This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
Please send any feedback about the terms and definitions on this site to email@example.com.
See Special Administrative Region.
See Simplified Services.
Storage arrays and logical volumes (LVOLs) that are connected to S/390 servers. S/390 storage sometimes also includes zSeries storage. See also zSeries storage.
See storage accounting area.
See SOAP with attachments API for Java.
See software as a service.
See set asynchronous balanced mode.
See set asynchronous balanced mode extended.
See Software Access Catalog.
See State Adaptive Choreography Language.
See Society of Automotive Engineers.
The time added to a shipping estimate to account for unforeseen circumstances. For example, one day might be added to a delivery date to account for the possibility of encountering bad weather.
See SWIFTAlliance Gateway.
See SQL Access Group's Call Level Interface.
See system adapter identification number.
See secure attention key.
See select application license charge.
Sales and Distribution (S and D)
An IBM business unit or organization that is responsible for sales and delivery of offerings and services through a specific set of channels to customers within a geographic region.
A section of the master catalog that contains a flexible structure for customer display purposes. Users can have only one master catalog per store, but can have as many sales catalogs as they want. See also master catalog.
A five-step process (demand generation, presales, close the deal, deploy and ongoing support) which encompasses the activities needed for a successful purchase of an offering by a customer.
A defined role in WebSphere Commerce that manages order processing, ensuring that orders are properly fulfilled, payment is received, and orders are shipped. The sales manager can search for customer orders, view details, manage order information, and create and edit returns. See also operations manager, order.
Pertaining to communication between entities in the same SNA domain. See also cross-domain.
same origin policy
A policy that ensures that HTML documents or scripts originating from one domain will not be allowed to change a document from another domain. This prevents malicious content from one domain or site from loading into another domain's HTMLs in order to steal data or issue unwelcome transactions.
A type of Sametime program. It allows users to share information with coworkers and to keep shared documents in a central location. Users can also chat with others who are using the same discussion.
See active name.
See Security Assertion Markup Language.
- A group of prospective respondents.
- The data that the product collects for the server.
An event that happens when a situation becomes true. Situations sample data at regular intervals. When the situation is true, it opens an event, which is closed automatically when the situation returns to false.
sample statistics program (DFHOSTAT)
Batch program supplied with CICS which provides information that is useful in calculating the storage requirements of a CICS Transaction Server system, for example, the sizes of the dynamic storage areas.
A store that is created solely for learning purposes. See also sample store.
See service assignment matrix record.
- An area on a file system where a developer can modify and test items in isolation, before returning them to the source control component and sharing them with other developers. A sandbox is a reflection of all or part of a repository workspace on disk.
- A restricted environment, provided by the web browser, in which Java applets run.
- A personal workspace used to store data values as a separate layer of only new values which can be merged back into the base data when adjustments are complete.
S and D
See Sales and Distribution.
SAN File System console
A web user interface used to remotely monitor and control the SAN File System with any standard web browser. See also administrative server.
See Software Access Option.
SAR file format
In WebSphere Commerce, SAR (store archive) is a platform-independent file format that aggregates many files into one. See also store archive.
See Simple Authentication and Security Layer.
See Serial Advanced Technology Attachment.
A DB2 database server that is a member of a group of similar DB2 database servers. Each satellite in the group runs the same application and has a similar configuration to support the application. See also DB2 control server.
A portable telephone that operates on a satellite network instead of a cell network or traditional wired network. Satellite phones are typically used as world phones because they are not limited to the range of a cell (they have worldwide coverage). See also mobile device, mobile phone.
- The amounts of color and gray in a hue that affect its vividness; that is, a hue with high saturation contains more color and less gray than a hue with low saturation.
- The level at which a system no longer operates at its full capacity. See also consumption.
- To copy specific objects, libraries, or data by transferring them from main storage or auxiliary storage to media such as optical disc, tape, diskette, or a save file. See also restore, save as.
- To make a local copy of a file that is attached to a document.
To create a new object from an existing object and leave the existing object as it was. See also save.
A save conflict occurs when two or more Notes users edit the same document in a Notes database on a server at the same time. The document saved first becomes the main document; subsequent users are prompted to save their changes as responses titled '[Replication or Save Conflict].'
- In Extensions, a set of data configured during an export operation or refresh operation. A user can choose a saved selection and update just the data without reconfiguring the report or export criteria.
- In Contributor, a dynamic group of items from a dimension or e.List.
- In Analyst, a set of data used to save a specific D-cube orientation, including a selection of rows, columns, and pages for later use. The selected items, sort order, and slice of the D-cube are all saved in a named selection.
saved user ID
The user ID that is acquired when running a setuid program. The saved user ID is the same as the owner of the file that ran. If the file that ran was not setuid, the saved user ID is set to the effective user ID of the parent.
- A file allocated in auxiliary storage that can be used to store saved data on disk (without requiring diskettes or tapes), to do I/O operations from a high-level language program, or to receive objects sent through the network. The system-recognized identifier for the object type is *FILE.
- In Backup, Recovery, and Media Services, an online file allocated on direct access storage for use as interim or short-term storage before off-loading to removable media or permanently deleting.
An operation that the user runs to save objects while application programs that change the objects are running. See also dedicated save operation.
See session awareness data.
See Simple API for XML.
See sequential buffering.
See set buffer address.
See Single-Byte Command Code Sets Connection.
See single-byte character set.
See session control.
See Standard Carrier Alpha Code.
See supervisory control and data acquisition.
- Pertaining to the capability of a system to adapt readily to a greater or lesser intensity of use, volume, or demand. For example, a scalable system can efficiently adapt to work with larger or smaller networks performing tasks of varying complexity.
- Pertaining to a system's ability to increase its capacity to distribute information or data as demand heightens.
scalable distribution infrastructure (SDI)
A solution that ensures fast and reliable software distribution to large numbers of target computers in a variety of topologies. It enables central management of software distribution, and relies on core services such as Tivoli common agent services, the dynamic content delivery, and device manager service to perform the actual software distribution and federated job management operations.
A physical platform that has at least one SMP Expansion Module. Additional attributes are assigned to a physical platform when it is a scalable node. These additional attributes record the number of SMP Expansion Modules, SMP Expansion Ports, and RXE Expansion ports on the physical chassis.
An IBM Director managed object that is used with Scalable Systems Manager. Scalable objects include scalable nodes, scalable systems, scalable partitions, and remote I/O enclosures that are attached to scalable nodes.
An IBM Director managed object that defines the scalable nodes that can run a single image of the operating system. A scalable partition has a single, continuous memory space and access to all associated adapters. A scalable partition is the logical equivalent of a physical platform. Scalable partitions are associated with scalable systems and comprise only the scalable nodes from their associated scalable systems.
An IBM Director managed object that consists of scalable nodes and the scalable partitions that are composed of the scalable nodes in the scalable system. When a scalable system contains two or more scalable nodes, the servers that they represent must be interconnected through their SMP Expansion Modules to make a multinode configuration, for example, a 16-way xSeries 455 server made from four scalable nodes.
- A type of program object that contains either string or numeric data. It provides the byte string it is mapped to with representation and operational characteristics. See also pointer.
- A quantity characterized by a single value. See also array, vector.
- An arithmetic object, an enumerated object, or a pointer to an object.
- Pertaining to a single data item.
A fullselect that returns a single value: one row of data that consists of exactly one column. See also fullselect.
An SQL function that optionally accepts arguments and that returns a single scalar value each time that it is invoked. A scalar function can be referenced in an SQL statement wherever an expression is valid. See also function, routine.
An instruction, such as a load, store, arithmetic, or logical instruction, that operates on a scalar. See also vector instruction.
- In ADA programming, a type in which values are ordered. However, neither an object nor a value of a scalar type have components.
- A type that defines a variable containing a single value at run time.
- In the GDDM function, the number and progression of ticks along a vertical or horizontal axis.
- A graphical representation of a chart axis.
- The magnitude of a stored number. Storing numbers with precision and scale allows a wide range of numbers to be stored in the same amount of space, but large numbers are not stored as exact integers.
- The increments of measure used by the nroff and troff commands. All supported scales are converted for the typesetter into a scale called machine units (u).
- In the GDDM function, to enlarge an image or marker.
- The number of digits in the fractional part of a number.
- A number used as a multiplier in scaling.
- A number that indicates the position of the decimal point in a real number.
- In computer graphics, the process of enlarging or reducing all or part of a display image by multiplying the coordinates of the image by a constant value.
- A process by which an image is reduced or enlarged in size to fit a given area on the display.
- In GL, the action of uniformly stretching a primitive along an axis.
- In programming, the process of indicating the number of digit positions in object code to be occupied by the fractional portion of a fixed-point or floating-point constant.
- The throughput of a workload on a multiprocessor divided by the throughput of that workload on a comparable uniprocessor (not on a single-processor SMP system).
- The conversion factor from output engineering units to user-specified units.
- To examine sequentially, part by part.
- To systematically search a computer or a network for information about hardware, software, or configuration. See also network scan, software scan.
- The process of AppScan exploring and testing an application and providing the results.
An attack in which a host on the network is trying to determine which ports are open on the target host. The host doing the scan may later be the same host that does a more virulent attack.
A job that monitors the usage and consumption of storage. See also schedule.
- A device that examines text, graphics, or bar code patterns and generates electrical signals corresponding to the pattern. It sends the signals to a computing device for processing.
- For the 3725 communication controller, a processor dedicated to controlling a small number of telecommunication lines. It provides the connection between the line interface coupler hardware and the central control unit.
- An automated security program that searches for software vulnerabilities within web applications.
- The software used to gather hardware information and software information from systems and devices.
A service request that conforms to the Service Component Architecture (SCA). An SCA module routes the request to a service provider, after having done any additional processing specified by the module.
For input and output operations, to read data from a device and locate it in noncontiguous memory addresses. See also gather.
A method of reading contiguous data pages from disk to discontiguous portions of memory. See also block-based I/O.
See Signal Computing bus.
See Standards Council of Canada.
See signaling connection control part.
See source code control system.
- The name assigned to a delta.
- The number assigned to each version of a program.
See system control element.
- A sequence of events that tests business data models for expected or possible outcomes. The models identify exceptional business conditions.
- A list of user-defined conditions that can be used to analyze bids.
- A set of actions representing a business process within the context of a collaboration. Scenarios can be used to partition collaboration logic. For example, if a collaboration handles one type of business object with various possible verbs, the user might develop Create, Update, and Delete scenarios. See also activity.
- A formal description of a hypothetical situation in terms of data and parameters.
- A specific sequence of actions that illustrates behaviors. A scenario may be used to illustrate an interaction or the execution of one or more use-case instances. See also interaction, use case.
- A real or fictitious use case that can be used to validate the behavior of rules with test suites or simulations. Each scenario contains all the necessary information required for rules to execute properly.
A lock that prevents a scenario that is being edited or solved by one user in a multi-user environment, from being modified by other users. Scenario locks can be released by users who have been granted the rights to do so.
See security classification guide.
- To request that a task set be started at a particular interval or on occurrence of a specified program interrupt. See also discovery, ping, probe, scan job.
- See job stream.
- A planned process that determines how frequently a situation runs with user-defined start times, stop times, and parameters.
- The time-based constraints for when events will be matched against a rule or SLC and when they will not. Schedules are also used to tell when to run an automated report.
- A monitoring task that collects data about storage resources. For example, a probe schedule can be defined to collect data about storage systems or a scan schedule can be defined to collect file-level information about hosts.
- A database record that describes client operations or administrative commands to be processed. See also administrative command schedule, client schedule.
- The work orders on a given route assigned to one or more specific crews.
Any of the items in an outline to be covered, in sequence, during a session that is added to the Scheduled Items folder at the top of the outline. Instructors add scheduled items when developing the course outline before a session begins.
- A batch job that becomes eligible to run at a specified date and time.
- A batch job that is submitted with a value other than *CURRENT for the schedule date and schedule time parameters.
A Sametime meeting that has been created using the New Meeting form, not by clicking an active name or using Sametime Connect. Scheduled meetings can start at a future date and time, or they can start immediately. See also meeting status.
- A computer program that performs functions such as scheduling, initiation, and termination of jobs.
- A multithread, multiprocess background server designed to handle the scheduling and launching of jobs, based on a simple timing scheme. See also broadcast job.
- A service that provides time-dependent services.
- A Java virtual machine (JVM) service that manages all jobs that are scheduled in the product. The scheduler service administers import and export jobs in the background.
scheduler work area (SWA)
An element of the CICS address space. The SWA is made up of subpools 236 and 237 which contain information about the job and the step itself. Almost anything that appears in the job stream for the step creates some kind of control block in this area.
A list of resource names along with their required states. If an MVS image satisfies all of the requirements in the scheduling environment associated with a given unit of work, then that unit of work can be assigned to that MVS image. If any of the requirements are not satisfied, then that unit of work cannot be assigned to that MVS image.
An application program attribute that is defined in the program specification block (PSB) and that specifies how the program should be scheduled if multiple programs are contending for scheduling. See also exclusive intent, read access, read-only access, update intent.
- A group of object classes defined for and applicable to a single namespace.
- See XML schema.
- A collection of database objects such as tables, views, indexes, or triggers that define a database. A schema provides a logical classification of database objects. See also collection.
- A specification for the structure and semantics of some related data. The schema is used to validate or otherwise understand a group of data.
- See SQL schema.
- In Enterprise Service Tools, a logical grouping for user-defined functions, distinct types, triggers, and stored procedures. When an object of one of these types is created, it is assigned to one schema, which is determined by the name of the object. For example, in the service flow project tools, when the developer imports screens, the imported objects are assigned to the .mxsd schema, which is a language for describing XML files that contain schema.
See Structured Call Interface.
- The drawing elements, construction, finishing, 3D values, and attributes that can be stored, plotted, manipulated, and deleted. The scope is typically what appears on the screen and can be limited by set, layers, object functions, and functions that control elements, construction, and finishing.
- A specification of the boundary within which system resources can be used.
- The range of context in a map for which a variable name, identifier, or declaration is valid or can be used.
- In the C language, the range within a program in which a declaration is known.
- A part of a source program in which an object is defined and recognized.
- The level to which a commitment control definition applies.
- The component of a policy expression that describes the class of resources that is subject to the decision of a policy. In the OGSA Policy Service, scope is the policy discipline and policy role.
- Information that is used to describe whether the scheduling policy indicates that threads compete directly with other threads within the process or within the system.
- A named part of the CICSPlex SM environment that qualifies the context of a CICSPlex SM request. The scope can be the CICSplex itself, a CICS system, a CICS system group, or any set of CICS resources that are defined as a logical scope in a CICSPlex SM resource description. See also context.
- The extent to which the semantic effects of language statements reach. The scope may be to the job or to the activation group.
- The effective range of the enablement of a condition, the establishment of a user-generated routine to handle a condition, or both. Scope can be both statically and dynamically defined. See also namespace scope.
- In web services, a property that identifies the lifetime of the object serving the invocation request.
- In identity management, the set of entities that a policy or an access control item (ACI) can affect.
- The sum of the products and services to be provided as a project.
- The boundaries for inclusions and exclusions that define the depth and breadth of the project.
The process of prioritizing and determining the set of requirements that can be implemented in a particular release cycle, based on the resources and time available. This process continues throughout the lifecycle of the project as changes occur. See also change management.
scope of control
See network management domain.
scope of reference
The portion of a routine or application program where an identifier can be accessed. Three possible scopes exist: local (applies only in a single statement block), modular (applies throughout a single module), and global (applies throughout the entire program). See also global variable, local variable.
In C++, an operator that defines the scope for the argument on the right: if the left argument is blank, the scope is global; if the left argument is a class name or namespace name, then the scope is within that class or namespace respectively.
- The restriction of a database object view to a specified subset. Further operations, such as update or retrieve, will affect only the cells in the specified subset. For example, scoping allows users to retrieve or update only the sales data values for the first quarter in the east region, if that is the only data they wish to receive.
- A mechanism for controlling multiple sign-ons of the same user ID to one or more CICS regions.
- In DB2 Text Search and DB2 Net Search Extender, an absolute value of 0 - 1 of type DOUBLE that indicates how well a document meets the search criteria relative to the other found documents. The value indicates the number of matches in the document relative to the size of the document.
- A number or ranking that expresses applicability in relation to a standard.
- To apply a predictive model to a data set with the intention of producing a classification or prediction for a new, untested case. See also weight.
- In the matching process, the result of a match comparison. See also match comparison, matching.
- The result of a computational analysis. See also match comparison, scoring.
- In data mining, to apply a data mining model to new data, such as to perform predictions or segmentations.
- A collection of metrics representing the performance of one unit or aspect of an organization.
- A set of measurements on a subject to help to make a business decision. See also scoring strategy.
A property that defines the reasoning strategy and the scoring strategy. Scorecard properties are used together to determine the final score and the reason codes that are displayed.
The process of computing how closely the attributes for an incoming identity match the attributes of an existing entity. See also score.
A strategy to calculate the final score from each of the attribute scores for the overall scorecard. See also scorecard.
See Sharable Content Object Reference Model.
See single copy object store.
- See System Control Process.
- See service control point.
- See Secure Copy Protocol.
- See secure copy program.
See start-control-program-function job.
See sustainable cell rate.
See scratch volume.
A labeled volume that is either blank or contains no valid data, that is not defined, and that is available for use. See also volume.
- The display that the user sees when connected to a 3270 application on the host system. A single 3270 application can include many screens, each of which has a purpose within the context of the application.
- The physical surface of a display device upon which information is shown to a user.
- See selection.
In Enterprise Service Tools, information stored in a recorded screen operations file. The stored information represents a particular user interaction with a screen, such as entering text, pressing an AID key, cursor repositioning, and so on. This stored information can be played back, or executed, on the same host screen to automate that user interaction.
- The storage of a screen display as a text or graphics file on disk.
- An XML representation of a host screen, used to create or customize a screen customization or transformation.
The coordinate system that defines the display screen. In GL, distances are measured in units of pixels, and the origin is in the lower left-hand corner. On most systems the screen size is 1024 pixels high by 1280 pixels wide. The viewport defines the mapping from normalized device coordinates to screen coordinates.
A HATS resource with two parts: a set of screen recognition criteria used to match host screens, and a list of actions to be taken when a host screen matches the screen recognition criteria.
A 3270 terminal service development tool that enables a developer to create and modify recognition profiles for an imported screen and to assign names to the fields on the screen definition.
A type of call transfer in which the transfer of the held party to the third party is completed only if the third party answers the call. See also blind transfer.
screen entry translation object
A translation object that provides a standardized format for entering an EDI document into the Document Editor for translation and transmission to trading partners. The screen entry translation object ensures that users enter all the data necessary to create the required EDI document.
The result of importing a screen definition from a 3270 application into the 3270 terminal service development workbench. A screen file represents a screen definition. The screen definition contains identifiers such as the number of fields on the screen and the row and column position of fields on the screen. There are multiple screen files per 3270 terminal service project. Each screen file can have multiple recognition profiles assigned to it.
The process of importing a screen definition (in its current state) and saving it to a screen file within the 3270 terminal service tools workbench, for the purpose of generating recognition profiles and custom screen records. Use the 3270 terminal service recorder to import screens.
In Enterprise Service Tools, a set of screen actions that make up the total user interaction necessary to process a given screen. A screen interaction is restricted to having a single AID key action.
In the service flow project tools of Enterprise Service Tools, an operation that represents all of the possible paths (the allowed user interactions) from a single screen. A screen operation refers to one screen description of a particular state, specifying the screen state, zero to N screen interactions representing the possible user interactions with that screen, and zero to N screen descriptions representing of the potential screen outputs.
screen operations editor
In Enterprise Service Tools, an editor that can be used offline to create operations for each screen description, with associated screen interactions and next screen descriptions.
screen operations file
In Enterprise Service Tools, a file that contains a set of screen operations with no more than one operation corresponding to a given screen description. A screen operations file represents all of the paths (the allowed user interactions) through the screens that are part of a single business function.
A device that renders onscreen text as audible language. See also digital speech synthesizer.
A runtime function that determines the state of a screen and processes the screen in accordance with the identifiers in the recognition profiles. Screen recognition compares the screen as presented by the 3270 application to the defined recognition profiles to determine which screen state applies.
screen recognition criteria
A set of criteria used to determine whether a host screen matches a screen customization and should have that screen customization's actions applied. Screen recognition criteria are also used in the process of recording a macro; in this context they are sometimes called descriptors.
The viewing and controlling of program screens on a computer other than the user's own computer. During a screen-sharing Sametime meeting or Learning Space - Virtual Classroom Live session, one participant shares a screen with the other participants and can allow them to control the program. The program needs to be installed only on the computer of the person who is doing the actual sharing.
See screen coordinates.
The set of conditions (at the time the screen was imported from the host) that determine the allowed and required processing on the screen. A screen state operates on input to change the status, cause an action, or result in a particular output screen. A single screen can have multiple states and the allowed user actions for the screen vary depending on which state the screen is in.
- A collection of graphic symbols used for writing. A script does not correspond one-to-one with either a language or a country. Members of the same linguistic family can use different scripts. For example, the Latin script is used by most western European languages, while the Arabic script is used in Arabic countries as well as in Iran for Farsi and in Pakistan for Urdu.
- An exact text for the Customer Service Representative (CSR) to read to a customer regarding transactions. Scripts can be short-hand or prompts to remind a representative to say certain things to a customer at certain points during a call.
- A series of commands, combined in a file, that carry out a particular function when the file is run. Scripts are interpreted as they are run. See also customer service representative.
- The logical flow of actions for a 3270 server program.
scripted OS image
An unattended install action where operating system installation files that are used with some configuration files would install the operating system on the target system using boot server technology.
In the Ada debugger, a file that contains a series of commands that can be used to drive the debugger. Script files are useful for debugging large, complex programs when you may not be able to complete a debugging session in one sitting.
A high-level, application-specific scripting language that consists of statements used to develop 3270 scripts. These scripts are part of the interface between a state table and a 3270-based host business application.
A memory area in which values can be stored and read inside IBM ILOG Script statements (main , execute , and prepare blocks). See also variable.
- To move a display image vertically or horizontally to view data that is not otherwise visible in a display screen or window.
- To move a slider interface item vertically on a touchscreen. Typically, apps use scroll gestures to move through a screen of content that is longer than the space allowed onscreen at one time.
A property of a cursor that indicates whether the cursor can fetch in a backward direction. See also fetch orientation.
A cursor that can be used to fetch in backward and forward directions. See also nonscrollable cursor.
A cursor that can fetch the next row in a sequence or any of the output rows. See also sequential cursor.
The portion of the presentation space that is mapped to the viewport at any given time. The window can be moved vertically within the presentation space by scrolling. See also presentation space.
See subcapacity reporting tool.
- An agile software programming method that uses small, self-organizing, cross-functional teams, and iterative, incremental practices.
- A daily, informal meeting between stakeholders in an agile software development project. Participants must include a scrum master, the product owner, and the team and might include the product manager and other stakeholders. See also chicken role, daily wash-up, pig role.
See Signal Computing System Architecture.
See Small Computer System Interface.
See Small Computer System Interface adapter.
SCSI back-end layer
The layer in a Small Computer System Interface (SCSI) network that performs the following functions: controls access to individual storage systems that are managed by the clustered system; receives requests from the virtualization layer, processes them, and sends them to managed disks; and addresses SCSI-3 commands to the storage systems on the storage area network (SAN).
A product, such as a drive or adapter, connected to a host through an I/O interface using the Small Computer System Interface (SCSI) protocol. A SCSI device is either an initiator or a target. See also initiator, Small Computer System Interface.
A standard that defines the protocol used to transfer Small Computer System Interface (SCSI) commands over the transport physical layer of the fibre-channel interface. This standard is published by ANSI as X3.269-1996.
SCSI front-end layer
The layer in a Small Computer System Interface (SCSI) network that receives I/O commands from hosts and provides the SCSI-3 interface to hosts. SCSI logical unit numbers (LUNs) are mapped to volumes in this layer as well. Thus, the layer converts SCSI read and write commands that are addressed to LUNs into commands that are addressed to specific volumes.
SCSI host system
A host system that is attached with a Small Computer System Interface (SCSI). These host systems run on operating systems such as UNIX, OS/400, Windows NT, Windows 2000, or Novell NetWare.
A unique identifier assigned to a Small Computer System Interface (SCSI) device that is used in protocols on the SCSI to identify or select the device. The number of data bits on the SCSI bus determines the number of available SCSI IDs. A wide interface has 16 bits, with 16 possible IDs.
See Server Display Control.
See source distributed data manager.
See sequential dependent segment.
See Screen Definition Facility.
See software development kit.
See Systems Director Management Console.
See data model.
See subject's distinguished name.
A database that is used for storing and serving the Web Services Description Language (WSDL) definitions of web services. For example, the WSDL definitions for service integration bus-enabled web services are stored as service data objects in an SDO repository.
See synchronous dynamic random access memory.
See shared dynamic storage area.
See spool data set browse.
See System Display and Search Facility.
See symmetric digital subscriber line.
See small-data-set packing.
See service data unit.
See system dump.
See system diagnostic work area.
See sequential data set system printer.
See Support Element.
- The conditions specified when searching, consisting of one or several search terms and search parameters.
- In RPG, a literal or field name specified in factor 1 of certain file operations (such as CHAIN) that identifies the record to be processed.
- Attribute values that are used to retrieve a stored item.
- In Information Integrator for Content, specific fields that an administrator defines for a search template that limit or further define choices available to the users.
In a DL/I call, a field that is referred to by one or more segment search arguments (SSAs). See also key field.
For System i Access, a number returned by the system to an application program when the application program requests a search. The search handle is used by the application program to request subsequent searches.
search index database
The database files used by document library services for storing descriptive information about documents and folders (such as keywords, subjects, dates, and so forth). These database files are used when a search of the document library is requested on one or more document descriptors.
- A list of directories searched by the shell when a command path name is not specified.
- A list of the libraries provided to a Rational Team Concert build to locate artifacts for the build, including the load library and object library for an i Project on IBM i.
A service that is used to define the configuration parameters for a search collection. A search service can be local, remote, inside the product, or outside the product. See also search center, search collection.
- A methodical and systematic way of exploring the search space. This is materialized as a data structure that is associated with an object, field, or value of a field. It controls the order in which decisions are made by a search engine. See also goal, search space.
- A named collection of comparison parameter values that override existing or default values and that are used to conduct a search. For example, existing search strategies include standard (default values), broad (values that widen the search), and narrow (values that restrict a search). Administrators can define their own set of comparison parameter values and save them as a search strategy.
- A form, consisting of search criteria designed by an administrator, for a specific type of federated search. The administrator also identifies the users and user groups who can access each search template.
- A file that, when opened, prompts the user to enter or change values and then displays a list of the documents that meet the search criteria. See also template.
- A saved set of attributes that are used to search for items in a catalog or a hierarchy. The search template is used to determine which attributes are visible in the Rich Search panel of the user interface.
search term association
A preset relationship between terms that lead to additional, different, or replacement product suggestions in search results. Search term associations are used as a product recommendation strategy to increase store sales when customers search for products. Search submissions are modified to increase or target search results.
A storage system architecture developed by IBM for open-systems servers, and S/390 and zSeries host systems. It provides storage solutions that integrate software, storage management, and technology for disk, tape, and optical storage.
In time series analysis, the evidence of a repetitive, predictable pattern observed in the data. See also time series analysis.
seasonal usage ratio
The ratio of water usage between defined summer and winter months. The seasonal usage ratio can be used in IBM Work Optimization for Water Utilities to identify seasonal water usage trends.
- See workpoint.
- An installation of a licensed program.
- To fit correctly into position.
See Securities and Exchange Commission.
See security mechanism.
secondary authorization ID
In DB2 for z/OS, an authorization identifier that is associated with a primary authorization ID by an authorization exit routine. See also primary authorization ID.
In the GDDM function, a horizontal or vertical axis drawn parallel to the primary axis and capable of having a title, ticks, and labels different from those of the primary axis. See also primary axis.
secondary cluster caching facility
A standby for the primary cluster caching facility. A secondary cluster caching facility takes over as the primary cluster caching facility if the primary cluster caching facility fails or must be taken offline. See also cluster caching facility, primary cluster caching facility.
One of the devices in a dual-copy or remote-copy logical-volume pair that contains a duplicate of the data on the primary device. Unlike the primary device, the secondary device can accept only a limited subset of channel commands. See also primary device.
secondary end of a session
An end of a session that uses secondary protocols. For an LU-LU session, the secondary end of the session is the secondary logical unit (SLU). See also half-session, primary end of a session, secondary logical unit.
- In the DDS for a join logical file, any physical file, other than the first physical file, that is specified on the JFILE keyword. See also primary file.
- For certain types of join operations using Query, all files except the first file that are joined in a query definition for the purpose of getting data.
- In RPG, any input file other than the primary file.
secondary GPFS cluster configuration server
In a GPFS cluster, the node chosen to maintain the GPFS cluster configuration data in the event that the primary GPFS cluster configuration server fails or becomes unavailable.
secondary group buffer pool
For a duplexed group buffer pool, the structure that is used to back up changed pages that are written to the primary group buffer pool. No page registration or cross-invalidation occurs using the secondary group buffer pool. The z/OS equivalent is "new structure." See also primary group buffer pool.
secondary group layout
The allocation of the graphic characters of group 2 to the keys of a particular keyboard (see ISO/IEC 9995-1). See also alternate layer.
In SNA, the half-session that receives the session-activation request. See also primary half-session.
- In IMS or VSAM, any index used to provide a path for access to a data set other than that provided by the primary keys. See also alternate index.
- A nonpartitioning index on a partitioned table. See also nonpartitioned index.
secondary index database
An index that is used to establish accessibility to a physical or logical database by a path that is different from the one provided by the database definition. A secondary index contains an index pointer segment type that is defined in a secondary index database.
The backup copy of the primary instance of a replicated resource group. The secondary instance of the resource group is intended for data backup purposes. See also replicated resource group.
One or more additional national languages that can be installed on the system to display and print information. See also primary language.
A set of one or more log files used to record changes to a database when the primary log is full. See also primary log.
- A nonhost port through which the user gains access to the services of the network.
- In SNA, the logical unit (LU) that contains the secondary half-session for one logical unit-to-logical unit (LU-to-LU) session. See also primary logical unit, secondary end of a session.
- A Domino server that can stand in for a Notes user's home server to ensure that the Notes Name Service is always available over TCP/IP.
- A name server that gets its domain data from a primary name server by way of a zone transfer.
- The Sterling Connect:Direct node that interacts with the primary node during process execution. See also adjacent node.
- A device that acts as the server node if the primary node is unavailable, that is, offline or down.
A logical partition that has certain dependencies on the primary logical partition, but otherwise is independent from the primary logical partition. For example, a secondary logical partition may be powered off and on, dumped, or installed without affecting other logical partitions.
secondary processing sequence
In a database, the hierarchical order of segment types in a physical or logical database that results automatically when a database is accessed through a secondary index.
secondary program operator application program (SPO)
A program operator application program that is not authorized to receive unsolicited messages. See also primary program operator application program.
secondary referential constraint
The constraint that occurs when a unique constraint or a primary key constraint is added to file that is a parent file in a defined referential constraint relationship. The referential constraint is regarded as secondary processing because the primary request is for the processing of the unique constraint or the primary key constraint.
The lower priority site for a replicated resource group. See also replicated resource group.
secondary space allocation
The amount of additional space requested by the user for a data set when existing space is full. See also primary space allocation.
A data station that executes data link control functions as instructed by the primary station. A secondary station interprets received commands and generates responses for transmission. See also primary station.
secondary system name
An alternative system name that can be used to identify a system in a SNADS network. See also primary system name.
Any thread that is started by, or on behalf of, the application that is not the initial thread. See also initial thread.
secondary vital-record specification
The second retention and movement policy that DFSMSrmm matches to a data set and volume used for disaster recovery and vital records purposes. See also primary vital-record specification, vital record specification.
- Pertinent to remote copy, the volume in a relationship that contains a copy of data written by the host application to the primary volume. See also relationship.
- A volume which is paired with a primary volume for the purposes of backup.
second backup object
The second backup copy of an object, which is stored in the object-backup storage group that is specified as a second, object-backup, storage group. See also object backup-storage group.
The part of a JES2 destination identifier that indicates a remote workstation, special local-route code, or user ID at the target node to which input is to be sent. See also first-level destination.
second-level interrupt handler (SLIH)
A device-dependent routine that handles the processing of an interrupt from a specific adapter. An SLIH is called by the first-level interrupt handler (FLIH) associated with that interrupt level.
A key that both encrypts and decrypts information. In symmetric cryptography, both communicating parties use a secret key. In asymmetric or public key cryptography, a public key and a private key are used to encrypt and decrypt information.
- In COBOL, a set of zero, one, or more paragraphs or entries preceded by a section header. Each section consists of a section header and the related section body.
- A block of keys on a keyboard, mostly with some functional relationship (see ISO/IEC 9995-1). For example, function section, numeric section.
- A defined area on a Notes form that can include fields, objects, layout regions, and text. Sections can be set to display (expand) or hide (collapse).
- A unit of code or data produced by the compiler. Sections do not have attributes. See also segment.
- A portion of a double-byte code page that consists of 256 consecutive entries. The first byte of a 2-byte code point is the section identifier. A code-page section is also called a code-page ward in some environments.
- The segment of a plan or package that contains the executable structures for a single SQL statement. See also SQL and XQuery compiler.
- A named collection of program object components, called elements. Each section is assigned a name in binder control statements.
- In disk storage, an addressable subdivision of a track used to record one block of a program or data.
- The smallest amount of information that can be written to or read from a disk or diskette during a single read or write operation.
secure attention key (SAK)
A key sequence that ends all processes associated with a terminal to provide a trusted path for secure communication with the TCB. The SAK sequence is Ctrl-x followed by Ctrl-r.
secure auditing facility
A facility of Informix database servers that lets a database system security officer monitor unusual or potentially harmful user activity. Use the onaudit utility to enable auditing of events and to create audit masks. Use the onshowaudit utility to extract audit event data for analysis.
A chat that is encrypted. The default is set for all chats to be encrypted. The default can be changed in Preferences or when initiating a chat with multiple participants. See also secure meeting.
secure copy program (SCP)
See secure shell/secure copy program.
Secure Electronic Transaction (SET)
An industry standard for secure credit card and debit card payments over open networks such as the Internet. The SET protocol ensures confidentiality of information, integrity of all transmitted data, authentication of the cardholder and the merchant, and interoperability.
Secure Hash Algorithm (SHA)
An encryption method in which data is encrypted in a way that is mathematically impossible to reverse. Different data can possibly produce the same hash value, but there is no way to use the hash value to determine the original data.
Secure Hypertext Transfer Protocol
A security-enhanced variation of HTTP. S-HTTP allows servers and clients to authenticate each other and to define the kind of security used in transmissions. S-HTTP is an alternative to another well-known security protocol, Secure Sockets Layer (SSL). See also secure server.
An online meeting that is encrypted. During meeting creation, the person scheduling the meeting has the option to secure the meeting by choosing encryption. See also secure chat.
A set of nodes that are controlled by a single administrative party. See also nonsecure network.
secure point of entry (SPOE)
A security feature a trading partner can use to access a remote node using a proxy relationship. Remote users can use SPOE to submit work to the local Sterling Connect:Direct node without explicitly defining user IDs and passwords in processes. See also user proxy definition.
