destroyed, often by using a backup copy of the data or by reapplying transactions recorded in a log.
- The process of re-creating a database or table space that became unusable because of hardware failure, software failure, or both. The process includes restoring a backup image and can also include rolling database logs forward in time.
- The process of returning the system to a state from which operation can be resumed.
- The process of restoring access to file system data when a failure has occurred. Recovery can involve reconstructing data or providing alternative routing through a different server.
- The restoration of resources following an error.
A subset of nodes in a cluster that are grouped together for a common purpose, such as rebuilding databases after a system failure. A domain represents those nodes of the cluster where cluster resource exists.
An event occurs when acceptable performance (or availability) is regained after a violation. See also violation event.
See fix procedure.
In an RSR environment, a tracking IMS that does not track the databases or areas of the active IMSs, but instead saves all database changes on tracked logs on the tracking IMS until recovery or remote takeover is performed See also database-level tracking.
- A log of updates that are about to be written to the database. The log can be used to recover from system and media failures. The recovery log consists of the active log (including the log mirror) and archive logs.
- See database log.
- In WebSphere MQ for z/OS, data sets containing information needed to recover messages, queues, and the WebSphere MQ subsystem. See also archive log.
- A collection of records that describes the events that occur during DB2 execution and indicates their sequence. The recorded information is used for recovery in the event of a failure during DB2 execution.
- A subcomponent that supplies coordination services that control the interaction of DB2 resource managers during commit, abort, checkpoint, and restart processes. The recovery manager also supports the recovery mechanisms of other subsystems (for example, IMS) by acting as a participant in the other subsystem's process for protecting data that has reached a point of consistency.
- A coordinator or a participant (or both), in the execution of a two-phase commit, that can access a recovery log that maintains the state of the logical unit of work and names the immediate upstream coordinator and downstream participants.
- CICS resource recovery mechanism that provides a CICS resource manager, for example file control, with more flexibility than the DWE two-phase commit support for syncpoint and backout processing.
In the CICS backup-while-open facility, the latest point, on the CICS forward recovery log series for this data set, from which forward recovery can start and restore any image copy taken at that point to a consistent state. The recovery point is held as a time that can be converted to a position on the forward recovery log.
- In disaster recovery planning, the point at which data is restored to in the event of a disaster.
- The acceptable amount of data lost in a period of time.
- The maximum amount of data loss that can be tolerated during a service interruption.
- The method of returning the system to the point where a major system error occurred and running the recent critical jobs again.
- An action performed by the operator when an error message appears on the display screen. This action usually permits the program to continue or permits the operator to run the next job.
- A process in which a specified data station attempts to resolve conflicting erroneous conditions arising during the transfer of data.
In an RSR environment, a database or area to which database changes are not applied as they are received from the active subsystem, but instead are saved on tracked logs on the tracking subsystem until recovery or remote takeover is performed, or until the database's (or area's) readiness level is changed to database readiness level. See also readiness level.
A routine that is entered when an error occurs during the performance of an associated operation. It isolates the error, assesses the extent of the error, and attempts to correct the error and resume operation.
See secondary site.
A system that is used in place of a primary application system that is no longer available for use. Data from the application system must be available for use on the recovery system; data is usually made available through backup and recovery techniques, or through various direct access storage device (DASD) copying techniques, such as remote copy.
- In disaster recovery planning, the total time one can allow for their systems to be offline.
- The maximum duration of time within which an application should be restored after any type of disaster.
- A 16-byte unique identifier that is created by CICS and passed to DBCTL for each logical unit of work (LUW). See also pseudorecovery token.
- An identifier for an element that is used in recovery (for example, NID or URID).
The first volume of a prime index if the Virtual Storage Access Method (VSAM) data set is a key-sequenced cluster. If the VSAM data set is entry-sequenced, a recovery volume is the first volume of the data set.
See recovery pending.
The process of finding the right people, with the right skills, abilities, and fit, who may be hired or already working for the company (organization) or may be working for competing companies.
See hiring manager.
recruitment management system
A software application that enables the electronic handling of recruitment needs. The system can be implemented on an enterprise or small business level, depending on the needs of the company. These systems are typically comprised of one or more candidate portal(s), a recruiter portal for candidate data mining and candidate processing, and a hiring manager portal. They generally also include candidate correspondence and interview scheduling functionality, plus ad-hoc reporting and a metrics dashboard.
See right-hand page.
recurring wait time trigger
A trigger that is evaluated based on a period of time. For example, a recurring wait time trigger can be evaluated every 30 minutes and fire if it detects that a specific business situation has occurred.
The position of a program in a call stack. The first occurrence of a program in a job has a recursion level of 1, the second occurrence of the same program has a recursion level of 2, and so on.
A hierarchy structured solely in terms of parent-child relationships, for which the user can explicitly name the levels contained in the recursive relationships. See also auto-level hierarchy, level.
A DFSMShsm process that, based on the percentage of valid data on a tape backup or a migration-level-2 volume, copies all valid data on the tape to a tape spill backup or migration-level-2 volume, omitting expired, deleted, or recalled data sets.
- To remove changes to a product's name, properties, and artifact links that a user did not mean to share. Redacting does not remove the changes from the history of the object.
- To block the viewing of the data that is displayed in the area under a annotation that is drawn on a document.
- In architecture, the process of applying an opaque mask over a page so that a selected portion of the page is visible. Because this function is typically used to prevent unauthorized viewing of data, an associated security level is also provided.
- An annotation type that is an opaque mask that is applied to a page so that a selected portion of the page is not visible.
The process of creating a reference image of a computer at the end of a deployment, and saving this reference image into a protected redeployment partition. This protected partition is invisible to the user and to the operating system.
- To define or use a logical device name as a reference to another device or file that may be local or remote.
- To divert data from a process to a file or device to which it would not normally go.
A URL used in a URL command to indicate the page that should be sent to the customer upon completion of the command. See also shopping flow URL.
The DEDB process in the second phase of a two-phase commit process if the chosen action is COMMIT. For DEDBs, if phase two action is COMMIT, the changes are written to the database using REDO, because the DEDB changes have only been made in main storage. If the action is BACKOUT, no changes are required to the database because the updates are still in main storage. The process applied is called UNDO. REDO is also used to refer to the action required for committed DEDBs during emergency restart of IMS, DL/I, or SQL/DS.
The amount by which an objective function coefficient must improve (increase for maximization, decrease for minimization) before the value of a corresponding variable is positive in the optimal solution.
reduced instruction set computer (RISC)
A computer that uses a small, simplified set of frequently used instructions for rapid processing. See also complex instruction set computer.
- In information analysis, a measure of the number of columns that have the same values or common domains.
- The use of several identical functional units, such as several disk drives or power supply systems, within one computer system in order to provide data security and a certain degree of fault tolerance in case of hardware failures.
redundant ac-power switch
A device that provides input power redundancy by attaching a device to two independent power sources. If the main source becomes unavailable, the redundant ac-power switch automatically provides power from a secondary (backup) source. When power is restored, the redundant ac-power switch automatically changes back to the main power source.
Redundant Array of Independent Disks (RAID)
A collection of two or more physical disk drives that present to the host an image of one or more logical disk drives. In the event of a physical device failure, the data can be read or regenerated from the other disk drives in the array due to data redundancy. See also device parity protection, Serial Storage Architecture.
redundant dual active controller
A software device driver, used with AIX, Solaris, Linux, Windows, and NAS 500 hosts, and the DS4000 disk subsystems, that provides multipath and load balancing capabilities.
A storage area network (SAN) configuration in which any single component might fail, but connectivity between the devices within the SAN is maintained, possibly with degraded performance. This configuration is normally achieved by splitting the SAN into two independent, counterpart SANs. See also counterpart SAN.
Pertaining to a module that is designed for concurrent execution by multiple tasks. If a reenterable module modifies its own data areas or other shared resources in any way, it must use appropriate serialization methods to prevent interference between using tasks. See also quasi-reentrant.
- The attribute of a program or routine that allows the same copy of the program or routine to be used concurrently by two or more tasks.
- See threadsafe.
Executable code that can reside in storage as one shared copy for all threads. Reentrant code is not self-modifying and provides separate storage areas for each thread. See also threadsafe.
- To transform a program, for example by renaming a package or method, while preserving its behavior.
- To make changes across a set of artifacts without changing the behavior of the application or its relationships to other elements.
In Enterprise Service Tools, a process that propagates a file name change to all referencing artifacts when an operations file or operation within a file is renamed to prevent breaks in the project.
- Logical names defined in the application deployment descriptor that are used to locate external resources for enterprise applications. At deployment, the references are bound to the physical location of the resource in the target operational environment.
- A module that stores required data, including categories and their code and display values, for all applications that are integrating with the Emptoris Strategic Supply Management platform.
- Single direction, one-to-one association between a root or child component and another root component. See also link.
- In VisualAge RPG, information from a physical source file that may be extracted at build time. Any changes made to the original source must be recompiled to reflect the changes at run time.
- A variable data type in which the variable's value is an address.(Sun)
- In a spreadsheet, the coordinates of a cell, usually in column-row format, but can also contain a reference to a sheet within the spreadsheet, for example, A3, or Sheet1.A3
- One or more objects that are grouped in a semipermanent fashion and used as a master for placement on a drawing. Instances of the reference can be placed on the drawing. When the reference definition is changed, all instances of the reference change.
A bit in each page frame table entry that denotes that the corresponding page has been accessed (either read from or written to) since the last time the operating system cleared the page.
reference code translation table
An object that contains reference code and field-replaceable-unit (FRU) code records. These records are used to report hardware errors and do problem analysis and resolution. The system-recognized identifier for the object type is *RCT.
A term in a business glossary that is referred to by a category instead of being contained in that category. A term can be referred to by multiple categories. A term cannot be contained by and referenced by the same category.
In DCF, in a general document, an element whose content is a reference to another element that is generated by an APF. There are five: figure reference, footnote reference, heading reference, index entry reference, and list item reference.
See information frame.
- A sample implementation that uses data such as sample organizations, users, teams, images, items, configuration models, item entitlements, and prices to demonstrate the functionality of various applications and products.
- An implementation by which other implementations are judged for conformance to a standard or are tested for interoperability.
- In Business Graphics Utility, a straight line parallel to either the vertical or horizontal axis relative to which data values are plotted on a chart. Sometimes called a translated axis line.
- A line that is used as a reference to position and orient drawings, objects, or symbols to be added to the active drawing. The reference line can be used to rescale the objects so that the reference line is the same length as the line on which it is placed.
An input link on a Transformer or Lookup stage that defines where the lookup tables exist. See also link.
See two-source matching.
A message that refers to a piece of data that is to be transmitted. The reference message is handled by message exit programs, which attach and detach the data from the message so allowing the data to be transmitted without having to be stored on any queues.
The price that buyers use to compare the offered price of a product or service. The reference price might be a price in a buyer's memory, or the price of a similar, alternative product.
- A list of single elements that are derived from events or flows on a network. For example, a list of IP addresses or a list of user names.
- The amount of real storage required so that minimal (almost zero) virtual paging occurs. It is the total amount of real storage required to process the most frequently used sequence of instructions and data for a given set of transactions performing defined tasks, without causing any virtual storage paging operations.
An online store that contains fully functional code for selected features of an online store, for example, auctions. Reference stores are designed to be used by store developers as code samples of the highlighted features.
- A data table that can be used in comparisons during data analysis.
- A table where the data record maps keys that have an assigned type to other keys, which are then mapped to a single value.
The requirement that the nonnull values of a designated foreign key are valid only if they are also values of the primary key of the parent table. The referential constraint is always defined from the perspective of the dependent file. See also constraint.
A set of referential constraints such that each table in the set is a descendent of itself. See also cycle.
- An analysis that is run after foreign key analysis to ensure that foreign key candidates match the values of an associated primary key.
- In Extensible Markup Language (XML) tools, the condition that exists when all references to items in the XML schema editor or DTD editor are automatically cleaned up when the schema is detected or renamed.
- The state of a database in which all values of all foreign keys are valid. Maintaining referential integrity requires the enforcement of a referential constraint on all operations that change the data in a table where the referential constraints are defined.
- The condition that exists when all intended references from data in one column of a table to data in another column of the same or a different table are valid.
A set of tables and relationships such that for every table in the set, the set includes all relationships in which that table participates and all the tables to which it is related.
- A record that shows number of times a third-party business or website has referred customers to the website. Referrals can be measured for recognition purposes through various techniques including clickstream analysis, clickthrough rates, affiliate marketing services, and surveys.
- In the Lightweight Directory Access Protocol (LDAP), a pointer from one LDAP directory server to another.
- A way for servers to refer clients to additional directory servers. With referrals you can: distribute namespace information among multiple servers, provide knowledge of where data resides within a set of interrelated servers, and route client requests to the appropriate server.
referred Locate search
See referred search.
The domain that is gathered in the session's referring URL for sessions that are not sourced through a marketing program (cm_mmc) or a natural search engine. See also inbound link.
See continuous-forms stacker.
A cumulative collection of fixes and new functions that moves the product up one modification level and a particular service level. For example, a refresh pack might move a product from Version 1 Release 1 Modification level 1 Fix Pack 5 to Version 1 Release 1 Modification level 2 Fix Pack 3. See also fix pack, interim fix, manufacturing refresh, test fix.
The process of dynamically generating application code from a model. When a model is regenerated, each builder in the model executes in sequence and creates pieces of the application, such as JSP Pages or Java methods.
See regular expression.
- In Sterling Order Management, a geographic or market-based zone in which a validation or override rule is applicable.
- A physical instance of a CICS server.
- An area within a bitmap, a pixmap, a screen, or a window.
- In MVS, a variable-size subdivision of virtual storage that is allocated to a job step or system task. CICS Transaction Server runs in an MVS region, usually referred to as the CICS region.
- A defined geographic territory. A region could be a specific postal code area, a town, a city, a state, a group of states, or even a group of countries. Each region can itself be a set of other regions or a set of postal codes that form the region.
- A contiguous area of virtual storage that has common characteristics and that can be shared between processes.
A classification of regions into distinct categories to facilitate easier searches. Region levels such as country, state, city, or county are created based on the level at which an organization wants to aggregate its member regions.
region status server
A coupling facility data table server into which CICS regions broadcast generic system status data which is subsequently interrogated by CICSPlex SM for making dynamic routing decisions.
- In NCS, to enter an object and its location in the Location Broker database. The lb_$register call registers an object with the Location Broker. A program can use Location Broker lookup calls to determine the location of a registered object.
- To insert authorization and authentication information into binding information.
- In the hierarchical file system, to make an underlying file system and the specific functions it supports known to the application programming interface layer and accessible to user applications.
- An internal computer component capable of storing a specified amount of data and accepting or transferring this data rapidly.
- To validate for compliance and store in the Global Registry.
- To add a user-written condition handler onto a routine's stack frame.
- In SQL replication, to define a DB2 table, view, or nickname as a replication source.
- In NCS, to make an interface known to the RPC run time library and, thereby, available to clients through the RPC mechanism. The rpc_$register call registers an interface.
- In a database, to store information about user-defined database objects in the system catalog tables of a database.
- To define a client node or administrator ID that can access the server.
- A customer who is registered with a store. To register, a customer provides personal information to the WebSphere Commerce system, such as an email address.
- In WebSphere Commerce, a defined role that allows the reseller to shop in the marketplace. Resellers must first register in the marketplace and be approved by the seller administrator in order to attain the registered customer role.
registered enterprise-unique identifier
A name given to an entire network that makes the network unique among other networks, including IBM networks. New users are requested to register the network name with IBM if they plan to communicate with IBM networks (for PTF information, for example).
A filter that allows more than one active filter for alerts and problem logs. When a filter is registered, the system can send notification of events to a data queue. Registered filters behave slightly different than filters exposed through the network attributes or system value commands.
registered network ID
An 8-byte name included in an IBM-maintained worldwide registry that has a structured format and is assigned to a particular IBM customer to uniquely identify a specific network.
- A portal user who has a user ID and password for logging in to a portal. See also anonymous user, authenticated user.