A server that encrypts files that it is sending and decrypts files that it has received to facilitate secure communication with a client. See also Secure Hypertext Transfer Protocol.
Secure Shell (SSH)
A network protocol for secure data exchange between two networked devices. The client can use public-key and private-key authentication, or password authentication, to access the remote server.
Secure Sockets Layer (SSL)
A security protocol that provides communication privacy. With SSL, client/server applications can communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery.
Securities Industry Automation Corporation (SIAC)
A subsidiary of the NYSE group and the American Stock Exchange that runs the computer systems and communications networks that power the two exchanges, and disseminate U.S. market data worldwide.
- A financial instrument such as an equity, bond, option, warrant, and so on.
- The protection of data, system operations, and devices from accidental or intentional ruin, damage, or exposure.
- An individual who is responsible for managing security within a database.
- A programmer who manages, protects, and controls access to sensitive information.
- The person who controls access to business data and program functions.
security administrator authority
A special authority that allows a user to add users to the system distribution directory, to create and change user profiles, to add and remove access codes, and to perform office tasks, such as delete documents, folders, and document lists, and change distribution lists for other users.
security and privacy lead
Person with responsibility to ensure that the solution in all its phases complies with all IBM security and privacy standards, ASCA requirements, legal requirements, and moral obligations. He / she is responsible to the PDT and OMT Lead to ensure that security, privacy, ASCA and related requirements are identified and addressed by the solution plans through end-of-life.
- A set of specifications written by the OASIS consortium to describe the secure handling of XML-based request and response messages that contain authorization or authentication information.
- An XML framework for exchanging authentication and authorization information.
- An additional hierarchical security marking.
- A non-hierarchical grouping of sensitive information used to control access to data.
A certificate containing information used by the SSL protocol to establish a secure connection. The information can include who a certificate belongs to, who issued it, its unique serial number, its valid dates, and its encrypted 'fingerprint’ that is used to verify the contents of the certificate.
- In RACF, the use of security categories, a security level, or both, to impose access controls. See also security level.
- An installation-defined level of security printed on the separator pages of printed output.
security compliance check
A type of compliance check that is used to check for a variety of security issues. See also software compliance check.
In z/OS, a member containing the definitions for one identification label. These definitions include instructions for the overlay name, and the size and origin of paper to be used.
security enabling interface (SEI)
The WebSphere MQ interface to which customer-written or vendor-written programs that check authorization, supply a user identifier, or perform authentication must conform.
A channel exit program that is called immediately after the initial data negotiation has completed on channel startup. Security exits normally work in pairs and can be called on both message channels and MQI channels. The primary purpose of the security exit is to enable the message channel agent (MCA) at each end of a channel to authenticate its partner.
- In Resource Access Control Facility (RACF), an installation-defined name that corresponds to a specific RACF security level with a set of security categories.
- A classification of users' access to objects or data rows in a multilevel security environment.
- In a trusted computing base, a label used to maintain multiple levels of security on a system. This label is a combination of a security class and a security level. See also identification label.
- In label-based access control (LBAC), a database object that can be granted to users and can also be applied to columns and rows in a table to protect the data. Only users who are granted appropriate security labels can access data that is protected by a security label. See also label-based access control, security label component, security policy.
security label component
In label-based access control, a database object that represents one of the criteria that an organization uses to decide who has access to specific data. See also element, security label.
In RACF, an installation-defined name that is associated with a number in the range 1 through 254. The security level increases as the numbers become higher. See also security classification.
A set of users and user groups matched with permissions or permission groups and optional organization restrictions. It defines who can access an object, action, or feature that contains it, and what they can do once accessed.
The management discipline that addresses the organization's ability to control access to applications and data that are critical to its success. See also availability management, deployment management, operations and administration.
security mechanism (SECMEC)
A technical tool or technique that is used to implement a security service. A mechanism might operate by itself, or in conjunction with others, to provide a particular service. Examples of security mechanisms include access control lists, cryptography, and digital signatures.
One of the messages, sent by security exits that are called at both ends of a channel, to communicate with each other. The format of a security message is not defined and is determined by the user.
A person assigned to control all of the security authorizations provided with the system. A security officer can, for example, remove password or resource security or add, change, or remove security information about any system user.
- In label-based access control, a database object that is associated with one or more tables and that defines how LBAC can be used to protect those tables. The security policy defines what security labels can be used, how the security labels are compared to each other, and whether optional behaviors are used. See also label-based access control, security label.
- A set of rules that determine the type of security event an agent detects, the priority of each event, and the way an agent responds to an event.
- A set of security templates that apply default security settings as the user adds objects.
See authentication provider.
In Java EE, an abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment. (Sun)
Security Support Provider Interface (SSI)
The means for networked applications to call one of several security support providers (SSPs) to establish authenticated connections and to exchange data securely over those connections. It is available for use on Windows systems.
A set of security settings that can be applied to a document, folder, or custom object. Security templates are components of security policies. See also template.
Testing to determine the security of the software product. (ISTQB) See also functionality testing.
- A representation of a set of claims that are made by a client that can include a name, password, identity, key, certificate, group, privilege, and so on. See also user token.
- In RACF, a collection of security information that represents data to be accessed, a user, or a job. A security token contains a user ID, a group ID, a security label, the node of origin, and other information. See also resource token.
- In programming, a string of characters designed as a security device and stored on the computer of authorized users. To log onto the network, the security token may be read directly like a credit card, or it may display a changing number that is typed in as a password.
- In the Distributed Computing Environment (DCE), an opaque string of bytes, returned to an LU 6.2 from the Generic Security Service (GSS) application programming interface (API), that must be sent to the partner in order for the authentication process to continue. For example, in Kerberos, the contents of an authentication token would be a ticket and an authenticator; in the DCE the contents would be a ticket, an authenticator, an extended Privilege Attribute Certificate (PAC), and a token-granting ticket for delegation. Because the authentication token is opaque, the LU has no knowledge of the token's contents.
- A small, highly portable hardware device, such as a USB smart card token or a one-time password (OTP) token, that the owner carries to authorize access to digital systems and/or physical assets.
- A token that can be used to represent an authenticated user. Often used when a user task may span multiple processes as in one client accessing multiple server functions.
See shipper export declaration.
see also entry
A cross-reference from one index entry to additional information. See also see entry.
seed list page
In WebSphere Portal, an XML page that contains links to the pages that are available on a portal. Crawlers use the seed list to identify the documents to crawl. The seed list page also contains metadata that is stored with the crawled documents in the enterprise search index.
A cross-reference to a preferred term from obsolete terms, selected synonyms, or terms used by competitive products. See also see also entry.
- A group of pages that holds a row of a single table.
- In the Enhanced X-Windows Toolkit, one or more lines that are drawn but not necessarily connected at the endpoints.
- A part of a program that can be run without the entire program being in main storage.
- Any part of an element as defined by two endpoints, two intersections, or one intersection and one endpoint. The intersections must be formed with real elements, not construction.
- For TCP/IP, the unit of end-to-end transmission in the TCP. A segment consists of control information and data fields. A segment is transmitted as an IP datagram.
- In IMS, the unit of access to a database; for the database system, the smallest amount of data that can be transferred by one IMS operation.
- See BIU segment.
- A collection of composed text and images, prepared before formatting and included in a document when it is printed. See also page segment.
- A group of display elements.
- In data mining, a group of input data records within a data set that have similar characteristics. Each group is called a segment. Within a segment, each piece of data is evaluated (or scored) for the degree to which it fits the segment to which it belongs. This statistical conformance is represented by a number, called the score, which ranges between 0.0 and 1.0. In DB2 Intelligent Miner, this concept is known as a cluster.
- A contiguous area of virtual storage allocated to a job or system task. The size of a segment varies with the system; in VM, for example, a segment is a 64KB area of storage. In other systems, a segment can vary in size from 4KB to 2 to the 28th power bytes.
- A defined section of a linear asset.
- The information that can be addressed using a single, unique segment-register value (256MB).
- One or more contiguous elements of a string.
- An EDI logical unit of information. EDI segments are made up of data elements and composites. Segments are delimited; their components are separated by a delimiter.
- A unit of code or data produced by the linker and existing only in an executable image of the program. The linker assigns attributes to sections, orders and groups them, and puts them into segments. See also section.
- A portion of a profile. The format of each segment is defined by a template.
- A set of customers/buyers within a market who have common wants, needs, characteristics and buying behavior. These wants and needs are sufficiently homogeneous that a consistent set of strategies, marketing campaigns and sales tactics can be directed toward them.
- A process by which path control (PC) divides basic information units (BIUs) into smaller units, called BIU segments, to accommodate smaller buffer sizes in adjacent nodes. Both segmentation and segment assembly are optional PC features. The support for either or both is indicated in the BIND request and response.
- The division of text into distinct lexical units such as words, phrases, sentences, paragraphs, or lemmas.
- The process of identifying groups of records with similar values for a target field. The process takes the whole set of records and divides them into subgroups or segments based on characteristics of the records.
- The activity of separating a market into distinct groups with similar characteristics, such as common business requirements, wants and needs, economic activity (industry), enterprise or establishment size, location, and offering usage. Segmentation identifies homogenous sets of customers/buyers such that members of one segment share common characteristics that are different from those of other segments.
- The division of a message that is too large for a queue manager, queue, or application, into a number of smaller physical messages, which are then reassembled by the receiving queue manager or application.
- A strategy that is used for building complex scorecards. This strategy defines segments or subgroups where a scorecard split might be necessary.
The maximum score of the scorecard when complex reasoning is not used. It is used to tune the contribution factor of a scorecard within the complex scorecard. The segmentation score is a property in a complex scorecard.
segment business plan
A statement of actions to address market needs in selected segments and to participate successfully in the opportunity represented by those segments. Segment business plans include all aspects of the business plan framework.
segmented table space
A table space that is divided into equal-sized groups of pages called segments. Segments are assigned to tables so that rows of different tables are never stored in the same segment. See also universal table space.
segment ID separator
The character that separates the segment identifier from the EDI data elements in the EDI segment. See also data element delimiter.
In OSI, a function performed by an (N)-entity to map one (N)-service-data-unit into multiple (N)-protocol-data-units.(I) Segmenting is the opposite of reassembly. See also fragmentation.
In COBOL, a user-defined word that classifies sections in the Procedure Division for purposes of segmentation. Segment numbers can contain only the characters 0 through 9. A segment-number can be expressed either as a 1- or 2-digit number.
In a database, an instance of a segment type. See also segment type.
segment search argument (SSA)
The portion of a DL/I call that identifies a segment or group of segments to be processed. Each SSA contains a segment name and, optionally, one or more command codes, and one or more qualification statements. Multiple SSAs may be required to identify the desired segment. See also qualified segment search argument, unqualified segment search argument.
In a database, a user-defined category of data. See also segment occurrence.
See security enabling interface.
A system function that determines which records from a physical file are to be included in a logical file. See also omit function.
- A process whereby a criterion is evaluated against the data or members of a dimension in order to restrict the set of data retrieved. Examples of selections include the top ten salespersons by revenue, data only from the east region, and all products with margins greater than 20 percent. See also condition.
- A saved set of items or categories (and all items in those categories), or both (which is a static selection) or a saved search query of items (which is a dynamic selection).
A collection of individual items that the user has explicitly selected. The items or members may be selected from one or more levels of the same hierarchy. See also set.
selection data set
In aggregate backup and recovery processing, a sequential data set or a member of a partitioned data set (PDS) used to define the data sets that compose the input. The selection data set contains any include, exclude, accompany, or allocate lists.
A graphic object that is created by IBM ILOG JViews to display a selected object within a manager. These objects are stored in the manager. Unlike regular graphic objects, selection objects are internally managed and cannot be manipulated.
See scheduling priority.
The process of backing up certain files or directories from a client domain. The files that are backed up are those that are not excluded in the include-exclude list. The files must meet the requirement for serialization in the backup copy group of the management class that is assigned to each file. See also incremental backup.
selective cryptographic session
A cryptographic session in which an application program can specify the request units to be enciphered. See also clear session, cryptographic session, required cryptographic session.
The process of copying user-selected files from a local file system to storage and replacing the files with stub files on the local file system. See also demand migration, threshold migration.
A function of the operating system that allows the user to tailor command prompts at a parameter level. See also conditional prompting.
A function that calculates the percentage of rows that will be returned by a filter function in the WHERE clause of a query. The optimizer uses selectivity information to determine the fastest way to execute an SQL query.
A field in a logical file record format whose value is tested by the system to determine if records including that field are to be used. The test is a comparison with a constant, the contents of another field, a range of values, or a list of values; and the record is either selected or omitted as a result of the test.
- An object associated with a project or step that selects the server where the project or step is run. Properties in the selector determine how the server is selected. Selectors can produce static information such as a server name, or dynamic information, such as specifying a server with designated properties.
- In Pascal, the term in a CASE statement that, once evaluated, determines which of the possible branches of the CASE statement are processed.
- The left side of a style rule. A selector consists of a mandatory object type, which is a class in a data model, and optional tags, pseudo-classes, pseudo-elements, and attribute conditions. A selector undergoes pattern-matching to determine the scope of the style rule.
- An identifier for a data item. In the WebSphere MQ Administration Interface (MQAI), there are two types of selector: a user selector and a system selector.
A field, such as an account number, consisting of a base number and a self-check digit. For data entry applications, the operator-entered self-check number is compared with the self-check number calculated by the system.
To adapt to dynamically changing environments. See also autonomic computing.
An message for which no matching definition exists in the message model. For example, a message coded in XML is self-defining. See also predefined message, self-defining element.
- To use a tool while it is being developed before making that tool generally available to customers. Self hosting a tool is a development best practice because it can promote the improvement of product quality and usability.
- A tool that is used while it is still being developed. Teams can use a self host to improve the quality and usability of a tool before it is made generally available to customers.
A certificate that is constructed like a digital certificate, but is signed by its subject. Unlike a digital certificate, a self-signed certificate cannot be used in a trustworthy manner to authenticate a public key to other parties.
self-timed interface (STI)
An interface that has one or more conductors that transmit information serially between two interconnected units without requiring any clock signals to recover the data. The STI performs clock recovery independently on each serial data stream and uses information in the data stream to determine character boundaries and inter-conductor synchronization.
In UML modeling, a relationship that indicates that the active state does not change when an object in the source state receives a specified event, performs a specific action, or meets a certain condition. See also transition relationship.
- A defined role in WebSphere Commerce that has access to all WebSphere Commerce Accelerator capabilities. See also expected inventory, expected inventory record.
- An organization that supplies products to enterprises or other buyer organizations.
- The role that supervises the overall store objectives and management, in addition to tracking the store sales. The seller role is equivalent to a merchant.
- A seller user with administrative privileges.
- The seller administrator manages the information for the selling organization. The seller administrator creates and administers the suborganizations within the selling organization and the various users in the selling organization, including the assignment of appropriate business roles.
A feature that allows the user to define a set of rules for date aging. For example, a set of rules can be defined to adjust aged dates to result in valid business days. See also age, incremental aging, target aging.
In the Reusable Asset Specification (RAS), a model that describes the nature of core elements of an asset. The model elaborates on specific elements of an asset, providing insight to the asset's structure as captured in the asset structure model.
The relationships of characters or groups of characters to their meanings, independent of the manner of their interpretation and use. Semantics is the meaning conveyed by a character string. See also parsing, syntax.
A type of keyword search that incorporates linguistic and contextual analysis. See also text analysis.
The usage or rules for an item. Base, annotation, and note are semantic types supplied by Content Manager; users can also define their own semantic types. See also item.
- An entity used to control access to system resources. Processes can be locked to a resource with semaphores if the processes follow certain programming conventions.
- A mechanism that is used to synchronize one or more jobs.
- A global flag or label in the system that prevents activities from occurring at the same time. Typically projects or steps that require exclusive use of a resource are set up to obtain a semaphore in order to use it.
- In UNIX and Linux systems, a general method of communication between two processes that extends the features of signals.
- A protected variable, used in a UNIX environment, that allows multiple program threads to share the same resource, such as file access, but not simultaneously.
- An indicator used to control access to a file. For example, in a multiuser application, a semaphore is a flag that prevents simultaneous access to a file.
- An object used by multi-threaded applications for signaling purposes and for controlling access to serially reusable resources. Processes can be locked to a resource with semaphores if the processes follow certain programming conventions.
In REXX, a token that indicates the end of a clause and is implied by the REXX interpreter in three cases: by the end of a line, by certain keywords, and by a colon if it follows a single symbol.
See semaphore ID.
send and forget
In extended messaging, an enterprise bean (stateless session bean) that can be built to send asynchronous messages. A sender bean translates its method invocation into a JMS message, then passes that message to JMS. It can also retrieve a response message, translate that message into a result value, and return it to the caller.
A type of channel exit program that is called just before a message channel agent (MCA) issues a communications send to send a unit of data over a communications connection. See also receive exit.
In SNA, the pacing of message units that a component is sending. See also receive pacing.
In Q replication, a WebSphere MQ message queue that is used by a Q Capture program to publish transactions that it has captured. A send queue can be used either for Q replication or event publishing, but not both at the same time.
In SNADS, the values that specify the time that distributions are sent to other locations in a network. The from and to times inclusively specify the range during which distributions can be sent; the force time specifies the time at which distributions are sent regardless of the number of items in the queue.
- In SNA, data sent with a negative response, indicating the reason for the response.
- In printers, sense information used to indicate the causes of command-stream and device exceptions and to direct the host program to the appropriate exception-recovery actions.
- The amount of time by which a threshold-based health indicator must exceed its threshold or the amount of time that a state-based health indicator must be in a non-normal state before an alert is generated.
- An IMS capability that ensures that only data segments or fields predefined as sensitive are available for use in a particular application. The sensitivity concept also provides a degree of control over data security, inasmuch as users can be prevented from accessing particular segments or fields by omission of those segments or fields from the logical database. Sensitivity is implemented through the database program communication block (DB PCB).
- A program that reads information from a managed software system to create configuration information.
- An interface that exposes information about the state and state transitions of a managed resource. A sensor is used to retrieve data from a managed resource, whereas an effector is used to alter data in a managed resource. See also effector, manageability interface, managed resource, sensor value, touchpoint.
- A device that converts measurable elements of a physical process into data that is meaningful to a computer.
- Software that monitors security networks, applications, or systems for security-related information, possibly indicative of suspicious activity.
In a policy-enabled system, a data value that is returned by a sensor and that can be used by a policy. See also sensor.
- In COBOL, a sequence of one or more statements, the last of which is stopped by a separator period.
- In the vi editor, text that is separated from other text by a. (period), ! (exclamation point), or ? (question mark) followed by two spaces.
See Software Engineering Process Authority.
separate search space
An implementation of the Product Advisor. For this style of implementation, additional database tables must be created that contain metadata to facilitate searching a particular category of products. See also base search space.
The list of separation characters. See also separation character.
An optional report page that contains information from a recipient's user ID for the purpose of distribution. This particular banner is used to separate individual reports from each other.
- A sequentially ordered flat collection.
- A list of recorded URLs.
- A list of items in a data set that tend to occur in a predictable order.
- A database object that is independent of any one table that automatically generates unique key values based on initial user specifications.
- A decision variable that represents a total order over a set of interval variables.
- In fibre-channel technology, a group of related frames transmitted in the same direction between two node ports (N_ports).
- To arrange in order.
- In the XQuery and XPath data model, an ordered collection of zero or more items. See also XQuery and XPath data model.
- A mechanism for keeping rows unique in cases of multiple iterations of other key data fields.
- In RPG, a function that checks the sequence of records in input, update, or combined files used as primary and secondary files.
- The process of verifying the order of a set of records relative to some field's collating sequence.
A UML structural diagram that shows the chronological sequence of messages between instances (objects or classifier roles) that work together in an interaction or interaction instance. See also communication diagram, lifeline.
Sequenced Packet Exchange protocol (SPX)
A session-oriented network protocol that provides connection-oriented services between two nodes on the network, and is used primarily by client/server applications. It relies on the Internet Packet Exchange (IPX) protocol, provides flow control and error recovery, and guarantees reliability of the physical network.
A connecting object, represented by a solid graphical line, that shows the order of flow objects in a process or choreography. A sequence flow can cross the boundaries between swimlanes of a pool, but cannot cross the boundaries of a pool. There are two types of sequence flows: exception flow and normal flow.
- A number assigned to each message exchanged between two nodes. The number is increased by one for each successive message. It starts from zero each time a new session is established.
- A field in a journal entry that contains a number assigned by the system. This number is initially 1 and is increased until the journal is changed or the sequence number is reset by the user.
- A 2-byte field in the structured field introducer that identifies the position of the structured field in the data set.
- A numerical value assigned by VTAM to each message exchanged between two nodes. The value (one for messages sent from the application program to the logical unit and another for messages sent from the logical unit to the application program) increases by one for each successive message transmitted unless it is reset by the application program with a set and test sequence numbers (STSN) indicator.
- The number of a record that identifies the record within the source member.
- In communications, a number assigned to a particular frame or packet to control the transmission flow and receipt of data.
sequence number wrap value
In WebSphere MQ, a method of ensuring that both ends of a communication link reset their current message sequence numbers at the same time. Transmitting messages with a sequence number ensures that the receiving channel can reestablish the message sequence when storing the messages.
The lowest level of the index of a key-sequenced data set (KSDS); it gives the locations of the control intervals in the data set and orders them by the key sequence of the data records they contain. The sequence set and the index set together comprise the index. See also index set.
- The process of referring to records one after another in the order in which they appear on the file. See also access mode.
- The retrieval or storage of a VSAM or SAM data record in either its physical order or its collating sequence relative to the previously retrieved or previously stored record.
- A mode of accessing data on a medium in a manner that requires the storage device to access consecutive storage locations on the medium.
The allocation of sequential data sets, partitioned data set (PDS) members, partitioned data set extended (PDSE) members, UNIX files, or any combination of these such that the system retrieves them as a single, sequential, data set. See also data set concatenation.
A cursor that can fetch only the next row in sequence and can read through a table only once each time the cursor is opened. See also scroll cursor.
sequential dependent segment (SDEP)
A segment of a data entry database that is chained off the root segment and inserted (last-in first-out) into the last part of a DEDB area. After being inserted by an online program, the SDEP cannot be modified. See also data entry database.
- For Network File System (NFS), a type of MVS file that has its records stored and retrieved according to their physical order within the file. It must be on a direct access volume.
- See sequential data set.
sequential millisecond response
A parameter specified in the definition of a storage management subsystem (SMS) storage class indicating the desired response time to read the next 4-KB block of a data entity assuming the prior 4-KB block has been read.
A rule execution mode for stateless pattern-matching. With this mode, rules can be processed sequentially, which can improve the speed of rule processing in specific cases. The sequential mode can be selected for individual tasks in a rule flow.
In COBOL, the permanent logical file structure in which a record is identified by a predecessor-successor relationship that is established when the record is placed into the file.
A method of processing in which records are read, written to, or deleted in the order determined by the value of the key field. See also consecutive processing, random processing.
A set of several consecutive blocks that are read with a single read I/O operation. Sequential reads are issued by the sequential buffering (SB) component of IMS in order to reduce the elapsed time required to sequentially process large IMS overflow sequential access method (OSAM) databases.
A tendering method that allows a shipper to tender a shipment to a list of carriers one at a time. In sequential tendering, a shipment is made available to the first carrier in the group for a set period of time. If the first carrier fails to respond within the allotted time or declines the tender, the shipment is tendered to the next shipper in the list for the same period of time. The process is repeated until a carrier accepts the tender or the shipment tender time expires.
Pertaining to the sequential or consecutive occurrence of two or more related activities in a single device or channel. See also parallel.
Serial Advanced Technology Attachment (SATA, Serial ATA)
A standard for connecting storage devices such as hard drives and CD ROM drives to computer systems that is based on serial signaling technology.
See Serial Advanced Technology Attachment.
serial-attached SCSI (SAS)
A data-transfer technology that moves data to and from computer storage devices. Serial-attached SCSI uses a point-to-point serial protocol, which replaces the traditional, parallel SCSI bus technology.
See nonscrollable cursor.
- A device that performs functions sequentially, such as a serial printer that prints one character at a time.
- A device that uses serial data as opposed to parallel data.
- In Q replication, the process of applying transactions in the same order in which they were committed at the source.
- The consecutive ordering of items.
- The process of handling files that are modified during backup or archive processing. See also shared dynamic serialization, shared static serialization, static serialization.
- The process of controlling access to a resource to protect the integrity of the resource.
- In object-oriented programming, the writing of data in sequential fashion to a communications medium from program memory.
- To convert data from an internal representation to a form that can be exchanged with other programs, using files or a network. When serialized data is deserialized the resulting internal representation is indistinguishable from the original data. See also deserialize.
- To change from parallel-by-byte to serial-by-bit.
- In XDR, to convert a particular machine representation to XDR format.
- To convert an XML value into a character string or binary string form. This process is the inverse of parsing.
See rotating asset.
See rotating item.
A Java object, one or more of which are produced by the SQLJ translator, that contains SQL statements and descriptions of host variables. A serialized profile file is used to describe the SQL statements so that they can be run with either a JDBC-based or a customized runtime library.
An XML value in the form of a character string or binary string. See also XML data.
A method for converting object data to another form such as binary or XML. See also deserialization.
The reusability attribute with which a program can be used sequentially by multiple tasks. A serially reusable module cannot be entered by a new task until the previous task has exited.
- A unique identifier of each single unit of a SKU attached to the item if serial number tracking is required.
- A unique number that identifies a custom configuration.
- A connector on a serial device to which cables for other devices are attached.
- An access point through which a computer transmits or receives data, one bit at a time.
Serial Storage Architecture (SSA)
An American National Standards Institute (ANSI) standard, implemented by IBM, for a high-speed serial interface that provides point-to-point connection for peripherals, such as storage arrays. See also Redundant Array of Independent Disks, spatial reuse, SSA adapter.
- The consecutive occurrences of a component. In map rules, the [ ] characters denote an indexed member of a series.
- In mathematics, the sum of a sequence.
- In Network Computing System, a process that exports one or more interfaces to one or more objects, and whose procedures can be invoked from remote hosts.
- A software program or a computer that provides services to other software programs or other computers. See also client, host.
- A component that is responsible for maintaining the data model, managing services, and running policies.
- A queue manager that provides queue services to client applications running on a remote workstation.
- An object that is associated with a host. The server to use is defined by the selector associated with the project or step which is run on the host.
- In Tivoli Workload Scheduler for z/OS, the optional component that runs on the controlling system and handles requests from remote ISPF dialogs, remote PIF applications, and the Graphical User Interface for Application Description.
- The target of a request from a remote requester. In a DB2 database system, the server function is provided by the distributed data facility, which is used to access a DB2 database from remote applications.
- In Enhanced X-Windows, the facility that provides the basic windowing mechanism. It handles interprocess communication connections from clients, de-multiplexes graphics requests onto screens, and multiplexes input back to clients.
- A definition that identifies where an application will be tested or published. See also host.
server addressing information
In DCE Remote Procedure Call (RPC), an RPC protocol sequence, a network address, and an endpoint that represent one way to access an RPC server over a network. Server addressing information is a part of server binding information.
server-based certificate authority
A certificate authority (CA) that runs under the CA process, a server task. It can be either a Notes or Internet certifier. The CA process can handle any number of Notes and Internet certifiers, and it gives administrators the ability to manage them from the server console, using Tell commands. The CA process also gives Internet certifiers the ability to issue certificate revocation lists (CRLs).
An electronic stamp stored in the server's key ring file that contains a public key, a name, an expiration date, and a digital signature. The server certificate uniquely identifies the server.
In message queuing, a channel that responds to a requester channel, removes messages from a transmission queue, and moves them over a communication link to the requester channel. See also requester channel.
In z/VM Center, a configuration profile for Linux guest systems that includes both Linux and z/VM aspects. A server complex can define network settings, Linux configuration scripts, disk access, and VM Resource Manager (VMRM) performance goals.
A document that is in the Domino Directory or a user's Personal Address Book and that defines a connection to a server. There are four types of server connection documents: dialup, network, passthru, and remote LAN.
server-connection channel type
The type of MQI channel definition associated with the server that runs a queue manager. See also client-connection channel type.
- The characteristics of a specific content server that uniquely identify it to Information Integrator for Content.
- In a federated system, the name and information that define the data source to the federated database.
- A definition for a computer that hosts a command server, to which systems under development in the Integration Flow Designer can be assigned as the intended execution server.
A document that defines many of the settings that control how a Domino server operates. The server document is set up when the administrator or administrators register a server. The server document also enables mail routing
In the Distributed Computing Environment (DCE)Remote Procedure Call (RPC), an entry in the name server database that stores binding information associated with the RPC interfaces of a particular RPC server and object Universal Unique Identifiers (UUIDs) for any objects offered by the server.
The code that resides in system flash memory, and includes a number of subcomponents, including POWER Hypervisor, power control, service processor, and logical partition firmware that is loaded into either AIX or Linux logical partitions.
- See computer group.
- A group of Rule Execution Server for z/OS instances that are configured to be transferred to another if a server fails or if there is a planned outage. A server group can include one to 32 server instances.
- A group of items, usually applications, that can be tested as a unit.
- A single operating system process that runs on a single machine and responds to requests from clients. See also virtual server.
- A logical server that consists of a set of server jobs and configuration objects. Each server instance listens on either a unique IP address or a unique port with the same IP address. A server instance is created, configured, deleted, or controlled from the administration server. The configuration of each server instance is determined by the name of an associated configuration file, instance parameters, and values that are specified on the Configuration and Administration Forms and on the Global Attribute Values page.
An initial program load (IPL) whereby all logical partitions on the server are shut down at the same time. This allows, for example, a new level of the server firmware to be activated on the server.
server-level RAS granularity
The level of RAS granularity at which RAS attribute values are assigned on a server-wide basis. RAS attribute values defined at the server-level are assigned to all requests that the server processes. See also RAS granularity.
The locale that a database server uses when it performs its own read and write operations. The SERVER_LOCALE environment variable can specify a nondefault locale. See also client locale.
A message that is routed to a server application for processing, or a delivery notification that is routed to a client application to acknowledge the receipt of a client message by its destination.
Server Message Block (SMB)
A protocol that manages requests and responses in a client/server environment so that clients on a network can share files, directories, and devices. See also Common Internet File System, Server Message Block 2.0.
Server Message Block 2.0
A higher performing, more scalable version of Server Message Block (SMB). This protocol can send multiple commands in the same packet and uses larger buffer sizes. See also Common Internet File System, Server Message Block.
server multiplexer group connection (SMX connection)
A multiplexed network connection that provides reliable, secure, high-performance communication between servers in a high-availability environment.
- The unique name of a database server, assigned by the database server administrator, that an application uses to select a database server.
- An identifier that designates an application server. In a federated system, the server name also designates the local name of a data source. See also alias, database name.
A collection of Java or non-Java process definitions that you can define to run on middleware servers. You can create server operations to enable or disable tracing, start or stop applications, query the running state of a server, and so on.
A software-delivery package consisting of products and service for which IBM has performed the System Modification Program/Extended (SMP/E) installation steps and some of the post-SMP/E installation steps.
A process that provides services to client processes. See also client process.
A program that automates an administration task, such as compacting all databases on a server. Administrators can schedule server programs to run at a particular time or can run them as the need arises.
server-prompted scheduling mode
A client/server communication technique where the server contacts the client node when tasks must be done. See also client-polling scheduling mode.
Pertaining to an application or component of an application that runs on a server rather than on the client. JSP and servlets are two examples of technologies that enable server-side programming.
server-side include (SSI)
A facility for including dynamic information in documents sent to clients, such as current date, the last modification date of a file, and the size or last modification of other files. See also server-side include injection.
server-side include injection (SSI injection)
An attack technique that exploits a web application's failure to sanitize user-supplied data before it is inserted into an HTML file. This could give an attacker the ability to execute arbitrary operating system commands, or include a restricted file's contents the next time the page is served. See also server-side include.
The primary, copy, and active-data storage pools that are used by the server to store user files such as backup versions, archive copies, and files migrated from space manager client nodes (space-managed files). See also active-data pool, copy storage pool, primary storage pool, storage pool volume, volume.
A program provided with the Domino server that runs only when specifically loaded. Server tasks serve various purposes; the Administration Process, HTTP Server, and Reporter are just a few examples of server tasks.
See computer template.
- The outgoing and return route taken by a vehicle, that includes a schedule.
- In the Kerberos protocol, a software server that has been assigned a principal name and is registered with the key distribution center (KDC).
- A resource, such as a web service, to which access requests are made and that can be protected by policies.
- A set of business processes (such as web transactions) that represent business-critical functions that are made available over the internet.
- A component of the system that is an abstraction layer between clients and the database.
- In service-oriented architecture, a unit of work accomplished by an interaction between computing devices.
- A networked application that is capable of participating in a RosettaNet conversation.
- A component type in the Tivoli Data Warehouse that is created by the IBM Tivoli Business Systems Manager product, displayed in the Executive Console, and provides independent status for associated SLAs based on violation and trend events.
- A TCP/IP port number.
- A program that performs a primary function within a server or related software.
- In network architecture, a capability of a given layer and the layers below it that is provided to the layer above. The service of a given layer is provided at the boundary between this layer and the next higher layer.
- A program that is used to implement activities or to perform one-time or recurring system tasks.
- A process that stores data values or a database used by TM1.
- A runnable sub-component that the user controls from within the graphical user interface (GUI).
- An offering that provides skilled assistance to customers. A service may include consulting, education and training, offering enabling services, managed operations, integration and application development. Services are distinguished from products by their intangibility, inseparability, perishability and variability. See also Advanced Integration service, General System service, integration service, product.
- A component that accepts as input a message, and processes the message. For example, a service translates its payload into a different format, or routes it to one of several output queues. Most services are implemented as message flows or primitives.
- An offering, function, or activity that performs a task in an organization, and is fulfilled through the use of an organization's intellectual, financial and physical assets.
- Work performed by a server. A service can be a simple request for data to be sent or stored (as with file servers, HTTP servers, or email servers), or it can be more complex work (as with print servers or process servers).
serviceable software asset
A logical unit of software packaging and sharing that has a managed development and maintenance life cycle. Common components, assemblies and offerings are all serviceable assets. See also assembly, common component, offering.
A logical unit of software that has an identifier and that is packaged as a unit. Products and bundles are made of one or more serviceable units. A fix can apply to only one serviceable unit.
- A logical address that allows a system to route data between a remote device and the appropriate communications support.
- In Open Systems Interconnection (OSI) architecture, the point at which the services of a layer are provided by an entity of that layer to an entity of the next higher layer.
- The protocol and credentials associated with a data center device for authentication of remote operations. A data center device can have more than one service access point.
- In the Ethernet logical link profile, the address for the transaction program on the local system. This address is a hexadecimal value.
The connection with an IP label between clients and applications. The service address is the address published by the Cluster Information Program (Clinfo) to application programs that want to use cluster services.
Service Advertising Protocol (SAP)
A protocol that allows service providing nodes, such as file server and print server, to advertise their services so that clients can access the services. SAP also provides for responding to a user for a given type of service. This information is delivered through the use of the Internetwork Packet Exchange (IPX) protocol. A SAP packet contains sets of service entry information.
- An agreement between a provider and supplier, or a host and recipient, to define store setup and business relationship terms and conditions.
- See service level agreement.
A category that identifies a group of components that are unavailable for use when one of the components of the group is being serviced. For example, service boundaries are provided on the ESS in each host bay and in each cluster.
service bundle (SVB)
A set of services that logically belong together, for example, because they share resources such as a status table or error processing queue. A service bundle contains the definition files for all resources required to provide the services, for example definition files for message flows, queues, and database tables. A service bundle has a unique name in the scope of an instance. A service bundle must be assigned to an organizational unit and loaded into a server before it is operational.
service bundle set
A group of service bundles that are packaged together to simplify ordering. A definition file that defines the resource classes, resource file types, place holders, and server types that can be used by the service bundles in the set is associated with each service bundle set.
- A repository for units and materials, fixed deliverables, and custom specification items that a company needs frequently.
- A list of available provisioning services.
- For file archive collections, a policy object that is used to specify document retention settings.
- A group of work that has the same service goals or performance objectives, resource requirements, or availability requirements. For workload management, a service goal and, optionally, a resource group is assigned to a service class.
- An entity that acts as a point of resource control and monitoring for a set of database connections and activities within a DB2 database. There are two levels of service classes: service superclass and service subclass. See also service subclass, service superclass, workload definition.
- An eight-character identifier that is used by the z/OS Workload Manager to associate customer performance goals with a particular DDF thread or procedure. A service class is also used to classify work on parallelism assistants.
A component that configures a service implementation. A service component consists of an implementation and one or more interfaces, which defines its inputs, outputs, and faults, and also its references, if applicable.
Service Component Architecture (SCA)
An architecture in which all elements of a business transaction, such as access to web services, Enterprise Information System (EIS) service assets, business rules, workflows, databases and so on, are represented in a service-oriented way.
The primary component of the payload of a RosettaNet Business Message, which is an XML document that represents the business content specified by a particular PIP. The Service Content plus any file attachments comprises the payload component of the RosettaNet Business Message.
Part of a General InterORB Protocol (GIOP) message that is identified with an ID and contains data used in specific interactions, such as security actions, character code set conversion, and Object Request Broker (ORB) version information.
Service Data Objects (SDO)
An open standard for enabling applications to handle data from heterogeneous data sources in a uniform way, based on the concept of a disconnected data graph. See also business object.
- A set of data that provides the framework for deploying an IT landscape.
- One or more WSDL files that describe a service. Service definitions are produced by the Definition, Deployment, Adapter, Skeleton, and Proxy wizards.
- An explicit definition of all the workloads and processing capacity in a sysplex. A service definition includes service policies, workloads, service classes, resource groups, and classification rules.
service definition framework
A framework that defines how data is transported between systems, and that converts data into formats that are readable by each system. It defines boundary conditions for accessing services and logs exceptions.
A specialization of a service integration bus destination. Each service destination can directly represent the web service implementation or can indirectly represent the service through a Web Services Description Language (WSDL) document.
- In OSI, a unit of standardization specifying a complete group of functions.
- One of the discrete hardware and software products that provide a terminal user with processing ability.
In Enterprise Service Tools, the generated output of the runtime code generator of the service flow project tools. A service flow is a reusable composed business function that exposes a programmatic interface to a service requester in an enterprise information system.
service flow modeler
In Enterprise Service Tools, the logical concept of a set of tools for building service flows. The service flow project tools in the Enterprise Service Tools perspective are a real-life implementation of the concept of a service flow modeler.
Service Focal Point
An application on the Hardware Management Console (HMC) that collects problems from the system and from logical partitions. It is used to view problems and to take action on problems.
- Specific capabilities within service tools that are typically used for problem determination and problem solving, often with the assistance of IBM support. Examples of service functions include Licensed Internal Code trace, Licensed Internal Code log, and the display, alter, dump function.
- Functions of Tivoli Workload Scheduler for z/OS that allow the user to manage exceptional conditions, such as investigating problems, preparing APAR tapes, and testing during implementation.
service group (SG)
In a Remote Site Recovery (RSR) environment, a collection of all IMSs that access RSR-covered databases at an active or at a remote site, including the recovery control data set (RECON data set). A service group usually includes one or more IMSs at a single site, with the databases and RECON data set shared between the IMSs.
An XML document that identifies the PIP, the business activity, and action with which the business message is associated: the sending and receiving services, partners, and roles. It is packaged together with other headers and the payload to form a complete RosettaNet Business Message.
service integration bus (SIBus)
A managed communication mechanism that supports service integration through synchronous and asynchronous messaging. A bus consists of interconnecting messaging engines that manage bus resources.
service integration bus web services enablement
A software component that enables web services to use IBM service integration technologies. This capability provides a quality of service choice and message distribution options for web services, with mediations that support message rerouting or modification.
service integration logic
Integration logic on an enterprise service bus to mediate between requesters and providers. The logic performs a number of functions such as to transform and augment requests, convert transport protocols, and route requests and replies automatically
service integration technology
Technology that provides a highly-flexible messaging system for a service-oriented architecture (SOA). This supports a wide spectrum of quality of service options, protocols, and messaging patterns. The technology supports both message-oriented and service-oriented applications.
service interface queue
The queue into which applications place messages that are to be processed by a service. In WebSphere BI for FN, each OU that uses a particular service has its own service interface queue, and this queue is implemented as a WebSphere MQ alias queue.
A time interval, against which the elapsed time between a put or a get and a subsequent get is compared by the queue manager in deciding whether the conditions for a service interval event have been met. The service interval for a queue is specified by a queue attribute.
- An item that can be a fixed deliverable, unit and material, or service level agreement (SLA) item that is procured in Emptoris Services Procurement.
- A service that is defined as an item by a catalog organization.
- A set of logical characteristics of storage required by a data set managed by a storage management subsystem (SMS). Examples of these logical characteristics are performance, security, and availability.
- One of the four levels of service (fast, status, data high, or data low) that determines if a distribution is put on the normal or priority distribution queue.
- A class of service that can be used in business policies to aggregate a set of implied service qualities.
- In IBM Business Process Management, a rule that a user creates to analyze the performance of business processes over time. An SLA establishes a condition that triggers a consequence and creates a report for one or more activities. Conditions in SLAs are based on a standard or custom key performance indictator (KPI).
- A contract between a customer and a service provider that specifies the expectations for the level of service with respect to availability, performance, and other measurable objectives. See also service level objective.
service level criteria (SLC)
A set of performance objectives that require processing to occur within a certain time period. See also duration schedule, simple SLC, standard SLC, wildcard SLC, workflow SLC.
service level management (SLM)
The disciplined, proactive methodology used to ensure that adequate levels of service are delivered to all IT users in accordance with business priorities and at acceptable cost. IT organizations must thoroughly understand the priority and relative importance of each service it provides. Service level management is the continuous process of measuring, reporting, and improving the quality of service provided by the IT organization to the business.
service level objective (SLO)
A specification of a metric property that is associated with both threshold values for peak and off-peak hours in a schedule and a guaranteed level of service that is defined in a service level agreement (SLA). See also breach value, metric, service level agreement.
service management process
A system automated process that uses a request class and service plan to determine business rules for the creation of a task or project, and assign the task or project to the responsible organization. See also request class.
- A message exchanged between services.
- See control message.
service message object (SMO)
A service data object that can exist only in a mediation flow component. The service message object is composed of a body and headers. The body contains the parameters of the invoked interface operation, and the headers may contain information such as service invocation, transport protocol, mediation exception, JMS properties, or correlation information.
See maintenance mode.
A name that provides a symbolic method of specifying the port number to be used at a remote node. To identify an application, the TCP/IP connection requires the address of the remote node and the port number to be used on the remote node.
- An element of an Intelligent Network that contains the service logic that controls an intelligent network application and resources.
- A Blue Gene system which is responsible for management and control of a Blue Gene solution.
service-oriented architecture (SOA)
A conceptual description of the structure of a software system in terms of its components and the services they provide, without regard for the underlying implementation of these components, services and connections between components.
A generalization referring to individuals or companies authorized to service IBM products. The terms service provider, service representative, and service support representative (SSR) refer to types of service personnel. See also service support representative.
- A performance goal that is assigned to a specific application URI to help designate the business importance of different request types.
- A set of performance goals for all z/OS images using z/OS workload management in a sysplex. There can be only one active service policy for a sysplex, and all subsystems in goal mode within that sysplex process towards that policy. However, you can create several service policies, and switch between them to cater for the different needs of different processing periods.
In the OSI reference model, the smallest defined interaction between service users and service providers in adjacent layers. This interaction is a service provided by the lower layer to the higher layer.(I)
- The logic that contains the processor function to start the system processor and handle error conditions.
- The interface to the Hardware Management Console (HMC) that provides hardware control and logical partition (LPAR) support for IBM Power Systems servers.
- A generic term for Remote Supervisor Adapters, Advanced System Management processors, Advanced System Management PCI adapters, and integrated system management processors (ISMPs). These hardware-based management processors used in IBM Netfinity and xSeries servers work with IBM Director to provide hardware status and alert notification.
- See utility program.
- A bound program that performs utility functions that can be called by other bound programs.
- Any company that provides services for a fee to its customers, such as telecommunication companies, application service providers, enterprise IT, and Internet service providers.
- In the OSI reference model, a layer that provides services to the next higher layer.
- An entity that connects stream data to feed handlers.
- In System Manager, the system used to provide problem-handling support to another system or systems connected to it by communications lines. The service provider can also be the alert focal point in a network. See also service requester.
- A company or program that provides a business function as a service.
- In Enterprise Service Tools, the application that hosts access to a web service. A service provider describes its service using WSDL.
The rate at which an entity can service requests. See also request rate.
- A repository that contains all of the information that is required to access a web service.
- A directory that contains information about services that are available in a network.
A repositories that contains updates for packages, for example IBM support sites or local repositories, which might be linked to other repositories. In managing installation packages, the service repository can be checked for updates to installed products.
service representative basic user profile
A system-supplied user profile, named QSRVBAS, that provides limited authority for a service representative to use dedicated service tools (DST) and system service tools (SST). See also service representative user profile.
service representative user profile
A system-supplied user profile, named QSRV, that provides all the authority required by a service representative to use the dedicated service tools (DST) and system service tools (SST). See also service representative basic user profile.
- An element that is used to manage and track work requests.
- A request from a user for help, information, advice, or access to an IT service.
- A request that is created and passed to the request queue handler whenever a nucleus server requires a service that is not currently available.
service request block (SRB)
A control block that represents a routine that performs a particular function or service in a specified address space. See also dispatch.
- In System Manager, the system with a program or equipment problem that requires and asks for problem-handling support from another system in a network. See also service provider.
- The application that initiates an interaction with a web service. The service requester binds to the service by using the published information and calls the service.
- In Enterprise Service Tools, an application that is looking for and invoking or initiating an interaction with a web service provider. The requester role can be played by a browser driven by a person or a program without a user interface, for example, another web service. A service requester issues one or more queries to locate a service and determine how to communicate with that service.
Service Science, Management and Engineering (SSME)
An academic discipline that uses the ideas and skills of computer science, engineering, social science, and business management to improve the productivity, quality, and innovation in services.
The application server, common services, and product services for the InfoSphere Information Server suite and product modules and the computer or computers where those components are installed.
A grouping mechanism for database activities within a service superclass. Resources of a service superclass are shared by all related service subclasses. See also service class, service superclass.
service support representative (SSR)
An individual or a company authorized to service IBM products. See also service personnel.
In the Kerberos protocol, a ticket that grants access to a particular resource, or service. A ticket from a Kerberos authentication server must be presented in order to obtain a service ticket.
The calculation of end time minus start time for a load event or an unload event. The service time for a vehicle is calculated as: Site Arrival Time + Unloading Time + Loading Time + Site Exit Time. See also work time.
service tools device ID
A programming object used by both the PC and the IBM System i model as a means to authenticate the network connection between the two. A service tools device ID is unique to that PC and server connection. The service tools device ID can be managed by authorized users in dedicated service tools (DST) or system service tools (SST). The default service tools device ID is QCONSOLE.
service tools user ID
A user ID that is required to access DST, SST, System i Navigator (for logical partitions and disk unit management), and Operations Console. Service tools user IDs are created through DST or SST and are separate from i5/OS user profiles.
In the context of a service definition, the set of physical IT components (such as hardware and software) that are available for inclusion in services based on that definition. On instantiation, the service topology is the actual set of these components in operation on behalf of the service deployment instance.
service topology node
In the context of a service definition, one element of the service topology to which resources can be allocated based on that definition. On instantiation, the service topology is the actual set of these components in operation on behalf of the service deployment instance.
service transaction program
A program that provides a function internal to SNA Server. See also application transaction program.
- A shipment attribute that specifies how quickly the freight must be delivered.
- A component that contains code that is used to do work when executed in a business process.
A virtualization that compensates for the differences in the syntactic details of the service interactions so that the service requester and provider do not have to use the same interaction protocol and pattern or the same interface, nor do they have to know the identities of the other participants.
See service network.
A Java program that runs on a web server and extends the server functions by generating dynamic content in response to web client requests. Servlets are commonly used to connect databases to the web.
A file that contains the same components as a servlet application. Unlike web archives, servlet archives can have only a sip.xml deployment descriptor and not a web.xml deployment descriptor.
The process of transforming a request or modifying a response without exposing the resource used by the servlet engine. See also filter.
- An automatic device that uses feedback to govern the physical position of a part.
- A feedback control system in which at least one of the signals represents mechanical motion.
See SCSI Enclosure Services.
- A collection of source and target volumes that are managed to create consistent copies of data. The type of data replication that is associated with the session determines the actions that can be conducted for the volumes.
- A series of requests to a servlet originating from the same user at the same browser.
- The time during which an authenticated user is logged on.
- In a distributed application, a single conversation between a communicating pair of transactions. See also conversation.
- A resource that controls local logical units (LUs), remote LUs, modes, and attachments.
- A collection of process groups established for job control purposes.
- In Java EE, an object used by a servlet to track user interaction with a web application across multiple HTTP requests.
- A logical or virtual connection between two stations, software programs, or devices on a network that allows the two elements to communicate and exchange data for the duration of the session. See also SQL connection, transaction.
session activation request
In SNA, a request that activates a session between two network accessible units (NAUs) and specifies session parameters that control various protocols during session activity.
A method of configuring applications in which a client is always connected to the same server. These configurations disable workload management after an initial connection by forcing a client request to always go to the same server.
session awareness data (SAW data)
Data that is collected by the NetView program about a session that includes the session type, the names of session partners, and information about the session activation status.
An enterprise bean that is created by a client and that typically exists only for the duration of a single client/server session. (Sun) See also entity bean, stateful session bean, stateless session bean.
A session-layer component in an APPN network node or in a subarea node boundary or gateway function that connects two stages of a session. Session connectors swap addresses from one address space to another for session-level intermediate routing, segment session message units as needed, and (except for gateway function session connectors) adaptively pace the session traffic in each direction. See also half-session.
session control (SC)
In SNA, one of the components of transmission control. Session control is used to purge data flowing in a session after an unrecoverable error occurs, to resynchronize the data flow after such an error, and to perform cryptographic verification.
A cookie that stores information in the form of session identification that does not personally identify the user. It is stored in temporary memory and is not retained after the browser is closed.
session cryptography key
In SNA, a data encrypting key that is used to encipher and decipher function management data (FMD) requests transmitted in an LU-LU session that uses cryptography. See also data-encrypting key.
In VTAM, a request to an LU to establish a session. For the primary logical unit (PLU) of the requested session, the session-establishment request is the CINIT sent from the system services control point (SSCP) to the PLU. For the secondary logical unit (SLU) of the requested session, the session-establishment request is the BIND sent from the PLU to the SLU.
A mechanism for separating the business and client tiers of an enterprise application by abstracting the data and business methods so that clients are not tightly coupled with the business logic and not responsible for data integrity. Implemented as session enterprise beans, session facades also decouple lower-level business components from one another.
session functional unit
In OSI, logical groupings of related services provided by the Session Layer, such as activity management, capability data exchange, and negotiated release. Most session functional units are optional. The peer application entities negotiate whether or not the optional functions will be used when the session connection is established.
See session identifier.
- In WebSphere MQ for z/OS, the identifier, unique to CICS, that defines the communication link to be used by a message channel agent when moving messages from a transmission queue to a link.
- A unique string of data provided by the web server that is used in network communications to identify a session, and is stored within a cookie or URL.
Session Initiation Protocol (SIP)
A protocol for initiating interactive multi-media sessions. See also siplet.
- A key that uniquely identifies each CICS-IMS session. The session key is formed from the CICS name for the session and the IMS subpool name.
- In computer security, a temporary key that grants access to a particular resource or session. A session key is similar to a service ticket in the Kerberos protocol.
- In Cryptographic Support, a data-encrypting key used to encrypt data before it is sent to another location.
In Systems Network Architecture (SNA), a session level security protocol that enables two logical units (LUs) to authenticate each other while they are activating a session. Session level authentication is also known as LU-LU verification.
A flow control technique that permits a receiving half-session or session connector to control the data transfer rate (the rate at which it receives request units) on the normal flow. It is used to prevent overloading a receiver with unprocessed requests when the sender can generate requests faster than the receiver can process them. See also adaptive session-level pacing, fixed session-level pacing, virtual route pacing.
In CDE, a software application that controls saving sessions, restoring sessions, screen locking and unlocking, and the use of screen savers. When a session is saved, the state of the desktop environment (location of icons, size and location of open windows, open/closed status of applications, current color palette, and so on) is preserved so that it can be restored at the next login.
- An instance of a session data class used to persist web client state between server requests.
- See security token.
In SNA, a parameter that specifies or constrains the protocols (such as bracket protocol and pacing) for a session between two network accessible units (NAUs). See also logon mode.
- For the 3270 Host Connection Program 2.1 and 1.3.3 for AIX, a profile describing the characteristics of a session between a client system and a System/370 host computer.
- In System i Access, a file that describes the characteristics of a PC5250 session.
session qualifier pair
See session key.
In LU6.2 and MRO, the level of security applied when a request to establish a session is received from, or sent to, a remote system. Used to verify that the remote system is really the system it claims to be. See also link security, user security.
session sequence number
A sequentially incremented 10 byte identifier that is assigned to each request unit in an LT session. It is formed by concatenating the 4 byte session number with a 6 byte sequence number.
session services (SS)
One of the types of network services in the control point (CP) and in the logical unit (LU). These services provide facilities for an LU or a network operator to request that a control point (an ENCP, NNCP, or SSCP) assist with initiating or terminating sessions between logical units. Assistance with session termination is needed only by SSCP-dependent LUs. See also configuration service, maintenance service, management services.
An identifier that is sent by the browser as a parameter or a cookie, in order to correlate between a user and their current session on the web application. See also transient token.
A function that collects session trace data for sessions that involve either specified resource types or a specific resource. The session trace data consists of session activation parameters, VTAM path information unit data, and network control program (NCP) data.
In OSI, pertaining to the two versions of the session-layer services and protocols standard. Session version 2 can handle the transmission of larger units of data than session version 1.
- An ordered list of unique elements.
- A field/variable whose values represent categories with no intrinsic ranking (for example, the department of the company in which an employee works). Examples of sets include region, zip code, and religious affiliation.
- A collection of unique, unordered elements. No element appears more than once in a set, and by default, there is no reproducible order for the elements of a set.
- A category within a grouping. An example of a set within a grouping, applied to an object type, is East Coast Warehouses, within Region, applied to warehouses. See also grouping.
- A collection of related items or members. Members in a set may be specifically chosen, or selected by one or more filter rules. See also category set, custom set, details-based set, page set, predefined set, selection-based set, stacked set.
- A temporary grouping of objects on a drawing that can be manipulated, changed, stored, or deleted.
See Secure Electronic Transaction.
An aspect of cache design that determines how many cache lines can be associated with a given memory location. A cache that is four-way set associative can contain a given memory location in one of four cache lines.
set asynchronous balanced mode extended (SABME)
In communications, pertaining to a control command used to initiate data transfer in the extended asynchronous balanced mode of operation with a remote link station. The SABME command uses modulus 128 sequence numbers.
A function that performs calculations on a column in a set of rows in a view, such as the average value of the cost of some similar product orders. A set function may only be used in the selection list of a SELECT statement.
See set-group-ID mode bit.
set integrity pending
A state indicating that integrity processing is required on a table. To remove this state, a SET INTEGRITY statement must be processed for the table. See also check pending, integrity processing.
An operator in SQL that corresponds to a relational operator. A set operator derives a result table by combining two other result tables. An example of a set operator is UNION, which corresponds to the union relational operator.
A method whose purpose is to set the value of an instance or class variable. This capability allows another object to set the value of one of its variables. See also accessor method, getter method, mutator method.
A view of an object that provides a way to display the attributes associated with the object. For example, using the settings view, the user can change the areas that display in a window, such as the title or columns.
A user-specified time interval during which the application waits before activating an offline resource group on a higher priority node that is joining the cluster. After the settling time expires, the resource group starts activating the node that has the highest priority among the nodes that joined the cluster during the settling time interval. See also delayed fallback timer, resource group, resource group policies, startup.
See set-user-ID mode bit.
A classification for an event that indicates its degree of severity. The predefined severity levels, in order of descending severity, are: fatal, critical, warning, minor, harmless, and unknown.
See waste water.
See sysplex failure management.
See small-form-factor pluggable transceiver.
See Suomen Standardisoimisliitto.
See Services for UNIX.
See service group.
See Standard Generalized Markup Language.
See smart grid maturity model.
See application shell.
See Secure Hash Algorithm.
See Secure Hash Algorithm digest.
- To duplicate Enterprise Address Book (EAB) data from one system to another and to send EAB changes, additions, and deletions to other systems.
- A duplication of the Enterprise Address Book (EAB) data on another system.
In an RSR environment, a database maintained at the tracking site as a remote copy of a database at the active site. If a remote takeover occurs, the shadow database becomes the master database.
- The process of having a high-level maintenance task, such as a yearly preventive maintenance check supersede a lower-level maintenance task, which eliminates the need for that instance of lower-level scheduling.
- The capability of a system to copy data from one system to another system and keep it up to date whenever it is changed on any system that shadows the information in the network.
- A recovery technique in which current page contents are never overwritten. Instead, new pages are allocated and written while the pages whose values are being replaced are retained as shadow copies to support system restoration. The shadow copies are deleted when they are no longer needed.
A log of errors that occur from the time that an initial program load starts to the time storage management recovery ends. The log contains the latest occurring errors, and may contain errors not found in the error log.
A copy of an existing (primary) Enterprise Replication replicate. Shadow replicates allow Enterprise Replication to manage alter and repair operations on replicated tables. See also master replicate, replicate.
A table that is used to store historical data. There is one shadow table for each table that is recorded in the synchronization history. See also incremental publication, synchronization history.
A zone where the tags might not be visible temporarily because they are out of reach of the tag reader infrastructure or the signals are shielded. WebSphere Sensor Events assumes that a tag continues to be in the shadow zone at the last reported position after it has been seen. No alert is generated if the tag is no longer visible.
For Arabic script, the process that decides which of the several (up to four) shapes of an Arabic character is to be used in the current context. The shapes are initial, middle, final, and isolated. For each character, the decision is based on the linking capabilities of current and surrounding characters. See also base shape, presentation shape.
Sharable Content Object Reference Model (SCORM)
A set of standards that, when applied to course content, produces small, reusable learning objects. A result of the Department of Defense's Advance Distributed Learning (ADL) initiative, SCORM-compliant courseware elements can be easily merged with other compliant elements to produce a highly modular repository of training materials.
An instance of a partition. A shard can be a primary or replica. See also container server.
The horizontal partitioning in a database design that is based on a business definition where each partition forms part of a shard. Shards can be located on a separate database server or physical location.
A condition in which the TSO data sets SYS1.UADS (TSO user definition) and SYS1.BRODCAST (TSO message transmission definition) are shared by all systems in the multi-access spool (MAS) complex.
- A coupling facility list structure that a DB2 for z/OS data sharing group uses for communication between members of the data sharing group.
- A memory structure in a cluster caching facility that can be simultaneously accessed by multiple members in a DB2 pureScale instance. The SCA contains database-wide control data that must be synchronized across all members.
A disk that is configured to serve more than one node. Shared disks are physically connected to multiple nodes. See also shared file system.
shared dynamic serialization
A value for serialization that specifies that a file must not be backed up or archived if it is being modified during the operation. retries the backup or archive operation a number of times; if the file is being modified during each attempt, will back up or archive the file on its last try. See also dynamic serialization, serialization, shared static serialization, static serialization.
shared dynamic storage area (SDSA)
The user-key storage area for any non-reentrant user-key RMODE(24) programs, and also for any storage obtained by programs issuing EXEC CICS GETMAIN commands for storage below 16 MB with the SHARED option.
A file whose open data path can be shared between two or more programs processing in the same job. See also open data path.
- An operating system extension that allows multiple users or computers to use the same set of files at the same time, across a network. To each user, the shared file system appears to be an extension of the local file system. See also export.
- A file system that is configured to serve more than one node. See also shared disk.
shared-for-read lock state
The lock state for a file in which the file can be shared with another program if the program does not request exclusive use of the file. The predefined value for this lock state is *SHRRD.
shared-for-update lock state
The lock state for a file in which the file can be shared either for update or for read operations with another program. The predefined value for this lock state is *SHRUPD.
A transparent window that is used in a screen-sharing meeting. The person sharing the screen can resize or move the shared frame around the desktop. Whatever appears in the shared frame is displayed to the meeting participants. Do not confuse a shared frame with a frame in a web browser.
shared inbound channel
In WebSphere MQ for z/OS, a channel that was started by a listener using the group port. The channel definition of a shared channel can be stored either on page set zero (private) or in the shared repository (global).
shared IP address
An IP address that is configured so that it can rotate among cluster nodes. See also nonconcurrent resource group.
shared library file
A file that consists of a symbolic name, a Java class path and a native path for loading Java Native Interface (JNI) libraries. Applications that are deployed on the same node as this file can access this information.
- A lock that several tasks can hold.
- A lock that limits concurrently running application processes to read-only operations on database data. See also exclusive lock, gross lock.
A member that explicitly shares storage space with another member of the same name. Shared members prevent making extra calculations on a member that appears in more than one location in the outline.
- An interprocess communications service that provides shared memory segments.
- Physical memory that is assigned to a shared memory pool and shared among multiple logical partitions.
- An area of memory simultaneously accessible to more than one cooperating process.
shared memory segment
An interprocess communications mechanism that allows a process to directly read data from, write data to, and share data with other processes without having the data manipulated by the operating system.
shared-no-update lock state
The lock state for a file in which the file can be shared with another program if the program requests either a shared-no-update lock state or a shared-for-read lock state. The predefined value for this lock state is *SHRNUP.
A library that is not linked to an application at compile time but instead is loaded into memory by the operating system as needed. Several applications can share access to the loaded shared-object file. See also dynamic link library, library, shared library.
shared outbound channel
In WebSphere MQ for z/OS, a channel that moves messages from a shared transmission queue. The channel definition of a shared channel can be stored either on page set zero (private) or in the shared repository (global).
A place created for a community of people with a common purpose. Shared places can be public or restricted. The place creator (who automatically becomes the place manager) specifies whether a place is public or restricted during place creation.
shared processing pool
See shared processor pool.
shared processor pool
A group of physical processors that provide processing capacity that can be shared among multiple logical partitions. Processing capacity from the shared processor pool can be assigned to each of the logical partitions in partial processor increments. The sum of the assigned processing capacity across all logical partitions in the shared processor pool cannot exceed the total processing capacity of the shared processor pool.
- A collection of data objects with the same name that reside on a coupling facility queue structure. Data objects on a shared queue are available to all CQS clients that have access to the structure.
- In WebSphere MQ for z/OS, a type of local queue. The messages on the queue are stored in the coupling facility and can be accessed by one or more queue managers in a queue-sharing group. The definition of the queue is stored in the shared repository. See also queue-sharing group.
- In WebSphere MQ for z/OS, a shared DB2 database that is used to hold object definitions that have been defined globally.
- A storage location of server objects where each file is stored only once even if it belongs to several objects.
- A special resource or workstation resource that can be used simultaneously by more than one operation.
- A software file or plug-in that is stored in a directory and can be shared by packages. See also installation directory.
- A function that permits the sharing of a pool of I/O-related control blocks, channel programs, and buffers among several Virtual Storage Access Method (VSAM) data sets that are open at the same time. See also global shared resource, local shared resource.
shared resources directory
The directory that contains software files or plug-ins that are shared by packages. The contents of this directory are used by all products in all the package groups that are defined on the computer.
shared static serialization
A copy-group serialization value that specifies that a file must not be modified during a backup or archive operation. attempts to retry the operation a number of times. If the file is in use during each attempt, the file is not backed up or archived. See also dynamic serialization, serialization, shared dynamic serialization, static serialization.
- Storage within a storage facility that is configured such that multiple homogenous or divergent hosts can access the storage concurrently. The storage has a uniform appearance to all hosts; the host programs that access the storage must have a common model for the information on a storage device.
- An area of storage that is the same for each virtual address space. Because it is the same space for all users, information stored there can be shared and does not have to be loaded in the user region.
- A storage pool that provides distributed storage access to one or more logical partitions or virtual servers in a cluster or that can be shared by more than one subsystem.
- A storage pool that can be shared by more than one subsystem. See also private storage pool.
shared virtual area (SVA)
In VSE, a high address area of virtual storage that contains a system directory list (SDL) of frequently used phases, resident programs that can be shared between partitions, and an area for system support.
A shared value for sorting purposes. For example, in a simple sort table, the letters a and A might share the same weight value of 24, and b and B the value 25. This would ensure that words such as able and Able would be kept close to each other. See also unique weight, weight.
shared-weight sort sequence
A sort sequence in which some graphic characters in the sequence may have the same weight as some other characters in the sequence. Those with the same weight will sort together as if they were the same character.
A collection of agents that scan the same object, such as a table, using the same mechanism, such as a table scan, and potentially share pages or records of this object that are in the buffer pool.
A single space on a shelf for storage of removable media. In DFSMSrmm, a shelf location is defined in the removable media library by a rack number; in a storage location, it is defined by a bin number. See also bin number, rack number.
A function that manages the placement of volumes in individual slots in a location. In DFSMSrmm, shelf management is provided for the removable media library using rack numbers. For storage locations, shelf management is optional and uses bin numbers.
shelf-resident optical volume
An optical volume that resides outside of an optical library. See also optical volume.
shelf-resident tape volume
A tape volume that resides outside of a tape library. See also tape volume.
- The CICS facility that provides an isolated area for running CICS programs without adversely affecting other users.
- Software that allows a kernel program to run under different operating system environments.
- A software interface between users and an operating system. Shells generally fall into one of two categories: a command line shell, which provides a command line interface to the operating system; and a graphical shell, which provides a graphical user interface (GUI).
See shell script.
In Enhanced X-Windows and AIXwindows, a top-level widget that is internal and communicates directly with the window manager. This widget does not have parents, nor can it be instantiated.
- A scheduled work period. For example, a 24-hour day is often divided into three 8-hour shifts.
- A keyboard action to allow uppercase or other characters to be entered. See also level.
shift-in character (SI)
A control character (X'0F') that is used in EBCDIC systems to denote that the subsequent bytes represent single-byte character set (SBCS) characters. See also shift-out character.
shift-out character (SO)
A control character (X'0E') that is used in EBCDIC systems to denote that the subsequent bytes, up to the next shift-in control character, represent double-byte character set (DBCS) characters. See also shift-in character.
- A part for adjusting gaps, play, or position in a mechanism.
- A thin, often tapered, piece of material, such as metal, used to fill in space between things for support, adjustment, or leveling.
A string of consecutive tokens (words) that are taken from a sentence. For example, from "This is a very short sentence.", the 3-word shingles (or trigrams) are: This is a/ is a very/ a very short/ very short sentence/. Shingles can be used in statistical linguistics. For example, if two different texts have a lot of common shingles, the texts are probably related somehow.
- A group of items from one or more customer orders that uses one shipment hub and has the same ship-to address.
- A quantity of product transported from one site to another. See also site.
See shipment identifier.
shipment receipt record
A record that contains information about the receipt of materials at a location, for example, at a site or storeroom within an organization. A shipment receipt record contains details such as the quantity of items that are received, the date of receipt, and the locations of the source and destination storerooms.
A record that contains information about the transfer of materials between source and destination storerooms, such as between two sites within an organization. A shipment record contains details such as the delivery method, the quantity of items, the date of the shipment, and the storeroom locations.
The status of a shipment during the delivery cycle, such as loaded, departed, arrived, or unloaded. See also plan status.
A condition of a shipment that is bound to a quote. The terms can specify the period within which the payment is to be made by the customer or the carrier service that will be used to fulfill the products in the quote.
ship order total pricing rule
A pricing rule that changes the total shipping charges charged to a customer based on the order total. For example, an organization can create a pricing rule under which a customer can avail a 100% discount on shipping charges if the customer buys goods worth $5000 or more.
The manufacturer, retailer, or other organization that manages contracts, shipments, and freight payments. The shipper organization can also work with vendors and suppliers that might not be licensed to use Sterling TMS.
A company that provides shipping services from a fulfillment center to a customer. See also fulfillment center.
The packaging units, such as a pallets or cartons, that are specified in a shipment manifest. A shipment can contain one or more shipping units. Each shipping unit can contain one or more items.
See simple HISAM.
See short-hold mode.
See shared memory ID.
shopping flow URL
A controller command that has a URL interface and is run from a store interface. See also redirection URL.
The language that is used when displaying pages to a particular customer. See also preferred language.
The act of either manually or automatically resolving inventory shortages that are detected. Inventory shortages can be resolved by placing an order for the additional quantity, or by canceling some of the orders placed at a later date for the item that has the inventory shortage.
The evaluation of Boolean expressions with AND and OR such that the right operand is not evaluated if the result of the operation can be determined by evaluating the left operand. The evaluation of the expression is always from left to right.
See keyboard shortcut.
A brief description of a term in a business glossary. See also long description.
The processing path that takes the shortest time to complete of all parallel paths in a process instance, where each path considered begins at a start node or an input to the process and ends at a terminate node.
Shortest Path First (SPF)
A routing algorithm in which each router uses the length of the path to determine the shortest-path spanning tree. Shortest Path First is used by link-state routing protocols. See also link-state routing protocol.
See coded character set identifier.
short-hold mode (SHM)
A mode specified during configuration that allows the DTE to connect or reconnect when no data is being transmitted over a circuit-switched line, while maintaining the logical connection of the sessions across the circuit.
In query management, the set of language-specific interfaces that allow commands to run that do not require access to program variables. The short interface includes the communications area, command length, and command string.
Short Message Service (SMS)
A message service that is used to send alphanumeric messages that are 160 characters or less between mobile phones. See also Multimedia Messaging Service.
Short Message Service Center (SMSC)
A component of the mobile telephony network, specified by the GSM group of standards, that provides for exchange of alphanumeric messages of less than 160 bytes. Messages can be exchanged between different types of system such as mobile telephone, alphanumeric pager, terminal, email, telex, or DTMF telephone.