- An authorized user of a licensed program who is recorded in a registry (for example a table, directory, or file) maintained by the customer.
- In printing, the relative print positions of images that are printed at different times. For example, when preprinted forms are used, the registration is good if the new image printed by the printer aligns correctly with the preprinted image. Print that extends beyond box edges and text that overlaps other text are examples of poor registration.
- The process of registering a database extension so that its code is available to use in a particular database.
- In Resource Recovery Services (RRS), the definition of a resource manager to the system.
- In X.25, the process used between a DTE and a DCE to establish an agreement on which optional user facilities will be in effect. For example, the DTE can request that the DCE agree to or stop a previous agreement for an optional user facility. Also, a DCE can indicate which optional user facilities are available or which optional user facilities are currently in effect. The negotiation is accomplished through the exchange of registration packets.
- In Cloud/SaaS offerings, the process during which a user signs up for an account on a application or service.
- In OSI, the process of obtaining identifiers for objects from the appropriate naming authorities. Registered identifiers should be obtained for the following objects, which relate to OSI Communications Subsystem operations: (a) NSAP addresses, (b) DTE addresses, (c) abstract syntaxes, (d) application contexts, and (e) application entities.
- In SQL replication, the process of registering a DB2 table, view, or nickname as a replication source. See also subscription.
- The creation of an object in the network installation database that uniquely identifies a client, network, or resource in the network installation environment to the master server.
- In the Tivoli common agent services, the service provided by the agent manager to validate and process requests for X.509 certificates from common agents and management applications. It functions as a registration authority.
- The z/OS system component that enables a resource manager to register itself with the system and identify the exit routines it provides for resource recovery.
- A database where services are enrolled along with a pointer to each service.
- A repository that contains access and configuration information for users, systems, and software.
- A public or private repository that contains images used to create containers. See also container, image.
regression tree algorithm
A tree-based algorithm that splits a sample of cases repeatedly to derive homogeneous subsets, based on values of a numeric output field. See also Chi-squared Automatic Interaction Detector algorithm.
A single aggregate function, used by default to aggregate data across all dimensions of the transformation model. See also aggregate rule, multidimensional aggregation, multilevel aggregation.
In FD:OCA, an array in which all partitions of any dimension have the same number of subpartitions. The individual elements of a regular array might or might not have identical format and length.
A command processed by a regular command processor. Regular commands can run concurrently with other regular commands and can be interrupted by immediate commands. Most commands and all command lists are regular commands. See also immediate command.
- A string containing wildcard characters and operations that define a set of one or more possible strings. See also literal string.
- A set of characters, meta characters, and operators that define a string or group of strings in a search pattern. See also Perl-compatible regular expression.
- A mechanism for selecting specific strings from a set of character strings.
regular expression annotator
A software component that detects entities or units of information in a text document, such as product numbers, based on regular expressions that describe the exact patterns that are searched in the document text. If one of the regular expressions matches parts of the document text, the regular expression annotator creates the corresponding annotations that cover the match or part of it. These annotated expressions are then stored, either in the enterprise search index using an index mapping file, or a JDBC-capable database using a database mapping file.
regular table space
A table space that stores persistent data in either database-managed space or system-managed space but that has a smaller space limit than that of a large table space. See also permanent table space.
regular time series
A set of time-stamped data where the measurements occur regularly at predictable times. The interval between measurements is identical. Electricity usage measured by smart meters every 15 minutes is an example of a regular time series. See also irregular time series, time series.
regulatory compliance report
A report of issues found on a web application that do not comply with a selected regulation or legal standard. The regulations include legal Acts, Bills, and Laws of Canada, EU, Japan, UK, USA, and regulations of MasterCard and Visa. Custom regulatory compliance report templates can also be created.
The actions that occur within the cluster when a node that had previously detached from the cluster returns to the cluster. These actions are controlled by the event scripts and, when necessary, by manual intervention.
related default CCSID table
A table containing a default CCSID associated with another CCSID and an ESID. This default CCSID is considered to be the nearest equivalent of its associated CCSID based on some relationship between the two.
An item that is associated with another item as an accessory or required part, but is sold separately. For example, if a customer buys a camera, the store may offer the option to buy a carrying case or batteries. The carrying case and the batteries are related items for the camera.
A term in a business glossary that is related to the term in question. This relationship can be used for "see also" relationships to terms that are similar but not identical. The relationship is symmetrical; that is, if you specify that term A has term B as a related term, then term B has term A as a related term. A term can have multiple related terms.
- In RPG, tests performed against two statements in a source program to ensure that the statements are valid (for example, a GOTO operation must have an associated TAG operation). This type of checking is done only by the compiler as opposed to single-statement syntax checking that is done by the SEU function.
- The evaluation of the operands in a relational expression, based on the relational operator used.
- A condition that relates two fields such that one is invalid unless the other is present.
- In COBOL, a condition that relates two arithmetic expressions, data items, or both.
- A database that can be perceived as a set of tables and manipulated in accordance with the relational model of data.
- A database that can be perceived as a set of tables and manipulated in accordance with the relational model of data. Each database includes a set of system catalog tables that describe the logical and physical structure of the data, a configuration file containing the parameter values allocated for the database, and a recovery log with ongoing transactions and archivable transactions.
relational database management system (RDBMS, RDMS)
A collection of hardware and software that organizes and provides access to a relational database. See also Data Definition Language.
relational database model
An object that contains a schema-based definition of entities within a relational database. A relational database model includes the names of all the tables, columns, keys (primary and foreign), indexes, and other related entities within the relational database.
Relational Data Services (RDS)
The component of the DB2 database manager that processes requests to access or manipulate the contents of a database. For SQL requests, RDS processing involves translating statement text into an executable section, running that section, and returning the result set to the requester.
A term that is included in a personal name that indicates a familial relationship between individuals. For example, in the name "Karim bin Hassan," the relational marker "bin" means "son of."
- The reserved words or symbols used to express a relational condition or a relational expression.
- In COBOL, a reserved word, a relational character, a group of consecutive reserved words, or a group of consecutive reserved words and relational characters used to express a relational condition.
- An operator that compares two operands and yields a Boolean value.
- Any of the set of operators that express an arithmetic condition that can be either true or false. The operators are: .GT., .GE., .LT., .LE., .EQ., and .NE.. They are defined as greater than, greater than or equal to, less than, less than or equal to, equal to, and not equal to, respectively.
See SQL schema.
- A link between two or more entities. Relationships can be based on links discovered by the system, disclosed by an analyst, or both. See also degrees of separation, entity, relationship path.
- In Metro Mirror or Global Mirror, the association between a master volume and an auxiliary volume. These volumes also have the attributes of a primary or secondary volume. See also auxiliary volume, master volume, primary volume, secondary volume.
- A property that serves as a link between two contracts or between two external organizations.
- An association between business glossary assets.
- A semantic connection among model elements. Examples of relationships include associations and generalizations.
- A defined connection between the rows of a table or the rows of two tables. A relationship is the internal representation of a referential constraint.
An attribute instance that references another attribute for an item that exists in a different catalog. Even if the primary key of the target entry is changed, the two entries are still associated with each other. See also link attribute.
relationship management application (RMA)
An application used to manage authorizations. Among other things, it converts bootstrap authorizations created by WebSphere BI for FN into the RMA authorizations required to satisfy FIN PV03.
A chain of relationships that connects the inbound identity to the entity that it was resolved to. See also relationship.
See entity resolution.
In EJB programming, a traversal of the relationship between two entity beans in one direction or the other. Each relationship that is coded in the deployment descriptor defines two roles.
A value that is assigned during entity resolution as a result of applying the resolution rules and that defines how closely the two compared identities are related to each other. See also resolution score.
- An address counted relative to a symbol. When a program is relocated, the addresses themselves change, but the relative addresses remain the same.
- An address specified relative to a base address. See also absolute address.
One of the coordinates that identify the position of an addressable point with respect to some other addressable point. See also absolute coordinate.
- In the DCE X/Open Directory Service (XDS), a set of Attribute Value Assertions (AVAs), each of which is true, concerning the distinguished values of a particular entry.
- An entity that builds the CA certificate name.
- The part of an object name that is an attribute of the object itself.
- The first component of the distinguished name (DN). For example, if the entry's DN is cn=John Doe,ou=Test,o=IBM,c=US, the RDN is cn=John Doe.
relative end position
In RPG, an entry on the output specifications that indicates the number of blank positions that are to appear between a field or constant defined on one specification line and the field or constant defined on the preceding specification line. See also exact end position.
Measurement information that is defined in relation to some other units. Relative values are expressed as fractional parts of a unit-square design space (em square), whose sides correspond to the vertical size of the font. See also bounded-box relative metric, character set metric, fixed metrics, font metric.
In architecture, a method used to establish a new current position. Distance and direction from the current position are used to establish the new current position. The direction of displacement is inline along the I-axis in the I-direction, or baseline along the B-axis in the B-direction, or both.
A path that begins with the current working directory. See also absolute path.
relative path name
A string of characters that is used to refer to an object and that starts at some point in the directory hierarchy other than the root. The starting point is frequently a user's current directory. See also absolute path name.
The positioning of an element of an overlay with respect to the last position established by the last position command. See also absolute positioning.
relative start generation
An indicator of the generation level of a tape. Relative-start-generation zero is the latest generation of a tape; relative-start-generation -1 is the previous generation of that tape; relative-start-generation -2 is the generation before the previous one.
In operations research, a loosening of constraints, usually to find a solution that may not be the optimal feasible solution of the original problem but a solution that is good enough in some sense. For example, in a mathematical programming problem expressed as integer variables, to allow floating-point solutions that are sufficiently close to integer solutions. See also conflict.
See relay open system.
relay open system
In OSI architecture, an open system that forwards data received from one open system to another open system. (T) See also adjacent destination node.
In transaction routing, a CICS program that provides the communication mechanism between a locally-connected terminal and a transaction in a remote system. The relay program is invoked by the relay transaction.
In transaction routing, a CICS transaction that handles communication between a locally-connected terminal and a transaction in a remote system. The relay transaction invokes the relay program.
- A distribution of a new product or new function and authorized program analysis report (APAR) fixes for an existing product. The first version of a product is announced as release 1 modification level 0. See also resource takeover.
- To send changed files from the workbench to the team server so that other developers on the team can catch up (synchronize) with the updated version.
- In VTAM, to relinquish control of resources (communication controllers or physical units). See also acquire.
- The third level in the software hierarchy, located between version and variation. A version of a product can have multiple releases, and a release of a product can have multiple variations. See also software hierarchy, variation, version.
- A collection of applications that are deployed together. An application can be part of any number of releases.
- In a WebSphere Commerce store, a set of products in a given order that have the same ship-to address, ship time, shipping method, fulfillment center, and shipping carrier. See also packing slip.
- A distribution of a new product or new function and authorized program analysis report (APAR) fixes for an existing product. The first version of a product is announced as release 1 modification level 0. See also modification level.
- To remove suspend criteria from an item. A suspended item is released when the criteria have been met, or when a user with proper authority overrides the criteria and manually releases it.
The character that indicates that a separator or delimiter is to be used as text data instead of as a separator or delimiter. The release character must immediately precede the delimiter.
The state of a connection that results in a disconnect of the connection at the next commit operation. See also held state.
The release level of a program, which is an indicator of changes to the external programming interface of the program. See also modification number.
A user who oversees the process of carrying out a release. The release owner is typically the release manager who creates a release, but ownership can be transferred to another release manager.
See release purchase order.
An operation that makes a program device not available for input/output operations. See also acquire-program-device operation.
- A measure of relative impact of an event, category, or offense on the network.
- A method of analysis that is used to determine how each document best matches a search query. This method relies on term weighting, term proximity, and other criteria.
A measurement of the ability of a system to continue processing without failure. Shutting down an on-line system to process batch updates to the database reduces its availability to end users but has no bearing on the reliability of components required to deliver the online service.
reliability, availability, and serviceability (RAS)
A combination of design methodologies, system policies, and intrinsic capabilities that, taken together, balance improved hardware availability with the costs required to achieve it. Reliability is the degree to which the hardware remains free of faults. Availability is the ability of the system to continue operating despite predicted or experienced faults. Serviceability is how efficiently and nondisruptively broken hardware can be fixed. See also RAS attribute, RAS granularity.
reliable multicast messaging (RMM)
A high-throughput low-latency transport fabric designed for one-to-many data delivery or many-to-many data exchange, in a message-oriented middleware publish/subscribe fashion. RMM uses the IP multicast infrastructure to ensure scalable resource conservation and timely information distribution.
Reliable Scalable Cluster Technology (RSCT)
A set of software components that together provide a comprehensive clustering environment for various platforms, including the AIX and Linux operating systems. RSCT is the infrastructure used by a variety of IBM products to provide clusters with improved system availability, scalability, and ease of use.
reliable stream delivery
A type of packet delivery that allows an application program on one machine to connect to an application program on another machine. The stream actually contains many packets of data that are sent one at a time to the receiving machine.
reliable transfer server (RTS)
In OSI X.400, a portion of X.400 that is responsible for creating and maintaining application associations and for reliably transferring distributions between message transfer agents.
- Attribute of a set of codes whose address constants can be altered to make up for a change in origin.
- Pertaining to a value, expression, or address that does not have to be changed when the program is relocated.
See ring error monitor.
A page that accommodates subsequent bytes of a long data row. If the trailing portion of a data row is less than a full page, it is stored on a remainder page. After the database server creates a remainder page for a long row, it can use the remaining space in the page to store other rows.
- In an AIX PowerSC environment, the corrective steps to take when the attestation process reports that one or more collectors are not trusted.
- A suggestion for how to fix an issue.
- Pertaining to a system, program, or device that is accessed through a communication line. See also link-attached.
- For hierarchical storage management products, pertaining to the origin of migrated files that are being moved. See also local.
- Any object that is maintained by a remote DB2 subsystem (that is, by a DB2 subsystem other than the local one). A remote view, for example, is a view that is maintained by a remote DB2 subsystem. See also local.
Remote Abstract Window Toolkit for Java
An implementation of the Abstract Window Toolkit (AWT) that allows Java applications to run on a host system that does not have a graphical user interface (GUI). The server does not support locally attached graphic workstations; therefore, Remote AWT is necessary to allow graphical Java applications to run on the server.
Remote Access Dial-In User Service
A server that authenticates a user's password and identification before sending the information on to an Internet Service Provider (ISP) server. The server also maintains accounting records of network usage for separate users. TCP/IP services and applications, such as Point-to-Point Protocol (PPP), can rely on a RADIUS server for authentication and accounting functions.
Remote Access Service
Windows NT software that provides network capabilities over a modem link and contains functions that support point-to-point wide area network connections. For i5/OS, this includes both outgoing (originator) and incoming (receiver) point-to-point profile types and other services such as Remote Access Dial-in User Service (RADIUS) and Dynamic Host Configuration Protocol (DHCP) client configuration. Operations Console requires Windows NT users to have Remote Access Service.
In OSI, an agent process on a remote node. See also local agent.
remote agent site
An agent site that is located on the same computer as the control server. A remote agent site requires the installation of IBM DB2 Warehouse Manager Standard Edition. See also agent site, default agent site.
remote alarm indication (RAI)
A remote alarm (also referred to as a yellow alarm) indicates that the far end of a T1 connection has lost frame synchronization. The Send RAI system parameter can be set to prevent DirectTalk from sending an RAI
remote application process
In OSI, an application process on a remote node. See also local application process.
A reference to an entity that represents an output of a development process that can be reused throughout an organization. Examples include code snippets, programs, reusable Java classes, or collections of common functions.
In VTAM CMIP services, the association between application entities in different nodes. See also association.
The function of a bridge that allows two bridges to connect multiple LANs using a telecommunication link. See also local bridging.
In high availability disaster recovery, the process of shipping logs from the primary database's log disk to the standby database. See also assisted remote catchup.
remote catchup pending state
In high availability disaster recovery, the state in which remote catchup is waiting to start. This state occurs because the primary and standby databases are not connected yet or scanning of the standby database's local log files, including those from its log archive, has not finished. See also peer state.
remote change management server (RCMS)
In retail communications and Point-of-Sale Utility, a store controller program communicating over an SNA/SDLC network that connects a host processor and a store controller. RCMS allows the NetView Distribution Manager program to access point-of-sale controller files. It also provides error reporting and recovery for failures and data format conversion for files.