The condition in CICS that occurs when requests for storage from the dynamic storage areas exceed available storage. CICS cannot satisfy these requests, or can satisfy them only by using some of the storage cushion, even when all programs that are eligible for deletion, and are not in use, have been deleted. See also program compression, storage cushion.
A transformer program for function shipping over MRO links. It is designed to optimize the pathlength involved in the construction of the TIOAs send on an MRO session for function shipping.
short wavelength (SWL)
A type of fiber optic cabling that is based on 850-mm lasers and supports 1.0625-Gbps link speeds. SWL can also refer to the type of gigabit interface converter (GBIC) or small form-factor pluggable (SFP). See also long wavelength.
A card that presents information to respondents. For example, a show card can format a category list in a larger font so that interviewers can show the card to respondents instead of reading out loud the list of categories.
A feature that can determine if the supplier is favorable or not favorable for business. When a question or questionnaire is designated as a show-stopper, the suppliers must attain the minimum score required for it. If a supplier does not achieve the required score, buyers may not consider them favorable for business.
- The process of breaking up an XML document for storage in database tables.
- See decomposition.
A method of wrapping and sealing materials by surrounding them with plastic and then shrinking the plastic by applying heat. This method is used for protection during transportation or storage, as well as a safety sealant.
See simple hierarchical sequential access method.
The status of a unit of recovery that has failed at one of the following points: while in doubt during a two-phase commit process; while attempting to commit changes to resources at the end of the unit of recovery; or while attempting to back out the unit of recovery. If a unit of recovery fails for one of these reasons, it is removed (shunted) from the primary system log to the secondary system log pending recovery from the failure.
Pertaining to the status of a UOW that has failed at one of the following points: while in-doubt during a two-phase commit process, while attempting to commit changes to resources at the end of the UOW, while attempting to back out the UOW, or if a UOW fails for one of these reasons, it is removed (shunted) from the primary system log (DFHLOG) to the secondary system log (DFHSHUNT) pending recovery from the failure.
The process of suspending a unit of work in order to allow time to resolve the problem that has caused the suspension. Shunting releases the user's terminal, virtual storage, and CP resources, and allows completion of the unit of work to be deferred for as long as necessary.
- The process of ending operation of a system or a subsystem by following a defined procedure.
- A status condition that describes when the cluster is shut down as intended.
See soft hyphen.
See shift-in character.
See session information block.
- Children of the same parent window.
- In a database outline, any member that is at the same branch level as another member. For example, Quarter 1, Quarter 2, and Quarter 3 are siblings.
Two or more occurrences of different sibling segment types having a common parent segment occurrence. See also twin segments.
See service integration bus.
In Performance Toolbox, a value that is incremented continuously. Instruments show the delta (change) in the value between observations, divided by the elapsed time, representing a rate per second.
- See SCCS identification.
- See security identifier.
- See shipment identifier.
- See subject identifier.
- See source ID.
See physical partition.
- An undesirable result caused by altering the values of nonlocal variables by a procedure or function.
- A change in the state of the execution environment.
A storage area used to maintain copies of tracks within a concurrent copy domain. A concurrent copy operation maintains one sidefile in storage control cache and another in processor storage.
- In OSI, system-defined values that are used as the initial values of certain parameters. In OSI Communications Subsystem, side information is a combination of (a) information in the OSI Communications Subsystem information base, and (b) information provided by directory service.
- System-defined variables that are used for the initial values of the communications element of the SAA Common Programming Interface partner_LU_name, mode_name, and TP_name characteristics.
See signaling information field.
The copying of a value from a higher-level resource to a lower-level resource. The sift-down effect applies to many of the keywords and operands in NCP and VTAM definition statements.
See silicon-germanium technology.
To attach a unique electronic signature, derived from the sender's user ID, to a document or field when a document is mailed. Signing mail ensures that if an unauthorized user creates a new copy of a user's ID, the unauthorized user cannot forge signatures with it. In addition, the signature verifies that no one has tampered with the data while the message was in transit.
- In replication, an SQL statement that allows communication with the Capture program and the Q Capture program. A signal is inserted into the signal control table and received by the Capture program or the Q Capture program when the program reads the log entry for the signal insert.
- A mechanism by which a process can be notified of, or affected by, an event occurring in the system. Examples of such events include hardware exceptions and specific actions by processes.
- A condition that might or might not be reported during program execution. For example, a signal can represent erroneous arithmetic operations, such as division by zero.
- In operating system operations, a method of inter-process communication that simulates software interrupts.
- In UML modeling, model elements that specify one-way, asynchronous communications between active objects and that are independent of the classifiers that handle them.
signal catching function
See signal handler.
Signal Computing bus (SCbus)
A time division multiplexed (TDM) hardware bus originated by Dialogic to interconnect different vendors' computer telephony adapters. Specified as part of Signal Computing System Architecture (SCSA).
Signal Computing System Architecture (SCSA)
An architecture defined by Dialogic to support interoperability of software and hardware components developed by different vendors in the computer telephony industry.
In OSI, an error detected but not recovered by the network layer. The error is signaled to the transport layer for action. For example, the network connection is lost and reset to a known state, possibly with loss of data, but the connection remains available for use. See also residual error.
- In WebSphere MQ for z/OS and WebSphere MQ for Windows, a feature that allows the operating system to notify a program when an expected message arrives on a queue.
- The exchange of control information between functional parts of the system in a telecommunications network.
signaling link code (SLC)
A code that identifies a particular signaling link connecting the destination and originating signaling points. This is used in MTP signaling network management messages to indicate the signaling link to which the message relates.
signaling NaN (sNaN)
In decimal floating-point operations, a value, not interpreted as a mathematical value, that contains a mask and a sequence of floating-point digits and that causes an invalid operation condition if used in certain arithmetic operations. See also decimal floating-point number.
A DirectTalk component that controls signaling for an exchange data link or common-channel signaling protocol. Some signaling processes are supplied with DirectTalk, and others can be custom-written.
A signal, such as resource reservation setup protocol (RSVP), that carries an admission control request to a network. The signal requests bandwidth resource according to an application's request. To get quality of service from a network, systems need to use signaling protocols.
- A code in a policy that determines what an agent can detect.
- The set of unique information that identifies a software application, such as the name, version, and file size of an application. See also signature candidate.
- The collection of types associated with a method. The signature includes the type of the return value, if any, as well as the number, order, and type of each of the method's arguments.
- The name and parameters of a behavioral feature.
- A value that identifies the interfaces supported by a service program. Signatures are based on the exports and the sequence of the exports allowed from a service program.
In DCE Security, pertaining to information that is appended to an enciphered summary of the information. This information is used to ensure the integrity of the data, the authenticity of the originator, and the unambiguous relationship between the originator and the data.
- The trusted certificate entry that is typically in a truststore file.
- The digital certificate that validates the issuer of a certificate. For a CA, the signer certificate is the root CA certificate. For a user who creates a self-signed certificate for testing purposes, the signer certificate is the user's personal certificate. See also truststore.
The program interruption that occurs when the resulting fraction in a floating-point addition or subtraction instruction is zero. This program interruption can be disabled through a program mask-bit setting.
- In binary floating-point format, the part of a number that contains the whole number and fraction.
- The significant digits of a floating-point number.
significant architectural requirement (SAR)
In the Reusable Asset Specification (RAS), a functional requirement, system property or constraint that influences significant architectural decisions. Not all requirements are equally important from the architectural point of view. Those requirements that impact architecture the most are grouped together into a set called SARs.
State data that keeps a resource from being deleted in Resource Manager (RM) when the resource is no longer active on any IMS. See also state data.
- A number or series of numbers to the right of a decimal point.
- Any number of a series of numbers that follows the farthest left number, that is not a zero, and that is within the accuracy allowed.
A resource status classified as significant. In addition to being recoverable, if the resource status is specified as significant, the resource cannot be deleted after a terminal logoff, a user signoff, or an IMS restart.
The act a terminal user performs in order to end an identification of a user to IMS. When the terminal is an ETO terminal, the signoff process usually disconnects the user structure from the terminal structure and deletes the user structure.
- The procedure by which the user starts working at a workstation.
- A request made by an application process or terminal user to verify authorization to use resources.
sign-on table (SNT)
A table holding terminal operator data, including the operator name, password, and operator priority. Each entry in the table contains data used by CICS to verify an operator name and to establish a priority and operator class for transactions entered by the operator.
An installation that does not send messages to the console but instead stores messages and errors in log files. A silent installation can use response files for data input. See also response file, unattended installation.
A method for installing or uninstalling a product component from the command line with no GUI display. When using silent mode, you specify the data required by the installation or uninstallation program directly on the command line or in a file (called an option file or response file).
silicon-germanium technology (SiGe)
A technology that makes possible the design of complex chips that integrate the functions of a cellular telephone, an emailbox and an Internet browser into a hand-held information device with rapid data transfer capability.
See Subscriber Identity Module card.
See single-instruction, multiple-data.
See single inline memory module.
Simple API for XML (SAX)
An event-driven, serial-access protocol for accessing XML documents, used. A Java-only API, SAX is used by most servlets and network programs to transmit and receive XML documents. See also Document Object Model.
An attribute in a business object that contains only one value. Valid attribute types for simple attributes include String and Integer. See also array attribute, attribute, single-cardinality attribute.
In COBOL, one of the conditions chosen from the following set of conditions: relational condition, class condition, condition-name condition, switch-status condition, sign condition. See also complex condition.
See basic disk.
- An item in the source or target document that does not contain child items, only data. For example: EDI data elements, ROD fields, XML attributes, and XML PCData values. See also complex element, element.
- In Enterprise Service Tools, a field in a message that is based on a simple type. A simple element can repeat, and it can define a default or a fixed value.
simple identity relationship
An identity relationship that relates two business objects through a single-attribute key. Each business object that participates in the simple identity relationship contains a key with a single unique value that identifies it.
A lowercase letter. See also capital letter.
A list of like values; for example, a list of user names. See also mixed list.
simple name server
A switch service that stores names, addresses, and attributes for up to 15 minutes, and provides them as required to other devices in the fabric. SNS is defined by Fibre Channel standards and exists at a well-known address. See also Fibre Channel service.
Simple Network Management Protocol (SNMP)
A set of protocols for monitoring systems and devices in complex networks. Information about managed devices is defined and stored in a Management Information Base (MIB). See also Management Information Base, SNMP agent, SNMP data source adapter, SNMP manager, SNMP trap.
An SLC that is created by specifying values for basic parameters and giving the SLC a name and a description. When a simple SLC is created, all of the necessary supporting objects are also created. See also service level criteria, standard SLC, wildcard SLC, workflow SLC.
simple text language (STL)
A language that uses the single-byte character set. Simple text languages have the following characteristics: (a) the total number of alphabetic and other characters needed by these languages are small and are containable in single-byte encodings; (b) the languages are written unidirectionally left to right and top to bottom; (c) each character is assigned a single code position and does not utilize any combining sequence representation; (d) the languages are non-ideographic, that is, they use words consisting of one or more characters from their alphabets. See also complex text language, ideographic language.
- In the XML, a type that cannot have element content and cannot carry attributes. Elements that contain numbers (and strings, and dates, and so on) but do not contain any sub-elements are said to have simple types.
- A characteristic of a simple element that defines the type of data in a message (for example, string, integer, or float). In XML, a simple type cannot have element content and cannot carry attributes. See also complex type.
- Pertaining to printing on only one side of the paper. See also tumble.
- Pertaining to communication that carries a signal in one direction only. Radio transmission is an example of simplex communication.
An algorithm for solving linear programming problems by testing adjacent vertices of the feasible set in a sequence such that at each new vertex the objective function is either unchanged or improved.
The state of a volume that is not part of a dual-copy or a remote-copy volume pair. Ending a volume pair returns the two devices to the simplex state, in which there is no longer any capability for either automatic updates of the secondary device or for logging changes.
- Characters defined and used in the People's Republic of China and Singapore. Simplified Chinese characters are derived from Traditional Chinese characters in one of two ways: 1. Remove or simplify the strokes of the Traditional Chinese character; 2. Replace the Traditional Chinese character by another (simpler) Traditional Chinese character. See also Traditional Chinese.
- The Chinese character set that has been simplified by reducing the number of strokes in common characters and deleting complicated variants. Simplified Chinese characters are used primarily in the People's Republic of China.
Simplified Chinese double-byte character set
An IBM-defined double-byte character set for Simplified Chinese. It consists of Simplified Chinese non-Chinese set, primary set, secondary set, and up to 1,880 user-definable characters.
Simplified Chinese non-Chinese character set
A subset of the Simplified Chinese DBCS, consisting of non-Chinese characters, such as Latin alphabet, Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana, Hiragana, Japanese, special symbols, and Chinese phonetic symbols. There are 712 characters in this set.
Simplified Policy Language
A human-readable syntax for the Autonomic Computing Policy Language and policy templates. See also Autonomic Computing Policy Language.
A mathematical technique that is assisted by a temperature scheme to find a good approximation of the optimum with respect to a certain goal. In graph layout, simulated annealing is used to place labels in such a way that they do not overlap with one another or with nodes and links.
A faster-than-real-time performance of a process. Simulation enables organizations to observe how a process will perform in response to variations of inputs to the process, just as in a real-life work environment.
A copy of a process model and the elements on which it depends, augmented with simulation attributes, that you use to run a simulation. Each simulation profile in a snapshot is based on the process as it existed at the time that the snapshot was taken.
A record of the complete process model in a state that you want to preserve for simulation purposes. This record contains a copy of all the project elements the process uses, as well as any additional project elements.
An environment for staging code that is written for a different platform. Simulators are used to develop and test code in the same IDE, but then deploy that code to its specific platform. For example, one can develop code for a BlackBerry device on a computer, then test it using a simulator on that computer.
simultaneous multithreading (SMT)
A processor design that combines hardware multithreading with superscalar processor technology. Using SMT, a single physical processor emulates multiple processors by enabling multiple threads to issue instructions simultaneously during each cycle.
simultaneous peripheral operation online
In a data-sharing environment, a coupling facility structure that contains only one VSO DEDB area. See also multiple-area structure.
A setting allowing an action to be carried out by a single person. See also dual authorization.
single buffer mode
In GL, a mode in which the frame buffer bitplanes are organized into a single large frame buffer. This frame buffer is the one currently displayed and is also the one in which all drawing occurs.
A character that uses one byte of storage. Because a single byte can store values in the range of 0 to 255, it can uniquely identify 256 characters. With these code sets, an application can assume that one character is always stored in one byte. See also 8-bit character, multibyte character.
single-byte character set (SBCS)
A coded character set in which each character is represented by a 1-byte code. A 1-byte code point allows representation of up to 256 characters. See also double-byte character set, multibyte character set.
Single-Byte Command Code Sets Connection (SBCON)
The standard, approved by the American National Standards Institute (ANSI), for the command set used by ESCON and FICON, known as FC-SB as used over a standard fibre-channel physical interface.
See single-byte coded font.
An attribute that represents a single value, which may be either a simple attribute or a single child business object. When this attribute represents a child business object, its type is the same as that of the business object it represents. See also array attribute, attribute, child business object, simple attribute.
single-cluster control data set
In DFSMShsm, a migration control data set (MCDS) or backup control data set (BCDS) that is represented by a single, Virtual Storage Access Method (VSAM), key-sequenced data set (KSDS) cluster. The cluster can be a key-range cluster or a cluster not employing a key range.
A reusable deployment environment architecture for IBM Business Process Management products and solutions in which the functional components of the environment (messaging, support, web-based components, and application deployment) are on one cluster.
Single Digital Trunk Processor
The combination of a single digital signal processing card and supporting equipment that provides high-level voice compression, high voice quality, and digital telephone signaling functions (transmit and receive) using an external shielded cable to an attached IBM RS/6000 computer. The Single Digital Trunk Processor supports one T1 or E1 trunk. See also Multiple Digital Trunk Processor.
Fonts with a single entry in the Map Coded Font structured field. This includes all single-byte fonts and those double-byte fonts being defined as coded fonts. See also multiple-entry font.
A semantic variation of generalization in which a type may have only one supertype. See also multiple inheritance.
single inline memory module (SIMM)
In computer hardware, a small circuit card that carries a number of surface-mounted memory chips in a space-saving configuration with the connector pins protruding in a single line from the edge of the card. Varying numbers of SIMMs can be plugged easily into slots in a memory board to expand random access memory. See also dual inline memory module.
single instance queue manager
A queue manager that does not have multiple instances. See also multi-instance queue manager.
single lock manager
A concept where locks for database resources shared between programs or subsystems are handled by one control point. Either an IRLM or a Program Isolation locking function can be invoked for the subsystem.
A method of recording WebSphere MQ for z/OS activity where each change is recorded on one data set only. See also dual logging.
single message mode
A processing mode in which synchronization points occur as each message is read from the queue, as well as at application termination. See also message mode, multiple message mode.
single-mode optical fiber
An optical fiber in which only the lowest-order bound mode (which can consist of a pair of orthogonally polarized fields) can propagate at the wavelength of interest. See also multimode optical fiber.
An environment that supports one MVS image. See also MVS image.
A cluster whose configuration is preserved when an application is installed and other nodes are added. Single-node clusters are used when an operating system has configured dependencies between applications running on a single node and application monitors for the applications.
A method in which a program can commit updates to a commitment resource without coordinating those updates with updates the program has made to resources controlled by another resource manager.
single point of control (SPOC)
In a sysplex, a method for managing multiple subsystems as if they were one system. For example, instead of entering commands on each subsystem, a user can enter commands from one SPOC and the commands will run on each subsystem in the sysplex.
- An environment in which one failure can result in simultaneous loss of both the coupling facility (CF) list structure for a log stream and the local storage-buffer copy.
- A configuration in which a critical cluster function is provided by a single component. If that component fails, the cluster has no alternative way to provide that function and essential services become unavailable.
single port sharing
An arrangement for short-hold mode operation in which each port is shared by a set of DTEs, with the restriction that all reconnection calls (recalls) must use the same port as the first call for that logical connection.
- The specification that causes the floating-point value to be stored internally in the short format. See also double precision.
- The use of one computer word to represent a number, in accordance with the required precision.
single-precision floating-point number
A 32-bit approximate representation of a real number. See also floating-point number.
single response variable
A categorical variable that can have only one value for each case, such as a variable based on a question that requires the respondent to choose one answer from a predefined set of answers.
A classification model used in conjunction with the DB2 access control module, or RACF external security module, to construct DB2 classes with the subsystem ID as part of the class name. See also multiple-subsystem scope.
- The collection and presentation of data about multiple CICS systems as though they were a single CICS system. In CICSPlex SM, the single-system image is provided by the CICSPlex SM address space (CMAS).
- A cluster of DirectTalk systems that are connected together using a local area network. Each system (known as a node) in the cluster is configured as either a client or a server.
A sysplex in which only one system can be initialized as part of the sysplex. In a single-system sysplex, cross-system coupling facility (XCF) provides XCF services on the system, but does not provide signaling services between MVS systems.
In CICS, a test of a single application or transaction running by itself. See also multithread test.
singleton implicit transaction
A single-statement transaction that does not require either a BEGIN WORK or a COMMIT WORK statement. This type of transaction can occur only in a database that is not ANSI compliant, but that supports transaction logging. See also explicit transaction, implicit transaction.
Pertaining to a model element whose Multiplicity Type:: upper attribute is set to 1. See also multivalued.
- A port that takes voice data from the SCBus. See also source.
- Any external format to which data can be written out. Sink examples include database, files, console output, and sockets.
See Session Initiation Protocol.
A Session Initiation Protocol (SIP) servlet that performs SIP signaling to back-end applications of the SIP server, such as the presence server or instant messaging server. See also Session Initiation Protocol.
See Standiseringskommissionen I Sverige.
See system initialization table.
- A location containing a node or nodes with access to either the production copy or mirror copy. The sites can be in close proximity or geographically dispersed.
- The set of components that monitor and control agents.
- A representation of a geographical location where resources are well connected through a fast, reliable LAN. Object stores, storage areas, content cache areas, index areas, and virtual servers are all associated with an individual site.
- A work location, such as a plant or facility. See also organization.
- The place at which a customer, a plant, a warehouse, or a hub is located. See also hub, shipment.
- A subdivision of an organization that can track inventory and other data separately from other sites.
- A location in a network that holds Active Directory servers. A site is defined as one or more well-connected TCP/IP subnets.
The association of a location with each storage system in a session. Site awareness ensures that a volume can only be selected for a session if it matches the location of the site. Site awareness helps to prevent both reversing a hardware relationship and selecting volumes at the wrong location.
- A certificate that is associated with an off-platform server or other network entity, such as a peer VPN server.
- A certificate obtained for an individual site. A site certificate is different from a trusted root certificate in that a site certificate lets you access only a specific site. A trusted root certificate lets you access any servers with certificates issued from that trusted root certificate authority.
A configuration setting that determines the FileNet P8 client appearance, behavior, and connectivity. Administrators can set site preferences for their site. Non-administrative users can set personal preferences, which override some site preferences.
site primary node
In cross-site mirroring, a node that owns the independent disk pool, either the production copy or mirror copy, at a particular site. The production-site primary node is also the primary node for the cluster resource group. The mirror-site primary node is a backup node in a cluster resource group.
A search that a customer performs on your online store using the search features that your store offers. For example, the customer searches using the search box in the store header for something specifically in your store.
- A set of conditions that, when met, creates an event. See also attribute group, condition, event.
- See event rule.
- A significant occurrence that is detected when a set of conditions are met. For example, exceeding the limits of a Key Performance Indicator (KPI).
- Any significant change in the state of a system resource, as represented in a Common Base Event. An event can be generated for a situation, such as a problem, the resolution of a problem, or the successful completion of a task. See also Common Base Event.
See smallest installable unit.
An approach to business which requires a very high level of quality with only 3.4 defects, failures, or errors per million measurable units of product and service. See also Green Sigma.
A bean created from an existing WSDL document that contains a set of methods that corresponds to the operations described in the document. When the bean is created, each method has a trivial implementation that can be replaced by editing the bean.
- The time difference between two clocks or clock values.
- The position of being slanted or tilted; oblique.
skills planner (SP)
The person who analyses skills gaps, identifies or obtains possible skills solutions, and builds the skills plan to close the gap. The SP identifies the need for new skills and templates. The SP works closely with Market Planning to quantify skills and resources needed, and plans both internal and sub-contractor skill and resource needs.
- A move of the current print position to another location.
- To ignore one or more instructions in a sequence of instructions.
Pertaining to a configurable data entry feature that enables the system to automatically insert a defined data value into fields that the system skips based on previous responses and implemented logic.
A line-printer control in line data that allows space to be left between print lines. This control is compatible with page printers when the data is formatted by page definitions.
See stock keeping unit.
See standard label.
See service level agreement.
A variable that is introduced into the standard formulation of a problem so that a constraint can be expressed as a strict equality instead of a “less than or equal to” OR “greater than or equal to” inequality.
See system log data set.
See session-level encryption.
- A single iteration of a grid or loop. See also loop.
- A view of a cube saved as a standard spreadsheet that retains a bi-directional link to the cube so that changes made in either the cube or in the slice are available in both locations.
- A subset of a multidimensional array that corresponds to a single value for one or more members of the dimensions not in the subset. For example, if the member Actuals is selected from the Scenario dimension, then the sub-cube of all the remaining dimensions is the slice that is specified.
- The set of blocks that contains pages with data having a certain value of one of the clustering dimensions.
A mathematical technique for processing a sparse matrix. It consists of creating pairs of values that identify cells of interest, as opposed to empty cells. The pairs of values can be used to set up processing loops. In OPL, the process of defining constraints with nested iterations on filtering conditions.
- To move a slider interface item horizontally on a touchscreen. Typically, apps use slide gestures to lock and unlock phones, or toggle options. See also gesture.
- Hardware attached to a device that moves the device in and out of the rack in a drawer-like action. See also rail.
- A control that uses a track and arm to set a value from among the available values. The position of the arm (or a separate indicator) gives the currently set value.
- An interface element that moves from one end of a track to the other.
See second-level interrupt handler.
See thin client.
See Serial Line Internet Protocol.
See service level management.
See service level objective.
- A section of a JSP set aside for displaying personalized data or content.
- A long electrical socket inside the system unit into which an electronic circuit board (card) is installed.
- A space in a library where a cartridge is stored. See also cell.
- A sub-location within a maintenance location. For example, a railway depot or an aircraft hangar may be sub-divided into slots so that maintenance tasks can be allocated.
- For a fixed-length relative record data set (RRDS), the data area addressed by a relative record number that may contain a record or be empty.
See service slot spanning.
See Service Location Protocol.
See Software License Review.
See signaling link selection.
See secondary logical unit.
An LU0 protocol defined by IMS as a protocol to communicate between a programmable workstation, such as a 4700, and IMS. IMS is the Primary Logical Unit (PLU) and the workstation is the Secondary Logical Unit (SLU) in the connection.
See statement local variable.
See shipment mode.
See systems management application entity.
Small Computer System Interface (SCSI)
An ANSI-standard electronic interface that allows personal computers to communicate with peripheral hardware, such as disk drives, tape drives, CD-ROM drives, printers, and scanners faster and more flexibly than previous interfaces. See also fixed-block device, iSCSI, open system, SCSI device, target.
small-data-set packing (SDSP)
In DFSMShsm, the process used to migrate data sets that contain actual data that is equal to or less than a specified amount. The data sets are written as one or more records into a Virtual Storage Access Method (VSAM) data set on a migration-level-1 volume.
small-data-set-packing data set
In DFSMShsm, a Virtual Storage Access Method (VSAM) key-sequenced data set (KSDS) allocated on a migration-level-1 volume and containing small data sets that have been migrated.
smallest installable unit (SIU)
The file or set of files that comprise the atomic (non-aggregated) installable unit (IU) that is intended to be deployed into a single hosting environment. The SIU delivers the capability of the IU and its descriptor. An SIU can be added and aggregated with other IUs into a container installable unit (CIU) or into a solution module. See also container installable unit, hosting environment, solution module.
In the vi editor, a contiguous set of alphanumeric characters bounded on at least one end with a character that is not a blank, a tab, or a new-line indicator. For example, in the word isn't, the two sets of characters isn and t are small words.
See system-managed access-path protection.
A mobile telephone or tablet that functions more like a computer and less like a traditional telephone. Smartphones typically can function as an Internet browser, MP3 player, gaming platform, digital camera, email client, GPS, and more. See also smartphone, tablet.
An interconnected, enriched campus that provides on-the-ground knowledge that is being developed by social networks. A smarter campus provides a personalized and collaborative learning experience for students, and instant access to deep computing resources for researchers.
In the Smarter Planet initiative, exploration that integrates and processes geophysical and other relevant data to develop 3-D models of reservoirs. Smarter exploration can find previously inaccessible oil and gas reserves embedded beneath difficult terrain or the deepest ocean waters.
smarter food system
In the Smarter Planet initiative, a food system that has standards for quality, process, and accountability. Through these standards food can become safer, more affordable, sustainable, and efficient. See also track and trace service.
An IBM initiative to build instrumented, interconnected, and intelligent systems. Smarter Planet takes advantage of the increasing quality and amount of data and advanced analytics to understand complex systems and some of the most challenging problems within them.
smarter power grid
In the Smarter Planet initiative, a power grid that uses broadband data streams, digital sensors, and advanced analytics. Utilities can analyze demand in real time, source, and manage power more effectively, and give more control of usage to customers.
In the Smarter Planet initiative, a product that uses embedded systems so that a user can personalize and customize a product. Even after purchase, a smarter product has the capacity for continual and dynamic upgrading.
smarter reservoir management
In the Smarter Planet initiative, a reservoir management system that makes use of sensors embedded across pipes, pumps, and an entire field. Smarter reservoir management generates data that can be compared against historical trends and applied to optimize well performance.
In the Smarter Planet initiative, a traffic system, such as streets, bridges, intersections, signs, signals, and tolls, that is instrumented and interconnected. Smarter traffic aims to curb the increasing pressure urban development puts on commuting by reducing inefficiency and congestion in the system.
smart grid maturity model (SGMM)
A power grid that has reduced outages, improved responsiveness and efficiency, and is better equipped for future demand compared to traditional power grids. Smart grids are achieved through process improvement, increased automation, and better analysis.
smart large object
A large object that is stored in an sbspace, which has read, write, and seek properties (similar to a UNIX file), is recoverable, obeys transaction isolation modes, and can be retrieved in segments by an application. Smart large objects include BLOB and CLOB data types.
A device that measures the consumption of electricity, gas, or water to ensure reliable billing, to meet regulatory requirements, and to enable smart grid initiatives that support the intelligent utility network for a Smarter Planet.
A mobile phone that functions more like a computer and less like a traditional telephone. Smartphones typically can function as an Internet browser, MP3 player, gaming platform, digital camera, email client, GPS, and more. See also smart device.
smart wind farm
A wind farm that is equipped with sensors to collect data and monitor the health of a farm and operations. Sensors are placed on wind turbines to track wind levels and turbine output, and meteorological sensors around the farm measure wind speed and direction, temperature, pressure, and humidity at hub height, along the vertical blade extent and near the ground.
- See scheduler message block.
- See small and medium business.
- See Server Message Block.
- See system-managed buffering.
See system management BIOS.
See solution module descriptor.
See system-managed directory entry.
See Simplified Message Desk Interface.
See subject matter expert.
See System Management Facilities.
SMF product section
Component of a CICS monitoring or statistics SMF record. The SMF product section describes the CICS data section that follows it in the record and contains operational data pertaining to the processing of the data.
A collection of information about capacity and system management that is written to a Systems Management Facility (SMF) data set. Each SMF record includes information about the system's configuration, paging activity, and workload. See also RACF SMF data unload utility.
See Storage Management Initiative Specification.
See System Management Interface Tool.
See service message object.
See SMP/E for z/OS.
A program's ability to avoid any action that would cause functional or performance problems in an SMP environment. A program that is described as SMP efficient is generally assumed to be SMP safe as well. An SMP-efficient program has usually undergone additional changes to minimize incipient bottlenecks.
SMP Expansion Module
An IBM xSeries hardware option. It is a single module that contains microprocessors, disk cache, random access memory, and three SMP Expansion Port connections. Two SMP Expansion Modules can fit in a chassis.
See symmetrical multiprocessor system.
- See Software Management Services.
- See storage management subsystem.
- See system management services.
- See Short Message Service.
See Short Message Service Center.
A list of attributes that the storage management subsystem (SMS) applies to data sets having similar allocation (data class), performance (storage class), or backup and retention (management class) requirements.
SMS complex (SMSplex)
A group of one or more systems that share a common storage management subsystem (SMS) configuration. All systems in an SMSplex share a common set of SMS control data sets: the active control data set (ACDS) and the communications data set (COMMDS).
The entity that DFSMS uses to manage storage: a base configuration; definitions of storage management subsystem (SMS) classes, group, library, and drive definitions; and automatic class selection (ACS). See also active configuration, base configuration, source control data set.
See Short Message Service gateway.
See Simplified Message Service Interface.
See SMS complex.
SMS table space
See system-managed space table space.
The name of the VSAM server that provides VSAM record-level sharing (RLS). See also VSAM record-level sharing.
See Simple Mail Transfer Protocol.
See Simple Mail Transfer Protocol gateway.
A denial-of-service attack in which a spoofed source address is flooded with echo replies. The replies are caused when many ping (ICMP echo) requests using the spoofed source address are sent to one or more broadcast or multicast addresses.
See server multiplexer group connection.
See Systems Network Architecture.
SNA 3270 API
See SNA 3270 program interface.
In PSF, pertaining to a device that is linked to the host system through VTAM or ACF/VTAM and uses an SNA protocol to transfer data. See also TCP/IP-attached.
SNA distribution services
See Systems Network Architecture distribution services.
A user-configured (using the ADDCMNE command) batch job that is started in the subsystem specified on the communications entry when the system receives SNADS distribution from a sending system in the SNADS network. See also SNADS sender.
A user-configured (by using the CFGDSTSRV command to add the SNADS distribution queue) batch job that is started in the QSNADS subsystem, and sends distributions to another system in the SNADS network. See also SNADS receiver.
See Systems Network Architecture File Services.
See Systems Network Architecture File Services.
SNA/Management Services Transport
See Systems Network Architecture Management Services Transport.
See Systems Network Architecture Management Services Transport.
See signaling NaN.
The part of the user application network that conforms to the formats and protocols of Systems Network Architecture (SNA). The SNA network consists of network addressable units (NAUs), a gateway function, intermediate session routing function components, and the transport network.
SNA network interconnection (SNI)
The connection, by gateways, of two or more independent SNA networks to allow communication between logical units in those networks. The individual SNA networks retain their independence.
See Systems Network Architecture/network job entry.
See subnetwork access protocol.
The i5/OS software processes through which SNA data is passed from source secondary applications or devices to target primary applications. SNA pass-through supports LU session types 0 through 3.
A registered user exit program that is defined to be called from mail server framework user exit points. The mail server framework user exit points are referred to as ports by the mail server framework. Systems will snap-in the programs that are needed to operate.
snap-in provided information (SPIN)
An area where snap-in user exit points programs can store information that other snap-ins can use. SPIN provides a place where information relating to a specific recipient can be stored and used by snap-ins in the same user exit point or in different user exit points. The information that is stored in snap-in provided information is completely user defined and interpreted data.
- A record of backup data at a certain point in time.
- A collection of information about resources and the state of a virtual data center at a point in time.
- A statistical sample.
- A record of the current state of the database environment.
- In source control management, a collection of baselines that represents the configuration of a workspace or stream at a particular point in time.
- A point-in-time copy of an entire active file system.
- A copy of changed data in the active files and directories of a file system with the exception of the inode number, which is changed to allow application programs to distinguish between the snapshot and the active files and directories.
- A capture of information at a specific time for analysis. The information can be data, a project, or a branch.
- An image backup type that consists of a point-in-time view of a volume. See also image snapshot.
- The state of a project or branch as captured at a specific time.
- A capture of data at a point time for performance analysis.
- In Tivoli NetView, a copy of a map that reflects the topology and status of the map's nodes and links at a given moment in time.
- An image that is an exact copy of the original files or directories from which it was created.
See snap dump.
The result of taking snapshots of a consistency group. See also consistency group.
- A view that uses a local file system to access versions of elements.
- A view that is a replica of a view at the time a query was executed.
SNA remote job entry
See remote job entry.
SNASVCMG mode name
See SNA service manager mode name.
See SNA topology manager.
SNA topology manager (SNATM)
A component of NetView for MVS that dynamically collects status and topology data into the Resource Object Data Manager (RODM) for display by the NetView Graphic Monitor Facility (NGMF). SNATM includes the function formerly provided by the NetView APPN Topology and Accounting Manager (APPNTAM).
SNA upline facility (SNUF)
The communications support that allows a System i system to communicate with CICS/VS and IMS/VS application programs on a host system. For example, DHCF communicates with HCF and DSNX communicates with the NetView Distribution Manager program.
See switched network backup.
See SNA network interconnection.
See Storage Networking Industry Association.
The practice of monitoring or eavesdropping on electronic transmissions. Information that is sent across the Internet might pass through many routers before it reaches its destination. Any of those routers can sniff the transmission and attempt to interpret the information. Passwords or other confidential information that is sent in an unencrypted form might be discovered.
See SWIFTNet Link.
See Simple Network Management Protocol.