- A display device that qualifies as a system console but is not directly attached to a system. See also local console.
- An Operations Console configuration that allows a personal computer to dial into a local console to gain console access to the system. See also Operations Console.
A device or system, attached to a communications line, that controls the operation of one or more remote devices. See also local controller.
remote control panel
A graphical interface that is provided by Operations Console that allows control panel operations to be performed from a remote location. This interface allows personal computer access to the control panel that controls operating or servicing the system.
- See Global Mirror.
- See Metro Mirror.
- A storage-based disaster-recovery and workload-migration function that can copy data in real time to a remote location. See also Peer-to-Peer Remote Copy.
- A database to which a connection is made by using a database link, while connected to a local database. See also local database.
- A shared database that is accessed by a program running on a different computer. The shared database is considered remote with respect to the program accessing it.
Remote Desktop Protocol (RDP)
A protocol that facilitates remote display and input over network connections for Windows-based server applications. RDP supports different network topologies and multiple connections.
In an MSC network, a destination that resides in a remote system. See also local destination.
A device that is attached to a processor using a communication line. See also local device.
Remote Direct Memory Access (RDMA)
A communication technique in which data is transmitted from the memory of one computer to that of another without passing through a processor. RDMA accommodates increased network speeds.
remote directory service
In OSI, the service that enables a system to obtain directory service from another system. In OSI Communications Subsystem, remote directory service requires the availability of a directory system agent (DSA) from which a directory user agent can obtain directory services using the X.500 directory access protocol (DAP).
The modem and controller that provides the communications connection between a communications line and a remote device or system. This remote equipment is at the other end of a data link from the host system.
In an enterprise search application, a server object created by the search and index APIs that enables users to search a set of heterogeneous collections and obtain a unified set of search results.
remote home interface
In enterprise beans, an interface that specifies the methods used by remote clients for locating, creating, and removing instances of enterprise bean classes. See also local home interface.
remote input/output (RIO)
A type of hardware architecture that facilitates faster input/output connection speeds between a system and expansion units. See also high-speed link.
In EJB programming, an interface that defines the business methods that can be called by a client. See also home interface.
remote I/O enclosure
An IBM Director managed object that represents an expansion enclosure of Peripheral Component Interconnect-X (PCI-X) slots, for example, an RXE-100 Remote Expansion Enclosure. The enclosure consists of one or two expansion kits.
remote job tracking
The function of tracking jobs on remote processors connected by network links to a controller. This function enables a central site to control the submitting, scheduling, and tracking of jobs at remote sites.
remote journal network
An i5/OS environment that includes a primary system source journal and target system journals. The target system journals, associated by using the remote journal function, are downstream from the primary system source journal.
remote location name
Any other system with which a user's system can communicate in a network. This corresponds to the remote location name specified in the communications configuration. Equivalent to an SNA remote logical unit name. See also local location name.
remote logical terminal
An IMS queue associated with an MSC logical link to allow routing of asynchronous output messages to the local LTERM in another IMS. See also logical terminal.
See remote logical unit.
In OSI, a managing process on a remote node. See also local manager.
A managed application system (MAS) that uses MRO or LU 6.2 to communicate with the CICSPlex SM address space (CMAS) that controls it. A remote MAS may or may not reside in the same MVS image as the CMAS that controls it.
remote messaging, remote support, and web applications pattern
A reusable deployment environment architecture for IBM Business Process Management products and solutions in which the functional components of the environment (messaging, support, web-based components, and application deployment) are split across four clusters.
remote messaging and remote support pattern
A reusable deployment environment architecture for IBM Business Process Management products and solutions in which the functional components of the environment (messaging, support, web-based components, and application deployment) are split across three clusters. Web-based components reside on the support or the application-deployment cluster.
A business method in the remote interface that is callable by a client. See also Remote Method Invocation.
Remote Method Invocation (RMI)
A protocol that is used to communicate method invocations over a network. Java Remote Method Invocation is a distributed object model in which the methods of remote objects written in the Java programming language can be invoked from other Java virtual machines, possibly on different hosts. See also remote method.
Remote Method Invocation over Internet InterORB Protocol (RMI/IIOP)
Part of the Java Platform, Standard Edition (Java SE) model that developers can use to program in the Java language to work with RMI interfaces, but use IIOP as the underlying transport.
remote mirror and copy
A feature of a storage server that constantly updates a secondary copy of a logical volume to match changes made to a primary logical volume. The primary and secondary volumes can be on the same storage server or on separate storage servers. See also Global Copy, Global Mirror, Metro Mirror.
- A J2EE resource adapter that has been configured with a ConnectionURL starting tcp://, http://, or ssl://. Such resource adapters communicate with the Gateway daemon.
- A Java Client Application using a Gateway network protocol to connect to the Gateway daemon. See also local mode.
- In TCP/IP, the function that allows a system to get an internet address from a remote site rather than from its own host table.
- A name server that exists outside a local network.
- In OSI, any node other than the local node. See also local node.
- A node in the cluster other than the local node. See also cluster node.
- See also secondary node.
In the NetView/PC program, the PC that runs the local PC, which has had its keyboard locked by means of the remote control function. See also local PC.
remote presentation address
In OSI, a presentation address of an application entity on a remote node. See also local presentation address.
The ability to interchange print data and controls across different computing environments with the intent of printing the data on a different system from where the print request was generated. For example, in host-to-LAN distributed printing, data that resides on the host is printed on printers attached to a local area network (LAN).
A processor connected to the Tivoli Workload Scheduler for z/OS host processor through a network. A Tivoli Workload Scheduler for z/OS event writer and an event transmitter are installed on the remote processor and transmit events to the Tivoli Workload Scheduler for z/OS host processor through the network link.
A queue that belongs to a remote queue manager. Programs can put messages on remote queues, but they cannot get messages from remote queues. See also local queue.
remote queue manager
A queue manager to which a program is not connected, even if it is running on the same system as the program. See also local queue manager.
remote queue object
A WebSphere MQ object belonging to a local queue manager. This object defines the attributes of a queue that is owned by another queue manager. In addition, it is used for queue-manager aliasing and reply-to-queue aliasing.
A request issued from an agent at one database partition to an agent at a different database partition. See also request.
remote service requester
In OSI, a service requester process on a remote node. See also local service requester.
- In the distributed shell (dsh) program, the shell in which the remote command will run.
- A variant of the remote login (rlogin) command that invokes a command interpreter on a remote UNIX machine and passes the command-line arguments to the command interpreter, omitting the login step completely.
Remote Site Recovery (RSR)
A feature of IMS that minimizes the impact of active site failures by having a geographically remote IMS track active IMSs. Production work is taken over at the remote site in the event of a disaster or site-wide failure at the active site. See also tracking IMS.
Remote Spooling Communications Subsystem (RSCS)
An IBM licensed program that transfers spool files, commands, and messages between VM users, remote stations, and remote and local batch systems through HASP-compatible telecommunication facilities.
remote stand-alone secondary server (RS secondary server)
A remote standalone secondary server participating in a high-availability configuration. RS secondary servers can be geographically distant from the primary server, serving as remote back-up servers in disaster-recovery scenarios. Each RS secondary server maintains a complete copy of the database, with updates transmitted asynchronously from the primary server over secure network connections.
Any relational database management system (RDBMS), except the local subsystem, with which the user or application can communicate. The subsystem need not be remote in any physical sense and might even operate on the same processor under the same z/OS system.
Remote Supervisor Adapter (RSA)
An IBM service processor that is built into some System x servers and available as an optional adapter for use with others. When used as a gateway service processor, the RSA can communicate with all service processors on the Advanced System Management (ASM) interconnect.
A feature that runs on the Fabric Operating System (OS) and enables two fabric switches to be connected over an asynchronous transfer mode (ATM) connection. Remote Switch requires a compatible Fibre Channel-to-ATM gateway. The distance between each switch and the respective ATM gateway can be up to 10 km (6.214 mi).
Any other system in the network with which a system can communicate. See also local system.
Remote System Explorer (RSE)
The workbench perspective for accessing and editing files, and developing applications, on any supported remote server, such as an IBM i or Linux server. For example, IBM i users can create a connection to a remote host and navigate IBM i objects.
In an RSR environment, an action initiated by an IMS operator to transfer the active IMS workload from the active site to the remote site. See also planned remote takeover, unplanned remote takeover.
Remote Technical Assistance and Information Network (RETAIN)
Database used by IBM Support Centers to record all known problems with IBM licensed programs. See also catcher telephone number, heartbeat.
- A terminal attached to a system through a data link.
- A terminal that is not attached to the host system through an I/O channel.
- A unit of work that allows for the remote preparation and execution of SQL statements.
- A unit of work that lets a user or an application program read or update data at one location per unit of work. RUOW supports access to one database within a unit of work. An application program can update several remote databases, but it can access only one database within a unit of work. See also unit of work.
- The form of SQL distributed processing in which the application is on a system different from the relational database, and a single application server services all remote unit-of-work requests within a single logical unit of work.
See local user.
A workstation that is connected to the system by data communications. See also local workstation.
removable media library
A mechanism for storing multiple units of removable media that can be individually selected and inserted into drives that are installed within the library for reading and writing.
removable storage device
Any storage device defined during system configuration to be an optional part of the system DASD. A removable storage device can be removed from the system anytime during normal operation.
- To create an image on a visual display from data that describes the scene.
- To take data that is not typically image-oriented and depict or display it as an image. In Content Manager, word-processing documents can be rendered as images for display purposes.
In Ada language, the interaction that occurs between two parallel tasks when one task has called an entry of the other task, and a corresponding accept statement is being executed by the other task on behalf of the calling task.
A ticket that contains two expiration times: one that applies to the current instance of the ticket, and one that applies to the latest permissible expiration of the ticket. Renewable tickets are valid for an extended period of time while lessening the changes for theft.
The process of reconsidering, at run time, the access path of an SQL statement that has already been optimized. During reoptimization, the actual values of host variables, parameter markers, and special registers might be considered in choosing the access path.
reordered row format
A row format that facilitates improved performance in retrieval of rows that have varying-length columns. DB2 rearranges the column order, as defined in the CREATE TABLE statement, so that the fixed-length columns are stored at the beginning of the row and the varying-length columns are stored at the end of the row. See also basic row format.
An operation that changes the format of the data that is written to permanent storage for a table and restricts the operations that are allowed on the table until the data in the table is reorganized.
See REORG pending.
A type of read integrity in which a program is permitted to issue multiple read-only requests, with repeatable read integrity, and be assured that none of the records passed can subsequently be changed until the end of the sequence of repeatable read requests. The sequence of repeatable read requests ends either when the transaction terminates, or when it takes a syncpoint, whichever is the earlier. See also consistent, read integrity.
repeatable read (RR)
An isolation level under which a query that is issued more than once in a transaction reads the same rows again for each subsequent execution, except for rows that might have been changed earlier in the same transaction. Additional (phantom) rows are not read. A query in a transaction using RR is prevented from reading any rows changed by statements in other transactions until the changes have been committed. Also, until the transaction using RR has been committed, any rows that a query in that transaction reads cannot be changed by statements in other transactions. See also cursor stability, isolation level, read stability, uncommitted read.
- In Report Studio, a cell container that repeats values within itself with no predefined internal structure.
- A device that regenerates signals in order to extend the range of transmission between data stations or to interconnect two branches.
In a TME 10 Management Region (TMR), a managed node that is configured with the MDist feature. A repeater site receives a single copy of data and distributes it to the next tier of clients.
An entity that includes multiple attributes that are inherently the same. The presence of a repeating group violates the requirement of first normal form. In an entity that satisfies the requirement of first normal form, each attribute is independent and unique in its meaning and its name. See also normalization.
The subsequent sale of a product after the initial purchase. The level of repeat sales for a product is often used as a measure of customer satisfaction--the higher the level of repeat sales, the more satisfied customers are.
repeat to address (RA)
An order to position data in the buffer of a 3270 terminal, thereby controlling the position of the data on the screen. An RA order is followed by a 2-byte buffer address, and a one-byte character to be repeated. The order copies the one-byte character repeatedly into the buffer until the 2-byte address is reached.
repetitive DO loop
In REXX, any instruction that has either a repetitor phrase or a conditional phrase (or both). The instruction list within the instruction is run zero or more times, controlled by any repetitor phrase that is optionally changed by a conditional phrase.
replaced by term
A term in a business glossary that supersedes another term. Typically, deprecated terms specify replacement terms to identify which term replaces the deprecated term. See also deprecated term.
replacement code point
In alerts, a 2-byte code point in which the first byte indexes text providing a high-level description of a condition, and the second byte indexes text providing a more specific description. The second byte is nonzero.
An encrypted character string lock that specifies some of the terms and conditions for acquiring software products described in an upgraded custom configuration. See also initial key.
- To apply the contents of a database log to a standby database, such as during a recovery operation.
- The redisplay of a visitor's session on a website, as it was originally experienced by the visitor. After a visitor's hits have been collected and sequenced into a session, that session can be replayed in the manner that the visitor experienced it, with the visitor's selections and entries highlighted for the Tealeaf user to see.
replay detection mechanism
A method that allows a principal to detect whether a request is a valid request from a source that can be trusted or whether an untrustworthy entity has captured information from a previous exchange and is replaying the information exchange to gain access to the principal.
- A server that contains a copy of the directory or directories of another server. Replicas back up servers in order to enhance performance or response times and to ensure data integrity.
- An instance of a versioned object base (VOB) located at a particular site.
- In the Lightweight Directory Access Protocol (LDAP), a read-only server that contains the same data as another server. Replicas are used to back up LDAP servers and to provide faster searches by splitting requests among the main server and replica servers.
- A special copy of a Notes database that, because it shares a replica ID with the original database, can exchange information with it through replication.
A unique number that is generated when a Notes database is first created. The replica ID is stored in the database header and never changes. When you make a replica of the database, the replica inherits the replica ID. For two databases to replicate, they must share the same replica ID.
In SQL replication, specifically in update-anywhere replication, a type of target table that can be updated locally and also receives updates from the master table through a subscription-set definition. If replication conflict detection is enabled, changes made to the replica table are rejected, whereas changes made to the master table are retained. See also conflict detection, master table, update-anywhere replication.
- In Enterprise Replication, pertains to participants and various attributes of how to replicate the data, such as frequency and how to handle any conflicts during replication. See also master replicate, shadow replicate.
- In a remote journal network, to make a duplicate copy of a journal entry from a source journal to a target journal.
replicated resource group
A resource group that is configured to have both primary and secondary instances distributed on nodes located at two different sites. See also primary instance, primary site, secondary instance, secondary site.
An OS deployment server which shares data with one or several other OS deployment servers. The servers are hierarchically structured with a parent and child servers. A child server can act as parent to replicated servers further down in the hierarchy.
A portion of the directory information tree that is replicated from one server to another. Under this design, a given subtree can be replicated to some servers and not to others. Subtrees can be writable on a given server, or read-only.
- The process of maintaining a defined set of data in more than one location. Replication involves copying designated changes for one location (a source) to another (a target) and synchronizing the data in both locations.
- The process of copying objects from one node in a cluster to one or more other nodes in the cluster, which makes the objects on all the systems identical.
- The process of exchanging modifications between replicas. Through replication, Notes makes all of the replicas essentially identical over time.
In SQL replication and in Q replication, the user who is responsible for registering replication sources and creating subscription sets. This user can also run the Capture program and the Apply program.
Information contained in the directory that defines the connection or replication path between two servers. One server is called the supplier (the one that sends the changes) and the other is the consumer (the one that receives the changes). The agreement contains all the information needed for making a connection from the supplier to the consumer and scheduling replication
Replication Alert Monitor
A program that checks the operation of the Capture, Apply, Q Capture, and Q Apply programs and sends alerts to one or more users when it detects the specified alert conditions.