SNMP Access and Trap Forwarding
An IBM Director Agent feature that enables SNMP to access managed-system data. When installed on a managed system, this feature enables SNMP-based managers to poll the managed system and receive its alerts. If System Health Monitoring is installed on the managed system also, hardware alerts can be forwarded as SNMP traps.
- A device that reports information through the SNMP to SNMP managers. See also Simple Network Management Protocol.
- A server process that resides on a network node and is responsible for communicating with managers regarding that node. The node is represented as a managed object, which has various fields or variables that are defined in the appropriate MIB.
SNMP data source adapter (SNMP DSA)
A data source adapter that allows management information stored by SNMP agents to be set and retrieved. It also allows SNMP traps and notifications to be sent to SNMP managers. See also Simple Network Management Protocol.
See SNMP data source adapter.
- A host that collects information from SNMP agents through the SNMP. See also Simple Network Management Protocol.
- A managing system that runs a managing application or suite of applications. These applications depend on Management Information Base (MIB) objects for information that resides on the managed system. The SNMP manager generates requests for this MIB information, and an SNMP agent on the managed system responds to these requests.
An SNMP message sent from the SNMP agent to the SNMP manager. The message is initiated by the SNMP agent and is not a response to a message sent from the SNMP manager. See also Simple Network Management Protocol.
See secondary node.
A schema that represents a dimension in a series of tables that correspond to the levels of the dimensions. The primary key of each table is the member identifier of each level. Each table has a foreign key to the level above. See also metadata schema.
See set normal response mode.
See sign-on table.
See sign-on table terminal entry.
See SNA upline facility.
See Schweizerische Normen-Vereinigung.
See shift-out character.
See service-oriented architecture.
A lightweight, XML-based protocol for exchanging information in a decentralized, distributed environment. SOAP can be used to query and return information and invoke services across the Internet. See also web service.
The message domain that includes all messages that conform to the SOAP standard. To process a message, a message model for messages is created in this domain. See also BLOB domain, DataObject domain, IDoc domain, JMS domain, MIME domain, MRM domain, XML domain, XMLNS domain, XMLNSC domain.
Rules for serializing data over the SOAP protocol. SOAP encoding is based on a simple type system that is a generalization of the common features found in type systems in programming languages, databases, and semi-structured data.
An element in the SOAP envelope of a SOAP message that contains application-specific context information (for example, security information) that is associated with the SOAP request or response message.
A technique for defining test scenarios by reasoning about dramatic and exaggerated usage scenarios. Like a soap opera on television, these scenarios reflect "real life", but are condensed and exaggerated to depict dramatic instances of system use.
A program that interprets a message that belongs to the SOAP domain, and generates the corresponding tree from the bit stream on input, or the bit stream from the tree on output. The bit stream is a representation of an XML file.
See sphere of control.
See Serial Optical Channel Converter.
The process of building social networking bridges from online storefronts to external social networking sites by leveraging portable, online identities with WebSphere Commerce powered websites. See also social commerce.
A business that uses social media to communicate with customers and staff in real time without geographic restrictions. With social media, businesses can disseminate and collect large amount of data about products and customer and employee satisfaction.
The process of adding social networking capabilities to the framework of a store in order to integrate user-generated content into the storefront. Although social networking content can be viewed by any customer, it can only be created by registered customers. See also social bridging.
Online collaboration services that facilitate communication, file sharing, and networking. See also social network.
An online community where people with similar interests, needs, and goals can interact, make connections, and collaborate. See also follower, hashtag, social media, tweet, tweet, tweeter.
Society of Automotive Engineers (SAE)
A non-profit educational and scientific organization dedicated to advancing mobility technology to better serve humanity. The SAE is composed of over 90,000 engineers and scientists that develop technical information about all forms of self-propelled vehicles including automobiles, trucks and buses, off-highway equipment, aircraft, aerospace vehicles, marine, rail, and transit systems.
- An identifier that an application uses to uniquely identify an end point of communication. The user associates a protocol address with the socket by associating a socket address with the socket.
- A means for directing data to an application in a TCP/IP network using a unique identifier that is a combination of an IP address and a port number.
- A communications handle used by TCP/IP.
- In the Network Computing System (NCS), a port on a specific host; a communications end point that is accessible through a protocol family's addressing mechanism. A socket is identified by a socket address.
A data structure that uniquely identifies a specific communications end point. It also specifies the protocol family. For example, a TCP/IP socket address consists of a port number and a host address.
See socket application programming interface.
socket application programming interface (socket API)
An industry standard API that provides application programs with a connection-oriented or a connectionless transfer of data over multiple protocols.
- A client/server architecture that transports TCP/IP traffic through a secure gateway. A SOCKS server performs many of the same services that a proxy server does.
- A mechanism by which a secure proxy data channel can be established between two computers.
See SOCKS server.
See Sockets Secure.
A proxy server that provides a secure one-way connection through a firewall to server applications in a nonsecure network. The server applications in the secure network must be compatible with the socket interface.
See Scale out File Service.
A form of commitment control that differs from traditional commitment control in that it limits the number of times that the system writes journal entries that are associated with a transaction to disk. Soft commit improves transaction performance and guarantees transaction atomicity, but does not guarantee the durability of recently committed transactions in case of a system failure.
soft CPU shares
An attribute that defines the relative share of CPU resources on a host or LPAR that the WLM dispatcher allows a particular service class to use and exceed when additional CPU resources are available.
soft error page
A type of web page that provides information about why the requested web page cannot be returned. For example, instead of returning a simple status code, the HTTP server can return a page that explains the status code in detail.
soft hyphen (SHY)
A special character inserted automatically or by the user in a word to mark where the word can be divided, and displayed as a hyphen when the word must be divided at the end of the line because of lack of space. Also called syllable hyphen, discretionary hyphen, phantom hyphen. Soft hyphens are subject to hyphen drop, which makes sure that these characters do not appear when they are not needed.
A process whereby access to a dependent object is allowed to continue after an object on which it depends was dropped or modified by a DDL statement. The next explicit reference to the dependent object that requires the dynamic SQL cache to be accessed causes the dependent object to be recompiled.
A request for items or tools that is not yet defined by the need for the items within a specific time frame. A soft reservation does not reduce the available balance. When a reservation is classified as soft, the item is available for eventual issue from the list of reservations. See also hard reservation.
A resource that is not declared in a Map structured field but is sent to the printer inline with data. It cannot be reused during the job without being reloaded to the printer. See also hard resource.
- A policy according to which, if the end user starts the product and there are no licenses available, the product starts.
- A function that halts the system after all the business processes finish running.
The programs, procedures, rules, and associated documentation pertaining to the operation of a system. See also hardware.
- A portable representation of the contents of the software knowledge base that serves IT management applications including asset management, license management, and software provisioning. Catalog format and content might vary, depending on the target application. See also software knowledge base.
- All software defined in the data center model.
software compliance check
A compliance check that determines if a software application should be present on a computer. See also security compliance check.
The deployment configuration that describes how to install one or more installable software dependencies. It includes a list of installable files, software prerequisites, and advanced attributes. See also installable file.
The combination of software product, version, release, and variation that represents a software item in the software knowledge base. The product is the root of the hierarchy. See also parent software, release, software item, software knowledge base, variation, version.
- The process of restoring software from external media to a local file system. The software can require further processing, or configuration, before it is ready to use.
- The set of files that is created by an installable file.
- For z/OS platform software, the SMP/E target and distribution zones that are associated with a product set and the target and distribution libraries described by those zones. See also product set.
- An activation of an application system or environment.
A table mapping a raw keystroke to a display symbol, predefined function or string. Software keyboards that are shipped with the operating system are associated with languages (U.S. English, U.K. English, Danish, Japanese, and so on).
software knowledge base
A collection of information about distributed software products and components, dependencies between them, the means to discover them, and their basic licensing properties. The knowledge base is used to generate software catalogs that asset management tools can use for software inventory identification, license compliance, and software provisioning. See also parent software, software catalog, software hierarchy.
software license key
An authorization that regulates the use of software licensed programs. Software license keys need to be installed on the system when software is upgraded or moved, the hardware processor group is changed, additional license usage is added, or new software that requires license keys is purchased.
See software development lifecycle.
Software Management Services (SMS)
A set of offerings that provide the user with a consistent distribution, installation, and service strategy for both IBM licensed programs and System Manager-packaged programs.
- In software distribution, a compressed text file that describes the actions to perform on the target system to which it is distributed. See also stanza.
- A file that defines a collection of artifacts and the actions to take with those artifacts on the target system to which it is distributed.
software package block (SPB)
A file or set of files that can be included in a particular software deployment. Examples include an installation package, installation files for a patch downloaded from the vendor's website, or a software image.
software package definition (SPD)
A compressed text file that describes the actions to perform on the target system to which it is distributed. See also stanza.
Software Platform Extension (SPX)
The collection of architectures and specifications that define how the IBM software componentization strategy is implemented, and guide the changes to IBM software development processes, management systems, and culture.
A software item that is licensed independently of other software items. For licensing purposes, software products are sometimes bundled into a single sales offering. See also unconfirmed instance.
Installed software, software configurations, and application data that is created when a piece of software is installed. Software resources are defined by a software configuration template.
An automated process that discovers instances of software installed on the computers in a network. The software scan results include details about discovered software, such as version numbers. See also network scan, scan.
A differential image of software installed on top of a running operating system. Software snapshot creation is deprecated. Any previously created software snapshots can be deployed for backward compatibility.
A group of software applications licensed as a single unit; for example, an office software suite might include a spreadsheet application, a word processing application, and a photo editor.
software support facility (SSF)
An IBM online database that allows for storage and retrieval of information about all current authorized program analysis reports (APARs) and program temporary fixes (PTFs).
A way to organize software in the data center based on specific criteria. There are two types of software views. Public views are available to all users. Personal views are specific to the user account of the person who created them.
See start-of-header character.
Pertaining to the act of requesting information from an autonomic manager. See also unsolicited.
- In operations research, an assignment of values to variables that satisfies the constraints of the problem. If, in addition to satisfying the constraints, the assignment of values to variables also optimizes an objective function, then the solution is an optimal solution.
- In constraint programming, an assignment of values to variables that satisfies all the constraints of the problem, including any objective function. See also feasible.
- A predefined response to a commonly asked question or problem containing symptom, cause, and resolution information.
- A combination of products that addresses a particular customer problem or project. See also code project.
- A set of one or more related case types, tasks, steps, and other components that provide documents, data, business processing, and routing to case workers. For example, a solution for a human resources department might include a case type for new hires, a case type for retirement, and a case type for employee termination.
solution area segment
A grouping of customers or buyers within a market having similar requirements for business function. Solution area segments may be industry specific (e.g., physician practice management in the health industry) or may be cross-industry (e.g., general ledger within business management/accounting). Multiple applications may exist within a solution area segment. A segmentation structure for solution areas has been established for worldwide use within IBM, with segment definitions developed and approved by each industry organization for its functional areas.
The shortcomings or differences between market/customer requirements and existing available solutions. Gap identification is the basis for defining specifications for the development or acquisition of solutions to meet segment customer requirements (where existing solutions do not exist or are inadequate).
Solution Installation for Autonomic Computing
The core technology of the IBM Autonomic Computing initiative that provides a single, consistent installation technology that provides standard methods for determining dependencies, deploying and configuring components into a complex system, and analyzing the system for failed components.
A managed resource that represents a collection of other managed resources, which can be managed as a single unit. An example of a solution instance is a composite application that includes a set of J2EE applications, queues, and message flows.
The installable unit (IU) that aggregates smallest installable units (SIUs), container installable units (CIUs), and other solution modules for multiple hosting environments. The solution module also contains a descriptor for the SIUs, CIUs, and solution modules. See also installable unit, smallest installable unit.
solution module descriptor (SMD)
See installable unit deployment descriptor.
solution module installable unit
See solution module.
solution project manager (SPM)
The focal point for the development and deployment of the IT solution. The SPM is accountable for the performance of the IGS effort, including technical proposal, solution development, solution delivery and rollout,
A subset of the search space of a problem. It consists of only those tuples (of the Cartesian product of the domains of the variables) that satisfy the constraints. See also search space.
A queue of solve processes that are solved in the order in which they were submitted. Users can check on the progress of the current solve process or cancel it using menu options and toolbar buttons.
A specialized optimization engine for analyzing a model and providing feasible or optimal solutions for a problem that is expressed as an objective function. Examples of the optimization criteria are least cost, greatest profit.
See System Object Model.
See statement of requirements.
See Sales Out Reporting Tool.
A search that allows a client to receive search results sorted based on a list of criteria, where each criteria represents a sort key. This moves the responsibility of sorting from the client application to the server, where it might be done more efficiently.
- A procedure for placing items in order. Sorting can be done at various levels of sophistication. The simplest sorting uses the code points, whereas the sorting done for dictionaries must consider cultural and language values. See also cultural sort.
- The process of establishing a specific order for the information in a RequisitePro view. See also filtering, query.
sort-merge file description entry
In COBOL, an entry in the File Section of the Data Division that is composed of the level indicator SD, followed by a file name, and then followed by a set of file clauses as required.
The order in which characters are arranged within the computer to sort, combine, or compare data. A binary sort uses the internal representation of a character to sort characters in a sequence. When you use binary representation to sort characters, your resulting data may not be in the order that you expect.
- A port that places voice data on the SCBus. See also sink.
- A system, a program within a system, or a device that makes a request to a target.
- In VisualAge RPG, a part that can notify target parts whenever the state of the source part changes. A source part can have multiple targets.
- In advanced program-to-program communications, the system or program that starts jobs on another system.
- The markup-language pertaining to files that define a HATS project or one of its resources. Also the name of a folder contained in each HATS project.
- In distributed data management (DDM), the platform that originates a request for remote data. See also Distributed FileManager, target.
- A specified instance of an application that provides a service to the WebSphere Front Office environment. Each source is uniquely identified by its source name in the configuration file.
- The location from which information is to be sent. See also destination address.
- The IP address of a computer that sends a network packet.
An application whose data is collected from its operational data stores and placed into the central data warehouse using an extract, transform, and load (ETL) process. See also consumer application.
source call view
A display of the nodes in the Application Diagram which represent blocks of code within the source that can be called, such as RPG subroutines, RPG subprocedures, COBOL procedures, and main entry points. The connections represent calls between the blocks of code.
source catalog entry
A product or SKU that contains one or more merchandising associations. When a source catalog entry is displayed, the user can view the defined merchandising associations. See also target catalog entry.
A computer program in a format that is readable by people. Source code is converted into binary code that can be used by a computer. See also object code.
source code control
A utility that allows the user to share catalogs between developers where concurrent access to the catalogs is required. See also multi-developer support.
source code control system (SCCS)
A program for maintaining version control of the source files in a developing program. SCCS stores the changes made to a file instead of the changed file, thus allowing several versions of the same file to exist in the system.
source code data
Metadata, dependency properties, and other user-defined data that are created and updated periodically by running scanners against the source code. The data can be queried, edited, and used to analyze the impact of potential changes. Source code data is used by dependency builds to determine which dependant artifacts have changed and therefore require that buildable files be rebuilt.
source control data set
A linear data set (LDS) containing a storage management subsystem (SMS) configuration. The SMS configuration in an SCDS can be changed and validated using the Interactive Storage Management Facility (ISMF). See also active control data set, communications data set, control data set, SMS configuration.
A tool for debugging Integrated Language Environment (ILE) programs by displaying a representation of their source code. See also symbolic debugger.
A function that duplicates the semantics of another function, called a source function. Only scalar and aggregate functions can be sourced functions. See also function, routine, user-defined function.
source distributed data manager (SDDM)
In a distributed data management network, programming support that translates local data management requests for remote files or SQL requests for a remote database into a DDM request, establishes communications to the remote system where the data file or database is located, and sends the request to the remote (target) system for processing. See also target distributed data manager.
A file of programming code that is not compiled into machine language. See also data file.
source file variable
A text helper variable that holds the name of a file that contains an image or a recording of a question response, such as a .tiff file that contains a scanned image of a hand-written response or a sound file that contains a recording of an open-ended response in a CATI interview.
See source program.
- The node on which a data management event is generated.
- A node that can import data stored in a particular format. Supported formats include fixed- and variable-length field files, as well as file formats from other IBM and non-IBM products.
- In DB2 for i5/OS, the source in an i5/OS source file member used to create an SQL program.
- A set of host language statements and SQL statements that is processed by an SQL precompiler.
- A set of instructions that are written in a programming language and must be translated into machine language before the program can be run.
- In communications, the program that starts a session with a remote system. See also target program.
source queue manager
See local queue manager.
During software upgrades, the version, release, and modification level of the installed product before a new level of the product is installed. See also target release.
source route bridging
In LANs, a bridging method that uses the routing information field in the IEEE 802.5 medium access control (MAC) header of a frame to determine which rings or token-ring segments the frame must transit. The routing information field is inserted into the MAC header by the source node. The information in the routing information field is derived from explorer packets generated by the source host.
In LANs, a method by which the sending station determines the route the frame will follow and includes the routing information with the frame. Bridges then read the routing information to determine whether they should forward the frame.
- A database or subsystem that contains the source tables for replication.
- In distributed data management (DDM), the function that converts source requests to data streams containing DDM commands and output data, and sends them over the network to the target server.
- A server that is being upgraded with new hardware or software or whose data is being migrated.
source service access point (SSAP)
In SNA and TCP/IP, a logical address that allows a system to send data to a remote device from the appropriate communications support. See also destination service access point.
- In communications, the system that issues a request to establish communications with another system.
- In distributed data management (DDM), a system containing an application program that requests access to data in another system.
- The system that sends information in a network of systems that exchange objects and data. See also target system.
- The system that currently owns the production copy of an independent disk pool in a cross-site mirroring (XSM) environment. Changes to the production copy of an independent disk pool are replicated to all mirror copies of the independent disk pool that exist on backup nodes within the recovery domain.
A table that contains data that is to be replicated to a target table. See also target table.
- The data type from which a DISTINCT type is derived.
- An existing type that is used to internally represent a distinct type.
- In the application development tools, a characteristic of i5/OS members that allows the user to select a subset of the members available in a CoOperative Development Environment/400 session. Source types include i5/OS members with a particular member type.
source user ID
An ID which, when altered, has the change propagated to other systems by RRSF. See also target user ID.
A rule that controls which node, external organization, or group of nodes should be considered for sourcing a product or service request based on the product, product classification, ship-to region, and other parameters.
For IBM business, legal, marketing, or organizational contexts, the administrative region comprising France, some parts of Africa, Italy, Belgium, Netherlands, Luxembourg, Spain, Portugal, Greece, Italy, Turkey, and some parts of the Middle East. See also Europe, Middle East, and Africa, Northeast Europe.
See statement of work.
- See service provider.
- See support provider.
- See system performance.
- See solution provider.
- See skills planner.
See Scalable Parallel 2.
See scratchpad area.
- In a neutral circuit, an impulse that causes the loop to open or causes absence of signal. In a polar circuit, it causes the loop current to flow in a direction opposite to that for a mark impulse. A space impulse is equal to a binary zero.
- A graphic character with an IBM GCGID of SP010000. On a typewriter, the space character is produced by movement (spacing or escapement) that does not imprint a graphic character. Unlike other graphic characters, space can sometimes be eliminated or lost, as when a space between words occurs at the end of a line of text. See also null character, numeric space, required space.
- A sequence of one or more blank characters.
- An object on the drawing that is composed of closed boundaries that are created to track the area and perimeter of the object. When the database form contains the AREA and PERIMETER attributes, records of these values are maintained and updated automatically.
- A site intended for storage of data, such as a location in a storage medium.
- Any storage area that can be directly accessed, down to its individual (8-bit) bytes, by a machine interface user such as a program or procedure.
- A basic unit of area, usually the size of a single character.
See thin provisioning.
See thin-provisioned volume.
- The process of managing aged data sets on DFSMShsm-managed and migration volumes. The three types of space management are migration, deletion, and retirement.
- See hierarchical storage management.
space monitor daemon
A daemon that checks space usage on all file systems for which space management is active, and automatically starts threshold migration when space usage on a file system equals or exceeds its high threshold.
A plan that is used to provide an environment for a planner to work with a set of planning data (supply and demand) for a given set of locations (scope). Space plans are created under a portfolio plan or subplan in the portfolio planning hierarchy.
space token (STOKEN)
An 8-byte identifier for an address space, data space, or hiperspace. A STOKEN is similar to an address space identifier (ASID), except for two important differences: the system does not reuse the STOKEN value while a program is running and data spaces do not have ASIDs.
A logical component consisting of a base card, which connects to the digital trunk adapter in the RS/6000, and a trunk interface card (TIC), which manages the trunk connection to the switch. See also VPACK, XPACK.
See Strategic Position Analysis.
- A user-defined group of network resources within a single domain. Spans provide a level of security by allowing the system administrator to define (a) the resources to which an operator can issue commands, (b) the views of resources that an operator can display, and (c) the resources in a view that an operator is allowed to see (an operator might not be authorized to see all the resources in a particular view). See also span of control.
- An attribute of a policy that defines the range of influence of a policy in a policy hierarchy. For example, the span attribute indicates whether a policy in a policy hierarchy is inherited only by its immediate child nodes or by its immediate child nodes and all their descendents.
- In the Virtual Storage Access Method (VSAM), a logical record whose length exceeds control interval length and, as a result, crosses, or spans, one or more control interval boundaries within a single control area.
- A logical record stored in more than one block on a storage medium.
- A subgraph of a graph containing all the nodes of the graph and the minimal number of links of the graph to connect all the nodes.
- A loop-free subset of a network topology.
span of control
The total network resources over which a particular network operator has control. All the network resources listed in spans associated through profile definition with a particular network operator are within that operator's span of control. See also span.
The optimal number of spares that are needed to protect the drives in the array from failures. The system logs a warning event when the number of spares that protect the array drops below this number.
See resource pool.
A dimension in a multidimensional database that has a low probability for occupying one or more data point in every combination of dimensions that occurs. For example, in a typical multidimensional database, the products dimension is often sparse since not every product is sold in every market. See also dense dimension.
The fraction of zeroes in a matrix. If matrix A is m by n , and A(i, j) != 0 for k of its elements, its sparsity is k/mn . Large linear programs tend to be very sparse, increasing as the dimensions get large.
- A method to link coordinates to a reference, so that objects whose coordinates are expressed in different systems can be displayed in the same manager.
- In DB2 Spatial Extender, a set of parameters that includes coordinates that define the maximum possible extent of space that is referenced by a given range of coordinates, an identifier of the coordinate system from which the coordinates are derived, and numbers that convert coordinates into positive integers to improve performance when the coordinates are processed.
A feature of Serial Storage Architecture (SSA) that enables a device adapter (DA) loop to support many simultaneous read/write operations. See also Serial Storage Architecture.
A function in which a calling process (the parent process) creates a new process called a child process. The child process inherits attributes from the parent process. A new program is specified and starts running in the child process.
See software package block.
See system power control network.
See session-layer protocol data unit.
speaker-dependent speech recognition
Identification of spoken words based on knowledge of the speech characteristics of one speaker. See also speaker-independent speech recognition.
speaker-independent speech recognition
Identification of spoken words based on aggregated knowledge of the speech characteristics of a population of speakers. See also speaker-dependent speech recognition.
The types of authority a user can have to perform system functions, including all object authority, save system authority, job control authority, security administrator authority, spool control authority, service authority, and system configuration authority. See also specific authority.
A category that groups a set of regular categories from any level in the same dimension, without regard to their normal hierarchical organization. For example, in a dimension called Management that includes the levels Senior Management, Middle Management, and Junior Management, it is possible to have a special category called Social Committee that includes specific personnel from each of these levels.
- A graphic character that is not a letter, a digit, or a space character and not an ideogram.
- A non-alphabetic and non-numeric character, such as %, &, /, ?, ], and a number of other characters that have a unique function in the SQL language.
- A character other than a digit, a letter, or one of these characters: $, #, @, ., or _. For example, the following characters are special characters: *, +, and %.
- In COBOL, a character that is neither numeric nor alphabetic.
- In REXX, a token that acts as a delimiter when found outside a literal string. Special characters include the comma (,), semicolon (;), colon (:), right parenthesis ()), left parenthesis ((), and the individual characters from the operators.
- A character that is not alphabetic, numeric, or blank. For example, a comma (,) or an asterisk (*).
special-character keyboard set
In System i Access, an optional keyboard set, used by Western European countries and the Americas, that contains special characters like the Spanish tilde or the international currency symbol.
- On AIX, UNIX, or Linux systems, a file that defines devices for the system, or temporary files that are created by processes. There are three basic types of special files: first-in, first-out (FIFO); block; and character.
- A file that provides an interface to input or output devices. There is at least one special file for each device attached to the computer.
Material handling procedures required by law, customer requirement, or company policy. Items requiring special handling can include, for example, hazardous materials, breakable items, or items of high value.
A set of arithmetic or logical constraints that expresses complicated relations between variables, for example, relations that would require a large number of arithmetic constraints. Specialized constraints enter into such considerations as counting values, maintaining load weights, and other critical activities. In most of the cases, a specialized constraint achieves more domain reduction than the equivalent set of basic constraints, and in all cases it performs domain reduction more efficiently.
specialized IT audience
Users whose primary domain of knowledge relates to the technical tasks of information technology (IT). This includes users such as programmers, database administrators, and network administrators. See also general purpose audience.
- A storage area that is defined for an application process by the database manager and is used to store information that can be referenced in SQL statements. Examples are USER and CURRENT DATE. See also built-in global variable, global variable.
- In COBOL, compiler-created data items used to store information produced by specific COBOL features (for example, the DEBUG-ITEM special register).
Text that allows document-placement information from views to be automatically recalculated as a postprocessing step. After the column formulas in a view are calculated, special text is replaced with an integer. For this reason, although special text appears to be a number, it is not.
- A variable that is similar to a local or global variable, except that it is predefined in Data Interchange Services. Special variables are created during translation at the start of a document and cannot be created or maintained by the user.
- In REXX, a variable set automatically by the language processor. Special variables are RC, RESULT, and SIGL.
special weight (SW)
In cultural sorting, the weight of special characters such as the percent, ampersand, and punctuation symbols. See also alphanumeric weight, case weight, diacritical weight, indifferent weight, level 4, mark weight.
- A detailed document that provides a definitive description of a system for the purpose of developing or validating the system.
- A declarative description of what something is or does.
- A representation or definition of the attributes for items (item spec), categories (category spec), locations (location spec), imports (file spec), exports (destination spec), lookup tables (lookup spec), or scripts (script input spec).
A series of system interfaces, headers, and utilities. Specification 1170 is a superset (with some changes) of the POSIX 1003.1 and POSIX 1003.2 standards. Specification 1170 is also a superset of XPG4 Base. It includes sockets, the SVID real-time model for interprocess communications, and miscellaneous interfaces.
See attribute definition.
specification node attribute
The types of authority a user can be given to use the system resources, including object authorities and data authorities. See also special authority.
specific function name
A particular user-defined function that is known to the database manager by its specific name. Many specific user-defined functions can have the same function name. When a user-defined function is defined to the database, every function is assigned a specific name that is unique within its schema. Either the user can provide this name, or a default name is used.
Entry point or interface to a CICS domain. A specific gate gives access to a set of functions that are provided by that domain only. The functions are likely to be requested by many different callers.
See format resolution.
An individual member of a Sametime audience. See also audience.
Speech Recognition Control Language (SRCL)
In WebSphere Voice Server, a structured syntax and notation used to define speech grammars. SRCL defines annotations, repetitions, words, phrases, and associated rules.
See Shortest Path First.
sphere of control (SOC)
In SNA, a collection of network node control points for which another system is acting as a focal point. This collection includes both control points explicitly defined by the customer, if the controlling system is a primary focal point, and control points assumed by the system if the controlling system is a default focal point.
- See stub programming interface.
- See schedule performance index.
- See Security Policy Index.
- See system programming interface.
spill backup volume
A volume owned by DFSMShsm to which either all but the latest backup version of a data set are moved when more space is needed on a direct access storage device (DASD), daily, backup volume, or all valid versions are moved when a tape backup volume is recycled.
In Q replication, a dynamic queue that the Q Apply program creates to hold transactions that occur at the source table while a target table is being loaded. The Q Apply program later applies these transactions and then deletes the spill queue.
spill storage group
See overflow storage group.
See snap-in provided information.
A type of entry field that shows a scrollable ring of choices from which a user can select a choice. After the last choice is displayed, the first choice is displayed again. A user can also type a choice from the scrollable ring into the entry field without interacting with the spin button.
A UI function that increments or decrements a numeric value according to the specified increment until the maximum or minimum values are reached. A spinner can be applied to either a numeric field or to a date/time field that contains a "time" component.
See Stored Procedure Language.
See standard point location code.
An SPL routine that returns one or more values. See also stored procedure.
A separation of the nodes in a cluster by some type of communications failure. For example, in a four-node cluster, if two nodes are connected by a LAN switch that fails and the two nodes lose the communications link between the other two nodes, the cluster is deemed to have a split-brain incident. In a split-brain incident, each subset of nodes might behave as if it owned the resources that it had been configured to share; therefore, any coordination of those shared resources would result in unexpected behavior.
A type of failure in which communication with the remote site is lost, but the remote site does not fail. This situation leads to a mirror split with two live sites where neither site mirrors the data.
In OSI, the technique of a single transport connection using multiple network connections so that an application entity can use more than one line to send data on an association. Splitting can increase data throughput and resistance to network failure. It might be used, for example, to send a large file more quickly than if a single line were used. Splitting is available only with transport layer class 4.
A user-defined routine that is written in Stored Procedure Language (SPL). Its name, parameters, executable format, and other information are stored in the system catalog tables of a database. An SPL routine can be an SPL procedure or an SPL function. See also stored procedure, Stored Procedure Language.
See SNA Primary LU2 Support.
A variable that is declared with the DEFINE statement in an SPL routine. See also stored procedure.
See solution project manager.
See single program, multiple data.
See System Performance Measurement Interface.
See single point of control.
See secure point of entry.
spoofed source address
A source IP address that is not the actual source address of a datagram, but the address of a victim of an attack. All responses to the datagram are sent to this source IP address.
- The practice of masquerading as a trusted system to try to obtain confidential information. For example, when a would-be intruder sets up a client system with an IP address that is trusted by another system, it is called IP spoofing.
- The technique of faking the sending address of a transmission in order to gain illegal entry into a secure system.
- To reduce, through the use of auxiliary storage as buffer storage, processing delays when transferring data between peripheral equipment and the processors of a computer.
- The system function of putting files or jobs into disk storage for later processing or printing.
spool control authority
A special authority that allows the user to perform spooling functions, such as display, delete, hold, and release spooled files on the output queue for himself and other users. This authority also allows the user to change the spooled file attributes, such as the printer used to print the file.
A direct-access device used for intermediate storage of control blocks and data needed for processing jobs. During multiprocessing, the spool device becomes a collection point for job input data to be distributed to local mains, and for job output data coming from local mains on route to I/O devices attached to the global.
- A file containing output that has been saved for later printing.
- A file that is used in the transmission of data among devices.
- The sending of data to auxiliary storage for later processing. The most common spooling application is print spooling.
- The process of performing a peripheral operation such as printing while the computer is busy with other work.
A part of the system that provides the operating environment for the programs that read jobs onto job queues to wait for processing and write files from an output queue to an output device. IBM supplies one spooling subsystem: QSPL.
See Shared Product Object Tree.
A manual rate that the carrier submits for a shipment. The spot rate overrides the flat rate that is defined by the shipper. See also fixed rate.
A shipment status that indicates a carrier has placed the trailer at the destination. A user sets Drop Loaded Trailer as the status event, which causes the shipment status to change to Spotted.
See Subpool Queue Block.
See sync point services.
See strategy and plans team.
See Synergistic Processor Unit.
See SQL Processor Using File Input.
SPX Component Metamodel
A metamodel that defines the categories of software entities along with their characteristics and relationships in addition to features, capabilities, interfaces and versions, and clarifies how we can use these concepts to further clarify our component model. See also SPX component model, SPX Component Model Reference Architecture, SPX Component Modeling UML Profile.
SPX component model
A formal specification of specific offerings, assemblies, common components, and features that conforms to the SPX Component Metamodel and is created in the SPX Component Modeling UML Profile. See also SPX Component Metamodel, SPX Component Modeling UML Profile.
SPX Component Modeling UML Profile (SPX UML Profile)
A tool for visually modeling how software components can be shared among development teams in a way that is conformant to the SPX Component Metamodel. See also SPX Component Metamodel, SPX component model.
SPX Component Model Reference Architecture (CMRA)
A reference architecture that defines the SPX Component Metamodel. See also SPX Component Metamodel.
SPX model package
A container that provides a means to organize and specify visibility for software entities contained in an SPX component model. See also owner.
SPX UML Profile
See SPX Component Modeling UML Profile.
See system queue area.
See Structured Query Language.
SQL and XQuery compiler
A DB2 component that analyzes the semantics of an SQL or XQuery statement and produces an efficient executable form of the statement. See also section.
See SQL communication area.
SQL communication area (SQLCA)
A set of variables that provides an application program with information about the execution of its SQL statements, XQuery expressions, or requests from the database manager.
See SQL descriptor area.
SQL database DSA
A data source adaptor that retrieves information from relational databases and other data sources that provide a public interface through Java Database Connectivity (JDBC). SQL database DSAs also add, modify and delete information stored in these data sources.
SQL descriptor area (SQLDA)
A set of variables in a structure used in the processing of certain SQL statements that describe input variables, output variables, or the columns of a result table. The SQLDA is intended for dynamic SQL programs. See also system-descriptor area.
An expression that is used to select rows in a database table. The syntax for the filter is similar to the contents of an SQL WHERE clause. See also filter.
The generation of SQL statements in order to perform SQL pushback. See also SQL pushback.
See SQL authorization ID.
See Structured Query Language injection.
See Structured Query Language for Java.
The reordering of nodes within a stream in order to maximize the number of operations that can use SQL pushback. See also SQL pushback.
See SQL Procedural Language.
SQL Procedural Language (SQL PL)
A language extension of SQL that consists of statements and language elements that can be used to implement procedural logic in SQL statements. SQL PL provides statements for declaring variables and condition handlers, assigning values to variables, and for implementing procedural logic. See also Procedural Language SQL.
A user-written program that is implemented entirely by using a subset of SQL statements and SQL PL statements and that is invoked by using the SQL CALL statement. See also built-in procedure, procedure, routine, SQL routine, user-defined procedure.
SQL processing conversation
Any conversation that requires access of DB2 for z/OS data, either through an application or by dynamic query requests. See also conversation.
The execution of generated SQL statements by the data mining algorithms of a connected database, rather than by SPSS Modeler algorithms. SQL pushback can improve performance as data does not need to be extracted from the database for processing by the algorithm. See also SQL generation, SQL optimization.
- A component of certain SQL statements that specifies a result table.
- Any valid SQL statement in the dialect of the target database. This may be either data definition, such as CREATE TABLE, or data manipulation, such as SELECT.
- In query management, a type of query that is created by running an IMPORT command against a file containing an SQL statement.
A collection of database objects such as tables, views, indexes, functions, user-defined types, or triggers that defines a database. An SQL schema provides a logical classification of database objects.
SQL statement coprocessor
An alternative to the DB2 for z/OS precompiler that can be used to process SQL statements at compile time. The user invokes an SQL statement coprocessor by specifying a compiler option.
SQL string delimiter
See string delimiter.
See service request block.
See subrecord control byte.
See Speech Recognition Control Language.
See structure recovery data set.
See system resources manager.
SRM database object
See system resource management database object.
See service request number.
See Self-Regulation Organization.
See system requirements review.
See software requirements specification.
See Signaling System 7.
See subsystem control block.
See system services control point.
See system services control point identifier.
In SNA, a session between a system services control point (SSCP) and a physical unit (PU); SSCP-PU sessions allow SSCPs to send requests to and receive status information from individual nodes in order to control the network configuration.
In SNA network interconnection, the technique used by the gateway system services control point (SSCP) to send session-initiation request units (RUs), by way of a series of SSCP-SSCP sessions, from one SSCP to another, until the owning SSCP is reached.
In SNA, a session between the system services control point (SSCP) in one domain and the SSCP in another domain. An SSCP-SSCP session is used to initiate and terminate cross-domain LU-LU sessions.
See resource takeover.
See Standalone Solutions Configuration Tool.
See solid-state drive.
See session-layer service data unit.
See software support facility.
See Secure Shell.
See secure shell/secure copy program.
See secure shell/Secure File Transport Protocol.
- See system status index.
- See subsystem interface.
- See server-side include.
- See single system image.
- See Security Support Provider Interface.
See subsystem identification block.
See subsystem identifier.
See server-side include injection.
See Secure Sockets Layer.
Authentication in which the server exchanges the server certificate with the client and, optionally, the client exchanges the client certificate with the server. This exchange determines whether the client and server have a certificate in common and verifies the identities of the server and, optionally, the client.
SSL server authentication
A type of authentication that allows a client to confirm the identity of a server. SSL-enabled client software uses standard techniques of public-key cryptography to ensure that the certificate and public ID of a server are valid and that the certificate and ID were issued from one of the client's trusted certificate authorities (CAs). See also certificate, certificate authority.
See subsystem options block.
See System Support Program.
See System Storage Productivity Center.
See system service tools.
- An area in memory that typically stores information such as temporary register information, values of parameters, and return addresses of subroutines and is based on the principle of last in, first out (LIFO).
- An area of storage in which stack frames can be allocated.
- In kernel mode, an area that is paged with the user process. The kernel maintains a stack for each process. It saves the process information such as the call chain and local variables used by the kernel for the user process.
stacked bar code
Horizontally stacked bar code with a row number identifier denoting how many rows (2-8) are stacked. Permits multiple bar code scanning in any order by sweeping top to bottom or bottom to top across the entire block.
Two or more sets arranged one above another in rows or side-by-side in columns. See also set.
In mainframe computing, the condition in which the control unit is in a holding status for the channel, and, the last time the control unit attempted to present the status, the channel responded with the stack-status control.
A volume that has a one-to-one association with physical tape media and is used in a virtual tape server (VTS) to store logical volumes (LVOLs). Stacked volumes are not used by MVS applications but by the VTS and its associated utilities. They may be removed from a VTS to allow transportation of LVOLs to a vault or to another VTS. See also container.
- A section of the stack that contains the local variables, arguments, and register contents for an individual routine, as well as a pointer to the previous stack frame.
- See dynamic storage area.
- The physical representation of the activation of a routine. The stack frame is allocated and freed on a last-in, first-out basis.
A contiguous area of storage obtained directly from the operating system. The Language Environment storage management scheme subdivides stack segments into individual dynamic storage areas (DSAs). If the initial stack segment becomes full, a second segment or increment is obtained from the operating system.
- See automatic storage.
- An area of storage used for suballocation of stack frames. Such suballocations are allocated and freed on a LIFO (last-in, first-out) basis. A stack is a collection of one or more stack segments consisting of an initial stack segment and zero or more increments.
An activity in a process that queries human interaction for decisions on how to proceed. A staff activity is used in a long-running process where the process will halt to await the outcome of the human interaction.
- To move data from the production database to the staging database.
- The element of a job design that describes a data source, a data processing step, or a target system and that defines the processing logic that moves data from input links to output links. A stage is a configured instance of a stage type. See also job design, operator, stage type.
- A program that processes messages in a NetView pipeline. Stages send messages to each other serially.
- Part of a scan phase in which AppScan either explores or tests the site. See also job design.
stage 2 system definition
The second part of the process of defining an IMS system. Stage 2 builds IMS system libraries, execution procedures, and the IMS online control program tailored to support the desired set of IMS functions. Stage 2 then stores these in an IMS library.
An object that defines the capabilities of a stage, the parameters of the stage, and the libraries that the stage uses at run time. See also stage.
- The area of the file system that can store both data that will be imported (it is identified as the data source) and data that has been exported (it can be identified as the distribution). See also export, import.
- An area into which subsystem interface routines store data to be transferred between address spaces. Staging areas can be contained in the common service area (CSA) or in an address space used by auxiliary storage.
- See resource manager cache.
staging configuration directory (SCD)
The directory in which program-specific ODM object classes are stored temporarily during a dynamic reconfiguration operation. See also active configuration directory, default configuration directory.
Those libraries that are modified by offline functions in a system using online change. Changes are first applied to the staging libraries, which are then copied to the inactive libraries.
An instance of a WebSphere Commerce Server that is used for testing purposes before new functions or data are deployed to the production server. See also authoring server, production server, production-ready data.
- An intermediate table that is written to from an external system and used to populate business object tables.
- In SQL replication, a consistent-change-data table that is used to save data before that data is replicated to the target database. A consistent-change-data table used for staging data can function as an intermediate source for updating data in one or more target tables. See also consistent-change-data table, SQL replication.
- An individual who is materially affected by the outcome of the system. See also customer.
- An individual or organization that is involved in or may be affected by project activities.
- A person or role that has interest in and influence on the system.
- Independent of any other device, program, or system. In a network environment, a stand-alone machine accesses all required resources locally.
- Pertaining to a program that can run separately from the DB2 database system, without using DB2 services.
A brand that has no expressed connection to IBM. See also ingredient brand.
- A catalog service or container server that is managed from the operating system that starts and stops the server process.
- A fully operational server that is managed independently of all other servers, using its own administrative console.
- A system that runs application programs independently of another system. The exchange of data files or applications with another system is done manually, through portable media, such as diskette or tape.
- A DirectTalk system that is not part of a single system image (SSI). A stand-alone system is not connected to other DirectTalk systems, so it contains its own application and voice data.
- User-specified open intervals for a typical day at a workstation.
- See measuring and test equipment.
- A set of clearly defined and agreed-upon conventions for specific programming interfaces which have been approved by a formally constituted standards-setting body.
standard access list
See access list.
standard allowable minutes (SAM)
A value that is defined by a warehouse to determine how much time is allocated for each activity, including receiving, pallet moves, case replenishment, and special ticketing.
standard connector configuration properties
Configuration settings typically used by the connector controller to manage the connector (for example, to set the trace level, log file name, or polling information). These settings are generic for all connectors. See also connector configuration property, connector-specific configuration property.
In high availability disaster recovery, a database that is neither the primary nor the standby. A standard database is not configured for high availability disaster recovery. See also high availability disaster recovery.
A measurement of how varied the values in a frequency distribution are from the average value of the distribution. A low standard deviation value means that the values are close to the average value, whereas a high standard deviation value means that the values are more widely dispersed over a large range of values.
See EDI envelope.
standard event reader
A service that monitors a database for new, updated, and deleted events and triggers policies based on the event data. See also event reader.
An exit routine that is called to derive the value for a destination column in a column map. See also exit routine.
Standard Generalized Markup Language (SGML)
A standard metalanguage for defining markup languages that is based on the ISO 8879 standard. SGML focuses on structuring information rather than presenting information; it separates the structure and content from the presentation. It also facilitates the interchange of documents across an electronic medium.
standard input (STDIN)
An input stream from which data is retrieved. Standard input is normally associated with the keyboard, but if redirection or piping is used, the standard input can be a file or the output from a command. See also standard error.
standard I/O board
A board that provides access to a group of I/O functions that are basic to most system units. Common standard I/O functions are keyboard, tablet, speaker, mouse, serial port, parallel port and diskette adapter.
A process that separates records into parts, changes them to implement enterprise data quality standards, and potentially enriches the data for when it is used. See also standardization rule.
One or more conditions, such as a pattern, and the associated set of actions, which is used to standardize data. See also action, condition, pattern, pattern-action language, standardization.
standard output (STDOUT)
The output stream to which data is directed. Standard output is normally associated with the console, but if redirection or piping is used, the standard output can be a file or the input to a command. See also standard error.
standard point location code (SPLC)
A code that the National Motor Freight Traffic Association assigns to many freight origin and destination locations. See also location code.
A configuration option shared by all instances of a particular WebSphere business integration component, such as all collaborations or all connectors. These properties differ from options that are unique to a particular component. See also property.
A rule that allows access to functions necessary for mapping operations more complex than simple linking but less complex than extended rules. Standard rules are mutually exclusive (only one can be used on a particular field).
Standards Council of Canada (SCC)
A federal Crown corporation that has the mandate to promote efficient and effective standardization in Canada through the development and deployment of standards. It is the Canadian national member for ISO.
A term in a business glossary that has been thoroughly evaluated and approved by the team and that has been defined as definitively describing a characteristic of the enterprise or organization. See also candidate term.
A volume that emulates one of several S/390 volume types, such as the 3390-2, 3390-3, 3390-9, 3390-2 (3380-track mode), or 3390-3 (3380-track mode). A standard volume presents the same number of cylinders and capacity to the host as the native S/390-volume type of the same name presents. See also custom volume.
Standard Widget Toolkit (SWT)
An Eclipse toolkit for Java developers that defines a common, portable, user interface API that uses the native widgets of the underlying operating system. See also Abstract Window Toolkit, Swing Set.
In high availability disaster recovery, a copy of the primary database. Updates to this database occur by rolling forward log data that is generated on the primary database and sent to the standby database. See also auxiliary HADR standby database, high availability disaster recovery, principal HADR standby database.
The logical partition that acts as a standby for an administration host, a management host, or a data host. The standby host can take ownership of the resources from only the same type of failed active host and process the workloads intended for that failed host.
See boot interface.
A device that assumes the identity of a primary node if the primary node fails or is taken out of service. The standby node runs the primary node's workload until the primary node is back in service. See also primary node.
standby queue manager instance
An instance of a running multi-instance queue manager ready to take over from the active instance. There are one or more standby instances of a multi-instance queue manager.
- A group of lines in a file that together have a common function or define a part of the system. Stanzas are usually separated by blank lines or colons, and each stanza has a name.
- A section of a software package that defines either a specific action to be performed on that the software package or a set of conditions under which actions are to be performed on the software package. The complete software package is a stanza that contains a hierarchy of many different stanzas. See also software package, software package definition.
- A grouping of options in a configuration file to control various aspects of compilation by default.
- A type of relational database schema that is made up of a fact table and a set of dimension tables. In Tivoli Enterprise Data Warehouse, the fact table holds the values of the component's metrics, and the dimension tables hold the values of the attributes of a component or a metric.
- A type of relational database schema that is composed of a set of tables comprising a single, central fact table surrounded by dimension tables. See also dimension table, star join.
- A simple schema that represents each dimension in a single table. Levels of the dimension are represented as columns within this table. The primary key of this table is the member identifier of the lowest dimension level. See also metadata schema.
star schema data model
A relational schema whose design represents a multidimensional data model. The star schema consists of one or more fact tables and one or more dimension tables that are related through foreign keys.
A point in time associated with the start of work and usually qualified as actual, planned, estimated, and scheduled. Start date combined with duration and dependencies permits the calculation of finish date.
started-task computer workstation
A computer workstation that supports started tasks as a result of giving the workstation the STC option. Operations defined to this workstation are treated as started tasks, not as jobs.
An event that indicates where a process starts. The start event starts the flow of the process and does not have any incoming sequence flow but can have a trigger. Start event types are none, message, timer, ad hoc, and error. See also ad hoc start event, error start event, message start event, none start event, timer start event.
- A node that identifies where a rule flow begins. A rule flow has one and only one start node.
- A node that identifies where a process begins.
start-of-text character (STX character)
In binary synchronous communications, a transmission control character used to begin a logical set of records that will be ended by the end-of-text character or end-of-transmission-block character.
In VTAM, a user-specified or IBM-supplied option that determines certain conditions that are to exist during the time a VTAM system is operating. Start options can be predefined or specified when VTAM is started.
Pertaining to asynchronous communications line control that uses start signals and stop signals to control the transfer of data over a communications line. Each group of signals representing a character is preceded by a start signal and followed by a stop signal. See also asynchronous communication.
A process in which a joining or reintegrating node acquires a resource group that previously remained offline. A startup policy can also be specified for a resource group. See also distribution policy, fallback, fallover, resource group, resource group policies, settling time.
See start Uniform Resource Locator.
- A file that stores an encrypted version of the key database password. See also key database, key file.
- A file that hides other data files within it.
- An object's characteristic that is manifested in its public and private data members, and can be divided into two categories: essential state and non-essential state.
- In a business state machine, one of several discrete individual stages that are organized in sequence to compose a business transaction.
- The situation of a conversation from the point of view of one of the participating transactions. The conversation state determines the commands (if any) that a transaction can validly issue. The state of each transaction changes dynamically in the course of a conversation. See also state variable.
- A condition in which the circuit remains until application of a suitable pulse.
- A condition or situation during the life of an object during which it satisfies some condition, performs some activity, or waits for some event.
- A stage in the lifecycle of an object that identifies the status of that object.
- A record taken at each choice point during the search for a solution. The record includes information on all constrained variables, their current values, their domains, and constraints upon them.
- One step in the logical sequence of actions that comprises a voice application.
- An indication associated with an icon, color, and severity level assigned to a situation at a point in time. A situation can reflect one of the following states: critical, warning, or informational.
- The attribute of a program that determines the domain of objects that it can access directly.
- In the OSI Communications Subsystem licensed program, an event that indicates that a resource--such as a line--has had a change in status. State change events are logged and generate a message to the operator.
- In the OSI Communications Subsystem licensed program, a change in the status of an application entity or association--for example, an application entity changing from activated to deactivated.
See state machine diagram.
Information that must be kept in Resource Manager (RM) so that users can sign onto another IMS and resume their states. See also significant data.
Of or pertaining to a system or process that keeps track of the state of interaction. See also stateless.
stateful session bean
A session bean that acts on behalf of a single client and maintains client-specific session information (called conversational state) across multiple method calls and transactions. See also session bean, stateless session bean.
A view that contains the results of aggregations derived from past data streams in a single row. A view is stateful if it contains a set function or moving set function in the SELECT clause, or contains a GROUP BY clause (in which case there is one row for each group), or is derived from another stateful view.
A function that is used to describe the state of a feature of the problem as a non-negative integer. For example the various operating temperatures of an oven can be described as a state function.
Having no record of previous interactions. A stateless server processes requests based solely on information provided with the request itself, and not based on memory from earlier requests. See also stateful.
- A session bean with no conversational state. All instances of a stateless bean are identical. (Sun) See also session bean, stateful session bean.
- A session bean that is a collection of operations. The server can optimize resources by reusing bean instances on every method call.
state machine diagram
A UML behavioral diagram that models the dynamic behavior of individual class objects, use cases, and entire systems. There are two types of state machines: behavioral and protocol.
- An instruction in a program or procedure.
- In programming languages, a language construct that represents a step in a sequence of actions or a set of declarations.
A unit of SPL program code that performs a particular task and is usually marked by the keywords begin and end. The statement block of an SPL routine is the smallest scope of reference for program variables.
The portion of the package cache related to dynamic SQL statements. See also package cache.
A mechanism that modifies dynamic SQL statements at the database server so that SQL statements with similar but not identical text can share the same access plan. The modified and original statements produce the same results.
In FORTRAN, a name, followed by a list of dummy arguments, that is equated to an arithmetic, logical, or character expression, and that can be substituted for the expression throughout the program.
The data object that contains information about an SQL statement or XQuery expression that is managed by the DB2 call level interface. Such information includes dynamic arguments, bindings for dynamic arguments and columns, cursor information, result values, and status information. Each statement handle is associated with a connection handle. See also connection handle.
- An SQL identifier that enables the GOTO label statement to transfer program control to the first executable statement that follows the declaration of the specified statement label.
- In FORTRAN, a number containing 1 - 5 decimal digits that is used to identify a statement. A statement label is usually used to transfer control, define the range of a DO loop, or refer to a FORMAT statement.
statement local variable (SLV)
An SPL, C, or Java function that is invoked in the WHERE clause of a query, which can declare one or more statement-local variables that are visible in other parts of the same query, including its subqueries.
statement of work (SOW)
A document prepared by a Project Manager (PM) as a response to a Request for Service from a customer. The project SOW is the technical solution proposal, and it should describe the deliverables and identify all Global Services risks and impacts, infrastructure investments, capacity, cost elements, assumptions and dependencies.
statement optimization guideline
An optimization guideline that applies to a single DML statement. See also optimization guideline.
A unit of SQL that includes an SQL query (which may or may not return a result set), a command (which does not return a result set), or a stored procedure invocation (which may or may not return a result set). Each statement record is associated with a single data source.
state table action
One instruction in a set of instructions contained in a DirectTalk state table that controls how DirectTalk processes various operations such as playing voice prompts or recording voice messages.
state transition diagram
See state machine diagram.
state transition model
The sequence of states that a change request goes through from submission through disposition. This model specifies the actions that a user can take to move a change request from one state to another.
A program can obtain values that indicate the conversation state. CICS places such values in a variable named by the program, known as the state variable. See also state.
- In C++, a keyword used for defining the scope and linkage of variables and functions. For internal variables, the variable has block scope and retains its value between function calls. For external values, the variable has file scope and retains its value within the source file. For class variables, the variable is shared by all objects of the class and retains its value within the entire program.
- Pertaining to an operation that occurs at a predetermined or fixed time. See also dynamic.
- A Java programming language keyword that is used to define a variable as a class variable.
statically known namespaces
In XQuery, a set of prefix and URI pairs that defines all of the namespaces that are known during static processing of an expression. Statically known namespaces are a component of the static context of an expression.
The process of extracting targeted types of information on the models in their static form. This differs from dynamic analysis, which extracts information based on the results of process simulations.
An artifact that is used, but not changed, by a process. See also input.
A process by which SQL statements are bound after they are precompiled. All static SQL statements are prepared for execution at the same time. See also automatic bind, dynamic bind, incremental bind.
- The act of resolving references to external variables and functions before run time.
A type of call in which the program is link-edited into the same load module as the calling program. See also dynamic call.
A Java™ class that is defined at compilation time. See also dynamic attribute model.
static class descriptor table
An optional portion of the CDT that can be defined by the client or supplied by IBM. See also dynamic class descriptor table.
A semantic variation of generalization in which an object cannot change its type or role. See also dynamic classification.
- Data that is stored in static storage. See also automatic data.
- Data that retains its last-used state across calls.
In text formatting, a block of text that the nroff command places on the current page only if there is room for the entire block. If there is not enough room, the nroff command starts a new page and places the block of text there. See also floating display.
static IP address
A fixed IP address for a persistent device or logical unit on a network that uses the IP standard. See also IP address.
An element of a data model that defines a static relationship between data items in internal data types. See also link.
The incorporation of procedures and data into a load module at build time, instead of dynamically loading them at run time. Compared to dynamic linking, static linking increases the size of the executable file. See also dynamic linking.
See class method.
See static network address translation.
static network address translation (static NAT)
A one-to-one mapping of IP addresses that allows a user to map an IP address on an internal network to an IP address that is to be made public. If static NAT is used, traffic can be initiated from either side of the connection. See also network address translation.
- A VTAM node defined by the IMS system definition.
- A node that can be used to submit documents for approval to specific individuals.
A phase of the IPL sequence that takes place prior to limited paging during which only predefined areas of the load-source disk unit can be accessed. See also full paging, limited paging, prestatic paging.
static power save mode
An IBM System z (z196) function used for periods of low utilization or potentially when a CBU system is sitting idle waiting to take over in the event of a failure. The server uses frequency and voltage reduction to reduce energy consumption of the system. Static power save mode is initiated by the customer using the HMC/SE or Active Energy Manager.
static procedure call
A high-level language (HLL) call statement that specifies the name of an Integrated Language Environment (ILE) procedure to be called. See also procedure pointer call.
static program call
A connection among programs during binding (program creation time). See also dynamic program call.
A type of ranking in which factors about the documents that are being ranked, such as date, the number of links that point to the document, and so on, augment the rank. See also dynamic ranking, ranking, text-based scoring.
A method of setting paths between hosts, networks, or both by manually entering routes into the routing table. Static routes are not affected by routing daemons and must be updated manually.
A copy-group serialization value that specifies that a file must not be modified during a backup or archive operation. If the file is in use during the first attempt, the storage manager cannot back up or archive the file. See also dynamic serialization, serialization, shared dynamic serialization, shared static serialization.
SQL statements that are embedded within a program and are bound before the program is executed. After being bound, a static SQL statement does not change, although values of host variables specified by the statement can change. See also deferred embedded SQL, dynamic SQL, embedded SQL, incremental bind statement.
An area that is allocated by the system when a program is activated. Static storage exists as long as the program activation exists. If the program has not been deactivated, the values in the storage persist from one call to another. See also automatic storage, dynamic storage.
static system symbol
In MVS, a symbol whose substitution text is defined at system initialization and remains fixed during the initial program load (IPL). Static system symbols are used to represent fixed values, such as system names.
A terminal created through the system definition process. See also dynamic terminal.
- Text that is always included in the screen entry or print translation object. Examples of static text include legends and column headings.
- Text that remains constant on every document created with a particular form, as opposed to fields in which the user types or in which Notes calculates information.
static transaction routing
Non-dynamic terminal-initiated transaction routing. The transaction routing request is routed to a predetermined system. Static transaction routing occurs when DYNAMIC(NO) is specified in the transaction definition and the request is routed to the system named in the REMOTESYSTEM attribute.
A variable that is allocated as soon as a program starts running and that remains allocated until the program stops. Normal scoping rules apply to the variable. See also automatic variable.
static web project
A project that contains resources for a web application with no dynamic content such as servlets or JavaServer Pages (JSP) files, or Java code. A static web project can be deployed to a static HTTP server and does not require additional application server support.
- A point or location on a site where work is performed, usually a valve or transformer.
- A computer or device that can send or receive data.
- An input or output point of a system that uses telecommunication facilities; for example, one or more systems, computers, terminals, devices, and associated programs at a particular location that can send or receive data over a telecommunication line. See also attaching device.
- A location in a warehouse where an activity is performed.
station management (SMT)
A Fiber Distributed Data Interface (FDDI) standard that specifies the local portion of the system management application process for FDDI, including the control required for proper operation of a station in an FDDI ring.
In Performance Toolbox, the lines in a list that represent a specific value. See also context line.
Major component of CICS that controls the collection of resource statistics for a CICS system. It collects data at user-specified intervals, at shutdown and logical end-of-day, and when requested by the user.
statistics utility program (DFHSTUP STUP)
CICS program that provides offline formatting of CICS statistics. DFHSTUP can format all types of statistics generated by CICS and provides a summary function to collect all statistics produced in a given period. See also summary report.
- The processing stage of a document or interchange, indicated in the status box.
- An attribute of a configuration item or other record, indicating the artifact's stage in the associated lifecycle.
- The state of a job or job stream instance. See also internal status.
- A property of a contract that represents its current stage and restricts or enables certain user or system actions.
- The true or false condition of a situation.
- The state of a transaction at a particular point in time, such as whether it failed, was successful, or slow.
- The current condition or state of a program or device, for example, the status of a printer.
- In System i Access, the part of a window that displays information indicating the current state of that window's content.
- A section of an application window that defines information about a selection, command, or process. It also defines menu bar items as the user highlights each item, and indicates any current keyboard-initiated modes for typing (for example, CAP for the Caps Lock key or NUM for the Num Lock key).
- Code that represents the current state of an operation. The status code is often associated with an extended status code.
- A two-character code in the program communication block (PCB) mask that indicates the results of a DL/I call. See also PCB mask.
- In VTAM, information on the status of a resource as shown in a 10-character state code; for example, STATEACTIV for active.
status recovery mode
The scope of recovery for a resource, it determines where the resource status can be recovered from. GLOBAL indicates the status is managed by RM, LOCAL indicates the status is managed by IMS in local control blocks and log records, and NONE indicates the status is not recovered.
See standard error.
See standard input.
See standard output.
- In REXX, that part of a compound symbol up to and including the first period. It contains just one period, which is the last character. It cannot start with a digit or a period. A reference to a stem can also be used to manipulate all variables sharing that stem.
- The root of an inflected or derived word form that is obtained by stripping off inflectional or derivational affixes, for example: 'polit' is the stem of 'political'. A stem does not have to be a valid word. See also lemma.
See word stemming.
A pattern of memory references used for averaging. For example, a 4-point stencil in two dimensions for a given array cell, x(i,j), uses the four adjacent cells: x(i-1,j), x(i+1,j), x(i,j-1), and x(i,j+1).
- A stage in a workflow where a distinct, well-defined action is performed. Each step on a workflow map represents a specific activity or task in the business process described by the map. For example, in insurance claims processing, verify account number and calculate deductible could be individual steps. A workflow consists of two or more steps.
- A part of an XQuery path expression that generates a sequence of items and then filters the sequence by zero or more predicates. The value of the step consists of those items that satisfy the predicates. See also node test, path expression.
- A component of a project or library that contains one or several command lines to be executed.
- To cause a computer to run one operation.
The system function that establishes a logical connection between a running program and a data set, device, or volume in preparation for running the program. See also dynamic allocation.
A restart that occurs at the beginning of a job step. There are two types of step restart: automatic or deferred. See also checkpoint restart.
The computation of the steps and substeps of a scale. Two types of steps definition are available: numerical steps definition, which handles numeric steps values; time steps definition, which handles time values.
stepwise linear function
A special case of the piecewise linear function where all slopes are equal to zero. The primary use of a stepwise linear function is in scheduling, typically used to model the efficiency of a resource over time. In all uses with scheduling, the domain and image of the function are limited to integers.
Sterling TMS number
A code that shippers and customers can use to refer to the same location. Sterling TMS automatically assigns this number to each location. See also location code.
The user or group of users that is responsible for the definition, purpose, and use of business glossary assets or the information assets that are described in the metadata repository. The steward does not have to be a user of the business glossary.
See Systems and Technology Group.
See IBM Sales Transaction Hub.
See self-timed interface.
A type of access permission bit that causes an executable program to remain on the swap area of the disk. Only someone with root authority can set the sticky bit. This bit is also used on directories to indicate that only file owners can link or unlink files in that directory.
An input method that enables the user to press and release a series of keys sequentially (for example, Ctrl+Alt+Del), yet have the keys behave as if they were pressed and released at the same time. This method can be used for those who require special-needs settings to make the keyboard easier to use.
The part of the page pool that is made available to cache the first block of frequently used interactive files. Sticky pool size is one of the file manager startup configuration parameters.
See information frame.
In Performance Tools, the interface at the S and T reference points defined in the reference model of the integrated services digital network (ISDN). When there is no network termination 2 (NT2), the S and T reference points become one S/T point.
See Synthetic Transaction Investigator playback policy.
See simple text language.
See sense type and model.
stock keeping unit (SKU)
An alphanumeric identifier for each item of merchandise, or catalog entry. The smallest unit available for keeping inventory control. It can include variables for department, class, vendor, style, color, size, and location. See also package, product.
- The arrival of a vehicle at a site to pick up or deliver one or more shipments (or both) and then leave. See also route ID, visit.
- A point where passengers can board or alight from vehicles.
stop and go light
See traffic lighting.
In Performance Toolbox, a special type of value record which signals that recording was stopped for a set of statistics and gives the time it happened. This allows programs using the recording file to distinguish between gaps in the recording and variances in the recording interval.
- A word that is commonly used, such as "the," "an," or "and," that is ignored by a search application.
- A frequently occurring word that many natural language processing (NLP) applications identify as such, to improve processing.
- A word that adds no meaning to an organization name and that is not included in any name comparison or name scoring.
- The location of saved information.
- A functional unit into which data can be placed, in which it can be retained, and from which it can be retrieved. See also virtual storage.
storage accounting area (SAA)
A field at the start of a CICS storage area that describes the area and enables CICS to detect some storage violations. Each CICS storage area has either an SAA or a storage check zone.
A person in the data processing center who is responsible for defining, implementing, and maintaining storage management policies. See also system operator.
storage architecture type (storage type)
The type of storage architecture, either count key data (CKD) or fixed block (FB), for which an array, pool, or volume is provisioned. See also count key data, fixed-block architecture.
storage check zone
A pair of fields at the beginning and end of a CICS storage area that enable CICS to detect some storage violations. Each CICS storage area has either a storage check zone or a storage accounting area (SSA).
- In WebSphere MQ for z/OS, the page set that is to hold the messages for a particular queue. The storage class is specified when the queue is defined.
- A named list of data-set storage attributes that identify performance goals and availability requirements. A storage class is defined by the storage administrator to select a device that can meet those goals and requirements.
- The type of media that an object is stored on. It is not directly associated with a physical location; however, it is directly associated with the device manager. See also storage group, storage system.
Any of the predefined models (data class, management class, storage class, and storage group) that are used to classify storage management needs and procedures for data sets under the storage management subsystem (SMS). Each data set has construct names associated with it, by explicit specification or by default. See also data class.
- In CICS, a facility that controls requests for main storage to provide intermediate work areas not automatically provided by CICS.
- The component in a storage subsystem that handles interaction between processor channel and storage devices, runs channel commands, and controls storage devices. Storage control is an example of a control unit.
storage controller enclosure
See control enclosure.
A noncontiguous area of storage in the dynamic storage areas reserved for use by CICS when processing a short-on-storage condition. See also short-on-storage.
- A physical unit that provides a mechanism to store data on a given medium so that it can be subsequently retrieved.
- A logical unit number (LUN) that terminates a collection of ports on the storage network.
A physical or logical element that manages multiple paths to storage components, such as devices or controllers. See also storage path.
storage expansion enclosure
See expansion enclosure.
- The user-defined partition of a database.
- A named set of disks on which DB2 for z/OS data can be stored.
- A group that associates a storage system to a storage class. See also storage class, storage system.
- A named set of storage paths on which DB2 for Linux, UNIX, and Windows data can be stored.
- A collection of storage volumes and attributes that are defined by the storage management subsystem (SMS) administrator to meet a defined service strategy. The collections can be a group of direct access storage device (DASD) volumes; tape volumes; or a group of DASD, optical, or tape volumes treated as a single, object-storage hierarchy. See also object backup-storage group, object storage group, pool storage group, tape storage group, virtual input/output storage group.
- A logical order of primary storage pools, as defined by an administrator. The order is typically based on the speed and capacity of the devices that the storage pools use. The storage hierarchy is defined by identifying the next storage pool in a storage pool definition. See also storage pool.
- An arrangement of storage devices with different speeds and capacities. The levels of the storage hierarchy include: main storage, such as memory and direct access storage device (DASD) cache; primary storage (DASD containing user-accessible data); migration level 1 (DASD containing data in a space-saving format); and migration level 2 (tape cartridges containing data in a space-saving format). See also hierarchical storage management, migration level 1, migration level 2, object storage hierarchy, primary storage.
A key associated with each 4 KB block of storage that is available in the CICS region. Access to CICS storage is controlled by key-controlled storage protection. When key-controlled protection applies to a storage access, a store operation (write) is permitted only when the storage key matches the access key associated with the request; a fetch (read) is permitted when the keys match or when the fetch-protection bit of the storage key is zero. In most cases, the access key for a storage operation is the PSW key in the current PSW.
- A specific space (floor space, shelf, rack) used to store material. Each storage location has a distinct identifier known by the warehouse management system and warehouse operator.
- In Backup, Recovery, and Media Services, a place where media and containers can be stored awaiting expiration or movement to another location such as off-site storage, vaults, or long-term (permanent) retention. Backup, Recovery, and Media Services has two predefined locations that can be overridden by the user: 1) *HOME, the system keyword for the on-site library (or home location); and 2) VAULT, a default storage location that refers to the default off-site storage location.
- A location physically separate from the removable media library where volumes are stored for disaster recovery, backup, and vital records management. See also inventory management.
storage-location management processing
In DFSMSrmm, the process of inventory management that assigns a shelf location to each volume that has moved as a result of vital record processing. See also inventory management, vital record processing.
The activities of data set allocation, placement, monitoring, migration, backup, recall, recovery, and deletion. Storage management can be performed either manually or using automated processes. The storage management subsystem (SMS) automates these processes while optimizing storage resources. See also storage management subsystem.
storage management cycle
An invocation of the OAM Storage Management Component (OSMC). The purpose of the storage management cycle is to ensure that every object scheduled for processing is placed in the correct level of the object storage hierarchy (as specified by its storage class), has expired or is backed up (as specified by its management class or by an explicit application request), and, if necessary, is flagged for action during a subsequent storage management cycle.
Storage Management Initiative Specification (SMI-S)
A design specification developed by the Storage Networking Industry Association (SNIA) that specifies a secure and reliable interface with which storage management systems (SMSs) can identify, classify, monitor, and control physical and logical resources in a storage area network (SAN). The interface integrates the various devices to be managed in a SAN and the tools used to manage them.
storage management station
A system that is used to manage the storage subsystem. A storage management station does not need to be attached to the storage subsystem through the fibre-channel I/O path.
storage management subsystem (SMS)
Software that automates as much as possible the management of physical storage by centralizing control, automating tasks, and providing interactive controls for system administrators. See also storage management.
A layer of a server that handles the mapping of data to the appropriate location in the server memory. The storage manager controls lock, index, data, allocation, and transaction management functions.
Storage Manager Enterprise Management window
See graphical user interface.
A creation attribute for modules, programs, and service programs that describes the type of storage supplied by the system at run time for automatic, static, and constant storage. The system-recognized identifiers for storage model are *SNGLVL (single-level store), *TERASPACE (teraspace), and *INHERIT (inherit). *INHERIT, which is specified only for modules and service programs, indicates that the object must be created such that it will run when either single-level store or teraspace is supplied.
- A component of a storage system that provides internal storage or a connection to one or more external storage systems.
- A node used to provide the back-end storage and file system to store the data in a system.
The hardware within storage control that transfers data between the direct access storage device (DASD) and a channel. See also storage director.
- A logical entity of components of a system consisting of two storage nodes, and one or two storage subsystems directly connected with these storage nodes.
- A subcomponent of a network-attached storage (NAS) system that consists of two or more storage nodes and one or more supported storage systems.
- A logical division of storage reserved for processing a job or group of jobs.
- A collection of storage capacity that provides the capacity requirements for a volume.
- A logical division of storage (directories, cooked files, and raw devices) reserved for automatically expanding existing storage spaces (dbspace, temporary dbspace, sbspace, temporary sbspace, or blobspace).
- A named set of storage volumes that is the destination that is used to store client data. See also archive, retrieve, storage hierarchy.
- A grouping of storage space consisting of volumes, logical unit numbers (LUNs), or addresses that share a common set of administrative characteristics. See also user pool.