A collection of application server components that share data. These components might include HTTP sessions, dynamic cache, stateful session beans, or the session initiation protocol (SIP) component.
replication queue map
In Q replication, an object that links a send queue and a receive queue. The replication queue map includes settings for how a Q Capture program processes all transactions that use the send queue and how a Q Apply program processes all transactions that use the receive queue. See also publishing queue map, queue map.
- In SQL replication, a table, view, or nickname that is registered as a source for replication. Changes that are made to this table, view, or nickname are captured and copied to a target table that is defined in a subscription-set member. See also subscription set, subscription-set member.
- In Q replication, a table that is a source for replication. Changes made to this type of table are captured and copied to a target table that is defined in a Q subscription or a publication. See also publication, Q subscription.
See subscription set.
In Q replication and in SQL replication, a table or procedure that is a destination for changes that were replicated from a source. The Q Apply program applies these changes. See also target table.
- In Enhanced X-Windows, the way information requested by a client program is sent back to the client. Both events and replies are multiplexed on the same connection. Most requests do not generate replies; some generate multiple replies.
- In SNA, a request unit sent only in reaction to a received request unit. For example, Quiesce Complete is the reply sent after receipt of Quiesce At End of Chain.
- See response.
- A string of data that represents the address to be replied to. The contents and format of the string are not defined by the mail server framework. The address type associated with the reply-to address is assumed to define the contents of the reply-to address field.
- A unique address that identifies both a person who replied to a notification and the event or item that triggered the notification.
See reported value.
- A set of data deliberately laid out to communicate business information. See also report specification.
- A document, or set of documents, that have been loaded into the OnDemand system and are defined by a named query, SQL statement, or supplied load parameters.
- In query management, the formatted data that results from running a query and applying a form to it.
- Data that has been selected and extracted according to the reporting tool, the type of report desired. and formatting criteria.
- A formatted presentation of information. Reports can be viewed online, printed, or exported to various file formats.
A group of settings that define the overall presentation of a report, including page dimensions and orientation, margin sizes, and options for displaying title, author, and summary information.
The basis for a displayed report. The context changes depending on which function you are using in the WebSphere Commerce Accelerator. Available report contexts include campaigns, initiatives, and a combined context.
- A group that lists software items based on license compliance ownership. Typically, a report group contains software items that belong to a single customer for whom an audit report is generated.
- A container for a dimension. A report group can contain up to four dimensions.
A code that specifies how a workstation will report events to Tivoli Workload Scheduler for z/OS. See also nonreporting attribute.
A data warehouse (database) that is used to store historical information about registered WiFi-enabled devices, unregistered WiFi-enabled devices, or both in the sites where Presence Zones is installed. This data is used by the reporting server, which leverages IBM Congos Business Intelligence technology to create reports.
report interface (RPI)
In Tivoli Enterprise Data Warehouse Version 1.1, the component that provides historical reporting capabilities. Using the report interface, users can create and run reports; create and manage data marts that have the format required by the Tivoli Enterprise Data Warehouse report-generating tools; and create and manage the groups that control access to those data marts. See also report server.
A type of message that gives information about another message. A report message can indicate that a message has been delivered, has arrived at its destination, has expired, or could not be processed for some reason. See also reply message, request message.
report object query variable
A variable that is used to filter data source queries for a particular report object. After the value of the variable has been overridden at the report level, it can be further overridden to filter the result set for the report object.
Report Program Generator (RPG)
A programming language designed for writing application programs for business data processing requirements. The application programs range from report writing and inquiry programs to applications such as payroll, order entry, and production planning.
In RLU, a representation of the image of a report that a user builds on a display and the printed report image, both of which look like the actual listing created by an application program. The report prototype, when saved as a DDS source member, can be used to create a printer file, which, in turn, can be used by an application program to create a report.
report query variable
A variable that is used to filter data source queries at the report level. The value of the variable can be overridden to filter the result set for all report objects referencing that query.
- In Tivoli Enterprise Data Warehouse, Version 1.1, the system where the report interface component is installed. more data sources and one or more target warehouses. Warehouse agents use Open Database Connectivity See also report interface.
- An application server that hosts reports and report editors.
An executable definition of a report, including query and layout rules, which can be combined with data to produce a report output. See also report.
A reference to another report that has its own properties, such as prompt values, schedules, and results. Report views can be used to share a report specification instead of making copies of it.
A dedicated fleet route that is used to move a truck from the destination of one leg to another location. For example, the carrier might use a repositioning leg to move the truck from a shipment destination to a maintenance depot or the domicile of the driver. See also deadhead leg.
- A VSAM data set on which the states of BTS processes are stored. When a process is not executing under the control of BTS, its state (and the states of its constituent activities) are preserved by being written to a repository data set. The states of all processes of a particular process-type (and of their activity instances) are stored on the same repository data set. Records for multiple process-types can be written to the same repository.
- A persistent storage area where packages are available for download.
- A persistent storage area for data and other application resources.
- A collection of information about the queue managers that are members of a cluster. This information includes queue manager names, their locations, their channels, and what queues they host.
repository access manager (RAM)
A piece of software that provides connections to a specific type of software change manager (SCM), such as Software Configuration Library Manager (SCLM), a component of the Interactive System Productivity Facility (ISPF) product.
A person who configures and tests repository functions such as database connections, email subscriptions, index timers, and custom user information. The repository administrator is responsible for configuring the Service Oriented Architecture (SOA) product integrations; and creating team spaces, asset types, category schemas, and asset relationships.
A function that backs up copies of files from the master configuration repository. The backup files can be used to restore the configuration to a previous state if future configuration changes cause operational problems.
repository content adapter
An optional software package that enables storing and processing content from other IBM SPSS applications, such as Statistics, Modeler, and Data Collection, as well as third parties.
repository index data set (RID)
A VSAM key-sequenced data set (KSDS) that contains the names and keys of all members in an IMS repository. A repository index data set is used by the Repository Server (RS) or a user-defined IMS repository. See also IMS repository function, repository member data set.
repository member data set (RMD)
A VSAM key-sequenced data set (KSDS) that contains the member data that is indexed by the repository index data set (RID). A repository member data set is used by the Repository Server (RS) or a user-defined IMS repository. See also IMS repository function, repository index data set.
A BPE-based address space for managing the repositories of the IMS repository function, such as the IMSRSC repository. The RS is managed by the Common Service Layer (CSL) Resource Manager (RM), which interacts with the RS to read, write, and delete stored resources, such as resource and descriptor definitions, from an IMS repository.
A repository object that includes one or more components. Repository workspaces are typically used by individual team members to contain their changes in progress. Team members deliver their changes from their repository workspace to the stream and accept changes from other team members into their repository workspace from the stream. Every repository workspace has an owner, and only the owner can make changes in the workspace. See also workspace.
- The form in which an entity is represented on a chart. See also box, circle, event frame, icon, theme line.
- An HTTP payload entity that is included in an HTTP response and is subject to content negotiation.
Representational State Transfer (REST)
A software architectural style for distributed hypermedia systems like the World Wide Web. The term is also often used to describe any simple interface that uses XML (or YAML, JSON, plain text) over HTTP without an additional messaging layer such as SOAP. See also RESTful, web-oriented architecture.
The record that is created during survivorship and populated with the best available data from a group of records. See also survivorship.
See request for acknowledgment and acknowledgment.
req auto email
See requisition automatic email.
See request for maintenance statistics.
- In SNA, a message unit that signals the initiation of an action or protocol.
- An item that initiates a workflow and the various activities of a workflow. See also workflow.
- A solicitation for items such as office stationery, cleaning equipment, and material or calibration devices and services such as facilities management, documentation, and translation services that are initiated by a buyer.
- In OSI, a service primitive issued by a service user to call a function supported by the service provider.
- The part of a web address that follows the protocol and server host name. For example, in the address http://www.server.com/rfoul/sched.htm, the request is /rfoul/sched.html.
- In a request/response interaction, the role performed by a business object that instructs a connector to interact with an application or other programmatic entity.
- See transaction.
- A directive, by means of a basic transmission unit, from an access method that causes the network control program to perform a data-transfer operation or auxiliary operation.
- A directive to perform a discrete action within a database system. A request is acted upon by a database agent. See also application request, remote request, subagent request.
- A message from one computer to another asking for a resource.
- In Enhanced X-Windows, a command to the server to send a single block of data over a connection.
request approval workflow
A workflow that defines the business logic. Typically it contains a series of activities and participants. The workflow is used to approve requests, such as account requests and access requests. See also workflow.
A classification record that determines many of the business rules that are to be applied by the service management process. See also service management process.
requested reset statistics
CICS statistics that the user has asked for by using the appropriate command or transaction, and specifying the RESETNOW option. The statistics are written to the SMF data set immediately, and the statistics counters are reset to zero. See also interval statistics, requested statistics, unsolicited statistics.
CICS statistics that the user has asked for by using the appropriate command or transaction, which causes statistics to be written immediately, instead of waiting for the current interval to expire. The request does not reset the statistics. See also interval statistics, requested reset statistics, unsolicited statistics.
- A display station or interactive communications session that requests a program to be run.
- In System i Access, a program that requests services from another program (a server). Each System i Access function has a server and a requester.
- The source of a request to access data at a remote server.
- See client.
- A workstation from which a user can log on to a domain and use network resources.
In message queuing, a channel that can be started locally to initiate operation of a server channel. See also server channel.
request for acknowledgment and acknowledgment (REQ/ACK)
A cycle of communication between two data-transport devices for the purpose of verifying the connection, which starts with a request for acknowledgment from one of the devices and ends with an acknowledgment from the second device. The REQ and ACK signals help to provide uniform timing to support synchronous data transfer between an initiator and a target. The objective of a synchronous data-transfer method is to minimize the effect of device and cable delays.
- A workflow activity that requests additional information from the specified participant.
- An RFx that buyers use to obtain detailed information from a supplier.
request for price quotation (RPQ)
A customer request for a price quotation on alterations or additions to the functional capabilities of a hardware product for a computing system or a device. See also programming request for price quotation.
- An RFx in which buyer users can create questionnaires to obtain information from suppliers as well as define items for bidding.
- A formal invitation containing a scope of work which seeks a formal response (proposal) describing both methodology and compensation to form the basis of a contract.
- A formal invitation to submit a price for goods and/or services as specified.
- The trading mechanism used when a buyer solicits quotes for a specific set of goods or services. It can be used if a buyer does not find a particular item in the catalog, finds an item without a price, or wants to establish a long-term supply arrangement for a fixed-price item.
request functional transmission
In multileaving telecommunications access method (MTAM), a control character indicating a request for permission to send data. See also grant functional transmission.
- In SNA, the control information that precedes a request unit. See also request/response header.
- In SNA, a 3-byte header that precedes a request unit. The request header specifies the type of request unit and contains control information associated with that request unit. See also response header.
The region in which a dynamic routing request originates. For dynamic transaction routing and inbound client dynamic program link requests, this is typically a TOR; for dynamic START requests and peer-to-peer dynamic program link requests, this is typically an AOR. To be eligible for dynamic routing, the process or activity must be started by an EXEC CICS RUN ASYNCHRONOUS command. See also routing region, target region.
request-level RAS granularity
The level of RAS granularity at which RAS attributes are assigned on a request-by-request basis to all requests for a particular request classification, such as HTTP requests that end in .jpg, a specific HTTP request for a URI such as /PlantsByWebSphere/index.html, or all IIOP requests for a particular EJB. See also RAS granularity.
request parameter list (RPL)
In VTAM, a control block that contains the parameters necessary for processing a request for data transfer, for establishing or terminating a session, or for some other operation.
The rate at which requests arrive at a servicing entity. See also service rate.
A type of messaging application in which a request message is used to request a reply from another application. See also datagram.
request/response header (RH)
In SNA networking, control information preceding a request/response unit (RU), specifying the type of RU (request unit or response unit) and containing control information associated with that RU. See also request header, request/response unit.
request/response unit (RU)
A generic term for a request unit or a response unit. See also request/response header.
request to send (RTS)
In data communication, a signal raised by data terminal equipment (DTE), while the data terminal is ready, to request facilities from data circuit-terminating equipment (DCE) so that data can be sent. See also clear to send.
In DCF, a character that prints as a blank, but does not act as a word separator. See also null character.
A component that can be defined within a group type to represent a data object that must be present in the data. The component range minimum specifies how many occurrences of the data object are required.
A hyphen that is not removed when the program adjusts lines. See also syllable hyphen.
- A space or blank that must not be removed when adjusting a line or paragraph of text, such as the space in 10 000. Required space has an IBM GCGID of SP30. See also numeric space, space.
- See required blank.
See required parameter.
- A post-solution representation of a rule. A requirement may be relaxed if it is in conflict with other requirements. Priorities can be assigned to requirements to control which ones are relaxed. See also constraint, rule.
- In testing, a recorded event that is saved as an action to be tested.
- A condition or capability needed by a user to solve a problem or achieve an objective that must be met or possessed by a system or system component to satisfy a contract, standard, specification, or other formally imposed document. (ISTQB)
- A condition or capability that a system must provide. This condition is either derived from user needs or stated in a contract, standard, specification, or other document.
Information associated with a requirement providing a link between the requirement and other project elements for example, priorities, schedules, status, design elements, resources, costs, hazards.
requirement attribute label
See attribute label.
requirement attribute matrix
See Attribute Matrix.
requirement attribute type
See attribute type.
requirement attribute value
See attribute value.
A document that captures requirements and is used to communicate product development efforts. Each requirements document addresses a particular requirement type, such as product features, use cases, and supplementary specifications.
requirements management (RM)
A systematic approach to eliciting, organizing and documenting the requirements of a system, and establishing and maintaining agreement between the customer and the project team on changes to those requirements.
The unique identifier of each requirement in a project. A requirement tag is composed of a tag prefix and a unique numerical value, such as "PR100.1.2." The tag prefix is always the requirement type, as defined in the Project Properties dialog box. The numerical value is generated by RequisitePro. See also pending tag number.
A set of descriptive and operational information associated with a requirement when the requirement is created. A requirement type serves as an outline for all requirements of the same type and is useful for classifying and grouping similar requirements in a project. Each requirement type has its own set of user-defined attributes.
A software product or a service update that must be installed with another software product or service update. If you attempt to install software products or service updates without the required requisite software, a system message displays the names of required requisite software. See also corequisite.
Rational's web interface that allows clients to access RequisitePro requirements information across an intranet. RequisiteWeb provides a thin client solution to access project documents and data in a web browser. No Requisite application-specific files need to be installed on individual machines.
See approval routing.
See requisition code.
Pertaining to a system that can reroute operations if the workstation on which they are scheduled to run is inactive, for example, if communication links to the system where the workstation is located fail. This option applies to operations only when they have status R (ready) or W (waiting).
- To change graph dimensions to better fit the data points and values in a graphical interface.
- To change the pel density of a print object to a different pel density; for example, changing the resolution of an image object from 240 dpi to 300 dpi.
In WebSphere Commerce, in the context of the demand chain business model, a business that sells products to businesses (such as end users or other resellers), after having obtained the goods from manufacturers, distributors, or other resellers. A reseller can provide its own value-add services of modifications to the product, and can also choose to package or bundle products differently from its suppliers.
- The preallocation of configuration items for future deployments.
- The act of reserving inventory items for a specific order.
- In QoS, part of a resource that has been dedicated for the use of a particular traffic type for a period of time through the application of policies.
- A concurrent-offline license that is reserved for a defined offline period and for use as an offline-nodelocked license.
ReSerVation Protocol (RSVP)
A resource reservation setup protocol designed for an integrated services Internet. The protocol provides receiver-initiated setup of resource reservations for multicast and unicast data flows.
reservation version status
The status that indicates a checked out, but not yet checked in, version of a document. See also check out.
In architecture, having no assigned meaning and put aside for future use. The content of reserved fields is not used by receivers, and should be set by generators to a specified value, if given, or to binary zeros. A reserved field or value can be assigned a meaning by an architecture at any time.
In mainframe computing, a relationship that is created in a control unit between a device and a channel path when the device completes a Sense Reserve command. Reserved allegiance causes the control unit to guarantee access (a busy status is not presented) to the device. The device is accessed over the set of channel paths that are associated with the reserved allegiance. Access is for one or more channel programs until the reserved allegiance ends. See also contingent allegiance, implicit allegiance.
- A word that has been set aside for special use in the SQL standard.
- A word that is defined by a programming language and that cannot be used as an identifier or changed by the user.
- To return a document to its original lifecycle state. See also exception state, lifecycle policy.
- In X.25 communications, to reinitialize the flow of control on a virtual circuit, which eliminates all data that may be in transit for the virtual circuit at the time of resetting.
- To cause a counter to take the state corresponding to a specified initial number.
- A state that indicates that the current logical unit of work (LUW) has not yet begun to prepare to commit. A failure during RST state results in a rollback of any pending changes.
- To put all or part of a data processing device back into a prescribed state.
- On a virtual circuit, the reinitialization of data flow control. At reset, all data in transit are eliminated.
See cause code.
reset confirmation packet
In X.25 communications, a packet transmitted by the data terminal equipment (DTE) to inform the data circuit-terminating equipment (DCE) that a reset operation has been processed.
reset indication packet
In X.25 communications, a packet transmitted by the data circuit-terminating equipment (DCE) to inform the data terminal equipment (DTE) that a virtual call or a permanent virtual circuit is being reset and the reason for the resetting.
residency mode (RMODE)
In z/OS, a program attribute that refers to where a module is prepared to run. RMODE can be 24 or ANY. ANY refers to the fact that the module can be loaded either above or below the 16M line. RMODE 24 means the module expects to be loaded below the 16M line.
On a Windows system, a complete file on a local file system that might also be a migrated file because a migrated copy can exist in server storage. On a UNIX or Linux system, a complete file on a local file system that has not been migrated or premigrated, or that has been recalled from server storage and modified.
In printers, those font data sets that are resident in the printer. They usually reside on the printer diskette media (floppy or hard disk). These font data sets are usually commonly used fonts, and having them resident reduces font loading time. These fonts can also be used during offline testing of the printer.
Any home, apartment, or other dwelling where people reside. A business can also be operated from a residence. In most cases, the freight carrier contacts the customer to make an appointment before delivery is attempted to a residential address.
A library routine that is linked with an application. Resident routines include initialization routines and callable service stubs. See also transient routine.
An error that is not detected by the network layer. Examples of residual errors are loss, corruption, duplication, and delivery out of sequence of TPDUs. See also signaled error.
residual user ID
A reference in the RACF database to a user ID that has been deleted. See also RACF remove ID utility.
- The process of distinguishing the individual parts of an object on screen, especially in font generation.
- A measure of the sharpness of an image, expressed as the number of lines per unit of length or the number of points per unit of area discernible in that image.
In architecture, a method used to present an image on a printer without changing the physical size or proportions of the image when the resolutions of the printer and the image are different.
In architecture, a method used to write an image on an image presentation space without changing the physical size of the image when the resolutions of the presentation space and the image are different.
A set of criteria that define how compared entities are resolved or related. See also candidate threshold.
A value that is assigned during entity resolution as a result of the confirmation and denial processing and that defines the likelihood that the compared identities represent the same entity. This score is used to resolve a new identity to an existing entity. See also relationship score.
- To compare incoming identities and determine whether they represent an existing entity or a new entity. See also entity resolution.
- To reconcile conflicts among change sets in a repository workspace.
- In programming, to change a predefined, symbolic value to the actual value of the item being processed. For example, a symbolic value of *LAST defined for the name of a file member is resolved to the name of the last member when the member is processed.
A kernel process used to resolve symbolic host names into Internet addresses. The method the routine uses to resolve names depends on whether the local network is organized as a flat network or as a hierarchical network.
- A hardware, software, or data entity. See also managed resource, managed resource.
- The collective term for projects, folders, subfolders, and files that can be manipulated in the Eclipse workbench.
- All of the functions and transactions that are both valid and available for an organization's role.
- In a storage environment, an entity that is monitored. Resources can include fabrics, switches, computers, and storage systems.
- Any of several data structures included in a HATS project. HATS resources include templates, screen customizations, transformations, screen captures, connections, and macros. Other WebSphere Studio plug-ins sometimes call these "artifacts."
- A cluster entity, such as a disk, file system, network interface, or application controller, that is made highly available in the cluster.
- Physical or logical system resources that are used as dependencies for jobs and job streams. See also resource dependency.
- A facility of a computing system or operating system required by a job, task, or running program. Resources include main storage, input/output devices, the processing unit, data sets, files, libraries, folders, application servers, and control or processing programs.
- In Event Management, an entity in the system that provides a set of services. Examples of resources include hardware entities such as processors, disk drives, memory, and adapters, and software entities such as database applications, processes, and file systems. Each resource in the system has one or more attributes that define the state of the resource.
- In the context of OSLC, a network data object or service that can be identified by a URI.
- A content repository object.
- A person, piece of equipment, or material that is used to perform an activity.
- An instance of a physical or logical entity that provides services to some other component on the system. See also action.
- A collection of printing instructions used by Print Services Facility (PSF), in addition to the print data set, to produce the printed output.
- A specific XML entity in an XML data source. A resource can be associated with an XML schema and can be used to map a data source to a relational database table to create reports.
- An XML fragment that is contained within an extended link that provides additional information about concepts or items.
- A physical or logical component that can be provisioned or reserved for an application or service instance. Examples of resources include database, accounts, and processor, memory, and storage limits.
- A person who can be assigned to work breakdown structure (WBS) elements.
- See artifact.
- The object of a lock or claim, which can be a table space, an index space, a data partition, an index partition, or a logical partition.
- Any physical item or logical item to be managed in an information system of an enterprise.
- A user-defined construct that is based on the architectural model of IBM UrbanCode Deploy. A resource represents a deployment target.
Resource Access Control Facility (RACF)
An IBM licensed program that provides access control by identifying users to the system; verifying users of the system; authorizing access to protected resources; logging unauthorized attempts to enter the system; and logging accesses to protected resources. See also command authorization.
- Map input and output data sources that are used to retrieve and route data. Resource adapters provide access to databases, files, messaging systems, and other data sources and targets. Each adapter includes a set of adapter commands that can be used to customize its operation.
- An implementation of the Java Enterprise Edition Connector Architecture that allows JMS applications and message driven beans, running in an application server, to access the resources of a WebSphere MQ queue manager.
- A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system (EIS). A resource adapter plugs in to a container; the application components deployed on the container then use the client API (exposed by adapter) or tool-generated, high-level abstractions to access the underlying EIS. (Sun) See also container, enterprise information system.
resource allocation timeout value (R_A_TOV)
In Fibre Channel technology, a value used to time out operations that depend on the maximum possible time that a frame can be delayed in a fabric and still be delivered. This value is adjustable in one microsecond increments from 10 - 120 seconds. See also resource recovery timeout value.
A characteristic of a system resource. The types of resource attributes are persistent attributes and dynamic attributes. See also resource group policies.
- A class that contains the text for the store pages. Bundle files are created and accessed according to the Java PropertyResourceBundle API.
- A structured collection of data that provides a key-value mapping for data (resources) used in localizing a program. The values are commonly strings, but may themselves be structured data. See also locale.
- A calendar selected from a base calendar and associated to a resource, used to represent the resource availability. A resource calendar can be modified to record the non-working days of the resource.
- A calendar that is created when a resource is created or added to a project.
- An attribute of a resource that is used to group resources according to the subsystem to which they belong and the purpose for which they are used.
- A set of resources of the same type. A resource class defines the common characteristics of instances in a resource class. See also action.
- A category of similar resources that are defined in the RACF class descriptor table (CDT).
- A group of resources that have attributes, actions, and other characteristics in common.
- A library member containing the set of records that collectively define a resource.
- A subset of content repository resources used to enable analytical processing, such as definitions of data sources, credentials, execution servers, and JMS message domains.
- See data set definition.
- See library definition.
resource definition data set (RDDS)
A data set that manages IMS resources. IMS systems have options to export resources that are defined by the system definition process and resources that have been created or updated dynamically, into the RDDS. These resources can then be imported from the RDDS into an IMS system during cold start processing or through the use of an IMPORT command.
resource definition macro (RDM)
A method of defining resources to CICS by using assembler macros. You code and assemble special CICS macros and present the assembler output to CICS at system initialization.
resource definition table (RDT)
In VTAM, a table that describes the characteristics of each node available to VTAM and associates each node with a network address. This is the main VTAM network configuration table.
- A collection of structured fields that describe the attributes of a resource such as a volume.
- A set of cluster resources that is configured by the user and handled as one unit. See also concurrent resource group, delayed fallback timer, dependent resource groups, distribution policy, location dependency, node list, nonconcurrent resource group, resource group policies, settling time, startup, takeover priority.
- A collection of XML sources from a product that share a common base web address. The web address determines the connection between the product data and the relational database that is used to create reports.
- A set of resource bindings. See also resource binding, resource policy.
- A group of resources that can include business objects such as contracts or a set of related commands. In access control policies, resource groups specify the resources to which the policy authorizes access.
resource group class
A type of RACF class in which each user or group of users that is permitted access to that resource group is permitted access to all members of the resource group. See also resource group profile, resource member class.
resource group management
The process by which resource groups are moved from one node to another, or taken offline or online while the cluster is running. See also resource group migration.
resource group migration
Movement of a resource group from one node to another without a fallover. See also resource group management.
resource group policies
A set of predefined policies that define how a resource group behaves during startup, fallover, and fallback. Different combinations of startup, fallover, and fallback policies for a resource group can be specified. See also concurrent resource group, delayed fallback timer, dependent resource groups, distribution policy, dynamic node priority policy, fallback, fallover, node priority policy, nonconcurrent resource group, resource attribute, resource group, settling time, startup, takeover priority.
resource group profile
A general resource profile in a resource group class. A resource group profile provides RACF protection for one or more resources with unlike names. See also resource group class.
In VTAM, the relationship among network resources in which some resources are subordinate to others as a result of their position in the network structure and architecture. For example, the logical units (LUs) of a peripheral physical unit (PU) are subordinate to that PU, which, in turn, is subordinate to the link attaching it to its subarea node.
The programmable list entry ID that IMS specifies for a resource to ensure name uniqueness. The first byte is the name type, and the remaining 11 bytes are the resource name, padded with blanks.
- The portion of a resource name that uniquely identifies the resource.
- In Enhanced X-Windows, an integer returned to an application program that identifies a resource that has been allocated for the program's use.
- In Event Management, a name/value pair that uniquely identifies the resource (and by extension, the copy of the resource variable) in the system.
A list pf all of the components that are deployed to an agent resource. See also component inventory.
In the NetView Graphic Monitor Facility, the textual information that identifies a particular aggregate or real resource. The resource label is displayed next to the resource symbol, and it cannot be changed by the network operator.
The hierarchical position of a device (and the software that is contained within it) in a data processing system. For example, a first-level resource could be the communication controller, and the second-level resource could be the line connected to it.
resource limit facility (RLF)
A portion of DB2 code that prevents dynamic manipulative SQL statements from exceeding specified time limits. The resource limit facility is sometimes called the governor.
- The function that protects serially accessed resources from concurrent access by competing tasks.
- In CICS, a facility that tracks what system resources are being used. The tracking is done by mapping the CICS identification name to the underlying system resources.
- The component of a Content Manager system that manages objects. These objects are referred to by items stored on the library server.
- In the Tivoli common agent services, the server of a management application that directly interacts with a managed resource. For example, a resource manager installs bundles on the agent and starts and stops a subagent. See also management application.
- The participant in a transaction responsible for controlling access to recoverable resources. In terms of the CICS resource adapters this is presented by an instance of a ConnectionFactory.
- A subsystem or component that manages resources that can be involved in transactions. Resource managers can be categorized as work managers, data resource managers, and communication resource managers.
- In an XA-enabled environment, software that manages and provides access to shared resources, such as databases. The DB2 database system is an example of a resource manager.
- A stand-alone daemon that maps resource and resource class abstractions into calls and commands for one or more specific types of resources.
- An application, program, or transaction that manages and controls access to shared resources such as memory buffers and data sets. WebSphere MQ, CICS, and IMS are resource managers.
- A function that is responsible for managing a particular resource and that guarantees the consistency of all updates made to recoverable resources within a logical unit of work. The resource that is being managed can be physical (for example, disk or main storage) or logical (for example, a particular type of system service).
- A participant, in the execution of a one-phase or two-phase commit, that has recoverable resources that could have been modified. The resource manager has access to a recovery log so that it can commit or roll back the effects of the logical unit of work to the recoverable resources.
resource manager interface (RMI)
A program or a group of programs that you write to enable you to structure calls from your CICS system in such a way that they can access non-CICS resources, such as databases, that you would not normally be able to access. See also task-related user exit.
Resource Measurement Facility (RMF)
A feature of z/OS that measures selected areas of system activity and presents the data collected in the format of printed reports, System Management Facility (SMF) records, or display reports.
resource member class
A class to which a resource group class is related. See also resource group class.
A program that supplies information about resources in the system. A resource monitor can be a command, a daemon, or part of an application or subsystem that manages any type of system resource.
Resource Monitoring and Control (RMC)
A subsystem that runs on each cluster node and provides global access to subsystems and resources throughout the cluster, thus providing a single monitoring and management infrastructure.
- The name under which an AFP resource object is stored, the first 2 characters of which indicate the resource type.
- An 11-byte unique name of a client-defined resource. A transaction is an example of an IMS resource name.
- A name assigned by the system to a line, controller, or device that is connected to the system.
- In AFP, a collection of printing instructions, and sometimes data to be printed, that consists entirely of structured fields. A resource object is stored as a member (or file) of a library and can be called for by PSF when needed. The different resource objects are: coded font, font character set, code page, page segment, overlay, form definition, and page definition.
- A resource used in the Network Installation Management environment that represents a file or directory.
Resource Object Data Manager (RODM)
In Tivoli NetView for z/OS, a component that provides an in-memory cache for maintaining real-time data in an address space that is accessible by multiple applications.
An element in the resource policy file that defines the resource bindings and resource groups to be used by a DB2 instance or database and can also contain rules for assigning DB2 database objects to resource bindings. See also resource binding, resource group, resource policy file.
resource policy file
A configuration file that contains the resource policy for an instance or database and can also contain a scheduling policy for an instance. See also resource policy, scheduling policy.
- A collection of available servers (servers that are not allocated) that support one or more application tiers.
- A group of people who are available to work on a project.
- A logical collection of resources identified to complete delivery or provided services.
A profile that provides RACF protection for one or more resources. The information in a resource profile can include the data set profile name, profile owner, universal access authority, access list, and other data. Resource profiles can be discrete profiles or generic profiles. User, group, and connect profiles are not resource profiles. See also discrete profile, generic profile.
- A property for a JDBC data source in a server configuration, for example the server name, user ID, or password.
- A characteristic of a system, project, subproject, or file.
- A piece of information that is associated with a Web Services Resource (WS-Resource) that can reflect the state of a resource, the metadata, or the manageability interface information. See also Web Services Resource.
Resource Recovery Services attachment facility (RRSAF)
A DB2 subcomponent that uses Resource Recovery Services to coordinate resource commitment between DB2 and all other resource managers that also use RRS in a z/OS system. See also call attachment facility.
resource recovery timeout value (RR_TOV)
In Fibre Channel networks, the minimum time a target device in a loop waits after a loop initialization primitive (LIP) before logging out a small computer system interface (SCSI) initiator. See also error detect timeout value, resource allocation timeout value.
resource reservation setup protocol
An Internet protocol that is used for communicating application (end-to-end) quality-of-service requirements to intermediate transit nodes in a network. RSVP uses a soft-state mechanism to maintain path and reservation states in each node in the reservation path.
resource resolution table (RRT)
In Tivoli NetView Performance Monitor, a table that contains the names of the network resources for which data is to be collected. The resource resolution table corresponds with a network control program (NCP) and is built by NetView Performance Monitor Global Enterprise Manager from an NCP Stage I and an NCP resource resolution table.
- A security function of the operating system used to authorize users to any part of the system that is required by a job or task.