- A collection of storage that identifies an underlying set of resources. These resources provide the capacity and management requirements for a volume or set of volumes.
- A reserved area of virtual disk space that serves storage requirements. See also volume.
An engine's connection point to a storage client network. A storage port is a member of a single fabric. See also engine.
storage privilege class
A privilege class that gives an administrator the authority to control how storage resources for the server are allocated and used, such as monitoring the database, the recovery log, and server storage. See also privilege class.
An optional facility in CICS Transaction Server that enables users to protect CICS code and control blocks from being overwritten inadvertently by application programs. See also transaction isolation.
- A hardware key associated with each page of virtual memory that is available in POWER6 processors and is supported as of AIX Version 5.3 with the 5300-06 Technology Level. Access to pages is controlled on a per-thread basis depending on the access mode of the running thread as represented in the authority mask register (AMR). See also authority mask register.
- An indicator that appears in the current program status word whenever an associated task has control of the system. This indicator must match the storage keys of all main storage blocks that the task is to use.
storage resource group
A named collection of logically related resources that are monitored by Tivoli Storage Productivity Center. Monitored resources can include fabrics, switches, computers, storage systems, tape libraries, and other storage resource groups.
storage subsystem controller
See node canister.
- A device, such as a Redundant Array of Independent Disks (RAID) controller, that creates and manages other storage devices.
- A generic term for storage in the Content Manager system. See also media archiver, storage class, storage group.
- A system that provides persistent storage within a network. A storage system can include facilities for host attachment, user role authentication, a command-line interface (CLI), a graphical user interface (GUI), and storage devices that most often include Redundant Array of Independent Disks (RAID) controllers. It might also include agents for enabling third-party management software to monitor or manage the storage devices.
- See storage architecture type.
- A user defined code attached to a SKU that is used to differentiate types of SKUs. Storage type can be used to ensure specific types of SKUs are sent to specific warehouse areas for storage.
Hardware that contains one or more drive bays, power supplies, and a network interface. Some storage units contain Redundant Array of Independent Disks (RAID) controllers; in this case, the storage unit is accessed by the appliance.
- In WebSphere Commerce, the place where all transactions for an online business occur. Store types include customer-facing store, asset store, and proxy store.
- To place and retain data in a storage device, so that it is available for retrieval and updating.
store archive (SAR)
A compressed file that contains all the assets (including file assets and database information) necessary to create a store. Publishing the store archive to a WebSphere Commerce Server creates an operational store. See also composite store archive, SAR file format.
See retail controller.
- A block of procedural constructs and embedded SQL statements that is stored in a database and that can be called by name. Stored procedures allow an application program to be run in two parts, one on the client and the other on the server, so that one call can produce several accesses to the database. See also SPL function, SPL routine, SPL variable.
- See procedure.
Stored Procedure Language (SPL)
An Informix extension to SQL that provides flow-control features such as sequencing, branching, and looping. See also SPL routine.
stored resource definition
The resource information that is stored offline, from which IMS builds runtime resource definitions. Stored resource definitions can reside in system data sets, such as IMS.MODBLKS, IMS.ACBLIB, IMS.FORMAT, and a resource definition data set (RDDS).
stored value card (SVC)
A configurable payment type that represents a card on which funds are available for use. Some examples of SVCs are gift cards, employee cards, pre-paid cards, merchandise return cards, and electronic gift cards.
Any part of an online store that customers see while shopping. Storefront assets include HTML pages, JSP files, style sheets, images, graphics, and other multimedia file types. See also back-office business logic.
storefront asset store
A type of asset store that is a collection of JSP files, commands, business processes (for example, order processing), business policies and access control policies that create a virtual storefront. See also asset store, catalog asset store.
Store Management tool
A Management Center tool that sellers and site administrators can use to manage general store information, change store layout and color, select store functions, select and view a store, open or close a store, and find stores. The Store Management tool in Management Center replaces all of the store management features in WebSphere Commerce Accelerator, except for the store creation and the ability to suspend and resume stores.
A process in which changed data is written to the cache structure and to permanent storage simultaneously and under the same serialization; as a result, the data in the cache structure always matches the data in permanent storage
A discharge that is generated when precipitation from rain and snow melt events flows over land or impervious surfaces and does not percolate into the ground. As the runoff flows over the land or impervious surfaces (paved streets, parking lots, and building rooftops), it accumulates debris, chemicals, sediment or other pollutants that could adversely affect water quality if the runoff is discharged untreated.
straight through processing (STP)
A series of uninterrupted electronic processes across and throughout an enterprise which (1) secures an initial transaction as an electronic message, (2) transforms and transports it to its initial execution/processing location and (3) passes it through the processing cycle with little, if any, human intervention.
strategic alliance and partnership
A relationship between two business entities which share assets for mutual benefit. Examples of shared assets include sales force, service personnel, porting assistance, and market development funds.
Strategic Position Analysis (SPAN)
An analytical technique that is used to perform portfolio analysis on a group of market segments or offerings/solutions. The technique uses a two-dimensional matrix with attractiveness on one axis and competitive position on the second axis.
In Metric Studio, a visual representation of the strategy and the objectives of that strategy for an organization. For example, a strategy map may show employees how their jobs are aligned to the overall objectives of the organization.
- A path of connected nodes along which data flows in order to analyze data, make predictions, or both. See also instantiate, node.
- To unidirectionally transmit multimedia content to a user from a streaming provider.
- A file access object that allows access to an ordered sequence of characters, as described by the ISO C standard. Such objects can be created by the fdopen() or fopen() functions, and are associated with a file descriptor. A stream provides the additional services of user-selectable buffering and formatted input and output.
- In the CVS team programming environment, a shared copy of application resources that is updated by development team members as they make changes. The stream represents the current state of the project.
- To send data from one device to another.
- A repository object that includes one or more components. Streams are typically used to integrate the work that is stored in repository workspaces. Team members deliver their changes to the stream and accept changes from other team members into their repository workspaces from the stream.
- A continuous sequence of data elements being transmitted one character at a time, or intended for transmission, using a defined format.
- The kernel aggregate created by connecting STREAMS components, resulting from an application of the STREAM mechanism. The primary components are a stream head, a driver, and zero or more pushable modules between the stream head and driver. A stream forms a full duplex processing and data transfer path in the kernel, between a user process and a driver. A stream is analogous to a shell pipeline except that data flow and processing are bidirectional.
- An object that specifies configuration rules for a UCM view.
- Physical channel of communication between a single transmitter and one or more receivers.
A method of collecting auditing data that writes audit records to a circular buffer within the kernel. The data can be displayed, or printed to provide a paper audit trail, or converted into bin records.
An event processing technology that is designed to simultaneously address two information challenges: the need for much faster information handling and analysis, and the ability to analyze growing volumes of diverse information.
stream data file
Data sets with a byte-oriented structure, which are accessed as continuous streams of data bytes. This structure is common in workstation environments. See also record-oriented file.
Any data sent over a network connection at a specified rate. A stream can be one data type or a combination of types. Data rates, which are expressed in bits per second, vary for different types of streams and networks.
- A file that contains continuous streams of bits such as PC files, documents, and other data stored in System i folders.
- A file containing a continuous stream of data. Stream files are well suited for storing strings of data such as the text of a document, images, audio, and video. The content and format of stream files are managed by the application rather than by the system.
The end of the stream that is closest to the user process and provides an interface between that process and the stream. The principal functions of the stream head are processing STREAMS-related system calls, and bidirectional transfer of data and information between a user process and messages in STREAMS' kernel space.
- In object-oriented programming, the serialization of class information and object instance data.
- A method of writing and reading data on magnetic tape as continuous fields without record boundaries.
- The one-way transmission of multimedia content to a user from a streaming provider. See also 3G, podcast, podcast.
A Sametime client that can receive streaming data from the Streaming Gateway but that has no interactive capabilities. These clients provide a user attending a meeting with an experience similar to watching television: users can watch but cannot interact.
A Sametime server component responsible for broadcasting audio, video, and data streams to receive-only clients. Communication from the streaming gateway is one-way (from the server to the client). The streaming gateway scales to a large audience but does not support interactive clients.
streaming gateway controller
In Sametime, the component that tells the streaming gateway when to join a meeting, ensures that streaming clients can connect to the streaming gateway, and terminates the meeting on the streaming gateway.
streaming tape device
See streaming tape drive.
- A method of sending and receiving data in which records are defined as a stream of data without boundaries.
- In MFS, the input mode in which fields are defined as a stream of data without record boundaries. See also input mode, record mode.
A kernel mechanism that supports development of network services and data communication drivers. It defines interface standards for character input and output within the kernel, and between the kernel and user level. The STREAMS mechanism comprises integral functions, utility routines, kernel facilities, and a set of structures.
A transaction that becomes durable before it is committed. Strict durability guarantees that data loss does not occur because the transaction must be made durable before the commit occurs. See also durability, relaxed durability.
The relationship between the layout of an array's elements in memory and the order in which those elements are accessed. A stride of 1 means that memory-adjacent array elements are accessed on successive iterations of an array-processing loop. A stride of N means that for each array element accessed, N-1 memory-adjacent elements are skipped over before the next accessed element.
- A field or element that contains one or more printable characters.
- A group of auxiliary storage devices connected in a series on the system. The order and location in which each device is connected to the system determines the physical address of the device.
- In programming languages, the form of data used for storing and manipulating text.
- A contiguous sequence of bytes terminated by and including the first null byte.
- The value of a character string, graphic string, or binary string data type, consisting of a sequence of bytes that might represent characters.
- A sequence of elements of the same nature, such as characters considered as a whole. For example, character string, binary string, and hexadecimal string.
In REXX, an operation that joins two characters or strings in the order specified, forming one string whose length is equal to the sum of the lengths of the two characters or strings.
Zero or more characters enclosed in double quotation marks. See also string literal.
A symbol that is used to enclose a string constant. The SQL string delimiter is the apostrophe (') except in COBOL applications, where the user assigns either a quotation mark (") or an apostrophe (').
- A literal that specifies a column value in a column map or relationship when the corresponding column contains character data.
- Zero or more characters enclosed in double quotation marks. See also string constant.
A built-in function that performs an operation on two strings. See also operator.
- The set of tracks located on the set of physical disk drives configured in a Redundant Array of Independent Disks (RAID) logical unit (LU) that have the same parity track. See also striped data set.
- The portion of a striped data set (for example, an extended sequential data set) that resides on one disk. The records in that portion are not necessarily logically consecutive. The system distributes records among the stripes such that the disks can be read or written simultaneously to gain better performance.
- A collection of disks that are grouped together for serving media streams. The multimedia file system uses stripe groups to optimize delivery of multimedia assets.
- The set of disks comprising the storage assigned to a file system.
- A storage process in which information is split into blocks (a fixed amount of data) and the blocks are written to or read from a series of disks in parallel.
- A data mapping technique for disk arrays in which fixed-length sequences of virtual-disk data addresses are mapped to sequences of member disk addresses in a regular rotating pattern. See also striped data set.
The list of strip characters. See also strip character.
A dependency that causes an object to be recompiled when another object that it depends on, such as a table or a data type, is dropped or modified. See also weak dependency.
An export that allows only one definition of an external symbol to be used by the binder. The first definition in the binder search is chosen, and duplicate definitions are discarded. The binder always chooses a strong export over a weak export for the same symbol. See also weak export.
strongly typed cursor data type
A cursor data type that is associated with a row data type. A variable or parameter of a strongly typed cursor data type can reference only a result set with the same definition as the row data structure. See also weakly typed cursor data type.
A process that prevents two objects with mismatched data types from being compared to each other and prevents data from being assigned to an object defined to accept data of a different type. See also implicit casting, weak typing.
- An aggregate of elements having arbitrary types.
- See structure.
See structure tag.
structural data source
A data source that defines the structure of a Transformer model. It contains columns that map to levels and categories to build dimensions in the model. See also transactional data source.
- A series of elements that have been graded or ranked in some useful manner. In WebSphere Business Modeler, a graphical representation of the relationships between different real entities in an organization.
- A construct used to map and manage storage on a coupling facility.
- A class data type that contains an ordered group of data objects. Unlike an array, the data objects within a structure can have varied data types.
- A name that refers collectively to different types of DB2 objects, such as tables, databases, views, indexes, and table spaces.
- A relationship that describes how accounts, companies, forms or extended dimensions are connected.
Semi-static data that is used to provide context for other data within a relational database and is typically used to construct a reference structure. For example, a product master contains a list of products with which the company deals. The product master may also contain supporting information, such as product characteristics.
- A mechanism that permits variable length data to be encoded for transmission in the data stream.
- A self-identifying string of bytes and its data or parameters.
- Output from the DFSMSrmm application programming interface (API) consisting of a structured field introducer (SFI) and output data.
An INed file that contains specialized data, such as information about the structure of the data in the file, and history information about changes that have been made to the file. Structured files can contain hierarchical data that is displayed and edited by using forms.
Structured Query Language injection (SQL injection)
An attack technique used to exploit websites by altering back-end SQL statements through manipulating application input. See also Structured Query Language.
The tabular aspect of the Design view of the XML editor that separates the structural constituents of an XML document, such as elements and attribute types, from values, such as attribute values and textual content.
In relation to group buffer pools, the DB2 member that is responsible for the following activities: coordinating rebuild, checkpoint, and damage assessment processing; and monitoring the group buffer pool threshold and notifying castout owners when the threshold has been reached
See set and test sequence number.
- A protocol extension procedure that connects with the library but remains outside the library.
- The two types of Remote Procedure Calls (RPCs) that are produced by the compiler when an interface is defined. The application code calls the stub, and the RPC mechanism translates this into a call to the appropriate function on the remote machine.
- In the Enhanced X-Windows Toolkit, the hooking functions that are used as extensions to the protocol to generate protocol requests.
- A component containing functionality for testing purposes. A stub is either a pure "dummy", just returning some predefined values, or it is "simulating" a more complex behavior.
- A small program routine that substitutes for a longer, possibly remote, program. For example, a stub might be a program module that transfers procedure calls (RPCs) and responses between a client and a server. In web services, a stub is an implementation of a Java interface generated from a Web Services Description Language (WSDL) document.
- A shortcut on the Windows file system that is generated by the hierarchical storage management (HSM) client for a migrated file that allows transparent user access. A stub is the sparse file representation of a migrated file, with a reparse point attached.
- To reduce the space that user mailboxes occupy on email servers.
- A program module that transfers remote procedure calls (RPCs) and responses between a client and a server. Stubs perform marshalling, unmarshalling, and data format conversion. Both clients and servers have stubs. The Network Interface Definition Language (NIDL) compiler generates client and server stub code from an interface definition.
- In email archiving, an email document from which previously archived content has been removed. The stub usually contains links to the archived content, that is, to the attachments and the body text of the email. Clicking these links, users can view, and, in a second step, restore the content to its original location.
- A replica or Notes database copy that has not yet been filled with documents. The database is no longer a stub after the first replication takes place.
- A line in a state table that is only partially displayed.
- A small module, link-edited into application code, that locates and transfers control to a larger body of related code.
A file that replaces the original file on a local file system when the file is migrated to storage. A stub file contains the information that is necessary to recall a migrated file from storage. It also contains additional information that can be used to eliminate the need to recall a migrated file. See also migrated file.
stub file size
The size of a file that replaces the original file on a local file system when the file is migrated to storage. The size that is specified for stub files determines how much leader data can be stored in the stub file. The default for stub file size is the block size defined for a file system minus 1 byte.
See start-of-text character.
In CDE, the software application used to customize some of the visual elements and system device behaviors of the workspace environment, including colors and fonts, and keyboard, mouse, window, and session start-up behaviors.
A specification of formatting instructions that, when applied to structured information, provides a particular rendering of that information (for example, online or printed). Different style sheets can be applied to the same piece of structured information to produce different presentations of the information.
See child item.
- An extension of an ISDN address used to identify individual users, processors, or groups of users within a large group of users or processors that are identified by a single network number.
- In X.25 communications, the unallocated digits at the end of the national terminal number (NTN). If the network provider allocates all digits to the NTN, there can be no subaddress.
- A logical grouping of bundles and services on the common agent. An application uses a subagent to perform actions on a system where the common agent is installed. See also agent, bundle, common agent.
- An extension to an SNMP agent that permits a user to dynamically add, or in some cases replace, management variables in the local MIB, thereby providing a means of extending the range of information that network managers may access.
- An agent that the coordinator agent enlists to speed up SQL processing. See also coordinating agent.
A request issued by a coordinator agent to a subagent at the same or a different database partition. See also request.
An alternative name that is used when several names are required for an object. For example, a single multiple response variable translates into a number of separate variables in SPSS .sav format. The subaliases are the names that are given to the variables in the SPSS .sav file.
A Virtual Storage Access Method (VSAM) file occupying a portion of a data space that is already defined. The data space may contain other files. See also unique file.
- A portion of the SNA network consisting of a subarea node, attached peripheral nodes, and associated resources. Within a subarea node, all network addressable units (NAUs), links, and adjacent link stations in attached peripheral or subarea nodes that are addressable within the subarea share a common subarea address and have distinct element addresses. See also adjacent subarea, element.
- An area that is nested within another area.
In SNA, a value in the subarea field of the network address that identifies a specific subarea. See also element address.
In SNA, a link that connects two subarea nodes. See also channel link.
subarea node (SN)
In SNA, a type 4 or type 5 node that uses network addresses for routing and whose routing tables are, therefore, affected by changes in the configuration of the network. Subarea nodes can provide boundary function support for peripheral nodes.
Pertains to a software licensing scheme that bases charges on the capacity of the partition where the licensed program is used, rather than on the total capacity in the server. See also full-capacity, partition, processor value unit, virtualization, virtualization.
In a partitioned operating environment, a software license that bases charges on the capacity of the partition where the licensed program is used, rather than on the total capacity in the server.
- A Workload manager class that is given resource entitlements relative to the entitlements of its associated superclass.
- In a generalization relationship, the specialization of another class; the superclass.
- In Java, a class that is derived from a particular class, through inheritance.
A tree of categories with levels that are independent of levels in the dimension. A subdimension can provide different details, or different levels of detail, for categories in a level. Subdimensions are permitted in dimensions with only one drill-down path or, in an alternate drill-down structure, at or below the convergence level.
In UN/EDIFACT EDI standards, an EDI data element that is part of an EDI composite data element. For example, an EDI data element and its qualifier are subelements of an EDI composite data element.
A list of the sub-events of a particular composite event that have fired. Each composite event has a sub-event queue associated with it. The queue may be empty. Sub-events remain on the sub-event queue until they are retrieved, or until a syncpoint occurs.
- In RPG, the layout of a field within a data structure.
- A subdivision of a field with a specific meaning. For example, the SWIFT field 32 has the subfields date, currency code, and amount. A field can have several subfield layouts depending on the way the field is used in a particular message.
In IBM i, a group of records of the same record format that can be displayed at the same time at a display station. The system sends the entire group of records to the display in a single operation and receives the group from the display in another operation.
subfile control record format
One of two record formats required to define a subfile in DDS. The subfile control record format describes the size of the subfile and the size of the subfile page, and is used by the program to write the subfile to and read the subfile from the display.
subfile record format
One of two record formats required to define a subfile in DDS. The subfile record format defines the fields in a subfile record and is used by the program to perform input, output, and update operations to the subfile.
A sequence of processing steps, implemented using message flow nodes, that is designed to be embedded in a message flow or in another subflow. A subflow must include at least one Input or Output node. A subflow can be executed by a broker only as part of the message flow in which it is embedded, and therefore it cannot be deployed. See also message flow.
A message flow node that represents a subflow. See also primitive.
- A folder that is in another folder. For example, if folder A contains folder B and folder B contains folder C, then B and C are subfolders of A because the folder path for each begins with A (A/B/C).
- In CDE, a folder contained within another folder. When discussing command-line activities, this may be called a subdirectory.
A form-building shortcut that lets designers store regularly used fields, sections, actions, and other form elements together. Subforms can be placed on a form either permanently or as computed subforms that display on documents as dictated by a formula.
A graph that is contained in another graph. In flat graphs, G' is a subgraph of G if its node and link sets are included in the node and link sets of G. In nested graphs, a node that is a graph is called a subgraph of the nested graph.
- A group that is subordinate to another group. A subgroup corresponds to a nested looping structure, a loop within a loop.
- A set of modifications within a copy group that applies to a certain number of copies of a form. A copy group can contain more than one subgroup.
submit/release data set
A data set shared between the Tivoli Workload Scheduler for z/OS host and a local Tivoli Workload Scheduler for z/OS processor that is used to send job-stream data and job-release commands from the host to the local processor.
For internet subnetworking, a 32-bit mask used to identify the subnetwork address bits in the host portion of an IP address. See also address mask.
- A network that is divided into smaller independent subgroups, which still are interconnected.
- A network that forms part of a larger network but can be represented as a single object.
- To divide a network into smaller interconnected, but independent subgroups.
- A grouping of connected traffic links that is defined by the user. This grouping is to improve application performance.
- The communications media that join two network nodes together. A subnetwork is a representation within the OSI reference model of a real network, such as a carrier network, a private network, or a local area network (LAN).
- A distinct partitioned piece of an internet network represented by two or more sets of addresses that are subsets of the network's range of addresses.
subnetwork access protocol (SNAP)
In LANs, a 5-byte protocol discriminator that identifies the non-IEEE standard protocol family to which a packet belongs. The SNAP value is used to differentiate between protocols that use $AA as their service access point (SAP) value.
A bit mask of 32 bits that defines the particular subnetwork to which an interface attaches. See also address mask.
In floating-point representation, any nonzero number that is smaller than the smallest normal number. A subnormal number has zero as the leftmost digit of the significand. See also decimal floating-point number, normal number.
An object that is created during the application of a declaration in a CSS style sheet, by virtue of a declaration value of the form @#identifier, @=identifier, or @+identifier. It is styled through the same CSS style sheet, although it is not contained in the original CSS model.
One of multiple elements in a list that comprises an operand. See also definition statement.
- In two-phase commit processing, a recovery manager that must wait for confirmation from its coordinator before committing or backing out changes made to recoverable resources by its part of a distributed unit of work. The subordinate can be in doubt in respect to its coordinator. See also coordinator, in-doubt.
- A system in which a child unit of recovery (UR) of a multisystem cascaded transaction resides.
- The unit into which a physical index page can be divided.
- A part of a logical page on which traditional line data can be placed. In the page definition, multiple subpages can be placed on a physical page as specified in the print data.
An access point for data entry or exit over a logical connection. The relationship between the physical line and the port is analogous to the relationship between the logical connection and the subport. See also frame handler subport.
- An independent process that is part of another business process.
- A process initiated by another process. Control is transferred back to the main process after the subprocess finishes running.
- A local process that is also a part of another process. See also deployment manager.
- In the IPA Link version of the Inline Report listing section, an equivalent term for 'function'.
- A called program that is combined with the calling program at run time to produce a run unit. A subprogram is below the calling program in the call stack.
- In FORTRAN, a program unit that has a FUNCTION, SUBROUTINE, or BLOCK DATA statement as its first statement.
- A program that is called by another program, such as a subshell. See also main program.
- In Ada language, a program unit that can be either a procedure or a function. A subprogram includes: a) a declaration, which specifies its name, formal parameters, and (for a function) its result; and b) a body, which specifies the sequence of actions.
- In SQL, a subselect used within a predicate, for example, a select-statement within the WHERE or HAVING clause of another SQL statement.
- A form of a fullselect that is enclosed within parentheses and used as a component of a query.
A set of resource names and rules for the construction of resource names. Tivoli Workload Scheduler for z/OS uses these names when checking a user's authority to access individual Tivoli Workload Scheduler for z/OS data records.
- A sequence of instructions within a larger program that performs a particular task. A subroutine can be accessed repeatedly, can be used in more than one program, and can be called at more than one point in a program.
- In REXX, an internal, built-in, or external routine called by the CALL instruction that may or may not return a result string. If a subroutine returns a result string, a subroutine can also be called by a function call, in which case it is being called as a function.
- In SQL replication, to enable tables or views registered as replication targets to receive initial source data and subsequent changes from tables or views registered as replication sources.
- To register to access the mastered data from Emptoris Strategic Supply platform.
- To register to access data that is published by another application or system. See also publish.
- To request information about a topic.
- A person who is registered to receive email notifications of events.
- The consumer of a business service.
- In voice mail, any person who owns a mailbox.
- A publish/subscribe application that requests information about a topic.
A named set of variables used to define a specific level of service available to telephone subscribers, such as maximum number of messages per mailbox and maximum number of members per mailbox distribution list.
subscriber identity module (SIM)
A smart card inserted into GSM phones that contains the user's telephone account information, and that allows the user to use a borrowed or rented GSM phone as if it were his or her own.
Subscriber Identity Module card (SIM card)
A portable memory card that contains the user's subscription information, personal data, and contact list. SIM cards are exclusive to GSM (or GSM compatible) networks and are supported around the world. See also Global System for Mobile Communications, phone locking.
- In COBOL, a positive number or variable whose value refers to a particular item in a table.
- A character that is printed one-half line below the normal printing line. For example, the number 2 in the chemical formula for water, H 2 O, is a subscript. See also superscript.
- One or more expressions, each enclosed in brackets, that follow an array name. A subscript refers to an element in an array.
- An integer or variable whose value selects a particular element in a table or array.
- A schedule of reports to be executed or delivered to a distribution list.
- The process of exporting a subset of master data or a set of profiles to stores.
- Email notices and Really Simple Syndication (RSS) feeds that repository users create to receive when the state of an asset changes.
- An order that allows continuous access to a service or a product for a specified period of time. For example, a monthly magazine can be ordered for one year for $20, or two years for $35.
- In a Tivoli environment, the process of identifying the subscribers that the profiles are distributed to. See also enterprise configuration, managed server.
- In SQL replication, an object that creates subscription sets and subscription-set members. See also Q subscription, registration, subscription set.
- A method that sets up the conditions required for an event action to take place and the class, object, instance or workflow that event acts upon.
- A request made to an owner center for data to be sent periodically to an external center.
- A record that contains the information that a subscriber passes to a local broker or server to describe the publications that it wants to receive.
- The set of mappings between source replication objects and target replication objects.
The process in which the Apply program retrieves changed data for a given subscription set, replicates the changes to the target table, and updates the appropriate replication control tables to reflect its status and current progress.
In SQL replication, a definition that controls the replication of changed data during a subscription cycle. A subscription set can contain zero or more subscription-set members. See also replication source, subscription.
In SQL replication, a definition that maps a registered replication source to a replication target. Each member defines the structure of the target table and the rows and columns that are replicated from the source table. See also replication source.
- To replicate data from part of a source table, rather than from the entire table, to a target table. Data can be subset by rows or by columns.
- A set of elements within a dimension. Subsets may be named and saved for future use.
- A variant form of a programming language with fewer features or more restrictions than the original language.
- A set of elements from within another set.
A group of subspaces and a single base space, where the base space is the normal MVS address space. See also subspace group facility.
subspace group facility
A facility in MVS that can be used for storage isolation to preserve data integrity within an address space. See also subspace group.
A state that is part of a composite state. See also disjoint substate.
An XML Schema feature that provides a means of substituting one element for another in an XML message. A substitution group contains a list of global elements that can appear in place of another global element, called the head element.
In UML modeling, a dependency relationship in which the client model element takes the place of the supplier model element. See also dependency relationship.
- A variable in a form whose value is specified by a global variable.
- In pseudo-JCL, a symbol that is used in a build script and that receives a value from a build server default, from the build script itself, or from a symbolic parameter.
- A variable in a procedure or query whose value is specified either by a global variable or by a runtime variable.
- A variable used to pass information, such as a file name, for use in a message.
- A variable with a user-specified value that is used to perform a one-off replacement wherever a substitution is required. Even if the value of the variable changes throughout the process, this is not reflected in the substitution variable. See also variable scope.
- A variable that can be used to specify column selection criteria or to create an SQL WHERE Clause.
- In the Remote System Explorer, a container for a particular user's remote IBM i libraries, command sets, and jobs.
- A secondary or subordinate system, usually capable of operating independently of, or asynchronously with, a controlling system.
- The part of communications that handles the requirements of the remote system, isolating most system-dependent considerations from the application program.
- An operating environment, defined by a subsystem description, where the system coordinates processing and resources.
- In z/OS, a service provider that performs one or many functions but does nothing until a request is made. For example, each WebSphere MQ for z/OS queue manager or instance of a DB2 for z/OS database management system is a z/OS subsystem.
A system object that contains information defining the characteristics of an operating environment controlled by the system. The system-recognized identifier for the object type is *SBSD.
- A user-assigned number that identifies a direct access storage device (DASD) subsystem. This number is set by the service representative at the time of installation and is included in the vital product data (VPD).
- A number that uniquely identifies a logical subsystem (LSS) within a computer installation.
subsystem information base
In OSI, an information base that specifies configuration information. The subsystem information base is built mostly by the Administrative Facility and used by OSI Communications Subsystem to control its own operations and network operations.
- A tree structure created by arbitrarily denoting a node to be the root node in a tree. A subtree is always part of a whole tree. See also forest of trees index.
- A lower-level directory structure.
- A branch of a type tree that includes a type and all of the subtypes that stem underneath it.
- A section of a directory tree. The subtree typically starts at a particular directory and includes all subdirectories and objects below that directory in the directory hierarchy; that is, any subdirectories or objects connected to the directory or to any lower level of its subdirectories.
- A type that extends or implements another type; the supertype.
- A named row data type that inherits all representation (data fields) and behavior (routines) from a supertype above it in the type hierarchy and can add additional fields and routines. The number of fields in a subtype is always greater than or equal to the number of fields in its supertype.
- In Ada language, a subset of the values of a type that is determined by a constraint on the type. Each value in the set of values of a subtype belongs to the subtype and satisfies the constraint determining the subtype.
A job that cannot start until all of the predecessor jobs or job streams on which it is dependent are completed successfully. See also predecessor.
- A distinguished name that identifies the top entry in a locally held directory hierarchy. Because of the relative naming scheme used in Lightweight Directory Access Protocol (LDAP), this suffix applies to every other entry within that directory hierarchy. A directory server can have multiple suffixes, each identifying a locally held directory hierarchy.
- A code dialed by a caller who is already engaged in a call.
- An affix that appears at the end of a name. For example, the affix "eddin" in "Nur-eddin" is a suffix.
- A character string attached to the end of a file name that helps identify its file type.
- The process of including non-redundant sentences in search results to briefly describe the content of a document. See also dynamic summarization, static summarization.
- The process of aggregating events and then submitting the set of events with a much smaller number of summary events.
In reporting and analysis, an aggregate value that is calculated for all the values of a particular level or dimension. Examples of summaries include total, minimum, maximum, average, and count.
Information about the response times and volume history, as well as total times and counts of successful transactions for the whole application See also data interval.
A partition that contains pre-summarized values for the categories in higher levels of one or more dimensions. Information requests that can be satisfied from the summary partition use the pre-summarized values and, therefore, require less calculation at the time of the request.
- A statistics report produced by the CICS statistics utility program (STUP). It summarizes the interval, unsolicited, requested reset, and end-of-day statistics on an applid by applid basis. See also statistics utility program.
- In Query, a report that contains only summary information, such as the total, average, minimum, maximum, or count by a query. See also detail report.
A materialized query table whose fullselect contains a GROUP BY clause that summarizes data from the tables referenced in the fullselect. See also materialized query table.
- A container element that comprises a series of tasks.
- A task that comprises a series of subtasks.
See daylight saving time.
super asynchronous mode
In high availability disaster recovery, the synchronization mode in which the primary database considers a transaction committed when the transaction is successfully written to the disk of the primary system. The primary database does not wait for an acknowledgment that the log data was sent to the standby system. See also high availability disaster recovery, synchronization mode.
- In Java, a class from which a particular class is inherited, perhaps with one or more classes in between.
- See parent class.
- In AIXwindows and Enhanced X-Windows, a class of widgets that passes inheritable resources down the hierarchy to a lower subclass.
A computer that leads the world in processing capacity and speed of calculation when it is introduced. See also Watson.
A bit template that identifies to the TCP/IP code which bits of the host address are used for routing to specific subnets. A subnet mask has fewer 1 bits than the corresponding class mask for a given Internet Protocol (IP) address.
A symbol, number, or letter written immediately above and to the right or left of another character. For example, a footnote can be identified in text with a superscript number. See also subscript.
A concept of one component taking the place of another component. For example, when a user undoes an operation, a previous instance of a component supersedes the current component.
- All the interfaces and classes that are extended or implemented by that type.
- In a type hierarchy, a type that subtypes inherit attributes from.
- A named row data type whose representation (data fields) and behavior (routines) is inherited by a subtype below it in the type hierarchy.
- A user who has various system control authorities above and beyond that of the ordinary user. In UNIX environments, the standard superuser is root.
- See root user.
- The unrestricted ability to access and modify any part of the operating system, usually associated with the user who manages the system.
- See root user authority.
A combination of two or more versions of the metadata. The versions are combined to form a superset, although when there is a conflict between, for example, a text in one or more of the versions, the more recent versions generally take precedence over the older versions.
- A request that serves as the interface into operating system functions, such as allocating storage. The SVC protects the operating system from inappropriate user entry. All operating system requests must be handled by SVCs.
- An instruction that interrupts the program being run and passes control to the supervisor so that it can perform the specific service indicated by the instruction.
A state during which a processing unit can execute input/output and other privileged instructions. See also problem state.
Pertaining to a frame format that performs data link control functions such as acknowledging information frames, requesting retransmission, and requesting temporary suspension of transmission. Receive ready (RR), receive not ready (RNR), and reject (REJ) are examples of supervisory frame formats.
supervisory control and data acquisition (SCADA)
A broad term, used to describe any form of remote telemetry system used for gathering data from remote sensor devices (for example, flow rate meters on an oil pipeline) and for the near real time control of remote equipment (for example, pipeline valves). These devices communicate with the broker using the SCADA device protocol (MQIsdp).
A routine, usually part of an operating system, that controls the execution of other routines and regulates the flow of work in a data processing system. See also supervisor.
One or more group profiles of which the user is a member. The user's first group profile is specified in the group profile (GRPPRF) parameter of the user profile. Supplemental group profiles are specified in the supplemental group profile (SUPGRPPRF) parameter of the group profile.
In Euro-ISDN, a service outside the minimum service offering that each signatory is obliged to provide. For example, calling line identification presentation (CLIP) and call session.
- A provider of products, services, or both to a customer.
- A classifier that provides services that can be invoked by others.
- A manufacturer or other company that provides goods to the shipper.
supplier cost constraint
The excess cost incurred when doing business with certain suppliers. This cost gets added to the bids, and the awarding suggestions are made by taking into account the excess cost.
For directory shadowing, a system that provides initial or changed Enterprise Address Book (EAB) data to a collector system in a network. See also collector system.
supply and demand analysis
A graphic space capacity fit or gap analysis to develop portfolio plans that efficiently use space across time. The analysis compares demand to the supply across time to determine if business needs match the space or portfolio inventory.
- An element of the Business Plan that includes the activities and services required to support a brand, training levels required, expense targets and specialized funding requirements. Support is one of the activities managed by the Global Brand Manager.
- In system development, to provide the necessary resources for the correct operation of a functional unit.