- In CICS Transaction Server, the facility provided by CICS and RACF for the control of access to resources protected by RACF security classes. The resources that can be protected include transactions, data sets, and transient data destinations.
- A collection of resources that are members of the same class and that share a common scope. A resource set also determines which other resource sets are its prerequisites and which place holders are used within the corresponding resource file templates.
- A data structure in AIX 5L used to represent physical resources such as processors and memory. AIX uses resource sets to restrict a set of processes to a subset of the system's physical resources.
A specification that defines a fixed list of properties for the resource, expected data types and values, and validation rules for new or changed resources. See also shape document.
resource status manager
The part of the NetView Graphic Monitor Facility that maintains a database of SNA resource status information and that forwards this information to all attached server workstations.
A coupling facility list structure, used by the Common Service Layer's Resource Manager and managed by CQS, that contains uniquely named resources. This structure is typically used to maintain global resource information when multiple Resource Managers exist in an IMSplex.
In the NetView Graphic Monitor Facility, a geometric shape that represents a particular kind of resource and that indicates whether that resource is an aggregate resource. A square, for example, represents a host.
In VTAM, an action initiated by a network operator to transfer control of resources from one domain to another without breaking the connections or disrupting existing LU-LU sessions on the connection. See also acquire, release.
resource target share
The shares of a resource that should be available to a Workload Management class. These shares are used with other class shares to determine the desired distribution of the resources between classes.
- A well-defined syntax and semantics that characterize all instances of a given kind of resource. See also managed resource prototype.
- A resource that is defined by CQS. CQS groups list headers into resource types. The resource types allow CQS and its clients to physically group resources of a particular type on a coupling facility list structure.
- A characteristic of a console resource that indicates the relationship of the console resource to the operation of the console. See also core resource, custom resource, system resource.
- In the context of OSLC, the type of data that is linked between integrated applications, for example, a change request.
In Event Management, the representation of an attribute of a resource. An example of a resource variable is IBM.AIX.PagSp.%totalfree, which represents the percentage of total free paging space. IBM.AIX.PagSp specifies the resource name and %totalfree specifies the resource attribute.
- In distributed queuing, a program that replies to network connection requests from another system. See also initiator.
- In OSI Communications Subsystem, the application entity that accepts an application association. See also initiator.
- A key server that is asked to establish a dynamic virtual private network (VPN) connection between two endpoints.
- A return message to a computer that made a request. After capturing a request, the PCA server then processes and assembles packets in search of the response to that request. A response may be in text or binary form.
- In OSI, a service primitive issued by a service user to complete the procedures associated with a confirmed service. See also command.
- In speech recognition, the character string returned by the recognizer, through DVT_Client, to the state table. The string represents the outcome of a recognition attempt. This is the word or words that the recognizer considers to be the best match with the speech input.
- In SDLC, a frame transmitted by a secondary station. Stations using asynchronous balanced mode send both commands and responses.
- The texts that make up the list of possible responses to a categorical question or a grid question. See also text.
- A message inserted to a logical terminal destination specified by an I/O PCB or an alternate response PCB. When VTAM is used, the term reply is substituted for response because response has a separate meaning in VTAM communications. See also primary request, secondary request.
- A choice that a user selects from a predetermined list when processing a work item. A response can determine the route that work will subsequently follow.
- In a request/response interaction, a message from a connector to a collaboration that carries the results of a request made by the collaboration. The message can be either a business object or a response code.
- In data communication, a reply that is represented in the control field of a response frame. It advises the primary or combined station of the action taken by the secondary or other combined station to one or more commands. See also command.
- In SNA, a message unit that acknowledges receipt of a request; a response consists of a response header (RH), a response unit (RU), or both.
- The reaction of an appliance to an event. Responses include sending an email message to a responsible party, triggering an SNMP trap, creating a log of the activity, quarantining the activity, or using a custom (user-specified) action, such as running an application or running a command.
response alternate PCB
See alternate response PCB.
In Notes, a document created using a Response form, a typical component of a discussion database. In a view, response documents are usually indented underneath the document to which they respond.
- A file containing predefined values that is used instead of someone having to enter those values one at a time. See also CID methodology, manifest file, silent installation.
- A file that can be customized with the setup and configuration data that automates an installation. During an interactive installation, the setup and configuration data must be entered, but with a response file, the installation can proceed without any intervention.
response file generator
A utility that creates a response file from an existing installed and configured DB2 product. The generated response file can be used to re-create the same setup on other computers.
response header (RH)
In SNA, a header, optionally followed by a response unit, that indicates whether the response is positive or negative and that may contain a pacing response. See also negative response, pacing response, positive response, request header.
A mode of terminal operation that synchronizes operations between the terminal operator and the application program. See also line response mode, nonresponse mode, terminal response mode.
A method that is used to record a quantity or frequency that is associated with a response, for example, “Do you buy product A, product B, or product C? If so, how often do you buy the product?”
- For response time monitoring, the time from the activation of a transaction until a response is received, according to the response time definition coded in the performance class.
- The elapsed time between entering an inquiry or request and receiving a response.
- In capacity planning, the elapsed time between the end of an inquiry or demand on a computer system and the beginning of the response. An example of response time is the length of time between an indication of the end of inquiry and the display of the first character of the response at a user's workstation.
- The time that an application spends in processing a request.
- A message unit that acknowledges a request unit. It can contain prefix information received in a request unit.
- In SNA, the record sent to respond to a request. The response can be either positive or negative and can include control information.
See resident queue.
See Representational State Transfer.
An application programming interface that defines the architectural design principals used to create web services. See also application programming interface.
- A process that resends an inbound batch through the network for complete reprocessing.
- Resumption of operation after recovery. Ability to restart requires knowledge of where to start and ability to start at that point.
A property of an operation that can automatically be restarted, if the workstation that it is using becomes inactive. This option applies only to the operation while it has status S (started). The operation is reset to status R (ready).
An attribute that specifies that processing of the input data should continue even though a data object of the component is invalid. The restart attribute provides instructions for handling errors encountered in a data stream and can be assigned to a component within a group type.
- A VSAM KSDS used only during a CICS emergency restart. The RSD temporarily holds the backout information read from the CICS system log. This allows CICS to be restored to a stable state and to be restarted following an abrupt termination.
- The direct-access data set used to contain the information necessary to restart IMS.
The act of restarting a member on a host other than its home host for the sole purpose of performing member crash recovery on each database as required. See also guest member.
A local queue that holds restart information for each send queue that a Q Capture program uses. The Q Capture program uses the information to determine where to start reading in the DB2 recovery log after a restart.
Pertaining to applications and services that conform to Representational State Transfer (REST) constraints. See also Representational State Transfer.
- To return to an original value or image, for example, to restore data to main storage from auxiliary storage.
- To revert a withdrawn or terminated contract to its prior status.
- To copy data from compact disc, tape, diskette, optical disc, or a save file to auxiliary storage. See also save.
- To rebuild a damaged or corrupted database or table space from a backup image produced with the backup database utility.
- To copy information from its backup location to the active storage location for use. For example, to copy information from server storage to a client workstation. See also back up.
See restart pending.
restricted IP option
An IP option, such as Loose Source and Record Route (LSRR), that is used to map a network's topology and discover private IP addresses. A hacker might try to use a restricted IP option to get through a firewall.
The status in which a user places a system (by ending all subsystems) to do a specific function, such as saving storage, saving the system, or restoring user profiles. Other jobs cannot be active on the system while it is in a restricted state.
To redistribute and rebalance data across all available and defined disks in a multimedia file system. This is typically done when a disk is removed from a file system for repair or when a new disk is added to a file system.
- A general-purpose, high-level programming language, particularly suitable for EXEC procedures or programs for personal computing.
- The i5/OS implementation of the Systems Application Architecture Procedures Language. REXX is a programming language that is supported by an interpreter provided as part of the i5/OS licensed program.
- In a policy-enabled system, a solicited decision that contains one or more specific data values, called result values.
- The consequence of reaching an end event. Types of results include message, error, compensation, and signal. There can be multiple results, such as a result that produces a message and another result that sends a signal.
- See edge.
- The set of columns that DB2 for i5/OS SQL selects for an application program.
- A set of column values that is generated by an expression that contains one or more columns.
In RPG, an indicator that signals the result of a calculation, such as whether the result is plus, minus, or zero; whether a given field is greater than, less than, or equal to another field; or whether an operation was successfully completed.
An algorithm that manipulates the return codes of batch jobs or provides placeholders for triggers that are based on batch step return codes. A results algorithm is applied to batch steps in a batch application by using xJCL. See also checkpoint algorithm, xJCL.
- The information returned to a model by a call to a back-end data source, like a service call or database query.
- A set of row values as returned by, for example, a cursor or procedure. See also result table.
- A visible subset of items, such as workflows or documents, returned by a search. The user can set the size of the result set.
- To reinstate a previously suspended change set to a repository workspace.
- To continue execution of an application after an activity has been suspended.
- To revert a decline action in order to continue contract negotiation.
- A candidate's set of accomplishments.
- A pointer that tracks the current location at which the exception handler may resume processing after handling an exception.
- The point in an application at which execution should continue if a condition handler requests the resume action for a condition it is processing.
resume pending state
In cross-site mirroring, the configuration state of a mirror copy that indicates that geographic mirroring requires synchronization but that the disk pool is currently unavailable. When the disk pool is made available, the mirror copy will be synchronized with the current information on the production copy.
In cross-site mirroring, the configuration state of the mirror copy that attempts to perform geographic mirroring and synchronization when the independent disk pool is available. The mirror copy state is resuming when it is not suspended or active.
- A track image copy from the primary volume to the secondary volume of only the tracks that have changed since the volume was last in duplex mode.
- The completion of an interrupted two-phase commit process for a unit of work.
- In OSI, a function of the session layer that enables two peers to coordinate the exchange of data to a previously marked point. This point was marked using the major or minor synchronization service. Resynchronization will normally be performed after a problem is detected by an application entity or indicated by the session layer.
In retail communications and Point-of-Sale Utility, a controller in a network that is used to collect data from and provide support for the point-of-sale and administrative devices within the retail system. The retail controller also provides some local data processing capabilities.
An i5/OS program that supports routing of user data between a System/370-type host processor and a retail controller using a single System i system. Both the SNA upline facility and the retail communications support use separate intersystem communications function sessions.
- A method for protecting transaction updates when a problem delays transaction recovery of the updates. The retained status is cleared when transaction recovery is completed.
- A MODIFY lock that a DB2 subsystem was holding at the time of a subsystem failure. The lock is retained in the coupling facility lock structure across a DB2 for z/OS failure.
- The amount of time, in days, that inactive backed-up or archived files are kept in the storage pool before they are deleted. Copy group attributes and default retention grace periods for the domain define retention.
- The process of storing a document for a period determined by an event-based or time-based policy.
- In Backup, Recovery, and Media Services, the total length of time that the output media is to be saved as a backup or archive copy before it is expired (available for reuse). Retention can be specified as a date, number of days, versions, or permanent. Different retention periods can be specified for full backups, incremental backups, or archive output.
- A period in a disposition phase that specifies the length of time between cutoff and the phase action. A disposition schedule can have several phases of retention, each with its own retention period.
- The length of time that data should be kept in a certain location or form.
See disposition schedule.
A rule execution mode for matching patterns with objects. The RetePlus mode is used by the rule engine to minimize the number of rules and conditions that need to be evaluated, compute which rules should be executed, and identify in which order these rules should be fired.
- To locate data in storage and read it so that it can be processed, printed, or displayed.
- To copy archived information from the storage pool to the workstation for use. The retrieve operation does not affect the archive version in the storage pool. See also archive.
- One or more products, their prices, and the quantity specified, that a customer has selected for a refund from the store in which the product was originally purchased.
- A product that has been shipped to a customer and shipped back by the customer for various reasons (damaged goods, incorrect items).
- To remove the call stack entry and transfer control back to the calling procedure or program in the previous call stack entry.
In architecture, the address of the order following a Call Segment order, that is pushed onto the segment call stack at call time. This enables a return from the called segment so that processing can resume with that order.
return merchandise authorization (RMA)
Authorization from the seller for a customer to return products ordered from a store and receive a credit, refund, or replacement product. At the seller's discretion, a product does not need to be returned in order to receive a credit, refund, or replacement product.
A defined role in WebSphere Commerce that manages the disposition of returned products. See also logistics manager.
See return code.
- To repost or forward a tweet in order to share it with one's followers on Twitter.
- A reposted or forwarded tweet that is shared with one's followers on Twitter.
Reverse Address Resolution Protocol (RARP)
In TCP/IP networking, a protocol by which a diskless machine can obtain its IP address from a RARP server. The diskless machine broadcasts a request and its physical hardware address. The RARP server responds by returning an IP address based on the physical address. See also address resolution, Address Resolution Protocol.
In X.25, a packet-switching data network optional facility that allows the data terminal equipment (DTE) to request that the cost of a communications session be charged to the DTE that is called.
reverse data type mapping
In a federated system, the mapping of a DB2 data type to a comparable data type at a remote data source. For most data sources, the default reverse data type mappings are in the wrappers. See also data type mapping, forward data type mapping.
A category or subquestion list that is presented top-down to some of the respondents and reversed (bottom-up) to the others. Reversed presentation is typically incorporated in an attempt to reduce bias.
The process of identifying more traditional geographic markers (addresses, postal codes, and so on) from geocodes. For example, a search for the geocode "43.641619,-79.389138" gets reverse geocoded to the Rogers Centre (a landmark). See also geocoding, geolocation, Geospatial Entity Object Code, geotagging, global positioning system, radiolocation.
A heading where each character is highlighted by reversing the color of the character with its background, for example, changing a black character on a white background to a white character on a black background.
reverse-interrupt character (RVI character)
The BSC transmission control character that is sent as a request from the receiving station to the sending station to stop transmitting and begin receiving a message.
reverse mandatory access check
A mandatory access check in which the security label of the resource must dominate the security label of the user in order for the user to be granted access to the resource.
A FlashCopy option that reverses a FlashCopy relationship by copying over modified tracks from the original target volume to the original source volume. The background copy process must complete before reverse restore can be performed.
A form of highlighting a character, field, or cursor by reversing the color of the character, field, or cursor with its background. For example, changing a red character on a black background to a black character on a red background.
- A structured process for detecting and correcting faults and inconsistencies of elements.
- To open a contract to check its language or other properties for purposes of collaboration or negotiation.
revisable-form text (RFT)
A data stream defined by document content architecture that is used to exchange unresolved documents (which cannot be directly printed or displayed) between systems. See also final-form text.
Revisable-Form-Text Document Content Architecture (RFTDCA)
The architectural specification for the information interchange of documents whose text is in a revisable format. A Revisable-Form Text Document Content Architecture document consists of structured fields, controls, and graphic characters that represent the format and meaning of the document.
- A version of an artifact that is designed to replace an earlier version, such as a model year of a car or a revised requirement. See also artifact, version.
- A distinct version of a project, document, or requirement identified by a unique internal revision number. See also version information.
- A clause or contract property that represents the net result of all edits and other updates by a single user before another user starts editing.
Revision Control System (RCS)
A system that manages multiple revisions of text files such as programs, form letters, and papers. RCS features automatic identification, storage, logging, retrieval, and merging of file revisions.
- To move tape from the take-up hub to the supply hub.
- To select an earlier item, rather than the next or current item, from an argument list.
- To repair items that do not meet customer specifications due to damage or incorrect packing.
- In replication, an action that is taken when an SQL statement fails against a target table and the resulting SQL return code indicates that another SQL statement could be used to produce the expected result in the target table. An example is the conversion of an insert into a replication target table to an update if the insert fails because the row exists in the target table. Another example is the conversion of an update to a replication target table to an insert if the update fails because the row does not exist in the target table.
See route extension.
See Remote Execution Protocol.
See Restructured Extended Executor.
A generally accepted standard for FTP implementation. RFC 959 defines commands that must be accepted by FTP servers and contains a general set of rules that FTP clients and servers must follow.
The kind of change that a request for change (RFC) defines. Each RFC is required to have a type. Release management process owners can edit or remove the predefined RFC types and create new types.
See request for information.
See radio frequency identification.
A tracking device that is used to record information about a product, animal, or person. For example, an RFID tag can be placed on a meat product at a farm, and then traced through the supply chain to the supermarket shelf. See also track and trace service.
See recency, frequency, monetary.
See request for proposal.
See request for quote.
When using the RFQ trading mechanism, the reply that a seller sends to a buyer who has sent them an RFQ. The RFQ response indicates the terms and conditions under which the Seller will sell the products or services to that buyer.
An electronic document that is created by a buyer and contains items for purchase and/or questionnaires related to a procurement activity. In Emptoris Sourcing it could also be a type of auction or a survey.
A report that contains information on the RFx attachments, items, and bid fields specific to each item, and item attachments. By printing or faxing this summary, information can be provided to offline suppliers to make bids on an RFx.
A configuration of the hardware that allows values stored in the frame buffer to be interpreted as packed RGB values. The values found in the frame buffer are passed directly to the red, green, and blue guns of the display monitor. The values are not passed through the color map first. (However, each color is sent individually through the gamma ramp to make a final correction to its intensity.)
A client application that has full access to the functions of an operating system and performs most of the processing itself rather than depending on the server facilities. See also thin client.
Rich Site Summary (RSS)
An XML-based format for syndicated web content that is based on the RSS 0.91 specification. The RSS XML file formats are used by Internet users to subscribe to websites that have provided RSS feeds. See also Atom, feed, Really Simple Syndication.
rich text editor
An embedded text editor that enables the creation of visually interesting blog posts, wiki articles, forum topics, and activity entries. Users can enter and format text as well as insert images and links.
rich text field
A field that can contain text, objects, file attachments, and pictures. Notes users can tell if they are in a rich-text field if the status bar at the bottom of the screen indicates the font size and font name being used.
See resource identifier.
A list of all of the RIDs that correspond to all of the rows that share a given index key. For example, if three rows share an index key, the RID list for that index key contains the RIDs for all three rows.
See record identifier pool.
See Resource Interchange File Format.
- See privilege.
- A security permission at the lowest, most granular level. Objects include the rights appropriate to them. For example, document classes include the create instance right, whereas folder classes include a file in folder right. Rights can be either allowed or denied.
- A rule defined by an administrator that permits or restricts a user from specific actions such as viewing and editing data.
right outer join
A join whose result consists of the matched rows of the two tables that were joined and the unmatched rows of the second table. See also full outer join, join, left outer join, outer join.
An input mode (prevalent in “legacy” host systems) of a bidirectional machine in which the cursor moves to the left after each character is entered. In other systems (e.g., Windows and Unix), another input mode (the “push” mode) is used instead.
- In FDDI, two or more stations connected by a physical medium wherein information is passed sequentially between active stations, each station is turn examining or copying and repeating the information, finally returning it to the originating station.
- A method used to distribute data in a LAN.
An application-defined buffer in which monitor mode input is placed. An application places data from input devices in the buffer. The ring buffer mechanism dramatically shortens the input data path from the input device to the application.
ring error monitor (REM)
In communications, a function of the token-ring manager that observes, collects, and analyzes recoverable and irrecoverable error reports sent by token-ring stations on a single token-ring network and assists in fault isolation and correction.
- A network in which every node has exactly two branches connected to it and in which there are exactly two paths between any two nodes.
- A network configuration in which devices are connected by unidirectional transmission links to form a closed path.
ring server topology
A network configuration in which servers are connected one-to-one in a circle with the ends connected. It is similar to chain server topology, which connects servers one-to-one but with the ends unconnected.
The functions that are necessary for connecting to the local area network and for operating with the token-ring protocols. These include token handling, transferring copied frames from the ring to the using node's storage, maintaining error counters, observing Media Access Control (MAC) sublayer protocols (for address acquisition, error reporting, or other duties), and (in the full-function native mode) directing frames to the correct Data Link Control link station. A ring station is an instance of a MAC sublayer in a node attached to a ring.
See remote input/output.
See remote IPL.
See recoverable indoubt structure.
An analysis of the security issues found in a web application. See also risk assessment.
- An evaluation of the benefits and consequences of an action or scenario. See also risk analysis.
- An evaluation of the supplier performance for the identification and management of procurement risks.
- The overall result of a risk assessment.
- A measure of how much risk an asset poses to a site, based on how critical the asset is and the amount and severity of attacks made against the asset.
See remote job entry.
See remote job processing.
See remote key management server.
The number of relocation dictionary (RLD) records in a load module that follow the text block that the count references. See also RLD record.
A record in a relocation dictionary (RLD) that contains information on relocatable address constants for that program object or load module. See also RLD count.
See recovery log data set.
See run-length encoding.
See resource limit facility.
See received license plate number.
See record-level sharing.
See Release Link Trunk.
See report layout utility.
See Royal Mail 4 State Customer Code.
- See return material authorization.
- See relationship management application.
- See return merchandise authorization.
When RM and a resource structure are used, an association between an IMS and a user or node with LOCAL status recovery mode. If RM indicates that the user or node has RM affinity to an IMS, the user or node cannot log or sign on to another IMS. This affinity occurs because end-user significant status (conversation, STSN, or Fast Path) is being recovered on an IMS.
See Resource Monitoring and Control.
See repository member data set.
RM distribution file
A file used to exchange relationship data with an relationship management application (RMA). It is the file that is created when you export bootstrap authorizations, and it is the file from which you import authorizations from an RMA.
See relationship management data store.
See resource manager local transaction.
See reliable multicast messaging.
See RMM complex.
See residency mode.
See Requirements Management Rich Text Format.
See resource management utility.
See RDMA network interface card.
robbed-bit signaling (RBS)
The T1 channel -associated signaling scheme that uses the least significant bit (bit 8) of each information channel byte for signaling every sixth frame. This is known as 7-5/6-bit coding rather than 8-bit coding. The signaling bit in each channel is associated only with the channel in which it is contained.
A recording of a typical customer transaction that collects performance data to determine whether a transaction is performing as expected, and exposes problem areas of the web and application environment.
See RDMA over Converged Ethernet.
See Resource Object Data Manager.
See return on investment.
- See relationship group.
- A defined set of permissions that can be assigned to database objects such as fields, forms, and views to simplify their maintenance.
- The way in which a field is to be used in model building. Examples are input, target, both, or none (if the field is not used in building the model).
- A logical group of principals that provides a set of permissions. Access to operations is controlled by granting access to a role.
- A job function that identifies the tasks that a user can perform and the resources to which a user has access. A user can be assigned one or more roles.
- A collection of access rights that can be assigned to a user, group of users, system, service, or application that enable it to carry out certain tasks.
- A logical group of principals that provide a set of permissions. Access to resources is controlled by using provisioning policy to grant access to a role . A role can also represent a group of principals based on business job title or other business-related attributes. See also organizational role.
- The function of an entity that participates in a relationship. Roles capture structure and constraint requirements on participating entities and their manner of participation. For example, in an employment relationship, the roles are employer and employee.
- A set of permissions or access rights. See also action.
- A classification of an identity that defines the focus, nature, or purpose for that identity. One or more roles can be associated with an identity. See also role code.
- A definition of the behavior and responsibilities of an individual or a team within the context of a software engineering organization.
- A set of job responsibilities related to a service management process. Each role is implemented as a security group, which gives users with that role access to a set of applications and a start center with role-appropriate information.
- A job function that identifies the tasks that a user can perform and the resources to which a user has access. A user can be assigned one or more roles.
- The part played by an organization that is understood by all of the other organizations that are associated with that particular hub.
- A position or responsibility within an organization, such as order entry clerk, marketing manager, travel advisor, sales associate, and so on. Activities are often assigned to roles rather than to individuals.
- A database entity that groups together one or more privileges and that can be assigned, for example, to users, PUBLIC, other roles, or trusted contexts.
- A description of a function to be carried out by an individual or bulk resource, and the qualifications required to fulfill the function. In simulation and analysis, the term role is also used to refer to the qualified resources.
role alert rule
A user-configured rule that identifies one or more roles, that, if present in a single entity, or if linked between multiple entities, would be considered "of interest" or as "conflicting". See also alert, role alert.
The unique identifier for a role. See also role.
The association of two volume roles in a session that take part in a copy relationship. For example, in a Metro Mirror session, the role pair can be the association between host volumes at the primary site and host volumes at the secondary site (H1-H2).
- An operation in a transaction that reverses all the changes made during the unit of work. After the operation is complete, the unit of work is finished.
- See backout.
- The process of restoring data that was changed by an application program or user.
- The process of restoring data that was changed by SQL statements to the state at its last commit point. All locks are freed.
- To restore data that is changed by an SQL statement to the state at its last commit point. See also backout, point of consistency, roll forward.
- To remove changes that were made to database files under commitment control since the last commitment boundary. See also commitment boundary, commitment control.
- To revert a software package to a previously installed version.
- To return to a previous stable condition.
rollback required (RBR)
Pertaining to a logical unit of work (LUW) state in which a rollback vote was received for a prepare-for-commit request or that a failure has put the current transaction into a state where it must be rolled back.
To update the data in a restored database or table space by applying changes recorded in the database log files. See also roll back.
rolling window container
A container that stores time series data in multiple partitions, based on a specified time interval. When the maximum number of partitions is reached, older partitions are removed when new partitions are added.
The status of the oldest copy of a data set when a new backup, dump, or generation data set (GDS) copy is created. Roll off specifies that the oldest copy is a candidate for deletion in order to maintain a customer-specified limit.
The efficient deletion of a large portion of a multidimensional clustering (MDC) table, which is possible when a DELETE statement is processed that either has no predicates or certain types of predicates (equality, range, BETWEEN, IN) on one or more dimension columns. See also deferred index cleanup rollout, immediate index cleanup rollout.
See read-only memory.
The upright version of a face within a font family, as compared to the italic version. See also italic.
The process of rendering any non-Roman text into the Roman alphabet. See also transliterate.
Any of the characters I, V, X, L, C, D, and M having the value of 1, 5, 10, 50, 100, 500, and 1000, respectively. Lesser numbers in prefix position indicate subtraction. For example MCMLXIV is 1964 in decimal, because CM is 900, LX is 60, and IV is 4. See also Arabic numeral, Chinese numeral, Hindi numeral, number.
A program that allows users to create documents for others to read, respond to comments from others, and review project status and deadlines. Users can also chat with others who are in the same room.
- In a database outline, the topmost member in a branch.
- See jailbreak.
- In Enhanced X-Windows, the screen on which the window is created. The root of a pixmap or GContext is the same as the root of the drawable used when the pixmap or GContext was created. The root of a pixmap or graphics context is the same as the root of whatever drawable was used when the pixmap or graphics context was created. The root of a window is the root window under which the window was created.
- The UNIX definition for a directory that is the base for all other directories.
- The user name for the system user with the most authority.
- The directory that contains all other directories in a system.
root addressable area
In an HDAM or PHDAM database, the primary storage area in HDAM and PHDAM databases. IMS always attempts to put new and updated segments in the root addressable area, and if there is not enough room, IMS puts the segment into the overflow area instead. See also overflow area.
See root certificate authority.
The certificate (proof of identity and keys) of the original trusted signer or certificate authority that certifies the authenticity of the end user/entity (or of intermediate signers).
A class that does not have a parent class. Most root classes can be subclassed or modified when configuring an object store. See also document class.
The initial dbspace that the database server creates. The root dbspace contains reserved pages and internal tables that describe and track all other dbspaces, blobspaces, sbspaces, tblspaces, chunks, and databases. See also dbspace.
- In the operating systems for personal computers, the directory on a disk or diskette that contains the list of files stored on that disk or diskette. If more than one directory is on a disk or diskette, the root directory is at the top of the hierarchy of directories. The root directory is created by the operating system when the disk or diskette is formatted.
- The directory that contains all other directories in the system.
- An element that represents the document/transaction that Sterling B2B Integrator is mapping. The root element defines the characteristics of the file, such as delimiters or record length. The root element is a group and can contain groups and records.
- An element used to define the namespace used by the XSL style sheet and the version of XSL being used in the document.
- The implicit highest-level node of a parsed XML document. You may not always be able to predict which element will be the document element of a parsed instance, but it will always have a root node that you can count on being able to use for preliminary or setup processing.
An entity in a grouped layout that has the highest degree centrality in its group. Depending on the data, there can be more than one root entity. See also degree.
- In a graphical representation of data as a tree, a node that has no parents but typically has children.
- The common ancestor of all nodes in a set of nodes. There is only one root node for each XML instance document.
- A single index page that contains node pointers to branch nodes. The database server allocates the root node when you create an index for an empty table. See also node.
- In a hierarchical database, the highest segment in the tree structure. It remains in main storage when other overlay segments are run. See also dependent segment.
- In AFP architecture, a segment in the picture chain that is not called by any other segment. If a single segment that is not in a chain is drawn, it is treated as a root segment for the duration of the drawing process. See also default drawing control.
In the Network File System (NFS) Protocol, a reduction of the access rights for the remote superuser (root) when using identity authentication. The local user is the same as the remote user.
- A system user who operates without restrictions. A root user has the special rights and privileges needed to perform administrative tasks.
- In Linux and UNIX operating systems, a user who has superuser authority and root privileges. A root user's user identifier (UID) is 0.
See root volume group.
See reorder point.
A consortium of major computer and consumer electronics, electronic components, semiconductor manufacturing, telecommunications, and logistics companies that work together to create and implement industry-wide e-business process standards.
- To change the dimensional orientation of a report or page display. See also pivot.
- To reorient an item by turning it on a touchscreen interface.
A category or subquestion list that is rotated, by one, for each respondent. For example, in a list of four categories, there would be four presentations: (1,2,3,4), (2,3,4,1), (3,4,1,2), (4,1,2,3).
rotating diagnostic log
A diagnostic log file that grows to a limited size, after which it is closed and a new diagnostic log file is created and opened for logging. To create the name of the new file, the index number used in the file name is incremented by 1.
A route that allows a shipper to obtain a discount for a carrier that travels from the origin to the destination and then back to the origin. See also continuous move.
A conversion where the integrity of all character data is maintained from the source CCSID to the target CCSID and back to the source. The characters that are in both the target CCSID and the source CCSID are preserved. Any characters outside the target CCSID are arbitrarily assigned unique code points in the target CCSID.
- The path that network traffic follows from its source to its destination. See also cut-through.
- A path between two steps in a workflow definition.
- The URL used to direct requests to an application. A route is made up of an optional host (or subdomain) and a domain that are specified when an application is pushed. For example, in the route myapp.example.com, myapp is the host and example.com is the domain. A route can be associated with one or more applications. Unless a custom domain is specified, Bluemix uses a default shared domain in the route to your application. See also custom domain, domain, host, subdomain.
- The overall path between a defined list of stops.
- A parallel processing stream in the final merging and ranking phases. Each route handles a different set of candidate answers.
- The sequential locations scheduled for a crew to complete work orders.
route extension (REX)
In SNA, the path control network components, including a peripheral link, that make up the portion of a path between a subarea node and a network addressable unit (NAU) in an adjacent peripheral node. See also explicit route, path, peripheral link, virtual route.
The identifier used for a sequence of stops for pickup visits or delivery visits or both. If a vehicle starts at a depot and returns to the same site, the route ID is increased by 1. If a vehicle starts somewhere that is not a depot, it does not return to the start site and so the route ID remains at 1. See also stop, visit.
In Internet communications, the method used by the Routing Information Protocol (RIP) to choose the best Internet routes. The unit of measure is the number of hops between the origin and destination. In practice, the metric for a route is often assigned based on factors such as link transmission speed and line cost, not on the actual number of hops.
- An MVS program that presents a common systems interface for all products providing resource control. Resource managing components (such as CICS) call the MVS router as part of certain decision-making functions in their processing.
- A special purpose, dedicated computer that attaches two or more networks.
- A computer that determines the path of network traffic flow. The path selection is made from several paths based on information obtained from specific protocols, algorithms that attempt to identify the shortest or best path, and other criteria such as metrics or protocol-specific destination addresses.