See IBM Support Assistant.
suppression local ID
A value assigned in the Map Suppression coded field to a suppression named in a Line Descriptor (LND) or Record Descriptor (RCD) structured field. This value is contained in the Begin and End Suppression text controls.
A customization option that restricts access to selected information in the cube by concealing a category within a dimension view. Within any cube that includes the view, the immediate descendants of the suppressed category link directly to its immediate ancestor category. In the cube, users see only the immediate ancestors and immediate descendants of the suppressed category.
See surrogate identifier.
surrogate identifier (surrogate ID)
An artificial identifier used to replace the natural member identifier of a dimension. Whereas the natural member identifier may be text-based, the surrogate identifier is always an integer. Natural member identifiers may have meaning, such as a product code, however, surrogate identifiers do not.
- An artificially created unique identifier column for rows in those tables that have no such natural key column.
- See surrogate identifier.
A coded representation for a single character that consists of a sequence of two 16-bit code units, in which the first value of the pair is a high-surrogate code unit in the range U+D800 through U+DBFF, and the second value is a low-surrogate code unit in the range U+DC00 through U+DFFF. Surrogate pairs provide an extension mechanism for encoding an additional 1,048,576 characters without using any 32-bit code units.
In CICS transaction routing, a TCTTE in the transaction-owning region that is used to represent the terminal that invoked, or was acquired by, the transaction. See also surrogate terminal.
A terminal whose terminal definition is shipped from a terminal owning region (TOR). See also surrogate TCTTE.
suspect relationship state
A state applied to a traceability or hierarchical relationship when a change occurs to one or both of the requirements in the relationship. A suspect relationship state indicates that, because of the modification to one or both requirements, the relationship may require modification as well. See also change-managed relationship, traceability matrix.
- In cross-site mirroring, to temporarily stop geographic mirroring. If the mirror copy contained usable data when suspended, the mirror copy still contains usable, though possibly outdated, data.
- To remove an object from its workflow and define the suspension criteria needed to activate it. Later activating the object enables it to continue processing.
- To temporarily remove a change set from a repository workspace.
- To pause a process instance.
Pertaining to a case-level status that is used to classify an interview that has not yet had all of the respondents’ answers entered as data. This status differs from the concept of the survey itself being incomplete in terms of the volume of responses or responses to specific questions.
- A state in which the resource is temporarily not receiving a request. A start action request returns the resource to the state it was in prior to being suspended.
- In cross-site mirroring, the configuration state of the mirror copy that does not attempt to perform geographic mirroring when the independent disk pool is available. The mirror copy state is suspended when it is not resuming or active.
- A state in which only one of the devices in a dual-copy or remote-copy volume pair is being updated as a result of a permanent error condition or an authorized user command. All writes to the remaining functional device are logged. Suspended state allows for automatic resynchronization of both volumes when the volume pair is reset to the active duplex state.
sustainable cell rate (SCR)
The maximum average rate at which an asynchronous transfer mode (ATM) endsystem can transmit cells into the network. The "on" and "off" cycles of transmission are averaged to determine the sustainable cell rate. See also maximum burst size, peak cell rate.
See system under test.
See schedule variance.
See shared virtual area.
See service bundle.
- See supervisor call.
- See switched virtual channel.
- See switched virtual circuit.
- See stored value card.
- A memory dump that is executed by a supervisor call (system macroinstruction).
- A dump that is issued when a z/OS or a DB2 functional recovery routine detects an error.
See Scalable Vector Graphics.
See Software Value Incentive.
See IBM Software Value Plus.
See Software Value Plus Industry Authorized.
See scheduler work area.
See Software Answer Network.
- A process that interchanges the contents of an area of real storage with the contents of an area in auxiliary storage.
- See paging.
See Software Group.
See bank identifier code.
SWIFT input message
A SWIFT message with an input header to be sent to the SWIFT network. See also SWIFT output message.
A SWIFT service providing FIN access using the Secure IP Network (SIPN) instead of the SWIFT Transport Network (STN). See also FIN.
See SWIFTNet public key infrastructure.
SWIFTNet public key infrastructure (SWIFTNet PKI)
SWIFT's mandatory security software and hardware installed with SWIFTNet Link. See also public key infrastructure.
SWIFTNet service application
An application that uses SWIFTNet services. Financial organizations such as Continuous Linked Settlement (CLS) or the Global Straight Through Processing Association (GSTPA) offer such applications to financial institutions.
SWIFT output message
A SWIFT message with an output header coming from the SWIFT network. See also SWIFT input message.
- A visually separated row within a process flow diagram that groups all the activities in the process that are performed by a particular combination of roles, resources, organization units, or locations.
- See pool.
- See partition.
A collection of GUI components that runs consistently on any operating system that supports the Java virtual machine (JVM). Because they are written entirely in the Java programming language, these components provide functionality above and beyond that provided by native-platform equivalents. See also Abstract Window Toolkit, Standard Widget Toolkit.
To rapidly move your finger horizontally or vertically on a touchscreen. Typically, apps use swipe gestures to switch between menus. See also gesture.
See Software IT Architect.
- A network infrastructure component to which multiple nodes attach. Unlike a hub, a switch typically has internal bandwidth that is a multiple of link bandwidth and the ability to rapidly switch a node connection from one to another. A typical switch can accommodate several simultaneous full-link bandwidth transmissions between different pairs of nodes.
- A command-line option.
- A half-duplex or full-duplex device that detects which devices are attached at each port and passes only frames addressed to those devices on that port. A switch has a small collision domain.
- A device that provides connections between telephone lines and trunks.
The physical resource containing the independent disk pools that can be switched between systems in a cluster. This can be a expansion unit containing disk units in a multiple system environment. This could also be an IOP containing disk units in an LPAR environment. See also device cluster resource group.
switchable hardware group
See device cluster resource group.
In a remote journal network, pertaining to the processing that is performed by a hot-backup application to allow the primary system to reassume its role from a previously promoted backup system.
- A mode of operating a data link in which a circuit or channel is established to switching facilities as, for example, in a public switched network.
- A connection that is established by dialing. See also nonswitched connection.
- A Fibre Channel topology that provides the underlying structure to interconnect multiple nodes and provides the necessary switching functions to support communication among multiple nodes. See also arbitrated loop, point-to-point.
- The physical or logical mapping of the location of networking components or nodes within a network. Common network topologies include bus, ring, star, and tree.
In data communications, a connection between computers or devices that is established by dialing. See also nonswitched line.
switched network backup (SNBU)
A modem feature that allows a nonswitched line to be used alternatively as a switched line or allows a switched line to be used as a nonswitched line depending on the characteristics of the modem.
switched virtual channel (SVC)
In asynchronous transfer mode (ATM), a temporary connection between two users that is established when one user calls another. Although this is similar in concept to one person's calling another person on the telephone, the signaling techniques are different. See also permanent virtual channel.
- A virtual circuit that is requested by a virtual call. It is released when the virtual circuit is cleared.
- In OSI, a temporary association between two DTEs that is initiated when one DTE makes a call request to the network.
The BladeCenter component that provides network connectivity for the BladeCenter chassis and blade servers. It also provides interconnectivity between the management module and blade servers.
- The change from the active multi-instance queue manager instance to a standby instance. A switchover results from an operator intentionally stopping the active multi-instance queue manager instance.
- A cluster event where the primary database server or application server switches over to a backup system due to the manual intervention from the cluster management interface.
- In a remote journal network, pertaining to the processing that is performed by a hot-backup application to logically promote a backup system to assume the role of a primary system.
In WebSphere MQ for z/OS, a RACF profile used when WebSphere MQ starts up or when a refresh security command is issued. Each switch profile that WebSphere MQ detects turns off checking for the specified resource.
See short wavelength.
See Software Maintenance.
See Standard Widget Toolkit.
- A hyphen used to divide a word at the end of a line; it may be removed when a program adjusts lines. See also required hyphen.
- See soft hyphen.
A shared source, proprietary mobile operating system that is currently maintained by Accenture. At the height of its popularity, Symbian OS was used primarily by Nokia and Sony. See also mobile operating system.
- In MVS, a group of 1 - 8 characters, including alphanumeric characters and the three characters: #, @, $. The symbol begins with either an alphabetic character or one of the three characters (#,@,$).
- Any combination of alphabetic or numeric characters (A-Z, a-z, or 0-9) and the characters @, #, $, ., !, ?, and _.
- A collection of graphic objects, parameters and conditions that are used to give a dynamic representation of changing data. It is made up of objects and other symbols.
- A string of characters that represent a finanical instrument and might also identify where the instrument is traded. One instrument can be represented by different strings in different symbologies. See also order book.
A checkpoint in a batch, BMP, or JBP application that indicates to IMS that the program has reached a commit point and that establishes a place in the program from which the application can be restarted. See also extended restart.
A tool that aids in the debugging of programs written in certain high-level languages. See also source debugger.
symbolic destination name
In the OSI Communications Subsystem licensed program, a name by which an application entity identifies to OSI Communications Subsystem the peer application entity with which it is to communicate. OSI Communications Subsystem uses the symbolic destination name to determine (a) the presentation address of the peer application entity, and (b) the application mode to be used on the association.
symbolic feedback code
The symbolic representation of the first 8 bytes of the 12-byte condition token. In a condition handling routine, a symbolic feedback code is substituted for the hexadecimal coding of the condition token.
- A string composed of characters from the ISO 646 code set that is used in locales to represent a character.
- A unique name used to identify an entity such as a field, file, data structure, or label within an RPG program.
In EGL, a symbol specified at declaration time, either to override a substitution variable that is used in a pseudo-JCL build script or to specify a value for use in certain build descriptor options.
In ILE, the process the binder uses to match unresolved imports from the set of modules to be bound by copy with the set of exports provided by the specified modules and service programs.
- In Business Graphics Utility, a supplied character set used for text strings on charts; for example, headings, legend text, labels, and notes.
- In PSF, a type of font that resides in a printer but has fewer attributes than can be specified for resident coded fonts.
An algorithm where the encryption key can be calculated from the decryption key and vice versa. In most symmetric algorithms, the encryption key and the decryption key are the same.
A network in which all the initiators are connected at the same level and all the controllers are connected at the same level. See also oversubscription.
See shared-secret key cryptography.
A common key and mathematical algorithm used to both encrypt and decrypt a message. For two people to communicate securely with each other, both need to agree on the same mathematical algorithm to use for encrypting and decrypting data. They also need to have a common key: the secret key. Symmetric encryption is also referred to as secret key encryption.
symmetric key cryptography
A system of cryptography in which the sender and receiver of a message share a single, common, secret key that is used to encrypt and decrypt the message. See also asymmetric key cryptography.
A virtualization technique in which the physical storage, in the form of a Redundant Array of Independent Disks (RAID), is split into smaller chunks of storage known as extents. These extents are then concatenated, using various policies, to make volumes. See also asymmetric virtualization.
An XML file of symptoms including one or more string match patterns with one or more associated solutions that is used in the analysis of event and error messages that occur in an activity log.
- Diagnostic information displayed in a structured format designed for searching the IBM software support database.
- A structured character string written to a file when VTAM detects certain error conditions.
See synchronization character.
See synchronization character.
In SQL replication, a control table value for the sequence number in the DB2 log or journal record corresponding to the last change that was applied during the most recent Apply cycle. This value is also used to coordinate the pruning of CD tables. See also change-data table.
- The process of coordinating system data component content in order to maintain consistency.
- A bi-directional process of copying data updates and metadata from an original cube to its replicated versions, and from replicated versions of the cube back to the original cube.
- A coordinated commitment control process between communicating transactions that ensures that all logically-related updates to recoverable resources are completed or that all are backed out.
- In Unified Modeling Language (UML), the visual representation of the forks and joins representing parallel workflows. Synchronizations enable you to see a simultaneous workflow in an activity diagram or state chart diagram.
- The cross-site mirroring (XSM) processing that copies data from the production copy to the mirror copy.
- The action of forcing certain points in the execution sequences of two or more asynchronous procedures to coincide in time.
- The process of making the primary volume and secondary volume identical after a communication downtime or upon the initialization of the mirroring.
- The process of publishing and updating changes in a rule to a server.
- The process by which a satellite downloads and runs the same DB2 database commands, operating system commands, and SQL statements from the satellite control server as the other members of its group download and then reports the results to the satellite control server.
synchronization character (SYN, SYN character)
In binary synchronous communications, the transmission control character that provides a signal to the receiving station for timing the characters received.
A set of data containing the history of changes (such as updates and deletes) to the data in a particular table. Historical data is stored in shadow tables. Historical information is required for incremental publications. See also incremental publication, shadow table.
synchronization level (sync level)
The level of synchronization (0, 1, or 2) established for an APPC session between intercommunicating CICS transactions. Level 0 gives no synchronization support, level 1 allows the exchange of private synchronization requests, and level 2 gives full CICS synchronization support with backout of all updates to recoverable resources if failure occurs.
A message that consists of one or more synchronization operations (propagation of transactions or refresh requests). See also transaction propagation.
In high availability disaster recovery, an option that specifies the level of coordination between the primary and standby databases when logs are sent from the primary database to the standby database in peer state. Synchronization mode determines the balance between performance and the potential for data loss. See also asynchronous mode, near synchronous mode, super asynchronous mode, synchronous mode.
- In OSI, a point to which a session can be reset. Setting a synchronization point requires the appropriate token. Synchronization points are a session-layer service.
- A point in time from which IMS or an application program can start over if a failure makes recovery necessary. The two types of synchronization points are system checkpoints done by IMS itself, and application program synchronization points (also known as commit points) done on behalf of individual application programs. See also commit point, system checkpoint.
- In APPC, a reference point during transaction processing to which resources can be restored if a failure occurs.
synchronization time interval
The elapsed time in seconds between storage management subsystem (SMS) checks for volume status, space statistics, and configurational changes from other systems in the SMS complex (SMSplex).
- To add, subtract, or change one feature or artifact to match another.
- In mobile computing, to update devices and a base station (such as a personal computer) simultaneously such that the information on both devices reflect each other (parallel calendar entries, read emails, application downloads, and so on).
In Contributor, a function used to update all cubes and links in an application when the underlying objects in Analyst change. Changes include renaming dimensions, and adding, deleting, or renaming dimension items.
- In cross-site mirroring, pertaining to the mode of geographic mirroring where the program that issues the update waits until the operation is completed on both the production copy and the mirror copy. This mode ensures that once control is returned to the client, the operation is accurately reflected on both the production copy and the mirror copy.
- Pertaining to a mode of coordination of communication among distributed processes that requires request-reply pairs to occur within the bounds of a specified time interval in which the communication session is live.
- Occurring with a regular or predictable time relationship.
- Pertaining to two or more processes that depend upon the occurrences of specific events, such as a common timing signal. See also asynchronous.
A request sent by an object that pauses to wait for results. See also asynchronous action.
Synchronous Data Link Control (SDLC)
A protocol for managing synchronous information transfer over a data link connection. See also binary synchronous communication.
synchronous disk I/O
In Performance Tools, a disk access operation that must complete before program operation can continue. See also asynchronous disk I/O.
A method of communication between programs in which a program places a message on a message queue and then waits for a reply to its message before resuming its own processing. See also asynchronous messaging.
In high availability disaster recovery, the synchronization mode in which the primary database considers a transaction to be committed when it gets an acknowledgment message from the standby system that confirms that the relevant log data was received and written to disk on the standby system. See also synchronization mode.
In VTAM, a communication, or other operation in which VTAM, after receiving the request for the operation, does not return control to the program until the operation is completed. See also asynchronous communication, asynchronous operation.
A function of a storage server that maintains a consistent copy of a logical volume (LVOL) on the same storage server or on another storage server. All modifications that any attached host performs on the primary LVOL are also performed on the secondary LVOL. See also Peer-to-Peer Remote Copy, PPRC Extended Distance.
A series of operations that are done as part of the job in which they were requested; for example, calling a program in an interactive job at a work station. See also asynchronous processing.
A communications protocol that is used to send and receive data across high-speed mainframe networks. Data is synchronized and transmitted using constant intervals between data bits and characters.
A shard that receives updates as part of the transaction on the primary shard to guarantee data consistency, which can increase the response time compared with an asynchronous replica. See also asynchronous replica.
- A type of replication that delivers updates continuously and within the scope of source transactions. See also asynchronous replication.
- A type of replication in which the application write operation is made to both the source volume and target volume before control is given back to the application. See also asynchronous replication.
In VTAM, a request for a synchronous operation. See also asynchronous request.
A method of transmission in which the sending and receiving of data is controlled by timing signals. See also asynchronous transmission.
A form of synchronous I/O that writes the file data to disk, updates the inode times, and writes the updated inode to disk. When the write returns to the caller, both the data and the inode have been written to disk.
See synchronization level.
See synchronization point.
- See point of consistency.
- A point during the processing of a transaction at which protected resources are consistent.
sync point services (SPS)
The component of the sync point manager that is responsible for coordinating the managers of protected resources during sync point processing. SPS coordinates two-phase commit protocols, resync protocols, and logging.
- A multilevel tree structure representing a hierarchical relationship among transaction programs and other resource managers in a distributed two-phase commit operation. The root node of the sync point tree is the initiator of the original commit or backout request.
- The tree of recovery managers and resource managers that are involved in a logical unit of work, starting with the recovery manager, that make the final commit decision.
Synergistic Processor Element (SPE)
In the Cell Broadband Engine architecture, a grouping of multiple Synergistic Processor Units (SPUs). The SPEs perform specialized tasks that involve high computational density, such as those required by game, multimedia, and broadband applications. See also Cell Broadband Engine processor, Synergistic Processor Unit.
Synergistic Processor Unit (SPU)
A 128-bit processor with single-instruction multiple-data (SIMD) capabilities specialized for computationally-intensive tasks. The SPUs use a specialized instruction set, for SIMD operations. Multiple SPUs make a up a Synergistic Processing Element (SPE). See also Synergistic Processor Element.
A type of denial-of-service attack in which an attacker sends a large number of TCP connection requests to a target computer, without answering the target computer's acknowledgment requests. The target computer becomes overloaded and denies service to legitimate users.
- In SQL, an alternative name for a table view. Synonyms can be used to refer only to objects at the subsystem in which the synonym is defined. A synonym cannot be qualified and can therefore not be used by other users.
- A name that is assigned to a table, view, or sequence and that can be used in place of the original name. A synonym does not replace the original name; instead, it acts as an alias for the table, view, or sequence.
- See alias.
- A term in a business glossary that has the same meaning as another term. A term can have multiple synonyms. The relationship is symmetrical and transitive; that is, if term A is a synonym of term B, and term B is a synonym of term C, each term is a synonym of the others.
syntactic character set
A set of 81 graphic characters that are registered in the IBM registry as character set 00640. This set is used for syntactic purposes maximizing portability and interchangeability across systems and country or region boundaries. It is contained in most of the primary registered character sets, with a few exceptions. See also invariant character set.
- In DCE X/Open Object Management (XOM), any of the various categories into which the object management (OM) specification statically groups values on the basis of their form.
- The rules for the construction of a command or statement. See also semantics.
- The arrangement of and relationship among the elements of a name (or other expression or phrase). For example, English name syntax distinguishes the given names and family names in: Todd Lane and Lane Todd.
In source editors, the ability to differentiate text and structural elements, such as tags, attributes, and attribute values, using text highlighting differences, such as font face, emphasis, and color.
- A data subtype that applies only to string fields and can contain one or more character ranges and single characters, such as $, Z or@.
- A token that defines ranges of characters and/or numbers that are allowed to be used for a string-type element or field.
syntax tree listing
In OSI, a report produced by the Abstract Syntax Checker that lists the order and hierarchical relationships of presentation data values (PDVs) and data structures--and shows the associated type assignments.
A category used to classify different formats of documents. Data Interchange Services supports three syntax types: XML, EDI, and record oriented data. The user can map and translate between any of these syntax types.
See synthetic event.
An event that is triggered in response to a condition that was detected while processing the current event. Unlike an action, which is also triggered in response to a condition that was detected during the processing of the current event, a synthetic event is not sent to an external system.
Synthetic Transaction Investigator playback policy (STI policy)
A policy that collects performance data from played back transaction recordings so that the overall performance and availability of a website can be evaluated. Transaction recordings often represent common user activity on a website, such as searching for information, enrolling in a class, opening or accessing an account, or purchasing goods or services online.
A server-level database that supports all the logged databases of a database server instance. Its tables store information that the DBSA can use in various administrative operations, including tuning and configuring the database server, monitoring and analyzing resource usage, scheduling recurring maintenance tasks, and logging calls to the SQL Administration API functions.
See system call.
See system generation.
See system input stream.
See system link.
- In a UNIX system, the subsystem that collects and manages logging data that is created by other subsystems.
- A standard for transmitting and storing log messages from many sources to a centralized location to enhance system management.
See system modification.
See system output stream.
A set of z/OS systems that communicate with each other through certain multisystem hardware components and software services. See also base sysplex.
See sysplex couple data set.
sysplex couple data set (sysplex CDS)
A couple data set (CDS) that contains sysplex-wide data about systems, groups, and members that use cross-system coupling facility (XCF) services. All systems in a sysplex must be connected to the sysplex CDS. See also couple data set.
sysplex data sharing
The ability of multiple IMS subsystems to share data across multiple MVS images. Sysplex data sharing differs from two-way data sharing in that the latter allows sharing across only two z/OS images.
sysplex query parallelism
Parallel execution of a single query that is accomplished by using multiple tasks on more than one DB2 for z/OS subsystem. See also query CP parallelism.
An IBM unit that synchronizes the time-of-day (TOD) clocks in processors. See also external time reference.
See system residence volume.
- A set of individual components, such as people, machines, or methods, that work together to perform a function.
- A computer and its associated devices and programs.
- A single node or a cluster of nodes acting as a single computing entity. A system in this sense may run multiple instances of the operating system. See also cluster node.
- A collection of referenced executable maps that are organized into a unit.
- A functional unit, consisting of one or more computers and associated software, that uses common storage for all or part of a program and also for all or part of the data necessary for the execution of the program. A system can be a stand-alone unit, or it can consist of multiple connected units. See also clustered system.
A function of the i5/OS operating system that processes most of the System/36 operator control language (OCL) statements and procedure statements to run System/36 application programs and allows the user to process the control language (CL) commands. See also System/38 environment.
See System/370 Host Interface Adapter.
A function of the operating system that processes most of the System/38 control language (CL) statements and programs to run System/38 application programs. See also System/36 environment.
An abend caused by the operating system's inability to process a routine. See also user abend.
- A DB2 database user with administrative authority. In DB2 for Linux, UNIX, and Windows and in DB2 for z/OS, this authority is SYSADM. In DB2 for IBM i, this authority is *ALLOBJ.
- The person who controls and manages a computer system.
- In OSI, a person who controls how the open system resources of a system or enterprise are used.
- An attribute that indicates the system or processor for processing a z/OS job.
- See affinity.
A work request that DB2 for z/OS creates, such as prefetch processing, deferred writes, and service tasks. See also allied agent.
The auxiliary storage pool where system programs and system data reside. It can also include user programs and user data. The system ASP (ASP1) always exists. See also auxiliary storage pool, user ASP.
An authority level that has full privileges for managing a system but cannot access the data in the system. The system authority level can be SYSCTRL or SYSMAINT. See also authority level.
System Authorization Facility (SAF)
A z/OS interface with which programs can communicate with an external security manager, such as RACF. See also command authorization.
system authorization ID
The primary DB2 authorization ID that is used to establish a trusted connection. A system authorization ID is derived from the system user ID that is provided by an external entity, such as a middleware server.
system call (syscall)
A call by a program to an operating system subroutine. See also callable service.
A point at which IMS records its internal status--control information, plus a unique checkpoint ID--and writes the checkpoint table to the restart data set (RDS). This information allows IMS to reconstruct its condition if recovery is later necessary. System checkpointing is done automatically each time a user-selected number of records is written to the log. See also synchronization point.
system configuration file
A configuration file that is distributed from a remote system in a push-to-client environment. See also push-to-client.
- A display station from which an operator can control and observe the system operation.
- The device that is in control of the operating system after the system has been shut down and when the system is in a restricted state. Only one device can be the system console at one time. See also backup console.
system contents directory (SCD)
A data area whose primary function is to contain major entry pointers for all IMS facilities. Its secondary function is to contain system data and the status of the log functions and commands.
system control area (SCA)
In MFS, a message field that allows an application program to control specific terminal features when the features apply to the terminal for which the message is destined. See also default system control area.
System Control Process (SCP)
A MERVA Link component that handles the transfer of MERVA ESA commands to a partner MERVA ESA system, and the receipt of the command response. It is associated with a system control process entry in the partner table.
The process of specifying the devices, programs, and users for a particular data processing system. See also configuration.
system database directory
A directory that contains entries for every database that can be accessed by using the database manager. The directory is created when the first database is created or cataloged on the system. See also local database directory.
- In a distributed system, a repository of all shared Gentran Server for Windows data that might reside on any machine that is a file server to the machines in the Gentran Server for Windows system.
- In a single workstation system, a repository for all shared Gentran Server for Windows Data that reside on a single workstation.
- An IMS process that describes databases, application programs, terminals, and other resources to IMS.
- The process, completed before a system is put into use, by which desired functions and operations of the system are selected from various available options.
system definition diagram
The graphical representation of a system viewed within a system window in the Integration Flow Designer. A user can interact with system definition diagrams to design systems.
system definition reference search
A search that is used to discover which artifacts are associated with a particular system definition. The search can also re-reference a set of artifacts with a different system definition in one step.
system definitions node
A project node that is used to organize IBM i libraries and search paths, z/OS data set definitions, language definitions, and translators in the Team Artifacts view of Rational Team Concert.
A description of the system that should include the full name and version identification of the hardware type for the system, the software operating system, and the networking software.
A dynamic SQL management structure that is used to store information about database columns or host variables used in dynamic SQL statements. The structure contains an item descriptor for each column; each item descriptor provides information such as the name, data type, length, scale, and precision of the column. See also descriptor, SQL descriptor area.
system domain object
An object on the system that can be accessed only by a system state program. The object types that can be either system domain or user domain are: *USRSPC, *USRIDX, *USRQ, *PGM, *SQLPKG. All other object types are system domain. See also domain.
system dump code
A name of up to eight characters by which a system dump will be known. A system dump code can be defined by CICS or by the user and identifies a set of system actions held in the form of an entry in the system dump table. See also dump code.
system dump table (SDT)
A CICS table which may contain an entry for each system dump code. See also dump code.
- A business event that is emitted by the system. System events can include resource state changes, thresholds being crossed, unusual system states or actions, or an input event. See also input event, user-defined event.
- A pre-defined event in Emptoris Contract Management.
- An event that is generated by the management server or a management agent for changes related to system operation; for example, a server starting or stopping, failure of the ARM engine on an application server, or authentication problems. See also application event.
A system-defined workflow field that the user can make visible at a step, use it to determine conditional routing, and expose it for searches and sorting. A system field value cannot be edited.
- The process of creating a particular system tailored to the requirements of a data processing installation.
- See system definition.
In voice mail, a default greeting heard by callers to the mailboxes of subscribers who have not recorded a personal greeting or who have selected the system greeting. See also personal greeting.
- In SNADS, the second part of a system name in the system distribution directory.
- All systems that are part of the same Parallel Sysplex and are running the storage management subsystem (SMS) with the same configuration, excluding any systems in the Parallel Sysplex that are explicitly defined in the SMS configuration.
- In System i Navigator, a logical collection of endpoint systems.
System Health Monitoring
An IBM Director Agent feature that provides active monitoring of critical system functions, including system temperatures, voltages, and fan speeds. It also handles in-band alert notification for managed systems running Windows and some managed systems running Linux.
A family of IBM systems distinguished by their object-oriented architecture, integrated relational database, and high-level machine interface. System i systems support the IBM i, i5/OS, Operating System/400, AIX, and Linux operating systems. See also i5/OS, IBM i.
System i Access asynchronous communications
The support that connects a personal computer to an ASCII Work Station Controller on the system. See also asynchronous communication.
system import map
A map used by a translator to determine which trading relationship (established in Partner Editor) corresponds to each document in the application file, so the system knows which import map to use to process the document.
system import translation object
See system import map.
System i Navigator
A no-charge feature of IBM System i Access for Windows that is bundled with the IBM i operating system. System i Navigator provides a graphical user interface to common System i management functions. Some of the common management functions include basic operations, TCP/IP configuration, job management, users and groups, database management, and Management Central.
An index that the database server creates to implement a unique constraint or a referential constraint. A system index is distinct from a user index, which a user creates explicitly. See also attached index, user index.
A CICS facility (part of the system support component) that is used to start the CICS job. The facility is resident only long enough to bring CICS into storage and start up CICS.
system initialization parameter
Parameter used to define capabilities of a CICS system at the time of system initialization. A system initialization parameter can be predefined in the system initialization table (SIT), or specified dynamically from the console, in the SYSIN data set, or as a parameter in the startup JCL.
system initialization program (DFHSIP SIP)
CICS program that builds a CICS system using the resources you have defined and any user-designed or purchased applications. DFHSIP receives instructions from system initialization parameters.
system input/output bus
A set of hardware components that provide the physical path and logical protocol through which input/output (I/O) processors and I/O adapters communicate with system processors and main storage.
system input stream (SYSIN)
A data definition (DD) statement used to begin an in-stream data set. See also system output stream.
System i object
An object that exists in a library on the server and is represented by an object on the PC. For example, a user profile is a server object represented on the PC by the user profile object.
System i resource
In System Manager, an entity that contains objects and other resources that reside on the server and are represented by System Manager on the PC. System resources supported by System Manager include items within lists, such as user profile and user.
System i Support Family of Services
A selection of support services, which can be purchased individually or in packages, offered by IBM to customers. These services range from answering questions about system usage and support to consulting on complex system problems.
- The library shipped with the system that contains objects, such as authorization lists and device descriptions created by a user, and the system commands and other system objects required to run the system. The system identifier is QSYS.
- A collection of data sets or files in which the parts of an operating system are stored. See also user library.
- A data set or file in which job-related information, operational data, descriptions of unusual occurrences, commands, and messages to and from the operator may be stored.
- The journal (identification='01') that is used by CICS to log changes made to resources for the purpose of backout on emergency restart. See also general log.
system log data set (SLDS)
A data set on which IMS archives a full online log data set (OLDS). An SLDS can be on DASD or tape. The contents are used as input to the database recovery process. See also online log data set, write-ahead data set.
system-managed access-path protection (SMAPP)
An i5/OS function that allows a user to specify a goal for the maximum amount of time the system should use to recover access paths after an abnormal system end. The system automatically protects access paths so that they can be recovered within the time specified.
system-managed buffering (SMB)
A facility available for system-managed, extended-format, Virtual Storage Access Method (VSAM), data sets in which DFSMSdfp determines the type of buffer management technique, along with the number of buffers needed, based on data set and application specifications.
system-managed directory entry (SMDE)
A directory that contains, in the extensible format, all the information contained in the partitioned data set (PDS) directory entry and information specific to program objects.
system-managed space table space (SMS table space)
A table space whose storage space is managed by the file system manager of the operating system. This storage model is based on files that are created under subdirectories and are managed by the file system. See also database-managed space table space.
Storage managed by the storage management subsystem (SMS). System-managed storage attempts to deliver required services for availability, performance, space, and security to applications. See also system-managed storage environment.
system-managed storage environment
An environment that helps automate and centralize the management of storage. This goal is achieved through a combination of hardware, software, and policies. In the system-managed storage environment for z/OS, the function is provided by DFSMSdfp, DFSMShsm, DFSMSdss, DFSMSrmm, DFSORT, Security Server (RACF), and MVS. See also system-managed storage.
system-managed tape library
A collection of tape volumes and tape devices that are defined in the tape configuration database (TCDB). A system-managed tape library can be automated or manual. See also tape library.
system management services (SMS)
An interface that provides information about a system or logical partition and that performs tasks such as changing the boot list and setting the network parameters. This interface is used for AIX or Linux logical partitions.
- The IBM licensed program that enables a system in a network to function as a service provider for other systems in the network.
- A graphical user interface to administer and manage the WebSphere business integration system. Most administration tasks are performed using System Manager, and many of the tools, such as Map Designer and Relationship Designer, can be accessed through System Manager.
- In hardware, the semiconductor memory (modules).
- See memory.
- A list of options that affect the window or the view it contains.
- A drop-down menu that is activated by clicking the icon at the left of a window title bar and that allows users to restore, move, size, minimize, or maximize the window.
system message field
In MFS, an output device field on 3270 display devices that can be defined to receive system messages, thereby preventing unsolicited IMS messages from destroying a screen format.
Information that is created and managed by the metadata server, such as information about file sets, storage pools, volumes and policies. This information is stored in the system storage pool.
- In finance communications, a 4700 controller program used to perform service, configuration, and debugging functions on that controller.
- See database system monitor.
- A System i Navigator tool that gathers and displays real-time performance data for the system.
system-monitoring interface (SMI)
A collection of tables in the sysmaster database that maintains dynamically updated information about the operation of the database server. The tables are constructed in memory but are not recorded on disk. Users can query the SMI tables with the SELECT statement of SQL.
- An IBM-supplied name that uniquely identifies the system. It is used as a network value for certain communications applications such as APPC.
- An IBM-defined name that has a predefined meaning to the COBOL compiler. System names include computer names, language names, device names, and function names.
The highest node in the hierarchy of device locations. Connection paths lead every hardware device back to the system node. For example, an SCSI disk is connected to an SCSI adapter that is connected to a bus that is connected to the system node.
A machine object classification. Any of the machine objects shipped with the system or any of the operating system objects created by the system. See also program object.
system operator message queue
A special message queue to which the system sends messages regarding changes in the status of the system, devices, and jobs, and messages indicating a condition that needs operator intervention. This message queue is identified by the name QSYSOPR.
system output stream (SYSOUT)
A data definition (DD) statement used to identify a data set as a system output data set. See also system input stream.
See kernel parameter.
System Performance Measurement Interface (SPMI)
In the Performance Toolbox, the Agent API that allows an application program to register custom performance statistics about its own performance or that of some other system component. Once registered, the custom statistics become available to any consumer of statistics, local or remote. Also permits applications to access statistics on the local system without using the network interface. Such applications are called local data-consumer programs.
In Backup, Recovery, and Media Services, a policy that defines the overall default controls and values to be used by Backup, Recovery, and Media Services. These values can be defaulted to, or overridden by, the backup policy, archive policy, media policies, or move policies.
A storage pool that contains the system metadata (system and file attributes, configuration information, and metadata server state) that is accessible to all metadata servers in the cluster. There is only one system pool. See also metadata server.
A serial port that is available for specifically supported functions. This port is limited to serial-connected TTY console functions and use of approved call-home modems, and, in some cases, an uninterruptible power supply.
system power control network (SPCN)
An asynchronous serial communications network. SPCN connects the power system in participating components to the operating system and can report critical changes and power failures in those components to the operating system. SPCN gives the operating system control of electrical power.
system privilege class
A privilege class that gives an administrator the authority to issue all server commands. See also privilege class.
system product division (SPD)
A bus architecture that allows I/O to communicate to the processor. SPD-I/O refers to devices that use the SPD bus architecture to communicate with the rest of the system.
- A file containing the default values used in system operations.
- The partition layout and list of files to deploy an operating system, either by unattended setup or by cloning. A system profile can have several configurations.
See systems programmer.