- An attaching device that connects two LAN segments at the reference-model network layer. The LAN segments can use similar or different architectures. See also bridge.
- A device or process that relays messages between multiple networks.
- A part of the System i Access licensed programs that handle requests to send and receive data from applications on the personal computer and routes them to the appropriate applications on the system.
Router Information Protocol (RIP)
The distance-vector routing protocol used by the Internetwork Packet Exchange (IPX) routers on the network to exchange routing information about the connected networks. The information is exchanged through the use of IPX. A RIP packet contains sets of network entry information.
Route Selection control vector (RSCV)
A control vector that describes a route within an APPN network. The RSCV consists of an ordered sequence of control vectors that identify the TGs and nodes that make up the path from an origin node to a destination node.
A value computed for the set of transmission groups and intermediate nodes interconnecting an origin and destination node; route weight determines which route is preferred during the route selection process.
- A program or sequence of instructions called by a program. Typically, a routine has a general purpose and is frequently used.
- A set of statements in a program that causes the system to perform an operation or a series of related operations.
- In REXX, a series of instructions called with the CALL instruction or as a function. A routine can be either internal or external to a user's program.
- A database object that can encapsulate procedural logic and SQL statements, is stored on a database server, and can be invoked using an SQL statement such as the CALL statement. The three main classes of routines are procedures, functions, and methods. See also aggregate function, built-in function, built-in procedure, external routine, function, method, procedure, row function, scalar function, sourced function, SQL function, SQL method, SQL procedure, SQL routine, table function, user-defined function, user-defined procedure.
A keyword in the WITH clause of a CREATE FUNCTION, CREATE PROCEDURE, ALTER FUNCTION, ALTER PROCEDURE, or ALTER ROUTINE statement that specifies a particular attribute or usage of a user-defined routine.
The process of assigning one name to multiple routines and specify parameters of different data types on which the routines can operate. See also routine resolution, routine signature.
The definition of a module routine without a routine body. A routine prototype can be referenced in an SQL statement; however, the referenced routine can be successfully invoked only after its routine body has been defined. See also module, routine body.
The process that the database server uses to determine which user-defined routine to execute, based on the routine signature. See also routine overloading.
- The determination as to how to deliver a shipment. A result of the routing process is that a shipment is assigned to an existing load, or a new load is created for that shipment.
- The assignment of the path by which a message is to reach its destination.
- A model for survey workflow, such as questions and logic, in the survey authoring tools.
- The list of users who are to receive an item when it is distributed, including all users named specifically and those users named on distribution lists by the sender.
- The process of directing packets between networks.
- A code assigned to an operator message and used to route the message to the appropriate console.
- For EMH, a user-defined code that allows transactions to be routed to programs within a load balancing group.
A control that determines which item is presented next based on the answers to previous questions in computer assisted interviewing methods, such as an IF/THEN/ELSE statement. See also off path, on path.
routing-control data set
In Download for OS/390, a data set containing routing statements that associate routing criteria of class, destination, and form name with the socket addresses of Infoprint Manager for AIX, Infoprint Manager for Windows NT/2000, or OnDemand servers.
In Internet communications, a group of intermediate systems that use a routing protocol so that the representation of the overall network is the same within each intermediate system. Routing domains are connected to each other by exterior links.
A list of conditions that determine how a shipment should be routed, and what carrier and service should be used. A routing guide has a time period for which it is effective, and conditions for when it should be applied.
- In the Internet suite of protocols, a protocol used to exchange intradomain routing information and to determine optimum routes between internet hosts. This protocol determines optimum routes on the basis of route metrics, not link transmission speed.
- A variant of the XeroxNS Routing Information Protocol that is used to maintain current kernel routing table entries.
A situation that occurs when two or more mail forwarding mechanisms attempt to forward mail to each other. The mail travels back and forth over the network, creating a high volume of traffic that may seriously impact other network users.
In the dynamic routing of BTS processes and activities, the CICS region on which the distributed routing program runs. In BTS routing, the routing region is the same as the requesting region. See also requesting region, target region.
- A condition that when its criteria are satisfied by event data, a collection of conditions and consequent routing are performed.
- A rule that enables Sterling B2B Integrator Mailbox to take automatic action when a message is added to a mailbox, such as notifying a business process to process the message.
- A collection of routes that is used to direct datagram forwarding or to establish a connection. The information is passed among routers to identify network topology and destination feasibility.
- The table holding a list of valid paths through which hosts can communicate with other hosts. The routing table can hold static routes and dynamic routes.
- In a point-to-point profile, a collection of path information through which hosts or networks can communicate with other hosts and networks.
- In SNADS, a list of entries in a table that the system uses to route a message or electronic mail to a user on the system. Each entry is made up of a destination group name (such as a department or organization) and a destination element name (the user ID of each person in that department or organization).
- The file-system definition for a directory that is the base for all other directories.
- A horizontal arrangement of characters or other expressions.
- The horizontal component of a table, consisting of a sequence of values, one for each column of the table. See also record.
- In AFP architecture, a subarray that consists of all elements that have an identical position within the high dimension of a regular two-dimensional array. See also column.
A generated column that is defined with the AS ROW BEGIN clause. The value is assigned whenever a row is inserted into the table or any column in the row is updated. A row-begin column is intended for use as the first column of a SYSTEM_TIME period. See also generated column, row-end column, transaction-start-ID column.
row change timestamp column
A generated column that is defined with the AS ROW CHANGE TIMESTAMP clause. A row change timestamp column provides a way for the database manager to automatically generate and maintain a timestamp value for each row that is inserted or updated in a table. A table can have no more than one row change timestamp column.
row data type
A complex data type that contains one or more related data fields, of any data type except IDSSECLABEL, that form a template for a record. The data in a row type can be stored in a row or column. See also complex data type, named row data type, unnamed row data type.
A generated column that is defined with the AS ROW END clause. The value is assigned whenever a row is inserted into the table or any column in the row is updated. A row-end column is intended for use as the second column of a SYSTEM_TIME period. See also generated column, row-begin column, transaction-start-ID column.
An SQL function that optionally accepts arguments and that returns a single row of values. A row function can be implemented in SQL and used as a transform function to map attributes of a structured type to built-in data type values in a row. See also function, routine.
See row identifier.
A lock on a single row of data. See also table lock.
A table where the data pages contain row data instead of column data. See also column-organized table.
The ability to retrieve a single row by using a single FETCH statement. See also rowset-positioned access.
row-positioned fetch orientation
The specification of the desired placement of the cursor as part of a FETCH statement, with respect to a single row (for example, NEXT, LAST, or ABSOLUTE n). See also rowset-positioned fetch orientation.
The ability to retrieve multiple rows by using a single FETCH statement. See also row-positioned access.
rowset-positioned fetch orientation
The specification of the desired placement of the cursor as part of a FETCH statement, with respect to a rowset (for example, NEXT ROWSET, LAST ROWSET, or ROWSET STARTING AT ABSOLUTE n). See also row-positioned fetch orientation.
- A global variable, local variable, or parameter of a row data type.
- An IBM Informix ESQL/C host variable or SPL variable that holds an entire row type and provides access to the individual fields of the row.
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a communication protocol that supports the semantics of the DCE RPC application programming interface (API) and runs over either connectionless or connection-oriented communication protocols.
RPC protocol sequence
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a valid combination of communication protocols represented by a character string. Each RPC protocol sequence typically includes three protocols: a network protocol, a transport protocol, and an RPC protocol that works with the network and transport protocols.
RPC runtime library
See Remote Procedure Call runtime library.
See report interface.
See request parameter list.
See recovery point objective.
See recognized private operating agency.
See request for price quotation.
See raster pattern storage.
See resource recovery timeout value.
See record resource block.
See relative record data set.
See reasonable resource loaded value.
See relative record number.
See Resource Recovery Services.
See RACF remote sharing facility.
See RACF remote sharing facility node.
See resource resolution table.
See read stability.
A system for public-key cryptography used for encryption and authentication. It was invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. The security of the system depends on the difficulty of factoring the product of two large prime numbers.
RS catalog repository
A reserved repository used to maintain the definitions of the user-defined IMS repositories that are managed by the RS, such as the IMSRSC repository. The RS catalog repository manages the association of repository names with repository data sets. See also IMSRSC repository.
RS catalog repository data sets
Two pairs of VSAM key-sequenced data sets (KSDSs) used by the Repository Server (RS) to maintain the definitions of the user-defined IMS repositories that are managed by the RS. RS catalog repository data sets consist of a primary pair and a secondary pair of repository index data sets (RIDs) and repository member data sets (RMDs). See also IMS repository function, IMSRSC repository.
See registered state change notification.
See Reliable Scalable Cluster Technology.
RSCT peer domain
See also management domain.
See Route Selection control vector.
See restart data set.
See resource set.
See remote shell.
See Remote Statistics Interface.
See real storage manager.
See resource sequence number.
See Remote Site Recovery.
RS secondary server
See remote stand-alone secondary server.
See remote modem self-test.
See recommended service upgrade.
See ReSerVation Protocol.
See real-time analysis.
See remote terminal access method.
See recovery time objective.
See resource token.
See Rapid Transport Protocol connection.
See Rapid Transport Protocol connection.
An indexing structure that supports spatial data. An R-tree index uses a bounding box, which is a set of coordinates that contains one or more objects and supports spatial data (two-dimensional, three-dimensional, and so on). An object can theoretically belong to more than one bounding box. An R-tree index is useful for searches on multidimensional data.
See Real-Time Streaming Protocol.
Pertaining to an object that can be derived from two endpoints, where one endpoint is defined and the other is undefined. For example, a circle is rubberbanded if the center is defined but the radius is not.
In SNA, a set of related request or response units that are transmitted consecutively on a particular normal or expedited data flow. See also first-in-chain, last-in-chain, middle-in-chain, only-in-chain.
- A configurable definition or limitation on how an order management system will behave when computing pricing and promotion charges, managing inventory, scheduling orders, and performing other related tasks.
- A solid or patterned line of any weight (line width) that extends horizontally across a row or page, or vertically down a column or page.
- A set of commands and tools used to create specific calculations and optimizations within cubes.
- A list of conditions and actions that are triggered when certain conditions are met. Conditions include attributes about an object (file name, type or extension, dates, owner, and groups), the requesting client, and the container name associated with the object. See also action, alert, file-placement rule.
- A condition that must be satisfied when a business activity is being performed.
- A set of conditional statements that enable computer systems to identify relationships and run automated responses accordingly.
- A condition that must be satisfied by the solution of a problem. A rule defines the context in which the problem is solved. See also requirement.
- The smallest building block in a software analysis configuration.
- The criteria or circumstances that are defined to trigger an event. For example, rules can be triggered during entry to or exit from a zone and can be specified for a tag ID, class, or group.
- A requirement that can be built with AQL constructs.
- A statement that defines or constrains some aspect of the business. See also business rule, event rule.
- A named definition of a run cycle that determines when an application will run.
rule-based break iterator (RBBI)
A construct that identifies token boundaries (or breaks) in text that is based on regular expressions and defined in terms of Unicode characters and character properties.
Categories that are created by rules that specify which documents are associated with which categories. For example, you can define rules to associate documents that contain or exclude certain words, or that match a Uniform Resource Identifier (URI) pattern, with specific categories.
rule-based run cycle
A run cycle that uses rules based on lists of ordinal numbers, types of days, and common calendar intervals. For example, the last Thursday of every month. Rule-based run cycles are based on conventional periods, such as calendar months, weeks of the year, and days of the week. See also offset-based run cycle, run cycle.
A software component that evaluates and executes business rules. See also decision engine.
Rule Execution Server configuration project
A project in which a server configuration persists. The configuration provides the information necessary to make a connection to the rule execution server when a RuleApp is applied.
The process of automatically deriving decision-making rules from example cases. See also C5.0.
An occurrence of a rule that includes the combination of objects in the working memory that match the patterns specified in the rule. More than one instance of the same rule may exist in the agenda at any time because the rule patterns may be satisfied by more than one object or set of objects.
The business logic, which is expressed by a business rule, that consists of decisions that affect how a business responds to specific business conditions. For example, a decision that determines how much of a discount to give to a preferred customer is rule logic.
A decision-making program that can be processed by a rule engine to yield a decision, based on input and output parameters. The decision-making logic is implemented as rules, decision tables, and ruleflows. See also decision table.
- An if-then statement that is composed of a set of textual statements, or rules, that are evaluated sequentially. If is the condition and then is the action. Each condition that evaluates to true is acted upon. See also action rule, if-then rule.
- A set of rules that attempts to make predictions for individual records. Rule sets are derived from decision trees and represent a simplified version of the information found in the decision tree. See also decision tree algorithm.
- A selection of target products and a corresponding set of rules. Rules in a rule set are applied only to the targets that are defined in the rule set.
A parameter that can be defined to set and retrieve values on a ruleset. Ruleset parameters are accessible from outside of the ruleset, and therefore are a bridge between the business logic and the application.
- A criterion or set of criteria on which individual rules can be specified.
- A partly completed business rule that can be used to create a series of rules with the same structure.
- To cause a program, utility, or other machine function to be performed.
- A string of repeated, adjacent characters or symbols. See also run-length encoding.
- A performance of one or more jobs or programs.
A task that has been dispatched and does not return control to CICS within a user-specified time interval. The program being used by this task is in a loop between two CICS requests. The task control program ends the task after expiration of this time interval.
A method of handling model, data, and settings files within a project. A run configuration is a variation of a given project for execution and testing purposes. It combines a model file and one or more data files that differ, regarding contents and/or settings, from the original model and data of the project, while addressing the same mathematical problem.
- See trigger.
- A schedule that specifies when a job stream runs. See also calendar, exclusive run cycle, inclusive run cycle, offset-based run cycle, rule-based run cycle, simple run cycle, weekly run cycle.
In DCE Remote Procedure Call (RPC), a procedure used with a context handle that is called after a communications failure. It recovers resources reserved by a server for servicing requests by a particular client.
See execution log.
- A technique for compressing data that avoids repeatedly having to code data elements of the same value; instead, the value is coded once, along with the number of times for it to be repeated.
- A type of compression that is based on strings of repeated, adjacent characters or symbols, which are called "runs." See also run.
See running header.
A column heading that is repeated on following pages if the column continues on more than one page. See also header.
- Pertaining to the time period during which a computer program is running.
- The set of resources used to run the application. See also starter.
The time period during which a computer program is running. See also system time.
runtime communication exit library
A dynamically loaded, shared library that has access to the information and runtime environment that are used to process SQL and non-SQL API requests and the output of these requests.
- The environment where the project files are deployed to the server and then downloaded to the app.
- A set of resources that are used to run a program or process.
Runtime Environment for Java
See IBM Runtime Environment for Java.
- A compiled collection of functions whose members can be referred to by an application program at run time.
- A library that is loaded dynamically and used during execution time.
runtime resource definition
The resource information such as attributes, status, and relationships to other resources that IMS maintains at run time in an internal format called control blocks. The runtime resource definitions include, but are not limited to, database directories (DDIRs), program directories (PDIRs), data management blocks (DMBs), program specification blocks (PSBs), Fast Path routing codes (RCTEs), and scheduler message blocks (SMBs) or transactions.
A variable in a procedure or query whose value is specified by the user when the procedure or query is run. The value of a runtime variable is only available in the current procedure or query. See also global variable.
- In COBOL, a set of one or more programs that run as a set to solve a problem. A set starts with the first COBOL program in the call stack and includes all programs (COBOL) (non-COBOL) that are below it in the call stack.
- One or more object programs that are executed together.
See remote unit of work.
See Rational Unified Process.
An expression that cannot have a value assigned to it. The result of calling a function that does not return a reference. Rvalues always have complete types or the void type. See also lvalue.
See reverse-interrupt character.
See resource value unit.
The Electronic Industries Association (EIA) RS standards (for example, RS-232); the ITU/CCITT standards (for example, V.24 for modem interconnects and protocols); and the ITU/CCITT standards for interconnects and protocols (for example X.21). ITU is the International Telecommunications Union, and CCITT is the International Consulting Committee for Telephony and Telegraphy.
See Remote Execution and Access.